Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Wikipedia:Copyright problems/2008 May 24/Articles
Articles
* Herman Maisel ([ history] · [ last edit]) from . Geraki T L 13:58, 24 May 2008 (UTC)
* Comment: Copyvio removed; warning left for contributor and at article talk page (against restoration). --Moonriddengirl (talk) 12:25, 26 June 2008 (UTC)
* Royal Society of Canada ([ history] · [ last edit]) from . <IP_ADDRESS> (talk) 19:15, 24 May 2008 (UTC)
* Comment: Although the tag was removed by a user with a note that it was "improperly placed", the lead paragraph of this article is a word-for-word duplicate of the official website, which displays an "all rights reserved" label. I have re-tagged it and left a note of inquiry at the article's talk page. Barring swift production of evidence that usage is not in violation for some reason, I will revise and remove the copyvio. --Moonriddengirl (talk) 12:56, 26 June 2008 (UTC)
* Resolved: Copyvio revised. --Moonriddengirl (talk) 01:45, 27 June 2008 (UTC)
* Anshita Asnani ([ history] · [ last edit]) from Krushdiva (talk) 19:23, 24 May 2008 (UTC)
* RECON (River, Estuary and Coastal Observing Network) ([ history] · [ last edit]) from . Claims copyright on talk but unclear any release has been made. Rividian (talk) 20:55, 24 May 2008 (UTC)
* Professional corporation ([ history] · [ last edit]) from "Glossary" for "Professional corporation" definition posted in nolo.com (added EL to the Wikipedia article page for comparison). Previous editors (prior to me) seem to have plagiarized material from that site's glossary; no citations were given at all for the article. NYScholar (talk) 22:32, 24 May 2008 (UTC) [Note: LLP may have similar problem: see (Nolo.com). --NYScholar (talk) 22:57, 24 May 2008 (UTC)
* Given the backlog, I've added source citations to the one source, maintained templates re: problems, but delisted it by removing the copy-vio template. Perhaps an administrator can review this in time. Thanks. --NYScholar (talk) 00:43, 27 May 2008 (UTC)
* Comment Problems may have been resolved. Have contacted to tagger (and cleaner) to inquire. --Moonriddengirl (talk) 13:11, 26 June 2008 (UTC)
* No additional sources identified. --Moonriddengirl (talk) 12:10, 1 July 2008 (UTC)
* FRICTO analysis ([ history] · [ last edit]) from . Psych less 22:39, 24 May 2008 (UTC)
* Ten Years of Tomb Raider: A GameTap Retrospective ([ history] · [ last edit]) from . Nomination completed by DumbBOT (talk) 23:14, 24 May 2008 (UTC)
* Comment: No infringement found. --Moonriddengirl (talk) 13:19, 26 June 2008 (UTC) | WIKI |
Polaris Office
Polaris Office is a paid office suite that runs on platforms such as Android, iOS, Windows and macOS, a product of Korea-based software firm Infraware, Inc. It allows the editing of Microsoft Office file-formats (doc/docx, hwp, ppt/pptx, txt, xls/xlsx) and the viewing of PDF files. All files saved in Polaris Office are synchronized with other connected devices, and thus documents are automatically updated to the latest version. It also provides a variety of cloud-storage services such as Box, Dropbox, Google Drive, OneDrive, etc. Moreover, Polaris Office has an agent program that allows uploading and downloading documents from a desktop computer to a mobile device. It is available in several languages. | WIKI |
Plastic deformation of superionic water ices
F Matusalem and JS Rego and M de Koning, PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 119, e2203397119 (2022).
DOI: 10.1073/pnas.2203397119
Due to their potential role in the peculiar geophysical properties of the ice giants Neptune and Uranus, there has been a growing interest in superionic (SI) phases of water ice. So far, however, little attention has been given to their mechanical properties, even though plastic deformation processes in the interiors of planets are known to affect long-term processes, such as plate tectonics and mantle convection. Here, using density functional theory calculations and machine learning techniques, we assess the mechanical response of high- pressure/temperature solid phases of water in terms of their ideal shear strength (ISS) and dislocation behavior. The ISS results are well described by the renormalized Frenkel model of ideal strength and indicate that the SI ices are expected to be highly ductile. This is further supported by deep neural network molecular dynamics simulations for the behavior of lattice dislocations for the SI face-centered cubic (fcc) phase. Dislocation velocity data indicate effective shear viscosities that are orders of magnitude smaller than that of Earth's lower mantle, suggesting that the plastic flow of the internal icy layers in Neptune and Uranus may be significantly faster than previously foreseen.
Return to Publications page | ESSENTIALAI-STEM |
CRAN_Status_Badge Travis-CI Build Status MIT licensed Rdoc Updated-on
R package spAddins
spAddins is an R package that provides a set of RStudio addins which are designed to be used in combination with user-defined RStudio keyboard shortcuts. These addins either:
1. format text in R Markdown documents:
2. insert text (e.g., operators %>%, <<-, %$%) at the cursor position;
3. replace symbols in selected pieces of text (e.g., convert backslashes to forward slashes which results in strings like "c:\data\" converted into "c:/data/").
Install package
Install released version from CRAN:
install.packages("spAddins")
Install development version from GitHub:
if (!require(devtools)) install.packages("devtools")
devtools::install_github("GegznaV/spAddins")
Get started online http://gegznav.github.io/spAddins/articles/v1_workflow.html
And offline:
vignette("v1_workflow", package = "spAddins")
More information at http://gegznav.github.io/spAddins/ | ESSENTIALAI-STEM |
User:Cv2456/sandbox
Elimination table
* The housemate entered to the house.
* The housemate won the game for to be "House of Household" (HoH), and was immune from eviction.
* The housemate was not nominated for eviction by their housemates and continued in the competition.
* The housemate was nominated for eviction by their housemates.
* The housemate was initially nominated for eviction, but was saved by HoH.
* The housemate was nominated for eviction, and later evicted from the house by the public. | WIKI |
Spontaneous heating of piled tyre shred and rubber crumb - Briefing note
Introduction
Waste tyres have a number of important uses as: fuels, construction materials or as raw materials in the production of rubber shred or crumb. In many of these applications whole tyres have to be chopped into small chips. In some cases chips are ground much more finely and the metal content of the tyres is removed.
Chopping and grinding of tyres produces a low density, porous material through which air may percolate. The total surface area of tyre chips or crumb particles may also be large compared with the volume occupied. The combination of permeability to air-flow and a high exposed surface area means that that a combustible material such as rubber is potentially susceptible to spontaneous combustion.
Practical experience
In practice spontaneous ignition of large stockpiles of tyre shred or deep landfill deposits has occurred on numerous occasions. Practical experience suggests auto-ignition normally occurs in large stockpiles (more than 3 metres deep). Finely shredded tyres are more susceptible because of the increased surface area available for reaction.
Surface symptoms of the onset of spontaneous combustion can be subtle: a slight sulphurous odour, condensation aerosols emerging from vents or evidence of oil contamination of rainwater draining through the tyre shred. The fire may intensify from smouldering to flaming as the combustion wave reaches the surface or if the pile is disturbed – allowing ingress of additional air.
Comparisons with other materials
Laboratory experiments show that rubber crumb and tyre shred are more susceptible to self-heating than cellulosic materials (like hay and straw) in conditions of high ambient temperature. Typically a given volume of tyre shred will spontaneously ignite at a lower ambient temperature that an equivalent volume of hay. On the other hand tyre shred is not as prone to biological heating that raises the internal temperature above ambient and may act as a trigger to spontaneous combustion.
Controlled experiments suggest that even piles of clean tyre shred or rubber crumb with a depth greater than around one metre may spontaneously ignite from ambient temperatures, if the level of ventilation is unfavourable. The initiation times are generally long (many weeks).
Factors increasing risk
The risk of ignition in practical circumstances may be raised by contamination of the tyres (which may allow biological heating in damp conditions) or by the rusting of exposed wires (which also generates heat). The stripping of rubber from wire in the tyre chopping process may be associated with blunting of blades in the shredding machine.
Mitigation of ignition risk
Many of the standard methods of protection against spontaneous combustion are applicable to tyre shred:
Obviously localised sources of heat eg heating pipes, light bulbs, space heaters, braziers, shrink-wrapping guns equipment etc should be kept away from piles of tyre shred.
Fire fighting
Once established, combustion in large piles of tyre shred and rubber crumb is difficult to suppress. Direct application of water or foam in situ does not generally provide effective extinguishment and may hamper control of oily run-off pollution.
The first priority is separation of unburned material from the fire to restrict the extent of spread. It may be possible to remove burning material from the fire and finally extinguish with water or by burial.
Without appropriate controls during fire-fighting there is potential for serious occupational exposure for fire service personnel and heavy equipment operators, from poly-aromatic hydrocarbons, oxides of sulphur and other harmful combustion products.
Further reading
Annex – Design guidelines to minimise internal heating of tyre shred fills
Civil Engineering Committee (1997), Scrap tyre Management Council, Washington DC.
The following recommendations apply to tyre chip layers less than 3 metres deep and greater than 1 metre deep. Layers deeper than 3 metres are not recommended. Lower standards are accepted for layers thinner than 1 m.
Notes
1. See Annex - Scrap tyre Management Council guidelines. Back to reference of footnote 1
2. Piles should not be deeper than 3m. Back to reference of footnote 2
Updated 2021-04-26 | ESSENTIALAI-STEM |
Guide to the Snippet Macro
When generating your project website with Maven, you have the option of dynamically including snippets of source code in your pages.
A snippet is a section of a source code file that is surrounded by specially formatted comments.
This functionality is inspired by the Confluence snippet macro, and is provided by the Maven Doxia project by way of the Maven Site Plugin.
To include snippets of source code in your documentation, first add comments in the source document surrounding the lines you want to include, and then refer to the snippet by its id in the documentation file.
Each snippet must be assigned an id, and the id must be unique within the source document.
Following are examples of snippets in various source documents, as well as the corresponding macros in the APT documentation format.
See the Doxia Macros Guide for more information and examples.
Snippets in Sources
Java
// START SNIPPET: snip-id
public static void main( String[] args )
{
System.out.println( "Hello World!" );
}
// END SNIPPET: snip-id
XML
<!-- START SNIPPET: snip-id -->
<navigation-rule>
<from-view-id>/logon.jsp</from-view-id>
<navigation-case>
<from-outcome>success</from-outcome>
<to-view-id>/mainMenu.jsp</to-view-id>
</navigation-case>
</navigation-rule>
<!-- END SNIPPET: snip-id -->
JSP
<%-- START SNIPPET: snip-id --%>
<ul>
<li><a href="newPerson!input.action">Create</a> a new person</li>
<li><a href="listPeople.action">List</a> all people</li>
</ul>
<%-- END SNIPPET: snip-id --%>
Snippets in Documentation
APT
%{snippet|id=snip-id|url=http://svn.example.com/path/to/Sample.java}
%{snippet|id=snip-id|url=file:///path/to/Sample.java}
As of doxia-core version 1.0-alpha-9, a 'file' parameter is also available. If a full path is not specified, the location is assumed to be relative to ${basedir}.
~~ Since doxia-core 1.0-alpha-9
%{snippet|id=abc|file=src/main/webapp/index.jsp}
• Macros in apt must not be indented.
• Exactly one of url or file must be specified. | ESSENTIALAI-STEM |
Topics Discussed: For / While loops, loop structure, using counter controlled loops.
Source code available here.
Loops
In this video I discuss two or the most important constructs in the entire language of java. In the next lesson I talk a bit more about for loops, which seem to be used a little more than while and do_while which we discussed here.
While loops
While loops are statements that will be repeated until either a break statement is reached, or until the condition is no longer true. Here’s a few examples of loops using while:
//syntax while(condition){ //do stuff }
//Examples below
int i=0;
while(i < 9){
//do stuff
i++; //increment i-- if you remove this statement, the loop will run infinitely.
}
boolean isTrue=true;
i=0; //reset 0 before the loop
while(isTrue){//while the boolean is true
if(i > 10){
isTrue = false;
}//end if
i++; // increment i
}//End loop
i=0;//reset 0 before the loop
while (i < 10){
cout << i; //output the value of i each time through the loop
i++; // increment i each time through the loop
}
In the examples above you’ll notice that we always have a ‘way out’ of the loop, that’s because there is a common error known as an ‘infinite loop’ in which your code executes endlessly because your loop is unable to exit.
Do_while loops
Do_while loops are the same basic idea as while loops, except that they execute the contents of the loop once before checking the conditional. These are very useful in making users enter certain values for their input, as seen below:
int aValue=0;
do{ // do these instructions
cout << "Enter a value 1 or greater for the variable: ";
cin >> aValue;
}while(aValue < 1);//until this condition is no longer true.
For loops
For loops are similar in idea to a while statement, except that it contains a few other parts that need to be talked about after I give an example of the syntax and use of for loops:
for(int i=0; i<10; i++){
cout << i;
}
The above code does 4 things, one of which is apparent, the println() statement, so we won’t talk about that. But the for statement can be a little confusing, but when we break it into parts it will make a lot more sense.
Parts of a for loop
Every loop has three parts, which are as follows:
1. The initializer: This part of the loop is where we set or declare some variable for use. Typically you’ll see something set to 0 here if you’re counting up to a variable.
2. The conditional:The conditional is the same as with a while loop. It should be a statement that evaluates to a true, false, or boolean(t/f) statement.
3. The iterator:The iterator is the part of the for loop in which we increase, decrease, or otherwise change some aspect of the loop, usually to make the loop get closer to it’s conclusion.
Additional considerations of for loops
The syntax and usage of for loops can be a little tricky overall:
for(int i=0; i<10; i++){
//null
}
cout << i; //This will error
The above is an example of an error that I see quite often among my peers in college. Despite the initializer coming before the scope bracket, it is considered part of the scope of the loop. Therefore we can thing of the scope of a for loop being like this:
for{(int i=0; i<10; i++)
//do stuff
}
rather than its existing structure.
Incrementing numbers
Any number that is of a type that can hold a whole number value can be incremented or decremented. In MOST cases you will be using “post-incrementing” which is seen as varName++; however, there are other ways of incrementing numbers:
++i; // pre-increment
i++; // post-increment (most-common)
--i; // pre-decrement
i--; // post-decrement (common while decrementing)
Each time you hit the statement i++;, you increase the value of i by the value of 1.
Nested for structure
Nested for’s actually share syntax with nested if statements in terms of scoping and complexity. Granted there aren’t any else statements to take into consideration. | ESSENTIALAI-STEM |
RECONDITION BATTERIES
Recondition battery guideWhy would you do it? Why spend the extra time and money and effort to recondition your old batteries when you can just go out and easily pick up a new one? Why risk getting acid in your eyes while fiddling about with analysers and multimeters? Why go to all the extra hassle??
Well, for starters if you recondition batteries it can save many dollars, especially if you are in a home or a business which uses lots of batteries and you have to spend out a lot to keep replacing them-batteries aren’t cheap, as we all know!
LEARN TO RECONDITION YOUR BATTERIES NOW!
As well as cutting down your own costs, you can make quite a lucrative sideline-or even a full on business-out of reconditioning batteries. No one really wants to fork out the money for a new battery, so if you can recondition old ones and sell them on at half the price of a brand new one, the pennies will come rolling in!
Reconditioning will also salve your conscience-throwing away old dead batteries, even if you take them to a recycling facility, is damaging to the environment. If you fix the old ones, as opposed to dumping them, you will be doing good work for the environment as well as your pocket. Have a gold star!
It is fairly simple to recondition batteries yourself, although you will need some basic equipment to get started-and a bit of common sense and the ability to follow instructions wouldn’t go amiss. All aspects of reconditioning can be attempted in the home. It is essential to be aware of personal safety however, and it is recommended that you do it outside or in a garage, due to the dangerous nature of some battery chemicals.
There are many different types of battery; from Lead Acid car batteries, to deep cycle batteries, everyday household staples such as mobile phone and camera batteries-all, one way or another can be reconditioned!
Batteries need reconditioning for various different reasons. For most new rechargeable batteries, this is due to the “memory effect”, which is the memory of the charge and discharge cycle. If you recharge your batteries when they are not fully discharged, then the battery will “remember” this, by forming a growth of the crystals used to form it in the factory. You can reduce the memory effect by completely discharging your batteries before recharging, and by reconditioning, which does away with the memory effect altogether.
Another reason for reduction in battery life is “sulphation”; this is usually found in lead batteries such as car and automobile batteries. This is caused by the build up of sulphate on the inside panels of the battery, and as batteries work on the contact of the electrolyte with the plates, sulphate build up will reduce the flow of electricity in the battery. Again, this can be solved with battery reconditioning in the form of “desulphation”, which can be remedied-as long as ALL the plates are not covered, in which case the battery is completely dead and cannot be reconditioned.
Reconditioning batteries, whether you do it for environmental, financial, or shrewd business reasons, is worth taking the extra time and effort to achieve.
LEARN HOW TO RECONDITION YOUR BATTERIES NOW | ESSENTIALAI-STEM |
Ask Nick Young a Question
Welcome back to our expert roundtable discussion of China’s environmental crisis. To ask a question or make a comment on the issues raised by the third article in the series, write to us using the comments box below. On Monday, we will have answers to selected questions from Nick Young, the Founding Editor of China Development Brief, a non-profit newsletter dedicated to “Reporting the latest news on China’s social development,” which was published in China from 1996 until July, 2007, when the authorities ordered it to cease publication. Having lived and worked in Beijing for more than a decade, Mr. Young, who is now in Britain, knows a lot about the ways that private citizens and NGOs in China have attempted to fight against pollution and environmental decay. | NEWS-MULTISOURCE |
5 http snippets
Launching an SSL (HTTPS) Server in Node.js
JavaScript:
var https = require("https");
var fs = require("fs");
var key_file = "/path/to/file.pem";
var cert_file = "/path/to/file.crt";
var passphrase = "this is optional";
var config = {
key: fs.readFileSync(key_file),
cert: fs.readFileSync(cert_file)
};
if(passphrase) {
config.passphrase = passphrase;
}
https.createServer(config,app).listen(443);
CoffeeScript:
https = require "https"
fs = require "fs"
key_file = "/path/to/file.pem"
cert_file = "/path/to/file.crt"
passphrase = "this is optional"
config = {
key: fs.readFileSync(key_file)
cert: fs.readFileSync(cert_file)
}
config.passphrase = passphrase if passphrase?
https.createServer(config,app).listen(443)
Where /path/to/file.pem is the path to a file containing an RSA key, generated (for example) by:
openssl genrsa 1024 > /path/to/file.pem
and /path/to/file.crt is the path to a file containing an SSL certificate, generated (for example) by:
openssl req -new -key /path/to/file.pem -out csr.pem
openssl x509 -req -days 365 -in csr.pem -signkey /path/to/file.pem -out /path/to/file.crt
Published 13 Mar 2014
Backup or mirror a website using wget
To create a local mirror or backup of a website with wget, run:
wget -r -l 5 -k -w 1 --random-wait <URL>
Where:
• -r (or --recursive) will cause wget to recursively download files
• -l N (or --level=N) will limit recursion to at most N levels below the root document (defaults to 5, use inf for infinite recursion)
• -k (or --convert-links) will cause wget to convert links in the downloaded documents so that the files can be viewed locally
• -w (or --wait=N) will cause wget to wait N seconds between requests
• --random-wait will cause wget to randomly vary the wait time to 0.5x to 1.5x the value specified by --wait
Some additional notes:
• --mirror (or -m) can be used as a shortcut for -r -N -l inf --no-remove-listing which enables infinite recursion and preserves both the server timestamps and FTP directory listings.
• -np (--no-parent) can be used to limit wget to files below a specific "directory" (path).
Published 10 Feb 2014
Pre-generate pages or load a web cache using wget
Many web frameworks and template engines will defer the generation the HTML version of a document the first time it is accessed. This can make the first hit on a given page significantly slower than subsequent hits.
You can use wget to pre-cache web pages using a command such as:
wget -r -l 3 -nd --delete-after <URL>
Where:
• -r (or --recursive) will cause wget to recursively download files
• -l N (or --level=N) will limit recursion to at most N levels below the root document (defaults to 5, use inf for infinite recursion)
• -nd (or --no-directories) will prevent wget from creating local directories to match the server-side paths
• --delete-after will cause wget to delete each file as soon as it is downloaded (so the command leaves no traces behind.)
Published 10 Feb 2014
Mapping port 80 to port 3000 using iptables
Port numbers less that 1024 are considered "privileged" ports, and you generally must be root to bind a listener to them.
Rather than running a network application as root, map the privileged port to a non-privileged one:
sudo iptables -A PREROUTING -t nat -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3000
Now requests to port 80 will be forwarded on to port 3000.
Published 8 Feb 2014
Launch an HTTP server serving the current directory using Python
The Python SimpleHTTPServer module makes it easy to launch a simple web server using a current working directory as the "docroot".
With Python 2:
python -m SimpleHTTPServer
or with Python 3:
python3 -m http.server
By default, each will bind to port 8080, hence http://localhost:8080/ will serve the top level of the working directory tree. Hit Ctrl-c to stop.
Both accept an optional port number:
python -m SimpleHTTPServer 3001
or
python3 -m http.server 3001
if you want to bind to something other than port 8080.
Published 20 Feb 2014
Tagged python, http, cli, one-liner, ops and tool.
This page was generated at 4:16 PM on 26 Feb 2018.
Copyright © 1999 - 2018 Rodney Waldhoff.
| ESSENTIALAI-STEM |
Your best friend for file transfer.
Fetch application logoFetch
nothing seems to happen (2 posts)
• Started 9 years ago by photoman@nwnetcom.net
• Latest reply 9 years ago from Scott McGuire
• photoman@nwnetcom.net Member
Hi, I type my website in the host field and when I hit "put"everything seems to get uploaded but when I go back to my site, it is still the same. What am I doing wrong?
Posted 9 years ago #
• Scott McGuire Administrator
Hi,
First, you should make sure that your web browser isn't caching an old version of your website.
Assuming you are using Safari, try the following:
* Go to the Safari menu, and choose Empty Cache.
* Safari will ask you if you're sure. Click the Empty button.
* Then go to your website address, and see if you see the updates.
If that doesn't help, the likely explanation is that you did not upload your updates to the correct folder on the server. On many servers, the files that make up your website must go in a specially named folder, for example, one named "public_html", "htdocs", or "www" - the exact name of the folder will depend on your server. You should check with the folks who run the server and make sure you are uploading your files to the correct location.
Please let us know if you have more questions or are still having problems after following this advice.
Thanks,
Scott McGuire
Fetch Softworks
Posted 9 years ago #
Reply
• Or nickname, if you prefer.
• This will be kept confidential.
• This is to ensure that you’re a person, not a spambot. | ESSENTIALAI-STEM |
FEDERAL DEPOSIT INSURANCE CORPORATION, in its corporate capacity, Plaintiff, v. CHERRY, BEKAERT & HOLLAND, et al., Defendants.
No. 88-1147-CIV-T-15C.
United States District Court, M.D. Florida, Tampa Division.
April 4, 1990.
Alison Berman, Federal Deposit Ins. Corp., Washington, D.C. and Leonard H. Gilbert, Robert Pass, Chris S. Coutroulis, and Mary Stenson Scriven, Carlton, Fields, Ward, Emmanuel, Tampa, Fla., for plaintiff.
Michael Minkin, Hermelee, Cowart & Minkin, Miami, Fla., for defendants.
ORDER
ELIZABETH A. JENKINS, United States Magistrate.
THIS CAUSE comes on for consideration of defendant Cherry Bekaert & Holland’s (“Cherry Bekaert”) Motion to Compel Production of Documents and for Sanctions (Dkt. 138), and Cherry Bekaert’s Request for Oral Argument (Dkt. 140) with respect thereto. Cherry Bekaert seeks an order compelling the production of certain documents in the possession of plaintiff which it considers responsive to the following requests for production: Plaintiff’s First Request for Production Nos. 4, 6, 8, 9, 10, 26; Plaintiff’s Second Request for Production Nos. 2, 13, 16. Cherry Bekaert also seeks sanctions for FDIC’s allegedly untimely disclosure and designation of certain documents as privileged.
7. Introduction
The FDIC has objected to producing certain documents to Cherry Bekaert on grounds of attorney-client privilege and work product doctrine. Because the parties have filed extensive memoranda on the motion to compel, oral argument is unnecessary. Therefore, Cherry Bekaert’s Request for Oral Argument is DENIED. The documents disclosed in a September 12, 1989 letter from FDIC counsel to Cherry Bekaert counsel which were withheld on privilege grounds by the FDIC are:
1. Reports of Criminal Irregularity (“criminal referrals”) sent to the Justice Department (attorney-client);
2. Loan “writeups” (attorney-client, work product);
3. Post-closing report, historical analysis, and time line of Park Bank (attorney-client, work product);
4. Witness statements taken by or on behalf of the FDIC and “work papers” (work product);
5. 191 other documents involving communications between Park Bank and its counsel, pre-closing (attorney-client privilege).
77. Criminal Referrals
The FDIC has identified four “Reports of Criminal Irregularity,” or “criminal referrals” from FDIC to the U.S. Attorney, as documents which have been withheld from Cherry Bekaert on grounds of attorney-client privilege. FDIC is not asserting the privilege of Park Bank with respect to these documents but its own attorney-client privilege.
According to the FDIC, the criminal referrals were created by FDIC personnel after the closing of Park Bank and in connection with the loan writeups it prepared. FDIC states that these documents are confidential transmittals to the U.S. Attorney’s office by FDIC investigators expressing views that certain criminal activity may have occurred with respect to various transactions at the bank.
Cherry Bekaert makes several arguments as to why it contends that the criminal referrals are not privileged. First, it argues that FDIC has cited no statute or rule which appoints the Criminal Division of the Justice Department or the United States Attorney for the Middle District of Florida as the FDIC’s attorney, or, that in making these referrals the FDIC was seeking to become the client of the U.S. Attorney. Second, Cherry Bekaert argues that the criminal referrals were not communications made for the purpose of securing legal opinions, legal services, or seeking legal assistance in some legal proceeding. Finally, Cherry Bekaert argues that the facts disclosed by the FDIC to the U.S. Attorney would have to be disclosed to criminal defendants at some point if the facts transmitted by the FDIC were for the purpose of having the U.S. Attorney institute criminal proceedings.
The attorney-client privilege protects confidential communications between a client and his attorney where the communications concern legal advice or tend to disclose information given to the attorney by the client. In re Grand Jury Subpoena, 788 F.2d 1511, 1512 (11th Cir.1986). The burden of proof is on the party asserting the privilege to establish the existence of an attorney-client relationship and the confidential nature of the information sought. Id. at 1511-1512.
The FDIC cites Employers Insurance of Wausau v. Federal Dep. Ins. Corp., No. Civ-3-85-311 & 312, slip opinion (E.D.Tenn. April 22, 1986) for the proposition that the criminal referrals are protected from disclosure by the attorney-client privilege of the FDIC. The Wausau case appears to be the only case directly on point. In Wausau, the court noted that the FDIC was obligated to report violations of the criminal laws which it uncovers during a bank investigation, slip op. at 16. In reporting such suspected violations, the court held, the U.S. Attorney acted as the FDIC’s lawyer. Ibid. The court viewed the FDIC and the Justice Department as working towards a common goal, prosecution of violation of the banking laws, with an identity of legal interests. Ibid, citing United States v. American Tel. & Tel. Co., 86 F.R.D. 603, 616 (D.D.C.1980).
The undersigned concludes that the FDIC’s attorney is the Justice Department and its U.S. Attorneys with regard to investigations of bank misconduct and for the referral of suspected criminal violations for prosecution and that the criminal referrals at issue here were disclosed in confidence to the U.S. Attorney’s office with the common goal of prosecuting violations of the federal banking laws through the exercise of the FDIC’s duty to report violations of such laws. Therefore, the attorney-client privilege applies to the criminal referrals and the FDIC’s refusal to produce these documents is proper.
III. Loan Writeups, Historical Analyses, Post-Closing Reports, Time Line, Work Papers
A. Loan Writeups
Cherry Bekaert seeks to compel the production of loan “writeups” prepared by FDIC investigators after the closing of Park Bank. The parties apparently agree that the “writeups” include documents referred to as the “four to five page checklists,” the individual “loan histories,” and the “six part memoranda.” It appears that the loan histories were a part of the six-part memoranda which in turn made up the bulk of each loan writeup. Thus, the discoverability of all of these documents making up the loan writeups shall be considered together.
The FDIC argues that the loan writeups are protected from disclosure by the work product doctrine and by the attorney-client privilege.
Cherry Bekaert contends that the documents are not protected work product because deposition testimony shows that the loan writeups were not created at the direction of counsel and contain only factual material which has been stripped of any opinions. In addition, even if the documents are found to have been created in anticipation of litigation, Cherry Bekaert argues that it has a substantial need for the documents and that the underlying documents are not the equivalent of the loan writeups and related documents prepared by FDIC. Cherry Bekaert fails to address the contention that the loan writeups are protected by the attorney-client privilege.
The work product doctrine protects from disclosure materials prepared in anticipation of litigation by or for a party or by or for that party’s attorney acting for his client. In re Grand Jury Proceedings, 601 F.2d 162, 171 (5th Cir.1979); Rule 26(b)(3), Fed.R.Civ.P. Under Rule 26(b)(3), litigation documents which contain the mental impressions, conclusions, opinions, and legal theories of counsel (or a party’s representative) are afforded absolute immunity from discovery. See e.g. Board of Trustees of Leland Stanford, Jr. Univ. v. Coulter Corp., 118 F.R.D. 532, 534 (S.D.Fla. 1987).
A party may discover, under Rule 26(b)(3), other relevant, unprivileged documents which are prepared in anticipation of litigation by or for another party or that party’s representative, only upon a showing of a substantial need for the documents and the inability to obtain the requested documents by other means without undue hardship. Rule 26(b)(3), Fed.R.Civ.P.
The work product doctrine does not protect documents prepared in the ordinary course of business of a party. Fann v. Giant Food, Inc., 115 F.R.D. 593, 596 (D.D.C.1987); Schmidt-Tiago, supra at 734-735.
While the FDIC states that the writeups were created primarily “in contemplation of filing lawsuits against officers and directors of Park Bank ... and were not used for or prepared for use [in this case],” FDIC admits that “some of the loans that are the subject of these “write-ups” overlap with the “negligence” and/or “liability” loans in this case.” {See Dkt. 139, Memorandum in Support of Cherry Bekaert’s motion to compel, exhibit “5”, letter dated September 12, 1989 from FDIC counsel to Cherry Bekaert counsel, pp. 2-3) (hereafter, “September 12, 1989 letter”). Therefore, the writeups may perhaps contain information relevant in the instant action.
With respect to the loan writeups in question, it appears that they were all created by the FDIC after the closing of Park Bank in 1986. According to deposition testimony from FDIC officials, portions of the transcripts of which are appended to Cherry Bekaert’s brief (Dkt. 139, exhibits “A”, “B”, “C”), the writeups were prepared pursuant to FDIC policy following a factual review of the various loans, review by the lead investigator, and by the supervisor. (See depo. of Dee Ann Doher taken in FDIC v. Kearney, No. 87-1898-Civ-T-13A (M.D.Fla.), pp. 79-82; depo. of Teresita Crockett, taken in Kearney, pp. 144, 149-151).
Other testimony indicates, however, that the writeups were prepared with an eye towards litigation and that every report generated by the FDIC investigation department is directed to FDIC counsel. {See Doher depo. pp. 24-25; Crockett depo. p. 143).
A review of the deposition testimony concerning the loan writeups and brief summaries concerning these documents contained in the letter from FDIC counsel to Cherry Bekaert’s counsel dated September 12, 1989, as well as other submissions of the parties leads to the conclusion that these documents were prepared in anticipation of litigation.
It is not clear, however, to what extent the loan writeups contain legal opinions or mental impressions of counsel “or other representative of a party concerning the litigation.” Rule 26(b)(3), Fed.R.Civ.P. The documents appear to have been created for review by FDIC’s Washington legal counsel. {See Doher depo. p. 25). However, Cherry Bekaert’s contention that the writeups have been stripped of all opinions is not supported in the testimony. According to the testimony of Ms. Doher, although the document is “pretty much factual,” it could “possibly” contain recommendations including those made as a result of meetings between “Washington office attorneys and people related to all of the claims.” (Doher depo. pp. 43, 55).
It is unnecessary, however, to conduct an in camera review of the loan writeups to determine whether the work product doctrine protects these documents from disclosure because the undersigned concludes that these documents are protected from disclosure by the attorney-client privilege. The writeups appear to be communications made in confidence by FDIC investigators to their counsel for the purpose of seeking legal advice concerning possible lawsuits. The deposition testimony of Dee Ann Do-her indicates that the writeups were prepared for review by Washington FDIC counsel. In preparing the loan writeups, Ms. Doher testified that the examiners:
... look to develop a claim, a legal claim, based on the losses that the institution has suffered, and you do that through investigation and through case writeups. And investigations is reading the exam reports ... Then, ultimately, what you have written up, if it should be pursued or not, is a legal matter, and our Washington office counsel read it.
(Doher depo., pp. 24-25).
The writeups, according to Ms. Doher, contain facts such as the following:
... the date [the note] was disbursed, and bring it on up to current and tell us what happened. Was collateral released from the loan when it shouldn’t have been? Was the guarantor released when it shouldn’t have been? Are they in default ... Capitalizing interest____
(Doher depo., p. 25). In preparing the loan writeups, the examiner utilizes a two-page “directors and officers negligence checklist” which aids the examiner as to what to look for in a loan file and what to put in the writeup. For example, the checklist, according to Ms. Doher, contains such items as “failure to perfect security; failure to monitor disbursements; failure to state purpose of loan.” (Doher depo. p. 27).
There is no suggestion on the part of Cherry Bekaert, nor in the deposition testimony, that FDIC has waived the attorney-client privilege with respect to the loan writeups other than in connection with the untimely disclosure issue. In fact, as noted above, Cherry Bekaert has not even addressed the attorney-client issue in its motion to compel.
It appears, therefore, that the loan write-ups were made in confidence by FDIC representatives and sent to FDIC’s counsel for the purpose of obtaining legal advice. Thus, the writeups and other documents included in this category are protected by the attorney-client privilege.
The conclusion reached above is supported by the only case found which deals with the discoverability of loan writeups (described as the “six-part memoranda”). The magistrate in Federal Dep. Ins. Corp. v. Butcher, No. Civ. 3-84-1020 slip opinion (E.D.Tenn. Sept. 15,1986), aff'd, 116 F.R.D. 203, 204 (E.D.Tenn.1987), cited by the FDIC, held that not only were the writeups protected from disclosure by the work-product doctrine, they were absolutely privileged under the attorney-client privilege. Id. at 6.
The magistrate in Butcher concluded:
The factual inquiries and opinions contained in the six-part memoranda were generated for counsel so that counsel could give the FDIC advice on how to proceed. Some of these memoranda were generated before this lawsuit was filed. Some were generated afterwards. But that does not matter, all were generated by FDIC employees to counsel for FDIC, acting as such, at the direction of the employees’ FDIC superiors, in order to secure legal advice from counsel.
Butcher, slip op. at 6-7, citing Upjohn Co. v. United States, 449 U.S. 383, 394, 101 S.Ct. 677, 685, 66 L.Ed.2d 584 (1981) (attorney-client privilege protects the giving of information to the lawyer, at the lawyer’s request, to enable him to give informed advice).
Accordingly, the undersigned concludes that the loan writeups are protected from discovery by the attorney-client privilege.
B. Post-Closing Reports and Historical Analysis
The “post-closing reports on Park Bank” and historical analysis and time line of Park Bank, according to the FDIC, consist of documents prepared by FDIC personnel at the direction of and under the supervision of FDIC counsel in contemplation of litigation against Park Bank officers, directors, “JK entities,” and “JRG.” According to the FDIC the reports contain a “brief synopsis of the status of the Park Bank receivership” and include “materials necessary for the preservation of FDIC’s legal rights in connection with Park Bank.”
FDIC contends that the documents were not prepared in connection with claims against Cherry Bekaert, but that they are protected from discovery in this case under the work product doctrine and the attorney-client privilege.
It is, however, unnecessary to determine to what extent the documents might be protected by the work product doctrine because, as with the loan writeups and related documents discussed above, the undersigned concludes that the post-closing reports, historical analysis, and Park Bank time line are protected from disclosure by the attorney-client privilege.
The deposition testimony of Ms. Crockett supports the conclusion that the post-closing reports, historical analysis and Park Bank time line were prepared for FDIC counsel, at their direction, for the purpose of securing legal advice:
(Witness) ... at the initial stages of a bank closing, there are usually several requests from our Washington counsel to prepare certain reports.
(Q) What kinds of reports are those? What kind of reports are generally requested when a bank closes?
(Witness) An overall history of the bank. First of all, there is what we call the post-closing report, which is a report that says the bank closed on such-and-such a date, and these are the directors that are still here. This is how much the bank has lost, and this is what we find on a brief — a one-week review as to why the bank closed____ We package all that up and send it up to them within a couple of weeks.
(Crockett depo. p. 145-146).
Further, Ms. Crockett recalls at least one specific request for a report concerning Park Bank from Washington legal counsel. (Crockett depo. p. 146). In addition, as noted above, Ms. Crockett testified that every report concerning a failed bank generated by her department was sent to a lawyer. (Crockett depo. p. 143). There is no evidence that once the reports were completed they were viewed by any' other persons so as to waive the attorney-client privilege.
As with the loan writeups, Cherry Bekaert has not suggested that the attorney-client privilege was waived in any respect with regard to these documents other than in connection with the untimely disclosure issue. In fact, Cherry Bekaert does not argue why the documents are not protected by the attorney-client privilege, focusing instead on the work product doctrine argument.
C. Personal Work Papers of Mr. Fernandez
The next group of documents sought by Cherry Bekaert are the personal work papers created by FDIC investigator John Fernandez. Mr. Fernandez testified at deposition in the Kearney case that he kept a personal file consisting of notes concerning Park Bank transactions with John Kearney (“Kearney credits”) which he was reviewing as an investigator for FDIC. (Depo. of John Fernandez, taken in Kearney case, p. 63) (“Fernandez depo.”). Mr. Fernandez referred to these documents as “work papers” and it is apparent that the notes were taken to aid in the preparation of loan writeups on the various credits reviewed should Washington counsel direct that writeups be created. (Fernandez depo. pp. 63, 71).
Documents prepared before litigation is formally commenced are “prepared in anticipation of litigation” and, therefore, protected from discovery under the work product doctrine if, at the time they are prepared, there is a substantial possibility that litigation will occur and that commencement of that litigation is imminent. Securities and Exchange Comm’n. v. World-Wide Coin Investments, Ltd., 92 F.R.D. 65, 66 (N.D.Ga.1981).
Although it appears that no writeups were created for at least some of these loans, the notes were evidently taken for the purpose of preparing loan writeups and there existed a substantial possibility that litigation would occur and was imminent with regard to these loans because the FDIC had closed Park Bank and these were loans which Mr. Fernandez had been asked to investigate.
Mr. Fernandez testified that he prepared these “work papers” with every credit he reviewed. These notes were not “personal files” in the sense that Mr. Fernandez would feel free to take them with him if he left FDIC’s employ. (Fernandez depo. p. 63). Accordingly, the undersigned concludes that the “work papers” referred to by Mr. Fernandez are protected by the work product privilege because they were prepared in anticipation of litigation by a representative of the FDIC.
Further, the undersigned concludes that Cherry Bekaert has not shown substantial need for the work papers in that FDIC has produced the underlying loan documentation on which the conclusions of the investigators are based. Cherry Bekaert has made no attempt on its own to depose Mr. Fernandez so as to question him concerning the specific loans which are the subject of this lawsuit, nor have they made a specific showing of unavailability of this witness. See Castle v. Sangamo Weston, Inc., 744 F.2d 1464, 1467 (11th Cir.1984) (no showing of substantial need for document when party had made no effort to depose person who made statement). Therefore, Cherry Bekaert’s motion to compel with respect to the work papers is DENIED.
IV. Witness Statements
Cherry Bekaert seeks production of various witness statements taken by an FDIC agent in late 1987. Statements were taken from Park Bank officers and directors Gary Froid and Frank Byars. The statement of Jim Matthews, referenced by Cherry Bekaert, was according to FDIC counsel, not taken on behalf of the FDIC but by Park Bank shareholders in connection with the case of Jenkins v. Jacobs. It is not clear whether the other individuals listed as having statements taken by the FDIC in 1987 — Grant C. Hunt, Peter Dawson, and Steve Jeatran — were officers and directors of Park Bank.
The FDIC states in its September 12, 1989 letter, that these statements, with the exception of the Matthews statement, were taken at the direction of FDIC counsel for the sole purpose of pursuing a bond claim against Aetna Casualty and Surety, and were withheld as work product in that case.
The FDIC argues that the witness statements are protected from disclosure under the work product doctrine. Cherry Bekaert contends that the statements are similar to statements taken pursuant to investigations conducted by insurance companies of accidents which courts have found discoverable. In addition, Cherry Bekaert argues that it has substantial need for the statements because the passage of time would affect the memories of these witnesses.
FDIC counters the contention of substantial need for the statements by arguing that Cherry Bekaert has made no attempt to depose these individuals and that when the statements were taken the loan transactions which were the subject of the questions occurred quite some time before the statements were taken.
The undersigned must accept FDIC’s assertion, uncontroverted by Cherry Bekaert, that the statements were taken by FDIC to aid in the preparation of anticipated, specific litigation: the bond claim against Aetna. Therefore, the statements would be work product at least with respect to the bond litigation. See Castle, supra at 1467. There is a split of authority among the various circuits regarding whether the work product protection extends to litigation other than that for which the documents were created. See Levingston v. Allis-Chalmers Corp., 109 F.R.D. 546, 552 (S.D.Miss.1985) (discussing split in circuits). One line of cases holds that the work product doctrine applies only if the materials were prepared in anticipation of the very suit before the court. See e.g. Honeywell, Inc. v. Piper Aircraft Corp., 50 F.R.D. 117, 119 (M.D.Pa.1970). Another line of cases holds that there is a perpetual protection for work product extending beyond the termination of litigation for which the documents were prepared. See Duplan Corp. v. Moulinage et Retorderie de Chavanoz, 487 F.2d 480, 483-484 (4th Cir.1973); In re Murphy, 560 F.2d 326, 335 (8th Cir.1977).
A third, intermediate, group of cases holds that subsequent or other litigation must involve closely related issues for the work product doctrine to apply. See Republic Gear Co. v. Borg-Warner Co., 381 F.2d 551, 557 (2d Cir.1967). Although the Eleventh Circuit Court of Appeals has evidently not taken a position on this issue, one Middle District of Florida case has taken the intermediate approach in considering whether the work product doctrine extends to suits other than the action for which the documents were originally created. See In re Grand Jury Proceedings, 73 F.R.D. 647, 653 (M.D.Fla.1977) (subsequent litigation found to be distinct and, therefore, work product did not operate to protect documents in second case).
It appears that the witness statements taken in connection with the Aetna bond claim involved at least some of the same issues as the case at bar so as to satisfy the closely related test for application of the work product privilege. It appears from the description of the contents of the statements in FDIC’s brief that the statements, taken shortly after Park Bank was closed, contain references to lending practices, procedures, and policies of Park Bank. Thus, the witness statements taken by the FDIC fall within the work product doctrine.
With respect to the statement taken from Mr. Matthews, it does not appear to be the work product of the FDIC but rather that of Park Bank shareholders in their suit against former Park Bank officers and directors in separate litigation. However, according to the FDIC’s September 12, 1989 letter, the Matthews statement is subject to a protective order in the Jenkins v. Jacobs case. Pending a supplemental response to be filed by the FDIC, a ruling on the discoverability of the Matthews statement is deferred.
As to the witness statements taken by representatives of FDIC which are covered by the work product privilege, the undersigned concludes that Cherry Bekaert has not shown a substantial need for these documents or the inability to obtain the equivalent from other sources without undue hardship. Cherry Bekaert has apparently made no attempt to depose the individuals who made the statements or even interviewed them to determine if their testimony would even be helpful to Cherry Bekaert’s case. See Castle, supra at 1467.
The work product doctrine exists to protect the integrity of the adversary system by safeguarding the fruits of an attorney’s trial preparation materials from discovery by the opposing party. In re Subpoena Duces Tecum, 738 F.2d 1367, 1371 (D.C.Cir.1984). If Cherry Bekaert wishes to obtain the testimony of the witnesses who made the statements, it should proceed to take their depositions rather than rely on FDIC’s efforts.
Accordingly, Cherry Bekaert’s motion to compel with regard to the witness statements referenced in FDIC’s September 12, 1989 letter is DENIED.
V. Documents Prepared by Park Bank’s Lawyers
The FDIC has identified 191 documents prepared by or for attorneys for Park Bank prior to the closing of Park. Bank with regard to which FDIC has claimed the attorney-client privilege of Park Bank. The undersigned has, in prior orders, upheld the right of the FDIC to assert the attorney-client privilege of Park Bank. It appears that both parties consider the undersigned’s determination concerning the FDIC’s right to assert Park Bank’s attorney-client privilege dispositive concerning the discovery of these 191 documents. Cherry Bekaert’s only argument for disclosure of these items is that they were not disclosed until September 12, 1989. The undersigned will address the tardy disclosure issue below.
With regard to the 191 documents listed in the September 12, 1989, all of the items listed appear to involve correspondence in some form between Park Bank officers or directors and the bank’s legal counsel for the purposes of obtaining legal advice. There is no suggestion by Cherry Bekaert that the privilege has been waived by disclosure of any of this correspondence. Accordingly, the 191 documents are protected from disclosure under the attorney-client privilege of Park Bank and Cherry Bekaert’s motion to compel with respect to these documents is DENIED.
VI. Request for Sanctions
In support of its request for sanctions, Cherry Bekaert states that the FDIC violated the undersigned’s May 16, 1989 order by failing to identify by May 31,1989 all privileged documents being withheld by FDIC. Cherry Bekaert argues that the disclosure of the documents that are the subject of this motion to compel as being withheld on privilege grounds in September and October, 1989 rather than in May violated the earlier order and justifies the sanctions of disallowing the claim of privilege and assessing the fees and costs associated with bringing the motion to compel.
The FDIC, on the other hand, argues that earlier disclosure and identification of many of the documents as privileged was precluded by the vague and ambiguous requests for production and contemporaneous correspondence which, it contends, led FDIC to believe that Cherry Bekaert was not interested in discovering post-closing documents. Further, FDIC claims that its failure to identify with specificity the particular criminal referrals withheld on grounds of privilege was due to oversight.
With respect to adherence to the May 16, 1989 order, FDIC states that it did not specifically identify the post-closing documents that were withheld on privilege grounds because (1) it did not interpret the request for production as calling for such documents; (2) that the transcript of the May 15, 1989 discovery conference reveals that Cherry Bekaert’s focus was on preclosing regulatory activity. In addition, FDIC argues that Cherry Bekaert similarly violated the terms of that order by failing to identify any work-product documents being withheld despite claiming work product protection regarding similar requests for production drafted by FDIC.
Finally, FDIC argues that even assuming that its disclosure of the documents withheld on privilege grounds was untimely, Cherry Bekaert has suffered no prejudice and that waiver of an asserted privilege is not an appropriate sanction for untimely assertion of a privilege.
Under the circumstances, the undersigned concludes that the sanctions requested by Cherry Bekaert are unwarranted. First, it appears that FDIC was under the impression, at least at the time of the May 15, 1989 discovery conference, that the post-closing documents were not at issue and were not sought by Cherry Bekaert. Second, with respect to at least some of the requests for production, FDIC did in fact raise objections to production based on work product and attorney-client privileges.
Most importantly, however, it does not appear that Cherry Bekaert has been prejudiced by the late disclosure of the documents which are the subject of this motion to compel. The FDIC would still have resisted discovery of the post-closing documents, necessitating a motion to compel. In addition, Cherry Bekaert has identified no particular harm resulting from the late disclosure and now has ample time to conduct any additional discovery, such as seeking to take the depositions of the individuals making the statements withheld by FDIC.
Finally, despite the authority cited by Cherry Bekaert in its memorandum, binding former Fifth Circuit authority suggests that failure to assert the attorney-client privilege in a timely manner does not waive the privilege even when the privilege is asserted for the first time in a motion for reconsideration of a district court’s order to produce. Southern Railway Co. v. Lanham, 403 F.2d 119, 133-134 (5th Cir.1968), rek. denied(en banc), 408 F.2d 348 (5th Cir.1969).
Accordingly, the undersigned concludes that neither binding authority nor the particular circumstances warrant the imposition of the sanctions requested by Cherry Bekaert.
It is, therefore,
ORDERED:
(1) that Cherry Bekaert & Holland’s Motion to Compel Production of Documents and for Sanctions (Dkt. 138) is DENIED except insofar as it concerns the items described in paragraphs 3 and 4, below, as to which a decision is DEFERRED pending the filing of a supplemental memorandum;
(2) that insofar as the motion to compel concerns the “ITS manual” and the “two-page directors and officers checklist” is DENIED as moot.
(3) that with respect to the discovery of the statement of Jim Matthews, the FDIC shall, within ten (10) days of the date of this order, file a supplemental memorandum addressing the issues related to its discovery and indicating why it believes the Matthews statement to be subject to the protective order in Jenkins v. Jacobs;
(4) that with respect to the “log” or “register” “of confidential memoranda,” determination of the discoverability of this documents) is DEFERRED and the FDIC shall set forth the FDIC’s position and cite authority with regard to this item in the same supplemental memorandum required above concerning Mr. Matthews’ statement to be filed within ten (10) days of the date of this order;
(5) that Cherry Bekaert’s Request for Oral Argument (Dkt. 140) is DENIED;
DONE and ORDERED.
. The documents have not been submitted for in camera review but are described in sufficient detail in the parties’ memoranda and attachments thereto so that a determination as to the discoverability of the documents can be made without the need for in camera review, in view of the issues presented.
. FDIC states that it has already produced the "ITS manual” and the "two-page directors and officers checklist” on November 1, 1989. The undersigned must accept as true these representations of counsel made as officers of the court. Accordingly, Cherry Bekaert’s motion to compel, insofar as it addresses these documents is DENIED as moot.
. In addition, Cherry Bekaert identifies a "log" or "register" "of confidential memoranda" in the possession of the FDIC. The item was referred to in the deposition of John Fernandez taken in the FDIC v. Kearney case. The "log” or "register” is not specifically addressed in FDIC's memorandum or in correspondence from the FDIC to Cherry Bekaert so it is unclear if the FDIC is withholding this item referred to by Mr. Fernandez on grounds of privilege, and, if so, on what basis.
Therefore, determination of the discoverability of the "log" or “register” of confidential memoranda is DEFERRED and the FDIC is directed to file, within ten (10) days of the date of this order, a supplemental memoranda which sets forth the FDIC’s position with regard to this item.
. As noted in the undersigned’s order dated November 28, 1989, it is unclear whether state or federal law of privilege will apply with regard to this action. On the one hand, under Rule 501, Fed.R.Evid., state law on privilege applies with respect to claims and defenses with regard to which state law supplies the rules of decision. Here, FDIC brings claims for accounting malpractice so it would appear that Florida law of privilege would govern. However, under Trigo v. Federal Dep. Ins. Corp., 847 F.2d 1499, 1502 (11th Cir.1988), federal common law governs in cases involving the rights and liabilities of the FDIC acting in its corporate capacity pursuant to a purchase and assumption transaction.
Nevertheless, Florida courts have looked to federal cases for guidance in resolving issues of interpretation concerning privileges. See e.g. Brookings v. State, 495 So.2d 135, 139 (Fla. 1986); Visual Scene, Inc. v. Pilkington Bros., 508 So.2d 437, 440 (Fla. 3d DCA 1987). Florida law of attorney-client privilege, insofar as it relates to the basic requirements for its application, does not vary substantially in any event from the requirements discussed in federal cases cited herein. See e.g. Boyles v. Mid-Florida Television Corp., 431 So.2d 627, 638-639 (Fla. 5th DCA 1983), approved, 467 So.2d 282 (Fla.1985).
Concerning the work product doctrine, it is a limitation on discovery in federal cases, and federal law provides the primary decisional framework. See Hickman v. Taylor, 329 U.S. 495, 512, 67 S.Ct. 385, 394, 91 L.Ed. 451 (1947); Rule 26(b)(3), Fed.R.Civ.P.
. See page 606-607, infra, for a discussion of the waiver issue as it relates to the alleged untimely disclosure of the documents. Of course, if FDIC intends to introduce any of the documents at issue in this order at trial which it has claimed to be privileged or present testimony regarding privileged communications at trial, or uses privileged documents to refresh recollection, the privilege could be deemed waived and the documents required to be produced at an appropriate time. See State of Colo, ex rel. Woodard v. Schmidt-Tiago Const. Co., 108 F.R.D. 731, 734-735 (D.Colo.1985); see generally Marshall v. United States Postal Service, 88 F.R.D. 348, 350 (D.D.C.1980). The attorney-client privilege was intended as a shield, not a sword. Pitney-Bowes, Inc. v. Mestre, 86 F.R.D. 444, 446 (S.D.Fla.1980).
. Most of the documents at issue here which the undersigned finds qualify for work product protection were prepared by FDIC employees and representatives rather than counsel.
. Dee Ann Doher, at the time of the investigation of Park Bank, was a Bank Liquidation Specialist and Department Head. See Dkt. 139, exhibit “A” for portions of her deposition transcript in FDIC v. Kearney (“Doher depo.”). Cherry Bekaert states that its counsel was permitted to sit in on the depositions of certain witnesses whose testimony is appended to their memorandum in support of the motion to compel. However, Cherry Bekaert counsel did not participate in questioning of witnesses.
. Teresita Crockett, at the time of the investigation of Park Bank, was a Supervising Liquidation Specialist in the field and the Lead Investigator. See Dkt. 139, exhibit "B” for portions of the deposition transcript from FDIC v. Kearney ("Crockett depo.”).
. See pages 606-607, infra.
. "JK entities” apparently refers to companies owned by or somehow connected with John Kearney. It is unclear from the documents submitted what "JRG" refers to.
. The FDIC states in its response that no time line was ever generated for Park Bank that showed when loans failed.
. Because this category concerns only post-closing reports and not post-closing loan files in general, FDIC will presumably have to disclose all other documents in its post-closing loan files which have not specifically been identified as privileged, pursuant to the March 1, 1990 order of the undersigned (Dkt. 177).
. See pages 606-607, infra.
. John E. Kearney was chairman of the board of Park Bank and a member of the executive loan committee in 1984.
. John Fernandez had the title of "liquidation assistant” with the FDIC and assisted in investigations of Park Bank loans after the bank’s closing. Portions of his deposition testimony in the Kearney case are appended to Cherry Bekaert’s memorandum as exhibit “C”.
. It is not clear where the Jenkins case is filed and what the terms of the protective order are. FDIC is directed to file a supplemental response within ten (10) days of the date of this order addressing these issues and indicating why it believes the Matthews statement ought to be subject to the protective order.
. See orders dated November 28, 1989 (Dkt. 145) and March 1, 1990 (Dkt. 177).
. The discovery deadline has now been extended, by order of the court, to September 7, 1990.
| CASELAW |
User:EbbiewebbyPlayz/sandbox
Minecraft'''is a sandbox game where there are no specific goals for the player to achieve.
I LOVE MINECRAFT! | WIKI |
Disclaimer: This material is being kept online for historical purposes. Though accurate at the time of publication, it is no longer being updated. The page may contain broken links or outdated information, and parts may not function in current web browsers. Visit the NASA Salinity website for more information.
Science Meetings
CONAE Microwave Radiometer (MWR) Counts to Tb Algorithm (Version 6.0) and On-Orbit Validation
Ghazi, Z., Jones, L., and Jacob, M.M. (13-Nov-13)
The MWR Calibration Team has developed an improved Microwave Radiometer (MWR) algorithm (version 6) to convert the radiometric counts to brightness temperature (Tb). This algorithm is based upon rigorous radiative transfer models with empirically derived coefficients from both pre-launch thermal vacuum radiometric calibration testing and on orbit intersatellite cross calibrations (XCAL) with the Naval Research Lab's WindSat satellite radiometer. This poster presents recent results of on-orbit MWR/WindSat XCAL comparisons for the newest version 6 of the MWR counts to Tb algorithm, which includes a "counts linearization" procedure to correct for a small radiometer non-linearity. To develop a linear radiometer transfer function, we analyzed MWR on orbit Tb measurements that includes Cold Sky Calibration (CSC) and ocean and land observations to provide a wide dynamic range of brightness temperatures. The analysis procedure is described, which includes normalization of the on orbit gain changes due to physical temperature changes. XCAL validation results of the previous version 5 and the new version 6 algorithms are shown for one year of comparisons between MWR and WindSat. | ESSENTIALAI-STEM |
Page:Vasari - Lives of the Most Excellent Painters, Sculptors, and Architects, volume 2.djvu/392
384
For Francesco del Giocondo, Leonardo undertook to paint , his wife, but, after loitering over it for four years, he finally left it unfinished. This work is now in the possession of the King Francis of France, and is at Fontainebleau. Whoever shall desire to see how far art can imitate nature, may do so to perfection in this head, wherein every peculiarity that could be depicted by the utmost subtlety of the pencil has been faithfully reproduced. The eyes have the lustrous brightness and moisture which is seen in life, and around them are those pale, red, and slightly livid circles, also proper to nature, with the lashes, which can only be copied, as these are, with the greatest difficulty: the eyebrows also are represented with the closest exactitude, where fuller and where more thinly set, with the separate hairs delineated as they issue from the skin, every turn being followed, and all the pores exhibited in a manner that could not be more natural than it is: the nose, with its beautiful and delicately roseate nostrils, might be easily believed to be alive; the mouth, admirable in its outline, has the lips uniting the rose-tints of their colour with that of the face, in the utmost perfection, and the carnation of the cheek does not appear to be painted, but truly of flesh and blood: he who looks earnestly at the pit of the throat cannot but believe that he sees the beating of the pulses, and it may be truly said that this work is painted in a manner well calculated to make the boldest master tremble, and astonishes all who beehold it, however well accustomed to the marvels of art. Mona Lisa was exceedingly beautiful, and while Leonardo was painting her portrait, he took the precaution of keeping some one constantly near her, to sing or play on instruments, or to jest and otherwise amuse her, to the end that she might continue cheerful, and so that her face might not exhibit the melancholy expression often imparted by painters to the likenesses they take. In this portrait of Leonardo’s, on the contrary, there is so pleasing an expression, and a smile so sweet, that while looking at it one thinks it rather | WIKI |
Blindness Resource Center
Blindness Resource Center
Visual impairment is total or partial vision loss. Blindness is the condition in which the vision is 20/400 or lower. A person may suffer from visual impairment due to some disease or trauma. Sometimes, it happens due to a medical condition which is not corrected in time. In case of low vision, the person cannot clearly see either the objects kept at a distance or close by.
Visual impairment is total or partial vision loss. Blindness is the condition in which the vision is 20/400 or lower. A person may suffer from visual impairment due to some disease or trauma. Sometimes, it happens due to a medical condition which is not corrected in time. In case of low vision, the person cannot clearly see either the objects kept at a distance or close by. In many cases, the loss of vision cannot be corrected by contact lenses or eyeglasses. Some forms of partial or complete vision loss can be corrected by making refractive correction of eyes which is either done through medication or surgery.
Epidemiology
According to the latest statistics of WHO, about 314 million people across the globe suffer from visual impairment out of which 45 million are completely blind. It has been found that 87% of the visually impaired are living in developing countries and about 85% of the cases are avoidable. Avoidable blindness is highest in South East Asia (28%) and Western Pacific (26%). It’s lowest in America (9.6%) and European nations (9.6%). Eighty percent of the people above 50 years suffer from some form of vision loss. The risk increases in people above the age of 65 and women are at a higher risk of losing vision. Color blindness is a genetic condition, and it is found in 8% of males and less than 1% of females. The main cause for visual impairment is cataract which is found in 39% of the cases, that is 17.6 million worldwide. The second major cause is refractive error which accounts for 18% of the cases.
Classification
Blindness is classified into three categories: total blindness, legal blindness, and low vision. Total blindness refers to lack of any form of visual perception, which is a severe condition. Legal blindness refers to vision acuity which is 20/200 or lower. People who are unable to read the biggest letters on charts even after using the corrective lenses are said to be legally blind. A condition called “low vision” refers to the visual acuity in which the person can see less than 20/60 and more than 20/200. On the other hand, color blindness, night blindness, and snow blindness are three medical conditions in which the person finds it difficult to see things clearly. In color blindness, the person is not blind but he/she finds it difficult to perceive certain colors. In night blindness, the vision reduces in low illumination. In snow blindness, the vision reduces due to exposure to ultra violet rays. Snow blindness is a temporary condition and it happens because the cells on the corneal surface swell.
Causes of Blindness
Blindness can be caused by age related macular degeneration, diabetic retinopathy, cataracts, and glaucoma. It happens because of infection to the cornea which turns white in color after an injury or infection. Eye injury is a common cause for blindness in people below 30 years as it can cause optic nerve hypoplasia which affects the functioning of nerve that sends signals to the brain. Injury to occipital lobe can make a person completely blind even if the eye is not injured. Blindness caused during birth or early childhood can be caused by Leber’s congenital amaurosis. Sometimes, certain chemicals such as methanol can cause blindness. Methanol is found in methylated spirits and it’s taken as a cheap substitute for alcohol in some parts of the world. Methanol poisoning can cause eye impairment. Willful actions such as torture, act of vengeance or acid attacks can cause blindness as well.
Adaptive Techniques and Aids
For mobility, reading, and magnification, the visually impaired use a number of tools and aids such as using routes and white cane with a red tip. Some use the lighter identification cane and dogs. Guide dogs are trained dogs which can help their owners reach complex places. Some use the software designed from GPS technology for easy mobility. The software assists with orientation and provides easy navigation. A number of magnifying glasses are used to enable reading letters for people who are not totally blind and Braille can be used to read books. Reading machines are provided to convert speech to Braille. There’s even certain optical character recognition software which can be used to read and write.
Additional Resources
Related Blogs
VoiceNation Earns ATSI Award of Excellence 2nd Year in a Row
Posted by spetty | July 9, 2018
VoiceNation Earns ATSI Award of Excellence 2nd Year in a Row
VoiceNation, LLC wins coveted ATSI Award of Excellence VoiceNation, LLC has been honored with the exclusive ATSI 2018 Award of Excellence for the 2nd consecutive year. This award is presented...
answering service real estate
Posted by admin | May 1, 2017
4 Reasons You Need an Answering Service Today for Your Real Estate Agency
Real estate agents are the lifeblood of the company. There really is no business without them, so they have to be available at all times of the day. But how...
HVAC Answering Service
Posted by admin | May 1, 2017
What Should HVAC Companies Look For in an Answering Service?
The heating and cooling industry is growing quickly. In 2014, HVAC technicians were projected to experience a 14 percent increase in job availability by 2024. These increased jobs may mean... | ESSENTIALAI-STEM |
Nestor (surname)
Nestor is, apart from a given name, also found as a surname borne by Irish and Estonians.
In Ireland, it was derived as a shortened form of Mac Girr an Adhastair, meaning son of the short man of the bridle. It was sometimes shortened to Mac an Adhastair. The surname is most common in County Galway and County Clare. The clan were natives of Corcomroe in the latter county, which in the Middle Ages formed the north-westernmost territory of the kingdom of Thomond. The Mac Girr an Adhastair were associated with the local lords, the Ó Lochlainn family.
Notable people with the surname include:
* Agnes Nestor (1880–1948), American labor leader and social reformer
* Daniel Nestor,(born 1972), Canadian grand slam winning tennis player
* Eddie Nestor (born 1964), broadcaster and comedian
* Eiki Nestor (born 1953), Estonian politician
* Ion Nestor (1905–1974), Romanian archaeologist
* Kelly Nestor (born 1968), Australian newsreader
* Pam Nestor (born 1948), British lyricist, singer and actress
* Rodrigo Nestor (born 2000), Brazilian footballer | WIKI |
Page:A tour through the northern counties of England, and the borders of Scotland - Volume II.djvu/136
[ 124 ]
expression of the old man is admirable. Half- length of Queen Elizabeth, when young, in a very rich dress. On the stair- case is a fine colossal mar- ble head, a modern copy of the dying Alexander.
Quitting Holker-Hall, we hurried through Flookbrooke, to the Carter-House on the Lancaster road, that we might pass this wide expanse (almost nine miles across) before the ocean resumed his lately abdicated domain. But though these sands exceeded in extent those we had already passed, the effect was not equal to the impression we re- ceived from the first; both from the circumstance of the charm of novelty being lost, and the boun- dary of mountains which lately was so grand, being now dwindled into comparative insignificance. But still the accompaniments were pleasing and curious; promontories and bays, hills and woods, villages and towns, in the distance; and numberless old women and children before us earning a scanty subsistence by digging cockles out of the sand, which they sell afterwards at two-pence per quart. A little river, flowing across the sands, soon pre- sented itself; but it was small, and passed without the assistance of the guide, who, stationed on the margin of the Kent, took us under his protection as we passed this ford; highly dangerous to the incautious traveller, and so perilous even to the
�� � | WIKI |
Page:The Scrum Guide (2020, English).pdf/5
Transparency enables inspection. Inspection without transparency is misleading and wasteful.
The Scrum artifacts and the progress toward agreed goals must be inspected frequently and diligently to detect potentially undesirable variances or problems. To help with inspection, Scrum provides cadence in the form of its five events.
Inspection enables adaptation. Inspection without adaptation is considered pointless. Scrum events are designed to provoke change.
If any aspects of a process deviate outside acceptable limits or if the resulting product is unacceptable, the process being applied or the materials being produced must be adjusted. The adjustment must be made as soon as possible to minimize further deviation.
Adaptation becomes more difficult when the people involved are not empowered or self-managing. A Scrum Team is expected to adapt the moment it learns anything new through inspection.
Successful use of Scrum depends on people becoming more proficient in living five values:
The Scrum Team commits to achieving its goals and to supporting each other. Their primary focus is on the work of the Sprint to make the best possible progress toward these goals. The Scrum Team and its stakeholders are open about the work and the challenges. Scrum Team members respect each other to be capable, independent people, and are respected as such by the people with whom they work. The Scrum Team members have the courage to do the right thing, to work on tough problems.
These values give direction to the Scrum Team with regard to their work, actions, and behavior. The decisions that are made, the steps taken, and the way Scrum is used should reinforce these values, not diminish or undermine them. The Scrum Team members learn and explore the values as they work with the Scrum events and artifacts. When these values are embodied by the Scrum Team and the people they work with, the empirical Scrum pillars of transparency, inspection, and adaptation come to life building trust. 4 | WIKI |
Dynamical Probability Distribution Function of the SK Model at High Temperatures
Hidetoshi Nishimori, Michiko Yamana
研究成果: Article査読
6 被引用数 (Scopus)
抄録
The microscopic probability distribution function of the Sherrington-Kirkpatrick (SK) model of spin glasses is calculated explicitly as a function of time by a high-temperature expansion. The resulting formula to the third order of the inverse temperature shows that an assumption made by Coolen, Laughon and Sherrington in their recent theory of dynamics is violated. Deviations of their theory from exact results are estimated quantitatively. Our formula also yields explicit expressions of the time dependence of various macroscopic physical quantities when the temperature is suddenly changed within the high-temperature region.
本文言語English
ページ(範囲)3-6
ページ数4
ジャーナルjournal of the physical society of japan
65
1
DOI
出版ステータスPublished - 1996
ASJC Scopus subject areas
• Physics and Astronomy(all)
フィンガープリント 「Dynamical Probability Distribution Function of the SK Model at High Temperatures」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。
引用スタイル | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Wu Shu-fen
The result was delete. WP:SOFTDELETE The Bushranger One ping only 18:09, 8 February 2013 (UTC)
Wu Shu-fen
* – ( View AfD View log Stats )
Has not "received significant coverage in reliable secondary sources that are independent of the subject". Therefore does not meet WP:N. Before someone cites WP:ATHLETE note that it presumes notability, it does not grant notability. It presumes that there will be significant coverage but in this, and many other cases there has not been. All of the information in the article is included in Beach volleyball at the 2012 Asian Beach Games so there is no need to merge and it is an implausible redirect. James086 Talk 15:08, 18 January 2013 (UTC)
* Comment While in my opinion I agree that stubs that don't expand on information already given elsewhere here should be removed, I don't think that your argument that "presumption" does not "grant" notability is valid. WP:GNG in itself "presumes" notability based on criteria which "received significant coverage..." falls under. Anyone following your line of reasoning would have right to argue that anything they dislike can be deleted by saying does not "grant" nobility, in effect rendering policies obsolete.
* On a side note, if this goes you may want to take a look at other similar stubs on Beach volleyball at the 2012 Asian Beach Games. Most of them are also single line stubs with that same dead link reference. — Preceding unsigned comment added by FunnyPika (talk • contribs) 16:16, 18 January 2013 (UTC)
* I missed that bit in the GNG, but I think this should still run its course because this person very clearly does not meet the GNG but does meet WP:ATHLETE. After this has run its course I'll bring it up on Wikipedia talk:Notability (sports) and then if appropriate proceed to nominate other similar stubs. I have come across hundreds like this (not just Asian Beach Games competitors) that probably don't have a single source that provides "significant coverage" (meaning in-depth info). James086 Talk 17:03, 18 January 2013 (UTC)
* Note: This debate has been included in the list of Sportspeople-related deletion discussions. ★☆ DUCK IS PEANUTBUTTER ☆★ 18:53, 19 January 2013 (UTC)
* Note: This debate has been included in the list of Taiwan-related deletion discussions. ★☆ DUCK IS PEANUTBUTTER ☆★ 18:53, 19 January 2013 (UTC)
* Relisted to generate a more thorough discussion so a clearer consensus may be reached.
* Please add new comments below this notice. Thanks, Automatic Strikeout ( T • C ) 00:17, 25 January 2013 (UTC)
* Relisted to generate a more thorough discussion so a clearer consensus may be reached.
* Please add new comments below this notice. Thanks, The Bushranger One ping only 01:24, 1 February 2013 (UTC)
* Comment If you feel the WP:RULES don't apply here and can make a good argument for such, I'd encourage you to debate along the WP:IGNORE all rules lines. Don't take "no" for an answer if you feel you can provide a sufficient means for inclusion that is not so obvious to other folks. Gives you the chance to make a point without anchoring it to the usual myriad of Wiki policy responsibilities. Never know what may pan out & good luck :) Яεñ99 (talk) 04:11, 1 February 2013 (UTC)
* Comment I should clarify a tad...Delete. I can't see a need for this as an independent inclusion. I forgot to put that in there a bit ago... Яεñ99 (talk) 08:57, 1 February 2013 (UTC)
* Comment Has anybody checked for sources in Chinese-language media? --Colapeninsula (talk) 10:49, 1 February 2013 (UTC)
* The Chinese Taipei University Sport Federation mentions her here, but I don't think it's enough to push past WP:GNG. She also plays indoor volleyball for TaiPower so there could be coverage there. If anyone is fluent in traditional Chinese they could try searching "吳淑芬 排球" (Wu Shu-Fen volleyball). Funny Pika! 02:46, 2 February 2013 (UTC)
| WIKI |
Suraj Deshmukh
Blog
containers, packaging, programming, hacks, kubernetes, openshift, fedora, centos
Monitor your PC with Prometheus Grafana stack
Get a fine grained view of the happenings on your system!
Suraj Deshmukh
2-Minute Read
Node Exporter
How do you monitor your own computer? Of course, using Prometheus, node-exporter and Grafana. You might ask why would you wanna do that when you can simply use the operating system provided, “System Monitor”. Well, yes, you can use that. But the data you get from the OS System Monitor is coarse-grained. OS system monitor is not configurable, but this stack is.
Kubernetes The Hard Way in "Vagrant"?
The first step in your CKA preparation!
Suraj Deshmukh
2-Minute Read
CKA logo
If you are studying for the Certified Kubernetes Administrator (CKA) exam, you might have come across folks recommending Kelsey Hightower’s Kubernetes the Hard Way. It is an excellent first step for someone who has no idea about the components that form a Kubernetes cluster. As the name suggests, it is created so that you learn the Kubernetes building blocks the “hard way”.
Exec in container environment
The correct way to use exec and the signal passing.
Suraj Deshmukh
3-Minute Read
If you use exec in your container script, then the container or Kubernetes pod might exit after the command that is exec-ed into has exited. But if that’s what you wanted, then it’s okay. This blog tries to explain how to pass the signals to the applications, how they work differently when invoked uniquely and what to do if the application does handle them.
Suraj Deshmukh
6-Minute Read
PodSecurityPolicy (PSP) is hard to get right in the first attempt. There has never been a situation when I haven’t banged my head to get it working on the cluster. It is a frustrating experience, but it is one of the essential security features of Kubernetes. Some applications have started shipping the PSP configs with their helm charts, but if a helm chart does not ship a PSP config, it must be handcrafted by the cluster-admin to make the application work reliably in the cluster.
How to gracefully kill Kubernetes Jobs with a sidecar?
A sidecar in a Kubernetes Job, what? Yeah you might need one and here is how to shut it.
Suraj Deshmukh
6-Minute Read
Have you ever had a sidecar in your Kubernetes Job? If no, then trust me that you are lucky. If yes, then you will have the frustration of your life. The thing is Kubernetes Jobs are meant to exit on completion. But if you have a long-running sidecar, then that might twist things for Kubernetes and in turn of you.
Use Configmap for Scripts
A new way to ship scripts to container images.
Suraj Deshmukh
6-Minute Read
We generally use some sort of scripts in application container images. They serve various purposes. Some scripts might do an initial setup before the application starts, others may have the whole logic of the container image, etc. Whatever the goal may be the general pattern is to copy the script into the container image, build the image and then the script is available when you consume the image.
Recent Posts
Categories
About
I am a Software Engineer at Kinvolk, working on various tooling around container technology like Docker, Kubernetes. | ESSENTIALAI-STEM |
Haderslev
Haderslev is a town in South Jutland, Denmark. It is situated deep in an East Jutland fjord on the Baltic coast, and emerged in the 1100s as a trading post.
Understand
Haderslev was a prolific trading port for centuries and became a regional religious center in medieval times with its old cathedral dating back to the 1200s.
Today, Haderslev is a regional center for the Danish military and State administration, both very important local employers. Trade and industry is in decline, but agriculture and related food industry is still an important employer though; the two local estates of Nybøl and Gram Castle are major agricultural producers from the town's large hinterland.
Do
Hiking
The countryside around Haderslev presents a number of beautiful, marked hiking trails.
Beaches
There are many opportunities for some beach activity around Haderslev, but you need transport to the coastline. If you drive your own car, the coast is only about 15 minutes away, while public transport will take much longer, depending on where you want to go. If you bike, all the beaches can be reached in less than an hour. Here are some of the best beach spots near Haderslev:
Go next | WIKI |
Zarubin
Zarubin (Russian: Зарубин) is a Russian masculine surname originating from the noun zarub meaning a notch in a tree; its feminine counterpart is Zarubina. The surname may refer to the following notable people:
* Elizabeth Zarubina (1900–1987), Soviet spy, wife of Vasily
* Georgy Zarubin (1900–1958), Soviet diplomat
* Irina Zarubina (1907–1976), Soviet theater and film actress
* Ivan Zarubin (1887–1964), Russian linguist
* Nikolai Zarubin (1948–1998), artist
* Roman Zarubin (born 1976), canoe racer
* Ruslan Zarubin (born 1983), Ukrainian football player
* Vasily Zarubin (1894–1972), Soviet intelligence officer
* Viktor Ivanovich Zarubin (1866–1928), Russian painter | WIKI |
-- U.S. Gasoline Demand Sinks 3.7% Last Week, MasterCard Says
U.S. gasoline demand slid 3.7
percent last week to the lowest level since Nov. 16, according
to data from MasterCard Inc. (MA) Drivers bought 8.52 million barrels a day of gasoline in
the week ended Dec. 7, down from 8.84 million in the prior
period, MasterCard’s SpendingPulse report showed. The decline
follows a gain of 0.1 percent in the seven days ended Nov. 30. The four-week average in the week ended Dec. 7 was 2.4
percent below a year earlier. It has been down from the previous
year every week except one since March 18, 2011. Year-to-date
fuel consumption is 3.6 percent below the same period in 2011. The lowest demand this year through Oct. 26 was 8.01
million barrels on Feb. 10. The highest level reached was 9.36
million on May 25. The average pump price fell 4 cents in the past week to
$3.38 a gallon, the cheapest since the week ended July 13, the
report showed. Drivers are paying 2.7 percent more than a year
earlier. Prices reached a year-to-date peak of $3.94 on April 6. The report from Purchase, New York-based MasterCard is
assembled by MasterCard Advisors, the company’s consulting arm.
The information is based on credit-card swipes and cash and
check payments at about 140,000 U.S. gasoline stations. To contact the reporter on this story:
Barbara J Powell in Dallas at
bpowell4@bloomberg.net To contact the editor responsible for this story:
Dan Stets at
dstets@bloomberg.net | NEWS-MULTISOURCE |
brick-0.29.1: A declarative terminal user interface library
Safe HaskellNone
LanguageHaskell2010
Brick.Main
Contents
Synopsis
Documentation
data App s e n Source #
The library application abstraction. Your application's operations are represented here and passed to one of the various main functions in this module. An application is in terms of an application state type s, an application event type e, and a resource name type n. In the simplest case e is unused (left polymorphic or set to '()'), but you may define your own event type and use customMain to provide custom events. The state type is the type of application state to be provided by you and iteratively modified by event handlers. The resource name type is the type of names you can assign to rendering resources such as viewports and cursor locations.
Constructors
App
Fields
• appDraw :: s -> [Widget n]
This function turns your application state into a list of widget layers. The layers are listed topmost first.
• appChooseCursor :: s -> [CursorLocation n] -> Maybe (CursorLocation n)
This function chooses which of the zero or more cursor locations reported by the rendering process should be selected as the one to use to place the cursor. If this returns Nothing, no cursor is placed. The rationale here is that many widgets may request a cursor placement but your application state is what you probably want to use to decide which one wins.
• appHandleEvent :: s -> BrickEvent n e -> EventM n (Next s)
This function takes the current application state and an event and returns an action to be taken and a corresponding transformed application state. Possible options are continue, suspendAndResume, and halt.
• appStartEvent :: s -> EventM n s
This function gets called once just prior to the first drawing of your application. Here is where you can make initial scrolling requests, for example.
• appAttrMap :: s -> AttrMap
The attribute map that should be used during rendering.
defaultMain Source #
Arguments
:: Ord n
=> App s e n
The application.
-> s
The initial application state.
-> IO s
The default main entry point which takes an application and an initial state and returns the final state returned by a halt operation.
customMain Source #
Arguments
:: Ord n
=> IO Vty
An IO action to build a Vty handle. This is used to build a Vty handle whenever the event loop begins or is resumed after suspension.
-> Maybe (BChan e)
An event channel for sending custom events to the event loop (you write to this channel, the event loop reads from it). Provide Nothing if you don't plan on sending custom events.
-> App s e n
The application.
-> s
The initial application state.
-> IO s
The custom event loop entry point to use when the simpler ones don't permit enough control.
simpleMain Source #
Arguments
:: Ord n
=> Widget n
The widget to draw.
-> IO ()
A simple main entry point which takes a widget and renders it. This event loop terminates when the user presses any key, but terminal resize events cause redraws.
resizeOrQuit :: s -> BrickEvent n e -> EventM n (Next s) Source #
An event-handling function which continues execution of the event loop only when resize events occur; all other types of events trigger a halt. This is a convenience function useful as an appHandleEvent value for simple applications using the Event type that do not need to get more sophisticated user input.
Event handler functions
continue :: s -> EventM n (Next s) Source #
Continue running the event loop with the specified application state.
halt :: s -> EventM n (Next s) Source #
Halt the event loop and return the specified application state as the final state value.
suspendAndResume :: IO s -> EventM n (Next s) Source #
Suspend the event loop, save the terminal state, and run the specified action. When it returns an application state value, restore the terminal state, redraw the application from the new state, and resume the event loop.
lookupViewport :: Ord n => n -> EventM n (Maybe Viewport) Source #
Given a viewport name, get the viewport's size and offset information from the most recent rendering. Returns Nothing if no such state could be found, either because the name was invalid or because no rendering has occurred (e.g. in an appStartEvent handler).
lookupExtent :: Eq n => n -> EventM n (Maybe (Extent n)) Source #
Given a resource name, get the most recent rendering extent for the name (if any).
findClickedExtents :: (Int, Int) -> EventM n [Extent n] Source #
Given a mouse click location, return the extents intersected by the click. The returned extents are sorted such that the first extent in the list is the most specific extent and the last extent is the most generic (top-level). So if two extents A and B both intersected the mouse click but A contains B, then they would be returned [B, A].
clickedExtent :: (Int, Int) -> Extent n -> Bool Source #
Did the specified mouse coordinates (column, row) intersect the specified extent?
getVtyHandle :: EventM n Vty Source #
Get the Vty handle currently in use.
Viewport scrolling
viewportScroll :: n -> ViewportScroll n Source #
Build a viewport scroller for the viewport with the specified name.
data ViewportScroll n Source #
A viewport scrolling handle for managing the scroll state of viewports.
vScrollBy :: ViewportScroll n -> Int -> EventM n () Source #
Scroll the viewport vertically by the specified number of rows or columns depending on the orientation of the viewport.
vScrollPage :: ViewportScroll n -> Direction -> EventM n () Source #
Scroll the viewport vertically by one page in the specified direction.
vScrollToBeginning :: ViewportScroll n -> EventM n () Source #
Scroll vertically to the beginning of the viewport.
vScrollToEnd :: ViewportScroll n -> EventM n () Source #
Scroll vertically to the end of the viewport.
hScrollBy :: ViewportScroll n -> Int -> EventM n () Source #
Scroll the viewport horizontally by the specified number of rows or columns depending on the orientation of the viewport.
hScrollPage :: ViewportScroll n -> Direction -> EventM n () Source #
Scroll the viewport horizontally by one page in the specified direction.
hScrollToBeginning :: ViewportScroll n -> EventM n () Source #
Scroll horizontally to the beginning of the viewport.
hScrollToEnd :: ViewportScroll n -> EventM n () Source #
Scroll horizontally to the end of the viewport.
setTop :: ViewportScroll n -> Int -> EventM n () Source #
Set the top row offset of the viewport.
setLeft :: ViewportScroll n -> Int -> EventM n () Source #
Set the left column offset of the viewport.
Cursor management functions
neverShowCursor :: s -> [CursorLocation n] -> Maybe (CursorLocation n) Source #
Ignore all requested cursor positions returned by the rendering process. This is a convenience function useful as an appChooseCursor value when a simple application has no need to position the cursor.
showFirstCursor :: s -> [CursorLocation n] -> Maybe (CursorLocation n) Source #
Always show the first cursor, if any, returned by the rendering process. This is a convenience function useful as an appChooseCursor value when a simple program has zero or more widgets that advertise a cursor position.
showCursorNamed :: Eq n => n -> [CursorLocation n] -> Maybe (CursorLocation n) Source #
Show the cursor with the specified resource name, if such a cursor location has been reported.
Rendering cache management
invalidateCacheEntry :: n -> EventM n () Source #
Invalidate the rendering cache entry with the specified resource name.
invalidateCache :: EventM n () Source #
Invalidate the entire rendering cache. | ESSENTIALAI-STEM |
Kristina Vaculik
Kristina Vaculik (born July 9, 1992) is a Canadian artistic gymnast who represented Canada at the 2012 Summer Olympics. In 2011–2012, Vaculik took a year off from Stanford University, which she attended on a gymnastics scholarship, in order to train full-time for the Olympics.
2006
In April, Vaculik competed at the Pacific Rim Championships in Honolulu, United States. The Canadian team placed second and individually Vaculik placed fifth with an all around score of 57.450. In event finals, she placed third on uneven bars scoring 14.500, seventh on balance beam scoring 14.050, and sixth on floor scoring 14.550.
In May, Vaculik won the all around title at the Canadian Championships in Quebec City, Canada with a score of 57.95. In event finals, she placed third on vault scoring 13.55, first on uneven bars scoring 14.65, second on balance beam scoring 14.60, and first on floor scoring 14.65.
2007
In May, Vaculik won the all around title at the Canadian Championships in Regina, Canada with a score of 58.650. In event finals, she placed second on vault scoring 13.925 and sixth on uneven bars scoring 13.450.
In September, Vaculik competed at the 2007 World Artistic Gymnastics Championships in Stuttgart, Germany. She contributed a score of 56.000 towards the Canadian team's fourteenth-place finish.
2008
In March, Vaculik competed at the Pacific Rim Championships in San Jose, United States. She led the Canadian team to a silver medal finish and individually she placed sixth with an all around score of 58.425. In event finals, Vaculik placed eighth on vault scoring 13.462, second on uneven bars scoring 15.225, and sixth on balance beam scoring 14.775.
In April, Vaculik competed at the Artistic Gymnastics World Cup in Maribor, Slovenia. She placed second on uneven bars scoring 14.850 and first on balance beam scoring 14.957.
In May, Vaculik competed at the Artistic Gymnastics World Cup in Tianjin, China. She placed eighth on uneven bars scoring 14.075, sixth on balance beam scoring 15.000, and seventh on floor scoring 13.900.
At the end of May, Vaculik competed at the Artistic Gymnastics World Cup in Moscow, Russia. She placed eighth on uneven bars scoring 14.025 and fourth on floor scoring 14.275.
In June, Vaculik won the silver medal in the all around competition at the Canadian Championships in Calgary, Canada with a score of 57.200. In event finals, she placed first on vault scoring 14.050, first on uneven bars scoring 15.600, second on balance beam scoring 15.500, and second on floor scoring 14.800. Vaculik said, "I just want to enjoy myself and have a good competition. It's been very tiring with all the traveling and different time zones and it's also been hard to work on new skills."
Canada qualified only two spots for the 2008 Summer Olympics and used a points system to decide which gymnasts would represent Canada. Vaculik placed third in the points system which meant that she was the reserve gymnast and not able to compete at the Olympics. Throughout the selection process Vaculik suffered from osteochondritis dissecans in her right elbow. After the Canadian Championships, she decided to take time off to allow it to heal. In December she had surgery on her elbow and took a year away from competition for rehabilitation.
2009
In December, Vaculik returned to competition at Elite Canada in Oakville, Canada. She placed second in the all around final with a score of 52.950. In event finals, she placed first on uneven bars scoring 14.150 and tied for first on floor scoring 13.900. "I didn't have any expectations going into my first major competition after a one year absence," she said, "I just wanted to experience competition again and feel through my routines in a competitive frame of mind. I wanted to prove to myself that I still have what it takes mentally and physically to compete and belong with the best gymnasts in Canada."
2010
In March, Vaculik competed at the Artistic Gymnastics World Cup in Cottbus, Germany. She placed second on vault scoring 13.787, first on uneven bars scoring 14.050, second on balance beam scoring 14.425, and first on floor scoring 13.950. This was the best showing for a Canadian gymnast ever at any World Cup event to that date.
At the end of April, Vaculik competed at the Pacific Rim Championships in Melbourne, Australia where the Canadian team placed fourth. Individually, Vaculik placed sixth in the all around with a score of 54.900, fourth in the vault final with a score of 13.600, fourth in the uneven bars final with a score of 14.225, sixth in the balance beam final with a score of 13.350, and third in the floor final with a score of 13.925.
In May, Vaculik won the all around title at the Canadian Championships in Kamloops, Canada with a score of 55.950. In events finals, she placed first on vault scoring 14.000, first on uneven bars scoring 14.050, first on balance beam scoring 14.200, and second on floor scoring 13.950.
In October, Vaculik led the Canadian team at the 2010 World Artistic Gymnastics Championships in Rotterdam, Netherlands with the team's highest all around score of 52.065. The team placed thirteenth and individually Vaculik placed thirtieth.
2011
In October, Vaculik was a member of the Canadian team at the 2011 World Artistic Gymnastics Championships in Tokyo, Japan. They placed eleventh in the team competition which meant that they would have to compete in London in January in order to qualify a full team for the Olympics. She contributed an all around score of 52.831 in qualifications.
Later in October, Vaculik competed in the 2011 Pan American Games in Guadalajara, Mexico. She helped the Canadian team win silver in the team event with an individual all around score of 54.625. Vaculik won the bronze medal in the individual all around final with a score of 54.777 and the silver medal in the balance beam final with a score of 13.925. She also placed fourth in the floor final with a score of 13.500.
2012
In January, Vaculik competed at the London Prepares series where Canada qualified a full team to the 2012 Summer Olympics. She contributed an all around score of 54.707 and placed fourth in the uneven bars finals scoring 14.466.
In February, Vaculik won the all around competition at Elite Canada in Mississauga, Canada with a score of 56.350. In event finals, she placed fourth on vault scoring 13.975, second on uneven bars scoring 14.100, second on balance beam scoring 14.200, and third on floor scoring 13.750.
At the Pacific Rim Championships in March, Vaculik was part of the Canadian team that won the bronze medal. She placed seventh in the all around competition scoring 55.100, seventh in the balance beam final scoring 12.825, and tied for sixth in the uneven bars final scoring 13.600.
In May, Vaculik competed at the Canadian Championships in Regina, Canada. She won the all around title with a score of 56.700. In event finals, Vaculik placed fourth on vault scoring 14.225, first on uneven bars scoring 14.400, first on balance beam scoring 14.600, and second on floor scoring 14.000.
As the Olympics approached, Vaculik hoped to be chosen for the five member team that will represent Canada at the 2012 Summer Olympics. "It's still kind of surreal because I've worked basically my whole gymnastics career for this and actually to know that I have a really good chance of going now is just an amazing feeling," Vaculik said. "So, now every day in the gym, I'm just so happy to be there and to be working towards that."
At the end of June, Vaculik was one of the twelve gymnasts chosen to compete at the Final Olympic Selection meet in Gatineau, Quebec. Unfortunately, her friend and fellow selection event team member Peng-Peng Lee had been forced to withdraw from the selection process due to an injury to her ACL, which she had sustained during practice prior to the Canadian National Championships in May. On the first day of competition she placed first in the all around with a score of 55.150. Based on her performances here and at the Canadian Championships she was selected to the five member Olympic team. "It's just an incredible feeling," said Vaculik. "I've wanted to go to the Olympics for a long time. Now I'm just going to be working hard every day, marking down the time to the Olympics and being really excited about what I'm doing."
London Olympics
At the end of July, Vaculik competed at the 2012 Summer Olympics in London, United Kingdom. She helped the Canadian team qualify to the team final and individually she qualified as the third reserve to the all around final with a score of 53.566. After qualifications, Vaculik said, "I'm at a loss for words. I am so proud of these girls. We had incredible performances, and it's so amazing to be here right now." In the team final, she contributed scores of 14.166 on uneven bars and 13.433 on balance beam toward the Canadian team's fifth-place finish. This is the highest placement the Canadian team has ever achieved at the Olympics. | WIKI |
Controlling an iPlayer 2 from a Lutron Homeworks Interactive System
.
The Color Kinetics iPlayer 2 can be easily interfaced to the Lutron HomeWorks Interactive® (HWI) system via an RS-232 serial connection. Through this interface the HWI system can command the iPlayer 2 to switch between up to 225 different shows, as well as set the overall brightness level. This application note describes the hardware requirements and configuration parameters for the HWI system.
Hardware
Any RS-232 communication link on the HWI system can be used to interface to the RS-232 serial port on the iPlayer 2. Typically link 7 is used for interfacing to external equipment.
Both the HWI and the iPlayer 2 have female DB9 connectors, so you will need a male-male cross over cable. The pinout is:
DB9M
DB9M
2
3
3
2
5
5
The other pins are not used.
One simple way to achieve this wiring is to use two adapters from Radio Shack connected end to end: RS-231 Male DB9 to Male DB9 Gender Adapter and RS- 264B Female DB9 to Male DB9 Null Modem Adapter.
Note: Jumper JP1 inside the iPlayer 2 should be removed for proper operation. JP1 is located directly behind the DB9 connector. JP1 only needs to be installed when using the Color Kinetics Controller Keypad (it provides power to pin 4 of the DB9 connector).
.
Configuring Device Driver
Prior to programming iPlayer 2 functions on the HWI you must first configure the HWI software to communicate properly with the iPlayer 2. The following steps illustrate how this is done.
1. Obtain a copy of the iPlayer 2 Device Driver. This HWI specific file defines iPlayer 2 commands and their corresponding RS-232 serial strings. Don’t confuse this file with the Windows operating system device driver.
The device driver file is a simple Excel spreadsheet. If necessary you can edit this file to define additional commands (to access more shows, for example). Refer to the “iPlayer 2 Serial Protocol” application note for the format of the commands.
You can download a copy of the device driver here.
2. Start the HomeWorks Interactive program and open your project. Enter the “Programming” view.
3. Select the “Control Station Programming” tab on the left of the window, and the “Interfaces” tab on the top.
1. Select “Serial Equipment” from the list of interfaces. Click the “Add” button. 3 of 5
2. In the Serial Output Definition window enter “Color Kinetics iPlayer 2” in the Name field. Click the “Driver List” button.
3. In the Driver Commands window click the “Global Drivers” button. Then click the “Import From Excel” button.
4. In the Serial Driver Import window start with the Select Driver File tab. Select the “ColorKinetics-iPlayer2.xls” file that you downloaded in step 1.
5. Move on to the Driver Settings tab. Set the COM parameters to 9600 baud, 8 data bits, no parity, 1 stop bit, and no handshaking. Un-check all of the Monitoring bits.
1. Move on to the Import tab. Enter “Color Kinetics iPlayer 2” in the Driver Name field. Click the “Import” tab. The driver should now be loaded. Click the “Close” button to dismiss the window.
2. Back in the Driver Commands window, select “Color Kinetics iPlayer 2” from the right side Global Driver List, then click “<< To Project” button to make the driver available to the project. Click the “Close” button to dismiss the window.
3. Finally, back in the Serial Output Definition window, select “Color Kinetics iPlayer 2” from the pull-down list of drivers. Click “Ok.” The iPlayer 2 should appear as an available interface under Serial Equipment.
.
The HomeWorks Interactive software now has the information on how to communicate with the iPlayer 2. The next step is to assign the iPlayer 2 to a link on the HWI processor, by following these steps:
1. Still in the Programming view, select the Processor tab on the left side of the window (the dip switch icon).
2. In the Unassigned Devices list, open RS-232 Equipment and select the iPlayer 2.
3. In the “Assign to Link” drop down list (just to the right of the Unassigned Devices list) select “Link 7 (RS-232).”
4. Click the “Assign” button.
.
Programming iPlayer 2 actions
At this point you are now ready to program HWI actions such as button presses or time clock events to trigger the iPlayer 2. This is also done in the Programming view, back in the Control Station Programming tab. Here is one example, programming the first button on a keypad to select iPlayer 2 show number 1:
1. Select the appropriate control station from the pull-down list, then highlight the button you want to program.
2. Select the Interfaces tab.
3. Choose the iPlayer 2 interface (under Serial Equipment).
4. From the Command/Level pull-down list select the iPlayer 2 command – in this case “Set Show 1.”
5. Click the “Add/Update” button in the top right of the window.
6. The button is now programmed.
How Did We Do?
Powered by HelpDocs (opens in a new tab) | ESSENTIALAI-STEM |
Talk:Florence, Alabama
Jeff Briggs' connection to Florence and to Roger Briggs
Is there any online source which confirms how Jeff and Roger Briggs are related, or confirms that they are not related? I assume that they are brothers or otherwise closely related but I'm not aware of anything to prove this. Something to confirm Jeff's date and place of birth may also be needed. — Preceding unsigned comment added by RW Dutton (talk • contribs) 18:16, 22 July 2022 (UTC)
Untitled
Wondering how to edit this U.S. City Entry? The WikiProject U.S. Cities standards might help.
Florence,Alabama climate
Hot, damn hot! Except when it's cold!
Disambiguation
I'd like to meet the person who would type in "Florence, Alabama" looking for the article on the city in Italy. Ttownfeen 04:13, August 4, 2005 (UTC)
Culture & Events
Florence has numerous parks, and facilities for recreation. http://www.fpard.com/parks.html
--This was moved here from the article because the website http://www.fpard.com/ reports it has been closed. --MicahDCochran 02:50, 24 June 2006 (UTC)
-- Florentine is an adjective exclusively used to describe things dealing with Florence, Italy. Florencian is the proper non-Italian adjective.
Removed.
Removed reference to Sheffield High School, which isn't in Florence. It's in Sheffield. --Nyxxxx 02:40, 24 November 2006 (UTC)
Why is there an ad in here for Shoals Christian Scool? Wikipedia is not a Sunday paper.
Fixed SCS advert--keep it factual, people. Wikipedia isn't for ads. Included reference to other christian schools in the area.
Cleanup tag added
Grammar, tightness of prose, style, tone, citations, etc., etc., etc. I'll work on it if I remember to come back to it. In the meantime, feel free to pitch in and help. --Kbh3rd talk 15:47, 27 March 2007 (UTC)
I did my part changing an inappropriate "it's" to "its." Let's not look more ignorant than people think we are! —Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:33, 23 September 2008 (UTC)
Why is there mention of "homosexual" activity between two people, named, in this article (in ref to the parks)? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:44, 29 May 2008 (UTC)
world famous tag team champions Reid Ware and Danny Libera?
I know these people to a certain extent, but have never heard anything about world-class tag-teaming. Is this a joke? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:24, 21 April 2009 (UTC)
Media Section
Why all the upper case in the media section? I scrolled down to the section and its shouting. Looks terrible. --Mjrmtg (talk) 13:31, 4 January 2010 (UTC)
Enrollment claim incorrect
"The University is the largest in north Alabama[citation needed], with an enrollment topping 7,000 for the first time in 2007. " A citation is definitely needed for this claim as a quick wikipedia search shows that the University of Alabama in Huntsville has a larger enrollment than UNA and both both universities are definitely in north Alabama.
Assessment comment
Substituted at 15:17, 29 April 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Florence, Alabama. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added tag to http://www.census.gov/popest/data/cities/totals/2013/SUB-EST2013-3.html
* Added tag to http://www.census.gov/popest/data/cities/totals/2015/SUB-EST2015.html
* Added archive http://www.webcitation.org/6YSasqtfX?url=http://www.census.gov/prod/www/decennial.html to http://www.census.gov/prod/www/decennial.html
* Added tag to http://www.census.gov/popest/data/cities/totals/2013/SUB-EST2013-3.html
* Added tag to http://www.timesdaily.com/article/20090325/ARTICLES/903255029
Cheers.— InternetArchiveBot (Report bug) 20:36, 1 January 2017 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 external links on Florence, Alabama. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20100316215435/http://www.legislature.state.al.us/misc/history/acts_and_journals/Acts_1825/Acts_91-101.html to http://www.legislature.state.al.us/misc/history/acts_and_journals/Acts_1825/Acts_91-101.html
* Corrected formatting/usage for http://www.census.gov/prod/www/decennial.html
Cheers.— InternetArchiveBot (Report bug) 13:53, 2 October 2017 (UTC) | WIKI |
Wydawnictwo MAG
Wydawnictwo MAG (Polish for: MAG Publishing House), is a publisher that was the first to publish Polish translations of popular American and British role-playing games (RPGs) like Call of Cthulhu and Warhammer Fantasy Roleplay. In more recent years, it has turned to publication of translations of popular English-language novels.
Magia i Miecz
Despite the rise of the role-playing game industry in the United States and the U.K. during the 1980s, very few people in Poland under Communist rule were aware of the existence of role-playing games. Following the fall of Communist rule, Jacek Rodek, the editor-in-chief of Fantaskya, a monthly magazine dedicated to fantasy and science fiction, founded the publishing company Wydawnictwo MAG in order to publish Magia i Miecz (Magic and Sword), a magazine that would be dedicated to role-playing games. Rodek and Darosław J. Toruń were the first editors.
Due to a lack of published role-playing games in Poland at the time, the first six issues of the magazine focussed on Kryształy Czasu (Crystals of Time), an unpublished Polish RPG created by Artur Szyndler. The first issue printed the rules, and subsequent issues featured articles about character generation, magic and spellcasting, and descriptions of the game world. The first full adventures for Kryształy Czasu appeared in issues #4–#6: „Nieproszony gość” ("Uninvited Guest"), „Demoniczna horda” ("Demonic Horde"), and „Pułapki w pułapkach” ("Traps Inside Traps").
MAG published a hardcover version of Kryształy Czasu in 1999.
Role-playing games
Magia i Miecz's monthly circulation of 20,000 indicated there was an audience for RPGs in Poland, so MAG acquired the Polish-language licenses for several popular British and American role-playing games, including:
* Warhammer Fantasy Roleplay
* Call of Cthulhu
* Deadlands
* Fading Suns
* Earthdawn
MAG released Polish-language editions of several tabletop games, notably Doomtrooper, and the Kult collectible card game (CCG), and also published some original Polish RPGs such as Wiedźmin - Gra Wyobraźni (The Witcher: A Game of Imagination), based on a series of novels and short stories written by Andrzej Sapkowski.
Book publisher
By 2001, Magia i Miecz had become unprofitable as its circulation waned to 10,000. MAG stopped publishing the magazine, and pivoted from role-playing games to books, specializing in science-fiction, horror and fantasy, children's literature and contemporary fiction, primarily translations of popular English-language novels. Its long-running Uczta Wyobraźni (Feast of the Imagination) series, started in 2006, features over 60 works by authors such as Ian McDonald, William Gibson, Christopher Priest, Susannah Clarke, and Bruce Sterling. MAG has also enjoyed great success republishing the works of Neil Gaiman and Christopher Paolini — in 2005–2006, Polish sales of Paolini's novel Eragon topped 135,000.
MAG also publishes novels by well-known Polish writers such as Feliks W. Kres.
Awards
* In 1994, MAG founder Jacek Rodek was presented with the Śląkfa, Poland's oldest award for science fiction and fantasy, as Publisher of the Year.
* In 2001, MAG Editor-in-Chief Andrzej Miszkurka was presented with the Śląkfa as Publisher of the Year, and MAG author Feliks Kres received the Śląkfa as Writer of the Year.
* In 2006, MAG Editor-in-Chief Andrzej Miszkurka was presented with the Śląkfa as Publisher of the Year. | WIKI |
UNITED STATES of America, v. Eric HOLMES, Defendant.
No. CR. 01-48-P-C.
United States District Court, D. Maine.
Dec. 11, 2001.
Leonard I. Sharon, Sharon, Leary & Detroy, Auburn, ME, for Eric Holmes.
Jonathan R. Chapman, Office of the U.S. Attorney, Portland, ME, for U.S.
MEMORANDUM OF DECISION AND ORDER GRANTING DEFENDANT’S MOTION TO SUPPRESS
GENE CARTER, District Judge.
The Court now has before it Defendant’s Motion to Suppress, in which he seeks suppression of all evidence seized from his residence and any evidence derived from the search of his residence on April 12, 2001. Docket No. 15 (Motion to Dismiss), Docket No. 16 (Memorandum in Support of Motion to Dismiss), Docket No. 27 (PosNHearing Brief in Support of Motion to Dismiss), Docket No. 29 (Reply Brief in Support of Motion to Suppress Evidence). Specifically, Defendant argues that the use of information illegally obtained by a thermal imaging scan to procure the search warrant renders the search based on that warrant invalid. After redacting the information obtained from the thermal imaging device, Defendant further contends that the warrant application did not establish probable cause. Defendant also argues that the search warrant was unconstitutionally executed in violation of Fourth Amendment “knock and announce” requirements. The Government opposes the motion, arguing that even without the thermal imaging data, the warrant application contained sufficient evidence for the judge to have found probable cause. Alternatively, the Government argues that the use of a thermal imaging device was a good-faith exception to the exclusionary rule. With respect to Defendant’s execution argument, the Government contends that the warrant was constitutionally executed because the officers’ failure to wait longer than a few seconds before entering the premises was “reasonable” under the circumstances. See Government’s Post-Hearing Brief at 1.
I. FACTS
Special Agent Thomas Slivinski of the Maine Drug Enforcement Agency (MDEA) submitted an Affidavit and Request for a Search Warrant on April 12, 2001, containing the following information. A. cooperating defendant in a marijuana trafficking case (“CD # 1”) provided information to Maine Drug Enforcement Agent Gerry Baril pertaining to the indoor cultivation of marijuana at 60 Academy Street in Auburn, Maine by an individual named Eric Holmes. CD # 1 reported personal conversations during December 2000 with an unidentified individual (“UI # 1”) who claimed to have obtained marijuana from, and smoked marijuana with, Eric Holmes at his residence at 60 Academy Street. CD # 1 also relayed information obtained from another unidentified individual, a so-called mutual friend of CD # 1 and Eric Holmes (“Friend”), who claimed to have been at the Holmes residence in December 2000 and to have witnessed a large grow operation. Both UI # 1 and Friend allegedly told CD # 1 that Holmes was cultivating and selling marijuana from his single-family residence where he lived with his wife Carol Holmes, who was not allegedly involved in the cultivation activity inside the residence. Friend allegedly told CD # 1 that Eric Holmes was using several high-intensity discharge grow lights, which were mounted on motorized tracks for automated movement over the marijuana plants that they were illuminating, and carbon dioxide gas to enrich the grow room environment for.better plant growth. On or about January 4 or 5, 2001, CD # 1 reported that CD # 1 and Friend drove together to Eric Holmes’ residence in Auburn, and CD # 1 watched Friend enter a blue, single-family residence across from 61 Academy Street (later identified as 60 Academy Street) for a brief stay. Friend allegedly returned and told CD # 1 that Holmes had just harvested a crop of indoor-grown marijuana plants at his home some time during December 2000 and had several big bags of processed marijuana stored in the house. Agent Baril determined that Eric Holmes lived at that address with his wife, Carol Holmes, and that Eric Holmes was a felon, who had been convicted and sentenced in 1989 to ninety days in jail and five years probation for possession of narcotics, and convicted in 1988 and sentenced to three years probation for strong-arm robbery. An investigation was then commenced by the MDEA. Attempted trash pulls were unsuccessful. Special Agent Kate Bernard of the United States Drug Enforcement Agency (“DEA”) subpoenaed power records for periods of time between December 1998 and March 2001, which were analyzed by Special Agent Tony L. Milligan of the MDEA.
Agent Milligan also submitted an affidavit on April 12, 2001, containing the following information. After viewing the residence at 60 Academy Street, Agent Milligan could not determine the source of heating. Agent Milligan analyzed power consumption records from December 1998 to March 2001 for 60 Academy Street and found the average consumption rate to be 1,906 kilowatt hours (kWh) per month, or 63 kWh per day, which is more than twice the national average. He found the lowest monthly consumption to be 725 kWh, recorded in April 1999, and the highest to be 2,638 kWh, recorded in February 2001. He noted what he called “distinct cycles” during the highest power consumption peaks, including that the consumption was high but relatively uniform from December 1998 to February 2000; however, in March 2000, the consumption doubled from 40 kWh per day to 81 kWh per day. In his affidavit, Agent Milligan described a typical grow cycle for indoor marijuana, which is three months, and attached power consumption charts. The affiant claims that four such cycles occurred from March 2000 to May 2000, July 2000 to October 2000, November 2000 to January 2001, and February 2001 to April 2001.
On April 10, 2001, Agents Milligan and Slivinski conducted a thermal imaging scan of the Holmes residence at 60 Academy Street in reliance on United States v. Woodward, 154 F.Supp.2d 83 (D.Me.2001). Agent Milligan found the results of the scan to show evidence of a marijuana grow operation. While conducting the scan, Agent Milligan noted in his affidavit that he also observed a “super-bright” light emitting from a second-floor window through a one— to two-inch gap, although the light source could not be identified because the shade was pulled nearly all the way down. Gov’t Ex. C at 9.
On April 12, 2001, Judge Paul Cote of the Maine District Court issued a search warrant that authorized law enforcement officers to search the premises at 60 Academy Street (the home of defendant Eric Holmes) in Auburn, Maine and to seize evidence relating to a suspected marijuana grow operation. The warrant required that the executing agents provide “notice of their purpose and office” (otherwise known as a “knock and announce” warrant), which the Government concedes requires the agents to provide “pre-entry notice” before entering the premises. See Government’s Objection to Defendant’s Motion to Suppress and Incorporated Memorandum at 1, n. 1.
Officer Dan LaChance was in charge of effecting the execution of the warrant. Agents gathered on the day of the search for a preraid tactical briefing, where they were alerted by Officer LaChance that the warrant required them to knock and announce before entering. Tr. at 23. Agents arrived at Defendant’s residence to execute the warrant at approximately 2:40 p.m. on April 12. The officers, including Officer LaChance and Agent Slivinski, were unfamiliar with how people customarily gained entrance into the residence. Tr. at 24, 33. They first approached a door on the side of the building that they “realized... was not the door that probably [the occupants] used to get inside the residence.” Tr. at 12. Two agents nevertheless remained at that door. Id. The remaining seven agents moved to the door at the front of the house, which they determined would be the appropriate point of entry. See Tr. at 12-13, Gov’t. Ex. 1. At that entrance, the storm door was resting in the open position but the inner door was closed. Tr. at 13, Gov’t Ex. 1. LaChance testified, “I was knocking on the door, I waited a couple of seconds ... and at the same time someone told me they believed it was an entry way with a shed.” Tr, at 13. After waiting “three seconds, three to five seconds,” LaChance testified, “I tried the door, it wasn’t locked, so I opened the door” and entered “thinking there would be another door inside the house.” Tr. at 15. It was then that the agents first announced their identity and purpose; Officer LaChance testified, “[a]s soon as I walked in and saw the door and realized I’m pretty much straight shot into the house, I yelled ‘Police! Search warrant.’ ” Tr. at 26. LaChance was immediately followed by others who, with weapons drawn, ran in through the kitchen area and into the living room, where they saw Defendant’s father seated in a chair, watching television. Tr. at 18, 27. The police handcuffed Defendant’s father and proceeded to conduct the search of the residence. Tr. at 17,19.
The agents searched the house and found a total of 164 marijuana plants, a firearm, and various items of physical evidence believed by the agents to be associated with marijuana cultivation. During the search, Eric Holmes arrived at his residence. Tr. at 20. Much of the substantive physical evidence was found in a second-floor room. Tr. at 19. Then the agents came upon a bolted door to the basement, and Officer LaChance asked Eric Holmes for a key. Tr. at 20-21. Because he could not provide one, the agents used a ram to break down the internal door and found what they believed to be another “grow room” in the basement. Tr. at 21. Holmes was arrested at the scene.
II. DISCUSSION
A. Search Warrant: Probable Cause
The Fourth Amendment protects an individual’s reasonable expectation of privacy against intrusion by the government. The test for determination of a reasonable expectation of privacy is twofold: (1) the defendant manifests an actual, subjective expectation of privacy and (2) the expectation is one that society is prepared to recognize as legitimate. California v. Ciraolo, 476 U.S. 207, 211, 106 S.Ct. 1809, 90 L.Ed.2d 210 (1986); Katz v. United States, 389 U.S. 347, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967). In Kyllo v. United States, 533 U.S. 27, 121 S.Ct. 2038, 150 L.Ed.2d 94 (2001), the Supreme Court held that the use of a thermal imaging device is a search within the meaning of the Fourth Amendment. Upon a motion to suppress evidence obtained in execution of a search warrant, it sometimes happens that “a showing is made for the first time that some of the information in the affidavit presented to the warrant-issuing magistrate was acquired in a prior illegal search.” 2 W. LAFAVE, Search and Seizure: A Treatise On The Fourth Amendment § 11.4(f) at 287 (3d Ed.1996). The First Circuit Court of Appeals, along with many other circuits, has determined that the search warrant “is nonetheless valid if it could have issued upon the untainted information in the affidavit.” Id. (citing, inter alia, United States v. Veillette, 778 F.2d 899 (1st Cir.1985)). The Court believes that the proper procedure is for this Court to examine the affidavits for probable cause after excising the tainted aver-ments. See, e.g., United States v. Herrold, 962 F.2d 1131, 1138, 1143-44 (3rd Cir.), cert. denied, 506 U.S. 958, 113 S.Ct. 421, 121 L.Ed.2d 344 (1992) (When a court reviews an affidavit from which unconstitutionally seized evidence has been excised, it must independently determine if such probable cause remains within the affidavit that a neutral magistrate would have issued the subject warrant).
Defendant argues that without the information obtained from the thermal imaging scan, there was insufficient probable cause to issue a search warrant for his residence. The Government responds that even without evidence obtained via the thermal imaging device, there is sufficient probable cause in the information and affidavits to support the issuance of a valid search warrant. Excluding the results of the thermal imaging scan, the magistrate judge was presented with information including: (1) the hearsay information of two unidentified sources who claimed to have been inside the Holmes residence, which was filtered through CD # 1 (a first-time cooperating informant) to Agent Baril and then to affiant Agent Slivinski; (2) Agent Bar-il’s determination of Defendant’s prior criminal history; (3) the power consumption records at a house where the source of heat was unknown; and (4) the observation of a “super-bright” light emanating through a one-to-two inch gap of a second-floor window.
Determining the existence of probable cause for issuing a search warrant requires a “totality of the circumstances” analysis. Illinois v. Gates, 462 U.S. 213, 241, 103 S.Ct. 2317, 2332, 76 L.Ed.2d 527 (1983).
The sufficiency of a search warrant affidavit is appraised against well-established criteria: The task of the issuing magistrate is simply to make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him, including the ‘veracity’ and ‘basis of knowledge’ of persons supplying hearsay information, there is a fair probability that contraband or evidence of a crime will be found in a particular place.
United States v. Taylor, 985 F.2d 3, 5 (1st Cir.1993) (citations omitted). The original source of information leading to a search may be anonymous if it is accompanied by factors vouching for the reliability of that source’s assertions. United States v. Burke, 999 F.2d 596, 598 (1st Cir.1993). In Burke, it was “significant that the source’s information was based on personal observation.” Id. Where an informant’s information is not first-hand, it may be less rehable because “an important indicia of reliability is the fact that the informant’s knowledge was based upon personal observation rather than hearsay.” U.S. v. Coch rane, 896 F.2d 635, 641 (1st Cir.1990) (citing United States v. Harris, 403 U.S. 573, 581, 91 S.Ct. 2075, 2081, 29 L.Ed.2d 723 (1971)). In Burke, the police officer affiant involved in executing the search warrant at issue had previously executed a similar search warrant at the same house, which had uncovered an elaborate indoor marijuana growing operation. Burke, 999 F.2d at 598. The affiant’s knowledge that the defendant had not been prosecuted for that offense also dovetailed with the anonymous source’s information that the defendant had “beat the charge” resulting from that search. Id. The fact that both the source and the officer knew about the defendant’s criminal history served to corroborate the source’s reliability. Id. Finally, although the tipster did not provide information based on her own, personal observation, she had previously provided reliable information; the Court of Appeals attached “weight” to the fact that the confidential informant had provided information in the past that led to three felony drug arrests and the seizure of several pounds of marijuana. Id. at 599. In this case, although CD # 1 saw Friend enter Defendant Holmes’s residence, CD # 1 neither personally entered the residence, knew Defendant Holmes, bought marijuana from him, nor saw any of the alleged evidence of activity of the marijuana grow. This case is distinguishable from Burke because there is simply insufficient evidence supporting the reliability of the anonymously provided information. CD # l’s information is based entirely on hearsay from the anonymous sources, UI # 1 and the unidentified mutual Friend. CD # 1 had never before provided information to law enforcement officers, and no one can vouch for the anonymous, unknown sources.
The “very specificity and detail with which [the affidavit] relates the informant’s first-hand description of the place to be searched or the items to be seized” may disclose an adequate basis for evaluating the informant’s veracity. Id. at 6 (emphasis in original); see also United States v. Scalia, 993 F.2d 984, 987 (1st Cir.1993) (confidential information provided to agent by informant with no criminal record and who, from personal knowledge, described interior and contents of residence with such precision as to provide “considerable intrinsic support for the informant’s capacity to convey reliable intelligence relating to the criminal activity attested to in the affidavit.”). The Scalia Court, however, also placed weight on the informant’s lack of a criminal record or suspected current criminal activity: “[i]n the absence of a prior record of reliability ... where the informant was ‘not a professional ’ ... but a private citizen with no known criminal record or other criminal contacts ... the informant’s story may be more easily accepted.... ” Scalia, 993 F.2d 984, 987 (citations omitted, emphasis in original). In this case, CD # 1 is a cooperating defendant whose source of information is not his/her own personal knowledge, but information from anonymous individuals, one of whom — Friend— admits to buying marijuana from, and smoking it with, Defendant. CD # l’s other source of information described Holmes’ grow operation in very general terms, including allegedly having seen high-intensity grow lights mounted on motorized tracks, carbon dioxide gas, and bags of recently harvested marijuana. Unlike the informant in Taylor, who provided a detailed, first-hand description, the informant in this case, CD # 1, had no first-hand information regarding evidence of criminal activity. Although the original sources of the information in this case gave first-hand descriptions to CD # 1, CD # 1 then relayed hearsay information to one officer, Agent Beril, who then told another officer, Agent Slivinski, who authored the affidavit, which included the now third-hand information; this is simply too attenuated to bolster the reliability of the original sources. The original sources of information provided no particular level of detail regarding the premises or the criminal activity.
An agent’s “extensive experience as a law enforcement officer... [may] buttress... informant-based indicia of probable cause.” Taylor, 985 F.2d at 6. Prior experience with an informant permits an agent to vouch for the reliability of a confidential informant’s statement based on personal knowledge. Id. CD # 1 had not previously cooperated with law enforcement officers in order for them to have a prior basis for determining his/her reliability or to permit prior veracity to corroborate his/her information. An affiant’s knowledge of a target’s prior criminal history is also material to the probable cause determination. Id. Corroboration of an informant’s tip may take other forms, such as a check of a target’s criminal record, and surveillance is not necessarily required in all circumstances. Scalia, 993 F.2d at 988; see also Taylor, 985 F.2d at 6. The Agents did corroborate the tip by checking Eric Holmes’s criminal record and determining that he had a prior drug conviction.
While there is unusually high power consumption for sustained periods of time at the Holmes residence, the Court disagrees with Agent Milligan’s characterization of the electric power consumption charts. In Agent Milligan’s affidavit, he claims that the power records show four distinct three-month cycles from March to May 2000, July to October 2000, November 2000 to January 2001, and February to April 2001. A number of factors could explain high usage or increases in usage, such as changes in the number of people living in the residence, use of electrically powered heating and cooling equipment. From the power usage charts submitted with the affidavit, it appears to the Court that there may possibly be two spikes, one from March to June 2000 and one from November 2000 to February 2001, which are both periods longer than three months. The Court also notes that if the marijuana cultivation were continuous, e.g., if different plants were in different stages of growth at different times, the records might not indicate “distinct spikes” at all, but a more sustained seemingly abnormally high usage, which would appear consistent with the records in this case. Surveillance of the residence on more than, what appears from the record to be, a couple of occasions may have eliminated some of the possible explanations for the unusually high use of electric power. The force of the electric power records alone does not persuade the Court of the probability of a marijuana grow.
The Court is also concerned about the import of what Agent Milligan stated in his affidavit was a “super-bright light emitting from [a one-to-two inch gap in] a window on the second floor.” Gov’t Ex. C. Agent Milligan did not testify at the suppression hearing. Although Agent Slivinski was present when the light was observed — on the night the thermal imaging scan was performed — he neither put anything about the light in his affidavit nor testified about the appearance of the light except to say, “we saw what would be grow lights.” Tr. at 36. Given that there was no testimony about the illuminatory power of grow lights, this conclusory statement does not assist the Court in determining the weight to give it or Agent Milligan’s statement that the light was “super-bright.”
Some of the information gained in the investigation dovetails to bolster the reliability of the information provided by the original, anonymous sources. That is, that two unidentified sources claimed that Eric Holmes was cultivating marijuana in his home, the alleged presence of what an officer took to be grow lights, and the criminal history check, which showed Holmes had previously been convicted of a drug offense. Given the fact that the Court finds the anonymous sources’ information to be of marginal reliability, the degree of dovetailing does not create significant indicia of reliability. Accordingly, after expunging the information obtained from the thermal imaging device, the Court concludes that there is insufficient evidence to support probable cause for the issuance of a warrant to search Defendant’s residence.
B. The Leon Exception
The inquiry does not end there, however, because the Government argues that information obtained from the use of the thermal imaging device, although a search within the meaning of the Fourth Amendment, may still be considered, under Leon, because the officers relied in good faith on the search warrant, which was based, in part, on acceptance of the constitutionality and validity of the warrantless use of a thermal imaging device. See United States v. Leon, 468 U.S. 897, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984). Defendant argues that Leon is not applicable to this case. In Leon, the Supreme Court recognized “a good-faith exception to searches conducted pursuant to warrants.” Id., 468 U.S. at 924, 104 S.Ct. at 3421. The Court of Appeals for the First Circuit stated, in United States v. Curzi, 867 F.2d 36, 44 (1st Cir.1989), “this court has not recognized a good-faith exception in respect to warrant-less searches.” The Court found that Leon’s good-faith exception was not applicable as an exception to the exclusionary rule, in Cwrzi, where the government conducted a warrantless search claiming exigent circumstances, rather the Court reiterated that Leon only applied to searches conducted in good-faith reliance on a warrant or a statute later declared to be unconstitutional. Id., 867 F.2d at 44-45. At a minimum, the exception “will not be applied unless the officers executing search warrants act within the scope of the warrants and abide by their terms.” Curzi, 867 F.2d at 44. Because the warrant here was issued prior to the Supreme Court’s holding in Kyllo, 533 U.S. at -, 121 S.Ct. at 2043, 150 L.Ed.2d 94, that the use of a thermal imaging device constitutes a search under the Fourth Amendment, the officers, affiants, and issuing judge relied on then-current caselaw holding that thermal imaging was not a search under the Fourth Amendment. See Woodward, 154 F.Supp.2d at 87. The unconstitutional execution of the warrant renders such a discussion and the resolution of the issues it generates, see n. 6 supra, moot. Because the agents did not “abide by [the] terms” of the warrant, the Court need not discuss Leon’s applicability or the validity of the warrant further. See infra Section C.
C. Execution of the Warrant
Defendant argues that the agents failed to properly knock and announce their presence and to wait a reasonable time before entering his residence. In Kyllo, the Supreme Court reiterated, “[w]e have said that the Fourth Amendment draws ‘a firm line at the entrance to the house.’ ” Kyllo, 533 U.S. at -, 121 S.Ct. at 2046, 150 L.Ed.2d at 106 (2001) (citing Payton v. New York, 445 U.S. 573, 590, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980)). The Government concedes that the search warrant in this case required the agents to knock and announce their presence. The Government concedes that an officer must wait a reasonable period of time before making an entry, and that delays of five seconds or less are typically unreasonable. See Government’s Post-Hearing Brief at 3, United States v. Dice, 200 F.3d 978, 983 (6th Cir.2000); United States v. Sargent, 150 F.Supp.2d 157, 160 (D.Me.2001) Singal, D.J. (holding that the exclusionary rule applies to knock-and-announce violations). The Government argues that the failure to knock and announce in this situation, however, was not unreasonable.
The Supreme Court held in Wilson v. Arkansas, 514 U.S. 927, 115 S.Ct. 1914, 131 L.Ed.2d 976 (1995), that the circumstances allowing officers to enter before waiting a reasonable period of time normally involve countervailing law enforcement needs, such as the need to prevent the destruction of evidence or to prevent violence. While an unannounced entry can certainly be reasonable under appropriate circumstances, the eases cited by Government are inapplicable here. The warrant issued here required a knock and announce and a reasonable wait prior to entry. Although the common law of Maine “does not prescribe a precise rule as to how long a police officer must wait after knocking and announcing before he may enter a residence ..., [c]ourts rely on the Fourth Amendment’s standard of reasonableness” to determine whether a search was constitutional. Sargent, 150 F.Supp.2d at 160 (citing United States v. Ramirez, 523 U.S. 65, 71, 118 S.Ct. 992, 140 L.Ed.2d 191 (1998)). Officer La-Chance knocked at the front door, waited two to five seconds, and then, he testified, “... I tried the door, it wasn’t locked, so I opened the door and once inside that door ... I looked to the left.” Tr. at 15. Once inside the home, Officer LaChance immediately recognized that the entry way led directly into the home and then, for the first time, the agents announced their identity and purpose. According to LaChance’s admission, he didn’t announce his presence until he was inside the residence: “As soon as I walked in and saw the door and realized I’m pretty much straight shot into the house I yelled ‘Police! Search warrant.’ ” Tr. at 26. In Sargent, the Court recently held that police conducted a de facto no-knock entry to an apartment when they smashed down the door after waiting only five seconds for a response to their announcement of presence and intent to enter. See Sargent, 150 F.Supp.2d at 161. In reaching this conclusion, Judge Singal noted that most courts faced with a delay of less than five seconds have found it an unreasonably short time. Specifically, the Court stated that, “[a]bsent exigent circumstances, ‘a delay of five-seconds or less after knocking and announcing has been held’ to be an unreasonably short period of time.” Id. at 160 (quoting United States v. Jones, 133 F.3d 358, 361 (5th Cir.1998) (collecting cases)); see also, United States v. Lucht, 18 F.3d 541, 550-51 (8th Cir.1994). This Court agrees.
The caselaw in the First Circuit further supports the conclusion that two to five seconds is not a reasonable wait before entering a residence with a knock and announce warrant. The Court of Appeals for the First Circuit has held that ten seconds is not necessarily an unreasonable wait before entering with a knock and announce warrant. See United States v. Garcia, 983 F.2d 1160 (1st Cir.1993) (holding that a ten-second wait with a knock and announce warrant was not, as a matter of law, too short where officers faced exigent circumstances). In United States v. One Parcel of Real Property, 873 F.2d 7 (1st Cir.1989), the Court of Appeals held that a five— to ten-second wait with a knock and announce warrant was not too short when accompanied by previous knocks and shouts at another door by another police officer. Unlike the officers in One Parcel who knocked at another door prior to entering the home from a different entrance, the agents here failed to properly knock or announce their presence at either door. Under these circumstances, a two— to five-second delay before entering the home is not the type of action that is “reasonable” for police officers to take.
The Court finds that the delay of only two to five seconds without the officers identifying themselves is a de facto no-knock entry. The Supreme Court stated, in Ramirez, 523 U.S. at 65, 118 S.Ct. at 994, 140 L.Ed.2d 191 (citing Richards v. Wisconsin, 520 U.S. 385, 394, 117 S.Ct. 1416, 1421, 137 L.Ed.2d 615 (1997)), that officers must possess “reasonable suspicion” in order to conduct a no-knock entry. The Supreme Court held that “ ‘[i]n order to justify a ‘no-knock’ entry, the police must have a reasonable suspicion that knocking and announcing their presence, under the particular circumstances, would be dangerous or futile, or that it would inhibit the effective investigation of the crime by, for example, allowing the destruction of evidence.’ ” Ramirez, 523 U.S. at 70, 118 S.Ct. at 996 (quoting Richards, 520 U.S. at 394, 117 S.Ct. at 1421). Although the Constitution creates a “presumption in favor of announcement,” the Court of Appeals for the First Circuit has held that this presumption yields under certain circumstances, including those “presenting a threat of physical violence,” or when police have a “ ‘reasonable suspicion’ that knocking and announcing would be dangerous ... to the purposes of the investigation.” United States v. Hawkins, 139 F.3d 29, 32 (1st Cir.1998) (quoting Wilson, 514 U.S. at 936, 115 S.Ct. at 1918-19 and citing United States v. Ramirez, 523 U.S. 65, 69-71, 118 S.Ct. 992, 996, 140 L.Ed.2d 191 (1998)). This postulate also yields “where police officers have reason to believe that evidence would be destroyed if advance notice were given.” Wilson, 514 U.S. at 935-36, 115 S.Ct. 1914, 131 L.Ed.2d 976. The Court of Appeals for the First Circuit has reiterated the standard to determine whether exigent circumstances excuse noncompliance with the knock-and-announce rule as one of “reasonable suspicion” based on the particular circumstances of the case. See Hawkins, 139 F.3d at 32 (quoting Richards, 520 U.S. at 394, 117 S.Ct. 1416, 137 L.Ed.2d 615 and Ramirez, 523 U.S. at 66-67, 118 S.Ct. at 995). In Hawkins, the police’s no-knock entry “was not a spur of the moment decision by the executing officers” because the search warrant had been issued as such by a judicial officer based on the attesting police officer’s personal knowledge of the defendant’s record of violent convictions, a recent armed action, and the officer’s suspicion that the defendant was aware of police interest in him. Id. Furthermore, whenever the reasonableness of a no-knock entry is challenged, the police must demonstrate the existence of reasonable suspicion to justify an unannounced entry. See Wilson, 514 U.S. at 936, 115 S.Ct. at 1919. The Court agrees with Defendant that this de facto “no-knock” entry was not reasonable under the circumstances of this case.
The Government cites to cases in which courts have recognized a “useless gesture” exception to the knock and announce rule where occupants have actual advance knowledge of the impending raid. See Miller v. United States, 357 U.S. 301, 310, 78 S.Ct. 1190, 2 L.Ed.2d 1332 (1958); United States v. Nicholas, 319 F.2d 697, 698 (2d Cir.1963). That is not this case. The Government fails to articulate any reason explaining why the agents may have had a reasonable suspicion that waiting more than two to five seconds before deciding to enter would have been “useless” in this case. Although Defendant’s father was sitting in a chair, watching television, there is no evidence in the record that the agents heard the television before entering the house or found the noise from inside the residence to be so loud that any occupant could not have heard their knock. In fact, the Government strains credulity in arguing that two to five seconds was a reasonable amount of time to wait in order to give Defendant’s father an opportunity to voluntarily answer the door — especially if it were an outer door. The Court agrees with Defendant’s characterization of the law on this point, which is that the “reasonableness” of an entry “must be viewed in light of ‘what the officers had reason to believe at the time of their entry ....’” United States v. Daoust, 728 F.Supp. 41, 50 (D.Me.1989), aff'd., 916 F.2d 757 (1st Cir.1990) (quoting Ker v. California, 374 U.S. 23, 40-41 n. 12, 83 S.Ct. 1623, 10 L.Ed.2d 726 (1963))(emphasis in Daoust). Furthermore, in Kyllo, the Supreme Court reiterated the importance of a citizen’s privacy in his home: “there is certainly no exception to the warrant requirement for the officer who barely cracks open the front door and sees nothing but the ... rug on the vestibule floor. In the home ... the entire area is held safe from prying government eyes.” Kyllo, 533 U.S. at -, 121 S.Ct. at 2045, 150 L.Ed.2d 94. The Supreme Court has been unwilling to hold that privacy rights in the home
‘are to be measured in fractions of inches.’ But [that] decision [did] not turn upon the technicality of a trespass upon a party.... It is based upon the reality of an actual intrusion into a constitutionally protected area. What the Court said long ago bears repeating now: ‘It may be that it is the obnoxious thing in its mildest and least repulsive form; but illegitimate and unconstitutional practices get their first footing in that way, namely, by silent approaches and slight deviations from legal modes of procedure.’
Silverman v. U.S., 365 U.S. 505, 512, 81 S.Ct. 679, 683, 5 L.Ed.2d 734 (quoting Boyd v. United States, 116 U.S. 616, 635, 6 S.Ct. 524, 535, 29 L.Ed. 746 (1886)). The only basis asserted by Government is that Officer LaChance opened the door upon hearing someone from behind him say “this was just an entry or breezeway to the house.” Tr. at 14. At the time of their entry, the agents had no information about the interior layout of the house. Moreover, the agents did not even allege that they believed knocking or announcing would be a useless gesture because of loud television noises or any other articulated reasonable suspicion that a no-knock entry was warranted. The Court has looked at the photograph of Defendant’s house and finds that Officer LaChance’s stated belief that the outside door would not lead directly into the home was simply not reasonable at the time of entry, which is the point at which it must be gauged. The Court, therefore, finds that the agents’ actions in entering the residence before waiting more than a couple of seconds was not constitutional.
III. CONCLUSION
Accordingly, the Court ORDERS that Defendants’ Motion to Suppress be, and it is hereby, GRANTED.
. A "trash pull” is when officers attempt to inspect the contents of a target’s trash for evidence of criminal activity. In this case, Agent Slivinski stated in his affidavit that "the trash was kept on the porch prior to trash day and was inaccessible ... without entering the curtilage.” Govt. Ex. B at 5-6.
. The thermal imaging scan produced a reading indicating that the temperature of the surface area of the front second floor was significantly higher than all of the remaining sides and levels of the residence and that substantially more heat was escaping from that area than any other part of the house. Four images were prepared and submitted with the affidavit, including imaging of a neighbor's home for comparison. Other similar structures in the neighborhood were scanned and did not exhibit the same elevated temperature as the target residence’s second floor. Gov’t Ex. C.
. As LaChance knocked, he testified that he heard an agent from behind him say "this was just an entry or breezeway to the house.” Tr. at 13-14.
. A police officer's knowledge may corroborate an informant’s awareness of a target's prior criminal activity. Burke, 999 F.2d at 598. Although Agent Baril ascertained Defendant Holmes’s prior drug conviction, neither CD # 1 nor his/her sources knew about Holmes's criminal record. Additionally, local authorities had no former interactions with Defendant or his residence and no information about him other than obtaining his criminal history from another state.
. Officer LaChance testified, “Agent Slivinski had been by [the Holmes residence] a few times.” Tr. at 22.
. The Court has not been able to find any case in this Circuit applying Leon where the basis of officers' reliance is a prior court decision on precisely the same issue as in the case before the deciding court, which decision has subsequently been overturned and its’ reasoning invalidated. This Court confesses discomfort at the thought of permitting the consideration of evidence, even under Leon, that the Supreme Court has recently ruled to be the subject of an unconstitutional search and seizure.
Supreme Court cases after Leon do not address searches based on warrants where the caselaw or legal precedent supporting them has been reversed or overruled, but only cases where reliance is on a statute or warrant which is later invalidated. In Massachusetts v. Sheppard, 468 U.S. 981, 990, 104 S.Ct. 3424, 82 L.Ed.2d 737 (1984), a companion case to Leon, the Supreme Court held that the exclusionary rule would not be applied to suppress the fruits of a search warrant upon which police officers placed objectively reasonable reliance, based on the issuing judge's advice that all necessary clerical changes had been made in the defective warrant form. In Illinois v. Krull, 480 U.S. 340, 358, 107 S.Ct. 1160, 1171-72, 94 L.Ed.2d 364 (1987), the Supreme Court extended Leon 's good-faith exception to officers’ reliance on a statute, which authorized warrantless administrative searches, ultimately found to violate the Fourth Amendment. More recently, in Arizona v. Evans, 514 U.S. 1, 115 S.Ct, 1185, 131 L.Ed.2d 34 (1995), the Supreme Court held that evidence seized in violation of the Fourth Amendment as a result of clerical errors of court employee, which caused incorrect computer records, fell within the good-faith exception to the exclusionary rule.
The cases closest to the issue, which the Court has found from other Circuits discuss applicable legal standards at the time of the search and focus on why suppression will not foster deterrence. In United States v. Henderson, 746 F.2d 619, 625 (9th Cir.1984), the Court of Appeals for the Ninth Circuit upheld, under Leon ’s good-faith exception, a search warrant whose issuance was based on that Court's prior holding that beeper monitoring was not a search and required no warrant, which was later held by the Supreme Court, in United States v. Karo, 468 U.S. 705, 104 S.Ct. 3296, 82 L.Ed.2d 530 (1984), to be a search requiring a warrant. Because the search warrant in that case "was based on a probable cause determination that comported fully with applicable legal standards at that time ... the agents reasonably relied on that [defective] warrant when they searched [defendant's] house and discovered the controverted evidence.” Henderson, 746 F.2d at 625. The Court of Appeals for the Tenth Circuit, in United States v. Rowland, 145 F.3d 1194, 1207 (10th Cir.1998), stated that "at the time the warrant was issued and executed, this circuit had not yet ruled on the constitutionality of anticipatory warrants and had not set out conditions on the validity of such warrants. Given the unsettled state of the law, it was not unreasonable for the officers to rely oh the magistrate's authorization.” That Court referred to the holding in United States v. Cardall, 773 F.2d 1128, 1133 (10th Cir.1985), wherein the Court stated "that in considering the Leon good-faith principles 'it must ... be remembered that the knowledge and understanding of law enforcement officers and their appreciation for constitutional intricacies are not to be judged by the standards applicable to lawyers.’ ” Id., 145 F.3d at 1207-08. The Court of Appeals for the Third Circuit, in Gluck v. United States, 771 F.2d 750 (3d Cir.1985), upheld a search where IRS agents "acted in good faith reliance on a facially valid Rule 6(e) order issued by a United States District Court.” Id. at 758. A subsequent Supreme Court decision, United States v. Baggot, 463 U.S. 476, 103 S.Ct. 3164, 77 L.Ed.2d 785 (1983), held that such an order would not be permitted, but the Court of Appeals found that the Baggot decision was not subject to retroactive application and upheld the search.
Reliance upon retroactivity jurisprudence, however, opens complex new vistas of analysis which do not necessarily dictate a clear result. See, e.g. Teague v. Lane, 489 U.S. 288, 109 S.Ct. 1060, 103 L.Ed.2d 334 (1989) (holding that newly declared Constitutional rules should be applied retroactively); United States v. Peltier, 422 U.S. 531, 95 S.Ct. 2313, 45 L.Ed.2d 374 (1975) (holding that another Supreme Court decision finding that a particular warrantless search lacked probable cause and contravened the Fourth Amendment would not be applied retroactively to defendant’s case even though it was pending on appeal on date the decision was announced). In their dissent to the Krull decision, Justices O'Connor, Brennan, Marshall, and Stevens succinctly describe the Court’s recent retroactivity jurisprudence, notwithstanding the majority’s application of the Leon good-faith exception to that case. In Griffith v. Kentucky, 479 U.S. 314, 107 S.Ct. 708, 93 L.Ed.2d 649 (1987), the Court held that " 'basic norms of constitutional adjudication’ and fairness to similarly situated defendants, require that we give our decisions retroactive effect to all cases not yet having reached final, and unappealable, judgment.” Illinois v. Krull, 480 U.S. 340, 368, 107 S.Ct. 1160, 1176-77, 94 L.Ed.2d 364 (citing Griffith, 479 U.S. at 322, 107 S.Ct. at 713). But see, United States v. Bowen, 422 U.S. 916, 919, 95 S.Ct. 2569, 2572, 45 L.Ed.2d 641 (1975) (stating "The Border Patrol reasonably relied on the decisions of the Courts of Appeals in performing the search in this case and others like it, and in these circumstances the purposes of the Fourth Amendment exclusionary rule would not be served by applying the principles of Almeida-Sanchez retroactively-”)
The Supreme Court's Fourth Amendment jurisprudence also describes a "judicial integrity” principle, which, albeit a subordinate factor to deterrence, which is the "prime purpose of the exclusionary rule,” nevertheless provides a relevant consideration when admitting evidence. United States v. Janis, 428 U.S. 433, 458 n. 35, 96 S.Ct. 3021, 49 L.Ed.2d 1046 (1976). However, the Court stated in Jams, “[judicial integrity clearly does not mean that the courts must never admit evidence obtained in violation of the Fourth Amendment. The requirement that a defendant must have standing to make a motion to suppress demonstrates as much.” Id.
To say that an exception exists under the Leon rule to the application of the United States Supreme Court's holding in Kyllo (invalidating the "no-search” rationale in the Woodard case), which would permit the principle of the Kyllo holding to be ignored in this post-Kyllo case, to Defendant’s prejudice, creates logical and rationalogical anomalies in implementation of Fourth Amendment doctrine of a decidedly perverse effect.
Here, the Court’s finding, infra, of unlawful execution of the warrant makes it unnecessary to resolve this matter in order to decide this case. See infra at § C.
. In his affidavit for the warrant application, Agent Milligan cited to Woodward, 154 F.Supp.2d at 87 and Kyllo, 190 F.3d 1041 (9th Cir.1999) (holding thermal image scanning not to be a search requiring probable cause under the Fourth Amendment).
. The warrant required that the executing agents provide "notice of their purpose and office” (otherwise known as a "knock and announce” warrant), which the government concedes requires the agents to provide "pre-entry notice” before entering the premises. See Government’s Objection to Defendant’s Motion to Suppress and Incorporated Memorandum at 1, n. 1. Officer Dan LaChance, the officer in charge of executing the warrant, explained at the hearing that they did not seek a “no-knock” warrant because this search was not "a high-risk search warrant.” Tr. at 9; see also M.R.Crim.P. 41 (i).
. Well-developed caselaw of the Sixth Circuit Court of Appeals lends additional support for this conclusion. The government argued, in Dice, that failing to knock was a more egregious violation that failing to wait more than a "few” seconds, but the Court of Appeals for the Sixth Circuit clarified, "A court cannot sever the requirement that an officer wait a reasonable time before forcing his way into a residence from the requirement that he knock and announce his presence in the first place.” United States v. Dice, 200 F.3d 978, 984 (6th Cir.2000).
. Caselaw in other Circuits supports this interpretation, as well. The Court of Appeals for the Sixth Circuit has held that exigent circumstances relieve officers of the knock- and-announce requirement when the person within the residence already knows of the officers' authority and purpose, or when officers have a justified belief either that someone within is in imminent peril of bodily harm or that those within are aware of the officers’ presence and are engaged in escape or destruction of evidence. See United States v. Dice, 200 F.3d 978, 983 (6th Cir.2000) (citing Wilson, 514 U.S. at 936, 115 S.Ct. 1914 (stating that announcement was unnecessary when it would constitute a "senseless ceremony”)). The burden of proof rests with the government to show such circumstances. Id. The Court of Appeals for the Fifth Circuit has also held that absent any articulation of reasonable suspicion that announcing their presence would be dangerous, futile, or would result in the destruction of evidence, officers' initial attempts to forcibly enter a defendant’s home were unreasonable and violated the Fourth Amendment. United States v. Cantu, 230 F.3d 148 (5th Cir.2000).
| CASELAW |
Wikipedia:Articles for deletion/Carlos Beltrán Leyva
The result was keep. Cirt (talk) 00:30, 21 January 2010 (UTC)
Carlos Beltrán Leyva
* – ( View AfD View log • )
Lack of notability. Has not been convicted; he is not on list of top drug traffickers. His relationship to his brother and potential relationship to the cartel does not make him notable. Too much speculation to show notability. FloNight♥♥♥♥ 00:47, 14 January 2010 (UTC)
* Note: This debate has been included in the list of Mexico-related deletion discussions. -- • Gene93k (talk) 01:06, 14 January 2010 (UTC)
* Note: This debate has been included in the list of Crime-related deletion discussions. -- • Gene93k (talk) 01:07, 14 January 2010 (UTC)
* Keep, references show significant coverage, and thus notability per WP:GNG. The suspect's arrest and familial relationships are facts, not conjecture. Werner Heisenberg (talk) 01:22, 14 January 2010 (UTC)
* Keep. I'm the primary author. I think the article is well sourced and well written, at least for its early stage. And even if his role in this cartel is lower than that of Arturo Beltrán Leyva, Carlos was still one of the five creators of the cartel, which alone makes him notable. — Hun ter Ka hn 01:36, 14 January 2010 (UTC)
* But there is no information to write an biographical article about this person. You have written a news story. Show me a source with in depth biographical information so we can write about his life. FloNight♥♥♥♥ 01:39, 14 January 2010 (UTC)
* In my opinion, the article as it stands right now is a biography, rather than a news article. It's not about his arrest. It outlines his role in the creation of the Beltran-Leyva Cartel, his part in the split from the Sinaloa Cartel, some context about his role in the organization, and then his arrest. There is room for more expansion, I agree, but there is no deadline and the simple fact that more work needs to be done isn't a valid reason for deletion. — Hun ter Ka hn 02:15, 14 January 2010 (UTC)
* Keep,, Carlos and his 4 brothers head one of the 5 drug cartels that have flooded the whole country with brutal violence and contributed to NOTABLE casualties above 16,000 deaths. He does not "have to" be convicted in order to be notable. The article is well referenced and it only needs his birth date and other minor details. --BatteryIncluded (talk) 02:42, 14 January 2010 (UTC)
* Keep I see enough coverage of him to satisfy the general notability guidelines. Jujutacular T · C 19:20, 14 January 2010 (UTC)
* Keep - the coverage is enough to establish notability. Any futher issues with the article are editting concerns and not a reason for deletion. -- Whpq (talk) 21:57, 15 January 2010 (UTC)
| WIKI |
Pittsburgh and Lake Erie Railroad
The Pittsburgh and Lake Erie Railroad (P&LE; ), also known as the "Little Giant", was formed on May 11, 1875. Company headquarters were located in Pittsburgh, Pennsylvania. The line connected Pittsburgh in the east with Youngstown, Ohio, in the Haselton neighborhood in the west and Connellsville, Pennsylvania, to the east. It did not reach Lake Erie (at Ashtabula, Ohio) until the formation of Conrail in 1976. The P&LE was known as the "Little Giant" since the tonnage that it moved was out of proportion to its route mileage. While it operated around one tenth of one percent of the nation's railroad miles, it hauled around one percent of its tonnage. This was largely because the P&LE served the steel mills of the greater Pittsburgh area, which consumed and shipped vast amounts of materials. It was a specialized railroad, deriving much of its revenue from coal, coke, iron ore, limestone, and steel. The eventual closure of the steel mills led to the end of the P&LE as an independent line in 1992.
At the end of 1970 P&LE operated 211 mi of road on 784 mi of track, not including PC&Y and Y&S; in 1970 it reported 1419 million ton-miles of revenue freight, down from 2437 million in 1944.
Route of the P&LE
The P&LE purchased many smaller railroads that operated in the areas of its main train line extending the line north to Youngstown and south to Connellsville. This provided a means of transportation from the steel centers of Pittsburgh to the Great Lakes and St. Lawrence Seaway area.
P&LE Division
The original line ran between Youngstown, Ohio (at Haselton) and 24th Street in Pittsburgh, Pennsylvania near the Jones and Laughlin Iron Works, opened in 1879. The P&LE's passenger terminal in Pittsburgh was on the south bank of the Monongahela River, at the foot of the Smithfield Street Bridge.
The P&LE followed the left downstream bank of the Monongahela River past the terminal to the Golden Triangle, where that waterway meets the Allegheny River and becomes the Ohio River. The railroad continued northwest along the left downstream bank of the Ohio River to the vicinity of Beaver, Pennsylvania, where it crossed the river on the Beaver Bridge. From there it followed the Beaver River to just south of New Castle, Pennsylvania, where it then followed the Mahoning River west-northwest, crossing into Ohio just east of Lowellville. From there it ran northwest into Youngstown, terminating at a junction with the New York Central known as Haselton.
In the table below, mileage is reckoned westbound from the P&LE Terminal in Pittsburgh. The original line continued east past that station for a little over 2 mi (listed in Youghiogheny Branch table below) to near 24th Street in the South Side Flats neighborhood of Pittsburgh, where it met the Monongahela Connecting Railroad and the Pittsburgh, McKeesport & Youghiogheny (PM&Y).
Youghiogheny Branch
The Pittsburgh, McKeesport and Youghiogheny Railroad ran from 24th Street in Pittsburgh, PA to Connellsville, Pennsylvania, in 1882. The PM&Y followed the Monongahela River to McKeesport, Pennsylvania, then the Youghiogheny River to Connellsville, Pennsylvania.
Mileage on this P&LE branch was reckoned from the passenger terminal back at the Smithfield Street Bridge.
Monongahela Branch
The Pittsburgh, McKeesport & Youghiogheny Railroad also followed the Monongahela River to Brownsville, Pennsylvania.
History
The Pittsburgh and Lake Erie Railroad was the creation of William McCreery, a prominent Pittsburgh businessman, merchant, and railroad builder. McCreery had suffered at the hands of the Pennsylvania Railroad in a business that had a loss or failed. The Pennsylvania Railroad at the time used discriminatory rates which became a hot issue in Pittsburgh. On May 11, 1870 McCreery and ten other people filed Articles of Association with the Pennsylvania Secretary of State. The stated length of the railroad was for 57 mi. After 2 years the starting group was not very successful at raising the required funds and in 1877 many of the directors were succeeded by a new group of Pittsburgh businessmen. The new group was James I. Bennett, David Hostetter, James M. Baily, Mark W. Watson and James M. Schoonmaker, all influential.
In the spring of 1877, the first rails were laid down in Beaver Falls, which had the largest population other than Pittsburgh. The other reason for this was around February 1877 Jacob Henrici of the Harmony Society had business there. Henrici would also become a director in 1877. On July 6, 1877, McCreery resigned and Bennett was elected to president with Jacob Henrici becoming a director. Henrici was the key due to his Harmony Society ties which was a communal religious group founded in 1805. In 1880, William Henry Vanderbilt's Lake Shore and Michigan Southern Railway bought stock to the tune of $200,000 in the P&LE. The P&LE would stay in the Vanderbilt's New York Central system until Conrail. Also in 1877, an agreement between the P&LE and the Atlantic & Great Western (Erie) and the Lake Shore and Michigan Southern Railway was reached for routing traffic at Youngstown, Ohio. The final track laying between Pittsburgh and Youngstown was on January 27, 1879. At the opening in 1879, the P&LE was a poorly built, single track line. Fortunately for the railroad it was an immediate success and money was soon available for improvements.
South Penn and Pittsburgh, McKeesport and Youghiogheny Railroad
In 1881, the P&LE became linked with the notorious South Pennsylvania Railroad (South Penn). This would lead to William Henry Vanderbilt to control of the P&LE as a link in the South Penn and the building of the Pittsburgh, McKeesport and Youghiogheny Railroad. The South Pennsylvania Railroad was planned to connect to the PM&Y. Vanderbilt did this by buying Henry W. Oliver's and the Harmony Society's stock in the P&LE. Then Vanderbilt, aided by Andrew Carnegie, advanced the PM&Y all of the funds to build to Connellsville, Pennsylvania and then lease it to the P&LE for 99 years. The PM&Y in the end was the only part of the South Penn that was built, but it would be an important part of the P&LE. The PM&Y opened in 1883 and leased to the P&LE in 1884. Concurrently in 1883, to get the P&LE ready for the expected new business due to the South Penn linkage, the McKees Rocks shops were built.
Vanderbilt and the "Little Giant"
The company came under more formal control in 1887 by the New York Central Railroad. Lake Shore and Michigan Southern Railway's president, John Newell, took over as president of the P&LE in 1887. Under Newell, Reed and Colonel Schoonmaker; the P&LE would become the "Little Giant". From 1887 to 1927, the P&LE would become a heavy duty railroad, with double track all the way from Pittsburgh to Youngstown. The P&LE operated as an independent subsidiary, even after New York Central and Pennsylvania Railroad merged to form Penn Central.
PM&Y and the Monongahela Railway
The making of coke in Connellsville had been a big part of P&LE traffic, but by the early 20th century it had lessened. The development of by-products distillation processing of coke had moved to the Pittsburgh area. The P&LE then extended up the Monongahela River to Brownsville, Pennsylvania in 1901. The Pennsylvania Railroad at the same time had extended to Brownsville. Both the PRR and the P&LE had plans to extend even further up the river into West Virginia coke fields. Most likely due to the South Penn, they decided to work together by using the Monongahela Railway. The Monongahela Railway then was extended south to Martin, Pennsylvania reaching the Kondike Coke fields. Later in 1915 it reached Fairmont, West Virginia.
Conrail and CSX
When Conrail was formed, the Pittsburgh and Lake Erie Railroad again became an independent company because P&LE was owed $15.2 million by Penn Central, and operated as such until its merger into CSX Transportation (CSX).
Starting in 1934, the Baltimore and Ohio Railroad (B&O) bought trackage rights over P&LE from McKeesport to New Castle. The B&O's route through Pittsburgh had excessive grades and curves. In the last years of the P&LE, CSX used the line more than P&LE leading to the merger. Most of the online customers had long been gone, with only the main line still intact. In 1993 the company was purchased by CSX. The CSX designated the P&LE as a new subsidiary, the Three Rivers Railway. However, in 1993, CSX leased the TRR, and there is currently no de facto distinction between the former P&LE and any other portion of CSX's system.
Company officers
Presidents of the railroad were as follows: After Newell the presidency would be held by the president of the NYC with the active management of the local vice president.
* William McCreery 1875-1877
* James I. Bennett 1877-1881
* Jacob Henrici 1877-1885
* John Newell 1887-1896
Vice Presidents: With Nash the active management went back to the president.
* James H. Reed 1892-1896
* Colonel James M. Schoonmaker 1886-1927
* James B. Yohe 1917-1919 WW1 Supervisor 1920-1929 V.P.
* Curtis M. Yohe 1929-1953
* John F. Nash 1953-1956
* John W. Barriger III 1956-1964
* Curtis D. Buford 1965-1969
* Henry G. Allyn, Jr c. 1969-1983
* Richard Thompson c. 1983-1986
* Gordon Neuenschwander c. 1986-1993
Pittsburgh Terminal and P&LE passenger trains
The P&LE's Pittsburgh passenger train station (interior seen in the lower right photo) sat adjacent the south bank of the Monongahela River at the foot of the Smithfield Street Bridge. The Pittsburgh Terminal was the railroad's headquarters, passenger train shed, and freight warehouse complex. In the upper photo, the terminal sits along the Monongahela river. The roof of the freight house is to the right of the terminal train shed. The former P&LE headquarters building at the bottom of the Monongahela Incline has been converted into a present-day shopping center, Station Square. The passenger station has been placed on a list of historic edifices, modernized and converted to a restaurant.
During 1910 - 1930, the P & LE operated 50 passenger daily trains on its 65-mile Pittsburgh - Youngstown portion of its system. Ticketing agreements with the Erie RR and the P & LE's parent New York Central, passengers boarding in Pittsburgh could ride coaches or sleepers west to Toledo, Detroit, Chicago, and St. Louis, and north to Cleveland, Buffalo, Toronto, Albany and Boston.
The Baltimore & Ohio RR obtained trackage rights in 1934 on the P&LE, and Chicago-New York trains such as the Capitol Limited (Chicago-Washington), Columbian (Chicago-Washington) and Ambassador (Detroit-Baltimore) operated over the P & LE between New Castle Junction and McKeesport. These trains stopped at the Terminal located in Pittsburgh's South Side. The trackage sharing arrangement continued until Amtrak assumed responsibility for the nation's passenger rail service in 1971.
P&LE operated commuter trains into Pittsburgh. In 1964, it ran one round-trip between Youngstown and Pittsburgh as well as one additional southbound and two additional northbound trains on the section between Beaver Falls and Pittsburgh. Latest by 1968, only the section between College Hill, Beaver Falls, Aliquippa and P&LE's Pittsburgh Terminal was served by one single roundtrip commuter train per day. In 1978, P&LE tried to drop that last commuter train, which was met by fierce objections. With state support, P&LE continued to operate the commuter run but eventually ended the service on July 12, 1985, after passenger counts had dropped significantly.
The PATrain commuter operation continued to use some P&LE-trackage until 1989.
Shops and yards
The Youngstown Gateway Yard was a major hub location on the railroad, until the creation of Conrail. Gateway Yard was opened in October 1957, to be a modern hump yard. The yard was approximately 200 acre stretching for a distance of just over 5 mi from Lowellville, Ohio to Center Street in Youngstown, Ohio. Gateway Yard was made up of three principal yards, and an assortment of smaller, special-purpose yards. The principal yards were arranged linearly, with the eastern limits of the Departure Yard in Lowellville. The Hump Yard was located in Struthers in the center of the facility, and the Receiving Yard was to the west. The special purpose yards were "Diesel Servicing Facilities", "Gorilla Park" and "Interchange" yards. The "Interchange" yard was made up of six tracks, four were for interchange to and from the B&O Railroad and two of which were for general use. The other interchange was with New York Central Railroad which was a direct interchange. The western yard limit was the end of track for the P&LE. Beyond the western end of the Yard was the NYC mainline that continued to Ashtabula, Ohio. The yard was constructed when the P&LE was under the control of the New York Central Railroad. Conrail routing most of the traffic around P&LE facilities in the area. After the 1993 CSX takeover of P&LE, Gateway Yard was closed and most tracks have been removed. The yard tower still stands but has been heavily vandalized.
* Gateway Yard
The McKees Rocks Yard facility was home to a yard, major locomotive rebuilding and general maintenance, as well as freight car repair and maintenance. On the westernmost end of the McKees Rocks yard, the P&LE interchanged with the PC&Y. However, the PC&Y facilities were just behind the P&LE Locomotive facilities in the main yard, and trackage from the PC&Y crossed the P&LE Mainline at this point, servicing several local businesses in the Bottoms section of McKees Rocks, finally making the previously mentioned interchange. Most of the McKees Rocks facilities are now gone. The entire McKees Rocks locomotive facility, shops, and yard is to be replaced by a regional CSX intermodal facility.
* McKees Rocks
In 1904, P&LE built the O'Donovan Bridge for easier automobile access from Island Avenue to The Bottoms without crossing the railroad tracks. This was replaced in 1931 by the McKees Rocks Bridge, which extended to Ohio River Boulevard but still provided access to The Bottoms via Helen Street exit.
The McKees Rocks Community Development Corporation has plans to adaptively reuse the building.
The College Hill neighborhood of Beaver Falls had a small yard located just below Geneva College along the Beaver River. There was also a small roundhouse on the property, plus the College Hill Station. Today, only the station remains.
* College
Subsidiaries
* Pittsburgh, McKeesport and Youghiogheny Railroad (Leased 1888 and merged in 1965)
* Pittsburgh, Chartiers and Youghiogheny Railroad (1/2 P&LE, 1/2 CR)
* Mahoning State Line Railroad (Leased 1885)
* Monongahela Railway (1/3 P&LE, 1/3 B&O, 1/3 CR(PR))
* Montour Railroad
* Lake Erie and Eastern Railroad (1/2 P&LE, 1/2 CR)
* Youngstown and Southern Railway | WIKI |
silicated
Adjective
* 1) Containing silicate or silica
* silicated rocks
* Silicated soap is a hard soap containing silicate of soda. | WIKI |
Talk:Jiang Zemin/Archive 1
Whitewash?
An entire page on this man and NOBODY mentions the hundreds of thousands of allegations of torture and murder overseen by this man? What the hell is going on? —Preceding unsigned comment added by Ibcteam (talk • contribs) 06:55, 4 February 2010 (UTC)
* Советский Союз занимает особое место в политической биографии Цзян Цзэминя.
* В 50-е годы Цзян стажировался в СССР на автозаводе имени Сталина. Цзян владел русским, знал пословицы и поговорки, пел песни 40-50-х годов. В 90-х он уже в ранге генсека китайской компартии посетил Москву. И, наконец, в 1998 году состоялась первая в истории китайской дипломатии «встреча без галстуков». В первую очередь он встретился с теми людьми, с кем в 1955 году работал на ЗИСе.
* В 1997 году, подписав с президентом Ельциным документ о мироустройстве в XXI веке и многополюсном мире, основанном на равноправном сотрудничестве, а не на противостоянии блоков, Цзян Цзэминь отправился в Ясную Поляну: он давно мечтал побывать в усадьбе любимого писателя. Председатель попросил российских хозяев не читать ему лекции о Толстом, произведения которого он прекрасно знает. Его влекли философские основы творчества классика. Цйфыву (talk) 13:45, 17 November 2022 (UTC)
Male Prostitute
I find the claim that Jiang Zemin did a brief stint as a male prostitute highly unlikely. I threw on a "citation needed" tag in the interest of (extreme) fair-mindedness.
Tiananmen Massacre
The text says that Jiang wasn't directly involved in the Tiananmen Massacre, and (on the text about the Tiananmen Massacre it says) he was chosen for chairmen of the party because of his involvement in suppressing other demonstartions.
Putting it this way isn't quite true...
A Chinese friend of mine, once explained it to me like this:
At the time of the Tiananmen Massacre there where two powers: Deng and Zhao. Deng wanted to supress the students and Zhao was supporting them. Yet only Deng had an Army. But Zhao had a supporter who had an army. But at that time this army was in America.
So they ordered the army to come back so that Zhao could prevent Deng from launching his army at the students.
Now that is where Jiang Zemin comes in: Jiang was the head of Shanghai at that time... So Jiang and Deng and another guy get like to gether and plan what they can do. So when the airplane with Zhao's army comes back... the army doesn't belong to Deng, yet the airplane does... so they order that airplane to fly to Shanghai instead of Beijing... saying there would be some emergency or something in Shanghai...
And so Jiang keeps them in Shangai for more than a week so as to make it possible for Deng's army to massacre those students.
Also at the time shortly before the massacre in Beijing Jiang travels to Beijing as well.
As to who gave the order to shoot the students... whether it was Jiang or Deng... this I do not know.
Bu his involvement and his deeds at the time of the massacre... where what made Deng choose Jiang for chairmen.
So saying that Jiang wasn't involved in the Tiananmen Massacre, but only in other massacres is defintily wrong.
So of course afterwards they covered it up... Zhao got removed and Jiang took his post.
Still in China they try to cover up the massacre... or if you go to the Chinese Embassy, and ask them about the massacre or any other suppression that is NOW going on in China... they will simply tell you that it doesn't exist, never has existed, and that those are all just lies made up by people who are trying to overthrow Communism or something (-:
* In response to the above
* 1) Deng was commander in chief of all Chinese armed services
* 2) Most local and provincial commanders of Police, Armed Police (think national guard), and Army garrisons refused the order to move against students, not out of support for Zhao but out of principle.
* 3) Regiments finally sent into Beijing were from out of province
* 4) If you go to any US Embassy around the world for a visa, they will grill you like a potential terrorist. If you inquire about US war atrocities in Iraq, they will have marines escort you out.
16 Party Congress
I updated the Jiang entry to cover the recent developments at the 16th Party Congress
172
Spoken language
I fixed the chart that referred to Jiang as Deng's as "Party leader." In the post-Mao period, Deng Xiaoping never held the post of Party "leadership." The chairmanship had been abolished upon the downfall of Hua Guofeng and Deng wielded power informally, having his protégés anointed as Party Secretaries. Deng was the "core" of the "second generation," while first Hu Yaobang, then Zhao Ziyang, and finally Jiang Zemin nominally held the highest Party posts. 172 03:44, 8 Aug 2003 (UTC)
* Any personal things? Colipon 04:21, 6 Dec 2003 (UTC)
* "A communist leader...fluent in Chinese, Japanese, Russian, Romanian, French and English" I don't know if this is actually true. Maybe he know some vocabulary in these languages but one cannot say that he is fluent in all of them... Colipon 04:23, 6 Dec 2003 (UTC)
* Russian is certain. He received his higher education in economics in Moscow. In addition, Chinese Communist cadres of his generation who started rising up CPC ranks in the late '40s and '50s learned Russian in droves, as Russia was the PRC's principal source of technology and industrial equipment at the time. Also more than willing to show off that he's well-versed in famous works of Western literature, he is known to quote Tolstoy, Pushkin, Chekhov and Turgenev. Romanian is certain as well, which can be verified by reading up on his record as an ambassador to Romania - a key Chinese ally at the time (during the high tide of the Cultural Revolution). Ceausescu, of course, was a maverick in the Warsaw Pact, condemning Soviet intervention in Czechoslovakia in '68; reaching out to the West for trade and diplomatic ties; courting Soviet rivals for leadership of international Communism, such as China and Albania; and later even developing close ties with Soviet foes, such as Israel. Chinese-Romanian ties were a high priority for both parties when Jiang was ambassador; so the accounts attesting to his proficiency in Romanian are believable. English, however, is a bit iffy. We've all heard him engage in small talk in English; cite English works, such as the US Declaration of Independence, the Gettysburg Address, "Hamlet," novels by Mark Twain, and even Elvis Presley songs; and start off interviews in English. He hasn't been immersed in an English-speaking environment, as he has been immersed in Romanian- and Russian-speaking settings for a number of years. His French and Japanese are largely self-taught as well. Perhaps we could say "fluent" in Romanian and Russian; and capable of engaging foreign dignitaries with his grounding in Japanese, French, and English language and literature.
* Anyhow, this is not really important. Biographies and profiles of Jiang just bring up these anecdotes to point out his eagerness to to show his familiarity with other cultures and their histories. His career, after all, has been heavily focused on deeping China's ties to foreign investors and its diplomatic ties. In fact, when he replaced the disgraced Zhao Ziyang in '89, he was seen as an acceptable public image for the PRC - not being linked to the unpleasantries of restoring socio-political stability in the aftermath of the Tiananmen crisis. But he was also well-known for his abilities to court foreigners in a friendly manner. As Mayor of Shanghai, the urbane and cosmopolitian cadre was ideally suited for for transforming Shanghai into the international commercial hub that it is today, luring a steady stream of venture capital from Hong Kong, Japan and the West. And during his 13 years in power as CPC chief and later President, Jiang's mission largely focused on helping open trade relations and spark China's rapid modernization and development.
* Thus, it's not really important if he's able to able to function fully in Japanese and English, but that we're mentioning a well-known characteristic of his background and personality that was emphasized a great deal in PRC efforts to strenghten China's international standing. 172 01:45, 7 Dec 2003 (UTC)
* Just sort of wanted the accuracy into all encyclopedic topics. I say your suggestion of fluent in Romanian and Russian; and capable of engaging foreign dignitaries with his grounding in Japanese, French, and English language and literature. Colipon 20:00, 10 Dec 2003 (UTC)
Early life
In the Background of Jiang Zemin, I don't know who add (now Nanjing University) after National Central University. I think we shuold not ignore his three years at Nanjing Central Univesity; but it's also not proper to indicate Nanjing Central University is now Nanjing University. So I'd like to delete it. The history of this university is very complex. Few people thoroughly know it.
During the war against Janpanese invasion, the Wang Ching-wei Goverment(汪精民政府) established Central University in Nanjing in 1940, with campus located in the fomer campus of University of Nanking (The campus of former Central University was changed to be the hospital for land forces during the period), and claimed to be the successor of Central University. The fact is that Central University had moved from Nanjing to Chongqing in 1937. Jiang Zemin, studied at Nanjing Central University from 1943 to 1945, not Chongqing Central University. Actually Nanjing Central University (1940-1945) and Chongqing Central University(Today's Nanjing University) are two universities (So in the resume of Jiang Zemin or his schoolmates, I think we should not ignore their year(s) at Nanjing Central Univesity; on the other hand, it's also not proper to indicate Nanjing Central University is now Nanjing University). In 1945 after Chiang Kai-shek Government((蒋介石政府) came back to Nanjing, the students of former Nanjing Central University (Wang Ching-wei Government) were admitted to enter Central University which moved bach from Chongqing, if they passed the entrance examination in 1946. Currently officially Nanjing University also admit the alumni of Nanjing Central University (1940-1945) and take them as its alumni. (From Talk:Nanjing University) Dictioner 03:35, 25 Apr 2004 (UTC)
The main image of this article as of 20th Sept 2004 15:25 UTC is an image of Jiang Zemin, and the caption is: "President Jiang Zemin with his successor, Vice President Hu Jintao, in the background"
Should this be changed to account for the fact that Hu Jintao is now President? Perhaps something akin to:
"Former-President Jiang Zemin with his successor, Then-Vice President Hu Jintao, in the background" Hazzamon 15:25, 20 Sep 2004 (UTC)
In the Hu Jintao discussion, it is mentioned that the picture of him in the Zhongshan suit ("Mao suit") is a doctored photo - it seems Jiang's is too. Since Mr Jiang is no longer CMC Chairman, I have changed his photo to one in a suit.
Jiang's Presidency
I think some actual stuff about Jiang's years as President is missing. It seems there is a sudden jump from his Ascendancy to the 16th Party Congress. Colipon+(T) 22:39, 28 Jan 2005 (UTC)
* Ok, after about six months I have finally done a rewrite of the article. The part about Taiwan definitely needs to be added. Colipon+(T) 07:15, 18 Jun 2005 (UTC)
His major evil deed.
He betrayed all Chinese and gave up the rights to take back the lands unfairly taken away by Russia. This is his major evil deed!
You betrayed all Wikipedians by making an idiotic comment like that. Colipon+(T) 03:19, 4 February 2006 (UTC)
Kuhn Book
I am currently reading the RL Kuhn book. I think it's pretty biased. Any views? Colipon+(T) 07:56, 18 February 2006 (UTC)
Persecution of Falun Gong
Not sure if this has been raised before, but there does not seem to be much information about Jiang and the persecution of Falun Gong. I was thinking that an appropriate comparison would be a biography of Hitler which only mentioned in passing that he was responsible for the Holocaust. This has become something of an important issue recently, particularly with the Canadian report about organ harvesting. The Olympics are coming up so maybe these issues, the CCP's evil deeds with regard to Falun Gong, will become more prominent. I would like to see a section about Jiang's initiation and role in the persecution of Falun Gong. I will start doing some research and check this board for responses and ideas about whether it is appropriate or has been tried before, etc. --Asdfg12345 01:23, 7 September 2006 (UTC)
* Yeah, I think the article should mention his ruthless persecution of Falun Gong. It is a human rights violation and amounts to genocide (considering that his government try to kill off a whole group). Wooyi 03:10, 26 March 2007 (UTC)
* See Reductio ad Hitlerum, Biography of living persons, and undue weight. Considering the FLG issue and Jiang's involvement has not been largely explored by much third parties outside of the pro-PRC sources and pro-FLG sources, these allegations shall remain as such. And this is the wrong place to vent your personal opinion on how evil you think JZM is.--PCPP (talk) 16:46, 30 June 2008 (UTC)
falun Gong is such a new religion, that it has always looked like having been invented for having an organisation which enjoys the protection of a religion, but in reality it is an organisation with a large dissenters' layer. 2001:8003:A070:7F00:E49D:28AB:85EB:DE13 (talk) 03:22, 17 September 2022 (UTC)
The table should be wikified
The table in Jiang Zemin should be wikified. Yue Qi 16:28, 13 September 2006 (UTC)
Biography and Controversy
I was asked, anonymously, by the person who first posted this section to develop it. I've tried to do so adhering to NPOV, citing sources.
Incorrect date
"In an encounter with a Hong Kong reporter in 2002 regarding the central government's apparent 'imperial order' of supporting Tung Chee-hwa to seek a second term as Chief Executive of Hong Kong, Jiang branded the Hong Kong journalists infamously as 'too simple, sometimes naive' in English."
This happened on Oct 27, 2000. Here's a news report covered that event from CNN, http://cnnstudentnews.cnn.com/2000/ASIANOW/east/10/27/china.hongkong.02/index.html
It says "page not found". Colipon+ (Talk) 23:57, 18 September 2009 (UTC)
International law suits
There are more than one "international law suits" on Jiang Zemin, one is the Spain court, another is the Sydney court, plus USA court, Sweden court, plus others. I think this kind of law suits need to be mentioned in the article, because of the "High profileness".
Also, the power struggle between Jiang and Hu Jintao needs to be mentioned, because Jiang, as a retired "Old comrade", has a very strange but high profile appearence on center stage on the 60th anniversary of the People's Republic of China. Arilang talk 23:17, 22 November 2009 (UTC)
* Like I said before, you're more than welcome to edit the body of the article. The suing is not particularly notable in my opinion... it's like saying George W. Bush can be sued for war crimes in a court located in Uganda just because people dislike him. Also, please avoid placing countless external links that are not directly relevant to the biography itself - and often inaccessible to the average reader, such as those links in Chinese. Colipon+ (Talk) 02:13, 25 November 2009 (UTC)
* The court case against Jiang Zemin is much more serious than saying George Bush being sued in a court located in Uganda
Jia Qinglin are in the prosecution list. This is unprecedent in International politic, neither Nazi Germany, nor Imperial Japan had been treated like this. And never in 3000 plus years of Chinese history, Chinese government official had been charged by internation legal courts. This is a BIG deal. Arilang talk 03:32, 25 November 2009 (UTC)
* 1) It is not a court; there are many courts, the last count is about 20 plus.
* 2) One important factor is the extradiction treaty signed by both the PRC and Spain. 中华人民共和国和西班牙王国引渡条约
* 3) Apart of Jiang, other PRC top cats such as Bo Xilai, Luo Gan
* I don't see your point, considering that under these court systems, anyone, even world leaders, can be sued for anything. Even as recently, George W Bush was sued for crimes against humanity, but these cases are usually done for publicity reasons and are never followed up.--PCPP (talk) 17:17, 28 March 2010 (UTC)
Why remove all the links
Some of these links are very usefull for average everyday readers -
* Falun Gong accuse Chinese leaders of genocideExpatica Communications BV
* China rejects Spain's 'genocide' claims Posted by The Independent.
* Briefly: China warns Spain over Tibet lawsuit - Europe - International Herald Tribune The New York Times
* Swedes to sue ex Chinese president The Local Europe AB
* ...investigation to proceed against China's ex-president, Jiang Zemin, and Luo Gan... The American Society of International Law
* Landmark Genocide Lawsuit Against Jiang Zemin on Firm Ground, Says Appeal Filed Today CHICAGO (FDI) – Dr. Terri Marsh, lead attorney in the ground-breaking lawsuit against former Chinese leader Jiang Zemin and the 6-10 Office, filed a 60 brief this morning in the U.S. 7th Circuit Court of Appeals in Chicago. The brief asks the Circuit Court to reverse the decision of the U.S. District Court and allow the case to go forward. Friends of Falun Gong USA January 20, 2004
* 《中俄全面勘分边界条约》内幕(转载)
* 香港人網
* 法輪功學員被迫害案 西班牙要江澤民解釋 馬來西亞中國报 The China Press Berhad
* 美国之音:江泽民等遭西班牙法院传讯 VOA
* 西班牙诉江案震荡中直机关 中共高层缄默 2009.11.24 The Epoch USA Arilang talk 03:40, 25 November 2009 (UTC)
Role in persecuting Falun Gong
Now this has been removed entirely. I think Epoch Times is an okay source, since they are the most vocal of critics. --Asdfg12345 23:22, 25 March 2010 (UTC)
I will try to search for source other than Epoch Times, I remember seeing it somewhere. I read somewhere that the most hated GFW began as a 610 Office project. The Golden Shield Project are different from GFW. Arilang talk 04:31, 26 March 2010 (UTC)
* I wouldn't mind using the Epoch Times as a source, to be honest, so long as we state that the Epoch Times is essentially a mouthpiece of Falun Gong, a group that obviously has an axe to grind with Jiang. I wrote some criticisms of Jiang earlier but editors came on here and told me that it was slander. I've grown more cautious because of BLP policies. But basically, we just have to cite sources, and give sources due weight. Colipon+ (Talk) 04:36, 26 March 2010 (UTC)
* What about scholars such as David Ownby? I agree Epoch Times is an fringe source at best, and the usage would violate WP:BLP, just as we don't use Xinhua as a critical source of Li Hongzhi.--PCPP (talk) 17:21, 28 March 2010 (UTC)
* I don't think it's entirely unreasonable to use the Epoch Times, as long as we follow strict rules of WP:A. While some of the Epoch Times' criticisms of Jiang is outright slander, some of it is also reasonable and qualified. Plus there is no other big organizations that have been so adamant about criticizing Jiang - as such the fact that such criticism exists at all warrants mention in this article, IMHO. Colipon+ (Talk) 17:40, 28 March 2010 (UTC)
* This one definitely not a Falun Gong site:
Arilang talk 04:51, 6 April 2010 (UTC)
* http://www.interexpat.com/chinas-ex-president-sought-in-spanish-probe-lawyer-a114151.html
* http://www.amnestyusa.org/international_justice/bulletin_spring06.pdf
PCPP's destructive edits
Please stop deleting things you don't like, as with the recent attempt. --Asdfg12345 23:21, 3 April 2010 (UTC)
* Per WP:BLP, poorly sourced material in regards to living persons should be removed, especially considering the ruling is not likely to be carried out, as the article claims.--PCPP (talk) 14:50, 4 April 2010 (UTC)
* Could you please explain how the Reuters article is "poorly sourced"? What you just wrote makes no sense. Whether the ruling is likely to be carried out or not can be noted briefly. It has nothing to do with whether the information is poorly sourced or not. Please explain how it's supposed to be poorly sourced. I'll wait. — Zujine |talk 15:45, 4 April 2010 (UTC)
* Go do a google news search on Jiang Zemin that's not from FLG-affliated sources. I'll wait. And BLP states that any poorly sourced, questionable, or libelous material can be removed on sight. The article on George W Bush or Tony Blair does not have sources on the individuals trying to sue them for war crimes, so why should this article have one?--PCPP (talk) 15:58, 4 April 2010 (UTC)
What are you talking about? The material you removed is from Reuters. Is that a Falun Gong affiliated source? Further, if you look above, both Colipon and Arilang agree that it's notable. I'm going to revert you, just because no one else would, and just to show how you edit against consensus. --Asdfg12345 16:34, 4 April 2010 (UTC)
* Here asdfg admits his intention to edit war, I LOLed.--PCPP (talk) 17:19, 4 April 2010 (UTC)
* You may have misunderstood. I did not mean to express that I intend to edit war. I meant that you have not explained at all why the information doesn't belong, and you are editing against consensus. I further stated that my assumption is that someone like Zujine is not readily going to revert you, even though I had thought that was the only thing you would listen to. But actually, that's useless too. You don't care if you are reverted, and you don't care if your explanations don't make sense, you don't care if you are editing against consensus. But back to the topic: can you please explain how the material is poorly sourced, questionable, or libelous?--Asdfg12345 08:42, 5 April 2010 (UTC)
* a news search on google showed no references of the supposed lawsuit, outside of the Epoch Times. And a google search on Judge Octavio Lamadrid mostly FLG links, with the Reuters article being the only third-party news source. This is clearly a problem of notability and undue weight.--PCPP (talk) 12:07, 5 April 2010 (UTC)
* How is there clearly a problem of notability and undue weight, when there are two reuters articles on it, copied to a number of media, and it's only one sentence? How is that undue weight, and a notability problem? And why did it stop being a BLP violation all of a sudden? It seems like you're changing tactics, just making up reasons to exclude the information. I don't think you believe half the stuff you say on here. --Asdfg12345 14:01, 5 April 2010 (UTC)
Here are two reports:. Unlike a local LGBT newspaper, these are international media. Why don't you apply the same standards to your own stuff as you do others? --Asdfg12345</b> 14:03, 5 April 2010 (UTC)
* Please stop lawyering. There's only the two articles on the supposed arrest warrant, the rest are simply unverifiable claims from Epoch Times and other FLG mouthpieces. The LGBT paper is notable because the SF board actually took FLG's stance on homosexuality into account when issuing a proclaimation on China's treatment of Falun Gong. An arrest warrant for a former world leader would have would need better sourcing than that, just as the George W Bush article doesn't contain random attempts to sue him by anti-war activists. Poorly sourced materials can be removed per BLP.--PCPP (talk) 14:12, 5 April 2010 (UTC)
* "Poorly sourced materials can be removed per BLP" -- please explain: What is the problem with the source? --Asdfg<b style="color:black;">12345</b> 14:14, 5 April 2010 (UTC)
* Simple. It has no follow up, no significant media coverage, and is largely used by FLG as a publicity stunt.--PCPP (talk) 14:17, 5 April 2010 (UTC)
* Why does there not having yet been a follow-up make it poorly sourced? And why does how Falun Gong practitioners have "used" it make any difference? --Asdfg<b style="color:black;">12345</b> 14:23, 5 April 2010 (UTC)
* Yawn, I've left a notice regarding the issue on the BLP board --PCPP (talk) 14:55, 5 April 2010 (UTC)
* Hi from the BLPN, there is a comment there from Guy, I agree with him also, this detail is notable for the F Gong article but not here as it gets undue weight, it is only symbolic and to add it here you would need to add explanatory detail of this and that and the whole report would be then excessive, feel free to comment there at the BLPN, perhaps wait and see if there are any notable developments, like interpol actually issuing an arrest warrant, they have been asked but as I see they have not issued one, thanks. Off2riorob (talk) 22:45, 5 April 2010 (UTC)
* Perhaps the most prudent course would be to await further developments or forms of argumentation. I do not think it is an issue of libel or BLP though, but one of notability/significance. — Zujine |talk 04:43, 7 April 2010 (UTC)
Alleged Affair With Song Zuying
There have been long running allegations that Jiang Zemin carried on an affair with the traditional Chinese music songstress Song Zuying. Lu Jiaping published this allegation on his website, was placed under house arrest, but then released. Asia Sentinel also published an article referring to this alleged affair in the context of Vice-Admiral Wang Shouye's arrest for corruption - he was described as being the man who introduced them. Finally, the book "China's New Rulers: The Secret Files" describes Jiang's relationship with Song as being a romantic one. These references can be found here:
http://www.asiasentinel.com/index.php?option=com_content&task=view&id=409&Itemid=31 http://<IP_ADDRESS>/media/doc/2010/02/09/china-new-ruler-chapter.pdf http://www.asianresearch.org/articles/1951.html
Am I okay to go ahead and edit the article to include these allegations? They're certainly relevant to the subject, to leave out this alleged affair, well known and much joked about across all of China at the time would be like leaving out Clinton's dalliance with Lewinsky, but it seems necessary to discuss this first given the history of edit wars on this page - I note that the page does not even have a 'personal life' section, which is inexcusable given this man's prominence. FOARP (talk) 16:09, 29 September 2010 (UTC)
Rumours of Death
Please see - it appears to be unlikely. The rumours themselves are notable though, I'd argue - and even if it's decided otherwise once things have calmed down, it will do some good for Wikipedia to be mentioning them as unlikely NOW while people are perhaps looking to it to see the truth. Egg Centric 10:39, 6 July 2011 (UTC)
* Sorry, just to be clear, why are you asserting that the rumors are "unlikely"? Death rumors around Jiang Zemin have circulated before, and should thus be regarded with caution, but it hardly seems unlikely that an 84-year-old might fall ill. The over-the-top response to the rumors, coupled with Jiang's conspicuous absence from 90 anniversary celebrations, suggest to me that there is at least a reasonable chance that there is some truth to these stories (if not about the death, then at least about his being in critical condition—something which several Hong Kong newspapers have asserted). Homunculus (duihua) 12:33, 6 July 2011 (UTC)
* And to clarify, I do not have an opinion as to whether mention of these rumors should be included in the article. But if others choose to include them, we should not attempt to pass judgement on how likely or unlikely they are.Homunculus (duihua) 12:39, 6 July 2011 (UTC)
* His death would certainly not be unlikely, and I woudl expect it any time soon. I just mean the source of the rumours is very very sketchy. I'm sure we'll know within 48 hours one way or another. Egg Centric 12:53, 6 July 2011 (UTC)
* The last source I'd want to cite for this article would be The Epoch Times. There are plenty other sources available. Just saying. Blodance the Seeker 04:54, 7 July 2011 (UTC)
Edit request from <IP_ADDRESS>, 6 July 2011
I request that the edit by Egg Centric on http://en.wikipedia.org/w/index.php?title=Jiang_Zemin&action=history 14:36, 6 July 2011, be revoked. The user Egg Centric unjustly removed reference to news that Hong Kong broacaster ATV has reported the death of Jiang Zemin. The reference is supported by a video of the actual TV news broadcast.
<IP_ADDRESS> (talk) 14:51, 6 July 2011 (UTC)
* The info is already in the rumours section. Egg Centric 15:47, 6 July 2011 (UTC)
* To clarify - I'm not saying *no* - I'm just pointing this out to you cause I don't think it would really make sense to put that trivia in the lead. If the rumours turn out to be untrue then it may be that even the rumours don't deserve to be in the article (but that is something we can revist in a few days). I have no objection to the article being in almost any form so long as it is coherent.... Egg Centric 16:17, 6 July 2011 (UTC)
* Red information icon with gradient background.svg Not done for now: I believe that a rumor about his death should not be included in the lead paragraph, especially on a BLP I think we should air on the side of caution. Jnorton7558 (talk) 08:52, 7 July 2011 (UTC)
* The claim that Jiang Zemin has died is circulating on Sina Weibo and lacks reliable sourcing. Wikipedia would not report claims that Barack Obama had died on the basis of a tweet, especially after what happened a few days ago.-- ♦Ian Ma c M♦ (talk to me) 11:28, 7 July 2011 (UTC)
Persecution vs Suppression of Falun Gong
Persecution of Falun Gong seems to be the more commonly used term. A google search shows this. The article on wiki is called Persecution of Falun Gong not Suppression of Falun Gong.Aaabbb11 (talk) 09:22, 22 March 2015 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 external links on Jiang Zemin. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20150529065551/http://www.theepochtimes.com/news/5-7-6/30081.html to http://www.theepochtimes.com/news/5-7-6/30081.html
* Added archive https://web.archive.org/web/20101123022821/http://factsanddetails.com/china.php?itemid=76&catid=2&subcatid=7 to http://factsanddetails.com/china.php?itemid=76&catid=2&subcatid=7
Cheers.— InternetArchiveBot (Report bug) 08:39, 22 April 2017 (UTC)
Neutrality of "Three Represents" Sub-Section
In the "Three Represents" sub-section, the theory is described in highly biased terms. To say that the theory pragmatically "justified" certain policies, and featured "euphemisms," means presenting the author's PoV on the theory, instead of letting it speak for itself. This section should be revised for balance and tact. — Preceding unsigned comment added by 2602:306:C403:3480:91B2:6E8E:D61D:1A4F (talk) 17:25, 6 June 2017 (UTC)
* If you see issues with the section, you're free to propose alternatives. I'm happy to work towards a more 'balanced' section. But please do not simply leave an accusation, tag the article, then leave. Offer some concrete suggestions. Colipon+ (Talk) 19:25, 6 June 2017 (UTC)
Joining the Communist Party
* He claims that he joined the Communist Party of China when he was in college.
Does anyone deny that he joined the party then? Surely the party would have records. The link appears to be dead.--Jack Upland (talk) 00:08, 15 October 2017 (UTC)
Civil Wars such as in China cause documents to disappear or perish, or even being disappeared. 2001:8003:A070:7F00:E49D:28AB:85EB:DE13 (talk) 03:26, 17 September 2022 (UTC)
BLP noticeboard
BLP noticeboard I came here from the noticeboard. A few changes:
* 1) I removed all refs pointing to falun gong owned media outlets as they are not reliable sources for anything, let alone BLPs.
* 2) I removed any statement which these refs was supporting unless it was either supported by a reliable source or entirely non-controversial. However there's a to-do here to ensure that any biographical details now lacking a citation get one.
* 3) I edited the section on the Falun Gong crackdown to more closely represent what is said at the sources. There's nothing at all about an expulsion; and regardless of what you think of this new religious movement or the response it got from China, what happened was not an expulsion, it was a crackdown or (to use more loaded language) a suppression. Furthermore, the source actually speaks to Jiang's motives. And that's some context which is important. He didn't wake up one day and say, "I'm going to crush a random religion today muahahaha." He reacted to fears that the FLG was trying to take over China, much as past millenarian movements had. Simonm223 (talk) 19:16, 31 July 2019 (UTC)
Request for comment on referring to the leader of China in the Manual of Style
Please see this Manual of Style RfC on whether Jiang Zemin, Hu Jintao, and Xi Jinping should be referred to as "leader ___", "Paramount leader ___", "General Secretary ____", or "President ____". — MarkH21talk 03:34, 2 July 2020 (UTC)
Current status
As of 2021, does Jiang continue to hold any measure of power or influence in China's communist power structure? <IP_ADDRESS> (talk) 21:23, 3 February 2021 (UTC)
* No. He's retired. - 祝好,Sinoam(聊天) 19:00, 19 April 2021 (UTC)
Respect of Jiang Zemin
I still care and I will revere to learn about Chinese President Jiang Zemin. I have to improve communication in skills in Chinese languages and Chinese history. He will believe in me. And I believe him. This is drama. <IP_ADDRESS> (talk) 22:29, 9 February 2022 (UTC)
A Commons file used on this page or its Wikidata item has been nominated for deletion
The following Wikimedia Commons file used on this page or its Wikidata item has been nominated for deletion: Participate in the deletion discussion at the nomination page. —Community Tech bot (talk) 23:38, 16 March 2022 (UTC)
* Levon Ter-Petrosyan and Jiang Zemin.jpg | WIKI |
Proclamation 4563
By the President of the United States of America A Proclamation
Throughout history the ocean has been a magnet for explorers, scientists, merchants, adventurers-and dreamers. Where once the oceans were cloaked in superstition, today we plumb their depths with an amazing array of technological devices, and we are beginning to understand the vital role of the oceans in life on this planet. The world community looks to the oceans as a vital source of food, energy and mineral resources, while they remain crucial to trade as they have been since ancient times.
As governments, international organizations and private groups develop plans and programs to harvest some of the riches of the sea, we must also control marine pollution. We must unlock the secrets of the ocean to understand the results of man's activities-not only at sea, but on land as well-which adversely affect sea-life. It is essential that we discover and work with the oceans' capacity to survive misuse. All the peoples of the world must understand that the ocean cannot be subjected to unchecked exploitation, but because our Nation lies between the world's largest oceans, and because of our economic position, the United States has a special responsibility in preventing the deadening of the seas. A careful balance between conservation and commercial development must be achieved if the oceans are to meet the needs of future generations.
In order to increase public awareness of the importance of the oceans of the world, the Ninety-fifth Congress has adopted a joint resolution (S.J. Res. 124) requesting the President to issue a proclamation designating the week of April 16 through April 22, 1978, as National Oceans Week.
Now, THEREFORE, I, JIMMY CARTER, President of the United States of America, do hereby proclaim the week beginning Sunday, April 16, 1978, as National Oceans Week.
I call upon public officials, users of the oceans and coasts, environmental organizations, industry, the media and civic leaders to join together to make the public aware of the importance of our ocean resources and I urge every American to take the time and trouble to learn about the proper use and management of our marine waters and the wealth of their contents.
IN WITNESS WHEREOF, I have hereunto set my hand this seventeenth day of April, in the year of our Lord nineteen hundred seventy-eight, and of the Independence of the United States of America the two hundred and second.
JIMMY CARTER
[Filed with the Office of the Federal Register, 2:11 p.m., April 18, 1978] | WIKI |
SUPREME COURT.
John E. Tallman, respondent agt. The Atlantic Fire and Marine Insurance Company, appellant.
Where a,policy of insurance on chattels contains a clause that &in case of any sale, transfer, or change of title in the property insured, such insurance shall he void and cease,the execution of a chattel mortgage on the property by the insured to a third person, without notice to the insurance company, or their assent obtained, avoids the policy.
And the sale of the mortgaged property under the power contained in the mortgage to the mortgagee, and possession by him without notice to the insurer, avoids the policy.
Where the insufed has no interest in the property at the time of the loss, the policy is void, although the loss is by the terms of the policy made payable to a third person having an interest in the property.
The. transfer by one partner to another of his interest in the property insured, 'without any notice to the insurer, does not affect the policy
Schenectady General Term, May, 1865.
Before Bockes, James, Rosekrans and Potter, Justices.
This is an action brought by the plaintiff upon a policy of insurance issued by the defendants to the firm of “ Sturtevant,- Sons & Go.” upon certain machinery for the manufacture of paper, in Ogdensburgh, St. Lawrence county. The policy was issued 9th January, 1861, insuring to the extent of $2,000, the loss, if any, payable to the “ Hon. W. C. Brown.” The property in question had been' purchased • by the insured off Judge Brown, on the 13 th of November,' previous, by an executory contract, in which Brown covenanted" to give immediate possession and did give such possession; and further covenanted, that after the payment of $2,500, the insured should have the title. On the contract “ Sturtevant, Sons & Co.” had paid all but about $1,000 at the.time of taking said insurance. One Royal Tallman, son of plaintiff, was one of the firm of Sturtevant, Sons & Co. This policy was received 9th January, 1862, and in August of that year, S. L. Sturtevant, one of the said firm, sold out his interest in the said firm to Frederick J. Sturtevant, his brother, another memher of said firm. No notice was given to the defendants of his transfer. After that the business which commenced 1st January, 1861, was carried on in the name of “ Sturtevant, Son & Go.” The firm remained the same, except that one son of Norman Sturtevant, the father, had retired after selling- his interest to the other son. On the 21st November, 1862, Sturtevant, Son & Go., to wit: Norman Sturtevant, Royal Tallman and Frederick J. Sturtevant, executed a chattel mortgage to John B. Tallman, the plaintiff, upon the insured property for' $1,539.24, as security for plaintiff’s indorsement of certain notes to that amount for the said firm. This mortgage was foreclosed and the property sold at public auction 18th April, 1863. Plaintiff became the purchaser, and took possession at the time of the purchase, and after that day Sturtevant Son & Co.,had no possession of the property, and ceased to carry on the business; and from and after that day the business was carried on by the plaintiff; his son, Royal Tallman, acted as agent and manager of the plaintiff in conducting the business.
On the 9th January, 1863, the plaintiff, John E. Tallman, obtained a renewal receipt from the defendants’ agent, upon §1,000, one-half the sum insured by the policy, for one year, and paid the premium therefor. The defendants’ business with this firm was conducted by D. M. Chapin, their agent. The agent of the defendants who gave this receipt did not then know that one of the Sturtevants had retired from the firm, nor did he ever know how many of them composed that firm. Neither the defendants or their agent had knowledge that the said firm had mortgaged the property to John E. Tallman, the plaintiff, nor had the defendants or their agent any knowledge at the time of issuing such renewal receipt, of the foreclosure of the mortgage and of the transfer of the business to the plain tiff. The plaintiff subsequently to the day of obtaining this renewal receipt, effected two other insurances from other insurance companies, of which companies Chapin (defendants’ agent) was also agent; one on the 26th January, 1863, in the North American Insurance Company of Hartford, of §1,500 on said machinery to plaintiff, “ for whom it may concern,” for three months, and $500 on rags for one month, and on the 26th of April of the same year, this was renewed for one year on the machinery ; and on the day last named he obtained an additional insurance on the machinery of $1,500 in the Massasoit Insurance Company of Springfield. Notice of these last insurances was not given by the plaintiff to the defendants’ company in
any other manner than that Chapin, who was the agent at Ogdensburgh of the defendants, and of all the companies in which policies were obtained on such machinery, did know, and he indorsed as agent of the two latter companies upon the policies respectively issued by them, notice of all the other insurances, including that by the plaintiff in this action, but did not make the same indorsement on the policy issued by defendants. On the 9th day of May, 1863, the mill and the insured property was destroyed or greatly injured by fire, exceeding the amount insured by the defendants. On the 29th May, 1863, Judge Brown sold and assigned to the plaintiff, in consideration of $1,061.50, his contract with Sturtevant, Sons & Co., and the policy of insurance in the defendants’ company, and the loss which was payable to him, as by renewal receipt of 9th January, 1863, and all his right of claim to damage on loss by fire.
This action was afterwards brought by the plaintiff to recover for that loss; all other facts will sufficiently appear in the opinion. The cause was tried at the June circuit, St. Lawrence county, 1864. The jury found a verdict for plaintiff. A case was made containing exceptions, and the defendants appealed from the judgment entered on the verdict to the general term.
Myers & Magone, for defendants and appellants.
I. Sturtevant, Sons & Company were not the absolute owners of the property at the time they effected the insurance, and no notice of their qualified interest was given to the defendant at the time the insurance was effected, nor was the qualifications of the interest stated in the policy as required by subdivision six of the conditions of the policy, and the omission rendered the policy void. There is no waiver of this condition, or pretence of waiver shown in the case. Even if it were true as urged by plaintiff’s counsel that the agent D. M. Chapin, had full knowledge, such knowledge does not avail the assured in the absence of fraud on the part of the defendant. (Jennings agfc. The Chenango Mutual Ins. Co. 2 Denio, 75 ; Chase agt. Hamilton I?is. Co. 20 N. Y. R. 52 ; Wilson agt. Genesee Ins. Co. 14 N. Y. R. 418.)
II. The assured, Sfcurtevant, Sons & Co., had no insurable interest in the property at the time of the destruction or injury thereof by fire. Sanford L. Sturtevant conveyed all his interest in the property to F. J. Sturtevant, October 6th, 1862, and the new firm of Sturtevant, Son & Co. succeeded to all the right and interest of the firm of Sturtevant, Sons & Co., and they convejmd all their interest in the property to John E. Tallman, November 21, 1862, by chattel mortgage, without notice to the defendant.. Tallman foreclosed the mortgage and bid in the property at public sale, under the power contained therein, and thereby extinguished the equity of redemption of Sfcurtevant, Son & Co. in the insured property. It is expressly provided by the terms of the policy that “ in case of any sale, transfer, or change of title in the property insured by this company, such insurance shall be void and cease.” Without an interest in the property at the time of the loss, the insured cannot recover. (Angeli on Fire and Life Insurence, § 55 ; Murdock agt. The Chenango Co. Mutual Insurance Company, 2 Com. p. 210; Kent’s Com. v. 3, p. 344 ; Hancox agt. Fishing Ins. Co. 2 Sumner, 142 ; The Saddler Company agt. Badcock, 2 Atk. 554; Lynch agt. Balzell, 3 B. P. C. 497; 23 Pickering, 418.) As to the legal effect consequent on the execution of the bill of sale by S. L. Sturtevant to F. J. Sturtevant, and the chattel mortgage, aside from the conditions of the policy, see Angeli on Insurance, page 105, § 63, and authorities there cited.
It may be urged that the sale from Si L. Sturtevant to F. J. Sturtevant, or in other words the sale of the interest of one partner to another, without notice to the defendant, although directly repugnant to the seventh subdivision of the conditions of the policy, does not avoid the policy. The supreme court so decided in Wilson agt. The Genesee Mutual Ins. Co. (16 Barb. 511), and the decision was incidentally approved in Bey agt. Poughkeepsie Mutual Ins. Co. (23 Barb. 623). We are not aware that the precise question has ever been passed -upon in the court of appeals, and we entertain the opinion that whenever it is, such a transfer, in direct violation of the fair words of the contract of insurance, will be held an avoidance of the policy. We therefore urge upon the court in this case a decision upon this precise question.
It was urged upon the trial of this case at the circuit, that John E. Tallman acquired no additional interest in the insured property by the foreclosure of the chattel mortgage. That the mortgagee could not become the purchaser and thereby extinguish the mortgagors’ equity of redemption, citing The Buffalo Steam Engine Works agt. The Sun Mutual Insurance Company, (17 N. Y. R. 401), as an authority in support of the doctrine. Upon a careful examination of the case, it will be observed that no such decision was necessary to an adjudication of the case, and that the judgment was reversed on other and entirely different ground. The case is most certainly far short of an authority. The precise question of the right of a mortgagee to become the purchaser at the foreclosure sale, was presented to this court in Olcott agt. The Tioga Railroad Company (40 Barb. 179), Monroe general term, 1862, and the court held that on “ a sale to cut off this mere equitable right, the mortgagee may bid to protect the title already absolutely vested in him,” and this decision of the general term was affirmed in the court of appeals, September, 1863 (note a, 40 Bar. 192). This decision was five'years subsequent to the dicta in the 17 JV. Y. R., urged by the plaintiff’s counsel. However, even if the assured had any equity of redemption in the property, it would not avail him when his acts were in direct conflict with the terms of his contract, as a conveyance by way of chattel mortgage carries the whole legal title in the propertyto the mortgagee absolutely, (Butler agt. Miller, 1N. Y. R. 496; Ferguson agt. Lee, 9 Wend. 258,) and upon the failure of the mortgagors to perform the condition of the mortgage, the mortgagee acquired an absolute title to the property. (Brown agt. Bement, 8 Johns. 86 ; Aclcley agt. Finch, 7 Cow. 290.) In the suit of The Western Massachusetts Ins. Co. agt. Riker (2d American Law Register, p. 127), it was held that a policy of insurance, one of the conditions of which is that “in case of any sale, transfer, or change of title in the property insured, such insurance shall be void and cease,” is avoided by a conveyance which is absolute in form, though given as security for a debt merely. And where the insurance is upon a single building, and the conveyance is of an undivided interest only, the conveyance avoids the whole policy, notwithstanding the interest of the insured remaining unconveyed is shown to exceed in value the sum insured.
III. The additional insurance effected by John E. Tail-man, without notice to the company, avoided the policy, being a direct and positive breach of the contract on the part of the assured (Mellon agt. The Hamilton Fire Ins. Co. 17 N. Y. R. 109). It is expressly stipulated in the body of the policy, that “ if the assured, or any other person'or parties shall hereafter • make any other insurance on the same property, and shall not with all reasonable diligence give notice thereof to this company, and have the same indorsed on this instrument, or otherwise acknowledged by them in writing, this policy shall cease and be of no further effect.” No notice in writing is shown or even pretended —but it is assumed from the fact that D. M. Chapin was the agent of each of the several companies with whom the additional insurance was effected, that the defendant in this case is chargeable with notice of any fact that came to Mr. Chapin’s knowledge while acting not only out of defendant’s employment, hut in the employment of rival companies. There is no evidence whatever in the case that the defendant had knowledge that Mr. D. M. Chapin was the agent of any other company. The courts have not yet established, even by implication, that such knowledge of the individual is any notice whatever to the company, much less a written acknowledgment or indorsement as required by the terms of the policy. On the contrary, it has been expressly, adjudicated that actual knowledge of the true state of the facts on the part of the agent, in the absence of fraud, will not relieve the assured against a breach of any of the conditions of the contract of insurance. (Jennings agt. The Chenango Mutual Ins. Co, 2 Denio, 75 ; Chase agt. Hamilton Ins. Co. 20 N. Y. R. 52 ; Wilson agt. Genesee Ins. Co. 14 N. Y. R. 418.) According- to the conditions in the policy in this case, it is wholly immaterial who effects the additional insurance, as it avoids the policy by force of the contract, but in this case the plaintiff is also the party who effected the additional insurance.
IV. It was claimed on trial at the circuit, and may possibly be urged on argument, that as the loss was payable tó Mr. Brown, and he conveyed his interest to the plaintiff, that the plaintiff is shielded not only from the acts of Sturtevant, Sons & Co., but also from his own acts. The legal rule fixed by judicial decision is the other way. It is expressly held that when the insurance is effected in the name of one, loss, if any, payable to another, the party to whom the loss is payable cannot recover unless the party named as the assured in the policy can. (Grosvenor agt. The Atlantic Fire Ins. Co. of Brooklyn, 17 N. F. R. 391; Id. 401; Bidwell agt. Northwestern Ins. Co. 19 N. F. R. 179.) Tn 17 N. F. R., at page 395, the court say : “ It is the damage sustained by the party insured, and not by the party appointed to receive payment, that is recoverable from the insurers (Macomber agt. The Cambridge Mutual Fire
Ins. Co. 8 Cush. 133). The insurance being upon the interest of the mortgagor, and he having parted with that interest before the fire, no loss was sustained by him, and of course none was recoverable by his assignee or appointee. The right of such a party being wholly derivative, cannot exceed the right of the party under whom he claims.” (Carpenter agt. The Providence Washington Ins. Co. 16 Peters, 495 ; Foster agt. The Equitable Fire Ins. Co. 2 Gray, 216.)
V. If the policy had life as a valid instrument, Royal Tallman was one of the assured thereby, and had con•tracted pursuant to the eleventh subdivision of the conditions of the policy that “ if there appear any fraud or false swearing, the assured shall forfeit all claim under this policy.” At folio 104 of the case, the defendant offered to prove false swearing on the part of Royal Tallman in support of his claim for loss under the policy, and the court excluded the evidence on the ground of immateriality, and the defendant excepted. This ruling of the court, assuming the policy to be valid,-we deem clearly erroneous. Evidence which has a legitimate tendency to satisf) the jury that the contract was broken is properly admissible, and its exclusion is sufficient ground to reverse the judgment. (Boyle agt. Coleman, 13 Barb. 42 ; Anthoine agt. Coit, 2 Hall Sup. C. R. 40; Lytle agt. Erwin, 26 How. 491; Lockwood agt. Thorne, 18 N. Y. R. 286 ; Id. 293.)
VI. The court erred in overruling the defendant’s objection to the admissibility of the proofs of loss'furnished by Wm. C. Brown, and in admitting such proofs in evidence against defendant’s several objections, especially in view of immediate notice to Mr. Brown that such proofs would not be accepted. The court also erred in admitting the proofs of loss furnished by Sturtevant, Son & Co., as they were not the party' insured. No proofs were offered by Sturtevant, Sons & Co., but only by Mr. Brown and Sturtevant, Son & Co., entirely different parties- from those insured.
VII. The court erred in denying defendant’s motion for a nonsuit at the close of the evidence on each of the several grounds claimed, and also erred in refusing to charge the jury as requested by defendant, but especially in refusing to charge that the neglect of Sturtevant, Sons & Co. to notify the defendant of their qualified interest in the property at the time of effecting the insurance, avoided the policy, and in refusing to charge that if the renewal receipt of 1863 was issued without the authority or assent of the assured, their verdict should be for the defendant. That the execution of the chattel mortgage was without notice to the defendant. These were questions of fact for the jury, and their withdrawal from the jury was error.
VIII. We are not unconscious of the uniform tendency of our courts to lean towards the plaintiff in actions arising on policies of insurance, often with the view of protecting innocent persons from loss growing out of carelessness in effecting ■ the insurance, or in doing some other act not in strict technical compliance with the letter of the contract of insurance. However, in this case there is a total Avant of compliance Avith the spirit as Avell as the letter of the contract. The title of the assured in the property Avas conditional; the assured neglected to disclose their true interest, although bound under pain of avoidance to do so. They contracted that in case of any additional insurance, either by themselves of any other person or parties, Avithout the same being indorsed on the policy, or otherwise acknoAvledged by defendant in writing, the policy shall cease and be of no further effect. The plaintiff in this action effected other large insurances on the property. They contracted that in case of “ any sale,- transfer or change of title in the property insured by this company, such insurance shall be void and cease.” Yet notwithstanding this plain agreement, they convey the one to the other, and mortgage to a stranger, without notice; suffer a. foreclosure under the mortgage, see other and different persons in the actual possession of the property, neglect to give any notice to the company, propose the one to the other to feloniously burn the property, come into court and by accident or the exhaustion of the jury obtain only a Scotch verdict.on the question of felonious burning. It is a case devoid of merit, and a judgment contrary to law, and should be reversed.
Foote & Magone, for plaintiff and respondent.
1. The purchaser under an executory contract of purchase is in law the owner, and has an insurable interest therein. (Ætna Insurance Company agt. Tyler, 16 Wend. 385 ; McGivney agt. Phoenix Insurance Company, 1 Wend. 85; Phillips on Insurance, §§ 174 and 180.)
2. A part)' effecting an insurance is not required to disclose the ownership unless “specially” requested by the company, and will recover according to his “ real ” interest. (Kernochen agt. The N. Y. Bowery Ins. Co. 17 N. Y. Rep. 428; Niblo agt. The N. A. Fire Ins. Co. 1 Sand. 551 N. Y. Superior Court; 18 Pick. Mass. 419.)
3. It is in proof that the state of the title was known to the agent, and disclosed to him by the payee of the policy at the time of effecting the insurance, and the nonindorsement of the state of the title on the policy was a waiver. (Ames agt. The N. F. Union Ins. Co. 14 N. F. Rep. 253; McEwen agt. The Montgomery Insurance Co. 5 Hill, 101; Goit agt. National Ins. Co. 25 Barb. 189 ; N. F. Superior Court, 4 Bosworth, 179; Wilson agt. Genesee Ins. Co. 16 Barb. 511.) “ An insurance company is chargeable with knowledge of all the facts stated by the applicant for insurance to the Company’s agent respecting the applicant’s title and interest in the premises.” (Hodgkins agt. The Montgomery Ins. Co. 34 Barb. 213; Ames agt. The N. F.
Union Ins, Co. 14 N. Y. Rep. 253.) The agent acts for the company in communicating with the assured, and facts known to him are presumed to be known to the company, so far as such knowledge is necessary to the validity of the insurance (1 Phillips, § 556). Denio, J. (19 N. Y. Rep. at page 182), says : “ There is much greater latitude in applying a policy of insurance to the interest intended to be covered ’ than in other, contracts;” and in Bidwell agt. The North Western Ins. Co. (24 N. Y. Rep. p. 303), Gould, J. says : “ When not contradictory to the terms of the policy, it may be shown whose ’ property it was intended to cover, and what ‘property’ or ‘ interest ’ it was intended to cover.”
4. The respondent under the testimony would have been entitled to relief, and to have had the state of the title indorsed on the policy, had it been necessary for his recovery, even on the trial, and without a prayer to that effect. (N. Y. Ice Company agt. North Western Ins. Co. 23 N. Y. Rep. 351, in opinion of Comstock, J.; Quick agt. Stuyvesant, 2 Paige, 84; Story on Contracts, § 641.)
II. The interest of the agent, in order to defeat the policy, should .be a legal and insurable interest, and not a mere expectation; and it should be an interest sought to be covered by the policy (Phillips on Insurance, § 183). The agent had had such an interest as assignee, but had sold it to Brown.
Ill: The reply to the appellant’s exception, that the insurance was renewed without the authority of the assured, is answered by this,
1. That the preliminary proofs were made by Sturtevant, Son & Co., representing the insurable interest of Sturtevant, Sons & Co., and the policy thereby ratified and adopted. Schedule No. 7, fol. 112 ; Phillips on Ins. § 390).
2. The same was done by the payee, who held the covenants of Sturtevant, Sons & Co., to maintain such insurance for him (Exhibit B, fol. 166).
3. All of the co-partners were witnesses, and two of them called by the appellant, yet no testimony was offered by them that they did not authorize or request Tallman to pay for such insurance.
4. The appellant was in law justly refused the right to question the proper renewal of the policy, as bound by his contract, in the hands of the party in interest.
IV. The transfer by the retiring member of a firm to the remaining copartners of his interest in property insured, is not such a sale and transfer as contemplated by the conditions of the policy (Wilson agt. Genesee Mu. Ins. Co. 16 Barb. 511). But otherwise, if a new member had been introduced into the firm (Bey agt. Poughkeepsie Mu. Ins. Co. 23 Barb. 623).
2. The proof being that the partner had retired prior to the renewal, such renewal would inure to the remaining firm, if the retiring partner had not retained his insurable interest; much more where his insurable interest still subsisted, as in this case (See authorities cited below).
3. The partnership was dissolved as between the partners inter se, but not as between them and the payee of the policy, Wm. C. Brown, for their joint indebtedness to Brown still existed (see testimony of Brown at folio 70), and their joint insurable interest remained while their indebtedness to him remained (Buffalo Steam Engine Works agt. The Sun Mu. Ins. Co. 17 N. Y. Rep. 402, in opinion of court).
V. The 5th exception taken (fol. 145), by appellant, that the subsequent insurance effected by Tallman, if without notice to the defendant, vitiated the policy, is not tenable in law, as Tallman was only a mortgagee at best. (Buffalo Steam Engine Works, 17 N. Y. Rep. 402; Mtna Ins. Co. agt. Tyler, 16 Wend. 385 ; Kenny agt, Clarkson, 1 John. 385.)
2. Any mortgagee has the right to insure the property mortgaged on his own motion, and that without vitiating the policy of the mortgagor in his own hands, much less in the hands of his assignee, as in this case. The contrary doctrine would be monstrous. The policj'- of the mortgagor or of his assignee would be vitiated only, where the mortgagor himself was a party to such subsequent insurance. Double insurance exists only where the insurable interests are identical.. The policy issued by the appellant was on the property ; the policies to Tallman were nominally on the property, but in fact were only upon his interest, and he was not bound to give notice even to his own insurers, much less to the insurers of the mortgagor, nor supposed to know of that insurance. (Columbian Ins. Co. agt. Lynch, 11 John. 232 ; Mutual Safety Ins. Co. in Error agt. Hone, 2 Comstock, 235.)
3. The proofs were clear and distinct that the agent had notice ; that he was the agent of all the underwriters ; that he stated such other insurance in writing, but for the reasons in law last above -stated, reference to authorities on these heads is omitted, as not deemed important or necessary.
VI. The 6th request of appellant’s counsel to charge the jury was founded on the 7th condition of the policy (last clause), folio 43.
1. A mortgage is not such a sale of property as is contemplated in the condition. (Conover agt. The Sun Ins. Co. 1 N. Y. Rep. 290; Shotwell agt. The Jefferson Ins. Co. N. Y. Superior Court, 5 Bosw. 247.)
2. A chattel mortgage is not even a conditional sale, it gives only an interest coupled with a power of sale, and through a chattel mortgage the mortgagee cannot acquire the title as purchaser under it. (17 N. Y. Rep. 402, cited below in opinion of court; 1 N. Y. Rep. 290, cited ante.)
VII. The appellant asked in his 7th exception (fol. 146) that the sale of the mortgaged property by Tallman, the mortgagee, to himself, should vitiate the policy. This was founded on the 7th condition of the policy, (fol. 43), and the court rightly refused to charge as requested; for,
1. Such sale did not destroy the insurable interest of the mortgagors.
2.. It did not transfer the title to Tallman, as he was only a mortgagee notwithstanding such sale ; and,
3. If any other person besides the mortgagee had become the purchaser, it would have foreclosed only the equity of redemption of the mortgagors so far; the nominal title would still have been in Brown, and while the indebtedness of Sturtevant, Sons & Go. to Brown remained unpaid, and an obligation on and against them, the “ insurable interest” of Sturtevant, Sons & Co., would have still remained to the extent of that obligation and indebtedness (see their covenants, folio 168, and the testimony of Brown at folio 70), and the policy would have been sustained to the extent of the indebtedness, had the policy been for so large an amount. This point and its subdivisions are all clearly stated and settled by the court of appeals in 17 N. Y. Rep. 402, Buffalo Steam Engine Co. agt. The Sun Mutual Ins. Co., see the opinion of court, and see also The JEtna Ins. Co. agt. Tyler, 16 Wend. 385.
VIII. The appellant’s at folio 147, 8th exception to the charge, claim that the policy was void for the reason that Sturtevant, Sons & Co., had no insurable interest at the time of the loss. This point is sufficiently answered in the respondent’s last point to wit: that the insurable interest remained while the covenants and indebtedness remained. (See the contract, fol. 166; see assignment, fol. 170; see Brown's testimony, fol..70; see 17 JY. Y. Rep. 402, cited ante, particularly; Phillips on Insurance, § 287 ; Gordon agt. Mass. Fire and Marine his. Co. 2 Pick. 249 ; JEtna Ins. Co. agt. Tyler, 16 Wend. 385.)
By the court, Potter, J.
It was an express provision of the contract of insurance in this case, and so expressed in the policy, that “ in case of. any sale, transfer or change of title in the property insured, such insurance shall he void and cease.” The title of the insured property, as well as the possession of it, was changed from “ Sturtevant, Son & Co.” to the plaintiff, on the 18th day of April, 1863, prior to the loss by fire, which was on the 9 th day of May following. There is no evidence in the case of the defendant’s waiver of or consent to this change of' title. The insured could not assign without the consent of the defendant. There is no evidence in the case that Sturtevant, Sons & Co. at the time of the fire had any interest in the insured property. As was said by the court of appeals in Grosvenor agt. The Atlantic lire Insurance Company of Brooklyn (17 N. Y. R. 392), “ The contract of insurance is a contract of indemnity. To sustain such an action upon such a contract, it must appear that the party insured has sustained a loss. This involves the necessity of an insurable interest at the time of the alleged loss.” This contract was made by the defendants Avith Sturtevant, Sons & Co., without any express contract Avritten on the face of the policy, and by the well settled law of insurance, the assurer must have an interest .at risk, not only at the time of issuing the policy, but at the time of loss. If he have nó such interest, there is nothing to be indemnified for (1 Phillips on Insurance, • 115, §§ 172,175). It must be such an interest that the peril may have a direct effect - upon it, instead of a remote, circuitous or consequential effect. It is not sufficient even that the party have an insurable interest in the property; he must have such an interest as the contract specifies (Bidwell agt. North Western Ins. Co. 18 N. F. R. 179). I give no importance to the evidence that one of the firm of Sturtevant, Sons & Co., had previously transferred his interest to another member of the same firm. No stranger,. not of the persons insured was brought in ; this does not come AAllthin the reason of the principle, as if the .transfer was to a stranger.. (16 Barb. 511; 23 Id. 623.) Nor does the fact that Judge Brown had an insurable interest in the property, and that the loss (if any) was payable to him, change this principle. Sturtevant, Sons & Co.” at the time of the contract had an insurable interest in. the property; it was that interest, no other, not Brown’s that was insured. Brown might have insured his own interest, but he did not; he was content to take an assignment of the indemnity given to “ Sturtevant, Sons & Co.” upon their insurable interest. That was his contract. He consented to take the hazards incident to the contract made by the policy, and dependent upon the conditions therein expressed, to be observed by the insured, and to the law affecting that contract.
The plaintiff in this action succeeded to Brown’s rights, but succeeded also, subject to all the contingencies to which Brown’s contract ivas liable. The loss, if any, was payable to Brown only, upon conditions that the insured sustained loss, having fully kept their contract. This question was directly raised on the trial by the 7th and 8th propositions of the defendants’ counsel, on motion for non-suit, at the end of the testimony. The seventh proposition was as follows : “ That the sale of .the property under the power contained in the mortgage to John E. Tallman, and possession thereof by him without such notice, avoided the policy.” The eighth proposition to non-suit was as follows: “ That the policy is void, because the assured had no interest in the property insured at the time of the loss.” This eighth proposition is but the sequence of the seventh, or they may be regarded together as one. These propositions are repeated in substance by the defendants’ counsel in his requests to the court to charge the jury as follows : The defendants’ counsel asked the court to charge the jury:
6th. That the execution of the chattel mortgage “ by ‘Sturtevant, Sons & Co.,’ to John E. Tallman, without notice to the defendants, or their assent obtained, avoided the policy, and their verdict should be for the defendant.”
7th. That the sale of the mortgaged property under “the power contained in the mortgage to John E. Tallman, and possession by him without notice to the insurer, avoided the policy, and their verdict should be for the defendant.”
8th. “ From the uncontradicted evidence in the case, the assured, ‘ Sturtevant, Sons & Co.,’ had no interest in the property at the time of the loss by fire, and therefore the policy was void, and their verdict should, be for the defendant.”
The learned judge refused to non-suit upon each of the foregoing propositions for that purpose, and refused to charge the jury as requested in each of the above requests. To the refusal upon each of said propositions to non-suit and refusal to charge, and upon each of the requests to charge as above, the counsel for the defendants excepted. A verdict was rendered for the plaintiff for the amount of the last renewal receipt, with interest, amounting to $1,056.78. There were various exceptions to rulings in the case less important than those we have reviewed, and most of which were not well taken. If we are correct in the views we have taken of the law of insurance upon the question above reviewed, there must be a new trial for the errors we have shown.
With no disposition to favor mere technical objections taken by those corporations who thus grant these indemnities against loss, we are bound to declare the law as we find it. Contracts must be enforced, and undertakings executed according to principles of natural justice, and contracts for insurance are not exceptions to the rule. Insurance companies have a right to claim the same uniformity in the rule of construction of their contracts from the courts which is accorded to contracts with all other parties, and the courts must grant it.
There should, I think, be a new trial, with costs to abide the result. | CASELAW |
Page:History of England (Froude) Vol 3.djvu/518
498 three hundred men bestowed. The next day after, at twelve o'clock at noon, by means of them in the town, they entered the castle, and killed the captain and eighteen soldiers which were within with him, and by-and-by the town yielded unto them; wherein they have abatred King Ferdinand's arms, and set up the French King's arms, displaying banners with white crosses, and have sent hither to the French King one called Spagnoletto, with letters signifying unto him that the town is at his commandment. This Spagnoletto arrived here upon Saturday at night; and upon Sunday, after dinner, the French King sent for the Emperor's ambassador, for the ambassador of Venice, and the Bishop of Rome's ambassador, and, calling them together, said he had received letters from Turchetto signifying this enterprise, and that they within the town were contented to surrender the town unto him; so he would certify them of his contentation therein before a certain day, and that otherwise they would surrender the town to the Grand Signor. And then the French King excused himself, protesting it was done without his knowledge, and that he was sorry therefor. Nevertheless, the case standing thus, he desired their advice, whether he should take it or no, or else suffer them to give it to the Grand Signor. The ambassadors of Venice and Rome said it were better that his Highness took it. The Emperor's ambassador answered that he should do well first to hang him that brought the letter, and then to do what he could to hang them that took the town like thieves, and to cause the | WIKI |
Page:Timon of Athens (1919) Yale.djvu/138
126 466). The rest of the scene is probably interpolated (467-545). The first scene of the fifth act with the possible exception of the introduction (1-59) was written by Shakespeare. The second and fourth scenes are likewise his; only the third scene bears no trace of his workmanship.
Concerning the double authorship of Timon of Athens there have arisen three distinct theories:
(1) Timon of Athens of the Folio represents Shakespeare's work as interpolated and corrupted by the players. In his lectures of 1815, Coleridge stated his belief that the play was Shakespeare's throughout, and that when first written it was one of the Poet's most complete performances. He explained the un- | WIKI |
FMS-like tyrosine kinase 3 ligand
Fms-related tyrosine kinase 3 ligand (FLT3LG) is a protein which in humans is encoded by the FLT3LG gene.
Flt3 ligand (FL) is a hematopoietic four helical bundle cytokine. It is structurally homologous to stem cell factor (SCF) and colony stimulating factor 1 (CSF-1). In synergy with other growth factors, Flt3 ligand stimulates the proliferation and differentiation of various blood cell progenitors. For example, it is a major growth factor stimulating the growth of dendritic cells.
FLT3L functions as a cytokine and growth factor that increases the number of immune cells (lymphocytes (B cells and T cells)) by activating the hematopoietic progenitors. It acts by binding to and activating FLT3 (CD135) which is found on what (in mice) are called multipotent progenitor (MPP) and common lymphoid progenitor (CLP) cells. It also induces the mobilization of the hematopoietic progenitors and stem cells in vivo which may help the system to kill cancer cells.
FLT3L is crucial for steady-state plasmacytoid dendritic cell (pDC) and classical dendritic cell (cDC) development. A lack of FLT3L results in low levels of dendritic cells.
In parasite clearance
FLT3L and its receptor are involved in the mammalian immune response to malaria. In strains of plasmodium, FLT3L was shown to be released from mast cells and cause the expansion of dendritic cells, leading to the activation of CD8+ T cells. The same paper suggested that FLT3L release was caused by stimulation of mast cells with uric acid, produced from a precursor secreted by the plasmodium parasite. .
In immunotherapy
In situ vaccine (ISV), combining Flt3L, local radiotherapy, and a TLR3 agonist (poly-ICLC), could recruit, antigen-load and activate intratumoral cross-presenting dendritic cells (DCs) in indolent non-Hodgkin’s lymphomas (iNHLs) treatment (clinical trial: NCT01976585). In this study, intratumoral Flt3L was able to (1) induce the accumulation of large numbers of TLR3+ DCs in the tumor and (2) mediate, together with local irradiation, cross-presentation of TAA by DCs in vitro and in vivo. | WIKI |
Page:Jewish Encyclopedia Volume 2.pdf/321
283 283
THE JEWISH ENCYCLOPEDIA
as penalty for one's sins, according to Dent. xxv. 3, while reciting the Confession of Sins. (See Mazhor Vitry, p. 344;
KolBo,
lxviii.
,
"Malkut."
2.
pure in both body and soul before
God on "the great day." The Karaite Day of Atonement with
Shulhan 'Aruk, Orah
Day of Atonement 1.
man may appear
Atonement
in the Synagogue (Center). "Teshubah." 3. Visiting the graves.
its
liturgy
Rites on Preceding Day (Surrounding). 4. " Zedakah " in graveyard. 5. " Kapparah."
(From Bodeoschatz, " Kirchllche Verfassung.)
Hayyim,
607.) According to Benjamin II., I.e., peope in Persia strip themselves to the loins in order to receive these stripes on the naked bodj r (see Malkut
Schlagen).
This
is
followed by bathing, so that
is to a great extent similar to that of the Rabbinite Jews. It also begins half an hour before sunset of the preceding day, and lasts until half an hour after sunset of the day itself (see Karaites). | WIKI |
Boeomimetes
Boeomimetes is a genus in the beetle family Carabidae. There are about five described species in Boeomimetes, found in Africa.
Species
These five species belong to the genus Boeomimetes:
* Boeomimetes atratus Péringuey, 1896 (Zimbabwe, Namibia, and South Africa)
* Boeomimetes confusus Basilewsky, 1948 (Botswana, Namibia, and South Africa)
* Boeomimetes ephippium (Boheman, 1860) (Mozambique, Zimbabwe, Botswana, Namibia, and South Africa)
* Boeomimetes jeanneli Basilewsky, 1946 (Somalia, Kenya, and Tanzania)
* Boeomimetes somalicus Basilewsky, 1964 (Somalia, Tanzania, Angola, Zimbabwe, Botswana, and Namibia) | WIKI |
Page:The Present State of Peru.djvu/245
Rh was peculiar to the assemblies and social parties; but, considered as a domestic refreshment, it has at length lost all its credit.
In the above-cited year a coffee-house was opened in the street, of Santo Domingo, and was considered as a singular novelty. It was followed, at the commencement of 1772, by another establishment of a similar nature. They were fully approved by the viceroy, who was persuaded that they would have a direct tendency to benefit society. It is certain, at least, that assemblies in coffee-houses, conducted with the moderation, decency, and propriety, which mark the disposition of the Peruvians, serve to unite man to man, to produce a uniformity of character, to augment the circulation and resources of subsistence, to contribute to the convenience of those who dwell in the vicinity, and to afford them an innocent recreation. The city did not, however, witness without repugnance the introduction of this custom. Another coffee-house was, notwithstanding, opened by the original projector in 1775; and was so successful that, on the following year, he ventured on a new speculation of the same kind, and made choice of a more commodious and centrical situation. This last establishment is at the present time the most flourishing.
By degrees the above coffee-houses became so much frequented, at the same time that the gains of the keepers were supposed to be very considerable, as to suggest the idea of two others, one of which was opened in 1782, and the other in 1788. In each coffee-house there is a billiard-table, a species of amusement which would be less censurable, if admittance were to be denied to young men of family, and to youths who are | WIKI |
1940s Dispatches From the Land of Wynken, Blynken and Noir
On DVD The highly aestheticized films noir of the 1940s were, in effect, Hollywood’s avant-garde. Many drew on German Expressionism. Others were more surreal. And while many were characterized by a hard-boiled naturalism, there were some — like Robert Siodmak’s “Phantom Lady” (1944) or Edgar G. Ulmer’s “Detour” (1945) — that were blatantly dreamlike. “The Chase” (1946), adapted from a novel by the crime writer Cornell Woolrich (also the source for “Phantom Lady”), is one such noir, a miasma in which more than one character seems to suffer from amnesia and the narrative structure suggests a dream within a dream. Circulating for decades in murky public domain prints and homemade DVDs, it has now been restored by the U.C.L.A. Film & Television Archive and reissued by Kino on disc. Much of “The Chase” is set inside the malaria-muddled mind of its protagonist, Chuck Scott (Robert Cummings), who, like many a noir antihero, is a veteran of World War II. Back home and at loose ends, he is introduced standing outside a Miami luncheonette, hungrily watching a cook flip pancakes, when, as if by magic, a wallet materializes at his feet. Seizing destiny, Scott dutifully returns the wallet. The owner turns out to be a moody gangland type, Eddie Roman (Steve Cochran), holed up in a blazingly white palazzo along with an abundance of Baroque statues and a sinister sidekick (Peter Lorre). Roman, who keeps a killer dog loose in his basement and his beautiful, unhappy wife (Michèle Morgan) on a tight leash, hires Scott as his chauffeur. In addition to allowing the boss to control the car’s speed from the back seat, Scott’s duties include driving Mrs. Roman to an empty pier from which she can stare disconsolately out at the surf. His gallantry soon trumps loyalty to his employer, and the scene shifts abruptly to a boat bound for Havana. There the nightmare begins. “The Chase” is nothing if not arty. Mrs. Roman is dressed and posed as if she were one of the subjects of Cecil Beaton’s Surrealist-inflected Vogue portraits while, en route to Cuba, Scott reveals a hitherto unsuspected talent for banging out Rachmaninoff-ian riffs on the stateroom piano. (The Russian opera diva Nina Koshetz, an actual associate of Rachmaninoff, has a small but vivid part as the proprietor of a Havana curio shop.) The director, Arthur Ripley, orchestrates a number of wordless stretches and makes strategic use of rear-screen projection to position Ms. Morgan before an oceanic void. With its sometimes glacial pacing and abrupt changes in location, the movie looks forward to the European art cinema of the 1960s. “The predilection of the director, producer and scenarist for the unusual in mood, background music and characterization makes this chase more confusing than suspenseful,” a film critic for The New York Times wrote in 1946. Credit the producer Seymour Nebenzal, who had a distinguished career in Weimar Germany and a sketchier one in Hollywood, making ambitious pictures on tight budgets. He preceded “The Chase” — possibly the strangest of the nine Hollywood films competing for a prize at the second Cannes Film Festival — with Douglas Sirk’s first two American movies and followed it with the Maria Montez vehicle “Siren of Atlantis” and a remake of his German triumph, “M.” If Mr. Nebenzal’s was the strongest artistic personality associated with “The Chase,” its greatest champion has been the Canadian filmmaker Guy Maddin. Mr. Maddin, who compares “The Chase” to David Lynch’s “Blue Velvet,” supplies a commentary filled with love for the movie — not least its battered condition prerestoration. Reflecting on one actor’s demise, he impulsively declares that “it would be an honor to keel over talking about ‘The Chase.’” “Dark Passage” (1947), reissued on Blu-ray by Warner Archive, is another dreamlike noir predicated on and inspiring mad passion. In his book “Le Surréalism au Cinéma,” the French critic Ado Kyrou calls it “sublime.” Escaping from San Quentin, where he has been unjustly imprisoned for murdering his wife, the hero (Humphrey Bogart) is rescued and sheltered by a sultry gal of mystery (Lauren Bacall). The film is the third that Mr. Bogart and Ms. Bacall, who married in 1945, made together, and their banter — some of which might as well have been lifted from “To Have and Have Not” or “The Big Sleep” — has a relaxed quality. For much of the movie, however, Mr. Bogart is heard but not seen. Employing a device Robert Montgomery used only months earlier in “Lady in the Lake” (1947), the writer-director Delmer Daves employs a subjective camera to present the fugitive’s point of view. Roughly midway through, he gets plastic surgery, and an hour into the movie, the bandages finally come off his face — it’s Bogie! (Ms. Bacall approves.) Although less shadowy than the Havana created for “The Chase,” San Francisco — where much of “Dark Passage” was shot — is also a labyrinth inhabited by monsters. Just as Mr. Cummings was hunted for a crime he did not commit, so Mr. Bogart is hassled by cops and witnesses searching for him (his new face notwithstanding). The two most deadly are a malignly histrionic Agnes Moorehead and an impressively creepy Clifton Young (a bucktoothed graduate of many “Our Gang” comedies). Adapted from David Goodis’s novel, “Dark Passage” is a movie of strange coincidences and occult connections. The least of these is the repeated use of “Too Marvelous for Words,” a ballad by Johnny Mercer and Richard Whiting. The most electrifying, singled out by Mr. Kyrou for its “exaltation of total love,” is the transition from a San Francisco bus station to a nightclub overlooking the Pacific, somewhere in Peru. As with “The Chase,” it’s unclear whether the protagonist has awakened from one dream or entered into another. NEWLY RELEASED CITY OF WOMEN Federico Fellini ponders feminism, and Marcello Mastroianni dreams a dream in this phantasmagorical comedy. “Though the film is overlong, even for a Fellini aficionado, it is spellbinding, a dazzling visual display that is part burlesque, part satire, part Folies-Bergères and all cinema,” Vincent Canby wrote in The New York Times in 1981. Available on Blu-ray and DVD. (Cohen Media) MANHUNTER The cannibal Hannibal Lecter made his screen debut in Michael Mann’s 1986 adaptation of Thomas Harris’s “Red Dragon.” “The movie drives along with such intensity for much of the time that you can just let it work on your senses without worrying about whether it makes sense,” Walter Goodman wrote in The Times. Reissued on Blu-ray with both the theatrical and director’s cuts. (MGM/Scream) THE NAKED ISLAND The Japanese director Kaneto Shindo uses no dialogue to depict a farming family’s daily struggle irrigating its meager crop with water brought by boat. Initially released as “The Island,” Shindo’s 1960 existential parable was an art-house hit; the New York Times critic Bosley Crowther mistakenly deemed it a documentary,comparable to “Nanook of the North.” On Blu-ray and DVD. (Criterion) WHERE THE SIDEWALK ENDS Otto Preminger reunited the “Laura” stars Dana Andrews and Gene Tierney in this tough and visually impressive 1950 police thriller, reissued on Blu-ray. Writing in The Times, Mr. Crowther declared that “Mr. Preminger’s megaphoning and some expert photography have resulted in a most vivid blend of action and New York City backgrounds.” (Twilight Time) WOMAN ON THE RUN A rare film noir with a female protagonist, Norman Foster’s taut 1950 B-movie sends Ann Sheridan on a desperate mission through nocturnal San Francisco. Reviewing it in The Times, Mr. Crowther rated it “several notches above the usual cops-and-corpses contributions from the Coast.” The restoration, by the U.C.L.A. Film & Television Archive, in a Blu-ray/DVD dual format edition, is also impressive. (Flicker Alley) | NEWS-MULTISOURCE |
Skip to main content
[ "article:topic", "limiting reagent", "Limiting Reagents", "showtoc:no", "mole-mass calculation", "mass-mass calculation", "license:ccbyncsa" ]
Chemistry LibreTexts
5.7: Limiting Reagents
• Page ID
65010
• Learning Objectives
• Identify a limiting reagent from a set of reactants.
• Calculate how much product will be produced from the limiting reagent.
• Calculate how much reactant(s) remains when the reaction is complete.
One additional assumption we have made about chemical reactions—in addition to the assumption that reactions proceed all the way to completion—is that all the reactants are present in the proper quantities to react to products; this is not always the case. In Figure \(\PageIndex{2}\) we are taking hydrogen atoms and oxygen atoms (left) to make water molecules (right). However, there are not enough oxygen atoms to use up all the hydrogen atoms. We run out of oxygen atoms and cannot make any more water molecules, so the process stops when we run out of oxygen atoms.
Figure \(\PageIndex{2}\): Making Water. In this scenario for making water molecules, we run out of O atoms before we use up all the H atoms. Similar situations exist for many chemical reactions when one reactant runs out before the other.
A similar situation exists for many chemical reactions: you usually run out of one reactant before all of the other reactant has reacted. The reactant you run out of is called the limiting reagent; the other reactant or reactants are considered to be in excess. A crucial skill in evaluating the conditions of a chemical process is to determine which reactant is the limiting reagent and which is in excess.
The key to recognizing which reactant is the limiting reagent is based on a mole-mass or mass-mass calculation: whichever reactant gives the lesser amount of product is the limiting reagent. What we need to do is determine an amount of one product (either moles or mass) assuming all of each reactant reacts. Whichever reactant gives the least amount of that particular product is the limiting reagent. It does not matter which product we use, as long as we use the same one each time. It does not matter whether we determine the number of moles or grams of that product; however, we will see shortly that knowing the final mass of product can be useful.
For example, consider this reaction:
\[4As(s) + 3O_2(g) → 2As_2O_3(s)\]
Suppose we start a reaction with 50.0 g of As and 50.0 g of O2. Which one is the limiting reagent? We need to perform two mole-mass calculations, each assuming that each reactant reacts completely. Then we compare the amount of the product produced by each and determine which is less.
The calculations are as follows:
\[50.0\cancel{g\, As}\times \frac{1\cancel{mol\, As}}{74.92\cancel{g\, As}}\times \frac{2\, mol\, As_{2}O_{3}}{4\cancel{mol\, As}}=0.334\, mol\, As_{2}O_{3}\]
\[50.0\cancel{g\, O_{2}}\times \frac{1\cancel{mol\, O_{2}}}{32.00\cancel{g\, O_{2}}}\times \frac{2\, mol\, As_{2}O_{3}}{3\cancel{mol\, O_{2}}}=1.04\, mol\, As_{2}O_{3}\]
Comparing these two answers, it is clear that 0.334 mol of As2O3 is less than 1.04 mol of As2O3, so arsenic is the limiting reagent. If this reaction is performed under these initial conditions, the arsenic will run out before the oxygen runs out. We say that the oxygen is “in excess.”
Identifying the limiting reagent, then, is straightforward. However, there are usually two associated questions: (1) what mass of product (or products) is then actually formed? and (2) what mass of what reactant is left over? The first question is straightforward to answer: simply perform a conversion from the number of moles of product formed to its mass, using its molar mass. For As2O3, the molar mass is 197.84 g/mol; knowing that we will form 0.334 mol of As2O3 under the given conditions, we will get
\[0.334\cancel{mol\, As_{2}O_{3}}\times \frac{197.84\, g\, As_{2}}{\cancel{1\, mol\, As_{2}O_{3}}}=66.1\, g\, As_{2}O_{3}\]
The second question is somewhat more convoluted to answer. First, we must do a mass-mass calculation relating the limiting reagent (here, As) to the other reagent (O2). Once we determine the mass of O2 that reacted, we subtract that from the original amount to determine the amount left over. According to the mass-mass calculation,
\[50.0\cancel{g\, As}\times \frac{1\cancel{mol\, As}}{74.92\cancel{g\, As}}\times \frac{3\cancel{mol\, O_{2}}}{4\cancel{mol\, As}}\times \frac{32.00\, g\, O_{2}}{\cancel{1\, mol\, O_{2}}}=16.0\, g\, O_{2}\; reacted\]
Because we reacted 16.0 g of our original O2, we subtract that from the original amount, 50.0 g, to get the mass of O2 remaining:
50.0 g O2 − 16.0 g O2 reacted = 34.0 g O2 left over
You must remember to perform this final subtraction to determine the amount remaining; a common error is to report the 16.0 g as the amount remaining.
Example \(\PageIndex{1}\):
A 5.00 g quantity of Rb are combined with 3.44 g of MgCl2 according to this chemical reaction:
\[2R b(s) + MgCl_2(s) → Mg(s) + 2RbCl(s) \nonumber\]
What mass of Mg is formed, and what mass of what reactant is left over?
Solution
Because the question asks what mass of magnesium is formed, we can perform two mass-mass calculations and determine which amount is less.
\[5.00\cancel{g\, Rb}\times \frac{1\cancel{mol\, Rb}}{85.47\cancel{g\, Rb}}\times \frac{1\cancel{mol\, Mg}}{2\cancel{mol\, Rb}}\times \frac{24.31\, g\, Mg}{\cancel{1\, mol\, Mg}}=0.711\, g\, Mg \nonumber \]
\[3.44\cancel{g\, MgCl_{2}}\times \frac{1\cancel{mol\, MgCl_{2}}}{95.21\cancel{g\, MgCl_{2}}}\times \frac{1\cancel{mol\, Mg}}{1\cancel{mol\, MgCl_{2}}}\times \frac{24.31\, g\, Mg}{\cancel{1\, mol\, Mg}}=0.878\, g\, Mg \nonumber \]
The 0.711 g of Mg is the lesser quantity, so the associated reactant—5.00 g of Rb—is the limiting reagent. To determine how much of the other reactant is left, we have to do one more mass-mass calculation to determine what mass of MgCl2 reacted with the 5.00 g of Rb and then subtract the amount reacted from the original amount.
\[5.00\cancel{g\, Rb}\times \frac{1\cancel{mol\, Rb}}{85.47\cancel{g\, Rb}}\times \frac{1\cancel{mol\, MgCl_{2}}}{2\cancel{mol\, Rb}}\times \frac{95.21\, g\, Mg}{\cancel{1\, mol\, MgCl_{2}}}=2.78\, g\, MgCl_{2}\: \: reacted \nonumber \]
Because we started with 3.44 g of MgCl2, we have
3.44 g MgCl2 − 2.78 g MgCl2 reacted = 0.66 g MgCl2 left
Exercise \(\PageIndex{1}\)
Given the initial amounts listed, what is the limiting reagent, and what is the mass of the leftover reagent?
\[\underbrace{22.7\, g}_{MgO(s)}+\underbrace{17.9\, g}_{H_2S}\rightarrow MgS(s)+H_{2}O(l) \nonumber \]
Answer
H2S is the limiting reagent; 1.5 g of MgO are left over.
Summary
The limiting reagent is that reactant that produces the least amount of product. Mass-mass calculations can determine how much product is produced and how much of the other reactants remain. | ESSENTIALAI-STEM |
Jack Dempsey (American football)
John Bernard Dempsey (March 12, 1912 – August 26, 1988) was an American football tackle who played for the Pittsburgh Pirates and Philadelphia Eagles of the National Football League. He played college football at Bucknell University for the Bucknell Bison. | WIKI |
Carctol
Carctol is an ineffective cancer treatment made by mixing eight Indian herbs. First promoted in 1968 by Nandlal Tiwari, it gained widespread popularity in United Kingdom.
Carctol has been aggressively marketed as being able to treat cancer and reduce the side-effects of chemotherapy. However, there is no medical evidence that it has any benefits whatsoever for people with cancer.
Background
Carctol is a herbal dietary supplement marketed with claims it is based on traditional ayurvedic medicine. Its ingredients include Hemidesmus indicus, Tribulus terrestris, Piper cubeba, Ammani vesicatoria, Lepidium sativum, Blepharis edulis, Smilax china, and Rheum australe (syn. R. emodi).
It was In 2009, Edzard Ernst wrote that it was still promoted in the United Kingdom; public relations companies hired by its sellers had garnered it wide coverage on the web and, according to the British Medical Journal, in the media generally.
Criticism
Edzard Ernst has noted a complete absence of any form of scientific evidence to assert that carctol is any beneficial to cancer patients. A few studies about the chemical composition of carctol along with inconclusive surveys of patients who used it were noted to be published in non-peer reviewed journals.
Cancer Research UK say of carctol, "available scientific evidence does not support its use for the treatment of cancer in humans".
Harriet A. Hall includes carctol among the biologically-based remedies promoted by naturopaths. Hall laments that frauds and quacks persistently try to take advantage of the vulnerability of cancer patients. | WIKI |
User:Alexcox
I am a film director and writer; my Wikipedia interests were initially filmic but have expanded to include aspects of nuclear war policy. I remain in favour of free stuff and the GPL and you are welcome to republish my contributions under the GFDL. | WIKI |
Frankincense also known as “olibanum” is a dried resin produced from the frankincense tree. When the bark of the tree is stripped, the sap called as the tears are collected and utilized for many purposes. In the ancient world, it was well-liked and used for aromatherapy and perfumery. Frankincense was also used religiously as well as medicinally. It’s popularity dates back to 1500 B.C. and more for then 5,000 years it was traded on the Arabian peninsula.
Pliny the Elder, the Roman botanist and historian wrote in the early century A.D that expensive frankincense resins had made the southern Arabians rich. At that time, the Arabians were known as some of the richest people on earth, due primarily to their mass production of frankincense.
Interesting enough, there are quite some mentions of the use of frankincense in the Bible. It is evident from the Bible that one of the three wise men presented baby Jesus with a gift of frankincense. The value of it may have been tremendously high during that time. The Egyptians considered it as a all-cure. Historically, it was used to treat asthma, bronchitis, snake bites, diarrhea, swellings and other ailments. It was also quite popular in traditional Chinese medicine and Ayurveda.
Many cultures believed the smoke of frankincense could calm one’s mood. It was a common practice to use the incense during rites of passages like funerals and weddings. The crystallized pieces were used as incense by burning the resin on top of lit coal, producing perfumed smoke. It is known that the ancient Greeks and Romans imported resins in massive quantity to be used as incense during cremations and for other purposes.
The Christians and Hebrews made use of the incense in many of their religious ceremonies and burials. It was quite popular among the Assyrians and Babylonians as well. Even the Egyptians used frankincense as an important element in their daily lives. They knew how to use makeup, and the ash from burned frankincense was sometimes used as an eyeliner for both men and women. Paintings of frankincense can be seen on walls of the temple of Queen Hatshepsut, a queen of Egypt that ruled for nearly two decades. Another use of it was the bark of the tree as a dye. In ancient days, the bark was utilized as a dye and is still practiced today.
Well, that’s the history of frankincense.
Hope you enjoyed reading it. | FINEWEB-EDU |
Gentinos
Gentinos (Γεντῖνος) was a town in ancient Troad. The inhabitants of Gentinos are cited in the tribute records of Athens between the years 452/1 and 444/3 BCE, so the city was part of the Delian League. Gentinos minted bronze coins inscribed «ΓΕΝ» or «ΓΕΝΤΙ».
Its site is tentatively located near Ballı Dağ, Asiatic Turkey. | WIKI |
The effect of moderate red wine consumption on 24-h blood pressure trajectory in type 2 diabetes; a six-month randomized controlled intervention trial: P802
Yftach Gepner, Y Henkin, D Schwarzfuchs, R Golan, R Durst, I Shelef, I Harman-Boehm, M Stampfer, A Rudich, I Shai
Research output: Contribution to journalMeeting Abstract
Abstract
Aims:Observational studies report inconsistent associations between moderate alcohol intake and blood pressure (BP). In a 6-month randomized controlled trial we assessed the effect of initiating moderate red wine consumption on 24h-dynamics BP, specific time-intervals of BP, and its interaction with a common genetic variant of alcohol-dehydrogenases (ADH) among patients with type-2-diabetes.
Methods:We randomly assigned 54 type-2-diabetes patients, alcohol abstainers, to initiate consumption of 150ml dry red-wine or mineral-water at dinner. Both groups were guided to adhere to Mediterranean diet, without caloric restriction. We measured 24h ambulatory-blood-pressure-monitoring (ABPM) and ADH1B polymorphism.
Results:Participants (age=57yrs;85% men;24h blood pressure=129/77mmHg) had 92% six-month retention. After 6-month intervention, average 24hr BP did not differ between the wine and water groups. The ABPM decreased in the red-wine group at midnight (3-4 hours after wine intake: systolic BP: red-wine=-10.6mmHg vs. mineral-water=+2.3mmHg; p=0.031) and the following morning at 7-9AM (systolic BP: red-wine:-6.2mmHg vs. mineral-water:+5.6mmHg; p=0.014). Among the red-wine consumers, only the individuals who were homozygous for the gene encoding ADH1B*2 variant (Arg48His;rs1229984,TT, fast ethanol metabolizers), exhibited a significant decrease in mean 24h systolic BP (-8.0mmHg vs. +3.7mmHg; p=0.002) and pulse pressure (-3.8mmHg vs. +1.2mmHg; p=0.032) compared to heterozygotes and homozygous for the ADH1B*1 variant (CC, slow metabolizers). No genetic interaction was observed for the water group.
Conclusions:Initiating moderate red-wine consumption at dinner in type-2-diabetics may have modest hypotensive effects within several hours after its consumption, and the following morning. The genetic interaction uncovers a personalized/precision-medicine factor regulating the hypotensive effect of red-wine in diabetes.
Original languageEnglish GB
Pages (from-to)S179
Number of pages1
JournalEuropean Journal of Preventive Cardiology
Volume22
Issue number1
StatePublished - 14 Jun 2015
Fingerprint
Dive into the research topics of 'The effect of moderate red wine consumption on 24-h blood pressure trajectory in type 2 diabetes; a six-month randomized controlled intervention trial: P802'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
This is why Washington wrangling could become a bigger deal in the week ahead
In the void before earnings season, Washington could bubble up as a bigger focus for markets in the week ahead. The House is expected to vote on a heath care bill Thursday, and if it passes that would be seen as a small step moving Congress closer to considering tax reform, though any legislation must also battle its way through the Senate. "Washington has been such an important driver of the rally since the election, so every week is important in terms of what is new on health care and what's new on tax reform," said Peter Boockvar, chief market analyst at The Lindsey Group. President Donald Trump had promised tax reform would be taken up weeks ago, but that time frame has come and gone, and the markets have been watching congressional efforts to move ahead on health care, which is first on the agenda. The full House vote on the health care bill is scheduled seven years to the day that the Affordable Care Act was made law. "The big story in the market is whether the delays in health care reform are delaying tax reform. That's what everybody's focused on now," said Daniel Clifton, head of policy research at Strategas. Clifton said the plan that drew fire this past week will be modified to appeal to more conservative members, and he expects it to pass the House. It then could take weeks to make its way through the Senate. "This is just the normal legislative process. The Senate bill is going to be radically different than the House bill," said Clifton. "If they are successful in passing the health care bill, there is $900 billion dollars of tax cuts." After health care, the Congress will deal with the budget and then move on to tax reform, which Clifton said should be considered in the second half of the year. "If this gets held up … then tax reform gets pushed out to next year, and that's not priced in. If you get that agenda item behind them, then you know you can start moving on tax reform and deregulation and that seems to be the line up," said Art Hogan, chief market strategist at Wunderlich Securities. The economic calendar is light in the week ahead, though there are durable goods on Friday and housing data on Wednesday and Thursday. There are also more than a half dozen Fed speakers including Fed Chair Janet Yellen who speaks at a Fed conference Thursday. After the Fed's recent offensive to convince markets it was prepared to raise rates this past week and its fairly dovish post-rate-hike comments, the markets are not expecting much from Fed speakers. "I think you'd be shocked to get any surprises from any Fed speakers. I don't think anybody's going to stick their neck out, and they did a great job of choreographing this meeting," Hogan said. So the market in the coming week could continue to trudge ahead, with an eye on Congress. "We're sort of in this information vacuum where the quarter is ending and you're a few weeks away from getting corporate earnings. The Fed is out of the way, the inflation data is out of the way," said Boockvar. "It's information no man's land." Jeff Mortimer, director of investment strategy at BNY Mellon Wealth Management, said he expects the stock market to continue higher for now. "I think markets march higher over the short to intermediate term," he said. Earnings will be the next big focus. "We're going to get back to fundamentals. We'll look to Washington to see how they're progressing on health care, tax reform and the infrastructure bill, but I think in the next few weeks, it will turn to what it always does. It will turn from a top down to a bottom up perspective. We remain constructive on the markets. We're a tick over fair value, but our belief is equities will continue to outperform," said Mortimer. He said a major theme for the market has been how resilient it's been, and he expects that to continue for the next year to 18 months. "History speaks to the fact that as long as the market sees progress in Washington that I think it continues to find firm footing," Mortimer said. He said the market is also quite comfortable with the Fed's projection of two more rate hikes this year. "I think the market will continue to look for progress in Washington, but I don't think it has a due date in mind," he said. "Valuation concerns me a bit but it doesn't take away our bullish view," he said. "Could you get a 5 percent pullback for no reason whatsoever? Of course, you could … if there's a variable that could tip us over its higher inflation. That's the variable I have on my radar." In the past week, stocks were flat to slightly higher. The was up 0.2 percent at 2,378, and the up was virtually flat at 20,914, while the gained 0.7 percent to 5,900. Treasury yields moved off their highs after Wednesday's Fed meeting, and the 10-year was at 2.50 percent last Friday. 10 a.m. QFR 1:10 p.m. Chicago Fed President Charles Evans 8:30 a.m. Current account 8:30 a.m. Philadelphia Fed manufacturing 12:00 p.m Kansas City Fed President Esther George 6:00 p.m. Cleveland Fed President Loretta Mester 10:00 a.m. Existing home sales 8:30 a.m. Initial claims 8:45 a.m. Fed chair Janet Yellen makes opening remarks at Strong Foundations Conference 10:00 a.m. New home sales 12:30 p.m. Minnepolis Fed President Neel Kashkari at Strong Foundations Conference 7:00 p.m. Dallas Fed President Rob Kaplan 8:30 a.m. Durable goods 8:45 a.m. Chicago Fed's Evans 9:05 a.m. St. Louis Fed President James Bullard 9:45 a.m. Manufacturing PMI 10:00 a.m. New York Fed President William Dudley | NEWS-MULTISOURCE |
Template:Did you know nominations/Transport of Białystok children
The result was: promoted by Cwmhiraeth (talk) 05:22, 2 October 2018 (UTC)
Transport of Białystok children
* ... that children from the Białystok Ghetto (pictured) panicked when told to undress and wash, because they knew about gas chambers? Source: "Soon after their arrival, the children, who had already experienced all the Jewish suffering in the East in their home, Bialystok [Białystok], were taken in groups to the disinfection bath, where frightening scenes occurred. The children knew about the gas chambers and did not want to enter the bath chambers; they screamed desperately, “No, no! Gas!”" Adler, H. G. (2017). Theresienstadt 1941–1945: The Face of a Coerced Community. Translated by Cooper, Belinda. Cambridge: Cambridge University Press. ISBN<PHONE_NUMBER>463. p. 126
* ALT1: ... that children from the Białystok Ghetto (pictured) panicked when told to undress and wash, but were not gassed for another six weeks?
* ALT2: ... that the Grand Mufti of Jerusalem probably intervened to prevent the rescue of 1,200 Jewish children (pictured) who were murdered at Auschwitz? Source: "Although no single factor can explain the collapse of the planned exchange of Jewish children for German prisoners, the intervention of [the mufti] was no doubt a significant contributory factor." Bender, Sara (2008). The Jews of Bialystok During World War II and the Holocaust. Lebanon: University Press of New England. ISBN<PHONE_NUMBER>293. p. 272
* ALT3: ... that Ottla Kafka was murdered at Auschwitz because she volunteered to help children from the Białystok Ghetto (pictured)?
* Reviewed: Phonetics
* Comment: There is probably a better way to rewrite the original/ALT1 to be more shocking and surprising... I'd like the article to be featured on 7 October if possible; that was the date that the children were murdered.
Created by Catrìona (talk). Self-nominated at 01:22, 22 September 2018 (UTC).
* I'll review shortly. epicgenius (talk) 16:22, 22 September 2018 (UTC)
* Moved from above:
* ALT3 isn't mentioned directly in the article but it is mentioned in the reference. The sentence in the article The train arrived at Auschwitz two days later; everyone was gassed immediately. includes Kafka, so maybe this should be explicitly mentioned.
* How about for ALT1, instead of that, use
* ALT4: ... that children from the Białystok Ghetto (pictured) knew about gassing and panicked when told to undress and wash, even though they were not gassed for another six weeks?
* But personally I'd prefer ALT0 or ALT3 instead, in that order, it's probably more hooky. ALT2 is pretty speculatory so I wouldn't prioritize that. Symbol voting keep.svg on ALT0 and ALT2. Symbol question.svg on the others. Let me know which one you'd prefer, though I strongly recommend ALT0 and ALT3. epicgenius (talk) 16:34, 22 September 2018 (UTC)
* Thanks for the quick review. I personally prefer ALT0 to ALT3 and would rather not mention Kafka twice in the article. It would seem to violate the policy of due weight, since she is mentioned by name in only one of the sources. Catrìona (talk) 21:58, 22 September 2018 (UTC)
* Fair enough. As I said above, I'll accept ALT0 and ALT2 in good faith, Symbol confirmed.svg ALT1 and ALT3 are also good to go. For the person who closes this nomination, I strongly suggest the use of ALT0 . epicgenius (talk) 02:37, 23 September 2018 (UTC)
* Shouldn't it be "bathe" instead of "wash"? Yoninah (talk) 21:12, 25 September 2018 (UTC)
* Although it's not entirely clear to the ambiguous wording of sources, it is more likely that they were told to wash in showers rather than bathtubs. Catrìona (talk) 05:47, 26 September 2018 (UTC)
* I assumed that. But the way it's worded, it sounds like they were asked to wash dishes, not bodies. "Bathe" is the acceptable word for cleansing the body. Yoninah (talk) 12:18, 26 September 2018 (UTC)
* Repinging with an accent :) Yoninah (talk) 12:20, 26 September 2018 (UTC)
We may be dealing with different varieties of English here. For me (north-west American), "wash" as an intransitive verb means to clean one's body and "bathe" would only be used for full immersion in water. I'm trying to think if there might be another verb that could be used here. Catrìona (talk) 16:02, 26 September 2018 (UTC)
* I'm originally from California. Your source is saying "bath chambers", but if you don't want to use "bathe", you could say something like:
* ALT0a: ... that children from the Białystok Ghetto (pictured) panicked when told to undress and enter the disinfection room, because they knew about the gas chambers?
* ALT0b: ... that children from the Białystok Ghetto (pictured) panicked when told to undress and prepare for disinfection, because they knew about the gas chambers? Yoninah (talk) 18:26, 26 September 2018 (UTC)
* Thanks for your help, . The source quoted for ALT0 is actually a translation from German, so I would take it with a grain of salt as to exact semantics. The Polish language source cited in the article mentions "showers" (prysznic) on page 196, so I'd like to propose an ALT0c: ... that children from the Białystok Ghetto (pictured) panicked when told to undress and shower, because they knew about gas chambers? Catrìona (talk) 23:55, 26 September 2018 (UTC)
* Definitely. I was wondering why you didn't say "shower" in the first place. Now, one more question: On the face of it, the hook sounds like this took place in the ghetto. Do you want to add something about arriving in Theresienstadt, like:
* ALT0d: ... that children from the Białystok Ghetto (pictured) panicked when told to undress and shower upon arriving at Theresienstadt, because they knew about gas chambers? Yoninah (talk) 17:11, 27 September 2018 (UTC)
Personally, I would think that "children from the Białystok Ghetto" implies that they were taken somewhere else, and it's not necessary to state where this incident took place. That said, I don't object to Alt0d and I'm inclined to let the promoter choose which hook to use. Thanks again for your help. Catrìona (talk) 19:45, 27 September 2018 (UTC)
* Symbol voting keep.svg OK. Restoring tick for either ALT0c or ALT0d per Epicgenius' review. Yoninah (talk) 19:50, 27 September 2018 (UTC) | WIKI |
Recreation Weed Legalized in California: Pot Stocks, Cronos Group, Soar | Fortune
Companies in the cannabis industry have added nearly $2 billion. in value since California dispensaries started to legally sell recreational marijuana on Jan. 1.
Heartened by the reportedly long lines outside Californian dispensaries and a possible wave of legalization in other states, shares in cannabis-related firms soared Tuesday. Canada-based Canopy Growth rose 9%, Vancouver-based Aurora jumped 24%, U.K.-based GW Pharma popped 2%, Ontario-based Aphria grew 8%, Canadian firm MedReleaf climbed 27%, Toronto-based Cronos Group advanced 5%, and while another Canadian company Canntrust increased 5%.
Still the companies are relatively small, with some trading--in the U.S., at least--on less regulated over-the-counter markets that come with extra risk. The seven companies, the largest marijuana-related firms by market capitalization, according to Marijuana International Corporation, added about $1.7 billion in value in the past day, for a total of over $19 billion.
That came as California made selling pot for recreational purposes legal for people 21 or older, and allowing them to possess up to one ounce of the drug.
The surge also comes as Canada is set to become the second nation after Uruguay to legalize recreational marijuana by July. Massachusetts meanwhile is also expected to begin selling marijuana for recreational purposes in July.
Despite California’s legalization, marijuana sales remain illegal under federal law. | NEWS-MULTISOURCE |
Goglides Dev 🌱
Cover image for IServiceCollection In C# – Simplified Beginner’s Guide For Dependency Injection
Dev Leader
Dev Leader
Posted on • Originally published at devleader.ca
IServiceCollection In C# – Simplified Beginner’s Guide For Dependency Injection
The post IServiceCollection in C# – Simplified Beginner’s Guide For Dependency Injection appeared first on Dev Leader.
Dependency injection is a useful technique for structuring code in a way that is testable, maintainable, and scalable. It involves passing instances of objects (or “dependencies”) as arguments into other objects that need them, feeding them from the top down. We’ll be looking at IServiceCollection in C# as a built-in solution that provides a convenient way to register and resolve dependencies. While I have historically preferred Autofac, I felt it necessary to come back and revisit the built-in mechanisms that we have access to.
Using a dependency injection framework offers several benefits, such as minimizing tight coupling between objects, simplifying unit testing, and promoting the Single Responsibility Principle. By using IServiceCollection to manage dependencies in your C# code, you can work towards more modular code that is easier to maintain and test in the long term.
Throughout this article, I’ll explain dependency injection with IServiceCollection in C#. We’ll cover the basics of IServiceCollection, dive into the core principles of dependency injection, explore some additional techniques, and more. By the end of this article, you should feel confident in your ability to utilize dependency injection to create scalable and maintainable software — so let’s get into it!
The Basics of IServiceCollection in C
In dotnet, the IServiceCollection interface is used to register dependencies in a .NET Core application. It’s a fundamental part of what we see when standing up ASP.NET Core applications in particular. If you’ve built an ASP.NET Core web application — surprise, you were using this even if you didn’t know it!
The IServiceCollection API is easy to use and simplifies dependency registration in a .NET Core application. When a service collection is created, it’ll be used to register dependencies using methods such as:
• AddSingleton: used to create a single instance of a dependency throughout the lifetime of an application
• AddTransient: creates a new instance every time it’s requested
• AddScoped: creates a new instance per request within the scope.
Managing Dependencies with IServiceCollection in C
One of the benefits of using IServiceCollection is the improved manageability of dependencies. It allows clear separation of concerns in registering services and it’s much easier to maintain compared to hard-coding of dependencies. IServiceCollection in C# also promotes code reuse and helps with testing, making the testing process more efficient. When the IServiceCollection is used with other dependency injection libraries, the registration process can become even simpler.
Here’s a simple code example of how to use IServiceCollection:
public void ConfigureServices(IServiceCollection services)
{
services.AddMvc();
services.AddSingleton<IMyService, MyService>();
services.AddTransient<BookService>();
}
Enter fullscreen mode Exit fullscreen mode
This example registers IMyservice as a singleton dependency, which means a single instance of the service is created throughout the lifetime of the application. BookService is registered as a transient dependency, which means that a new instance is created every time it’s requested. Finally, the AddMvc() method is used to register the MVC framework — which you may have seen before!
The Core Principles of Dependency Injection
Dependency injection is a design principle that follows two fundamental concepts, the Inversion of Control (IoC) and the Dependency Inversion Principle (DIP). The IoC describes how control is passed between classes in a program and the DIP describes the design principle of reducing class dependencies by introducing abstractions.
Single Responsibility Principle within Dependency Injection
The Single Responsibility Principle (SRP) is a core principle in object-oriented programming that describes the need for a class to have a single responsibility. It’s useful to apply SRP in dependency injection because it helps ensure each class only has one reason to change, which speeds up development and reduces the potential for errors.
By isolating each class’s responsibility, we can use dependency injection to decouple their dependencies, making the code easy to maintain and test. But if it’s not obvious how Dependency Injection can immediately benefit here, think about the process of splitting up a class. Even if your methods are decoupled, you still need to go move stuff around into new classes, instantiate them in the right spot, pass them in through the constructors in the right spots, etc…
Dependency Injection can nearly trivialize the passing of dependencies into your classes. By wiring things up on your dependency injection container (IServiceCollection in C# for the scope of this article), the DI framework itself auto-resolves these for you. Bye-bye manual effort!
Open/Closed Principle within Dependency Injection
The Open/Closed Principle (OCP) states that classes should be open for extension but closed for modification. The idea is to design code that can be easily extended without modifying the original code’s behavior. Applying the Open/Closed Principle allows us to create code that is much more flexible, maintainable, and testable using dependency injection. By creating code that adheres to the OCP, dependency injection can enable developers to substitute implementations without modifying the existing code — and the less that changes, the less surface area for things exploding.
Tying These Together
Both the Single Responsibility Principle and the Open/Closed Principle are helpful when using dependency injection. By isolating a class’s responsibility and designing code that can be extended without modifying its existing behavior, dependency injection simplifies development. This is because we’re simultaneously promoting modularity, extensibility, and testability, improving code quality and maintainability. What’s not to love about all of that?
An example of how these principles can be applied with dependency injection is by creating a class that depends on an interface instead of a concrete implementation. This way, when implementing that class, we can easily substitute the implementation with a new one that conforms to the same interface without updating the original class. If you’re of the camp where that *immediately* feels like overkill (not every class needs an interface, of course), just consider at a minimum the situations where you have an external dependency that you may want to mock in your tests.
IServiceCollection in C# vs Other DI Containers
When it comes to dependency injection (DI), there are plenty of tools and libraries to choose from, each with its advantages and disadvantages. One of the most popular DI containers for .NET Core is the IServiceCollection, but how does it compare to other containers?
Alternative DI Containers to IServiceCollection in C
One popular DI container is Autofac, my personal favorite, which offers extensive functionality, including instance and assembly scanning, that is not available out of the box with IServiceCollection. Autofac can handle more complex and customized scenarios in comparison to IServiceCollection, which has a simpler API. However, Autofac might be an overkill for small to medium-sized projects and requires more boilerplate. It’s also important to note that IServiceCollection has evolved a great deal over the years, and as much as I love Autofac, I am sure the gap between features is rapidly closing.
Another popular DI container is Simple Injector, which focuses on performance and compile time verification. Its API is similar to that of IServiceCollection, but it has a more rigid model for registration and verification. Simple Injector is ideal for medium to large scale applications and can achieve high performance benchmarks but might become problematic when dealing with multiple dependencies. I have no professional experience working with this one, but I wanted to mention it.
Scrutor is also on the list of things to consider, so keep your eyes peeled!
Advantages of Using IServiceCollection in C# over Other DI Containers
Despite Autofac and Simple Injector’s popularity, IServiceCollection is still the go-to choice for most .NET Core developers. One of the main benefits of using IServiceCollection is its integration with .NET Core, which allows DI registration in Startup.cs. Furthermore, IServiceCollection can be easily integrated with other dependency injection libraries, like Autofac or Simple Injector, if more complex scenarios arise. The fact that it’s immediately accessible to us in ASP.NET Core without pulling in additional dependencies is a huge win. Here’s a quick snippet to show you that yes, Autofac can be combined directly with IServiceCollection:
builder.Services.AddAutofac(); // allow autofac registrations in the container!
builder.Services.AddRazorPages();
builder.Services.AddServerSideBlazor();
builder.Services.AddBlazorBootstrap();
Enter fullscreen mode Exit fullscreen mode
Another significant advantage of IServiceCollection is its simplicity and flexibility. Its API is uncomplicated and easy to understand, making it ideal for small to medium-sized projects and ramping up with DI in general. Its flexibility allows you to add advanced features as needed, creating a smoother learning curve than other DI containers.
Overall, the choice between IServiceCollection and other DI containers primarily depends on a project’s size, specific requirements, and your experience level in each of these. However, in most cases, IServiceCollection offers the flexibility required for most projects without sacrificing the essential features — and that’s coming from an Autofac fan!
Further Concepts with DI and IServiceCollection in C
Dependency injection (DI) allows us as .NET developers to easily add new features and improve the flexibility of code. In this section, I’ll introduce some slightly more advanced concepts with DI that can be applied by using IServiceCollection in C#.
How to Use Dependency Injection with Interfaces
The best practices for working with dependency injection suggest that interfaces should be used to reduce class dependencies and abstract the functionality of the code. By defining an interface, you can create a clear separation of concerns between your application’s components, enabling DI to work more powerfully and efficiently.
Of course, there is a larger and larger audience of individuals who hate interfaces because they see them as bloat. The argument is that it’s just an additional file, and the odds of an implementation being swapped for something else in actuality are slim to none in most cases. For me, I find adding interfaces close to zero overhead, and getting that bit of extra safety if I need to swap implementations feels great… Which for me, is almost every single time I want to go write coded tests across a class and not use real dependencies.
Best Practices for Creating Services with Dependency Injection
The best practices for creating services with DI revolve around designing code to be modular, scalable, and easy to understand. Abstractions should be utilized where possible to make code more flexible and less dependent on specific implementations. But again, based on points in the previous section, there’s arguably a point where over-abstracting becomes ridiculous… so keep it in mind.
Service lifetime management is also important to ensure that your services operate efficiently and with minimal memory usage. So consider who needs to own and refer to what, and for what lifetime. I find in many situations things have dependencies for the entire lifetime of an application — so I default to some patterns because of that. However, when things fall outside of that need, then I need to think a bit more carefully about how to maintain those lifetimes accordingly.
Practical Example of Advanced Techniques with Dependency Injection
Here’s a simple code example of dependency injection that follows the best practices outlined above. Imagine we have a UserService class we want to register with DI. We can define an interface – IUserService – and create a new implementation of this interface in our UserService class.
Our project can utilize this interface to access the UserService functionalities easily. We also learned about the importance of lifetime management, so we will make use of AddTransient to add our IUserService implementation to IServiceCollection. In this situation, our (artificial) requirement is that we don’t want the service reference to be re-used.
public interface IUserService
{
void GetUserById(int id);
void SaveUser(User user);
}
public class UserService : IUserService
{
public void GetUserById(int id)
{
// ...
}
public void SaveUser(User user)
{
// ...
}
}
public void ConfigureServices(IServiceCollection services)
{
services.AddTransient<IUserService, UserService>();
}
Enter fullscreen mode Exit fullscreen mode
This example follows the best practices of creating an interface for service definitions. We also considered lifetime management using AddTransient since we don’t want the instance to be reused.
Wrapping Up The IServiceCollection in C
Dependency injection with IServiceCollection in C# is a helpful tool you can leverage in your dotnet applications. Through the use of IServiceCollection in C# apps, you can quickly and efficiently create loosely coupled code that is easily maintainable and extendable.
We explored the basics of IServiceCollection and the core principles of dependency injection, such as Inversion of Control and the Dependency Inversion Principle. I also discussed the benefits of loosely coupled code, especially with respect to testable and maintainable software. We also discussed how to use IServiceCollection in C# with interfaces and best practices for creating services.
It's important to remember that while IServiceCollection is an excellent DI container, it's not the only option available. You should take the time to assess your needs and explore other DI containers (like Autofac!) before making a final decision. If you found this useful and you’re looking for more learning opportunities, consider subscribing to my free weekly software engineering newsletter and check out my free videos on YouTube!
Want More Dev Leader Content?
• Follow along on this platform if you haven’t already!
• Subscribe to my free weekly software engineering and dotnet-focused newsletter. I include exclusive articles and early access to videos: SUBSCRIBE FOR FREE
• Looking for courses? Check out my offerings: VIEW COURSES
• E-Books & other resources: VIEW RESOURCES
• Watch hundreds of full-length videos on my YouTube channel: VISIT CHANNEL
• Visit my website for hundreds of articles on various software engineering topics (including code snippets): VISIT WEBSITE
• Check out the repository with many code examples from my articles and videos on GitHub: VIEW REPOSITORY
Top comments (0) | ESSENTIALAI-STEM |
Page:History of Woman Suffrage Volume 3.djvu/474
Rh ment received by the delegates in the two conventions. Soon afterwards a delegation of ladies waited on Winfield S. Hancock, the Democratic nominee, who received them with much courtesy, saying he was quite willing to interpret, in its broadest sense, that clause of his letter of acceptance wherein he said: "It is only by a full vote and a fair count that the people can rule in fact, as required by the theory of our government." "I am willing, ladies,' said the general, "to have you say that I believe in a free ballot for all the people of the United States, women as well as men."
Mrs. Blake, Mrs. Slocum and Mr. Wilcox made quite an extensive canvass through many counties of the State, to rouse the women to use their right to vote on all school matters.
The bill to prohibit disfranchisement was again introduced in the legislature of 1881, by Joseph M. Congdon, and ordered to a third reading May 3, by a vote of 60 to 4o, and on May 11 came up for final action, when the ladies, by special courtesy, were admitted to the floor of the Assembly chamber to listen to the discussion. General Francis B. Spinola and General James W. Husted made earnest speeches in favor of the bilt, and Hon. Erastus Brooks and General George A. Sharpe in opposition. The roll-call gave 57 ayes to 55 noes—a majority of those present, but not the majority (65) of all the members of the Assembly, which the constitution of New York requires for the final passage of a bill. The vote astonished the opponents, and placed the measure among the grave questions of the day. This substantial success inspired the friends to renewed efforts.
The necessity of properly qualified women in the police stations again came up for consideration. The condition of unfortunate women nightly consigned to these places had long been set forth by the leaders of the suffrage movement. In New York there were thirty-two station-houses in which, from night to night, from five to forty women were lodged, some on criminal charges, some from extreme poverty. All there, young and old, were entirely in the hands of men, in sickness or distress. If search was to be made on charge of theft, it was always a male official who performed the duty. If the most delicate and refined lady were | WIKI |
Source
pypy / testrunner / scratchbox_runner.py
Full commit
""" This is a very hackish runner for cross compilation toolchain scratchbox.
Later on we might come out with some general solution
"""
import os
def args_for_scratchbox(cwd, args):
return ['/scratchbox/login', '-d', str(cwd)] + args
def run_scratchbox(args, cwd, out, timeout=None):
return run(args_for_scratchbox(cwd, args), cwd, out, timeout)
def dry_run_scratchbox(args, cwd, out, timeout=None):
return dry_run(args_for_scratchbox(cwd, args), cwd, out, timeout)
import runner
# XXX hack hack hack
dry_run = runner.dry_run
run = runner.run
runner.dry_run = dry_run_scratchbox
runner.run = run_scratchbox
if __name__ == '__main__':
import sys
runner.main(sys.argv) | ESSENTIALAI-STEM |
Machine Operations in the Manufacturing Industry
« Back to Home
The Lowdown on Vapor Blasting: Why It's the Best Solution for Your Parts Cleaning Needs
Posted on
If you're looking for a cleaning solution that provides exceptional results without causing damage to your parts, then vapor blasting might just be the answer. Vapor blasting, also known as wet blasting or liquid honing, is an advanced surface preparation technique that is used to clean surfaces.
What is vapor blasting, and how does it work?
Vapor blasting is a surface preparation technique that uses a mix of water, abrasive media, and compressed air to clean surfaces. The process works by injecting the abrasive media into a stream of water, which creates a slurry that is then propelled onto the surface to be cleaned. The slurry of water and abrasive media cleans the surface by removing contaminants and debris without causing any damage to the surface itself. The process is quite gentle and safe for all types of materials, making vapor blasting ideal for cleaning delicate or complex parts.
Why is vapor blasting better than other cleaning techniques?
Vapor blasting is considered the ultimate solution for cleaning parts and components. Unlike other cleaning techniques, such as sandblasting or dry-blasting, vapor blasting is much gentler, producing a soft, satin-like finish that's ideal for surfaces that require a smooth and uniform finish. Vapor blasting is also a highly effective cleaning method, capable of removing rust, paint, and other tough contaminants that are difficult to remove with other cleaning methods. What's more, it's environmentally friendly as the process uses water instead of chemicals, which can be disposed of safely.
What are the benefits of vapor blasting?
Vapor blasting has several benefits, including its cleaning ability, safety, and versatility. The process is gentle enough to clean parts made of any material, including aluminum, brass, copper, stainless steel, plastics, and composites. This makes vapor blasting ideal for cleaning engine parts, carburetor bodies, fuel tanks, and other components that would be otherwise difficult to clean. Additionally, vapor blasting is safe for the worker who operates the equipment, as it produces less dust and noise than other blasting methods.
What industries use vapor blasting?
Vapor blasting is used in various industries that require high-quality cleaning. Some of these industries include automotive, aviation, marine, and manufacturing. For instance, automotive shops use vapor blasting to restore vintage cars, while aviation companies use vapor blasting to clean and maintain airplane parts. Additionally, the manufacturing industry uses vapor blasting to clean complex parts, such as mold cavities and rotational molds, that are used in the production of high-quality products.
Vapor blasting is an advanced surface preparation technique that is highly effective, gentle, and safe for all types of materials. The process is ideal for parts and components that require a smooth, uniform finish, such as engine parts, carburetor bodies, and fuel tanks. With vapor blasting, you can be sure that your parts will be left looking clean, shiny, and ready for use.
For more information, contact a professional vapor blasting service in your area.
Share | ESSENTIALAI-STEM |
Bowel (Colorectal) Cancer
October 24, 2017
Bowel (Colonic) Polyps
October 24, 2017
Show all
Bowel Ischemia
Bowel Ischemia refers to decreased blood supply to bowel. There are various causes for different types of bowel ischemia. This is case of medical emergency, which needs urgent admission to hospital. In most cases if not attended to urgently can be life threatening.
Patients who suffer from the bowel ischemia usually have other serious medical co – morbidities which makes the condtion very difficult to treat. Bowel ischemia sometimes can be the last complication of their medical condition.
Bowel ischaemia has been classified into three main types:
1. Acute mesenteric ischaemia
2. Chronic mesenteric ischaemia
3. Ischaemic colitis (colonic ischaemia)
Acute mesenteric ischaemia
This is an umbrella term covering a number of conditions, including acute mesenteric arterial embolus and thrombus, mesenteric venous thrombus and non-occlusive mesenteric ischaemia (NOMI). They all have the features of impaired blood transfusion to the intestine, bacterial translocation (the passage of intestinal bacteria to normally sterile tissue) and systemic inflammatory response.
Incidence
This is chiefly a disease of people aged over 50, although younger people with risk factors for mesenteric venous thrombosis (MVT) – eg, atrial fibrillation (AF) – can be affected. The overall prevalence is 0.1% of all hospital admissions.
Stimulating aspects
Conditions causing arterial emboli – eg, mural thrombus following myocardial infarction, auricular thrombus associated with mitral stenosis and AF, septic emboli from valvular endocarditis, fragments of proximal aortic thrombus, arterial catheterization dislodging bits of plaque.
Conditions causing arterial thrombosis – atherosclerosis (most common), aortic aneurysm or dissection, arteritis, decreased cardiac output (eg, from myocardial infarction or chronic heart failure), dehydration.
NOMI – hypotension, vasopressive drugs, ergotamines, cocaine, digitalis.
MVT can be caused by:
1. Hypercoagulability disorders (eg, protein C and S deficiency).
2. Tumour causing venous compression or hypercoagulability.
3. Infection – usually intra-abdominal conditions such as appendicitis, diverticulitis, or abscess,
4. Venous congestion from cirrhosis (portal hypertension).
5. Venous trauma from accidents or surgery, especially portocaval surgery, pancreatitis, decompression sickness.
Staging
The presentation of the various types is similar, with moderate-to-severe colicky or constant and poorly localised pain. A striking feature is that the physical findings are out of proportion to the degree of pain and, in the early stages, there may be minimal or no tenderness and no signs of peritonitis. In the later stages typical symptoms of peritonism develop, with rebound guarding and tenderness. A mass is sometimes palpable. Examination may reveal associated causes (eg, AF).
Examination
There are no specific laboratory tests. A raised white cell count and the presence of metabolic acidosis may be helpful.
Plain abdominal X-ray may be required to rule out other causes and may show small bowel obstruction, ileus and thickened bowel wall in the later stages.
CT scan may show gas in various ectopic places such as bowel wall (pneumatosis intestinalis) or portal vein, bowel wall and/or mesenteric oedema, thumbprinting, streaking of mesentery and solid organ infarction.
Angiography is the gold standard and shows arterial blockage due to emboli or thrombus.
Multidetector computerised tomography (MDCT) with intravenous contrast enhancement is the specific investigation of choice if superior mesenteric artery occlusion is suspected.
Ultrasound or MRI scan may also be contributory.
Electrocardiogram may show atrial fibrillation or infarction.
Echocardiogram may be needed to show the cause of an embolism or valvular pathology.
Intraoperative fluorescein administration may be required to highlight those areas of bowel that need resection.
Differential diagnosis
• Other causes of an acute abdomen
• Abdominal aortic aneurysm
• Biliary disease
• Chronic mesenteric ischaemia
• Diverticulitis
• Ectopic pregnancy
• Helicobacter pylori infection
• Multisystem organ failure of sepsis
• Myocardial infarction
• Acute intermittent porphyria
• Testicular torsion
Medical care
Initial resuscitation with intravenous fluids and oxygen should be carried out.
Medical options include papaverine (to relieve vasospasm) or thrombolytics infused through an angiogram catheter, and heparin for MVT.
Operation options
Surgical options include:
Angioplasty to the superior mesenteric artery
Embolectomy
Aortomesenteric bypass and resection of bowel if gangrene develops
Outlook
Even in the best hands, the outcome is poor. If the diagnosis is missed, the mortality rate is 90%. With treatment, the mortality rate is still 50-80%. Survivors of extensive bowel surgery face a lifetime of disability.
Chronic mesenteric ischaemia (intestinal angina)
This is a chronic atherosclerotic disease of the vessels supplying the intestine. Usually all three major mesenteric arteries are involved. There are no definitive epidemiological data but the condition is reported to be rare. However, autopsy reports suggest that many cases of chronic abdominal pain are likely to be due to chronic mesenteric ischaemia but are not reported as such.
Stimulating aspects
This is generally caused by factors predisposing to atherosclerosis – eg, smoking, hypertension, diabetes mellitus and hyperlipidaemia.
Appearance
The presentation of the various types is similar, with moderate-to-severe colicky or constant and poorly localised pain. The history is typically one of weight loss, postprandial pain (‘intestinal angina’) and a fear of eating. There is usually a history of cardiovascular disease such as myocardial infarction or cerebral vascular disease. Other nonspecific symptoms may include nausea, vomiting, or bowel irregularity.
Examination may show vague abdominal tenderness disproportionate to the severity of the pain, an abdominal bruit and signs of generalized cardiovascular disease.
Distinguished Identification
Acute mesenteric ischaemia
Other causes of an acute abdomen
Causes of dyspepsia
Diverticulitis
Gastric cancer
Chronic pancreatitis
Chronic pyelonephritis
Examination
Laboratory tests such as FBC, LFTs and U&E may reflect malnutrition or dehydration.
CXR should be carried out to exclude pneumonia, and cardiac scanning to exclude comorbidity.
Arteriography is the gold standard investigation to show the site of arterial blockage or stenosis.
Mesenteric duplex ultrasonography is a non-invasive method of demonstrating arterial blood flow but is more affected by extraneous factors such as obesity or respiratory movements.
Medical care
As a sole option, this should be considered only in patients who are a very poor surgical risk, as there is a very high incidence of complications such as malnutrition, sepsis infarction and perforation. Nitrate therapy may afford short-term relief and the patient should be anticoagulated. Once the decision to operate has been taken, intra-arterial papaverine should be administered to reduce vasospasm.
Surgical care
Options include:
Transaortic endarterectomy of the coeliac or superior mesenteric artery.
Retrograde bypass from the external iliac artery.
Anterograde bypass, which provides the best orientation of the graft to the aorta.
Providing there is no bowel infarction, the tendency is to opt for less invasive procedures such as angioplasty and stenting rather than open surgical repair.
Ischaemic colitis
This is caused by a compromise of the blood circulation supplying the colon. Marginal branches of the middle colic (superior mesenteric territory) and left colic (inferior mesenteric territory) arteries supply the transverse and descending segments of the colon and, with an arterial and lymphatic watershed existing near to the splenic flexure, supported by an additional vascular arcade, this part of the colon is at risk. Also, blood flow may be impaired by colonic distension with ischaemic colitis occurring within the segment of intestine immediately proximal to an obstruction (stercoral ulceration) or pseudo-obstruction. Ischaemic colitis may also be caused by venous occlusion.
The incidence has been steadily increasing since it was first recognized. Because the most common cause is atheroma of the mesenteric vessels it is mainly a disease of the elderly and is rare before the age of 60. The average age for diagnosis is 70. The incidence is likely to increase with the increasing age of the population.
The condition is, however, by no means unknown in younger age groups, due to non-cardiovascular causes such as cocaine abuse.
Stimulating aspects
Thrombosis:
Inferior mesenteric artery thrombosis
Emboli:
Mesenteric arterial emboli
Cholesterol emboli
Decreased cardiac output or arrhythmias.
Shock (sepsis, haemorrhage, hypovolaemia).
Trauma.
Strangulated hernia or volvulus.
Drugs:
Digitalis
Oestrogens
Antihypertensive drugs
Cocaine and methamfetamine
Vasopressin
Phenylephrine
Pseudoephedrine
Immunosuppressive agents
Psychotropic agents
Surgery:
Cardiac bypass
Aortic dissection and repair
Aortoiliac reconstruction
Colectomy with inferior mesenteric artery ligation
Gynaecological operations
Vasculitis:
Systematic lupus erythematosus
Polyarteritis nodosa (hepattis B, Hepatitis C)
Thromboangiitis obliterans
Rheumatoid vasculitis
Sickle cell disease
Disorders of coagulation:
Protein C deficiency
Protein S deficiency
Paroxysmal nocturnal haemoglobinuria
Activated protein C resistance
Antithrombin III deficiency
Long-distance running.
Colonoscopy or barium enema.
Idiopathic.
Presentation
The condition may be difficult to diagnose, with nonspecific symptoms of an ‘acute abdomen’, such as acute-onset abdominal pain. The pain is most frequently located in the left iliac fossa. Nausea and vomiting often occur and, in the later stages, loose motion containing dark blood. Marked tenderness may be found in the left iliac fossa.
The diagnosis may be one of exclusion and should always be borne in mind in patients presenting with abdominal pain of indeterminate cause. In younger patients it is often associated with taking the contraceptive pill, cocaine or methamfetamine abuse, the use of pseudoephedrine, sickle cell disease and inherited coagulopathies.
Examination
The presence of metabolic acidosis may be a clue.
Colonoscopy may show blue, swollen mucosa not showing contact bleeding and sparing the rectum.
Plain abdominal X-ray may show abnormal segment outlined with gas.
Barium enema shows ‘thumb printing’ in the early phase that may last for several days. The mucosa may then return to normal or progress to ulceration with similar appearance to segmental ulcerative colitis or Crohn’s disease. It may either resolve spontaneously or progress to narrowing of the intestine +/- sacculation of the antimesenteric border.
Other modalities occasionally used include CT scan, MRI scan and angiography.
Distinguished Identification
Dysentery
Acute diverticular disease of the colon.
Acute inflammatory bowel disease
Perforation of a hollow viscus or pancreatitis causing left-sided peritonitis.
Medical care
In many cases, the ischaemia resolves once the cause of the hypoperfusion has been alleviated. Bowel rest and supportive care are often helpful.
Antibiotics are often given but their benefits are unproven.
Surgical care
Rarely, fulminant ischaemic colitis develops, with perforation or gangrene and this requires immediate surgery.
A chronic condition can develop (chronic segmental colitis) which may require segmental colectomy. A stricture may also occur, which may require surgical treatment although, if the symptoms are not too severe, it is worth adopting a ‘wait and see’ approach, as spontaneous resolution may occur in months.
| ESSENTIALAI-STEM |
MIDEAST STOCKS-Dubai's DSI slumps on more write-offs, oil below $50 sours sentiment
* Arabtec at 14-mnth on potential 722 mn dirhams further write-off * Tabarak may offer DSI future value but outlook uncertain * Saudi drop weighed down by petchems * But STC up on Q1 net profit beat * Foreign funds net buyers in Egypt By Celine Aswad DUBAI, May 7 (Reuters) - Shares of Dubai builder Drake & Scull (DSI) slumped to a 14-month low in heavy trade on Sunday as investors reacted to the company’s revised capital restructuring plan, while last week’s fall in oil prices knocked down oil-sensitive shares. Dubai’s stock index fell 1.0 percent as DSI plummeted 9.9 percent to 0.399 dirham after a shareholder meeting held on Thursday. “The new news from the meeting is the 722 million dirhams additional write off from potentially unrecoverable receivables, and the market - rightfully so - was reacting to that as it would effectively dilute current shareholder value by up to 75 percent, more than previously anticipated,” said Allen Sandeep, head of equity research at Naeem Brokerage in Cairo. The capital reduction of up to 722 million dirhams is in addition to a previously planned reduction of 992 million dirhams, it said. In 2016 the company made a full-year net loss attributable to owners of the parent of 732.9 million dirhams. DSI also said that shareholders had “unanimously expressed no interest” in a 500 million-dirham ($136 million) capital increase via a new share issue at 1 dirham per share. Instead, Tabarak Investment, a Dubai-based investment firm which currently does not hold any stock in DSI, agreed to buy the new shares, which will be issued if the securities regulator approved the further capital reduction by DSI, the builder said. Analysts at Abu Dhabi’s Alramz Capital said the injection of capital by Tabarak could play a significant role because of the builder’s ability to negotiate and to settle outstanding cases with clients and creditors. “Tabarak have done it before with Gulf Navigation as a very recent example. Some of the favourable scenarios for DSI include settling the Aramco case as well as renegotiating with creditors for better financing terms,” said Talal Touqan, head of research at Alramz Capital. “And these serve as positive catalysts for DSI’s long-term perspective. But the timeline and when this might happen is still unknown.” As of December 2016, DSI had an outstanding order variation of 1.7 billion dirhams from contracts in Saudi Arabia, according to Alramz. In Abu Dhabi, the index dropped 1.0 percent dragged down by a 4.6 percent fall in the shares of natural gas producer Dana Gas. In Doha, oil rig provider Gulf International Services dropped 4.0 percent to 23.96 riyals, a four-year low. Qatar’s index lost 1.1 percent, its fourth straight session of declines. All but three of 14 listed Saudi petrochemical makers fell after Brent crude dropped below $50 late last week. Heavyweight Saudi Basic Industries retreated 1.0 percent; the main market index dropped 1.0 percent. Saudi Arabian Mining Co (Ma’aden) lost 1.0 percent, failing to hold onto gains in the day. The company reported a first-quarter net profit of 275.6 million riyals ($73.5 million), up 41.9 percent from a year ago and beating the average analyst forecast of 167.9 million riyals. Shares of Saudi’s largest telecom operator, Saudi Telecom Co (STC), rose 1.1 percent after it reported a first quarter net profit of 2.53 billion riyals ($674.63 million), up 5 percent from a year earlier and above the 2.21 billion riyals analysts had forecast the former monopoly would make. Alrjahi Capital said that historically the company’s costs are lowest in the first quarter. It also said that revenues, which fell 3 percent in the first quarter, could improve because of a reversal in civil servant allowances announced last month. Egypt’s index edged down 0.1 percent but daily traded volumes rose to their highest in seven weeks with international funds net buyers on Sunday, bourse data showed. Investment bank and brokerage firm EFG Hermes, a stock favoured by foreign funds, added 0.6 percent. Sixteen shares on EGX 30, however, dropped, with GB Auto declining 2.4 percent. * The index fell 1.0 percent to 6,857 points. * The index dropped 1.0 percent to 3,384 points. * The index lost 1.0 percent to 4,570 points. * The index fell 1.1 percent to 9,834 points. * The index edged down 0.1 percent to 12,692 points. * The index dropped 2.8 percent to 6,565 points. * The index fell 0.5 percent to 1,325 points. * The index declined 0.5 percent to 5,450 points. ($1 = 3.7502 riyals) Editing by Andrew Torchia | NEWS-MULTISOURCE |
Quantum Radar
Quantum Computing is about to upend our Digital Privacy, but I only just learned Quantum Algorithms will do the same for Military Stealth too…
Currently, stealth works in a couple of basic ways:
1. Minimising the reflected radar signal.
2. Sending back a fake signal.
3. Messing with the electronic brain of the radar system (but this is more electronic warfare than stealth).
For a radar system, both 1 and 2 can be circumvented if there is someway for it to focus exclusively on the echoes from its own beam by filtering all the other photons. In this way, it can concentrate on the real target and ignore innocent but confusing background noise, and deliberate spoofing with fake signals.
Radars today try to filter out these false signals by focusing on specific frequency ranges and very precise timings, but clever EM warfare packages are able to spoof these techniques.
What the radar needs is a way to securely ‘tag’ its own photons, so that it can filter and ignore anything else…
Enter the Quantum Radar…
“Only a few of the photons sent out will be reflected back if they hit a stealth aircraft. A conventional radar wouldn’t be able to distinguish these returning photons from the mass of incoming signals created by natural phenomena—or by radar-jamming devices. But a quantum radar can check for evidence that incoming photons are entangled with the ones held back. Any that are must have originated at the radar station. This enables it to detect even the faintest of return signals in a mass of background noise.
Confused signals from target, environment and spoofing.
Background noise is filtered by quantum algorithms which only allow photons through if they are entangled with clones of the transmitted photons held in the radar’s ‘quantum memory’ .
The target is revealed.
However faint the real signal, it can never be swamped because only reflections from the radar station are considered.
https://www.technologyreview.com/s/612421/us-china-quantum-arms-race/
Amazing! | ESSENTIALAI-STEM |
eljonan
Distinguished
Apr 25, 2011
1
0
18,510
Long story short, my sony vaio's hard drive got busted and i replaced it with the hard drive from an old compaq i had laying about. I did the windows restore thinking it would try to identify the laptops components on its own but now it thinks that it is the old compaq again. Is there anything i could do to have it detect the actual components or do i have to do a clean install of windows to have that happen?
yoji
Distinguished
Jul 1, 2011
88
0
18,610
If you did the windows restore/recovery then it will put it back to "factory settings".. so yes.. as it was as a Compaq.
But if windows is working.. that suggests its working well enough that it should update itself with drivers etc as it detects "new hardware"... or if you do a windows update....
But branding will still be Compaq.. but that's not a real worry? though you may want to uninstall Compaq specific tools and download any Vaio specific tools you want from Sony.
Cheers
| ESSENTIALAI-STEM |
New Judge in the 9/11 Trial at Guantánamo Inherits a Complex History
This article was produced in partnership with the Pulitzer Center on Crisis Reporting. GUANTÁNAMO BAY, Cuba — When he took over this week as the judge in the military trial of the five defendants charged in the Sept. 11, 2001, attacks, Col. W. Shane Cohen inherited 23,039 pages of public and secret transcripts; a vault with secret evidence withheld from defense lawyers by prosecutors invoking a national security exception; approximately 500 substantive legal case motions, some awaiting rulings; and more legal arguments and filings in the pipeline. He is the third person since 2012 to preside over the complex, slow-moving proceedings, which have been bogged down over how to handle what the United States did to the terrorist suspects from 2002 to 2006 in the C.I.A.’s secret network of black sites. More than 17 years have passed since the attacks by Al Qaeda — and seven since Khalid Shaikh Mohammed, the accused mastermind of the plot, and four accused accomplices were arraigned in the case, which carries the death penalty — and Colonel Cohen could be the first judge to set a trial date. On his first day on the bench, he described himself to lawyers in the case as a Mormon with “a very Jewish name” who felt shock but no anger over the hijackings that killed nearly 3,000 people on Sept. 11. He referred to the Sept. 11 defendants arrayed in front of him in the cavernous courtroom on the United States military base at Guantánamo Bay as “gentlemen” and addressed civilian defense lawyers as “sir” and “ma’am,” adopting a more courteous approach than the cutting, less indulgent judge, a Marine colonel, who presided before him. Colonel Cohen said he had two years left on his current Air Force assignment, as a circuit judge based in Virginia, and nine years until mandatory retirement, meaning he could preside over the case for some time. “I understand the seriousness of what we’re doing here,” he said. His first day in court on Monday was devoted to letting lawyers question him on his qualifications and for potential bias, a practice in court-martial cases. It offered a window into the style, experience and thinking of Colonel Cohen, a 48-year-old career military lawyer, whose last assignment was as chief of the Air Force’s environmental law and litigation division. “I do not recall ever being angry about anything that happened with Sept. 11,” he said, adding that he did not know a single victim of the attacks. On that day, he said, he was taking a defense lawyer’s course at the Bolling Air Force Base in Washington, across the Potomac River from the Pentagon. When James Harrington, a defense lawyer representing Ramzi bin al-Shibh, one of the accused plotters, asked if the colonel was aware that the C.I.A. torture of the defendants “was a big issue in this case,” the judge responded, “I understand that the parties will be arguing over whether or not your clients were tortured.” The judge was assigned to the case June 3. Since then, he said, he had “wondered” whether the United States Constitution applies to military commissions, and was hoping prosecutors and defense lawyers would help him “make the right decision.” Mr. Harrington replied, “Welcome to the sewer, judge.” The last judge, Col. Keith Parrella of the Marines, was impatient and decisive during his qualifications questioning. He took over the case in September, presided for nine months then became commander of Marine Corps security forces at United States Embassies worldwide. Colonel Cohen appeared humble by contrast, asking at times how to pronounce the names of some in the courtroom, notably Mr. bin al-Shibh. Mr. Mohammed, the lead defendant, sat about 30 feet away from the judge. His accused accomplices sat in rows behind him, two of them having brought shawls with images of Al Aqsa Mosque in Jerusalem, demonstrating their affinity with the Palestinians. The judge’s official biography shows he obtained his undergraduate and law degrees from the Brigham Young University. But, unprompted, he brought up his faith when he was asked about his attitude toward Israel’s conduct in the Middle East. “I do have some relatives that are Jewish. I am not. I am a member of the Church of Jesus Christ of Latter-day Saints,” he said. “I believe that all people, men and women, should be able to worship how, where and what they may. I have no affiliations with the state of Israel, nor do I harbor any ill will toward the religion of Islam.” When a defense lawyer pointed out that the question was not about his religious affiliation, the judge replied, “I wanted to just put that aside because I do realize it is a very Jewish name.” He then noted that Israel “was recognized as a state” before he was born. “Whether or not that was the correct decision or not, that’s not my decision,” he said. Colonel Cohen also said he had never been involved in a death-penalty or multiple-defendant case in his 20 years as a military lawyer. In 2003, a year he served as a defense lawyer at United States air bases in Turkey and Japan, he said, he took capital punishment defense training to become a “learned counsel,” a specialty recognized by the American Bar Association. Each Sept. 11 defendant has one, paid by the Pentagon. A trial prosecutor, Clayton Trivett, had only one question, to which Colonel Cohen replied that he has not applied for a civilian job at the Justice or Defense Departments. The question was important because a federal court this year invalidated about two years of pretrial rulings in the destroyer Cole trial, the other capital case at Guantánamo, because that case’s judge secretly negotiated with the Justice Department for a civilian immigration judge position while presiding in the case with a Justice Department prosecutor. Colonel Cohen said he read that decision and took away a one-word lesson: “Disclose.” | NEWS-MULTISOURCE |
User:Rakhadzi
What is photosynthesis?
Photosynthesis is the process whereby plant manufacture their own food using light or radiation from the sun | WIKI |
2019 Nigerian House of Representatives elections in Enugu State
The 2019 Nigerian House of Representatives elections in Enugu State was held on February 23, 2019, to elect members of the House of Representatives to represent Enugu State, Nigeria.
Aninri/Awgu/Oji River
A total of 12 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Toby Okechukwu won the election, defeating APC VinMartin Obiora Ilo and 10 other party candidates. Okechukwu received 80% of the votes, while Ilo received 13.32%.
Enugu East/Isi-Uzo
A total of 10 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Prince Cornelius Nnaji won the election, defeating APC Ebenyi Kingsley and 8 other party candidates. Nnaji received 79.36% of the votes, while Kingsley received 20.22%.
Enugu North/Enugu South
A total of 13 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Ofor Gregory Chukwuegbo won the election, defeating APC Maduka Nelson Arum and 11 other party candidates. Chukwuegbo received 69.12% of the votes, while Arum received 24.93%.
Ezeagu/Udi
A total of 13 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Dennis Amadi won the election, defeating APC Mmaniel Joseph Onyemadi and 11 other party candidates. Amadi received 81.99% of the votes, while Onyemadi received 12.31%.
Igbo-Etiti/Uzo-Uwani
A total of 11 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Martins Oke won the election, defeating APC Jonathan Chukwuma and 9 other party candidates. Oke received 83.87% of the votes, while Chukwuma received 13.60%.
Igboeze North/Udenu
A total of 12 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Simon Chukwuemeka Atigwe won the election, defeating APC Kentus Eze and 10 other party candidates. Atigwe received 85.95% of the votes, while Eze received 13.64%.
Nkanu East/Nkanu West
A total of 11 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Nnolim Nnaji won the election, defeating APC Anthony Okwudili Nwafor and 9 other party candidates. Nnaji received 85.18% of the votes, while Nwafor received 7.65%.
Nsukka/Igbo-Eze South
A total of 8 candidates registered with the Independent National Electoral Commission to contest in the election. PDP candidate Patrick Asadu won the election, defeating APC Ikechukwu Ugwede and 6 other party candidates. Asadu received 83.1% of the votes, while Ugwede received 16.53%. | WIKI |
Kamala Harris: 'Single women in politics' aren't granted the same 'latitude' as men | TheHill
Sen. Kamala HarrisKamala Devi HarrisEight Democratic presidential hopefuls to appear in CNN climate town hall Biden, Buttigieg bypassing Democratic delegate meeting: report The Hill's Morning Report - Trump on defense over economic jitters MORE says single women in politics get treated differently than their male counterparts. The imbalance, the California Democrat writes in her new book, “The Truths We Hold: An American Journey,” released Tuesday, is part of the reason she kept her dating life under wraps before getting married. “As a single, professional women in my forties, and very much in the public eye, dating wasn’t easy,” Harris, now 54, writes. “I knew that if I brought a man with me to an event, people would immediately start to speculate about our relationship,” the junior California senator — who’s considered a potential 2020 presidential contender — says in her book. “I also knew that single women in politics are viewed differently than single men. We don’t get the same latitude when it comes to our social lives.” Before she met Doug Emhoff, Harris writes, “I had no interest in inviting that kind of scrutiny unless I was close to sure I’d found ‘the One’ — which meant that for years, I kept my personal life compartmentalized from my career.” Harris was set up on a date with Emhoff by her best friend only after she promised not to Google the lawyer’s name. “Don’t overthink it. Just meet him. I already gave him your number. He’s going to reach out,” Harris recalls her pal telling her. The couple tied the knot in 2014. Harris reveals in her book that Emhoff’s two children from a previous marriage weren’t keen on calling the former California attorney general “stepmom” — so they came up with a different title that played off of her distinctive moniker. “Instead they call me their ‘Momala,'” Harris says, indicating in her book that she has a close relationship with her stepchildren and considers Emhoff’s first wife “a friend.” “We sometimes joke that our modern family is almost a little too functional,” she quips. The lawmaker, whose book focuses largely on her upbringing and her vision for the future, makes little direct mention of President TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE in "The Truths We Hold." She does say Trump was at the forefront of a "race to the bottom" in the 2016 GOP presidential primary and refers to him as a man who "crossed every boundary of decency and integrity." Harris also recalls watching the results come in on Election Day in 2016 as it became increasingly clear Democratic presidential nominee Hillary ClintonHillary Diane Rodham ClintonTop Sanders adviser: Warren isn't competing for 'same pool of voters' Anti-Trump vets join Steyer group in pressing Democrats to impeach Trump Republicans plot comeback in New Jersey MORE would not prevail. "No one really knew what to say or do," Harris writes, as she describes engaging in a form of nacho cheese-flavored therapy: "Each of us was trying to cope in our own way. I sat down on the couch with Doug and ate an entire family-size bag of classic Doritos. Didn't share a single chip." View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Talk:Vinyl revival
The importance of Hip Hop Djing and sample culture!
Why isn´t the importance of Djing and Sample Culture in Hip Hop mentioned here anywhere? In Hip Hop Vinyl never dissapeared! Hip Hoppers engaged in "Save the Vinyl" Movement when it was almost replaced by CDs in the 90s. Vinyl always was important to to turntablists and beatproducers. Through Hip Hop I personally came to buying my first Vinyl some years before the Revival. And many Hip Hop DJs and producers also have other music than Rap in their collection, like Soul, Funk, Jazz or every other Genre. Steffen AM 24.4.2022 — Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:05, 24 April 2022 (UTC)
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 27 August 2018 and 13 December 2018. Further details are available on the course page. Student editor(s): Edaig1.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 04:42, 18 January 2022 (UTC)
Vinyl revival is a myth
"vinyl revival" is based on sales since year 1990 or so. But, in 1990 vinyl was almost dead. Look at this link. There is a graph going back to earlier days a page down or so.
https://www.vox.com/2015/1/27/7922989/music-sales-2014
It is easy to increase from almost nothing.
DnalorKarlsson (talk) 10:21, 6 August 2017 (UTC)
* True, but the article acknowledges that vinyl represents only a very small proportion of overall music sales.JezGrove (talk) 23:35, 31 August 2017 (UTC)
Role of music cassette tapes
The article as it currently (2017-10-09) makes no mention of the volume of music cassette tapes sold during the 1980s and into the early 1990s. One report suggests that for the period starting 1985 and ending ~1992, music cassettes were the dominant format in the U.K., and the Wikipedia page on the Compact Cassette cites two sources indicating that cassette tape sales overtook LP sales.
In short, the popularity of cassettes was having an impact on LP sales before the acceleration of CD sales. Further research is required to validate this, but this oversight in the article needs to be corrected. — Preceding unsigned comment added by Mhmonkman (talk • contribs) 14:12, 9 October 2017 (UTC)
Worldwide view of vinyl revival
So, as this wikipedia page has some problems and mostly focuses on the US and UK it does not provide a balanced and sane view of vinyl sales/revival worldwide.
Please help make this article better and provide a broader view of vinyl in the current times.
I've done my best to add 3 additional sales figures for my own country (that I could find), for which accurate data is relatively easy to get as the Dutch trade association of the entertainment industry, NVPI, publishes figures regularly and is verified by outside sources. But that's just the Netherlands.
We need additional information on the state of vinyl for other countries. Please help add this.
~ DaveFlash (talk) 8:19, 28 June 2018 (UTC)
Name
Really, this should be called The Revinyval. AsmodeanUnderscore (talk) 16:46, 18 October 2019 (UTC)
2012 charts
Seems like we can delete the 2012 charts as they are obsolete data. There's nothing particularly special about 2012. — Preceding unsigned comment added by Djk74 (talk • contribs) 21:47, 17 March 2021 (UTC)
* RIAA revenue and units sold data updated to 2022. Full year 2023 data not yet available. Arahl1 (talk) 16:47, 17 March 2024 (UTC)
Definition of music revenues
"In 2020 vinyl recordings accounted only for 5.1% ($619.6m) of total US music revenues and CDs accounted for 4% ($483.3m) of revenues. Digital and streaming formats accounted for the remainder of the $12.2 billion in US music revenues, with paid subscriptions accounting for 57.7% of total revenue at $7.0 Billion." I am confused. What is the definition of music revenue? For me, as a lay person, it should at least include concerts and probably sheet music. But these, which obviously had some income, are clearly excluded from the figures. Why? Kdammers (talk) 22:07, 12 January 2022 (UTC) There are also the minuscule sales of piano rolls, their electronic off-spring, and maybe still cassettes. Also, what about royalties for use in movies and elsewhere?Kdammers (talk) 22:12, 12 January 2022 (UTC)
One reson vinyl is back, is because digital has only 2 states, on or off, vinyl is analog and sound fade from one to another. much more smothly.
I forgot to mention the same, or nearly the same for tape. 2600:1700:3A99:C000:398F:49CE:A83F:BBA9 (talk) 03:51, 31 January 2023 (UTC) | WIKI |
1. He was of Viking extraction.
Though he spoke a dialect of French and grew up in Normandy, a fiefdom loyal to the French kingdom, William and other Normans descended from Scandinavian invaders. William’s great-great-great-grandfather, Rollo, pillaged northern France with fellow Viking raiders in the late ninth and early 10th centuries, eventually accepting his own territory (Normandy, named for the Norsemen who controlled it) in exchange for peace.
2. He had reason to hate his original name.
The product of an affair between Robert I, duke of Normandy, and a woman called Herleva, William was likely known to his contemporaries as William the Bastard for much of his life. His critics continued to use this moniker (albeit behind his back) even after he defeated the English at the Battle of Hastings and earned an upgrade to William the Conqueror.
3. His future bride wanted nothing to do with him at first.
When William asked for the hand of Matilda of Flanders, a granddaughter of France’s King Robert II, she demurred, perhaps because of his illegitimacy or her entanglement with another man. According to legend, the snubbed duke tackled Matilda in the street, pulling her off her horse by her long braids. In any event, she consented to marry him and bore him 10 children before her death in 1083, which plunged William into a deep depression.
4. He couldn’t bear any disrespect toward his mother.
During William’s siege of Alençon, a disputed town on the border of Normandy, in the late 1040s or early 1050s, residents are said to have hung animal hides on their walls. They mocked him for being the grandson of a tanner, referring to the occupation of his mother’s father. To avenge her honor, he had their hands and feet cut off.
5. He made England speak Franglais.
William spoke no English when he ascended the throne, and he failed to master it despite his efforts. (Like most nobles of his time, he also happened to be illiterate.) Thanks to the Norman invasion, French was spoken in England’s courts for centuries and completely transformed the English language, infusing it with new words.
Recommended for you
6. His jester was the first casualty of the Battle of Hastings.
William’s jester rode beside him during the invasion of England, lifting the troops’ spirits by singing about heroic deeds. When they reached enemy lines, he taunted the English by juggling his sword and was promptly killed, initiating the historic skirmish.
7. He was touchy about his weight.
Described as strapping and healthy in his earlier years, William apparently ballooned later in life. It is said that King Philip of France likened him to a pregnant woman about to give birth. According to some accounts, the corpulent conqueror became so dismayed with his size that he devised his own version of a fad diet, consuming only wine and spirits for a certain period of time. It didn’t work.
8. His body exploded at his funeral.
William died after his horse reared up during a 1087 battle, throwing the king against his saddle pommel so forcefully that his intestines ruptured. An infection set in that killed him several weeks later. As priests tried to stuff William into a stone coffin that proved too small for his bulk, they pushed on his abdomen, causing it to burst. Mourners supposedly ran for the door to escape the putrid stench.
9. He is an ancestor of millions of people.
Every English monarch who followed William, including Queen Elizabeth II, is considered a descendant of the Norman-born king. According to some genealogists, more than 25 percent of the English population is also distantly related to him, as are countless Americans with British ancestry.
10. He’s responsible for scores of British Wills.
William, an Old French name composed of Germanic elements (“wil,” meaning desire, and “helm,” meaning protection), was introduced to England by William the Conqueror and quickly became widespread. By the 13th century, it was the most common given name among English men. Today it still ranks in the top 10, and some have predicted that the future crowning of another King William will propel the name even higher. | FINEWEB-EDU |
paleo diet thesis
and 60s. I say this based on the fact that sea salt requires less processing, not because of the iodine. If these steps are not taken, then there can be a wide variety of negative effects like lightheadedness upon standing up quickly, feeling faint, weakness, fatigue (worse after exercise headaches, and constipation. If you determine that you cant tolerate cow-milk products (kefir, yogurt, cheese, milk then you may want to try goat or sheep dairy during the reintroduction phase Reintroduce in this order (skip foods you dont want to eat ghee (clarified butter butter, kefir (homemade has. Proteins: 10-20 of your total daily calories (65 to 130 grams for a moderately active male eating 2,600 dissertation on carl marx calories per day, and 50 to 100 grams for a moderately active female eating 2,000 calories per day). What makes you feel your best? More frequently though, I feel the need to increase my fat rather than my carbs. All of which can result in a wide variety of negative symptoms in some people that may drive one back to the carbohydrates. The book claims that there is no one-size-fits-all approach for diet and lifestyle. Did you know that humans are the only species to continue to drink milk after infancy?
I feel fantastic, much better than when I was low carb. However, then you began to go through the inevitable detox and adjustment phase, which commonly produces the type of symptoms you experienced. There is a wide variance of what might be an acceptable level of carbohydrates within the Paleo structure. Eat in moderation, avoid completely, meal planning, approximate ranges for macronutrients.
The Paleo Diet plan by Loren Cordain: Food list What The Paleo and Primal Diet Eating Like a Caveman
Bone broths differ from stocks in that theyre simmered for a long time up to forty-eight hours to get the maximum nutrition from the bones Fish Especially fatty fish, like salmon, sardines, mackerel, anchovies, and herring Wild is preferable Eat three six-ounce servings of fatty. Just remember that cheating intro to gre argument essay score 6 doesnt mean go out and eat 4 pizzas, drink a gallon of soda and 6 packs of French fries. One may also find that they do best by really emulating our ancestors and that means eating a little higher carbohydrate level during the summertime and less or ketogenic during the winter months, like they did. However, if those options are not available, dont let that get in the way of your Reset Eat tougher cuts of meat, like brisket, chuck roast, oxtail, and shanks; and dont shy away from skin and cartilage these are all excellent sources of glycine Organ. About Me page and read his story (check out his slide show which shows the transformation). Adrenal fatigue has a significant impact on ones ability to handle glucose since the adrenals are called upon anytime glucose goes up or down and insulin is released. The phase of recovery that you are in for one of these particular conditions will also impact your carb intake. Prior to agriculture, legumes were very rare and were not a staple in our diets.
paleo diet thesis | ESSENTIALAI-STEM |
Calculating d’, beta, c and Ad’ in Python and PHP
About d’
A central component of Signal Detection Theory is d’ – a measure of the ability to discriminate a signal from noise. The d’ is flanked by the parameters “beta” and c, which are measures of the criterion that the observer uses to discriminate between the two.
These measures can be calculated in every experiment where there is a signal (e.g. target trials) and noise (e.g. nontarget trials), and the observer (e.g. subject) is to indicate whether the signal was present or not. d’, beta and c are statistical measures in a model where noise and noise+signal are regarded as two “probability-of-detection” distributions on a “threshold-of-detection” continuum. d’ is basically a Z-score on how well the observer discriminates the two distributions, i.e. the number of standard deviations between the probability-of-response distributions for signal and noise for this given subject. c (the criterion) is the number of standard deviations from the midpoint between these two distributions, i.e. a measure on a continuum from “conservative” to “liberal”.
Every trial is scored as one of four possibilities:
• noise + signal + response: HIT
• noise + signal + no response: MISS
• noise + response: FALSE ALARM (FA)
• noise + no response: CORRECT REJECTION (CR)
It is often analyzed in terms of rates:
• HIT RATE = HIT/SIGNALS (ratio of signals detected as signals)
• FA RATE = FA/NON-SIGNALS (ratio of noise detected as signals)
You want to have a high hit rate and a low fa rate (hitrate > farate). Say you have conducted an experiment on a subject and calculated hitrate and farate. A signal-detection account of the subjects signal-detection-abilities can be one of the following
• If hitrate=1 and farate=0, d’ is infinite, meaning that you signals and noise are totally separated, i.e. the distributions are non-overlapping. In that case, you have effectively discriminated signal from noise.
• If hitrate > farate, d’ is positive, meaning that you are more likely to detect the information as signal when signal is present than when it is absent.
• If hitrate=farate, d’=0, meaning that you are just as likely to detect signals and noise as signals, i.e. you were unable to discriminate the signal and noise and hence the probability-of-detection distributions overlap perfectly. This occurs when responses are perfectly random.
• If hitrate < farate, d’ is negative, meaning that you have a wierd bias of primarily detecting noise as signals while ignoring the actual signals.
• If hitrate = 0 and farate = 1, d’ is negatively infinite, meaning that you have completely confused noise and signal.
For a a more thorough introduction and guide to calculating d’/beta, “Calculation of signal detection theory measures” by Stanislaw & Todorov.
Calculating d’, beta, c and Ad’ in Python
Using the Percentile Point Function (ppf) from scipy:
[/crayon]
Note the adjustment of rate=0 and rate=1, to prevent infinite values.
Calculating d’, beta, c and Ad’ in PHP
[/crayon]
Note that a rate-threshold of 0.025 is used because the PHP-ppf function above is only an estimation which fails violently if this threshold is exceeded. | ESSENTIALAI-STEM |
AR
Causes Signs and Symptoms
Chronic Venous Insufficiency
Treatment and Relief
Heavy legs
9/7/2022
The importance of fast-absorbing venotonic treatments for tired legs
Are you aware of the symptoms that indicate that you have venous insufficiency? You have probably heard of leg heaviness or leg fatigue. This includes the swelling that can be associated with tired legs syndrome1. We will tell you more about tired legs syndrome and how to treat it.
Learn how to identify symptoms of tired legs
Swelling related to tired legs is frequently related to body position. This swelling in the legs will be aggravated when spending long periods of time without moving. For example, when we sit or stand for long periods of time. The swelling associated with tired legs can also be made worse by heat. In addition, muscle crampspain and tingling in the legs may occur. These symptoms related to tired legs may be the beginning of chronic venous insufficiency, a problem that progresses and gets worse, evolving, for example, into varicose veins. 1
Treatment with venotonic and venoprotective drugs has been shown to significantly improve the condition of symptoms related to oedema and chronic venous inefficiency (CVI). CVI is characterised by heavy legspain and cramps at night2
References
1. Guía práctica para prevenir y tratar el Síndrome de piernas cansadas. SEFAC. https://www.sefac.org/sites/default/files/2017-11/Sind__piernas_cansadas.pdfLast accessed: May 2022
2. Recomendaciones para el manejo de la Enfermedad Venosa Crónica en Atención Primaria. http://www.semergen.es/resources/files/noticias/venosaCrocina_1.pdfLast accessed 02/06/2020 Last accessed May 2022
2024 | ESSENTIALAI-STEM |
カトウ ケイコ KATO KEIKO
加藤 啓子
所属 京都産業大学 生命科学部 先端生命科学科
職種 教授
期間 2009/07
名称 Distinct role of growth hormone on epilepsy progression in a model of temporal lobe epilepsy
区分 その他
開催場所 WILEY-BLACKWELL PUBLISHING, INC JOURNAL OF NEUROCHEMISTRY
発表者・共同発表者等 Keiko Kato,Masakazu Suzuki,Hiroki Kanno,Shinji Sekino,Ken Kusakabe,Toshiya Okada,Tetsuji Mori,Kazuyuki Yoshida,Yoshio Hirabayashi
発表・展示等 Temporal lobe epilepsy is a common form of pharmacoresistant epilepsy, in which epileptogenic foci propagate to other regions of the brain from the area of the initial insult. The present study focused on epileptogenesis, that is, the development of the first foci inducing seizures in amygdala-kindled mice, a model of temporal lobe epilepsy, to find the molecular process promoting the formation of epileptogenic networks. The expression of growth hormone (GH) was up-regulated along neural circuits during the epileptogenesis, while there was no difference in the pituitary gland. The up-regulation was associated with increased phosphorylation/activation of signal transducer and activator of transcription 5 and expression of the Serum Response Element-regulated genes, FBJ osteosarcoma oncogene, early growth response 1, and Jun-B oncogene, suggesting that expression of GH leads to GH signaling in the hippocampus and cortex. Furthermore, the administration of the hormone into the hippocampus markedly enhanced the progression of kindling. The administration of an inhibitor of its secretion into the hippocampus elicited a delay in the progression. Our results demonstrate directly that regulation via growth hormone has a robust impact in epileptogenesis.
DOI 10.1111/j.1471-4159.2009.06132.x | ESSENTIALAI-STEM |
Talk:bradyon
Etymology
Supposed to be from a Greek root meaning slow. Equinox 16:57, 26 November 2008 (UTC)
* Yes, βραδύς:. —Stephen 17:14, 26 November 2008 (UTC) | WIKI |
Amanda Staveley
Amanda Louise Staveley (born 11 April 1973) is a British business executive. She is notable chiefly for her connections with Middle Eastern investors. She helped a Saudi consortium take over Newcastle United in a deal completed in October 2021 and has joined the board of directors.
In 2008, Staveley played a prominent role in the investment of £7.3 billion in Barclays by the ruling families of Abu Dhabi and Qatar, and by the Qatari sovereign wealth fund.
Staveley's firm, PCP Capital Partners, acted for Sheikh Mansour Bin Zayed Al Nahyan of the Abu Dhabi royal family, who invested £3.5 billion to control 16 percent of the bank. The deal was reported to have earned PCP Capital Partners a commission of £110 million, which, after paying advisers, represented a profit of £40 million. Staveley was also involved in Mansour's high-profile purchase of Manchester City in September 2008.
Staveley has also attempted on two occasions to buy a stake in Newcastle United, first in 2017 and again in 2020 as part of a group led by Saudi Arabia's sovereign wealth fund, the Public Investment Fund. The takeover was completed on 7 October 2021, with Staveley owning 10% of the club, the Reuben Brothers owning 10% and Public Investment Fund (PIF), Saudi Arabia's sovereign wealth fund, owning 80%.
Early life and education
Staveley was born near Ripon in Yorkshire. She is the daughter of Robert Staveley, a North Yorkshire landowner who founded the Lightwater Valley theme park, where Staveley waitressed as a child; her mother, Lynne, was an occasional model and champion showjumper.
Staveley was educated at Queen Margaret's School, York. As a child, she competed in showjumping and athletics. At the age of 16, Staveley left school and enrolled at a crammer, winning a place to read modern languages at St Catharine's College, Cambridge. As a student, she supplemented her income by working as a model. Staveley abandoned her degree after suffering from stress following the death of her grandfather.
Early career and creation of Q.ton
In 1996, Staveley borrowed £180,000 and bought the restaurant, Stocks, in Bottisham between Cambridge and Newmarket. Through the restaurant, Staveley came to know members of Newmarket's racing community, in particular those associated with the Godolphin Racing stables owned by the Al Maktoum family of Dubai, as well as people from Cambridge's high-tech businesses. Through the late 1990s she started dealing in shares and became an active angel investor, especially in dot com enterprises and biotech firms such as Futura Medical.
Staveley closed Stocks and in 2000 opened Q.ton, a £10 million conference centre and facility developed in a joint venture with Trinity College, Cambridge on Cambridge Science Park. Investors in Q.ton were believed to include King Abdullah of Jordan.
Q.ton and EuroTelecom
In 2000, Staveley sold a 49 per cent share in Q.ton to the telecoms company EuroTelecom for £2 million. Staveley joined the firm as a non-executive director. A few months later, EuroTelecom went out of business in the collapse of the dotcom boom. At the time, it was claimed that Q.ton owed EuroTelecom £835,000 and that Staveley had agreed to buy back the company's stake, only for the money not to be forthcoming. Staveley denied having agreed to any payments and hired Kroll Inc. to investigate the members of the EuroTelecom board.
Staveley bought EuroTelecom's stake in Q.ton from the firm's administrator PricewaterhouseCoopers, a deal that led to a discontinued petition of bankruptcy against her when payment was delayed. She began raising £35 million from private investors to roll out the Q.ton concept throughout the UK and Europe. However, the company failed. Staveley agreed an Individual Voluntary Arrangement and in 2008 was paying back her creditors, including Barclays.
Background
After the failure of Q.ton, Staveley moved to Dubai, cultivating connections centred on Abu Dhabi, but extending across the Middle East.
In 2008, the Financial Times described her firm, PCP Capital Partners, as really amounting to Staveley and her legal partner, Craig Eadie, and explained that, although based in Mayfair, London, the company acts "via offshore private equity affiliates" as a vehicle for the investment of Middle Eastern money, with Staveley acting as an adviser on those deals.
Barclays
These contacts brought Staveley to a new level of prominence at the end of 2008 with the investment of Middle Eastern funds in Barclays as the bank sought to recapitalise by raising money privately rather than accept a bail-out from the British government following the financial crisis of that year. Staveley earned a fee of £30 million for her role in the transaction. In 2010, The Daily Telegraph reported that Mansour's disposal of his stake in Barclays had made him a profit of about £2.25 billion.
On 8 June 2020, Staveley's firm filed a £1.5 billion lawsuit against Barclays, claiming that the bank offered her client, Abu Dhabi, "manifestly worse" terms than those offered to Qatar. The Barclays legal team claimed that Staveley inserted herself into the capital raising while Staveley countered that the PCP was not a "facilitator" as Barclays claimed, but rather led the investment syndicate. A judgement was reached in February 2021 with Staveley losing the case despite the judge ruling that the bank was "guilty of serious deceit" towards PCP Capital Partners. Judge Waksman’s ruling described Staveley’s deal for Sheikh Mansour as "excellent" and found that Barclays had made false representations to PCP, but dismissed PCP’s claim to compensation. In March 2021, Waksman ruled that Barclays was responsible for its own legal costs as the bank had made a "financial benefit as a result of its fraud". In April 2021, Staveley launched an appeal against the verdict, which she lost in June 2021.
Manchester City and Liverpool
The Barclays deal followed Sheikh Mansour's £210 million purchase of Manchester City in September of the same year through the Abu Dhabi United Group, a transaction reportedly worth £10 million in commission to PCP Capital Partners. At the same time Staveley was involved in extended negotiations by Sheikh Mohammed bin Rashid Al Maktoum's Dubai International Capital to buy a 49 per cent stake in Liverpool, although the deal, which would have given Staveley a place on the club's board, eventually foundered.
Takeover of Newcastle United
On 20 November 2017, Staveley submitted a bid in the region of £300 million to buy Newcastle United, which failed. In 2020 a new takeover bid, primarily funded by the Saudi Arabian government's sovereign wealth fund (Public Investment Fund), was reported in April 2020. It fell through again on 30 July 2020 as reported by the BBC, The Times and other media. A £300 million deal was successfully concluded on 7 October 2021, in which Staveley took a 10% share in Newcastle United, as did the Reuben Brothers, and the Saudi Public Investment Fund took an 80% share.
The takeover sparked condemnation by human rights organizations who characterized the takeover as "sportswashing." The other 19 Premier League clubs condemned the Saudi takeover of Newcastle, stating that it damaged the brand of the Premier League. Staveley defended the takeover, arguing that it was not "sportswashing." Staveley has also argued that PIF, which is the Saudi Arabian government's sovereign wealth fund, is a separate entity from the Saudi Arabian government. On the 12th of July 2024, Staveley and her husband announced their intention to leave Newcastle United having sold their remaining share in the club which, by this time had reduced to 6% from the original 10%.
Other deals
Also in 2008, Staveley fronted a bid by the Qatar Investment Authority to buy the Trillium facilities management business from the Land Securities property group, an offer reportedly totaling £1.1 billion. The bid in the end came to nothing and Trillium was sold to Telereal for £750 million in January 2009.
Later that year, Staveley was involved in an attempt to help finance the $13.5 billion sale of Barclays Global Investors to the US firm BlackRock, offering $2.8 billion of funding in return for a shareholding of 10%, an amount that reportedly included a commitment of Staveley's own money. In June 2009, with details being finalised, BlackRock pulled out of the deal. Press reports at the time suggested that BlackRock had sought further clarification of the identity of the investors behind the special purpose vehicle created by PCP Capital Partners to handle the offer, although alternative reports claimed that they had always been aware of the conditions of the deal. In the end, BlackRock funded its purchase of BGI from other sources.
In 2010, Staveley was reported to have advised the Qatari property investment company Barwa in their purchase of the Park House site on Oxford Street in London from Land Securities for £250 million, a deal that was said to have earned PCP Capital Partners in the region of £5 million to £7.5 million in fees. In March 2012, it was announced that Waterway PCP Properties Ltd, a Middle Eastern private equity group fronted by Staveley, had paid Land Securities £234 million for their Arundel Great Court site on the north bank of the Thames in London.
Personal life
Staveley initially hit the tabloid headlines after dating Prince Andrew, Duke of York, in 2003. In October 2011, she married British-Iranian financier Mehrdad Ghodoussi, in a ceremony held at West Wycombe Park in Buckinghamshire. In 2013, she was diagnosed with Huntington's disease. As of 2009, Staveley has lived in Dubai and a house on London's Park Lane. | WIKI |
(set-param! resolution 100) ; pixels/a (a = 1 um) (define-param lambda-min 0.4) ; minimum source wavelength (define-param lambda-max 0.8) ; maximum source wavelength (define fmin (/ lambda-max)) ; minimum source frequency (define fmax (/ lambda-min)) ; maximum source frequency (define fcen (* 0.5 (+ fmin fmax))) ; source frequency center (define df (- fmax fmin)) ; source frequency width (define-param tABS lambda-max) ; absorber/PML thickness (define-param tGLS 1) ; glass thickness (define-param tITO 0.1) ; ITO thickness (define-param tORG 0.1) ; organic thickness (define-param tAl 0.1) ; Al thickness ; length of computational cell along Z (define sz (+ tABS tGLS tITO tORG tAl)) ; length of non-absorbing region of computational cell in X and Y (define-param L 4) (define sxy (+ L (* 2 tABS))) (set! geometry-lattice (make lattice (size sxy sxy sz))) (set! pml-layers (list (make absorber (thickness tABS) (direction X)) (make absorber (thickness tABS) (direction Y)) (make pml (thickness tABS) (direction Z) (side High)))) (define ORG (make medium (index 1.75))) (define ITO (make medium (index 1.80))) (define GLS (make medium (index 1.45))) (include "/path/to/materials-library.scm") (set! geometry (list (make block (material GLS) (size infinity infinity (+ tABS tGLS)) (center 0 0 (- (* 0.5 sz) (* 0.5 (+ tABS tGLS))))) (make block (material ITO) (size infinity infinity tITO) (center 0 0 (- (* 0.5 sz) tABS tGLS (* 0.5 tITO)))) (make block (material ORG) (size infinity infinity tORG) (center 0 0 (- (* 0.5 sz) tABS tGLS tITO (* 0.5 tORG)))) (make block (material Al) (size infinity infinity tAl) (center 0 0 (- (* 0.5 sz) tABS tGLS tITO tORG (* 0.5 tAl)))))) ; random number generator: uniformly distributed in [-1,1] (define random-num (lambda () (let ((time (gettimeofday))) (set! *random-state* (seed->random-state (+ (car time) (cdr time))))) (if (> (random:uniform) 0.5) (random:uniform) (* -1 (random:uniform))))) (define-param perp-dipole? true) (define src-cmpt (if perp-dipole? Ez Ex)) ; current source component (define-param num-src 10) ; number of point sources (set! sources (map (lambda (cz) (make source (src (make gaussian-src (frequency fcen) (fwidth df))) (component src-cmpt) (center 0 0 (- (* 0.5 sz) tABS tGLS tITO (* 0.4 tORG) (* 0.2 cz tORG))) (amplitude (exp (* 0+2i pi (abs (random-num))))))) (arith-sequence (/ num-src) (/ num-src) num-src))) (set! force-complex-fields? true) (if (= src-cmpt Ex) (set! symmetries (list (make mirror-sym (direction X) (phase -1)) (make mirror-sym (direction Y) (phase +1))))) (if (= src-cmpt Ey) (set! symmetries (list (make mirror-sym (direction X) (phase +1)) (make mirror-sym (direction Y) (phase -1))))) (if (= src-cmpt Ez) (set! symmetries (list (make mirror-sym (direction X) (phase +1)) (make mirror-sym (direction Y) (phase +1))))) ; number of frequency bins for DFT fields (define-param nfreq 50) ; surround source with a six-sided box of flux planes (define srcbox-width 0.05) (define srcbox-top (add-flux fcen df nfreq (make flux-region (size srcbox-width srcbox-width 0) (direction Z) (center 0 0 (- (* 0.5 sz) tABS tGLS)) (weight +1)))) (define srcbox-bot (add-flux fcen df nfreq (make flux-region (size srcbox-width srcbox-width 0) (direction Z) (center 0 0 (- (* 0.5 sz) tABS tGLS tITO (* 0.8 tORG))) (weight -1)))) (define srcbox-xp (add-flux fcen df nfreq (make flux-region (size 0 srcbox-width (+ tITO (* 0.8 tORG))) (direction X) (center (* 0.5 srcbox-width) 0 (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO (* 0.8 tORG))))) (weight +1)))) (define srcbox-xm (add-flux fcen df nfreq (make flux-region (size 0 srcbox-width (+ tITO (* 0.8 tORG))) (direction X) (center (* -0.5 srcbox-width) 0 (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO (* 0.8 tORG))))) (weight -1)))) (define srcbox-yp (add-flux fcen df nfreq (make flux-region (size srcbox-width 0 (+ tITO (* 0.8 tORG))) (direction Y) (center 0 (* 0.5 srcbox-width) (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO (* 0.8 tORG))))) (weight +1)))) (define srcbox-ym (add-flux fcen df nfreq (make flux-region (size srcbox-width 0 (+ tITO (* 0.8 tORG))) (direction Y) (center 0 (* -0.5 srcbox-width) (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO (* 0.8 tORG))))) (weight -1)))) ; padding for flux box to fully capture waveguide mode (define fluxbox-dpad 0.05) ; upward flux into glass substrate (define glass-flux (add-flux fcen df nfreq (make flux-region (size L L 0) (direction Z) (center 0 0 (- (* 0.5 sz) tABS (- tGLS fluxbox-dpad))) (weight +1)))) ; surround ORG/ITO waveguide with four-sided box of flux planes ; NOTE: waveguide mode extends partially into Al cathode and glass substrate (define wvgbox-xp (add-flux fcen df nfreq (make flux-region (size 0 L (+ fluxbox-dpad tITO tORG fluxbox-dpad)) (direction X) (center (* 0.5 L) 0 (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO tORG)))) (weight +1)))) (define wvgbox-xm (add-flux fcen df nfreq (make flux-region (size 0 L (+ fluxbox-dpad tITO tORG fluxbox-dpad)) (direction X) (center (* -0.5 L) 0 (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO tORG)))) (weight -1)))) (define wvgbox-yp (add-flux fcen df nfreq (make flux-region (size L 0 (+ fluxbox-dpad tITO tORG fluxbox-dpad)) (direction Y) (center 0 (* 0.5 L) (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO tORG)))) (weight +1)))) (define wvgbox-ym (add-flux fcen df nfreq (make flux-region (size L 0 (+ fluxbox-dpad tITO tORG fluxbox-dpad)) (direction Y) (center 0 (* -0.5 L) (- (* 0.5 sz) tABS tGLS (* 0.5 (+ tITO tORG)))) (weight -1)))) (run-sources+ (stop-when-fields-decayed 50 src-cmpt (vector3 0 0 (- (* 0.5 sz) tABS tGLS tITO (* 0.5 tORG))) 1e-8)) (display-fluxes srcbox-top srcbox-bot srcbox-xp srcbox-xm srcbox-yp srcbox-ym glass-flux wvgbox-xp wvgbox-xm wvgbox-yp wvgbox-ym) | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Lily Jackson
The result was delete. j⚛e deckertalk 02:56, 16 April 2014 (UTC)
Lily Jackson
* – ( View AfD View log Stats )
Not notable. Accepting (questionably) that she has two notable roles would establish the presumption of notability. However, there is insufficient coverage in independent reliable sources to write a reasonably detailed biography. Instead, we a have a list of credits, structured to look like a biography. Sum mer PhD (talk) 16:43, 8 April 2014 (UTC)
* Note: This debate has been included in the list of United States of America-related deletion discussions. • Gene93k (talk) 20:07, 8 April 2014 (UTC)
* Note: This debate has been included in the list of Actors and filmmakers-related deletion discussions. • Gene93k (talk) 20:07, 8 April 2014 (UTC)
* Delete No notability within the roles listed; all roles except for the main two are guest roles anybody could do; nothing since 2010. Nate • ( chatter ) 01:54, 9 April 2014 (UTC)
* Delete A run of the mill child actress.John Pack Lambert (talk) 02:27, 13 April 2014 (UTC)
* Delete per nom. LADY LOTUS • TALK 19:59, 14 April 2014 (UTC)
| WIKI |
Norman Baker (disambiguation)
Norman Baker (born 1957) is a British politician.
Norman (or Norm) Baker may also refer to:
* Norman Baker (architect) (1885–1968), American architect
* Norman Baker (explorer) (1929–2017), American explorer, navigator on Ra, Ra II and Tigris
* Norman G. Baker (1882–1958), American inventor, radio pioneer
* Norman H. Baker (1931–2005), American astrophysicist
* Norm Baker (1923–1989), Canadian basketball and lacrosse player
* Norm Baker (baseball) (1863–1949), Major League Baseball pitcher
* Norm Baker (footballer) (1917–1979), Australian footballer for Essendon | WIKI |
CNC Machining: Revolutionizing Metal Bending --cncmass.com(how to identify brass Lydia)
• Time:
• Click:8
• source:CLAREY CNC Machining
Introduction:
CNC machining has emerged as a revolutionary technology in the field of metal fabrication, particularly in terms of bending and shaping various metals. With precision, accuracy, and efficiency, this process has transformed the way engineers and manufacturers produce complex components with exceptional quality. In this article, we will delve into the world of CNC machining and explore its significance in transforming the art of metal bending.
The Basics of CNC Machining:
Computer Numerical Control (CNC) machining is the automated control of machine tools through computer programming instructions. Unlike conventional manual methods, where numerous operators are involved, CNC machining combines software programming and innovative machinery to execute precise techniques such as metal bending. This advanced manufacturing method utilizes specialized CNC machines designed for cutting, drilling, milling, turning, and, most importantly, bending metal with utmost accuracy.
Unleashing the Potential: Metal Bending with CNC Machining:
1. Process Overview:
Metal bending using CNC machining involves a series of meticulous steps starting from the design phase to final production. Initially, Computer-Aided Design (CAD) software plays a crucial role in creating an accurate digital 3D model of the desired component. Once the CAD file is ready, it is converted into a format that the CNC machine can interpret, known as the Computer-Aided Manufacturing (CAM) system. The CAM translates the design into specific machine instructions, known as G-codes, enabling the CNC machine to execute the desired bends accurately.
2. Selection of Tools and Materials:
Apart from designing and programming, CNC machining requires careful selection of appropriate tools and materials for efficient metal bending. Based on the nature of metal, its thickness, and the required bend radii, skilled technicians choose the right tooling options, including press brakes, rollers, or tube benders. These tools are optimized for use in CNC machines to achieve consistent results without compromising structural integrity.
3. Precision Bending:
Precision is the hallmark of CNC machining. By combining digital precision with mechanical excellence, CNC machines are able to perform incredibly precise bends on various metals. This accuracy ensures consistency in quality throughout the production process and minimizes errors or defects that can occur during manual bending techniques.
4. Streamlined Production Process:
CNC machining expedites metal bending by offering an automated production process. Once the program is set and tested, the machine operates continuously until all desired bends are completed. This not only saves time but also enhances productivity as multiple components can be bent simultaneously with consistent attributes. Moreover, the repeatability offered by CNC machining helps maintain uniformity among batches of products, ensuring efficient manufacturing.
5. Flexibility and Customization:
One of the major advantages of CNC machining lies in its ability to handle intricate designs and unique product variations effortlessly. Whether it's a complex geometric shape or a delicate curve, the flexibility provided by CNC machines allows manufacturers to create customized metal components without compromising accuracy. With the capability to produce both simple and complex bends, CNC machining enables endless possibilities in producing everything from automotive parts to architectural elements.
Conclusion:
In conclusion, CNC machining has revolutionized the art of metal bending. By virtue of automation, advanced programming, and highly specialized machinery, this technology empowers manufacturers with unparalleled precision, efficiency, and customization options. Incorporating CNC machining into metal fabrication processes ensures consistently superior results, reduces human error, and paves the way for pioneering advancements in various industries. As we move forward, it is safe to say that CNC machining will continue to play a pivotal role in transforming the landscape of metal bending, enabling impeccable quality and pushing the boundaries of innovation. CNC Milling | ESSENTIALAI-STEM |
Page:Lavine - Recipes Tried and True.djvu/79
* 8 eggs,
1 small glass any sweet cordial,
l½ cups sugar,
½ teaspoon cinnamon,
¼ lb. ground sweet almonds,
¼ teaspoon cloves,
1 tablespoon grated chocolate,
6 bitter almonds,
¾ cup crumbs,
1 brandy glass rum,
1 heaping teaspoon baking powder.
Beat yolks with sugar; add spices, chocolate, rum and cordial, almonds, crumbs, baking powder and last the beaten whites. Bake in moderate oven ¾ of an hour.
* 2 hard boiled eggs,
1 teaspoon baking powder,
¾ lb. butter,
½ cup sugar,
Rind and juice of ½ lemon,
5 cups sifted flour,
Whites of eggs,
¼ cup milk,
Fine chopped nuts.
Mix butter with sugar, add flour with baking powder. Cream yolks of eggs; add rind and juice of lemon. Add to first mixture and take milk to form batter to roll out three-eighths of an inch. Cut in shapes with small glass. Then half each shape with edge of glass. Spread each with white of egg and sprinkle with nuts. Bake ten to fifteen minutes.
Prepare same batter as for cream puffs. Put on buttered sheets in pieces about four inches long and 1½ inches wide. Bake thirty minutes. Frost with either vanilla or chocolate icing. When dry open on one side and fill either with custard or whipped cream. | WIKI |
-- Japanese Shares Rise as Yen Weakens, China Data Improve
Japanese shares rose, after the
Topix (TPX) index last week posted its fourth straight monthly loss,
as a weaker yen boosted carmakers and data signaled a recovery
in domestic capital spending and Chinese manufacturing. Toyota Motor Corp., Asia ’s biggest automaker, gained 1
percent. Fanuc Corp., a producer of industrial robotics that
counts on Asia excluding Japan for half its revenue, climbed 2.7
percent after a gauge of China’s factory activity increased to a
16-month high. Consumer-finance company Aiful Corp. surged 18
percent on a report non-bank lending is recovering. Otsuka
Holdings Co. slid 2.4 percent after Citigroup Inc. cut its
investment outlook on the drugmaker. The Topix added 1.1 percent to 1,117.78 at the close of
trading in Tokyo , with all but four of the 33 industry groups
advancing. The measure fell 2.3 percent in August, capping its
longest monthly losing streak since November 2008. The Nikkei
225 increased 1.4 percent today to 13,572.92. Japan’s currency
weakened 0.8 percent to 98.93 against the greenback. “The yen at the 98-per-dollar level today is positive for
stocks,” said Masaru Hamasaki , a senior strategist at Tokyo-based Sumitomo Mitsui Asset Management Co., which oversees about
11.2 trillion yen ($113 billion). “China’s PMI is also being
taken positively, although whether it can last is questionable.
Capital-spending data is supportive for an increase in Japan’s
economic growth outlook, so that’s also a plus.” Futures on the Standard & Poor’s 500 Index climbed 0.7
percent today. The measure lost 0.3 percent on Aug. 30, capping
its worst monthly drop since May 2012, as investors weighed
prospects for a military response to an alleged chemical weapons
attack in Syria and a less-than-forecast rise in consumer
spending . U.S. markets are closed today for a holiday. China Manufacturing The official Purchasing Managers ’ Index of Chinese
manufacturing was at 51.0, beating analysts’ estimates. HSBC
Holdings Plc and Markit Economics today released the final
reading of a similar private gauge showing a level of 50.1. A
reading above 50 denotes expansion. Fanuc gained 2.7 percent to 15,420 yen. Komatsu Ltd., a
machinery manufacturer that gets about 8 percent of sales from
China, climbed 0.9 percent to 2,175 yen. Mitsubishi Heavy
Industries Ltd. (7011) , which counts on Asia excluding Japan for 16
percent of its revenue, rose 2.8 percent to 554 yen. Best Performer Even after falling 12 percent from this year’s May 22 peak,
Japanese equities are still the best performers in 2013 among
developed markets, amid optimism Prime Minister Abe and the Bank
of Japan can lead the country out of deflation through
unprecedented monetary easing and spur economic growth. Capital spending in Japan was unchanged from a year earlier
in the second quarter, recovering from a 3.9 percent drop in the
first three months of the year, the Finance Ministry said today
in Tokyo. Analysts surveyed by Bloomberg projected a 2.1 percent
decline. JPMorgan Chase & Co. expects an upwards revision to Japan’s
gross domestic product in the period because of the better-than-expected data, Masamichi Adachi , senior economist at the
investment bank, said by phone today. Prime Minister Shinzo Abe’s bid to raise the sales tax got
a boost as Economy Minister Akira Amari said on Aug. 31 a
majority of officials in seven consultative panels favored
proceeding with the increase in April. The yen fell 0.8 percent to 98.93 per dollar today and
retreated against all of its major peers. Toyota, which gets 31
percent of sales from North America , gained 1 percent to 6,000
yen. Honda Motor Co., which generates 83 percent of revenue
abroad, added 0.7 percent to 3,570 yen. Consumer Lending The Topix Other Financing Business Index of consumer-finance stocks rose the most among the Topix industry groups,
climbing 4.6 percent. Consumer lending will turn positive for
the first time in eight years amid increasing spending by
individuals, the Nikkei newspaper reported today. Japan’s top
three consumer lenders’ lending balance climbed to 1.9 trillion
yen at the end of June, the report said. Aiful soared 18 percent, the most since April 8, to 963
yen. Acom Co., Japan’s second-biggest consumer-finance company
by market value, jumped 14 percent to 2,795 yen. Among stocks that fell, Otsuka Holdings (4578) sank 2.4 percent to
2,973 yen, the biggest drop since Aug. 8. The company was cut to
neutral from buy at Citigroup, which also reduced its target
share price to 3,200 yen from 4,100 yen. The Topix traded at 1.17 times book value today, compared
with 2.40 for the S&P 500 and 1.67 for the Stoxx Europe 600
Index on Aug. 30. The Japanese gauge’s 30-day historic
volatility was at 26.84 today, compared with its five-year
median of 19.42. To contact the reporter on this story:
Anna Kitanaka in Tokyo at
akitanaka@bloomberg.net To contact the editor responsible for this story:
Sarah McDonald at
smcdonald23@bloomberg.net | NEWS-MULTISOURCE |
Wikipedia:Map data/City of Chester (UK Parliament constituency)
{ "type": "FeatureCollection", "name": "Westminster_Parliamentary_Constituencies_(December_2016)_Boundaries", "crs": { "type": "name", "properties": { "name": "urn:ogc:def:crs:OGC:1.3:CRS84" } }, "features": [ { "type": "Feature", "properties": { "objectid":111,"pcon16cd":"E14000640","pcon16nm":"City of Chester","bng_e":"339234","bng_n":361923,"long":-2.91006994,"lat":53.15097046,"st_areasha":133478096.30856042,"st_lengths":90695.8699781491},"geometry":{"type":"Polygon","coordinates":[[[-3.025865467087127,53.24844280586931],[-2.998378240676568,53.23585864247317],[-2.992559162684092,53.23301536849548],[-2.984911649122046,53.22847104331978],[-2.977836897498751,53.22539388653777],[-2.966162903719199,53.218689635419345],[-2.949510091679294,53.21127971415686],[-2.9446798524202,53.205028338499446],[-2.937288788339332,53.19763100289901],[-2.935052040069236,53.196173502803994],[-2.929237999481399,53.19429071373235],[-2.925162713240687,53.191045881197915],[-2.92229929315189,53.18929267082614],[-2.920354138618913,53.18295142468096],[-2.905624990644447,53.19367702595089],[-2.902525816232588,53.192566964322914],[-2.902485207621357,53.18984538897685],[-2.904330084237441,53.186552070788714],[-2.902319777340846,53.18417532776952],[-2.900022715875863,53.18367848596884],[-2.893389486027524,53.18398822072499],[-2.889680474029965,53.18582364542216],[-2.888278478174833,53.18518778669041],[-2.892703434679989,53.18338029328126],[-2.90027369364607,53.18294309651441],[-2.903703287523066,53.184146778488326],[-2.905185405153981,53.1870903485928],[-2.903807446635796,53.189523438204226],[-2.904001608130579,53.19213690845207],[-2.90523146586319,53.19289880597597],[-2.91966061786206,53.18235718763905],[-2.920955801627932,53.17708573756147],[-2.922850381047874,53.17529125885584],[-2.926589371289168,53.17335741094005],[-2.927331707167924,53.17177311752486],[-2.94404108602732,53.1652477155422],[-2.946553132261205,53.16711194060105],[-2.948907266968621,53.16600734306876],[-2.953478925031564,53.16535147057346],[-2.95635769829847,53.163776830193264],[-2.961219774203905,53.162749780782455],[-2.966262849905269,53.15986475693492],[-2.970925958127484,53.16078239907639],[-2.975350559582797,53.15737162127886],[-2.978913096009938,53.15718512237906],[-2.981491907852178,53.15629190658909],[-2.984640259515038,53.15859503255814],[-2.988124128349622,53.15692832865903],[-2.989956767168449,53.157542366379474],[-2.992274082361,53.15666457105578],[-2.993968942110116,53.153509549364905],[-2.990426300270645,53.15305547967732],[-2.987699186761405,53.15209559455232],[-2.984984317368979,53.14879378284998],[-2.980363880310075,53.14937668562134],[-2.979498026768763,53.15062164425111],[-2.963813123668874,53.13275752418045],[-2.960158455539744,53.132483203441815],[-2.958170707478166,53.13040928141446],[-2.952349396741854,53.12859161087631],[-2.946905678999246,53.1272704111209],[-2.944980279328383,53.12227783381795],[-2.942371178924521,53.121391587619115],[-2.940402679652405,53.12239325312153],[-2.937645038482479,53.12085448054561],[-2.934410234002819,53.12148579126031],[-2.931924996777054,53.12009392495485],[-2.928558665281389,53.11982627617887],[-2.923967019908629,53.118581947878134],[-2.919725185384972,53.1160708666459],[-2.91023233561463,53.112638962435966],[-2.906784771737248,53.11280815930316],[-2.9033916379743,53.1117975323409],[-2.899415385445489,53.11404615845522],[-2.897148632318157,53.11396081577304],[-2.894957721465264,53.11543798582431],[-2.895121669206452,53.11649213736665],[-2.891703551367697,53.118748889238006],[-2.885237161384725,53.12044304245174],[-2.882328349896754,53.12171054015276],[-2.880956764016406,53.120912625121576],[-2.881619646067947,53.11825586115354],[-2.884077005463317,53.11357494935897],[-2.883878826919467,53.11134352541123],[-2.886587826777762,53.11085868470343],[-2.887805497826118,53.10927381220317],[-2.891629739049188,53.10761092846572],[-2.893249619360355,53.10533083790041],[-2.893123063775231,53.10405623099736],[-2.888092802974838,53.105746949255],[-2.887276172846206,53.10460697909141],[-2.885850782481,53.10429668371956],[-2.879883617391009,53.10452426725251],[-2.87970447194561,53.10891679563541],[-2.869977924866523,53.10920763721282],[-2.870638615524221,53.11107255394481],[-2.864405630317096,53.11142989982793],[-2.862456769977168,53.11064395987218],[-2.856075587040085,53.1111368315588],[-2.855145872438609,53.10982841642188],[-2.851794802959161,53.11094547900707],[-2.850749006125342,53.10996416393463],[-2.845953631282203,53.11132781760345],[-2.840684594614208,53.111865881870976],[-2.836907241920402,53.116675623714436],[-2.836490285076435,53.11821213133959],[-2.833095413913867,53.11804713685117],[-2.829363480692332,53.12366094550761],[-2.827021468455396,53.124807229200464],[-2.829521384224917,53.127429932245924],[-2.827602879494465,53.12838715964531],[-2.829921644696419,53.13090776624407],[-2.829667181443886,53.13320904692316],[-2.828413703560555,53.13572307989531],[-2.828530348612929,53.13882976376472],[-2.842915395395238,53.1374504891155],[-2.842205833043129,53.13968483348765],[-2.842164777440803,53.14316583621648],[-2.846382543062944,53.14515575761142],[-2.851305746772022,53.146804296664826],[-2.853865897777854,53.14713023651959],[-2.853089481929538,53.1492923315046],[-2.854799629452414,53.15168381178554],[-2.851389427598736,53.15261886974415],[-2.853682894367831,53.1559886999959],[-2.850727186073062,53.157165811344676],[-2.851650007966582,53.15905772875537],[-2.854552067064279,53.161869428090405],[-2.852102709999643,53.16333248434343],[-2.856472488097486,53.167121521224665],[-2.855273104255389,53.167892479121384],[-2.85124355654834,53.16730739237389],[-2.844094735606972,53.16714881019909],[-2.848388132565127,53.17163352490332],[-2.850409110395448,53.17480126726236],[-2.852705752118102,53.17608655213055],[-2.835907604871863,53.17945156463289],[-2.832644924853783,53.178873031449015],[-2.828269933066122,53.177174962900786],[-2.822735265340836,53.17733103022301],[-2.820233698215159,53.17498589873341],[-2.816815270386677,53.173972066964005],[-2.80922944204724,53.1756175811946],[-2.815650295123834,53.17920903187465],[-2.813824886864178,53.179926234511235],[-2.804820745648322,53.18180769050174],[-2.808120501884295,53.18564075129946],[-2.811705649143107,53.188544997632796],[-2.811358309765394,53.191076882469126],[-2.808242130940574,53.191552951919256],[-2.804932657427638,53.19394212150421],[-2.800372774937708,53.19479805876073],[-2.800799033980335,53.19750632824927],[-2.797488842849848,53.197808092561125],[-2.8000827845289,53.19971974606958],[-2.801554186941202,53.20196340436515],[-2.805104318695737,53.2039062671682],[-2.8088590016072,53.20413256198651],[-2.813080807037845,53.20649856758868],[-2.81230768642566,53.208689987372324],[-2.809202239826651,53.20932497712645],[-2.809744591199213,53.21077486934365],[-2.808487241116358,53.21231156555584],[-2.809306698205729,53.21599426335021],[-2.80810571644043,53.21815441653917],[-2.833970206459917,53.21227263966973],[-2.839817705990375,53.208819394022846],[-2.844516167281757,53.20667283633754],[-2.847858790387924,53.205875097829136],[-2.855137182114455,53.20295019029241],[-2.858688908692551,53.207180166003255],[-2.865815864296399,53.21089507791618],[-2.867241085990377,53.212957565566946],[-2.862572705052643,53.21351642818457],[-2.858724322155155,53.216451277516526],[-2.858964202979953,53.21766758966825],[-2.861871072807775,53.22035327823999],[-2.861072807820925,53.22312142663681],[-2.866485829808937,53.22504542059153],[-2.866027969187571,53.226264090251426],[-2.863598708813453,53.22754917392426],[-2.866138739801924,53.23027327038172],[-2.8690142463363,53.23178860255225],[-2.873298254359595,53.23522351087015],[-2.876381239204831,53.23652506300928],[-2.87630303995774,53.24143274625863],[-2.882541904588359,53.24299937543562],[-2.883733647274791,53.24593364632366],[-2.88692199528853,53.24560793668509],[-2.88852314693651,53.24991171919702],[-2.890735628494609,53.25000215369138],[-2.891332440104189,53.25348186962019],[-2.892478059765924,53.25336276692323],[-2.898837602204431,53.256215772620465],[-2.91034112087758,53.25495897442],[-2.91190901735807,53.256020341524085],[-2.923432159336505,53.25291843938116],[-2.927058669780199,53.25156441189597],[-2.93082102865444,53.25668850570784],[-2.932246568314868,53.26054714481996],[-2.934139692111954,53.26301332313194],[-2.938430898006662,53.26693126041242],[-2.945556767586484,53.26575037268515],[-2.946991077504836,53.26837644407232],[-2.949464094070874,53.26995412646646],[-2.952340982015303,53.27073744775939],[-2.959598687702244,53.27482778772261],[-2.974233713051754,53.275162995899194],[-2.976511545986884,53.27712643121067],[-2.98125561701112,53.27629648205924],[-2.988646260107718,53.27397017999542],[-2.989217392759421,53.27460815995495],[-2.997678154725739,53.271703380998574],[-2.995026540851145,53.26955465971589],[-2.997561832091205,53.26761160330536],[-3.00316243159752,53.266155058651094],[-3.007020946682093,53.26166122594105],[-3.009339497294693,53.25768544827839],[-3.014465371840764,53.25448314151104],[-3.0195503869688,53.253252351792234],[-3.025865467087127,53.24844280586931] ] ] } }, ] } | WIKI |
Bifluoride Ion Mediated SuFEx Trifluoromethylation of Sulfonyl Fluorides and Iminosulfur Oxydifluorides
Sulfur-Fluoride Exchange (SuFEx) is the new generation click chemistry transformation exploiting the unique properties of S-F bonds and their ability to undergo near-perfect reactions with nucleophiles. We report here the first SuFEx based protocol for the efficient synthesis of pharmaceutically important triflones and bis(trifluoromethyl)sulfur oxyimines from the corresponding sulfonyl fluorides and iminosulfur oxydifluorides, respectively. The new protocol involves the rapid exchange of the S-F bond with trifluoromethyltrimethylsilane (TMSCF3) upon activation with potassium bifluoride in anhydrous DMSO. The reaction tolerates a wide selection of substrates and proceeds under mild conditions without need for chromatographic purification. A tentative catalytic mechanism is proposed supported by DFT calculations, involving formation of the free trifluoromethyl anion followed by nucleophilic displacement of the S-F through a five-coordinate intermediate. The preparation of a benzothiazole derived bis(trifluoromethyl)sulfur oxyimine with cytotoxic selectivity for MCF7 breast cancer cells demonstrates the utility of this methodology for the late-stage functionalization of bioactive molecules. | ESSENTIALAI-STEM |
Frequently Asked Questions regarding Hair Transplants
1. What are “grafts” and “micro-grafts” of hair follicular units?
A follicular unit is a natural group of hair roots. Individual follicular units are very small and grow in a disordered pattern.
With the techniques “Laser Way” uses, follicular units are usually preserved in their natural structure. This is important, as it benefits the maximum amount of hair, which contributes to achieving the most perfect and natural result possible.
A “micro-graft” is a graft with 1, 2, or 3 hair roots.
The ultimate goal of any transplant procedure is to give to the client a natural appearance, achieving an optimal density and a virtually indistinguishable result, but without compromising the donor area.
There are several techniques that can be effective, but it is the doctor’s responsibility to choose the best method to achieve the goal for each individual patient.
2. Am I a candidate for a hair transplant?
A free consultation with a specialist at the “Laser Way” clinic will provide you with information on the causes of hair loss and the available ways to treat it.
After the evaluation by our specialist, we will determine whether or not you are a candidate for the transplant. During the evaluation, your hair loss will be analyzed, your expectations will be discussed and possible alternatives will be put forward.
The factors that determine the candidacy for the transplant procedure include the number of grafts that are needed in order to provide the desired result, the existence and density of donor hair, the hair structure, and the possibility of hair loss in the future.
3. Can I have a hair transplant to cover signs from accidents or other causes?
Yes. Hair transplants can be very effective in covering visible scars caused as result of various accidental scalp injuries, including major burns and surgical interventions.
Modern transplant techniques make it possible for the doctor to place grafts before, after, and even over the scarred tissue itself.
However, enough donor hair is needed to cover the scars, so only your individual and free consultation at “Laser Way” can provide the answer if the hair transplant procedure can be the solution to your problem.
4. Have the results of hair transplant been confirmed?
Hair transplants have been successfully performed for over 40 years. Recent advances in the use of hair follicle unit grafts have substantially influenced the results of hair replacement interventions.
Transplanted hair looks just as natural as the rest of your hair, for the simple reason that it is hair that grows naturally.
One of the most important benefits of hair transplantation is the fact that the transplanted hair will grow throughout your life and will never fall out again.
5. Can I afford a hair transplant?
The question you really must ask is: Can you afford not to have a hair transplant?
Hair replacement today is more affordable than ever. After a detailed assessment of your hair problems and the discussion on your expectations, we will be able to give you a realistic estimate of the time and expense required to achieve your goal.
The only important thing that should be considered by every customer is to achieve the natural replacement and the desired density within the available budget.
A hair transplant is only worth it if it satisfies the client.
Although cost is an important factor and should always be considered, it should not be the only factor to influence your choice. Unlike other methods for treating hair loss, the cost of each transplant procedure is unique.
“Laser Way” clinic adapts the procedure and payment according to the circumstances and budget of each client.
6. How does the “Laser Way” differ from other clinics?
The doctors at “Laser Way” continue to be the pioneers for the most advanced micro-surgical techniques used for hair replacement.
Our medical staff with 25 years of experience, will help you achieve natural and aesthetically perfect results through the perfection of graft and micrograft preparation techniques.
By using the “Hair Plus” and “FIT” (Follicle Isolated Technique) techniques, there are achieved maximum results, the grafts are placed artistically in different angles and directions, so that the final result resembles perfectly with natural hair.
Each treatment plan is personalized as according to the needs of the individual.
Since hair transplants are permanent, your decision will last for a lifetime. Therefore, you must choose “Laser Way” clinic – the first in Albania to perform hair transplants.
7. At what age should I have a hair transplant?
Hair loss is a problem that persists throughout life. We would advise you to address this issue early, before it becomes apparent.
An early start enables the doctor performing your transplant to mask the work and allows the transplanted hair to grow gradually, unnoticed. There are no age limits (our patients range from 18 to 80 years old).
There is no need to wait until the hair loss is over, as there is a certain age when this happens. The doctors at “Laser Way” clinic calculate the hair loss that you will have in the future and prepare an intervention plan so that you look natural all the time.
If you have been waiting for the transplant through micro-surgery techniques to be perfected, this moment has already come. Once you are familiar with the extraordinary results that have been achieved by the staff at “Laser Way” clinic, your only regret will be “Why did you not do this procedure sooner”.
Start counting the new hair that grows instead of continuing to count the hair that falls out.
8. Will moving the hair from the donor area at the back of the head create an empty space?
The scalp is very elastic. Once a hair section is taken, it is enough to just to join both ends of the skin and sew.
The only visible evidence that will be left from the intervention is a thin line which is hidden under the hair that grows vertically on the back of the head.
9. Is there a method to curb or slow down hair loss?
Yes. There are methods through which the rate of weakening and loss of your hair can be stopped or slowed down.
At “Laser Way” clinic we practice the most advanced methods for the treatment of weakened hair and the treatment of hair loss – the professional laser for the regeneration of hair follicles.
After a detailed ANALYSIS of your hair which is performed in modern laboratories through the method “Capillure Test”, we can DIAGNOSE and identify the factors that cause hair loss and determine the potential need for essential micro-nutrients which affect having healthy hair.
Personalized THERAPY for each client is determined based on the results of the detailed analysis and the careful diagnosis and it includes replacement therapy with micro-nutrients tailored to the needs of the individual, as well as the use of the professional laser for oxygenation and regeneration of hair follicles.
SHARE THIS ARTICLE | ESSENTIALAI-STEM |
Volkswagen 4Motion All-Wheel Drive Explained
The automaker's crossovers and SUVs offer this all-wheel-drive system.
A 4Motion badge on a blue carVolkswagen
Article QuickTakes:
Available on most members of the Volkswagen range, 4Motion is an all-wheel-drive system developed to improve traction and handling. The term commonly appears in the German carmaker's marketing materials, but the type of technology that it refers to can vary from model to model.
Rear three-quarter view of a silver 1987 VW Passat with SyncroVolkswagen
4Motion Is VW's All-Wheel-Drive System
Volkswagen's 4Motion AWD system traces its origin to the automaker's Bus-based prototype built in the 1970s. While the model wasn't approved for production, it paved the way for the Syncro system released in the '80s and, ultimately, the 4Motion technology offered on several Volkswagen models since 1996.
The system has gone through many evolutions since, but its name hasn't changed. Similarly, brands such as Audi, BMW, and Mercedes-Benz have used Quattro, xDrive, and 4Matic, respectively, for decades.
From three-quarter view of a white 2022 VW TiguanVolkswagen
Volkswagen lumps several types of AWD systems under the 4Motion label. The brand's gasoline-powered cars use one type, which relies on a multiplate clutch to distribute the engine's power between the front and rear axles. The front wheels receive most of the engine's output in normal driving conditions, and power gets shifted to the rear if the car senses a loss of traction.
Keeping the rear axle disconnected when it's not needed helps improve efficiency, though AWD cars typically use more fuel than two-wheel-drive models due to the system's additional weight. The all-wheel-drive Tiguan returns 25 mpg, compared with 26 mpg for the front-wheel-drive model.
A 4Motion control knobVolkswagen
In the electric ID.4, 4Motion denotes a dual-motor drivetrain. Adding a motor to the front axle gives the crossover through-the-road AWD, so there's no mechanical connection between the front and rear wheels. The second motor increases horsepower at the expense of range. Volkswagen quotes up to 275 miles of driving range and 201 horsepower for the rear-wheel-drive model, and it lists 255 miles of driving range and 295 horsepower for the AWD version. Both use an 82-kWh battery pack.
Global-market models, such as the Touareg and the Amarok, use a heavier-duty evolution of 4Motion. Closely related to the Ford Ranger, the Amarok is notably available with a two-speed transfer case, which is helpful for off-roading.
Front three-quarter view of a blue VW TouaregVolkswagen
The Benefits of 4Motion
Sending power to all four wheels increases traction on slippery surfaces such as snow and gravel. All-wheel drive also helps reduce torque steer in performance applications.
Front three-quarter view of a green 2024 VW AtlasVolkswagen
Cars That Offer 4Motion
Volkswagen offers 4Motion across its full line of crossovers and SUVs, ranging from the entry-level Taos to the three-row Atlas. Note that these models come standard with front-wheel drive, and buyers who want AWD need to pay extra for it. It's a $1,900 option on the Atlas and a $1,500 option on the Tiguan.
The ID.4 offers optional all-wheel drive as well, while the Golf R hot hatch and the Arteon sedan are all-wheel drive only. Front-wheel drive is the only layout available on the Jetta and the Golf GTI.
This site is for educational purposes only. The third parties listed are not affiliated with Capital One and are solely responsible for their opinions, products and services. Capital One does not provide, endorse or guarantee any third-party product, service, information or recommendation listed above. The information presented in this article is believed to be accurate at the time of publication, but is subject to change. The images shown are for illustration purposes only and may not be an exact representation of the product. The material provided on this site is not intended to provide legal, investment, or financial advice or to indicate the availability or suitability of any Capital One product or service to your unique circumstances. For specific advice about your unique circumstances, you may wish to consult a qualified professional.
author photo
Ronan Glon
Ronan Glon is an American journalist and automotive historian based in France. He enjoys working on old cars and spending time outdoors seeking out his next project car. | ESSENTIALAI-STEM |
The Blog
How a lack of sleep affects your brain (and how to get more!)
Sleep is essential for our physical and mental health. It affects our mood, our ability to concentrate, and even our physical energy levels. A lack of sleep, on the other hand, can cause a range of negative effects on our brain function. In this article, we’ve looked at some ways in which a lack of sleep could be affecting your brain function and provided our top tips on how to establish a good sleep routine.
• Reduced cognitive performance
One of the most obvious effects of sleep deprivation is impaired cognitive function. Studies have shown that a lack of sleep can negatively impact important areas such as decision-making, problem-solving, and memory retention. In fact, one study found that just a single night of sleep deprivation can impair our ability to concentrate, make decisions, and react quickly to unexpected situations. A lack of sleep can also negatively impact creativity, making it harder to come up with new ideas or problem-solve effectively.
• Increased risk of depression and anxiety
A lack of sleep can also increase our ‘emotional instability’ (e.g. experiencing negative emotions like anger, frustration, or sadness), and heighten the risk of developing mental health conditions like depression and anxiety. These conditions are often characterized by a lack of energy, negative thoughts and feelings, and difficulty concentrating. Sleep deprivation can exacerbate these symptoms and may lead to a vicious cycle where poor sleep leads to deteriorating mental health, which in turn leads to even poorer sleep.
• Impaired memory function
Memory loss is another common effect of sleep deprivation. Sleep plays a crucial role in memory consolidation, the process by which our brains transfer short-term memories into long-term storage. When we don’t get enough, our ability to form and retain these memories can suffer. This can be especially problematic for students or professionals who need to function at a high level of cognitive performance.
• Increased risk of weight gain
Sleep deprivation has been linked to increased levels of the hormone ghrelin, which stimulates hunger, and decreased levels of the hormone leptin, which signals to our brain that we’re full. As a result, sleep-deprived people may be more likely to overeat or make unhealthy food choices, which can contribute to weight gain and related health issues.
• Higher risk of accidents
Last but not least, a lack of sleep can increase our risk of accidents or injuries. This is because sleep deprivation can impair our cognitive function and reaction time, making us more prone to mistakes or accidents while driving, operating heavy machinery, or engaging in other activities that require sustained attention.
So, what can we do to establish and maintain a good sleep routine? Here are some tips:
1. Stick to a consistent sleep schedule: Try to go to bed and wake up at the same time every day, even on weekends.
2. Create a relaxing bedtime routine: Develop a relaxing routine that will help you wind down and prepare your mind and body for sleep. This could include taking a warm bath, practising relaxation exercises like yoga or meditation, or reading a book.
3. Avoid stimulants: Avoid consuming caffeine, nicotine, alcohol or other stimulants in the late afternoon or evening, as these can interfere with your ability to fall and stay asleep.
4. Create a comfortable sleep environment: Make sure your bedroom is quiet, dark, and a comfortable temperature.
5. Limit electronic devices: Avoid using electronic devices (such as your phone, tablet, or computer) during the hour before bed. The blue light emitted by these devices can suppress the production of melatonin, a hormone that regulates sleep.
Hopefully, by following these tips and prioritising getting enough quality sleep each night, you can improve your brain function, boost your mood, and increase your productivity. An easy win!
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
Before discussing this topic, I want to clarify that both software testing has unique benefits in development projects.
You must hear about unit testing and functional testing from many developers, and they think it is a waste of time. But that’s not true.
Testing is essential to creating high-quality, bug-free applications.
Both functional testing and unit testing are the base of the testing procedure. Both testings play an important role in software development.
With the help of this blog, functional testing vs unit testing, I want you guys to understand the various aspects of unit testing and functional testing. You will know the basics of both the testing and what type of defects they report.
Let’s dive in.
What Is Unit Testing?
Unit testing is a test that helps to eliminate bugs in the early stage of software development. It is popular among many organizations.
As the name suggests, every component or unit is tested separately to ensure the code is working smoothly in this type of testing.
The main aim of unit testing is to keep an eye on the software code and ensure whether they are performing as expected or not.
Unit testing helps isolate the code section, check whether the code is correct, find and fix bugs in early-stage, help developers understand the code base, and allow them to make changes asap.
Unit testing is also known as White box testing. It is performed in the early stages to make sure that bugs cannot pass further. It is necessary to conduct unit testing because it becomes more expensive to fix bugs in later stages, so it is a cost-effective activity that helps companies to save money.
The Objectives Of Unit Testing Are:
• To isolate each part of the program.
• To find bugs in the early stage of software development.
• To test every unit separately.
• To check the correctness of the code.
• To help developers with the code and allow them to make changes quickly.
Advantages Of Unit Testing:
• The bugs are found earlier, so less compound error occurs.
• It is a quick and easy test to run.
• Errors are detected in the early stage, which reduces expenses.
• It helps to improve the internal code.
• It enhances the quality of code.
• Unit testing provides the documentation of the entire system.
• The debugging process can be simplified by unit testing.
• Unit testing allows developers to think through the design of the software.
What Is Functional Testing?
A functional test aims to check if the system functions as it should and if it meets the user and business requirements. In this test, the tester has an expected result of how the software should perform and compares it with the actual result.
Functional testing is also known as Black-box testing and therefore refers only to the external aspects, so there is no need for internal code knowledge.
Functional tests are performed after the development stage is over in the software development. The Quality analyst team executes a functional test. There are a few types of functional tests that testing teams regularly use, such as integration testing, regression testing, sanity testing, and so on.
The Objectives Of Functional Testing Are:
• It relies solely on the requirements rather than anticipation.
• Check whether the previous software testing was fruitful and that all bugs are fixed.
• To make sure that the outcome meets the user’s requirement.
• To prevent errors.
Advantages Of Functional Testing:
• It ensures the customer requirements are fully met.
• It produces a defect-free product.
• Improving the security of the software.
• The test simulates a real-life scenario.
• It provides security and safety.
• The risk associated with the product is reduced.
• It ensures the proper working of all the functionalities of the product.
Difference Between Unit Testing And Functional Testing
• Unit testing is easy to write and execute. On the other hand, functional testing is quite complex compared to unit testing.
• Unit testing is usually done with the same coding language, while functional testing doesn’t need the same coding language.
• In unit testing, code testing is done in isolation, while in functional testing, testing is done as per user requirements.
• Developers conduct unit testing while testers do functional testing.
• Unit testing uses White box testing. On the contrary functional testing uses black-box testing.
• The number of test cases in unit testing is higher than in other testing. On the flip side, it is lower than unit and integration testing in functional testing.
What Is The Purpose Of Both The Testing Types?
Unit Testing
It is a testing method in which units of code are tested separately. The main purpose behind unit testing is to test the smallest parts of an API and check if they work correctly in isolation.
From the developer’s point of view, the reason behind conducting unit testing is to create a robust codebase at a low cost.
Functional Testing
In functional testing, the tester needs to verify the output based on the customer’s requirements. The main purpose of functional testing is to check the entire software and hardware from the front end to the back end. They also ensure that all functions are working as expected.
Instead of telling the errors and their location, functional testing just tells you that something is wrong either with the test or a browser. Functional testing follows end to end testing, so it cannot tell what is broken.
How Do Unit Testing And Functional Testing Improve Software Quality?
Unit Testing
You may sometimes write lengthy codes that are hard to remember for a long time. After a few months, it must be difficult for you to work with the same code again. In this scenario, unit testing helps you capture your original code and fix it later. The bugs in code are identified straight away, so there is less re-work and re-test.
Functional Testing
Functional testing makes sure that the application works as expected. Typically rigorous tests for ensuring the critical app’s functionality, such as user logins, signups, payments, and all the essential user workflows, behave as expected.
FAQs
1. What are the goals of unit testing?
The major goal of unit testing is to ensure the sustainable growth of the software project. In unit testing, each unit is tested in isolation.
2. What is unit testing in software engineering?
Unit testing is a testing technique through which individual units or components of the software are tested to determine whether they are sustainable to use or not.
3. What is the difference between unit testing and system testing?
Unit testing is work on the module specification. It requires one module at a time. On the other hand, system testing is done to check whether the product meets the specified needs.
Conclusion
In recent times, people have wanted companies to develop the highest quality software. It compels companies to incorporate testing as a part of the development process.
Both testings have different purposes; they aren’t interchangeable.
Unit testing is fast and achieves error-free code in this competitive market. The functional testing is a bit complex and identifies the defects against a business document and produces a perfect product.
The main aim of testing is to deliver a quality product with the right balance between unit testing and functional testing.
I hope this blog post has given you a clear idea about Unit testing vs. functional testing!
Happy Testing! | ESSENTIALAI-STEM |
All the Yankees Need to Know Is Inside Their Caps (or Their Pockets)
During a start for the Yankees last week against the Baltimore Orioles, C. C. Sabathia took off his cap and looked inside. But something in there was missing, so he looked around, first examining the mound and then his cap again before realizing the thing he needed was stuck on his bald head. His teammates Aaron Hicks and Mike Tauchman have been spotted doing the same in the outfield between batters: gazing into their caps. Relief pitcher Chad Green does not typically peer into his cap, but he was caught doing so a bit too long as he stepped off the rubber during a recent outing. “My wife noticed and asked me, ‘What were you doing?’” Green said after the game. “Just double-checking things.” No, they haven’t lost their minds. These small moments of apparent wardrobe examination are just byproducts of modern baseball. As loads of data have revolutionized the sport and the level of sophistication required to play each position has risen, more and more teams are employing positioning cards to guide their fielders through every game. Infields have been altering their positioning based on their opponents for decades, but the frequency and precision have risen exponentially in recent years. Now the Yankees’ outfielders, too, carry cards with information on how to best situate themselves. Pitchers and catchers also use them, but as a reference guide for their complex signs. Some, like Sabathia, stash their cheat sheets in their caps, and others in their pants. “People think I’m pulling my cellphone out of my back pocket,” outfielder Clint Frazier said. Even after sending 18 players to the injured list this season, the Yankees, whose game on Thursday against the rival Boston Red Sox was rained out, have a 36-19 record, second best in the American League. The Yankees’ defense, despite some uneven stretches, has remained solid despite all the turnover. For their outfielders, the cards tell them where to play relative to their teammates, based on a rival hitter’s tendencies versus a right- or left-handed pitcher. Reggie Willits, the Yankees’ first base coach and outfield instructor, said the cards are based on information provided by the team’s large analytics department. He adjusts them based on how opposing hitters have fared recently. “Sometimes we’ll see stuff midgame, and the outfielders will make their adjustments,” Willits said. “When they come in, they’ll tell me what they saw, and I trust our guys, and they’ve got good instincts.” Frazier, who has had several defensive lapses in the outfield, said the positioning cards had helped him make some catches he would not otherwise have made. “Sometimes, hitters are going to hit the ball the opposite way of where the chart says,” he said. “It’s just one of those things where you tip your cap. But I’m just following the sheet, because I’ve had my struggles in the outfield as it is. And I’m going to keep following that sheet.” Brett Gardner, the Yankees’ most veteran outfielder, said the practice of using the cards had begun about four years ago, and he noted that they might be more useful for outfielders than for infielders. “It’s hard to communicate out there sometimes,” he said. “It’s loud. And it’s hard to tell somebody to move 15 feet. If they have that, we all have to be accountable and look at it and know what’s going on from pitch to pitch to batter to batter. It helps.” Sabathia and Green, of course, are not worried about their positioning on the mound. Since Major League Baseball limited mound visits to six for a nine-inning game before the 2018 season and dropped it to five before 2019 to improve the pace of play, teams began using cards as a reminder for pitchers and catchers, helping them keep their signs for pitches straight. With rising fears that signs are being stolen and new procedures to crack down on the use of technology, the pitcher-catcher cards allow them to quickly and discreetly change up their communication. “It’s better that way,” said Gary Sanchez, who, like his fellow catcher Austin Romine, wears his card on a wristband. “It’s served us well.” James Paxton, the Yankees starting pitcher who returned from the I.L. on Wednesday, keeps his card in his cap. And if he wants to switch the signs, he simply signals to Sanchez or Romine which variation on the card to employ. “If we think they have something on us, we can switch it multiple times an at-bat, or each hitter,” he said. “It just depends on what we’re feeling. There’s a lot of different sets on there that we can go to.” The only people who know which signs are being used are the pitcher and the catcher, Larry Rothschild, the Yankees’ pitching coach, said. “It just simplifies things and it’s quick,” he said. “Other than it getting stuck on your head, it works pretty fast.” As for the infielders’ cards, Carlos Mendoza, the Yankees’ quality control coach and infield instructor, combines the data with what he has gleaned from video and the opponents’ spray charts along with the tendencies of the his own pitchers. Infielder Thairo Estrada and shortstop Gleyber Torres, who keeps his card in his back pocket, check the cheat sheet during games. D. J. LeMahieu, an experienced, sure-handed defender, looks at it before a game but rarely during it. “We’re moving around so much every pitch that we kind of look at each other and look at Mendy, and we kind of get the plan from that,” he said, referring to Mendoza. Mendoza said infielders were not wedded to the cards, or to his direction. If they notice the pitcher altering a game plan or a hitter’s tendencies changing, they are allowed to do the same. “There’s a lot of information now,” he said. “But you have to give credit, because at the end of the day, it’s on the players. They’ve got all the freedom to make adjustments. And we discuss in between innings when they come in, ‘Hey, what do you see?’ And it’s been good.” | NEWS-MULTISOURCE |
Duane Young
Curtis Duane Young Sr. (born May 29, 1968) is an American former professional football player who was a tight end in the National Football League (NFL). He played college football for the Michigan State Spartans. Young was selected by the San Diego Chargers in the fifth round of the 1991 NFL Draft. Young played in the NFL for six seasons with the Chargers (1991–1995) and the Buffalo Bills (1998).
Young is from Kalamazoo, Michigan and is a graduate of Kalamazoo Central High School. Since retiring from the NFL he has coached many high school teams. Most recently he was the head coach at Loy Norrix High School in Kalamazoo. | WIKI |
covert-coat
Noun
* 1) A coat suitable for wearing while shooting game, usually with a neutral colour and windproof or waterproof qualities. | WIKI |
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
Types of Breast Carcinoma - General Introduction
Updated on February 27, 2013
Pre-malignant Breast Disease - ADH/DCIS or ALH/LCIS
Premalignant breast lesions are the one which have potential to turn into frank malignancy if untreated or un-resected surgically. Turning into malignancy means that the breast disease that was confined to the bounds of a duct within the breast glands had now broken its limits and had invaded into the surrounding connective tissue or fibroadipose tissue of the breast parenchyma. If all this sounds too alienated then let me start with the basics. Developmentally or embryologically, breast is considered a modified apocrine/eccrine gland tissue, which is equivalent to the sweat glands in the skin. The biological reason for breast development is to provide nourishment to the new born in the form of milk. Therefore, the two important components in the breast are.
1. Secretory system
2. Supporting system
The secretory system is composed of cells which help in formation of milk and are called acinar cells. Many groups of acinar cells forms a terminal ductal lobular unit (TDLU) and many TDLUs together form a lobule which drains into a biological conduit or a duct, leading to the way out through the microscopic orifices at the nipple. The supporting system is the fibrous tissue and fat in between the lobules. The interesting part is that both the major components have chemical and molecular cross talk with each other, which determines the development of breasts and response to the hormones, in particular estrogen and progesterone.
The premalignant lesions arising from the secretory ductal system are called "Ductal Carcinoma In-Situ or DCIS" and the ones arising from lobules are called "Lobular Carcinoma In-Situ or LCIS". Now there are two nearly ambiguous terms which are ADH or atypical ductal hyperplasia and ALH or atypical lobular hyperplasia. These two terms are used in pathology diagnosis when qualitatively the histology of lesion looks pre-malignant but there is not enough quantity of disease to classify it as frankly premalignant lesion. For example in ADH the cells look like that of DCIS but the number of bad cells is less than that required to classify something as DCIS. Importantly ADH and DCIS will have different types of treatments as well as different disease outcomes.
There is very good link for the risk assessment of breast carcinoma based on various risk factors.
Basic anatomy of breast for classification of origin of lesions
Basic anatomy of breast for classification of origin of lesions | Source
Types of Breast Carcinoma
The two most common variants of malignant breast disease are the one arising from the ductal unit and the other group arising from the secretory cells of the acinar system. Both the malignant diseases are clubbed under the common broad category of adenocarcinoma.
The one arising from duct is called "Invasive adenocarcinoma - Duct type" and the one arising from the lobule is called "Invasive adenocarcinoma - Lobular type". There can be adenocarcinomas with duct and lobular features and in that case the tumor is called "Invasive Mammary Carcinoma - Mixed type".
In general, adenocarcinoma is the term applied to the cancers which arise from the epithelial cells lining the glands and duct systems in human body. When looked under the microscope by the trained eyes or Pathologist, these lesions are easily picked up and accordingly classified. The classification done by the pathologists will eventually help the oncologist in deciding the type of treatment, follow-up, prognosis, molecular studies to be done and genetic counseling. Therefore, a lot depends on the expertise of your breast pathologist in looking at the MRI guided or ultrasound guided core needle biopsies or lumpectomies. I think that patients should be encouraged to discuss their biopsy results with the Pathologists. This can greatly help in reducing the anxiety associated with all possibilities of ruling out malignant disease.
Other uncommon variants of malignant breast lesions can be Phyllodes tumor or cystosarcoma phyllodes. This is most commonly considered as a borderline malignant disease because it usually does not metastasize to distant organs or lymph nodes but have high incidence of recurrence if incompletely excised. One of the very uncommon but highly malignant breast tumor is called metaplastic carcinoma which have malignant components derived from supporting stroma as well from the ducts. It is more like a mixed variant of highly malignant disease, unfortunately with very poor survival. Diagnosis is most commonly made by biopsy and doing further special studies on the biopsy itself.
What is meant by TNM staging and how it is done?
TNM staging is the evidence based classification of the extent for any malignancy. The staging system is provided by American Joint Committee on Cancer (AJCC) for stratification of patients based on their outcome/prognosis.
[T] stands for tumor characteristics, which are generally the tumor size and whether the tumor is confined or have locally spread into the adjacent tissue, skin and chest wall.
[N] stands for nodal or lymph node involvement by the tumor. N is given different subscript numerical values based on the size of lymph node metastasis, number of nodes involved, laterality of the nodes, anatomical location of the nodes draining the breast and extra-capsular spread beyond the anatomical confines of the particular lymph node.
[M] stands for distant metastasis. It is in two forms [Mx] which is no metastasis after extensive radiological and clinical work-up and [M1] which means that breast carcinoma have spread to distant organs such as brain, lungs, bones, liver, spleen or ovaries etc. Note that metastasis to the lymph nodes under the definition of [N] category are not considered distant metastasis.
Following is how the TNM classification of breast looks like. (Source AJCC and National Cancer Institute). It might look very complicated but it is a crucial factor in deciding the treatment and prognosis. This is routinely done and extensively discussed by every oncologist and pathologist with expertise in breast cancer. Please feel free to ask questions or comment.
T0 (Zero): No evidence of primary tumor.
T1a: Carcinoma in situ (Premalignant lesion).
T1: Tumor size is less than or equal to 2 cm. T1a >0.1 to 0.5 cm; T1b >0.5 to 1 cm;T1c >1 to 2 cm.
T1m1c: Microinvasion of 0.1 cm or less.
T2: Tumor size greater than 2.0 cm but less than 5 cm
T3: Tumor more than 5.0 cm in greatest dimension
T4: Tumor of any size with direct extension to (a) chest wall or (b) skin. The structures included in chest wall are ribs, intercostal muscles, and serratus anterior muscle but not pectoral muscles (flap muscles two types pectoralis major and pectoralis minor).
T4 is further subdivided into T4a to T4d : T4a: Extension to chest wall; T4b: Edema or ulceration of the skin of the nodules confined to the skin same breast; T4c: Presence of both T4a and T4b features; T4d: Inflammatory carcinoma - The diagnosis is made clinically when there is mass lesion and the breast skin is tense, red and looks very warm. This is due to the obstruction of specialized blood vessels called lymphatics by the microscopic tumor clots.
The [N] or nodal attribute is grouped as follows:
NX: Regional lymph nodes cannot be assessed because they might had been very small or previously removed by surgical procedure.
N0: No regional lymph node metastasis(tumor deposits in the lymph node are not seen on pathology slide)
N1: Metastasis to the underarm (axillary) lymph nodes on the same side as that of the tumor and the nodes are not adherent to the fat and therefore can be moved under the skin during examination.
N2: Metastasis to same side axillary lymph node or multiple nodes which are fixed to each other or to other structures and are therefore not movable during examination.
N3: Metastasis to same side internal mammary lymph node(s). These nodes are located alongside the chest bone or sternum.
The [N] status is further sub-classified when looked under the microscope and that makes it further important and complicated. I will not discuss the [pN] (attribute "p" is for Pathology) classification here since it will make the understanding more complicated.
Finally [M] or metastasis is classified as:
M0: No distant metastasis identified
M1: Distant metastasis present (includes metastasis to same side nodes located above the collar bone or supraclavicular lymph nodes)
Earlier a term called Mx, which means MX: presence of distant metastasis cannot be assessed. However, recently there had been recommendation to not use this term.
Conclusions
I have tried to make this article as simple as possible with respect to the important clinical and pathological classification, which have significant impact on the treatment and outcome of the individual cases. Every case is different and is looked at from different patho-physiological points of view. Some cases will respond to the empirical therapies and other might need neo-adjuvant treatments. It is beyond the scope of this article to discuss the entire scenario and management protocols. I will like to discuss more and invite you to give me some suggestions on what you may like to hear more on. The further work-up in breast carcinoma cases is an extensive multidisciplinary approach which includes pathology, oncology, radiology, molecular studies, radiotherapy and genetic counseling based on the type of mutations involved. Early screening and biopsy have helped a lot in picking up this dreaded disease in its very early stage of evolution. This have helped in early treatments and almost complete cure.
Recommended links and readings
Here are some of the recommended books on general awareness about breast carcinoma.
Dr. Susan Love's Breast Book, 5th Edition by Susan M. Love MD
The Breast Cancer Survival Manual, Fifth Edition: A Step-by-Step Guide for Women with Newly Diagnosed Breast Cancer by John Link
Breast Cancer Husband: How to Help Your Wife (and Yourself) during Diagnosis, Treatment and Beyond by Marc Silver
Comments
0 of 8192 characters used
Post Comment
No comments yet. | ESSENTIALAI-STEM |
Draft:Al-Mohanad Al-Marwai
Al-Mohanad Al-Marwai is the CEO and co-founder of Arabian Coffee Institute, Coffee Lights and AgriNexsus Ltd. Al-Marwai has founded eight companies over the last 12 years across Saudi Arabia, UK, Uganda and the US. He has also trained over 2000 leaders in the coffee sector and entrepreneurship. Category:Living people | WIKI |
Abstract
The mechanisms underlying the psychotropic actions of lithium are not established, but modulation of endogenous brain neurotransmitter systems is likely to be important. Several interactions of lithium with muscarinic responses have been reported, including a marked potentiation of seizures produced by muscarinic agonists. Because the mechanism by which lithium augments muscarinic seizures may be related to the mechanism by which it produces its psychotropic effects, we have studied the interaction of lithium and muscarinic agonists in vitro. Using rat hippocampal slices, we found that a muscarinic agonist, pilocarpine, increased postsynaptic neuronal excitability, but simultaneously decreased synaptic transmission because of presynaptic inhibition. Lithium did not alter pilocarpine's postsynaptic excitatory actions, but reversed its presynaptic inhibitory action, leading to markedly increased action potential firing. These presynaptic effects are not caused by alterations in presynaptic action potential shape or reliability of conduction, and do not involve pertussis toxin-sensitive G proteins. Activation of protein kinase C with phorbol-12,13-dibutyrate, or inhibition with H-7 and sphingosine, did not affect muscarinic presynaptic inhibition, but abolished lithium's ability to enhance synaptic transmission, suggesting that this effect of lithium involves protein kinase C. We propose that presynaptic facilitation accounts for lithium's potentiation of muscarinic seizures. Since these effects occur with concentrations of lithium used clinically, similar presynaptic effects in endogenous brain neurotransmitter systems may be important for lithium's psychotropic actions.
Original languageEnglish
Pages (from-to)457-468
Number of pages12
JournalNeuroscience
Volume38
Issue number2
DOIs
StatePublished - 1990
Fingerprint
Dive into the research topics of 'Lithium enhances neuronal muscarinic excitation by presynaptic facilitation'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
John S. McCampbell v. Mary J. Durst et al.
No. 1931.
1. Collateral Attack—Fraud.—A suit to cancel and annul a deed executed in pursuance of the proceedings of the Probate Court, which are alleged to have been fraudulent and void, is not a collateral attack on such probate proceedings, but a direct effort to vacate the deed, which may be done when fraud has been perpetrated, though the probate orders stand.
2. Stale Demand.—The defense of stale demand will not avail in favor of one who sets it up against the claim of title by a former owner when the defendant’s right, accrues within less than ten years.
3. Evidence—Fraud—Administrator’s Deed.—When an order of probate confirming an administrator’s sale and the deed made in pursuance thereof are attacked lor fraud, and suit is brought by the heir to cancel the deed, alleging that the recitation therein which alleged payment of purchase money was false, parol evidence is admissible to contradict the recitations of the deed by showing that no consideration was ever paid.
4. Void and Voidable.—When the jurisdiction of a Probate Court over the administration of an estate has once attached, its orders though not strictly in accordance with a directory statute are not void but voidable. If an administrator’s report of sale and the order confirming it were procured through fraud, they can not form the basis of a right claimed by the purchaser or his vendee in a suit to cancel the deeds, they having notice of the fraud complained of.
5. Contract—Condition Precedent.—An attorney contracted with heirs of one whose estate was being administered that he would render all professional services necessary in litigating the title of the estate to lands, and would pay, compromise, or discharge in some way all debts established against the estate. The contract further-provided that he should be entitled to one-half the land of the estate upon its final settlement, distribution, and partition, after payment of all lawful debts, costs, and charges.. Held, that the payment, compromise, or discharge in some way of all debts established against the estate was a condition precedent to the right of the attorney to receive the one-half set forth in the contract.
6. Same.—Under a. contract between an attorney and the heirs of an estate the attorney was to have for his services one-half of the land of the estate which might remain after the discharge in some way of all debts against the estate. The debts were never paid. The form of an administrator’s sale was gone through with and its confirmation by order of the Probate Court secured, but no money was ever paid by the purchaser for the land sold, one-half of which was deeded to the attorney, on which transaction also no money was paid. In a suit by the heirs to recover the land, held, that the attorney who had received a deed without consideration, with full knowledge that his vendor, the pretended purchaser, had paid nothing for the land, held the legal title in trust for the benefit of the heirs.
7. Fraud in Probate Proceedings.—The administrator was also an heir, a party to the contract with the attorney, and one of the plaintiffs in a suit to recover the land from the attorney. Held, that if such heir, being administrator, did in Ms representative capacity consciously participate in the fraud and knew that his report to the Probate Court that the purchase money for the land had been paid was false, he would be without remedy as against his coworker in the fraud or his vendee.
Appeal from Cameron. Tried below before Hon. JohnC. Russell.
The opinion states the case.
Wells & Hicks and Waul & Walker, for appellant.—
1. The plaintiffs relied upon their charges of fraud, and yet there are no facts or acts-set out in their pleadings, and certainly nothing proved, from which any such inference can be drawn; the use of such terms as “fraud,” “fraudulent,” “ covinous,” etc., is dealing in mere conclusions of law and wholly insufficient. The fact that the defendant was the attorney and counselor of the administrator did not in the absence of other and inculpatory facts render a purchase from the administrator by the attorney in person or through another even voidable, much less void; and so with all the orders and decrees of the Probate Court; each and every order and deed complained of must be void and not voidable merely, else in this, a collateral action and one brought by parties and privies, they can not be attacked; if the fraud was admitted the rule would remain the same in this action. Kerr on Fraud and Mistake, 365.
Fraud is a conclusion, and it is wholly immaterial and insufficient merely to state such conclusions. Id., 366; Giddings v. Steele, 28 Texas, 732.
Rule as attorney purchasing, etc. Erskine v. De la Baum, 3 Texas, 406; Mackey v. Martin, 26 Texas, 57; Giddings v. Steele, 28 Texas, 732.
Orders and decrees of Probate Court can not be attacked collaterally. Lynch v. Baxter, 4 Texas, 431-440; Burdett v. Sillsbee, 15 Texas, 604, 617; Lockhard v. White, 18 Texas, 110; Dancy v. Stribling, 15 Texas, 557; Guilford v. Love, 49 Texas, 715; Brown v. Franklin, 44 Texas, 559; Jansen v. Jacobs, 44 Texas, 577; Dunson v. Payne, 44 Texas, 542; Murchison v. White, 54 Texas, 78; Fleming v. Seeligson, 57 Texas, 524; Bradley v. Love, 60 Texas, 475; Rutherford v. Stamper, 60 Texas, 450; Heath v. Layne, 62 Texas, 686; Mikeskav. Blum, 63 Texas, 44; Voorheesv. U. S. Bank, 10 Pet., 474; Wells’ Res. Adj., secs. 5, 6, 7, 9,12.
For non-payment of purchase money. Heath v. Layne, supra.
For collateral attack by parties and privies for fraud. Murchison v. White, supra.
2. The Probate Court is a court of general jurisdiction, and all of its orders and decrees are entitled to the same presumptions in favor of their validity as those of any other court of general jurisdiction. Its judgments, orders, and decrees can only be set aside by some direct proceeding having that end in view. Parties and privies can not make collateral attack for fraud. Rutherford v. Stamper, 60 Texas, 447; Bradley v. Love, Id,, 475; Kleinecke v. Woodward, 42 Texas, 311; Murchison v. White, 54 Texas, 78; Fleming v. Seeligson, 57 Texas, 524; Heath v. Layne, 62 Texas, 686; Mikeska v. Blum, 63 Texas, 44; Hollister v. Abbott, 11 Foster, 448; Voorhees v. U. S. Bank, 10 Pet., 474; Wells’ Res Adjudicata, secs. 5, 6, 7, 9, 12.
3. The law vests in courts of probate a larger discretion than in any other tribunal, and our Supreme Courts throughout the land so hold and
' construe all provisions of law like the one in question (requiring sales in lots of ten to forty acres) as merely directory and not at all mandatory, and allow the courts of probate in the exercise of a sound discretion to disregard them; and from the construction of these courts and the matters committed to their charge this rule is a matter of necessity and its wise and salutary effect illustrated almost daily.
And if error (which we do not at all concede) it was a mere irregularity and cured by the approval of the sale by the court; this being a collateral action the question can not be raised here. Edwards v. James, 13 Texas, 52; Brown v. Christie, 27 Texas, 75; Alexander v. Maverick, 18 Texas, 179; Pasch. Dig., arts. 1304, 1305, 1322,1371; Laws of 1870, sec. 172 (probate); Fisk v. Varnell, 39 Texas, 73; Brown v. Cook, 45 Texas, 73; Grignon’s Lessees v. Astor, 3 How., 319; Florentine v. Barton, 2 Wall., 216.
Constitutional provisions are subject to the same construction as statutory provisions.
“There is generally a striking analogy and entire harmony between the rules of interpretation of constitutions and those of statutes,” etc. Potter’s Dwarris’ Statutes, p. 654; Id., p. 231, note 28; Id., pp. 222, 223, note 29.
“I may here notice that this same principle has been applied to constitutions.” Sedgw. Const and Stat. Law, pp. 368, 377, and note; Supervisors v. Heenan, 2 Minn , 330; Willitts v. Ridgeway, 9 Ind., 369; People v. Sup. Chenango, 8 N. Y., 317; Hill v. Boyland, 40 Miss., 618, 626, 627; Lehman v. McBride, 15 Ohio St., 573; Cunningham v. Cassiday, 17 N. Y., 276; Smith v. Randall, 6 Cal., 47; People v. Admire, 39 Ill., 251; Woods v. Moncell, 1 Johns Ch., 502; Savage v. Walsh, 26 Ala., 619, 631; People v. Cook, 8 N. Y., 68, 80; In re Empire City Bank, 28 N. Y., 200, 218, 219; People v. Allen, 6 Wend., 487; Jackson v. Young, 5 Cow., 269; Wood v. Chaffin, 13 N. Y., 509; Ex Parte Heath, 3 Hill, 42, 46, 47; Stewart v. Slater, 6 Duer., N. Y., 84, 102.
4. The report of sale, confirmation of sale, final account'of the administrator de bonis non, his deed to Richard Jordan, and from Richard Jordan to defendant, were each and all valid and necessary links in the chain of title, and together vested perfect title in defendant to the land in controversy, and were admissible in defense of plaintiffs’ action and to -establish the affirmative relief prayed by defendant. Lynch v. Baxter, 4 Texas, 443-446; Howard v. Bennett, 13 Texas, 309; Klienecke v. Woodward, supra; Guilford v. Love, supra; Rippetoe v. Dwyer, 49 Texas, 498; Debrell v. Ponton, 27 Texas, 623; Lockhart v. White, 18 Texas, 102; Dancy v Stribling, 15 Texas, 557; Burdett v. Sillsbee, 15 Texas, 604, 617.
5. The proceedings of a Probate Court can not be declared void in a collateral attack; irregularities can only be revised by a direct proceeding having that end in view.
A deed regular on its face can not be declared void by the court in an action for cancellation for alleged fraud. Such issue is for the jury to determine under proper instructions. Klienecke v. Woodward, 42 Texas, 311; Murchison v. White, 54 Texas, 78; Fleming v. Seeligson, 57 Texas, 524; Heath v. Layne, 62 Texas, 686, and otners cited, ante; Cobb v. Beall, 1 Texas, 347; Bryant v. Kelton, 1 Texas, 432; Crozier v. Kirker, 4 Texas, 252; Gay v. McGuffin, 9 Texas, 502; Hall v. Layton, 10 Texas, 61; Earle v. Thomas, 14 Texas, 583; Andrews v. Smithwick, 20 Texas, 118; Austin v. Talk, 20 Texas, 168, Thomas v. Ingram, 20 Texas, 728; Drinkard v. Ingram, 21 Texas, 650; Gilkey v. Peeler, 22 Texas, 669; Smithwick v. Andrews, 24 Texas, 488, 495; Rogers v. Broadnax, 24 Texas, 543; San Antonio v. Lane, 32 Texas, 416.
6. The proper construction of the contract evidenced by the two instruments of date April 22, 1870, is that Lovenskiold & McCampbell were employed to settle up the estate of James H. Durst, deceased, to close the-administration, and secure the discharge of the administrator according-to the law, and nothing more, and they were vested by the conveyance at the time of its execution with a one-half interest in all the property specified in said instruments. Swisher v. Grumbles, 18 Texas, 177; Haldeman v. Chambers, 19 Texas, 39; Dunlap v. Wright, 11 Texas, 597; Nichols v. Stewart, 15 Texas, 232; Perry v. Rice, 10 Texas, 371; Younger v. Welsh, 22 Texas, 417; Hill v. Still, 19 Texas, 84; Browning v. Estes, 11 Texas, 247; York v. Gregg, 9 Texas, 89; Broughton v. Blaylock, 17 Texas, 356; Menard v. Sydner, 29 Texas, 257.
Bethel Coopwood, for appellees. —
1. The plaintiffs being in actual possession of the land the void deeds could not be aided by time, and each day they remain of record and cast a cloud upon the title of plaintiffs is a successive cause of action, to which the statute of limitation attached, and the action is in the nature of a continuing nuisance and falls within the rule that a continuance of a nuisance is a fresh nuisance and gives a new cause of action. Smith v. Montes, 11 Texas, 25; Smyth v. Taylor, 34 Texas, 604-607; McConnell v. Kibble, 33 Ill., 175; Witchouse v. Fellows, 10 C. B. (N. S.), 765.
2. The District Court having no power to grant letters of administration in September, 1869, all the proceedings of the court in the progress of the administration it then granted are null and void, and may be shown to be so in any collateral proceedings in which they are relied on to support a claim of right; and in case the administration were rightful, every ■order or judgment which the law has not conferred upon the court the power to make or render is a nullity, and may be impeached collaterally by showing from the record itself the want of power in the court to make or render the order or decree in question; and presumptions will not be indulged which are repelled by the record: and fraud vitiates any and all instruments, as well as the judgment of courts, rendering them void. Withers v. Patterson, 27 Texas, 501, 502; McNally v. Haynes, 59 Texas, 583.
3. Appellant’s second amended original answer amounts in law to an admission in favor of plaintiffs that no purchase money was ever paid to the administrator for the land in Cameron County, and that the sale was made to Jordon with an understanding that he was to deed one-half of it to the appellant and the other half to the heirs and representatives, and that the only consideration claimed to have been paid in fact was that appellant caused deed to be made and forwarded to the administrator for half of the tract of land in accordance with an agreement; and such is tantamount to an admission that the sale was never made and that the deed is fraudulent and void. Judson v. Sierra, 22 Texas, 370; Hamlin v. Warnecke, 31 Texas, 93, 94; Hardy v. De Leon, 5 Texas, 246.
4. Long delay in taking any proceeding to enforce a contract after the party'is entitled to its fulfillment will be a defect to his suit when finally brought, and the defendant taking no steps for more than ten years to enforce the agreement set up should be deemed to have abandoned it, and the ordinary principles which require promptness in the assertion of the right to specific performance apply with peculiar force when no consideration is given. Wat. on Spec. Per., sec. 477; Preston v. Preston, 5 Otto, 200; McWilliams v. Long, 32 Barb., 194; Pigg v. Corder, 12 Leigh, 69.
Acker, Presiding Judge.—
James H. Durst died in Nueces County on the 24th day of April, 1858, leaving a will, which was probated in that county on the 3d day of June of that year, and the executors named in the will qualified. The will directed that after payment of all debts the estate should be equally divided between his widow and- three children. Debts to the amount of several thousand dollars were allowed by the executors and established against the estate.
In September or October, 1869, the executors were removed by the County Court of Nueces County, and Mortimer T. Durst, son, and one of the legatees, was appointed administrator de bonis non with the will annexed. On the 22d day of April, 1870, Mortimer T. Durst, as administrator de bonis non and as legatee, and Mary J. Durst, for herself as widow and legatee, and as mother and natural guardian for Mary H. Durst and James W. Durst, who were then minor heirs and legatees, executed a power of attorney to Charles Lovinskiold and John S. McCampbell, the appellant, who were then partners in the practice of law, empowering them jointly or severally to take all and every step and to do everything necessary according to their judgment to settlement, to settle up the estate and close up the administration “so as to insure a distribution and partition of the assets of the estate according to the last will and testament, and to obtain the final discharge of the administrator de bonis non with the least possible delay, and to assert and enforce our rights or those of any one of us through any of the courts of this State or of the United States, prosecuting or defending as the case may be, and with full power to compromise, arbitrate, and conciliate as to them may seem best; it being understood that the following are supposed to be all the claims •against the estate allowed and approved by preceding executor and unpaid. (The list of claims mentioned amounts to about $5000.) And it being further believed that the following embrace all the judgments heretofore rendered by the proper courts in the State against the deceased or his estate and which remain unsettled.” (The list of judgments mentioned amounts to about $8500.) The several suits then pending against the estate are named, and the fact stated “that there is said to be a claim against the estate on the part of the United States Treasury amounting to $4782 unpaid. It is understood that the property and assets of said estate are those recited, described, and set forth in the original inventory sworn to by the executors and filed in the Probate Court of Nueces County July 31, 1858; and that for their services our said attorneys in fact shall be entitled to demand, receive, and retain the one-half of all sums of money that may be coming to us, or any one of us, from the said administration and estate whenever collected and receivable by us, as also the one-half of all real estate that may fall to us or be decreed our shares out of said •estate upon its final settlement, distribution, and partition after payment of all lawful debts, costs, and charges.” The power of attorney recited that it was irrevocable.
Of same date with the power of attorney the administrator and widow executed in the same way another instrument in writing reciting that the four persons named were by the will “ constituted the only heirs and legatees of the testator, to share equally all his real and personal property after-payment and discharge of all his lawful debts, and we are desirous in every respect to carry out the wishes and intentions of the deceased.” The instrument conveys to Lovinskiold & McCampbell one-half of all the assets of the estate, describing them, “after the settlement, discharge, or payment of all claims against the estate which have been allowed and approved, and of all judgments for which said estate is or may become liable, and of all costs, taxes, and expenses to which said estate is or may become subject.” The instrument recites that it was executed “in consideration of the professional services rendered and hereafter to be rendered by Lovinskiold & McCampbell, attorneys at law, in settling and closing according to law the estate and administration of J. H. Durst,, enforcing and defending the rights and interests of the heirs and legatees,, perfecting and quieting title to all property belonging to the estate and recovering possession thereof, prosecuting all suits at law in favor of th& estate that are now pending or which it may be necessary to institute, defending all actions now pending or which may be brought against the • same, and generally doing and performing everything requisite and proper in the premises to insure the distribution and partition final of said estate and the final discharge of the administrator with the will annexed.” The instrument binds the legatees to execute, acknowledge, and deliver all and every such further partition, conveyance, release, act, confirmation, or release, and assurance in the law whatever as shall be reasonably demanded and required by said Lovinskiold & McCampbell for the-further,better, and more effectual conveying, settling, assigning, and confirming of all and singular the property and rights, privileges, members, and appurtenances unto the said Lovinskiold & McCampbell, their heirs,, and assigns.”
The administrator, widow, and minor legatees all resided at Austin, in Travis County, and Lovinskiold & McCampbell resided in Nueces. County, where the administration was pending. On October 21, 1870, appellant, as attorney in fact for the administrator de bonis non, filed an application for an order to sell all of the land belonging to the estate for the purpose of raising money to pay the allowance to the widow and children and debts established against the estate. The allowance had been fixed on applicatibn of the widow, filed May 25, 1870. The application was sworn to by appellant as attorney in fact for the administrator, and asked that so much of the land as was necessary to raise sufficient, money to pay the allowance be sold for cash and the balance on a credit of six months.
The application was granted and an order of sale regularly entered in due form, under which all of the lands belonging to the estate, about. 77,000 acres, were sold on the seventh day of February, 1871, appellant, attending and directing the sale as attorney in fact for the administrator, who was not present. The aggregate amount for which all of the lands sold was $3747.31. The land in controversy in this suit, fourteen leagues, of La Barreta twenty-five leagues grant, was bid off by one Jordon, who-attended the sale for that purpose at the request of appellant.
At the Spring Term, 18^1, of the court the administrator made a report of the sales, which appears to have been made by him in person, in which he reports the sale of the land in controversy to Richard Jordon for 1-jj- cents per acre in cash, amounting to $697.84, and that the land had been sold in bulk without subdividing as directed by the order of sale. At the same term of court the report of sales was approved and a. decree of confirmation regularly entered in due form, and the administrator was thereby directed to execute proper conveyances for the lands to the purchasers thereof. In May, 1871, the administrator executed a deed in proper form to Jordon, reciting payment of the purchase money.
On June 15, 1872, appellant and his law partner Lovinskiold filed the final report and application for final discharge of the administrator, which was sworn to by Lovenskiold as agent for the administrator. The exhibit accompanying the final report and application charged the administrator with the $3747.31, proceeds of sales of lands, and charged the estate with costs, expenses, and amounts paid out, including $2402.90 charged as paid to widow on allowance and $500 charged as attorney’s fee paid a firm of lawyers for representing the estate in a suit in Goliad County involving the title to a portion of the land belonging to the estate. The debits and credits on the exhibit exactly balanced. The final report and exhibit were approved and an order entered finally discharging the administrator.
In May, 1873, Mortimer T. Durst and appellee Mary J. Durst, executed and delivered the following paper:
“ $2115 coin. Received, Austin, Texas, May 23, 1873, from Messrs. Lovinskiold & McCampbell the sum of two thousand one hundred and fifteen coin dollars, which sum upon the delivery to me of the hereinafter specified conveyances in blank by quit claim from Richard Jordan and from Edwin J. Nickerson, of Nueces County, Texas, in full of all demands against Lovinskiold & McCampbell under deed by virtue of a certain contract entered with them April 22, 1870.
“1. Deed to lower half of the Barreta tract in Cameron County for 30,992 acres.
“2. Deed to eastern half of Mariano Lopez de Herrera tract in Nueces County, 7200 acres.
“ 3. Deed to the lower half Cayetano de la Garza tract in San Patricio County, 553 acres.
“Being for 38,740 acres.
“Mortimer T. Durst,
“As late administrator of estate of James H. Durst, deceased.
“M. J. Durst,
“And for myself and co-heirs and legatees of said James H. Durst.”
This instrument was duly acknowledged in June, 1873. The quit claim deeds in blank were delivered, one from Jordon, being for the lower half of the La Barreta tract, and Mortimer T. Durst wrote the name of Mary H. Durst (now Armstrong) in the blank as grantee.
On the 23d of March, 1875, Jordon executed and delivered to appellant a quit 'claim deed for the upper one-half of the La Barreta grant, reciting the consideration to be $5000 in cash. Lovinskiold died before this deed was executed, and appellant testified that he purchased Lovinskiold’s interest before he died.
On February 20, 1878, Mary H. Durst married John B. Armstrong, and on July 31, 1882, Mortimer T. Durst conveyed his interest in the land in controversy to appellee Mary H. Armstrong.
This suit was brought on the 26th day of October, 1883, by appellee Mary J. Durst (Mary H. Armstrong), joined by her husband John B. Armstrong and James W. Durst as legatees. Armstrong and wife also claimed the interest of Mortimer T. Durst in the land. The petition set out in detail the proceedings in the Probate Court, the deeds executed thereunder, the contract between the administrator and widow of J. H. Durst and Lovinskiold & McCampbell, and every proceeding, transaction, and act as they are specifically hereinbefore set forth, and alleged that every act done by appellant and his partner was done in pursuance of a scheme and with intent to defraud appellees; and averred that the probate proceedings under which the lands were sold were absolutely void, and that the deeds executed in pursuance of the order of sale, report, and confirmation were void.
The prayer of the petition was for delivery and cancellation of the three deeds, that appellant and all persons claiming under him be restrained from setting up any claim or prosecuting any suit on the deeds or any other claim to the land, that all clouds cast upon appellees’ title by the deeds or appellant’s claim be removed, and that appellees be quieted in their title.
Appellant answered by general and special exceptions, pleaded stale demand, estoppel, acquiescence, limitation, and cross bill to recover the land, setting out his claims of title as follows:
1. By deed from Mortimer T. Durst, the administrator d& bonis non, to Richard Jordon, and deed from Jordon to him.
2. The power of attorney from appellees to Lovinskiold & McCampbell, and the contract entered into between the administrator and widow and Lovinskiold & McCampbell by which his firm was to have half of the land in payment for services. He pleaded faithful performance of all service incumbent on him and his partner under the contract, and specially pleaded the receipt executed by Mortimer T. Durst and Mary J. Durst, and denied all fraud.
By supplemental petition appellees denied the performance of services by appellant under the contract and power of attorney, and reiterated the charges of fraud. The trial was by jury, and resulted in verdict and judgment in favor of appellees in accordance with their prayer.
It was proved that no part of the debts established against the estate was ever paid, that Jordon never paid any consideration for the lands bid off by him, and that he never received any consideration for the deeds to the land executed by him to appellant and in blank at appellant’s request; that the money mentioned in the receipt from Mortimer T. Durst and Mary J. Durst to Lovinskiold & McCampbell was never paid; that appellees have expended over five thousand dollars in perfecting title to the land in controversy since the order closing the administration was entered, and have paid all taxes on the entire fourteen leagues up to the time of the trial.
The court charged the jury that the report of sale of land made by the administrator and the deeds made thereunder were in contravention of law and void; that the burden of proof was on appellant to sustain his cross action, and in order to entitle him to any relief under his power of attorney and contract he must prove that he has performed the conditions therein expressed to be performed by him; that closing the administration and obtaining the order discharging the administrator without performance of the other parts of the agreement would not be sufficient performance on the part of appellant; that if they found that Lovinskiold & McCampbell carried out the contract and performed the conditions thereof they should find for appellant; that if they found that appellees made the-contract of April 22, 1870, and that under it Mortimer T. Durst delivered the deed in blank to Mary H. Durst and received the same and others through Lovinskiold & McCampbell from Richard Jordon, and appellees knew the same and acquiesced therein for a period of more than ten years before the institution of this suit, then they are estopped from impeaching said contract and you will find for defendant.
The questions raised by the sixty-eight assignments of error that demand consideration are the following. It is contended:
1. That the court erred in overruling the special exceptions to appellees’ pleadings upon the grounds that they did not state facts, but conclusions, and did not state how, in what, or upon whom the alleged fraud was committed.
2. That the court erred in overruling the special exception upon the ground that this suit is an attempt to vacate the orders, judgments, and decrees of the Probate Court in a collateral proceeding.
3. That the court erred in overruling the special exception upon the ground that plaintiffs’ claim was a stale demand and that their right of action, if any they ever had, had been lost by their laches.
4. That the court erred in admitting the testimony of Richard Jordon over the objection of defendant upon the ground that the testimony was the declarations of a vendor after parting with title against the title, and that the testimony contradicted and impeached the orders and judgments of the Probate Court.
5. That the court erred in admitting the testimony of appellant and Mary J. Durst over the objection of defendant upon the ground that the testimony contradicted and impeached the orders and judgments of the Probate Court.
6. That the court erred in holding the probate proceedings and the deeds executed thereunder void and in excluding them from the jury on objection of plaintiffs.
7. That the court erred in charging the jury that under the contract, and power of attorney of April 22, 1870; it devolved upon appellant, to settle the debts established against the estate as a condition to his acquiring any interest in the land, and that obtaining the order discharging the administrator was not sufficient to entitle defendant to the land without performing other parts of the contract.
8. That the court erred in refusing to give the special charge number-three requested by apjDellant, to the effect that if they believed the contract between Lovinskiold and appellant and the administrator and widow was tainted with fraud they should return a verdict for defendant.
Without here reciting the averments of appellees’ pleadings, it is sufficient to say that we think they were sufficiently full and specific and that the court did not err in overruling the exceptions.
The obvious purpose of this suit was to cancel • the deeds which were executed in pursuance of the proceedings in the Probate Court, and to-remove from plaintiffs’ title the cloud cast thereon by the deeds or any other claim of appellant to the land. These proceedings in the Probate Court and every order and decree relating to the land in controversy are specifically set out in the petition, and it is averred of each and all of them that they are fraudulent and void. These proceedings constitute' a part of appellant’s claim and eventuated in the deeds, against both of which relief is directly sought by this suit. We think the suit is not collateral, but a direct proceeding to vacate the deeds, which .may be done if the facts alleged be true, although the orders in probate stand.
Appellant asserted no right or claim to the land until he received the deed from Jordon, but little more than eight years before this suit was brought. The plea of stale demand was not therefore sustained and the court did not err in so holding.
The witness Richard Jordon testified that he paid no consideration for the deed executed to him for the land, and that he received no consideration for the deed which he executed to appellant. This testimony was not the mere declarations of appellant’s vendor, but the proof of facts which were expressly alleged by appellees and which were also proved by the testimony of the appellant himself. This suit was predicated upon theory that the recitations in these deeds and the probate proceedings were false and fraudulent, and it was so specifically alleged in appellees’ pleadings as grounds for avoiding them. We think the testimony was admissible and that the court did not err in so holding.
What we have said with reference to the testimony of the witness Jordon applies to the testimony of appellant and the witness Mary J. Durst, which was admitted over the objection of appellant.
The proceedings in the Probate Court were not void and the court erred in so holding and in excluding them from the jury. The application and order for the sale of the lands were regular and complied with the requirements .of law. It is true that the report of the sales appears upon its face not to have been made in comformity to the directions of the order of sale or to the requirements of the statute then in force, but the court vested with-full jurisdiction in the premises, heard this-report and rendered a decree confirming it. It has been held that such statutes as that in force at the time these lands were sold directing how such sales should be made are merely directory. The decree of confirmation was entered by a court of competent jurisdiction in a proceeding entirely regular upon its face, and was not void, but simply voidable in a suit' like this, brought directly against the parties claiming rights under the probate proceedings with notice of the facts that render the proceedings voidable. While we think the court erred in the ruling now being discussed, we do not think it such •error as requires reversal of the judgment.
We think the court did not err in its construction of the contract entered into between appellant and his partner and the administrator and widow of James H. Durst. We think the contract admits of no other construction than that Lovinskiold & McCampbell were to render all professional services' necessary in litigating the title of the estate to the lands, and to defry all expense necessary to clearing up and perfecting the titles to the lands; to pay, compromise, or discharge in some way all debts established against the estate as conditions precedent to their right to receive one-half of the assets of the estate.' It was clearly proven that these conditions were not performed. The land having been conveyed to Jordon without consideration he held the title in trust for the beneficiaries of the estate, and the conveyance having been made to appellant without consideration and with full knowledge upon his part of the title his vendor had, he was in no better position than Jordon would have been as defendant in the action.
The contract entered into between Lovinskiold & McCampbell and the ■administrator and widow was probably not illegal. By its terms the administration was to be conducted and the estate settled in conformity with the requirements of law and the directions of the will. As to the two legatees who were minors at the time this contract was made and for whom their mother, the widow Mary J. Durst, assumed to act, their rights are in no way affected thereby. Had the terms of this contract been complied with and carried out in good faith appellant would have been entitled to receive one-half of the interests of Mortimer T. Durst and Mary J. Durst in the assets remaining after discharge of all debts and costs; but the rights of appellees Avho were minors and for whom no one was authorized to act in the execution of the contracts Avould have remained as if the contract had not been entered into.
We think the court did not err in refusing to give the special charge number three, because the charge as asked required the jury to return a verdict against all of the plaintiffs if they believed the contract was tainted with fraud, when, as we have seen, two of the plaintiffs were not in fact parties to the contract. There was nothing fraudulent in the contract; whatever of fraud there was, was in the acts subsequent to the-, execution of the contract, and with these none of the appellees appear to have had any connection.
While we think there was no error in refusing the special charge as, asked, we also think it was sufficient to call the court's attention to the-question, which should have been submitted to the jury, whether or not Mortimer T. Durst in reporting the sales of the lands to the court knew that the representation that the purchase money had been paid was false, and whether or not in executing the deed to Jordan he did so knowing that it was fraudulent and without consideration. If he was an actual-participant in the fraudulent transactions which resulted in the conveyance to appellant he would not be entitled to recover as against his coworker in the fraud, and whether or not he was such participant is a question of fact to be determined by the jury. If Mortimer T. Durst was so connected with the fraudulent transactions as to defeat his recovery, then appellee Armstrong claiming under him would likewise be defeated.
We deem it unnecessary to discuss the case further.
We are of opinion that the judgment of the court below should be reversed and the cause remanded.
Reversed and remanded..
Adopted March 26, 1889. | CASELAW |
Bellator 285
Bellator 285: Henderson vs. Queally was a mixed martial arts event produced by Bellator MMA, that took place on 23 September 2022 at the 3Arena in Dublin, Ireland.
Background
Bellator returned to Dublin for the second time in 2022, featuring Irish fighter Peter Queally in the main event against former WEC and UFC Lightweight Champions Benson Henderson.
After initially being booked for May 6, 2022 at Bellator 280 and being scrapped due to a hand injury to Manhoef, Yoel Romero and Melvin Manhoef was rescheduled for this event.
A bantamweight bout between Brett Johns and James Gallagher was scheduled for this event. However in August, it was announced that Gallagher pulled out of the bout due to unknown reasons. Jordan Winski was picked as a replacement for Gallagher. | WIKI |
Struggling commodity prices signal more trouble could be ahead for the stock market
Stocks prices have bounced back nicely since entering a correction in October. But several commodities have failed to recover along with them, suggesting more trouble may lie ahead for investors. The is up more than 6 percent since Oct. 29, when it closed down more than 10 percent from its all-time high reached in late September. But commodities like oil, gasoline, copper and platinum are still in a correction or in a bear market — down at least 20 percent from their 52-week highs. Commodities are typically seen as leading indicators for global growth as they are used for everything from homebuilding to powering cities. A decline in commodity prices can signal slower economic growth moving forward. "The question is does this mean the global economy is slowing? I think yes," said Komal Sri-Kumar, president of Sri-Kumar Global Strategies. "I can't see this continuing. When you get these signals, it's hard to see equities continue to move up on their own." Commodities have been hit by a slew of factors, including higher rates, a stronger dollar, weakness in overseas markets and increasing friction in global trade relations. The yield on the benchmark 10-year Treasury note is trading around 3.23 percent, near its highest levels since 2011. The , meanwhile, is trading at a level not seen in more than a decade. Yields have risen this year as risen this year as the Federal Reserve continues to unwind historically accommodative monetary policy. The Fed has increased the overnight rate three times this year and is expected to hike once more before year-end. Higher rates hurt commodities because they make it more expensive to store them for a prolonged period. Meanwhile, the stronger dollar has also hit commodities which are priced in the U.S. currency. The greenback is up more than 5 percent against a basket of currencies. Source: FactSet "A lot of that is a function of negative performance overseas relative to the U.S. and strength in the U.S. dollar," said Ilya Feygin, senior strategist at WallachBeth Capital. "The metals especially have been suffering from that combination." The U.S. economy grew at a 3.5 percent annualized pace in the third quarter, topping expectations. In China — the world's second-largest economy — economic growth slowed to 6.5 percent in the third quarter, missing estimates. Meanwhile, euro zone GDP growth decelerated to 0.2 percent in the third quarter from 0.4 percent in the second quarter. On top of that, continuous trade tensions between the U.S. and China have also depressed commodity prices. Washington and Beijing have exchanged tariffs on billions of dollars worth of each other's goods this year, sparking fears that tighter trading conditions could slow down global growth. "What's happening in the commodity markets has to do with trade," said Tim Courtney, chief investment officer at Exencial Wealth Advisors. He added, however, that he does not think the commodity complex's broad decline is signaling an economic contraction ahead. The decline in commodities has been especially hard on emerging markets as most are net commodity exporters. The iShares MSCI Emerging Markets ETF (EEM) — which tracks a broad basket of emerging market stocks — is down nearly 14 percent for 2018 through Thursday's close. The iShares ETFs that track Mexican and Chinese stocks are also down 13.6 percent and 11.2 percent, respectively. Emerging markets will need to recover for the global economy to recover, Sri-Kumar said, noting: "EM now accounts for 60 percent of the global economy." But Matt Lloyd, chief investment strategist at Advisors Asset Management, said the sharp losses in commodities could be a buying opportunity for investors as we get closer to the end of the current economic cycle. "We're late into the cycle and usually value outperforms growth at these stages," Lloyd said. "Commodities have been in a depressed market for some time and that has to do with the fact that we've had an anemic recovery from the global recession." — CNBC's Gina Francolla contributed to this report. | NEWS-MULTISOURCE |
Page:Oregon Historical Quarterly volume 23.djvu/388
338 CHARLES HENRY CAREY
In concluding this review of the Oregon Mission, it may be proper to observe that though the number of laborers in this field has been greatly reduced during the past year, this reduction has been mainly in the secular department. And there is good reason to hope that as the mission becomes less secular, it will become more spiritual in its character; that seeming weakness will prove its real strength, and its apparent retrogression turn out to be a forward movement. Such a sequel will serve to remind us of what it is always fatal to forget that neither worldly policy, numerical strength nor hon- orable distinction can ever be safely substituted for divine efficiency. "Not by might nor by power, but by my Spirit, saith the Lord." The good seed which has been sown in this far distant field is not lost. The enter- prise in Oregon must not be set down as a failure. There are two or three scores of triumphant spirits now in heaven who will bless the God of Missions and the Church through eternity that the voice of our missionary heralds was ever heard on the other side of the Rocky Mountains. Others are on their way who will, doubtless, unite in their rapturous strains for ever and ever. Besides the good already effected, under the most untoward circumstances, a foundation is laid for great good in the future. "The little one shall become a thousand?" and the valley of the Columbia shall yet become vocal with the songs of re- generated thousands the fruit of missionary instrumen- talities. In these views we are abundantly sustained by the language with which our worthy Superintendent closes his last letter. "There are," says he, "a number of worthy members in our church who have been converted here. Some have already gone to rest in Abraham's bosom. I think our Mission in Oregon has done good, is doing good, and will yet do great good in this land. Continue, 0, continue to remember us in your prayers!" To this request we sincerely hope the whole Church will give a hearty and united response. | WIKI |
Northern Suburbs, Cape Town
The Northern Suburbs is a major urban and rural region located in the City of Cape Town Metropolitan Municipality in the Western Cape province of South Africa. It is the urban north-eastern part of the Greater Cape Town metropolitan area (Cape Metropole) that is functionally merged with Cape Town.
The northern suburbs of Cape Town are experiencing human trafficking, as of October 2023 they have encountered 74 human trafficking victims, 42 labour trafficking victims, 9 victims of unspecified trafficking activities, 23 sex trafficking victims, and an estimated overall sum of 250 000 victims in South Africa.
Geography
The region extends from Goodwood in the west to Kraaifontein, Brackenfell and Kuilsrivier in the east and north up to incorporate the rural village of Philadelphia.
The principal town is Bellville to the south of the Tygerberg Hills, which as of 2011 has a population of 112,507. Along with Bellville, the population density of the Northern Suburbs is concentrated along the N1 corridor including the towns of Goodwood (pop. 50,285), Parow (pop. 119,462), Brackenfell (44,842) and Kraaifontein (154,615). Bordering Bellville to the north among the Tygerberg Hills is the town of Durbanville (pop. 54,286) and along the R300 corridor bordering Bellville and Brackenfell is the town of Kuilsrivier (pop. 46,685). Though separate, these aforementioned towns have virtually become one due to development and urban sprawl and as a result have become known as the northern suburbs of Cape Town.
The Northern Suburbs’ borders encompass the vibrant townships of Bloekombos, Wallacedene and Scottsdene in Kraaifontein and the smaller township of Fisantekraal (pop. 12,369) just outside Durbanville.
Towards the extreme north of the Northern Suburbs about 20 kilometres (12.4 mi) from Durbanville are the rural settlements of Klipheuwel (pop. 2,294) and Philadelphia (pop. 570) which are the most isolated and least integrated areas within the Greater Cape Town metropolitan area.
Roads
The Northern Suburbs mainly lies along the N1 freeway which traverses through Goodwood, Parow, Bellville, Brackenfell and Kraaifontein, routing traffic north-east from Cape Town to Paarl and Worcester. The R300 freeway (Kuils River Freeway) connects the northern suburbs of Bellville, Brackenfell and Kuilsrivier with Mitchells Plain to the south. The N7 freeway lies to the far west of the northern suburbs linking Goodwood with Malmesbury to the north.
Rail
The Metrorail Western Cape commuter rail system connects Cape Town to the northern suburbs of Goodwood, Parow, Bellville, Brackenfell and Kraaifontein via the Northern Line and also connects Strand and Somerset West in the Helderberg region to the northern suburbs of Kuilsrivier and Bellville via the Strand Line. | WIKI |
Citations:nunny
* 1970, Barbara Leslie Austin, Sad Nun at Synanon, Holt McDougal
* Sister Brigid wipes her nunny - glasses. No. Or, rarely. Here we're supposed to be teaching teenage girls about life, and we never - I make a gesture of hopelessness with my hands.
* 2011, Karl Sabbagh, Remembering Our Childhood: How Memory Betrays Us, Oxford University Press (ISBN<PHONE_NUMBER>417), page 110:
* ... if anybody's touched her nunny?' So I've asked you.
* 2015, Julia O'Faolain, No Country for Young Men, Faber & Faber (ISBN<PHONE_NUMBER>449)
* Poor thing, it's dreadful to strike people that way. Like old droppings. Her stale phrases, her nunny words: stuffy, niffy, lower-middle class, ... | WIKI |
Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams
Cisco 642-883 Exam - Cheat-Test.com
Free 642-883 Sample Questions:
Q: 1
What is defined by using the Cisco IOS XR policy-global configuration command?
A. the default BGP route policy
B. global variables that can be referenced by any route policy
C. the global default route policy
D. hierarchical route policy
E. nested route policy
Answer: B
Explanation:
Global Configuration Mode
Prompt: (config)
Enter global configuration mode from executive (EXEC) mode by using the configure command.
Global configuration commands generally apply to the whole system rather than just one protocol or interface. You can enter all other configuration submodes listed in this section from global configuration mode.
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)#
Global Parameter Configuration Mode
Prompt: (config-rpl-gl)
Enter global parameter configuration mode by using the policy-global command in global configuration mode.
In global parameter configuration mode, you can create or modify a global policy by entering successive commands and then terminating the configuration by entering the end-global command.
For example, to configure global parameters:
RP/0/RP0/CPU0:router(config)# policy-global
RP/0/RP0/CPU0:router(config-rp-gl)# glbpathtype ebgp
RP/0/RP0/CPU0:router(config-rp-gl)# glbtag 100
RP/0/RP0/CPU0:router(config-rp-gl)# end-global
Q: 2
What is the default OSPF seed metric and type?
A. 10 and E1
B. 10 and E2
C. 20 and E1
D. 20 and E2
E. 0 and E1
F. 0 and E2
Answer: D
Q: 3
Which high-availability routing feature requires the neighbor router to support the graceful restart capability?
A. BFD
B. NSR
C. NSF
D. MTR
Answer: C
Explanation:
On Cisco IOS XR software, NSF minimizes the amount of time a network is unavailable to its users following a route processor (RP) failover. The main objective of NSF is to continue forwarding IP packets and perform a graceful restart following an RP failover.
When a router restarts, all routing peers of that device usually detect that the device went down and then came back up. This transition results in what is called a routing flap, which could spread across multiple routing domains. Routing flaps caused by routing restarts create routing
instabilities, which are detrimental to the overall network performance. NSF helps to suppress routing flaps in NSF-aware devices, thus reducing network instability.
NSF allows for the forwarding of data packets to continue along known routes while the routing protocol information is being restored following an RP failover. When the NSF feature is configured, peer networking devices do not experience routing flaps. Data traffic is forwarded
through intelligent line cards while the standby RP assumes control from the failed active RP during a failover. The ability of line cards to remain up through a failover and to be kept current with the Forwarding Information Base (FIB) on the active RP is key to NSF operation.
When the Cisco IOS XR router running IS-IS routing performs an RP failover, the router must perform two tasks to resynchronize its link-state database with its IS-IS neighbors. First, it must relearn the available IS-IS neighbors on the network without causing a reset of the neighbor
relationship. Second, it must reacquire the contents of the link-state database for the network.
The IS-IS NSF feature offers two options when configuring NSF:
•IETF NSF
•Cisco NSF
If neighbor routers on a network segment are NSF aware, meaning that neighbor routers are running a software version that supports the IETF Internet draft for router restartability, they assist an IETF NSF router that is restarting. With IETF NSF, neighbor routers provide adjacency and link-state information to help rebuild the routing information following a failover.
In Cisco IOS XR software, Cisco NSF checkpoints (stores persistently) all the state necessary to recover from a restart without requiring any special cooperation from neighboring routers. The state is recovered from the neighboring routers, but only using the standard features of the IS-IS routing protocol. This capability makes Cisco NSF suitable for use in networks in which other
routers have not used the IETF standard implementation of NSF
Q: 4
Which high-availability mechanism is a detection protocol that is enabled at the interface and at the routing protocol levels?
A. NSF
B. SSO
C. NSR
D. BFD
E. SDR
Answer: D
Explanation:
http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fs_bfd.html
Q: 5
Which OSPF feature allows a router with redundant route processors to maintain its OSPF state and adjacencies across planned and unplanned RP switchovers and does this by checkpointing state information from OSPF on the active RP to the standby RP? This feature does not require the OSPF neighbor to support graceful restart.
A. NSR
B. NSF
C. BFD
D. MTR
E. SDR
Answer: A
Explanation:
Continuous Forwarding An important aspect of high availability is maintenance of traffic forwarding, even in the case of control-plane switchovers. Cisco IOS XR Software has several built-in features that can provide continuous forwarding, including RSP stateful switchover (SSO), Nonstop Forwarding (NSF), Graceful Restart, and NSR.
NSF: Cisco IOS XR Software supports forwarding without traffic loss during a brief outage of the control plane through signaling and routing protocol implementations for Graceful Restart extensions as standardized by the IETF. In addition to standards compliance, this implementation has been compatibility tested with Cisco IOS Software and third-party operating systems.
Graceful Restart: This control-plane mechanism ensures high availability by allowing detection and recovery from failure conditions while preserving NSF services. Graceful Restart is a way to recover from signaling and control-plane failures without affecting the forwarding plane. Cisco IOS XR Software uses this feature and a combination of check pointing, mirroring, RSP redundancy, and other system resiliency features to recover prior to timeout and avoid service downtime as a result of network reconvergence.
NSR: This feature allows for the forwarding of data packets to continue along known routes while the routing protocol information is being refreshed following a processor switchover. NSR maintains protocol sessions and state information across SSO functions for services such as
Multiprotocol Label Switching (MPLS) VPN. TCP connections and the routing protocol sessions are migrated from the active RSP to the standby RSP after the RSP failover without letting the peers know about the failover. The sessions terminate locally on the failed RSP, and the protocols running on the standby RSP reestablish the sessions after the standby RSP goes active, without the peer detecting the change. You can also use NSR with Graceful Restart to protect the routing control plane during switchovers. The Cisco IOS XR Operating System provides system resiliency through a comprehensive set of high-availability features including modularity, process restart, fault handling, continuous forwarding, and upgradability.
© 2014 Cheat-Test.com, All Rights Reserved | ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.