Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Grupo Caoa
Grupo Caoa is a Brazilian automotive company that was established in 1979. It is the distributor of the Subaru, Hyundai and Chery brands in Brazil. It has two of its own factories in Brazil, one in the Agroindustrial District of Anápolis, where Hyundai and Chery models are assembled, as well as another in Jacareí, resulting from the acquisition of 50.7% of the company's Brazilian operations of Chery, in September 2017, forming Caoa Chery.
Caoa stands for the name of its founder, Carlos Alberto de Oliveira Andrade.
History
Dr. Carlos Alberto de Oliveira Andrade of Paraíba purchased a Ford Landau in 1979, at a dealership called Vepel, in the city of Campina Grande in Paraíba, but the dealership went bankrupt before delivering the vehicle. As compensation for the undelivered car, Carlos kept the dealership. Six years later, Grupo Caoa – a name formed from the initials of its founder – reached the level of the largest Ford dealer in all of Latin America. The company's expansion in the automotive sector took place in 1992, when Brazil opened its doors to importing vehicles. In the following years, Caoa became an official importer of other brands such as Renault.
In 1998, Caoa began representing Subaru, the automotive division of Subaru Corporation. In 1999, Hyundai also transferred its representation to Caoa in Brazil, after passing through the hands of two other distributors. In 2001, Hyundai became the leading brand in the import market and the Tucson became the best-selling SUV. In 2007, Grupo Caoa opened Caoa Montadora de Veículos, which was the result of an initial investment of R$1.2 billion, built in the Agroindustrial District of Anápolis. This resulted in earning Carlos Alberto de Oliveira Andrade the title of "Entrepreneur of the Year in Industry" by Istoé magazine.
In 2010, the Anápolis factory was recognized as a "Company for Good" by IstoÉ Dinheiro magazine, for its program of reusing waste from vehicle production and participation in reforestation in the Central-West region. In the last quarter of 2013, the Anápolis factory, which already produced the Tucson, the HR and the HD78, underwent a new investment cycle to begin production of the ix35. The investment of R$ 600 million guaranteed improvements in the assembly line with the inclusion of 10 robots, responsible for around 50% of the welding work. In May 2014, the 10,000th ix35 left the Caoa assembly line, and Grupo Caoa celebrated its 35th year. In 2017, Hyundai Caoa ranked first in the vehicle after-sales satisfaction survey, according to J.D. Power, which interviewed more than 3,700 owners who purchased new cars in the last 12 months in the country. In November of the same year, Caoa acquired 50.7% of the Brazilian operations of Chinese manufacturer Chery, becoming responsible for manufacturing and distributing the brand in Brazil.
False advertising
In 2011, the group was reported to the Public Ministry of Minas Gerais (MPMG) for possibly carrying out misleading advertising, such as declaring the model year of the Subaru Forester, safety and engine of the Hyundai ix35 and the power of the Veloster, Elantra and other models.
Corruption allegations
In 2015, Grupo Caoa, together with other automakers, was investigated for lobbying allegations for the approval of Provisional Measure 471 of 2009, under the government of then President Luiz Inácio Lula da Silva, which granted tax benefits to automotive companies.
In 2016, Grupo Caoa was accused of paying bribes to the former Minister of the Civil House and Finance Antonio Palocci, in 2010, in exchange for his work in approving Provisional Measure 512 of that year, and to the governor of Minas Gerais, Fernando Pimentel, in exchange for tax benefits. In November 2017, the Federal Public Ministry expanded investigations into Caoa's relations with Palocci, after it was found that Palocci's consulting company Projeto signed several contracts with Grupo Caoa. | WIKI |
Paul Mathias Padua
Paul Mathias Padua (November 15, 1903 - August 22, 1981) was an Austrian-born German painter. He was committed to the tradition of the realist painter Wilhelm Leibl, which was highly valued by Adolf Hitler, and was very successful as an official artist at Nazi Germany.
Biography
Padua was born in Salzburg, Austria, but grew up in poor conditions with his grandparents in Geiselhöring and Straubing, in Lower Bavaria. He lost his father at the age of nine. Padua later would move to Murnau and Munich. He abandoned his early academic education to concentrate on his painting. Padua's early work was essentially influenced by Wilhelm Leibl; his later work was increasingly influenced by the New Objectivity. In 1922, he became a member of the Munich Artists' Association. In the following years, his paintings were regularly exhibited. In 1928, he received the Georg-Schicht Prize and in 1930 the Albrecht Dürer Prize, from the city of Nuremberg. In the 1930s, Padua's popularity increased, so that he exhibited in several cities outside the Munich region and in other European countries.
Padua's focus on traditional art was rather unusual as he had not received any completed academic training. He was recognized as an official artist in Nazi Germany, after 1933. He was represented at the Great German Art Exhibitions, from 1938 to 1944, in the House of German Art, in Munich, with 23 works, including still lifes and female nudes. In 1937 and 1940 he received the Lenbach Prize, from Munich, for portraits. Among those he portrayed were composer Franz Lehár and writer Gerhart Hauptmann. In 1938 he created the fresco painting depicting farmers dressed in the costume of the region of Bavarian Oberland, on the front side of the Weilheimer Hochlandhalle, a livestock auction hall built in 1937/38, which has since then also served as an event hall for the city of Weilheim, and was included as a monument in the Bavarian State Office for Monument Protection's, in 2017.
At the beginning of the World War II, Padua was drafted into a propaganda company as a war painter. After being slightly wounded during the Western campaign, he was sent back to Germany in May 1940. Until 1943, he painted some of the most famous paintings of German Nazi propaganda art, such as The Führer Speaks, which depicts a family listening to a speech by Adolf Hitler in the radio, and May 10th, 1940, which heroizes the beginning of the Western campaign, and is stylistically inspired on the 19th century Realism. In 1943, Padua was included in the exhibition Young Art in the German Empire, held in the Vienna Künstlerhaus. In 1943, Padua moved to St. Wolfgang, in Austria. In 1944, he was included in the Gottbegnadeten list of the Reich Ministry of Propaganda.
He seems not to have been affected by the denazification process in Austria, after 1945. In 1951, Padua settled back in Germany. He acquired a house in Rottach-Egern, from Else Pfeifer. Here in the Tegernsee Valley, he opened his own Gallery by the Lake. He continued his career as a portrait painter. He portrayed personalities such as Friedrich Flick, Helmut Horten, Makarios III, Otto Hahn, Herbert von Karajan and Franz Josef Strauss. Since 1960 onwards, Padua traveled regularly to the fishing town of Nazaré, in Portugal, where he created several paintings, often inspired by the local people.
He died of a stroke on August 22, 1981, in Rottach-Egern. Here he was buried in the cemetery at the Protestant Church of the Resurrection. | WIKI |
What logo has an E with a blue circle?
What logo has an E with a blue circle?
Along with this new design approach, Microsoft has made a new logo to help convey the new lightweight and slickness of IE9. The logo itself, that blue “e”, is the subject of a blog post on the IEBlog.
What logo has AE and a circle?
A&E (previously called the Arts & Entertainment Network ) – American cable and satellite channel. Besides United States it also is broadcast in Canada, Australia, Latin America and Europe.
What does a blue i in a circle mean?
A filled-in blue circle next to your message means that your message was delivered. And, when a friend has read your message, a small version of your friend’s photo will appear next to your message. Send Message.
What is the logo with the E called?
It’s called the Estimated Sign. “The estimated sign is a mark required to be appended to the nominal mass or volume printed on prepackaged goods for sale within the European Union.
Why is the Internet logo an E?
Symbol in the Internet Explorer Logo The Internet Explorer logo is a lowercased letter ‘e’ with a yellow ring that seems to be revolving around the letter. This represents the browser’s capability to allow the users to visit different sites, anytime, anywhere.
What does the i in a circle mean on Iphone?
Information
(9,451 points) macOSSpeciality level out of ten: 1. Feb 20, 2015 10:22 AM in response to minimac51 In response to minimac51. It stands for “Information” and it’s used throughout iOS in various places, not just under Wi-Fi.
What does a capital I with a circle around it mean?
anarchism
The symbol composed of the capital letter A surrounded by a circle is universally recognized as a symbol of anarchism and has been established in global youth culture since the 1970s.
What E logo means?
The estimated sign, ℮, also referred to as the e-mark or quantité estimée (estimated quantity) can be found on some prepacked products in Europe. Its use indicates that the prepackage fulfils European Union Directive 76/211/EEC, which specifies the maximum permitted tolerances in package content.
What is reverse E?
Backwards E may refer to: Ǝ, a letter used in several alphabets, such as Pan-Nigerian or the African Reference Alphabet. ɘ, the IPA symbol for the close-mid central unrounded vowel. ∃, a symbol that is used to represent existential quantification in predicate Logic.
What does the E logo stand for?
The famous blue “e” with the orbital rings around it has symbolized Microsoft’s Internet Explorer browser since 1996 (IE 3 was the first version to sport the logo). But in recent years, the “e” has become synonymous with bugs, security problems and outdated technology.
What does the e mean on Internet?
Letter E stands for EDGE (Enhanced Data Rates for GSM Evolution). It is also called Enhanced GPRS. This technology lies somewhere in between 2G and 3G technology. So, some people refer to it as 2.5G. EDGE is faster than GPRS but still not good enough to browse the Internet.
What does an i inside a circle mean?
The grey ‘circle with an i’ symbol indicates your connection is not secure. The lowercase i with a circle around it is formally known as the Information Symbol. It tells you when your connection to a website is not secure. When you connect to a website your browser uses the HTTP protocol or the HTTPS protocol. | ESSENTIALAI-STEM |
Page:Popular Science Monthly Volume 56.djvu/405
Rh among geologists whether it represents any organic structure. He was the first President of the Royal Society of Canada, which was organized in 1882; was one of the sectional presidents of the British Association at its Montreal meeting (1884), and was president of that body at its Birmingham meeting, 1886. Among his published works are the Description of the Devonian and Carboniferous Flora of Eastern North America, constituting two volumes of the Reports of the Geological Survey of Canada; Air-Breathers of the Coal Formation; Acadian Geology; The Story of the Earth and Man; Origin of Animal Life; Fossil Men; the Canadian Ice Age; the Meeting Place of Geology and History; the Geological History of Plants (in the International Scientific Series); Relics of Primeval Life (Lowell Lectures); The Chain of Life in Geological Times; Modern Science in Bible Lands; the Dawn of Life; Modern Ideas of Evolution; a book of travels in Egypt and Syria; and many contributions to scientific periodicals. He received numerous degrees and honors from learned bodies and institutions, among them the Lyell medal of the Geological Society of London, in 1882. A sketch of Principal Dawson, as he was then called, was published, with a portrait, in the Popular Science Monthly for December, 1875 (vol. viii, p. 132).
Glacial Lakes in New York.—A glacial lake is defined by H. P. Fairchild, in his paper on Glacial Waters in the Finger Lake Region of New York (Geological Society of America, Rochester, N. Y.), as a body of static water existing by virtue of a barrier of ice. Such impounded waters may exist where a glacier blocks a stream, or where the general land surface inclines toward the glacier foot. The lakes described in Mr. Fairehild's paper belongs to the second class, and were formed in the southern part of the Ontario basin, where the land slopes northward from a plateau of two thousand feet elevation down to Lake Ontario, two hundred and forty-six feet. The high plateau was deeply gashed by the preglacial stream erosion, and in these trenches along the northern border of the plateau lie the present "Finger Lakes." The topography was peculiarly favorable to the production against the bold ice front of a series of distinct valley lakes, in many respects unequaled elsewhere. Between twenty and thirty of these lakes are described in Professor Fairehild's paper, which occupied sites now partly represented by nineteen streams and lakes, beginning with Tonawanda Creek on the west and extending to Butternut Creek (Jamesburg and Apulia) on the east. The local lakes were not of long duration, and their surface level was unstable, changing with the down-cutting of the outlets and with the greatly increased volume of the summer melting of the ice sheet. Consequently, true beaches are usually wanting. The conspicuous evidences are the deltas of land streams, with their terraces, embankments, bars and spits, and the outlet channels. The records of these extinct waters are the very latest phenomena connected with the ice invasion, and are the connecting link between the glacial condition and the present hydrography. They are of lively interest, perhaps, to only a few persons, but the details are necessary to the more general study of the Pleistocene. No economic or practical result from the knowledge is foreseen, "but as pure science the study of these waterless lakes, waveless shores, and streamless channels has a fascination and romance."
The Environment in Education.—"Two considerations of equal and fundamental importance," says Mr. Wilbur S. Jackman, "are included in teaching—the choice of the subject-matter and its presentation, and the reaction of the pupil as the result of the presentation. No presentation ever reaches consciousness without a reaction, however feeble, from which results an immediate and inevitable corresponding mental construction. Certain instincts called primitive, it may be generally agreed, exist in children, and, by taking intelligent advantage of these, definite educative presentation may be begun at a much earlier age than was once supposed. Under the theory that the child repeats the racial history in its growth, a practice has arisen of meeting the early instincts of childhood with presentations from the adult lives of primitive peoples. Presentations are made to stimulate the idea | WIKI |
tule shrew
Noun
* , a possibly extinct subspecies of the ornate shrew, confined to the Baja California peninsula in Mexico. | WIKI |
Do you remember what you had for dinner last night?
Do you remember what you had for dinner last night? The hippocampus, a brain structure linked to memory formation, participates in this mental process. Memory impairment, such as an inability to remember what you ate, is an early sign of hippocampal damage due to insulin resistance, which itself further disrupts a person’s feeding patterns.
According to a small but growing body of research, obesity is increasing being linked to psychological disorders such as depression, eating disorders, distorted body image, and low self-esteem1 and, possibly, to the development of neurodegenerative conditions such as Alzheimer’s Disease (due to brain shrinkage).2 Diabetes research has also founds links between low Insulin levels and depression.3 A recent publication by Ludmer Centre research Dr P Silveira adds to this research by suggesting that hippocampal insulin-resistance alters food inhibitory control, perpetuating a cycle of obesity—higher insulin resistance—continued cognitive damage. The study contributes to our understanding of the co-occurrence of type II diabetes and diseases like Alzheimer’s and major depression.
Read the article in Neuroscience & Biobehavioral Reviews
Learn more about the Primary Investigator: Dr Patricia P. Silveira (MD)
Reference:
Research collaboration: Federal University of Rio Grande do Sul, Brazil and Douglas Mental Health University Institute/McGill University, Canada
| ESSENTIALAI-STEM |
2021 FC Tucson season
The 2021 FC Tucson season was the eleventh season in the soccer team's history and their third in USL League One. On February 18, 2021, Phoenix Rising FC transferred ownership of FC Tucson to Benevolent Sports Tucson LLC, led by Rising co-owner Brett Johnson.
Statistics
(regular-season & Playoffs)
* One Own Goal scored by North Carolina FC | WIKI |
cern.colt.map
Package cern.colt.map
Automatically growing and shrinking maps holding objects or primitive data types such as int, double, etc.
See: Description
Package cern.colt.map Description
Automatically growing and shrinking maps holding objects or primitive data types such as int, double, etc. Currently all maps are based upon hashing.
1. Overview
The map package offers flexible object oriented abstractions modelling automatically resizing maps. It is designed to be scalable in terms of performance and memory requirements.
Features include:
• Maps operating on objects as well as all primitive data types such as int, double, etc.
• Compact representations
• Support for quick access to associations
• A number of general purpose map operations
File-based I/O can be achieved through the standard Java built-in serialization mechanism. All classes implement the Serializable interface. However, the toolkit is entirely decoupled from advanced I/O. It provides data structures and algorithms only.
This toolkit borrows some terminology from the Javasoft Collections framework written by Josh Bloch and introduced in JDK 1.2.
2. Introduction
A map is an associative container that manages a set of (key,value) pairs. It is useful for implementing a collection of one-to-one mappings. A (key,value) pair is called an association. A value can be looked up up via its key. Associations can quickly be set, removed and retrieved. They are stored in a hashing structure based on the hash code of their keys, which is obtained by using a hash function.
A map can, for example, contain Name-->Location associations like {("Pete", "Geneva"), ("Steve", "Paris"), ("Robert", "New York")} used in address books or Index-->Value mappings like {(0, 100), (3, 1000), (100000, 70)} representing sparse lists or matrices. For example this could mean at index 0 we have a value of 100, at index 3 we have a value of 1000, at index 1000000 we have a value of 70, and at all other indexes we have a value of, say, zero. Another example is a map of IP addresses to domain names (DNS). Maps can also be useful to represent multi sets, that is, sets where elements can occur more than once. For multi sets one would have Value-->Frequency mappings like {(100, 1), (50, 1000), (101, 3))} meaning element 100 occurs 1 time, element 50 occurs 1000 times, element 101 occurs 3 times. Further, maps can also manage ObjectIdentifier-->Object mappings like {(12, obj1), (7, obj2), (10000, obj3), (9, obj4)} used in Object Databases.
A map cannot contain two or more equal keys; a key can map to at most one value. However, more than one key can map to identical values. For primitive data types "equality" of keys is defined as identity (operator ==). For maps using Object keys, the meaning of "equality" can be specified by the user upon instance construction. It can either be defined to be identity (operator ==) or to be given by the method Object.equals(Object). Associations of kind (AnyType,Object) can be of the form (AnyKey,null) , i.e. values can be null.
The classes of this package make no guarantees as to the order of the elements returned by iterators; in particular, they do not guarantee that the order will remain constant over time.
Copying
Any map can be copied. A copy is equal to the original but entirely independent of the original. So changes in the copy are not reflected in the original, and vice-versa.
3. Package organization
For most primitive data types and for objects there exists a separate map version. All versions are just the same, except that they operate on different data types. Colt includes two kinds of implementations for maps: The two different implementations are tagged Chained and Open. Note: Chained is no more included. Wherever it is mentioned it is of historic interest only.
• Chained uses extendible separate chaining with chains holding unsorted dynamically linked collision lists.
• Open uses extendible open addressing with double hashing.
Class naming follows the schema <Implementation><KeyType><ValueType>HashMap. For example, a OpenIntDoubleHashMap holds (int-->double) associations and is implemented with open addressing. A OpenIntObjectHashMap holds (int-->Object) associations and is implemented with open addressing.
The classes for maps of a given (key,value) type are derived from a common abstract base class tagged Abstract<KeyType><ValueType>Map. For example, all maps operating on (int-->double) associations are derived from AbstractIntDoubleMap, which in turn is derived from an abstract base class tying together all maps regardless of assocation type, AbstractMap. The abstract base classes provide skeleton implementations for all but few methods. Experimental layouts (such as chaining, open addressing, extensible hashing, red-black-trees, etc.) can easily be implemented and inherit a rich set of functionality. Have a look at the javadoc tree view to get the broad picture.
4. Example usage
int[] keys = {0 , 3 , 100000, 9 };double[] values = {100.0, 1000.0, 70.0 , 71.0};AbstractIntDoubleMap map = new OpenIntDoubleHashMap();// add several associationsfor (int i=0; i < keys.length; i++) map.put(keys[i], values[i]);System.out.println("map="+map);System.out.println("size="+map.size());System.out.println(map.containsKey(3));System.out.println("get(3)="+map.get(3));System.out.println(map.containsKey(4));System.out.println("get(4)="+map.get(4));System.out.println(map.containsValue(71.0));System.out.println("keyOf(71.0)="+map.keyOf(71.0));// remove one associationmap.removeKey(3);System.out.println("\nmap="+map);System.out.println(map.containsKey(3));System.out.println("get(3)="+map.get(3));System.out.println(map.containsValue(1000.0));System.out.println("keyOf(1000.0)="+map.keyOf(1000.0));// clearmap.clear();System.out.println("\nmap="+map);System.out.println("size="+map.size());
yields the following output
map=[0->100.0, 3->1000.0, 9->71.0, 100000->70.0]size=4trueget(3)=1000.0falseget(4)=0.0truekeyOf(71.0)=9map=[0->100.0, 9->71.0, 100000->70.0]falseget(3)=0.0falsekeyOf(1000.0)=-2147483648map=[]size=0
5. Notes
Note that implementations are not synchronized.
Choosing efficient parameters for hash maps is not always easy. However, since parameters determine efficiency and memory requirements, here is a quick guide how to choose them.If your use case does not heavily operate on hash maps but uses them just because they provide convenient functionality, you can safely skip this section.For those of you who care, read on.
There are three parameters that can be customized upon map construction: initialCapacity, minLoadFactor and maxLoadFactor.The more memory one can afford, the faster a hash map.The hash map's capacity is the maximum number of associations that can be added without needing to allocate new internal memory.A larger capacity means faster adding, searching and removing. The initialCapacity corresponds to the capacity used upon instance construction.
The loadFactor of a hash map measures the degree of "fullness". It is given by the number of assocations (size())divided by the hash map capacity (0.0 <= loadFactor <= 1.0).The more associations are added, the larger the loadFactor and the more hash map performance degrades.Therefore, when the loadFactor exceeds a customizable threshold (maxLoadFactor), the hash map is automatically grown.In such a way performance degradation can be avoided.Similarly, when the loadFactor falls below a customizable threshold (minLoadFactor), the hash map is automatically shrinked.In such a way excessive memory consumption can be avoided.Automatic resizing (both growing and shrinking) obeys the following invariant:
capacity * minLoadFactor <= size() <= capacity * maxLoadFactor
The term capacity * minLoadFactor is called the low water mark, capacity * maxLoadFactor is called the high water mark. In other words, the number of associations may vary within the water mark constraints. When it goes out of range, the map is automatically resized and memory consumption changes proportionally.
• To tune for memory at the expense of performance, both increase minLoadFactor and maxLoadFactor.
• To tune for performance at the expense of memory, both decrease minLoadFactor and maxLoadFactor.As as special case set minLoadFactor=0 to avoid any automatic shrinking.
Resizing large hash maps can be time consuming, O(size()), and should be avoided if possible (maintaining primes is not the reason). Unnecessary growing operations can be avoided if the number of associations is known before they are added, or can be estimated.
In such a case good parameters are as follows:
For chaining:
Set the initialCapacity = 1.4*expectedSize or greater.
Set the maxLoadFactor = 0.8 or greater.
For open addressing:
Set the initialCapacity = 2*expectedSize or greater. Alternatively call ensureCapacity(...).
Set the maxLoadFactor = 0.5.
Never set maxLoadFactor > 0.55; open addressing exponentially slows down beyond that point.
In this way the hash map will never need to grow and still stay fast.It is never a good idea to set maxLoadFactor < 0.1, because the hash map would grow too often.If it is entirelly unknown how many associations the application will use,the default constructor should be used. The map will grow and shrink as needed.
Comparision of chaining and open addressing
Chaining is faster than open addressing, when assuming unconstrained memory consumption. Open addressing is more space efficient than chaining, because it does not create entry objects but uses primitive arrays which are considerably smaller. Entry objects consume significant amounts of memory compared to the information they actually hold. Open addressing also poses no problems to the garbage collector. In contrast, chaining can create millions of entry objects which are linked; a nightmare for any garbage collector. In addition, entry object creation is a bit slow.
Therefore, with the same amount of memory, or even less memory, hash maps with larger capacity can be maintained under open addressing, which yields smaller loadFactors, which in turn keeps performance competitive with chaining. In our benchmarks, using significantly less memory, open addressing usually is not more than 1.2-1.5 times slower than chaining.
Further readings:
Knuth D., The Art of Computer Programming: Searching and Sorting, 3rd ed.
Griswold W., Townsend G., The Design and Implementation of Dynamic Hashing for Sets and Tables in Icon, Software - Practice and Experience, Vol. 23(4), 351-367 (April 1993).
Larson P., Dynamic hash tables, Comm. of the ACM, 31, (4), 1988.
Performance:
Time complexity:
The classes offer expected time complexity O(1) (i.e. constant time) for the basic operationsput, get, removeKey, containsKey and size,assuming the hash function disperses the elements properly among the buckets.Otherwise, pathological cases, although highly improbable, can occur, degrading performance to O(N) in the worst case.Operations containsValue and keyOf are O(N).
Memory requirements for open addressing:
worst case: memory [bytes] = (1/minLoadFactor) * size() * (1 + sizeOf(key) + sizeOf(value)).
best case: memory [bytes] = (1/maxLoadFactor) * size() * (1 + sizeOf(key) + sizeOf(value)).Where sizeOf(int) = 4, sizeOf(double) = 8, sizeOf(Object) = 4, etc.Thus, an OpenIntIntHashMap with minLoadFactor=0.25 and maxLoadFactor=0.5 and 1000000 associations uses between 17 MB and 34 MB.The same map with 1000 associations uses between 17 and 34 KB.
SCaVis 1.7 © jWork.org | ESSENTIALAI-STEM |
Bug: Mouse Position Coordinates Are Incorrect From the "Get" Button
The mouse position coordinates are different from "Go" and "Get". This is literally it.
For example, I put the mouse at the position (0,0) as an absolute position. Then press the "Get" button and (0,900) will appear in the keyboard maestro editor. So, if i press the "Go" button, the mouse moves to the bottom left corner of the screen.
Why does this happen?
My keyboard maestro version is 10.0.1 and MacOS version is 12.0.1.
Hey @peternlewis,
I can confirm this with:
Keyboard Maestro 10.0.1
macOS 10.14.6
-Chris
1 Like
Yes, the Y coordinate of the Get button result is inverted in 10.0.1 - fixed for 10.0.2 when that is released.
2 Likes
Since I've upgraded to version 10, the "Get" function is no longer working properly.
Any ideas as to why this may be? The pixel coordinates selected are very off and I have to manually find the right location via trial and error.
Another user seems to have the same issue. I found the post ""Get" button in click mouse action not working" via google, but the link leads to an error page. Any insight as to how to fix the GET function would be great. Thanks!
Hey @gener
Welcome to the forum! :sunglasses:
We know – please see post #3.
-Chris
I'm still experiencing a problem with Get in 10.0.2.
In a Move and Resize Front Window action, using Get returns -1032, -397, 0, 0 while using a macro with WindowSize and WindowPosition tokens returns the following on the same application window:
Size (W,H): 787,846
Position (→, ↓): -1296,-745
@peternlewis? -ccs
1 Like
May I point out that I have KM 10.0.2, and it seems to return correct values when I press GET for the action you mention.
May I ask if you have multiple monitors? I think some multiple monitor setups can provide negative values there, but I won't explain why if you don't have multiple monitors.
I do have multiple monitors, but I am quite familiar with the negative values. It's the differences in the values and the lack of Width and Height returned by GET that I have a problem with.
The results returned by tokens are accurate (verified by macros that move a window to those coordinates), but the Get values are most definitely not accurate.
Ok, then. My bad. I always tell people that I'm wrong 20% of the time. You got me on one of those 20%s.
1 Like
This sounds like something you should email support@stairways.com about, it's not really possible to resolve such an issue without more information than is sensible to try to do in a topic forum.
Only 20%? Shoot, you're way better than me. :rofl: | ESSENTIALAI-STEM |
Object-Oriented JavaScript
JavaScript code doesn’t necessarily follow object-oriented design patterns. However, the JavaScript language provides support for common object-oriented conventions, like constructors and inheritance, and benefits from using these principles by being easier to maintain and reuse.
Read this chapter if you’re already familiar with object-oriented programming and want to see how to create object-oriented code with JavaScript.
Declaring an Object
JavaScript provides the ability to create objects that contain member variables and functions. To define a new object, first create a new function with the desired object’s name, like this:
function MyObject()
{
// constructor code goes here
}
This function works as the object’s constructor, setting up any variables needed by the object and handling any initializer values passed in as arguments. Within the constructor or any member function, persistent instance variables are created by adding them to the this keyword and providing the variable with a value, like this:
this.myVariable = 5;
To create a new member function, create a new anonymous function and assign it to the prototype property of the object. For example:
MyObject.prototype.memberMethod = function()
{
// code to execute within this method
}
After you have created the constructor for your object, you can create new object instances by using the new keyword followed by a call to the constructor function. For example:
var myObjectVariable = new MyObject();
This particular constructor takes no parameters. However, you can also create more complex constructors for classes that allow you to specify commonly used or mandatory initial values. For example:
function MyObject(bar)
{
this.bar = bar;
}
myobj = new MyObject(3);
alert('myobj.bar is '+myobj.bar); // prints 3.
One common use of this technique is to create initializers that duplicate the contents of an existing object. This is described further in Copying an Object.
Freeing Objects
Just as you used the new operator to create an object, you should delete objects when you are finished with them, like this:
delete myObjectVariable;
The JavaScript runtime automatically garbage collects objects when their value is set to null. However, setting an object to null doesn’t remove the variable that references the object from memory. Using delete ensures that this memory is reclaimed in addition to the memory used by the object itself.
Arrays and Objects
JavaScript provides arrays for collecting data. Since an array is an object, you need to create a new instance of an array before using it, like this:
var myArray = new Array();
Alternatively, you can use this simpler syntax:
var myArray = [];
Once you create an array, you reference elements using integer values inside of brackets, like this:
myArray[0] = "first value";
myArray[1] = 5;
The previous example shows that arrays, like variables, can hold data of any type.
Generic objects and arrays can be used with associative properties, where strings replace the index number:
myObject["indexOne"] = "first value";
myObject["indexTwo"] = 5;
When you use a string as an index, you can use a period instead of brackets to access and assign data to that property:
myObject.name = "Apple Inc.";
myObject.city = "Cupertino";
You can declare an object and its contents inline, as well:
myObject = {
name: "Apple Inc.",
city: "Cupertino"
}
A variation of the for loop is available for iterating within the properties of an array or object. Called a for-in loop, it looks like this:
for ( var index in myArray )
{
// code to execute within this loop
}
Getters and Setters
Recent WebKit builds (available from webkit.org) contain support for getter and setter functions. These functions behave like a variable but really call a function to change any underlying values that make a property. Declaring a getter looks like this:
MyObject.__defineGetter__( "myGetter", function() { return this.myVariable; } );
It is essential that a getter function return a value because, when used, the returned value is used in an assignment operation like this:
var someVariable = MyObject.myGetter;
Like a getter, a setter is defined on an object and provides a keyword and a function:
MyObject.__defineSetter__( "mySetter", function(aValue) { this.myVariable = aValue; } );
Note that setter functions need to take an argument that’s used in an assignment statement, like this:
MyObject.mySetter = someVariable;
Inheritance
JavaScript allows an object to inherit from other objects via the prototype keyword. To inherit from another object, set your object’s prototype equal to the prototype of the parent object, like this:
MyChildObject.prototype = MyParentObject.prototype;
This copies all of the parent’s functions and variables to your object. It does not, however, copy the default values stored in that object. If your purpose is to subclass an object completely, you must also execute code equivalent to the original constructor or construct an instance of the original type and copy its values as described in Copying an Object.
Recent WebKit builds also include the ability to extend an existing DOM object via the prototype keyword. The advantage of this over inheritance is a smaller memory footprint and easier function overloading.
Copying an Object
In object-oriented programming, you often need to make a copy of an object. The most straightforward (but painful) way to do this is to methodically copy each value by hand. For example:
function MyObjectCopy(oldobj)
{
// copy values one at a time
this.bar = oldobj.bar;
}
For very simple objects, explicit copying is fine. However, as objects grow larger, this technique can become unmanageable, particularly if additional variables are added to an object outside the constructor. Fortunately, because a JavaScript object is essentially an associative array, you can manipulate it just as you would an array. For example:
function MyObjectCopy(oldobj)
{
// copy values with an iterator
for (myvar in oldobj) {
this[myvar] = oldobj[myvar];
}
}
You should be aware, however, that assigning an object to a variable merely stores a reference to that object, not a copy of that object, and thus any objects stored within this object will not be copied by the above code.
If you need to perform a deep copy of a structured tree of data, you should explicitly call a function to copy the nested objects. The easiest way to do this is to include a clone function in each class, test each variable to see if it contains an object with a clone function, and call that function if it exists. For example:
// Create an inner object with a variable x whose default
// value is 3.
function InnerObj()
{
this.x = 3;
}
InnerObj.prototype.clone = function() {
var temp = new InnerObj();
for (myvar in this) {
// this object does not contain any objects, so
// use the lightweight copy code.
temp[myvar] = this[myvar];
}
return temp;
}
// Create an outer object with a variable y whose default
// value is 77.
function OuterObj()
{
// The outer object contains an inner object. Allocate it here.
this.inner = new InnerObj();
this.y = 77;
}
OuterObj.prototype.clone = function() {
var temp = new OuterObj();
for (myvar in this) {
if (this[myvar].clone) {
// This variable contains an object with a
// clone operator. Call it to create a copy.
temp[myvar] = this[myvar].clone();
} else {
// This variable contains a scalar value,
// a string value, or an object with no
// clone function. Assign it directly.
temp[myvar] = this[myvar];
}
}
return temp;
}
// Allocate an outer object and assign non-default values to variables in
// both the outer and inner objects.
outer = new OuterObj;
outer.inner.x = 4;
outer.y = 16;
// Clone the outer object (which, in turn, clones the inner object).
newouter = outer.clone();
// Verify that both values were copied.
alert('inner x is '+newouter.inner.x); // prints 4
alert('y is '+newouter.y); // prints 16 | ESSENTIALAI-STEM |
Garbage disposals can sometimes get jammed and are typically a quick fix. Follow our 4 step process below to unjam your garbage disposal in less than 5 minutes.
1. Unplug the unit
You want to make sure the unit is unplugged from the outlet to ensure it won’t activate while you are working on it.
2. Press the reset button
The garbage disposal unit and motor are found directly underneath the sink it’s installed on. On the underside of the garbage disposal there should be a reset button, if it looks like it’s sticking out, press in back in to reset the unit. This may resolve the jam right away, plug the unit back in and see if the disposal is now working. The reset button will continue to pop out if the unit is overheated, give it 15 minutes to cool down before giving up on this option. If this doesn’t resolve the jam, move on to the next step.
3. Manually remove blockages
Grab a flashlight and look into the garbage disposal drain. Turn the light in all directions especially the outer edges since this is where blockages typically happen. Find the teeth of the disposal blades on the outer edge and see if there’s anything stuck in them. If you do see something blocking the blade, get a pair of tongs or pliers and use them to release any jams you may see. Plug the unit back in and see if that resolves the problem. Move on to the next step if it doesn’t.
4. Rotate the disposal blades
Each new disposal is equipped with an Allen wrench that will allow you to rotate the disposal blades from underneath the unit. If you’ve lost your wrench, any ¼” Allen wrench will do. Again, make sure the unit is unplugged from the outlet. Climb underneath the sink and find the hole on the disposal’s underside. It will be hexagonal-shaped and in the center. Insert the Allen wrench head into the hole and crank the wrench to turn the disposal’s motor shaft. First, rotate the wrench in one direction and then reverse and go the other direction. Continue cranking the wrench back and forth until you are able to rotate it in a complete circle. It’s ok to apply force while doing this, the unit is designed to allow you to be able to dislodge the blades this way. Plug the unit back in and turn on the cold water and then turn on the garbage disposal to see if it now works.
If none of the above options work, it might be time to replace your garbage disposal. | ESSENTIALAI-STEM |
Orontium
Orontium, sometimes called golden-club, is a genus of flowering plants in the family Araceae. The single living species in the genus is Orontium aquaticum, while the two other described species, Orontium mackii and Orontium wolfei, are known from fossils.
Orontium mackii is the geologically oldest species described, with fossils of the species being found in the Jose Creek member of the McRae Formation in New Mexico. The formation is dated to the Late Cretaceous, possibly the Maastrichtian. The species is noted for having a simpler vein structure in the leaves then is seen in either O. wolfei or O. aquaticum. Two of the outcrops where the species was found are preserved volcanic ash beds which hosted long-term standing water. However, a third outcrop is that of a well-drained floodplain with no evidence of standing water. This indicates the possibility that O. mackii was not an obligate hydrophyte. The second fossil species O. wolfei is from Early to early Middle Eocene rocks in northern Washington state and southern central British Columbia. In contrast to the subtropical environment which O. mackii lived in, O. wolfei inhabited a colder upland environment with temperatures similar to that seen in the northern end of the O. aquaticum range. O. wolfei appears to have inhabited swampy areas and marginal regions of upland lakes in the region. The leaves of O. wolfei show a more complex vein structure than seen in O. mackii and have a hooded leaf tip similar to O. aquaticum.
The living O. aquaticum is endemic to eastern North America and is found growing in ponds, streams, and shallow lakes. It prefers an acidic environment. The leaves are pointed and oval with a water repellent surface. The inflorescence is most notable for having an extremely small almost indistinguishable sheath surrounding the spadix. Very early in the flowering this green sheath withers away leaving only the spadix. The flowering occurs in the spring. Native Americans once ate the seeds and rhizome by drying them out and grinding them into a starchy substance. | WIKI |
Page:The Garden Mushroom.pdf/22
in spawning beds, provided it be quite dry otherwise let it lye by for a few weeks.
Be careful, in collecting the spawn, to have the lumps or cakes of spawny dung taken up entire, placing them in a basket or wheelbarrow, in order to be carried into some dry close shed or room, to be deposited till wanted; noticing whether any of the lumps be wet: in that case spread them to dry a little; then let the whole be placed in a dry corner, closely covered with straw or litter or garden mats; or packed up in sacks or hampers, covered close in the same manner, whether for present use, or for keeping. By attending to these directions its vegetative power may be long retained, and the spawn safely sent to any distant place.
We should be particularly cautious to reject spurious or false spawn; for there is a | WIKI |
Talk:SKILES AND HENDERSON
I was skeptical of the usefulness of this redirect, but realized it works if you type in "skiles and henderson" as well, and many people including myself commonly use all lowercase. It also works for "Skiles And Henderson", another common different capitalization. So a very useful redirect. Toliar (talk) 05:02, 8 February 2009 (UTC) | WIKI |
Web Results
www.reference.com/article/factor-math-cd1ebe24d944f242
In mathematics, a factor of a base number is any number that can be evenly divided into the base number. Due to this definition, a factor can only be less or equal to the original base number. Although all whole numbers can be divided evenly by one, it is still considered a factor.
www.reference.com/article/fun-math-games-cool-math-2b2e9a567f333bbc
A couple of fun games on Coolmath-Games.com include "Pixel Quest" and "Flip Dojo." Both games require players to solve math puzzles and avoid obstacles to advance to higher levels.
www.reference.com/article/factor-tree-e5d9446ea6487262
A factor tree is a diagram that shows the breakdown of a number into its prime factors. This diagram holds a pattern similar to a family tree, with a line between each factor and its factors.
www.reference.com/article/make-factor-tree-dabeed0127ad0094
Numbers that multiply to give you a larger number are called factors. Use a factor tree for an easy way to factor larger numbers.
www.reference.com/world-view/math-factors-20-4a46ae78ce5134cb
The factors of 20 are one, two, four, five, 10, 20, negative one, negative two, negative four, negative five, -10 and -20. The prime factors of 20 are two, four and five.
www.reference.com/world-view/factored-form-math-d63e5c35b1a59798
The factored form of an equation is the simplest form of the equation that is obtained by factoring out a common variable or constant from multiple terms. Many types of polynomials are presentable in factored form, but the more terms an equation contains, the more difficult it is to find common fact
www.reference.com/article/factor-pair-math-a6cd849ba9e1fa1d
A factor pair is a pair of integers whose product is a given number. The factors of a prime number are only 1 and itself. Composite numbers have the factor pair of 1 and itself, as well as at least one other factor pair.
www.reference.com/article/tree-plant-7c55115cf79a3722
A tree is a plant. Trees are perennial plants that use photosynthesis to make their own food like other plants. They have woody stems and trunks and tend to live for many years.
www.reference.com/world-view/factor-rainbow-math-ccd6e0e1969f3431
A factor rainbow is a way of writing factors for numbers using a series of arcs. It helps students ensure they have all the factors by listing them in consecutive order.
www.reference.com/article/prime-factorization-math-21552baf47c6f479
In mathematical terminology, prime factorization is finding the prime numbers that multiply together to make a particular number. A prime number is a whole number larger than one that is evenly divisible by only itself and one. Two is the smallest prime number. | ESSENTIALAI-STEM |
Create Grafana dashboards
Overview
Grafana is an open source analytics and monitoring tool which can be used to visualise data from Gateway Hub and create alerts. If you have existing Grafana installs, you can seamlessly integrate data from Gateway Hub into your current dashboards.
Prerequisites
You should already have Grafana installed and configured. For more information consult the Grafana getting started documentation.
You should be familiar with the use of Grafana from the web interface. To learn more about using Grafana see the Grafana getting started guide.
Gateway Hub must have Transport Layer Security (TLS) enabled. For more information about configuring TLS, see Configure transport layer security.
Install the ITRS data source for Grafana
Grafana plug-ins allow you to add new data sources from external applications. To install the ITRS Geneos Gateway Hub Datasource:
1. Download the grafana-geneos-datasource.<version>.tgz from ITRS Downloads
2. Navigate to the Grafana plugins directory. The default location is /var/lib/grafana/plugins.
3. Create a new subdirectory here, for example /itrs-geneos-gateway-hub-datasource.
4. Extract the plugin file into the subdirectory.
You can also use the grafana-cli tool to install plugins.
For more information on installing Grafana plugins see grafana.com.
Note: The ITRS Geneos Gateway Hub Datasource is only compatible with the Gateway Hub of the same version.
Connecting to Gateway Hub
To fetch data from Gateway Hub, the Grafana host must be able to communicate with your Gateway Hub installation.
To allow this, you must:
Display data from Gateway Hub
Add Gateway Hub as a data source
To add a new data source:
1. Navigate to your Home Dashboard.
2. Select Configuration > Data Sources from the sidebar.
3. Click Add data source.
4. Select the ITRSGeneosGateway HubDatasource.
5. Specify the following options:
1. Name — name for the datasource in Grafana.
2. URLREST API endpoint of the Gateway Hub in the form https://<hostname>:<port>/<API version>/.
3. API Version — API version used when communicating with Gateway Hub.
4. Key — unique key used to identify an application to Gateway Hub.
5. Secret — secret used to authenticate the identity of an application.
6. Skip TLS Verify — checked.
All other options can be left at their default value.
6. Click Save & Test. You should see a notification to indicate that the data source is correctly configured.
Visualise data from Gateway Hub
To visualise data from Gateway Hub you can create a new panel in a new or existing Grafana dashboard.
To display data from Gateway Hub:
1. Open a dashboard or create a new dashboard.
2. Click the Add Panel button.
3. Click Add Query.
4. Set the Query to the Gateway HubDatasource using the name you specified above.
5. Configure the Query using the following options:
1. Filter— a filter specified in the entity filter syntax, see Entity filter syntax.
2. Endpoint type — API endpoint used to perform query. Choose from Metric Query, Events, or Entities.
6. If the Endpoint type is Metric Query, specify:
1. Group By — attributes included in the Query.
2. Metrics — metric and aggregations used in the Query.
7. If the Endpoint type is Events, specify:
1. Events — event types used in the Query.
2. Duration — duration bucket size used in the Query.
8. If the Endpoint type is Entities, specify:
1. Group By — attributes included in the Query.
9. Click Visualisation.
10. Configure the graphical representation of your data.
11. Click General.
12. Configure the Panel information.
13. Click Save Dashboard.
Note: Grafana will validate your dashboard's configuration before saving and alert you to any errors.
Organise data using variables
You can define variables in Grafana that allow you to dynamically change the data displayed on your dashboards. You can use the ITRS Geneos Gateway Hub Datasource to populate variables.
For more information about variables, see the Grafana website.
To create a new variable using data from Gateway Hub:
1. Open the Dashboard settings menu.
2. Click Variables.
3. Click New.
4. Configure the variable using the following options:
1. Name — name of the variable.
2. Type — type of data source used for the variable. Choose Query.
3. Data source — data source used to provide the variable data. Choose Gateway HubDatasource.
4. Query — a query specified in the entity filter syntax, see Entity filter syntax.
5. Click Add.
Once you have created a variable, you can use it to adjust the information displayed in a dashboard by selecting from the possible values of a variable using a drop-down list.
You can use variables defined in Grafana when writing queries to populate visualisations. A panel will show the results of the query corresponding to the values of the variables you have set from the drop-down lists.
In the example below, there are two variables defined: Department and Entity. Variables are nested so that setting that value of Department to Engineering will restrict the contents of the Entity drop-down to show only entities that belong to the Engineering department.
Annotate data
You can automatically add annotations to your visualisations in Grafana based on data from Gateway Hub. Annotations settings can be configured separately for each dashboard.
To configure annotations:
1. Open the Dashboard settings menu.
2. Click Annotations.
3. Click New.
4. Configure the annotation query using the following options:
1. Name — a name use to refer to this annotation query.
2. Data source — data source used to provide the annotation data. Choose Gateway HubDatasource.
3. Enabled — checked.
4. Hidden — unchecked.
5. Query — a query specified in the entity filter syntax, see Entity filter syntax.
Note: When specifying a query you will need to escape special characters.
5. Click Add.
Grafana overlays your existing visualisations with indicators for the annotations you have configured. These can be colour coded from the configuration menu. Hovering the cursor over an indicator displays the contents of the annotation query in a pop-up.
Note: Grafana annotations are applied at the dashboard level, active annotations are displayed on all panels in a dashboard.
In the example below, an annotation has been configured to show Geneos events. This is often useful since it allows you to correlate changes in severity with changes in the values of metrics. | ESSENTIALAI-STEM |
Micropolyphony
Micropolyphony is a kind of polyphonic musical texture developed by György Ligeti, which consists of many lines of dense canons moving at different tempos or rhythms, thus resulting in tone clusters. According to David Cope, "micropolyphony resembles cluster chords, but differs in its use of moving rather than static lines"; it is "a simultaneity of different lines, rhythms, and timbres".
Differences between micropolyphonic texture and conventional polyphonic texture can be explained by Ligeti's own description: "Technically speaking I have always approached musical texture through part-writing. Both Atmosphères and Lontano have a dense canonic structure. But you cannot actually hear the polyphony, the canon. You hear a kind of impenetrable texture, something like a very densely woven cobweb. I have retained melodic lines in the process of composition, they are governed by rules as strict as Palestrina's or those of the Flemish school, but the rules of this polyphony are worked out by me. The polyphonic structure does not come through, you cannot hear it; it remains hidden in a microscopic, underwater world, to us inaudible. I call it micropolyphony (such a beautiful word!). (Ligeti, quoted in )."
The earliest example of micropolyphony in Ligeti's work occurs in the second movement (mm 25–37) of his orchestral composition Apparitions. He used the technique in a number of his other works, including Atmosphères for orchestra; the first movement of his Requiem for soprano, mezzo-soprano, mixed choir, and orchestra; the unaccompanied choral work Lux aeterna; and Lontano for orchestra. Micropolyphony is easier with larger ensembles or polyphonic instruments such as the piano, though the Poème symphonique for a hundred metronomes creates "micropolyphony of unparallelled complexity". Many of Ligeti's piano pieces are examples of micropolyphony applied to complex "minimalist" Steve Reich and Pygmy music derived rhythmic schemes. | WIKI |
Macerich Tops Q2 Estimates, Guides Up - Analyst Blog
Calif.-based retail real estate investment trust (REIT), The Macerich Company ( MAC ), reported second-quarter 2013 adjusted funds from operations (AFFO) per share of 87 cents, beating the Zacks Consensus Estimate of 81 cents. Moreover, this was substantially higher than the year-ago figure of 74 cents. Strong escalations in revenues, overall portfolio occupancy and re-leasing spreads aided the results.
Including the impact of non-recurring items, FFO came in at 87 cents per share, compared with $1.57 in the year-ago period. Nevertheless, Macerich raised its FFO per share outlook for full-year 2013.
Total revenue surged 26.1% year over year to $262.9 million. Moreover, this significantly beat the Zacks Consensus Estimate of $247 million.
Beneath the Headlines
As of Jun 30, 2013, overall portfolio occupancy upped 110 basis points (bps) year over year to 93.8%. Moreover, mall tenant annual sales jumped 6.2% year over year to $545 per square foot.
In addition, re-leasing spreads for the second quarter rose 14.2% on a year-over-year basis. Same centers net operating income (NOI) during the quarter advanced 4.6% year over year to $179.8 million.
Notable Portfolio Activities
In tune with its portfolio enhancement activity, Macerich sold 5 non-core assets, namely Green Tree Mall, Northridge Mall, Rimrock Mall, Kitsap Mall and Redmond Town Center office building. The divestitures generated proceeds of $468 million on a pro rata basis. Moreover, subsequent to quarter-end, on Aug 1, Macerich sold the retail section of Redmond Town Center and generated proceeds of about $63.6 million on a pro rata basis.
Furthermore, Macerich continued constructions at Tysons Corner Center for the development of a mixed use project, which includes an office building, a luxury residential tower and Hyatt Hotels Corp. ( H )'s Hyatt Regency hotel. The office tower is currently over 60% leased to 2 tenants, Deloitte LLP and Intelsat, Ltd. The project is slated to open in 2014.
Subsequent to quarter-end, on Aug 1, Macerich opened its 526,000 square feet fashion outlet center - Fashion Outlets of Chicago - after completion of construction. The 93% occupied (on the opening day) property includes several well-known retailers such as Bloomingdale's The Outlet Store, Skechers USA Inc. ( SKX ), Gap Inc. ( GPS ) and Last Call by Neiman Marcus.
Liquidity
As of Jun 30, 2013, Macerich had cash and cash equivalents of $46.9 million compared to $68.8 million at the prior quarter-end. The company had a total debt of $6.5 million at the end of the quarter.
In the quarter, Macerich reaped net proceeds of $171.2 million by selling 2.5 million shares under its at-the-market program at the time when the company was included in the S&P 500 Index. The proceeds were utilized to pay off debts.
Moreover, Macerich committed to refinancing worth $850 million of Tysons Corner super regional mall. The company also planned the extension and rate reduction of its unsecured line of credit worth $1.5 billion.
Guidance Raised
For full-year 2013, Macerich raised its FFO per share guidance in the range of $3.38-3.48 (prior range of $3.35-3.45). Notably, the company increased its guidance for the second time this year.
Our Take
In tandem with its winning streak, Macerich reported impressive quarterly result on the back of solid operating fundamentals. The company's A-quality malls portfolio positioned across the most attractive U.S. markets drive occupancy and revenues growth. Moreover, significant developments and portfolio restructuring activities strengthens long-term growth prospects. The guidance increase also boosts investors' confidence in the stock and is thus encouraging.
Currently, Macerich carries a Zacks Rank #2 (Buy).
Note: FFO, a widely accepted and reported measure of REITs performance, are derived by adding depreciation, amortization and other non-cash expenses to net income.
GAP INC (GPS): Free Stock Analysis Report
HYATT HOTELS CP (H): Free Stock Analysis Report
MACERICH CO (MAC): Free Stock Analysis Report
SKECHERS USA-A (SKX): Free Stock Analysis Report
To read this article on Zacks.com click here.
Zacks Investment Research
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
The tag has no wiki summary.
learn more… | top users | synonyms
2
votes
1answer
496 views
Qt: Is it OK to use QString as a member in exception class
I am developing a custom exception, where I'd need a QString member. Something like: class MyException { private: const QString fDescription; public: MyException(QString desc); }; ...
2
votes
1answer
406 views
Are Ruby fork are COW friendly if yes how to test it
I have read some where that ruby fork are COW friendly ok here the link But then when I happen to google around for more info on it I found out that Ruby does not support COW (copy on write) Now ...
2
votes
3answers
186 views
PHP null and copy-on-write
Suppose I want to have two variables and have them both equal to null. (More realistically, I am thinking about an array that contains a large amount of nulls, but the "two variables" scenario is ...
1
vote
2answers
145 views
Why there is no SIGSEGV signal on copy on write?
The copy-on-write article on wikipedia says that copy-on-write is usually implemented by giving read only access to the pages, so that when one is written, the page fault trap handler can map a unique ...
6
votes
1answer
534 views
Making more efficient use fork() and copy-on-write memory sharing
I am a programmer developing a multiplayer online game using Linux based servers. We use an "instanced" architecture for our world. This means that each player entering a world area gets a copy of ...
6
votes
1answer
676 views
R: selecting subset without copying
Is there a way to select a subset from objects (data frames, matrices, vectors) without making a copy of selected data? I work with quite large data sets, but never change them. However often for ...
1
vote
1answer
516 views
invoking do_fork with copy-on-write disabled
I am doing an Operating System assignment, which is adding a new system call. The system call, which is called "dumbfork", needs to fork a process without using copy-on-write policy. So basically it ...
1
vote
3answers
656 views
mprotect in linux
If I mprotect a segment with PROT_NONE and if a SIGSEGV occurs due to a write which gets handled by sigaction with sa_sigaction, We will be able to find the address where the fault occurs using ...
2
votes
3answers
137 views
sometimes we declare “&” ahead of function in class based coding
I am following class based coding for project development.I have recently seen that some times we put "&" ahead of function name.. for an example.. rather than defining function test() it ...
1
vote
3answers
86 views
why is the code behaving this way WRT reference return?
This is my setting: display_startup_errors = on display_errors = On error_reporting = E_ALL | E_STRICT $b; function func ($name) { global $b; $b = 10; return $b; } $a =& ...
0
votes
2answers
727 views
Does Go language use Copy-on-write for strings
Does Go language use Copy-on-write for strings as in Java? I.e. if I pass a string by value to a method and never change it will this allocate memory and copy the string (which will be time ...
1
vote
2answers
136 views
To what granularity are expressions in function call parameters interleaved?
I would like to fully understand what is exactly specified about how function call parameters are interleaved. It seems to me to have many implications. Take the following example: void ...
1
vote
4answers
136 views
How do I get the underlying static array out of a CopyOnWriteArrayList in Java?
I have a class which maintains a list of features of the class. These features change infrequently compared to the reads. The reads are almost always iterations through the feature list. Because of ...
1
vote
5answers
634 views
Does Python use copy-on-write for copies of lists?
Suppose I copy an existing list: existing_list = [ 1, 2, 3 ]; copied_list = existing_list[:] ... copied_list[2] = 'a' // COW happens here [Some edits] I heard that Python uses copy-on-write when ...
1
vote
1answer
208 views
return const auto object — and Qt implicit sharing
So it is known this code is not sensical: const int foo() { int n = // do computation...; return n; } Because what meaning is to return "const int" when it is copied anyway? But with classes ...
6
votes
2answers
1k views
Why the address of variable of child process and parent process is same
Here is my code int main() { pid_t pid; int y = 3; if ( (pid = fork()) <0 ) return -1;; if( pid == 0 ) /* child */ { printf(" before: %d %p\n", y, &y ); y *= 10; ...
5
votes
3answers
530 views
Does deepcopy use copy-on-write?
I wonder if the python interpreter applies copy on write strategy when doing a deepcopy on mutable objects. Also, I'd like to know if the deepcopy is performed also on nonmutable object (that would ...
6
votes
2answers
1k views
Confusion about Copy-On-Write and shared_ptr
I have searched the web and read through the Boost documentation about shared_ptr. There is a response on SO that says that shared_ptr for Copy-On-Write (COW) sucks and that TR! has removed it from ...
2
votes
3answers
623 views
sharing address space versus duplicating the page table entries
Before copy on write (COW), when it says that the parent and child process share the same address space, it means that they share the same code segment, data segment, heap and stack right? If the ...
2
votes
5answers
3k views
remove elements from CopyOnWriteArrayList
I am getting an exception when I try to remove elements from CopyOnWriteArrayList using an iterator. I have noticed that it is documented Element-changing operations on iterators themselves ...
0
votes
1answer
2k views
std::string copy-on-write implementation thread safety [duplicate]
Possible Duplicates: C++: std::string in a multi-threaded program Is std::string thead-safe with gcc 4.3? Hello all, Suppose that we are passing a reference to object to the thread ...
2
votes
2answers
445 views
Object roll-back, copy-on-write, versioned proxy etc in Python
Premise: Given a Python object obj, I want to pass it along to some random function, and, when the function is done, I need the option to reset obj to it's original state. Additionally, no actual ...
3
votes
2answers
402 views
Does all memory flagged as copy-on-write get copied after a single change to one piece of the data?
My question is, perhaps, a poorly worded one and stems from my amateurish understanding of memory management. My concern is this: I have a Perl script that forks many times. As I understand from the ...
1
vote
2answers
572 views
disable copy-on-write(COW) on some memory pages when doing fork()
When a parent process forks a child process (under linux), I want to copy some of the memory pages in parent process to the address space of child process right at the beginning, which means, no need ...
15
votes
7answers
2k views
Which string classes to use in C++?
we have a multi-threaded desktop application in C++ (MFC). Currently developers use either CString or std::string, probably depending on their mood. So we'd like to choose a single implementation ...
8
votes
1answer
3k views
Implicit Sharing
I am building a game engine library in C++. A little while back I was using Qt to build an application and was rather fascinated with its use of Implicit Sharing. I am wondering if anybody could ...
3
votes
2answers
2k views
Programmatically determine if std::string uses Copy-On-Write (COW) mechanism
Following up on the discussion from this question, I was wondering how does one using native C++ determine programmatically whether or not the std::string implementation they are using utilizes ...
4
votes
6answers
3k views
How to know whether a copy-on-write page is an actual copy?
When I create a copy-on-write mapping (a MAP_PRIVATE) using mmap, then some pages of this mapping will be copied as soon as I write to specific addresses. At a certain point in my program I would like ...
14
votes
5answers
1k views
Does StringBuilder become immutable after a call to ToString?
I distinctly remember from the early days of .NET that calling ToString on a StringBuilder used to provide the new string object (to be returned) with the internal char buffer used by StringBuilder. ...
3
votes
2answers
2k views
Why does COW mmap fail with ENOMEM on (sparse) files larger than 4GB?
This happens on a 2.6.26-2-amd64 Linux kernel when trying to mmap a 5GB file with copy-on-write semantics ( PROT_READ | PROT_WRITE and MAP_PRIVATE). Mapping files smaller than 4GB or using only ...
4
votes
3answers
692 views
How to check if the block is present in a sparse file (for simple copy-on-write)?
How to get sparse block size and check if data is present at the given offset in sparse file in reiserfs/ext3 in Linux? I want to use it to implement simple copy-on-write block device using FUSE. Or ...
6
votes
2answers
418 views
Qt undocumented method setSharable
I stumbled about a method which seems to be present in all data objects like QList, QQueue, QHash... I even investigated so far I can see the source code of it, which is inline void setSharable(bool ...
6
votes
3answers
829 views
Why is there no boost::copy_on_write_ptr?
I just saw this nice copy-on-write pointer implementation. It looks pretty generic and useful, so my question is: Is such a class contained in any of the C++ toolkits (boost, loki, etc.)? If not, I'd ...
13
votes
6answers
7k views
How to implement Copy-on-Write?
Hey! I want to implement a copy-on-write on my custom C++ String class, and I wonder how to... I tried to implement some options, but they all turned out very inefficient. Thank you guys :-)
5
votes
2answers
1k views
Purely functional data structures with copy-on-write?
I want to have the advantage of functional data structures (multiple versions of data that can share structure) but be able to modify it in an imperative style. What I'm thinking about (and a ...
12
votes
5answers
4k views
Why VC++ Strings are not reference counted?
STL standard do not require from std::string to be refcounted. But in fact most of C++ implementations provide refcounted, copy-on-write strings, allowing you passing string by value as a primitive ...
19
votes
5answers
16k views
What is copy-on-write?
I would like to know what copy-on-write is and what it is used for? The term 'copy-on-write array' is mentioned several times in the Sun JDK tutorials but I didn't understand what it meant.
3
votes
5answers
453 views
How can you tell if a memory page is marked as read-only?
When using copy-on-write semantics to share memory among processes, how can you test if a memory page is writable or if it is marked as read-only? Can this be done by calling a specific assembler ... | ESSENTIALAI-STEM |
Inside Out (2000 TV series)
Inside Out was a short-lived Scottish children's television show, produced by Scottish Television (now STV Central) and broadcast each Saturday and Sunday afternoon, from August to December 2000. The show was also broadcast on neighbouring ITV station, Grampian Television (now STV North).
The series was written and presented by David Sneddon. Sneddon went one to win the first series of the BBC's Fame Academy in 2002. He is now in 2012 a successful songwriter in London and has written music chart songs for artists such as Hurts, Morten Harket of A-ha, X Factor winner Matt Cardle, Newton Faulkner and number one selling American singer Lana Del Rey. His presenting partner on the show was the actress Christina Cochran, now known as Christina Strachan. The show consisted of on-location features, comedy and cartoons.
Featured cartoons on the programme included Birdz, Mythic Warriors, and Sherlock Holmes in the 22nd Century. | WIKI |
How To Take Off Tempered Glass Screen Protector?
How To Take Off Tempered Glass Screen Protector?
Taking off a tempered glass screen protector is a delicate process. Begin by powering down your device and using a plastic card to lift the protector’s edges gently. Applying heat with a hairdryer helps loosen the adhesive, facilitating a slow and steady removal. Clean any residue with isopropyl alcohol and a microfiber cloth. Finally, dispose of the old protector responsibly and celebrate your clear screen.
Tips to Take Off Tempered Glass Screen Protector
1. Gather Your Tools
First things first, let’s assemble our toolkit. You’ll need a couple of handy items:
• A plastic card (like a credit card or ID)
• A hairdryer
• Isopropyl alcohol
• Microfiber cloth
These tools will be your trusty companions on this screen protector removal journey.
2. Power Down Your Device
Before you start any screen protector removal magic, power down your device. It’s a small precaution but an important one. We want to make sure your device stays safe and sound throughout the process.
3. Use a Plastic Card
Now, grab that plastic card we mentioned earlier. Slip it between the screen protector and the phone, gently prying the edges. The plastic card is your secret weapon – it’s flexible enough not to damage your phone but sturdy enough to lift the protector away.
4. Apply Heat with a Hairdryer
For stubborn screen protectors that refuse to budge, heat is your friend. Use a hairdryer on low heat and wave it over the protector for about 15-20 seconds. The heat helps loosen the adhesive, making it easier to peel off. Just be cautious not to overheat and damage your device.
5. Slow and Steady Wins the Race
As the adhesive starts to loosen, begin peeling the screen protector from one corner. Take it slow and steady, applying more heat if needed. If you encounter resistance, stop and add a bit more heat to that area. The key is to be patient and gentle to avoid any mishaps.
6. Clean Up the Residue
Once the screen protector is off, you might be left with some sticky residue. Fear not! Dampen a microfiber cloth with isopropyl alcohol and gently wipe away the adhesive. This will ensure your screen is clean and ready for its next protector.
7. Check for Remaining Debris
Inspect your device’s screen for any leftover adhesive or debris. If you find any, use the microfiber cloth and a bit of isopropyl alcohol to clean it off. A pristine screen is the goal!
8. Install Your New Protector
With the old screen protector gone, it’s time for a fresh start. If you’re replacing it with a new protector, follow the installation instructions carefully. Make sure your screen is clean and free of any residues before applying the new protector.
9. Dispose of the Old Protector Responsibly
Let’s be eco-friendly! Instead of tossing your old screen protector into the regular trash, check if there’s a recycling program in your area that accepts electronic accessories. Some manufacturers or retailers offer recycling options for screen protectors.
10. Celebrate Your Clear Screen
Congratulations! You’ve successfully removed your old tempered glass screen protector and given your device a clean slate. Now, whether you’re admiring your phone’s sleek display or gearing up for a new protector, you can do so with the confidence that comes from mastering the art of screen protector removal.
Conclusion
In a nutshell, for cleaning tempered glass screen protectors taking off protectors doesn’t have to be a nerve-wracking experience. With the right tools, a bit of heat, and a touch of patience, you can seamlessly transition from old to new. CellNTech is here to guide you through every tech twist and turn, ensuring your devices stay in tip-top shape. Happy peeling
Frequently Asked Questions
Q1. Are tempered glass screen protectors hard to remove?
Removing tempered glass screen protectors can be relatively easy with careful peeling and lifting. However, the difficulty may vary based on the quality of the adhesive used during installation.
Q2. Does removing tempered glass damage the screen?
When removed correctly, tempered glass screen protectors should not damage the screen. The tempered glass is designed to absorb impact and scratches, leaving the device’s screen unharmed during removal | ESSENTIALAI-STEM |
Learning The Secrets About Telecommunication
What to Know about Structured Cabling Solutions Structured wiring refers to the construction of infrastructure with the use of conventional materials referred to as subsystems. Usually there are five subsystems; the work area components, the vertical cabling, horizontal cabling, telecommunications rooms and the demarcation point. The demarcation point is the point where the end of the web company is marked, and it establishes a connection with the premises of the enterprise where the network is installed. It is this stage that the person responsible for the installation and maintenance of the cables and other equipment is determined. Note that this point may vary in different countries. The telecommunications room is used for keeping equipment and also act as a wiring consolidation point which serves the users in the area where the cabling systems have been installed. Vertical wiring connects different equipment usually located on different floors or various locations in the building.
Smart Ideas: Telecommunication Revisited
The horizontal cabling is used to link telecommunication rooms to the independent outlets found on the floors of the building, ceilings, or conduits. The work area components connect the end user devices to the outlets.
Lessons Learned About Companies
There are certain rules that govern the designing and installing of structured cabling. The standards specify the type of offices, wiring date centers, and apartment buildings for voice or data communications using some structured cables such as the category 5e, category 6, fiber optic and other modular connectors. The cabling standards are very much crucial in defining how the wiring will be laid depending on the topology to meet specific needs of the customers.This is done using a patch panel which is the point where every modular connection can be utilized when there is a need. Every outlet in the network is then connected to switch. In other instances, the outlets may be patched into a private branch exchange telephone system patch panel. A structured cable network is the stronghold of the whole information technology of a company and the foundation upon which all other business activities are depended on. The organization being served with this system must make sure that the cabling network is properly designed, fixed and administered so as to reduce costs linked with these activities. The the only solution for companies wishing to have cabling networks connected, is to hire the services of a structured cable company.These companies design and install standard based cable products that are made of high-quality components.A Company that is reliable will give you leading industry warranties. Reliable companies have the capability of reducing frustration among the information technology users in your organization by doing away with issues related to poor network infrastructure. These firms ensure that the business service levels are enhanced by reducing the impacts of errors caused by structured cable products.
READ Learning The "Secrets" of Tips | ESSENTIALAI-STEM |
Michael POTTINGER, Peter Carter, and Berry Young, Plaintiffs, v. CITY OF MIAMI, Defendant.
Case Number: 88-2406-CIV-MORENO
United States District Court, S.D. Florida, Miami Division.
Signed February 15, 2019
Benjamin Samuel Waxman, Black Srebnick Kornspan & Stumpf PA, Maria Kayanan, ACLU of Florida, Arthur J. Rosenberg, Florida Legal Services, Kelley S. Roark, Ritter Ritter & Zaretsky, Dante Pasquale Trevisani, Florida Justice Institute, Miami, FL, Robert Elliot Weisberg, Stephen J. Schnably, University of Miami School of Law Professor of Law, Coral Gables, FL, for Plaintiffs.
Carole Patman, pro se.
David Peery, pro se.
Kendall Brindley Coffey, Borgognoni Gutierrez & Arza, Warren Bittner, Miami City Attorney's Office, Scott Allan Cole, Thomas E. Scott, Jr., Cole Scott & Kissane, Miami, FL, for Defendant.
MEMORANDUM OPINION
FEDERICO A. MORENO, UNITED STATES DISTRICT JUDGE
"[O]ne of the things Pottinger has done so well is create this amazing collaboration where it forced the different stakeholders to work together." (Tr. vol. 4, 29). The veracity of Judge Steve Leifman's statement was evident in this proceeding as this Court heard time and again about the myriad of programs and aid available to the homeless in this community. There can be no doubt that in the twenty years this Consent Decree has been in place, the City of Miami has endeavored to eradicate homelessness. Although Miami has made significant inroads, homelessness unfortunately persists, as it does in all cities in America. Yet, the City continues daily to mitigate the effects in a manner consistent with the Pottinger Agreement. The issues in these proceedings are whether the City has substantially complied with the Pottinger Consent Decree such that federal court oversight should come to an end after 20 years or whether the City's treatment of the homeless requires this Court to continue its oversight and even to hold the City in contempt.
I. BACKGROUND
The world has changed dramatically since the original filing of this complaint 30 years ago and the City of Miami is no exception. In 1988, Judge C. Clyde Atkins entered an injunction to prevent the arrest of the homeless for being homeless and the seizure of their property. After 10 years of litigation, a settlement was reached between the homeless Plaintiffs led by Mr. Pottinger and the City of Miami, and the undersigned entered the Consent Decree commonly referred to as the Pottinger Agreement.
The 1998 Pottinger Agreement was later modified with the agreement of both parties in 2014 to exclude sexual offenders from the protected class of the homeless. In the twenty years of the Pottinger Agreement, the City of Miami police department instituted departmental policies that prohibited the police officers' past practices of arresting the homeless without cause. As a direct consequence of the excellent work done by the attorneys for the American Civil Liberties Union representing the homeless, the Pottinger Agreement led to, not only a change in the City's police department, but also contributed to a total cultural change in the way the homeless were treated by all City employees. That cultural change also contributed to the creation of a Miami-Dade County Homeless Trust supported by taxes and grants that yield an annual budget of approximately $ 61-65 million to assist the homeless in various activities, including medical assistance, shelters, etc. (Tr. vol. 2, 24).
Because of these changed circumstances, the City of Miami seeks termination of the twenty-year old Pottinger Agreement. On the other hand, the Plaintiffs not only oppose the termination of the agreement, but they have also moved to hold the City of Miami in contempt for violating the agreement by seizing the property of the homeless in the City's clean-up operations. The City's 2018 clean-up operations were essential because of the health and safety concerns stemming from various homeless encampments.
The Court conducted an evidentiary hearing on the parties' motions over numerous days. The Court will make findings of fact and separate conclusions of law based on the testimony of the City's witnesses, over thirty homeless witnesses, and several expert witnesses in the field of homelessness. The Court is not charged with "resolving" the homeless problem in the City of Miami. However, the Court was impressed with all the services provided to the homeless by many individuals and organizations as a direct consequence of the cultural change engendered by the Pottinger Agreement. As such, there is little dispute that the number of homeless has been reduced countywide from 10,000 to around 1,000, although those numbers are imprecise because of the difficulty of counting the homeless. Of those, the overwhelming majority (over 600) are in the City of Miami. According to the U.S. Census, the 2017 population estimate for the City of Miami is 463,347 and the estimate for the County is 2,751,796. Meaning, even though the City's population is only about 17% of the County's overall population, it is home to over 60% of its homeless. Indeed, Mr. Ronald L. Book, Chair of the Homeless Trust, testified that 66% of all homeless individuals placed in shelters come from the City of Miami. (Tr. vol. 2 at 10).
Thus, there is little dispute that Miami has changed, its homeless population has declined by 90%, and the City is the only municipality out of 34 in Miami-Dade County and the County's unincorporated area, subject to the Pottinger Agreement. The solution to those problems is beyond the scope of any power given to the judiciary. Yet, the Court does have the power to enforce the parties' agreement and of course, courts always have the power to enforce the United States Constitution to protect individuals from unlawful arrests and seizures of their property.
The dispute in this case is simply the impact that terminating the Pottinger Agreement will have on the constitutional rights of the homeless to be free from harassment, arrests, and the unlawful taking of their property. During the last twenty years, so much has changed in how the City of Miami treats its homeless population that the Court finds the Pottinger Agreement should indeed be terminated. The changes in the treatment of the homeless are the direct result of the vigorous challenge by the American Civil Liberties Union attorneys on behalf of the homeless in this case.
The Court is under no illusions that the City of Miami has resolved homelessness. But, as homeless expert Judge Steve Leifman, a witness for the Plaintiffs, testified, Miami has become the best city in the country in dealing with the homeless. The health crisis, about which there is no dispute involving drug use, public sex, and rodents in homeless "camps," must be dealt with for the protection of the homeless themselves and the citizens, including children, who live and walk near these gatherings. Any abuse by the authorities is subject to individual civil rights suits. Unattended personal property left on public sidewalks and fences, which pose public health and safety concerns, are allowed to be seized and dispensed by the City. Any arrest not based upon probable cause by the City of Miami police department will subject the police to the same liability whether the aggrieved party is homeless or has a home.
Therefore, the City of Miami's Motion for Termination is GRANTED, and the Plaintiffs' Motion to Hold the City in Contempt is DENIED.
II. FINDINGS OF FACT
Twenty years ago, this Court approved a settlement between a class of Plaintiffs, consisting of homeless individuals, and the City of Miami, where the Plaintiffs lived. United States District Judge C. Clyde Atkins found the City of Miami had unconstitutionally arrested homeless persons for engaging in life-sustaining acts they were forced to conduct in public, such as sleeping, cooking, eating, sitting, congregating, and relieving themselves. Judge Atkins found the City "used the arrest process for the ulterior purpose of driving homeless from public areas." Pottinger v. City of Miami , 810 F.Supp. 1551, 1566 (S.D. Fla. 1992).
Recognizing the limited role of the Court in fashioning a remedy, Judge Atkins issued a negative injunction that prohibited the City from arresting homeless people for sleeping, eating, lying down, or sitting in two safe zones he established in downtown Miami. The injunction further prohibited City police from destroying personal property belonging to the homeless. The injunction did not prohibit police from arresting homeless persons for criminal acts.
The Settlement Agreement ultimately reached in this case was the product of ten years of litigation, appeals, and extensive mediation. After a hearing, this Court, assigned to the case after Judge Atkins, approved the Pottinger Agreement, which has been in place ever since.
As modified in 2014, the Consent Decree details a protocol that governs City of Miami police interactions with those experiencing homelessness. City police may not approach a homeless individual, who is not committing a crime, unless the approach is to offer services. (Consent Decree, Def. Exh. 1 at 6-8). With certain exceptions, the police may not arrest or threaten to arrest any homeless person for committing "life sustaining conduct misdemeanors," unless they first offer the individual an available space in a shelter within city limits or within a mile of those limits, and the individual refuses that offer. Id. at 6, 8. Upon refusal of available shelter, the homeless individual is subject to arrest if there is probable cause that a crime has been committed. Id. The Consent Decree lists the life-sustaining conduct misdemeanors and does not prohibit police from arresting individuals for misdemeanors not on the list. Id. at 9-11. Miami police need not offer shelter prior to arresting a homeless individual committing a felony. Id. at 12.
The Consent Decree also offers protection for the property of homeless individuals. The Decree requires all City employees to follow procedures for taking custody of personal property and not to destroy personal property reasonably recognizable as belonging to the homeless. Id. at 12-13. The Decree does not prevent the City from destroying contaminated property, or property that otherwise poses a health hazard. Id. The evidence showed that although the City has routine protocol in place, the City outreach team did not have written procedures in place for the handling of property when the Plaintiffs filed their motion for contempt.
In its motion, the City of Miami seeks to terminate the Consent Decree, or at the very least, modify it in four different ways. One proposed modification is to exclude what the City calls the chronically homeless from the purview of the decree. The other proposed modification would permit a shelter space anywhere in Miami-Dade County to be offered in lieu of arrest for a life sustaining conduct misdemeanor, rather than only a shelter within the city limits or within one mile, as is currently the case. The City also proposes two additional modifications, which are to include language prohibiting the storage of a homeless person's belongings on public property and exempting from the Decree actions taken by the City in cleaning public areas.
In its discretion, the Court held an evidentiary hearing to resolve the disputed issues of fact and to determine whether the City carries its burden to show significant changed circumstances and substantial compliance with the Consent Decree. The inquiry is fact-intensive. The trial court is "vested with broad discretion in granting or denying discovery." See King v. Greenblatt , 149 F.3d 9, 13 (1st Cir. 1998). This Court allowed the parties limited discovery prior to conducting the evidentiary hearing.
A. Summary of Changed Circumstances in the City of Miami since 1998
The testimony was unequivocal that the Pottinger Agreement was a catalyst for all the stakeholders in Miami-Dade County to devise appropriate programs to combat homelessness. It was an "incentive to provide the services for the population." (Tr.
vol. 4, 8). Judge Steve Leifman, Associate Administrative Judge of Miami-Dade County's Criminal Division, and the Chair of the Florida Supreme Court Steering Committee on Mental Health and Substance Abuse Courts, testified that "[i]t has been a significant motivator for all the stakeholders to come up with appropriate programs on how to deal with this population, and it has worked." Id. at 7. The evidence showed that the numbers of homeless persons in Miami has plummeted. Id. The evidence also showed that the "population that we have left on the street is different than what we had when we first started." Id. Pottinger was not developed to address the mental and substance abuse issues that remain present in our community. It was primarily devised to prevent the police from arresting the homeless in certain circumstances and from unlawfully taking their property. The evidence showed "it has achieved that end." Id. at 15. The evidence also showed that the City of Miami is unlikely to revert to those policies given the myriad of programs available to it as a means to aid the homeless. Those programs did not exist when Pottinger was filed in 1988. It is true that by the time the Consent Decree was entered, ten years after the litigation began, the wheels were in motion and homeless aid initiatives were beginning to take shape. In the twenty years since, the proliferation of services and funding available in this community has been transformative causing a 90% reduction in the number of homeless. There is also a general consensus of what work remains and how to chip away at those remaining statistics.
1. Changes in Police Work
The City began its presentation by calling its Police Chief Jorge Colina, a 28-year veteran of the force and the chief since January 2018 and James Bernat, an executive officer for the Police Department, and an 11-year veteran with the force. Chief Colina discussed the City's interdepartmental efforts to aid the homeless, including the City's newly formed Department of Human Services. (Tr. vol. 1, 60-61, 94). Both testified regarding the changes in policing since Pottinger 's inception. Now, every City officer wears a body camera to record engagements with the public and every officer has access to an interactive simulator to teach them how to react in different scenarios. Id. at 65-67. Every police vehicle has a computer, where officers can watch training videos and access Departmental Orders, including those orders explaining how to treat the homeless. Id. at 68-69. All officers receive training on Pottinger 's requirements and scenario-based training so they are well-versed in the appropriate treatment of the homeless. Id. at 54-55; (Def. Exh. 40).
Chief Colina testified that the department has implemented disciplinary procedures since the Pottinger agreement was entered. Id. at 61. Any police officer found to have violated the order is subject to discipline, up to and including termination or arrest. Id. at 47-48. One incident involving a homeless individual named Java Brooks, is under investigation by the Department's Internal Affairs. Id. at 87-88.
Section VIII of the Pottinger Agreement requires the City to keep records of police interaction with the homeless. Pursuant to the agreement, officers document every interaction with a homeless individual in the form of a Field Information Card. (Def. Exh. 1 at 9). Departmental Order 11, Chapter 10 requires that these cards be kept on file with the police records unit like the old library card cataloguing system. (Def. Exh. 95, 100). Beyond dispute is that changes in technology, including body cameras and cellular phones, render this requirement of a "card catalogue" archaic and obsolete. The Court observed videotape evidence documenting police interactions with the homeless in this case. (Pl. Exh. 578-37, 39). Although there are many contributing factors, the transparency in police work, caused by technology, surely helped precipitate the sharp decline in arrest statistics relating to homeless individuals. (Tr. vol. 4, 30).
2. Funding Changes and the Development of the Continuum of Care
The evidence described the changes in funding efforts in Miami-Dade County since the inception of the Pottinger Agreement. Ronald L. Book, the Chairman of the Homeless Trust for the last decade, testified as to the funding efforts to assist the homeless in this community. Prior to serving as the Chair of the Homeless Trust, Mr. Book chaired the finance committee since the Homeless Trust's creation over 24 years ago. Mr. Book began his work 25 years ago on a legislative effort to pass the food and beverage tax in Miami-Dade County. (Tr. vol. 2, 5-6). The tax was an outgrowth of the Governor's Commission on Homelessness and part of a 10-year plan to end homelessness in Miami-Dade County. Id. The Homeless Trust is the funding source and overseer of the panoply of services for the homeless, known as the continuum of care in Miami-Dade County. Id. Twenty-seven members participate on the public board that administers the food and beverage tax dollars, federal and state grants, and other revenue streams. Id. The continuum of care was created to provide all the programs and services needed to end homelessness. Id. at 7. It starts with the City of Miami's outreach teams, known as the Green Shirts, many of whom are formerly homeless individuals themselves. The Green Shirts work on bringing the homeless into the continuum of care, which includes medical care, mental health counseling, substance and alcohol abuse treatment, shelter, and housing. Id. at 10.
The City's outreach efforts are "completely intertwined" with the Homeless Trust. Id. at 9. The Trust owns two Homeless Assistance Centers, in its partnership with the Chapman Partnership. Id. at 10. The City's outreach workers bring the homeless individuals (from the City of Miami and other geographic areas) to these centers; the homeless cannot simply walk into a center for assistance. Id. The placements in the Chapman Homeless Assistance Centers are 66% derived from the City of Miami. Id. In the 24 years since the creation of the Homeless Trust, the County started with over 8,000 street unsheltered homeless individuals, and that number has plummeted to 1,104. Id. at 11. Of the roughly 1,000 homeless in the County, approximately 664 are in the City of Miami. Id. at 11, 17. Mr. Book testified there has been a 90% reduction in the City of Miami and countywide since the start of the Homeless Trust. Id. at 11.
The Department of Housing and Urban Development also provides funding and dictates certain standards and protocols for homeless individuals to access the system. (Tr. vol. 2, 79). The Homeless Trust developed a Coordinated Entry System, which provides a hotline for homeless individuals to call for aid. Id. The evidence showed that homeless individuals sometimes have to call the hotline for 30 days or more to get into a shelter. Id. at 79-80; (Tr. vol. 3, 50-51). The Camillus House Day Center provides phones for them to call the hotline. (Tr. vol. 2, 80).
The monies generated by the Homeless Trust from the food and beverage tax are used as an elastic band. Id. at 13. When the Trust provides funding to the different community-based organizations, such as Camillus House and the Salvation Army, the Trust expects these organizations to use those funds as leverage to obtain additional grants and funds to buy more beds and units of housing. Id. Of the funds collected by the Trust, approximately 33 to 34% are generated in the City of Miami, which is the dominant source of food and beverage tax revenues in the County. Id. The Pottinger Agreement has no impact on the collection of the food and beverage tax. Id. at 15.
Camillus House is a key component of the continuum of care. Hilda M. Fernandez, the CEO of Camillus House, a Ministry of St. John of God, testified regarding the organization's work with the homeless in Miami-Dade County. Id. at 50. Camillus House operates programs throughout the county serving about 1,100 people daily. Id. at 51. Some of the programs include the Lazarus project, which is a program that is a combination of employees from Camillus House and Camillus Health. Id. at 52. The medical assistants, a psychiatric nurse practitioner, and the Green Shirts engage the hardest to serve, severely mentally ill chronically homeless, medicate them on the street, and get them sufficiently stable to enter the continuum of care. Id. Dr. Edward Suarez, the former director of the Lazarus Project, testified that the idea is to get homeless individuals started on necessary medication and therapy while they await housing. Id. at 94-95.
Camillus also provides a day center to serve the street homeless, allowing individuals to come in and access showers, clothing, a hot breakfast, and mail service. Id. at 52. Camillus operates with a sister agency, Camillus Health Concern, which provides a clinic on the Camillus campus, which provides healthcare services to those that come into the day program. Id. at 55. Camillus provides temporary storage while people are accessing services on the Camillus campus. Id. at 52. The organization also provides emergency housing, treatment programs, and permanent supported housing. Id. at 52-53. In providing all these services, Camillus serves various populations, including unaccompanied homeless youth, victims of human trafficking, and veterans. Id.
For the last fifteen years, Camillus has been providing permanent housing, which is known as the Housing First model in the continuum of care. Id. This is housing for individuals moving out of homelessness, who do not need intensive support services, and can pay reduced rents to live in facilities owned by Camillus. Id. There are on-site clinicians that provide services to individuals in permanent supported housing. Id. at 56.
In addition to Camillus House's partnership with the City of Miami on the Lazarus Project, the City has an agreement with Camillus to fund shelter beds and provide support for the Camillus Day Center program. Id. at 56-57. The City funds 75 beds, 65 are extended-stay beds, and 10 are 24-hour beds. Id. at 59. Former City Commissioner Marc Sarnoff testified that the City provided funding, $ 10 million dollars, to aid Camillus House's relocation to its new campus. (Tr. vol. 2, 30).
3. The Chronically Homeless and Outreach Efforts
The City's outreach efforts have also changed since the inception of the Pottinger Agreement. The record demonstrates agreement among City police and administration that arresting homeless individuals is not an effective remedy since the homeless individuals return to the streets within a short time. The City created outreach operations to move homeless individuals off the streets and into the continuum of care. As of the fall of 2018, the City created a new department called the Department of Human Services. (Tr. vol. 1, 276). The Department includes homeless outreach, a child care center, job training, and employment. Id. at 277. Prior to this past fall, the City of Miami's Department of Veterans Affairs and Homeless Services provided outreach to the homeless community.
The City's Green Shirts, the homeless outreach employees, work in the streets of Miami to move the homeless into the continuum of care or to get them social services as needed. Sergio Torres, the Director of the new Department of Human Services, testified that he conducts training sessions for his department, and other City employees, who interact with the homeless, including Parks and Recreation staff and the police department's Neighborhood Enhancement Teams. (Tr. vol. 1, 233-234). David Rosemond, the Assistant Director of Neighborhood Enhancement Teams, oversees the Green Shirts to ensure they are working as a cohesive unit. (Tr. vol. 6, 30). Due to the teams' active engagement with the homeless, the City of Miami has a contract with Miami-Dade County to perform the work countywide. Id. at 31. The role of the Green Shirts is to usher the homeless from the streets and to the agencies that can best provide them services. Id. at 32. Many know the homeless individuals by first and last names and know their circumstances. Id. at 33. The City provides the Green Shirts with training on how to engage the homeless, how to provide them services, and how to talk to people who find themselves homeless. Id. The majority of the Green Shirts are formerly homeless individuals, or individuals in recovery. Id. at 34. Some of the Green Shirts have been working in that capacity since the inception of the project in 1992. Id. at 35.
The outreach efforts are not always successful as many homeless individuals refuse available shelter. Officer James Bernat testified that many prefer to stay homeless even if they can obtain available shelter due to mental illness, substance abuse issues, and other reasons. Judge Leifman, a witness for the Plaintiffs, also confirmed the change in the type of homeless individuals now versus twenty years ago. Shelters are controlled environments with rules, which many homeless individuals do not want to follow. A majority of the unsheltered homeless population are "chronic homeless," meaning they have been living on the streets for 365 days or more, or they experience four instances of homelessness in a three-year period. (Tr. vol. 2, 17). About 67-69% of the homeless population is chronically homeless. Id. This is a population that is shelter-resistant and would benefit from a Housing First program, which is not a shelter facility, but rather an individualized home. Id. This population needs to be incentivized to seek housing. Mr. Book testified that allowing street feedings and panhandling, as well as the Pottinger agreement, itself, all make it harder to get the chronically homeless into the continuum of care. Id. at 17. The County and Jackson Memorial Hospital gave $ 42 million for the construction of a new facility on 7th Avenue and 22nd Street in the City of Miami to help this population. In addition, there is a city-owned property around that facility, and a desire to build thousands of new units of low-income affordable housing for the chronically homeless. (Tr. vol. 4, 25-26).
There is agreement that many chronically homeless suffer from mental illness. In 2000, Judge Leifman convened a summit to address how to better handle mental health issues in the criminal court. (Tr. vol. 4, 2). The summit devised a pre- and post-arrest diversion system. As a result, Miami-Dade County has the largest squad of officers trained in Crisis Intervention Team policing. Id. The program provides training for law enforcement that teaches them to identify people in crisis, how to deescalate a situation, how to Baker Act individuals, and where to take them. The programs provide an alternative to arrest. Id.
The summit also set up post-arrest diversion programs for people with serious mental illness who get arrested, one for misdemeanants, one for non-violent felonies, and one for competency restoration. Id. at 3. The success of those programs is evidenced in the statistics. "[B]etween 2010 and 2017, the City of Miami and Miami-Dade Police Department[s] combined, handled 83,427 mental illness calls and only made 149 arrests." Id. The recidivism rate has dropped from 72 to 20 percent in the misdemeanor program and the felony program has saved the County "about 68 years of jail bed days with a low recidivism rate." Id. The Competency Restoration Alternative Program helps individuals get services as opposed to being sent back to the street without assistance. Id. Before these programs started, there were two shootings per month of people with mental illnesses. Id. at 19. Now, there have been five or six in eight years. Police injuries of mentally ill people has almost completely vanished and "out of 5,200 calls in the City of Miami last year there were six arrests." Id. When a mentally ill homeless person winds up in court, the state court calls the Green Shirts to aid the homeless individual. Id. at 33.
The Green Shirts are also involved in the University of Miami's Needle Exchange Program. Dr. Edward Suarez testified that it is Florida's first and only syringe exchange program. (Tr. vol. 2, 92, 96). As part of his work and due to his training in crisis intervention, Dr. Suarez can Baker Act when he sees an "individual who's floridly psychotic, responding to internal stimulation ... hasn't eaten, hasn't drank, not taking care of himself, is being a danger to themselves by way of self-neglect ... to the point of self-harm." Id. at 98. At that point, Dr. Suarez can call a City of Miami Neighborhood Resource Officer to transport the individual to Jackson Crisis, and that individual gets housed. Id. at 99. He says that he has a symbiotic relationship with the City of Miami police and to that end, he testified that "whenever [the police or outreach personnel] get into a jam, before they commit anything - whatever, before they put any hands on anybody or anything of that sort, I get a phone call" seeking advice and assistance since he is familiar with many homeless individuals. Id.
The objective of the Needle Exchange Program is to test the homeless individuals for HIV and Hepatitis C. When homeless individuals test positively for HIV, Dr. Suarez starts HIV medication that same day. Id. at 106. He then goes out to find that person in the street, days later, to remind them to refill their medications. Id. The City of Miami aids in the process by helping Dr. Suarez locate individuals and place them into shelters. Id. at 107, 120. Once the individual is in a shelter, Dr. Suarez can get that person into HIV care, and that person will have a dedicated space to store the HIV medication. Id. at 107.
B. Outreach Efforts and Procedures Regarding Property
The Consent Decree contains a section titled: "Disposition of Property Belonging to Homeless Person who is arrested." It states:
The City shall respect the personal property of all homeless people. The Miami Police Department (and all other Departments including but not limited to Parks and Recreation and Solid Waste) shall follow their own internal procedures for taking custody of personal property. In no event, shall any city official or worker destroy any personal property known to belong to a homeless person, or readily recognizable as property of a homeless person (i.e. bedding or clothing and other belongings organized or packaged together in a way indicating it has not been abandoned), except as is permissible by law and in accordance with the department's operating procedure, or if the property is contaminated or otherwise poses a health hazard to City workers or to members of the public.
(Def. Exh. 1 at 12). This section places two requirements on the City departments with regard to property of homeless individuals: (1) all departments must "follow their own internal procedures for taking custody of personal property," and (2) no City employee may destroy property belonging to homeless individuals except where permitted by law, or if the property is contaminated. The evidence showed that the City outreach workers follow internal procedures, albeit unwritten ones, for the handling of property. The Pottinger Agreement did not require the City to have written procedures for the handling of property. Although a written protocol is preferable and has finally been prepared, it is important to note that in the twenty years that Pottinger has been in place there has not been a complaint regarding the handling of property or a lack of written procedures until now.
When an outreach worker assists a homeless individual into a shelter, the worker follows a procedure to deal with the property. (Tr. vol. 1, 248-49, 254). When a homeless individual accepts an offer of shelter from an outreach worker, the outreach team assists him in storing bulkier property that the individual cannot take into a shelter. (Tr. vol. 6, 44). The homeless person entering a shelter takes the belongings he may want to keep, and the outreach worker will itemize the rest of the items on a receipt, which the outreach worker then gives to the homeless individual. Id. The outreach worker then takes that property to the City's storage unit. Id. This same protocol would be used when encountering abandoned property in the streets. Id. at 46-47. In that situation, the outreach worker will go through the property and separate items of value, including documentation, medication, phones, or pictures. Id. The outreach worker itemizes those things and puts them in a bag to take to storage. Id. The outreach worker also leaves a note on the site where the things were located so that the individual knows that his belongings were gathered by the outreach team. Id. ; (Def. Exh. 28) (photographs of notes on fences). The notice contains an address and phone number where the homeless can retrieve their property. Id. The department stores the property as long as there is space, and in reality, has not thrown anything away. (Tr. vol. 6, 48-49). The outreach team patrols those areas for days where the property would be taken in the event someone is looking for his belongings. Id. at 46-47. Only one homeless person, Robert Rhodes, testified that he attempted to retrieve his property from the facility, and was unable to do so. (Tr. vol. 3, 17-18).
1. 2018 Clean-Ups
The City outreach workers unquestionably began clean-up efforts in the downtown Miami area in 2018 due to health and sanitation concerns from the homeless encampments. The City Manager Emilio Gonzalez coordinated various city departments to target and clean up hotspots. His direction to clean these areas indicates that the work should be done in accordance with the Pottinger Agreement. (Pl. Ex. 601-65). Plaintiffs claim Mr. Gonzalez's directive was the beginning of a coordinated attempt to disperse the homeless from the downtown Miami area and resulted in a violation of constitutional rights. Evidence showed that the City's efforts were, at least in some part, due to complaints it had received from residents. The Plaintiffs rely on an email from Milton Vickers, Special Assistant to the City Manager, to make this point. The text of the email from Milton Vickers to Police Chief Colina reads:
Chief Colina, the Homeless Outreach staff have developed a plan to address homeless encampments and unattended contaminated items. It is imperative that this be coordinated with police in these locations and be patrolled in the future to ensure that homeless individuals do not return to these locations. The Homeless Outreach staff will be in full compliance with the Pottinger Agreement. Please see thread below.
(Pl. Exh. 601-65 at 1); (Tr. vol. 1, 82). The Deputy City Attorney Barnaby Min also wrote an email to other Assistant City Attorneys requesting that they follow-up with Milton Vickers to make sure the clean-ups were Pottinger compliant. (Pl. Exh. 601-4). The evidence showed that the City tried to relocate the individuals that were living in the clean-up areas to available shelters and that individuals returned to the spots after the clean-ups. (Tr. vol. 3, 13) (Testimony of Robert Rhodes) (stating he walked down the street with his belongings while the City power washed the street and he returned later that afternoon and slept in the same location that night.). That the City wanted to prevent the squalor and unsanitary conditions from re-manifesting after completing a clean-up is not a Pottinger violation. Rather, the clean-up efforts inure to the benefit of the homeless sleeping on the sidewalks. Overall, the evidence showed the City was working to clean the streets for the public welfare, while also meeting its Pottinger obligations.
On September 19, 2018, the Florida Department of Health notified the City of a specific area of concern located between 13th and 14th Streets and between NW 1st and 2nd Avenues in Overtown, a neighborhood in Miami north of the downtown area. The Department indicated that these areas were a significant public health concern and were being investigated. (D.E. 658-1). The clean-up had to be handled with the assistance of a specialized biohazard waste clean-up crew. Video evidence showed human feces, rats, and contaminated items in the area. Judge Leifman testified that he observed this site under the expressway overpass, in the Overtown section of Miami, which he described as a public health crisis. (Tr. vol. 4, 12). "It was like a horror movie. There were a lot of women using right in front of us. There were needles hanging out of different parts of their body. Many were collapsed lying on the street half naked. There were rats running around, there were needles everywhere. It was an opioid den ... There was a big concern that if we disturbed the site too quickly those illnesses would spread." Id. Judge Leifman testified that a young boy was walking through the area on his way to school and got his hands on fentanyl and died. Id. at 21. Despite the gravity of the situation, there was not one arrest. Id. at 15, 20. With regards to this site, Judge Leifman testified that 30 people were moved into treatment within a week and property was appropriately taken. He did not witness City officials seizing and destroying personal property. Id. at 20. He noted that from what he observed, however, that mattresses and whatever else was being used for sleep were not fit for human use. Id. Dr. Suarez was also involved in this clean-up of this Overtown site. (Tr. vol. 2, 110). Once it was clear that there was an HIV network, Dr. Suarez stated that City workers understood that the homeless individuals in this area could not be dispersed and that when the appropriate time came, they would work to get the people into shelters. Id. at 111.
The City protocol for executing the clean-ups includes posting notices at least seven days prior to the clean-up. (Tr. vol. 1, 235-36; 216-17); (Tr. vol. 2, 65). In the two weeks leading up to a clean-up, the City outreach workers would provide increased efforts to place the individuals living in certain areas of downtown in available shelters. Id. ; (Tr. vol. 6, 43). Camillus House ensures there are beds available when the outreach teams identify areas for clean-ups. (Tr. vol. 2, 64). The evidence showed there is daily engagement, which means that the outreach teams go out daily at different times to offer individuals placement opportunities as often as possible before the clean-up. (Tr. vol. 2, 65-66); (Tr. vol. 6, 43-45). Much like the City's general protocol for handling property, the outreach workers followed the same procedure during clean-ups. If the outreach workers identify anything important - such as identification cards or medications - they inventory and store the property. They discard contaminated property. (Tr. vol. 1, 248-49). The outreach workers leave a notice for property they take to storage or discard. (Tr. vol. 2, 65); (Def. Exh. 28). The Plaintiffs dispute that these notes were left and argue there was no guarantee that the owner of the property would receive these notes. The evidence showed a few examples where the handwritten notes were placed on a fence, such that they would not easily blow away. The handwritten notes provided an address where the City took the unattended personal property. Id.
Dr. Edward Suarez testified about the clean-ups stating that the team comes with "engagement tools: bottles of water, food, blankets. We do not go in there with the idea of... dispersing or kicking people out because that doesn't help. That just spreads the problem across the city, and we use engagement tools to build rapport. So the clean-up is really rapport building." (Tr. vol. 2, 103). Dr. Suarez explained that he shows up with the City employees to perform the clean-up and they ask the individuals to move. They offer them clean clothes. While the clean-up is going on, the individuals are offered detox at Banyan Behavioral or shelter beds. They work with Camillus and the Homeless Trust to ensure there are shelter beds available during a clean-up. Id. at 104-105. He also testified that they ask individuals to "move for a little bit until we clean everything, and they're more than welcome to come back to that spot." Id.
Plaintiffs presented the testimony of over thirty homeless individuals, including the class representative David Peery. Cumulatively, the homeless witnesses testified about what occurred during the clean-ups. The Plaintiffs presented testimony that the clean-ups in the Lot 16 area would start very early in the morning. That appears reasonable so as not to impede both vehicular and pedestrian traffic, which increases tremendously as thousands of employees come to work before 8:00 a.m. The homeless witnesses testified that officers and Green Shirts would sound loud noises, shine bright lights, and request the homeless, who are sleeping on the sidewalks, move so that they could pressure clean the sidewalks. (Tr. vol. 3, 12, 42, 76). Officer Jose Galvez, who works with the City's Neighborhood Enhancement Team, testified regarding the clean-ups. As a neighborhood resource officer, he goes to community meetings to address issues in the downtown Miami area. (Tr. vol. 1, 203). Officer Galvez testified that the City starts the clean-ups early in the morning before 8 a.m. Id. at 204. The Neighborhood Solid waste teams drive trucks to collect bulky items in the streets or on the curb. Id. at 207.
The manner that the City handled personal property during the clean-ups is vehemently contested in this proceeding. When property is found, the Neighborhood Solid Waste team will take contaminated unattended property, such as cans, food, or soiled sheets. Id. at 210. Officer Galvez said the team does not discard abandoned bookbags, which he says are left in the middle of everything. Id. In video footage, the Court observed the officers placing sheets and mattresses, and trash bags in a pile to be discarded. Again, such actions appear reasonable due to the evidence of contamination and the spread of diseases. However, unattended bicycles, which pose no such health risk, were left by the clean-up crews on the street. Officer Galvez testified about the need to pressure wash the street on 1st Street and Southwest 2nd Avenue, because of the amount of human feces, urine, and contaminated sheets in the area. Id. at 213. During the pressure washing, the homeless were asked to move, even if they were sleeping, and many went across the street to an empty parking lot. Id. at 214. They were again offered available shelter, which is corroborated by the testimony of Hilda Fernandez, who testified that Camillus House sets aside beds during clean-ups so that the affected individuals would have a place to go. Dr. Suarez also testified that affected individuals were offered an opportunity to go to a detox facility. (Tr. vol. 2, 64, 105). The Neighborhood Solid Waste team discarded whatever property the homeless no longer wanted to keep and would provide bags so they could carry their personal belongings. (Tr. vol. 1, 215-216). Officer Galvez corroborated that notice would be posted for a clean-up, although he did not do it himself. Id. at 216-17, 219; (Tr. vol. 3, 89) (homeless individual testifying that "there were signs up saying that they were going to be cleaning.").
Almost all the homeless witnesses testified that they saw City workers take property. A few testified that they personally witnessed either their own or other people's property being seized. Several witnesses testified generally that they had witnessed City of Miami employees throwing unattended property into trucks. (Tr. vol. 5, 18). For the most part, the testimony was that property was kicked around, thrown into piles, and then loaded into trucks when the homeless were not present, even if they had left their belongings neatly by the side of the fence or in a manner that did not obstruct the sidewalks. Id. ; (Tr. vol. 3, 90). Some said they asked the City for their property back, but that their requests were denied. Id. at 263-64. Plaintiffs testified to losing small items, such as identifications, medicine, eye glasses, cellular phones, personal notes from family members, and photographs. Id. at 52-57, 83, 90-91, 113, 263. Various homeless persons, who lost their property, testified that they had left items in either a backpack, bag, or suitcase and positioned them out of the way. Id. at 44, 193, 222. Some claim that police and City workers did not allow homeless people to retrieve and save the property of another from disposal during a clean-up operation. Id. at 76. For example, Eli Halter, a Marine veteran, testified, if you were not there, your property went into a pickup truck. Id. at 76; (Tr. vol. 4, 18). Robert Rhodes, however, testified that he was able to grab the belongings of his neighbor, who slept next to him on the street and left shortly before the clean-up. (Tr. vol. 3, 15). Obviously, there is no excuse for the taking of identification cards, medicine, eye glasses, cellular phones, or photos, as they, by themselves, do not present a health hazard. The dilemma is what to do with those items if they are commingled with backpacks, mattresses, sheets, food, etc. that clearly pose health and security concerns. The solution to this dilemma is that these individuals should never abandon their identifications, prescriptions, eye glasses, or phones that are so important. Rather, they should keep those items with them when they are on the move.
Class representative, David Peery, testified as to an incident involving another witness, Wilbur Cauley, which was partially recorded on a video. (Tr. vol. 5, 35-36); (Pl. Exh. 578-40-A). This incident occurred during a clean-up in the area of concern flagged by the Florida Department of Health in Overtown. Mr. Cauley's property was up against a fence, neatly bundled. Plaintiffs introduced a photograph of the property, which showed its position and contents, including a personal bag. (Pl. Ex. 578-41-A). While Mr. Cauley went to a nearby store and left his property, a City worker kicked his property and then moved it from its position against the fence into a pile with other property. (Tr. vol. 3, 88-89); (Pl. Ex. 578-40A). When Mr. Cauley returned to the scene and saw his property in the pile, the City worker did not allow Mr. Cauley to retrieve his property. Id. The Court agrees with the City's position that given the "horror movie" conditions of squalor as described by Judge Leifman at this location, it would have been eminently difficult to discern contaminated property from sanitary property in this area.
C. Orders to Move
Plaintiffs focus on orders to homeless individuals to "move on" by members of the City of Miami Police Department. The Court agrees with the City that orders to move during clean-up operations are essential to the public welfare and do not violate Pottinger . The evidence that the City roused the homeless from slumber in the early mornings did not indicate the City workers intended to harass the homeless. Rather than harassment, the intent was to clear the areas where the homeless spent the night before the arrival of vehicle and pedestrian traffic that is typical of most cities. The Court finds the testimony of Dr. Suarez, who is not a City employee, credible as to how he observed the City workers treat homeless individuals to achieve the goals of the large-scale cleaning of public areas. (Tr. vol. 2, 109) ("I've never seen them do any of these types of things they're being accused of. I've only seen them do it with dignity and respect....").
Putting aside the clean-up operations, Plaintiffs also provided evidence of instances where police ordered homeless individuals to move. The Court viewed a video taken by Java Brooks, whom police asked to move from the area by the old Macy's in downtown Miami. (Pl. Exh. 578-39). This incident is admittedly under investigation by the City of Miami Police Internal Affairs to determine if discipline is warranted. (Tr. vol. 1, 88). Rafael Villalonga's incident was another, where he was asked to move from his area on Lot 16. Villalonga testified that he complied with the request. There is no evidence that he was threatened with arrest. (Tr. vol. 5, 8-9). Guthrie Chibanguza testified that he was ordered by the police to leave a bus stop, and he went across the street by a FedEx office. (Tr. vol. 3, 96). Willie Richardson testified that police made him get up and move. (Tr. vol. 3, 101-102). The Consent Decree, however, specifically prohibited arrests, and did not specifically prevent officers from asking the homeless to temporarily relocate. Plaintiffs conceded at closing argument that the Consent Decree does not explicitly prohibit officers from ordering homeless individuals to move under certain circumstances. Plaintiffs, however, argue the orders to move violated their constitutional rights because the order was meant to disperse them from particular locations. There was no evidence that upon returning to a particular location after moving, or after a clean-up, that arrests were made.
D. Arrests of Chetwyn Archer and Tabitha Bass
At the heart of the Pottinger agreement is the criminalization of homelessness. To that end, the Consent Decree does not permit City police to arrest homeless individuals engaged in life-sustaining misdemeanors without offering them available shelter. Plaintiffs presented evidence of two arrests made simultaneously of Chetwyn Archer and Tabitha Bass, neither of whom testified in this evidentiary hearing. Police arrested the two individuals for the misdemeanor of obstructing the sidewalk. (Pl. Exh. 578-37, 578-38) (police identified a crack pipe at the scene, but the arrests did not appear to be drug-related). Under the 2014 modification to the Consent Decree, "obstructing passage on sidewalks" is excepted from the list of "life sustaining misdemeanor conduct" if the entire sidewalk is obstructed and the police has given the individual a prior warning about the situation. The body camera of Officer C. Gonzalez captured the arrests, however, the video did not show what transpired beforehand. The video begins as the arrest of Chetwyn Archer is being initiated. The video shows a mattress obstructing the sidewalk and no passageway for pedestrians.
The issues for the Court in these proceedings are whether the City of Miami has substantially complied with the purpose of the Consent Decree, such that federal oversight should end, or whether the Plaintiffs have met their burden to show the City should be found in civil contempt.
III. CONCLUSIONS OF LAW
District courts are empowered to modify or vacate consent decrees. Horne v. Flores , 557 U.S. 433, 447, 129 S.Ct. 2579, 174 L.Ed.2d 406 (2009). The City argues that absent systemic violations of 42 U.S.C. § 1983 and in light of policy and practice changes concerning the homeless, continued enforcement of the Pottinger Consent Decree is inequitable. Plaintiffs argue the City continues to violate the terms of the Decree.
A. Termination of the Consent Decree
A party seeking termination of a consent decree bears the burden to show "a significant change in either factual conditions or the law." Rufo v. Inmates of Suffolk County Jail , 502 U.S. 367, 384, 112 S.Ct. 748, 116 L.Ed.2d 867 (1992) (relying on Fed. R. Civ. P. 60(b)(5) ). The Supreme Court has acknowledged that consent decrees "are not intended to operate in perpetuity" and cannot condemn an agency to "judicial tutelage for the indefinite future." Bd. of Educ. of Oklahoma City Pub. Sch. v. Dowell , 498 U.S. 237, 249, 111 S.Ct. 630, 112 L.Ed.2d 715 (1991) (school desegregation).
To determine whether to terminate a consent decree, the Court must first look to the basic purpose of the decree. United States v. City of Miami , 2 F.3d 1497, 1504 (11th Cir. 1993) (citing Dowell ). Then, the Court must determine whether there is "substantial compliance." That means the Court must determine whether the City of Miami has complied in good faith with the core purpose of the decree, whether the purposes of the litigation have, to the extent practical, been achieved, and whether it is necessary or sensible, under current circumstances, for the Court to continue to exercise judicial oversight. Id. , 2 F.3d at 1508 (consent decree addressed under-representation of women and minorities in City's workforce).
The Eleventh Circuit provided additional guidance when it stated that district courts should terminate consent decrees when the system had "undergone radical changes and was on secure footing to continue its progress in the years to come, without court supervision," notwithstanding the fact that the system is "not yet perfect and may never be." R.C. v. Walley , 270 F. App'x 989, 992 (11th Cir. 2008). In so doing, this Court may rely on the state's "history of good faith and its present commitment to remedying remaining problems." Id. "Federal courts should not be in the business of running important functions of state government for decades at a time." Id. (quoting Reynolds v. McInnes , 338 F.3d 1201, 1219 (11th Cir. 2003) ). If this Court determines that the City has implemented a durable remedy, continued enforcement is improper. Horne , 557 U.S. at 450, 129 S.Ct. 2579 (stating that federal court decrees exceed appropriate limits if they are aimed at eliminating a condition that does not violate federal law).
Federalism concerns also exist in institutional reform litigation, such as this, where core areas of state responsibility are involved. Horne , 557 U.S. at 448, 129 S.Ct. 2579. The Supreme Court has acknowledged that "injunctions issued in such cases often remain in force for many years, and the passage of time frequently brings about changed circumstances ... that warrant reexamination of the original judgment." Id. at 447-48, 129 S.Ct. 2579. The Supreme Court has also noted that "the dynamics of institutional reform litigation differ from those of other cases," where, "public officials sometimes consent to, or refrain from vigorously opposing, decrees that go well beyond what is required by federal law." Id. "Injunctions of this sort bind state and local officials to the policy preferences of their predecessors and may thereby improperly deprive future officials of their designated legislative and executive powers." Id. at 449, 129 S.Ct. 2579.
It is well beyond dispute that there have been changed circumstances since the start of Pottinger . As detailed, supra , changes in police work, technology, and most importantly the implementation of a dedicated source of funding to the tune of $ 60 million dollars a year to aid the homeless in this community sufficiently establish that the conditions in place when Pottinger was filed 30 years ago, and even when the Consent Decree was entered in 1998, are no longer the case. The evidence showed that the continuum of care available to homeless individuals in Miami-Dade County is unparalleled in the United States. And, the numbers prove it. The amount of homeless individuals in Miami has plummeted 90% since Pottinger was entered. The number of arrests has also decreased as explained by Judge Leifman.
The dispute in this case centers on whether the City has substantially complied with the core purpose of the Pottinger Agreement, and the Plaintiffs claim that the City has not due to its actions in cleaning up homeless encampments starting in 2018. There is no question after hearing the testimony and viewing the video evidence that the City was compelled by the gravity of the unsanitary and unhygienic conditions to literally clean the streets for the betterment of the common welfare, including the homeless, the City's residents, and its businesses.
1. Substantial Compliance by the Police Department
There can be no doubt that the core purpose of Pottinger was to stop the criminalization of homelessness. The primary goal of this litigation and the Consent Decree was to prohibit the City of Miami Police Department from arresting homeless individuals for engaging in life-sustaining conduct misdemeanors. Because Pottinger prohibited arrest as a solution to get the homeless off the streets, the City and the community, at large, developed a myriad of programs that City Police could tap into when interacting with the homeless. The County's Homeless Trust, the recipient of $ 60 million in tax revenue a year, provides funding and Camillus House, the Chapman Partnership, and Lotus House provide shelter, medical care, and other services to the homeless in our community. The state court system, through Judge Leifman, developed diversion programs to avoid putting the mentally ill in jails. The whole system, described supra , and known as the continuum of care has provided an outstanding support network for the City police and other outreach workers. There can be no doubt that the primary purpose of the agreement, to stop the arrests of the homeless for being homeless, has been achieved. The Court finds that the continuum of care is exactly the type of durable remedy that requires this Court to cease its oversight of these primarily state functions. This is not to say that more cannot be done to achieve the goal of eradicating homelessness. The goal of the Consent Decree, however, was not to solve homelessness. Rather, the goal of the Consent Decree was to reform the manner that City Police treated the homeless. That goal has been achieved to the credit of all the individuals, particularly in this litigation.
Plaintiffs' evidence, in this case, of two arrests that purportedly violated Pottinger is insufficient to convince this Court that a durable remedy is not in place. The overwhelming evidence supports the finding that City police will not revert to arresting individuals, because they have an ample support network to turn to in handling difficult situations. (Testimony of Ronald L. Book) (Tr. vol. 2, 18) ("[T]he City clearly understands the need to treat the homeless population with respect and with dignity and with a desire to put a permanent end to it and that is our goal and I think that's our joint goal. I don't see that changing should Pottinger be discontinued.").
The evidence also showed that for those chronically homeless individuals, Pottinger , serves as a crutch enabling them to avoid entering the continuum of care. The video of Java Brooks was emblematic of this where she basically flaunted the City police, who ordered her to move, when she said she was aware of her rights. She showed little incentive to try to get off the streets. The testimony of Ronald Book, Chairman of the Homeless Trust, exemplified this point, when he was discussing the chronically homeless population. He said the chronically homeless are "shelter resistant ... if you make it easier for them to be on the streets, they're not coming in. It's why we don't support street feedings. It's why we don't support panhandling. I believe Pottinger at this point, my opinion, is that continuation doesn't make it easier for us, it makes it harder for us to finish what's out there because it's chronic." Id. at 17. Likewise, Pottinger has a chilling effect on an officer's ability to provide aid to the homeless. Dr. Suarez said it best, when he said "it's just sad to see that we're still stuck in the past and I see the officers are handcuffed by this. And I think that might be why subconsciously I brought up that young officer saying 'I'm going to be on YouTube by the end of the day.' I think that's Pottinger ...getting in her way of doing the right thing because she is afraid for herself, and I can't blame her for that." (Tr. vol.2, 116).
Not only has the City substantially complied with the main purpose of Pottinger regarding arrests, the City Police Department has implemented the required training as set forth in section IV of the Consent Decree, which nowadays includes scenario based training. (Def. Exh. 95, 95A). The City also complies with its departmental orders and police officers, who fail to comply, are subject to investigation by Internal Affairs and discipline. The Departmental Order is modeled after the protocol in Section VII of the settlement agreement.
The Departmental Order also contains specific directives as to how the police should handle property. While the Plaintiffs' evidence regarding the loss of property during clean-ups often reflected a police presence, there was no evidence that any City of Miami police destroyed or seized property and there are no internal affairs investigations on the record in this regard.
Finally, the police implemented a system to document interactions with the homeless known as Field Information Cards, which are used in cases where there is no arrest. Those forms are maintained by the police as required by Section VIII of the Settlement Agreement. Technology has certainly rendered this requirement obsolete.
The question that remains is whether the evidence of police ordering homeless individuals to move negates a finding a substantial compliance. Java Brooks and Rafael Villalonga testified that the City Police told them to move from where they were staying at night, without cause and without offering shelter. Likewise, Guthrie Chibanguza testified that he was asked to leave a bus stop, even though he had a bus pass, and he walked across the street. Willie Richardson testified that police also ordered him to move. Plaintiffs cite City of Chicago v. Morales , 527 U.S. 41, 119 S.Ct. 1849, 144 L.Ed.2d 67 (1999) to argue that the directive to move violates the homeless person's fundamental right to travel. In City of Chicago , the Supreme Court held that an ordinance violates the due process clause of the Fourteenth Amendment where it prohibited street gang members from loitering in a public place. To enforce the ordinance, the officers could order the gang members to disperse, and a failure to comply would be grounds for arrest. Id. , 527 U.S. at 50, 119 S.Ct. 1849. The Supreme Court found the ordinance unconstitutionally vague as to what conduct was proscribed. Id. at 53, 119 S.Ct. 1849. In so holding, the Supreme Court stated that "freedom to loiter for innocent purposes is part of the 'liberty' protected by the Due Process Clause of the Fourteenth Amendment." Id.
Plaintiffs, however, do not lose their constitutional rights by termination of the Consent Decree. It bears noting that no other municipality in Miami-Dade County's 34 is subject to the Pottinger Agreement except for the City of Miami. And, individuals in Miami-Dade County are not gaining greater constitutional protections when they cross from Miami Beach into Miami. The issue here is whether there has been substantial compliance with the tenets of the Consent Decree. The basic tenets of the Consent Decree prohibit "arrest or detention" of homeless individuals not engaged in any criminal activity. Neither took place here. The Court does not find the evidence of these four instances where individuals were ordered to move negates a finding of substantial compliance. Substantial compliance "impl[ies] something less than a strict and literal compliance with the contract provisions but fundamentally it means that the deviation is unintentional and so minor or trivial as not 'substantially to defeat the object which the parties intend to accomplish.' " Wells Benz, Inc. v. U.S. for Use of Mercury Elec. Co. , 333 F.2d 89, 92 (9th Cir. 1964) (citations omitted). The alleged actions of a few police officers do not constitute the type of deviation necessary to find a lack of substantial compliance, especially where there is no evidence of arrest and the circumstances under which the police issued the directives to move are unclear.
2. Substantial Compliance by other City Departments
This institutional reform litigation sought to revamp police interactions with the City's homeless population. Its effects, however, are seen throughout the City of Miami's government departments. There are three sentences in the Settlement Agreement that address property of homeless individuals and are written so as to encompass other City departments, in addition to the police. That provision, supra , requires City departments to respect the property of the homeless and to follow their own internal procedures for taking custody of property, It also prohibits city departments from destroying property except as allowed by law, or where the property is contaminated or poses a health risk. (Def. Exh. 1 at 12-13). Plaintiffs argue that the City's failure to have written procedures equates with noncompliance. The agreement, however, functioned for twenty years without incident and at no time did the Plaintiffs complain about a lack of written procedures. The testimony from the City outreach managers, Sergio Torres and David Rosemond, was consistent on the procedures the City workers employ to determine when and how to take property. The testimony also showed that the Department of Veterans Affairs and Homeless Services, now the Department of Human Services, trains the other relevant City departments, such as the Parks and Recreation Department, on the procedures. (Def. Ex. 39). With respect to section VII(F) of the Consent Decree, the Court finds the City in substantial compliance.
Plaintiffs presented testimony of many homeless individuals regarding the taking of property during the 2018 clean-up operations that took place in Downtown Miami and Overtown. There is no question that the City exercised a valid governmental power in addressing the sanitation and public health concerns created by the large encampments of homeless congregating and living in certain areas of the City. Plaintiffs argue the City's actions during those clean-ups negate a finding of substantial compliance.
The City presented ample evidence that notice was given in advance of the clean-ups and that shelter beds were secured to move people from those areas into the continuum of care. The City's evidence was corroborated by Dr. Suarez and Hilda Fernandez, who both testified regarding their joint efforts and work with the City in performing the clean-ups. The testimony of the homeless witnesses was that if they left their belongings unattended, they were gone when they returned. Some witnesses testified that they asked the City workers to recover their belongings, but were denied those requests. Other witnesses, such as Robert Rhodes, testified that he was able to grab his neighbor's belongings during a clean-up. One witness, Eli Halter, testified that if you were at the clean-up, you had the ability to move your stuff. (Tr. vol. 3, 76). This testimony is consistent with the information provided by Dr. Suarez, Sergio Torres, and David Rosemond regarding clean-up operations.
Plaintiffs emphasize that the incident involving Wilbur Cauley's property shows the City's noncompliance with the Consent Decree. The incident described by Wilbur Cauley and David Peery, and shown in a video (D.E. 578-40-A), took place in the area in Overtown underneath the I-395 overpass. Judge Leifman described that area saying "[i]t was dangerous to put anything on the ground. You had to step around the needles and the rats that were all over the place." (Tr. vol. 4, 34). The evidence showed the unsanitary conditions in that location, and it is not difficult to extrapolate the potential consequences to the public health, which would lead a City worker to discard more property than not, because he believed it to be contaminated. The squalor present prevented the clean-ups from being easy operations where the City workers could examine items one by one. Unfortunately, some medications, identifications, and personal notes were necessarily discarded in the process and the Court sympathizes with that loss, but the Court cannot ignore that those items were commingled with food, soiled materials, and garbage creating a public health crisis. The Court noted that the bicycles present were not discarded, presumably because a bicycle does not pose a health or safety risk. The testimony of Ronald L. Book exemplifies the contents of the evidence. He said: "Nobody is ever going to accuse me of being anything other than compassionate and understanding as it relates to the plight of those who live on our streets, but oftentimes you end up in situations where there's been hoarding and it's more garbage than it is property of value." (Tr. vol. 2, 21). Therefore, the Court concludes the City has substantially complied with the Consent Decree's property provisions, even though there were instances during the clean-ups where City workers mistakenly discarded valuable items due to the gravity of the unsanitary conditions.
B. Motion for Contempt
Injunctions, such as Consent Decrees, are enforced through the civil contempt power of the trial court. Reynolds v. G.M. Roberts , 207 F.3d 1288, 1298 (11th Cir. 2000). Plaintiffs bear the burden of proving by clear and convincing evidence that the City violated the Pottinger Consent Decree. See Riccard v. Prudential Ins. Co. , 307 F.3d 1277, 1296 (11th Cir. 2002) ("A finding of civil contempt - willful disregard of the authority of the court - must be supported by clear and convincing evidence."). To establish that a party acted in contempt, the party seeking the contempt ruling must show by clear and convincing evidence that: (1) the allegedly violated order was valid and lawful, (2) the order was clear and unambiguous, and (3) the alleged violator had the ability to comply with the order. Id. ; Wyatt v. Rogers , 92 F.3d 1074, 1078 n.8 (11th Cir. 1996). If the Plaintiffs do so, the burden shifts to the Defendant to show that it has complied with the injunction, or why it should not be adjudged in contempt. Reynolds , 207 F.3d at 1298.
Plaintiffs presented evidence of three different types of alleged violations to validate a finding of contempt. The first group is the directives from police to homeless individuals to move. The second group is evidence relating to the taking of personal property by City workers during clean-up operations in 2018. The last is the arrests of the two individuals for obstructing the sidewalk.
Although the Consent Decree contains a general requirement that City police not harass the homeless, the Consent Decree and Police Departmental Order 11 do not explicitly prohibit the police from ordering homeless persons to move from their locations or from sounding loud noises to wake people before a clean-up operation. It goes without saying that directives to move during a clean-up operation are essential to facilitate the pressure washing of the sidewalks. Pressure cleaning, while individuals are sleeping on the sidewalks, is obviously hazardous to their safety. And, not cleaning poses health hazards to them and others. During the clean-up operations, the evidence showed that homeless individuals often moved close by or were offered shelter. Dr. Suarez testified that the team engages any homeless individual at the clean-up location, helps them to discard any garbage that has accumulated around them, offers them clean clothes and blankets. (Tr. vol. 2, 104). The team then offers shelter placement and, if the offer for shelter is rejected, the team members ask the homeless person to relocate temporarily. Id. The City has an interest in preserving the public welfare, hygiene and sanitation. It makes sense and the evidence confirmed that the City's intent was to move these homeless individuals, living in squalor and in encampments, into the continuum of care. The Court does not view the City's actions, in this regard, to be a concerted plan to violate the homeless civil rights. And, there is no clear and convincing evidence that requiring the homeless to move I during clean-up operations was a violation of the Decree, especially because the evidence showed that people returned to the locations after the clean-ups and no one was arrested.
As noted, supra , the Plaintiffs argue there are four instances, outside of a clean-up operation, where the police were harassing homeless individuals and ordering them to move, Java Brooks, Rafael Villalonga, Guthrie Chibanguza, and Willie Richardson. Other than the general prohibition on harassment contained in Consent Decree, there is nothing in the Consent Decree or in the Police Departmental Order 11 specifically precluding a police officer from instructing someone to move. Moreover, the testimony from the witnesses and the video evidence did not show the underlying circumstances under which the officers issued the directives. To find civil contempt, the Court must find by clear and convincing evidence that the Pottinger Agreement clearly and unambiguously said that officers could not ask homeless individuals to move or the evidence must show that the police officers were harassing these individuals. The evidence does not establish a violation of the Decree's general statement that the police not harass the homeless. Therefore, the standard for civil contempt is not met.
The Plaintiffs also seek to hold the City in contempt due to their handling of homeless individuals' personal property. Again, the Pottinger Agreement allows officers and City workers to take unattended property in accordance with their internal procedures and discard property that is contaminated. The Consent Decree also contains a general requirement that City police and outreach workers treat the property of the homeless with respect.
The majority of Plaintiffs' witnesses complained about the handling of property during clean-up operations. Witnesses testified that workers moved in quickly and that they had little time to collect their belongings. Homeless individuals testified that they left items in backpacks, bags, and positioned out of the way and that their property was kicked around, thrown into piles, and then loaded into trucks to be disposed. Plaintiffs' witnesses also testified that City workers routinely did not allow homeless persons to retrieve and save the property of another homeless person from disposal. But, it would be unreasonable for City workers to decide their course of action based on a non-owner's statement regarding abandoned property. The evidence also showed that City workers complied with their procedures, gave notice ahead of time, provided outreach to affected individuals, gave homeless persons bags to put away their belongings, and left notes at the scene on the fences to let people know the location of property. Some of Plaintiffs' own witnesses testified that they were able to keep the property on them, and retrieve property belonging to others. The evidence also showed the gravity of the circumstances at these clean-up spots, which has already been detailed in this order. Even assuming that, at times, the City workers could have handled the homeless person's belongings more delicately, the Court does not find that a violation of the Consent Decree occurred by clear and convincing evidence. The Consent Decree allows the City workers to take property in a manner consistent with their procedures. The evidence showed that, at least for the most part, that was done, and to discard contaminated property. Deciphering what is and is not contaminated inside a bag is difficult and going through a bag that possesses contaminated materials to fish out identifications and medications is not a requirement of the Consent Decree. The evidence did not show an officer or a worker taking away identifications and medications, rather it showed that those items were unfortunately lost as part of a process of cleaning areas in desperate need of sanitation. The Court does not hold the City in contempt for its handling of the personal belongings.
Finally, the Court, for reasons already detailed in this Order, does not find the two arrests are sufficient to meet the standard that the City violated the decree and should be held in contempt. There is no evidence as to what preceded the arrests, and as such, the standard for contempt is not met.
Heroes for the Homeless
Although the Plaintiffs have opposed the termination of this agreement, in a very real sense, they are the victors. Their lawsuit, and the work of their excellent and capable counsel, under the guidance of the Americans Civil Liberties Union and the Florida Justice Institute, engendered a revolution in this community as to the treatment and care of persons experiencing homelessness. Twenty years ago, the undersigned could not have predicted the myriad of services made possible by the efforts of the Homeless Trust and Mr. Ronald L. Book. The Court could not have envisioned the dedication of people, like Dr. Pedro Joe Greer and Dr. Edward Suarez, who have taken medicine to the streets of Miami to help people and gain their trust to improve their care. The lifetime of work by Camillus CEO Hilda Fernandez is commendable as she has worked in a variety of roles to assist the homeless and better their lives in a truly compassionate way. The work of Constance Collins at the Lotus House has also contributed to aiding homeless women and children and helped them find solutions to homelessness. It goes without saying that this community owes a debt of gratitude to Judge Steve Leifman, who has implemented sustainable programs to help the mentally ill, which will continue to improve their circumstances. Simply put, Judge Atkins would be proud of the results. Accordingly, it is
ADJUDGED that the Court terminates the Consent Decree and denies the motion to hold the City of Miami in contempt.
DONE AND ORDERED in Chambers at Miami, Florida, this 15th of February 2019.
References to the transcripts of the six-day evidentiary hearing are as follows:
Tr. vol. 1 refers to September 24, 2018 transcript
Tr. vol. 2 refers to September 25, 2018 transcript
Tr. vol. 3 refers to September 26, 2018 transcript
Tr. vol. 4 refers to October 24, 2018 transcript
Tr. vol. 5 refers to October 25, 2018 transcript
Tr. vol. 6 refers to November 1, 2018 transcript
The original Plaintiffs, Michael Pottinger, Peter Carter, and Berry Young, are deceased or their whereabouts are unknown. On December 23, 2013, the Court granted Plaintiffs' Motion to Add Class Representatives and named Carole Patman and David Peery as class representatives.
See https://www.census.gov/quickfacts/fact/table/miamicityflorida,miamidadecountyflorida/PST045217.
It is estimated that the population of the County's unincorporated area exceeds one million residents, approximately 36% of the total population. See https://www8.miamidade.gov/global/disclaimer/about-miami-dade-county.page.
The Consent Decree is at D.E. 382. The 2014 Addendum is at D.E. 525-1.
After Closing Arguments, the City filed a written Administrative Policy Addressing Treatment of Homeless Property. Because this policy was not introduced at the evidentiary hearing, the Court does not rely on it in ruling on the motions.
The Court notes that Java Brooks testified that she had recently changed her name and her prior name was Java Houston. In the pleadings, the parties use both names interchangeably. (Tr. vol. 3, 151).
The food and beverage tax is not charged in the cities of Miami Beach, Bal Harbour, and Surfside, which charge tourism-related taxes. The City of Miami Beach provides funds to buy beds in the continuum of care and coordinates with the Homeless Trust in that regard. When the City of Miami Beach purchases beds, oftentimes the beds are in the City of Miami. (Tr. vol. 2, 13-15).
The Florida Mental Health Act, commonly known as the Baker Act, allows for the involuntary institutionalization and examination of an individual. Judges, law enforcement, physicians, and mental health professionals can initiate the process. § 394.463, Fla. Stat.
Dr. Suarez testified that Green Shirt Willie Rachel helps him locate these individuals. (Tr. vol. 2 at 102, 107).
The City filed a motion for judicial notice of the Florida Department of Health letter. The Plaintiff did not oppose the request as to this particular document and the motion is granted as to this document.
Clean-ups are also referred to as encampment closures on the record. (Tr. vol. 2, 64).
There are a few areas where the clean-ups occurred: 1) the downtown area known as Lot 16, a municipal parking lot east of the Miami River under the I-95 underpass, bounded by the Miami River on the east, S.W. 1st Street on the north, and S.W. 3rd Street on the south; 2) Overtown area under the I-395 overpass on N.W. 11th and 13th streets between N.W. 1st and 2nd Avenues; 3) the downtown area by the old Macy's on Flagler street; 4) N.W. 6th street by the new Brightline station and one block from this courthouse; 4) the downtown area by Government Center across the street from this courthouse; and 5) Peacock Park in Coconut Grove.
Plaintiffs have not previously filed a motion to enforce the agreement or to hold the City in contempt. Plaintiffs' counsel likened the situation to a probation violation that occurs after sometime, but is still punishable.
In fact, the class certified by Judge Atkins includes "homeless persons ... who have been, expect to be, or will be arrested, harassed, or otherwise interfered with by members of the City of Miami Police Department for engaging in the ordinary and essential activities of daily living in public due to the lack of other adequate alternatives." Pottinger v. City of Miami , 720 F.Supp. 955, 959 (S.D. Fla. 1989). The Consent Decree focuses almost entirely on the implementation of training, policies and procedures to ensure that the police department engaged with the homeless population in a humane manner and within the bounds of the constitution. (Def. Exh. 1).
Indeed, Chief Colina testified that the City was investigating the instance with Java Brooks to determine whether the City would discipline the police officer for his actions.
| CASELAW |
Category:American cybercriminals
For inclusion in this category, a person must have been duly and lawfully convicted of a crime involving computers (such as "cracking") by one or more United States federal courts or State courts, or else the person must have committed distinct, infamous, verifiable criminal acts but have gone unconvicted for reasons other than lack of proof, such as death before trial or flight from the United States. Note also that, while many such criminals are hackers, not all need be, nor are all hackers criminals, with or without a conviction. | WIKI |
Jamali Kamali Mosque and Tomb
Jamali Kamali Mosque and Tomb, located in the Archaeological Village complex in Mehrauli, Delhi, India, comprise two monuments adjacent to each other; one is the mosque and the other is the tomb of Jamali and Kamali. Their names are tagged together as "Jamali Kamali" for the mosque as well as the tomb since they are buried adjacent to each other. The mosque and the tomb were constructed in 1528-1529, and Jamali was buried in the tomb after his death in 1535.
Location
Mehrauli urban village where the monument is located is approachable from all parts of Delhi by well laid out roads and transport system. The Indira Gandhi International Airport is 18 km away and the New Delhi Railway Station and Nizamuddin Railway Station are respectively 17 km, and 16 km away. The nearest metro station is Qutab Minar.
The practice of Friday prayers is barred in such monuments classified by the body under the category of "non-living heritage structures".
History
"Jamali" was the alias given to Shaikh Fazlu'llah, also known as Shaikh Jamali Kamboh or Jalal Khan, a renowned Sufi saint who lived during Lodi Dynasty and the Mughal Dynasty, a period from the rule of Sikander Lodi to that of Babur and Humayun.
The name "Jamali" is Urdu, though originates from "Jamal" which means "beauty". Jamali was a popular poet who traveled widely around Asia and the Middle East. He became court poet during Lodi Dynasty rule and continued to enjoy the patronage of the Mughal rulers, Babur and his son Humayun. His poetry mirrored Persian mysticism of the times. His two popular works are The Sun and Moon and The Spiritual Journey of the Mystics. It is said that his tomb was completed during Humayun's rule.
Kamali was an unknown person who was Jamali's disciple and his lover, according to the oral stories and traditions. It is noted that even though they were both males, as signified by a symbolic pen box on each of their graves, their graves are placed in a manner that implies that they were lovers.
Mosque
The Jamali Kamali mosque, positioned in an enclosed garden area, built first during the years 1528-29, has a southern entry. It is built in red sandstone with marble embellishments. It is claimed to be a forerunner in the design of Mughal mosque architecture in India. The prayer hall, fronted by a large courtyard, has five arches with the central arch only having a dome. The size of arches increases towards the central arch, which is the largest of the five arches embellished with beautiful ornamentation. The spandrels of the arch are decorated with medallions and ornamentation. Fluted pilasters exquisitely decorate the central arch. The prayer wall on the west has niches with mihrab. The niches and walls are decorated with a few Koranic inscriptions. A porch around the mosque provides access to the two storied mosque and the four corners are adorned by octagonal towers. The rear end of the mosque has been provided with oriel windows, apart from a small window on the central arch.
Tomb
The tomb of Jamali-Kamali is a decorated 7.6 m square structure with a flat roof, located adjacent to the mosque on its northern side. Inside the chamber, the flat ceiling is plastered and ornately decorated. It is painted in red and blue with some Koranic inscriptions, and the walls are adorned with inlaid coloured tiles inscribed with Jamali's poems. The decorations in the tomb have been described as giving the impression of "stepping into a jewel box". In the Jamali Kamali Mosque and Tomb the tomb chamber has two marble graves: one of Jamali, the saint poet and the other of Kamali. The reason for the Kamali name could probably be that it rhymes well with Jamali.
Conservation
The monument is well maintained and provides a very serene atmosphere. Conservation of the monuments has been undertaken by the Archaeological Survey of India (ASI). It is one of the 172 monuments under the jurisdiction of the Delhi Archaeological circle, of ASI, identified for restoration. An amount of Rs. 1.5 million (US$30,000) has been proposed for this purpose. | WIKI |
What is CBD oil?
CBD is on the checklist of a number of compounds called cannabinoids located in the marijuana plant. Numerous study studies have been done to figure out different restorative uses of this oil.
Primarily, CBD oil consists of focused kind of CBD. Nonetheless, it is very important to remember that the concentrations and their usages differ. So, you might intend to speak with an expert before using CBD for your problem.
Is CBD marijuana?
In marijuana, the best-known substance is delta-9 tetrahydrocannabinol aka THC, according to the majority of reports. And also THC is the most energetic part of marijuana. Actually, cannabis has both CBD and also THC in it. As well as the results of both these substances vary.
When smoked or made use of in food preparation, THC conveys a “high” impact. Actually, THC often tends to break down in heat or when it goes into the body. On the other hand, CBD is not psychoactive, which implies it has no effect on your mindset when consumed.
However CBD can produce adjustments in your body. As a matter of fact, according to some research studies, it might have numerous clinical benefits as well.
Where does it come from?
CBD is gotten from the cannabis plant. Frequently, marijuana plant is referred to as marijuana or hemp based upon the level of THC. It is necessary to note that legal hemp plants mustn’t include more than 0.3% THC, according to Ranch Costs.
Marijuana farmers have actually reproduced their hemp plants to generate even more THC as well as several various other substances. Nonetheless, these farmers don’t change the plant whatsoever. These plants are made use of to generate CBD oil.
Exactly how does it function?
All types of cannabinoids attach to some specific receptors in your body to develop a special result. And the very same puts on CBD as well. In fact, your body creates some sorts of cannabinoids instantly. Additionally, it has two effective receptors for CBD: CB 2 receptors and also CB1 receptors.
As far as CB1 receptors are concerned, they are discovered throughout your body. Nevertheless, many are found in your mind too. The ones found in the mind assist with memories, appetite, assuming, state of mind, feelings, discomfort, motion and also many various other functions. And also these are the receptors THC connects to. On the other hand, CB2 receptors are rather usual in your immunity system, as well as they have an influence on discomfort and also swelling.
In the past, scientists believed that CBD2 receptors are the receptors that CBD connects to, today they understand that CBD will not affix to any of the receptors. Actually, it appears like it assists your body get better use its own cannabinoids.
know more about How is delta-8 flower made? here. | ESSENTIALAI-STEM |
GPS Air
GPS Air, formerly Global Plasma Solutions, is an indoor air quality company based in the United States that provides air conditioning and other air quality technologies for commercial and industrial buildings with a focus on using "needlepoint bi-polar cold plasma". The company produced room air quality products designed for schools, among other indoor locations, and after the outbreak of the COVID-19 pandemic thousands of schools purchased their products for preventing viral outbreaks.
Investigations by Boeing, air quality organizations such as the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), and various academic researchers into the efficacy of the air purifiers GPS Air sold raised concerns about both their effectiveness and the potential negative health effects that could occur from the high levels of negative ions produced by the devices. In response, the company filed lawsuits against a member of ASHRAE and the academic publisher Elsevier.
History
Founded in 2008 in Savannah, Georgia, GPS Air was created as an air purification sales company focused on "needlepoint bi-polar cold plasma" as the primary function of its products. In October 2018, the company was purchased by the investment firm Falfurrias Capital Partners and had its headquarters moved to Charlotte, North Carolina.
Lawsuits
A class action lawsuit was filed in Maryland in May 2021 against GPS Air regarding their products using "needlepoint bipolar ionization" to inactivate microorganisms in the air. The suit claimed that the technology used by the devices was false advertising and did not function as stated, citing an investigation done by Kaiser Health News on the same devices that were sold to over 2,000 schools in the United States. Some counties, such as Shelby County, Tennessee, and cities, such as Charlotte, North Carolina, used millions of dollars from covid relief funds to install the devices in schools and other locations. The original testing done by GPS Air on the devices was scaled down due to the lack of a lab with the right equipment, resulting in a testing scenario involving an area the "size of a shoebox". This region was "blasted with 27,000 ions per cubic centimeter" and was stated by the company to be successful at reducing 99% of pathogens in the space, though it was later acknowledged by the company founder that the amount of ions the machines are able to routinely put out is 13 times lower when dealing with a normal sized room.
While a study originally conducted by the aerospace corporation Boeing in September 2020 on the devices did indicate its effectiveness, a subsequent study done by Boeing for a longer period of time found the devices to have "no observable reduction in viability" of E. coli in the testing area. GPS Air responded by stating that the study had been conducted on pathogens on surfaces and not in the air, with the latter being what the ionization devices were made to counteract. An additional study done at the University of Arizona found that the devices did indeed kill microorganisms when they were producing ions at "62,000 negative ions per cubic centimeter", but that this was an order of magnitude higher than the ion production rates of the devices under normal usage. Furthermore, other studies have found that ionization levels over 60,000 produced negative health impacts on humans.
After information about the lawsuit became public, the Newark, California, school district began removing the devices from area schools alongside concerns about the air quality being made worse by the technology.
Response to scientific criticism
An open letter was filed by a dozen scientists and engineers against the ionization technology and warning schools against installing such devices. This warning was amplified by the Asthma & Allergy Foundation of America and the Environmental Protection Agency due to the potential negative health impacts. The Centers for Disease Control were also prompted to advise the United States Department of Education to send out notices advising schools to require higher levels of scientific evidence of efficacy of such devices before purchasing them, with the Department of Education updating regulations and guidelines in June 2021.
One of the signatories of the open letter was Marwa Zaatari, a member of ASHRAE, who compiled a list of public information on school district spending in relation to the ionization products. In response to this and her statements in the media that independent research hasn't corroborated the claims of GPS Air, the company filed a lawsuit against Zaatari in April 2021 for $180 million. Additionally, GPS Air filed a lawsuit earlier in March 2021 against Francis J. Offermann, President of the consulting firm Indoor Environmental Engineering, for the publication of an article in the firm's newsletter critical of the company. A third lawsuit was filed against the academic publishing organization Elsevier for their publication of studies, including one by Colorado State University professor Delphine Farmer, on GPS Air's devices showing their lack of efficacy.
Products
Among others, one of the room mounted air purifiers made by GPS Air includes the GPS-FC24-AC that can be wall mounted in multiple small cassettes or to existing HVAC equipment. An additional device sold by the company is a "plasma generator" aimed at reducing the amount of microorganisms, including mold and allergens, in the air to prevent pets from becoming sick.
Awards
The Indoor Air Quality (IAQ) Gold award was given by The ACHR News magazine in their 2016 Dealer Design Awards to the company's GPS-iClean device for room air purification. | WIKI |
That’s because women tend to store more temporary fat in their bellies. “The fat stores are gained and lost,” says Lawrence Cheskin, MD, chair of the department of nutrition and food studies at George Mason University and director of the Johns Hopkins Weight Management Center. “By and large, belly fat comes off easier in the sense that it comes off first. That’s where a good amount of the fat is lost from.”
The scale is not necessarily your friend. You may want to lose fat – but the scale measures muscles, bone and internal organs as well. Gaining muscle is a good thing. Thus weight or BMI are imperfect ways to measure your progress. This is especially true if you’re just coming off a long period of semi-starvation (calorie counting), as your body may want to restore lost muscles etc. Starting weight training and gaining muscle can also hide your fat loss.
Also some research shows that the human body is primed to consume most of its calories during daylight hours. But the lifestyle is problematic for many: Because family meals and dinners with friends often are scheduled for after sunset, "people who try to stop eating after 7pm can’t do it every day for the rest of their lives," says Dr. Seltzer, who supports an alternative strategy: Eating a hearty meal at your regular dinnertime.
Fathi, Y., Faghih, S., Zibaeenezhad, M. J., & Tabatabaei, S. H. (2016, February). Kefir drink leads to a similar weight loss, compared with milk, in a dairy-rich non-energy-restricted diet in overweight or obese premenopausal women: A randomized controlled trial. European Journal of Nutrition, 55(1), 295–304. Retrieved from https://link.springer.com/article/10.1007/s00394-015-0846-9
This could be because the body increases insulin secretion in anticipation that sugar will appear in the blood. When this doesn’t happen, blood sugar drops and hunger increases. Whether this chain of events regularly takes place is somewhat unclear. Something odd happened when I tested Pepsi Max though, and there are well-designed studies showing increased insulin when using artificial sweeteners.
Once your muscle glycogen stores are full, they’ll remain this way for days, as long as no other strength training is performed (because muscle glycogen is burned only during high- intensity exercise). Carbing up on Wednesday also gives you time to make adjustments. If you feel you look flat and small on Thursday or Friday, increase your carbs a bit. Bloated and soft? Cut them back a bit. Make adjustments by 25–50 grams at a time.
The 30-Day Shred workout was designed by celebrity fitness trainer Jillian Michaels. This weight loss DVD comprises three 20-minute circuit training workouts that are based on Jillian's 3-2-1 interval method. Each circuit alternates among three minutes of strength training, two minutes of cardio and one minute of core work to effectively burn fat and lose up to 20 pounds within 30 days. In order to lose weight with Jillian's 30-Day Shred series, you'll need to incorporate a sensible diet that allows you to consume the appropriate amount of calories and healthy foods in order to reduce body fat.
The scale is not necessarily your friend. You may want to lose fat – but the scale measures muscles, bone and internal organs as well. Gaining muscle is a good thing. Thus weight or BMI are imperfect ways to measure your progress. This is especially true if you’re just coming off a long period of semi-starvation (calorie counting), as your body may want to restore lost muscles etc. Starting weight training and gaining muscle can also hide your fat loss.
"With all the different tips out there, it can be tricky to understand exactly which exercises work the best. HIIT is great for fat burning and will get your heart rate up, but I’d also recommend including strength (resistance) exercises too. Try lifting weights, using resistance bands or using the weight machines at the gym as these will increase your metabolism to help with weight loss, and increase your muscle strength. It’s important to mix-up your whole-body workouts so you don’t get bored."
Frequent and sustained cardio training is one of the best ways to burn fat and boost metabolism. One of the best cardio exercises to perform is running, according to the American College of Sports Medicine, as it burns a high number of calories per hour and improves cardiovascular health. ACSM recommends training five days a week, with a minimum of 60 minutes per session.
Ultimately, you need to pick a healthy eating plan you can stick to, Stewart says. The benefit of a low-carb approach is that it simply involves learning better food choices—no calorie-counting is necessary. In general, a low-carb way of eating shifts your intake away from problem foods—those high in carbs and sugar and without much fiber, like bread, bagels and sodas—and toward high-fiber or high-protein choices, like vegetables, beans and healthy meats.
"Only doing abdominal-focused workouts, like crunches, won’t help you banish the bulge. Belly fat is simply where your body stores energy, so you need to take a whole-body approach to tackle it. HIIT training (high intensity interval training) is a great way to burn fat and get your heart rate up. Squats, burpees and treadmill sprints are all examples to try."
× | ESSENTIALAI-STEM |
User:Basharramadan/sandbox
Doodles Eraser man is a non-fungible token (NFT) collection on the polygon blockchain. The project was launched in May 2022 generated by the Egyptian designer and the software developer Bashar.
The experimental project was inspired by Doodles
blockchain project was an inspiration for the ERC-721 standard for NFTs and the modern art movement, which has since become a part of the cryptocurrency and decentralized finance ecosystems on multiple blockchains.
The parent company of Doodles Eraser man is a soft art.[ The project launched with a live pre-sale on may 19, 2022. Owners of a Doodles Eraser NFT are granted access to a rare nfts, and intellectual property rights for the image.
The eraser gives you access to buy the most successful and powerful projects in the NFTS world
Concept
There are 101 unique Doodles Eraser man all of which are made digitall scarce through the use of blockchain technology. Each one was algorithmically generated through computer code and thus no two characters are exactly alike, with some traits being rarer than others. They were originally released for free and could be claimed by anyone with an Ethereum wallet. The only costs to claim a Doodles Eraser man during their initial release were polygon (ETH) "gas fees"were negligible due to little use of both the polygon blockchain and little knowledge of the project as well.
Story
Why is the sum of nfts 101 and not 1000 or 10,000 nfts? This is because When you see number 101, it means that you should follow your emotions and listen to your intuition. Your angels are reminding you that your spiritual journey has just begun, so you should follow your dreams. Most important is to have faith in your angels because they will give you strength and support | WIKI |
#
# Graph_Presentation_Type manages what type of graphs and what kind of presentation
# is used. XY graph, Xy chart, BAR graph, BAR chart.
#
# contains: Chart::Graph::Xmgrace::Graph
# Chart::Graph::Xmgrace::Chart
#
# things to do as of 4/2000:
# 1) implement Polar graph object
# 2) implement Smith chart object
# 3) implement Fixed chart object
#
## This software product is developed by Esmond Lee and David Moore,
## and copyrighted(C) 1998 by the University of California, San Diego
## (UCSD), with all rights reserved. UCSD administers the CAIDA grant,
## NCR-9711092, under which part of this code was developed.
##
## There is no charge for this software. You can redistribute it and/or
## modify it under the terms of the GNU General Public License, v. 2 dated
## June 1991 which is incorporated by reference herein. This software is
## distributed WITHOUT ANY WARRANTY, IMPLIED OR EXPRESS, OF MERCHANTABILITY
## OR FITNESS FOR A PARTICULAR PURPOSE or that the use of it will not
## infringe on any third party's intellectual property rights.
##
## You should have received a copy of the GNU GPL along with this program.
##
##
## IN NO EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY
## PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
## DAMAGES, INCLUDING LOST PROFITS, ARISING OUT OF THE USE OF THIS
## SOFTWARE, EVEN IF THE UNIVERSITY OF CALIFORNIA HAS BEEN ADVISED OF
## THE POSSIBILITY OF SUCH DAMAGE.
##
## THE SOFTWARE PROVIDED HEREIN IS ON AN "AS IS" BASIS, AND THE
## UNIVERSITY OF CALIFORNIA HAS NO OBLIGATION TO PROVIDE MAINTENANCE,
## SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. THE UNIVERSITY
## OF CALIFORNIA MAKES NO REPRESENTATIONS AND EXTENDS NO WARRANTIES
## OF ANY KIND, EITHER IMPLIED OR EXPRESS, INCLUDING, BUT NOT LIMITED
## TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
## PARTICULAR PURPOSE, OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE
## ANY PATENT, TRADEMARK OR OTHER RIGHTS.
##
##
## Contact: graph-dev@caida.org
##
##
$VERSION = 3.2;
use Chart::Graph::Xmgrace::Dataset_Options;
use Chart::Graph::Xmgrace::Base_Dataset_Option;
package Chart::Graph::Xmgrace::Graph_Presentation_Type;
use Carp;
sub new {
my $that = shift;
my $color = shift;
$color += 1;
my $class = ref($that) || $that;
my $self = {
"XY graph" => new Chart::Graph::Xmgrace::Graph("XY", $color),
"XY chart" => new Chart::Graph::Xmgrace::Chart("XY", $color),
"BAR graph" => new Chart::Graph::Xmgrace::Graph("BAR",$color),
"BAR chart" => new Chart::Graph::Xmgrace::Chart("BAR",$color),
"Polar graph" => undef,
"Smith chart" => undef,
"Fixed" => undef,
};
bless $self, $class;
return $self;
}
sub XY_graph {
my $self = shift;
return $self->{"XY graph"};
}
sub XY_chart {
my $self = shift;
return $self->{"XY chart"};
}
sub AUTOLOAD {
my $self = shift;
my $type = ref($self) || croak "$self is not an object";
my $name = $AUTOLOAD;
$name =~ s/.*://; #strip fully-qualified portion
unless (($name eq "DESTROY") or (exists $self->{$name})) {
croak "Can't access '$name' field in object of class $type";
}
if (@_) {
return $self->{$name} = shift;
} else {
return $self->{$name};
}
}
package Chart::Graph::Xmgrace::Graph;
use Carp;
@ISA = qw(Chart::Graph::Xmgrace::Base_Dataset_Option);
sub _init {
my $self = shift;
my ($type, $color) = @_;
$self->{type} = $type;
$self->{print_order} = ["hidden","type","symbol","line","baseline",
"dropline","fill","avalue","errorbar","comment",
"legend"],
$self->{length} = 4;
$self->{options} = {
"hidden" => "false",
"type" => "$type",
"symbol" => new Chart::Graph::Xmgrace::Symbol_Options($color),
"line" => new Chart::Graph::Xmgrace::Line_Options($color),
"baseline" => new Chart::Graph::Xmgrace::Baseline_Options($color),
"dropline" => new Chart::Graph::Xmgrace::Dropline_Options($color),
"fill" => new Chart::Graph::Xmgrace::Fill_Options($color),
"avalue" => new Chart::Graph::Xmgrace::Avalue_Options($color),
"errorbar" => new Chart::Graph::Xmgrace::Errorbar_Options($color),
"comment" => "",
"legend" => "",
};
if ($type eq "XY") {
return 1;
} elsif ($type eq "BAR") {
$self->symbol->fill_pattern("1");
$self->symbol->color("1");
$self->line->type("0");
return 1;
} else {
carp "Warning: Invalid graph type\n";
return 0;
}
}
package Chart::Graph::Xmgrace::Chart;
use Carp;
@ISA = qw(Chart::Graph::Xmgrace::Base_Dataset_Option);
sub _init {
my $self = shift;
my ($type, $color) = @_;
$self->{type} = $type;
$self->{print_order} = ["hidden","type","symbol","line","baseline",
"dropline","fill","avalue","errorbar","comment",
"legend"],
$self->{length} = 4;
$self->{options} = {
"hidden" => "false",
"type" => "$type",
"symbol" => new Chart::Graph::Xmgrace::Symbol_Options($color),
"line" => new Chart::Graph::Xmgrace::Line_Options($color),
"baseline" => new Chart::Graph::Xmgrace::Baseline_Options($color),
"dropline" => new Chart::Graph::Xmgrace::Dropline_Options($color),
"fill" => new Chart::Graph::Xmgrace::Fill_Options($color),
"avalue" => new Chart::Graph::Xmgrace::Avalue_Options($color),
"errorbar" => new Chart::Graph::Xmgrace::Errorbar_Options($color),
"comment" => "",
"legend" => "",
};
if ($type eq "XY") {
return 1;
} elsif ($type eq "BAR") {
$self->symbol->fill_pattern("1");
$self->symbol->pattern("0");
$self->line->type("0");
return 1;
} else {
carp "Warning: Invalid graph type\n";
return 0;
}
}
1; | ESSENTIALAI-STEM |
Daniel Okulitch
Daniel Okulitch (born January 30, 1976) is a Canadian bass-baritone. He first came to attention on Broadway as Schaunard in Baz Luhrmann's production of La bohème in 2002/03 – a role he repeated when the production traveled to Los Angeles the following year, for which he received the Ovation Award for Best Ensemble Performance from the Los Angeles Stage Alliance. He has since begun an international career with opera companies and orchestras throughout Europe and North America, and is admired for both his singing and powerful stage presence. He is sought after for many contemporary operas and world premieres, as well as the roles of Mozart, including Figaro and Don Giovanni.
Education and early career
Okulitch was born in Ottawa, Ontario, and was raised in Calgary, Alberta, where he had his operatic debut at the age of 12 while still a boy soprano in the role of Amahl in Amahl and the Night Visitors with Calgary Opera, followed by one of the 3 spirits in The Magic Flute. He continued to perform throughout his teens, and at age 19 transferred to the Oberlin Conservatory of Music to study with acclaimed pedagogue Richard Miller, where he gained a Bachelor of Music and a Masters in Opera Theater. He then continued his education at the Cincinnati College Conservatory of Music, under the tutelage of William McGraw. During these years he apprenticed with the Des Moines Metro Opera, the Cincinnati Opera, and in the San Francisco Opera Merola Program.
In 2002, Okulitch was cast as Schaunard in the Baz Luhrmann production of Puccini's La bohème, which premiered at the Curran Theatre in San Francisco, and performed on Broadway for 228 performances.
Career
Okulitch is an interpreter of Mozart roles, most notably Don Giovanni, Almaviva and Figaro, which he has performed at New York City Opera, Teatro Colón, Los Angeles Opera, Santa Fe Opera, Palm Beach Opera, Opera Warsaw, Vancouver Opera, Dallas Opera, Portland Opera, Michigan Opera Theater, Hawaii Opera, Manitoba Opera, Lyric Opera Kansas City, and the Milwaukee Symphony. Okulitch has also created leading roles in contemporary opera, most notably the roles of Ennis del Mar in Charles Wuorinen's Brokeback Mountain at Teatro Real in Madrid, Seth Brundle in Howard Shore's The Fly at the Théâtre du Châtelet in Paris and at Los Angeles Opera, Willy Wonka in Peter Ash's The Golden Ticket at Opera Theatre of St. Louis and Atlanta Opera, and Herman Broder in Ben Moore's Enemies, A Love Story at Palm Beach Opera.
Okulitch's career first garnered national attention in the role of Schaunard in the original cast of Baz Luhrmann's Tony Award-winning Broadway production of La bohème. Other career highlights include his Teatro alla Scala debut as Theseus in Britten's A Midsummer Night's Dream, his Washington National Opera debut in the role of Swallow in Peter Grimes which he also performed at La Scala, and the role of Creonte in Medee with Opera Genève, the role of LBJ in the world premiere of JFK with Fort Worth Opera, and General Groves in Dr. Atomic with the Santa Fe Opera.
In March 2011, he released his first solo album, The New American Art Song, featuring world premiere songs by Ricky Ian Gordon, Jake Heggie, Lowell Liebermann and Glen Roven who all accompany Okulitch on piano. Simultaneous with the record release, the songs were performed in a concert at Carnegie Hall, again with the composers accompanying (except Heggie).
In 2016, Okulitch premiered the role of Lyndon B. Johnson in David T. Little and Royce Vavrek's JFK at Fort Worth Opera. He reprised this performance for Opéra de Montréal in January 2018.
Awards
Okulitch is the recipient of numerous awards and prizes, including first prize from the George London Foundation in 2004, a grant from the Sullivan Foundation 2004, 2nd prize from the Licia Albanese/Puccini Foundation Competition, first prize from the Joyce Dutka Arts Foundation in 2004, a grant from the Singers Development Fund in 2003, 5th prize in the Palm Beach Opera Vocal Competition in 2002, and was a regional finalist in the Metropolitan Opera Auditions in 2000 and 2001. He is a 2006 and 2008 recipient of a Canada Council Grant for Professional Musicians and received the Andrew White Memorial Award and a Corbett Award while a student at the Cincinnati Conservatory of Music.
Recordings
* Baz Luhrmann's La bohème (Highlights from the 2002 original Broadway cast) DreamWorks 2002
* Le roi Arthus (Ernest Chausson) Telarc 2005
* Frau Margot Thomas Pasatieri Albany Records 2007
* The New American Art Song, GPR Records (2011) | WIKI |
User:Uttamheart
Hey i m uttam vasant ingale from vill benikre tel kagal dist kolhapur my contact info<PHONE_NUMBER> | WIKI |
Third Point takes stake in Buffett-backed Snowflake
Oct 5 (Reuters) - Billionaire investor and hedge fund owner Daniel Loeb told clients that one of his portfolios nursed small losses last month but was helped by positions in Snowflake Inc SNOW.N and Pinterest Inc PINS.N, two fast-growing technology companies.
The Third Point Offshore Fund is now up 3.6% for the year after slipping 0.7% in September following a gain of 8.4% in August.
Loeb recently overhauled the portfolio to include more tech names, a move that helped wipe away the year's losses.
(Reporting by Svea Herbst-Bayliss and Ayanti Bera in Bengaluru; Editing by Maju Samuel)
((Ayanti.Bera@thomsonreuters.com; 646 223 8780 - 3401;))
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Alternative public offering
An alternative public offering (APO) is the combination of a reverse merger with a simultaneous private investment of public equity (PIPE). It allows companies an alternative to an initial public offering (IPO) as a means of going public while raising capital.
Overview
There are two parts that comprise an APO: the reverse merger and the PIPE. In the reverse merger, the private company becomes public by merging with or being acquired by a public “shell” company. The shell company is a public company that has no assets or liabilities. When the private company and public shell merge, the combined entity thereafter trades under the previously private company's name rather than the shell company's name as it did before.
What differentiates an APO from a reverse merger is the simultaneous PIPE raise. A PIPE is when a publicly traded company sells its stock to investors in a privately negotiated transaction. The stock is normally sold at a discount to current market value and investors are normally acquiring unregistered “restricted” stock. The typical PIPE investor is an institutional investor such as a hedge fund or mutual fund. PIPEs are usually completed by investment banks who act as “Placement Agent” in the transaction.
Process
An APO is a quick transaction compared to an initial public offering (IPO). At the closing of an APO, the public shell and private company sign merger documents to complete the reverse merger; file a 8K with the Securities and Exchange Commission (SEC), which is the required public disclosure of transaction; file a registration statement with the SEC to register the PIPE shares; release PIPE funds from escrow; and issue a press release announcing the completion of the transaction. The company's stock now begins trading on the OTCBB, reflecting the new valuation.
A company can close an APO in as little as 30 – 45 days. After the close of an APO, the company is funded and has exactly the same SEC disclosure requirements as an IPO. Approximately 3 to 4 months after the completion of the APO, the company's registration statement should clear comments and “go effective” with the SEC. When this is accomplished the company can then submit its application to obtain a listing on NASDAQ, AMEX, or NYSE. Listing approval for the exchanges typically takes about one month. At this point analyst research coverage begins and the company focuses on IR efforts, non-deal roadshow, conferences etc.
At the conclusion of a successful APO transaction, a company has received equity funding and has a base of institutional investors. The company has the sponsorship of an investment bank and is exchange listed with analyst coverage. There is now a true market value for the company and the company is positioned to raise additional capital in PIPE transactions.
Benefits
Companies want to become public through an APO for several reasons. The public shell company already has shareholders, so after the APO is complete, the formerly private company typically already meets the shareholder requirements for NASDAQ and AMEX; 400 and 300 respectively. A company that goes public through an IPO must sell its stock to a large number of shareholders in order to meet these requirements necessitating a broad marketing and roadshow process. Unlike an IPO, there is no public disclosure required until the transaction closes. Customers, suppliers, employees, and press are unaware until closing. Therefore, a private company can pursue going public through an APO and understand what kind of investor response and valuation they will receive without having to make the “leap of faith” requirement of an IPO. With an IPO a company must publicly announce its intentions and file with the SEC at the beginning of the process. It is only after clearing comments with the SEC and after going on the roadshow that a company learns what kind of investor response and valuation it will receive.
The APO model owes much of its success to the involvement of the Investment Bank as the gatekeeper that standalone reverse mergers never had. In a traditional reverse merger, anyone could simply buy a shell and go public whether or not they had sufficient financial performance to justify being a public company. With an APO, the investment bank would not raise capital for a company that it did not believe would be successful in the marketplace. This is why the APO has such a high success rate. The investment bank also brings research, trading and liquidity to the company's stock after the transaction closes. Investment banks find the APO process appealing because they can receive the same fees and breakage for raising the capital as they do in an IPO in a much condensed period of time and to a significantly smaller number of investors.
PIPE investors are attracted to the APO because they get to buy stock at a negotiated discount to the projected public market value of a company. In addition, because the company completed a reverse merger and is now public, there is a guaranteed exit defined upfront if they wish to get out. After a company completes an APO, potential investors will be inclined to invest in additional PIPE raises for the company because the public company has had SEC disclosures from day one including audited financial statements, Sarbanes-Oxley, 10Qs, 8Ks, etc. Many tier 1 hedge funds are active investors in APO and many investment banks support the process. There are many tier 2 and tier 3 banks that are active in APO business.
Disadvantages
Investors expect a discount on stock since they are buying restricted securities and thus this is a more expensive cost of capital to the company. The aftermarket of an APO typically takes 6–12 months to develop and thus there is minimal stock liquidity immediately at closing. | WIKI |
What is Container In Cloud Computing
Marketing Team Cloud Security Expert - CloudCodes Software
• June 18th, 2021
A Container in cloud computing is an approach to operating system virtualization. By this, the user can work with a program and its dependencies using resource procedures that are isolated. The code of the application can be bundled with configurations and dependencies in a systematic manner.
Container in cloud computing is used to build blocks, which help in producing operational efficiency, version control, developer productivity, and environmental consistency. Because of this, the user is assured of reliability, consistency, and quickness regardless of the distributed platform. The infrastructure is enhanced since it provides more control over the granular activities on resources. The container usage in online services benefits storage with cloud computing information security, availability, and elasticity.
Advantages of a Container in Cloud Computing
These are the following things that have to be provided by CASB solution:
• The Consistency in Cloud Storage: The container enhances portability. It eliminates the organizational and technical frictions so that the program moves through the entire process cycle. It encapsulates the core files of an application and software server and dependencies like a building block. This can be distributed on any resource. The manual configuration of each server is thus completely avoided enabling the users to announce a new feature.
• Application Version Control: Through containers in cloud computing, the users can look at the current version of the application code as well as their dependencies. A manifest file is managed by the Docker containers. The users can easily hold and track the editions of the container, look for differences between the container editions, and roll back to earlier versions if needed.
• Efficiency in the Operational Activities: The users can achieve more resources through the container in cloud computing. By this, the users can also work at a time on several applications. The required memory, disk space, and CPU consumed by the container have to be specified. Since each of the containers is a process of the operating system that works on an application and associated programs, the containers have a fast boot time. The users can quickly enter and exit the application and also measure it up and down. The applications are separated from each other through the isolation procedure. This concept has no shared incompatibilities or dependencies.
• Productivity of the Developers: The containers deduct the dependencies and conflicts between the cross-service and thus the productivity increases. The component of the program is segregated into different entities that run a separate micro-service. There is no worry about the libraries and dependencies that are being synced for each service because the containers are isolated from each other. Each service can be upgraded independently as they are not in touch with each other.
Security Concerns
Security of containers is a challenging task for the service provider. Under a specified operating system, the Docker containers work like a privileged user. The administration permissions gain the underlying operating system when the key components of the container are compromised. The user namespaces are held in the Docker by which the containers work for a particular user. Also, there are the picture security concerns that can be downloaded from the Docker. An additional feature, the Docker Content Trust verifies the image publisher information to address this problem.
The presence of vulnerability is deeply checked by picture scanning. To assure that the security policy is enforced, it is always better than the user makes the image on his own. For matters regarding secretive productivity applications, cloud containers are to be used in the same manner as that of other deployments. This concept increases the security factor. The container has vulnerabilities from within. Issues like no permission to the server OS and DOS disabling MySQL container crop up that can lock the website working.
Hence, wherever containers are hosted, it is necessary to keep an eye on the server’s security. The cloud security challenges can be efficiently handled by deploying effective Cloud Access Security Broker solutions.
Takeaway
The concept relating to the container in cloud computing is beneficial to enterprises. Then there is the virtual machine, which is low cost and offers internal as well as cloud portability. Some big organizations comprise both virtual machines and cloud containers. The enterprises have to evaluate the pros and cons of each of these and deploy the aptest one.
Share | ESSENTIALAI-STEM |
Robert A. KLOR, Plaintiff, v. Terrance W. HANNON, Terry D. Pierce & Ronald Keller, Defendants.
No. 65-1302.
United States District Court C. D. California.
Dec. 19, 1967.
Edwin M. Rosendahl, Beverly Hills, Cal., for plaintiff Klor.
Roger Arnebergh, City Atty. of Los Angeles, John A. Daly, Asst. City Atty., and Nowland C. Hong, Deputy City Atty., Los Angeles, Cal., for defendants Hannon, Pierce and Keller.
DECISION FINDINGS OF FACT and CONCLUSIONS OF LAW
HAUK, District Judge.
The complaint herein adequately states a claim under Section 1 of the Civil Rights Act of 1871, 42 U.S.C. § 1983, 2because it alleges facts which show that the defendants: (1) while aeting under color of state statute, ordinance, regulation, custom or usage, (2) subjected, or caused to be subjected, a person within the jurisdiction of the United States to the deprivation of rights, privileges or immunities secured by the Constitution and laws of the United States. Cohen v. Norris, 300 F.2d 24, 30 (9th Cir. 1962); Marshall v. Sawyer, 301 F.2d 639, 643 (9th Cir. 1962); Lucero v. Donovan, 354 F.2d 16, 19-20 (9th Cir. 1965); Lucero v. Donovan, 258 F.Supp. 979, 980 (C.D.Cal.1966).
Moreover, the complaint sufficiently sets forth a claim under Section 2 of the Civil Rights Act of 1871, 42 U. S. C. § 1985(3) because it alleges the necessary two additional elements: (1) that the defendants conspired or acted jointly or in concert; and (2) that overt acts were done pursuant to the conspiracy which damaged plaintiff. Hoffman v. Halden, 268 F.2d 280, 294 (9th Cir. 1959); Cohen v. Norris, 300 F.2d 24, 27-28 (9th Cir. 1962). It follows that this Court has jurisdiction by virtue of 28 U.S.C. § 1331(a), the Federal question jurisdiction; ****and under 1343 (1) 1343(3), 1343(4), which give District Courts original jurisdiction of civil actions to recover damages and secure redress by way of equitable and other relief for deprivation of Constitutional and civil rights, whether resulting from conspiracy or direct acts. Cohen v. Norris, 300 F.2d 24, 26 (9th Cir. 1962); Monroe v. Pape, 365 U.S. 167, 169, 81 S.Ct. 473, 474, 5 L.Ed.2d 492, 495 (1961); Lucero v. Donovan, 258 F.Supp. 979, 980 (C.D.Cal.1966).
Plaintiff alleges that the defendant police officers, under color of State law, conspired to interfere and deprive Plaintiff of his civil rights and in furtherance of the conspiracy while possessed with a warrant for his arrest unlawfully searched for and seized personal property of the Plaintiff, assaulted his person and thereafter intentionally and maliciously damaged and mutilated said personal property, all of which acts were in violation of the United States Constitution and particularly the First and Fourth Amendments.
The trial concluding on September 22nd, 1967 the Court now makes its Decision, Findings of Fact and Conclusions of Law in favor of the police officer Defendants Hannon, Pierce and Keller.
On September 1st, 1964, two women went to the Hollywood Police Station to complain that while employed to pose for nude potographs for the Plaintiff herein, they believed contrary to the terms of their employment with him that he had taken photographs of their private parts and that such photographs might be considered lewd and obscene. A report of these complaints was made by Defendant Hannon, a sergeant of police assigned to the vice detail, and he assigned Defendants Pierce, Keller and Officer Wade, not a defendant in this action, to investigate the complaints.
In order to locate and discover the whereabouts and other information on the Plaintiff, the records of the Police Department were consulted. An address was found along with an outstanding traffic warrant and with this information an attempt was made to contact the Plaintiff. On the afternoon of September 4th, 1964, Plaintiff was found at his apartment where Defendants Pierce, Keller and Officer Wade identified themselves and were asked into the premises by the Plaintiff. He was informed of the warrant and it was explained to him. Thereafter, Plaintiff was told that a complaint was made regarding his making lewd or obscene motion pictures.
Plaintiff denied the accusations of the complaint by the women and voluntarily escorted the three policemen about his entire apartment, opening cupboards and drawers containing a large volume of slides of naked women and motion pictures he produced and sold in his business. Following this, Defendant Hannon was called to the premises to view several slides which Defendant Keller felt may have been obscene.
Defendant Hannon was also voluntarily given a tour by Plaintiff of his premises and observed two boxes bearing the first names, “Candy” and “Lorrie”, of the two complaining women and at the conclusion of the inspection led by Plaintiff, Defendant Hannon asked if he could see some films and obtained four boxes of films, which included those bearing the names of the two women, from a cupboard in the kitchen above the range without any protest or objection by Plaintiff.
The Plaintiff agreed to show the films and proceeded to run them on a projector he had in the apartment. After viewing the films “Candy” and “Lorrie” Defendant Hannon asked if he could take the two films and have the City Attorney of Los Angeles view them. Plaintiff agreed and told the Defendant Hannon that he should inform the City Attorney that these films as yet were unedited. The films were viewed by the City Attorney’s Office which was informed of the Plaintiff’s claim that the films were unedited. That Office being of the opinion that the motion pictures were obscene, a warrant for Plaintiff’s arrest was obtained from the Municipal Court for violation of Penal Code Section 311.2.
Possessed with a copy of the warrant on September 10th, 1964, Defendant Pierce and Officer Wade, without Defendant Keller, sought to serve the warrant on Plaintiff. They waited at his post office box for a time and went to his apartment several times. Finally, after knocking on the Plaintiff’s door he was observed coming from a nearby elevator.
Plaintiff approached the two policemen who were in plain clothes and greeted them. Defendant Pierce informed Plaintiff they wished to speak to him and Plaintiff stated they could not go into his apartment because the maid was there. Defendant Pierce then told Plaintiff the maid had just left, whereupon Plaintiff walked past the two police officers and opened the apartment door, went in and stated, “come on in”, or words to that effect.
Once inside the apartment the police officers informed Plaintiff they had a warrant for his arrest and showed him a copy of the warrant. He replied that he had expected the officers and had removed all the most incriminating films and that he was not going to allow the officers to take anything from his apartment.
Due to the Plaintiff’s state of agitation and hostility a uniformed policeman was called to the apartment since it had been the experience of the policemen that this had a calming effect upon people. Additionally, Defendant Hannon was called to the scene. He then had a civilian photographer photograph the interior of Plaintiff’s apartment to establish the fact that the motion pictures of “Candy” and “Lorrie” had been photographed there. Various props used in those films such as pillows and a tapestry were seized and taken, along with numerous motion picture films, slides of nude women, photographs of the two complaining women in clothed and unclothed conditions, ledger books, check books, certificates of business, a lease of the premises, a motion picture camera, a photostatic copy of a post office box application, envelopes containing mail order advertising and mail orders from customers.
During the seizure of the ledger books Plaintiff, seated on a swivel chair, attempted to prevent the officers from taking these items and in doing so Plaintiff fell over backwards with Defendant Pierce on top of him. Plaintiff then agreed not to interfere any further so that he would not be handcuffed.
At Plaintiff’s request, he was permitted to copy down all the orders that had been mailed to him, and all the police personnel left in small groups. Further, as Plaintiff also asked, he was not handcuffed and was accompanied by just two plain clothes officers to the unmarked police ear in order to be inconspicuous and avoid embarrassment with his neighbors. On the way to the police station Plaintiff was allowed to attempt to cash a check at a market by his apartment to make bail.
Plaintiff was later tried for violation of California Penal Code, Section 311.2 in Municipal Court and convicted. Defendants Hannon, Pierce and Keller testified at that trial. Officer Wade who was present on both occasions at Plaintiff’s apartment did not testify and was not made a defendant in this action. Thereafter, upon Writ of Habeas Corpus, Plaintiff was discharged by the California Supreme Court from the custody imposed by the judgment of the Municipal Court. In re Klor, 64 Cal.2d 816, 822-823, 51 Cal.Rptr. 903, 907, 415 P.2d 791, 795 (1966).
In the Municipal Court prosecution and trial certain motion pictures were returned to the Plaintiff by Order of that Court and delivered to him by Defendant Hannon. Plaintiff claims that these films had been damaged and mutilated, but the short answer to this is that, after inspecting the films, Plaintiff signed a document which specifies his admission to the contrary:
“All above items returned to the Defendant in substantially the same condition as they were when taken into custody by the police. Items were returned to Defendant on October 21st, 1964, at 8:30 p. m.
ROBERT A. KLOR”
This Court is confronted with deciding whether the three police officers, Han-non, Pierce and Keller violated the Plaintiff’s Civil Rights under the provisions of 42 United States Code, Sections 1983 and 1985. In particular, the questions here raised are whether the seizures of various films from Plaintiff’s stock in trade, photographic equipment and business records were unreasonable and whether a conspiracy existed between the Defendants to deprive Plaintiff of his civil rights.
In determining the propriety of the acts of Defendants the Court’s evaluation must always start with the rule of reason tempered with the necessity of good faith:
“So long as the defendant’s conduct stemmed from his reasonable belief as to the requirements of the law and was not unreasonable in any other way, he cannot be held responsible — under the standard of liability set forth in Monroe v. Pape [365 U.S. 167, 81 S.Ct. 473, 5 L.Ed.2d 492.] — for the deprivation of plaintiff’s rights. ‘No one has a constitutional right to be free from a law officer’s honest misunderstanding of the law or facts in making an arrest’ Agnew v. City of Compton, 239 F.2d 226 at 231 (9th Cir. 1956), cert. den. 353 U.S. 959, 77 S.Ct. 868, 1 L.Ed.2d 910 (1957). Thus, the action of a police officer cannot be tortious when the officer proceeds on the basis of his reasonable, good faith understanding of the law and does not act with unreasonable violence or subject the citizen to unusual indignity.” Bowens v. Knazze, 237 F.Supp. 826, 829 (N.D.IIl.,1965).
There is no question but that the Defendant Pierce on September 10th, 1964 was in possession of a valid warrant for the arrest of the Plaintiff for violation of four counts of California Penal Code, Section 311.2. However, the inquiry, is directed at both the propriety of searching and seizing property following the arrest and the reasonable relation of the items taken to the crime charged.
It is well recognized that a search incident to a lawful arrest is proper. People v. Scott, 170 Cal.App.2d 446, 453, 339 P.2d 162, 166 (1959); Leahy v. United States, 272 F.2d 487, 490 (9th Cir. 1959).
Further and obviously, a search is proper when made incidental to an arrest pursuant to a warrant which does not provide for a search. People v. Pressley, 242 Cal.App.2d 555, 560, 51 Cal.Rptr. 563, 567 (1966); United States v. Pisano, 193 F.2d 361, 363, (7th Cir. 1951).
Here, Defendant Pierce and his partner, Officer Wade, were possessed with a warrant for Plaintiff’s arrest. They had sought to find him at his post office box and several times at his apartment, the only locations known to them where he could be found. Then, contact was made at the latter location while they were standing outside his door as he came from the adjacent elevator. Plaintiff, after a conversation regarding the avoidance of the maid cleaning his apartment and being informed that she had left, opened the door of his apartment and led the policemen inside. Once inside, the Plaintiff was served with the warrant. Thereafter, the seizure of numerous items of Plaintiff’s personal property took place. The power to search at this time clearly existed.
A search, as incident to a lawful arrest, may be made of premises on which the arrest was made and which are under the suspect’s control at the time of the arrest. People v. Chapman, 207 Cal.App.2d 557, 571, 24 Cal.Rptr. 568, 576 (1962).
Under California Law the “premises under a suspect’s control” is broadly interpreted and is not limited to the exact location where the suspect is arrested. Arrest occurred 20 or 25 feet from suspect’s house, search of house allowed, People v. Aquilar, 191 Cal.App.2d 887, 890, 13 Cal.Rptr. 121, 123 (1961). Search of a garage located beneath suspect’s apartment following his arrest in the apartment, held incident to arrest, Trowbridge v. Superior Court, 144 Cal.App.2d 13, 18, 300 P.2d 222, 226 (1956) and People v. Smith, 166 Cal.App.2d 302, 306, 333 P.2d 208, 210 (1958). Search in washroom at end of hallway on which defendant’s room faced, held reasonably incident to arrest which was accomplished in rented room, People v. Wasco, 153 Cal.App.2d 485, 487, 314 P.2d 558, 560 (1957). Search of an area 20 feet from house in which defendant arrested, held permissible, People v. Montes, 146 Cal.App.2d 530, 534, 303 P.2d 1064, 1068 (1956).
Further, a search incident and pursuant to an arrest under or by warrant is reasonable and a search warrant is not required. United States v. Rabinowitz, 339 U.S. 56, 65, 70 S.Ct. 430, 435, 94 L.Ed. 653, 660 (1950); Collins v. Klinger, 332 F.2d 54, 56-57 (9th Cir. 1964).
The decisive question in determining whether a search made after an arrest, without a search warrant, is reasonable, is not whether a search warrant could have been procured, but whether the search made was reasonable. United States v. Pisano, 193 F.2d 361, 363 (7th Cir. 1951).
At the time of this incident, September, 1964, it was the rule in California that any articles which have been used by the suspect to commit the crime for which he was arrested, or which constitute evidence of the crime, may be seized and used as evidence. People v. Chapman, 207 Cal.App.2d 557, 571, 24 Cal.Rptr. 568, 576 (1962).
Subsequently, the California Supreme Court, in further consideration of this proposition, has said the rule that “mere evidence” of a crime as opposed to contraband or instruments or fruits of the crime cannot be seized is not a constitutional standard and has no application in California. People v. Thayer, 63 Cal.2d 635, 642, 47 Cal.Rptr. 780, 784, 408 P.2d 108, 112 (1965), cert. den. 384 U.S. 908, 86 S.Ct. 1342, 16 L.Ed.2d 361 (1966).
The items seized by the Defendants Hannon, Pierce and Officer Wade consisted of one reel from each of the numerous stacks of different motion picture films Plaintiff sold in his business, several larger reels of film, a motion picture camera, photographic lights, pillows, a tapestry, boxes of color slides of nude women, photographs of the two women who made the report to the police depicting them in clothed and unclothed states, a magazine containing the Plaintiff’s advertisement of his products, advertising brochures and stationery, a business Certificate, a lease of the premises, post office box application and number, cheek and ledger books.
In light of the broad scope of evidence which can be seized under the law of California that existed at the time of the incident giving rise to this action, this Court is of the opinion that the seizure of all the property was reasonable when considered in respect to the crime for which the arrest was made.
California Penal Code, Section 311.2 provides:
“ § 311.2 [Sale or Distribution, etc., of obscene matter: Penalty.] Every person who knowingly: sends or causes to be sent, or brings or causes to be brought, into this State for sale or distribution, or in this State prepares, publishes, prints, exhibits, distributes, or offers to distribute, or has in his possession with intent to distribute or to exhibit or offer to distribute, any obscene matter is guilty of a misdemeanor. [Added by Stats.1961, Ch. 2147 § 5.]”
The taking of such things as the motion picture camera, photographic lights, pillows, tapestry, photographs of the two complaining women and lease of the premises were all related to establishing the elements of knowingly preparing, publishing and printing obscene matter as these were the means by which the Defendants reasonably hoped to prove that Plaintiff did indeed photograph the films “Candy” and “Lorrie”.
Additionally, the confiscation of the numerous films, slides of nude women, magazine containing Plaintiff’s advertisement, advertising brochures and stationery, business Certificate, lease of the premises, post office box application and number, and cheeks and ledger books were at least “mere evidence” of the crime, that is, such items strongly tended to show that Plaintiff distributes, offers to distribute or has in his possession with intent to distribute the motion pictures for which he was prosecuted.
The seizure of the check book which had entries dating several years before the incident was also proper on another ground. Defendant Hannon observed that out of 42 sales there were 27 refunds. Such a curious state of business would lead the ordinary man to suspect there may be a purposeful scheme to evade taxes. Where officers are rightfully searching a room for evidence connecting the suspect with one crime, there is no reason for ignoring evidence showing another crime discovered during the course of the search. People v. Littlejohn, 148 Cal.App.2d 786, 792, 307 P.2d 425, 428 (1957).
Once evidence is lawfully obtained, the State may use it in the enforcement of any law which may have been violated. People v. Lujan, 141 Cal.App.2d 143, 147, 296 P.2d 93 (1956).
This Court is further persuaded as to the propriety of the search by the recent Supreme Court decision in Warden v. Hayden, 387 U.S. 294, 87 S.Ct. 1642, 18 L.Ed.2d 782 (1967). In that case, the United States Supreme Court also rejected the distinction between seizure of items of evidential value only and seizure of instrumentalities, fruits of the crime or contraband. The Court further stated, “Nothing in the language of the Fourth Amendment supports the distinction * * *. Privacy is disturbed no more by a search directed to a purely evidentiary object than it is by a search directed to an instrumentality, fruit, or contraband.” Id., at p. 301. The various items seized were within the ambit of “mere evidence”' and there was no violation of Plaintiff’s constitutional rights.
Although the Municipal Court wherein Plaintiff was prosecuted was of the opinion that some of the items seized were done so illegally, this Court is not bound by such decision even if it were of the same mind. It is not the law that each and every time a search is determined to be unlawful, the person searched has a cause of action under the Civil Rights Act. Bowens v. Knazze, 237 F.Supp. 826, 827 (N.D.Ill.1965).
The good faith and reasonableness of the Defendant Police Officers which further buttress this Court’s opinion that their searches, seizures and other actions were lawful and well within the guidelines of the case law, both Federal and California, is shown by the concern they displayed towards the Plaintiff at the time of Plaintiff’s arrest by warrant on September 10, 1964. He was permitted to make copies of all his accumulated mail orders so there would be no interruption of his business. His request that the policemen assembled in his apartment leave in small groups to avoid drawing attention was also honored. Additionally, Plaintiff was permitted to walk from his apartment without handcuffs and accompanied only by two officers in civilian clothes so there would be no embarrassment if seen by his neighbors. Lastly, Plaintiff was permitted to stop at a nearby store to cash a check in order to obtain funds for bail on the way to the police station.
All in all, the Court must find and conclude that, actually and contrary to the allegations of the complaint, there was no conspiracy to deprive Plaintiff of his civil rights; his arrest and the searches and seizures conducted in his apartment were clearly constitutional and legal; no property or rights of Plaintiff were injured or damaged in any way; the Defendant Police Officers at all times acted reasonably and in good faith; and judgment should be rendered for Defendants and against Plaintiff.
Therefore, the cause having been submitted for decision by the Court, trial by jury having been waived by the parties, and the Court having duly considered the pleadings and all the evidence both oral and documentary, as well as the arguments of counsel made at the conclusion of the case, and the Court being fully advised in the premises, the following formal Findings of Fact and Conclusions of Law in favor of the Defendants and against Plaintiff are made and entered herein:
FINDINGS OF FACT
I
Plaintiff is, and at all times pertinent to this action, has been a citizen of the United States and the action is one for damages under 42 United States Code, Sections 1983 and 1985.
II
From September 4th, 1964 to September 10th, 1964, and at all other pertinent times, the said Defendants were police officers employed by the City of Los Angeles and were acting within the scope and course of their authority as police officers and acting under color of law.
III
On September 1, 1964 two women named “Candy” and “Lorrie” went to the Hollywood Police Station and complained that while they were employed to pose for motion pictures in the nude for the Plaintiff, Robert Klor, they believed he was taking pictures of their private parts and such pictures might be considered lewd and obscene. This report was taken by Defendant Hannon who was a Sergeant of Police assigned to the vice detail.
IV
Defendant Hannon later assigned defendant police officers Pierce and Keller, and Officer Wade, to investigate the complaint and report of the women, Candy and Lorrie. Pursuant to their assignment said police officers found an outstanding traffic warrant for a Robert Klor.
V
On the afternoon of September 4th, 1964 Plaintiff was located at his apartment by the said police officers. The Defendants Pierce and Keller, and Officer Wade, identified themselves as police officers and were asked to enter the apartment by the Plaintiff, Robert Klor. Service of the warrant was then effected upon the Plaintiff who identified himself as Robert Klor.
VI
Plaintiff was informed of the fact a complaint had been made against him for having made lewd and obscene motion pictures. He denied such accusation.
VII
Defendants Pierce and Keller and Officer Wade asked the Plaintiff Robert Klor if they could look around and Plaintiff agreed. Plaintiff then voluntarily consented to a search and lead the police officers about the apartment, opening the doors to cupboards, drawers, shelves and the like in the kitchen, bathroom and bedroom.
VIII
The three police officers did not open any of the doors to the various storage areas but saw a large volume of photographic slides of naked women and mo* tion pictures all of which Plaintiff stated were a part of his business stock in the mail order sale of “girlie” slides and motion pictures.
IX
Defendant Keller later took several slides from the open cupboard in the kitchen of Plaintiff’s apartment, viewed them and believing they were possibly lewd or obscene, called defendant Hannon on the telephone for further instructions regarding the investigation of the Plaintiff.
X
Defendant Hannon arrived at Plaintiff’s apartment a short time later and was also voluntarily given a tour of the premises by the Plaintiff. Two cartons of film bearing the names “Candy” and “Lorrie” were seen by Defendant Han-non in the kitchen.
Plaintiff was later asked by Defendant Hannon if some of the films could be viewed and particularly four films he took from the kitchen including the two ■bearing the names, “Candy” and “Lorrie”.
Plaintiff consented to exhibiting the films and voluntarily ran them in his own projector in the apartment for Defendants Hannon, Pierce, Keller and Officer Wade, who thereby saw the films entitled “Candy” and “Lorrie” and then formed the opinion that these films were obscene and in violation of the provisions of California Penal Code, Section.311.2.
XI
Upon the request of Defendant Han-non, Plaintiff Robert Klor agreed and consented to permitting Defendant Han-non to take the films “Candy” and “Lorrie” to the Office of the City Attorney for viewing, but with the further statement that said films were unedited. Defendant Hannon then gave Plaintiff a receipt for said films and took them from Plaintiff’s apartment when he left.
XII
Subsequent to September 4th, 1964 the Office of the City Attorney of Los Angeles viewed the two films “Candy” and “Lorrie”, and were informed of the Plaintiff’s claim of lack of editing of the films. The City Attorney’s Office was of the opinion the films were lewd and obscene and filed a complaint and sought a warrant for Plaintiff’s arrest for violation of Section 311.2 of the California Penal Code, which warrant was issued by the Municipal Court, Los Angeles Judicial District.
XIII
On September 10th, Defendant Pierce was in possession of this valid warrant, fair on its face, for the arrest of Plaintiff Robert Klor for four counts of violating California Penal Code, Section 311.2, and along with Officer Wade attempted to serve the warrant upon the Plaintiff by going to his post office box at the Hollywood Branch Post Office and then to Plaintiff’s apartment several: times that day.
During the afternoon of September 10th, 1964 while in the apartment house where Plaintiff resided, Defendant Pierce and Officer Wade saw a maid come from Plaintiff’s apartment.
Defendant Pierce and Officer Wade were in plain clothes and Plaintiff approached and greeted them. Then, Defendant Pierce informed Plaintiff they wished to speak to him and Plaintiff replied they could not go into his apartment because the maid was inside. Plaintiff was then informed by Defendant Pierce that the maid had departed, whereupon Plaintiff walked past the two policemen, opened his apartment door and stated “come in” or words to that effect and the two policemen entered the apartment at Plaintiff’s invitation.
XIV
On the afternoon of September 10th, 1964 Defendant Pierce and Officer Wade arrested Plaintiff inside his apartment pursuant to the said warrant of arrest issued by the Municipal Court, Los Angeles Judicial District.
XV
Upon service of the valid warrant Plaintiff became hostile and stated that .he had expected the police officers to return and that in anticipation of his arrest he had removed or destroyed all the incriminating films he possessed. Plaintiff also stated that he was not going to allow the officers to take anything from his apartment.
Because of Plaintiff’s agitated and hostile state of mind, a uniformed policeman, Officer Wade, was called to the apartment since it had been the experience of the police officers that this had a settling effect on people.
Defendant Hannon was then called to 'the apartment by telephone by Officer 'Wade and told of all the events that had ■occurred up to that time. Defendant Hannon ordered a civilian police photographer to the Plaintiff’s apartment to take photographs to establish the fact Plaintiff had actually taken the motion pictures “Candy” and “Lorrie” in his apartment.
XVI
Defendant Hannon arrived at Plaintiff’s apartment and he along with Defendant Pierce and Officer Wade seized pillows and a tapestry depicted in the films “Candy” and “Lorrie”. Said police officers also seized one box from each of the numerous stocks of different motion picture films being sold by Plaintiff in his business from the storage areas seen by them on September 4th, 1964, several large reels of film, a motion picture camera, photographic lights, boxes of color slides of nude women, photographs of the women Candy and Lorrie showing them in clothed and unclothed states, a magazine containing an advertisement by the Plaintiff, some advertising brochures and stationery, a business Certificate, the lease for the apartment, a post office box application and number, check and ledger books and order forms sent in by purchasers.
Each and every one of the above items was seized incident and pursuant to a valid arrest and were evidence of the crime for which the Plaintiff was arrested.
XVII
During the seizure of the business papers such as the stationery, advertising brochures and purchasers’ orders, Plaintiff did attempt to interfere with Defendant Pierce, and said Defendant Pierce and Defendant Hannon used only that reasonable force necessary to restrain Plaintiff, who was not injured as the result of the force used, and Plaintiff was not handcuffed on his promise not to interfere any further.
XVIII
At Plaintiff’s request, he was permitted to make copies of all the orders that had been mailed to him, and all the police personnel left in small groups. Further, as Plaintiff also asked, he was not handcuffed and was accompanied by just two plain clothes officers to the unmarked police car in order to be inconspicuous and avoid embarrassment with his neighbors. On the way to the police station Plaintiff was allowed to attempt to cash a check at a market near his apartment to obtain money for use as bail.
XIX
Defendants Hannon, Pierce and Keller testified at the criminal prosecution of the Plaintiff. Officer Wade did not testify at the criminal trial and Defendant Keller was not present at Plaintiff’s apartment on September 10th, 1964 and did not participate in any of the events on that date.
XX
Pursuant to the Order of the Municipal Court, Los Angeles Judicial District, on October 21st, 1964, all the motion picture films, slides, negatives and motion picture camera and lights were returned to the Plaintiff by Defendant Hannon at the Hollywood Police Station, with the exception of the films “Candy” and “Lorrie” and the photographs of the two women bearing those names.
Plaintiff, Robert Klor, did view portions of each of the films which in his complaint he claims were damaged and thereafter voluntarily executed a release admitting that all items were returned to him “in substantially the same condition as they were when taken into custody by the police”.
XXI
At no time did Defendants Hannon, Pierce or Keller agree or conspire among themselves or anyone else to interfere with the civil rights of the Plaintiff or to deprive him of his rights, privileges and immunities secured and guaranteed by the United States Constitution.
XXII
At no time did Defendants Hannon, Pierce or Keller intentionally, wantonly or maliciously damage or mutilate any or any one of the motion picture films belonging to Plaintiff and seized by said Defendants.
XXIII
At no time did Defendants Hannon Pierce or Officer Wade violently knock Plaintiff to the floor or assault Plaintiff’s person, and any force used upon the Plaintiff was reasonable and necessary under the circumstances and provoked by the acts of Plaintiff himself.
XXIV
The evidence shows by a clear preponderance, in fact overwhelmingly and beyond any reasonable doubt, that Defendants Hannon, Pierce and Keller acted reasonably and in good faith, and seized property of the Plaintiff which was evidence of the crime for which he was arrested. Such lawful seizure was pursuant to a lawful arrest.
XXV
The allegations contained in Plaintiff’s Complaint inconsistent with the Findings of Fact herein are untrue.
CONCLUSIONS OF LAW
I
All Findings of Fact which are actually Conclusions of Law are hereby incorporated and made a part of these Conclusions of Law.
II
This Court has jurisdiction of the cause pursuant to the provisions of 42 United States Code, Sections 1983 and 1985(3), and 28 United States Code, Sections 1331(a), 1343(1), 1343(3) and 1343(4).
III
No Defendant under color of any statute, regulation, custom or usage subjected Plaintiff or caused Plaintiff to be subjected to the interference or deprivation of any of his rights, privileges or entitlements secured by the Constitution or laws of the United States or the State of California.
IV
No Defendant conspired to abridge or deny to Plaintiff any of the rights, privileges or entitlements secured to him by the Constitution or the laws of the United States or of the State of California or any of the civil rights of Plaintiff, or to deny to Plaintiff equal protection secured by the laws.
V
Defendants were acting within the course and scope of their employment by the City of Los Angeles as police officers and were acting in good faith and under color of law.
VI
Defendants and each of them reasonably and in good faith did search and seize property of the Plaintiff incident to a lawful arrest pursuant to a valid warrant which property was evidence of the crime for which the Plaintiff was arrested and reasonably related thereto.
VII
Defendants and each of them had and have a good and valid defense to this action under the Civil Rights Act of 1871 for reasonable conduct in the performance of their duties in good faith and with legal cause to act.
VIII
No Defendant performed any unlawful or illegal act.
IX
No Defendant entered into a conspiracy to perform any unlawful or illegal act.
X
The allegations contained in Plaintiff’s Complaint inconsistent with the Findings of Fact herein are untrue.
XI
Defendants Terrance W. Hannon, Terry D. Pierce, and Ronald Keller are entitled to judgment in their favor.
XII
Plaintiff is to bear costs of all parties.
Let judgment be entered accordingly.
. “§ 1983. Civil Action for deprivation of rights
Every person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law, suit in equity, or other proper proceeding for redress.”
. “1985. Conspiracy to interfere with civil rights — Preventing officer from, performing duties — Depriving persons of rights or privileges
(3) If two or more persons in any State or Territory conspire * * * for the purpose of depriving, either directly or indirectly, any person or class of persons of the equal protection of the laws, or of equal privileges and immunities under the laws; or for the purpose of preventing or hindering the constituted authoritíes of any State or Territory from giving or securing to all persons within such State or Territory the equal protection of the laws; * * * in any case of conspiracy set forth in this section, if one or more persons engaged therein do, or cause to be done, any act in furtherance of the object of such conspiracy, whereby another is injured in his person or property, or deprived of having and exercising any right or privilege of a citizen of the United States, the party so injured or deprived may have an action for the recovery of damages, occasioned by such injury or deprivation, against any one or more of the conspirators.”
. “§ 1331. Federal question; amount in controversy; costs
(a) The district courts shall have original jurisdiction of all civil actions wherein the matter in controversy exceeds the sum or value of $10,000.00, exclusive of interests and costs, and arises under the Constitution, laws, or treaties of the United States.”
. “§ 1343. Civil rights and elective franchise
The district courts shall have original jurisdiction of any civil action authorized by law to be commenced by any person:
(1) To recover damages for injury to his person or property, or because of the deprivation of any right or privilege of a citizen of the United States, by any act done in furtherance of any conspiracy mentioned in section 1985 of Title 42;”
. “(3) To redress the deprivation, under color of any State law, statute, ordinance, regulation, custom or usage, of any right, privilege or immunity secured by the Constitution of the United States or by any Act of Congress providing for equal rights of citizens or of all persons within the jurisdiction of the United States;”
. “(4) To recover damages or to secure equitable or other relief under any Act of Congress providing for the protection of civil rights, including the right to vote.”
| CASELAW |
Your browser doesn't support javascript.
BVS APS
Atenção Primária à Saúde
Home > Pesquisa > ()
Imprimir Exportar
Formato de exportação:
Exportar
Email
Adicionar mais destinatários
| |
Potentially inappropriate medication: Association between the use of antidepressant drugs and the subsequent risk for dementia.
Heser, Kathrin; Luck, Tobias; Röhr, Susanne; Wiese, Birgitt; Kaduszkiewicz, Hanna; Oey, Anke; Bickel, Horst; Mösch, Edelgard; Weyerer, Siegfried; Werle, Jochen; Brettschneider, Christian; König, Hans-Helmut; Fuchs, Angela; Pentzek, Michael; van den Bussche, Hendrik; Scherer, Martin; Maier, Wolfgang; Riedel-Heller, Steffi G; Wagner, Michael.
J Affect Disord; 226: 28-35, 2018 Jan 15.
Artigo em Inglês | MEDLINE | 2018 | ID: mdl-28942203
Resumo: BACKGROUND: Potentially inappropriate medication (PIM) is associated with an increased risk for detrimental health outcomes in elderly patients. Some antidepressant drugs are considered as PIM, but previous research on the association between antidepressants and subsequent dementia has been inconclusive. Therefore, we investigated whether the intake of antidepressants, particularly of those considered as PIM according to the Priscus list, would predict incident dementia. METHODS: We used data of a prospective cohort study of non-demented primary care patients (n = 3239, mean age = 79.62) to compute Cox proportional hazards models. The risk for subsequent dementia was estimated over eight follow-ups up to 12 years depending on antidepressant intake and covariates. RESULTS: The intake of antidepressants was associated with an increased risk for subsequent dementia (HR = 1.53, 95% CI: 1.16-2.02, p = .003; age-, sex-, education-adjusted). PIM antidepressants (HR = 1.49, 95% CI: 1.06-2.10, p = .021), but not other antidepressants (HR = 1.04, 95% CI: 0.66-1.66, p = .863), were associated with an increased risk for subsequent dementia (in age-, sex-, education-, and depressive symptoms adjusted models). Significant associations disappeared after global cognition at baseline was controlled for. LIMITATIONS: Methodological limitations such as selection biases and self-reported drug assessments might have influenced the results. CONCLUSIONS: Only antidepressants considered as PIM were associated with an increased subsequent dementia risk. Anticholinergic effects might explain this relationship. The association disappeared after the statistical control for global cognition at baseline. Nonetheless, physicians should avoid the prescription of PIM antidepressants in elderly patients whenever possible. | ESSENTIALAI-STEM |
Study of BNT-BKT-BT lead-free piezoelectric ceramics and their application in piezoelectric devices
Pao Yue-kong Library Electronic Theses Database
Study of BNT-BKT-BT lead-free piezoelectric ceramics and their application in piezoelectric devices
Author: Choy, Siu-hong
Title: Study of BNT-BKT-BT lead-free piezoelectric ceramics and their application in piezoelectric devices
Degree: Ph.D.
Year: 2007
Subject: Hong Kong Polytechnic University -- Dissertations.
Piezoelectric ceramics.
Piezoelectric devices.
Department: Dept. of Applied Physics
Pages: xvii, 199, vi leaves : ill. ; 30 cm.
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b2116708
URI: http://theses.lib.polyu.edu.hk/handle/200/2785
Abstract: Perovskite lead-free ceramics bismuth sodium titanate (Bi0.5Na0.5TiO3, BNT) modified with potassium and barium to form a new compound, 0.90Bi0.5Na0.5TiO3-0.05Bi0.5K0.5TiO3- 0.05BaTiO3 (BNKBT-5), have been fabricated by a solid-state reaction method. The dielectric, piezoelectric and ferroelectric properties of the ceramics have been measured and the microstructures studied by X-ray diffraction and scanning electron microscopy. In the ferroelectric hysteresis loop measurements, a large remanent polarization (Pr ~ 28.5 uC/cm2 ) and coercive field (Ec) ~3.5 MV/m have been observed. The electromechanical coupling coefficients kp and kt are 0.31 and 0.46, respectively. Those properties are comparable to that of lead-based ceramics such as lead zirconate titanate (PZT). BNKBT-5 has relatively high dielectric loss (dissipation factor, tan d ~2.7%), low mechanical quality factor (QM ~ 65 for radial mode) and low piezoelectric charge coefficient (d33 ~160 pC/N). To improve the properties of BNKBT-5, three different compounds have been used as additives/dopants. These include various amounts of cerium oxide (CeO2), dicalcium ferrite (Ca2Fe2O5) and bismuth lithium titanate (Bi0.5Li0.5TiO3 (BLT)). All the samples with different compositions have been characterized. The measured dielectric, piezoelectric and ferroelectric properties are compared with that of undoped BNKBT-5. It has been found that the BNKBT-5 doped with 1.5 mole % of BLT, namely BNKLBT-1.5, has the best performance. It can enhance kp, kt, QM, Pr, and can reduce the dielectric loss tan d but do not lower the depolarization temperature. Two different types of devices have been fabricated using BNKBT-5 and BNKLBT-1.5 ceramic rings. The first type of device is compressive type accelerometers. A PZT accelerometer with similar structure has also been fabricated for comparison. The accelerometers are calibrated using a back-to-back calibration method against a standard reference accelerometer (Briiel & Kjaer standard reference accelerometer Type 8305). Within the +-2.5% tolerance, the PZT accelerometer has a mean sensitivity value of 4.34 pC/ms-2 from 50 Hz to 8.24 kHz. The BNKBT-5 accelerometer has a mean value of 2.24 pC/ms-2 from 50 Hz to 10.1 kHz and the BNKLBT-1.5 accelerometer has a mean value of 2.97 pC/ms-2 from 50 Hz to 12.45 kHz. Although the PZT accelerometer has the highest sensitivity, but it has the lowest working frequency range. The BNKLBT-1.5 accelerometer has a reasonably high sensitivity and the broadest sensing frequency range which would be the most preferable choice for structural health monitoring applications. The second type of device is ultrasonic wirebonding transducers for microelectronic packaging. It has been found that if titanium is used as the metal parts in the transducer, the BNKLBT-1.5 transducer has similar axial displacement (~1.6 um) to that of PZT/stainless steel (which is the state-of-the-art transducer) transducer presumably because the lead-free ceramic has an acoustic impedance close to that of titanium metal. The lateral displacement of the BNKLBT-1.5 is much smaller than that of PZT transducer thus can improve the bonding quality. It shows that lead-free ceramics has the potential to replace PZT in certain transducer designs.
Files in this item
Files Size Format
b21167084.pdf 7.018Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Quick Search
Browse
More Information | ESSENTIALAI-STEM |
Talk:Teresa Nielsen Hayden
Disambiguation
I didn't want to insert this independently, but mightn't it be helpful to create cross-links clarifying the distinction between Theresa Nielsen Hayden, science fiction writer, and Teresa Nielsen, fantasy artist. They have extremely similar names and vaguely similar occupations. — Preceding unsigned comment added by 2602:306:BD66:25A0:317B:7DBD:EB7A:A25B (talk) 00:34, 16 November 2015 (UTC) or Theresa Nielsen, the Danish athlete, who is the current person who shows up when entering "Theresa Nielsen" — Preceding unsigned comment added by 2602:306:BD66:25A0:317B:7DBD:EB7A:A25B (talk) 04:33, 16 November 2015 (UTC)
Disemvowelling
"Nielsen Hayden is the inventor of disemvowelling."
I doubt this and it definitely needs a citation. There is no mention of her "inventing" it on the disemvowelling site and I doubt that this was something that started with one person. I will see what I can find out but that is my explanation for removing it. Crito2161 01:27, 13 November 2006 (UTC)
* To be honest, I'm surprised to see that the disemvoweling claim was in the article to be removed, having been deleted some time ago. The strongest claim that seems to be supportable with accepted sourcing is the one on the Disemvoweling article. (Briefly: the term predates the moderation technique, and the first use claim, in the sense of "as a moderation technique," seems impossible to prove, even though it's probably true.) Please see that article and its talk page for details, and do not reinsert the stronger claim that was just removed from here...again. Thanks! Karen | Talk | contribs 01:43, 13 November 2006 (UTC)
* Huh. My mistake. I guess I just assumed it had previously been removed. Karen | Talk | contribs 01:52, 13 November 2006 (UTC)
* I highly, highly suspicious of the claim she invented disemvoweling and am curious as to when she supposedly did this. The practice (if not the term) certainly pre-dates the Internet and undoubtedly was being used on the 'net as early as the ARPANET days. I certainly used it on early (mid-1980's) Bulletin board systems such as Stuart][, The Temple of Doom, and Pyrzqxgl. Unless better sources are found, I suggest it be removed. The Cory Doctorow source seems a bit circular since Hayden works for his Boing Boing blog (I don't mean to impune Doctorow, but suspect he got his info from Hayden rather than a third-pary) Simenzo 13:53, 14 September 2007 (UTC)
* Re-reading the current article I see it now states that Hayden is the first Internet-editor to practice disemvoweling (rather than the inventor of the practice). I'm still a bit dubious of the claim in absence of better sources--also I suspect it hangs on a narrow definition of what a Internet-editor is. Simenzo 14:01, 14 September 2007 (UTC)
* It says first recorded; and of course, this depends on the definition of Internet editor. The creation of the term by Arthur (who deserves his own article) on her blog helped solidify the association of the practice with her. -- Orange Mike 14:12, 14 September 2007 (UTC)
* So the emphasis on 'recorded' is a concession that in all likelihood she isn't the first? Yes, yes, of course it depends on the definition of Internet-editor... the point is how narrow of a definition? Would someone who moderates a discussion forum count as an Internet Editor? At a certain point the factoid is so precariously balanced on particulars that it becomes a trivial/misleading 'first'. Finally, the fact that her blog solidifies the claim isn't really a third-party, source... if the point is that disemvoweling is associated with Hayden, fine... let's state that and leave out the "first" aspect. This reminds me a bit of Compton's patent on 'multimedia'--something that was both obvious & in general use. I think the proponents of Hayden (and, incidentally, I'm not an opponent of hers) are really doing her a disservice by stretching the readers' credulity by including this in her bio. Simenzo 14:35, 14 September 2007 (UTC)
* Or perhaps the point is that Hayden disemvowels entire posts, instead of individual words (reading between the lines, that does seem to be what the article implies)... if that is the case, I'll back off my objections (but suggest that article is extended to include the extent of disemvowling. Simenzo 14:52, 14 September 2007 (UTC)
* Yes, Nielsen Hayden (not Hayden) disemvowels entire articles.Shsilver 15:12, 14 September 2007 (UTC)
* In that case I suggest the article be edited (in fact I'll go do it now) to specify that... I think that's key to her "first recorded." <IP_ADDRESS> 15:28, 14 September 2007 (UTC)
Narcolepsy
There are two elements here. One is the loss of the subject's medication. We don't normally get into this level of detail about biographical subjects. Is the matter worth mentioning in a short article? Is her narcolepsy important? Should we say more about that? The second half simply says that the subject blogged on a topic and some fellow bloggers commented on her piece. That is insignificant, unencyclopedic, and depends on blogs as secondary sources. I propose we rewrite the material:
* In January, 2006, Nielsen Hayden fell victim to the FDA's removal from the market of a prescription drug she regularly used for narcolepsy, without notice to her and other users. This situation, first brought to light on her weblog, was soon widely reported and commented on elsewhere.
* Personal websites, blogs, and other self-published or vanity publications should not be used as secondary sources.
* Nielsen Hayden has narcolepsy and had been taking Cylert for the condition. However the Food and Drug Administration withdrew the drug from the marketplace in January 2006 with insufficient warning, leaving her with no effective replacement.
A little research shows that the issues with this drug, and advocacy for patients who used to take it, predated January 2006.. It would be inaccurate to assert that the subject was the first to bring this "to light". -Will Beback 11:43, 13 November 2006 (UTC)
* Works for me, Will. Thanks! Karen | Talk | contribs 15:46, 13 November 2006 (UTC)
SwatJester has raised again (August 2007) the question of whether this topic belongs in the encyclopedia article. As the question has been discussed previously (see above), it seems that the most conservative approach would be to edit the language, rather than delete material that has already been discussed and vetted at least once before. It appears that Nielsen Hayden has served as an advocate or "poster child" for this disease -- she is, for example, the first person listed in [List of People With Narcolepsy]. The entry appears to be factually correct, does no harm, and might perhaps do some good. MarkBernstein 02:34, 28 August 2007 (UTC)
* TNH has written about her narcolepsy both on her blog and in published essays. It's obviously verifiable that she has narcolepsy; whether this is significant enough to be included in a Wikipedia article, I don't know. --Akhilleus (talk) 04:24, 28 August 2007 (UTC)
Disemvowelling source
In this article in Information Week, Cory Doctorow credits Nielsen Hayden with inventing disemvowelling. --Akhilleus (talk) 19:10, 15 May 2007 (UTC)
Can we get a better reference on the creation of disemvowelling? As it stands now this "fact" is verified by a reference from a man who is essentially Nielsen Hayden's employer.<IP_ADDRESS> (talk) 16:11, 23 February 2009 (UTC)
* The statement appeared in a reliable source, so this is not a concern. -- Orange Mike | Talk 16:20, 23 February 2009 (UTC)
Making Light is not an attack site
I'm not sure what an "attack site" is, but Making Light isn't it. It's a group-edited blog, moderated and founded by Teresa Nielsen Hayden, who remains one of the strongest voices on that page. The site is widely read in Nielsen Hayden's field -- science fiction -- and is often referred to in trade publications such as the multi-Hugo-winning Ansible. It is appropriate for a noteworthy blog that Nielsen Hayden founded and posts to regularly to be included in her Wikipedia biography. Doctorow 23:26, 27 May 2007 (UTC)
* I've replied on your user talk page. ·:·Will Beback ·:· 23:55, 27 May 2007 (UTC)
* If one exaimes Mr. Bebeck's contributions, it is apparent that for reasons of his own -- because I updated my own bibliography to include my 2007 books -- he felt is necessary to vandalize the entries of my husband's colleges at Tor Books, a New York science fiction publisher. I suggest that Mr. Bebeck demonstrate his Wikipedian Good Will by deleting all these pages from his watch list.
* I'm sure that upon mature consideration Mr Bebeck -- who haspreviously threatened to gut the entries of the whole field of editors of science fiction -- will walk away from this subject. Pleasantville 01:00, 28 May 2007 (UTC)
* This isn't about anything besides the contents of Nielsenhayden.com
* However, since you mention it, we have a problem on Wikipedia with science fiction editors who ignore our guidelines on autobiography. This article has that problem too. If editors would stop creating and editing their autobiographies then it wouldn't be so necessary for others to patrol them. I have no particular interest in this field and I've only gotten involved because of the need for policy enforcement. ·:·Will Beback ·:· 01:16, 28 May 2007 (UTC)
* Huh? The only edits that are apparently by TNH on this page are and . The former is a well-sourced edit which isn't in the slightest contentious and the latter, while unsourced, only makes the same claim along with passing the credit for the popularity of her blog onto her visitors rather than herself which hardly seems contentious to me. She didn't create this page, and WP:AUTO doesn't require her to refrain from editing. JulesH 08:22, 28 May 2007 (UTC)
I see no evidence that Making Light is an attack site. --Akhilleus (talk) 01:32, 28 May 2007 (UTC)
* People should be able to contribute to their own articles however they like. It's about them, anyway. If Wikipedians such as Will Beback write lies about them, they should be able to fix it.--ElminsterAumar 06:32, 26 August 2007 (UTC)
* This is now being discussed at AN/I ·:·Will Beback ·:· 01:38, 28 May 2007 (UTC)
According to the Arbitration Committee, A website that engages in the practice of publishing private information concerning the identities of Wikipedia participants will be regarded as an attack site whose pages should not be linked to from Wikipedia pages under any circumstances. I have looked at the site, and am completely satisfied that it engages in that practice. Therefore, we should not link to it. I do not intend to give details in the sense of "Go to the main page, and click on the link at the second from the top at the left-hand side" etc. Once there's question of privacy violations, we should err on the side of protecting our contributors. Of course, if the webmasters remove the privacy-violating information, which it is perfectly in their power to do, there will be no reason not to link to it. Musical Linguist 11:25, 28 May 2007 (UTC)
* Where, then, is the hue and outcry to remove all references to Google from Wikipedia, as it, too, "engages in the practice of publishing private information concerning the identities of Wikipedia participants." Because the complainant is "outed" on the first page of a search on their handle + wikipedia on Google. Perhaps they need to take better care of their own pseudonymity, if they can be found out so simply. --Izzylobo 02:05, 29 May 2007 (UTC)
OK, so it's a breach of Wikipedia's policies on contributor privacy. Calling such a site an "attack site", without even a pointer to a definition or supporting policy, looks a lot like abuse. (I gave the relevant blog a skim--there's a claim that the anonymity of Wikipedia is being abused, and so is damaging Wikipedia.) There isn't an easy answer, but I suggest that Mr. Beback, whatever his real life identity, needs to back off. Like it or not, I think he's becoming part of the problem. <IP_ADDRESS> 12:55, 28 May 2007 (UTC)
* The ArbCom ruling specifically uses the phrase "in the practice of..". I see no evidence here or on AN/I that Making Light is in the practice of compromising on-WP privacy. As has been mentioned ad nauseam, the discussion in one open thread of the first-page google results for one editor's name does not support the classification of the site as an attack site, as it is not regular behaviour. Hornplease 13:12, 28 May 2007 (UTC)
See my essay on the whole "BADSITES" controversy. *Dan T.* 21:16, 28 May 2007 (UTC)
I agree with Hornplease's post above: I see no evidence that Making Light is in the practice of violating the privacy of Wikipedia editors. I see a comment about an ED thread, and a link to that ED thread; if there are any links from Wikipedia to those posts on Making Light, then those links should be removed. But since the vast, overwhelming majority of Making Light has nothing to do with Wikipedia, much less investigating Wikipedia editors' backgrounds, and since Making Light is being used to provide source material for Wikipedia articles, there's no justification for removing all links to the site. --Akhilleus (talk) 01:59, 29 May 2007 (UTC)
* If the subject's site doesn't make a practice of attacking Wikipedia editors, or of revealing their personal information, then I'm sure the subject will remove the info as we've requested. ·:·Will Beback ·:· 07:38, 29 May 2007 (UTC)
* Will, she already has. See and following comments. Explanation of her reasons for doing this is here. JulesH 08:06, 29 May 2007 (UTC)
* I'm glad to see TNH's act of moderation and withdraw my objections to linking to her website. I acknowledge over-reacting initially and appreciate everyone's patience in this matter. ·:·Will Beback ·:· 09:26, 29 May 2007 (UTC)
* Does this mean you'll replace all the links you deleted?Shsilver 13:40, 29 May 2007 (UTC)
* I believe that the rest of us have already done that, although I can't be certain I didn't miss any. And I didn't do most of the ones on talk pages, except for where they were removed from my comments. JulesH 16:44, 29 May 2007 (UTC)
According to the Arbitration Committee - and they have clarified this once already - the AC have not given licence for blanket removal of links to any site just because someone feels like deeming an 'attack site'. Any such rule that could possibly be applied to nielsenhayden.com is self-evidently too stupid for words and demonstrably dangerous to have around on Wikipedia.
By the way, Will Beback and Teresa Nielsen Hayden have already resolved this actual incident between themselves. It has no relevance to this talk page and should probably go somewhere else - David Gerard 16:10, 31 May 2007 (UTC)
* The origins of the dispute stem partly from Will Beback's unwillingness to accept TNH's expertise on the career of Roger Elwood and on the subject of scam literary agents.
* Despite WB's notability as a Wikipedia admin, because he insists on concealing his real name and real-world connections, those of us who are out here under our real names and real CVs are reluctant to accept his authority since we have no way of validating it or sourcing the roots of his authority. This reluctance caused him and other admins of his stripe to regard us as suspicious characters.
* Teresa and I, both of whom were trained by Joanna Russ, Samuel R. Delany, and David Hartwell to have confidence in our authority, did not take well to being treated as suspicious characters.
* In private correspondence, I have tried to explain to WB the social rules of our subculture and what puts it at odds with the WIkipedia subculture, I hope with some success. (Because we know each other and marry each other's daughters in SF, we have different standards of conflict of interest, for example. There are no truly disinterested parties in the science fiction field.) This may allow future confrontations of this nature to be avoided. --Pleasantville 21:13, 1 June 2007 (UTC)
* I'd be happy to continue discusing this matter in appropriate forums. But this page exists just to discuss our article on the subject. ·:·Will Beback ·:· 23:48, 1 June 2007 (UTC)
Only a single source, and that source is the subjects blog!?
If no third-party sources are forthcoming, this article should be stubbed. See WP:SELFPUB. --Ronz 03:20, 27 August 2007 (UTC)
* According to that policy, Making Light is a reliable source on Teresa Nielsen Hayden. --Akhilleus (talk) 03:42, 27 August 2007 (UTC)
* Verifiability says:
* Material from self-published and questionable sources may be used as sources in articles about themselves, so long as:
* it is relevant to their notability;
* it is not contentious;
* it is not unduly self-serving;
* it does not involve claims about third parties;
* it does not involve claims about events not directly related to the subject;
* there is no reasonable doubt as to who wrote it;
* the article is not based primarily on such sources.
* It appears that this article is based primarily on the subject's own blog. ·:· Will Beback ·:· 09:26, 27 August 2007 (UTC)
* Was going to add additional sources, but the article is currently locked.Shsilver 15:43, 27 August 2007 (UTC)
* I asked the admin who protected the page to unprotect, so I think you'll be able to edit it soon. --Akhilleus (talk) 15:51, 27 August 2007 (UTC)
* That assertion has no basis in fact. Trivial example: TNH and Patrick edited Izzard, as the Hugo lists verify. They are well-known figures in the field, with plenty of other sources about them totally unrelated to their blog. I don't understand why you assume bad faith on the part of every other science fiction fan or pro who has edited these articles. -- Orange Mike 15:46, 27 August 2007 (UTC)
* The only cited source is TNH's blog, but there are other sources that can be used for the article--including Cory Doctorow's article, mentioned above on the talk page, which gives her credit for inventing disemvowelling. Of course, as OrangeMike just pointed out, some of the content in the article is based on independent sources--e.g., the list of Hugo award nominations is not coming from the blog, nor is the list of books edited by TNH (these are the sorts of things that don't really need a citation, either). --Akhilleus (talk) 15:55, 27 August 2007 (UTC)
* In the interests of civility and amity, it might not be a bad idea to find sources for some of these things other than Visible Light so that other editors do not have similar concerns about verifiability. ISTR that TNH and others have written about some of these matters in other venues in the past. -- Orange Mike 17:30, 27 August 2007 (UTC)
* I've added some sources from the TAFF pages, Viable Paradise, and the Hugo Awards page. Will look in some print sources later when I get a chance.Shsilver 17:34, 27 August 2007 (UTC)
How about just listing possible sources here? --Ronz 20:11, 27 August 2007 (UTC)
* Sure...Possible sources include Locus, The Encyclopedia of Science Fiction, various science fiction convention program books, [Science Fiction] Chronicle, various fanzines, etc. Shsilver 20:36, 27 August 2007 (UTC)
* Speaking of sources, Sourcewatch isn't a reliable source for a biography. See WP:BLP. ·:· Will Beback ·:· 04:05, 29 August 2007 (UTC)
* Sourcewatch appears, here, to be cited as an example of a place that published or commented upon the subject's writing on a specific topic. Whether or not Sourcewatch is reliable as a source for biographical data, it is doubtless reliable in regard to its own contents. Similarly, though you might not rely on The National Enquirer as an authority for a subject's birth date, the fact that a subject wrote stories for The National Enquirer can reliably be sourced to that publication. —Preceding unsigned comment added by MarkBernstein (talk • contribs) 12:26, August 29, 2007 (UTC)
"Controversy"
Every editor makes people unhappy. Every moderator does, too. I'm far from convinced that the "controversy" discussed here rises to the level of meriting inclusion in the encyclopedia entry. I also note that the contribution stems from an IP editor who is adding other contributions on the same "controversy" to other pages. I'd suggest reverting the controversy section unless it can be established that there's a real controversy, and not simply the sort of unhappiness that everyone in a similar position eventually faces. MarkBernstein (talk) 13:51, 12 July 2008 (UTC)
* This appears to have been a "real controversy":
* [Xeni] Update, 07-02-08: A number of the BB team were on the phone together today (for the first time since this started) discussing the situation. Several news organizations had pinged us to discuss this, including the Los Angeles Times, so we invited them to join the call and ask a few questions. It turned out to be a good conversation, and we hope the partial transcripts posted on the LA Times contribute to the thoughtful and evolving conversation.
* I haven't checked the L.A. Times articles, but they'd obviously be a relaible source. However this is probably better covered at Boing Boing than here. ·:· Will Beback ·:· 17:56, 12 July 2008 (UTC)
* The issue is well-covered at Boing_Boing. If more needs to be added about this subject's involvement it'd be better to add it there. ·:· Will Beback ·:· 18:18, 12 July 2008 (UTC)
* TNH has been central to this controversy, and many people are very upset. It seems this goes beyond the normal ire that a moderator accrues. Also, I think if anything this controversy brought to light many complaints about the moderation techniques that TNH has pioneered. So its pretty specifically relevant to this page. To wit, I've added a citation to the New York Times.<IP_ADDRESS> I would certainly appreciate help editing to make sure that what is said is fair. (talk) 20:17, 12 July 2008 (UTC)
* Despite the fact that the matter concerns blogging, using blogs as citations, especially in biographies, is discouraged on Wikipedia. Please read WP:SOURCE and WP:BLP. Though there is no problem with the NYT citation, most of the section you have added relies on material from sources that do not meet WP:SOURCE standards. --Pleasantville (talk) 20:31, 12 July 2008 (UTC)
* Well that seems like a tricky standard, but if you want to edit it down, please go ahead. I had two objectives with the section. #1 mention TNH's central involvement in the issue. #2 Show how this has lead to criticism of some of her "creative moderation techniques". I think that can probably be done with more conservative sources too. This has been covered in the LA Times, The New York Times, and the IHT. I thought sources that were more primary would be preferred. Most of the blog posters have identified themselves by name on their sites. One in particular names the following qualifications : "Bill Wyman is the former arts editor of NPR and Salon.com." That seems pretty good. <IP_ADDRESS> (talk) 20:39, 12 July 2008 (UTC)
* Please read the policies that have already been mentioned. Blogs may not be used as sources for biographies of living people, except in articles about the bloggers themselves. It doesn't matter how well-known the bloggers are. It's the same principle that says we can't use TNH's blogging as a source for other articles, so it's applied across the board. Please limit the material to what can be sourced in newspapers and other reliable sources. ·:· Will Beback ·:· 21:20, 12 July 2008 (UTC)
* It seems quite a lengthy addition for something which is a minor part of the subject's history and which is ongoing and therefore not of established notability. Shsilver (talk) 21:22, 12 July 2008 (UTC)
* Reasonable enough. I'm putting a shorter note that is based off the New York Times article. Let me know what you think. I'm still using Teresa's post from BB, as she posted it. ETA: Done. It is one sentence. It is no longer in a separate section. It uses two news articles from The Globe and Mail, and the New York Times, as well as Teresa's own article on the controversy. Better? <IP_ADDRESS> (talk) 07:45, 13 July 2008 (UTC)
The problem with the new version is that it gives the impression that Teresa Nielsen Hayden was the editor who removed the Violet Blue posts from view (which is not the case) and that the disemvowelment techniques were involved in the removal which, despite the NYT's cute turns of phrase, is also not the case. As I understand the story, Xeni Jardin removed the posts a year ago (before TNH worked for BoingBoing) using the "unpublish" feature of Movable Type which is quite unrelated to disemvowelment. I think TNH has worked for Federated Media/BoingBoing only since the end of August, 2007. Xeni's removals, described at the end of June 2008 as having been "a year ago," would have taken place two months before TNH worked there. --Pleasantville (talk) 10:35, 13 July 2008 (UTC)
* It doesn't seem to me that the current statement says one way or another. It says the controversy has generated criticism of her moderation techniques. I would agree that Xeni takes responsibility for the unpublication, but I don't think it is clear whether Teresa was the moderator at the time, whether she helped remove the posts, or whether she approved it.(She certainly approves of it).
* What is clear is:
* 1. TNH is the person that published the public statement from BB on the controversy.
* 2. TNH used the inclusive pronoun: 'we' to describe the behavior, in the statement. Whoever initially deleted the posts, TNH has put herself in the center of this.
* 3. The VB posts were still available at least as late as 2008/08/10, only 18 days before the announcement that TNH had started at BB. As far as I can tell the wayback machine has not yet released archives of the boing boing archives for later dates.
* Here's the link to the wayback archive: http://web.archive.org/web/20070810120051/boingboing.net/2005_12_01_archive.html
* Here's a link to an article I checked to be present: http://www.violetbluevioletblue.net/2005/12/27/yasgl-yet-another-sexy-geeks-list-for-2005/
* 4. The scrubbing of Violet Blue's posts was pretty thorough. That may have required some technical expertise.(I haven't really looked at wordpress in detail, to say how tricky it is.).
* Maybe we could say Xeni unpublished them? I definitely don't think we should say that TNH was not moderator at the time, given the what the wayback machine says and the lack of any statements to the contrary, it would be premature. One thing I was aiming for was brevity, given previous comments people made about my edits. That said, I'm definitely interested if you have an idea on how to rephrase it so it is fairer. Any suggestions?<IP_ADDRESS> (talk) 13:40, 13 July 2008 (UTC)
I propose we remove this controversy from the article for the time being, and revisit the question in six months -- that is, in January 2009. At that point, I think we'll be in a better position to assess where this matter fits in the subject's career. Wikipedia is not a newspaper (WP:NOT); we don't need to be blindingly up-to-the-minute. If this is notable, it will still be WP:NOTABILITY in January. —Preceding unsigned comment added by MarkBernstein (talk • contribs) 14:09, 13 July 2008 (UTC)
* <IP_ADDRESS>, you are way out there into original research territory and speculation. Please read WP:NOR. --Pleasantville (talk) 14:51, 13 July 2008 (UTC)
* I would suggest that rather than TNH putting herself in the middle of it by using the "we," she was acting as a spokesperson for the organization using the editorial "we." If what she wrote had run in the New York Times or any other newspaper, it would have been an unsigned statedment by the editorial board, much as <IP_ADDRESS> is hiding behind anonymity by using an IP address rather than a log-in.
* Since <IP_ADDRESS> claims "The VB posts were still available at least as late as 2008/08/10," then it isn't even an issue since they can still be seen (yes, <IP_ADDRESS> made a mistake, but this is no less ridiculous than any of the other arguments <IP_ADDRESS> has made).
* Boing Boing is a private publication and yes, they have the right to control what is published at their site, even if that includes retroactively removing content.
* I'd agree with User:MarkBernstein's comments about waiting to see just how notable any of this is. Shsilver (talk) 17:18, 13 July 2008 (UTC)
* Mark Berstein, could you be specific about what standards of notability you think this does not meet? What criterion you would expect it to have to meet to be notable in 6 months? I may misunderstand you, so I apologize if this is incorrect, but it seems that the standard for notability that you are proposing is different from the standard that has been applied to much of the other material in this article. This one issue has probably gotten nearly as much, if not as much coverage in the media as the rest of the material in the article put together.
* Pleasantville, If I phrased things poorly, I apologize. Let me try to clarify: I don't think we should put any of the wayback material into the TNH article. I just wanted to demonstrate that the usage of "year" was not exact, and that we have no reason to believe that TNH was not the moderator at the time. The TNH article doesn't make any assertions one way or another on this at the moment, so I think the current statement corresponds well to the available evidence.
* Shsilver, I don't mean to be rude and I'm sorry if I said something that bothered you, but I don't think calling my statements "ridiculous" or criticizing my typos is that helpful. I think WP:Assume_Good_Faith & WP:Please_do_not_bite_the_newcomers might apply. Certainly I've done various modifications without an account for some time(although, apparently not so controversial), I don't think I'm obligated to create or use a user account. As to whether BB has the right to retroactively remove their content, I'm not sure this is the appropriate place to debate the issue. On the usage of 'we', the available sources seem to demonstrate TNH's involvement. TNH's actual statement as is doesn't choose to use an unsigned statement, so I'm not sure the counterfactual applies.
* I've provided a lot of different sources at this point that seem to indicate the notability of the issue and these were only a small subset of the total available number. Does anyone have any ideas on a compromise statement that we can use? Is anyone interested in working out some sort of compromise? I think this is well covered enough that it is notable, but am very open to any proposals on how things can be phrased in a way. Pleasantville: Your previous statement seemed to indicate the NYT material was acceptable, any idea how we might want to include it? <IP_ADDRESS> (talk) 08:27, 14 July 2008 (UTC)
* Hi guys, I just had one more thought. The WP:NPOV article seems to give some criterion for whether a point of view is notable for inclusion. It notes that there will be multiple points of view. It seems to suggest if there is a significant minority viewpoint, then it should be represented. The viewpoint in the comment in question is supported by many of the 1700 comments on the "That Violet Blue Thing" talk page on Boing Boing(who knows how many other even more critical comments were blocked), the blogs I've cited(amongst, many, many, others), and the major media outlet newpapers that I've cited. If I seem dense, I apologize, but I'm having trouble seeing how this isn't a notable point of view.<IP_ADDRESS> (talk) 11:30, 14 July 2008 (UTC)
The WP:NOTABILITY question is simple. On the one hand, we have an entire career as a writer/editor and prominent member of the science fiction community. On the other hand, we have a spat on a particular Web magazine over publication or unpublication of some posts by a sex columnist. This spat matters a lot to [Special:Contributions/<IP_ADDRESS>|<IP_ADDRESS>]] (talk, but there is good reason to wonder whether it is actually historic. (As Pleasantville has pointed out, it's not enitrely clear that the subject even plays much role in the matter.) MarkBernstein (talk) 14:26, 14 July 2008 (UTC)
* Well a lot of people beyond myself consider it pretty serious. I really encourage you to check out the references available if you are unconvinced. What if we replace the current statement with something more innocuous. Something like "Teresa Nielsen Hayden was the moderator responsible for dealing with much of the online fallout from a June 2008 controversy over the "unpublishing" of posts on Boing Boing"???<IP_ADDRESS> (talk) 01:21, 15 July 2008 (UTC)
This section has not even begun to address or cover her considerable activity on an online forum called Absolute Write where she posted for many years as an anonymous entity known only as Hapisofi. Utilizing this guise, she was able to continue an underground, supported by the owners of Absolute Write, wherein she perpetrated act after act of what any reasonable person would see as overly harsh, untrue, and unfair criticism of various presses, editors and writers. Here is a link addressing this issue with several more links showing clear evidence of this activity by Teresa Nielsen Hayden posing as the personality Hapisofi: http://writeabsolutereviews.blogspot.com/2015/01/teresa-nielsen-hayden-fired-from-tor.html — Preceding unsigned comment added by <IP_ADDRESS> (talk) 17:08, 19 September 2016 (UTC)
1989 Hugo Nomination
In relation to our other dispute, I've been looking through the citations on this article to get a feeling about what qualifies for mention. I noticed something odd when I checked the citation on the 1989 Hugo, it doesn't actually mention Teresa Nielsen Hayden. "The New York Review of Science Fiction ed. by Kathryn Cramer, David G. Hartwell and Gordon Van Gelder".
Why is this nomination included in the article?<IP_ADDRESS> (talk) 00:41, 15 July 2008 (UTC)
* That is a good question, and when I checked a different source, it listed "David G. Hartwell, Patrick Nielsen Hayden, Teresa Nielsen Hayden, Susan Palwick & KC" Shsilver (talk) 00:54, 15 July 2008 (UTC)
* So how do we resolve a dispute like this, when two reputable sources are in obvious conflict? I looked at http://www.nyrsf.com/ and I think I figured out the root of the controversy. "Three issue into the process of publishing the magazine, we had a disagreement over whether to maintain a monthly schedule, and Patrick and Teresa resigned. Gordon Van Gelder, Robert H.K. Killheffer, and Jim Hornfischer joined the staff, and we settled in for the long haul, adding staff and losing staff from time to time, but always getting the issue done." Is it acceptable for a wikipedia editor to contact the Hugo organization to verify whether what was said is correct?<IP_ADDRESS> (talk) 01:26, 15 July 2008 (UTC)
* The 1989 Hugo was for work published in 1988; for part of 1988, TNH and PNH were co-editors of NYRSF. At that time, the Hugo was awarded to the zine itself, not to the editor; but they were both editors for the first three ishes of the zine. (For a matter like this, the NYRSF website is deemed a reliable source). -- Orange Mike | Talk 02:45, 15 July 2008 (UTC)
* Can you link the source you would propose to cite?<IP_ADDRESS> (talk) 04:50, 15 July 2008 (UTC)
* The history of NYRSF that you yourself provided? -- Orange Mike | Talk 15:40, 15 July 2008 (UTC)
* Here is TNH's listing in the LOCUS Index of award nominations. http://www.locusmag.com/SFAwards/Db/NomLit96.html#3854 She was a Hugo nominee that year. David Hartwell, owner & publisher of the magazine, provides the committee with a list of the editors of the magazine for the nominees list each year when the magazine makes the Hugo ballot, which it has every year of its publication. TNH was a founding editor of the magazine, and so was nominated in connection with it in its first year of publication. Why is this an issue for you?--Pleasantville (talk) 11:12, 16 July 2008 (UTC)
* Regarding the question of contacting a Hugo administrator, you are certainly welcome to do that, but you should not post private correspondence on Wikipedia, and a claim that an administrator had said something to you would be unsourced claim and violate Wikipedia's original research policy. If you contact a Hugo administrator, please ask the administrator to post directly in this space. We do, however, already have a former WorldCon Programming Director participating in this discussion. --Pleasantville (talk) 12:17, 16 July 2008 (UTC)
* Ya, my only issue is that two reliable sources are contradicting each other. The source(The Hugo Web Site) that is currently cited in the TNH article doesn't note her at all, I can't see how this couldn't be an issue.(I'm a bit new to this, but I assume WP:Verifiability) I left a message on the Hugo awards web site so you can follow the correspondence, I assume that they'll post a correction on their web site that includes TNH when they've figured it out, this would probably be ideal as I don't think a post to a talk page on Wikipedia would qualify as a source anyway, no matter who posted it. http://www.thehugoawards.org/?page_id=11 I'm fine just waiting until they post a fix before we make any corrections to this page, if you guys don't mind. <IP_ADDRESS> (talk) 10:25, 17 July 2008 (UTC)
I was nominated with her and administer the NYRSF site. She really really was on that Hugo ballot. --Pleasantville (talk) 13:14, 17 July 2008 (UTC) aka Kathryn Cramer
* I have sent the Hugo site a correction and left a comment on the page where your question resides. --Pleasantville (talk) 14:07, 17 July 2008 (UTC)
* Cool, they modified the document that the this article already links to. (-: Thanks for the help. <IP_ADDRESS> (talk) 03:54, 18 July 2008 (UTC)
"Controversy" II
Looks like Pleasantville deleted my additions pertaining to RaceFail09, claiming that "blogs and LJs won't do" when it comes to "reliable sources." Um, I included FeministSF Wiki. Also, the various LJers had screencaps by TNH. Note, also, that hundreds of people have criticized the NHs at this point. —Preceding unsigned comment added by LiliVonShtup (talk • contribs) 14:57, 28 February 2009 (UTC)
* Please read Reliable sources, especially as pertains to biographies of living persons. And no, the FeministSF Wiki will not do. See also: Biographies of living persons. --Pleasantville (talk) 15:04, 28 February 2009 (UTC)
* As an early member and contributor of the FeministSF Wiki, I must agree that it doesn't meet our definition of "reliable sources"; and screencaps, as anybody with a copy of Photoshop can attest, are among the easiest things on the planet to fake up. -- Orange Mike | Talk 14:27, 2 March 2009 (UTC)
Association with Tor
There were several references to subject's association with Tor, however, the citation did not reference her in the present or past tense - in fact it didn't reference her at all. I cannot find a reliable source that discusses or mentions her association or lack thereof with Tor, but it seems to be some sort of common knowledge in the industry. Perhaps it's some type of name confusion with her spouse, who appears on the Tor site as an editor. If anyone is interested and can find a good source, it would be good to make her work history accurate. Without a reliable source, there is no way to inculcate her involvement with Tor.
Kennedy Trengove (talk) 04:33, 18 January 2015 (UTC)
I think it would be worth noting the TOR site itself no longer lists her name anywhere on there. I don't see how you could get more reliable than that. — Preceding unsigned comment added by Sango75 (talk • contribs) 13:23, 20 January 2015 (UTC)
REMEMBER BLP. There's off-wiki agitation by anonymous enemies of the subject to remove the affiliation from Wikipedia. Reliable sources clearly indicate that she has been an editor at Tor (e,g, http://viableparadise.net/viable-paradise-instructors/teresa-nielsen-hayden/ and http://www.sf-encyclopedia.com/entry/nielsen_hayden_teresa), and of course it is true that she has long been an editor for that house. No change should be made to the page until and unless the change in status has been published in a reliable source. MarkBernstein (talk) 16:20, 20 January 2015 (UTC)
* I think that you are misreading the BLP policy. One of the BLP principles is the ability for a claim or fact to verified. The idea that a fact should remain until a reliable source says that the fact is not true is counter how evidence works. I removed the link and the reference after seeing that the source did not reference the subject at all. I am not sure what anonymous enemies have to do with this, but happenings in the larger world are irrelevant to NPOV and BLP guidelines so far as I can see. As far as the references being put back in, I don't see how the sources linked are reliable, NPOV, and notable. The reference to a writers workshop website is potentially even a self-contributed bio, which would violate reliable sources guidelines and self-publishing. Additionally, being a guest speaker at a yearly week long conference is not notable, and does not support being a teacher. The website lists her as a speaker and an instructor. The operation seems to be a money making enterprise to train authors to write saleable material. In that regard I am not sure any of it points to the subject being a "teacher", which normally connotes an activity of some substance and lasting impact to the students. I am neutral on the changes, and would like to see if anyone else has an opinion. I discount wholly the claim that "of course it is true" that she is an editor for that house - WP is not a place for debating what is or is not of course true, but rather, a place for publishing what is verifiable and encyclopedic about a subject. Kennedy Trengove (talk) 02:40, 21 January 2015 (UTC)
* So took a little time, have tried to come up with some reliable sources that support extraordinary claims required for BLP standards - namely, verifiability. It is my opinion that there is a self-publishing problem. My count shows that well over half of the supporting references for this subject are either self-published, or published at a group-blogged website. Most of the works that are claimed to be edited by the subject are not sourced, and many of the historical elements are only self-sourced. My read of WP:RS indicates this is okay, but frowned upon and should not be relied on heavily or for extra-ordinary claims. I am going to be hold and re-work some of the text to try to capture a more NPOV, and to add a few reliable sources where appropriate. I'd be happy if someone made some improvements, especially with works edited by or for the subject. There is a great way to establish authorship, but what is the standard for editing? It seems easiest when the subject was nominated for an editing award because then there are NPOV sources to reference that are reliable and establish notability.Kennedy Trengove (talk) 04:53, 21 January 2015 (UTC)
* Looking even further, the newly posted sources claimed to be reliable appear to not met WP:RS. Locus Magazine Online, which is the source for the claim about a third-party (namely, bio information that the subject is some sort of editor for Tor) is part of the "commentary and essay" section of the site, which is not the same as the magazine, and is not signed. It is not possible to know from what is available if the postings carry the weight of editorial weight of the magazine proper, which would indicate a reliable source. Given this a BLP, the need to have a RS is critical. According to the Locus Online page linked, the website Perspectives contains "Essays and commentary, including Cory Doctorow's bimonthly columns from Locus Magazine, and (as of February 2009), a new Roundtable blog with posts from Locus reviewers and other invited guests". This indicates the content linked is not part of the editorial control of the magazine, but apart. WP:RS says "Some news organizations host online columns that they call blogs, and these may be acceptable as sources so long as the writers are professionals and the blog is subject to the newspaper's full editorial control.". The combination of the source being unsigned and in the "Perspectives" section of the website for the publication indicate that the source may not be acceptable. Combined with the enhanced scrutiny of BLP, I feel confident in removing the reference in favor of a better, NPOV RS.Kennedy Trengove (talk) 05:19, 21 January 2015 (UTC)
* The subject was a long time consulting editor at Tor, but has not been listed on the editorial staff there since sometime between July 1, 2014 and September 24, 2014. Without regard to why the status change may have occurred, the article should reflect the fact that her staff position at Tor is in the past rather than ongoing. Nitpicking polish reverted to the present tense based in part on work she did on Hawk, which was released October 7, 2014. In Hawk she is credited with a "wonderful line edit," a job that must be completed months, sometimes a year or more, before a book is released. Nitpicking polish also noted that her page says she's there. To that point, her user profile at Tor.com appears to be quite stale. The last activity seems to have been over a year ago. If the reference is to her independent web site, it only says that she consults, which indicates that she does some freelance work. At one time she had a dedicated workspace at Tor. There doesn't seem to be any evidence that is true today. <IP_ADDRESS> (talk) 14:08, 5 May 2015 (UTC)
* The subject is no longer a consulting editor at Tor. The controversy over this issue here on Wikipedia would have been easily resolved long ago when the issue was first broached if the subject were indeed still on the staff in any capacity. The presentation of actual evidence based on Wikipedia guidelines, e.g., a staff or bio page on the Tor website, has not and will not be forthcoming. — Preceding unsigned comment added by 2600:1012:B167:22FB:3144:ADAB:8FF9:7E81 (talk) 16:42, 19 September 2016 (UTC)
Sourcing Problems
I continue to find sourcing problems with references that have been here a long time. The source for the subjects editing of a major novel points to a comment left on a group-blog, by the subject herself. Working on finding better sources and removing items that don't meet sourcing guidelines. Anyone up to help? Kennedy Trengove (talk) 14:04, 21 January 2015 (UTC)
* Kennedy, given your (apparent) depth of ignorance of this field, I wish you would slow down your current pace or desist entirely. Locus Online is one of the most reliable sources in this field, along with File 770 and Ansible, due to the intense vigor with which the SF community tends to self-police. Are you even familiar with these matters? -- Orange Mike | Talk 19:01, 21 January 2015 (UTC)
* OrangeMike-- Thanks for your constructive feedback! I will throttle back the boldness and see what turns up in time. I admit I have no idea about the SF community or the subject, but I am happy to hear it polices itself well. Despite that, the 'Locus Online' publication linked to does not appear to be meet the written guidelines as I read them. For one thing, the article is unsigned, and in a section of the publication described as "essays and commentary". The publication also goes out of it's way to seperate itself from the website. The website is titled as "the website of the magazine". So whereas the magazine is unquestionably a reliable source, the website, especially for BLP, appears to not be. I have not made any edits that are substantive to the subject, except for ones related to sourcing. These require no special knowledge of the subject, the field, or anything else. I am open to better sources, and if the subject is prominent I think that reliable and BLP worthy ones will not be a problem. Can you recommend what the best way is way to source editorial involvement of a novel?Kennedy Trengove (talk) 03:46, 22 January 2015 (UTC)
* User:Orangemike, who is something of an expert in this field, is correct. There is absolutely no question about many of these things -- that the subject has edited any number of important books, that she has taught at Viable Paradise, etc. Better sourcing is always welcome, but in fact Locus and Ansible are really good sources, and for non-contentious things self-published sources are acceptable in any case. You might also consider that User:Orangemike and myself have been editing Wikipedia for years and years, and you're lecturing us on details of WP:BLP after ostensibly having two or three days of experience here. Because the subject is known to have enemies and rivals of various kinds, we all should be especially careful that changes are made prudently. MarkBernstein (talk) 00:02, 22 January 2015 (UTC)
* Mark, thank you also for you constructive feedback. However, regardless of what is known and what is well known and not in question, for BLP, only what is verified and verifiable can be published, whether positive, neutral, or negative. If the only reference to the subject teaching is from a workshop website, and not from reliably secondary sources, I have to question that it's really notable, and thus encyclopedic. I am sorry that you found my comments on the talk page to be lectures, that was not my intent, and I will try to be more constructive in them in the future. Although the tone might not have struck you right, I hope that you would agree that using, as a source for a BLP, a comment on a blog post by the subject, violates WP:RS, which explicitly states that user generated comments should not be used as a source. I welcome better sources that establish notability, reliability, and meet the guidelines for BLP.Kennedy Trengove (talk) 03:46, 22 January 2015 (UTC)
* Notability is an issue for the subject; verifiability is an issue with assertions of fact. Primary and secondary sources can be just fine for verification of facts, if they're reasonably authoritative. - Dravecky (talk) 05:41, 22 January 2015 (UTC)
* Dravecky, thank's for pointing that out. I have re-read notability and see the note about content within a subject not having to be notable. That certainly makes sense and it makes it a lot easier to write articles. I've worked on trying to just make sure the links used as sources are not dead, and are on topic, and I think I have them all cleaned up. Several were broken and possibly changed from the last time they were referenced. Can you take a stab at how to find sources for works edited? The sole source does not verify the information cited.Kennedy Trengove (talk) 06:14, 22 January 2015 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Teresa Nielsen Hayden. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20070609045318/http://today.reuters.com/news/articlebusiness.aspx?type=tnBusinessNews&storyID=nN2475960&imageid=&cap=&from=business to http://today.reuters.com/news/articlebusiness.aspx?type=tnBusinessNews&storyID=nN2475960&imageid=&cap=&from=business
Cheers.— InternetArchiveBot (Report bug) 07:34, 26 December 2017 (UTC) | WIKI |
Page:Greece from the Coming of the Hellenes to AD. 14.djvu/119
Rh were transferred bodily to Asia; and Otanes, the successor of Megabazus, extended these conquests to Antandros, Lemnos, Imbros, Calchedon, and Byzantium. Tokens of submission were then demanded from the King of Macedonia, and, though the Persian envoys behaved with such insolence that they were assassinated by order of the king's son, these tokens were given.
The operations thus briefly noticed seem to have occupied several years, during most of which Darius was far away at Susa, while his half-brother Artaphernes was the Satrap at Sardis in charge of all that concerned the Greek towns. The supremacy of Persia does not seem to have been exercised with harshness, and accordingly there was a brief period of comparative repose.
Nevertheless the position of the Persians in the North, and especially their command of the Hellespont and Bosporus, must have seemed a menace to Greek freedom, and was especially annoying to Athens, which depended greatly for its supply of corn upon the trade from the coasts of the Propontis and Black Sea. Accordingly we find that the Athenians, after trying to make terms with Artaphernes, made up their minds to adopt a steadily hostile attitude to Persia. Their first attempts at negotiation were met by the rigid demand for "earth and water," as a necessary condition of any alliance. Though the recent expulsion of Hippias (B.C. 510) had involved them in conflicts with Sparta, the Athenians would not purchase the Satrap's assistance at this price. Later on (B.C. 505) they were further angered by a direct | WIKI |
Nick Warren (cricketer)
Nicholas Alexander Warren (born 26 June 1982) is a former English cricketer who played a number of senior games for Warwickshire County Cricket Club between 2002 and 2005, although he made his List A debut for the Warwickshire Cricket Board side in 2001. He was a right-handed batsman and his bowling style was right arm fast-medium. He was born in Moseley, Birmingham.
He was said to have shown potential in the England Under 17 team against Ireland in 1999, and he went on to tour Malaysia with the Under 19's, and played in the Youth World Cup in Sri Lanka during 1999–2000. While in the England A cricket team, his Youth Test debut came in 2002 against West Indies A.
However, Warren's career appeared to be on the verge of decline when his contract at Warwickshire was ended in 2003. During his fight to keep his place, he missed three months of play due to a stress-fracture of the spine in 2004. However a run of 'impressive performances' earned him a renewal on his contract, in which he played Northamptonshire in the Frizzell County Championship, taking three wickets for one run in ten balls.
Warren did not hold down his place, however, and did not appear for the first team after the 2005 season. | WIKI |
Astoria (Amsterdam)
Astoria is a Jugendstil office building at Keizersgracht 174–176 in Amsterdam, built in 1904-1905 as the headquarters of the Eerste Hollandsche Levensverzekerings Bank insurance company. The building, at the intersection of the Keizersgracht and Leliegracht canals, served as the international headquarters of Greenpeace for 15 years. In 2001, it gained rijksmonument (national monument) status.
Description
With six floors and a maximum height of 37 metres, the Astoria building was one of the first office towers in the Netherlands. The building was a design by H.H. Baanders and Gerrit van Arkel, two architects who designed many buildings in Amsterdam in a sobre version of Jugendstil which later came to be known as Nieuwe Kunst ("New Art").
The Astoria building has a copper-plated roof with a small tower and decorative cast-iron fencing with EHLB (for Eerste Hollandsche Levensverzekerings Bank) in gold lettering. The mosaic on the Keizersgracht facade shows a guardian angel (intended to be symbolic of the insurance company) and two other figures.
In 1968–1969, the building was extended in the same style, after a design by architect C. Wegener Sleeswijk.
Astoria served for 15 years as the international headquarters of Greenpeace, from the founding of Greenpeace International in 1989. The building now houses various companies.
The Astoria building is on the same block as the Anne Frank House. | WIKI |
Page:United States Statutes at Large Volume 111 Part 2.djvu/215
PUBLIC LAW 105-61—OCT. 10, 1997 111 STAT. 1295 be funded pursuant to this campaign shall feature any elected officials, persons seeking elected office, cabinet-level officials, or other Federal officials employed pursuant to Schedule C of title 5, Code of Federal Regulations, section 213, absent advance notice to the Committees on Appropriations and the Senate Judiciary Committee; (5) a detailed implementation plan to be submitted to the Committees on Appropriations and the Senate Judiciary Committee for securing private sector contributions including but not limited to in-kind contributions; (6) a detailed implementation plan to be submitted to the Committees on Appropriations and the Senate Judiciary Committee of the qualifications necessary for any organization, entity, or individual to receive funding for or otherwise be provided broadcast media time; and (7) a system to measure outcomes of success of the national media campaign: Provided further, That the Director shall report to Congress quarterly on the obligation of funds as well as the specific parameters of the national media campaign and report to Congress within two years on the effectiveness of the national media campaign based upon the measurable outcomes provided to Congress previously: Provided further, That of the funds provided for the support of a national media campaign, $17,000,000 shall not be obligated prior to September 30, 1998: Provided further. That of the funds provided, $6,000,000 shall be used to continue the drug use reduction program for those involved in the criminal justice system: Provided further, That of the funds provided, $10,000,000 shall be to initiate a program of matching grants to drug-free communities, as authorized in the Drug-Free Communities Act of 1997. This title may be cited as the "Executive Office Appropriations Act, 1998". TITLE IV—INDEPENDENT AGENCIES COMMITTEE FOR PURCHASE FROM PEOPLE WHO ARE BLIND OR SEVERELY DISABLED SALARIES AND EXPENSES For necessary expenses of the Committee for Purchase From People Who Are Blind or Severely Disabled established by the Act of June 23, 1971, Public Law 92-28, $1,940,000. FEDERAL ELECTION COMMISSION SALARIES AND EXPENSES (INCLUDING TRANSFER OF FUNDS) For necessary expenses to carry out the provisions of the Federal Election Campaign Act of 1971, as amended, $31,650,000, of which no less than $3,800,000 shall be available for internal automated data processing systems, and of which not to exceed $5,000 shall be available for reception and representation expenses: Provided, That of the amounts appropriated for salaries and expenses, $750,000 shall be transferred to the General Accounting Office for the sole purpose of entering into a contract with the private sector for a management review, and technology and performance audit, of the Federal Election Commission, and $300,000 may be tremsferred to the Government Printing Office. Reports. Independent Agencies Appropriations Act, 1998.
� | WIKI |
Maitra, Ramban
Maitra is a village, near Ramban town in Ramban district in the Indian union territory of Jammu and Kashmir. | WIKI |
Gitter keyboard shortcuts
Gitter
Zeynel Abidin Öztürk -
11 months ago
- Shortcuts
?
Open keyboard shortcut help
Ctrl + /
Toggle compose mode
Q
Quote selected text
or R
Ctrl + S
Focus the search input
Ctrl + ↑ Shift + C
Focus the chat input
Ctrl + ↑ Shift + M
Show markdown help
Ctrl + ↑ Shift + K
Show keyboard shortcuts
Ctrl + ↑ Shift + 1 - 9
Open item at numbered position in the menu bar
↑ ↓
Navigate up and down the left menu once you have focus
← →
Navigate between the menu bar and conversation list in the left menu once you have focus
⤶ Enter
Go to the selected room once you have focus
Ctrl + ⤶ Enter
Send message when in compose mode
Edit previous message (when possible)
Source: Gitter. Icon: Flaticon.
Share this page on:
Program information
Program name: Gitter Gitter (Social & Messaging)
Gitter is an open-source instant messaging system for users of GitHub. It has a free option that provides all basic features like private chat rooms. Like Slack, Gitter saves all messages in the cloud.
Web page: https://gitter.im
Shortcut count: 14
How easy to press shortcuts: 85%
Similar programs
1. Grand Theft Auto VGrand Theft Auto V
66409
2. Keyboard symbolsKeyboard symbols
51967 1
3. Apex Legends (PC)Apex Legends (PC)
39840
4. The Sims 4The Sims 4
38778 3
5. PlayerUnknown's BattlegroundsPlayerUnknown's Battleg
35425 2
6. DiscordDiscord
34512
More keyboard shortcuts...
Advertisement
Join our mailing list!
Your email is kept private and we don't spam. | ESSENTIALAI-STEM |
The Benefits Of Owning An Electric Car
Having green energy in your house is a great way to protect the environment, while reducing energy costs. You don’t have to buy an electric car to make this happen! In the article below you will find easy tips for making your home as energy efficient as you want it to be.
When creating an outdoor light set up for a garden path or patio, think of solar powered lamps as an option. This type of lamp is cost-effective and needs no power other than sunlight. This, of course, will save you a lot of money. It means that there is no need to run wires outside to hook up lights.
Make your home more energy efficient by unplugging your unused electronic devices. Your charger still uses energy while it’s plugged in, even if it isn’t charging anything.
TIP! Be socially responsible, and unplug electric chargers for all devices that don’t need immediate charging. Chargers used for cell phones, laptops, mp3 players and other electronic devices use power when they’re plugged in, even if they aren’t charging your device.
Check with a technician and see if switching to biodiesel for your home instead of fuel oil is a viable option for you. Some current systems can use forms of biodiesel without the need for modifications. Bio-diesel is more efficient and burns cleaner than conventional petroleum, which in turn, reduces the environmental impact from your home during the winter.
Solar water heaters are an inexpensive and efficient way to heat your home’s water. If you live in an area where freezing temperatures are unlikely, you can purchase systems that circulate water through solar heating systems before pumping it inside for use. Don’t get rid of your conventional water heater though; you may need it if it’s cloudy when you’re ready to use hot water.
Only run your dishwasher when it is completely full. Don’t run it with only a few things. You’ll be shocked at the amount of dishes it can hold. Set up the plates so that you fill it up as much as possible.
TIP! Your furnace filters should be cleaned monthly and replaced yearly. You should also install filters on any warm-air registers included with your furnace.
If you use a dishwasher to clean your dishes, do not run it until it is completely full. Dishwashers consume a similar amount of water and electricity regardless of whether it contains one dish or 20. Also ensure that it is set to air-dry if you are aiming to reduce your energy consumption.
Do maintenance on your fridge to save money. Since refrigerators are one of the high-consumption appliances, it’s crucial that you keep it running efficiently. Clean heating coils regularly to get rid of dust. Make sure door seals are clean and tight.
Sweater Gives
TIP! Speak to a technician to find out if your fuel oiled heating can be changed to an alternative fuel, such as biodiesel. A lot of the existing systems can be modified with minimal parts or alterations.
Change up the way you dress in your home and warm yourself up to avoid turning on the heater if possible. A light sweater gives you 2 extra degrees of warmth, while a heavy sweater gives you 4 degrees. You don’t have to wear a t-shirt and shorts in your home, so dress warmly and save money!
If you are uncertain with regard to expensive green energy updates for your home, have a heating expert or plumber provide an overview of the systems that you currently have in place. They will be able to tell you how much money you are losing on inefficient appliances, and they can also give you an accurate estimate of what it will cost to upgrade or replace your systems.
Carpooling is a great way to get to many places; not only work. If you have children, you can have a neighborhood carpool and switch with the other parents every day. Join with friends and family to do grocery shopping, visit the mall or even go to the movies.
TIP! Find out what energy options your community has available. Check the cost of running your home using these utilities, taking into consideration any recent legislation regarding energy costs.
Turn off the lights when you exit a room. Turning off the lights will save a surprising amount of energy. You will also save on your electric bill.
Energy Star
The easiest way to find these appliances is to look on them for an Energy Star badge. ENERGY STAR appliances have been approved by the U.S. Department of Energy and additionally the Environmental Protection Agency. If you want to claim a green energy tax rebate, you’ll likely need to buy one of these products to qualify.
TIP! Wait until your dishwasher is full before running it if you want to save energy. Don’t run it with just a few dishes.
There are a few simple changes you can make to reduce household energy usage, including installing energy-efficient light bulbs and a programmable thermostat, as well as changing your furnace filter regularly. Be an example to your family, so they will realize how simple it is to be green! Keep these tips in mind and use them often. | ESSENTIALAI-STEM |
Khonsa
Khonsa is the headquarters of Tirap district in the Indian state of Arunachal Pradesh. It also houses Ramakrishna Sarada Mission School, Christ The King ICSE School. The Noctes, a Wancho tribe, are the indigenous population, although the town is cosmopolitan in nature, people from every Indian state can be found here. It is 43km away from Deomali Town.
Geography
Khonsa is located at 27.02°N, 95.57°W. It has an average elevation of 1215 metres (3986 feet).
Education
Wangcha Rajkumar Government College in Deomali Town is the only college in Tirap district, it is 43km away from Khonsa.
Demographics
India census, Khonsa had a population of 9229. Males constitute 56% of the population and females 44%. Khonsa has an average literacy rate of 74%, higher than the national average of 59.5%: male literacy is 80%, and female literacy is 65%. In Khonsa, 15% of the population is under 6 years of age.
The majority of the people are Christians, mostly Baptist, although some are Roman Catholics. There are relatively few animists. Among Nocte Catholics, syncretism between traditional religions and Christianity is evident. American-sponsored missionaries in Khonsa and neighboring districts. Christ King Catholic Church Khonsa is helping the people to grow up in spirituality.
Languages
According to the 2011 Census, Nocte is Spoken by 2,704 people, Hindi by 1,327 people, Bengali by 1,008, Nepali by 823 people, Wancho by 799, Bhojpuri by 555 people and Assamese by 473. | WIKI |
Talk:Political entrepreneur
How to become number one politician? Maaparty 11:43, 23 January 2007 (UTC)
An article in need of assessment
Presently, this article is not in good condition--although, it has good potential to be a good article. A specific list of people who ARE considered to be Political entrepreneurs would help (Ross Perot? or Ralph Nader? or people who start political think tanks or lobbying groups?). I will assess this article and continue to revise it.
Also--the original author (User:RJII) of this article has been blocked indefinitely from Wikipedia; can anyone shed any light on that subject? Thank you. ProfessorPaul 04:14, 29 October 2006 (UTC)
* RJII was banned after openly admitting that he was editing wikipedia to promote libertarian/"free market" bias. -- Nikodemos 04:45, 29 October 2006 (UTC)
Terminology
I think this article entirely misses the point. A political entrepreneur means someone who demonstrates political entrepreneurialism which is a recognised term in political science to denote a person, often an outsider, who sees and exploits a political opportunity or creates a new form of political mobilisation (cf 1 or 2 or 3 or 4). It does not mean a politically-active businessman, even if the same term is sometimes applied as a joke (like 1). Only the former is notable —Brigade Piron (talk) 11:17, 30 August 2020 (UTC) | WIKI |
Wikipedia:Featured list candidates/List of Fullmetal Alchemist episodes/archive3
* The following is an archived discussion of a featured list nomination. Please do not modify it. Subsequent comments should be made on the article's talk page or in Wikipedia talk:Featured list candidates. No further edits should be made to this page.
The list was not promoted by User:Matthewedwards 02:46, 24 December 2008.
List of Fullmetal Alchemist episodes
* previous FLC 1, FLC 2
This article has been nominated because I have attempted to restore it as far as possible to when it was orignally listed as FA. I have updated the article consistantly, added new images and re-written sections to keep unecessary detail out as far as possible. I know it has reached FA status owing to the way the article looks as a whole; I believe it matches the criteria for FA-List Class in it's encyclopaedic form. サラは、私を、私の青覚えている. Talk Contribs 23:20, 22 December 2008 (UTC)
* Support. As per above. サラは、私を、私の青覚えている. Talk Contribs 23:21, 22 December 2008 (UTC)
Quick-fail per above (note that nominator's support is assumed and the FLC directors probably will not take the extra support into consideration). Also, please convert the ISO dates and expand the summaries before relisting. Dabomb87 (talk) 00:27, 23 December 2008 (UTC)
* Speedy fail – summaries are far less than adequate (short, poor prose, not comprehensive at all). I remember thinking about working on this list a few months ago (as I watched the series a while ago too), but writing 51 decent episode summaries was a bit daunting at the time. I highly doubt you can crank out 51 good episode summaries in the scope of this FLC. Aside from that, I detest List of Anime Episodes TV for the atrocious formatting, we don't autoformat dates anymore, lists shouldn't start with "This is...", the film doesn't deserve a mention anywhere here since it's not an episode, and the OVAs have no release dates. A host of problems that you can't solve in the scope of this FLC. Withdraw it. — sephiroth bcr ( converse ) 23:56, 22 December 2008 (UTC)
* Speedy fail per Sephiroth BCR and one of the list primary editors disagreeing with nomination before it was even made. List has way too many issues right now. -- Collectonian (talk · contribs) 00:04, 23 December 2008 (UTC)
* Speedy fail per Sephiroth, Collectonian, and Dabomb. Also, featured list standards increase continuously. Simply reverting to a revision that was featured and filling in missing episodes isn't gonna do the trick. The list as it is now has no chance of promotion. -- Goodraise (talk) 00:43, 23 December 2008 (UTC)
* Fail The standards for a featured list of episodes has evolved to include complete plot summaries for episodes. One sentence cannot summaries the entire plot of an episode. In fact, it was because of the too short episode summaries that was the primary reason the list to be demoted in the first place. Also the table format is far too cluttered compared to the table format of Japanese episode list. The funny thing is, the version before the nominator reverted the list was far closer to featured list standards then the version he "restored" and re-nominated. My suggestion would be to revert to this version and continue to work from there. --Farix (Talk) 00:50, 23 December 2008 (UTC)
* I've restored use of Japanese episode list as well as readded the English airdates which were improperly removed. However, the episode summaries are still too short and incomplete for this list to be promoted. --Farix (Talk) 02:24, 23 December 2008 (UTC)
* Looking over the article again, one other thing I notice missing is the lack of information about the series director, much less who directed and wrote the individual episodes. This information should be easily found since the series has been released in English. Also, the OP and ED songs and artist who performed them is missing from the article's lead along with the companies that produced the series. In fact, much of the information in Fullmetal Alchemist should also be mentioned in the list. --Farix (Talk) 13:14, 23 December 2008 (UTC)
* Speedy fail/Recommend withdrawal per Sephiroth BCR. The FLC listing is premature, and the list of issues are too numerous to quickly be fixed, especially the lack of proper episode summaries. Recommend reverting to this version (per Farix) and continuing work from there. G.A.S talk 10:25, 23 December 2008 (UTC)
| WIKI |
SEARCH
SEARCH BY CITATION
Keywords:
• DNA;
• electrochemistry;
• gold;
• in situ STM;
• metalloproteins
Abstract
We have briefly overviewed recent efforts in the electrochemistry of single transition metal complex, redox metalloprotein, and redox-marked oligonucleotide (ON) molecules. We have particularly studied self-assembled molecular monolayers (SAMs) of several 5′-C6-SH single- (ss) and double-strand (ds) ONs immobilized on Au(111) electrode surfaces via Au[BOND]S bond formation, using a combination of nucleic acid chemistry, electrochemistry and electrochemically controlled scanning tunnelling microscopy (in situ STM). Ds ONs stabilized by multiply charged cations and locked nucleic acid (LNA) monomers have been primary targets, with a view on stabilizing the ds-ONs and improving voltammetric signals of intercalating electrochemical redox probes. Voltammetric signals of the intercalator anthraquinone monosulfonate (AQMS) at ds-DNA/Au(111) surfaces diluted by mercaptohexanol are significantly sharpened and more robust in the presence than in the absence of [Co(NH3)6]3+. AQMS also displays robust Faradaic voltammetric signals specific to the ds form on binding to similar LNA/Au(111) surfaces, but this signal only evolves after successive voltammetric scanning into negative potential ranges. Triply charged spermidine (Spd) invokes itself a strong voltammetric signal, which is specific to the ds form and fully matched sequences. This signal is of non-Faradaic, capacitive origin but appears in the same potential range as the Faradaic AQMS signal. In situ STM shows that molecular scale structures of the size of Spd-stabilized ds-ONs are densely packed over the Au(111) surface in potential ranges around the capacitive peak potential. | ESSENTIALAI-STEM |
Pregnancy superstitions backed by science
Most of the folk wisdom that well-meaning older relatives offer up to expectant mothers can be easily ignored: Carrying the baby lower in the abdomen isn't a sign that it's a boy, or a girl, or anything other than an indication your abdominal muscles have loosened up a bit. Your cravings won't manifest themselves as birthmarks on the kid's skin. Long walks won't induce labor. And no, the full moon has nothing to do with the timing of the birth. But in recent years, a handful of studies have found that some of the most outlandish old ideas concerning babies and pregnancy may have some scientific merit after all. Here are a few that superstitious grandmothers everywhere can put in the win column. A long, difficult labor means the baby's a boy Researchers aren't quite sure why this one's true, but nonetheless: In 2003, a team of doctors analyzed more than 8,000 births at a single hospital in Ireland between 1997 and 2000, excluding women who delivered prematurely or needed to induce labor. When they crunched all the numbers, the difference between the sexes was small but noticeable. On average, labor for boy births lasted a little over six hours, while girl births took a little under six. Women delivering boys were also more likely to run into complications during delivery, requiring C-sections 6 percent of the time (compared to 4 percent for girls) and forceps in 8 percent of cases (as opposed to 6 percent). Overall, 29 percent of boy deliveries ended up requiring some sort of extra intervention; for girls, it was 24 percent. You really can get pregnant a second time while pregnant One possible reason for the discrepancy: Boys, on average, weigh three and a half ounces more at birth than girls do. And a small 2003 study found that women carrying boys also consume more calories during pregnancy, suggesting that male babies are a little more demanding even before delivery starts. To have a girl, stay away from bananas It's not just that women carrying boys will eat more; eating more in the lead-up to pregnancy may also make it more likely that the baby is a boy. In 2008, a study published in the journal Proceedings of the Royal Society Basked 740 women who were pregnant for the first time to describe their diets over the year before they conceived, then divided them into three groups based on calorie intake. The women in the top third of the study, calorie-wise, had boys 56 percent of the time; among the third that consumed the fewest calories, 55 percent had girls. 'Just relax' has always been bad advice for getting pregnant Here's where the old line about bananas -- that eating them before conception will up your chances of having a boy -- comes in. The study authors found that sheer calorie intake wasn't the only thing that made a difference; specific nutrients did, too. Eating plenty of potassium (which bananas are chock-full of) was linked to boys, as were diets high in calcium and sodium. Though as the Guardian noted, overhauling your diet to influence the sex of a future kid can be a risky move, health-wise, spurring people to overload on some nutrients and to ignore others -- a safer idea may be to focus on eating healthily in general, and leaving the rest up to chance. Heartburn is a harbinger of a hairy baby Here's a horrifying fact about babies: Sometime in the second trimester of pregnancy, they develop a coat of fine hair all over their bodies, called lanugo -- and sometime in the third trimester, they shed it and eat it. A baby's first poop, in fact, is the digested remains of their own body hair. Why superstitions help athletes perform better The hair on their heads, though, is another story. While all babies have lanugo in the womb, not all babies are born with anything up top -- and mothers looking to know ahead of time whether their kid will be fuzzy-headed or bald may be able to use their own heartburn as a clue. In 2006, for a study in the journal Birth, a team of researchers from Johns Hopkins University followed 64 women throughout their pregnancies, 28 of whom reported moderate or severe heartburn. Within that group, 23 women ended up having babies of average or above-average hairiness. On the opposite end of the spectrum, of the 12 women who reported no heartburn at all, ten of them gave birth to kids who were less hairy than the average newborn. But here's a perfect example of correlation not equaling causation. The heartburn wasn't a result of the hair, or vice versa. Rather, the study authors argued, both were caused by a third factor: pregnancy hormones. Specifically, the same hormones that contribute to hair growth in the womb have also been shown to relax the muscles that keep stomach acid contained in the stomach. So you can technically blame the baby for that fiery pain in your chest, but the link isn't quite as direct as the old wives' tale implies. | NEWS-MULTISOURCE |
From 1910 to 1920, it's estimated that as many as several thousand ethnic Mexicans were killed at the hands of law enforcement, such as the Texas Rangers, as well as by vigilantes.
“When I was meeting residents in Texas whose lives have been shaped by racial violence, they hadn’t forgotten the violence — state institutions had," said Muñoz Martinez, who was born in Uvalde, Texas, and is of Mexican descent.
Muñoz Martinez, an assistant professor of American and ethnic studies at Brown, continues to unearth early 20th-century accounts of racial violence in the Texas border area through a digital research project, histories that she says can also shed light on more current attitudes about the border and law enforcement.
She's a founding member of the nonprofit organization Refusing to Forget, which organizes exhibits and conferences around the issue. The group organized a 2016 exhibit at the Bullock Texas State History Museum that marked the first time a state cultural institution acknowledged state responsibility for this period of anti-Mexican violence. | FINEWEB-EDU |
Aasha Sundari
Aasha Sundari is a 1960 Kannada-language film, directed by Hunsur Krishnamurthy and produced and written by S. Bhavanarayana. The film starred Krishnakumari in the title role, besides Rajkumar, Harini and M. N. Lakshmi Devi in other pivotal roles. The film, produced under Gowri Productions, has musical score composed by Susarla Dakshinamurthi, with lyrics written by the director himself. Hunsur Krishnamurthy simultaneously made the movie in Telugu as Rama Sundari starring Kanta Rao. Rajkumar played dual role in a small portion of the movie where the second character appears only for few minutes.
Cast
* Rajkumar
* Krishnakumari
* Harini
* Narasimharaju
* M. N. Lakshmi Devi
* Rajasree
* Kantha Rao
* Hanumantha Rao
* Hemalatha
* Ramachandra Shastry
Plot
Yaksha Krishna Rao loves Mitravinda and asks her to marry and she is not showing love to him. Mitravinda is Yakshni Harini comes to Earth and watches princess Hemavathi Krishnakumari was dancing in shiva temple. She also dance with her and she is very fond of each other and become best friends. Prince Rajkumar is in love with his dream girl and he shows the painting to friend Narasimharaju. On the other end, to keep their friendship intact girls decided not to marry and become always friends. Prince will come to her kingdom and see her in garden and he trying to approach her. Yaksha will help Prince to love her and he will go to palace and keep his photo there. After wake up she will see photo which express his love to her and she falls in love. He will put his ring to her finger and she is love with her. One day Yakshini want to come to palace and YaIsha stops and tell that she is love with prince. She come and see both are in love. She gets angry and tell her their love won't happen. she will curse prince become mad and forgot princess. After seeing photo in her bedroom her father brings him to palace and punish him ask his army cut his head. Friend will come and stop that and they will go to forest. Her father sent princess to forest as she wants to leave with prince and Yakshini tells that prince is cruel and he makes your kingdom problematic. Princess will get help from Yaksha to make clear from madness curse given by Yakshni.
Soundtrack
The music was composed by Susarla Dakshinamurthi, with lyrics by Hunsur Krishnamurthy. | WIKI |
Ubique Barracks, Widnes
Ubique Barracks, Widnes is a military installation of the British Ministry of Defence occupied by the British Army located in Widnes, Cheshire WA8 6TH, England.
History
Following the reorganisation of the Territorial and Army Volunteer Reserve, a Light Air Defence Troop was formed at the (then) Territorial Army Centre, Widnes part of the also newly formed 213 (South Lancashire Artillery) Light Air Defence Battery. In 1986, following the formation of the Home Service Force (a home defence roled infantry force), a new detachment formed at the barracks part of A (Home Service Force) Battery. At this time the centre was expanded to the modern barracks.
As part of the Options for Change reform announced after the Dissolution of the Soviet Union, the Home Service Force Battery was disbanded, and the LAD troop based in Widnes reduced to the battery LAD, where it remained until 2001.
In 2001, an internal reorganisation of 103rd (Lancashire Artillery Volunteers) Regiment Royal Artillery saw the regimental Light Aid Detachment (LAD), Royal Electrical and Mechanical Engineers disperse and join each battery individually, leaving the barracks vacant.
In 2007 following the Future Army Structure programme whereas B (Cheshire) Company, 4th Battalion Mercian Regiment was based. This company was later to be disbanded by 2018, but under the Army 2020 Refine programme, the company remained at the location.
On 19 April 2018, a 'suspicious package' was notified to the Cheshire Constabulary, but this was later found to just be a false alarm.
Ubique Barracks forms part of Cheshire Garrison, a regional garrison overseeing all units based within the county of Cheshire.
Current garrison
The current garrison of the barracks includes the following:
British Army
* B Company, 4th Battalion, Mercian Regiment
Community Cadet Forces
* Widnes Detachment, Cheshire Army Cadet Force
* Widnes Sea Cadets
* 310 (Widnes) Squadron, Air Training Corps | WIKI |
Page:EB1911 - Volume 24.djvu/167
two storeys high, and include many fine specimens of Spanish colonial architecture; but the suburbs consist chiefly of wretched hovels and stretch out over a large area. Among the more notable public buildings are the cathedral and government palace fronting on the Plaza Mayor, the latter conspicuous for its façade of rose-coloured stone; the churches of El Carmen, San Francisco and Guadalupe; the La Paz theatre, mint, penitentiary and the Instituto Cientifico, in which law, medicine and science are taught. San Luis Potosí is an important railway and distributing centre, with a considerable trade in cattle, tallow, wool, hides and minerals. Its proximity to the port of Tampico, with which it was connected by a branch of the Mexican Central railway in 1885, has greatly increased its commercial importance, though in earlier days it was also one of the principal centres of the diligence and pack-train traffic of this part of Mexico. The city has cotton and woollen factories using modern machinery, and the smelting works of the Metallurgica Mexicana company, an American enterprise.
San Luis Potosí was founded in 1586. It was an important centre of colonial administration and played an important part in the civil wars and political disorders following Mexican independence. It was the seat of the Mexican government of Benito Juárez in 1863, but was soon afterwards captured by the French under Bazaine. It was recovered by Juárez in 1867, after the French had retired.
SAN MARINO, a republic in northern Italy, 14 m. S.W. of Rimini by road. Pop. (1901) about 1600 (town); 9500 (whole territory). It is the smallest republic in the world (32 sq. m. in area). According to tradition, the republic was founded by St Marinus during the persecutions under Diocletian, while his companion, St Leo, founded the village of that name 7 m. to the S.W., with La Rocca its old castle, now a prison, in which the impostor Cagliostro died in 1795. The history of S. Marino begins with the 9th century, the monastery of S. Marino having existed demonstrably since 885. In the 10th century a communal constitution was established. The republic as a rule avoided the faction fights of the middle ages, but joined the Ghibellines and was interdicted by the pope in 1247–1249. After this it was protected by the Montefeltro family, later dukes of Urbino, and the papacy, and successfully resisted the attempts of Sigismondo Malatesta against its liberty. In 1503 it fell into the hands of Caesar Borgia, but soon regained its freedom. Other attacks failed, but civil discords in the meantime increased. Its independence was recognized in 1631 by the papacy. In 1739 Cardinal Alberoni attempted to deprive it of its independence, but this was restored in 1740 and was respected by Napoleon. Garibaldi entered it in 1849, on his retreat from Rome, and there disbanded his army. The town stands on the north end of a precipitous rock (2437 ft.) which bears the name of Monte Titano; each of the three summits is crowned by fortifications—that on the north by a castle, the other two by towers. The arms of the republic are three peaks, each crowned with a tower. There are traces of three different enceintes, of the 14th, 15th and 16th centuries. The chief square, the Pianello, contains the new Palazzo del Governo in the Gothic style (1894) and a statue of Liberty (1876). The principal church (Pieve), in classical style, dates from 1826–1838, and contains the body of St Marinus. The old church, then demolished, is first mentioned in 1113, but was several times restored. S. Francesco has some paintings by Niccolo Alunno of Foligno and other later artists, and a pretty loggia. The museum contains a few pictures of various schools and some Umbrian antiquities. Bartolommeo Borghesi, the epigraphist and numismatist, resided here from 1821 until his death in 1860. The Borgo at the base of the rock is a chiefly commercial village.
The supreme power of the republic resides in the general assembly (Arringo) which meets twice a year. It is governed by two Capitani Reggenti, selected twice a year from the 60 life-members of the Great Council, which is composed of 20 representatives of the nobility, 20 of the landowners and 20 of the citizens. They are assisted by a small committee of 12 of the Great Council. The available armed forces of the republic form a total of about 1200 men, all citizens able to bear arms being technically obliged to do so from the age of 16 to 60 years. San Marino issues its own postage-stamps, and makes thereby a considerable income. It also issues its own copper coinage, which circulates in Italy also; but Italian money is current for the higher values. Most of the republic falls within the diocese of Montefeltro, a small portion within that of Rimini.
SAN MARTIN, JOSÉ DE (1778–1850), south American soldier and statesman, was born at Yapeyú on the Uruguay river on the 25th of February 1778. His father was a captain in the Spanish army, and young San Martin was taken to Madrid and educated for a military career. He served in the Moorish wars and in the great struggle against Napoleon, and his distinguished conduct at the battle of Baylen brought him the rank of lieutenant-colonel. In 1812 he offered his services to the government of Buenos Aires in the struggle for the independence of Argentina. He was appointed early in 1814 to the command of the revolutionary army operating against the royalists on the borders of Upper Peru. But he soon resigned his command, realizing that for the permanent success of the revolutionary cause it was necessary first to oust the Spaniards from Chile and then to organize an expedition thence against the stronghold of Spanish power on Peru. With this end in view he secured his appointment to the governorship of the province of Cuyo, bordering on the Chilean Andes, and established himself at Mendoza, where he prepared for the invasion of Chile. Assisted by Bernardo O'Higgins, he rallied the Chilean patriots who had fled across the mountains after their defeat at Rancagua; he enlisted the sympathies of the Argentine government, and after two years succeeded in raising a well-trained army of Chileans and Argentines and in collecting the material resources necessary for a crossing of the Andes. In January 1817 he set out on his enterprise. By the swiftness of his movements and by a clever feint he evaded opposition, and he led his army, of about 3000 infantry and 1000 cavalry, together with artillery and large baggage trains, through a barren and difficult region, and over passes 13,000 ft. above sea-level. The victory of Chacabuco (Feb. 12, 1817) over the royalist army led to the re-establishment of a nationalist government at Santiago under Bernardo O'Higgins, as San Martin himself wished to prepare for the invasion of Peru; but in 1818 he took command of the Chilean forces against a fresh royalist army, and by his victory at the river Maipo in April finally secured the independence of Chile. This left him free to organize the expedition against Peru, and assisted by O'Higgins and the Argentine government, he procured the necessary fleet and the army. He set out in August 1820, landed his forces for a short time at Pisco, where he tried to enter into negotiations with the Viceroy of Lima, and then transported his army with the help of the fleet to a point on the coast a little way north of Lima. Here he spent several months of inaction, hoping that the demonstration of force and the influence of popular feeling would lead to a peaceful withdrawal of the Spaniards. In July 1821 the Spaniards evacuated Lima, San Martin entered the city, proclaimed the independence of Peru and assumed the reins of government with the title of Protector. His position, however, was far from secure. The royalist party, never having been decisively crushed, organized risings in the interior, and San Martin was embarrassed by the jealousy which his authority roused among the patriots, and by the rivalry of Bolivar, who had arrived with an army on the northern frontier of Peru. San Martin resigned his authority on the 20th of September 1822 and left the country. He spent a short time in Chile and in Argentina, but his many enemies had embittered popular feeling against him, and constant attempts were made to involve him in political intrigues. Unable to live a peaceful private life, he was compelled to exile himself in Europe, where he lived, often in great poverty, till his death at Boulogne on the 17th of August 1850.
San Martin did more than any man for the cause of independence in the Argentine, Chile and Peru. He was not only an able soldier; in | WIKI |
Writing and deleting text file lines, and bubble sorting alphabetically
Question:
How can I write and delete individual lines of a text file?Also, how can I bubble-sort the whole text file alphabetically?
Answer:
There is no support in thelanguage to do either of these things.
However, there are many tricks that one can perform to make them happen. One is to handle all manipulations to the file in memory, then write the fileafter it has been manipulated. Here is an example of a function that deletes some lines from a file and writes it back.
#include #include void deleteLine(char *lines[],int lineNo){ lines[lineNo-1][1] = ‘’ ; // zero out the first char on line to be deleted}void writeFile(char *lines[],int maxLines,ostream &outFile){ for (int i = 0; i < maxLines; ++i) if (lines[i][1] != '') // don't write deleted lines outFile << lines[i] << endl;}int main (){ char *lines[80]; // max number of lines is 80 // allocate space and zero out chars. for(int i = 0; i < 80; ++i) { lines[i] = new char[80] ; // each line holds 80 chars lines[i][1] = ''; } ifstream inFile("testFile.txt"); for(int j = 0; inFile.getline(lines[j],80) && j < 80; ++j) ; deleteLine(lines,2); ofstream outFile("testFile.out"); writeFile(lines,80,outFile); return 0;}
In this example I am writing out to a different file so that you can compareoutput easily with the input. This can be easily modified to write to the samefile. You can also use the same method to sort your file; all you have to do is sort char *lines[] before calling writeFile.
Share the Post:
Share on facebook
Share on twitter
Share on linkedin
Overview
The Latest
iOS app development
The Future of iOS App Development: Trends to Watch
When it launched in 2008, the Apple App Store only had 500 apps available. By the first quarter of 2022, the store had about 2.18 million iOS-exclusive apps. Average monthly app releases for the platform reached 34,000 in the first half of 2022, indicating rapid growth in iOS app development.
microsoft careers
Top Careers at Microsoft
Microsoft has gained its position as one of the top companies in the world, and Microsoft careers are flourishing. This multinational company is efficiently developing popular software and computers with other consumer electronics. It is a dream come true for so many people to acquire a high paid, high-prestige job
your company's audio
4 Areas of Your Company Where Your Audio Really Matters
Your company probably relies on audio more than you realize. Whether you’re creating a spoken text message to a colleague or giving a speech, you want your audio to shine. Otherwise, you could cause avoidable friction points and potentially hurt your brand reputation. For example, let’s say you create a | ESSENTIALAI-STEM |
Bleeding into the Skin | Sickness Finder
Bleeding into the Skin
What is bleeding into the skin?
When a blood vessel bursts, a small amount of blood escapes from the vessel into the body. This blood may show up just beneath the surface of the skin. Blood vessels can burst for many reasons, but it usually happens as a result of an injury.
Bleeding into the skin can appear as small dots, called petechiae, or in larger, flat patches, called purpura. Some birthmarks can be mistaken for bleeding into the skin. Normally, when you press your skin it becomes pale, and when you let go, the redness or color returns. When there is bleeding into the skin, the skin will not become pale when you press down on it.
Bleeding beneath the skin often results from a minor occurrence, such as bruising. The bleeding can appear as a small dot the size of a pinprick or as a patch as large as an adult hand. Bleeding into the skin may also be the sign of a serious medical condition. Always see a doctor about bleeding into the skin that is not related to an injury.
What causes bleeding into the skin?
Common causes of bleeding into the skin are:
• injury
• allergic reaction
• infections of the blood
• autoimmune disorders
• birth
• bruises
• medication side effects
• chemotherapy side effects
• radiation side effects
• normal process of aging
Certain infections and diseases can cause bleeding under the skin, such as:
• meningitis, an inflammation of the membranes covering the brain and spinal cord
• leukemia, a cancer of the blood cells
• strep throat, a bacterial infection that causes a sore throat
• sepsis, a body-wide inflammatory response to bacterial infection
If you experience any of the following symptoms seek medical care immediately:
• pain in the area of bleeding
• significant bleeding from an open wound
• a lump over the bleeding into the skin
• darkening of the skin affected
• swelling in the extremities
• bleeding gums, nose, urine, or stool
How a doctor determines the cause of bleeding into the skin
If you develop bleeding into the skin with no known cause or that doesn’t go away, contact your doctor immediately, even if the patches of blood are not painful.
Bleeding into the skin is easily identified through a visual inspection. However, to determine a cause, your doctor will need more information about the bleeding. After reviewing your medical history, your doctor will ask the following questions:
• When did you first notice the bleeding?
• Do you have any other symptoms?
• When did these symptoms begin?
• Do you play any contact sports or use heavy machinery?
• Have you recently injured the affected area?
• Does the area of bleeding hurt?
• Does the area itch?
• Do you have a family history of bleeding disorders?
Your doctor will also ask if you have any medical conditions or if you’re being treated for anything. Make sure to let your doctor know if you are taking any herbal supplements or medications. Drugs such as aspirin, steroids, or blood thinners can cause bleeding into the skin. Answering these questions as accurately as possible will give your doctor clues about whether the bleeding under the skin is a side effect of medication you are taking or was caused by an underlying medical condition.
The doctor may give you a blood or urine test to check for the presence of infection or other medical conditions. If necessary, the doctor will also perform an imaging scan or an ultrasound of the area to diagnose any fractures or tissue injuries.
Treatments for bleeding into the skin
Depending on the cause, there are many different treatment options available for bleeding into the skin. Your doctor will determine which treatment option is best for you.
If you have any infections or medical conditions, prescription medication may be offered. This may be enough to stop the bleeding. However, if medications are causing the bleeding, your doctor may recommend switching medications or discontinuing the use of your current medication.
Contact your doctor immediately if you experience a recurrence of bleeding into the skin after treatment.
Home treatments
If the bleeding into the skin was caused by an injury, there are at-home treatments that can help you heal.
• elevate the injured limb, if possible
• ice the injured area for 10 minutes at a time
• use acetaminophen or ibuprofen for pain relief
Make an appointment with your doctor if your injury hasn’t started to heal.
Outlook for bleeding into the skin
Bleeding into the skin caused by minor injuries should heal without treatment. A doctor should evaluate bleeding into the skin that wasn’t caused by an injury. This could be a symptom of a serious condition.
Share your experience: | ESSENTIALAI-STEM |
Athletics at the 2018 Asian Games – Women's heptathlon
The women's heptathlon event at the 2018 Asian Games was held at the Gelora Bung Karno Stadium, Jakarta, Indonesia on 28–29 August. The event was won by Swapna Barman from India.
Schedule
All times are Western Indonesia Time (UTC+07:00)
Results
* Legend
* DNF — Did not finish
* DNS — Did not start
* NM — No mark
100 metres hurdles
* Wind – Heat 1: +1.2 m/s
* Wind – Heat 2: −0.1 m/s
200 metres
* Wind – Heat 1: −0.5 m/s
* Wind – Heat 2: −0.1 m/s | WIKI |
The Heiji Disturbance
Between 1142 and 1159, the emperors of Japan battle with the Fujiwara clan for power, and the Taira and Minamoto join the fight
IN 1142, a three-year-old boy was crowned emperor of Japan.
His name was Konoe, and no one expected him to actually rule; two retired emperors were already battling over that privilege. In fact, Japan was suffering from an embarrassment of emperors.
BY THE ELEVENTH CENTURY, members of the ambitious and powerful Fujiwara clan had dug themselves firmly into top positions in the Japanese government. Generation after generation, imperial princes had married Fujiwara brides. Fujiwara ministers of state, usually close male relations of the reigning empress, dominated weak or young rulers. Emperor after emperor was crowned and then retreated behind the scenes to pursue poetry and luxurious living, political ceremony and religious ritual.*
In 1068, the emperor Go-Sanjo—a younger half brother, unexpectedly crowned after the premature death of his older sibling—had broken the pattern.
Unlike the string of emperors who came before, Go-Sanjo did not have a Fujiwara mother. And resentment of the Fujiwara ministers—who had, more often than not, ruled Japan as though the entire country were a private estate intended for their pleasure—had been gathering for decades. “Emperor Go-Sanjo’s reign came at the time of a sharp turn into the Final Age,” explains the thirteenth-century Japanese history known as the Gukansho. “[He] had come to think and feel that people would no longer be at peace . . . if Regents and Chancellors continued to dominate the state, and if Emperors concerned themselves only with that which was elegant.”1
The Fujiwara clan was not the only threat to Japan’s peace. Over the previous century, noble families throughout the large central island of Honshu had been building private power. Both the Minamoto clan in the northeast and the Taira to the southwest had accumulated personal armies, granting land to local soldiers in exchange for military service: these warriors, bound by ties of loyalty to their landlords, were the samurai.*
By the time of Go-Sanjo’s coronation, local samurai militias had grown to rival any force that could be mustered by the emperor’s decree. And another host of warriors could join the game at any moment. Since the tenth century, the wealthy Buddhist monasteries in the cities of Kyoto and Nara had suffered from the attacks of local warlords looking to fill their pockets. In reaction, the monasteries had begun to recruit monks from the ranks of Japanese mercenaries and convicted criminals: the sohei, or warrior monks, chosen for the monastic life solely because they were good with their weapons.2
This was a potent mix of sword-happy men, and the emperor Go-Sanjo had to proceed carefully with his reforms. He started out by establishing a brand-new government department, called the Records Office, that required all landholders to register proof that they owned their land; this was supposed to quell the Fujiwara tendency to use public land for the recruitment of private soldiers. (The Gukansho remarks that the “entire country” had begun to seem like the estate of the Fujiwara chancellor.) He promoted a score of Minamoto officials into higher positions at court. And he did his best to organize a line of succession that would place sons of non-Fujiwara mothers on the throne. His own empress, mother of his oldest son, Imperial Prince Shirakawa, was Fujiwara, but from a much less notable branch of the family; his second son was the child of one of his lesser wives, a Minamoto daughter.3
Go-Sanjo remained on the throne only four years and then abdicated, aged thirty-nine. He had no intention of giving up his influence, though. He married Shirakawa to a Minamoto bride, supervised his coronation at age twenty-one, and then pushed through the appointment of his second son, the child with no Fujiwara connections, as Imperial Prince and heir. Then he remained behind the scenes, advising his sons and thwarting all attempts of the Fujiwara chancellor to control them.*
He was able to do this for only a few months, dying unexpectedly before his fortieth birthday. But the sharp turn he had given to Japan’s power structure survived. Shirakawa followed in his father’s footsteps, refusing to obey his chancellor and favoring Minamoto and Taira courtiers over the Fujiwara. And like his father, he abdicated at the height of his power, handing over the throne at age thirty-three and taking monastic vows. But he continued to rule actively from his monastery, exercising as much control over his young successors—first his son Horikawa and then his grandson Toba—as the Fujiwara regents had once done. It was said by his subjects that there were only three things the retired emperor could not control: the floods of the wild Kamo river, the troublesome warrior monks who lived on Mount Hiei, and the throw of the dice.4
This was the beginning of a two-hundred-year tradition of Cloistered Emperors, during which emperors abdicated at the height of their powers, leaving the throne to child heirs, and then went on ruling from behind the scenes. Everyone knew who was in charge: “After Shirakawa’s abdication,” says the Gukansho, “the state was governed for a long time by Retired Emperors.”5
9.1 Japan under the Cloistered Emperors
It was not an entirely impractical system. The Cloistered Emperor regime neatly divided time-consumingritual duties (ceremonially important but politically pointless) from the equally time-consuming duties of actual governance. The sovereign on the throne took care of the first; the ruler in the monastery, the second. It also preserved an appearance of cooperation between the emperor-in-name and his Fujiwara advisor, while the actual power struggle between king and Fujiwara clan went on, more or less, in private.
But the Cloistered Emperor system also, inevitably, multiplied the battles for power within the royal family itself.
WHEN THE THREE-YEAR-OLD Emperor Konoe was crowned in 1142, the imperial household was already filled with crackling hostilities.
Those hostilities had unfolded over three generations. Back in 1107, the emperor of Japan had been four-year-old Toba; the Cloistered Emperor, wielding the real power from the traditional monastery, was Toba’s imperious and long-lived grandfather Shirakawa. When Toba reached his teens, Shirakawa arranged for him to marry the beautiful teenaged Shoshi—his own adopted ward. Court gossip said that Shoshi was much more than Shirakawa’s ward. When Shoshi gave birth to a son and heir in 1119, the baby was generally assumed to be Shirakawa’s, even though Toba claimed the child as his own.6
The rumors got an imperial stamp of approval in 1123, when Shirakawa forced Toba to abdicate in favor of the four-year-old boy, who now became Emperor Sutoku. This relegated Toba, still just twenty-three, to a completely powerless position; he was now a Cloistered Emperor, but he was junior to his vigorous grandfather and inferior to his crowned son. Toba simmered in impotent resentment until Shirakawa finally died in 1129.
Once able to assume the real power of a Cloistered Emperor, Toba allowed his son-in-name to stay on the throne. But in 1139, Toba’s favorite wife, Tokuko, finally gave birth to a son—Konoe, his actual flesh and blood. Three years later, Toba forced Sutoku to abdicate in Konoe’s favor—just as he himself had been forced to abdicate in Sutoku’s favor, twenty years before.
9.1 Family line of Konoe and Sutoku.
This put Sutoku in exactly the same position Toba had occupied, all those years: junior Cloistered Emperor, powerless, resentful. Given the various hatreds and ambitions flying around the court, it is perhaps surprising that Konoe lasted thirteen years before someone slipped poison into his food.
At Konoe’s death, in 1155, Toba proposed that his next son (barring Sutoku, of course) become the new emperor; Sutoku objected, proposing either himself or his own oldest son as the logical candidate. Toba, who had more soldiers, won the argument; his son Go-Shirakawa (“Shirakawa the Second”) became the new emperor, and peace briefly descended on the royal house. “While Toba was alive,” the Gukansho tells us, “no rebellions or wars broke out.”7
But Toba died barely a year later. Before his funeral had even ended, the courtiers, clan leaders, and samurai were lining up behind the rival brothers, Go-Shirakawa and Sutoku had commandeered two different royal palaces to use as their respective headquarters, and the capital city was preparing for war.
The sides did not break neatly along clan lines. Taira and Minamoto clan members could be found in both armies, as could Fujiwara officials. Sutoku’s right-hand commander was the Minamoto clan leader Tameyoshi, accompanied by his son Tametomo. In The Tale of Hogen, an account of the struggle written in the early fourteenth century, Tametomo is a superhero, more than seven feet tall: “Born to archery, he had a bow arm that was some six inches longer than the arm with which he held his horse’s reins . . . [and he used] a bow that was more than eight and a half feet in length.” Tametomo’s skill was restricted, though, by the presence of his brother Yoshitomo on the other side; Yoshitomo had been one of the first courtiers to declare himself a supporter of Go-Shirakawa, and had put four hundred hand-chosen samurai warriors at the emperor’s disposal.8
The two sides finally met in battle on the night of July 29, 1156, in a brief and violent clash known afterwards as the Hogen Incident.* Tametomo picked off a number of warriors on the opposing side, but his brother Yoshitomo had the brilliant idea of sending an arsonist in to set Sutoko’s headquarters on fire. As the Cloistered Emperor’s men scrambled away from the flames, Go-Shirakawa’s archers took them down, one at a time. “Those who were afraid of the arrows and terrified by the flames even jumped into the wells in large numbers,” the Tale of Hogen says, “and of these, too, the bottom ones in a short time had drowned, those in the middle had been crushed to death by their fellows, and those on top had been burned up by the flames themselves.”
Sutoku’s forces were scattered, and the Cloistered Emperor himself was arrested and exiled. Yoshitomo had his own father put to death—a cold-blooded and vicious decision that, says the Gukansho, caused “some commotion around the country.” Tametomo was allowed to live, but the sinews of his arms were cut so that he could no longer use a bow.9
Minamoto Yoshitomo considered himself the architect of Emperor Go-Shirakawa’s victory, but when the normal business of government resumed, a Taira clan member named Kiyomori (who had joined the emperor’s cause after Yoshitomo) managed to gain a higher position at court, and the emperor’s apparent favor. Before long, Yoshitomo and Kiyomori were at odds; and the hostility between them was fanned by a Fujiwara clansman named Nobuyori, who himself felt unappreciated by the emperor. “Having noted rivalry between Minamoto Yoshitomo and Taira Kiyomori,” theGukansho explains, “and having assumed that the victor in a war between them would seize control of the state, he allied himself with Minamoto Yoshitomo . . . and began immediately to plot a rebellion.”10
The inevitable fight—the Heiji Disturbance—broke out in 1159.
Go-Shirakawa had just abdicated in favor of his teenaged son, who became the emperor Nijo; Yoshitomo and Nobuyori waited until their Taira rival Kiyomori left the capital city Kyoto on a pilgrimage of devotion to Kumano, a sacred site nearly 175 miles of mountainous road away. When he was well away, five hundred Minamoto samurai surrounded the palace of the Cloistered Emperor Go-Shirakawa, took him prisoner, and set his palace on fire. Others kidnapped the young emperor.
9.2 Detail from the Heiji Scroll: Burning of the Sanjo palace.
Credit: Werner Forman / Art Resource, NY
Their intention was to force both rulers into declaring the absent Taira Kiyomori an enemy of the state, thus throwing the entire Taira clan into disfavor. But Kiyomori, getting word of the coup, came thundering back into Kyoto at the head of a thousand hastily gathered samurai, all loyal to the Taira cause. The conspirators were quickly overwhelmed. Young Emperor Nijo was rescued; the Cloistered Emperor escaped; and the troops of Minamoto Yoshitomo and Fujiwara Nobuyori, falling like leaves, finally scattered in the face of the Taira attack.
Nobuyori was taken prisoner, and Kiyomori ordered him taken to a nearby riverbed and beheaded. Yoshitomo managed to escape, during the battle, and fled barefoot to the south with his faithful retainer Masakiyo. But when it became clear that capture and execution was inevitable, he asked Masakiyo to behead him. Masakiyo reluctantly obeyed and then killed himself. When the pursuers caught up to the two corpses, they took Yoshitomo’s head back to Kyoto and hung it in a tree beside the imperial prison.11
In the aftermath of the Heiji Disturbance, Taira Kiyomori executed or exiled almost every important member of both rival clans. In the span of twenty years, the power of the Fujiwara had collapsed. Now the Taira clan was rising; but the Cloistered Emperor still controlled the palace, and the other clans waited their chance for revenge.
* In 884, the Fujiwara official Mototsune invented for himself the post of kampaku, or “civil dictator.” The kampaku had as much authority over a grown emperor as a regent, or sessho, had over a child ruler. By the twelfth century, the titles sessho and kampaku seem to have often been used interchangeably, but the highest post in government—with authority over the throne itself—was almost always held by a Fujiwara official. See, for example, Ivan Morris, The World of the Shining Prince: Court Life in Ancient Japan (Alfred A. Knopf, 1964), pp. 48ff.
* Stephen Turnbull provides a useful definition: “The actual definition of a samurai changed considerably throughout his history, so the reader is recommended to see the samurai initially as a high-ranking warrior in service to a master. To think of a samurai as a Japanese knight is a helpful analogy.” See The Samurai: A Military History (1977), pp. ix and following.
* Shirakawa’s younger brother died before he could take the throne, and Shirakawa’s own son became heir; he inherited the throne in 1087 as Emperor Horikawa. Because Horikawa was the son of a Minamoto mother, though, Go-Sanjo’s intentions were carried out. Horikawa died in 1107 at the young age of twenty-eight, before he was able to abdicate in favor of his young son Toba; so when Toba was coronated, Shirakawa continued to serve as Cloistered Emperor.
* Both the Hogen Incident and the Heiji Disturbance, three years later, were named after the eras in which they occurred. In Japan, a new era was often declared when a new emperor was crowned (the Hogen Era began with the coronation of Go-Shirakawa; the Heiji Era began with Emperor Nijo), but a catastrophe, triumph, or new discovery might also be marked with a new era name. | FINEWEB-EDU |
Open Access Open Access Restricted Access Subscription or Fee Access
DOI: http://dx.doi.org/10.11646/zootaxa.4138.3.9
A cryptic new species of Indigo Snake (genus Drymarchon) from the Florida Platform of the United States
KENNETH L. KRYSKO, MICHAEL C. GRANATOSKY, LEROY P. NUÑEZ, DANIEL J. SMITH
Abstract
Indigo Snakes (genus Drymarchon) occur from northern Argentina northward into to the United States, where they inhabit southern Texas and disjunct populations in Mississippi, Florida and Georgia. Based on allopatry and morphological differences Collins (1991) hypothesized that the two United States taxa—the Western Indigo Snake, D. melanurus erebennus (Cope, 1860), and the Eastern Indigo Snake, D. couperi (Holbrook, 1842)—deserved full species recognition. Building upon this hypothesis with molecular and morphological analyses we illustrate that D. couperi is split into two distinct lineages. Based on the General Lineage Concept of Species, we describe the lineage that occurs along the Gulf coast of Florida and Mississippi as a new species, Drymarchon kolpobasileus. The new species is distinguished from D. couperi by a suite of morphological features, including a shorter and shallower head, deeper and shorter 7th infralabial scales, and shorter temporal scales. Overall, the presence of a deep 7th infralabial scale provides the best univariate identifier of D. kolpobasileus sp. nov. This study illustrates the usefulness of using both morphological and genetic data in refining accurate descriptions of geographical distributions.
Keywords
Reptilia, Colubridae, D. couperi, D. melanurus, Drymarchon kolpobasileus sp. nov., Indigo Snakes, morphology, phylogenetics, Pleistocene, Pliocene, Serpentes, United States
Full Text:
PDF/A (6.18 MB)
Refbacks
• There are currently no refbacks.
ISSN 1175-5326 (Print Edition) & ISSN 1175-5334 (Online Edition)
Published by Magnolia Press, Auckland, New Zealand
A founding journal of Biotaxa | ESSENTIALAI-STEM |
James Freeling
Sir James Robert Freeling, 7th Baronet (3 June 1825 – 30 October 1916) was an English first-class cricketer and clergyman.
The son of John Clayton Freeling, he was born at Marylebone in June 1825. He was educated at Winchester College, before going up to Exeter College, Oxford in 1844. A year prior to going to Oxford, Freeling had made his debut in first-class cricket for the Marylebone Cricket Club (MCC) against Oxford University at Bullingdon, also playing for the MCC in return fixture at Lord's. In 1844, he made a single appearances for Oxford University against the MCC at Lord's. He scored a total of 34 runs in his three first-class matches, with a high score of 18. He transferred from Exeter College to Durham University, where he completed his studies.
After leaving Durham, Freeling took holy orders in the Church of England. His first ecclesiastical post was at Ely, where he was a deacon in 1852. Later in 1852, he was appointed curate at Farley in Wiltshire, a post he held until 1855. In 1861, he became the curate of Sharnbrook, Bedfordshire which he held until 1868. After holding ecclesiastical posts in England, Freeling held posts on the continent, at Chantilly in France from 1868 to 1870, Brussels in Belgium from 1870 to 1877, and Bonn in Germany from 1878 to 1882. He succeeded his cousin, Sir Harry Freeling, as the 7th Baronet of the Freeling baronets in 1914. Freeling died at Brussels in October 1916 and upon his death, he was succeeded as the 8th Baronet by Sir Clayton Freeling. | WIKI |
Solved
Iterative function
Posted on 1997-11-07
4
1,245 Views
Last Modified: 2008-03-10
I am trying to figure out an exercise out that tries to take a copy
function(below) and make it into an iterative function of postorder traversal
that does not have any recursion. I think using a stack is appropriate
isn't it? Any ideas?
typedef struct node *tree_pointer;
typedef struct node
{
int data;
tree_pointer left_child, right child;
};
tree_pointer copy (tree_pointer original)
/*this function returns a tree_pointer to an exact copy of the original
tree*/
{
tree_pointer temp;
if(original)
{
temp=(tree_pointer)malloc(sizeof(node));
if (IS_FULL(temp)) /*IS_FULL is a macro*/
{ fprintf(stderr, "the memory is full\n");
exit(1);
}
temp->left_child = copy(original->left_child);
temp->right_child=copy(original->right_child);
temp->data=original->data;
return temp
}
return NULL;
}
0
Comment
Question by:ricco
• 2
4 Comments
LVL 84
Expert Comment
by:ozo
ID: 1256189
I think using a stack is very appropriate.
(But if you don't want to use the program stack, it may be convenient
to use the tree itself as a stack by adding a parent pointer)
0
LVL 2
Expert Comment
by:kellyjj
ID: 1256190
I agree with ozo. for doing a tree, a stack is a good idea. though I would say recursion would be faster and less code.
0
LVL 84
Expert Comment
by:ozo
ID: 1256191
(since recursion naturally comes with a very nice automatic stack)
0
LVL 4
Accepted Solution
by:
emmons earned 100 total points
ID: 1256192
If you use a stack, are you not going to end up with a program that looks really close to this recursive program, but you will handle the recursion yourself? Will this satisfy the assignment?
You walk down the tree and at every branch you push the reference to that branch onto a local stack, then, when you can't go down any more, you pop it off the stack and proceed with the right branch. I am not sure that I see the advantage of this algorithm over the recursive one iin your example.
I am thinking that you are going to want to do a tree walk and create a tree that has backwards links on it as you go. This would make it so that you would not use the stack (which is really just another way of implementing recursion.) It would be a bit more of a memory hog during the copy, but it would be a completly different mechanism.
0
Featured Post
PRTG Network Monitor: Intuitive Network Monitoring
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
Question has a verified solution.
If you are experiencing a similar issue, please ask a related question
Preface I don't like visual development tools that are supposed to write a program for me. Even if it is Xcode and I can use Interface Builder. Yes, it is a perfect tool and has helped me a lot, mainly, in the beginning, when my programs were small…
Summary: This tutorial covers some basics of pointer, pointer arithmetic and function pointer. What is a pointer: A pointer is a variable which holds an address. This address might be address of another variable/address of devices/address of fu…
The goal of this video is to provide viewers with basic examples to understand and use pointers in the C programming language.
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use while-loops in the C programming language.
770 members asked questions and received personalized solutions in the past 7 days.
Join the community of 500,000 technology professionals and ask your questions.
Join & Ask a Question | ESSENTIALAI-STEM |
Alejandro Peña Esclusa
Alejandro Peña Esclusa (born 3 July 1954) is a Venezuelan writer, analyst and political consultant, expert on the subject of the São Paulo Forum, about which he has written five books. The most sold of them is entitled The Cultural War of the Sao Paulo Forum, which has been translated from Spanish into English, Portuguese, Italian, Slovenian and Hungarian.
He is a mechanical engineer by profession, graduated in 1977 from the Universidad Simón Bolívar, in Caracas. He studied financial administration at the Instituto de Estudios Superiores de Administración in Caracas, in 1981, and completed a master's degree in security and defense at the Instituto de Altos Estudios de Defensa Nacional de Venezuela, in 1987.
He is president of the NGO Fuerza Solidaria and founder of the Unión de Organizaciones Democráticas de América (UnoAmerica). In 1998 he was a candidate for the presidency of Venezuela. He was the first to denounce Hugo Chávez's links with Cuban Castro-communism and the Colombian guerrilla.
Pioneer of the first protests against Chávez, in 2010 he was imprisoned in El Helicoide, without trial to date. Political and social leaders, intellectuals, parliamentarians and bishops from different countries requested his release, expressing that it was a political persecution.
A year after his arrest, he was released due to international demands, but with a ban on leaving the country, carrying a passport, expressing an opinion on any subject, using social networks and engaging in political activities. His case was presented before the Inter-American Commission on Human Rights (IACHR) and before the International Criminal Court in The Hague. To date, he continues to be politically persecuted.
He has an in-depth knowledge of the regional reality and promotes the consolidation of democracies in the face of the expansionist threat of the Sao Paulo Forum. He is a fervent promoter of Ibero-American integration, as stated in another of his books, entitled The Continent of Hope.
Early life
Peña Esclusa was born 3 July 1954 in Washington, D.C., the son of a Venezuelan Army General, Enrique Peña Briceño. He graduated in mechanical engineering from the Universidad Simón Bolívar in 1977, and in 1980 obtained a postgraduate degree in finance from the Instituto de Estudios Superiores de Administración (IESA). In 1978 he won the national karate championships, and in 1981 gained a civil aviation licence. He married Indira Ramírez in 1989, and had three daughters.
Early years
Peña Esclusa dates his political awakening to 1984, when he investigated the beliefs of various political parties with the aim of joining one, but found none satisfactory. In 1985 he helped distribute Lyndon LaRouche's book Narcotráfico, S.A. ("Dope, Inc."), and by 1988 he was the leader of the Partido Laboral Venezolano (PLV, Venezuelan Labor Party), a party which he co-founded as the Venezuelan branch of LaRouche's International Caucus of Labor Committees, modelled on LaRouche's U.S. Labor Party. He split with LaRouche in spring 1998, describing him as a "LaRouche movement deserter" in 2009. Peña Esclusa himself dates the split to 1995. In 1997 the Stephen Roth Institute wrote that "Anti-Semitic propaganda is also disseminated by the Partido Laboral Venezolano (Venezuela Workers' Party), an affiliate of the Lyndon LaRouche cult."
Opposition to Chávez
According to his wife, Alejandro Peña Esclusa has been an opponent of Hugo Chávez ever since he denounced Chávez for being a front man for Fidel Castro in a 1994 book. He published an article in 1995 attacking the Foro de São Paulo, which Chávez' Fifth Republic Movement joined that year. Peña Esclusa entered the 1998 Venezuelan presidential election as a candidate for the Partido Laboral Venezolano (PLV), and was also a candidate on another occasion. Announcing his candidacy in July 1998, with Chavez already the front runner, he aimed to denounce Chavez and warn of the dangers of electing him. On 28 July 2000 Peña Esclusa formally accused Chávez of treason, denouncing him to the Attorney General, which rejected the claim.
In May 2001 Peña Esclusa founded the NGO Fuerza Solidaria. This organization coined the slogan "no to cubanization", and organised a range of political protests against Chávez, including a demonstration in front of the Cuban embassy. In February 2002 Peña Esclusa, on behalf of Fuerza Solidaria, called for the general strike being organised to be indefinite, until Chávez resigned. Following the mass demonstration of April 11, 2002, and the 2002 Venezuelan coup d'état attempt that resulted, he was briefly detained on suspicion of links to military officers allegedly involved. According to the Latin American Weekly Report, Esclusa was arrested and questioned for the 17 September 2002 publication of newspaper advertisements, sponsored by Fuerza Solidaria, urging the armed forces to "'restore constitutional order'" in the country by deposing President Chavez. Peña Esclusa himself has expressly denounced violence as a method, and said that he does not believe that violence could end Hugo Chávez's government, but that a peaceful mass movement could.
Traveling North and South America as well as Europe, Peña Esclusa has claimed that Chávez was allowing Russia and Iran to use Venezuela as a base for strategic bombers, submarines, warships, and long range missiles capable of reaching the United States. He has also alleged crimes against humanity perpetrated by the regime, and links with terrorist groups.
UnoAmerica
In December 2008 Peña Esclusa co-founded UnoAmerica, becoming its President. UnoAmerica describes itself as "a confederation of NGOs" working to combat Latin American left parties connected to the Sao Paulo Forum, which it accuses of "introduc[ing] Marxist ideological models that divide our societies into factions based on class and race, promoting hate, violence and anarchy" and, in some cases, of "destroying democracy from within".
UnoAmerica was one of the few organizations that endorsed as constitutional the deposing of president Manuel Zelaya during 2009 Honduran coup d'état, which involved Zelaya being arrested by the military acting on orders by the Supreme Court, removed from office and expelled from the country, and replaced by the person the constitution indicated as his successor, in this case the Speaker of the House Roberto Micheletti, as interim president. Peña Esclusa endorsed as constitutional the deposing of Zelaya, and said that "Only a process similar to that of Honduras can rescue democracy and freedom in Venezuela". He also said that “Venezuelans ought to be inspired by the Honduran model, and strive for a change of government as soon as possible, through peaceful, democratic, and constitutional means--and not just electoral--to avoid a national tragedy".
In August 2009, Peña Esclusa formally accused Venezuela's president Hugo Chávez before the International Criminal Court of crimes against humanity for his support of Manuel Zelaya's attempt to hold a referendum on whether to hold a Constituting Constitutional Convention in Honduras, which sparked the 2009 Honduran constitutional crisis, and for threatening to invade the country to reinstall Zelaya after he was deposed on June 28, 2009.
In November 2009 he was decorated with the "José Cecilio del Valle" medal by President Micheletti. Others decorated on that occasion were Armando Valladares and Juan Dabdoub Giacoman, who also had expressed public support for Honduras.
Controversies
In early July 2010, the Salvadoran Francisco Chávez Abarca was arrested in Venezuela. The Venezuelan authorities accused Peña Esclusa of being an accomplice in a plan to use violence to disrupt the 2010 parliamentary elections. In response Peña Esclusa posted a video online denying the accusations and said that he expected to be arrested within a day. That evening he was arrested in his home by the Bolivarian Intelligence Service (SEBIN), accused of possession of explosives. Peña Esclusa's wife declared that search officers planted explosives in the desk of the couple's eight-year-old daughter. His lawyer, Alfredo Romero, declared that the 13 members of the political police of violating his client's constitutional rights at the search and arrest by not allowing his lawyer to be present or to inspect the search order. Luis Cabrera, the presiding judge, ruled that the presence of the lawyer could lead to impunity, to which Romero commented, "This court has declared dead the right to defense in Venezuela."
Peña Esclusa was denied bail on 15 July 2010. The preliminary hearings were held January 27, 2011, and on February 7 the defense appealed. The defense has consistently objected to the fact that the court has denied every request to order the presence of the star witness of the prosecutor for cross-examination, since Francisco Chávez Abarca was sent to Cuba just before Peña Esclusa's arrest in accordance with an Interpol red notice. FuerzaSolidaria published Peña Esclusa's petition in court, in which he accused the judge of acting politically, and the prosecutor of lying about statements allegedly made by Chávez Abarca.
On March 29, 2011, Indira de Peña Esclusa and other wives of prisoners of Chávez petitioned the Inter-American Commission on Human Rights that their husbands should be recognized as political prisoners by OAS.
Opposition deputy María Corina Machado has declared that he is a prisoner due to his opinions. Cardinal Jorge Urosa of the Catholic Church in Venezuela has repeatedly declared that he is certain that Peña Esclusa is innocent and demanded his release. In a letter dated 2011, nine senators from Bolivia wrote to Hugo Chávez and demanded that he release Alejandro Peña Esclusa, whom they describe as being imprisoned illegally in order to silence him, and that he the time he was imprisoned was heading a group of lawyers who were preparing a prosecution of Hugo Chávez for Crimes Against Humanity.
Peña Esclusa was released from prison on 20 July 2011.
Books
* Government Program: How to make of Venezuela an industrial power
* 350: Cómo salvar a Venezuela del castro-comunismo, Caracas: Ediciones Fuerza Productiva, June 2005
* The Continent of Hope September 2006
* Classical art and good government
* The Foro de São Paulo: A Threat to Freedom in Latin America, Bogotá: Mary Montes Edition, February 2009
* The Sao Paulo Forum against Álvaro Uribe
* The Sao Paulo Forum, a Continental Threat
* The Sao Paulo Forum's Plan to Destroy the Armed Forces (compilation)
* From Chávez's dungeons
* The Sao Paulo Forum's cultural warfare (in its different editions and translations)
* The electoral frauds of the Sao Paulo Forum (in its different editions and translations) | WIKI |
Category:CS1 maint: url-status
This is a tracking category for CS1 citations that use url-status with a valid value when archive-url is empty or omitted. While not an error, CS1 and CS2 templates that have url-status but not archive-url should be repaired.
To repair, if the value is, either: or
* add both archive-url and archive-date (see WP:LINKROT and WP:Citing sources for more information),
* remove url-status.
To repair, if the value is, either: or
* add both archive-url and archive-date (see WP:LINKROT and WP:Citing sources for more information),
* remove url-status and add dead link after the citation template.
Otherwise, replace the citation or add archive-url and archive-date. Pages in this category should be added only by Module:Citation/CS1.
Pages with this condition are automatically placed in. | WIKI |
Energy Fixes: Tips to Boost Low Energy
Looking for more pep in your step? While fatigue is the symptom, let's look closer at the possible cause. Start by focusing on just one of these areas and feel your energy improve!
Get Enough Sleep
Let's start with the basics. If you aren’t getting enough sleep you may find it hard to maintain your energy throughout the day. The National Sleep Foundation found that 7-9 hours of sleep a day is optimal.1 Hard time falling asleep? Consider your “sleep hygiene” and everything that may affect your quality of sleep, which may include sleeping in a dark, quiet (or a white noise machine to block outside noise) room, keeping a cool temperature, and limiting screen time right before bed.
Exercise
Exercise is one of the best ways to boost energy levels and get a good night’s sleep. When you exercise, you burn energy which needs to be restored with sleep. Exercise causes the release of epinephrine and norepinephrine which are hormones that give us energy. So, if you find yourself feeling sleepy at your desk try a Hinge Health playlist or a brisk walk for a quick pick-me-up.
Limit Stress
We all have some stress in life, but the key is to limit it so that it doesn’t become constant or overwhelming. Some stress-reducing strategies are spending time with friends, practicing meditation or yoga, speaking with a therapist, or even hanging out with your favorite furry pal. Don’t let your to-do list drive you crazy. Ask for help at home or at work.2
Eat a Healthy and Balanced Diet
Specifically, choose a balance of high fiber carbohydrates including whole fruit, lean protein, healthy fats, and plenty of vegetables. Eating small snacks and meals throughout the day is ideal because eating one large meal can cause an energy drain. Limit sugar (especially sweet drinks and desserts) and refined carbohydrates like potato chips, white crackers, white bread, pastries and white noodles which can cause a spike in blood sugar and a crash in energy shortly after.3
Limit Alcohol
Even though alcohol has a sedative effect (causing you to be drowsy), it also interrupts normal REM cycle sleep, which is a restorative sleep cycle that helps you stay alert and attentive the next day. If falling and staying asleep is a challenge for you, consider an alcohol-free beverage.
Stay Hydrated
Drink water consistently throughout your day. When you get dehydrated, one of the first signs is feeling tired. Avoid that by drinking and refilling your water bottle every few hours.
Enjoy Caffeine in Moderation
Caffeine has been shown to increase energy levels and response time, but don’t overdo it. Too much caffeine can keep you awake at night causing a vicious cycle of sleepless nights and over-caffeination. To avoid this be sure to enjoy your caffeine in the first half of your day and skip the sugar sweeteners.
References:
1. The National Sleep Foundation. How Much Sleep Do We Really Need? Retrieved from https://www.sleepfoundation.org/excessive-sleepiness/support/how-much-sleep-do-we-really-need
2. American Psychological Association. Five Tips to Help Manage Stress. Retrieved from https://www.apa.org/helpcenter/manage-stress
3. Gidus, T. (2019, July 17th). Eating to Boost Energy. Retrieved from https://www.eatright.org/food/nutrition/healthy-eating/eating-to-boost-energy | ESSENTIALAI-STEM |
Denise DUNNING, Plaintiff, v. NATIONAL INDUSTRIES, INC., etc., et al., Defendants.
Civ. A. No. 88-T-908-N.
United States District Court, M.D. Alabama, N.D.
Aug. 9, 1989.
Kenneth T. Hemphill, Donald R. Harrison, Montgomery, Ala., for plaintiff.
E. Scott Smith, Ginger C. Reed, Ford & Harrison, Atlanta, Ga., and Bruce J. Dow-ney, III, Capell, Howard, Knabe & Cobbs, co-counsel, Montgomery, Ala., G. Paris Sykes, Jr., Ford & Harrison, co-counsel, Atlanta, Ga., for defendants.
MEMORANDUM OPINION
MYRON H. THOMPSON, District Judge.
Plaintiff Denise Dunning, an African-American woman and a former employee of defendant National Industries, Inc., brought this lawsuit on September 1, 1988, charging National Industries with employment discrimination in violation of 42 U.S. C.A. §§ 2000e through 2000e-17, popularly known as Title VII of the Civil Rights Act of 1964, as amended. Dunning makes the following claims. Her first claim is that National Industries discriminated against her because of her race and sex by transferring her against her will from one area of a company plant to another area. Her second claim is that the company discriminated against her because of her race and sex by forcing her to take an early maternity leave. Her final claim is that the company retaliated against her for having filed a charge of discrimination with the federal government by refusing to allow her to return to her job after the birth of her baby. The court’s jurisdiction has been properly invoked pursuant to 42 U.S.C.A. § 2000e-5(f)(3).
Based on the evidence presented at a nonjury trial of this cause, the court finds against Dunning on her first claim and in her favor on her third claim. The court further finds in Dunning’s favor on her second claim to the extent she charges race discrimination. Dunning is thus entitled to appropriate declaratory and injunctive relief.
I. BACKGROUND
Dunning worked for National Industries in its factory in Montgomery County, Alabama, for three and one-half years, from 1984 through 1987. Dunning worked on the “boards,” assembling wire harnesses for electrical systems. Like other employees working at the boards, Dunning had to stand upright in one place for long periods of time in front of the boards to construct the wire harnesses. The evidence showed that board work is difficult and physically demanding.
In late 1986, Dunning discovered that she was pregnant. Although she continued working, her pregnancy coupled with a change in workplace conditions affected her ability to work. In April 1987, National Industries’s management transferred Dunning from the area at the back of the plant where she had been working to another part of the plant. The boards in the area to which Dunning was moved were located near machinery used to mold plastic components for the electrical systems produced by the plant. Because these machines generated heat, temperatures in the new area were somewhat higher than in her former location. Dunning, who was especially sensitive to the heat because of her pregnancy, found work in the new location very uncomfortable. In addition, Dunning had to interrupt her work often to go to the restroom and to drink water. As a result of her discomfort and these frequent interruptions, Dunning’s work productivity declined.
On the first day that she worked at the boards near the molding machines, Dunning complained to the lead woman at her work area that the heat made her ill, and asked if she could get some ice to relieve her discomfort. The lead woman contacted the departmental supervisor, Dan Carden, about this request. Carden denied the request and brought Dunning to the office of James Collier, a plant supervisor. There, Dunning repeated her request for some ice. Collier denied this request, commenting that Dunning’s pregnancy “wasn’t his fault,” and asking her whether she had air conditioning at home or in her car. Dunning then asked if she could go home early that day. Collier replied that if Dunning did so, she would be fired. Dunning worked the rest of that day and two more days after that in the new location. She repeated her complaints about the heat to Carden. On the third day, Carden called Dunning in to his office to caution her that she was not meeting her production quota. Dunning asked to be transferred to an area of the plant with cooler temperatures and better ventilation, such as the area in which she had previously worked. Carden refused this request and stated that Dunning’s pregnancy was not his problem. Carden did tell Dunning that if she obtained a doctor’s excuse, then he would move her to a different part of the plant.
Dunning went to her doctor’s office the following morning and the doctor issued her a note stating that she was under his care and that she should not work near excessive heat. Dunning brought this note to James Collier at National Industries. James Collier forwarded the note to June Collier, National Industries’s president, and instructed Dunning to return to work. Later that day, Carden accompanied Dunning to June Collier’s office. June Collier rejected the medical excuse, refused Dunning’s request for a transfer, and informed her that she had four options. She could return to work, quit her job, accept a layoff, or take early maternity leave. Since National Industries would not accommodate her by moving her away from the molding machines, Dunning felt herself forced to choose early maternity leave as the least objectionable of four bad options.
Dunning gave birth to her child on July 12, 1987. She expected to return to work some time thereafter at National Industries. She had heard from other employees at the plant that she could return to work only with authorization from her doctor after a six-week checkup. . Dunning therefore made an appointment for such a checkup to be conducted on August 27, 1987. That appointment was postponed when Dunning’s physician had to perform an emergency delivery, however, and the check-up did not occur until September 11, 1987. Dunning experienced a further delay when the doctor’s office insisted on issuing an authorization slip stating that Dunning could return to work as of August, rather than as of September. Dunning wanted the statement to reflect her ability to return to work as of the time of the check-up, fearing that National Industries would suspect that she had stayed off work without justification beyond six weeks after her baby’s birth. During the delay in obtaining a statement from the doctor’s office, Dunning was in frequent contact with both the doctor’s office and National Industries. She informed National Industries’s personnel department of the delay in obtaining a work authorization, and that office responded that she would be able to return once she acquired the authorization. Dunning’s husband had also been in contact with National Industries, informing the company of her status and her expectation to return to work.
Meanwhile, Dunning had obtained legal advice from a staff attorney at the Legal Services Corporation of Alabama, regarding National Industries’s response to her complaints prior to taking maternity leave. With the help of this attorney, Dunning filed a complaint with the Equal Employment Opportunity Commission (EEOC) on August 24, 1987, alleging that National Industries had discriminated against her on the basis of her race and sex in refusing to grant her request for a transfer to a cooler area of the plant.
Dunning finally received a work authorization document from her doctor in mid-October 1987. She informed National Industries over the telephone that she had received the authorization, and soon thereafter Dunning and her husband went to the plant to submit the physician’s statement. Dunning’s husband went into the plant with the statement, while Dunning remained in the car with her baby. An employee at National Industries instructed Dunning’s husband to have Dunning report to work at the plant the following Monday with her doctor’s authorization. However, when Dunning called Monday morning before leaving for work, the personnel director informed her that she could not return to work at National Industries, and would have to reapply for a position at a starting wage below what she made prior to taking her maternity leave. Dunning then filed this suit.
II. DISCUSSION
Dunning challenges three distinct, though related, decisions by the defendants. First, she asserts that, on the basis of her race and sex, National Industries transferred her from the cooler area of the plant to the area near the molding machines. Second, she asserts that, on the basis of her race and sex, National Industries forced her to take early maternity leave without pay while she was still able to work. Finally, Dunning contends that National Industries refused to allow her to return to work after her leave because she had filed a complaint with the EEOC.
To determine whether Dunning has been a victim of discrimination and retaliation, the court applies the same analytical framework to each of the employment decisions challenged by Dunning. Donnellon v. Fruehauf Corp., 794 F.2d 598, 600 (11th Cir.1986). Under this framework, Dunning bears the initial burden of establishing by a preponderance of the evidence a prima facie case of a practice proscribed by Title VII: either race discrimination, sex discrimination, or retaliation. Many different articulations of the Title VII prima facie case exist, varying with the context of the employment decision and the type of proscribed practice involved. The essence of the prima fade case is that the employee presents circumstantial evidence sufficient to generate a reasonable inference by the factfinder that the employer used prohibited criteria in making an adverse decision about the employee. Thus, the unifying themes of the various manifestations of the prima facie case are that the employee is a member of a protected group and that the employer has treated that employee differently from other members outside that protected group under the same or similar circumstances, to the employee’s detriment.
If established, this prima facie case raises a presumption that the employer is liable to the employee under Title VII. Texas Department of Community Affairs v. Burdine, 450 U.S. 248, 101 S.Ct. 1089, 67 L.Ed.2d 207 (1981). The burden then shifts to the employer to rebut the presumption by producing sufficient evidence to raise a genuine issue of fact as to whether the employer did take unlawful action against the employee. The employer can meet this burden of production by articulating a legitimate, nondiscriminatory and nonretalia-tory reason for the employment decision, a reason which is clear, reasonably specific and worthy of credence. The rebuttal burden is one of production only, and the employer does not have to persuade the court that it was actually motivated by the proffered reason. Id., at 253-55, 101 S.Ct. at 1093-94; Tipton v. Canadian Imperial Bank of Commerce, 872 F.2d 1491, 1494-95 (11th Cir.1989).
Once the employer satisfies this burden of production, the focus shifts back to the employee’s ultimate burden of proving by a preponderance of the evidence that the employer’s proffered reason for its employment decision is a pretext for discrimination or retaliation. The employee may meet this ultimate burden by persuading the court either directly that a discriminatory or retaliatory reason more than likely motivated the employer or indirectly that the proffered reason for the employment decision is not worthy of belief. Burdine, 450 U.S. at 256, 101 S.Ct. at 1095. In the final analysis, the question is whether the employee, in this case Dunning, has demonstrated by a preponderance of the evidence that her employer, National Industries, discriminated or retaliated against her in violation of the strictures of Title VII.
A.
As to the first employment decision challenged by Dunning, the court finds that National Industries did not transfer Dunning to the boards near the molding machines because of her race or sex. Dunning has not even established a prima fa-cie case of discrimination. She has produced no credible evidence that white employees or male employees were treated differently from her regarding the transfer. Moreover, National Industries has articulated a persuasive, nondiscriminatory reason for transferring Dunning. Because the area where Dunning had worked before the transfer had become crowded, National Industries moved some boards, including Dunning’s, to a less crowded area of the plant. Dunning was simply moved along with her board. She has not shown this reason to be pretextual. The evidence establishes and the court finds that National Industries identified only boards that it wished to move, without regard to the identity of the employees stationed at those boards.
B.
Dunning next argues that, because of her race, National Industries refused to transfer her to a cooler area of the plant and effectively forced her to take early maternity leave without pay, when she could have continued working until a relatively short time before the birth of her child. The court agrees. As described in more detail below, Dunning proved a pri-ma facie case of such discrimination by presenting compelling evidence of how National Industries treated pregnant white women differently from her under similar circumstances.
National Industries accommodated two white women, Cecilia Skipper and Katie Moncrief, with light duty work because of their pregnancies. In Skipper’s case, she became sick during her pregnancy, and the company moved her at her request from the boards to “assembly work” which was not as physically difficult. The company also transferred Skipper without first demanding a doctor’s excuse. In the case of Moncrief, she could not meet required production levels on the boards and was frequently absent because of her pregnancy. National Industries did not require that she go on maternity leave or quit, but rather transferred her at her request to lighter duty work, such as “spot taping,” “plugging wires” and assembly work.
In rebuttal, National Industries’s president testified that the company’s beneficial policy toward pregnant women was limited to allowing them maternity leave without pay. She stated that the company did not accommodate pregnant women by transferring them to light duty positions. She stated further that she simply applied this neutral policy to Dunning. The court is convinced, however, that the reason given by National Industries’s president for application of the policy in Dunning’s case was a pretext for race discrimination. As shown above, the company accommodated two pregnant white women but did not do the same for Dunning. The court finds that this difference in treatment was based on the women's race.
In reaching this conclusion, the court has also considered the fact that National Industries has no written policy regarding maternity leave; indeed, the company has no written personnel policies at all. The company’s maternity leave policy, as described by June Collier, is as follows: The company, as stated earlier, does not provide any special accommodations to pregnant women at work. Instead, an employee may leave work within four weeks of the expected date of birth without a doctor’s excuse, but if she wishes to leave prior to four weeks before the due date, then she must have a medical excuse. An employee must present a doctor’s authorization when she returns to work at National Industries after the birth of her baby. She may return to work as soon as she desires and is able, but she must call the company six weeks after the birth of her child if she has not yet returned and wishes to remain on leave longer than six weeks. She must get a formal extension to remain off work past this six-week period, and must bring a doctor’s authorization with her when she returns.
Since the company has not taken the step of establishing a written personnel policy, it relies on verbal communication of the maternity leave policy to employees at the time of the hiring interview. The company does not consistently convey this information to its employees, however; several employees testified that they were not told a thing about maternity leave policy during their orientation, or afterward, except through the employee grapevine. The evidence also reflected that employees often forget the substance of the company’s maternity leave policy if several years pass between its oral rendition during orientation and the employees’ pregnancies.
June Collier, National Industries’s president, nevertheless testified that she preferred an unwritten personnel policy. And, of course, she was entitled to maintain the company’s policy in that form; Title VII does not require employers to set their personnel policies down in writing. Cf. Conner v. Fort Gordon Bus Co., 761 F.2d 1495, 1499-1500 (11th Cir.1985) (fact that employer has not reduced discharge standard to writing does not mean that the standard is too subjective to serve as justification). However, this court cannot overlook that unwritten policies, as opposed to written policies, can be easily turned into tools of discrimination. National Industries has no documentation of exactly what its personnel policy is; nor can it produce documentation reflecting that all employees are aware of the policy, or, if aware, that they understand the policy correctly. These circumstances allow for more discretionary, and therefore potentially more discriminatory, enforcement of the policy. Indeed, as stated, the court is convinced that National Industries enforced its unwritten policy in an intentionally discriminatory manner. The company’s rule of no accommodation for pregnant workers, other than early maternity leave, was enforced against Dunning but not against two white women.
C.
This leaves National Industries’s refusal to allow Dunning to return to work in mid-October 1987. Upon consideration of the evidence adduced at trial, the court finds that National Industries made this employment decision in retaliation for Dunning’s filing a claim with the EEOC.
Dunning has established a pri-ma facie case of retaliation. Title VII explicitly protects employees against retaliation by an employer for participation in an employment discrimination case, including participation in the form of filing a complaint with the EEOC. Dunning filed such a claim in August 1987. National Industries made the challenged adverse employment decision in October 1987, shortly after receiving a copy of the complaint from the EEOC with a request for the company’s position on the matter. The fact that the decision occurred in the same time frame as the receipt of the EEOC complaint and the communication with an EEOC officer establishes the necessary causal connection between National Industries’s decision and Dunning’s challenge to its employment practices to make out a prima facie case of reprisal. See Donnellon v. Fruehauf Corp., 794 F.2d 598, 601 (11th Cir.1986); Jordan v. Wilson, 649 F.Supp. 1038, 1061 (M.D.Ala.1986); see also Tipton v. Canadian Imperial Bank of Commerce, 872 F.2d 1491, 1494 (11th Cir.1989).
In rebuttal, National Industries basically relies on the fact that Dunning violated its maternity leave policy, as described above. National Industries asserts that it must assume at some point that an employee who remains on maternity leave for an extended period of time has quit, so that the company can hire a replacement for the employee. National Industries contends that Dunning never contacted it in any way to let the personnel department know of her difficulty in obtaining an excuse from her doctor.
The court is convinced that these proffered reasons for the company’s decision are purely pretextual, and that Dunning was actually barred from returning to her job because of the fact that she filed a complaint with the EEOC. First of all, the court finds that Dunning did actually keep National Industries’s personnel office apprised of the initial delay in her checkup arising from her doctor’s emergency as well as the later delay in obtaining a written excuse from this office. Dunning called the company on numerous occasions to inform them of this, and Dunning’s husband personally conveyed this information to the personnel office on several occasions as well. The EEOC officer assigned to Dunning’s case testified that he spoke with National Industries’s personnel office shortly before Dunning attempted to return to work on the 19th of October. At that time, the company told him that Dunning had not returned to work because she had experienced some sort of difficulty in obtaining her medical authorization statement, and that once she obtained that statement she could resume her job. Secondly, employees at National Industries’s personnel office testified at trial that they would contact an employee’s doctor’s office directly on behalf of an employee who was experiencing difficulty in obtaining her medical authorization to return to work, but no one at the company did so for Dunning.
To the extent National Industries contends that it had to replace Dunning at her position, this argument carries little weight. Personnel employees at National Industries stated that the six-week deadline is not rigorously enforced, and that there is no set period beyond the six-week deadline at which the company treats an employee as having quit. Rather, the company approaches each case on a subjective, case-by-case basis. The company’s president stated that National Industries at any given time has a large number of pregnant employees — indeed, so large that they outnumber the amount of sit-down jobs available at the plant. She also testified that the company immediately replaces any employee on leave. In light of the company’s policy to transfer employees from position to position (from the board to the splicing machines, etc.) as needed and the significant number of pregnant employees, National Industries obviously maintains a large supply of temporary labor designed specifically to report only when the company needs replacement or additional help.
Indeed, Dunning provided evidence of specific instances where National Industries did not enforce at all its purported policy regarding returns from maternity leave. For example, Cecilia Skipper, the white employee discussed earlier in this opinion, was allowed to return to her position by National Industries after her maternity leave even though she stayed on leave beyond six weeks after her child’s birth. Skipper testified that she simply returned to National Industries when she wanted to, and that she had not been in communication with the company to let them know that she would not return by the six-week deadline. Moreover, Skipper did not have a doctor’s authorization to return to work, as supposedly required by the policy. Dunning, in contrast, was not given the benefit of this lenient return policy. The court is convinced that National Industries’s purpose in strictly enforcing this policy against Dunning was retaliation for her having filed a complaint with the EEOC. This purpose clearly does not comport with the mandate of Title VII.
III. CONCLUSION
The court is convinced that Dunning was forced to take early maternity leave by National Industries because of her race. The court is also convinced that National Industries refused to permit Dunning to return to her job in retaliation for her having filed an EEOC complaint against the company. Dunning is therefore entitled to appropriate relief. As a victim of such retaliation and discrimination, Dunning is entitled to backpay and reinstatement in her former position, with the concomitants of employment which would have accrued to her absent these violations of her civil rights. 42 U.S.C.A. § 2000e-5(g); see Franks v. Bowman Transportation Co., 424 U.S. 747, 764, 96 S.Ct. 1251, 1264, 47 L.Ed.2d 444 (1976); Albemarle Paper Co. v. Moody, 422 U.S. 405, 420-21, 95 S.Ct. 2362, 2373, 45 L.Ed.2d 280 (1975). The court informed the parties at trial that this opinion would address only the liability aspect of the case. The court will now give the parties an opportunity to agree upon the appropriate amount of backpay and other benefits Dunning should receive. If the parties cannot reach an agreement on this issue, then the court will itself determine, after an appropriate hearing, how much Dunning should receive. In addition, Dunning is entitled to reasonable attorneys’ fees under 42 U.S.C.A. § 2000e-5(k).
An appropriate judgment will be entered.
JUDGMENT AND INJUNCTION
In accordance with the memorandum opinion entered this date, it is the ORDER, JUDGMENT, and DECREE of the court:
(1) That judgment be and it is hereby entered in favor of plaintiff Denise Dunning and against defendants National Industries, Inc., June Collier, president of National Industries, James Collier, a plant manager for National Industries, and Dan Carden, a supervisor for National Industries, on the following two claims: (a) on plaintiff Dunning’s claim that the defendants discriminated against her because of her race by forcing her to take an early maternity leave; and (b) on her claim that the defendants retaliated against her for having filed a charge of discrimination with the federal government by refusing to allow her to return to her position after the birth of her baby;
(2) That all defendants be and they are hereby ENJOINED and RESTRAINED from failing to reemploy plaintiff Dunning within 14 days from the date of this order, with such accompanying promotions, pay increases, and other benefits that plaintiff Dunning would have received had she not been illegally forced to take early maternity leave and prevented from returning to her job by the defendants;
(3) That plaintiff Dunning have and recover backpay, determined according to accepted legal principles, from the defendants;
(4) That plaintiff Dunning be and she is hereby allowed 14 days from the date of this order within which to file her request for reasonable attorneys’ fees, which request shall address each of the criteria set forth in Hensley v. Eckerhart, 461 U.S. 424, 103 S.Ct. 1933, 76 L.Ed.2d 40 (1983), and Johnson v. Georgia Highway Express, Inc., 488 F.2d 714 (5th Cir.1974);
(5) That all parties to these proceedings be and they are hereby allowed 14 days from the date of this order within which to file a request for the court to determine appropriate backpay, should the parties be unable to agree between themselves as to the amount of backpay to which plaintiff Dunning is entitled; and
(6) That all other relief sought by the plaintiff Dunning in this case that is not specifically granted be and the same is hereby denied.
It is further ORDERED that all costs of this proceeding be and they are hereby taxed against the defendants, for which execution may issue.
The clerk of the court is DIRECTED to issue a writ of injunction.
. The defendants also include several officers of National Industries, Inc.: June Collier, President of National Industries, James Collier, a National Industries plant manager, and Dan Carden, a supervisor for the company. Since these officers are all sued in their capacity as officers of National Industries, the court has not treated them separately in this opinion.
. After receiving the excuse from James Collier, June Collier called Dunning’s physician to verify her medical excuse. During her telephone conversation with a member of the doctor’s office, some confusion developed as to whether Dunning had stated to her physician that she worked near steam. June Collier later accused Dunning of having intentionally misrepresented to her doctor that she worked near steam. The court is convinced, and so finds, that Dunning did not inform her doctor that she worked near steam. The note Dunning received from her doctor to take to National Industries did not even mention steam.
The court cannot say how this confusion regarding the steam first arose; the record is simply unclear. This issue is in any event not critical to the case, because June Collier did not base her refusal to accommodate Dunning on her belief that Dunning had misrepresented matters to the doctor.
. The defendants stipulated at trial that Dunning had satisfied all jurisdictional prerequisites associated with her Title VII claims.
. Dunning also alleges violations of 42 U.S.C.A. §§ 1981 and 1985. The court need not resolve whether Dunning has viable independent claims of intentional discrimination and retaliation under these two statutes. Assuming that she has, the court would find in her favor and against her to the same extent it has done so under Title VII. Moreover, the court does not understand Dunning to seek any relief under these two statutes that is not available under Title VII.
. The court adapts the prima facie case both to the type of employment decision challenged, see, e.g., Hill v. Metropolitan Atlanta Rapid Transit Authority, 841 F.2d 1533, 1538-39 (hiring) reh’g granted and opinion modified in other respects, 848 F.2d 1522 (11th Cir.1988): Taylor v. Hudson Pulp and Paper Corp., 788 F.2d 1455 (11th Cir.1986), cert. denied, 484 U.S. 983, 108 S.Ct. 345, 98 L.Ed.2d 371 (1987) (transfer); Wu v. Thomas, 847 F.2d 1480, 1483-84 (11th Cir.1988), cert. denied, — U.S. -, 109 S.Ct. 1641, 104 L.Ed.2d 156 (1989) (promotion); Rollins v. TechSouth, Inc., 833 F.2d 1525 (11th Cir.1987) (discharge); Nix v. WLCY Radio/Rahall Communications, 738 F.2d 1181, 1184-86 (11th Cir.1984) (discriminatory application of work rules), and to the type of discriminatory practice alleged. E.g., Maddox v. Grandview Care Center, Inc., 780 F.2d 987 (11th Cir.1986) (pregnancy); Donnellon, 794 F.2d at 600-01 (retaliation).
. When an employee presents direct evidence of the employer’s discriminatory or retaliatory motive, the framework set out in the text is substantially altered. In such a case, the employer bears more than a mere burden of production of a legitimate reason for the decision; the employer bears the burden of proving by a preponderance of the evidence that it would have made the same decision even if it had not used the proscribed criteria. See Price Waterhouse v. Hopkins, — U.S. -, 109 S.Ct. 1775 1804-05, 104 L.Ed.2d 268 (1989) (O’Connor, J., concurring in the judgment) (espousing direct evidence threshold); Jones v. Gerwens, 874 F.2d 1534, 1539 n. 8 (11th Cir.1989) (in dicta, apparently adhering to direct evidence threshold). But cf. Price Waterhouse, — U.S. at -, 109 S.Ct. at 1791 (plurality opinion) (decliningto require direct evidence in all cases as a prerequisite to imposing burden of proof on employer); id., — U.S. at -, 109 S.Ct. at 1795 (White, J., concurring in the judgment) (unlawful motive must be a substantial factor in the decision, but unclear whether this requires a showing of direct evidence). Although the question of whether a plaintiff has presented direct evidence is not always entirely clear, direct evidence relates to actions or statements of an employer reflecting a discriminatory or retaliatory attitude correlating to the discrimination or retaliation complained of by the employee. See Hill v. Metropolitan Atlanta Rapid Transit Authority, 841 F.2d 1533, 1539 (11th Cir.1988); Rollins v. TechSouth, Inc., 833 F.2d 1525, 1528 n. 6 (11th Cir.1987); Bell v. Birmingham Linen Service, 715 F.2d 1552, 1556 (11th Cir.1983), cert. denied, 467 U.S. 1204, 104 S.Ct. 2385, 81 L.Ed.2d 344 (1984).
The court finds that Cunning has not presented direct evidence of discrimination or retaliation on the part of the defendants, and thus applies the usual Burdine shifting analysis. The comments of James Collier and Dan Carden, to the effect that Dunning’s pregnancy was not their fault or their problem, can certainly be criticized as callous and insensitive. They do not reflect an attitude of treating pregnant employees differently from other employees, however, but rather reflect that indifference to health complications arising from working conditions is the prevailing and general ethic at National Industries. In any event, even if National Industries had the burden of establishing that it would have reached the same decision in the absence of the prohibited motive, the court would have reached the same conclusions as to all of Dunning’s claims.
. Where, as here, a disparate treatment Title VII case has been fully tried, the court need not employ the full Burdine analysis, but may simply proceed directly to the ultimate issue of discrimination or retaliation. United States Postal Service Bd. of Governors v. Aikens, 460 U.S. 711, 715, 103 S.Ct. 1478, 1482, 75 L.Ed.2d 403 (1983); Moore v. Alabama State University, 864 F.2d 103, 105 (11th Cir.1989). The court believes that trial courts should nonetheless use the Burdine analysis in fully tried cases in which the plaintiff relies on circumstantial evidence. Such cases pose difficult and sensitive issues of subjective intent and objective action. The Burdine analysis provides an invaluable method of weighing and considering evidence. By focussing the court’s inquiry on the prima facie case, the employer’s justification, and the issue of pretext, Burdine helps to assure that the court arrives at its ultimate conclusion less through intuition and more through factual reasoning and analysis. See, e.g., Noble v. Alabama Dep’t of Environmental Management, 872 F.2d 361, 365 n. 4 (11th Cir.1989); Nix v. WLCY Radio/Rahall Communications, 738 F.2d 1181, 1184 (11th Cir.1984).
Of course, the Burdine analysis should not be applied too rigidly; nor should it be viewed as an end in itself. In other words, it should not be used by the court as a "substitute" for reaching the ultimate issue of whether the plaintiff has, in fact, been a victim of discrimination or retaliation. Moore, 864 F.2d at 105.
. At one point during trial, Dunning also contended that National Industries transferred her out of a desire to get rid of her because she was pregnant. However, Dunning offered no credible evidence that nonpregnant employees were treated differently from pregnant women in this regard. As stated in the text, National Industries identified only the boards to be transferred, not the employees, nor their sex or race, nor whether they were pregnant.
. Dunning also contends that National Industries discriminated against her on the basis of her sex in forcing her to take this leave. The exact nature of this claim is unclear, however, inasmuch as Dunning offered no evidence on National Industries’s policy with respect to men experiencing difficulty at work because of medical problems. Cf. Maddox v. See generally Annot., Pregnancy Leave or Maternity Leave Policy, or Lack Thereof, as Unlawful Employment Practice Violative of Title VII of the Civil Rights Act of 1964 (42 USCS §§ 2000e et seq.), 27 A.L.R.Fed. 537 (1976). Since Dunning is entitled to relief on her theory of race discrimination, the court need not and does not reach her claim of sex discrimination on this particular adverse employment decision.
. The record contains additional evidence that National Industries accommodated another white woman, Carol Dandridge, during her pregnancy by giving her a sit-down job. Because the testimony regarding Dandridge was essentially second-hand, the court has accorded it little weight.
. Cf. Williams v. City of Montgomery, 742 F.2d 586, 587-88 (11th Cir.1984) (per curiam), cert. denied, 470 U.S. 1053, 105 S.Ct. 1756, 84 L.Ed.2d 819 (1985) (racially discriminatory application of presumably neutral work rule regarding reinstatement); Sims v. Montgomery County Commission, 544 F.Supp. 420, 426 (M.D.Ala.1982) (uneven application of neutral work rules on racial lines is strong evidence that the rules were never meaningfully employed, and were retained as a pretext to discriminate against disfavored employees).
The evidence adduced at trial reflects that National Industries’s president, June Collier, was intimately involved in the enforcement of her unwritten personnel policy. She either made the company’s personnel decisions herself or closely monitored the personnel decisions of the officers below her in company hierarchy. The court is therefore convinced that she was more than likely fully aware of the uneven application of National Industries’s personnel policy as detailed in this memorandum opinion.
. Title VII’s protection attaches to the filing of such a complaint with the EEOC; the employee need not prove the merits of her EEOC complaint to establish her retaliation claim. “[RJather, the plaintiff need only have had a ‘reasonable belief that an unlawful employment practice was occurring." Wu v. Thomas, 863 F.2d 1543, 1549 (11th Cir.1989). Considering the circumstances giving rise to Dunning’s EEOC complaint, the court finds that she plainly had a reasonable belief that National Industries was committing an unlawful employment practice against her.
. National Industries hired a new personnel director between the time Dunning left on her maternity leave in April and the time she attempted to return to her job in October. Whether the new personnel director personally communicated this information to the EEOC officer or not was not clearly established at trial, but this was clearly the company's position with respect to Dunning prior to the EEOC officer’s contact with the company about Dunning’s complaint.
. See note 11, supra.
| CASELAW |
[IDENTITY-2544] It is better, If we can improve to read dashboard url configurations from one place Created: 06/Jun/14 Updated: 20/Sep/15 Resolved: 06/Dec/14
Status: Resolved
Project: WSO2 Identity Server
Component/s: user-view
Affects Version/s: 5.0.0-GA
Fix Version/s: 5.1.0-M1
Type: Improvement Priority: Highest
Reporter: Asela Pathberiya Assignee: Ishara Karunarathna
Resolution: Duplicate Votes: 1
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Reference
relates to IDENTITY-2878 Fixing 'Dashboard Login, Register pag... Resolved
is related to IDENTITY-2614 [User portal] [When LB host name and ... Resolved
Severity: Blocker
Estimated Complexity: Novice
Test cases added: Yes
Affects Docs:
Yes
Comments
Comment by Asela Pathberiya [ 06/Jun/14 ]
Currently, If we are changing host name or port number, we need to change them in following files..
1. repository/conf/carbon.xml
2. repository/conf/security/sso-idp-config.xml
3. repository/deployment/server/jaggeryapps/dashboard/apis/gadget.json
4. repository/deployment/server/jaggeryapps/portal/gadgets/account-recovery/gadget.xml
5. repository/deployment/server/jaggeryapps/portal/gadgets/identity_management/gadget.xml
6. repository/deployment/server/jaggeryapps/portal/gadgets/pwd_change/gadget.xml
7. repository/deployment/server/jaggeryapps/portal/gadgets/user_auth_apps/gadget.xml
8. repository/deployment/server/jaggeryapps/portal/gadgets/user_profile/gadget.xml
Comment by Asela Pathberiya [ 06/Jun/14 ]
Also please modify the url of the user_profile (i.e. http://10.100.1.47:9763/portal/gadgets/user_profile/gadget.xml ) in "repository/deployment/server/jaggeryapps/dashboard/apis/gadget.json" file in to HTTP and Port in to 9763.
Comment by Johann Nallathamby [ 05/Dec/14 ]
The ideal way to do this is read the hostname from carbon.xml. Can use CarbonUIUtil.getAminConsoleURL() and replace the /carbon with /dashboard like we've done in most endpoints like /samlsso or /oauth2/authorize where we replace /carbon with /commonauth.
Generated at Mon Jun 26 16:05:02 IST 2017 using JIRA 7.2.2#72004-sha1:9d5132893cc8c728a3601a9034a1f8547ef5c7be. | ESSENTIALAI-STEM |
Black Dems take lead in push to impeach Trump | TheHill
Members of the Congressional Black Caucus (CBC) are proving central to efforts to impeach President TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE. Black lawmakers say that’s the result of Trump repeatedly stirring racial controversies, from personally attacking two members of the caucus to casting equal blame on white supremacists and counterprotesters for fatal violence in Charlottesville, Va., last summer. Rep. Emanuel Cleaver (D-Mo.), former head of the CBC, said the bitter feelings originated well before Trump arrived in office, when the real estate mogul began raising doubts about former President Obama’s birthplace — and, by extension, his authority to be president. “I don’t know if the people around the country understand that he has launched … an assault against African-American people starting with his refusal to accept the first African-American president, by continuing to declare that he was from Kenya,” Cleaver said. “No other president in history has had to face that kind of criticism. “We’ve come to conclude that this is a part of his belief system.” Just under two-thirds of the 48-member CBC has backed impeachment in House floor votes forced by Rep. Al GreenAlexander (Al) N. GreenDanish prime minister: Trump's idea to buy Greenland 'absurd' Juan Williams: Democrats finally hit Trump where it hurts We need a climate plan for agriculture MORE (D-Texas), himself a CBC member. The CBC includes two senators, two nonvoting delegates and one Republican, Rep. Mia LoveLudmya (Mia) LoveFormer GOP lawmaker: Trump's tweets have to stop Congressional Women's Softball team releases roster The 31 Trump districts that will determine the next House majority MORE (Utah), who does not support impeaching Trump. The votes forced by Green were procedural and not actual up-or-down votes on forcing Trump out of the Oval Office, but served as the only referendums in Congress to date on impeachment. CBC spokeswoman Kamara Jones reiterated that members specifically voted in support of starting debate on impeachment. “Members voted in support of debating impeachment of the president,” Jones said, while acknowledging that “some of the members who voted against tabling that motion might ultimately support impeachment itself.” CBC members made their disgust for Trump clear at Tuesday night’s State of the Union, where many pointedly refrained from clapping or shaking his hand — or skipped the event altogether. Rep. Bennie ThompsonBennie Gordon ThompsonHillicon Valley: House panel subpoenas 8chan owner | FCC takes step forward on T-Mobile-Sprint merger | Warren wants probe into FTC over Equifax settlement | Groups make new push to end surveillance program House Homeland Security Committee subpoenas 8chan owner What Mississippi ICE raids mean for vulnerable workers MORE (D-Miss.) was positioned along the center aisle, but kept his distance as GOP colleagues nearby enthusiastically jostled to shake Trump’s hand on national television. Virgin Islands Del. Stacey PlaskettStacey PlaskettOmar says US should reconsider aid to Israel Schumer to donate Epstein campaign contributions to groups fighting sexual violence House Democrat backtracks, will now donate Epstein's campaign contributions MORE (D) stood with her arms crossed as Trump walked past. Most CBC members, including the group’s leader, Rep. Cedric RichmondCedric Levon RichmondHouse Democrat calls for gun control: Cities can ban plastic straws but 'we can't ban assault weapons?' Embattled Juul seeks allies in Washington Democratic lawmakers support Bustos after DCCC resignations MORE (D-La.), sat down well before Trump reached the dais and refrained from joining the raucous applause emanating from the GOP side of the chamber. And that’s just the reaction from CBC members who attended Trump’s State of the Union. More than half of the 14 House Democrats who boycotted the speech were members of the caucus. The articles of impeachment put forth by Green don’t allege Trump has committed a crime; instead, they assert that Trump has “brought the high office of president of the United States in contempt, ridicule, disgrace and disrepute” and “has sown discord among the people of the United States.” Green’s articles cite Trump’s reported comments in an Oval Office meeting about immigration policy describing Haiti, El Salvador and African nations as “shithole countries”; the president’s equivocating response to the Charlottesville violence; and Trump’s attacks on NFL players kneeling during the national anthem to protest police brutality. Green argued that Trump is “legitimizing bigotry” by aggravating such controversies. “Saying that certain countries of color are s-hole countries … and then saying it as you’re discussing a ‘merit-based’ immigration policy. Is it really a merit-based policy, or a race-based policy masquerading as merit-based?” Green said. “This bigotry is being evinced in policy.” The “shithole” controversy led the CBC to stage another protest at Tuesday’s State of the Union: Almost all members of the group in attendance that evening donned ties or shawls made of kente cloth — a colorful fabric originating in Ghana. Rep. James Clyburn (S.C.), the third-ranking House Democrat and a veteran of the civil rights movement, said Wednesday that the message was one of “solidarity with Haiti, El Salvador and those countries on the continent of Africa that were referred to by our president in very derogatory terms.” “We thought that it was necessary for us to demonstrate, as members of the Congress, our displeasure with the president,” he said. Clyburn is the highest-ranking House Democrat to vote in support of Green’s articles of impeachment. Another black lawmaker and member of Democratic leadership, Rep. Hakeem JeffriesHakeem Sekou JeffriesAnti-Trump vets join Steyer group in pressing Democrats to impeach Trump Appetite for Democratic term limits fizzling out Jeffries dismisses optics: We wanted testimony from Mueller, not Robert De Niro MORE (D-N.Y.), has also voted in favor of impeachment. A total of 58 Democrats first voted in support of Green’s articles of impeachment last month. But the number grew to 66 when Green forced another vote on Jan. 19 following Trump’s profane remarks. Nearly all of the Democrats on the record in support of impeachment represent deep-blue districts where their constituents want their lawmakers to show resistance to Trump. Indeed, most CBC members hail from districts that are a lock for Democrats. Rep. G.K. ButterfieldGeorge (G.K.) Kenneth ButterfieldDemocrats call for increased security after 'send her back' chants The Hill's Morning Report - Trump seizes House impeachment vote to rally GOP Here are the 95 Democrats who voted to support impeachment MORE (D-N.C.), a former CBC chairman, originally voted to table the articles of impeachment in December. But he had a change of heart in the ensuing month after hearing his constituents’ outrage over the Trump administration. “I had hoped to see improvements at the White House, but every day brings another scandal. Enough is enough. The time has come to have an open and transparent debate on the issue of impeachment on the floor of the House of Representatives,” Butterfield said in a statement provided by his office. The fiery debate over race and ethnicity has been at the center of the current fight over the fate of so-called Dreamers, immigrants brought to the country illegally as children. As part of legislation to salvage the Deferred Action for Childhood Arrivals (DACA) program, Trump and GOP leaders are pressing for new restrictions on the ability of U.S. citizens and permanent legal residents to bring relatives into the country. The Democrats refer to the program as one encouraging “family reunification,” while the Republicans label the process “chain migration.” The reference to chains has stirred no lack of antipathy from CBC members, who have long accused Trump of advancing white nationalist sentiments and who think the president is blowing dog whistles to his white, conservative base. “My great, great, great grandfather wouldn’t call [how] he came over here anything but chained migration. And he was brought here from Cameroon,” said Cleaver. “Donald Trump has never insulted any group accidentally. He knows what he’s doing, and it hurts.” Still, Cleaver has declined to join the impeachment push, expressing concerns that it could lend ammunition to critics of the ongoing probe by special prosecutor Robert MuellerRobert (Bob) Swan MuellerTrump calls for probe of Obama book deal Democrats express private disappointment with Mueller testimony Kellyanne Conway: 'I'd like to know' if Mueller read his own report MORE into whether Trump’s campaign colluded with Russians meddling in the 2016 presidential election. “One of the worst mistakes we could make is to create the image to his base that our goal is first and foremost the impeachment of Donald Trump,” Cleaver said.“Don’t misunderstand me: I’m not saying that he’s a good [person],” he quickly added. “But in spite of how he has treated my people, my race, I’m not going to allow him to influence me to be like him.” Trump’s relationship with the CBC hasn’t been helped by his personal attacks on two of its members. Rep. John LewisJohn LewisCummings invites Trump to visit Baltimore House Democrat knocks Trump's Cummings tweet: 'This guy is a terrible, terrible human being' George Wallace's daughter: 'I saw Daddy a lot' during 2016 election MORE (D-Ga.), the civil rights icon, said on NBC’s “Meet the Press” shortly before the inauguration last year that he didn’t see Trump as a “legitimate” president. Trump drew bipartisan criticism when he tweeted in retaliation that Lewis is “all talk, talk, talk — no action or results. Sad!” Trump later lashed out at Rep. Frederica WilsonFrederica Patricia WilsonAssault weapons ban picks up steam in Congress Democratic rep reconsiders wearing trademark hats because of 'racists who taunt me' Overnight Defense: US shoots down Iranian drone | Pentagon sending 500 more troops to Saudi Arabia | Trump mulls Turkey sanctions | Trump seeks review of Pentagon cloud-computing contract MORE (D-Fla.), whom he called “wacky” on Twitter after she offered a critical account of his phone call to the wife of a fallen soldier. Perhaps unsurprisingly, both Lewis and Wilson voted in favor of impeachment and boycotted the State of the Union. “I’ve got to be moved by my conscience,” Lewis said. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Kids and Teen Furniture
Listen to Coronavirus Patient Zero
Toddler Skills for Personal Responsibility
There are three skills that are very important for our little ones to learn early in their lives. 1) Children need to be able to fall asleep on their own. Infants and toddlers who are always rocked to sleep, or breastfed or bottle fed to sleep, learn to depend upon others for falling asleep and do not develop their own falling asleep mechanism. This can cause much distress for parents who go through the nightly nightmare of trying to get their infant or toddler to sleep. Instead of always picking up and rocking a crying little one, which only reinforces the child’s dependency on you putting him or her to sleep, try patting the child and then leaving for a few minutes. If you keep coming in, patting your child and reassuring him or her that you are here, eventually your child will stop depending upon you to rock, hold or feed him or her to sleep.
2) Children need to learn very young to play by themselves and amuse themselves. It is not healthy for children to be constantly dependent upon others, or upon the TV, to amuse them. I work with many adults who never learned to “play by themselves.” These adults feel lost when they are alone, having no idea what to do with themselves. Instead of turning to creative or learning opportunities, they may participate in addictions such as eating, drinking, drugs, TV, work, spending, and so on.
When children learn to play by themselves at a young age, they tend to be more self-sufficient and creative as adult. 3) Children need to learn how to self-nurture. This means that they need to learn how to take some responsibility for their own feelings. Infants often self-soothe with their blanket, thumb, or pacifier. But as they grow older, they need to learn other ways of self-nurturing because they will not be taking their blanket or pacifier to school. Even children as young as 2 1/2 years old can learn to attend to their own feelings. You can help your young children start to take responsibility for their feelings by giving them a doll or stuffed animal that represents their emotions. You can tell them that the doll or stuffed animal is the baby inside them that has a lot of different emotions. When they are feeling sad or angry, they can learn to talk to the baby inside and find out what that baby needs from them or from you. As they get older, they can learn to connect their thoughts with their feelings.
They can learn that if they judge themselves by telling themselves that they are bad or stupid or ugly, they will feel very badly. It is vitally important for all of us to connect our thoughts with our feelings. Most of us grew up believing that others caused all our good and painful feelings. If someone yelled at us or told us we were bad or stupid or ugly, we certainly felt badly, and if someone approved of us, we felt good. So we learned to believe that all our feelings are being caused by others. It is important for children to learn that their feelings are also affected by what they tell themselves and how they treat themselves. For example, if an older brother tells his younger brother that he is stupid, the younger child might start to tell himself he is stupid, without realizing that he is causing himself to feel very badly. By talking with his “baby”, he might realize he is treating himself in a way that is hurting him. He also might also be able to understand that his brother is not telling him the truth. The way he can learn to realize this is by learning to access his “Source of Love and Truth.
” Small children can easily learn to open to a powerful Source of Love and Truth. You can ask them to imagine a wonderful friend, a guardian angel, or a fairy godmother. It is very easy for most children to imagine a wonderful being who is here to love them and guide them. They can be encouraged to ask questions of this loving being, such as “Is it true that I am stupid?” They can learn to bring through true and loving statements to themselves when they open to learning with their spiritual Guidance. These skills, learned early in life, will do much to foster personal responsibility in our children.
Kids and Teen Furniture Articles
Kids and Teen Furniture Books
Kids and Teen Furniture | FINEWEB-EDU |
Miltonduff
Miltonduff is a hamlet 1.5 miles southwest of Elgin and is in the Scottish council area of Moray.
History
The village contains a 17th or 18th century rectangular dovecote. The dovecote is Category C listed and was restored in 1970.
The village contains a First and Second World war memorial for the local area. The memorial is in the form of a stone obelisk and is located beside the village hall.
Economy
Miltonduff Distillery is a Scotch whisky distillery in the village. Built in 1824, it is currently owned by Pernod Richard.
Education
Mosstowie Primary School is located in Miltonduff and provides primary education for children in the Miltonduff, Pluscarden and Mosstowie areas. | WIKI |
Rob Ryan (artist)
Rob Ryan (born 1962) is a British visual artist who specialises in Papercutting and screen-printing. He is known for his detailed paper cut outs. His artwork has featured in Vogue, Elle, and Stylist. He has also collaborated with fashion designer Paul Smith. Ryan was elected Master of the Art Workers' Guild for 2024.
Ryan has illustrated book and album covers, including John Connolly's novel The Book of Lost Things, Erasure's album Nightbird, Louis de Bernières short-story collection Notwithstanding and Dara Horn's novel The World to Come. His first book, This Is for You, was published in October 2007 by Hodder & Stoughton; it consists of a fairy tale told through his paper cut-out art and explores themes of love and loneliness. Ryan also creates the Global Gift greeting cards for the charity Trocaire.
Personal life
Ryan was born in 1962 in Cyprus in Paphos to Irish parents Doris and Buddy Ryan who divorced in 1966. He is the youngest of three brothers and his father was an RAF mess hall officer. He studied at Trent Polytechnic and has a Master of Arts in printmaking from the Royal College of Art. He graduated from the Royal College of Art in 1987.
He currently works from his studio in London, where he lives with his wife and two daughters. | WIKI |
Talk:Humayun Akhtar Khan
Original research
Please refrain from adding unsourced and promotional material to the article page. I'm trying to avoid edit warring however you are not responding to the talks I left on your talk page. --Saqib (talk) 18:28, 18 October 2018 (UTC)
* You declined to take action against edit warrior. The SPA continue to revert and not interested to discuss the issue via talk page, instead citing unreliable source (yourpakistan.pk) to support the OR and attacking me saying I've got some personal vendetta. --Saqib (talk) 09:11, 24 October 2018 (UTC) | WIKI |
User is being mapped to old username, even after map file is updated to local username
Hello,
I am using map file to map users for Open-Ondemand along with PAM module.
The below user has his AD username different from HPC LDAP username.
The issue is as follows:
We have a user who logged in using his AD credentials with PAM authentication.
When he logged in, he got a message that his home directory is missing, which is true since his home directory exists with LDAP username.
So I updated the map file, with his HPC username, and ran these commands:
/opt/ood/ood-portal-generator/sbin/update_ood_portal
systemctl try-restart httpd24-httpd.service httpd24-htcacheclean.service
However, the next time that he logs in - he still gets the same message that his home directory has been missing.
Also, I see in the logs that his PUNs are being created with his AD username and not his LDAP username.
Does OOD keep a cache somewhere, where it remembers how it authenticated a user as? If it is - Is it possible to clean this history so that it starts as new?
I also had a second scenario, where I had to change the uidNumber of a user, after the user authenticated and used the services with previous uidNumber - which did create lot of issues.
I do not have a way to replicate this scenario as of now.
However, I can replicate the first scenario if necessary.
I have enabled debugging, and I will update soon on what I will see in the logs, with respect to who this user is being mapped to…
Regards,
Lohit
Hello and welcome!
There is a cache of the user information in a json format which may need to be cleaned out.
These files can be found in ~/ondemand/data/sys/dashboard/batch_connect/db and in that directory you can find the session file which is likely causing the problem in the first scenario. Remove the file that has the old session info which is causing the conflict. You’ll have to look at those files to determine which is the right file.
For the second scenario, I’d expect nothing to work if you changed the UID as now there is no way for the user to be known to OnDemand. That session file would again have all the info needed for OnDemand and if you do anything to cause a deviation from that for the users metadata, OOD will no longer know who they are and what apps or configurations to use for them.
Let me know if you have any more questions or clarifications.
Hello Travis,
Thank you for the quick reply.
This user who has an issue, does not have a home directory for his AD username. I later changed the map file to his LDAP username, but it still maps to AD username and complains about no home directory.
So where would the session or db files be stored, if there is no home directory?
Regards,
Lohit
It just happened to be a permission issue. I do not have this issue anymore. | ESSENTIALAI-STEM |
classification
Title: PyUnicode_AsEncodedString: the bootstrap hack is no more needed
Type: Stage:
Components: Interpreter Core, Unicode Versions: Python 3.3
process
Status: closed Resolution: fixed
Dependencies: Superseder:
Assigned To: Nosy List: vstinner
Priority: normal Keywords: patch
Created on 2011-02-11 13:04 by vstinner, last changed 2011-02-21 20:53 by vstinner. This issue is now closed.
Files
File name Uploaded Description Edit
unicode_asencodedstring_bootstrap.patch vstinner, 2011-02-11 13:04
Messages (2)
msg128384 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2011-02-11 13:04
Since version 3.2, Python uses the locale encoding in PyUnicode_EncodeFSDefault() using _Py_wchar2char() and _Py_char2wchar() until the codec registry is initialized and the locale codec is loaded (until initfsencoding() is done).
Before Python 3.2, Python used ASCII in PyUnicode_AsEncodedString() at bootstrap (before the codec registry was initialized): we don't need this hack anymore and it is bad to use ASCII instead of the locale encoding (encode/decode can fail).
This ticket is just a reminder for me: I am waiting Python 3.3 to remove PyUnicode_AsEncodedString() bootstrap hack ;-)
msg128993 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2011-02-21 20:53
Fixed by r88476. I prefer to only change it in Python 3.3, so no backport.
History
Date User Action Args
2011-02-21 20:53:17vstinnersetstatus: open -> closed
messages: + msg128993
resolution: fixed
2011-02-11 13:04:15vstinnersetcomponents: + Unicode
2011-02-11 13:04:08vstinnercreate | ESSENTIALAI-STEM |
Sylvain Gbohouo
Guelassiognon Sylvain Gbohouo (born 29 October 1988) is an Ivorian professional footballer who plays as a goalkeeper for Stade d'Abidjan.
International career
Gbohouo made his debut for the Ivory Coast national team on 6 July 2013, in a 4–1 loss against Nigeria at the 2014 African Nations Championship qualification.
He was part of the team that played in the 2014 FIFA World Cup, but did not make an appearance.
He was Ivory Coast's starting goalkeeper at the 2015 Africa Cup of Nations as they went all the way to the final, but a thigh injury sustained in the semi-final against DR Congo saw him miss out the final match in favour of veteran Boubacar Barry. He was still named the tournament's best goalkeeper, and since Barry's retirement, Gbohouo became the Elephants' undisputed number one.
During the 2019 Africa Cup of Nations between Côte d'Ivoire and Algeria in the quarter-finals, Gbohouo was elected man of the match, despite the defeat of his team on penalties.
Gbohouo could not participate in the 2021 Africa Cup of Nations due to a positive drug test. He was consequently given an 18-month ban by FIFA and has not played for the Ivory Coast since then.
Honours
Séwé Sport
* Côte d'Ivoire Premier Division: 2012–13, 2013–14
* Coupe Houphouët-Boigny: 2012, 2013, 2014
Mazembe
* Linafoot: 2015–16, 2016–17, 2018–19
* DR Congo Super Cup: 2016
* CAF Champions League: 2015
* CAF Confederation Cup: 2016, 2017
* CAF Super Cup: 2016
Ivory Coast
* Africa Cup of Nations: 2015
Individual
* Africa Cup of Nations Team of the Tournament: 2015 | WIKI |
Page:Cambridge Modern History Volume 2.djvu/355
They were rejected by Zurich, but resulted in the Disputation at Baden (May-June, 1526). Zwingli, however, it was easy to see, cared little for unity or peace, compared with the carrying out of his own far-reaching plans.
At Beckenried, April 8, 1524, the Five Cantons, Luzern, Uri, Schwyz, Unterwaiden, and Zug, formed a separate league to suppress all Hussite, Lutheran, or Zwinglian errors. A further remonstrance was made to Zurich by all the Cantons except Schaffhauseii and Appenzell, and the intention of not sitting in Diet along with Zurich was declared (July 16, 1524). The Mass, pictures, images, and fasting were pronounced binding upon all Swiss. Zurich on the other hand declared religion to be a purely cantonal matter. This was a question hard to settle, with no precedents to refer to. Zurich, however, put itself in the wrong by its action in the Thurgau, where it held the lower jurisdiction, exercised through its bailiffs. Preachers, for the most part connected with Zwingli, had worked their way here-such as Oechsli (an old Einsiedeln friend of his) at Burg. When Oechsli was seized by the Federal officer who exercised the higher jurisdiction, his friends and parishioners gathered to rescue him (July 17, 1524): afterwards in a riotous mob they proceeded to the Carthusian monastery of Illingen, and set it on fire. At Stammheim and Stein images were destroyed. The seizure of the leaders-three of whom were executed at Baden- embittered Zurich; but the other Cantons in their turn blamed its encouragement of the preachers.
Six Cantons (Luzern, Uri, Unterwaiden, Schwyz, Zug, and Freiburg) now threatened to break the league; but Bern was inclined to support the independence of the Cantons, upon the principle cujus regio, ejus religio. At a Diet at Zug it was proposed to raise the country districts against Zurich on account of her destruction of images, but to this step Bern and Solothurn objected. Zurich had, however, made sure of the loyalty of her subjects in the religious changes, just as she referred to them the French alliance and the demands of the peasants. But the Cantons were now divided into hostile factions; and outside lay Austria, embittered by the help sent from Zurich to a rising at Waldshut and Swiss support of Duke Ulrich.
At the end of 1524 Zwingli, always fertile in suggestions and skilful in expression, came forward with a remarkable plan. Zurich was to strengthen herself in military equipment-her reputation for military strength was great; she was to seek alliances with France and Savoy; to promise St Gallen and the Thurgau the property of the monasteries in their territory as a price for their support; and to raise Tyrol against Austria. It is clear that Zwingli's range was extending: it was now that he entered into relations with Duke Ulrich; he now also took the religious movement in his old home, Toggenburg, under his care, and the Reformation was soon fully under way (1524-5). | WIKI |
Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl Monk, Perl Meditation
PerlMonks
why does open ">..." sometimes touches the directory?
by Mark_Galeck (Novice)
on Feb 05, 2013 at 08:31 UTC ( #1017082=perlquestion: print w/ replies, xml ) Need Help??
Mark_Galeck has asked for the wisdom of the Perl Monks concerning the following question:
Hello Monks, when using
open(FILE, ">existing_file") ... close(FILE)
, sometimes the directory of the existing file gets touched; I am on Linux, that means, there was some file added and/or removed during the code above. Perhaps the file in question was removed first, then added. I can't tell. This only happens some of the time, no sure why or what triggers it. Can you explain it? And how to prevent it from ever happening? That is, I don't want the directory timestamp touched. Thank you, Mark
Comment on why does open ">..." sometimes touches the directory?
Download Code
Replies are listed 'Best First'.
Re: why does open ">..." sometimes touches the directory?
by flexvault (Prior) on Feb 05, 2013 at 09:27 UTC
Hello Mark_Galeck,
Since you're on Linux, what you are seeing is "normal". Occasionally I get interrupted and forget where I put a file, I can go to the head of the file system and follow the updated directories to locate the file. ( Hint: all directories are 'touch'ed, and on a very active system this technique may not work. ) When installing your *nix, you can turn this feature off to get better performance. Usually flash drives and Live CD/DVDs are build this way.
If you have administrative rights you can use the 'ln -s' command to bypass how you access the file, for example:
/home/mark/bin/myscript ## This file exists ln -s /home/mark/bin /mark ## /mark is symbolic link to /home +/mark/bin touch /mark/myscript ## change timestamp on directories + to myscript
The actual directories to 'myscript' will have their timestamps updated, but the symbolic link '/mark' will not change. ( If that is what you want ).
However as a system admin, I would be very concerned about 'end users' not wanting to show that they added/updated a file.
Good Luck...Ed
Update: This tested correctly on AIX, but after reading dave_the_m comments, I tried it on a "debian" and a "suse" systems with mixed results.
"Well done is better than well said." - Benjamin Franklin
Re: why does open ">..." sometimes touches the directory?
by kcott (Canon) on Feb 05, 2013 at 09:29 UTC
G'day Mark,
The directory is a file. You can view it in an editor. When you open a file for writing, even if you don't write anything, the information in the directory file will change and, accordingly, so will the timestamp. You can see this for yourself at the command line (i.e. without using perl) - here's a sample run:
ken@ganymede: ~/tmp $ ls -al check_dir_touch ls: check_dir_touch: No such file or directory ken@ganymede: ~/tmp $ mkdir check_dir_touch ken@ganymede: ~/tmp $ ls -al check_dir_touch total 0 drwxr-xr-x 2 ken staff 68 5 Feb 20:12 . drwxr-xr-x 211 ken staff 7174 5 Feb 20:12 .. ken@ganymede: ~/tmp $ view check_dir_touch --------------------- Editor window shows various info with no files listed (exit editor without attempting to save anything) --------------------- ken@ganymede: ~/tmp $ > check_dir_touch/fred ken@ganymede: ~/tmp $ ls -al check_dir_touch total 0 drwxr-xr-x 3 ken staff 102 5 Feb 20:19 . drwxr-xr-x 210 ken staff 7140 5 Feb 20:18 .. -rw-r--r-- 1 ken staff 0 5 Feb 20:19 fred ken@ganymede: ~/tmp $ view check_dir_touch --------------------- Editor window now shows "fred" (exit editor without attempting to save anything) ---------------------
I agree with vinoth.ree's comment about using the 3-argument form of open; however, that won't change the behaviour of the underlying operating system.
-- Ken
Re: why does open ">..." sometimes touches the directory?
by vinoth.ree (Prior) on Feb 05, 2013 at 08:42 UTC
In Linux '>' redirect symbol is used to create new file, if the file exists it removes the existing content and creates new file.
Use Three-argument open(), to open a file its safer open my $fh, '>', $filename or die "Can't write to '$filename': $!\n"; Update:
Shorthand Flags:
Entities Definition
< or r Read Only Access
> or w Creates, Writes, and Truncates
>> or a Writes, Appends, and Creates
+< or r+ Reads and Writes
+> or w+ Reads, Writes, Creates, and Truncates
+>> or a+ Reads, Writes, Appends, and Creates
Re: why does open ">..." sometimes touches the directory?
by dave_the_m (Prior) on Feb 05, 2013 at 09:41 UTC
A simple open(FILE, ">existing_file") will not update the directory's mtime. On linux, the open just gets translated to the OS call
open("existing_file", O_WRONLY|O_CREAT|O_TRUNC, 0666)
(as verified by strace). Either the open you're doing is not as straightforward as your example, or something else is modifying the directory.
Dave.
That's right. As I said, the "open" that I am doing, is only _sometimes_ modifying the directory. I don't know why.
I would respectfully disagree with what some of the other Monks seem to be saying, is that overwriting a file, must touch the directory. As shown below.
the question is, why do my Perl scripts sometimes do it and sometimes don't - and I checked, all they do explicitly, is open for writing, and write, and close, not remove anything
The reason I care, is because I am a makefiles guy. As such, I don't want to touch _anything_ that does not need absolutely need to be touched, so that the system does not rebuild too much. Yes I do have dependencies on directories (meaning, their contents listing). When I do Perl scripts, sometimes, they will open an existing file for writing, and the directory gets touched. That's bad for me.
mgaleck{262}: touch test/foobar mgaleck{263}: ls -ld test drwxr-xr-x 2 mgaleck sw-team 138 Feb 5 03:30 test mgaleck{264}: date Tue Feb 5 03:31:12 PST 2013 mgaleck{265}: echo foobar > test/foobar mgaleck@hq1-up-swe-07{266}: ls -ld test drwxr-xr-x 2 mgaleck sw-team 138 Feb 5 03:30 test
Same does not happen on FreeBSD 8.3-STABLE when tried in zsh 4.3.10 & tcsh 6.18.01 (Astron) 2012-02-14 ...
mkdir -p ./tmp/test ; ll -d ./tmp/test ; sleep 60 ; echo > ./tmp/test/ +file ; ll -d ./tmp/test drwx------ 2 parv people 512 Feb 5 01:48 ./tmp/test/ drwx------ 2 parv people 512 Feb 5 01:49 ./tmp/test/
... got the same result when directory was created in /tmp. I have to say I would be (rudely) surprised if the directory modification time did not change after a file was created.
the question is, why do my Perl scripts sometimes do it and sometimes don't - and I checked, all they do explicitly, is open for writing, and write, and close, not remove anything
Maybe they use rename, maybe they use utime, maybe they call other functions or programs that do manage to change mtime, .... you seem to think open is responsible, but it probably isn't
On my NTFS windows machine, create modifies directory, delete modifies directory, but not append or clobber
However updating mtime after delete is not immediate, it is delayed (I assume a seeking optimization)
Re: why does open ">..." sometimes touches the directory?
by Anonymous Monk on Feb 05, 2013 at 08:44 UTC
That is, I don't want the directory timestamp touched.
Why do you care? It is very weird to care, suspicious even, in any case, utime
Re: why does open ">..." sometimes touches the directory?
by sundialsvc4 (Abbot) on Feb 05, 2013 at 14:08 UTC
Probably the safest assumption is simply to assume that “it might.” Actual behavior can depend on the OS-type and, within Unix/Linux, exactly what filesystem is used and how that filesystem is configured. All of which is really beyond your control. So, don&rquo;t get upset if the mod-time of a directory changes, and, don’t use mod-time as a sentinel to tell you whether or not you need to dumpster-dive into a particular directory.
Log In?
Username:
Password:
What's my password?
Create A New User
Node Status?
node history
Node Type: perlquestion [id://1017082]
Approved by moritz
help
Chatterbox?
and the web crawler heard nothing...
How do I use this? | Other CB clients
Other Users?
Others browsing the Monastery: (10)
As of 2015-11-25 07:55 GMT
Sections?
Information?
Find Nodes?
Leftovers?
Voting Booth?
What would be the most significant thing to happen if a rope (or wire) tied the Earth and the Moon together?
Results (672 votes), past polls | ESSENTIALAI-STEM |
1944–45 NHL season
The 1944–45 NHL season was the 28th season of the National Hockey League. Six teams each played 50 games. The Toronto Maple Leafs won the Stanley Cup in seven games versus the Detroit Red Wings.
League business
In October 1944, Lester Patrick sponsored W. G. Hardy to become NHL president, replacing Red Dutton who wanted to step down. Patrick credited Hardy for being largely responsible for the current professional-amateur agreement between the NHL and the amateur associations in the International Ice Hockey Association, and said he was "temperamentally suited and has an excellent record as an executive of the Canadian Amateur Hockey Association".
Regular season
It was the year of the "Punch Line" as Rocket Richard scored 50 goals in 50 games, breaking Joe Malone's record of 44 goals, and when Richard scored his 45th, Malone was on hand to present him with the record-breaking puck. Richard had a five-goal, three-assist night against Detroit at the Montreal Forum on December 28, 1944. His centreman, Elmer Lach, though, won the scoring race with 26 goals and 80 points. Toe Blake finished third with 29 goals, 38 assists, and for the second time, an entire line finished first, second, third scoring. The previous time had been in 1939–40, when the Boston Bruins' Kraut Line of Milt Schmidt, Bobby Bauer and Woody Dumart accomplished the feat. Schmidt finished with 52 points in 48 games that year, and Bauer and Dumart 43 apiece.
Montreal dared not loan Paul Bibeault to Toronto again with his fine year the previous season and loaned him instead to Boston. But the Maple Leafs came up with a fine rookie named Frank McCool who won the Calder Memorial Trophy as the league's top rookie. For the first time, a team produced three consecutive top rookies. McCool and Chicago netminder Mike Karakas tied for the league lead in shutouts with four each.
Bill Durnan won his second consecutive Vezina Trophy with Montreal. Flash Hollett became the first defenceman to score twenty goals in one season. The record would stand until Bobby Orr broke it several decades later.
A major trade that occurred this year was Chicago trading their great defenceman Earl Seibert to Detroit for Don Grosso, Cully Simon and Byron "Butch" McDonald. After team owner Frederic McLaughlin died, it was just a matter of time before Bill Tobin would trade Seibert, as the two did not get along.
(1) Montreal Canadiens vs. (3) Toronto Maple Leafs
The Montreal Canadiens finished first in the league with 80 points. The Toronto Maple Leafs finished third with 52 points. This was the fourth playoff meeting between these two teams with Montreal winning the two of the three previous series. They last met in previous year's Stanley Cup Semifinals where the Canadiens won in five games. Toronto won this season's ten-game regular-season series earning eleven of twenty points.
(2) Detroit Red Wings vs. (4) Boston Bruins
The Detroit Red Wings finished second in the league with 67 points. The Boston Bruins finished fourth with 36 points. This was the fourth playoff meeting between these two teams with Detroit winning the two of the three previous series. They last met in the 1943 Stanley Cup Finals where the Red Wings won in four games. Detroit won this season's ten-game regular-season series earning nineteen of twenty points.
Stanley Cup Finals
This was the eighth playoff meeting between these two teams with Toronto winning four of the seven previous series. They last met in the 1943 Stanley Cup Semifinals where Detroit won in six games. Detroit won this season's ten-game regular-season series earning seventeen of twenty points.
Scoring leaders
Note: GP = Games played, G = Goals, A = Assists, PTS = Points, PIM = Penalties in minutes Source: NHL
Leading goaltenders
Note: GP = Games played; Min – Minutes played; GA = Goals against; GAA = Goals against average; W = Wins; L = Losses; T = Ties; SO = Shutouts
Coaches
* Boston Bruins: Art Ross
* Chicago Black Hawks: Johnny Gottselig
* Detroit Red Wings: Jack Adams
* Montreal Canadiens: Dick Irvin
* New York Rangers: Frank Boucher
* Toronto Maple Leafs: Hap Day
Debuts
The following is a list of players of note who played their first NHL game in 1944–45 (listed with their first team, asterisk(*) marks debut in playoffs):
* Fern Flaman, Boston Bruins
* Murray Henderson, Boston Bruins
* Pete Horeck, Chicago Black Hawks
* Ted Lindsay, Detroit Red Wings
* Bill Ezinicki, Toronto Maple Leafs
* Frank McCool, Toronto Maple Leafs
Last games
The following is a list of players of note that played their last game in the NHL in 1944–45 (listed with their last team):
* Bill Thoms, Boston Bruins
* Cully Dahlstrom, Chicago Black Hawks
* Mush March, Chicago Black Hawks
* Johnny Gottselig, Chicago Black Hawks
* Kilby MacDonald, New York Rangers
* Bucko McDonald, New York Rangers
* Jack McLean, Toronto Maple Leafs
* John McCreedy, Toronto Maple Leafs | WIKI |
User:Jahar.dasgupta
Early life
Born in Jamshedpur (Tata Nagar, Jharkhand, India) in year 1942. Later he completed his further studies in painting from Shantiniketan Kala Bhavan Biswa Bharati in 1964.
Career
Group shows [1967-2007] Nehru Centre (London 2007); Maisonde 1’ Inde, Salle Indira Gandhi (Paris 2006); Indian Habitat Centre (New Delhi); Salon Exposition (South Korea); Academy of Fine Arts, (Kolkata); Jehangir Art Gallery (Mumbai), participated all group shows by Painters’ Orchestra in Mumbai, New Delhi, Shantiniketan and Kolkata. Solo shows [1967-2007] Chitrakut Art Gallery, Samokal Art Gallery, Lalit Kala Academy, Academy of Fine Arts, Birla Academy, Gallery Hansmania (Norway in 2005) and Club Bangladesh (Sweden in 2005) etc.
Influences & Impact
Being the student of Late Nandalal Bose and Ramkinkar Baij he has a major influence by these two eminent legends in his works. He is mainly inspired by another art icon of bengal late Binod Behari Mukherjee. Invited as a member of Millennium committee to organize exhibition and workshop under Biswa Banga Sammelan in 1999. Participated in many places like KalaMela organized by Lalit Kala Academy, Democratic Painters and Writers Association etc. Presently Vice President at Academy of Fine Arts Kolkata. Bengali Magazine “Shatak Ekush” honored Jahar Dasgupta by publishing the magazine on his works. Film Director Mr. Sandip Roy made a documentary film “Bornomoy Jahar” on his art works. Eminent poet Late Shakti Chatterjee wrote poem on his sketch on the releasing of a book “Poem on Paintings” in the Silver Jubilee of Painters’ Orchestra, 1994.
Glamour of his art
Jahar Dasgupta, born in 1st June, 1942 in the city Jamshedpur (Bihar), a veteran artist from Kala Bhavan, Shantiniketan, is well known among the artists of his age and to the critic for his stylized and figurative work. He is one of the most prominent figures in the Indian Art Industry. His figuration is full of graceful rhythm. Strongly inclined towards the traditional Indian decorative values, he tends to combine image of flora & fauna that excite the optic nerves. In his work he is not only independent; he is in search of an idiom which is individualistic. Certainly his painting portrays this and that, this and another story, which momentarily confuse the sight. But on closer scrutiny the experience is totally different.
Jahar, on the other hand wants art to spread wings, to percolate into the lives of ordinary people. Jahar normally works in colors. His art is two dimensional in form and linear in content. The use of colour is bright, the texture is compact and the work is reliant on surroundings. The thematic juxta position of ideas and novel approach. In his work there is a fusion of a modern mind and style with an independent streak. In his respect towards the traditional art form there is a richness of self realization. He empathizes with man and the society, colors and forms creation and commitment. Jahar Dasgupta is known for his ability to successfully marry traditional imagery with the zeitgeist of contemporary painting, in a skillful blend of an tribal culture and their influence in society. Some paintings highlights that women are the integral part of his paintings and nature is closest to him. He is rebel in his own world, challenging the barriers imposed by traditional ideas as well as contemporary theories. | WIKI |
Vietnam Veterans Against John McCain
Vietnam Veterans Against John McCain was a 527 Political Action Committee formed in 1997. The group made controversial allegations against John McCain concerning his time as a prisoner of war in Vietnam. The group was founded by Vietnam veterans Jerry Kiley and Ted Sampley.
In 2000, Sampley called McCain a "Manchurian candidate" on his Web site and said that McCain was an agent of the Vietnamese, and in 2008, Kiley, who says he served in Vietnam for about a year, was behind a flier that claimed McCain was a "Hanoi Hilton songbird" who collaborated with the enemy.
In 2004, Kiley and Sampley formed a similar group targeting another Vietnam veteran, John Kerry, who was running for the Democratic Party nomination for President of the United States. In May 2018, a Fox News analyst, retired Air Force Lt. Gen. Thomas McInerney, was terminated from the network for reviving the debunked charges against McCain, calling the senator “Songbird John”.
The group made a video in which Bob Smith, former Republican senator from New Hampshire, Bob Dornan, former Republican representative from California, former Congressional staffers and others made various allegations against McCain. The group also disseminated taped excerpts of McCain's questioning of Dolores Alfond of the National Alliance of Families before the United States Senate Select Committee on POW/MIA Affairs. | WIKI |
Talk:Hrkljuš
Domene?
I'm not so sure that "Domene!" means "It's me". I'd rather state "Next to me!", despite ugly expression. In any case, point is that there's no point. :) Wile E. Coyote (talk) 10:50, 14 July 2009 (UTC) | WIKI |
That Good Gut Feeling
That Good Gut Feeling
Today I would like to talk to you about your gut, and why taking care of your digestive system can be the single most important thing you do for your health. Scientists and nutritionists alike refer to the gut as the “Second Brain”. This is due to the importance it plays on our overall well being. The gut functions independently from the brain in a complex combination of sheaths and neurons lining the walls of the digestive tract, this is known as the enteric nervous system. Much of the job of this system is to deal with the daily tasks of breaking down food, absorbing nutrients and getting rid of the waste. However, this system does so, so much more, and its health is a direct reflection on our whole well-being.
Everyone has a microbiota (gut flora), which is unique to him or her. The microbiota is made up of both good and bad bacteria each having their own role and function. There are even more bacteria living inside your gut than there are human cells in the body (yes that means we are actually more bacteria than we are human.) Not to put too fine a point on it but maintaining this balance becomes paramount to a sustaining healthy body. This may all sound very complicated and it is, but also keeping the balance does not have to be.
There are many ways in which our micrbiota gets thrown off balance. The main reasons are a poor diet (high in trans fats, processed foods, low fiber and low water intake,) lack of exercise, poor nutrient intake and over use of antibiotics. Poor gut health is one of the leading causes of illnesses in the western world, but the good news is its is preventable and reversible.
It Take (Good) Guts!
Happy Guts = Happy Mind:
There is 30 neurotransmitters found in the enteric nervous system. 95% of serotonin is found in the gut. Serotonin is known as the happy hormone, it is an antidepressant neurotransmitter; therefore good gut health will lead to good brain health. This is but only one role the gut plays on mental health.
Immunity:
Four thirds of the body’s immune system is found in the digestive tract. Your gut is actually your first line of defense against foreign invaders to the body. Technically your digestive tract is on the outside of your body, complicated I know but bear with me. The whole tract is covered by epithelial cells (aka: skin) just like the outside of your body. And it is the good gut bacteria, which controls what gets absorbed and utilized in the body and what gets pushed through as waste. When the bad bacteria in the gut outnumbers the good this selection process gets altered and more harmful materials get in.
Bad gut = Weight gain:
An unhealthy microbiota can lead to dysbiosis, which causes weight gain. There are also new studies, which have linked poor gut microbiota to obesity. Your microbiota will effect how your body metabolizes foods, leading to poor or low metabolism will effect how we gain or lose weight.
Gut Check: How To Have a Healthy Gut
Prebiotics: These are foods that help prepare the system for proper digestion. One of the best prebiotics is fiber. Fiber is one of the most important nutrients for the digestion, it is what keeps things moving and pulls the toxins out with it. Fiber also helps to nourish your microbiota encouraging the good guys to grow and multiply. Get your fiber through vegetables, fruits and whole grains and avoid processed foods with added fiber.
Probiotics:
Are substance that stimulates the growth of microorganisms in the intestinal flora (microbiota.) Probiotics work by adding good bacteria to the gut and balancing out the bad. We actually do need both. There are a few ways you can add probiotics to your health routine: eat it, drink it or take it. Fermented foods such as sauerkraut or kimchi are excellent sources and usually have lots of healthy strains. Fermented drinks such as kombucha (fermented tea) or kefir (fermented dairy) are also easy tasty sources. And if the fermented foods are not to your liking then there are many probiotic supplements on the market. When supplementing make sure you are choosing good quality brands, your local health food store will be able to help you pick the one that is right for you.
Apple cider vinegar:
If taken before meals, ACV will prime the system for digestion by stimulating the release of bile by the pancreas. If you are finding yourself feeling bloated, gases or have heartburn try a spoon full of ACV before meals and this should help calm your system down.
Water!:
Without adequate hydration the body cannot get ride of waste, leading to toxins being reabsorbed in the body. Water acts as the transport system in your digestive tract, circulating nutrients through the body. So make sure you are getting at least 64 oz. a day. Try adding a little lemon to your water (which contain pectins which encourages good intestinal flora.)
Happy (Gut) Health! | ESSENTIALAI-STEM |
Bernard Stonehouse
Bernard Stonehouse (1 May 1926 – 12 November 2014) was a British scientist who specialised in animal behaviour, polar research and popular science. In 1953 he received the Polar Medal.
Early life and military service
Stonehouse was born in Hull on 1 May 1926. He attended Hull Grammar School before joining the Royal Navy in 1944, and was seconded as a naval pilot to the Falkland Islands Dependencies Survey (later renamed the British Antarctic Survey) from 1946 to 1950.
Further education and career
After returning to Britain in 1950, Stonehouse studied zoology and geology at University College, London, and then earned his D.Phil. from Edward Grey Institute of Field Ornithology and Merton College, Oxford, which involved spending 18 months studying emperor penguins on South Georgia.
He led the British Ornithologists' Union's centenary expedition to Ascension Island between 1957 and 1959. From 1960 to 1968, Stonehouse worked at the University of Canterbury (Christchurch, New Zealand) and later appointments saw him working at the University of British Columbia, the University of Bradford, and, as editor of the Polar Record, at the Scott Polar Research Institute (part of the University of Cambridge). He retired as editor in 1992 but continued as a senior associate, forming the institute's Polar Ecology and Management Group, and promoting Antarctic tourism.
Stonehouse's notable students include Graeme Caughley and Ian Stirling.
Personal life
Stonehouse married Sally Clacey in 1955; they had two daughters and a son. He died on 12 November 2014.
Legacy
He is commemorated in the names of Stonehouse Bay and Mount Stonehouse.
Selected publications
* Animals of the Arctic: The Ecology of the Far North (1971)
* Young Animals: The Search for Independent Life (1973)
* Saving the Animals: The World Wildlife Fund Book of Conservation (1981)
* The Last Continent: Discovering Antarctica (2000)
* The Truth about Animal Intelligence (2002)
* The Truth about Animal Senses (2002) | WIKI |
Nuxt 3 Release Candidate is out! Discover more about it on v3.nuxtjs.org
The alias property
Nuxt allows you to use aliases to access custom directories within your JavaScript and CSS
• Type: Object
• Default:
{
'~~': `<rootDir>`,
'@@': `<rootDir>`,
'~': `<srcDir>`,
'@': `<srcDir>`,
'assets': `<srcDir>/assets`, // (unless you have set a custom `dir.assets`)
'static': `<srcDir>/static`, // (unless you have set a custom `dir.static`)
}
This option lets you define aliases to directories within your project (in addition to the ones above). These aliases can be used within your JavaScript and CSS.
nuxt.config.js
import { resolve } from 'path'
export default {
alias: {
'images': resolve(__dirname, './assets/images'),
'style': resolve(__dirname, './assets/style'),
'data': resolve(__dirname, './assets/other/data')
}
}
components/example.vue
<template>
<img src="~images/main-bg.jpg">
</template>
<script>
import data from 'data/test.json'
// etc.
</script>
<style>
@import '~style/variables.scss';
@import '~style/utils.scss';
@import '~style/base.scss';
body {
background-image: url('~images/main-bg.jpg');
}
</style>
Within a Webpack context (image sources, CSS - but not JavaScript) you must prefix your alias with ~ (as in the example above).
If you are using TypeScript and want to use the alias you define within your TypeScript files, you will need to add the aliases to your paths object within tsconfig.json.
Edit this page on GitHub Updated at Sat, Sep 24, 2022 | ESSENTIALAI-STEM |
Page:Tracts for the Times Vol 2.djvu/446
336 or adults, who made profession of their "faith," as, also, that it is said to be administered in order to signify and attest internal absolution from or remission of sin by the blood of : but it is opposed to that view, in that it is added, "and at the same time to commence renovation or regeneration through the ." On the Supper, it states, that "both the earthly and heavenly parts are in a different way, but each most truly, really and presentially exhibited to us, viz., the earthly, in a natural, corporeal, earthly manner; the heavenly, in a spiritual, mystical, and heavenly, which, being inscrutable to sense and reason, we hold by faith only, whereby we apprehend the words of promise and the thing itself promised, viz. crucified, with all His benefits" So much a Zuinglian, perhaps, might admit, affixing his own meaning to the words; but then they proceed to state, (as in the Leipzig Colloquy) that the "Sacramental union, consisted, not in the bare signifying, nor only in the sealing, but also in that united and simultaneous exhibition and communicating of the earthly and heavenly part of the Sacrament, although of diverse manners." Again, in half Zuinglian language, they add, "we by no means maintain that they are bare, empty, void signs, but rather exhibiting that, which they signify and seal;" but then they subjoin instantly, "as most certain means and efficacious instruments, whereby the Body and Blood of, and even Himself, with all His benefits, is exhibited or offered to all who partake of the element, but is conferred, given, to believers, and received by them as a salutary and life-giving food of the soul." They say again, that "not only the virtue, efficacy, operation, or benefits of Christ, are presented and communicated to us, but especially, the very substance of the Body and Blood of Christ, or that very Victim, who was given for the life of the world, and slain upon the Cross, so that by a faithful communion of this Victim, and by the union with Christ Himself, we are, consequently, partakers of the merits and benefits obtained by His sacrifice, and as in us, so we remain in Him;" which, again, is opposed to the Zuingli-Calvinist view.
This use of the Reformed language, though not in the sense of the Reformed, may help to explain a remarkable phenomenon in our own Articles. Whereas, namely, the language of our Baptismal service, is entirely formed upon the model of the ancient Church, and altogether pure from modern theories (see Note M); and again, our Catechism says, that by the "inward and Spiritual grace of Baptism," "we being by nature born in sin, and the children of wrath, are made children of grace;" both which statements the Zuingli Calvinist denied; much of the language of our Article on Baptism resembles that of the Calvinist school, although none of the peculiar marks of that school, above-enumerated, (p. 225,) occur in it. It is clear, that our Articles also, do not express that view, inasmuch as they assert, (Art. 25,) "that the Sacraments of are effectual signs of | WIKI |
gall bladder stone
Dealing with gall bladder stones can be an excruciating experience, with pain being a primary concern. These small, solid particles that develop in the gall bladder can lead to intense discomfort and necessitate effective pain relief strategies. In this comprehensive guide, we will explore a range of methods to manage gall bladder stone pain, offering insights into both medical and natural approaches that can provide relief and improve your quality of life.
Understanding Gall Bladder Stones and Pain
Gall bladder stones, also known as gallstones, are hardened deposits that can form in the gall bladder due to an imbalance in the composition of bile. When these stones obstruct the normal flow of bile or irritate the gall bladder lining, they can trigger pain. The pain is typically experienced as a sharp, sudden sensation. In the upper abdomen, often radiating to the back or right shoulder. Understanding the connection between gall bladder stone and pain is crucial for effectively managing this discomfort.
gall bladder stone
Medical Relief Strategies for Gall Bladder Stone Pain
1. Pain Medications: Over-the-counter pain relievers such as ibuprofen or acetaminophen can help alleviate mild to moderate gall bladder stone pain. However, it’s important to use these medications under the guidance of a healthcare professional to avoid potential side effects.
1. Prescription Medications: In cases of more severe pain, a healthcare provider may prescribe stronger pain medications or antispasmodics to help relax the gall bladder and provide relief.
1. Laparoscopic Cholecystectomy: Surgical removal of the gall bladder, known as laparoscopic cholecystectomy, is a highly effective treatment for gall bladder stones. This procedure not only addresses the pain but also prevents future stone-related issues.
1. Endoscopic Procedures: Procedures like ERCP (Endoscopic Retrograde Cholangiopancreatography) and ESWL (Extracorporeal Shock Wave Lithotripsy) can be used to break down or remove gall stones, offering relief from pain and other symptoms.
Natural and Lifestyle Relief Strategies
Dietary Modifications: Adjusting your diet can play a significant role in managing gall bladder stone pain. A low-fat diet helps reduce gall bladder stimulation, decreasing the likelihood of pain triggers. Incorporating more fiber-rich foods supports digestion and overall gall bladder health.
• Hydration: Staying well-hydrated is essential for promoting bile production and aiding digestion, potentially leading to pain relief.
• Herbal Remedies: Certain herbal supplements, such as milk thistle and dandelion, are believed to support gall bladder function and alleviate pain. Consultation with a healthcare professional is advised before incorporating any herbal remedies.
• Heat Therapy: Applying a hot compress to the painful area can help relax the gall bladder and alleviate discomfort. Be cautious about temperature to prevent burns.
• Stress Management: Chronic stress can worsen gall bladder symptoms. Engaging in relaxation techniques, such as deep breathing, meditation, or yoga, can effectively manage stress and potentially reduce pain.
Lifestyle Adjustments for Gall Bladder Stone Pain Management
Weight Management: Maintaining a healthy weight is crucial for reducing the risk of gall stone formation and managing pain. Avoid rapid weight loss, as it can trigger gall stone-related symptoms.
Smoking Cessation: Quitting smoking is not only beneficial for overall health but can also reduce the risk of gall stone development and alleviate pain.
Regular Medical Check-ups: Scheduled visits to a healthcare provider enable the monitoring of gall bladder health and the implementation of preventive measures to manage pain effectively.
Conclusion
Effectively managing gall bladder stone pain requires a multi-faceted approach that encompasses medical interventions, natural remedies, and lifestyle adjustments. By understanding the causes of pain and collaborating closely with healthcare professionals, individuals can tailor a pain relief plan to their specific needs. Whether through surgical procedures, dietary modifications, or holistic practices, the goal is to minimize discomfort and enhance the overall well-being of those grappling with gall bladder stones. Always remember that personalized guidance from medical experts is paramount for addressing individual concerns and achieving optimal outcomes. | ESSENTIALAI-STEM |
Särkijärvi
Särkijärvi is a medium-sized lake in the Vuoksi main catchment area. It is located in the North Karelia region in Finland, close to border with Russia. There are 178 lakes with this name in Finland. This lake is the biggest of them. | WIKI |
CBD Frequently Asked Questions
Learn more about CBD, and find the answers to some of the more commonly asked questions.
Not a fan of CBD, we have a great range of natural skincare without a drop of CBD.
All our products containing CBD are clearly labelled, and so you can be confident you will find a product that meets your needs.
Runk + CBD
Introduction
We have sought to pull information together to help you develop your understanding of CBD. We sell products as skincare or food supplements only. We do not have a medical background, and we recommend you seek medical advice before using any of the products advertised on our website.
You should undertake your own wider range of research on CBD, to make informed decisions.
What is CBD?
CBD stands for Cannabidiol oil and is derived from the marijuana plant (Cannabis). It is one of many active ingredients in the plant. It is a naturally occurring compound that is extracted from the plant.
CBD is gaining in popularity across the wellness and health world, and there is increasing scientific research being undertaken to validate the potential medical benefits. However, there is too little proven and peer approved medical research on the full benefits of CBD for medicinal purposes.
CBD is often recommended by friends and family who have benefited from its properties, who believe it can relieve pain, could reduce anxiety and depression and potentially reduce acne.
Why take CBD orally?
It is believed that CBD can relieve pain, reduce anxiety and depression to name but a few. CBD is often recommended by friends and family who have benefited from its properties.
Why take CBD topically?
It is believed that CBD is anti-inflammatory, anti-ageing and can relieve pain. Our natural skincare range, includes a number of natural oils and butters, which are also great for the skin and body, such as Camphor Oil, Arnica Oil, and Menthol Oil.
Are Cannabidiol and Cannabinoid the same?
No. Cannabidiol (CBD) is a compound.
Cannabinoid is a group of compounds found in the cannabis plant, other compounds include THC, CBN, CBD, CBG and CBC.
Is CBD the same as HEMP?
When people refer to hemp seed oil, they are referring to the oil derived from cold pressing the seeds of the marijuana plant. This hemp seed oil is used in skincare and for cooking. There is no CBD or THC in hemp seed oil.
Is there absolutely no THC?
Different distillation and forms of CBD such as isolate, broad spectrum and full spectrum will have removed differing levels of THC. There is a common misconception that the home office has set a limit of 0.2% for THC, but this is for the licencing of cultivating the hemp plant.
The only way to be sure of the level of THC or absolute non-presence of THC is to check the data sheets available for the product.
To be legal THC should not be able to be isolated from the product and extracted, and not be detected (detection at 0.01%) under laboratory (ISO accredited). Therefore a claim for No THC can contain 0.01%.
What is Isolate / Broad Spectrum / Full Spectrum?
All three are legal and Safe forms of CBD:
CBD isolate is considered the purest form of CBD that is pulled from the plant. CBD isolate is 99.9% CBD
Broad Spectrum includes terpenes, CBD and other cannabinoids such as, CBG, and CBC
Full spectrum includes terpenes, CBD and other cannabinoids such as CBD, CBG and THC. Full spectrum can still be used in CBD products, as long as the THC levels are low and cannot be isolated. The levels are low enough to ensure you cannot get high
What are terpenes?
Terpenes are natural aromatic compounds found in many plants, not just marijuana. Terpenes are aromatic oils, that give each variety of plant its distinct flavour. They are a primary component of essential oils.
Is it legal?
CBD is legal, but there are many additional laws or requirements.
For CBD to be legal, THC should not be able to be isolated from the product and extracted, and not be detected (detection at 0.01%) under laboratory (ISO accredited).
Other laws governing CBD products: skincare will need a Cosmetic Product Safety Report (CPSR)
CBD Flowers, regardless of THC limit are illegal.
CBD taken orally (eaten), is subject to the EU regulations from 2015 – The Novel Food Regulation. CBD has been confirmed as a novel food status. Once a product is authorised under the Novel Food regulation, it cannot be changed (manufacturing/use) without further assessment, however, authorisation itself is not specific to the applicant and the final product may be branded in different ways.
Will I get "High" / "Stoned" from CBD?
CBD is one of hundreds (113) of different components (Cannabinoid) from the marijuana plant, it does not get you high.
The WHO Report: https://www.who.int/medicines/access/controlled-substances/5.2_CBD.pdf states “In humans, CBD exhibits no effects indicative of any abuse or dependence potential…. To date, there is no evidence of public health related problems associated with the use of pure CBD.”
The active ingredient in Marijuana that drives the “high” associated with CBD, is delta-9-tetrahydrocannabinol (THC), CBD is not psychoactive.
Leaving the UK with CBD products
Most other countries have differing laws on CBD, therefore we suggest you check the laws of the country you are traveling to and those you travel via, before packing your CBD skincare and oral products.
What is THC (Tetrahydrocannabinol)?
THC (tetrahydrocannabinol or delta-9-tetrahydrocannabinol) is another active ingredient in the marijuana plant. This is the active ingredient that will get you high, this is the physcoactive compound found in Cannabis. It is illegal to sell products containing THC.
Can I take CBD with other medications/supplements
Seek medical advice first.
Will I fail a drug test?
World Anti-Doping Agency’s Prohibited List does not include CBD, but all other cannabinoids are listed, including THC.
Check your product carefully, the only way to be sure of the level of THC or absolute non-presence of THC is to check the data sheets available for the product. You should consider the use of CBD carefully.
https://www.ukad.org.uk/cannabidiol-cbd
How much can I take / CBD Dosage?
How much CBD in mg you should take is down to the individual, and can be impacted by things such as weight, physical condition, genetics, and body chemistry. What works for one person may be different for another person.
Start low, and see how your body responds. Some people may only need 1mg a day, others may need a much higher dosage. Desired effects may not be instantaneous, so patience is key, it may take a couple of weeks.
Try to maintain a consistent level for about a week, only increase every week or so. You may need to increase your intake overtime. If you have increased your dosage too quickly, you may experience headaches and nausea, in this instance lower your dosage.
The Food Standards Agency suggests healthy adults take no more than 70mg a day, this is about 28 drops of 5% CBD. This is not a target, nor does it confirm that levels below this are definitely safe.
Not all droppers are calibrated so may issue different amount of volume per drop. On average a standard dropper will produce 0.05ml of liquid per drop. Which is 20 drops per 1ml.
How is CBD measured? How can I compare products?
Measured in MG per container size
The potency of the product, depends on the total size of the product, and the total mg of CBD in the product. You can calculate the potency by dividing the potency by the bottle size.
(CBD contents in mg / total volume = potency per ml)
A 100mg in a 10ml bottle would give you 10mg per ml.
A 100mg in a 30ml bottle would give you 3mg per ml
A 1,000mg in a 10ml bottle would give you 100mg per ml
10mg per ml = 0.5mg per drop.
3mg per ml = 0.15mg per drop
100mg per ml = 5mg per drop
Not all droppers are calibrated so may issue different amount of volume per drop. On average a standard dropper will produce 0.05ml of liquid per drop. Which is 20 drops per 1ml.
Using the above calculations, you should be able compare the potency of each product. Remember, it’s about finding the right strength for you, so don’t just go for the most potent product.
Potency isn’t the only distinguishing difference between products, consider purity, quality assurance, and carrier used
What is meant by purity?
CBD needs to be extracted, there are a number of means of doing this, but the recommended way is supercritical CO₂, which ensures a safe form of extract free from residues or additives. Avoid CBD oils made with chemicals like propane, butane, pentane and hexane
Can I drive whilst using CBD?
In 2015, the law changed for driving and drug usage, to clamp down on drug driving and making the roads safer for all. There are 16 specific drugs specified, Cannabis (delta-9-tetrahydrocannabinol) is one of those listed, you can see further information on the government website.
https://www.gov.uk/government/collections/drug-driving#table-of-drugs-and-limits
https://www.gov.uk/drug-driving-law
Although CBD oil is considered safe for most, check the quality and contents of your product, and be aware of your body. Everyone is different and your body’s chemistry may react differently to different strength products.
DO NOT Drive, if you
• Have taken drugs.
• If in doubt about prescriptions, check with a professional.
• are unsure, don’t take the risk
Age restrictions
It is recommended that CBD not be sold to, or acquired for those under 18 | ESSENTIALAI-STEM |
Talk:I Understand (Just How You Feel)
Possible sampling of Auld Lang Syne
Having listened to the Dreamers' version, I notice that Auld Lang Syne seems to be being sung in the background. Is this a one-off or is it standard for all versions?--<IP_ADDRESS> (talk) 22:46, 26 January 2011 (UTC) | WIKI |
Portal:United States
Poetry
* Americanisation, poem by Author:Gilbert Keith Chesterton
* An American, poem by Author:Rudyard Kipling
Federal historical documents
* Mayflower Compact (1620)
* Navigation Acts (1651)
* East-Hampton Pattent of Thomas Dongan (1686)
* Albany Plan of Union (1754)
* Considerations on Behalf of the Colonists (1765)
* Declaration of Rights and Grievances (1765)
* Letter to the Inhabitants of the Province of Quebec (1774)
* Letter to the oppressed inhabitants of Canada (1775)
* Declaration of the causes and necessities of taking up arms (1775)
* The Olive Branch Petition (July 1775)
* Declaration of Rebellion (23 August 1775)
* Letter to the Inhabitants of the Province of Canada (1776)
* United States Declaration of Independence (4 July 1776)
* Treaty of Tripoli (7 June 1779)
* Memorial and Remonstrance (20 June 1785)
* Constitution of the United States of America (17 September 1787)
* The Federalist Papers, 1788
* Residence Act of 1790
* Saint Petersburg Convention (1824)
* Appeal of the Cherokee Nation (1830)
* Treaty of Medicine Creek (1854)
* Know-Nothing Platform 1856
* Homestead Act (1862)
* Morrill Act (1862)
* Portal:Quantrill's Raid into Kansas (1863)
* Report of Col. Abel D. Streight (1864)
* Annexation Bill (1866)
* U.S. Patent 268503 (1882)
* Dawes Act (1887)
* Confederate Military History, Vol. III (Confederate Publishing Company, Atlanta, GA, 1899)
* Lodge Committee testimony from the New York Times (1902)
* The Declaration of the Rights of the Negro Peoples of the World (1920)
* Treaty of Peace between Germany and the United States of America (1921)
* Daniel Inouye's Medal of Honor Citation (1945)
* The Long Telegram (1946)
* Memo PPS23 by George Kennan (24 February 1948)
* Nathaniel Weyl testimony corroborating Alger Hiss as member of CPUSA secret apparatus (1953)
* Southern Manifesto (1956)
* Explanation and History of Venona Project Information (1956)
* Voting Rights Act of 1965
* President's Daily Brief, June 9, 1967
* Alternative Materials for One Cent Coinage (Treasury Dept, 1973)
* Belmont Report (1979)
* Current Crisis in South Africa Desmond Tutu's testimony before U.S. Congress (1984)
* Report to the President for the White House Conference On Hate Crimes by the Metropolitan Community Churches (November 1, 1997)
* 1997 Special Investigation in Connection with 1996 Federal Election Campaigns
* Grand Jury indictment of Osama bin Laden (1998)
* August 6, 2001 Presidential Daily Brief ("Bin Ladin Determined to Strike in US")
* Working Group Report on Detainee Interrogations (4 April 2003)
* 9/11 Commission Report (July 26, 2004)
* White House Press Releases:March 17 2005
* Hurricane Katrina state of emergency declaration (August 27, 2005)
Revolution & Independence
* Declaration of Independence & "Original Rough Draught" of the Declaration of Independence
* Treaty of Paris (1783), in which the United Kingdom recognizes the United States
Confederate documents
* Provisional Constitution of the Confederate States of America
* Constitution of the Confederate States of America
Federal Government of the United States
Executive Branch
United States Department of State
* U.S.-Australia-Japan Trilateral Strategic Dialogue (2022)
* Albania
* Consular Information Sheet - Albania
* Austria
* International Religious Freedom Report 2006 - Austria
* International Religious Freedom Report 2005 - Austria
* International Religious Freedom Report 2004 - Austria
* International Religious Freedom Report 2003 - Austria
* International Religious Freedom Report 2002 - Austria
* International Religious Freedom Report 2000 - Austria
* International Religious Freedom Report 1999 - Austria
* Czechoslovakia
* American Recognition for the Czechoslovaks (3 September 1918)
* Germany
* International Religious Freedom Report 2006 - Germany
* International Religious Freedom Report 2005 - Germany
* International Religious Freedom Report 2004 - Germany
* International Religious Freedom Report 2003 - Germany
* International Religious Freedom Report 2002 - Germany
* International Religious Freedom Report 2000 - Germany
* International Religious Freedom Report 1999 - Germany
* India
* Consular Information Sheet - India
* Israel
* Jerusalem 1500
* Jerusalem 3239
* Jerusalem A-19
* Letter to Ariel Sharon from George W. Bush supporting disengagement plan (14 April 2004)
* Japan
* Joint Statement of the U.S.-Japan Security Consultative Committee (16 March 2021)
* Soviet Union
* Telegram From the Department of State to the Embassy in the Soviet Union (August 29, 1979)
United States National Security Council
* NSC-68 (1950)
* Paper by the Psychological Strategy Board (1976)
United States Department of Justice
* Justice Department Memo on Torture
* Letter of Deputy Attorney General appointing Patrick Fitzgerald Special Counsel for investigating Plame leak (December 30, 2003)
* Letter of Deputy Attorney General clarifying powers of Special Counsel for investigating Plame leak (February 6, 2004)
* Background Checks for Firearm Transfers, 2005
* Memorandum of Deputy Attorney General delegating authority for investigating Plame leak (August 12, 2005)
* Medical Malpractice Insurance Claims in Seven States, 2000-2004 (2007)
* Report Regarding the Criminal Investigation into the Shooting Death of Michael Brown (March 4, 2015)
* Investigation of the Ferguson Police Department (March 4, 2015)
* A Review of Various Actions by the Federal Bureau of Investigation and Department of Justice in Advance of the 2016 Election (June 2018)
FBI documents
* FBI Memo Morgan to Clegg, January 14, 1947
* Memorandum for the Attorney General, January 27, 1947
* FBI Memorandum identifying Harry Dexter White as agent Jurist (1950)
* FBI Memo Brent to Hennrich, October 30, 1950
* Letter from William L. Borden to J. Edgar Hoover, November 7, 1953
* Explanation and History of Venona Project Information
* FBI Synopsis on "Operations of the MGB Residency at New York, 1944-45" (1957)
* Weather Underground Declaration of a State of War (May 20, 1970)
* A Review of Allegations of a Double Standard of Discipline at the FBI, 2002
National Monuments
* Dunes and Dreams: A History of White Sands National Monument - (Michael Welsh April 1995)
National Parks
* 2004 Visitor Study
* Joshua Tree National Park Superintendent's Report - July – September, 2004
United States Department of Defense
* Portal:United States Department of Defense
U.S. Army documents
* German Antiguerrilla Operations in the Balkans (1941-1944)
* US Army Operator's Manual for the AK-47
* US Army 15-6 Report of Abuse of Prisoners in Iraq (Taguba Report, 2004)
* US Army Directive removing authority for discharges from battalion commander level (May, 2005)
* Calipari Report
* U.S. Department of the Army No Gun Ri Review Report
* Statement of Mutual Understanding on the No Gun Ri Investigations
U.S. Navy documents
* SECNAV Instruction 10520.6 (31 May 2002) - display of the first navy Jack during the Global War on Terrorism
* SCAPIN-301: Commerical and Civil Aviation (18th November 1945)
Other military documents
* Creed of the Noncommissioned Officer
CIA documents
* MJ-12 Document (18 November 1952)
* CIA and Guatemala Assassination Proposals: CIA History Staff Analysis (June, 1995)
* CIA Adds Four Stars to Memorial Wall, 2007
* Message to Cyrus Vance about CIA Agents
* Statement of CIA Inspector General to The House Committee On Intelligence - March 16, 1998
* The World Factbook, 1982
* The World Factbook, 1990
* The World Factbook, 2004
* CIA Report on NGOs With Terror Links, 1996
Documents of other intelligence agencies
* Venona 687 KGB New York to Moscow, 13 May 1944, Perlo group (13 May 1944)
* Venona 79 KGB New York to Moscow, 18 January 1945, KGB in Treasury (18 January 1945)
* Documents Seized from the US Embassy in Tehran, 1979
United States Department of Commerce
* Portal:U. S. patents
* Portal:National Weather Service
* Census Bureau
* U.S International Trade in Goods and Services - February 2007
* Summary of the Africa Investment Incentive Act of 2006 (2006)
Other
* ICD-10-CM (2010)
* American Red Cross 1917
* Telegram 28513 From the Embassy in Thailand to the Department of State, October 14, 1976
* Statement of Policy Regarding Comparative Advertising (1979)
* Statement on United States Oceans Policy (1983)
* United States – Vietnam Joint Vision Statement (2015)
* Economic and Trade Agreement Between the Government of the United States and the Government of the People's Republic of China (2020)
* Competent Authority Agreement Regarding the Interpretation of Article 19 of the Agreement Between the Government of the United States of America And the Government of the People's Republic of China
* Portal:Presidents of the United States
Legislative branch
United States Senate
* Letter to Mark P. Mays from Senator Harry Reid (2 October 2007) - (Author: Senator Harry M. Reid D-NV)
* Statement of Richard A. Clarke to the Senate Committee on Banking, Housing, and Urban Affairs, October 22, 2003
* Statement by Senator Jeff Flake of Arizona on October 24, 2017
United States House of Representatives
* Brecht HUAC hearing (1947-10-30) transcript
United States Congressional Research Service
* The Cultic Phenomena: New and Emerging Religious Movements in America
Judicial branch
Supreme Court of the United States
* Portal:Supreme Court of the United States
Other
* Canada, England and the United States, 1899 speech by Wilfrid Laurier
* The History of New England 1630 to 1649, 1908 by James Kendall Hosmer
* Dramatic Moments in American Diplomacy, 1918 by Ralph Page
* Human Rights Record of United States in 2007, printed by the Chinese information office
* American Convention on Human Rights, adopted at the Inter-American Specialized Conference on Human Rights, 1969
* A History of Banking in the United States (1896) by William Graham Sumner
* Czechoslovakia's tribute to the memory of Woodrow Wilson, 1924
* Czechoslovakia's tribute to the memory of Woodrow Wilson, 1924
Works about
* The Report on Human Rights Violations in the United States in 2022 - State Council Information Office of the People's Republic of China
* The State of Democracy in the United States: 2022 - Ministry of Foreign Affairs of the People's Republic of China
History
* Portal:American History
* Portal:Philippines, a former protectorate of the United States
Literature
* Portal:American literature
Locations
* Portal:New Orleans
* Portal:Puerto Rico, a protectorate of the United States
* Portal:States of the United States
Projects
* WikiProject NARA
* WikiProject United States Executive Orders
* WikiProject U.S. Supreme Court cases
Science
* Portal:Paleontology in the United States | WIKI |
walkie talkie
Understanding Advanced Radio Communication
In the technological era, communication has a vital role in keeping up with the fast-changing world. The modern advancements in communication technology have created a greater world that allows people to talk and commute easily and vividly. More importantly, the discovery of advanced radio technology has shown a greater advantage in today’s era as scientific forums have discussed, as can be seen in https://www.its.bldrdoc.gov/isart/past-programs/2012-isart-speakers.aspx
In fact, radio modern communication methods have been brought to an unsurpassed level. The simplicity of communication improves the workplace’s integrity by reducing the time and money spent on communication issues. Together with radio guidance, employees can quickly keep in touch. Radio, as a modern method of communication, is undoubtedly leading to a revolution in communication.
The Importance of Advanced Radio Communication
The invention of advanced radio communication has indicated a greater impact on an industrial and construction site. It helps thousands of workers to get the right instruction and motivation from their manager or supervisors to work properly, although they are not available at the construction site. Thanks to the two-way radio communication techniques that ensure these people are in constant contact with each other. Also, these radios are exceptionally powerful and very valuable to campus security personnel. During an urgent case, radio communication can be the only possible communication to let others get informed while eliminating the risk of being known by the intruder or other security attackers.
The Installment of Advanced Radio Communication
two way radio communicationAs you know the importance of advanced radio communication, you might start thinking about installing one. The best thing to do is to call a system specialist as there is more to prepare. They can help you proposing the type of equipment and the number of radio devices you will need, along with the machine’s frequency or the power required to operate it effectively.
Then, you have to discuss the rate for this setup and make a deal with them. Once it is completed, you can start the installment. The basic systems of the radio equipment will be established so that your company immediately has an efficient and specific communication system. These radio communication systems are portable wireless devices that are incredibly comfortable and easy to use.
The Rent of Advanced Radio Communication
In case you need an advanced radio communication for events, you can choose to rent these devices rather than install one. Many companies offer both the sale and use of wireless devices for a moderate rental purchase. This type of company often handles maintenance and repair as well. Hence, it is better to choose this type of company for all these services because they know more about the tool.
When it comes to security, these devices offer exceptional service. The price and time spent on manual communication are enormous and rather impractical than the speed of communication and action that you can see when installing radios for communication. It can be said that radios are the best modern communication method that humanity has had and will
wearing headphone can be advantageous but at the same time can also be harmful
Advantages and Disadvantages of Wearing Headphone
Clearly there was a time when people enjoyed the natural sounds of the world, and there were no sounds that could make people feel uncomfortable. Today noise pollution is a big problem, and the planet is full of noises that are not pleasant for the vast majority of people, so this is where noise-canceling headphones have become part of our lives. Today, people use noise-canceling headphones to protect themselves from the outside world or concentrate on their important work, requiring pure concentration. However, many people still debate about the positive and negative effects of wearing headphones.
With technology growing every day, the market is filled with gadgets like earplugs, Bluetooth headsets, noise-canceling headsets, and other items like these. You will find many products that will fascinate you, but with each new technology and each new product, there is an important question that lifts an individual’s mind, whether this solution or technology is worth the price or whether it is really great for you or not. So you must understand the advantages and pitfalls of a noise-canceling headset to know whether or not it hurts. There are debates about you may use headphones or not. Below are some of the advantages and disadvantages that will help you decide either you want a pair of headphones.
Wearing headphone wisely is the best you can do
Blockage of External Sounds
Sometimes it’s hard to escape the outside world, including all the noise around you so that noise-canceling headphones can help you with all the congestion. Although there are some limitations, outside noise can be obstructive, but it is still useful to protect you from unpleasant outside noise.
Low Volume
Almost every time, people changed the volume of their music too loud to disturb other unpleasant noises and enjoy the sound in peace. With noise-canceling headphones, you don’t need to turn the volume up too loud so you can stay away from different sounds. Headphones suppress outside noise so you can hear the sound.
Better Listening Experience
Noise-canceling cans or Bluetooth headsets will certainly give you a much better hearing experience and you’ll be able to concentrate fully on your most important conversations and needs. Reducing outside noise helps protect you from outside noise and provides a much better hearing experience.
Ideal for Studying
Noise-canceling headphones are ideal for people who travel frequently by air or use any transportation means for their journey. With these headphones you can avoid outside noise and concentrate on work, reading, studying or even sleeping. You can also focus better on your research because outside noise does not irritate you and limits your attention.
Among all of the advantages of using headphones, experts say that using headphones may also disadvantage you in many reasons. Here are some reasons
Cost
The cost of audio Turning off the headset or Bluetooth headset may be the biggest drawback, as these devices are expensive compared to a normal headset. The features, layout, and structure of these devices are complicated, making the price of these noise-canceling headsets higher.
High Power Usage
charge
How to Extend Your Lithium-Ion Battery
If you have a lithium battery, you should visit some websites for strategies to extend its life. In this guide, we will discuss some techniques to achieve this goal. Today, battery life is extremely important, especially about cell phones. Here are some ways to extend battery life.
Room Temperature Limits
So what you need to do is avoid leaving the battery in your car or truck when you have parked it in the sun.
High Capacity Battery
Therefore, it is important not to forget that a spare battery is not a wonderful idea. The extra battery will not give you more energy than you use. So make sure you know the aging characteristics before you buy a lithium-ion battery. It is much better to buy a newly manufactured battery.
Partial Discharges
This means no full discharge cycles are needed. However, in reality, continuous partial discharges can cause a digital memory problem, which reduces the device’s power meter’s validity. For this reason, you can choose to let the battery discharge and then recharge it. This procedure can recalibrate the power meter.
Fully Discharged
battery
If you place a lithium-ion battery of fewer than 2.5 volts on the market, the integrated safety circuit opens to stop the charging process. As a result, the battery does not appear to cost anything. In cases like this, the charger cannot be used. In cases like this, you want to use a battery analyzer with the boost to charge the device. Apart from that, it is not a great idea to charge a severely discharged device if you have kept it for a long time, say a few months. In cases like this, the oxidation rate of the battery was at its maximum. It is much better to keep this type of battery in a refrigerator with a 40% discharge.… | ESSENTIALAI-STEM |
Cardio Exercises For Beginners
6
4066
Butt Kickers home cardio
Cardio Exercises for Beginners
best cardio at home
Are you on a weight loss journey or may be just trying to stay fit and disciplined? Ask anyone, the only advice you will receive from all and sundry will be, “Do some cardio.” To your ease and comfort here we explain to you what are the Best Cardio Exercises For Beginners.
Cycling
● Swimming
Jumping rope
● Kettle bells
● Stair climber
Running
All the above mentioned cardio workouts need no introduction as all those are part of our daily life. Some Cardio workouts can be done easily at home without requiring any equipment.
1. Plyo Power Knees
Home workout Plyo Power Knees
• Start with your feet spread wide, weight primarily on left leg and arms extended overhead.
• Next, bring your right knee in towards your chest while bringing your hands down towards the lifted knee, gently tapping your knee.
• Extend your right leg back to the original position and continue
this motion, 50 times on one side, then 50 times on the other side.
2. Side to Side Punches
Side to Side Punches Home cardio
• Stand with your feet wider than hip distance apart and turn your body to the right, putting most of your weight on your right leg.
• Punch out to the right side with your left arm, then bring your
right leg in towards your left as you ‘skip’ up, lifting both arms overhead.
• Land with most of your weight on you left leg as you punch out with your right arm.
• Continue to do this back and forth 50 times.
3. Mummy Kicks
Mummy Kicks home cardio
• Start with your arms extended out in front of your shoulders, palms facing down, one arm stacked over the other.
• Shuffle one leg out and in front of your body slightly, then quickly switch legs and arms simultaneously.
• Do 50 mummy kicks.
4. Suicide Drills
suicide drill cardio
• Start in a wide stance, weight distributed on your right leg, reaching your left hand near your foot, body angled down.
• Using your right leg for power, quickly lift your body up and execute a one-step shuffle over to your left as you place all the weight on your left leg and reach with your right hand.
• Complete 50.
5. Butt Kickers
Butt Kickers home cardio
• Stand with your feet hip-distance apart, then lift your right foot back towards your booty as if you are trying to kick it.
• Switch legs and do this quickly for 50 repetitions (each time your right leg kicks your backside, count that as one).
So, is there any need to step out of the home and hit the gym! You can maintain a good weight and stay fit at home even. Wish you all the luck for the exercise journey!
You may also like reading-
6 COMMENTS
1. The movements are basic and easy to follow for everyone that wants to start a cardio program. After a week or maxim 2, the movements need to be changed and the complexity increased.
2. Cardio are always the best way, If you want to loose weight or you want to stay fit. The best part of cardio is that you can do these indoor without leaving from your home.
When it comes to cardio, running is always be my first pick and would recommend these to all who want to loose weight or stay fit.
Thanks for sharing these tips 🙂
LEAVE A REPLY
Please enter your comment!
Please enter your name here | ESSENTIALAI-STEM |
Structural basis for human NADPH-cytochrome P450 oxidoreductase deficiency.
Article Details
Citation
Xia C, Panda SP, Marohnic CC, Martasek P, Masters BS, Kim JJ
Structural basis for human NADPH-cytochrome P450 oxidoreductase deficiency.
Proc Natl Acad Sci U S A. 2011 Aug 16;108(33):13486-91. doi: 10.1073/pnas.1106632108. Epub 2011 Aug 1.
PubMed ID
21808038 [ View in PubMed
]
Abstract
NADPH-cytochrome P450 oxidoreductase (CYPOR) is essential for electron donation to microsomal cytochrome P450-mediated monooxygenation in such diverse physiological processes as drug metabolism (approximately 85-90% of therapeutic drugs), steroid biosynthesis, and bioactive metabolite production (vitamin D and retinoic acid metabolites). Expressed by a single gene, CYPOR's role with these multiple redox partners renders it a model for understanding protein-protein interactions at the structural level. Polymorphisms in human CYPOR have been shown to lead to defects in bone development and steroidogenesis, resulting in sexual dimorphisms, the severity of which differs significantly depending on the degree of CYPOR impairment. The atomic structure of human CYPOR is presented, with structures of two naturally occurring missense mutations, V492E and R457H. The overall structures of these CYPOR variants are similar to wild type. However, in both variants, local disruption of H bonding and salt bridging, involving the FAD pyrophosphate moiety, leads to weaker FAD binding, unstable protein, and loss of catalytic activity, which can be rescued by cofactor addition. The modes of polypeptide unfolding in these two variants differ significantly, as revealed by limited trypsin digestion: V492E is less stable but unfolds locally and gradually, whereas R457H is more stable but unfolds globally. FAD addition to either variant prevents trypsin digestion, supporting the role of the cofactor in conferring stability to CYPOR structure. Thus, CYPOR dysfunction in patients harboring these particular mutations may possibly be prevented by riboflavin therapy in utero, if predicted prenatally, or rescued postnatally in less severe cases.
DrugBank Data that Cites this Article
Polypeptides
NameUniProt ID
NADPH--cytochrome P450 reductaseP16435Details | ESSENTIALAI-STEM |
How To: Make the Scariac (A Poor Man's Variable Power Controller)
Make the Scariac (A Poor Man's Variable Power Controller)
Mixing water and electricity is extremely risky and potentially lethal, yet that's exactly what I did with the Scariac. In its simplest form, the Scariac is just a glorified version of two wires in a bucket of water, but it's actually one of the cheapest power controllers you can make.
WARNING!
This project is extremely dangerous and should only be attempted by those highly skilled in working with electricity.
• High voltages and high currents passing through the water provide an open hazard of electrocution, and may cause death.
• This design does not include any electrical ground. This system is not recommended as a safe device. Its purpose, rather, is to regulate electrical current in a simple and low cost way.
• Toxic gases may be released from the solution during operation.
• This project should not be attempted without adult supervision and adequate training. Misuse, or careless use, of tools or projects may result in serious injury. Use of this video content is at your own risk.
Now that that's out of the way...
Making a Poor Man's Power Controller
I needed a way to adjust the power running to my homemade stick welding system, as seen in the video below:
Even with enough power to the welder, the main problem was finding a system that could vary electrical current without costing an arm and a leg.
In a tight situation, it's good to be aware of options, and that's why I was happy to learn about the idea of the water resistor.
Variac vs. Scariac
I got the name "Scariac" (with permission) from YouTube user acronus in his video on making a homemade Variac. It's a fitting name since the system acts very similar to a Variac.
The idea is to use a water-based medium as an electrolytic resistor. A bit of electrolyte is added to the solution to make it slightly conductive, and when two electrodes are placed in the solution, the allow more or less current to flow, depending on whether there are closer or further apart.
In its simplest form, this device is just a glorified version of two wires in a bucket of water.
"How I Did" vs. "How To"
Although I've taken thought to minimize risks in operation, I have to stress that I don't consider this device safe or foolproof. It has the potential to be lethal, and even though I show step-by-step how it was made, this is more of a "How I Did" project rather than a "How To."
The system has a power lever to vary current output, and a loop of wire for connecting an ammeter. The outlet on the board is where the devices plug in, and the switch acts as a kill switch to turn the device completely on or off at will.
ADDITIONAL WARNING
There is no grounding wire connected, as stated before, and always possibility of failure in any part of the system. So, extreme caution and respect is needed when operating. The device doesn't have any internal fuse, circuit breaker, or current-limiting device, so there is also risk of fire if the system shorted out and your home circuit protection system failed. This fire could potentially happen inside the walls of your home.
Using Electrolyte as a Variable Resistor
I used a water-based medium for the variable resistance.
• 2 gallons of tap water (distilled water will also work great, but is more expensive)
• 1/4 teaspoons of 100% Lye (NaOH)
Even though the amount of lye is very low, it makes the water conductive very quickly.
I found my lye in a drain cleaner from the hardware store. 100% lye in fact!
Any salts could probably be used as an electrolyte, but using something like table salt (NaCl) seemed to introduce the possibility of generating chlorine gas, and that's why I went with the NaOH instead.
Additional Considerations
During operation, the electrolysis does produce some gas, however it seems to be minimal when supplying with AC power. DC would be a much greater concern.
The system is also open (ventilated) so any gas generation escapes quickly. In my experience, this doesn't give hydrogen and oxygen gases enough time to build up to a dangerous level, and I wasn't able to achieve any gas explosions, even at ultra-high power settings, despite trying. However, it is good to be aware of the risks, and operate in a well-ventilated area as a precaution.
Well, there you have it! That's how I sacrificed safety to build a variable power controller on a very small budget.
If you haven't see the video yet, it's not too late. Watch it here!
If you like this project perhaps you'll like some of my others. Check them out at thekingofrandom.com.
Get the Gadget Hacks Daily
Life hacks for your smartphone.
Be the First to Comment
Share Your Thoughts
• Hot
• Latest | ESSENTIALAI-STEM |
CORRECTED-EXCLUSIVE-Fearful of fake news blitz, U.S. Census enlists help of tech giants
tech giants@ (Corrects first name of Facebook spokesman in paragraph 9) NEW YORK, March 27 (Reuters) - The U.S. Census Bureau has asked tech giants Google, Facebook and Twitter to help it fend off fake news " campaigns it fears could disrupt the upcoming 2020 count, according to Census officials and multiple sources briefed on the matter. The push, the details of which have not been previously reported, follows warnings from data and cybersecurity experts dating back to 2016 that right-wing groups and foreign actors may borrow the fake news playbook from the last presidential election to dissuade immigrants from participating in the decennial count, the officials and sources told Reuters. The sources, who asked not to be named, said evidence included increasing chatter on platforms like "4chan" by domestic and foreign networks keen to undermine the survey. The census, they said, is a powerful target because it shapes U.S. election districts and the allocation of more than $800 billion a year in federal spending. Ron Jarmin, the Deputy Director of the Census Bureau, confirmed the bureau was anticipating disinformation campaigns, and was enlisting the help of big tech companies to fend off the threat. "We expect that (the census) will be a target for those sorts of efforts in 2020," he said. Census Bureau officials have held multiple meetings with tech companies since 2017 to discuss ways they could help, including as recently as last week, Jarmin said. So far, the bureau has gotten initial commitments from Alphabet Inc's Google, Twitter Inc and Facebook Inc to help quash disinformation campaigns online, according to documents summarizing some of those meetings reviewed by Reuters. But neither Census nor the companies have said how advanced any of the efforts are. Facebook spokesman Andy Stone confirmed the meetings with Census, but did not provide details of any agreed action. Twitter and Google declined to comment. The bureau has also embarked on an online landgrab to control census look-alike websites, according to Census officials. These sites could end up in the hands of people who want to dissuade some portions of the population from responding to the survey. "We came up with a list of 20 to 30 URLs that we wanted to make sure we owned," said Census spokesman Stephen Buckner, adding the bureau had done the same before the 2010 count "to mitigate confusion about where to go." Census controls at least two non-government websites with census in the name - 2020census.com and 2020census.org - through marketing firm Reingold, Buckner said. The Census Bureau, until now, has kept mostly mum about how it plans to counter disinformation. The efforts highlight the challenges posed by the internet age to the decennial gathering of data on Americas population. So-called "fake news" strategies can take myriad forms, according to cyber experts: posing as a demographic group to convey false information under the guise of advocacy; spreading false data by doctoring ads and news stories; or circulating bogus information to drum up fear and opposition. Jarmin said activists could target the census "mostly through attempts to get them to not participate, either by scaring them or telling them its not important, or that something they had already done - like paying their taxes - had completed the census." HELP FROM SILICON VALLEY Former Census Director John Thompson, who left the bureau in 2017, remembers his first briefing about the disinformation threat - shortly after the 2016 presidential election - and said it was the bureaus catalyst to act. Thompson said he had invited data expert danah boyd to speak to top officials in 2016. boyd, who stylizes her name lowercase, said she was seeing chatter on the dark web in white supremacist and other communities about wanting to disrupt the count, according to Thompson and two other people in the room, who declined to be named. boyd declined to be interviewed about her presentation. Thompson declined to provide details of threats outlined at the meeting, but called them "chilling." One of the sources present said boyd discussed efforts by "far-right actors and foreign governments" to use disinformation campaigns to discourage minorities from participating. A year later, the Census Bureau organized a forum in Silicon Valley, partly about the 2020 disinformation threat, which was attended by boyd, locally elected officials and representatives from tech companies including Twitter, Uber Technologies and Microsoft Corp. During that gathering, Census officials also visited Facebook and Google campuses to meet with executives. According to notes from the 2017 meetings reviewed by Reuters, Google told Census it would consider creating a bespoke census-related search project. Twitter also agreed to help mitigate misinformation, according to the notes. At a meeting with Facebook, Census officials discussed allowing the company to join conversations between Census and the U.S. Department of Defense about security; creating Facebook groups on census topics; and training Census workers through Facebook technology, according to the notes. Census has held subsequent meetings with these companies, including as recently as this month, according to Census officials. It remains unclear how many of these ideas Census and tech companies have put into action. Census' Jarmin said: "There were some hits from those meetings, and some things that didnt pan out." (Additional reporting by Katie Paul in San Francisco; editing by Richard Valdmanis and Paul Thomasch) | NEWS-MULTISOURCE |
Novel magnetically separable Fe3O4@ZnO core–shell nanocomposite for UV and visible light photocatalysis
Suresh D. Kulkarni, Sagar M. Kumbar, Samvit G. Menon, K. S. Choudhari, C. Santhosh
Research output: Contribution to journalArticlepeer-review
10 Citations (Scopus)
Abstract
Photocatalysis is an unconventional, yet promising method that can combat industrial water pollution by decomposing toxic organic effluents into harmless moieties under suitable irradiation sources. Synthesis of magnetically separable Fe3O4@ZnO core–shell nanoparticles at low temperature for the visible light photodegradation of aqueous azo-dye pollutant, methyl orange is reported. Fe3O4 nanoparticles were synthesised by co-precipitation method following which ZnO was grown by reflux reaction with a Fe3O4: ZnO molar ratio of 1: 10. The formation of Fe3O4@ZnO nanoparticles were confirmed by X-ray diffraction and Fourier Transform Infrared Spectroscopy. The bandgap was measured using diffuse reflectance spectroscopy and the photodegradation efficiency of Fe3O4@ZnO nanoparticles on the decolouration of methyl orange was measured under both 365 nm UV and visible light excitations. The magnetic separability, surface area of 36 m2/g and visible light absorption make Fe3O4@ZnO nanoparticles favourable for solar photocatalysis. The point of zero charge (pzc) of the Fe3O4@ZnO nanoparticles determined by the pH drift method was found to be 6.4, which makes the operating pH of the solution (pH= 6) suitable for adsorption/photodegradation. The decolouration of the dye under visible light irradiation closely competed with the decolouration observed under UV irradiation. This is an extremely useful technique in water treatment, especially to treat toxic effluents from several colouring industries.
Original languageEnglish
Pages (from-to)1724-1729
Number of pages6
JournalAdvanced Science Letters
Volume23
Issue number3
DOIs
Publication statusPublished - 01-03-2017
All Science Journal Classification (ASJC) codes
• Health(social science)
• Computer Science(all)
• Education
• Mathematics(all)
• Environmental Science(all)
• Engineering(all)
• Energy(all)
Fingerprint
Dive into the research topics of 'Novel magnetically separable Fe3O4@ZnO core–shell nanocomposite for UV and visible light photocatalysis'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Page:United States Statutes at Large Volume 115 Part 1.djvu/841
PUBLIC LAW 107-82—DEC. 14, 2001 115 STAT. 819 " (4) LIMITATION ON USE OF CERTAIN FUNDS FOR EVALUATION ,- OF PROGRAM. — Amounts for activities under paragraph (2)(B) may not be derived from amounts under section 1024(a) except for amounts that are available under section 1024(b) for administrative costs.". (g) TREATMENT OF FUNDS FOR COALITIONS REPRESENTING CER- TAIN ORGANIZATIONS.— Section 1032 of that Act (21 U.S.C. 1532) is further amended by adding at the end the following new subsection: " (c) TREATMENT OF FUNDS FOR COALITIONS REPRESENTING CER- TAIN ORGANIZATIONS.—Funds appropriated for the substance abuse activities of a coalition that includes a representative of the Bureau of Indian Affairs, the Indian Health Service, or a tribal government agency with expertise in the field of substance abuse may be counted as non-Federal funds raised by the coalition for purposes of this section.". (h) PRIORITY IN AWARDING GRANTS.— Section 1032 of that Act (21 U.S.C. 1532) is further amended by adding at the end the following new subsection: "(d) PRIORITY IN AWARDING GRANTS. —In awarding grants under subsection (b)(l)(A)(i), priority shall be given to a coalition serving economically disadvantaged areas.". SEC. 2. SUPPLEMENTAL GRANTS FOR COALITION MENTORING ACTIVI- TIES UNDER DRUG-FREE COMMUNITIES SUPPORT PRO- GRAM. Subchapter I of chapter 2 of the National Narcotics Leadership Act of 1988 (21 U.S.C. 1531 et seq.) is amended by adding at the end the following new section: "SEC. 1035. SUPPLEMENTAL GRANTS FOR COALITION MENTORING 21 USC 1535. ACTIVITIES. "(a) AUTHORITY TO MAKE GRANTS.—As part of the program established under section 1031, the Director may award an initial grant under this subsection, and renewal grants under subsection (f), to any coalition awarded a grant under section 1032 that meets the criteria specified in subsection (d) in order to fund coalition mentoring activities by such coalition in support of the program. " (b) TREATMENT WITH OTHER GRANTS. — "(1) SUPPLEMENT. —^A grant awarded to a coalition under this section is in addition to any grant awarded to the coalition under section 1032. " (2) REQUIREMENT FOR BASIC GRANT. — ^A coalition may not be awarded a grant under this section for a fiscal year unless the coalition was awarded a grant or renewal grant under section 1032(b) for that fiscal year. "(c) APPLICATION.— ^A coalition seeking a grant under this section shall submit to the Administrator an application for the grant in such form and manner as the Administrator may require. "(d) CRITERIA.—^A coalition meets the criteria specified in this subsection if the coalition— "(1) has been in existence for at least 5 years; "(2) has achieved, by or through its own efforts, measurable results in the prevention and treatment of substance abuse among youth; "(3) has staff or members willing to serve as mentors far persons seeking to start or expand the activities of other coalitions in the prevention and treatment of substance abuse;
� | WIKI |
In 16th century Bavaria, a professional executioner named Frantz Schmidt kept a diary through most of his life. This left us an extraordinary opportunity to see the world through the eyes of a professional we mostly know from fiction and the very fringes of textbooks. Schmidt was an educated man, took his work seriously, and sometimes felt empathy for those he lawfully killed. But he didn't choose his work; like most folks in the Middle Ages, he inherited the career from his father. Vanderbilt University historian Joel Harrington tells us more about executioners.
Over time, this passing of the baton from father to son created what Harrington called long-standing "execution dynasties" that spread across Europe during the Middle Ages.
But the existence of those dynasties also reveals the poor image executioners had at the time. People were trapped in this family cycle of employment because, in reality, they had few other opportunities to work, according to Harrington. People whose professions revolved around death were people that the rest of society did not want to associate with. So executioners were typically consigned to the fringes of society — and even forced to literally live at the edge of town.
"People wouldn't have invited executioners into their homes. Many executioners were not allowed to go into churches. Marriage has to be done at the executioner's home," Harrington said. "Some schools would not even take the children of executioners."
It wasn't all bad, though. There were perks designed to keep the executioner from abandoning his job, which was seen as a necessary part of law enforcement. Read about the life of an executioner at LiveScience. -via Damn Interesting | FINEWEB-EDU |
From: Warren Young Date: October 5 2004 12:11pm Subject: Re: Warnings List-Archive: http://lists.mysql.com/plusplus/3540 Message-Id: <41628F7D.3080909@etr-usa.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Marc Sturm wrote: > i'm using mysql++ 1.1.17 with gcc 3.2.2 and i get a lot of warnings like > "result1.hh:158: warning: base class `class > const_subscript_container int, int>' should be explicitly initialized in the copy constructor" I've never seen this one, and I use GCC 3.2.2 on my main development system. Therefore, what you're seeing is code-dependent. If you want it fixed, you're going to have to track down the offending code and provide a patch. > "coldata4.hh:11: warning: unused parameter `int dummy'". I'll look into it. > Is there a patch planned for these warnings? This library is open source. It moves forward faster if you help. > define_short.hh: "#define null mysql_null". > This did not work with qt 3.1: > "qt-3.1/include/qgdict.h:203: `mysql_null' is not a member of type > `QString'" > After i commented this line out, it worked fine. The whole define_short.hh thing is going away someday (it's on the Wishlist, anyway), but again, it will happen faster if you help. | ESSENTIALAI-STEM |
Page:Oliver Twist (1838) vol. 3.djvu/253
face an index even to your mind—you, Edward Leeford, do you brave me still!"
"No, no, no!" returned the coward, overwhelmed by these accumulated charges.
"Every word!" cried the old gentleman, "every word that has passed between you and this detested villain, is known to me. Shadows on the wall have caught your whispers, and brought them to my ear; the sight of the persecuted child has turned vice itself and given it the courage and almost the attributes of virtue. Murder has been done, to which you were morally if not really a party."
"No, no," interposed Monks. "I—I—know nothing of that; I was going to inquire the truth of the story when you overtook me. I didn't know the cause, I thought it was a common quarrel."
"It was the partial disclosure of your secrets," replied Mr. Brownlow. "Will you disclose the whole?"
"Yes, I will."
"Set your hand to a statement of truth and facts, and repeat it before witnesses?" | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.