Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Apple is reportedly planning a March 25th event for its subscription news service
Apple is reportedly planning an event on March 25th to launch its upcoming paid Apple News subscription service, according to a report from BuzzFeed. The event will reportedly focus on Apple’s service business, so it’s unlikely that we’ll see any new hardware, like the rumored iPad mini, AirPods, or long-anticipated AirPower charger. But the timing and theme of the event could give us an early look at its upcoming TV service, which is rumored to launch this spring. For the past few years, Apple has held a March event focused on its iPads, so it would be strange not to have some hardware announcements at the event — especially considering that an updated version of the company’s entry-level $329 iPad would seemingly be the perfect place to read a paid Apple News subscription. Apple hasn’t formally sent out invitations for the event yet, but BuzzFeed’s John Paczkowski has a history of getting dates like these right, so it’ll likely only be a matter of time before Apple officially announces the event. Reports have been swirling about Apple adding a paid unlimited subscription to Apple News for months, suggesting the company would offer premium magazine and news subscriptions in a single bundle, similar to what Netflix and Hulu provide for TV and movies. Images previewing the service were found in an iOS 12.2 beta last month, indicating that Apple may be close to launch. The Wall Street Journal reported earlier today that Apple was having some issues with publisher partners over revenue splits for the upcoming service, with Apple reportedly demanding a staggering 50 percent cut before dividing the other half between publishers based on how much their articles were read. The service is rumored to cost $10 per month, although that number hasn’t been finalized, according to the WSJ. The paid Apple News subscription — along with Apple Music and the upcoming TV service — is part of Apple’s renewed focus on selling paid services going forward, following a slump in iPhone sales that has led the company to explore new sources of revenue for the future. | NEWS-MULTISOURCE |
Okey docs
Corvalol - instructions for use, potential harm
Corvalol
"Something crushed in the chest," "you have to calm down," "something hard to breathe" - this is how people motivate their decision to use a few drops of Corvalolum.And many people are accustomed to consider this drug quite safe - it certainly will be found in every medicine cabinet.But what in fact is a corvalol, to whom it can be taken, and to whom is it categorically contraindicated?Only specialists can answer these questions.
Table of contents: Corvalol - instructions for use Corvalol composition Corrolol indications Corvalol - indications for use Corvalol - contraindications How to take Corvalol Side effects Overdose Coralolol interaction with other drugs Corvalol is harmful
Corvalol - instruction manual
Before takingAny medicine, you need to carefully read the official annotation to it.But who reads these instructions?But even Corvalol, at first sight an absolutely safe drug, has its indications and contraindications, it can provoke the development of side effects.
Composition of Corvalol
The drug under consideration is in the form of drops and tablets, but coral drops are particularly popular. They include:
• ethyl bromizovalerianate;
• peppermint oil;
• phenobarbital;
• sodium hydroxide;
• purified water;
• ethanol.
Appearance of Corvalol drops is a clear liquid, without any tinted impurities.It has a peculiar pleasant aroma.
How does Corvalol work
How Corvalol works This medication belongs to a group of combined medicines, but all components that make up it combine optimally with each other, correcting the effect of each.
Ethyl bromizovalerianate has sedative and spasmolytic effects.Phenobarbital, in turn, enhances the sedative effect of ethyl bromizovalerianate, actively contributes to a decrease in the excitability and tension of the central nervous system, makes it possible for a calm onset of sleep.A peppermint oil has a complex effect on the human body: spasmolytic, choleretic, vasodilating, antiseptic.Therefore, peppermint oil contributes to the expansion of the blood vessels of the heart and brain, irritates the mucous of the organs of the gastrointestinal tract - this restores intestinal motility and helps to cope with increased gas production.
Corvalol - indications for use
There is a clear indication of those conditions in which it is advisable to use corvalol. These include:
1. Neuro-like conditions - increased irritability, unmotivated outbursts of anger, depressed mood, a sense of anxiety.
2. Functional disorders of the cardiovascular system - it is especially recommended to use corvalol for people with diagnosed angina, arrhythmia, tachycardia.
3. Spasms of the intestine - for example, with intestinal dysbiosis, diarrhea against food poisoning.
4. Sleep disorders - sleeplessness at night and drowsiness during the day, problems with falling asleep, frequent awakening.
Corvalol - contraindications
Corvalol - contraindications This drug is not used in pediatric practice, at least for children under 3 years of age it can not be uniquely assigned.In the older childhood, the question of the appropriateness of the appointment and use of Corvalol should be decided only by the doctor.
No studies have been conducted on the effect of Corvalol on the pregnant woman's organism, during breastfeeding and on intrauterine development of the fetus.Therefore, it is forbidden to take the drug in question during these periods of life.
It is strictly forbidden to use Corvalol in case of head injury, some brain diseases( this should be warned by the attending physician), diagnosed alcoholism.
It is not recommended to use the drug in question for violations of the liver and kidneys of a serious nature of the course - for example, in renal failure, cirrhosis.But this issue is solved in a strictly individual order.
How to take Corvalol
Dosage, which will have the expected effect and will not cause harm to the overall health, should be determined only by the specialist and individually. But in the instructions for the use of Corvalol, there are general recommendations for its use:
• adults can take 30 drops at a time, in case of diagnosing tachycardia and with the approval of the doctor, the dosage can be increased to 40 drops per reception.In a day you can eat Corvalol 2-3 times;
• Children over 3 years of age are prescribed 1 drop for each year of life once a day.In some cases, repeated taking of Corvalol is allowed, but the doctor must give it permission.
The duration of the course of treatment is determined only by the doctor and it is strictly forbidden to prolong it independently( "to fix the effect").
Side effects of
Despite the apparent simplicity and safety, Corvalol may in some cases cause side effects. These include:
• increased drowsiness;
• Constant dizziness;
• concentration of attention is reduced;
• heart rate slows down.
Note: if taking Corvalolum for a long time, the so-called phenomena of bromism-addiction and drug dependence, cancellation syndrome-can develop.
If these side effects( or at least one of them) appear, stop taking Corvalol immediately and seek medical advice.Most likely, a correction of the treatment regimen will be carried out or the dosage of the given drug will be reduced.
Overdose
Cases of coral overdose occur extremely rarely, but can occur.Therefore, anyone who uses this drug, you need to know the first signs of an overdose. These include:
• lowering blood pressure;
• nystagmus;
• depression of the central nervous system - apathy, confusion;
• rhinitis;
• hemorrhagic diathesis;
• ataxia;
• traffic coordination disorders.
If there is at least one sign of an overdose, the use of the drug should be stopped immediately and seek medical help.Typically, doctors prescribe symptomatic therapy with an overdose of corvalol, and if signs of central nervous system depression are already present, then caffeine and niketamide.
Interaction of Corvalol with other drugs
It is strictly forbidden to use the drug under consideration, if any sedatives are being taken - they intensify each other, which can lead to an overdose.
Note: in , the composition of corvalol is phenobarbital and ethyl alcohol are substances that are capable of affecting the central nervous system.Therefore, when accepting the means under consideration, it is not recommended to operate the transport, conduct labor activity, which is associated with the need for high concentration of attention.
Corvalol is harmful
Is Corvalol Harmful? Disputes about how dangerous Corvalol is to human health, are conducted relatively recently.Some time ago many people thought that Corvalol would be banned for sale in the Russian Federation - it contains both phenobarbital and ethyl alcohol.But it turned out to be only rumors - such combined preparations remain in free sale.
However, in most countries Corvalol is not found in pharmacy chains - it was withdrawn from sale without prescriptions.For example, the United States, Great Britain, Norway, Italy, the United Arab Emirates, Poland, Finland and Sweden not only banned Corvalol in free sale, but also strictly control the transportation of this drug across the border to the territory of their countries.Therefore, be extremely careful - if possible, when visiting these countries, replace the drug, if this is not possible, the doctor appoints him, then take care of the availability of a document confirming this fact.Otherwise, punishment will be imposed within the framework of the legislation of the specific country.
"Our population still has a strong habit of using this drug.Radical measures - a ban on the sale of Corvalol, its withdrawal from consumption - will cause a negative reaction from patients.At the same time, gradually Corvalolum will be superseded by other, more modern drugs with proven effectiveness, "the Russian Ministry of Health said in a statement.
What is so dangerous about Corvalol?
Coralol is so dangerous First, phenobarbital, which is part of the drug under consideration, has been included in the group of psychotropic drugs since 2013.For the sake of justice it is necessary to specify - in many countries of the world such a classification of phenobarbital has been adopted for a very long time.
Secondly, phenobarbital causes rapid and strong addiction - in some cases, it takes 2-3 weeks to take the drug for the development of drug dependence.Moreover, phenobarbital causes not only physical, but also psychological dependence.
Thirdly, after the abolition of corvalol, people develop a so-called "cancellation" syndrome - a depressed state, the patient complains of constant nausea, intense headaches.
Interesting fact: Phenobarbital is used in some countries to bring the death penalty to execution.
But is there nothing useful in this tool?After a long time, corvalol was recommended for consumption by millions of patients and in most cases no course of therapy was considered by the agent in question.There is one indisputable advantage in Corvalol - it has the fastest and most powerful effect.
If taken in small doses and extremely moderately, then Corvalolum can quickly, almost instantaneously, relieve the feeling of anxiety.In fact, the recommended dose of the drug is not dangerous, but the problem is that if you continually take it, you will need to increase the dosage.The most dangerous thing is that these doses do not just increase each time, but lead to real pleasure: a depressed state and dizziness are replaced by euphoria immediately after the use of the desired dose.
The popularity of Corvalol is related to the fact that it is a cheap medication known to everyone since ancient times and has a quick effect, but it should be consumed only when absolutely necessary or for the purpose of a specialist.If a person feels the manifestations of side effects listed in this article, or if others notice sharp mood swings in someone who periodically uses Corvalol, then urgently seek medical help.The fact is that drug dependence should be treated only in specific medical institutions.
Tsygankova Yana Aleksandrovna, medical reviewer, therapist of the highest qualification category
The most effective antipyretic agents for children
The most effective antipyretic agents for children
Elevated body temperature is one of the common symptoms of viral infections and colds.Significa...
Read More
Are there effective drugs to improve memory?
Are there effective drugs to improve memory?
How many drugs that improve memory, can a person call?Even men and young people will immediatel...
Read More
Remantadine: instructions for use, indications and contraindications
Remantadine: instructions for use, indications and contraindications
Remantadine is a synthetic antiviral drug that, in fact, is a derivative of adamantane.For th...
Read More | ESSENTIALAI-STEM |
It has been estimated that the years between 1933 and 1945 are a black hole in the art community, with thousands of pieces of art changing hands and going missing.
During World War II, the Nazis went on a rampage destroying and stealing European art. Priceless pieces of art were auctioned off at extremely low prices. This has created a major problem in the art community that remains evident today. People purchased stolen art and the victim’s families want their possessions back. In many cases, proving the legal rights to a piece of art is a difficult and time consuming process. This article will be examining 10 famous pieces of art that were stolen by the Nazis.
Brushdecor Note: This article was written in July 2010 by BRYAN JOHNSON | FINEWEB-EDU |
Description
Learn how to customize the Vision Client's menu via scripting.
Video recorded using: Ignition 8.1
Transcript
(open in window)
[00:00] The Ignition designer gives you the ability to tailor your Vision applications using custom menus and various enhancements to them. In this lesson, we'll show some examples of custom menus and also demonstrate how to set these up from scratch. Let's first take a look at some custom menus in an existing Vision application. Here, both the command and navigation menus are completely custom, added in the designer. We can see that each one also has some child sub options underneath and as well as some refinements such as icons, keyboard shortcut letters, tool tip text, and accelerator shortcut keys such as F1 or F2. You aren't required to make use of all these features, but they are here for your customization as desired. The command menu options aren't implemented yet, as we can see here, but the navigation ones are and they navigate between the three windows as shown below, or by using the accelerator keys F1, F2, and F3 at the keyboard, as I'm doing now, we can do the same thing.
[01:21] Let's next see how all this is done in the designer. In the designer, the menu customizations are accessed by going to the project menu, then the client events option, and finally to the client event scripts menu bar option, which is already selected here. In the menu structure pane here on the left, we can see that all the menu options are represented in a tree structure, each one having its own set of properties and each one potentially running its own script actions here in the scripting pane. For example, here, all we're doing is using system.nav.swapTo to display a specified existing window.
[02:05] For each menu element, you can potentially customize it further by adding a small icon, some tool tip text, an accelerator key such as one of the F keys, and the mnemonic character which will appear underlined in the menu option. Again, you aren't required to fill all of these out, they're just here for your applications use if desired. Now that we've seen the basics, let's set up a brand new menu item from scratch and customize it a bit. For starters, let's add a new top level menu item at the same level as the others on the client. So, we will click on the existing menu item command, and let's click add sibling, and we will click on it, give it a new name. How about new menu? And then, while it's still selected, we will add the child.
[03:06] And again, let's click on it and give it our own name. How about new child? Like so. And let's add a simple action, maybe just a simple pop-up message. So, system.gui. messagebox, and in parentheses and double quotes, maybe new child action here. We'll close it up like so, and then let's move this parent menu up in the order to the first spot with this up arrow, then we'll click, at the bottom, apply. And in the upper left, we will click save it to the gateway. And then when we go back to our minimized Vision client, we see the new menu in the first spot and new child underneath it.
[04:06] And when we select it, we see the message pop up we added, and everything is good. Of course, if we wanted to make our menu nicer, we could also add various customizations as we saw earlier. Let's see how this is done and how it will update our menu. So, for starters, let's dismiss our pop-up and restore a client event scripts dialog, and we'll put it alongside our client like so. Then let's select the new child for some customizations. Let's first add a small icon by clicking on this folder on the right and drilling down into the built-in icons, size 16, perhaps. And we'll just pick one that suits our fancy. How about this light bulb? We'll double-click on it. And we see it up here.
[05:03] By the way, we can also use our own icons for this too, if we want to. And let's add some simple tool tip text. How about new child tool tip text? Like so. The next- The difference between an accelerator and an mnemonic is that an accelerator is a key or key combination that can be pressed anywhere in the client to initiate a certain menu items action, whereas a mnemonic provides a keyboard based alternative to navigating a menu, but only when a particular menu is visible, and for us, also using the ALT key. So, let's add the following to the new menu. Let's add a N mnemonic. And to the new child, let's add a W mnemonic since the C is already spoken for for a command.
[06:01] And to the new child, let's add a... Oh, I don't know, let's add an F5 accelerator. Then what we'll do is we will apply our changes, then save to the gateway. So to see our changes, let's first bring the client event scripts back to the foreground and let's restore our client to have them side by side, then we can navigate in the client using ALT + N and then ALT + W to show the pop-up. Or dismissing the pop-up, we can do the same thing directly using F5 alone. So using all these options, we can configure our menu structure as much as we'd like to. You might notice a couple other menu options, windows and help.
[07:01] These are two standard menus added by the Vision client itself. We can hide the windows menu, but not the help one, or we can hide this menu bar entirely. However, the caveat is that we have to restart our client for such changes to take hold. So in this lesson, we've seen how to customize our Vision client menu bar with added menu items and various other refinements as our user needs dictate.
You are editing this transcript.
Make any corrections to improve this transcript. We'll review any changes before posting them.
close
Share this video | ESSENTIALAI-STEM |
Talk:Mustafa Ef. Ceric
Unsourced
* We have to enlighten the Enlightenment.
* You have to be crazy to change the world. | WIKI |
San Rocco, Guardia Sanframondi
San Rocco is a Roman Catholic former chapel or church located in Rione Croce of the town of Guardia Sanframondi, province of Benevento, region of Campania, Italy. The building is closed due to risk of collapse.
History
The octagonal church was erected in 1575 in response to the threat of a plague afflicting the region. The interior was richly decorated with stucco, and once had a number of altarpieces, including one by Paolo de Matteis. It is part of the route of the Rites of Penitence, held every seven years. | WIKI |
Ebola patient suspected of going to Rwanda - report
GENEVA, July 18 (Reuters) - A woman who died of Ebola in the Democratic Republic of Congo may have taken the deadly disease into Rwanda, according to a Ugandan Health Ministry report published by the World Health Organization on Thursday. The woman, a fishmonger who vomited multiple times at a market in Uganda on July 11 before dying of Ebola in Democratic Republic of Congo, the WHO said on Wednesday. The case raised the risk of the disease spreading in Uganda. “Upon leaving Uganda, she is suspected to have gone to Goma in DRC and later to Gisenyi in Rwanda with unknown business interests,” the latest report said. Rwanda has never had a recorded case of Ebola. Reporting by Tom Miles; Editing by Angus MacSwan | NEWS-MULTISOURCE |
Talk:Percee P
Untitled
Centered text Born in 1971 and started emceeing in 1979?
to the above poster, not sure if this is true, but its a fact that percee p claims himself, i saw him live last night and he said he'd been emceeing from 1979, and making records since 1986, 2006 was his 20th yea in the 'game' but he has still yet to release an actual album. his '1979' claim may be an exageration, but this is what he says, so be it.
I think the article should be changed to 'Percee-P'. On the track Lung Collapsing Lyrics he says "I'm the P E R C double E, dash P" so wouldn't that be the right way to write it? STR8jACKiT (talk) 01:15, 14 December 2008 (UTC)
That image has GOT to be fixed. Any of y'all know how to do it? -djl —Preceding unsigned comment added by Davidjustinlee (talk • contribs) 06:03, 16 December 2009 (UTC) | WIKI |
Opinion | Meghan Markle and My Tabloid Obsession
She’s a Rorschach test for whoever happens to be reading and writing about her. Ms. Greenidge is a contributing opinion writer. My weekly magazine ritual started in college, with People magazine, but I quickly grew bored of its articles. To get to the good dirt, you had to page past feel-good stories about small towns coming together and crossword puzzles that appeared to be written to make a very sleepy child feel good about herself. I soon moved on to more exciting magazines, like Us Weekly and In Touch, which were relatively new to the market in 2002. I bought them even when I had only $50 in my account, wincing as I tabulated the $7 deduction, berating myself for spending what amounted to a seventh of my worldly assets on trash. These days, I’ve nearly given up my gossip habit — the stories have gotten so boring, the same scandals, with different players, recycled over and over. But Meghan Markle forced me back into the habit of checking blogs every few hours for the latest update. She fascinates me less because I identify with her and more because she acts as a kind of Rorschach test for whoever happens to be reading and writing about her. She is a figure who would usually be beneath the standard gossip blogs — a mixed-race working actress, over 21, divorced, leading a rather uneventful life shooting television. But her marriage, and the stories forced upon her relationship, wedding, pregnancy and imminent childbirth, mutate and change for whoever happens to be reading them. She is either a beautiful symbol of a hoped-for pan-racial harmony or a treacherous, ill-mannered black woman who somehow tricked a blameless white man into marrying her. Both takes are so predictable that they become boring. But I keep reading about her because the beats of her story are so familiar, because it is fascinating to see the frothing rage she inspires in some and the myopic, fervent worship of celebrity as social balm in others, as if the ascension to royalty of a single woman of African descent could change the history of an empire based on racial subjugation. Perhaps the reason Ms. Markle sticks is because her story seems to so closely follow tabloid rules, and then swerve past them. If a tabloid editor could script reality, the prince would have already dumped her for a more suitable love interest. When I first started reading gossip magazines, uncovering the rules was part of the fun. Back then, it was at the beginning of the age of early-21st-century gossip, when there was a rise of celebrity and a new economy of paparazzi. But gossip blogs were still in their infancy, so if you wanted to watch the show, you had to read the magazines. In the tabloids, breakups were always wars. Any women over 21 were always “hoping for wedding bells.” Men were always avoiding marriage, unless they happened to be starring in a coming children’s movie franchise, in which case they were “finally ready to settle down.” Queer people didn’t exist, unless they were connected to scandal. I found these rules absurd and fascinating in the odd world they described, a world that operated according to logic I was certain, as a naïve and liberal-leaning college student, was about to be tossed aside in this world. It all seemed so obviously fake, so contrived. I assumed that the photos and stories were justified, because they were clearly written by someone in on the joke. It was the classic mistake of someone who has read a lot of books but not interacted with a lot of people. But here’s the thing about reading trash ironically. It still seeps into your worldview. Many of the tropes we’ve become accustomed to — bump watches, “flaunting body after baby,” the endless scrutiny of women’s bodies for the slightest fluctuation in weight — were just becoming established as story lines. I read these too, through a feminist lens, pointing to the pictures and saying, “This is messed up!” But I still bought my magazines every week. This habit lasted for more than a decade. Sometime in the middle of all of it, in my mid-20s — around 2008 or ’09 when I did a search on OkCupid for all the straight men who listed James Baldwin on their profiles and came up with two accounts in all of New York City — I began to think that maybe these magazines were on to something. Maybe the rules they were describing weren’t so ludicrous after all. I began to read these less as texts of a retrograde country to deconstruct and more, even though I couldn’t even really admit it to myself, as an instruction manual. Unsurprisingly, it did not yield great results in dating or in life. Even as I’ve worked to disregard the rules of tabloids, I still believe in the validity of gossip. Gossip lives a weird half-life. People invested in our current definitions of respectability and civil discourse will claim gossip is damaging, worthless, the refuge of the unintelligent. But if you are ever trying to find stories of people left off the official historical record, gossip becomes a place where you can maybe catch a glimpse of them, a distorted version of them trapped in scandal. What’s the instruction manual in the saga of Meghan Markle? I am not sure. I think there is something to learn about the falseness of narratives. I read gossip most ferociously during the time in my life when I was trying to figure out how to create an adult life, and the silly stories seemed, because of their dumb cruelty, to be sharing some kind of rude truth. It must be strange to live as Ms. Markle does, to experience a pregnancy — somehow a universal experience and something intensely personal — with millions of people deciding what it must mean for you. I can only imagine that you look straight ahead and keep moving. Kaitlyn Greenidge is the author of the novel “We Love You, Charlie Freeman” and a contributing opinion writer. The Times is committed to publishing a diversity of letters to the editor. We’d like to hear what you think about this or any of our articles. Here are some tips. And here’s our email: letters@nytimes.com. Follow The New York Times Opinion section on Facebook, Twitter (@NYTopinion) and Instagram. | NEWS-MULTISOURCE |
Duke of Rutland
Duke of Rutland is a title in the Peerage of England, named after Rutland, a county in the East Midlands of England. Earldoms named after Rutland have been created three times; the ninth earl of the third creation was made duke in 1703, in whose family's line the title continues. The heir apparent to the dukedom has the privilege of using the courtesy title of Marquess of Granby.
First creation
The title Earl of Rutland was created on 25 February 1390 for Edward of Norwich (1373–1415), son of Edmund of Langley, 1st Duke of York, and grandson of King Edward III. Upon the Duke's death in 1402 Edward became Duke of York. The title became extinct upon Edward of Norwich's death at the Battle of Agincourt.
Second creation
The title Earl of Rutland was created for a second time on 29 January 1446 for Edmund (1443–1460), second son of Richard Plantagenet, 3rd Duke of York (and younger brother of the future King Edward IV).
Third creation
Thomas Manners (c. 1488–1543), son of the 11th Baron de Ros, was created Earl of Rutland in the Peerage of England in 1525. He was the great-grandson of Richard Plantagenet. The barony of 'de Ros' (sometimes spelt Ros, Roos or de Roos) was created by Simon de Montfort with a writ of summons to the House of Lords for Robert de Ros (1223–1285) in 1264. The title may pass through the female line when there is no male heir, and accordingly, when the 3rd Earl, Edward Manners (c. 1548–1587), left no sons, the barony of Ros passed to the family of his daughter Elizabeth (died 1591) who became the wife of the 2nd Earl of Exeter. The 3rd Earl was succeeded as the 4th Earl by his brother John (died 1588). The barony of Ros was restored to the Manners family when Francis Manners, the 6th Earl (1578–1632), inherited it in 1618 from his cousin William Cecil (1590–1618). However, Francis died without male issue and the assumption of the courtesy title of Lord Ros for the eldest son of subsequent earls appears to have had no legal basis. On the death of the seventh Earl in 1641 the Earldom passed to his distant cousin John Manners of Haddon Hall, grandson of the second son of the first Earl.
Dukedom of Rutland
In 1703, the ninth Earl of Rutland was created Duke of Rutland and Marquess of Granby by Queen Anne.
Marquess of Granby
The most notable Marquess of Granby was John Manners (1721–1770), eldest son of the third Duke. He was an accomplished soldier and highly popular figure of his time; in 1745 he became a colonel; his military career flourished during the Seven Years' War.
At the Battle of Minden (1 August 1759), although his role was small, he commanded the reserve cavalry. In 1760, at the Battle of Warburg, he led a cavalry charge which routed the French, losing his hat and wig in the process. In recognition of this, soldiers of the Blues and Royals (his former regiment) have the unique privilege in the British Army of being permitted to salute while not wearing headgear. Granby's losing his helmet and wig in the charge gave rise to the expression 'going bald-headed' at something.
In 1758, the King made him Colonel of the Royal Horse Guards and in 1766, as Lieutenant-General, he became Commander-in-Chief (a basically political appointment). His title was honoured by being used by a large number of pubs throughout Britain. As Colonel, he provided for his most capable soldiers such that when they could no longer be of service to the Regiment, he would give them financial support to start a pub, the sole condition being that the pub was to be named "The Marquis of Granby" after him. The towns of Granby, Quebec in Canada and Granby, Massachusetts and Granby, Connecticut in the United States as well as Granby Street in Norfolk, Virginia, USA were also named after him. So too were two forts, Fort Granby, in Tobago, and Fort Granby in South Carolina.
He died before his father, and therefore did not become Duke.
Subsidiary titles
The subsidiary titles of the dukedom are: Marquess of Granby (created 1703), Earl of Rutland (1525), Baron Manners, of Haddon in the County of Derby (1679), and Baron Roos of Belvoir, of Belvoir in the County of Leicester (1896). The title Baron Roos of Belvoir is in the Peerage of the United Kingdom; the remaining titles being in the Peerage of England. The most senior subsidiary title, Marquess of Granby, is the courtesy title used by the Duke's eldest son and heir.
Family seat
The Manners family own medieval Haddon Hall, Derbyshire and Belvoir Castle, Leicestershire that were successively extended and rebuilt until the 19th century. Some rooms in both buildings are open to the public. They are Grade I in architecture, set in listed parks, woodland and gardens and span a central water feature, which acted as models for other landscaped estates.
In 2009, to mark 500 years of the occupancy of Belvoir Castle by the family, two aircraft from RAF Cranwell, Lincolnshire, bore the Duke's coat of arms. On 11 June 2009, the Duke visited the station to see the aircraft: a King Air from 45 (Reserve) Sqn and a Dominie from 55 (Reserve) Sdn.
Burials
The traditional burial place of the Manners family was St Mary the Virgin's Church, Bottesford. Since elevation to the dukedom in 1703 most Dukes have been buried in the grounds of the mausoleum at Belvoir Castle. The mausoleum at Belvoir Castle was built by John Henry Manners, 5th Duke of Rutland, following the death of his wife, Elizabeth Howard (1780–1825), daughter of the 5th Earl of Carlisle. After its construction, most of the 18th-century monuments in Belton Church were moved to the mausoleum which then became the family's main place of burial.
Literature
Jorge Luis Borges recalls the duke of Rutland in his story "A Survey of the Works of Herbet Quain" in the book The Garden of Forking Paths.
Earls of Rutland, first creation (1390)
* Other titles (1st Duke): Duke of York (1385), Duke of Aumale (1397–1399), Earl of Cambridge (1362–1461), Earl of Cork (c. 1396)
* Edward of Norwich, 2nd Duke of York (1373–1415), grandson of Edward III
Earls of Rutland, second creation (1446)
* Edmund, Earl of Rutland (1443–1460), second son of Richard Plantagenet, 3rd Duke of York
Earls of Rutland, third creation (1525)
* Other titles (1st–3rd & 6th Earls): Baron de Ros of Helmsley (1299)
* Thomas Manners, 1st Earl of Rutland (c. 1492–1543), son of George Manners, 11th Baron de Ros
* Henry Manners, 2nd Earl of Rutland (c. 1526–1563), eldest son of the 1st Earl
* Edward Manners, 3rd Earl of Rutland (1549–1587), elder son of the 2nd Earl, died without male issue
* John Manners, 4th Earl of Rutland (c. 1552–1588), younger son of the 2nd Earl
* Roger Manners, 5th Earl of Rutland (1576–1612), eldest son of the 4th Earl, died without issue
* Francis Manners, 6th Earl of Rutland, Lord Ros (1578–1632), second son of the 4th Earl, died without male issue
* George Manners, 7th Earl of Rutland (1580–1641), third son of the 4th Earl, died without issue
* John Manners, 8th Earl of Rutland (1604–1679), great-grandson of the 1st Earl
* John Manners, 9th Earl of Rutland (1638–1711), son of the 8th Earl, created Duke of Rutland in 1703
Dukes of Rutland (1703)
* Other titles: Marquis of Granby (1703), Earl of Rutland (1525), Baron Manners of Haddon (1679) and Baron Roos of Belvoir (1896)
* John Manners, 1st Duke of Rutland (1638–1711), only son of the 8th Earl
* John Manners, 2nd Duke of Rutland (1676–1721), son of the 1st Duke
* John Manners, 3rd Duke of Rutland (1696–1779), eldest son of the 2nd Duke
* John Manners, Marquis of Granby (1721–1770), eldest son of the 3rd Duke, predeceased his father
* John Manners, Lord Roos (1751–1760), eldest son of Lord Granby, died young
* Charles Manners, 4th Duke of Rutland (1754–1787), second son of Lord Granby
* John Henry Manners, 5th Duke of Rutland (1778–1857), eldest son of the 4th Duke
* George John Henry Manners, Marquis of Granby (1807), eldest son of the 5th Duke, died in infancy
* George John Frederick Manners, Marquis of Granby (1813–1814), second son of the 5th Duke, died in infancy
* Charles Cecil John Manners, 6th Duke of Rutland (1815–1888), third son of the 5th Duke, died unmarried
* John James Robert Manners, 7th Duke of Rutland (1818–1906), fourth son of the 5th Duke
* Henry John Brinsley Manners, 8th Duke of Rutland (1852–1925), eldest son of the 7th Duke
* Robert Charles John Manners, Lord Haddon (1885–1894), elder son of the 8th Duke, died young
* John Henry Montagu Manners, 9th Duke of Rutland (1886–1940), younger son of the 8th Duke
* Charles John Robert Manners, 10th Duke of Rutland (1919–1999), eldest son of the 9th Duke
* David Charles Robert Manners, 11th Duke of Rutland (born 1959), eldest son of the 10th Duke
The heir apparent is Charles John Montague Manners, Marquess of Granby (born 1999), elder son of the 11th Duke.
Line of Succession
* Coronet of a British Duke.svg John Manners, 1st Duke of Rutland (1638–1711)
* Coronet of a British Duke.svg John Manners, 2nd Duke of Rutland (1676–1721)
* Coronet of a British Duke.svg John Manners, 3rd Duke of Rutland (1696–1779)
* John Manners, Marquess of Granby (1721–1770)
* John Manners, Lord Roos (1751–1760)
* Coronet of a British Duke.svg Charles Manners, 4th Duke of Rutland (1754–1787)
* Coronet of a British Duke.svg John Manners, 5th Duke of Rutland (1778–1857)
* George Manners, Marquess of Granby (1807)
* George Manners, Marquess of Granby (1813–1814)
* Coronet of a British Duke.svg Charles Manners, 6th Duke of Rutland (1815–1888)
* Coronet of a British Duke.svg John Manners, 7th Duke of Rutland (1818–1906)
* Coronet of a British Duke.svg Henry Manners, 8th Duke of Rutland (1852–1925)
* Robert Manners, Lord Haddon (1885–1894)
* Coronet of a British Duke.svg John Manners, 9th Duke of Rutland (1886–1940)
* Coronet of a British Duke.svg Charles Manners, 10th Duke of Rutland (1919–1999)
* Coronet of a British Duke.svg David Manners, 11th Duke of Rutland (b. 1959)
* (1) Charles Manners, Marquess of Granby (b. 1999)
* (2) Lord Hugo Manners (b. 2003)
* (3) Lord Edward Manners (b. 1965)
* (4) Alfred Manners (b. 2013)
* (5) Vesey Manners (b. 2013)
* Lord John Manners (1922-2001)
* (6) Richard Manners (b. 1963)
* Lord George Manners-Sutton (1723-1783)
* John Manners-Sutton (1752-1826)
* The Revd Frederick Manners Sutton (1784-1826)
* The Revd William Manners-Sutton (1824-1899)
* Frederick Manners-Sutton (1865-1946)
* John Manners-Sutton (1914-2003)
* (7) John Manners-Sutton (b. 1955)
* [[Image:Coronet of a British Baron.svg|15px|baseline]] Thomas Manners-Sutton, 1st Baron Manners (1756–1842)
* [[Image:Coronet of a British Baron.svg|15px|baseline]] John Manners-Sutton, 2nd Baron Manners (1818–1864)
* [[Image:Coronet of a British Baron.svg|15px|baseline]] John Manners-Sutton, 3rd Baron Manners (1852–1927)
* The Hon. John Manners (1892–1914)
* [[Image:Coronet of a British Baron.svg|15px|baseline]] Francis Manners, 4th Baron Manners (1897–1972)
* [[Image:Coronet of a British Baron.svg|15px|baseline]] John Manners, 5th Baron Manners (1923–2008)
* (8) [[Image:Coronet of a British Baron.svg|15px|baseline]] John Manners, 6th Baron Manners (b. 1956)
* (9) Hon. John Alexander David Manners (b. 2011)
* The Hon. Richard Manners (1924–2009)
* (10) Edward Manners (b. 1948)
* (11) Rupert Manners (b. 1950)
* (12) Stephen Manners (b. 1978)
* (13) Philip Manners (b. 1979)
* (14) Thomas Manners (b. 1954)
* (15) Rupert Manners (b. 1990)
* (16) Hugh Manners (b. 199)
* (17) The Hon. Thomas Manners (b. 1929)
* (18) Charles Manners (b. 1957)
* (19) Joseph Manners (b. 1991)
* (20) Arthur Manners (b. 1959)
* (21) Hugo Manners (b. 1989)
* (22) Robert Manners (b. 1962)
* (23) Archie Manners (b. 1993)
* (24) Orlando Manners (b. 1995)
* (25) Humphrey Manners (b. 1998)
There are no further known heirs either to the Dukedom of Rutland or to the Earldom of Rutland.
Coat of arms
The original coat of arms of the Manners family had a chief of plain gules. The quartered chief, with the fleurs-de-lis of France and lion passant guardant of England, was granted as an augmentation by King Henry VIII to Thomas Manners at the time of his creation as Earl of Rutland, in recognition of his descent in the maternal line from King Edward III. | WIKI |
PENENTUAN RUMUS BILANGAN REPRODUKSI DASAR PADA MODEL MATEMATIKA COVID-19 DARI MODEL SIR YANG DIMODIFIKASI
• Anna Angela Sitinjak Politeknik Teknologi Kimia Industri Medan
Abstract
The spread of COVID-19 has occurred and is unsettling many countries, not only the number of patients is increasing but also the economy is disrupted. Mathematical models can be used to assist in making decisions by describing both exposed and infected conditions. From the mathematical model, especially infectious diseases, the basic reproduction number can be seen. Therefore, this study aims to find the basic reproduction number of the mathematical model COVID-19 modified with various approaches using parameters close to daily life. The basic reproduction number, R0, will be free from disease if R0 <1 and endemic if R0> 1. The method used is modifying the Mathematical Model SIR to become the Mathematical Model COVID-19 by considering the isolation that is currently done to reduce the spread of COVID-19, then looking for the disease-free equilibrium point and analyzed its stability by determining the eigenvalues of the Jacobian matrix. From the eigenvalues, the study result is obtained, namely Basic Reproduction Number, .
Published
2021-01-10
How to Cite
Sitinjak, A. A. (2021). PENENTUAN RUMUS BILANGAN REPRODUKSI DASAR PADA MODEL MATEMATIKA COVID-19 DARI MODEL SIR YANG DIMODIFIKASI. EduMatSains : Jurnal Pendidikan, Matematika Dan Sains, 5(2), 203-210. https://doi.org/10.33541/edumatsains.v5i2.2222
Section
Articles | ESSENTIALAI-STEM |
Page:Popular Science Monthly Volume 51.djvu/674
658 the diet. She was given a food rich in materials to nourish the nervous system, and within a week it was observed by all who knew her that there was a marked improvement in her temperament. After two weeks of proper nourishment she had regained her former restfulness, sleeping peacefully a good portion of the time; and gradually the expressions of irritability and moodiness disappeared. Her face would now light up as formerly with pleasant smiles whenever any one she knew was about, and once more she appeared to every one as a very good-feeling, happy child. From that time on care was taken with her food, keeping it rich in albuminous elements, and her intellectual and emotional development was most satisfactory in every way. Some time after her diet was enriched it was learned definitely that the food she had been getting just previously was quite deficient in nutritive elements.
Brain fatigue in childhood, as physicians well know, is sometimes due to pathological conditions wherein the peculiar elements needed to nourish the brain are not assimilated from the food. X and Y are two children of the same family, who at the ages of five and seven respectively came under the writer's notice. They were then giving their parents a great deal of trouble. They were highly organized, irritable children, with whom no one seemed to get along pleasantly. While at home nothing was permanent in its interest for them, and discipline was a serious problem. When they began going to school matters grew worse. While apparently bright children, they did not make rapid progress, and always seemed utterly fatigued at the close of the day's work. When they reached home at night any little thing which crossed their paths would so greatly annoy them that they were much of the time in tears and passions. After every effort had been made by the parents to discover what was the matter, an analysis of the blood was finally decided upon, and it was found that it lacked the right proportion of elements to properly nourish the nervous system. A special diet was then begun, and other treatment resorted to to supply this deficiency. After seven months of this special care sleep had been largely restored, the tendency toward irritability had decreased, and the children could now remain in school all day without becoming unbalanced thereby. They were in reality quite different children keener—intellectually, and expressing more estimable traits of character.
Lately a group of similar cases has come to the notice of the writer. The members of a family for several generations have been afflicted with anæmia of the brain, and the children show easily all the evidences of cerebral fatigue. One girl of twelve is characterized by willfulness and carelessness, as her teachers say. | WIKI |
Page:In Maremma, by Ouida (vol 2).djvu/259
'I am a fool,' he said to himself, but the folly grew with him. He had set his heart on saving her from this wild and solitary life, which was endurable only as long as youth and health should last, but even then was hourly filled with a thousand sources of peril and possible evil.
He grew uneasy. It was unlike her nature to fail in what she had promised; she was too grave to be capricious, too tenacious to be deterred by any obstacle or accident from doing what she had said she would do. He saw she had not come there in his absence, for she had not used the little boat, which remained always high and dry upon the shelf of rock, the oars and the fishing-gear lying inside it. For her to be so many days away from the sea, he felt that something unforeseen and serious must have occurred.
Any day, a wild boar might turn on her; a false step take her from the narrow path of safety into the slimy slow death of the black bog; the fever that she never feared might yet overtake her, or the lawless fierce men from the mountains find out her dwelling-place under the marucca and myrtle. The soil of Maremma was | WIKI |
Page:Nihongi by Aston volume 2.djvu/197
190 castle. He erected an armoury, and provided store of arrows. In his goings out and comings in he was always surrounded by an attendant company of fifty soldiers. These sturdy fellows were called the Eastern Company. The people of the various Uji came to his gate, and waited upon him. He called himself their father, and them his boys. The Aya no Atahe attended wholly upon the two houses.
4th year, Spring, 1st month. On mountain-peaks, by river-sides, or among shrines and temples, there was a something visible afar, and there was heard a humming of monkeys, as it were ten or sometimes twenty together. But when one approached to see what it might be, nothing was visible. There was still heard the sound of crying and screaming, but no one was able to distinguish any bodily form.
An old book says:—"In this year the capital was removed to Naniha, and this was an indication that the Itabuki palace would become a waste."
The men of that day said:—"These are the messengers of the Great Deity of Ise."
Summer, 4th month, 1st day. The Koryö student-priests said that their fellow-student Kura-tsukuri no Tokushi had made friends with a tiger, and had learnt from him his arts, such as to make a barren mountain change into a green mountain, or to cause yellow earth to become clear water, and all manner of wonderful arts too many to enumerate. Moreover, the tiger bestowed on him his needle, saying:—"Be watchful! be watchful, and let no one know! Treated with this, there is no disease which may not be cured." Truly, as the tiger had said, there was no disease which was not cured when treated by it. Tokushi always kept the needle concealed in a pillar. Afterwards the tiger broke the pillar and ran away, taking the needle with him. The Land of Koryö, hearing that Tokushi wished to return, put him to death by poison.
6th month, 8th day. (Prince) Naka no Ohoye secretly | WIKI |
-- Two United 777 Jets Hit Wingtips at Washington’s Dulles Airport
A United Continental Holdings Inc. (UAL)
jet taxiing to its gate at Washington’s Dulles International
Airport today clipped the wing of an aircraft parked nearby. Flight 951, a Boeing Co. (BA) 777 that seats about 250
passengers, had just arrived from Brussels when the 2:15 p.m.
incident occurred, Jennifer Dohm, a spokeswoman for the Chicago-
based carrier, said in an e-mailed message. Passengers and crew left the jet so maintenance workers
could evaluate both aircraft for damage. There weren’t any
passengers on board the parked plane, also a United 777, at an
adjacent gate, she said. No injuries were reported, Dohm said. To contact the reporter on this story:
Mary Jane Credeur in Atlanta at
mcredeur@bloomberg.net . To contact the editor responsible for this story:
Ed Dufner at edufner@bloomberg.net . | NEWS-MULTISOURCE |
Ingombota
Ingombota is one of the six urban districts that make up the municipality of Luanda, in the province of Luanda, the capital city of Angola. Ingombota is home to the central business district of Luanda, Angola. The economic, political and symbolic center of the city and the nation, it is Luanda's oldest district. The district is home to most of Luanda's prominent hotels and office towers.
Etymology
The word Ingombota originates from Kimbundu, while existing two theories as to its origin. One saying Ingombota comes from the words joint and ingombo kuta, meaning place where there are abundant quiabos. Another possibility would be to join the words Ngombo kuta and meaning a refuge for outlaws (possibly slaves), giving rise to the word Ngombota, in Portuguese to Ingombota.
Orientation
Ingombota has 9.6 square kilometers (3.7 square miles) and about 370,000 inhabitants. The district is bordered on the west by the Atlantic Ocean, Sambizanga to the north, Rangel to the east, and Maianga to the south. Ingombota is home to the Port of Luanda, Museu Nacional de Antropologia (Angola), National Assembly (Angola), the Fortress of São Miguel, Museu Nacional de História Natural de Angola and Museu da Moeda. The district has a population density of 100,000 people per square mile making it a highly densely populated urban neighborhood. Redevelopment of the historic colonial core has entailed the destruction of informal and low-income housing options for residents in favor of higher end commercial and residential structures. Prominent examples of this redevelopment and displacement is the demolition of the Cuca Building and Kinaxixe Market.
Neighborhoods
The Ingombota District is made up of the seven neighborhoods of Luanda Island, Baixa, Cidade Alta, Ingombota, Maculusso, Kinanga, and Patrice Lumumba. These are older, urbanized neighborhoods which make up the historic and economic core of Luanda Province.
Luanda Island
The Luanda Island is a narrow strip of land located between Baía de Luanda and the Atlantic Ocean with sandy beaches, stylish hotels and attractive views of the Luanda skyline. Igreja da Nossa Senhora do Cabo, the oldest church in Angola is located on Luanda Island.
Baixa
Baixa, the lower city concentrates the financial and commercial activities in the capital. Headquarters of the largest companies operating in Angola are located here, both domestic and foreign, mainly around the Avenida 4 de Fevereiro. Ingombota also has several hotels, numerous restaurants, clubs, bars, bakeries, kiosks and many shops, besides the ever-present peddlers market, the responsibility of zungueira.
Cidade Alta
Cidade Alta, the upper town is home to the Presidential Palace, several ministries, the National Assembly (Angola) near the Fortaleza de São Miguel and the Igreja de Jesus (Luanda), where Paulo Dias de Novais, the founder of the City of Luanda is buried. The area occupies a lofty position on the city and is a popular location for tourists and locals, with heavily guarded police all around, thanks to the proximity of the Presidential Palace.
Ingombota
Located in the Ingombota neighborhood are the Museum of the Armed Forces of Angola, the National Museum of Anthropology and the National Museum of Natural History of Angola. The majority of Luanda's Portuguese colonial era structures are located in this neighborhood. In recent years many have been renovated and restored to their former beauty. A treelined pedestrian corniche was constructed between 2008 and 2011 providing public access to Luanda Bay. The corniche is a popular place for people to gather and recreationally walk.
Maculusso
Maculusso is a neighborhood located in the southern portion of Ingombota. The neighborhood developed under the period of Portuguese colonization in Angola. The neighborhood was originally built for a working-class population of merchants, missionaries, soldiers and others. The area continues to be a primarily residential quarter with a formally laid out street pattern. Streets in the quarter are paved often with sidewalks and trees. The area is now an upper-middle class district with abundant luxury houses, leisure areas, historic sites and international hotels and restaurants.
The area consists primarily of low-rise homes with adjoining private gardens but with the discovery of oil in Angola has seen the construction of a number of high-rise residential and hotel structures. Holy Family Church (Igreja Sagrada Família) and the Mutu Ya Kevela School are two of the most prominent cultural landmarks in the neighborhood. Angola's Central Military Hospital and Maternity Hospital are located across the street from Holy Family Church. Dipanda Tower, the Tropical Cinema and Largo da Independence are other attractions in the area.
Kinanga
Kinanga is a formerly working-class residential district located in the southwest section of Ingombota. The neighborhood consisted largely of informally built residential structures on a slope overlooking the Atlantic Ocean. In recent years many of these structures have been demolished and replaced by a parkway and the Agostinho Neto Memorial and park. The new National Assembly (Angola) campus overlooks the neighborhood.
Patrice Lumumba
Patrice Lumumba is a working-class residential district on the east side of Ingombota District. The neighborhood is set atop a hill overlooking Luanda Bay. A large public square dedicated to Patrice Lumumba is located at the intersection of Largo de Ambiente and R. Major Kanhangulo Avenue. Angola's Ministry of Interior is located in the neighborhood and is one of several new office buildings that were built in the neighborhood in the 2010s. Similar to other neighborhoods in Ingombota, in the 2010s many of the informal residential structures were cleared and replaced with higher end office towers, hotels and apartment buildings.
Transportation
Ingombota is home to Luanda's Central Train Station which provides service to the Luanda Railway. The Port of Luanda is located in the eastern portion Ingombota along the Luanda Bay. Quatro de Fevereiro Airport is located 6 kilometers to the south of the district, though the new Angola International Airport is expected to replace the airport in 2023 and is located 40 kilometers to the southwest of Ingombota. Construction of the Luanda Light Rail began in Ingombota in 2020. The neighborhood consists primarily of paved streets which host a range of vehicles, motorbikes, bicycles, public buses and informal vans. | WIKI |
[Crim. No. 1595.
First Appellate District, Division Two.
January 20, 1931.]
THE PEOPLE, Respondent, v. JOHN J. COLLIER et al., Appellants.
Myron Harris, Leo A. Sullivan, R. B. McMillan and John W. Collier for Appellants.
U. S. Webb, Attorney-General, William F. Cleary, Deputy Attorney-General, Earl Warren, District Attorney, and Frank J. Coakley, Deputy District Attorney, for Respondent.
NOURSE, P. J.
The defendants were tried jointly on an indictment framed in four counts, the first of which charged conspiracy to ask and receive bribes, the other three charging completed acts of bribery. During the course of the trial the offense charged in count three was dismissed and . the jury returned its verdict finding the four defendants guilty on the first count and not guilty on counts two and four. From the judgment on the verdict and from the orders denying their motions for a new trial the four defendants appeal upon a typewritten record. Each defendant was represented by individual counsel at the trial and each has filed separate briefs on this appeal requesting that any point raised by others be available to him. Upon some of the issues presented on the appeal the legal considerations are applicable to all appellants, but in most instances the circumstances are such that each appellant must be treated separately.
The story of the conspiracy originates in the testimony of Fred Smith, a co-conspirator. In the general election of 1926 a bitter contest was waged in Alameda County between B. F. Becker and.Barnett, the incumbent, for office of sheriff in which Becker was successful. In January, 1927, Becker,. who had been chief of police of the city of Piedmont, brought with him to the sheriff’s office the defendant John L. Davis, who had been associated with him in the Piedmont office. Davis was made a deputy sheriff. Collier, who had occupied that position for many years under the former sheriff, was retained. Shurtleff, who had formerly been a federal prohibition officer, was appointed by Becker as chiéf criminal deputy and Davis and Collier were assigned to work under him as a “raiding squad” to enforce the provisions of the Wright Act (Stats. 1921, p. 79) relating to the manufacture and sale of intoxicating liquor. The defendant Gardella was a confessed “bootlegger” operating in the eastern section of Alameda County.
Fred Smith met Becker and Davis while they were in the Piedmont office and became very active in Becker’s campaign for sheriff in the fall of 1926. Soon after Becker assumed the office of sheriff in January, 1927, Davis sought out Smith and proposed his plan to force the bootleggers of the county to pay tribute for protection against arrest for violation of the prohibition law. In the latter part of January, 1927, Davis, accompanied by defendant Collier, appeared at Smith’s place of business in San Leandro and, in the presence of Collier, told Smith that there were several bootlegging places operating in Livermore and vicinity which would “have to lay it on the line or get knocked off”, and proposed that the three drive into Livermore, where he, Davis, would introduce Smith to the Gardellas. Davis then drove Smith and Collier to the Gardellas’ bootlegging establishment, where all had drinks of liquor and where Davis introduced Smith as “the closest man in the county to the sheriff” and “the man to talk business to with regard to protection”. Gardella replied that he had not been active in Becker’s campaign; that he had been a “Barnett man”, “but that if it was going to be necessary to pay for protection, if the business would afford it, why, he would do so”. Gardella then said that under present conditions he could probably pay around $75 a month if he were assured of proper protection. Smith assured him that “that was all right”, whereupon Collier left the party, saying that he would wait for them out in the car. Davis then went into the “barroom” while Gardella procured $75, which he paid to Smith. These two then joined Davis, who then said to Gardella: “If you got any other of your friends down here who are all right we can arrange the same thing for them.” Gardella replied: “All right, I will have a talk with them.” He, Gardella, then mentioned Croce, Duarte, Valponi and another as bootleggers who could be expected to pay monthly sums for protection and the rate to be charged each was discussed among the three. They then agreed that Smith should return to Gardella in two or three days to receive the money which Gardella promised to collect from those mentioned. Davis and Smith then joined Collier in the car and Smith divided the money he had received from Gardella—$25 to Davis, $25 to Coliier and $25 to himself.
A few days later, according to the arrangement made at the time, Smith returned to Gardella and received two envelopes, one containing $50, the other $25, which Gardella told him had been collected from two of the bootleggers and which Smith divided with Collier and Davis. From this time on to the early part of August, 1927, Smith continued the collection of monthly tribute from those engaged in the violation of the Prohibition Act, either in the operation of stills or in the transportation and sale of illicit liquor. These sums were divided one-quarter to Davis, one-quarter to Collier, one-quarter to Smith, and the remainder was held by Smith as a “trust fund” for campaign purposes, out of which he testified he paid a portion to Shurtleff.
During all this time the district attorney of the county maintained a staff of special detectives engaged in investigating violations of the Prohibition Act and the practice of the two offices was that when the district attorney’s staff discovered violations of the act search-warrants were delivered to the sheriff’s office for service. These warrants came into the hands of Shurtleff, who handed them to Collier and Davis for service. From the testimony of Collier and Davis it appears that during the period in question they found liquor and made arrests in ninety per cent of the raids made by them, but that they were unsuccessful in their raids upon the bootleggers in the vicinity of Livermore because they were always,“tipped off” before they arrived. It was the theory of the state throughout the trial that this was the “protection” given to those who paid the conspirators and that information was always given in' advance of a raid upon their friends, this information coming directly from Davis before he and Collier left the sheriff’s office or coming to the bootlegger from Smith through information furnished him by Davis, Collier or Shurtleff.
The foregoing statement of facts, which is taken mainly from the testimony of Smith, is sufficient, if corroborated in the particulars required by law, to involve all four defendants in the conspiracy charged. It is apparent from this evidence that the conspiracy was formed in the latter part of January, 1927, to ask and receive bribes for the purposes alleged in the indictment and that Davis, Collier, Smith and Gardella were the instigators of the conspiracy. The precise date when Shurtleff joined in the conspiracy does not appear. Hence, aside from the matter of corroboration,' which will be treated later, the evidence is legally sufficient to sustain the verdict unless the testimony of Smith was incompetent for the reasons assigned by the appellant Collier.
The point raised by this appellant is that Smith, being an accomplice, was incompetent to testify regarding any of the agreements or conversations had between his co-conspirators until after the conspiracy was proved—that is to say, that evidence of these conversations was inadmissible to prove the corpus delicti. In this connection the appellant relies on subdivision 6 of section 1870 of the Code of Civil Procedure, which provides that “After the proof of a conspiracy the act or declaration of a conspirator” may be given in evidence “against his co-conspirator”. From this it is argued that no evidence of the act or declaration of a conspirator can be received for the purpose of proving the conspiracy. The argument is based on what we deem to be a misconception of the meaning of the code and upon disconnected excerpts from decisions where the language has not been carefully chosen. The code section is an exception to the well-known hearsay rule which is stated in section 1845 of the Code of Civil Procedure, as follows: “A witness can testify of those facts only which he knows of his own knowledge; that is, which are derived from his own perceptions, except in those few express eases in which his opinions or inferences, or the declarations of others, are admissible.” Following this, section 1850 of the Code of Civil Procedure provides that when the declaration or act forms a part of the transaction, which is itself the fact in dispute, or evidence of that fact, such declaration or act is evidence as part of the transaction, while subdivision 3 of section 1870 permits evidence of an act or declaration of another in the presence of a party and his conduct in relation thereto and subdivision 7 of the same section permits evidence when the act or declaration comes within the provisions of section 1850. Reading these sections together it seems clear that the purpose of the statute is that the act or declaration of a party could not be received in evidence as proof of a conspiracy with others until such conspiracy is established but that, when the matter at issue is the formation of the conspiracy, or the purpose for which the combination was made, evidence of the acts and declarations of the co-conspirators among themselves and in their presence is admissible for the purpose of proving that issue.
If this were not so let us see to what limits appellants’ argument would carry us. A, B and C are charged with conspiracy to commit murder. A carries out the act and numerous eye-witnesses are called to testify concerning the acts of A in the commission of the homicide. Certainly their testimony would not be barred under this section because A is charged as a conspirator with B and C because such testimony would cover facts of the witnesses’ own knowledge within the meaning of section 1845. But if A had made declarations involving B and C in the conspiracy such statements would be pure hearsay and inadmissible against B and C until the conspiracy had been proved. But if these witnesses overheard A, B and C plotting the murder, their testimony of these conversations had in the presence of all the conspirators would be admissible under the express provisions of subdivision 3 of section 1870, as well as under the provisions of section 1850. However, the latter section is nothing more than a restatement of the well-settled res gestae rule under which “where the making of a statement in controversy, or the doing of an act, assists in constituting the transaction or in proving per se a relevant fact, the declaration or act is competent”. (22 Cor. Jur. 446. Such is the rule of People v. Gregory, 120 Cal. 16, 19 [52 Pac. 41]; Gillam v. Sigman, 29 Cal. 637, 641; People v. Petruzo, 13 Cal. App. 569, 577 [110 Pac. 324].)
The application of the rule to the instant case seems plain in so far as it relates to appellants Collier and Davis. They were both sheriff’s deputies assigned to the enforcement of the prohibition law. The conspiracy charged to them was their agreement to refrain from making raids upon violators of that law until information had been given permitting the destruction of evidence. In the formation of the conspiracy in January, 1927, no act or declaration was required from these two—all that was needed, and all that was done— was the lending of their presence in the company of Smith, who assumed the role of soliciting and collecting the bribe funds. This was the conspiracy which the prosecution sought to prove at that time—the res gestae was the conversations between Smith and Gardella in the presence of Davis and Collier and it is of no moment that, before the money was passed, Collier stepped outside. If he had then notified the others that he would not be a party to the transaction, or had later refused to co-operate, he might now complain, but his subsequent actions show a full acquiescence in the arrangements made by the others. Hence, these conversations were not hearsay under any possible theory, and were admissible against all the co-conspirators even though it might be said that the conspiracy was not “proved” until later on in the trial. The order of proof is not material. (People v. Stokes, 5 Cal. App. 205, 209 [89 Pac. 997].)
Neither Collier nor Davis denied their association with Smith and Gardella. They denied that they received any bribes from them and explained that they “worked” with Smith under instructions from the head of the office. We accordingly hold that Smith’s testimony was admissible as tending to establish the formation of the conspiracy alleged in the indictment, and was competent proof of the acts and conduct of appellants Collier and Davis which made it possible for Smith to approach Gardella in the role he assumed as one of the conspirators. Whether this testimony had sufficient corroboration so that the “fact” of the conspiracy was proved is a question to be treated later.
Much is said in the brief of the appellant Collier regarding the bad reputation of Smith for truth, honesty and integrity. From this it is argued that his testimony should not be believed, but that, of course, was for the jury to decide. It is. significant, however, that notwithstanding the reputation of this witness these two deputies associated with him constantly, calling' at his home at least twice a week over a period of six months and frequently, with their v/ives and other members of their families, joining Smith and his wife in drinking parties at the bootlegging places named by Smith as having paid for protection.
This appellant also urges the “improbability” of Smith’s story of the conspiracy because Collier had met Smith but three weeks before the time testified to. But it does not appear how long Collier had known Davis and it is apparent from the record that Davis was the instigator of the entire plan and brought Collier to Smith with the proposal that Smith act as the go-between to make the collections from the bootleggers, leaving the deputies in the clear to deal with Smith alone. We understand that an appellate court can reject the positive testimony of a witness only when that testimony is “inherently improbable”. It is not sufficient that the testimony may disclose circumstances which are unusual. Where the testimony is such that within the knowledge of reasonable men it cannot be true the appellate court might assume that knowledge and hold the testimony legally insufficient, but to do so the court must act on what is equivalent to judicial notice. We are not advised of any precedent which would sanction our taking judicial knowledge of the extent of the acquaintance which must be had with the modern bootlegger before he could be asked to pay for protection. All the appellants devote much time and space in their attacks upon the credibility of the witness Smith, and lest they feel that their arguments have gone unnoticed let it be said here that the appellate court does not sit as a jury to determine the issues of fact upon the credibility of the testimony of the witnesses but, when the attack is made on these grounds, it is necessary for the appellant to go further and show that the testimony which we are asked to reject is inherently improbable or that it was incompetent, or for some other reason, not legal evidence upon which the jury could rely.
The appellant Collier argues that the evidence was insufficient to prove an overt act. Ten overt acts are alleged in the indictment. Number 1 is merely a repetition of the acts leading to the formation of the conspiracy. Number 2 covers the same matters alleged in count three of the indictment which was dismissed. Numbers 4 and 9 cover the same matters alleged in counts two and four of the indictment upon which the appellants were acquitted. The remaining charges covered specific acts of bribery-similar to those alleged in counts two and four but involving different bootleggers. Prom the fact that count three was dismissed and from the fact that the jury acquitted on counts two and four it is argued that it is not unreasonable to say that “had the prosecution seen fit to mold each of these overt acts (3, 5, 6, 7, 8 and 19) into separate charges of bribery as they did with three of them, the jury would have acquitted the defendants on them also”. This is a conjecture in which we are. not permitted to indulge. Counts two and four were specific charges of bribery. Evidence of the bribery came from the testimony of Smith who was an accomplice. Hence, his testimony on the specific act of bribery required corroboration. But, on the first count for conspiracy, it was not necessary that the testimony of the accomplice be corroborated in every particular. Thus the jury may have been satisfied with the testimony of Smith on some one of the overt acts, other than Numbers 2, 4 and 9, and may not have been satisfied that this testimony was corroborated on the specific acts alleged in counts two, three and four. The acquittal of appellants on these two counts can mean nothing more than that the jury did not believe the evidence sufficient to convict, but such acquittal can have no bearing upon the other matters alleged, and we must assume in support of the verdict that the jury found them guilty of one of the alleged overt acts, and that is all that is needed.
The heavy attack of all the appellants is based on the common ground that the evidence of corroboration is insufficient. In these attacks the appellants find much comfort in the recent decisions of the appellate courts, particularly People v. Davis, 210 Cal. 540 [293 Pac. 32], People v. Washburn, 104 Cal. App. 662 [286 Pac. 711], and People v. Sheffield, 108 Cal. App. 721 [293 Pac. 72]. All three decisions involved prosecutions of public officials for bribery in the performance of their public duties and all three reversed the convictions. In each the appellate court ruled that the corroborating evidence was insufficient, but it will be noted that, in each case, errors at law occurred during the trial which the court rendering the decision held to have been prejudicial. It would be merely voicing the com-
mon complaint of the bar at large to say that the decisions upon this important subject are in hopeless conflict and confusion, and this is so because the courts are asked to determine each case upon the peculiar facts and circumstances in the record. There is no hard-and-fast rule by which it can be determined what evidence is sufficient and what is insufficient when the appellate court approaches the subject as a trier of fact in the place and stead of the jury. The code section is plain, section 1111 of the Penal Code provides: “A conviction cannot be had upon the testimony of an accomplice unless it be corroborated by such other evidence as shall tend to connect the defendant with the commission of the offense; and the corroboration is not sufficient if it merely shows the commission of the offense or the circumstances thereof.” In People v. Davis, supra, the Supreme Court pointed out that the rule had always been adhered to that “the corroborating evidence must do more than raise even a grave suspicion of defendant’s guilt” and People v. Kempley, 205 Cal. 441 [271 Pac. 478], and other authorities were cited. Of course, evidence which merely creates a suspicion would not be sufficient else the provisions of section 1111 would be meaningless, and, though we find many “negative” authorities on what is insufficient under the section, it is difficult to find the authorities which declare what is sufficient. People v. Negra, 208 Cal. 64, 69 [280 Pac. 354, 356], comes closest to the line where it is said: “And if there is other evidence which measures up to the requirement of the code (supra), tending to connect the defendant with the commission of the crime charged, then such testimony of the accomplice is to be considered by the jury, as is any other testimony, and must be given, the weight to which the jurors may conclude that it is entitled. (People v. Hoosier, 24 Cal. App. 746 [142 Pac. 514].) The evidence tending to connect a defendant with the commission of the crime may be slight and, when standing by itself, entitled to but little consideration. (People v. McLean, 84 Cal. 480 [24 Pac. 32].) The law does not require that the evidence necessary to corroborate the testimony of an accomplice shall tend to establish the precise facts testified to by the accomplice; and strong corroborative testimony is not necessary to support a judgment of conviction founded on the testimony of an accomplice. Sven though circumstantial and slight, the evidence is, nevertheless, sufficient if it tends to connect the accused with the commission of the offense. (People v. Martin, 19 Cal. App. 295 [125 Pac. 919].) The defendant’s own statements and admissions, made in connection with other testimony, may afford corroboratory proof sufficient to sustain a verdict. (People v. Armstrong, 114 Cal. 570 [46 Pac. 611] ; People v. Sullivan, 144 Cal. 471, 473 [77 Pac. 1000].) It is not necessary that the corroborating evidence should go so far as to establish by itself, and without the aid of the testimony of an accomplice, that the defendant committed the offense charged. ’ ’
The foregoing quotation was quoted with approval by the Supreme Court in People v. Davis, supra, with the explanation that it was not intended to hold that the corroborating evidence was sufficient if it merely raises a suspicion of defendant’s guilt. But, though evidence which merely creates a suspicion is insufficient because of the statutory presumption of innocence of crime, we must not overlook the weight of an inference which is “a deduction which the reason of the jury makes from the facts proved” (Code Civ. Proc., see. 1958). Hence, when the question of the sufficiency of the corroborating evidence is before the appellate court we cannot approach it in the same manner the jury would do, but we must assume that the jury drew all inferences from the facts proved as “the reason of the jury” might sanction. If, therefore, facts are in evidence which would reasonably support an inference that defendant was involved in the conspiracy alleged and the jury so found it is not the province of the appellate court to weigh the evidence or to determine in its mind what weight it would give to such evidence.
The code section expressly states that the corroborating evidence “shall tend to connect the defendant with the commission of the offense”. This does not mean that such evidence shall connect the defendant beyond all reasonable doubt. Such is the rule of People v. Martin, 19 Cal. App. 295, 301 [125 Pac. 919), which is quoted with approval in People v. Negra, supra. Therefore, unless the appellate court can say that the corroborating evidence is either incompetent or is, as matter of law, of such a character that it could not tend to connect defendant with the commission of the offense and could not reasonably support an inference of such connection, the finding of the jury on that issue should not be disturbed.
With this in view and bearing in mind that the alleged conspiracy consisted of the agreement to solicit bribes in consideration for the advancing of information of proposed raids so that the .bribe givers might avoid arrest for violations of the law, we may examine the evidence of acts and declarations of the alleged conspirators to see if any of this evidence would tend to connect the appellants with the conspiracy.
Addressing ourselves to the appeals of Collier and Davis, and referring to the issue of corroboration of accomplice Smith, we find in the evidence that these two appellants throughout the period of the alleged conspiracy called at Smith’s home upon an average of twice a week and that frequently upon these calls they each received from Smith an envelope which Smith testified contained money received from bootleggers according to their prior agreement and which these appellants testified contained diagrams of stills operating in the county; that Mrs. Smith testified that on several occasions she saw her husband assorting money and placing it in separate envelopes immediately before Collier and Davis called, and that on one occasion she saw her husband deliver an envelope to each of these appellants; the witnesses Van Noy and Trevett testified that they saw Smith assorting money upon his library table and placing it in separate envelopes a short time before Collier and Davis called, and that Smith, Collier and Davis then went into a bedroom where they remained for five or ten minutes. The only explanation of these transactions given by the appellants was that upon those occasions Smith gave them diagrams of stills, but they gave no explanation why a separate envelope should be given to each while both were working together or why they had not at any time during this entire period of six months delivered any of this information to their superior officers but had on each occasion destroyed the location maps which they testified Smith had given them nor did they explain why during this entire period no still had been raided by them and no arrests made as a result of this information. By their denial that they had received any money from Smith on any of these occasions the case differs from People v. Davis, supra, where the court held that the testimony that money had been seen to pass through the hands of the accomplice was insufficient to corroborate his testimony because it should be presumed that the money was delivered for a legitimate rather than for a criminal purpose. From the weak and unsatisfactory explanations of these appellants as to the contents of the envelopes the jury was warranted in inferring that money did pass as Smith and his wife testified, and this inference would corroborate the testimony of Smith in that respect. Then bearing in mind that the theory of the prosecution was that the object of the conspiracy was that the conspirators would either fail to arrest or would give to the bribe givers advanced information of proposed raids so that all criminal evidence could be destroyed we find the testimony of Mrs. Walker to the effect that habitually before these appellants started on a raid with a search-warrant procured by the district attorney’s office, Collier and Davis would lag behind the other officers and the latter would put in a telephone call which was usually “ ‘make it at 7 o’clock’; ‘it will be now’ or the like”. This information was generally conveyed to Smith who in turn relayed it to the party to be raided and his testimony that he received and conveyed this information was corroborated by other evidence. The explanation of the appellants of this testimony is nothing more than a complete denial, and here again the trial jury was called upon to weigh the evidence and if the jury believed the testimony of Mrs. Walker and these other witnesses and disbelieved the testimony of the appellants in this respect it follows, of course, that Smith’s testimony of these transactions was fully corroborated. Aside from the testimony relating to what happened in the sheriff’s office as to “tip offs” of these raids we find the direct evidence coming from Mrs. Smith that in the latter part of July she received a telephone call from Davis asking if her husband was in, and that upon being informed that he was not, Davis asked her to get in touch with her husband and tell him to telephone the Irvington Hotel and warn them to close up as the place was to be raided that night. It is also in the evidence that Mrs. Smith got in touch with her husband and he informed her that he could not telephone the hotel from where he was located, asked her to do so, that she did phone the hotel and that on the same night the place was raided and no evidence of the sale or possession of liquor found. It is also in evidence, coming from the testimony of Collier and Davis, that during this period they made numerous raids upon bootlegging establishments in the eastern portion of Alameda County, and that in ninety per cent of such raids they found liquor and made arrests. It is significant, however, that during the entire period of the alleged conspiracy none of the bootleggers named by Smith as having paid for protection was raided excepting in one instance in which a federal raid was made against Schenone and another when a federal raid was made against Gardella, at which time he had been given advanced information and had destroyed all evidence of the sale or possession of liquor. In addition to this, there is the testimony of Pisani and Santucci of their conversations with Ormsby, an attorney at law, who urged the witnesses to construct and operate a still and assured them in the presence of Davis that they would be fully protected from the sheriff’s office by the payment of a monthly sum for that purpose, and the testimony of Pisani as to the association of Collier with Ormsby in this enterprise. And then we find the undisputed evidence of the association of Collier and Davis with Smith and Ormsby throughout this entire period; their frequent gatherings with their respective families in bootlegging establishments where liquor was being drunk, these places all being on Smith’s list of the protected. Aside from this direct evidence (which is but a small portion of the corroborating testimony relied upon by the state) the respondent urges the circumstance that when Collier and Davis were called before the grand jury when it was making its investigation of the alleged conspiracy both were informed of the accusations made against them by Smith and neither denied the accusations but both refused to testify upon the ground that their testimony might tend to incriminate them. The foregoing statement of the evidence is sufficient to corroborate the testimony of Smith as to the formation of the alleged conspiracy, and is such “as shall tend to connect the defendant with the commission of the offense”, and it is unnecessary to outline the mass of other evidence which was offered for this purpose.
It is strenuously argued by the appellants that we' may not take the testimony of Mrs. Smith as corroborative of that of her husband because in relaying the “tip off” message to the Irvington Hotel she became an accomplice, but to hold her as an accomplice it would be necessary to hold that she was a party to the offense charged, which was a conspiracy to ask and receive bribes for certain purposes. But it does not appear that she had any knowledge of the conspiracy nor any knowledge of the relations between the conspirators or the proprietor of the Irvington Hotel. Her action in conveying the message to the hotel upon the request of her husband was consistent with an innocent obedience of her husband’s commands, and though it is possible that the entire evidence may have been sufficient to warrant the jury in inferring an evil motive on the part of Mrs. Smith, such motive was certainly not presumed, and, therefore, the question of whether she was an accomplice was a fact to be left to the jury and not a question of law ro be determined by the trial judge. In this connection the appellants attack the refusal of the trial judge to give their proposed instruction advising the jury that it must consider Mrs. Smith as an accomplice, and likewise attack the instructions which the trial judge gave to the jury defining an accomplice and advising the jury what was sufficient corroborative evidence of the testimony of an accomplice. There was no error in either respect. (People v. Ward, 134 Cal. 301, 311 [66 Pac. 372]; People v. Lawlor, 21 Cal. App. 63, 68 [131 Pac. 63].)
The appellant Collier criticises the action of the trial court in admitting the testimony of Smith relating to conversations had with Smith, Davis and Gardella in the absence of Collier. This testimony all related to matters occurring after the formation of the conspiracy and was clearly admissible under section 1870 of the Code of Civil Procedure, as interpreted in the eases heretofore cited. Smith’s testimony relating to his conversations with Valponi, Groce, Peyser, Schenone and others who were maintaining bootlegging establishments were all evidence of the transactions of a co-conspirator in furtherance of the purposes of the conspiracy, and this testimony of Smith, like his testimony relating to the payments made by various bootleggers and his division of the proceeds among his co-conspirators, was properly admitted. Likewise there was no error in admitting the testimony of Van Noy, Trevett and Mrs. Smith relating to Smith’s division of the money in his home prior to the visits of Collier and Davis, because this was evidence of “an act” of one of the conspirators' performed after the formation of the conspiracy.
Considerable space is devoted to an attack upon the admission of the testimony of Pisani regarding his promise to pay to Ormsby $3,000 a month for protection in the operation of an illicit still, such protection being assured him by Ormsby in the presence of Davis. Of a similar character are the objections to the testimony of Tognotti, Santucci and Roggi. The objections are two: That these transactions were not had in the presence of all the other alleged conspirators, and that they were evidence of separate and distinct offenses. The first objection is without merit as we have already said. As to the second objection the rule seems to be fully settled. In People v. Arnold, 199 Cal. 471 [250 Pac. 168], the Supreme Court, quoting from People v. Wilson, 76 Cal. App. 688 [245 Pac. 781], said: “ ‘In such cases it is no objection that the- evidence covers a great many transactions and extends over a long period of time, or that it may show the commission of other crimes. When the question is whether the accused was a party to a general conspiracy, distinct overt acts in furtherance of such a design may be given in evidence. (People v. Collins, 64 Cal. 293 [30 Pac. 847]; People v. Berry, 191 Cal. 109, 122 [215 Pac. 74] ; Commonwealth v. Scott, 123 Mass. 222 [25 Am. Rep. 81] ; Hall v. State, 3 Lea (Tenn.), 522.) See, also, Commonwealth v. Stuart, 207 Mass. 563 [93 N. E. 825], State v. Roberts, 95 Kan. 280 [147 Pac. 828], Jenkins v. Commonwealth, 167 Ky. 544 [3 A. L. R. 1522, 180 S. W. 961], and Worden v. United States, 204 Fed. 1 [122 C. C. A. 315],’ ” and in the same decision, quoting from Commonwealth v. Scott, 123 Mass. 222 [25 Am. Rep. 81], the court said: “ ‘There being- evidence sufficient to be laid before the jury to prove the conspiracy, as to which the presiding justice was in the first instance to determine, it was competent for the government to put in evidence any acts of the several conspirators in furtherance of the common purpose of the conspiracy, either before or after the robbery was completed. ’ ” And in People v. Schmidt, 33 Cal. App. 426, 445 [165 Pac. 555, 563], the District Court, quoting from People v. Olsen, 80 Cal. 122 [22 Pac. 125], said: “ ‘Where several parties conspire or combine together to commit any unlawful act, each is criminally responsible for the acts of his associates or confederates committed in furtherance of any prosecution of the common design for which they combine. . . . Each is responsible for everything done by his confederates, which follows incidentally in the execution of the common design as one of its probable and natural consequences, even though it was not intended as a part of the common design for which they combined. ’ ” The court added as authorities for the rule, People v. Kauffman, 152 Cal. 331 [92 Pac. 861]; People v. Creeks, 170 Cal. 368, 369 [149 Pac. 821] ; Spies v. People (The Anarchists’ Case), 122 Ill. 1 [3 Am. St. Rep. 320, 12 N. E. 865, 17 N. E. 898].
The testimony of similar transactions occurring in the latter part of August and in early September of the year 1927 was not inadmissible under the rule excluding acts and declarations of a co-conspirator after the completion of the conspiracy. The indictment alleged the period of time of the conspiracy as from February 1, 1927, to August 20, 1927, but this was merely an approximation and was not a definite time limiting the period of the conspiracy. There was no evidence that the conspiracy ended precisely on August 20th, and, from the nature of the case, this was not such a conspiracy as would be “completed!’ by a definite overt act such as murder or robbery. Hence, evidence of transactions occurring within a few weeks following August 20th was not evidence of a separate isolated act or declaration of one of the conspirators occurring subsequent to the end or the “objective” of the conspiracy, within the rule of People v. Oldham, 111 Cal. 648 [44 Pac. 312], and similar cases. To the contrary these acts and declarations were shown to have been “the ordinary and probable effect of the common design” of the conspirators, and evidence of such was admissible under the rule noted in People v. Lorraine, 90 Cal. App. 317, 327 [265 Pac. 893, 897], where the court say: “The common design of a criminal enterprise may extend, however, as appellant concedes, beyond the point of the commission of the act constituting the crime for which the alleged conspirator is- on trial (People v. Opie, 123 Cal. 294 [55 Pac. 989]; People v. Mazzurco, 49 Cal. App. 275 [193 Pac. 164]; People v. Holmes, 118 Cal. 444 [50 Pac. 675]; People v. Rodley, 131 Cal. 240 [63 Pac. 351]); and, as declared in California Jurisprudence (vol. 5, p. 523).” To the same effect is People v. Sampsell, 104 Cal. App. 431 [286 Pac. 434].
The application of the rule in the present case is that it was always the theory of the prosecution that the alleged conspirators were operating in the eastern section of Alameda County as a portion of a county-wide conspiracy headed by the sheriff of the county and involving many of his deputies and others officially connected with his office for the general purpose of collecting tribute from all those engaged in any unlawful business conducted in the county. Thus having proved the conspiracy alleged in the indictment it was competent for the state to offer in corroboration thereof the activities of Davis, Collier, Smith and others as evidence of the ordinary and probable effect of the common design of the conspiracy alleged.
The question involved here is not whether this testimony was competent because the general rule is that evidence of the separate acts and declarations of one co-conspirator is admissible against all the other conspirators after the conspiracy has been established because each is criminally responsible for the acts of his confederates committed in furtherance of the common design. (People v. Kauffman, 152 Cal. 331, 334 [92 Pac. 861] ; People v. Creeks, 170 Cal. 368, 374 [149 Pac. 821].) But the real question involved in the point raised by this appellant is whether this testimony was relevant. The question of the relevancy of testimony is frequently confused with the question of the weight and sufficiency of that testimony to prove a particular issue. Evidence is relevant when no matter how weak it may be it tends to prove the issue before the jury. In Moody v. Peirano, 4 Cal. App. 411, 418 [88 Pac. 380, 382], it was said: ‘‘The tendency of modern decisions is to admit any evidence which may have a tendency to illustrate or throw any light on the transaction in controversy, or give any weight in determining the issue, leaving the strength of such tendency or the amount of such weight to be determined by the jury; and in determining the relevancy of evidence that may be offered upon an issue of fact much depends upon the nature of the issue to sustain which or against which it is offered, and a wide discretion is left to the trial judge in determining whether it is admissible or not.” It has frequently been said that “it is not often that the direct fact of an unlawful design which is the essence of a conspiracy can be proved otherwise than by the establishment of independent facts bearing more or less closely or remotely upon the common design” (People v. Sampsell, 104 Cal. App. 431 [286 Pac. 434, 437]), and for this reason greater liberality is permitted in the admission of cireumstaneial evidence which would tend to prove the fact of the conspiracy, as well as that which would tend to corroborate the testimony of a .co-conspirator. Hence, any testimony which is relevant for these purposes and which is not too remote or incompetent should be received and the weight and sufficiency of the evidence should be left to the triers of the questions of fact. Accordingly, when the question of the common design of a criminal enterprise and the question whether that common design extended beyond the point of time of the actual commission of the act constituting the overt act alleged are matters in issue those questions are to be determined by the jury and any competent evidence which tends to prove the extent of the conspiracy and any competent evidence of acts or declarations tending to prove this common design is relevant to the issues before the jury. Such evidence even though it may tend to prove the commission of distinct criminal acts is not admitted under the rule permitting evidence of similar criminal acts but is admitted under the circumstances above stated for the purpose of proving the common design and extent of the conspiracy alleged. (People v. Schmidt, 33 Cal. App. 426 [165 Pac. 555]; People v. Lorraine, 90 Cal. App. 317 [265 Pac. 893]: People v. Sampsell, 104 Cal. App. 431 [286 Pac. 434].)
Objection is made to the admission of evidence relating to transactions between Smith and Sheriff Becker, Parker and Davis after Smith had fled to Los Angeles. This testimony was presumably offered for the purpose of corroborating Smith’s testimony as to' his criminal association with the sheriff’s office of Alameda County. It was all stricken out and the jury was instructed to disregard it. There was nothing in this testimony that was prejudicial to any of the appellants except as to appellant Davis, and as to him it was properly admitted. If any error occurred as to the other appellants through the admission of this testimony that error was cured by the order striking out the instruction to the jury to disregard it. Though the appellant ' Collier insists that the evidence was improperly admitted he does not show in what respect it was in any way prejudicial to him. This is not a case such as People v. Anthony, 185 Cal. 152 [196 Pac. 47], and similar cases, where the testimony admitted was such that it poisoned the minds of the jury to such an extent that the error could not be cured.
These two appellants complain of the ruling permitting the evidence in rebuttal of the witness Barnes. Appellant Collier on cross-examination had been asked if he had been served intoxicating liquor in the Newark Hotel during the period of the alleged conspiracy, and answered, no. Barnes, who was a cook at the Newark, testified that both Collier and Davis had been served drinks in the hotel during that time and that, on the occasions when they raided the place, the proprietor removed the liquor and slot-machine a short time before the raid occurred. The appellants insist that the impeachment was on a collateral matter. But it was not. The evidence disclosed that these two deputies, whose special duty it was to make arrests of those engaged in the illegal sale of liquor, frequented one of the bootlegging establishments which the witness Smith testified was on his list and that no arrests were made though violations of the law were known to these deputies. This testimony tended to corroborate the witness Smith and was relevant to that issue.
In so far as the appellants Collier and Davis are concerned we find no error in the record and the judgment and order as to them should be affirmed.
Little need be said regarding the case of appellant Gardella, inasmuch as the case must be reversed as to him because of the lack of corroborating evidence and the general principles and the questions of law which will arise on a retrial are not different from the general principles which have heretofore • been discussed. In support of the judgment the respondent cites as corroborating evidence the testimony of Pauline Walker that Gardella was frequently in and about the sheriff’s office, having conversations with Collier, Davis and Sheriff Becker, and that on one occasion she telephoned him asking him why he had a truck-load of liquor in front of his place, and that he told her not to worry because he was paying plenty of protection to the sheriff’s office. The respondent cites as further corroborating testimony, this appellant’s admission that he was raided by Collier and Stark of the sheriff’s office but had received advanced information and had consequently destroyed all evidence; his testimony that Smith had tried to persuade him to buy stock in a paving company which was being organized by Parker who was a friend and associate of the sheriff; and the testimony of Mrs. Smith that she and her husband, in company with Becker and Parker and their respective wives, had been entertained by Gardella at which time intoxicating liquor was served. We are unable to find in this testimony any evidence which measures up to the requirements of the cases heretofore discussed, or that the testimony does more than create a suspicion of guilt of this appellant. For this reason the judgment and order as to him must be reversed.
For the reasons given it is ordered that the judgment and order in so far as they relate to appellants Collier and Davis are affirmed, and in so far as they relate to the appellants Shurtleff and Gardella, they are reversed with directions for a new trial.
Sturtevant, J., and Burroughs, J., pro tem., concurred.
Petitions for a rehearing of this cause were granted by the District Court of Appeal on February 4, 1931, as to defendant Shurtleff, and denied as to the other defendant, and the following opinion then rendered thereon:
THE COURT.
In his petition for a rehearing the appellant Collier finds fault with that portion of the opinion which relates to the admission in evidence of the testimony of the accomplice Smith relating to the acts and conversations of his co-conspirators leading to the formation of the conspiracy. He argues that what we have said in the opinion is contrary to the rule of People v. Irwin, 77 Cal. 494 [20 Pac. 56]; People v. Doble, 203 Cal. 510 [265 Pac. 184], and other cases cited. In our original opinion we endeavored to point out the distinction between the cases cited and the case at hand, and for the purpose of making our position more clear it is now ordered that the concluding sentence on page 6 [295 Pac. 901] of the typewritten opinion reading as follows: “Reading these sections together it seems clear that the purpose of the statute is that the act or declaration of a party could not be received in evidence as proof of a conspiracy with others until such conspiracy was established but that, when the matter at issue is the formation of the conspiracy, or the purposes for which the combination was made, evidence of the acts and declarations of the coconspirators among themselves and in their presence is admissible for the purpose of proving that issue” is hereby stricken out and the following is inserted in lieu thereof: " The offense charged in the indictment was that the defendants combined and agreed together, and with each other, to commit the crime of asking, receiving and ‘agreeing to receive a bribe’ in violation of section 68, Penal Code.” This section declares the crime to be when an executive officer “asks, receives, or agrees to receive, any bribe, upon an agreement or understanding that his , . . action . . . shall be influenced thereby”. Thus the agreement is the essential element of the crime charged as well as that denounced by the statute. This being so the corpus delicti of the crime charged was the “agreement or understanding” made by the defendants and Smith whereby one or more of them undertook to ask for bribes, one or more agreed to accept bribes, and the sheriff’s deputies undertook upon their part to permit their action as such officers to be influenced thereby.
Now it must be apparent that when an agreement is not in writing parol evidence is admissible to prove its contents. And, when the agreement is in parol, evidence of the conversations of the parties tending to disclose the agreement made is evidence of the very fact to be proved and hence is evidence of the res gestae. Hence, when the conspiracy charged in the indictment is an “agreement” to do or not to do a certain act evidence of the conversations and acts of the conspirators which constitute the agreement is admissible to prove the agreement. Thus, when, as a part of the agreement, one or more of the. conspirators undertakes to ask for a bribe, one or more agrees to accept a bribe, one or more agrees to do or not to do some act for the purpose of effectuating the compact, and one or more of the conspirators gives his assent to the compact either by express words or by actions from which such assent might be implied, evidence of such facts, when the agreement is in parol, is competent evidence of the acts or declarations which form “a part of the transaction” which is in dispute, and, as such is admissible under the express provisions of section 1850 of the Code of Civil Procedure. On the other hand, if a witness were asked to relate a conversation which he had had with one of the alleged conspirators such testimony would be hearsay and would not be admissible under section 1870, subdivision 6 of the Code of Civil Procedure, until after the conspiracy had been proved, and, by thus permitting evidence of the acts and declarations of a conspirator against his co-conspirator, this subdivision becomes an enlargement of rather than a limitation upon the ordinary hearsay rule. | CASELAW |
Wikipedia:Reference desk/Archives/Mathematics/2016 May 9
= May 9 =
Preservation of precious Science and Mathematics knowledge
To whom it may concern,
This question has been really bothering me for quite some time, and has really made me pessimistic, maybe you can answer it.
With all this mathematics and Scientific research being done every day, how could we be sure that all this research and discoveries will be preserved for future generations? How could we know that research findings and discoveries in Mathematics and the Sciences today, will be available to humanity, in, say, 1,000 years? I asked this question to many Mathematicians, and they unanimously said there is no good system that preserves our discoveries today.
What could we learn from the contributions of Euclid, Thales, and Archimedes, in which their discoveries are still available until today even though most of the discoveries from ancient Greece and the Library of Alexandria have been lost and/or destroyed? Is it true that many mathematical and scientific discoveries are being lost today because there is no good way of preserving and archiving new and old Scientific and Mathematical discoveries? I heard the science is being lost today at an unprecedented level due to poor archiving and/or not properly preserving data and discoveries throughout the world.
Links:
http://unesdoc.unesco.org/images/0010/001055/105557e.pdf
http://www.unesco.org/bpi/eng/unescopress/2002/02-fea10e.shtml
http://www.un.org/apps/news/story.asp?NewsID=3902#.Vvhn4PsrLIX
What can we do to retrieve all of the research that we have lost already? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:55, 9 May 2016 (UTC)
* Don't you worry. Google will digitize everything :-). Actually there is no need to preserve anything. Studies of scientific citations have shown that science grows on its skin, in short only the most recent papers are referenced. Old discoveries if useful are incorporated in contemporary knowledge and will be passed to the next generation, if there is a next generation - it is another question. --AboutFace 22 (talk) 22:06, 9 May 2016 (UTC)
* All is transitory, nothing is permanent. Sławomir Biały (talk) 23:10, 9 May 2016 (UTC) | WIKI |
Page:American Journal of Sociology Volume 4.djvu/512
492 foreclosures agree in this respect. They show a much higher relative assessment for the lands sold for small amounts than for those disposed of for larger ones. The different classes, or groups, from the least valuable to the most valuable, form a more or less regular series. The tracts of land sold by warranty deeds for amounts less than $500 were assessed for 65.91 per cent. of the selling value, while those for amounts over $10,000 were assessed relatively only 45 per cent. as much, or for 29.66 per cent. The average assessment of all lands sold by warranty deeds was 39.40 per cent. of the selling price. The tracts selling for less than $500 were, therefore, forced to pay relatively 1.67 for every 75 cents paid by the owners of the land sold in amounts over $10,000, and where each should pay one dollar. The lands selling for less than the average amount of all sales were assessed at 47.87 per cent. of the selling price, while those selling for amounts above the average were assessed only 35.64 per cent. The former were assessed relatively 34 per cent. more than the latter. Here is a greater relative over-assessment of the poorer and a more unjust under-assessment of the richer owners of realty than has been disclosed by any similar tax study in the United States. Before explaining the origin of the vicious system of assessment which works this practical injustice, the reader's attention is first directed to the figures showing the relative assessment of unimproved lands, or lands having upon them no valuable buildings to attract the notice of the assessors.
Of sales by warranty deeds of unimproved acres in the rural counties there were tabulated in the report 8,200, conveying 796,591 acres, for a stated consideration of $11,377,525. The average consideration was approximately $1,500. There were 5,693 sales for sums below this average and 2,507 for amounts above it. Of corresponding sales by mortgage foreclosures there were 644, conveying 90,984 acres, with amounts of sheriff's certificates making a total of $651,857. The average for each sale was about $1,000. There were 452 sales for amounts below this average and 182 for amounts above it.
The percentages for assessment for the sales by warranty deeds of unimproved acres make a series, the highest being for | WIKI |
Bernard Noble
Bernard John Noble OBE (5 February 1928 – 5 October 2004) was a teacher and university lecturer, a translator of works of philosophy and international jurisprudence, a senior ranking United Nations employee, first in Beirut, Lebanon and then in The Hague, Netherlands, and an author.
Biography
Noble was born in Bromley, Kent to parents of modest circumstances. His father, John, worked variously as a civil servant, an unpublished novelist and as a caterer, running a café in Battersea Park. Noble entered King's College School (KCS) in Wimbledon in 1939 on a scholarship in what would now be considered an unconventional way: having "tied" in the examination with another boy, they were given the same puzzle each to complete: whoever finished it first, would win the scholarship.
Suffering from asthma, Noble was excused sport and used his time to discover model aeroplanes, literature, music and languages. Hospitalised for his asthma, he found himself sharing a ward with a young German airman; he left KCS in 1946 to read German and French at Trinity College, Oxford where he had won an open scholarship. His contribution to the war effort was working as aeroplane mechanic at RAF Desford Aerodrome in Leicestershire.
Noble was awarded a First Class Degree in French in 1949 and embarked on a thesis on Jean-Jacques Rousseau's philosophical method, first at Oxford and then as Assistant Lecturer at the University of Manchester. In 1956 he finally abandoned the project in order "to seek a post of contemporary urgency, being tired of living in the past", as he wrote to one potential employer. He taught in a school in Switzerland briefly before finding employment as a lecturer in English at the University of Baghdad. In 1959 he went to Beirut for a summer holiday where he worked on his translation of Max Scheler's On the Eternal in Man and where he met and married Amy Jalkh. He then found a position as Assistant Professor of English and Humanities at the Beirut College for Women (now the Lebanese American University and, in 1961, the year his first son, Bruno, was born, became Translator-Reviser and later Deputy Head, Press and Publications at the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) in Beirut. He found himself translating into English from French and, occasionally, German, Spanish, Italian and Dutch and revising translations into English from Arabic.
In 1967, the family moved to The Hague in the Netherlands where Noble had been appointed First Secretary to the International Court of Justice and where his second son, Marc, was born. Noble's work at the Court had some of the same multi-lingual, multi-cultural aspects as his work with UNRWA but now involved judges and staff from more than a dozen nations. It took on more of a legal hue, as Noble found himself ever more involved with the complexities of international law; he translated numerous books on the subject from French and Dutch into English. In 1987, he was elected Deputy Registrar to the Court, a position from which he retired in 1994. He was awarded an OBE for services to the International Court of Justice in 1994.
Noble spent the first few years of his retirement writing three broadly biographical books: The Chocolate Tram tells the story of a boy growing up in South London before the war; Young Mortality (cf. Old Mortality) recounts the life of a boy attending KCS in Wimbledon during the war; Talismen is about a student at Oxford after the war. The trilogy is titled Echoes.
Noble developed a love of classical music, of the classical romantics and Wagner in particular, and built a large collection of LPs and CDs many of which were given to KCS who named their new music library after him. His elder son established the Bernard Noble Sculpture Foundation in commemoration of him.
Noble died on 5 October 2004 in The Hague. | WIKI |
Robert Tatum
Robert George Tatum (August 20, 1891 – January 27, 1964) was an American mountain climber and Episcopal priest. He, along with Hudson Stuck, Harry Karstens, and Walter Harper made up the expedition that was the first to successfully climb Denali, the tallest mountain in North America, on June 7, 1913.
Early life
Tatum was born on August 20, 1891, in Knoxville, Tennessee, the son of George, a photographer, and Emma Tatum. He grew up in Knoxville, and went to Sewanee: The University of the South. In June 1911 he moved to Nenana, Alaska, to visit his brother Howard, who was working at an Army outpost. That summer, Robert worked as a surveyor for the government; after that he taught at an Episcopalian mission school.
Denali expedition
Episcopalian archdeacon Hudson Stuck, who would later become the expedition leader, first met Tatum during a regular visit to the mission school. Stuck asked Tatum if he would join him in ascending Denali (Mount McKinley) for the first time; he immediately accepted. In preparation for the climb, Tatum hiked about 1200 mi, including a trip to Tanana Crossing with other missionaries to establish a new mission.
On March 17, 1913, the expedition left Nenana to climb McKinley. Besides Stuck and Tatum (who was the cook), the party consisted of Harry Peter Karstens, who led the expedition with Stuck; Walter Harper, an Alaska Native who had been Stuck's travelling companion for three years; and two Gwich'in teenagers, Johnny Fredson and Esaias George, who helped at base camp and brought the dog teams back down before the summit.
On June 6, they arrived at their final camp after three months of sometimes very dangerous climbing.
Early the next morning, the party set off to reach the summit. Around noon, they finally reached the top of Mount McKinley, at an elevation of 20310 ft. During the hour and a half they spent on the summit, Tatum planted a flag he had made earlier out of handkerchiefs and other miscellaneous items. He compared the view to "looking out of a window of heaven." They began the descent, which only took two days to get back to base camp. They returned to Tanana on June 20, just over three months since they left.
Later life
During World War I, Tatum served as a Corporal in the US Army.
On June 7, 1922, Tatum was ordained an Episcopal priest in Nenana, but he soon returned to his hometown of Knoxville, where he ministered until his death on January 27, 1964.
Legacy
Mount Tatum was named by Bradford Washburn in about 1945 for Tatum. The 11053 ft mountain is located in the Carpe Ridge between Muldrow and Traleika Glaciers, about 10 mi away from Denali. | WIKI |
Catalonia’s Ousted Leader Calls for Peaceful Defiance
BARCELONA, Spain — In a defiant message, Catalonia’s ousted leader, Carles Puigdemont, called on Saturday for Catalans to unite in peaceful “democratic opposition” after the Spanish central government took control of the restive region — an act Mr. Puigdemont called “premeditated aggression.” Mr. Puigdemont said in a televised address that “our will is to continue to work to meet our democratic mandates,” in an indication that his government may attempt to ignore its dismissal and, in effect, create two competing administrations. He spoke a day after Spain’s prime minister, Mariano Rajoy, fired him and the entire Catalan cabinet and set a date for new regional elections. Madrid’s hard-line stance was announced shortly after regional lawmakers illegally declared an independent republic, setting up a showdown that escalated the biggest political crisis the country has faced in decades. On Saturday, a day after the Spanish Senate voted to give Mr. Rajoy emergency powers under Article 155 of Spain’s Constitution to end the secessionism drive, the full force of the national government’s actions went into effect. Madrid took control of Catalonia’s government, according to a plan published early on Saturday. Spain’s deputy prime minister, Soraya Sáenz de Santamaría, will take over the Catalan administration from Madrid. Dozens of other Catalan officials were expected to be fired, but Enric Millo, the current representative of the central government in Catalonia, told Catalunya Radio on Saturday that he expected Madrid to make “the minimum possible” staff changes. Mr. Puigdemont, speaking from his hometown, Girona, insisted that Mr. Rajoy was removing a democratically elected government. “These are decisions contrary to the will expressed by the citizens of our country at the ballot boxes,” he said. He added that the central government in Madrid “knows perfectly well that, in a democratic society, it is the Parliaments that choose or remove presidents.” Madrid also took control of the regional police force and fired the regional police chief, Maj. Josep Lluís Trapero. Pere Soler, the ousted director general of the Catalan police force and Major Trapero’s boss, sent a letter to his officers, expressing regret over his removal and thanking them for their work. Major Trapero, who is facing possible sedition charges after he was accused of failing to stop protesters last month from encircling national police officers, also wrote to his colleagues. He reminded them that their task was to “guarantee the safety of everybody” in the coming days, should the political crisis spur more unrest. As Mr. Puigdemont spoke on Saturday, throngs of Spaniards gathered in central Madrid — many of them waving flags, some wrapped in them — to protest Catalonia’s unilateral declaration of independence. “We are resisting xenophobia,” one man said into a microphone, before shouting, “Long live Catalonia, long live the king, long live Spain.” The crowd chanted: “Don’t fool us, Catalonia. You are part of Spain.” Many protesters said that Madrid had to enforce its decision to invoke Article 155. Some said that, if necessary, the army should be sent in, though most said it would not come to that. “They need to apply the law,” said Chema Martinez, 22, who described himself as a patriot and a Catholic and wore a Spanish flag with the Sacred Heart of Jesus stamped on its center. “The army is there to defend Spain,” he said. “They should send in the army to Catalonia; that’s what needs to be done.” At one point, the Spanish national anthem began to play, and many who had been quietly listening as they sat on the curb silently stood up. Agueda Rivera, 77, tears streaming down her face, said: “I’m crying. I’m crying for my Spain.” On Friday, Mr. Rajoy announced that new Catalan elections would be held on Dec. 21, the earliest possible date, in an apparent bid to show frustrated Catalans that Madrid wanted to avoid prolonging a constitutional crisis. By limiting Madrid’s control over Catalonia to 55 days, analysts said, Mr. Rajoy and his allies were hoping to quickly turn the tables on the separatists, who staged an independence referendum on Oct. 1 that had been declared illegal by Spain’s government and courts. “It’s Rajoy’s attempt to regain the democratic initiative, but also a surprisingly risky bet that he can really beat the independence movement,” said Josep Ramoneda, a political columnist and philosopher. “Whether it works will depend on the level of resistance to Madrid in the coming weeks, which perhaps won’t be that high given that people are exhausted and need a break.” Albert Rivera, the national leader of Ciudadanos, the party that has been Mr. Rajoy’s main ally in fighting secessionism, told a party conference on Saturday morning, “We will now come out to beat them, but by voting.” The December elections, he said, were an opportunity for “all the Catalans who have been silenced by nationalism,” after opponents of independence mostly boycotted the Oct. 1 referendum. “We will now claim the right to vote in freedom,” Mr. Rivera added, “to show the world that this is a free and democratic country.” Vicent Sanchis, the general manager of the Catalan public television station, TV3, said that it remained to be seen how much practical control Mr. Rajoy could exert over Catalan institutions. “We live in an uncertain moment,” Mr. Sanchis said in his office. “We now have two parallel legitimacies and we still don’t know which one controls the Catalan institutions.” “The key thing now is to discover what pressure the Madrid government will now exert,” he added. “In the coming days, we’ll find out.” Jordi Borda, the deputy director of Catalunya Radio, said a crucial test would come on Monday. “If the Catalan ministers go to work on Monday and manage to work normally, it will be a strong step towards consolidating what the Catalan Parliament voted on yesterday,” Mr. Borda said. “If Monday is a normal day,” he said, “it will be a victory for the independence movement.” Spain’s attorney general is expected to take legal action against Mr. Puigdemont and other leading separatists on Monday, possibly on grounds of rebellion, which carries a prison sentence of as long as 30 years. Joan Queralt, a professor of criminal law at the University of Barcelona, said he expected the attorney general to act forcefully. “One thing is what the law says and another is how far the government can act,” Professor Queralt said. “I’ve got the feeling that the attorney general will do whatever he wants, just as happens when governments deal with terrorists.” An article on Sunday about the response of Carles Puigdemont, Catalonia’s ousted leader, to the move by Spain’s central government to take control of the restive region misstated the location from which he delivered a televised address on Saturday. Mr. Puigdemontspoke from Girona, not Barcelona. OpinionOmar G. Encarnación | NEWS-MULTISOURCE |
Drink Meal Replacement Shakes for Weight Loss
Do you want to shake off those extra pounds away? Set aside body shaking exercises to burn those unwanted fats and drink your way up to a slimmer and sexier figure with meal replacement shakes for weight loss.
What are meal replacement shakes?
Meal replacement shakes for weight loss is a type of liquid meal replacement diet very much popular among figure-conscious men and women across the globe. Meal replacement shakes are also being referred as protein shakes for weight loss, which offers the easiest and fastest weight loss program for men and women, young and old alike who simply want to achieve or maintain a desirable weight or to treat medical problems such as obesity.
It’s not a wonder why many people prefer drinking meal replacement shakes for weight loss. It’s very easy to prepare. It comes in powder form, which can be mixed with water, skim milk, or juice in a large drinking cup, shaker cup, or blender. The magic weight loss drink can be ready in less than three minutes. It also comes in a wide variety of flavors such as chocolate, vanilla, and strawberry that makes the drink really enjoyable to the palate.
Why do meal replacement shakes work for weight loss?
Meal replacement shakes are really formulated to reduce fats, aid weight loss and maintain an ideal weight. With appetite suppressant concocted in the powder, one glass is enough to make one feel full and resist tempting weight-gaining meals.
Best of all, protein shakes contain the ample calories, protein, fats, carbohydrates, fibers, vitamins and minerals the body needs that a dieter can still feel great as well as strong and active to execute physical exercise while shedding off those extra pounds. The drink contains between 100 calories to 200 calories and 15 grams to 30 grams of protein per serving.
Meal replacement shakes for weight loss are taken twice daily replacing two of your regular meals in a day. So instead of eating power lunches, for instance, a glass of the diet shake is taken that can make one feel full until the following meal time.
How long should meal replacement shakes be taken for weight loss?
The best meal replacement shakes show result within two weeks. One can notice a drop in the weighing scale. Some dieters, however, gain weight back faster than they had lost it when they stopped drinking the diet shake after achieving the desired weight. Ideally, one should only drink the two glasses of diet shake in a day for a period of five months. After that period, one can simply drink one glass a day to maintain the weight that they have achieved.
Are meal replacement shakes safe to drink?
No matter how desperate one can be in losing weight, popping a question on health safety is a natural reaction. The answer is yes only if done properly.
It is important to note that there are two types of meal replacement shakes for weight loss namely the over-the-counter and the doctor-prescribed. If you don’t have any medical problem, it is safe to get over-the-counter meal replacement shakes. Otherwise, consult a doctor or a licensed nutritionist to avoid further complications on your health.
Meal replacement shakes for weight loss is a cool way to get slim and sexy while staying healthy. Proper precaution, however, should still be observed. If you are not sure of your medical status, better consult a doctor or nutritionist before taking the shake for your slimming diet.
Leave a Reply
Your email address will not be published. Required fields are marked *
* | ESSENTIALAI-STEM |
Page:The rise of physiology in England - the Harveian oration delivered before the Royal College of Physicians, October 18th, 1895 (IA b24974778).pdf/10
during the years that have elapsed since Harvey's institution of it by some of the most illustrious Fellows on our roll-by Garth (1697), Arbuthnot (1727), and Akenside (1759); by Mead (1723), Heberden (1750), and Warren (1768), not to mention others of more recent date, men whose names will ever remain fresh in the history of the literature and medicine of our country. I have no claim to be asso- ciated with these great names, nor with the many learned and eloquent men who have addressed you in recent years, and I should have shrunk from attempting the task your favour has imposed on me had I not felt that in asking me to undertake it you were mindful of the position which it is my lot to hold in connection with the great hospital to which the immortal Harvey was thirty-four years physician, in which he exercised an influence over its governing body that remains to this day, and where his memory is yet held in reverential remembrance.
I wish it were possible for me to bring forward from the records of St. Bartholomew's Hospital any new facts illustrating either Harvey's life or works; but many years ago | WIKI |
Low carb diets and fruit 07,how to get skin looking younger,no carb meal ideas vegetarian quick - Test Out
28.03.2014
When I design meal plans for clients, they are always shocked as to how many carbs they get to eat in one day. At the conclusion of the four month trial, researchers found that the two carbohydrate restricted conditions led to greater weight loss and fat loss (both groups lost an average of ~9 lbs vs. Now to be fair, this is just the summary report from a conference presentation so I can’t exactly go through the methodology to see what kind of diets the two low-carb groups were following the other 5 days of the week. Frankly, I wouldn’t be surprised if the participants in those two intermittent low carbohydrate groups actually ate fairly low carb for more than just those two days a week. But in any case, the important thing to note here is once again, we see evidence of superior body composition results as well as health outcomes when you consciously reduce (*note I did not say eliminate) the amount of carbohydrate you consume in your diet. Incorporating a few deliberate low-carbohydrate days into your regular routine can also be a fantastic way to avoid gaining a whack load of weight through the Holiday season, which is fast approaching. A new infographic has been released showing six of the most popular low carb diets, including The South Beach Diet, Zone Diet, Atkins Diet, Paleo Diet, Sugar Busters Diet, and Low GI Diet, with key facts for each one.
Please note…Articles are presented in good faith but we cannot be held responsible for any content - the opinions presented are for educational and illustrative purposes only and should not be considered as either individual advice or as a substitute for medical and other professional services intended to suit your specific personal needs. Always consult a competent medical professional for answers specific to your questions and circumstances.
And then they are more surprised when they lose fat even while eating more carbs than usual. The moment you bring in more carbs after a low carb diet, you will gain weight and it can be one of two things. Low carb diets have their place in the dieting world, but it’s how you use them that is key. If you’re trying to gain lean muscle mass and lose fat at the same time, a low carb diet may not be the route for you.
5 lbs in the Mediterranean condition), as well as yielding superior benefits in decreasing the prevalence of insulin resistance (22% reduction in the low carb calorie-restricted, 14% reduction for the ad lib group and 4% reduction in the Mediterranean group). In fact, we can take the whole periodic, deliberate low intake philosophy one step further for really explosive results… but that’s a blog article for next week! Low carb is designed more to help you with tightening up your body when either getting ready for a photo shoot, a competition, or some sort of activity of importance.
When you eat low carb you have a tendency to eat less calories due to more veggies and less complex carbs. The reason for this is you only stick with low carb for one to two weeks to achieve the look you’re going for because it helps dry your body out and you have less water retention.
A low carb diet is great to use when needing to really tighten up your body from time to time, but it is not a long term thing. Many people complain that when they stick to a low carb diet that they have a hard time sticking with it long term or they complain that the moment they bring in more carbs, they gain all the weight back. When you are no longer bringing in carbs, your body must switch over from using glucose to Ketones. Understanding the difference between what works and what doesn’t work is having a patience, knowledge, and determination. It usually has nothing to do with your carb intake, it has to do with how many calories you’re bringing in. You may experience headaches, moodiness, achiness, fatigue, the inability to focus mentally, groggyness, and weakness.
Low carb diets are great when the occasion calls for them, they are also great for people are diabetics or deal with epilepsy.
Best low carb high protein bar recipes
How 2 lose weight fast at home yahoo
Comments to «Low carb diets and fruit 07»
1. KAMILLO writes:
Was good....Weed is only illegal because of teams like low carb diets and fruit 07 Pfizer...No you aren't weight-reduction plan does not.
2. Stilni_Oglan writes:
Of course, you probably have the the rationale why. | ESSENTIALAI-STEM |
Jeff Tien Han Pon
Jeff Tien Han Pon (born March 9, 1970) is an American human resources professional who is a former Director of the United States Office of Personnel Management (OPM).
Career
Pon previously served as chief human resources and strategy officer for the Society for Human Resource Management, a non-profit professional membership organization. He was also chief operating officer for Futures Inc., an organization that helps transitioning military members find civilian careers. Previously, he was a principal at Booz Allen Hamilton and served as the United States Department of Energy's chief human capital officer.
Director of OPM
Pon was the deputy director of eGovernment at the U.S. Office of Personnel Management, where he helped to develop human resources shared services centers, payroll modernization, and the USAJobs website.
President Trump nominated Pon for the Director of OPM position. Pon's nomination to OPM was supported by the Senior Executives Association, a nonprofit that advocates for top federal government officials. Newsweek wrote that Pon "could be a key player in reforming" the federal bureaucracy and "in keeping the president's campaign pledge to 'drain the swamp.'" He was confirmed in March 2018.
Pon served in the position for seven months before being removed in October 2018. President Trump reportedly fired Pon because he resisted the administration's plan to dismantle the agency and farm out its functions to other departments, including the White House. | WIKI |
Building ESP8266 Weather station with BME280 (part 1)
Ever since I started playing around with ESP modules I wanted to measure weather conditions in multiple location at home, friends, etc. The best way to achieve that would be to build a station that gathers various environment parameters and publishes them somewhere. That is what I've done. The very first prototype was done using ESP-1 module, DHT-11 humidity sensor and BMP280 breakout board. The station publishes gathered data to a MQTT broker from where it can be further gathered and analysed.
Basically the operation of the station is as follows: the station will try to connect to configured multiple Wifi networks and if no such were found, will try open networks. Then it will connect to MQTT broker and announce telemetry data until 30 seconds elapses. In that case it will go to deep sleep for 30 minutes and the process starts over.
During development and playing around, three variants were born: OLED, E-Paper and Headless.
The source code for the station is here.
Features
• mDNS
• OTA
• Connect to free wifi or one of configured networks
• MQTT Pub/Sub
• Report temperature
• Report relative humidity
• Report air pressure
• Report battery voltage
• Monitor and display several other station telemetry
• Headless
• OLED display
• E-Paper display
• Configure Wifi networks via MQTT
• Configure station name via MQTT
• Configure station names to be monitored via MQTT
• Persistent telemetry MQTT messages
General operation
Each station variant tries to connect to either open wifi or one of configured wifi networks giving priority to configured networks. After that it tries to connect to a configured MQTT broker. Once initial telemetry data is available, starts to publish telemetry data to MQTT broker every 1s. After 30s of bootup will go to deep sleep. After 30 minutes will wake up and repeat the cycle. OLED/E-Paper variants also display gathered telemetry data. Calculated power demand is around 1mAh and can be lowered by reducing time spend awaken and removing LEDs from ESP module. Also higher resistor value for voltage divider could be used. Configuration of the station is done via MQTT messages. E.g. to set a name for device "18:FE:34:A7:05:1A" one should publish a string e.g. "Balkony" to "18:FE:34:A7:05:1A/name". E-Paper variant is a little bit different. You can specify up to three other station names to display by separating names with a space, e.g. "paper room Balkony closet" to "18:FE:34:A7:05:1A/name".
Headless
Headless Weather Station variant
DHT-11 and BMP280 modules can be seen in the photo, as well as Li-Ion battery and ESP-1 module. I had to solder wires directly GPIO16 and ADC of the ESP chip. It's not that hard as it looks, all that is needed - a little bit of flux, steady hands and thin soldering iron :) By the way, since there are very little GPIO pins available, I use RX/TX pins for I2C interface. I2C devices seem not to mind an initial burst of bootup information. I never changed the pins for ESPWeather variants that use ESP12 modules.
OLED
OLED variant of ESP Weather Station
After some time I grew tired of checking up my phone for MQTT readings just to check what is going on at my desk, so I've built an OLED variant. Since I already have I2C interface for BMP280 sensor, all I did was hook up an OLED screen to SDA/SCL and thus OLED variant was born. Also I had to add some code to support that, of course, and since I had plans for other display types support in the future, I've created a neat C++ interface to easily swap display types during compile time.
E-Paper
E-Paper Weather Station variant
As I was starting to accumulate a number of weather stations put in different places and I found smartphone MQTT client app invonvenient, I decided to use one of my Waveshare 2.13" E-Paper displays. I figured since it is ultra low power the whole station should last a very long time between charges. The display width allows to display data gathered from four stations. For this particular station I had to use ESP-12 module instead of ESP-1 as the latter lacks adequate number of GPIO pins :) This station does the following - connects to the MQTT broker, subscribes to station announcements channel and catches messages from preconfigured station names and displays them after all the readings are gathered. Just before going to deep sleep.
Construction
DHT11 and BMP280 modules are used in this station for prototypes. BME280 or even BME680 will be used in production. SSD1306 and 3 colour 2.13" E-Paper HAT are used for OLED and E-Paper variants respectively. For E-Paper prototype Wemos D1 mini was used and later replaced with standalone ESP-12F module. For battery management I used a TP4050 micro-usb module with protection circuitry. If one has Lipo/LiIon batteries with protection in possession, then protection-less charging boards can be used.
I plan adding a 6V solar panel so I could start measuring outside temperature without worrying about the battery. OLED variant in the above picture does not use any charging circuitry as it is meant for always-connected (or battery-pack) usage. However please note, that most battery packs will disconnect the battery from the station once it goes into deep sleep mode due to extremely low current consumption. Cases for these can be 3D printed.
• Rx is SCL
• Tx is SDA
• GPIO 2 is 1-Wire interface for DHT11
• GPIO 13, 14, 15, 5, 12, 4 are for EPD signals: DIN, CLK, CS, DC, RST, BUSY respectively
• TOUT or ADC is for battery monitoring and connected to battery input via 1/10 voltage divider (ADC can measure up to 1.0V, so this scale factor is quite convenient)
• sourced on Ebay: DHT11 for ESP-1S module, BMP280 board, TP4050 lipo micro-usb charger board, SSD1306 and 2.13" RPI-Zero E-Paper HAT (Waveshare)
• LiIon Batteries from various dead cell phones and cheap Chinese video registrators
Cloning
Since I use git submodules (for EasyOTA), cloning must be done using --recurse-submodules option:
1git clone --recurse-submodules https://github.com/itohio/ESPWeather.git
2git checkout 10a7188545d1faf004c2990fb229bb47a6dc7dfc
Configuration
Please look at sample_wificonfig.h file, select relevant features, add default Wifi credentials, MQTT connection details and build after selecting appropriate board. Note, that wifi connection and MQTT are required if one wants to configure the station, e.g. changing the name or adding more access points.
Building
PlatformIO is used for this project. Just clone the project, import it into platformio, select board info and build. Flashing is also done this way. platformio.ini file contains some example upload_port values for OTA flashing. One can always use hostnames instead of ips. It's just that my bonjour service is confused because of different stations occupying the same hostname.
Battery monitoring
I use 100k trim pot directly across battery connector to the DH11 board, trim it to 1/10th of the battery voltage and solder the center tap to a TOUT pin right to the ESP8266 chip. I suggest flashing the ESP-1 module before soldering, so that the wire wouldn't be stressed to much. Discrete resistors for voltage divider can be seen in some the photos - this is because I ran out of trim pots:) And the dividing factor is not really precise, since I did not have 90k resistors and opted out for 2x51k + 10kx1k resistors. For the prototypes I am only interested in monitoring approximate voltage drop for the batteries and approximate point when DHT11 fails to provide meaningful readings. At about 2.80V of battery voltage DHT11 library returns nan. This voltage is even too low for ESP, but surprisingly it survives until 2.65(minus voltage drop across ldo).
Deep Sleep function
For waking up from Deep sleep GPIO 16 must be connected to RST. So more fine soldering skills are required in case of ESP-1. ESP-12 is more forgiving in that regard.
Reducing current consumption
I've measured 1.8ma current in deep sleep. That means that the station sleeps for 30 minutes with 1.8mA current consuming 1.8mAh(I assume it never goes away). During all the communication and measurements somewhere around 70-90 mA are flowing to the ESP. So let's say it's 75mA for 30s. That translates to 0.625mAh. Therefore 800mAh battery would last a long time (about 13 days). Sadly, the batteries I am using in the photos are pretty much dead and charge up to around 75-120mAh. Which lasted for about 40 hours which confirms current consumption measurements and rough calculations to a degree. That was with two LEDs being constantly lit and an onboard regulator. Which I am surprised by, by the way. One can always remove those buggers, but I figured that with solar panel the station would run almost indefinitely and would have plenty of run time for home usage with a 800mAh battery. By removing the blue LED current drops to ~400uA during deep sleep and the dead'est battery still runs for 4 days already at 3.75V.
Topics being published by the station
announce
Station will publish it's name to this topic once it connects to MQTT broker. Initially it will be a MAC address of the ESP. One can configure a different name by publishing to {station name}/name a new name which will be saved on the station.
{station name}/temperature
Temperature of the surroundings in deg. centigrade.
{station name}/pressure
Air pressure of the surroundings in milli Bar.
{station name}/humidity
Air relative humidity in percentage.
{station name}/battery
Battery voltage in volts.
Topics being subscribed by the station
{station name}/name
Publishing to this topic will change station name. Station name must not contain neither commas nor spaces as these symbols are reserved for E-Paper variant. One can specify a list of station names separated by a space or comma, so that measurement from those stations can be monitored. E.g. "paper OLED outside mobile" was used in the E-Paper variant shown in the photo. That means, that E-Paper variant's name was set to "paper" and three other stations were monitored: OLED, outside and mobile. Since each station published persistent telemetry messages, the latest data is being monitored and subsequently displayed on the E-Paper display.
{station name}/apadd
Publishing to this topic will add another Wifi Network. One must supply a space delimited ssid and password, e.g. ssid password. This will be saved to the station and it will try to connect to this and other saved APs on boot.
{station name}/apremove
Publishing to this topic will remove the ap. One must publish ssid of the network that one wishes to remove.
{station name}
This topic accepts following publishes:
SLEEP
Forces the station to sleep for preset time (around 30 minutes).
NOSLEEP
Disables sleeping of the stations. This does not percist after restart. Useful for OTA development/etc.
RESTART
Forces restart of the station.
PING
Forces to announce it's name on announce topic. Useful for station status monitoring.
Things to note
RX/TX pins
Due to pin count limitation on ESP-1 RX and TX pins are used for I2C bus. I2C stations seem to survive initial burst of boot info that is fed during bootup, but programming via serial while these pins are still connected to OLED/BMP280 is not advised. I've tried it, but ESP-12 module does not boot.
SPIFFS
Until now (20180216) ESP-01 with PUYA flash chips are not supported by the SPIFFS library (it can read uploaded, but not properly write files.). As a workaround one can publish config topics with persistent messages. E.g. setting name of the station. Setting up Wifi in this fashion isn't really useful for obvious reasons though.
BMP280
For some reason very first measurement is way too high (both temperature and pressure). I've tried several libraries with no luck. In fact Adafruit_BMP280 library gives way too high readings all the time. The one I'm using currently (BMP280) is simplistic and allows to set different oversampling values and gives the most accurate readings except for the very first. To remediate that I skip several first readings.
DHT11
Sometimes DHT11 will not read any data. And most of the time when the battery is almost depleted (<2.8V) there are no readings.
comments powered by Disqus | ESSENTIALAI-STEM |
Neutrino propagation in the Earth and emerging charged leptons with $\texttt{nuPyProp}$
30 Sep 2022 · Diksha Garg, Sameer Patel, Mary Hall Reno, Alexander Reustle, Yosui Akaike, Luis A. Anchordoqui, Douglas R. Bergman, Isaac Buckland, Austin L. Cummings, Johannes Eser, Fred Garcia, Claire Guépin, Tobias Heibges, Andrew Ludwig, John F. Krizmanic, Simon Mackovjak, Eric Mayotte, Sonja Mayotte, Angela V. Olinto, Thomas C. Paul, Andrés Romero-Wolf, Frédéric Sarazin, Tonia M. Venters, Lawrence Wiencke, Stephanie Wissel ·
Ultra-high-energy neutrinos serve as messengers of some of the highest energy astrophysical environments. Given that neutrinos are neutral and only interact via weak interactions, neutrinos can emerge from sources, traverse astronomical distances, and point back to their origins. Their weak interactions require large target volumes for neutrino detection. Using the Earth as a neutrino converter, terrestrial, sub-orbital, and satellite-based instruments are able to detect signals of neutrino-induced extensive air showers. In this paper, we describe the software code $\texttt{nuPyProp}$ that simulates tau neutrino and muon neutrino interactions in the Earth and predicts the spectrum of the $\tau$-lepton and muons that emerge. The $\texttt{nuPyProp}$ outputs are lookup tables of charged lepton exit probabilities and energies that can be used directly or as inputs to the $\texttt{nuSpaceSim}$ code designed to simulate optical and radio signals from extensive air showers induced by the emerging charged leptons. We describe the inputs to the code, demonstrate its flexibility and show selected results for $\tau$-lepton and muon exit probabilities and energy distributions. The $\texttt{nuPyProp}$ code is open source, available on Github.
PDF Abstract
Categories
High Energy Astrophysical Phenomena High Energy Physics - Phenomenology | ESSENTIALAI-STEM |
Thermocouple Accuracy Table by Type and Temperature
Updated Nov 22, 2017
Issue Details
I am reading the temperature of a chamber using two thermocouples of the same type but the readings are different. I have calculated the accuracy of my measurement hardware but it does not compensate for the difference in readings. What may be causing this phenomenon?
Solution
In addition to considering the accuracy of the measurement hardware, you should consider the inherent accuracy of the thermocouple. The accuracy of a thermocouple is affected by its type and temperature. See the table below for the maximum permitted error (in degree Celsius) for various common thermocouples that comply with IEC 584-2 (1982).
In addition to accuracy based on the type of thermocouple, thermocouples have a specified range of temperatures over which they can operate. This can become a problem when extreme high temperatures are being read. Their ranges are determined by numerous variables, including the following:
1. Type (i.e. J, K, E, T, RX/SX, N, CX)
2. Sheath material
3. Sheath diameter
The following website is an example of a thermocouple wire reference guide produced by a specific manufacturer that gives temperature range. International Thermocouple Color Codes
WAS THIS ARTICLE HELPFUL?
Not Helpful | ESSENTIALAI-STEM |
Coronavirus stimulus checks: Here's everything you need to know
Congress is expected to pass a $2 trillion stimulus bill this week to help individuals and businesses deal with the economic fallout from the coronavirus pandemic. Included in the bill is a provision for many Americans to receive a one-time check from the federal government to help in a time when millions are losing their jobs. While it's possible some details could change before the House passes the bill, here's what we know about the stimulus checks now. Individuals earning a gross adjusted income up to $75,000 a year will be eligible to receive a $1,200 check. From there, the checks will be reduced by $5 for every $100 in income north of $75,000. They phase out completely if you earn $99,000 or more. Married couples earning a gross adjusted income up to $150,000 will receive $2,400. Checks phase out completely at $198,000 for couples. Heads of household will receive $1,200 if they earn up to $112,500, phasing out completely at $136,500. Additionally, heads of households and married couples will receive $500 per child under 17. You need a Social Security number to qualify for a relief check. As noted above, individuals earning up to $99,000, and couples earning up to $198,000, will receive a check, though the amount will vary. You do not need taxable income to receive a check. However, if you don't typically file a tax return, you will need to do so for 2019 before you will be eligible, according to the AARP. Those making above the income thresholds, noncitizens without green cards and anyone who's classified as dependents do not qualify for a check. Yes, many people receiving Social Security benefits will be eligible for a check, as long as their gross adjusted income meets the requirements. Yes. As long as you have a Social Security number, filed taxes in 2018 or 2019 and meet the income requirements you will receive a check. Yes. If you filed taxes in 2018 or 2019 and meet the income requirements you will receive a check. However, if you recently lost your job because of the coronavirus but your income was over the eligibility requirements in 2019, then you will not receive the check. But you can still apply for unemployment. Adjusted gross income is different from taxable income. It is the amount of money you report as income, including earnings from your job, self-employment, dividends, etc., minus certain "above the line" deductions like alimony payments and contributions to certain retirement accounts, including a 401(k) and IRA. You can find your AGI on line 8b on your 2019 Form 1040 and line 7 on your 2018 Form 1040. If you've filed your 2019 return, then the amount you receive will be based on your 2019 gross adjusted income. Otherwise, the federal government will use your 2018 return to see if you are eligible. The checks will be sent via direct deposit if you've already provided the IRS with your bank account information. If you received a refund this year deposited directly into your account, you're all set. If the IRS doesn't have your direct deposit info, you will get a check in the mail. No. The checks will be sent automatically by the IRS. However, if you have not filed a 2018 or 2019 tax return, you should do so. People will start receiving relief checks, or direct deposits, within three weeks, according to Treasury Secretary Steve Mnuchin. Some experts, though, say that is unrealistic and that it could take much longer. Those who do not have direct deposit information on file with the IRS can expect to wait longer to receive a check in the mail, just as they would have to wait to receive their tax refund. The checks are not taxable. Many people receiving the checks will use them for day-to-day expenses: groceries, bills and rent or mortgage payments. If you don't need them for those purposes, experts advise using them to build an emergency fund or pay down some debt. If you already have an emergency fund, and little to no debt, you could consider investing the money. President Trump has said he is open to sending another round of checks, however it is unclear whether Congress will do so in the coming months. Unsurprisingly, scammers are already looking for ways to cash in on unsuspecting victims. The Federal Trade Commission recently warned consumers that the government will never ask you to pay money upfront to receive the checks, or call you to ask for personal information like your Social Security number of bank account number, all of which are typically scams. You will either receive a direct deposit, or a check in the mail. The government will not send you the payment via Venmo or another app. Direct deposits are more secure than paper checks, so if you are relying on the latter, be vigilant about checking your mailbox. | NEWS-MULTISOURCE |
Encyclopedia of Czechoslovak Military 1920–1938
Encyklopedie branné moci Republiky československé 1920 - 1938 (- in Czech, Encyclopedia of Czechoslovak Military 1920 - 1938) is a printed Czech language encyclopedia covering the military of the First Republic of Czechoslovakia. It was published in 2006 by publisher Libri, ISBN 80-7277-256-2.
The book was written by Jiří Fidler and Václav Sluka, both military historians specialized on prewar era. The book, with 768 pages and over 3,000 entries, covers:
* weapons,
* personalities (including weapon designers, military related details of Czechoslovak politicians and biographies of French generals serving in Czechoslovakia),
* units and their locations,
* armament industry and other infrastructure.
The encyclopedia uses traditional form and its entries are sorted alphabetically. Photographs, plans and layouts accompany the text entries. The period covered starts with 1920 unification of local military forces (former Austro-Hungarian units, volunteers and paramilitaries as Sokol) and the Czechoslovak Legions built abroad and ends with the general mobilization in 1938 (which was followed by the Munich Agreement). Some biographies also include later events. | WIKI |
Big Brother wants to be your new car's co-pilot | TheHill
In the future, negotiating to buy a self-driving car will be more about the software than the hardware. In fact, if you buy the software, chances are the dealership will throw in the car for free. Sound far-fetched? Not so fast. The Lockheed Martin F-35 Lightning II is the most sophisticated stealth fighter ever built. Besides being able to pull 9 G’s, the F-35 is described as “the most lethal, survivable and connected fighter aircraft ever built. More than a fighter jet, the F-35’s ability to collect, analyze and share data is a powerful force multiplier enhancing all airborne, surface and ground-based assets in the battlespace and enabling men and women in uniform to execute their mission and come home safe.” Something as deadly and stealthy as the F-35 requires over 8 million lines of code to make it strike fear into our adversaries. Surely there is little that can rival the complexity of a stealth fighter. Unless you’re Facebook. To connect over 1.2 billion people on a daily basis takes a little over 60 million lines of code. Even that pales in comparison to what it takes to run a modern automobile. At the 2016 Consumer Electronics Show, Ford appeared to be more of a data and sensor company than a vehicle manufacturer. The thousands of sensors inside a modern Ford require over 150 million lines of code. Mix in Artificial Intelligence and computer vision for self-driving cars, and you have a recipe for chaos. Keen Security Lab, which is the cybersecurity research group of Chinese internet giant Tencent, recently published a report demonstrating how their researchers were able to hijack a Tesla Model S self-driving car and move it into the oncoming lane. It’s no coincidence Keen is a Chinese company, and even less of a coincidence Tesla is being targeted. The watershed moment for cybersecurity in vehicles happened in 2015 when DARPA researchers Charlie Miller and Chris Valasek wirelessly cut the brakes to a 2014 Jeep Cherokee being driven by a Wired magazine reporter, watching as the Jeep slid into a ditch. Jeep issued a recall for 1.4 million vehicles as a result. Keen Security Lab, a Chinese group who has hacked Tesla and BMW vehicles, portrays their work as “ethical hacking research.” This statement is extremely difficult to reconcile, since all companies in China are expected to share their research and technology with the People’s Liberation Army (PLA) under a concept called “civil-military fusion.” Bob Work, the former Deputy Secretary of Defense, has warned of this repeatedly. The results from the Keen group research feeds directly into China’s global ambition of dominating electric and autonomous vehicles. According to recent data, China buys one out of every two electric vehicles sold globally. And the talent pool for driverless vehicles isn’t in Shanghai or Beijing. It’s in Silicon Valley. Several Chinese startups have recognized the real talent is still in the United States. They are setting up shop near Apple, Google, Tesla and others and using credits from their Communist government to poach top engineers. To achieve the kind of dominance in Artificial Intelligence envisioned by President Xi, “Made in China 2025” has been the key strategy for achieving global leadership. Until last March. The slogan ‘Made in China 2025’ appears to have been dropped in name only. The intent is still there, and China will continue to aggressively use subsidies, credits, civil-military fusion, espionage, intellectual property theft and academia against us. To make matters worse, China continues to openly follow their three ‘R’ strategy: ‘Rob’ the technology, ‘Replicate’ it in China, and ‘Replace’ current competitors whose technology was stolen in the first place. One large scale example was Didi Chuxing, a ride-hailing service that competes with Uber. Didi Chuxing does most of the driverless research in America, and used that knowledge to drive Uber out of the China market. There’s another big reason China wants to dominate AI and driverless vehicles, and that’s 5G. The next generation of wireless connectivity has arrived, with Verizon beating South Korea in launching the next generation networks. The 5G network is more than just about speed, but that is a consideration. The advantages 5G brings will have significant impact in the Internet of Things (IoT), connected and driverless vehicles. Connected cars are estimated to send 25 gigabytes of data — per hour — to the cloud. Sending that amount isn’t going to be possible on current wireless networks. Which is why Huawei is positioning to deploy as much of their 5G networking gear as possible around the world. Imagine the thousands of sensors per vehicle, and the millions of connected vehicles per country, sending data back over software and hardware owned by Chinese companies who fully participate in civil-military fusion. If China, and Chinese companies, control that much of the market, they will also get to set the standards. And that means China will have visibility into the data flowing across the networks. That’s a problem for Rob Spaulding, senior fellow at the Hudson Institute. "It’s going to be far more pervasive in terms of what data aggregators know about you and how they can influence your lives,” says Spaulding. “Today it’s Amazon, Google, Facebook. Tomorrow it’s Baidu, Alibaba, Tencent, and the Chinese communist party." Janice Stein, political science professor at the University of Toronto, was more pragmatic. "This isn’t about virtue. For most of the world, the question is who do you want to spy on you?" I, for one, want to make sure it’s not China. Morgan Wright is an expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. He previously worked as a senior advisor in the U.S. State Department Antiterrorism Assistance Program and as senior law enforcement advisor for the 2012 Republican National Convention. Follow him on Twitter @morganwright_us. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Canonical and Adobe collaboration project
nautilus crashed with SIGSEGV
Reported by BlueT - Matthew Lien - 練喆明 on 2012-03-27
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
adobe-isv
Undecided
Unassigned
nautilus (Ubuntu)
Undecided
Unassigned
Bug Description
Re-Produce:
1. Install adobeair from https://launchpad.net/~dajhorn/+archive/adobeair
2. Download the AIR Presentation file http://goo.gl/jZCSE from https://groups.google.com/d/msg/cloudtw/JYUEA3ckiNs/Za2YR83XVc8J
3. Install tts.air and launch
4. After the long buzz the screen showup, BUT whole desktop got frozen
5. try to kill the AIR Update process and .air application from Ctrl-Alt-F1 console BUT nothing help
6. only restart X Window can bring my desktop back.
ProblemType: Crash
DistroRelease: Ubuntu 10.04
Package: nautilus 1:2.30.1-0ubuntu1.2
ProcVersionSignature: Ubuntu 2.6.32-40.87-generic 2.6.32.57+drm33.23
Uname: Linux 2.6.32-40-generic x86_64
Architecture: amd64
Date: Tue Mar 27 19:57:07 2012
Disassembly: => 0x7f274e4fa91b: Cannot access memory at address 0x7f274e4fa91b
ExecutablePath: /usr/bin/nautilus
ProcCmdline: nautilus
ProcEnviron:
LANGUAGE=zh_TW:en_US:en
PATH=(custom, user)
LANG=zh_TW.UTF-8
SHELL=/bin/bash
SegvAnalysis:
Segfault happened at: 0x7f274e4fa91b: Cannot access memory at address 0x7f274e4fa91b
PC (0x7f274e4fa91b) not located in a known VMA region (needed executable region)!
SegvReason: executing unknown VMA
Signal: 11
SourcePackage: nautilus
Stacktrace:
#0 0x00007f274e4fa91b in ?? ()
No symbol table info available.
#1 0x0000000000000000 in ?? ()
No symbol table info available.
StacktraceTop:
?? ()
?? ()
Title: nautilus crashed with SIGSEGV
UserGroups: adm admin cdrom dialout libvirtd lpadmin plugdev sambashare vboxusers
Stacktrace:
#0 0x00007f274e4fa91b in ?? ()
No symbol table info available.
#1 0x0000000000000000 in ?? ()
No symbol table info available.
StacktraceTop:
?? ()
?? ()
Changed in nautilus (Ubuntu):
status: New → Invalid
Thank you for your report!
However, processing it in order to get sufficient information for the
developers failed (it does not generate a useful symbolic stack trace). This
might be caused by some outdated packages which were installed on your system
at the time of the report:
outdated debug symbol package for udisks: package version 1.0.1-1ubuntu1 dbgsym version 1.0.1-1build1
package gcc-4.5-base does not exist, ignoring
libssl0.9.8 version 0.9.8o-5ubuntu1 required, but 0.9.8k-7ubuntu8.8 is available
libstdc++6 version 4.5.2-8ubuntu4 required, but 4.4.3-4ubuntu5.1 is available
outdated debug symbol package for libstdc++6: package version 4.4.3-4ubuntu5.1 dbgsym version 4.4.3-4ubuntu5
gvfs version 1.6.2-1ubuntu1~ppa1 required, but 1.6.1-0ubuntu1build1 is available
package multiarch-support does not exist, ignoring
package python-gobject-2 does not exist, ignoring
Please upgrade your system to the latest package versions. If you still
encounter the crash, please file a new report.
Thank you for your understanding, and sorry for the inconvenience!
tags: removed: need-amd64-retrace
visibility: private → public
Is this still an issue for you?
If yes please update your system and set back the status to "new"
thanks
Changed in adobe-isv:
status: New → Incomplete
To post a comment you must log in.
This report contains Public information Edit
Everyone can see this information.
Other bug subscribers | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Video Industry
The result was Speedy deleted as copvio Malla nox 13:43, 8 June 2007 (UTC)
Video Industry
* – (View AfD) (View log)
It is an essay type article that was created on May 2. It can also be found here http://open-site.org/Business/Arts,_Entertainment,_and_Recreation/Media_Production/ which claims a " Copyright © Open Site" but I don't know if it came from Wikipedia first or if their copyright allows this sharing. 650l2520 01:35, 8 June 2007 (UTC)
* Delete Unformatted text, single purpose account, stolid voice... Looks like another term paper pasted onto Wikipedia. I hope he got a good grade. - Richfife 01:39, 8 June 2007 (UTC)
* Actually, on reading the paper, I hope he didn't get a good grade. - Richfife 01:49, 8 June 2007 (UTC)
* Delete. WP is not a place to post your term paper, regardless of the grade you received. Horologium t-c 01:45, 8 June 2007 (UTC)
* Speedy delete This is definitely a copyright violation. Google's cache indicates the webpage existed on April 16:, whereas this article was created on the second of May: . nadav (talk)
* Speedy delete as a copyvio and per Wikipedia not being a publisher of original research. NeoChaosX (talk, walk) 03:54, 8 June 2007 (UTC)
| WIKI |
blob: 0ab3ce567905fe10329da3515ea73443e14fb764 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "dbus/bus.h"
#include "base/bind.h"
#include "base/logging.h"
#include "base/message_loop.h"
#include "base/stringprintf.h"
#include "base/threading/thread.h"
#include "base/threading/thread_restrictions.h"
#include "dbus/message.h"
#include "dbus/object_proxy.h"
#include "dbus/scoped_dbus_error.h"
namespace {
// Gets the absolute signal name by concatenating the interface name and
// the signal name. Used for building keys for method_table_ in
// ObjectProxy.
std::string GetAbsoluteSignalName(
const std::string& interface_name,
const std::string& signal_name) {
return interface_name + "." + signal_name;
}
} // namespace
namespace dbus {
ObjectProxy::ObjectProxy(Bus* bus,
const std::string& service_name,
const std::string& object_path)
: bus_(bus),
service_name_(service_name),
object_path_(object_path),
filter_added_(false) {
}
ObjectProxy::~ObjectProxy() {
}
// Originally we tried to make |method_call| a const reference, but we
// gave up as dbus_connection_send_with_reply_and_block() takes a
// non-const pointer of DBusMessage as the second parameter.
bool ObjectProxy::CallMethodAndBlock(MethodCall* method_call,
int timeout_ms,
Response* response) {
bus_->AssertOnDBusThread();
if (!bus_->Connect())
return false;
method_call->SetDestination(service_name_);
method_call->SetPath(object_path_);
DBusMessage* request_message = method_call->raw_message();
ScopedDBusError error;
// Send the message synchronously.
DBusMessage* response_message =
bus_->SendWithReplyAndBlock(request_message, timeout_ms, error.get());
if (!response_message) {
LOG(ERROR) << "Failed to call method: "
<< (error.is_set() ? error.message() : "");
return false;
}
response->reset_raw_message(response_message);
return true;
}
void ObjectProxy::CallMethod(MethodCall* method_call,
int timeout_ms,
ResponseCallback callback) {
bus_->AssertOnOriginThread();
method_call->SetDestination(service_name_);
method_call->SetPath(object_path_);
// Increment the reference count so we can safely reference the
// underlying request message until the method call is complete. This
// will be unref'ed in StartAsyncMethodCall().
DBusMessage* request_message = method_call->raw_message();
dbus_message_ref(request_message);
// Bind() won't compile if we pass request_message as-is since
// DBusMessage is an opaque struct which Bind() cannot handle.
// Hence we cast it to void* to workaround the issue.
base::Closure task = base::Bind(&ObjectProxy::StartAsyncMethodCall,
this,
timeout_ms,
static_cast<void*>(request_message),
callback);
// Wait for the response in the D-Bus thread.
bus_->PostTaskToDBusThread(FROM_HERE, task);
}
void ObjectProxy::ConnectToSignal(const std::string& interface_name,
const std::string& signal_name,
SignalCallback signal_callback,
OnConnectedCallback on_connected_callback) {
bus_->AssertOnOriginThread();
bus_->PostTaskToDBusThread(FROM_HERE,
base::Bind(&ObjectProxy::ConnectToSignalInternal,
this,
interface_name,
signal_name,
signal_callback,
on_connected_callback));
}
void ObjectProxy::Detach() {
bus_->AssertOnDBusThread();
if (filter_added_)
bus_->RemoveFilterFunction(&ObjectProxy::HandleMessageThunk, this);
for (size_t i = 0; i < match_rules_.size(); ++i) {
ScopedDBusError error;
bus_->RemoveMatch(match_rules_[i], error.get());
if (error.is_set()) {
// There is nothing we can do to recover, so just print the error.
LOG(ERROR) << "Failed to remove match rule: " << match_rules_[i];
}
}
}
ObjectProxy::OnPendingCallIsCompleteData::OnPendingCallIsCompleteData(
ObjectProxy* in_object_proxy,
ResponseCallback in_response_callback)
: object_proxy(in_object_proxy),
response_callback(in_response_callback) {
}
ObjectProxy::OnPendingCallIsCompleteData::~OnPendingCallIsCompleteData() {
}
void ObjectProxy::StartAsyncMethodCall(int timeout_ms,
void* in_request_message,
ResponseCallback response_callback) {
bus_->AssertOnDBusThread();
if (!bus_->Connect() || !bus_->SetUpAsyncOperations()) {
// In case of a failure, run the callback with NULL response, that
// indicates a failure.
Response* response = NULL;
base::Closure task = base::Bind(&ObjectProxy::RunResponseCallback,
this,
response_callback,
response);
bus_->PostTaskToOriginThread(FROM_HERE, task);
return;
}
DBusMessage* request_message =
static_cast<DBusMessage*>(in_request_message);
DBusPendingCall* pending_call = NULL;
bus_->SendWithReply(request_message, &pending_call, timeout_ms);
// Prepare the data we'll be passing to OnPendingCallIsCompleteThunk().
// The data will be deleted in OnPendingCallIsCompleteThunk().
OnPendingCallIsCompleteData* data =
new OnPendingCallIsCompleteData(this, response_callback);
// This returns false only when unable to allocate memory.
const bool success = dbus_pending_call_set_notify(
pending_call,
&ObjectProxy::OnPendingCallIsCompleteThunk,
data,
NULL);
CHECK(success) << "Unable to allocate memory";
dbus_pending_call_unref(pending_call);
// It's now safe to unref the request message.
dbus_message_unref(request_message);
}
void ObjectProxy::OnPendingCallIsComplete(DBusPendingCall* pending_call,
ResponseCallback response_callback) {
bus_->AssertOnDBusThread();
DBusMessage* response_message = dbus_pending_call_steal_reply(pending_call);
if (!response_message) {
// This shouldn't happen but just in case.
LOG(ERROR) << "The response message is not received for some reason";
Response* response = NULL;
base::Closure task = base::Bind(&ObjectProxy::RunResponseCallback,
this,
response_callback,
response);
bus_->PostTaskToOriginThread(FROM_HERE, task);
return;
}
// The response message will be deleted in RunResponseCallback().
Response* response = new Response;
response->reset_raw_message(response_message);
base::Closure task = base::Bind(&ObjectProxy::RunResponseCallback,
this,
response_callback,
response);
bus_->PostTaskToOriginThread(FROM_HERE, task);
}
void ObjectProxy::RunResponseCallback(ResponseCallback response_callback,
Response* response) {
bus_->AssertOnOriginThread();
if (!response) {
// The response is not received.
response_callback.Run(NULL);
} else if (response->GetMessageType() == Message::MESSAGE_ERROR) {
// Error message may contain the error message as string.
dbus::MessageReader reader(response);
std::string error_message;
reader.PopString(&error_message);
LOG(ERROR) << "Failed to call method: " << response->GetErrorName()
<< ": " << error_message;
// We don't give the error message to the callback.
response_callback.Run(NULL);
} else {
// The response is successfuly received.
response_callback.Run(response);
}
delete response; // It's ok to delete NULL.
}
void ObjectProxy::OnPendingCallIsCompleteThunk(DBusPendingCall* pending_call,
void* user_data) {
OnPendingCallIsCompleteData* data =
reinterpret_cast<OnPendingCallIsCompleteData*>(user_data);
ObjectProxy* self = data->object_proxy;
self->OnPendingCallIsComplete(pending_call,
data->response_callback);
delete data;
}
void ObjectProxy::ConnectToSignalInternal(
const std::string& interface_name,
const std::string& signal_name,
SignalCallback signal_callback,
OnConnectedCallback on_connected_callback) {
bus_->AssertOnDBusThread();
// Check if the object is already connected to the signal.
const std::string absolute_signal_name =
GetAbsoluteSignalName(interface_name, signal_name);
if (method_table_.find(absolute_signal_name) != method_table_.end()) {
LOG(ERROR) << "The object proxy is already connected to "
<< absolute_signal_name;
return;
}
// Will become true, if everything is successful.
bool success = false;
if (bus_->Connect() && bus_->SetUpAsyncOperations()) {
// We should add the filter only once. Otherwise, HandleMessage() will
// be called more than once.
if (!filter_added_) {
bus_->AddFilterFunction(&ObjectProxy::HandleMessageThunk, this);
filter_added_ = true;
}
// Add a match rule so the signal goes through HandleMessage().
const std::string match_rule =
base::StringPrintf("type='signal', interface='%s', path='%s'",
interface_name.c_str(),
object_path_.c_str());
ScopedDBusError error;
bus_->AddMatch(match_rule, error.get());;
if (error.is_set()) {
LOG(ERROR) << "Failed to add match rule: " << match_rule;
} else {
// Store the match rule, so that we can remove this in Detach().
match_rules_.push_back(match_rule);
// Add the signal callback to the method table.
method_table_[absolute_signal_name] = signal_callback;
success = true;
}
}
// Run on_connected_callback in the origin thread.
bus_->PostTaskToOriginThread(
FROM_HERE,
base::Bind(&ObjectProxy::OnConnected,
this,
on_connected_callback,
interface_name,
signal_name,
success));
}
void ObjectProxy::OnConnected(OnConnectedCallback on_connected_callback,
const std::string& interface_name,
const std::string& signal_name,
bool success) {
bus_->AssertOnOriginThread();
on_connected_callback.Run(interface_name, signal_name, success);
}
DBusHandlerResult ObjectProxy::HandleMessage(
DBusConnection* connection,
DBusMessage* raw_message) {
bus_->AssertOnDBusThread();
if (dbus_message_get_type(raw_message) != DBUS_MESSAGE_TYPE_SIGNAL)
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
// raw_message will be unrefed on exit of the function. Increment the
// reference so we can use it in Signal.
dbus_message_ref(raw_message);
scoped_ptr<Signal> signal(
Signal::FromRawMessage(raw_message));
// The signal is not coming from the remote object we are attaching to.
if (signal->GetPath() != object_path_)
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
const std::string interface = signal->GetInterface();
const std::string member = signal->GetMember();
// Check if we know about the method.
const std::string absolute_signal_name = GetAbsoluteSignalName(
interface, member);
MethodTable::const_iterator iter = method_table_.find(absolute_signal_name);
if (iter == method_table_.end()) {
// Don't know about the method.
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
if (bus_->HasDBusThread()) {
// Post a task to run the method in the origin thread.
// Transfer the ownership of |signal| to RunMethod().
// |released_signal| will be deleted in RunMethod().
Signal* released_signal = signal.release();
bus_->PostTaskToOriginThread(FROM_HERE,
base::Bind(&ObjectProxy::RunMethod,
this,
iter->second,
released_signal));
} else {
// If the D-Bus thread is not used, just call the method directly. We
// don't need the complicated logic to wait for the method call to be
// complete.
iter->second.Run(signal.get());
}
return DBUS_HANDLER_RESULT_HANDLED;
}
void ObjectProxy::RunMethod(SignalCallback signal_callback,
Signal* signal) {
bus_->AssertOnOriginThread();
signal_callback.Run(signal);
delete signal;
}
DBusHandlerResult ObjectProxy::HandleMessageThunk(
DBusConnection* connection,
DBusMessage* raw_message,
void* user_data) {
ObjectProxy* self = reinterpret_cast<ObjectProxy*>(user_data);
return self->HandleMessage(connection, raw_message);
}
} // namespace dbus | ESSENTIALAI-STEM |
Simon icon Simon
Flexible server monitoring
pause - not
We have an MIS app that goes down for processing from 11:30PM to 6 AM. I created a test that pauses - since I can't make a single pause from 11:30 PM to 6am the following day, I created a pause form 23:30 to 00:00 and from 00:00 to 7:00 every day. This worked for a while, but now I get an error because Simon is checking during the pause period. I tried re-creating the test, same thing. Any hints would be appreciated - I'd like to email our IT folks instead of just me, but don't want to inundate them with false positives every day.
Suggestion - if the pause feature had a start time, and length of time then the computer could do the math, and we could span midnite with a single pause.
David Sinclair's picture
Re: pause - not
I would expect those time ranges to work. In fact, I'd expect just a single range of 23:30 to 07:00 to work, too.
The way the auto-pause dates are calculated is it firstly finds the next "from" date from the ranges, then takes that date/time and sets the time part to the "to" time. If the resulting date/time is before the "from" date/time, it bumps it up to the next day.
So using 23:30 to 07:00 every day, and today being 2008-09-04, would set the next auto-pause date/time to 2008-09-04 @ 23:30, and the next auto-resume date/time to 2008-09-04 @ 07:00. Since that is before the auto-pause date/time, it'd bump that up to 2008-09-05 @ 07:00, which is what you want.
I suppose having two auto-pause ranges as you do now could conceivably fail with the second range, as the second range would have already passed when the first one is resumed. Though I'd expect it to cope with that, too.
Anyway, try using just one range; I believe that should do what you want.
I do want to redesign the auto-pausing in the future. For Time Out 2, I'm thinking of using positive ranges instead of negative, i.e. saying which time range it should perform the actions, rather than when it shouldn't. I'm thinking of adopting that for Simon, too. | ESSENTIALAI-STEM |
Final steps under way before mine rescue - CNN.com
(CNN) -- Steel tubing has begun to be placed to reinforce the path that connects the 33 miners trapped in Chile to the surface, the final step before the extraction of the miners can begin, Mining Minister Laurence Golborne said Sunday. Three of the tubes are already in place, he said. About 15 or 16 tubes will be placed in total. We are expecting no major problems, Golborne said If all goes according to plan, the first of the miners could be pulled from the mine by Wednesday, he said. But the health and safety of the miners remained the top priority, he added. Given their circumstances, the miners, who have been trapped since August 5, are in very good health, Health Minister Jaime Manalich said. Their spirits also remain high, he said. When he told the miners through video conference that they would have to choose an order to be rescued in, there was no shortage of volunteers to go last, Manalich said. They continue to have an admirable attitude, he said. The last six hours before the rescue starts, the miners will be switched over to a liquid diet and vitamins ahead of their trip to the surface. The change in diet is one way that officials are trying to mitigate some of the challenges associated with the rescue. These include the loneliness of being in the rescue capsule, and dizziness and panic because the capsule will spin around as it rises, Manalich said. After the 2,300-foot hole in Chile is secure, materials and equipment will be brought in so that the rescue capsule -- dubbed the Phoenix -- can be lowered into the mine. Then, authorities will lower a doctor and a rescuer into the chamber, Manalich said earlier. Medical and rescue personnel will be in place to start extracting and treating the miners. Once the men have been extracted, they will undergo about two hours of health checks at a field hospital set up at the mine. They will then be flown by helicopter to a hospital in the town of Copiapo -- approximately a 15-minute flight. Miners who are healthy enough will be allowed to visit briefly with family members in a reunion area before being taken to the hospital. Health officials have increased the miners' physical activity in recent days to gauge how they can handle the stress of being removed. The overall response has been good, though some miners have exhibited anxiety or have had minor cardiac issues, Manalich has said. The miners have been in contact with the outside world through a small bore hole that sends them food, water, supplies and other necessities. CNN's Karl Penhaul and Patrick Oppman contributed to this report. | NEWS-MULTISOURCE |
Dark Tourist
Dark Tourist (also known as The Grief Tourist) is a 2012 American psychological thriller film directed by Suri Krishnamma, written by Frank John Hughes, and starring Michael Cudlitz, Melanie Griffith, and Pruitt Taylor Vince. Cudlitz plays a bisexual security guard who engages in dark tourism. It premiered at Filmfest München on July 3, 2012, and Phase 4 Films released it theatrically on August 23, 2013.
Plot
Jim Tahna, a quiet and solitary man, explains in voice-over narration his hatred of society and his employers, though he enjoys his work as a security guard, as it allows him long periods of solitude. On his vacation time, he engages in dark tourism, the visitation of murder sites. His current subject is Carl Marznap, a mass murderer and arsonist. He leaves Yonkers, New York, to visit Carl's home in California. His neighbor at the cheap motel in which he stays, Iris, turns out to be a prostitute. Nervous, Jim fumbles in conversation with her, then states in voice-over how much he hates prostitutes. At a local restaurant, he meets Betsy, a friendly waitress. Jim introduces himself to her as Carl and falsely claims that his sister has been diagnosed with cancer. Betsy and Jim draw closer over their difficult lives, and she invites him to an Alcoholics Anonymous meeting.
On his tour of Marznap's home and crime scenes, Jim becomes increasingly disturbed by hallucinations and vague flashbacks. Eventually, Jim hallucinates Marznap himself, who urges him to teach the world what it feels like to be a victim. Once tortured and gang-raped in juvenile detention, Marznap explains that he sought revenge by burning down a church, as he blamed those people for doing nothing to help him while his father abused him. After the Alcoholics Anonymous meeting, Jim and Betsy bond further, and Betsy invites him to dinner at her house. Betsy offers him marijuana, and he reluctantly accepts. When she tries to kiss him, he becomes agitated and demands that they have sex without any affection. When she asks him to slow down, he berates her and leaves. Marznap encourages him to visit Iris. A trans woman, Iris has anal sex with Jim, and he flashbacks to a childhood gang rape.
Jim and Carl discuss their shared experiences, and Jim expresses his belief that he is broken beyond repair. The next day, at the restaurant, Betsy apologizes to Jim, and he calls her disgusting. She runs away crying, and Jim returns to his motel. Jim breaks into Iris' room, scares off her client, and beats her savagely. After he berates Iris, God, and the kids who raped him, he takes Iris to the church, where he strangles her. Marznap and Jim then discuss what to do next; Marznap counsels him to commit suicide, and Jim slits his own throat. In the epilogue, the police reveal that Jim has killed six trans-women prostitutes on his various dark tourism trips, and a young man visits Jim's house as part of his own dark tourism. Around a hole in the wall in Jim's house, a message reads, "From this void, no one returns!"
Cast
* Michael Cudlitz as Jim Tahna
* Melanie Griffith as Betsy
* Pruitt Taylor Vince as Carl Marznap
* Suzanne Quast as Iris
* Brad Bufanda as Manny
Production
Production was originally to take place in New Orleans but moved to Los Angeles after a money dispute. Cudlitz and Griffith were drawn to the film because of the writing.
Release
Dark Tourist premiered at Filmfest München on July 3, 2012. It received a limited release in the United States on August 23, 2013. It was released on Blu-ray, DVD in the United States on February 25, 2014.
Reception
Rotten Tomatoes, a review aggregator, reports that 33% of nine surveyed critics gave the film a positive review; the average rating was 4.7/10. Metacritic rated the film 40/100. Geoff Berkshire of Variety called it "a well-acted but rote and ultimately repellent character study". Karsten Kastelan of The Hollywood Reporter wrote that the film is unrelentingly dark, which makes it too uncomfortable to enjoy. Nicolas Rapold of The New York Times wrote that the film's mood is weakened by Vince's and Griffith's appearances, and the post-credits scene is "too clever by half". Annlee Ellingson of the Los Angeles Times criticized the film's pacing and called the climax "a grotesque, exploitive mess". Ernest Hardy of The Village Voice wrote that the film "veer[s] hard into cliché" but the actors give good performances. Gareth Jones of Dread Central rated it 1.5/5 stars and wrote, "What should be a deep and wounding trip to the edge of sanity remains far too understated and impenetrable for its own good." Becki Hawkes of Daily Dead rated it 4/5 stars and wrote, "There's an intense evocation of dread throughout: a crawling, fetid sense of evil, which some viewers may simply find too repellent to watch." | WIKI |
Suwayri
Suwayri (صويري, also spelled Suweireh or Swarey) is a village in northern Syria located northwest of Homs in the Homs Governorate. Nearby towns include Shin to the northwest, al-Mahfurah to the north, Ghur Gharbiyah to the northeast, Qazhal to the east, Khirbet Tin Nur to the southeast, Khirbet al-Hamam to the south, Hadidah to the southwest and Mazinah to the west. According to the Syria Central Bureau of Statistics, Suwayri had a population of 2,966 in the 2004 census, making it the second largest locality in the Shin nahiyah ("subdistrict"). Its inhabitants are predominantly Alawites. | WIKI |
New England Forest Rally
The New England Forest Rally is a performance rally event in New Hampshire and Maine, United States. Originally known as the Maine Forest Rally, it first appeared in 1991 as a winter rally. In the past, the event was part of the SCCA ProRally and Rally America schedule, now it is sanctioned by the American Rally Association.
The event is held mainly on logging roads with some of the longest stages in North America rallying. As the event is held during July, the road conditions are often dry and dusty.
In 1994 the Maine Summer Rally was added. The event ran as a 60% National/Divisional and as a full National event starting in 1995. In 1996 an in-town spectator stage was added to the summer event to the delight of the spectators. The most recent in-town stages, held at the Mexico Recreation Area, have featured a 1 meter high man-made jump.
At its peak, the Maine Forest Rally had the highest number of starting cars in the SCCA ProRally series. The 2001 event, with 121 National and ClubRally starting teams, broke the 111 car starting record held by the 2000 Maine Forest Rally. As a bellwether of the event's success, it was voted the SCCA's ProRally of the Year in 1992 and again in 2001.
In 2007, the name of the event was changed to the New England Forest Rally to better reflect the continued growth of the event by expanding to include stages in the city of Berlin, New Hampshire.
Notable competitors
The 1999 event saw 1984 World Rally Champion Stig Blomqvist drive the late Carl Merrill's Ford Escort Cosworth to victory over 83 National and Divisional teams.
In 2007, freestyle motocross star turned rally driver Travis Pastrana drove a Subaru Rally Team USA WRX STi to victory.
Ken Block, co-founder of DC Shoe Co. and rally driver competed at the New England Forest Rally regularly.
John Buffum, the most successful American-born rally driver ever, was a key organizer of the event, and in 2008, he drove his Group B Audi Quattro on the first stage of the event.
=== Past winners === | WIKI |
unified framework
Recently Published Documents
TOTAL DOCUMENTS
3003
(FIVE YEARS 1385)
H-INDEX
88
(FIVE YEARS 27)
2022 ◽
Vol 16 (1) ◽
pp. 1-26
Author(s):
Bang Liu ◽
Hanlin Zhang ◽
Linglong Kong ◽
Di Niu
It is common practice for many large e-commerce operators to analyze daily logged transaction data to predict customer purchase behavior, which may potentially lead to more effective recommendations and increased sales. Traditional recommendation techniques based on collaborative filtering, although having gained success in video and music recommendation, are not sufficient to fully leverage the diverse information contained in the implicit user behavior on e-commerce platforms. In this article, we analyze user action records in the Alibaba Mobile Recommendation dataset from the Alibaba Tianchi Data Lab, as well as the Retailrocket recommender system dataset from the Retail Rocket website. To estimate the probability that a user will purchase a certain item tomorrow, we propose a new model called Time-decayed Multifaceted Factorizing Personalized Markov Chains (Time-decayed Multifaceted-FPMC), taking into account multiple types of user historical actions not only limited to past purchases but also including various behaviors such as clicks, collects and add-to-carts. Our model also considers the time-decay effect of the influence of past actions. To learn the parameters in the proposed model, we further propose a unified framework named Bayesian Sparse Factorization Machines. It generalizes the theory of traditional Factorization Machines to a more flexible learning structure and trains the Time-decayed Multifaceted-FPMC with the Markov Chain Monte Carlo method. Extensive evaluations based on multiple real-world datasets demonstrate that our proposed approaches significantly outperform various existing purchase recommendation algorithms.
2022 ◽
Vol 16 (4) ◽
pp. 1-24
Author(s):
Kui Yu ◽
Yajing Yang ◽
Wei Ding
Causal feature selection aims at learning the Markov blanket (MB) of a class variable for feature selection. The MB of a class variable implies the local causal structure among the class variable and its MB and all other features are probabilistically independent of the class variable conditioning on its MB, this enables causal feature selection to identify potential causal features for feature selection for building robust and physically meaningful prediction models. Missing data, ubiquitous in many real-world applications, remain an open research problem in causal feature selection due to its technical complexity. In this article, we discuss a novel multiple imputation MB (MimMB) framework for causal feature selection with missing data. MimMB integrates Data Imputation with MB Learning in a unified framework to enable the two key components to engage with each other. MB Learning enables Data Imputation in a potentially causal feature space for achieving accurate data imputation, while accurate Data Imputation helps MB Learning identify a reliable MB of the class variable in turn. Then, we further design an enhanced kNN estimator for imputing missing values and instantiate the MimMB. In our comprehensively experimental evaluation, our new approach can effectively learn the MB of a given variable in a Bayesian network and outperforms other rival algorithms using synthetic and real-world datasets.
2022 ◽
Vol 40 (4) ◽
pp. 1-27
Author(s):
Hongwei Wang ◽
Jure Leskovec
Label Propagation Algorithm (LPA) and Graph Convolutional Neural Networks (GCN) are both message passing algorithms on graphs. Both solve the task of node classification, but LPA propagates node label information across the edges of the graph, while GCN propagates and transforms node feature information. However, while conceptually similar, theoretical relationship between LPA and GCN has not yet been systematically investigated. Moreover, it is unclear how LPA and GCN can be combined under a unified framework to improve the performance. Here we study the relationship between LPA and GCN in terms of feature/label influence , in which we characterize how much the initial feature/label of one node influences the final feature/label of another node in GCN/LPA. Based on our theoretical analysis, we propose an end-to-end model that combines GCN and LPA. In our unified model, edge weights are learnable, and the LPA serves as regularization to assist the GCN in learning proper edge weights that lead to improved performance. Our model can also be seen as learning the weights of edges based on node labels, which is more direct and efficient than existing feature-based attention models or topology-based diffusion models. In a number of experiments for semi-supervised node classification and knowledge-graph-aware recommendation, our model shows superiority over state-of-the-art baselines.
Author(s):
Damien Depannemaecker ◽
Anton Ivanov ◽
Davide Lillo ◽
Len Spek ◽
Christophe Bernard ◽
...
AbstractThe majority of seizures recorded in humans and experimental animal models can be described by a generic phenomenological mathematical model, the Epileptor. In this model, seizure-like events (SLEs) are driven by a slow variable and occur via saddle node (SN) and homoclinic bifurcations at seizure onset and offset, respectively. Here we investigated SLEs at the single cell level using a biophysically relevant neuron model including a slow/fast system of four equations. The two equations for the slow subsystem describe ion concentration variations and the two equations of the fast subsystem delineate the electrophysiological activities of the neuron. Using extracellular K+ as a slow variable, we report that SLEs with SN/homoclinic bifurcations can readily occur at the single cell level when extracellular K+ reaches a critical value. In patients and experimental models, seizures can also evolve into sustained ictal activity (SIA) and depolarization block (DB), activities which are also parts of the dynamic repertoire of the Epileptor. Increasing extracellular concentration of K+ in the model to values found during experimental status epilepticus and DB, we show that SIA and DB can also occur at the single cell level. Thus, seizures, SIA, and DB, which have been first identified as network events, can exist in a unified framework of a biophysical model at the single neuron level and exhibit similar dynamics as observed in the Epileptor.Author Summary: Epilepsy is a neurological disorder characterized by the occurrence of seizures. Seizures have been characterized in patients in experimental models at both macroscopic and microscopic scales using electrophysiological recordings. Experimental works allowed the establishment of a detailed taxonomy of seizures, which can be described by mathematical models. We can distinguish two main types of models. Phenomenological (generic) models have few parameters and variables and permit detailed dynamical studies often capturing a majority of activities observed in experimental conditions. But they also have abstract parameters, making biological interpretation difficult. Biophysical models, on the other hand, use a large number of variables and parameters due to the complexity of the biological systems they represent. Because of the multiplicity of solutions, it is difficult to extract general dynamical rules. In the present work, we integrate both approaches and reduce a detailed biophysical model to sufficiently low-dimensional equations, and thus maintaining the advantages of a generic model. We propose, at the single cell level, a unified framework of different pathological activities that are seizures, depolarization block, and sustained ictal activity.
Econometrics ◽
2022 ◽
Vol 10 (1) ◽
pp. 5
Author(s):
Ron Mittelhammer ◽
George Judge ◽
Miguel Henry
In this paper, we introduce a flexible and widely applicable nonparametric entropy-based testing procedure that can be used to assess the validity of simple hypotheses about a specific parametric population distribution. The testing methodology relies on the characteristic function of the population probability distribution being tested and is attractive in that, regardless of the null hypothesis being tested, it provides a unified framework for conducting such tests. The testing procedure is also computationally tractable and relatively straightforward to implement. In contrast to some alternative test statistics, the proposed entropy test is free from user-specified kernel and bandwidth choices, idiosyncratic and complex regularity conditions, and/or choices of evaluation grids. Several simulation exercises were performed to document the empirical performance of our proposed test, including a regression example that is illustrative of how, in some contexts, the approach can be applied to composite hypothesis-testing situations via data transformations. Overall, the testing procedure exhibits notable promise, exhibiting appreciable increasing power as sample size increases for a number of alternative distributions when contrasted with hypothesized null distributions. Possible general extensions of the approach to composite hypothesis-testing contexts, and directions for future work are also discussed.
2022 ◽
Vol 12 (1) ◽
Author(s):
Etienne Granet ◽
Henrik Dreyer ◽
Fabian Essler
We consider the XY spin chain with arbitrary time-dependent magnetic field and anisotropy. We argue that a certain subclass of Gaussian states, called Coherent Ensemble (CE) following [1], provides a natural and unified framework for out-of-equilibrium physics in this model. We show that all correlation functions in the CE can be computed using form factor expansion and expressed in terms of Fredholm determinants. In particular, we present exact out-of-equilibrium expressions in the thermodynamic limit for the previously unknown order parameter 1-point function, dynamical 2-point function and equal-time 3-point function.
2022 ◽
Vol 2022 ◽
pp. 1-13
Author(s):
Peng Wang ◽
Jing Yang ◽
Jianpei Zhang
Unlike outdoor trajectory prediction that has been studied many years, predicting the movement of a large number of users in indoor space like shopping mall has just been a hot and challenging issue due to the ubiquitous emerging of mobile devices and free Wi-Fi services in shopping centers in recent years. Aimed at solving the indoor trajectory prediction problem, in this paper, a hybrid method based on Hidden Markov approach is proposed. The proposed approach clusters Wi-Fi access points according to their similarities first; then, a frequent subtrajectory based HMM which captures the moving patterns of users has been investigated. In addition, we assume that a customer’s visiting history has certain patterns; thus, we integrate trajectory prediction with shop category prediction into a unified framework which further improves the predicting ability. Comprehensive performance evaluation using a large-scale real dataset collected between September 2012 and October 2013 from over 120,000 anonymized, opt-in consumers in a large shopping center in Sydney was conducted; the experimental results show that the proposed method outperforms the traditional HMM and perform well enough to be usable in practice.
Sensors ◽
2022 ◽
Vol 22 (2) ◽
pp. 457
Author(s):
Wei Zhou ◽
Hongliang Cai ◽
Guo Chen ◽
Wenhai Jiao ◽
Qianqian He ◽
...
Global navigation services from the quad-constellation of GPS, GLONASS, BDS, and Galileo are now available. The international GNSS monitoring and assessment system (iGMAS) aims to evaluate the navigation performance of the current quad systems under a unified framework. In order to assess impact of orbit and clock errors on the positioning accuracy, the user range error (URE) is always taken as a metric by comparison with the precise products. Compared with the solutions from a single analysis center, the combined solutions derived from multiple analysis centers are characterized with robustness and reliability and preferred to be used as references to assess the performance of broadcast ephemerides. In this paper, the combination method of iGMAS orbit and clock products is described, and the performance of the combined solutions is evaluated by various means. There are different internal precisions of the combined orbit and clock for different constellations, which indicates that consistent weights should be assigned for individual constellations and analysis centers included in the combination. For BDS-3, Galileo, and GLONASS combined orbits of iGMAS, the root-mean-square error (RMSE) of 5 cm is achieved by satellite laser ranging (SLR) observations. Meanwhile, the SLR residuals are characterized with a linear pattern with respect to the position of the sun, which indicates that the solar radiation pressure (SRP) model adopted in precise orbit determination needs further improvement. The consistency between combined orbit and clock of quad-constellation is validated by precise point positioning (PPP), and the accuracies of simulated kinematic tests are 1.4, 1.2, and 2.9 cm for east, north, and up components, respectively.
Sign in / Sign up
Export Citation Format
Share Document | ESSENTIALAI-STEM |
Manual: 2009-2012
Page: 155
Deactivating voice control
You can deactivate the voice control system as follows:
• Press the button on the Operating Lever for onboard computer (sports car) or on the stalk for the turn signal, high beam, and headlamp flasher (Cayenne).
- or -
• Say the "stop", "quit", "terminate", "end", or "cancel" commands if the voice control system is awaiting a command.
After you deactivate the system, you hear the announcement "End" in confirmation and the voice control system then switches off.
Setting the volume
You can change the volume of the voice control system announcements to compensate for changes in the ambient noise during the journey, for example.
1. Activate the voice control system and say a command such as "help", for example.
2. Turn the volume control on your device during an announcement to raise or lower the volume of the announcement.
The volume of the voice control system announcements is independent of that of the telephone and audio system.
Setting the language
The voice control system recognizes various languages. When you change the language, it affects the voice input by the user, the voice output by the PCM, and the language shown on the display.
1. Press the button.
2. Press the button or touch the tab of the same name in the header.
3. Select "SET PCM system"
> "Regional settings"
> "Language".
4. Select the desired language.
The corresponding language is set.
Configuring the voice control system
You can configure how you interact with the voice control system in just a few steps.
1. Press the button.
2. Press the button or touch the tab of the same name in the header.
3. Select "SET PCM system"
> "Voice control". | ESSENTIALAI-STEM |
A New York-based book designer on her first visit to India’s premier literary festival, held in a 200-year-old palace in Jaipur.
Palace Coup | Jaipur’s Literary Festival
Jaipur, India, may be called “The Pink City,” but in truth it’s gray and dusty, a wonderful place of crumbling beauty. Now in its fifth year, the DSC Jaipur Literature Festival, which was held inside a 200-year-old palace at the end of January, is breathing new life into this very old town. The event draws an increasingly curious cross-section of India’s vibrant literary scene: authors, publishers, readers, schoolchildren, old poets, young journalists, socialites, minor royalty, major art collectors, literary aspirants, Nosy Parkers — in short anyone who has ever felt the power of a good book. | NEWS-MULTISOURCE |
ARRIVE guidelines
The ARRIVE guidelines are a set of guidelines for improving experimental design and reporting standards for animal research, drawn up by the National Centre for the Replacement, Refinement and Reduction of Animals in Research. | WIKI |
User:Mauriziok/List of Mister Universe Venezuela editions
The following is a list of Mister Universe Venezuela pageant edition and information.
Host city by number
Currently all 9 editions are held in Caracas.
Currently 2 theaters had served as locations for the Mister Universe Venezuela pageant.
* Location count | WIKI |
A glass of water with measurement tape
The Age-Old Question: Does Sugar Cause Cancer?
I hear this question all of the time, "Does sugar cause cancer? If I eat sugar, am I going to get cancer or is my cancer going to grow?"
Is sugar the culprit?
Well ... just because you consume sugar does not mean that you will get cancer or that cancer you have will have a growth explosion. On the flip side, scientists are connecting obesity to cancer. In fact, a 2015 article by Jennifer Castoro for Memorial Sloan Kettering Cancer Center (MSKCC) is headlined, "Obesity Could Soon Be the Leading Preventable Cause of Cancer in the United States." (Hmmm, will patients one day be asked, "Oh, were you fat?" instead of "Oh, did you smoke?" Will the stigma be the same?)
In December 2016, another MSKCC article, "No Sugar, No Cancer? A Look at the Evidence," was published. Once more, obesity, not sugar itself, is seen as the link to cancer. Fat cells, once thought to be simply a way to store fat, are actually signaling cells. In fact, they "are a major regulator of inflammation in the body."1 Inflammation can cause damage to the DNA of cells, which in turn may turn malignant.
Sugar, in and of itself, will not cause cancer or tumor growth. The reason is that your body maintains a certain blood glucose level. If you eat less sugar, your body will simply convert other resources to glucose. The MSKCC article about sugar says that it's very hard to affect glucose levels simply by changing your diet.1 The fact is, your body has to have a certain amount of sugar to function. And, at present, there is no way to tell normal cells they can have glucose and cancer cells that they cannot.
Looking to the research
According to an article published by Cancer Research UK:
"Glucose is the basic fuel that powers every single one of our cells. If we eat or drink things that are high in glucose, such as fizzy drinks, the glucose gets absorbed straight into our blood ready for our cells to use. If a starchy food, such as pasta, is on the menu, the enzymes in our saliva and digestive juices break it down and convert it into glucose. And if for some reason there’s no carbohydrate in our diet, cells can turn fat and protein into glucose as a last resort, because they need glucose to survive."2
An article published by another leading cancer center, MD Anderson Cancer Center, corroborates this. "Does Sugar Cause Cancer?" says that avoiding sugar is not the answer to preventing cancer.3 After all, as noted above, sugar (glucose) is required to keep our vital organs functioning. In fact, cutting out too much sugar (carbohydrates) could even damage our health by "eliminating foods that are good sources of fiber and vitamins."2
A healthy diet is still important
Nevertheless, we should monitor the amount of sugar we eat because sugars do contribute to obesity. The American Heart Association recommends that women eat no more than six teaspoons of sugar per day and men should have no more than nine teaspoons per day. Most of us consume far more.
Remember that sugar is not just in cookies, candy, and cake. Canned and processed foods are loaded with it. Labels may not show "sugar" as an ingredient, but watch for the words fructose, lactose, sucrose, maltose, glucose, and/or dextrose.2 Keep in mind that natural sugars (molasses, agave, honey, maple syrup) actually have antioxidants in them that can help you fight cancer. However, they are still rich in calories so care should be taken when consuming them.
By providing your email address, you are agreeing to our privacy policy.
This article represents the opinions, thoughts, and experiences of the author; none of this content has been paid for by any advertiser. The LungCancer.net team does not recommend or endorse any products or treatments discussed herein. Learn more about how we maintain editorial integrity here.
Join the conversation
Please read our rules before commenting. | ESSENTIALAI-STEM |
Skip to main content
Table 1 Key recommendations of the adapted bronchiolitis CPG
From: Bronchiolitis diagnosis, treatment, and prevention in children: an evidence-based clinical practice guideline adapted for the use in Egypt based on the ‘Adapted ADAPTE’ Methodology
Qs Health questions Clinical recommendations Source guideline Evidencea
Diagnosis
1 a In infants presenting to hospital or hospitalized, how can clinician diagnose Clinicians should diagnose bronchiolitis and assess disease severity on the basis of history and physical examination AAP [12] Evidence B
Strong recommendation
1b In infants presenting to hospital what factors in history and physical examination contribute to diagnosis of bronchiolitis? The major factors which were predictive were fever, cough, tachypnea, retractions, and wheeze. PREDICT [11] Evidence C
Weak recommendation
2 In infants presenting to hospital with bronchiolitis, what are the risk factors for admission or severe disease Clinicians should consider as risk factors for more serious illness: gestational age less than 37 weeks; chronological age at presentation less than 10 weeks; exposure to cigarette smoke; breast feeding for less than 2 months; failure to thrive; having chronic lung disease; having chronic heart and/or chronic neurological conditions. PREDICT [11] Evidence C
Grade: Conditional
3 In infants presenting to hospital or hospitalized with bronchiolitis, does performing a ChestX-ray beneficially change medical treatment or clinically relevant end-points? When clinicians diagnose bronchiolitis on the basis of history and physical examination, radiographic studies should not be obtained routinely AAP [12] Evidence B
4 In infants presenting to hospital or hospitalized with bronchiolitis, does performing laboratory tests (blood and/or urine) beneficially change medical treatment or clinically relevant end-points? When clinicians diagnose bronchiolitis on the basis of history and physical examination, laboratory studies should not be obtained routinely AAP [12] Evidence B
5 In infants presenting to hospital or hospitalized with bronchiolitis, does performing virological investigations beneficially change medical treatment or clinically relevant end-points? In infants with bronchiolitis, routine use of viral testing is not recommended for any clinically relevant end-points. PREDICT [11] Evidence C
6 For infants presenting to hospital or hospitalized with bronchiolitis, does use of a bronchiolitis scoring system beneficially change medical treatment or clinically relevant end-points? For infants presenting to hospital or hospitalized with bronchiolitis, there is insufficient evidence to recommend the use of a scoring system to predict need for admission or hospital length of stay PREDICT [11] Evidence D
Grade: weak
Treatment
7 For infants presenting to hospital or hospitalized with bronchiolitis, what criteria should be used for safe discharge? Oxygen saturations, adequacy of feeding, age (infants younger than 8 weeks), and social support should be considered at the time of discharge as a risk for representation. PREDICT [11] Grade: Good Practice Point
8a Does administration of B2 agonist improve clinically relevant outcome in infants and children with bronchiolitis? Bronchodilators should not be used routinely in the treatment of bronchiolitis in infants and children. PREDICT [11] Evidence A
Strong recommendation
8b In hospitalized infants with bronchiolitis, with personal or family history of atopy, does the use of B2 agonist improve clinically relevant outcome? Inhaled bronchodilators should be continued only if there is a documented positive clinical response to the trail using an objective means for evaluation. PREDICT [11] Evidence A
Strong recommendation
9 Does the use of inhaled 3% saline improve clinical outcome in infants hospitalized with bronchiolitis? Clinicians may administer nebulized hyper tonic saline to infants and children hospitalized for bronchiolitis AAP [12] Evidence: B
Moderate recommendation
10 Does the inhaled Epinephrine improve relevant outcome? Do not administer Epinephrine to infants presenting to hospital or hospitalized with bronchiolitis. PREDICT [11] Evidence B
Strong recommendation
11 In hospitalized infants with bronchiolitis, does administration of combination of systemic or inhaled corticosteroids and adrenaline improve clinically relevant outcome? Do not administer a combination of systemic or local steroids and nebulized epinephrine to infants presenting to hospital or hospitalized with bronchiolitis. PREDICT [11] Evidence D
Weak recommendation
12 Does the use of corticosteroids improve clinically relevant outcome? Corticosteroid (systemic or local) medication should not be used in the treatment of bronchiolitis PREDICT [11] Evidence B
Strong recommendation
13 Does the use of antiviral treatment improve clinically relevant outcome? The clinician should not use routinely Ribavirin in children with bronchiolitis? AAP [12] Evidence B
14a In infants presenting to hospital or hospitalized with bronchiolitis, does administration of supplemental oxygen improve clinically relevant end-points? Consider the use of supplemental oxygen in the treatment of hypoxic (oxygen saturations less than 92%) infants with bronchiolitis. PREDICT [11] Evidence C
14b In infants presenting to hospital or hospitalized with bronchiolitis, what level of oxygen saturation should lead to commencement or discontinuation of supplemental oxygen to improve clinically relevant end-points? In uncomplicated bronchiolitis oxygen supplementation should be commenced if the oxygen saturation level is sustained at a level less than 92%. At oxygen saturation levels of greater than or equal to 92%, oxygen therapy should be discontinued. PREDICT [11] Evidence C
14c In infants hospitalized with bronchiolitis does the use of heated humidified high flow oxygen, or air, via nasal cannula improve clinically relevant end-points? The clinician should use heated humidified high flow oxygen, or air, via nasal cannula for the inpatient setting in children with bronchiolitis with hypoxia (oxygen saturations < 92%). PREDICT [11] Evidence C
15 In infants hospitalized with bronchiolitis does continuous monitoring of pulse oximetry beneficially change medical treatment or clinically relevant endpoints? Routine use of continuous pulse oximetry is not required for treatment of non-hypoxic infants (saturations ≥ 92%) not receiving oxygen, or stable infants receiving oxygen. PREDICT [11] Evidence C
16 In infants hospitalized with bronchiolitis, does chest physiotherapy improve clinically relevant end-points? Chest physiotherapy is not recommended for routine use in infants with bronchiolitis. PREDICT [11] Evidence B
17a In infants hospitalized with bronchiolitis, does suctioning of the nose or naso-pharynx improve clinically relevant end-points? Nasal suction is not recommended as routine practice in the treatment of infants with bronchiolitis. Superficial suction may be considered to assist with feeding. PREDICT [11] Evidence D
17b In infants hospitalized with bronchiolitis, does the use of nasal saline drops improve clinically relevant end-points? Routine nasal saline drops are not recommended. Trial of intermittent saline drops may be considered at time of feeding. PREDICT [11] Evidence D
Weak recommendation
18 In infants hospitalized with bronchiolitis, does the use of CPAP improve clinically relevant end-points? Nasal CPAP for infants with bronchiolitis may be considered for the treatment. PREDICT [11] Evidence C
19 In infants hospitalized with bronchiolitis, is provision of home oxygen a safe alternative for treatment? After a period of observation, infants at low risk for severe bronchiolitis can be considered for discharge on home oxygen as part of an organized ‘Home Oxygen Program’ which has clear ‘Return to Hospital’ advice. PREDICT [11] Evidence C
20 Does the use of antibacterial medication is beneficial in treatment of bronchiolitis and improve clinically relevant outcome? Antibacterial medication should be used only in children with bronchiolitis who have specific indications of coexistence of bacterial infection. PREDICT [11] Evidence B
21a In infants presenting to hospital or hospitalized with bronchiolitis, does the use of oral or non-oral hydration improve clinically relevant end-points? Supplemental hydration is recommended for infants who cannot maintain hydration orally. AAP [12] Evidence Quality: X
Recommendation Strength: Strong
21b In infants presenting to hospital or hospitalized with bronchiolitis, what forms of non-oral hydration improve clinically relevant end-points Both NG and IV routes are acceptable means for non-oral hydration in infants admitted to hospital with bronchiolitis. AAP [12] Evidence Quality: X
Recommendation Strength: Strong
21c In infants presenting to hospital or hospitalized with bronchiolitis, does limiting the volume of non-oral hydration impact on clinical relevant end-points? There is insufficient evidence to recommend a specific proportion of maintenance fluid. There is a risk of fluid overload. Judicious use of isotonic hydration fluid is recommended. PREDICT [11] Evidence D
Weak recommendation
Prevention
22 What are the criteria for giving Palivizumab prophylaxis to infants and children by a clinician? Clinicians may administer palivizumab prophylaxis to selected infants and children with chronic lung disease or a history of prematurity (less than 35 weeks gestation) or with congenital heart disease. AAP [12] Evidence A
23 How the clinicians prescribe the dose, frequency, and duration of the palivizumab prophylaxis to the selected infants? The clinician should give prophylaxis with palivizumab in 5-monthly doses, usually beginning in November or December at a dose of 15 mg/kg per dose intramuscular. AAP [12] Evidence C
24 Does hand decontamination for clinician prevent nosocomial spread of RSV? Hand decontamination is the most important step in preventing nosocomial spread of RSV. Hand should be decontaminated before and after direct contact with patients, after contact with inanimate objects in the direct vicinity of the patient, and after removing gloves AAP [12] Evidence B
Strong recommendation
25 What is the preferred disinfectant to be used by the clinician? Alcohol-based rubs are preferred for hand decontamination. An alternative is hand-washing with antimicrobial soap AAP [12] Evidence B
26 Should the clinicians educate personnel and family members on hand sanitation? Clinicians should educate personnel and family members on hand sanitation AAP [12] Evidence C
27 Does tobacco smoking affect the clinical outcome in treatment of bronchiolitis in infants and children? Infants should not be exposed to passive smoking AAP [12] Evidence B
Strong recommendation
28 Does breastfeeding affect the risk of having lower respiratory tract disease in infants? Breastfeeding is recommended to decrease a child’s risk of having lower respiratory tract infection AAP [12] Evidence C
1. aFor explanation of the classification of the level of evidence and grade of recommendations, refer to the two Source CPGs: PREDICT and AAP [11, 12] | ESSENTIALAI-STEM |
Médée (Cherubini)
Médée is a French language opéra-comique by Luigi Cherubini. The libretto by François-Benoît Hoffman (Nicolas Étienne Framéry) was based on Euripides' tragedy of Medea and Pierre Corneille's play Médée. It is set in the ancient city of Corinth.
The opera was premiered on 13 March 1797 at the Théâtre Feydeau, Paris. It met with a lukewarm reception and was not immediately revived. During the twentieth century, it was usually performed in Italian translation as Medea, with the spoken dialogue replaced by recitatives not authorized by the composer. More recently, some performances have used Cherubini's original version.
The long-lost final aria, which Cherubini appears to have elided from his original manuscript, was discovered by researchers from the University of Manchester and Stanford University by employing x-ray techniques to reveal the blackened out areas of Cherubini's manuscript.
Performances and versions
Several versions of the opera were produced and staged in Italian and German:
* 1800: German translation by Karl Alexander Herklots was premiered in Berlin on 17 February 1800
* 1802: Another German translation by Georg Friedrich Treitschke was premiered in Vienna on 6 November 1802.
* 1809: The shortened version of the Treitschke translation was given in Vienna, where Cherubini produced a version which omitted some 500 bars of music
* 1855: Franz Lachner's German version was given in Frankfurt. This was based on the shortened Vienna version, but with recitatives composed by Lachner which replaced the spoken dialogue.
* 1865: The United Kingdom premiere was given in Italian at Her Majesty's Theatre on 6 June, with recitatives by Luigi Arditi, and Thérèse Tietjens in the title role. Cherubini's son and grandson were among the audience. This performance received a highly enthusiastic review in The Times.
* 1909: The Italian translation of the Lachner version by Carlo Zangarini was prepared for its Italian premiere at the Teatro alla Scala, on 30 December 1909, and starred Ester Mazzoleni. It was this hybrid version that was revived in 1953 for Maria Callas.
Callas revivals (1953–1962)
* Perhaps the most famous 20th-century revival of the work was in Florence in 1953, with Maria Callas in the title role, conducted by Vittorio Gui. Callas learned and performed the role within a week, to critical acclaim. The production was so successful that the Teatro alla Scala decided to stage this opera during the opening week of its 1953–1954 season, with Leonard Bernstein filling in for an indisposed Victor de Sabata and staged by Margherita Wallmann.
* Callas performed the role throughout the 1950s and early 1960s, with possibly the most famous production being by the Dallas Opera in 1958, conducted by Nicola Rescigno (with Jon Vickers as Jason and Teresa Berganza as Néris) and directed by the Greek director Alexis Minotis. This production traveled to the Royal Opera House, Covent Garden, in London in 1959, in the Ancient Theatre of Epidaurus in 1961 with the collaboration of the Greek National Opera and to La Scala (where a few minutes of it were filmed) in 1961–62. It was in these performances that Callas made her last appearances in Italy.
* The Rescigno–Minotis production was successfully revived again for Magda Olivero in Dallas (1967) and Kansas City (1968).
Late 20th-century revivals
* 1984–1995: Revivals of the original French version were given at the Buxton Festival on 28 July 1984; at The Royal Opera House, Covent Garden on 6 November 1989; and at the Valle d'Itria Festival on 4 August 1995.
* 1996: The shortened Vienna version was given in an English translation and sung in English by Opera North in Leeds in April 1996.
* March 1997: A Bicentennial production by Opera Quotannis presented an unabridged (text and music) version (with a period-instrument orchestra) of the original opéra-comique at Alice Tully Hall, Lincoln Center, commemorating the bicentennial of the premiere. Bart Folse conducted Brian Morgan's stylized production, which featured Phyllis Treigle (in the title role), Carl Halvorson (as Jason), D'Anna Fortunato (as Néris), David Arnold (as Créon), Thaïs St Julien (as Dircé), and Jayne West and Andrea Matthews (as the Handmaidens of Dircé). Peter G. Davis, in New York magazine, wrote that "Opera Quotannis delivers Cherubini's Médée in all its original glory.... The occasion proved that the real Médée is indeed a masterpiece. Its weak sister, the doctored Medea we've been hearing all these years, should now be permanently set aside." Newport Classic subsequently recorded the production for Compact Disc.
The role of Médée is famed for its difficulty. Other famous interpreters of the role in the 20th century included Dame Josephine Barstow, Montserrat Caballé, Eileen Farrell, Marisa Galvany, Leyla Gencer, Dame Gwyneth Jones, Nadja Michael, Maralin Niska, Leonie Rysanek, Sylvia Sass, Anja Silja, Dunja Vejzovic, and Shirley Verrett. Anna Caterina Antonacci performed the Italian version in the first decade of the 21st century: the recording of a performance from the 2008 Turin edition has been released on DVD. The opera, in its Italian version, was performed for the first time at the Metropolitan Opera in 2022, with Sondra Radvanovsky, Matthew Polenzani, Janai Brugger, Michele Pertusi, and Ekaterina Gubanova. It was featured on the Metropolitan Opera Live in HD on Saturday, October 22, 2022 and an encore showing took place on Wednesday, October 26, 2022.
Synopsis
* Place: Corinth
* Time: Antiquity
Act 1
Outside the palace of King Créon
Dircé is preparing for her wedding to Jason. Years ago, Jason had stolen the golden fleece with the help of Médée, who had betrayed her family and established a relationship with Jason, the result of which was two children. Although Jason has since abandoned Médée, she reappears and demands that he return to her. Jason refuses and Médée curses him, swearing vengeance.
Act 2
Inside the palace
In despair, Médée is encouraged by her slave, Néris, to leave the city. Créon then appears and orders that Médée leave. She asks for one more day with her children and, after the king agrees, she appears to be calmer and gives Néris two wedding presents to take to her rival.
Act 3
Between the palace and the temple
Néris brings the two children out to where Médée is waiting. Sounds of lamentation are heard from within the palace and it is discovered that one of Médée's wedding presents has poisoned Dircé. An angry crowd gathers and Néris, Médée, and the children take refuge in the temple. From the temple, the two women reappear with Médée grasping a blood-stained knife with which she has killed her two children. Médée curses Jason and disappears into the air. The temple goes up in flames and the crowd flees in terror.
Recordings
Original French version:
Italian translation, with recitatives by Franz Lachner:
Influence
Ludwig van Beethoven esteemed Cherubini, and owned a copy of the score of Médée; themes from Beethoven's Pathétique Sonata have a strong likeness to figures and ideas in the opera. | WIKI |
Full Screen ZC Makes Me Sad [Archive] - Armageddon Games Forums
PDA
View Full Version : Full Screen ZC Makes Me Sad
Modus Ponens
07-16-2017, 10:38 PM
[Edit: before I said my problem occurred in both ZC and ZQ, when in reality, it only happens as described in ZC — there's an entirely different problem in ZQ]
Hey guys, I guess I haven't posted in... like at least five years or more. Hi.
So, this thread (http://www.armageddongames.net/showthread.php?96844-Fullscreen-Issue) talks about a bug that plagues me as well. If I run ZC in full screen, it flickers the whole time that the game is running. It's like it's showing the game properly for one frame, and then the next frame it's all blue with some stuff on the left side of the screen.
Proper frame (http://i.imgur.com/B70JtWo.png), and glitch frame (http://i.imgur.com/a2WMvIA.png), rapidly alternating between the two. (Note that these two frames do not perfectly correspond to one another — I moved Link around a little bit between them, but ZC crashed while I was trying to take screenshots and I didn't feel like launching it again.)
As you might be able to see from these images, it appears that the glitch frame is actually the data from the proper frame, but kind of squished against the left side of the screen and without proper color palette information. I don't suppose that diagnosis will help at all, but there it is.
For the record, I'm running 2.50.2, launched from the ZC Launcher with the launcher's Screen Mode set to "Full Screen". I'm running Windows 10 Pro (version 1703, build number 15063.413) on a Retina Macbook Pro, with its NVIDIA GeForce GT 750M graphics card, in case any of this matters.
As an aside, I can't tell you how nice it is to see that ZC is still around after all these years, and in such good hands. Please keep it up!
Saffith
07-17-2017, 12:10 AM
Try setting
doublebuffer = 1
in the zeldadx section of ag.cfg.
Modus Ponens
07-17-2017, 01:12 AM
Radical. Thank you, Saffith, that helps very much. However, problems persist.
First of all, your solution is actively defeated by the launcher, who seems to gleefully overwrite the doublebuffer setting when I use it to launch ZC. If I launch it directly via zelda-w.exe, everything's fine. Is there a way around this?
Secondly, I goofed in my initial report (which I have now edited): I said that that behavior occurs in both ZC and ZQuest. In reality, the glitchy behavior I described does not happen in ZQ, though it still doesn't work. In ZQ, when I try to enable fullscreen, it tries to open a full-screen-sized window. It remains visible with only black contents for a few moments, and then it disappears. A few moments later, it tries and fails again. This repeats several times, before ZQ finally gives up and goes back to windowed mode.
Any thoughts on this matter?
Gleeok
07-17-2017, 02:21 AM
Sounds like it is running through the available supported hardware (GPU) display settings and failing? I'm not sure. What does allegro.log report? Triple buffering started to become a problem once windows went to 8 (false positives result in crashes) and 10, so I would make sure triple-buffering is not set in the config file (If you say it gets reverted by ZL?). Triple-buffer is officially permanently deprecated now in 2.50.3.
Are you running wine, and does the Mac build work any better?
Modus Ponens
07-17-2017, 06:24 AM
Hi, Gleeok. No, I'm not running Wine, I'm using Boot Camp to run Windows natively. It doesn't seem that triple-buffering is ever being set.
Here's my Allegro dump:
ZQuest v2.50 (Build 29)
Allocating tunes buffer (16.00k/16.00k)... OK
Allocating map buffer (1008.84k/1.00M)... OK
Allocating combo buffer (5.98k/1.01M)... OK
Allocating string buffer (680.00k/1.67M)... OK
Allocating door combo buffer (159.50k/1.83M)... OK
Allocating dmap buffer (234.00k/2.06M)... OK
Allocating combo buffer (1.62M/3.67M)... OK
Allocating color data buffer (314.11k/3.98M)... OK
Allocating tile buffer (8.50M/12.48M)... OK
Allocating tile grab buffer (511.88k/20.98M)... OK
Allocating trash buffer (97.66k/21.07M)... OK
Allocating item buffer (31.12k/21.10M)... OK
Allocating weapon buffer (2.50k/21.10M)... OK
Allocating guy buffer (70.00k/21.17M)... OK
Allocating combo class buffer (33.30k/21.21M)... OK
Allocating combo undo buffer (1.62M/22.82M)... OK
Allocating new tile undo buffer (511.88k/23.32M)... OK
Resetting new tile buffer...OK
Allocating file path buffers (14.00k/23.33M)... OK
Initializing Allegro... OK
Loading data files:
Fonts.Dat...OK
ZQuest.Dat...OK
QST.Dat...OK
SFX.Dat...OK
OK
Initializing sound driver... OK
gfx mode set at -2 8bpp 800 x 600
Loading Quest: c:\Users\Modus Ponens\Desktop\- Gams -\Zelda Classic\Quests\NewThing.qst...
Decrypting...okay.
Opening...okay.
Reading Header...okay.
Made in ZQuest 250 Beta 29
Reading Rules...okay.
Reading Strings...okay.
Reading Doors...okay.
Reading DMaps...okay.
Reading Misc. Data...okay.
Reading Misc. Colors...okay.
Reading Game Icons...okay.
Reading Items...okay.
Reading Weapons...okay.
Reading Maps...okay.
Reading Combos...okay.
Reading Combo Aliases...okay.
Reading Color Data...okay.
Reading Tiles...okay.
Reading Tunes...okay.
Reading Cheat Codes...okay.
Reading Init. Data...okay.
Reading Custom Guy Data...okay.
Reading Custom Link Sprite Data...okay.
Reading Custom Subscreen Data...okay.
Reading FF Script Data...okay.
Reading SFX Data...okay.
Reading Item Drop Sets...okay.
Reading Favorite Combos...okay.
Done.
Removing timers.
Cleaning aliases.
Cleaning subscreens.
Cleaning sfx.
Cleaning script buffer.
Cleaning qst buffers.
Cleaning maps.
Cleaning tile buffers.
Cleaning misc.
Cleaning midis.
Cleaning undotilebuf.
Cleaning datafiles.
Cleaning bitmaps...... OK.
This is after opening ZQ (via zquest-w.exe), attempting to switch to fullscreen, seeing it fail, and then quitting the program.
Gleeok
07-17-2017, 07:13 AM
Oh right, ZQuest... Forget what I said about triple-buffering then. Sorry. I don't see the cause off hand, but points of interest:
Is there a screen resolution in ZQuest that your computer will support? If not then fullscreen is probably impossible without DXGL or something similar. (800x600 is 4:3; does ZC run fullscreen at 800x600?)
I couldn't add custom resolutions in ZQ (too much work at the time; impractical) at the time they were added to ZC, but I can take another look if it's something that users really want. I just always thought that people preferred ZQ to be in windowed mode. I don't think I've ever run ZQ in fullscreen since 1.93.
Do we have a Mac guy at all?
DarkDragon
07-17-2017, 11:46 AM
You can force arbitrary resolutions in the master branch (assuming you are fine with the resulting aliasing artifacts).
Do we have a Mac guy at all?
Sadly no...
Saffith
07-17-2017, 12:00 PM
First of all, your solution is actively defeated by the launcher, who seems to gleefully overwrite the doublebuffer setting when I use it to launch ZC.
Strange, it shouldn't do that... It wasn't already running when you edited ag.cfg, right?
In ZQ, when I try to enable fullscreen, it tries to open a full-screen-sized window. It remains visible with only black contents for a few moments, and then it disappears. A few moments later, it tries and fails again. This repeats several times, before ZQ finally gives up and goes back to windowed mode.
Scaling the new interface up in ZQuest wasn't allowed until after 2.50.2, so I don't know what it'll do if 800x600x8 isn't supported. A newer version might work.
Modus Ponens
07-17-2017, 02:15 PM
Is there a screen resolution in ZQuest that your computer will support?
I don't know. How do I change the ZQ screen resolution?
(800x600 is 4:3; does ZC run fullscreen at 800x600?)
800x600 doesn't show up as an option in the drop-down list of resolutions in the launcher. Is there a way to manually specify that? (Presumably in ag.cfg?)
I couldn't add custom resolutions in ZQ (too much work at the time; impractical) at the time they were added to ZC, but I can take another look if it's something that users really want. I just always thought that people preferred ZQ to be in windowed mode. I don't think I've ever run ZQ in fullscreen since 1.93.
It isn't a big deal. I think I probably do actually prefer to run it windowed, like you said, because it's so much easier to switch to other applications that way. If you get the option in, I might use it sometimes, but it's far from a priority on my personal wants list.
Strange, it shouldn't do that... It wasn't already running when you edited ag.cfg, right?
Ooh, good catch. I think that was the problem. I just checked ag.cfg without the launcher open and confirmed the doublebuffer setting, and then closed that and launched ZC via the launcher, and everything is fine there.
BUT...
when I have ZC in fullscreen mode and I Alt-Tab to another program, it's bad. Last night I tried it a couple times, and when I tabbed back to it, it was put into that glitched state I mentioned in my first post. Today I can't replicate that because it just crashes altogether when I Alt-Tab away. So maybe this is a different bug, or maybe it's related, but there it is.
Fortunately, things seem pretty agreeable at this point: I'm able to run both ZC and ZQuest and I'm happy with how it's working, so long as I'm careful to toggle Fullscreen before I want to switch programs from ZC.
Tim
07-17-2017, 03:06 PM
That tab-out issue also happens on a PC running Win 10, so no surprise there. That one's not a Mac issue.
Modus Ponens
07-17-2017, 03:13 PM
I gotta say, I don't know everything about computers, but I think for all intents and purposes, I'm using a PC. I mean, I've got Windows 10 natively installed and running on my Intel hardware. | ESSENTIALAI-STEM |
Talk:Shin Lim
Citizenship
Since the IP refuses to look at what I pointed, here is the source USA Today "Lim, who was born in Vancouver, British Columbia, lives in Boston and has Canadian and American citizenship..." --M asem (t) 00:18, 20 February 2019 (UTC)
* Also to add to what the IP is claiming: while he is confirmed to be Chinese enthnicity, that in no way automatically makes him a Chinese citizen. We know he was born in Canada and Canada follows jus soli principle (if you were born in Canada you are a Canadian citizen). --M asem (t) 01:02, 20 February 2019 (UTC)
@masem Citizenships do change. People can change their citizenships, but they can never change their ethnicity. Therefore, he will always be Chinese-American as long as he keeps his American citizenship, in the same way that a black person who is American will always be an African-American as long as they keep their American citizenship. How come you pretend to be ignorant of such a simple and basic fact? You need an up-to-date source to prove that he is still a canadian "citizen" at the moment, though, because your link was from Sept 20th, 2018, which means that it is outdated. Also, he does not need to be a "Chinese citizen" to be called "Chinese-American", just as a person who is black and American does not need to be an "African citizen" to be called "African-American". So your reply about him not automatically being a "Chinese citizen" is in no way relevant to this discussion whatsoever.2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 01:47, 20 February 2019 (UTC)
To reiterate what Dawnleelynn said, is USA Today not a reliable source? Also, you yourself are failing to provide a reliable source for your own claim. CrispyCream27 • talk • user page 02:05, 20 February 2019 (UTC)
* To be clear, I was being sarcastic when asking if USA Today was a reliable source. It's a mainstream source like the Washington Post, or the Associated Press, or CBS etc., that is a nationwide newspaper. It gets delivered to hotel rooms, of course it's reliable. It doesn't get more reliable. And the article is not that old in terms of its content; citizenship lasts for years at a time.dawnleelynn(talk) 04:12, 20 February 2019 (UTC) P.S. You can also find it in those newspaper vending machines. Should be no question about reliability. dawnleelynn(talk) 04:24, 20 February 2019 (UTC) Oh wow, I just found this list on Wikipedia and it shows that USA Today is #1 on the List of newspapers in the United States by circulation. I think this settles it quite clearly now. dawnleelynn(talk) 17:02, 20 February 2019 (UTC)
* @dawnleelynn Just because it's the most popular newspaper does not mean that it's a reliable source by any means. Popularity does not determine truthfulness. Furthermore, if even the New York Times, which has a much higher reputation among the American press, is not necessarily reliable because it had been found of lying on more than one occasion, then why should anyone consider the USA Today to be absolutely reliable? — Preceding unsigned comment added by 2604:6000:D786:6C00:3DF7:791D:751C:69D4 (talk) 21:53, 21 February 2019 (UTC)
* Indeed why should any source be found reliable? Nonsense! At any rate, I am not going to debate you on one fact out of several I made on that particular source. You whined for proof for days, and I provided it. No proof is good enough for you. If Shin Lim himself appeared to you in person with his papers, it still wouldn't be good enough for you. I will not spend any of my valuable time in debate. I've done my service; do with it as you will. Ciao! dawnleelynn(talk) 00:08, 22 February 2019 (UTC)
* As a Canadian, I can quite assure you IP, that Canada is indeed a country. GoodDay (talk) 02:20, 20 February 2019 (UTC)
* @goodday First of all, whether canada is a country or not is no longer the main point, and has not been so for a long while in this discussion. So, please get a grasp for the point of discussion since then. But I will only briefly reply to your comment about canada's nation-status. As a canadian, of course you would want to call canada a country. But you are not a reliable source. On the other hand, your constitution is a reliable source, which states that the queen of England is officially the "head of state" and "highest leader" of canada. Therefore, canada can only be a de-facto colony of England. But that is it for this digression from the main topic, because I don't want to waste time on this digression anymore.2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 03:07, 20 February 2019 (UTC)
@crispycream27 I had already answered your question. Since you're asking me whether USA Today is a reliable source, I'm going to tell you that it is not, because, first of all, whether or not USA Today is a reliable source for anything depends on one's personal opinion. So it is not necessarily a reliable source. Furthermore, specifically for proof of citizenship status, the USA Today article that you used cannot be a reliable source simply because it is outdated from Sept. 20th, 2018. Therefore, you have failed to provide any reliable source that proves he still has "canadian citizenship" at present. He may no longer be a "canadian citizen", because he could have changed his citizenship status, especially considering the fact that he has been living in the U.S. for so long. So, it would be more accurate to call him Chinese-American, because his ethnicity can never change, in the same way that an African-American's black ethnicity can never change, or a Latino-American's Latino ethnicity can never change, either. Therefore, I don't need to provide further reliable source for my claim, because the reliable source had already been provided. Is this logic simple enough for you?2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 02:36, 20 February 2019 (UTC)
* USA Today is a reliable work. There is no evidence that since that was published that Lim tried to drop his Canadian citizenship, and we don't second guess things like that. (He has to apply to get American citizenship obviously). He may have some Chinese ethncity, but at best, taht would make him a Chinese-Canadian-American, which is far too many terms. --M asem (t) 02:44, 20 February 2019 (UTC)
* @masem First of all, you can only say that it's your opinion that USA Today is "a reliable work". Just because you say so does not make it an objective fact. What's so hard to understand about that? But the point here is not about whether USA Today is a "reliable work" for anything based on anyone's opinion, but about the fact that the article through your link is simply outdated and therefore cannot be used to show current citizenship status. Yet, the wikipedia article on this page is written in the present tense. So it is not accurate. To be accurate, you could only claim that he WAS "canadian-American" as of Sept 20th, 2018. Unless you can provide up-to-date reliable sources on his present citizenship status, you have no current basis to continue to claim that he "is" a canadian-American. On the other hand, it would be entirely accurate to say that he is Chinese-American, because his ethnicity can never change, as I had pointed out multiple times already. I have already explained all of this to you and the others here more than once. So I'm wondering: Do you know how to read? How old are you? Have you graduated from grade school? Why do you need me to repeatedly explain this simple line of reasoning to you, as if you had never read it? And why do you even reply without having read my previous answers to your same comment?2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 03:07, 20 February 2019 (UTC)
* You've obviously have been around Wikipedia before, otherwise you wouldn't learn about talkpages & edit-summaries that quickly. So it leave one to wonder, who you really are. Furthermore, if you don't stop what you're doing? you'll be blocked. GoodDay (talk) 02:51, 20 February 2019 (UTC)
* Why are you only mainly concerned about my personal identity instead of the topic at hand? Either pay attention to the point of discussion, or leave if you are incapable of doing so. Or else, YOU'll be blocked.2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 03:20, 20 February 2019 (UTC)
* @goodday Your replies contain not much of anything relevant to the main point of discussion. You have also failed to read my replies before making your own comment. Unless you start addressing the topic with relevant and well-reasoned comments, you're the one who should be blocked.2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 03:20, 20 February 2019 (UTC)
* You haven't provided any up-to-date reliable sources for the change you want made. You're obnoxious approach to this matter is making you a bore. You've already been reported at the Edit-war board. Take a hint. GoodDay (talk) 03:18, 20 February 2019 (UTC)
* You haven't read ANY of my previous replies, because I had already addressed the point about "reliable sources" amply and on multiple occasions. So I will not repeat them again. Go read them yourself before you reply again, because you have so far failed to respond to me with anything relevant and rational. Evidently, you only want to engage in personal attacks against me without ever paying attention to the progress of discussion. You're really pathetic. That's why I have reported you for your antagonistic behavior.2604:6000:D786:6C00:FC0B:14FC:18B9:6346 (talk) 03:27, 20 February 2019 (UTC)
* The infobox is asking for his nationality. Nationality refers to one's relationship between himself/herself and a political state. There are NO sources that I know of that state that he ever lived in China. Your logic is referring to his ethnicity, which is not what we're looking for. CrispyCream27 • talk • user page 03:35, 20 February 2019 (UTC)
* @crispycream27 My edits to include his Chinese name, with source link, each time had nothing to do with talk of "nationality". So stop giving irrelevant and disingenuous replies about "nationality" while dodging the real issue. If you don't understand what I'm talking about, don't reply to pretend that you have anything useful to say.2604:6000:D786:6C00:BC3D:8133:D0E8:1E7E (talk) 16:07, 21 February 2019 (UTC)
* We know he's Han Chinese without that video. (we have other sources to confirm) We know that he was born a Canadian citizen, and as of Sep 2018 (if not earlier) was also American, with no evidence he forwent Canadian citizenship. There's zero evidence that he has Chinese citizenship. So it is proper without evidence to prove otherwise as a Canadian American. And to that reason, it is improper to also force including of his name translated to Chinese, particularly taken from a random video. He may have a given Chinese name given his parents, but without it, we should not presume he has one. --M asem (t) 17:25, 21 February 2019 (UTC)
This article will likely have to be long term semi-protected as Mobile editor has returned with a different Mobile IP & continues to edit-war on the nationality topic. GoodDay (talk) 17:50, 21 February 2019 (UTC)
Current Residence
Shin Lim seems not to be living near Boston, MA as the article currently states. He was living in Southern California in 2018 according to this article from the Pasadena Star News. Currently he is in residence The Mirage in Las Vegas, and seems to be living in Las Vegas per his his Instagram but he never explicitly says. Posting this because I'm not sure of a good source for this. Blupomodoro (talk) 21:59, 3 January 2022 (UTC) | WIKI |
Jump in overnight euro bank lending rate baffles markets
LONDON (Reuters) - A key overnight benchmark rate European banks use to lend money to each other showed signs of stabilizing on Friday after a surge this week that raised questions about possible funding stresses. The Euro Over Night Index Average (EONIA) EONIA= had spiked 12 basis points over two fixings, leaving analysts puzzled by the sudden surge. But on Friday it was fixed at -0.291 percent, down from -0.241 percent on Thursday, its highest since March 2016. Still, EONIA was set for its biggest weekly rise since November 2014, according to Reuters data. That’s a marked contrast for a rate that has been in a tight trading range for more than a year. Traders said they suspected the sharp rise in the rate was sparked by demand for funds by one bank but did not have any further details, while others added that month-end demand for funds may also have made a contribution to the rise. “I haven’t heard anything systemic here and it seems to be related to one firm which is having some funding issues and we will come to know next week,” said Kit Juckes, head of FX strategy at Societe Generale. “There is no spillover effect to other markets for now.” A spokeswoman for the European Central Bank confirmed that the readings of the fixing were accurate. They are published after the close of markets on each trading day. Another possible cause for the EONIA spike could be a bank or banks which recently enjoyed ratings upgrades, switching their source of funding from the ECB to the interbank market, other analysts said. But while the rare spike in EONIA rates has caused a stir in financial markets, most analysts did not believe it was a sign of broader funding stress among European banks. Most also reckon the benchmark remains a valid measure of interbank lending rates. “We have a robust economic backdrop, countries such as Italy have been addressing problems in its banks and the sector is more solid than it has been for some time, so I don’t see liquidity problems,” said DZ Bank rate strategist René Albrecht. Still, given this week’s sharp moves, traders and analysts had been watching Friday’s fixing with interest. “EONIA is only built on real deals, the only weakness is that it is 28 contributors,” said one euro zone money market trader. Reporting by Dhara Ranasinghe, Marc Jones, Sujata Rao and Saikat Chatterjee; Editing by Matthew Mpoke Bigg | NEWS-MULTISOURCE |
Hide/Show Apps
Enhancement in Oxygen Reduction Reaction Activity of Nitrogen-Doped Carbon Nanostructures in Acidic Media through Chloride-Ion Exposure
Download
2018-07-11
Jain, Deeksha
Mamtani, Kuldeep
Gustin, Vance
Gunduz, Seval
Çelik, Gökhan
Waluyo, Iradwikanari
Hunt, Adrian
Co, Anne C.
Ozkan, Umit S.
Nitrogen-doped carbon nanostructures (CNx) are promising cathode materials as catalysts for the oxygen reduction reaction (ORR) in polymer electrolyte membrane (PEM) fuel cells. Incorporation of chlorine into CNx catalysts using a facile methodology can lead to a significant improvement in the ORR activity in acidic media, as confirmed by electrochemical half-cell measurements. The chlorine-containing CNx catalyst (CNx-Cl) is synthesized by soaking CNx powder in 0.3 M HCl. The analysis of near-edge X-ray absorption fine structure spectra collected in the C K-edge region and Fourier-transform infrared spectra confirm the formation of C-Cl bonds in CNx-Cl. X-ray photoelectron spectroscopy (XPS) results reveal the presence of three distinct chlorine species in the CNx-Cl sample: (i) organic chlorine (C-Cl), (ii) anionic chloride in the positively charged environment of a pyridinium ring (N+Cl-), and (iii) physisorbed ionic chloride. Results from temperature-programmed desorption studies under inert atmosphere corroborate the conclusions from XPS depth profiling analysis. The improvement in ORR activity after exposure of the CNx catalyst to chloride anions can be attributed to the creation of C-Cl functionalities as additional active sites. The difference in the electronegativity of C and Cl atoms results in a net positive charge on adjacent carbon sites, leading to the side-on adsorption of oxygen molecules and breakage of the O-O bond during ORR. | ESSENTIALAI-STEM |
Page:Completeconfectioner Glasse 1800.djvu/276
Rh
Take four pounds of damask rose water, of lavender water and spike water, three ounces each; the water of blossoms of lemons or oranges, the water of the blossoms of a myrtle tree, blossoms of jessamine and marjorum, of each half a pound; add of storax of jessamine and marjorum, of each half a pound; add of storax calamita and benjamin, a drachm each, and of musk, half a scruple; mingle them well together, and keep it in phials well stopped six days; then distil it in Balneum Mariæ, and keep the water in a glass vessel fifteen days in the sun, and it will be fit for use.
Take of fresh flowers of rosemary, two pounds, damask-rose water, two pounds, and a scruple of amber; put these into a glass phial well stopt for ten days; distil in in Balneum Mariæ, and keep it in a glass phial stopt very close.
Take four pounds of the above-mentioned water, two pounds of damask-rose water, and half a scruple of amber; mix these together, keep them close stopt in a phial and put it in the sun for a month, and it will be fit for use.
Take four pounds of damask-rose water, with six ounces of lavender water, three pounds of jessamine | WIKI |
ANALYSIS-Canada's pain Japan's gain, as Mitsubishi buys CRJ jet
PARIS/MONTREAL, June 25 (Reuters) - Japan's Mitsubishi , which agreed on Tuesday to buy Bombardier's loss-making regional jet program, plans to exploit the Canadian company's support network and global customer list to rejuvenate its delayed efforts to conquer the jet market. Japan's return to the aircraft market for the first time in 50 years had run into trouble as the Mitsubishi Regional Jet hit seven years of delays; but Bombardier's withdrawal from the cut-throat commercial aerospace sector gives Japan a second chance. The deal comes days after Mitsubishi announced a redesigned 65-88-seat regional jet at the Paris Airshow and gave the MRJ a facelift and new brand: Spacejet, promoting high cabins which it says will allow passengers to store rollerbags in overhead bins. "One of the strongest barriers to entry is the ability to build the relationships with customers and the support network to keep those relationships moving," Alex Bellamy, chief development officer of Mitsubishi Aircraft, told Reuters. "We know that (manufacturers) succeed or fail based on the support they give the product," the former Bombardier executive said in an interview at last week's show. That's especially true in regional markets which rely on sweating assets as hard as possible, with planes flying up to 10 times a day. Bristling with Japanese and Canadian designs, the Paris Airshow illustrated big industry bets succeeding or failing. Japan and Canada each make up 3 percent of the $900 billion aerospace industry, says Mitsubishi, but Bombardier was forced out by the cost of its effort to enter the industry's main battleground between Airbus and Boeing. Its 110-130-seat CSeries won plaudits for design but failed in the market until Airbus took it over for one dollar and starting pulling in hefty orders at last week's show. Now Bombardier has completed its exit by selling its mature CRJ regional jet program to Mitsubishi, whose own new development is billions of dollars over budget. "The Japanese were able to play a longer game; Mitsubishi has more cash than Bombardier," a senior industry source said. U.S. PILOT CLAUSES Mitsubishi's assault on a segment of the market dominated by Canada's Bombardier and Brazil's Embraer dates back to 2003. It developed two sizes for roughly 70-90 passengers. Like others, it hoped important pilot union agreements that cap at 76 seats the capacity of planes flown by regional airline contractors in the make-or-break U.S. market would be relaxed. But the so-called scope agreements have stuck, meaning the larger model could only be offered outside the U.S. while the smaller 70-seater was too small to compete. Some of the agreements set the seating limit even lower at 65 seats. Complicating matters, the U.S. regional deals ban aircraft weighing over 86,000 pounds, which is a particularly tough hurdle for jets with newer but larger engines like the Japanese regional line-up and the latest version of Embraer's E175. Mitsubishi therefore went back to the drawing board with the MRJ 70 by stretching the cabin to allow 65-76 seats in three classes in the U.S. and up to 88 single-class seats in Europe. The makeover is called the M100 Spacejet, even though it is smaller than the M90 now undergoing flight tests. Although bigger than before, it saves weight by using new materials. "It will be a new and optimized aircraft," Bellamy said. Mitsubishi is also looking at a larger model with just under 100 seats called the M200, competing with the Embraer 190. Embraer declined to comment, but its executives have said it is tackling the U.S. market with planes that meet scope limits and is ready to offer the re-engined E175 if those rules ease. (Reporting by Tim Hepher, Allison Lampert; editing by David Evans) | NEWS-MULTISOURCE |
Wikipedia:Articles for deletion/Kevin McKeever
The result was delete. Spartaz Humbug! 17:45, 21 November 2008 (UTC)
Kevin McKeever
* ( [ delete] ) – (View AfD) (View log)
No evidence of notability. Previous debates have found that Prospective Parliamentary Candidates are not notable (see Elizabeth Shenton for example), and a few trivial mentions of the "recent appointments" type in PR magazines do not establish notability in the PR world. (Full disclosure: I met Mr McKeever several years ago, but this nomination is policy-based.) DWaterson (talk) 18:44, 16 November 2008 (UTC)
* Same disclosure applies to me. (Aside, hi Dave, didn't know you contributed to Wikipedia. Does this make us a cartel?) WP:POLITICIAN is pretty clear about this. Redirect to Harborough (UK Parliament constituency), and add the list of PPCs for the next general election (as is common practice elsewhere with UK Parliamentary constituencies). Chris Neville-Smith (talk) 20:15, 16 November 2008 (UTC)
* Note: This debate has been included in the list of Living people-related deletion discussions. --Erwin85Bot (talk) 00:00, 17 November 2008 (UTC)
* Note: This debate has been included in the list of Politicians-related deletion discussions. -- Raven1977 (talk) 00:59, 17 November 2008 (UTC)
* Note: This debate has been included in the list of United Kingdom-related deletion discussions. -- Raven1977 (talk) 01:00, 17 November 2008 (UTC)
* Delete and redirect to Harborough (UK Parliament constituency). If he gets elected (he won't) he gets a page. TerriersFan (talk) 20:36, 17 November 2008 (UTC)
| WIKI |
Ankylosing Spondylitis (Marie-Strumpell Disease)
Ankylosing spondylitis (AS) is a systemic condition in which the joints and ligaments of the back become inflamed and eventually fuse.
+
Symptoms
AS causes stiffness, usually starting in the lower back. Over time it may spread into the upper spine, causing joints and bones to become fused. This makes the spine rigid.
About a third of all persons with AS may have symptoms that affect other parts of the body besides the joints and ligaments, including ones affecting the heart and blood vessels.
Causes and Risk Factors
This condition tends to be inherited. It most commonly occurs in men between the ages of 16 and 30, but can also occur in women.
+
Diagnosis
Some blood tests can help identify that the symptoms are those of AS. MRI is currently used to diagnose the condition. Some changes caused by AS only begin appearing over a period of 10 years or so.
+
Treatments
The earlier AS is treated, the better. Once joints fuse (become joined together and rigid), mobility won't completely return even with treatment. Drugs may relieve the pain it causes.
Usually, AS is treated with:
• Physical therapy - This treatment helps reduce pain and stiffness and help preserve back mobility
• Drug therapy - This includes over-the-counter drugs that relieve pain (such as aspirin, ibuprofen, naproxen and piroxicam). It can also include drugs that modify rheumatic diseases (such as sulfasalazine and methotrexate and corticosteroids like prednisone. Researchers are also looking at promising, new drugs, such as tumor necrosis factor (TNF) blockers etanercept and infliximab. | ESSENTIALAI-STEM |
Do You Think You’ve Already Forged Your Lifelong Taste in Music?
Student Opinion Do you and your siblings, cousins or friends who are a few years younger or older than you love the same songs? What about your parents or other adults: do you share the same favorite musical artists? What would you say in response to a study that found the ”strongest adult musical preferences” set in by age 13 for girls and 14 for boys? In the Op-Ed “The Songs That Bind,” which is about a research project designed to “see to what extent the year we were born influences the music we listen to, the extent to which different generations are bound to disagree on music,” Seth Stephens-Davidowitz writes: Consider, for example, the song “Creep,” by Radiohead. This is the 164th most popular song among men who are now 38 years old. But it is not in the top 300 for the cohort born 10 years earlier or 10 years later. Note that the men who most like “Creep” now were roughly 14 when the song came out in 1993. In fact, this is a consistent pattern. I did a similar analysis with every song that topped the Billboard charts from 1960 to 2000. In particular, I measured how old their biggest fans today were when these songs first came out. It turns out that the “Creep” situation is pretty much universal. Songs that came out decades earlier are now, on average, most popular among men who were 14 when they were first released. The most important period for men in forming their adult tastes were the ages 13 to 16. What about women? On average, their favorite songs came out when they were 13. The most important period for women were the ages 11 to 14. Granted, some results of my research are not surprising. One of the facts I discovered is that Coolio’s “Gangsta’s Paradise” is extremely unpopular among women in their 70s. Thank you, Big Data, for uncovering that nugget of wisdom! But I did find it interesting how clear the patterns were and how much early adolescence matters. The key years, in fact, match closely with the end of puberty, which tends to happen to girls before boys. This also adds one more piece of evidence to the growing scientific consensus that we never really leave middle school and high school. For both men and women, their early 20s were half as influential in determining adult musical tastes as their early teens. Students: Read the entire Op-Ed, then tell us: — What is the most surprising and least surprising things you learned from reading about the study conducted by Mr. Stephens-Davidowitz? — What was your favorite song when you were 13 or 14? Do you think you’ll always love it? — Why do you think the early teen years are so significant for forging a lifelong taste in music? — If you don’t know the answer off-hand, ask your parents or teachers about their favorite bands, musicians, songs and albums when they were in their early teens and how they feel about them today. How does what they shared with you support or challenge the notion that one’s lifelong musical taste is cemented in the early teen years? — What, if any, do you think are the challenges older people face when they hear styles of music that either didn’t exist or weren’t known to them when they were teenagers? Explain. Students 13 and older are invited to comment. All comments are moderated by the Learning Network staff, but please keep in mind that once your comment is accepted, it will be made public. | NEWS-MULTISOURCE |
User:Johnvr4
Johnvr4
* Redevelopment Draft of former Operation RED HAT User:Johnvr4/Operation Red Hat. The most recent version is in my sandbox 1.
* Developing Beacham Theater | WIKI |
Wikipedia:Suspected sock puppets/Kristy22
User:Kristy22
* Suspected sockpuppeteer
* Suspected sockpuppets
Delicious carbuncle (talk) 15:11, 19 April 2008 (UTC)
* Report submission by
Lovato45 copypasted American Idol webpages to their talk page, just as Kristy22 did. Lovato45 made this edit to Kristy22's talk page. They also helpfully made this edit on their talk page, pointing to an assumed autoblock of IP <IP_ADDRESS>. and share an interest in Miley Cyrus, but who doesn't? Add to that their shared habit of making "mistakes" and pleading for forgiveness endlessly and trollishly on admin talk pages.
* Evidence
* I've added new arrival, whose very first edit was leaving nonsense about Michael Jackson on my talk page. Their unblock request and other contributions share that familiar pleading Kristy22 style. Delicious carbuncle (talk) 15:48, 28 April 2008 (UTC)
* Comments
* At the time of writing, I believe all three are blocked from editing, for various reasons.
* I've waded through all of the non-deleted contribs of all three parties, and I have to say that the similarities are very strong: there's a lot of starting sections on User Talk pages called "Hey!" or similar, and a great deal of removal of warning/block/unblock requested/denied messages from Talk. All the unblock requests made by any of these parties follow the same patterns ("please unblock me, i am very sorry" or "IT WAS A MISTAKE"). Kristy and the IP are surely one and the same; they both posted unblock-granted templates signed by themselves (yep, even the IP). Lovato doesn't immediately seem so similar (the modus operandi there seems to be, find any article or Talk section, scroll down, and delete everything up to the end of the section) - but as noted in Evidence, Lovato did provide confirmation of using the same IP. Hoping this helps, non-admin S HEFFIELD S TEEL TALK 17:59, 19 April 2008 (UTC)
* Just a quick clarification - only User:Kristy22 is currently blocked. Blocks on the other two accounts have expired. Delicious carbuncle (talk) 18:08, 19 April 2008 (UTC)
I would recommend indef-blocking all of the accounts. The evidence of sockpuppetry is sufficient to justify such an action. The users, taken as a whole, have provided virtually no useful contributions to the encyclopedia, and have spent dozens of edits bothering admins on their talk pages and posting copyvios in their userspace. We're dealing with an immature child, or someone acting like a child, who really doesn't understand what we do. Let's block the accounts and hope the person grows up and returns to make a new start. Shalom (Hello • Peace) 18:59, 7 May 2008 (UTC)
Adding a new one:. I'm not even going to bother citing evidence - just look at the contribs. Delicious carbuncle (talk) 19:03, 9 May 2008 (UTC)
If this is a child, or childlike person, they need firm discipline. Lets start with a request for checkuser citing this report as the evidence, code G. A Checkuser will probably eliminate all doubt and may reveal addition socks, and help get the underlying IPs blocked. Jehochman Talk 02:53, 8 May 2008 (UTC)
* Conclusions
See WP:Requests_for_checkuser/Case/Kristy22 for confirmations. All confirmed except SDLexington. --NrDg 02:11, 10 May 2008 (UTC)
* All blocked and tagged accordingly. GBT/C 16:45, 10 May 2008 (UTC) | WIKI |
Wikipedia:Articles for deletion/Mr. Hero
The result was keep. - Mailer Diablo 09:04, 30 August 2006 (UTC)
Mr. Hero
WP:SPAM, WP:NN and WP:CVG. CSIN 05:28, 25 August 2006 (UTC)
* I'm not sure what the WikiProject Computer and video games has to do with this article. However, this is a chain of sandwich shops with 94 locations by my count, all of which are in Ohio and at least half of them in the Cleveland area alone. It could possibly be notable in the local area, but the chain is not famous outside Ohio according to the article itself. No vote yet. --Metropolitan90 08:08, 25 August 2006 (UTC)
* The article's in decent shape now; I could support a keep. --Metropolitan90 01:52, 26 August 2006 (UTC)
* Comment - There are many around here in Cleveland. I think the guideline to be investigated is WP:CORP. It seems like it is probably notable, but some reliable sources would be nice. As it is, the article is pretty not good. Wickethewok 14:15, 25 August 2006 (UTC)
* Keep as U.S. regional restaurant chain since we have a whole category of them, some smaller than this (note guidelines which say as few as two can count), and cleanup per my tag. Daniel Case 17:22, 25 August 2006 (UTC)
* OK, I did the cleanup, put an infobox in and tried to add some info from the company's website. I think it can be kept now. Daniel Case 17:39, 25 August 2006 (UTC)
* Keep 94 locations? Definitely notable. Zagalejo 17:47, 25 August 2006 (UTC)
* Keep as a relatively old chain with 94 locations. Regional chains pass notability, and thanks to Daniel Case's cleanup, it isn't spam. SliceNYC 21:40, 25 August 2006 (UTC)
* Keep per the above. Just withdraw the nomination. RFerreira 06:54, 29 August 2006 (UTC)
| WIKI |
Diagnostic performances and thresholds: The key to harmonization in serological SARS-CoV-2 assays?
Clin Chim Acta. 2020 May 30;509:1-7. doi: 10.1016/j.cca.2020.05.050. Online ahead of print.
Abstract
Background: The evaluation of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) specific antibody (Ab) assay performances is of the utmost importance in establishing and monitoring virus spread in the community. In this study focusing on IgG antibodies, we compare reliability of three chemiluminescent (CLIA) and two enzyme linked immunosorbent (ELISA) assays.
Methods: Sera from a total of 271 subjects, including 64 reverse transcription-polymerase chain reaction (RT-PCR) confirmed SARS-CoV-2 patients were tested for specific Ab using Maglumi (Snibe), Liaison (Diasorin), iFlash (Yhlo), Euroimmun (Medizinische Labordiagnostika AG) and Wantai (Wantai Biological Pharmacy) assays. Diagnostic sensitivity and specificity, positive and negative likelihood ratios were evaluated using manufacturers' and optimized thresholds.
Results: Optimized thresholds (Maglumi 2 kAU/L, Liaison 6.2 kAU/L and iFlash 15.0 kAU/L) allowed us to achieve a negative likelihood ratio and an accuracy of: 0.06 and 93.5% for Maglumi; 0.03 and 93.1% for Liaison; 0.03 and 91% for iFlash. Diagnostic sensitivities and specificities were above 93.8% and 85.9%, respectively for all CLIA assays. Overall agreement was 90.3% (Cohen's kappa = 0.805 and SE = 0.041) for CLIA, and 98.4% (Cohen's kappa = 0.962 and SE = 0.126) for ELISA.
Conclusions: The results obtained indicate that, for CLIA assays, it might be possible to define thresholds that improve the negative likelihood ratio. Thus, a negative test result enables the identification of subjects at risk of being infected, who should then be closely monitored over time with a view to preventing further viral spread. Redefined thresholds, in addition, improved the overall inter-assay agreement, paving the way to a better harmonization of serologic tests.
Keywords: Antibodies; COVID-19; Clinical performances; SARS-CoV-2. | ESSENTIALAI-STEM |
The Tables
By default the scrolling area of the toplevel widget displays the list of motors. Depending on the contents of online.xml, other device classes may be selected.
For most of the device classes we have this assignement for the mouse buttons.
However, there are some deviations. Watch the tool tips as you move the mouse over the buttons for details.
As mentioned, the device classes are defined by online.xml.
Motor:
module == 'motor_tango' or
type == 'stepping_motor' or
type == 'dac'
<device>
<name>eh_mot01</name>
<type>stepping_motor</type>
<module>oms58</module>
<device>p99/motor/eh.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
</device>
Counter
type == 'counter'
module == 'tangoattributectctrl'
module == 'counter_tango'
module in ['mca8715roi', 'vortex_roi1', 'vortex_roi2',
'vortex_roi3', 'vortex_roi4', 'amptekroi', 'mythenroi']
<device>
<name>d1_c01</name>
<type>counter</type>
<module>sis3820</module>
<device>p99/counter/d1.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
<channel>1</channel>
</device>
Timer:
type == 'timer'
<device>
<name>d1_t01</name>
<type>timer</type>
<module>dgg2</module>
<device>p99/dgg2/d1.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
<channel>1</channel>
</device>
IORegs:
type == 'input_register' or
type == 'output_register'
<device>
<name>d1_ireg01</name>
<type>input_register</type>
<module>sis3610</module>
<device>p99/register/d1.in01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
<channel>1</channel>
</device>
AdcDac:
module == 'tip551' or
module == 'tip830' or
module == 'tip850adc' or
module == 'tip850dac' or
<device>
<name>d1_adc01</name>
<type>adc</type>
<module>tip830</module>
<device>p99/adc/d1.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
<channel>1</channel>
</device>
MCA:
module == 'mca_8701'
<device>
<name>d1_mca01</name>
<type>mca</type>
<module>mca_8701</module>
<device>p99/mca/d1.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
</device>
Camera:
module in ['dalsa', 'eigerdectris', 'lambda','pilatus100k',
'pilatus300k', 'pilatus1m', 'pilatus2m', 'pilatus6m',
'tangovimba']
<device>
<name>pilatus</name>
<type>detector</type>
<module>pilatus300k</module>
<device>p99/pilatus/exp.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
</device>
VFCADC:
module == 'vfcadc'
<device>
<name>d1_vfc01</name>
<type>adc</type>
<module>vfcadc</module>
<device>p99/vfc/d1.01</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
<channel>1</channel>
</device>
PiLC:
module == 'pilc_module'
<device>
<name>pilc_triggergenerator</name>
<type>type_tango</type>
<module>pilc_module</module>
<device>p99/pilctriggergenerator/dev.01</device>
<control>tango</control>
<hostname>hasep99oh:10000</hostname>
</device>
ModuleTango:
module == 'module_tango'
<device>
<name>tg_test</name>
<type>type_tango</type>
<module>module_tango</module>
<device>sys/tg_test/1</device>
<control>tango</control>
<hostname>haspp99:10000</hostname>
</device>
MG:
type == 'measurement_group'
Doors:
HasyUtils.getDoorNames()
MacroServer
HasyUtils.getMacroServerNames()
Pools:
HasyUtils.getPoolNames()
NXConfigServer:
HasyUtils.getDeviceNamesByClass( "NXSConfigServer")
2021-07-09 | ESSENTIALAI-STEM |
Talk:Harold Miner
i believe Harold Minor is not 6foot5. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:07, 25 November 2013 (UTC)
Many players' bio-stats are inflated, including Harry's.
As for Harry - I can say he is one of the nicest, most soft-spoken and humble athletes I have ever had the pleasure of meeting.Onefineham (talk) | WIKI |
In re Leonard FRANKS, Debtor.
Bankruptcy No. 88-12793S.
United States Bankruptcy Court, E.D. Pennsylvania.
Jan. 31, 1989.
Jeffrey Sheridan Toaltoan, Philadelphia, Pa., for debtor.
Melvyn S. Mantz, Doylestown, Pa., for American Express.
Edward Sparkman, Philadelphia, Pa., Standing Chapter 13 Trustee.
OPINION
DAVID A. SCHOLL, Bankruptcy Judge.
Before us in the instant Chapter 13 bankruptcy case is the Objection of the Debtor, LEONARD FRANKS, to an unsecured Proof of Claim in the amount of $47,429.45 filed by the AMERICAN EXPRESS TRAVEL RELATED SERVICES CO. (hereinafter referred to as “American Express”). We find that the Debtor’s transfer of a business, of which a major activity was sale of American Express money-orders and in which he was a partner, to a corporation, about two years prior to the time that the present claims of American Express arose, absolves him from liability as to those claims. This conclusion is supported by our findings that (1) the Trust Agreement between the parties does not appear to render the Debtor’s business liable to American Express for actions that occurred after the business was sold; and (2), assuming arguendo that the Trust Agreement’s terms did render him so liable, American Express waived the provision of the Trust Agreement requiring that any assignment of the business must be in writing and is therefore equitably estopped from rendering the Debtor liable on the basis of a failure to provide the said written notice. We also believe that American Express failed to establish the validity of most of its claims in any event.
The Debtor filed his bankruptcy petition on July 30, 1988. On September 6, 1988, American Express filed the Proof of Claim in issue, attaching thereto an Addendum breaking down its claim, totaling $47,-429.45, into $31,598.57 Principal, $9,511.17 Interest, and $6,319.71 Attorney’s Fees. Also attached was an Arbitration Award of May 19, 1988, in C.A. No. 86-2943 in this district court in favor of American Express and against the Debtor and one Diane Murray, individually and doing business as “Wynnefield Check Cashier,” with a notation that the Debtor only had appealed this award. Consequently, despite the award, no judgment had been entered in favor of American Express in this matter as of the date of the bankruptcy filing.
On September 19, 1988, the Debtor filed the instant Objection, attacking the claim as disputed in its entirety. After two continuances, the matter came before us for a hearing on December 15, 1988. Testifying at that time, on the Debtor’s behalf, were the Debtor himself and his daughter, Sharon Franks Jenkins. American Express called George Yochmovitz, Esquire, the custodian of its records, and Joseph W. Richardson, its agent who serviced the money-order business during the pertinent time-period. After a lengthy hearing, we entered an order allowing the parties until January 6, 1989 (the Debtor), and January 20, 1989 (American Express), to file Briefs supporting their respective positions, which they did in timely fashion.
Ms. Jenkins testified that she was the clerk and principal employee of the business throughout its duration. On January 16, 1979, the Debtor and Ms. Murray, a partner of the Debtor in this venture who was described as simply a “friend,” in their capacity as partners of “Wynnfield [sic] Check Casher” (hereinafter this business is referred to by the proper spelling of the neighborhood of the City of Philadelphia designated thereby, i.e., “Wynne field”) executed a form Trust Agreement and Appointment of Agent for Sale of American Express Money Orders with American Express (hereinafter “the Trust Agreement”). The Trust Agreement was obviously a form prepared solely by American Express. The portions of the Trust Agreement pertinent to this controversy are paragraphs 9, 10, 12, 13, and 14 which, though quite lengthy, are quoted herein in full as follows:
9. Term of Agreement. This agreement shall continue in force until terminated by either party by six months written notice to the other, but no such notice shall be given during the first year following the date of this agreement. Notwithstanding the foregoing, American Express may terminate this agreement at any time without cause by written notice or, if it has reason to believe that the financial condition of the Agent is not sound.
10. Assignments, Amendments, etc. This agreement may not be assigned by Agent without the written consent of American Express and may be modified only by an agreement in writing, signed in either case on behalf of American Express by an official of the Money Order Operation. No other employee of American Express has authority to modify or waive any term of this agreement.
12.Termination. In the event of termination for any cause, Agent shall immediately pay over to American Express all of the Trust Funds (which shall be the full amount of all Money Orders issued plus the American Express share of all customer charges), and shall return to American Express all unsold Money Orders' and any equipment, display material or other property furnished to Agent by American Express, all of which equipment, display material, etc. shall at all times remain the property of American Express and may be removed by American Express at any time without notice to Agent. All such Trust Funds and Money Orders shall, until remitted to American Express, continue to be held IN TRUST for American Express.
13. Change of Ownership. This Agreement shall be binding upon Agent, his successors, administrators, executors and assign. Agent agrees that he shall give notice of the existence of this Agreement to any purchaser, transferee, assignee, etc., of Agent’s business. Such notice shall be given in writing, with a copy furnished to American Express at the same time Agent executes a contract of transaction, as herein described. In the event the Agent fails to give the notice herein required and/or fails to require the purchaser, transferee or as-signee to assume the obligations of this Agreement, Agent shall be liable to American Express for all damages sustained as a result of such failure to require assumption of the terms of this Agreement, but shall not be liable after the purchase, transferee, or assignee has agreed to assume the obligations of this Agreement.
14. Defaults, Breaches, etc. In the event Agent defaults in the prompt and complete performance of its obligations hereunder or fails to promptly pay American Express all sums and amounts payable hereunder and American Express refers this Agreement to an outside attorney for purposes of instituting legal action for the collection of such sums and amounts, Agent shall pay court costs and attorney fees of 25% of the sums and amounts which it failed to pay, which amount shall be added to Agent’s obligations hereunder.
The Debtor initially played an active role in the business and had previously owned a grocery store and tavern for about ten years, although his education had gone no further than the sixth grade and he stated that he cannot read very well. However, in 1980, he severely injured his back in a fall at his home and, being limited in his activities as a result, sold the business to a corporate entity named Wynne Check Cashing, Inc. (hereinafter “Wynne”), of which the principal was his wife, Marion Franks, for $2,000.00. This transaction was memorialized by an Agreement of Sale of October 1,1980, in which the vendor was identified as “Leonard Franks T/A Wynnefield Check Cashing Agency” and which was signed, for the vendor, only by the Debtor and not Ms. Murray. Although this transaction was therefore a bit homespun, there is no suggestion that it was anything other than legitimate and in no sense contrived to unfairly benefit or prejudice any party.
A key element of the controversy is the Debtor’s contention that, on October 4 or October 5, 1980, he called Mr. Richardson and informed him of the sale of the business, to which Mr. Richardson answered that he would take care of the matter insofar as American Express was concerned. The Debtor further testified that, a week later, he called Mr. Richardson again and was again reassured in the same manner by him. It is uncontested that neither the Debtor, nor anyone on his behalf, ever sent any written notice confirming the change of ownership of the business to American Express, and that American Express never gave its consent to the sale of the business in writing. Mr. Richardson, in this testimony, originally stated that he “doesn’t recall” these conversations, but thereafter, on prompting from counsel, stated that he definitely never received any such called from the Debtor. The Debtor, who appeared in substantial back pain at the hearing, was, in our view, more credible on this point than Mr. Richardson, the latter of whom is presently retired and impressed us as less reliable in his recollections than the Debtor. We therefore find that the calls referenced above were in fact made by the Debtor, and that the debtor, given his marginal literacy, reasonably relied on Mr. Richardson to inform him of any other requirements to effect the transfer of the Trust Agreement to the new corporate entity. Receiving no such instructions, he reasonably concluded that no further actions on his or Wynnefield’s part were necessary to effect the transfer insofar as the relationship of the business to American Express was concerned.
The relationship between the check-cashing business and American Express over the years proceeding without any complaints on either side, and Mr. Richardson made only three or four occasional, amiable “spot checks” to the business through 1982. There were only a few scattered written communications between the parties, and none appear to evince the awareness, on the part of American Express, that the business was transferred. However, in September, 1982, a discrepancy arose regarding $15,990.48 due to American Express from Wynne in the period from July to September, 1982. This dispute was quickly resolved when Wynne discovered its error in failing to remit this sum, and it immediately rectified same by sending $15,-990.48 to American Express.
In January, 1983, a further dispute arose as to whether a check from Wynne in payment to American Express in the amount of $3,076.57, originally returned for insufficient funds, was subsequently paid when and if redeposited by American Express. This dispute was not resolved by Mr. Richardson’s visit to Wynne’s place of business on January 20, 1983. In fact, that visit terminated with Mr. Richardson’s “closing” Wynne as an agent of American Express and taking all of its unused money orders with him.
There is no evidence that any written notice was sent from American Express to Wynne indicating that the parties’ relationship was ended or that any specific demand was sent from American Express to Wynne regarding any sum due, such as the more than $31,000.00 delinquent amount claimed at present, was ever dispatched. Ms. Jenkins stated that she had no indication of the delinquency now in issue until March, 1983, when she was provided by American Express with voluminous printouts relating to numerous money orders for which no payments had allegedly been received. At the hearing, Ms. Jenkins produced copies of receipts of all of the hundreds of money orders in issue, and checks and bank statements which purported to establish that every payment on account of these money orders which was allegedly due to American Express had in fact been remitted to it by Wynne. Unfortunately, she was able to produce only a bank statement as to the originally-disputed sum of $3,076.57, the entries on which appear to support American Express’ claim that this payment was not made; the front only of one check for $3,667.83; and only a stub in Wynne’s check book for a payment of $8,814.76. American Express accurately points out that payments of these sums, totaling $15,-559.16, has not been conclusively established by Wynne. However, on the other hand, American Express has produced only masses of print-outs to establish that an outstanding balance of over double that sum ($31,598.57) exists, and it presented no real rebuttal that payments were made, per the records which Ms. Jenkins laboriously identified at the hearing, for the balance of $16,039.41 alleged to be due.
No evidence regarding the computation of interest nor the actual legal services performed on behalf of American Express or attorney’s fees paid by it to counsel was produced at the hearing.
The Debtor, as indicated, produced mountains of documentary evidence and copious oral testimony supporting his proposition that he personally did not owe any sum to American Express. The burden was therefore squarely placed upon American Express to prove the validity of all aspects of its claim, just as if it were proving its case as the plaintiff in a lawsuit. See, e.g., In re Jordan, 91 B.R. 673, 676, 682-84 (Bankr.E. D.Pa.1988); In re Celona, 90 B.R. 104, 109 (Bankr.E.D.Pa.1988); and In re Lewis, 80 B.R. 39, 41 (Bankr.E.D.Pa.1987).
This was, of course, the same burden which American Express was obliged to bear — and did to the satisfaction of the arbitration panel — at the federal arbitration hearing. However, the very fact that the arbitration panel apparently awarded American Express everything it asked for, when it appears to us that its base claim could be no more than $15,559.16 and the other aspects of its claims were questionable, causes us to place little weight on the decision of the arbitrators. In any event, no judgment was entered, and the award is therefore in no sense conclusive in determining the validity of the claim of American Express in this Court. Compare, e.g., Heiser v. Woodruff, 327 U.S. 726, 732-37, 66 S.Ct. 853, 856-57, 90 L.Ed. 970 (1946); and In re Gulph Woods Corp., 84 B.R. 961, 970 (Bankr.E.D.Pa.1988) (unappealed judgments may be conclusive of the validity of proofs of claims).
Our analysis of the liability of the Debtor for the alleged 1982 defalcations of Wynne as to American Express begins with the observation that there is no question that the Debtor did sell the business to Wynne two years before the liability in issue arose. There is no allegation that this sale transaction was accomplished for any bad faith purpose, or, specifically, to evade any liability which the Debtor might have had to American Express. American Express has not asserted any grounds for setting aside this transfer. We believe that, generally, a vendor of a business is not liable for obligations of the business that arise after he has sold it and involve transactions concerning which the vendor has made no undertaking and that, in their entirety, arose only after the sale has taken place. Compare Parish Mfg. Corp. v. Martin-Perry Corp., 285 Pa. 131, 137-38, 131 A. 710, 712 (1926); 6A C.J.S. 753-54 (1975) (assignor of contract in progress cannot relieve himself of his own undertaking by assignment).
These observations cause us to carefully examine the Trust Agreement and determine whether any clauses in it would alter our normal expectations that the vendor is not liable and render the Debtor liable to American Express for the post-sale obligations of his vendee, Wynne. American Express points to paragraphs 10 and 13 of the Trust Agreement as its bases for establishing liability of the Debtor.
In construing these provisions of the Trust Agreement, we must recall, initially, that the Trust Agreement is a form adhesion contract prepared solely by American Express. Therefore, its terms must be construed, wherever ambiguous, strictly against American Express. See, e.g., Jordan, supra, 91 B.R. at 678-79; In re Leedy Mortgage Co., 76 B.R. 440, 445-46 (Bankr. E.D.Pa.1987); and In re United Nesco Container Corp., 68 B.R. 970, 974 (Bankr. E.D.Pa.1987). Compare In re Temp-Way Corp., 82 B.R. 747, 751 (Bankr.E.D.Pa. 1988).
Paragraph 10 of the Trust Agreement, quoted at page 348 supra, states, inter alia, that the Trust Agreement may be assigned only if written consent of an official of American Express’ Money Order Operation approves the Assignment in writing. This clause, if enforced, would preclude the assignment of the rights and obligations of Wynnefield under the Trust Agreement to Wynne, since it is uncontested that no such written agreement of any sort was established to have been elicited from American Express concerning the assignment of the Trust Agreement to Wynne. However, paragraph 10 is silent as to the legal ramifications of an imperfect assignment. This paragraph certainly does not state, as American Express would apparently have us read it, that the purported assignor of an imperfect assignment remains liable for all obligations of his purported assignee arising thereafter.
In its Brief, American Express suggests that the Debtor, by his failure to elicit the requisite written assent to the assignment, “did not terminate his legal responsibilities under the Agreement” and, having “violated the Trust Agreement by failing to give notice of an assignment of the Trust Agreement, ... is liable to American Express for all monies due_” Memorandum of Law of American Express Travel Related Services Co., Inc., at 4, 5. Sandwiched in the midst of these statements is a full quotation of paragraph 13 of the Trust Agreement. Therefore, we infer that American Express contends that paragraph 13 of the Trust Agreement is the provision which renders an assignor liable for the obligations of his putative assignee when it has not given assent to the assignment. We do not agree that this paragraph has this effect. The first three sentences of paragraph 13 (quoted at page 348 supra) oblige the assignor to provide notice of its obligations under the Trust Agreement to the assignee in writing, with a copy to American Express. Although no such written notice was provided, we note that the operations of the business remained at all times in the hands of Ms. Jenkins. Therefore, there would not appear to be any question that Wynne, as assignee, recognized that it assumed all of the obligations of Wynnefield under the Trust Agreement. There is no dispute between American Express and Wynne on that score.
The last, rather convoluted sentence of paragraph 13 renders the imperfect assign- or liable to American Express, but only (1) in the event that the assignor has not notified the assignee of its obligations under the Trust Agreement; and (2) to the extent that damages result to American Express as a consequence of the failure of the assignee to assume these obligations. In the final phrase, the liability of the assign- or is further limited to only damages arising prior to the assignee’s assumption of the obligations of the Agreement.
We believe that the impediments to invocation of paragraph 13 by American Express here as a basis for rendering Wynne-field and the Debtor liable to it for Wynne’s defalcations are its failure to establish that Wynne had not agreed to assume the obligations of the Debtor’s business under the Trust Agreement and its failure to establish that its losses were suffered solely as a result of Wynne’s failure to assume those obligations. As we indicated above, it seems apparent to us that Wynne, operated by Ms. Jenkins, as had been Wynnefield, its predecessor, did agree, at least tacitly, to assume all of the obligations of Wynnefield under the Trust Agreement, long prior to the time that any problems regarding obligations of Wynne to American Express arose in late 1982. This being so, paragraph 13 would not support a cause of action of American Express against the Debtor.
We find no other provision in the Trust Agreement which renders an assignor of such an Agreement liable to American Express for the acts of its assignee. It might be contended that the imperfect assignment by Wynnefield effected a termination of the Agreement. However, paragraph 12, also quoted at page 348 supra, creates no special liability for assignors of businesses on termination of their contracts with American Express. Moreover, any termination was imperfect, as it was not effected in writing, as required by paragraph nine of the Trust Agreement. Furthermore, American Express indicated its own lack of concern for the specific provisions of the Trust Agreement by failing to give written notice of its termination of its relationship with Wynne in January, 1983. If anything, this would seem a far more serious breach of the terms of the Trust Agreement than any failures to send written notices on the part of Wynnefield.
The foregoing analysis leads us to question whether Wynnefield and the Debtor have any liability to American Express, even if we enforced all terms of the Trust Agreement against them. The Trust Agreement, if read strictly against American Express, would not seem to create any such rights. We underscore that our analysis might well differ if we believed that the alleged obligations of Wynne to American Express in issue were traceable to Wynnefield’s tenure as owner of the business, or that the transfer of the business to Wynne had any air of impropriety or of an attempt to take unfair advantage of American Express about it. Certainly, in such instances, the equities would be different. However, no such instances exist here. From an equitable standpoint, we would characterize American Express’ claims against the Debtor here as an attempt to impose a liability upon him from which he was otherwise totally free simply because he failed to comply with the requirement, which is both entirely technical and substantively unrelated to the issue at hand, to provide American Express with written notice of the sale of his business to Wynne.
In their briefing, both parties appear to assume that the Debtor’s potential liability turns upon whether the written consent requirement of paragraph 10 was waived by Mr. Richardson’s advice to the Debtor, in the two telephone notices to him by the Debtor of the sale of the business to Wynne in October, 1980, that no further notice of the sale was required. In this regard, we note that, in Pennsylvania,
[t]he law is crystal clear that a written contract may be modified orally. Consolidated Tile & Slate Co. v. Fox, 410 Pa. 336, 341, 189 A.2d 228 (1963). Even where the contract provides that any non-written modification will not be recognized. Wagner v. Graziano Construction Co., 390 Pa. 445, 448, 136 A.2d 82 (1957). Such a contract may be modified, changed or a new one substituted for it and this may be established by parol evidence showing either an express agreement or actions necessarily involving alterations. Consolidated Tile & Slate Co. v. Fox, supra, and Bartl v. Crawford Door Sales Co., 394 Pa. 512, 516, 147 A.2d 399 (1959).
Wymard v. McCloskey & Co., 217 F.Supp. 143, 147 (E.D.Pa.1963). Accord, First Nat’l Bank of PA. v. Lincoln Nat’l Life Ins. Co., 824 F.2d 277, 280 (3d Cir.1987); Barnhart v. Dollar Rent A Car Systems, Inc., 595 F.2d 914, 919 (3d Cir.1979); Cedrone v. Unity Savings Ass’n, 609 F.Supp. 250, 254 (E.D.Pa.1985); Universal Builders, Inc. v. Moon Motor Lodge, Inc., 430 Pa. 550, 557-59, 244 A.2d 10, 15 (1968); and Wagner, supra. Cf. In re DSC Industries, Inc., 79 B.R. 244, 248-49 (Bankr.E.D. Pa.1987), remanded 94 B.R. 42, 47-48 (E.D.Pa.1988) (applying New Jersey Law).
American Express, in addressing this argument, cites to Leasing Service Corp. v. Benson, 317 Pa.Super. 439, 449-50, 464 A.2d 402, 407 (1983), where it is said that the law “generally upholds the validity and sanctity of no-oral modification clauses [unless] ... there is evidence of a waiver of the requirement that modifications be written to be effective;” and C.I.T Corp. v. Jonnet, 419 Pa. 435, 439, 214 A.2d 620, 622 (1965), where Justice Musmanno, in typically colorful fashion, stated that, “[i]f such a loose and rambling averment [as in that case was purported to modify a contract] were to be accepted as wiping out a solemn stipulation in a written contract, then such stipulations would last no longer than the vapor written by airplanes in the sky.” See also In re Slaw Construction Co., 28 B.R. 540, 543 (Bankr.E.D.Pa.1983).
However, we believe that there are several responses to these authorities. First, we note that, when the facts were somewhat different, and the equities were in favor of the party seeking to avoid bondage to the strict terms of a written contract, Justice Musmanno, in Wagner, supra, was equally colorful in stating that “[t]here is nothing sacrosanct about a written agreement ... The most ironclad written contract can always be cut into by the acetylene torch of parol modification supported by adequate proof ... The hand that pens a writing may not gag the mouths of assenting parties ...,” 390 Pa. at 448, 136 A.2d at 83, and “[m]inds may meet in the field of oral concord as well as between the borders of parchment or paper,” 390 Pa. at 449, 136 A.2d at 84.
The facts here are readily distinguishable from those in Leasing Service, C.I.T. Corp., and Slaw Construction. The waiver in issue is of a term which, as we indicated in our discussion at pages 351-52 supra, of little material consequence in the parties’ contract. There is considerable question in our mind, as indicated therein, as to whether anything in the Trust Agreement actually would render the Debtor liable to American Express for the obligations of Wynne in any event. Clearly, it should be easier to find a waiver of a non-material, purely-technical contract provision, as we believe the requirement of paragraph 10 to be under the facts here, than one which is highly significant. See Cedar Points Apartments v. Cedar Point Inv. Corp., 693 F.2d 748, 755 (8th Cir.1982) (clause requiring written consent to an assignment not enforced because “its existence ... does not form an essential part of the exchange for the promisor’s performance”). Compare Temp-Way, supra, 82 B.R. at 752-53 (court enforces contract provision found to indeed be material despite arguments to the contrary). The element of lack of materiality is supported by our observation that neither party appears to have adhered to any of the written notice requirements in the Trust Agreement.
In contrast to Leasing Service, supra, the element of waiver does arise here, due to Mr. Richardson’s assurances to the Debtor that his oral notices of the sale of the business were sufficient for American Express’ purposes. In fact, it appears to us that all of the elements necessary to establish an equitable estoppel against American Express arising out of these telephone exchanges are present here. See E.C. Ernst, Inc. v. Koppers Co., 626 F.2d 324, 330 (3d Cir.1980); Schifalacqua v. CNA Ins., 567 F.2d 1255, 1258 (3d Cir.1977); GAF Corp. v. Amchem Products, Inc., 399 F.Supp. 647, 657-59 (E.D.Pa.1975), rev’d on other grounds, 570 F.2d 457 (3d Cir.1978); and In re Haines, 10 B.R. 856, 858-59 (Bankr.E.D.Pa. 1981). These elements are that the party sought to be bound by waiver acts or is silent when he ought to speak, anticipates that the other is relying upon him, and possesses or should possess the requisite knowledge to provide correct information; and that the party raising the claim of estoppel lacks knowledge of the accuracy of the facts in issue, relies on the party sought to be estopped, and changes his position in reliance upon what he is told (or not told). See GAF Corp., 399 F.Supp. at 657, and cases cited therein. Here, Mr. Richardson knew or should have known that the assignment request was technically required to have been in writing, yet he advised the Debtor that his oral notices were sufficient, in full awareness that these representations would be relied upon by the Debtor. The Debtor, whose literacy was limited, clearly lacked knowledge of the Trust Agreement provisions, and relied upon the advice of Mr. Richardson to his detriment, as he would have doubtless supplied the requisite written notice of same had it been requested by Mr. Richardson. The elements of an equitable estoppel would therefore appear to be present. We note that estoppel has been, specifically held to run against parties which manifest intentions to disregard such restrictions on assignments. See Cedar Point, supra, 693 F.2d at 754-76; and RESTATEMENT (SECOND) OF CONTRACTS § 323 (1981).
Therefore, we agree with the Debt- or that the requirement that the notice of assignment be in writing was waived by Mr. Richardson on behalf of American Express. Hence, even if we believed that the terms of the Trust Agreement technically rendered Wynnefield and the Debtor liable to American Express, which we do not, we would not enforce that requirement as to the Debtor here. We therefore conclude that the debtor is not liable to American Express for any of the alleged obligations of Wynne to American Express arising in the latter part of 1982.
Having reached this conclusion, we need not further explore the parties’ mountains of documents to ascertain the precise amount of any liability of Wynne to American Express. Nor need we consider whether the award of prejudgment interest and attorney’s fees was justified. We shall, nevertheless, comment on these issues, but do so very briefly.
First, we do not believe that the documentation supports a finding of a liability of Wynne in the full amount claimed by Mr. Yochmowitz of $31,724.57, or of the $31,598.57 recited in the Proof of Claim and awarded by the arbitrators. We have several reasons for questioning this liability. As the Debtor points out, as of August, 1982, the only controversy between the parties involved an obligation of Wynne to American Express in the amount of $15,-990.00, which Wynne promptly satisfied. How a discrepancy as large as $31,000.00 could have developed in such a short time thereafter, after a long prior period of tranquility, is unexplained. The vague testimony of Mr. Richardson and the documentation of American Express, answered by the more specific submissions of Ms. Jenkins evidencing payments which appear to clearly rebut any deficiency in excess of $15,-559.16, did little to inspire our confidence in the accuracy of the calculations of American Express. Only the liability for the payment check which apparently did not clear Wynne’s account in the amount of $3,076.57, the dispute over which was the only issue which set off the parties’ controversy, appears clear.
The claim for pre-judgment interest is clearly dependent upon the validity of the underlying claim of American Express against Wynne. Moreover, pre-judgment interest is recoverable as a matter of right, under Pennsylvania law, only where the defendant commits a breach of a contract to pay a definite sum of money. See Benefit Trust Life Ins. Co. v. Union Nat’l Bank of Pittsburgh, 776 F.2d 1174, 1177-80 (3d Cir.1985); Ambromovage v. United Mine Workers of America, 726 F.2d 972, 980-84 (3d Cir.1984); Fernandez v. Levin, 519 Pa. 375, 548 A.2d 1191, 1193-94 (1988); and In re Art Shirt, Ltd., 68 B.R. 316, 325 (Bankr.E.D.Pa.1986), aff'd, 93 B.R. 333 (E.D.Pa.1988). The claim of American Express here is so indefinite that we question whether any award of pre-judgment interest would be appropriate.
Finally, the claim for any attorney’s fees measured at twenty-five (25%) percent of the obligations due, simply because of the presence of the twenty-five (25%) percent figure of measurement in paragraph 14 of the Trust Agreement (see page 348 supra), is extremely questionable. Contract clauses authorizing the fixing of attorney’s fees by measurement of a certain fixed percentage of a debt are properly interpreted as caps on fees allowable, not licenses to routinely impose the amount which results from a computation of that given percentage. See In re Johnson-Alien, 67 B.R. 968, 976-77 (Bankr.E.D.Pa. 1986); and In re Cosby, 33 B.R. 949, 950 (Bankr.E.D.Pa.1983). The upward limit of an amount of attorney’s fees includable in a proof of claim, as is true generally under the law of Pennsylvania, is an amount that is reasonable, irrespective of the provisions of the parties’ contract. See In re Nickleberry, 76 B.R. 413, 421-23 & n. 11 (Bankr. E.D.Pa.1987). Here, there is absolutely no evidence to support the conclusion that a fee in the amount of $6,319.71 is “reasonable.”
Our conclusion that there are questions as to the legitimacy of all aspects of the merits of the claim of American Express against Wynne, let alone against Wynne-field and the Debtor, lends to our comfort in concluding that its Proof of Claim, against the Debtor here, should be disallowed. An Order so stating will accordingly be entered by us.
We are, however, somewhat distressed to note that the Debtor has apparently not yet filed his Schedules and that, therefore, no meeting of creditors pursuant to 11 U.S.C. § 341 has been scheduled in this case, as we directed in paragraph one of our Order of December 16, 1988. We therefore include mandates in our Order designed to rectify this situation.
. We note that a failure of a contracting party to provide a requisite written notice of termination to the other party can give rise to liability on its part. See In re Chapman, 77 B.R. 1, 5-6 (Bankr. E.D.Pa.1987). There is, however, no evidence that Wynne has ever pursued any claim against American Express as a result of these actions.
. There is also a question as to whether such fees are allowable as an aspect of the clearly unsecured claim of American Express, in light of the presence of 11 U.S.C. § 506(b). See In re Vitelli, Vitelli v. Cheltenham Federal Savings & Loan Ass’n, 93 B.R. 889, 894-97 (Bankr.E.D.Pa. 1988); and Nickleberry, supra, 76 B.R. at 423-26.
| CASELAW |
Germany, Vanilla Beans, Riz Ahmed: Your Friday Briefing
Europe Edition (Want to get this briefing by email? Here’s the sign-up.) Good morning. Germany braces for more neo-Nazi protests, India pushes back against a crackdown and Campbell Soup goes back to its roots. Here’s the latest: • A rampage in Chemnitz this week was a high-water mark in the outpouring of anti-immigrant hatred that has swelled in Germany. For a few perilous hours, an angry mob, pictured above, owned the eastern city’s streets, chasing after dark-skinned bystanders as outnumbered police officers failed to intervene. Some in the crowd flashed Nazi salutes. The scale of the unrest reflects a more assertive far right that has started pushing into the mainstream, as Germany struggles to absorb nearly a million asylum seekers who entered after Chancellor Angela Merkel opened the borders in 2015. Some say Chemnitz is becoming a test of Germany’s postwar democracy. More marches are planned in the city Saturday. _____ • Gérard Depardieu, the film star, is accused of rape. Prosecutors are investigating claims that Mr. Depardieu, above, a towering figure in French cinema whose career spans more than 200 movies, sexually assaulted a young actress on two occasions this month at his home in Paris. Mr. Depardieu’s lawyer said the actor was “stunned” by the accusations and “absolutely contests any sexual assaults.” He is the second prominent French film figure accused of rape this year, after the director Luc Besson. The French response to the accusations against Mr. Besson was muted, compared to the #MeToo movement in America that arose from similar charges against Harvey Weinstein, the Hollywood producer. French television news did not dwell on the Depardieu story, suggesting another subdued reaction was likely. _____ • “Democracy is under siege in India.” That’s how many in India see the arrests of five activists this week. The activists were taken into custody on suspicion of abetting communist groups, plotting the assassination of government officials and inciting riots. Several other activists were accused of similar crimes in June. The arrests have sparked an outcry from the media, intellectuals and others who say the charges are thinly veiled attempts by Prime Minister Narendra Modi’s government to stifle dissent. Above, protesters speaking out against the arrests. Discontent with Mr. Modi’s policies doesn’t stop there. Two years ago, the prime minister suddenly invalidated large chunks of the country’s paper currency in a bid to rid the economy of “black money” and deter criminals, including tax evaders and terrorists. But a report from India’s central bank found that 99 percent of the value of the old bills pulled from circulation found its way back into the financial system. _____ • “It’s like cocaine in Latin America.” The price of vanilla in Madagascar has skyrocketed from $50 a kilogram to about $600, making it more valuable than silver. While the plant pods have helped make the economy a little sweeter, it has also created lawless criminal networks that revolve around the prized commodity. Our reporter takes a look at Madagascar’s vanilla trade from plant to port. • The Campbell Soup Company plans to sell off its fresh food and overseas businesses, retreating from its efforts to cater to health-conscious shoppers. The canned soup giant also left the door open to selling its entire business, as sales and gross margins fell. • The European Union’s top trade official said the bloc would be willing to remove all tariffs on cars as part of a limited trade agreement, if the U.S. reciprocates. “It’s not good enough,” said President Trump. • Argentina’s central bank, trying to slow the fall of its plunging currency, raised interest rates by 15 percentage points, bringing the benchmark lending rate to 60 percent and prompting a sell-off of other emerging-market currencies. • Do you respond to emails during your work commute? Maybe that should count as part of your working day. • Here’s a snapshot of global markets. • President Trump reaffirmed his decision in June to suspend joint military exercises with South Korea, pictured above, because they cost too much. Many South Koreans are worried about the president’s commitment to the decades-long alliance. [The New York Times] • Street urinals in Paris, already derided as eyesores, have been vandalized by protesters who see them as sexist. Unidentified vandals plugged two urinals with cement and decorated them with tampons and protest stickers. [The New York Times] • Omaui, an idyllic coastal town in New Zealand, is home to a vast assortment of rare bird species, and just 35 humans and seven to eight cats. But a new proposal to preserve the unique wildlife would phase out the feline friends. [The New York Times] • The U.S. Justice Department sided with Asian-American students who are suing Harvard University for affirmative action policies that they claim discriminate against them. [The New York Times] • Iran is complying with the restrictions on its nuclear activities set out in the 2015 international accord that lifted sanctions on the country, according to a confidential report by the U.N. atomic watchdog. But the deal, which President Trump pulled out of this year, now hangs by a thread. [Reuters] • The New Academy prize, the alternative to the scandal-ridden Nobel literature prize that was canceled this year, has announced its shortlist, which includes Neil Gaiman and Haruki Murakami. [The Guardian] Tips for a more fulfilling life. • Recipe of the day: There’s nothing quite like having a tray of homemade tiramisù in the refrigerator. • Small things can have big ramifications. • Open offices are awful. These desk improvements will make your 9-to-5 more bearable. • Riz Ahmed, above, the British actor and rapper, is a shapeshifting, genre-bending talent who defies pigeonholes and seems to be able to do it all. Just don’t call him a Renaissance man. • Scientists call it the “woman in red” effect: when male pregnant pipefish see a more appealing female, they abandon their offspring. • In memoriam: Paul Taylor, the choreographer and dancer who bought poetry and lyricism to modern dance. He was 88. Tennis tournaments can lead to debates about gear, and this year’s have been no exception (see: Serena Williams, catsuit). But few controversies can compare to the furor at the U.S. Open in 1977 over the so-called spaghetti racket (pictured here). Michael Fishbach, a player from Long Island, qualified for the U.S. Open with a racket described by The Times as “doublestrung and reinforced with fishnet line, adhesive tape and plastic tubing, creating the spaghetti effect.” That made the ball spin and bounce in unpredictable ways. Fishbach, ranked 200th, upset his first- and second-round opponents. He lost in the third round, though even his opponent, John Feaver, was confounded by the bounce off Fishbach’s racket: “You don’t know what’s going on with the bloody thing.” Talk of a ban gained traction a few weeks later at another tournament, after a player walked off the court in protest during a match against Ilie Nastase, who was using a spaghetti racket. The United States Tennis Association banned the racket soon after, and the International Tennis Federation followed the next year, adopting a rule that defined a tennis racket for the first time. “The purpose, of course, is to get rid of the spaghetti racquet,” The Times wrote. Jillian Rayfield wrote today’s Back Story. _____ Your Morning Briefing is published weekday mornings and updated online. Check out this page to find a Morning Briefing for your region. (In addition to our European edition, we have Australian, Asian and U.S. editions.) Sign up here to receive an Evening Briefing on U.S. weeknights, and here’s our full range of free newsletters. What would you like to see here? Contact us at europebriefing@nytimes.com. | NEWS-MULTISOURCE |
Workout
GAIN MUSCLE WITH SQUAT – BENEFITS, PROPER FORM AND VARIATIONS
gain muscle with squats
Squat is beneficial for any kind of purpose, whether you want to grow, cut or gain strength, squats will get you there.
The squat has a strong strengthening effect, it will make your whole body stronger while having a positive effect on all your basic lifts.
Squat is a joint exercise that uses most of the body’s muscle group; as a result of large amount of muscle groups are used, causes the body to increase the production of anabolic hormones.
A study by the University of Texas found that doing squats increases testosterone and growth hormone making it the king of all exercises.
To gain muscle with squat comes with huge benefits such as;
Squat benefits # 1 – squats are a highly functional lift
A squat is a basic movement pattern that people have been practicing for millions of years, strength developed from squats can be highly efficient not only in the gym but can also carry over into daily activities.
Squat benefits # 2- squats activates many muscle groups
Squats activates majority of muscle groups simultaneously such as the quads, glute, hamstrings, spinal erectors, abs, oblique and calves.
Squat benefits # 3- squats improves athletic performance
Gaining strength and stamina in squats is an important way to improve your athletic performance because it allows you to build the strength of the hip extensor which can be used in sports in sprinting activities and vertical jumps.
Squat benefits # 4- squats reduces the risk of injury
Incorporating squats into your overall exercise program also helps to strengthen muscles, tendons and bones which will reduce the risk of injury.
Squat benefits # 5 – squats strengthens the core
During the entire squat movement, the spinal muscles work hard to keep the body upright and support back, this improves the overall core strength which carries over to improve strength and performance of other exercises, protects the lower back from injury and stimulates muscle hypertrophy in the obliques and abdominals.
Squat benefits # 6 – squats builds big legs
Squats focus on developing big legs; builds lower body strength and muscle mass.
Squats benefits # 7 – squats builds strength
Squares are good indicator of strength which is why it is among the top 3s of the power lifting competition. No other lift builds up muscle mass in general like squat. It is a real measure of strength.
Variations of squats
To gain muscle with squat, you have to incorporate different variations into your routine. There are many variations of this amazing exercise that you should incorporate into your routine.
• Back squats
The back squats is one of the traditional mass building exercise for the lower body developing all four quadriceps head. The back squats work well for improving athletic performance as it works all muscle groups.
gain muscle with squats
How to do the back squats
1. Step under a loaded barbell in a squat rack, let the barbell rest across the back of the shoulders. Hold firmly onto the bar, raise up to lift off the rack.
2. keep your chest up and a straight back, bend your knees and lower yourself until the thighs are parallel to the floor, pause when you reach parallel.
3. Then drive through the heels to stand back to the starting position.
Note: The position of the feet determines the area of the thighs you work on while doing squats. Wide stance works the inside the thighs, while with a narrow stance works the outside more.
• Front squats
The front squats emphasize the quadriceps more than the traditional back squats but still strengthens the glutes and the hamstrings muscle as well. It forces the body in an upright position of the thoracic extension which develop posture, spine, scapular adductor and leg muscles.
gain muscle with squats
How to do a front squat
1. step up to the barbell in the squat rack, bring your arms under the bar, letting it rest under the shoulder.
2. Cross the arms and grasp the bar with your arms to control it, keeping the elbows high.
3. Lift the weight off the rack, take a deep breath, tighten the core keeping a straight back and your chest up.
4. Bend your knees lowering Yourself until your thighs are parallel to the floor.
5. Drive yourself through the mid-foot to stand up out of the squats.
• Sissy squats
The name has nothing to do with the gender of people who perform this exercise. In short, real men do this exercise. The sissy squats place more emphasis on the quads by most of the involvement of the glutes and hamstrings, and also strengthening the core and building the hip flexors.
How to do the sissy squats
1. Stand upright with feet shoulder with apart holding on to a bench or other support.
2. Bend your knees slightly and tilt the body backward, engage your core and keep the body upright.
3. Raise your toes and lower your body in a squat.
4. Squat as low as possible without losing balance.
5. Pause for a while, then push yourself back to the starting position.
6. Then repeat.
• Overhead squats
Overhead squats can be an effective way to train the lower body while developing and balance and mobility. Overhead squats also work the muscles in the upper back, shoulders, and arms. Your range of motion will vary slightly with this type of exercise, so correct technique is important.
SQUAT BENEFITS, PROPER FORM AND VARIATIONS
How to do the overhead squat
1. Step under barbell in a squat rack, place the barbell across the back letting it rests on the traps just as if you were about to perform a squat.
2. Then step back a bit from the squat rack, stand upright with your feet shoulder width apart.
3. Inhale and brace your core, bend at the knees and grip the barbell with hands wider than shoulder width. In an explosive movement, drive the barbell up over your head while simultaneously extending your knees and hips. Note: the bar should be positioned slightly behind the head and the arms fully extended.
4. Slowly squat down until the thighs are parallel to the ground
5. Drive through the heels, exhale as you rise to stand up back then gradually lower the weight down to your shoulders. Rack the barbell. Note: Only use a weight that you are comfortable with so as to maintain proper form.
• Zercher Squat
If you push through the discomfort, this exercise will completely transform your body, this exercise can build big quads, give you huge traps and work the core, it is one of the workouts out there which is rare for people who even lift, though the zercher squats can be uncomfortable, you will still reap amazing benefits from this workout.
How to do the zercher squats
1. Place the barbell in the crook of the elbows.
2. While maintaining an upright position, squat until the bar touches your thighs.
3. Then drive upwards straight back to the starting point.
Note: when doing a zercher squat, wear a long-sleeved shirt and consider placing neoprene knee sleeves around your elbows to prevent discomfort during this.
Hack squat
The hack squat is a machine-based exercise that works the leg muscles but mainly focuses on the quads, however hack squat can be an effective movement to build lower body strength and mass with this exercise you can load more weight than you do on the back squat.
SQUAT BENEFITS, PROPER FORM AND VARIATIONS
How to do the hack squat
1. Load the machine with the desired weight and lie on the machine, position your shoulders against the pads and make sure your back is flat against the platform.
2. Position your feet at shoulder width with the toes slightly pointed outwards, keep your head up and grab the handles.
3. Keeping hold of the handles, bend your knees and slowly lower the weight by bending your knees until your thighs are approximately at 90 degrees.
4. Pause at the bottom for a second.
5. Reverse the movement by driving into the platform and extending the knees and hips.
• Bulgarian squat
This single leg variation focuses one leg at a time, targeting all the same muscle groups as it does during the squats but with greater emphasis on the quadriceps and core. This one-leg squat variation also improves your balance.
How to do the Bulgarian squat
1. Place your foot a few feet behind you on a bench or on a raised platform.
2. Keeping the torso upright, tighten your abs, slowly lower your leading leg toward the floor until the thigh is almost horizontal or when your back knee touches the floor.
3. Drive up back to the starting position.
Tips for properly executing the squat
To gain muscle with squat, maintaining proper form is essential to avoid injury. Always keep your chest, shoulders, and back straight as this not only hinders growth but also make you prone to injury.
Conclusion
If you want to gain muscle with the squat, you have to get rid of the excuses and incorporate them into your routine, whether you want to grow, cut or gain strength, squats will get you there. You won’t only build big legs; you will also lift better and increase overall body weight and gain strength.
Do the squats.
3 Comments
Leave a Comment | ESSENTIALAI-STEM |
Positive and negative failure-shears in orthotropic materials
δείτε την πρωτότυπη σελίδα τεκμηρίου
στον ιστότοπο του αποθετηρίου του φορέα για περισσότερες πληροφορίες και για να δείτε όλα τα ψηφιακά αρχεία του τεκμηρίου*
κοινοποιήστε το τεκμήριο
Positive and negative failure-shears in orthotropic materials (EN)
Theocaris, PS (EN)
N/A (EN)
Failure predictions of off-axis loaded fiber composite laminate are given according to the elliptic paraboloid failure criterion for anisotropic solids [1]. The failure condition assumes that for any anisotropic solid a safe triaxial loading path exists, along the hydrostatic compression, and thus the failure surface must be open-ended. By appropriately formulating the failure criterion, it is shown that the geometric interpretation of the failure surface in the principal stress space is an elliptic paraboloid (EPFS) whose axis of symmetry is parallel to the hydrostatic axis in the principal stress space. Because of the shape and position of the EPFS, the intersections by principal stress planes corresponding to loadings of off-axis laminate of a fiber composite are represented by ellipses whose origins are displaced from the origin of the stress reference frame. This fact creates unequal shear yield stresses in the positive and negative sense clearly manifested in a pure shear failure loading. The predictions of the above criterion for plane stress failure loadings of laminae, and especially for pure shear induced failures, are compared with existing experimental data for various fiber composites and are shown to be in satisfactory agreement. (EN)
journalArticle
Plastics Laminates (EN)
Plastics Laminates - Failure (EN)
Shear Induced Failure (EN)
Stresses - Shear (EN)
Failure Criterion (EN)
Orthotropic Materials (EN)
Anisotropic Solids (EN)
Elliptic Paraboloid (EN)
Εθνικό Μετσόβιο Πολυτεχνείο (EL)
National Technical University of Athens (EN)
Journal of Reinforced Plastics and Composites (EN)
1992
TECHNOMIC PUBL CO INC (EN)
*Η εύρυθμη και αδιάλειπτη λειτουργία των διαδικτυακών διευθύνσεων των συλλογών (ψηφιακό αρχείο, καρτέλα τεκμηρίου στο αποθετήριο) είναι αποκλειστική ευθύνη των αντίστοιχων Φορέων περιεχομένου. | ESSENTIALAI-STEM |
May 30, 2013 · How to unlock (jailbreak) your Windows RT device By Joshua Sherman May 30, 2013 Windows RT is a sort of unique member of the Microsoft family of operating systems. It’s Windows, but it’s not.
Jun 20, 2017 · Jailbreaking is the process of removing the limitations put in place by a device’s manufacturer. Jailbreaking is generally performed on Apple iOS devices, such as the iPhone or iPad. Jailbreaking removes the restrictions Apple puts in place, allowing you to install third-party software from outside the app store. Mar 30, 2017 · Jailbreaking unlocks the security settings on your device so that you have admin control over it. After it's jailbroken, others could potentially have admin control over it, too. On an Android device, this same process is called "rooting." Feb 17, 2020 · Unc0ver Jailbreak Process Failing. It is possible that the Unc0ver app keeps failing to jailbreak your device. The app could crash or just seem stuck. In such a case, you need to close the Unc0ver app, clear all app cache, restart your device, turn on Airplane mode, and then try to jailbreak your device again. The devices are provided on a 12-month renewable basis and remain the property of Apple. They are not meant for personal use or daily carry, and must remain on the premises of program participants
Jailbreaking your device is a security risk. This news is a timely reminder about the downside to jailbreaking your Apple iOS device. It sounds like a great idea, in theory, but what many often overlook is that while jailbreaking allows Apple users to bypass many iOS operating system restrictions they might consider burdensome, for example being only able to download apps from the Apple iOS
Jul 02, 2020 · The jailbroken FireStick gives you access to the endless pool of media (including movies, shows, live Tv, and a lot more) available on the internet. By jailbreaking your streaming device, you end the limitations imposed by the manufacturer. Jan 06, 2020 · To jailbreak your iPhone is to free it from the limitations imposed on it by its manufacturer (Apple) and carrier (for example, AT&T, Verizon, and others). After a jailbreak, the device can do things it previously couldn't, such as install unofficial apps and modify settings and areas of the phone that were previously restricted. 32-bit devices only. Semi-untethered, but can be untethered by installing UntetherHomeDepot via tihmstar's Cydia repo. Follow the Cydia Impactor method of installing the Jailbreak. Jailbreaking removes the Apple locks and restrictions on your device, and permits root access to iOS. With root access, you can also install additional applications, extensions, and themes that are unavailable through the official Apple App Store. If your device is jailbroken, you may want to access and transfer files to:
Jailbreaking removes the Apple locks and restrictions on your device, and permits root access to iOS. With root access, you can also install additional applications, extensions, and themes that are unavailable through the official Apple App Store. If your device is jailbroken, you may want to access and transfer files to:
If your device is jailbroken, you can install apps that aren't available from the iTunes App Store. For example, Cydia is a framework that lets you add other unauthorized apps, such as games and Basically, if you can execute arbitrary code or write to arbitrary disk locations, you're jailbroken. iOS security researcher Stefan Esser (also knows as i0n1c) has developed an application called System and Security Info to determine if an iOS device is currently jailbroken by testing for the abilities that you gain from jailbreaking. | ESSENTIALAI-STEM |
DEV Community
Cover image for So what actually is Nginx? (Linux Sys-Admin for web devs)
Angus Allman
Angus Allman
Posted on • Updated on • Originally published at angusallman.com
So what actually is Nginx? (Linux Sys-Admin for web devs)
We've all been there
Getting to the point of having a site looking beautiful and polished with only one problem... no one can actually see it yet. This is where the whole painful deployment process kicks off. A search for "How to deploy a your stack site" will return a slew of options but some things seem to crop up time and time again no matter what tech you're using. Nginx
What is it?
The official word (from the Nginx site) is:
NGINX is open-source software for web serving, reverse proxying, caching, load balancing, media streaming, and more.
Put simply, it's the thing that handles communication between the web server and your site. Whether that be reading the domain that's been requested by the user and handling it by pointing the request to the correct files, or sending it elsewhere (reverse proxy).
When you access a website, say ilovenginx.com, it always sends a request to a server somewhere in the world (for more info on how this works read about DNS). Now that the request's reached the server it needs to know what to do with it and that's where Nginx comes in. Using it you can create config files that contain instructions for what to do when a request to ilovenginx.com arrives at the server.
Hit the ground running
Nginx creates a load of files in the /etc/nginx directory as soon as it's installed. This is where you want to create your config files because without them Nginx is useless and won't do a thing.
Inside /etc/nginx and you'll see a myriad of files and folders but the ones we want are sites-enabled, and sites-available.
sites-available is where we create and edit our Nginx config files and sites-enabled contains symbolic links (symlinks) to our config files in sites-available. The point of this is that you can have as many config files as you want available to use but only actually have the important ones which your site(s) use enabled.
The config files
If you head into the directory /etc/nginx/sites-available there will be a file named 000-default.conf. If you want you can open that up and take a look at the base config file template.
I'm fairly sure that these config files look bewildering to even the most experienced developers and I'll be creating a line-by-line breakdown of one of these files in another blog post (coming soon) but let's not get bogged down in the details here. Fundamentally, these files are a list of instructions that tell Nginx what to do with requests that arrive depending on which domain they're for and what port they arrive at (usually port 80 for HTTP requests, or port 443 for HTTPS).
A brief rundown
As with all systems like this, there is a great deal which I could discuss here and an endless list of varying commands which do plenty of different, unique things, however below, I’ve listed a few of the most important lines from a config file with a brief explanation of what they do.
server {} - Creates a new Nginx server to handle requests (all Nginx commands should be within a server block)
listen - Defines which port the this server should handle requests from.
root - Points to the directory which your site is stored in. The path will usually contain /var/www if you use Nginx's defaults.
index - Tells Nginx a list of files in the root directory to use to run the site. You can use space-separated file names in the order which they should be tried
server_name - Defines the domain name that you want this server block to handle requests for. You can list multiple domains here e.g:
server_name example.com www.example.com;
Conclusion
That just about does it for the basics of Nginx! While it can seem complicated and like something that only advanced devs know there’s no need for it to stay that way. What it does under the hood is all kinds of magic but at its core it’s an elegant way to tell your server how to handle requests, get your site live and show it to the world. As I mentioned there will be another post coming soon which will be a deep dive into a real Nginx config file and how it does its wizardry line-by-line. If there is anything you feel could be added to this post or you have any questions then leave them in the comments below!
Top comments (0)
50 CLI Tools You Can't Live Without
The top 50 must-have CLI tools, including some scripts to help you automate the installation and updating of these tools on various systems/distros. | ESSENTIALAI-STEM |
gyriuq
Object.extend Black Magic
Just an interesting inheritance mixin I use from time to time. Haven't seen it around on the web,
thought you might enjoy it.
function extend () {
return [].reduce.call(arguments, Object.create, this);
}
Create yourself a prototype and add in the ye olde extend magic.
Let's just use the classic example of person/say name we all know and love.
var person = {
sayName: function () {
console.log("Hello, my name is " + this.name);
return this;
},
name: "John Doe",
extend: extend
};
Now let's create another "prototype", but not too specific. Just add in some extra functionality.
Note this is formatting using Object.create's propertiesObject argument.
var ninja = {
hide: {
value: function () {
this.hidden = true;
return this;
}
}
};
Maybe another for good measure? Be sure to note here that these don't inherit from person, it's just some behavior or data we might want to add to a person.
var wizard = {
fireball: {
value: function () {
console.log("Pew Pew!");
return this;
}
}
};
And now: a god-damned ninja-wizard.
var ninjaWizard = person.extend(ninja, wizard, {
name: {
value: "Ninja Wizard"
},
wtf: {
value: function () {
console.log("RWAWRRRGGGGG!");
return this;
}
}
});
ninjaWizard.sayName().wtf().fireball().hide();
Maybe create a son of Ninja Wizard?
var shaggar = ninjaWizard.extend({
name: {
value: "Shaggar, Son of Dolff"
},
feedToGoats: {
value: function () {
if (this.hasCutoffManhood) {
//Do things
}
}
}
});
shaggar.sayName().feedToGoats();
The above works with as many prototypes as you'd like to throw at it. If you want to do a little
formatting to avoid the verbosity of Object.create, go for it. I personally don't mind it.
EDIT: For those of you interested, I've created a very small library with this functionality: metatype.js.
7 Responses
Add your response
13708
0fnsi63t normal
Tags: "wizards", "ninjas". Niiiice.
over 1 year ago ·
13724
0 goniworhrdizozyquf6pwgf5 inze1mqumcywgyqda8xvbm6m2qfljhvp5qidq7eidnjkvahsbu
This is pretty sick, nice trick
over 1 year ago ·
13775
Cf7a5a69a6ea64cb0b8a6eac32cad791
hi chris, that looks great. does it have any disatvangtes compared to the standard extend method (like underscore's)?
over 1 year ago ·
13776
55e62171d8f1b780c9439899d36cc6dc normal
Awesome!!!
over 1 year ago ·
13783
Me
This should be in standard.
over 1 year ago ·
13786
7bb511a89868311f7ce08747f7105913
Hey @oronm, this is a very different type of functionality than underscore's extend. The extend in underscore simply copies properties from one object to another. This is creating a new object in which the prototype chain extends from the object on which the method was called, includes each argument passed, and ends with the new object.
over 1 year ago ·
13832
4693d7cfa88635d430c0de9a92f8dd84
"a god-damned ninja-wizard" code that is :)
Awesome tip!
over 1 year ago · | ESSENTIALAI-STEM |
Deadheart
Deadheart is an Australian rock/pop band from Geelong. The band released two albums in the 1990s and finished in 2000 when singer and songwriter Ron Thorpe was killed in a car accident. Thorpe had previously played with No Fixed Address and performed on the Terrasphere album and had been removed from his parents at the age of five.
Discography
* Deadheart (1994) – CAAMA
* Sista Krista (1998) – CAAMA | WIKI |
Charles Crane
Charles Spencer Crane (January 4, 1869 – September 13, 1958) was a businessman and politician in Hawaii.
Life
Crane was born in Honolulu on January 4, 1869, the son of a whaler captain Ezra Dean Crane and Emma Ann Still Crane. He started working at the Honolulu telephone company. In February 1897 he worked in the business department of the Hawaiian Gazette Company, became assistant manager of the Gazette in 1900, and in November 1905 became manager of the publishing company. From 1908 to 1919 he published a Hawaiian language newspaper called Ka Nupepa Kuokoa. Crane married Emma Spurrell Thompson on October 16, 1922, at Hilo. He eventually became executive vice president of what would become the Honolulu Advertiser.
After Advertiser owner Lorrin A. Thurston died, his son Lorrin Potter Thurston took over in October 1931, and Crane resigned from the newspaper to go into politics. He was elected to the board of supervisors for the City and County of Honolulu. He was appointed Mayor of Honolulu July 15, 1938 upon the death of George F. Wright, and served until January 2, 1941. He was elected to the Territory of Hawaii senate 3rd district in 1943 and 1945. He retired for a while to California, and then returned to live with his son Ezra Crane who was editor of the Maui News. He died on Maui September 13, 1958.
Crane is memorialized in Honolulu by Crane Playground in the Kaimukī section of Honolulu at 21.28583°N, -157.81472°W. | WIKI |
Skip to main content
Advertisement
You are viewing the new article page. Let us know what you think. Return to old version
Prefrontal cortical modulation of information flow in a large-scale model of the cortico-thalamic circuit
While generating the stream of consciousness and driving our actions in the world the brain largely relies on implicit forms of information processing. Conscious and unconscious factors are closely coupled and can be seen as complementary since unconscious processing can be sensitive to regularities within signals prior to conscious awareness, suggesting that the content of consciousness can be biased by unconscious factors.
In the context of the Distributed Adaptive Control (DAC) theory of the mind, brain and body nexus [1], we previously developed different probabilistic models of perception and attention that include bottom-up and top-down processes in defining an anticipatory gate to restrict the prediction of future incoming stimuli [2]. These results suggest that unconscious information presented at the border of this anticipatory gate could lead to a re-organization of perception and cognition by modifying sensory expectations. A plausible neuronal substrate for this top-down shaping mechanism has been identified in the circuitry including prefrontal cortical areas and the thalamus by mediation of the inhibitory thalamic reticular nucleus (TRN) interposed between the thalamus and the cortex. TRN is uniquely innervated by prefrontal projections, both by large ('driving') and small ('modulatory') synaptic boutons, that extends into the sensory sectors of the nuclei [3] indicating a possible role in the regulation of the sensory information flow from the thalamus to the cortex.
Building on an initial large scale model of thalamo-cortical dysrhythmia [4], the present study describes a spiking model of the cortico thalamic loops that aims at explaining how concurrent sensory inputs can be effectively gated by the activation of prefrontal projections to the TRN. The model consists of a network of pyramidal cells, interneurons, thalamic reticular and thalamocortical relay cells and includes driving and modulatory connections from the prefrontal areas to the TR nuclei. We show that inputs from the prefrontal cortex (and its homologous thalamic area) can selectively favor one of two incoming thalamic stimuli by activating neighboring TRN neurons and thus inhibiting the thalamic relay cells activated by the concurrent stimulus. The stimulus is then not sufficiently strong to be transmitted to the cortical areas. PFC top-down expectations can thus act as a filter on the thalamus (by the mediation of the RTN) to suppress irrelevant signals and maintain a coherent internal state. As a follow up we want to test the prediction that the same mechanism can drive to conscious percepts following strong expectations even in the absence of external stimuli.
References
1. 1.
Verschure PFMJ: Distributed adaptive control: A theory of the Mind, Brain, Body Nexus. Biologically Inspired Cognitive Architectures. 2012, 1: 55-72.
2. 2.
Mathews Z, Bermúdez i Badia S, Verschure PFMJ, PASAR: An integrated model of prediction, anticipation, sensation, attention and response for artificial sensorimotor systems. Information Sciences. 2011, 186 (1): 1-19.
3. 3.
Zikopoulos B, Barbas H: Circuits for multisensory integration and attentional modulation through the prefrontal cortex and the thalamic reticular nucleus in primates. Review in the Neurosciences. 18 (6): 417-438.
4. 4.
Proske H, Jeanmonod JD, Verschure PFMJ: A computational model of thalamocortical dysrhythmia. Eur J Neurosci. 2011, 33 (7): 1281-1290. 10.1111/j.1460-9568.2010.07588.x.
Download references
Acknowledgements
This work has been supported by the European Commission 7th Framework Programme (FP7-ICT-2009-5) under the CEEDs project grant agreement no. 258749.
Author information
Correspondence to Riccardo Zucca.
Rights and permissions
Reprints and Permissions
About this article
Keywords
• Thalamic Reticular Nucleus
• Relay Cell
• Modulative Connection
• Thalamic Relay
• Cortical Modulation | ESSENTIALAI-STEM |
Use Azure Video Indexer API
Video Indexer consolidates various audio and video artificial intelligence (AI) technologies offered by Microsoft in one integrated service, making development simpler. The APIs are designed to enable developers to focus on consuming Media AI technologies without worrying about scale, global reach, availability, and reliability of cloud platform. You can use the API to upload your files, get detailed video insights, get URLs of insight and player widgets in order to embed them into your application, and other tasks.
This article shows how the developers can take advantage of the Video Indexer API. To read a more detailed overview of the Video Indexer service, see the overview article.
Subscribe to the API
1. Sign in.
To start developing with Video Indexer, you must first Sign In to the Video Indexer portal.
Sign up
If signing in with an AAD account (for example, alice@contoso.onmicrosoft.com) you must go through two preliminary steps:
1. Contact us to register your AAD organization’s domain (contoso.onmicrosoft.com).
2. Your AAD organization’s admin must first sign in to grant the portal permissions to your org. To do this, the organization's admin must navigate to https://login.microsoftonline.com/common/adminconsent?client_id=e97b04d3-3e10-41fb-926f-b3c868fef6df&redirect_uri=https://videobreakdown.portal.azure-api.net/signin-aad, sign in and give consent.
2. Subscribe.
Select the Products tab. Then, select Production and subscribe.
Sign up
Once you subscribe, you will be able to see your subscription and your primary and secondary keys. The keys should be protected. The keys should only be used by your server code. They should not be available on the client side (.js, .html, etc.).
Sign up
3. Start developing.
You are ready to start integrating with the API. Find the detailed description of each Video Indexer REST API here.
Recommendations
This section lists some recommendations when using Video Indexer API.
• If you are planning to upload a video, it is recommended to place the file in some public network location (for example, OneDrive). Get the link to the video and provide the URL as the upload file param.
• When you call the API that gets video breakdowns for the specified video, you get a detailed JSON output as the response content. For details about the returned JSON, see this topic.
Code sample
The following C# code snippet demonstrates the usage of all the Video Indexer APIs together.
var apiUrl = "https://videobreakdown.azure-api.net/Breakdowns/Api/Partner/Breakdowns";
var client = new HttpClient();
client.DefaultRequestHeaders.Add("Ocp-Apim-Subscription-Key", "...");
var content = new MultipartFormDataContent();
Console.WriteLine("Uploading...");
var videoUrl = "https:/...";
var result = client.PostAsync(apiUrl + "?name=some_name&description=some_description&privacy=private&partition=some_partition&videoUrl=" + videoUrl, content).Result;
var json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("Uploaded:");
Console.WriteLine(json);
var id = JsonConvert.DeserializeObject<string>(json);
while (true)
{
Thread.Sleep(10000);
result = client.GetAsync(string.Format(apiUrl + "/{0}/State", id)).Result;
json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("State:");
Console.WriteLine(json);
dynamic state = JsonConvert.DeserializeObject(json);
if (state.state != "Uploaded" && state.state != "Processing")
{
break;
}
}
result = client.GetAsync(string.Format(apiUrl + "/{0}", id)).Result;
json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("Full JSON:");
Console.WriteLine(json);
result = client.GetAsync(string.Format(apiUrl + "/Search?id={0}", id)).Result;
json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("Search:");
Console.WriteLine(json);
result = client.GetAsync(string.Format(apiUrl + "/{0}/InsightsWidgetUrl", id)).Result;
json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("Insights Widget url:");
Console.WriteLine(json);
result = client.GetAsync(string.Format(apiUrl + "/{0}/PlayerWidgetUrl", id)).Result;
json = result.Content.ReadAsStringAsync().Result;
Console.WriteLine();
Console.WriteLine("Player token:");
Console.WriteLine(json);
Next steps
Examine details of the output JSON, see this topic.
See also
Video Indexer overview | ESSENTIALAI-STEM |
Darren Corbett
Darren Corbett (born 9 July 1972 in Belfast, Northern Ireland), nicknamed Raging Bull, is a Northern Irish professional boxer. Corbett's weight fluctuated significantly throughout his career and although he had some fights at both heavyweight and light-heavyweight, the bulk of his contests and his success came at cruiserweight.
Amateur
Corbett boxed for Ireland as an amateur before turning professional in December 1994, winning his first fight at the G-Mex Leisure Centre, Manchester, England, in which he knocked out Donaster's David Jules on a card that included Eamonn Loughran and Chris Eubank.
Professional
Corbett won his first title belt, the vacant Irish cruiserweight title, in November 1996 with 5th round knockout win over Dubliner Ray Kane at the Ulster Hall in Belfast, Northern Ireland. After successfully defending that title against Nigel Rafferty and Noel Magee, Corbett added the Commonwealth cruiserweight championship to his resume with a win over the then-undefeated Chris Okoh.
Corbett successfully defended that belt against another undefeated fighter, and a man who would go on to hold the Title himself some 11 years later, Robert Norton. In addition to this, Corbett also won the lightly regarded IBO (International Boxing Organization) Inter-Continental Cruiserweight Championship. In his next fight after winning the IBO Title, however, Corbett lost his Commonwealth Championship by 10th Round TKO in a unification fight with British Champion Bruce Scott on 28 November 1998.
In March 1999, Corbett's next fight saw him also lose his IBO Inter-Continental Championship to a relative novice in Stephane Allouane, but he rebounded later that year by defeating future British & Commonwealth Light-Heavyweight Champion Neil Simpson to win the IBO Inter-Continental Light-Heavyweight Title, a belt he never lost in the ring.
Corbett retired from the sport in 2004 but made his comeback in 2008 with a 6-rounds points win in Dublin. On 19 May 2009 he competed in the first cruiserweight instalment of the 'Prizefighter' series, defeating the former Southern Area Heavyweight Champion Micky Steeds on a 3-round points decision in the quarter-finals before losing on a 2nd-Round stoppage to the unfancied Ovill McKenzie in the semi-finals.
He returned a year later for the second cruiserweight instalment of the 'Prizefighter' series. Again he won his first bout, this time against John Anthony, but he suffered a shock points defeat in the semi-final to journeyman Nick Okoth, who had record of 8-27-5 going into the bout. Okoth started the tournament as a reserve and only came into the tournament after an injury to Herbie Hide.
Corbett returned in April 2012, losing over 6 rounds to Michael Sweeney. | WIKI |
AssertionError while fine_tune()
Hey guys, I’m just starting here and with DL. I’m building image multi-label-classifier, but while fine_tune(10), I receive following error after first epoch: "
AssertionError: Exception occured in `Recorder` when calling event `after_batch`:
==: "
My code:
training = tuple(zip(train_X, train_y)) # where train_X is a 3rd rank tensor in a shape of (300,256,256), and train_y is tensor shaped (300,)
epl_2122_season = DataBlock(
blocks=(ImageBlock(), MultiCategoryBlock()),
get_x=ItemGetter(0), get_y=ItemGetter(1))
dls = epl_2122_season.dataloaders(
source=training, shuffle=False)
learn = vision_learner(dls, resnet18, metrics=accuracy)
learn.fine_tune(10)
Below I also paste a summary(training) output.
Found 300 items
2 datasets of sizes 240,60
Setting up Pipeline: ItemGetter -> PILBase.create
Setting up Pipeline: ItemGetter -> MultiCategorize -- {'vocab': None, 'sort': True, 'add_na': False} -> OneHotEncode -- {'c': None}
Setting up after_item: Pipeline: ToTensor
Setting up before_batch: Pipeline:
Setting up after_batch: Pipeline: IntToFloatTensor -- {'div': 255.0, 'div_mask': 1}
Building one batch
Applying item_tfms to the first sample:
Pipeline: ToTensor
starting from
(PILImage mode=F size=258x258, TensorMultiCategory([1., 0., 0.]))
applying ToTensor gives
(TensorImage of size 1x258x258, TensorMultiCategory([1., 0., 0.]))
Adding the next 3 samples
No before_batch transform to apply
Collating items in a batch
Applying batch_tfms to the batch built
Pipeline: IntToFloatTensor -- {'div': 255.0, 'div_mask': 1}
starting from
(TensorImage of size 4x1x258x258, TensorMultiCategory of size 4x3)
applying IntToFloatTensor -- {'div': 255.0, 'div_mask': 1} gives
(TensorImage of size 4x1x258x258, TensorMultiCategory of size 4x3)
Any ideas why I’m getting this error?
1 Like
Hello,
You mention you are developing a multi-label classifier, but train_y is a vector of dimension 300, which leads me to believe there is only one class per input, i.e., it is multi-class classification. Is there anything I am missing? Nevertheless, the issue that produces the AssertionError is likely unrelated and arises from the usage of accuracy as a metric. Since the application is multi-label classification, it should be replaced with accuracy_multi. Again though, I don’t see how train_y, a rank-one tensor, is being used as the target variable for a multi-label task, so I might be mistaken.
Does that solve your issue?
2 Likes
Hey, sorry for the late response, I was ill. Yes, you were right. That was the main problem. Thank You!
1 Like | ESSENTIALAI-STEM |
David Pinner
David John Pinner (born 6 October 1940) is a British actor and novelist. He was trained at the Royal Academy of Dramatic Art. He has appeared on stage and television in many roles.
As an actor, he is known for Emergency Ward 10 (1962), Z Cars (1967), The Growing Pains of PC Penrose (1975), (1985), Henry V (1979), The Prince Regent (1979) and Agatha Christie's Miss Marple: A Murder Is Announced.
His 1967 novel Ritual was a major inspiration for Anthony Shaffer's film The Wicker Man (1973). In 2014 he published The Wicca Woman, a sequel to Ritual.
Novels
* Ritual (1967) Hutchinson/Arrow
* With My Body (1969) Weidenfeld & Nicolson/Corgi
* There'll Always Be An England (1985) Anthony Blond
* Ritual (2011) Finderskeepers
* Ritual (2014) ebook Endeavour Press
* The Wicca Woman (2014) ebook Endeavour Press
Stage Plays Performed
* Dickon (1966)Queens's Theatre, Hornchuch
* Fanghorn (1967) Traverse Theatre, Edinburgh
* Fanghorn (1968) Fortune Theatre, London with Glenda Jackson
* The Drums of Snow (1969) Stanford Repertory Theatre, California
* Lightning At A Funeral (1970) Stanford Repertory Theatre
* Marriages (1972) L.A.M.DA, London
* Cartoon (1973)Soho Poly, London
* Hereward the Wake (1974) Key Theatre, Peterborough
* Richelieu (1976) BBC
* Lucifer's Fair (1976) Arts Theatre, London
* Shakebag (1976) Soho Poly, London
* Talleyrand, Prince of Traitors (1978) BBC
* An Evening With The G.L.C (1979) Soho Poly, London
* The Potsdam Quartet (1980) Lyric Theatre, Hammersmith + BBC
* Screwball (1982) Theatre Royal, Plymouth
* The Potsdam Quartet (1982) Lion Theatre, New York
* Revelations (1986) Grinnell, Iowa, USA
* The Teddy Bears' Picnic (1988)Gateway Theatre, Chester
* Skin Deep (1989) Gateway Theatre, Chester
* The Last Englishman (1990) Orange Tree Theatre, Richmond
* The Sins of the Mother (1996) Grace Theatre, London
* Lenin in Love (2000) New End Theatre, Hampstead, London
* All Hallows' Eve (2002) Hong Kong Academy of Performing Arts
* Midsummer (2003) Brehmer Theatre, Hamilton, New York
* Oh, To Be In England (2011) Finborough Theatre, London
* The Potsdam Quartet (2013) Jermyn Street Theatre, London
* Edred, the Vampyre (2019) The Old Red Lion, London
Stage Plays Published
* Fanghorn (1966) Penguin Modern Playwrights 2
* Dickon (1967) Penguin Plays, New English Dramatists 10
* Drums of Snow (1968) Penguin Plays, New English Dramatists 13
* Drums of Snow (1972) Plays of the Year, Paul Elek Books Ltd
* The Potsdam Quartet (1980) Terra Nova Editions
* The Potsdam Quartet (1982) Samuel French
* Lenin In Love (2000) Oberon Books
* Two Plays; The Teddy Bears' Picnic/The Potsdam Quartet (2002) Oberon Modern Playwrights
* Midsummer/All Hallows' Eve (2002) Oberon Modern Plays
* Newton's Hooke (2003) Imperial College Press
* The Stalin Trilogy; Lenin In Love/The Teddy Bears' Picnic/The Potsdam Quartet (2003) Oberon Modern Playwrights
* Lady Day/Revelations (2003) Oberon Modern Plays
* Three Power Plays; The Drums of Snow/Richelieu/Prince of Traitors (2006) Oberon Modern Playwrights
* Oh, To Be In England (2011) Oberon Modern Playwrights
* The Vampire Trilogy; Fanghorn/Edred, the Vampyre/Lucifer's Fair (2011) Oberon Modern Playwrights
* The Joy of Misery; four one-act plays; Cartoon/An Evening With The G.L.C/Shakebag/Succubus (2012) Oberon Modern Playwrights | WIKI |
Joseph LaBate
Joseph LaBate (born April 16, 1993) is an American professional ice hockey player who is currently playing for Barys Astana of the Kontinental Hockey League (KHL). He was selected 101st overall by the Vancouver Canucks in the 2011 NHL Entry Draft.
Playing career
LaBate played for the Academy of Holy Angels's men's ice hockey team in high school, tallying 58 points in 25 games.
After three seasons in high school hockey, the Vancouver Canucks used their fourth round pick, 101 overall, to select LaBate in the 2011 NHL Entry Draft. He soon moved on to college hockey, playing for the Wisconsin Badgers in the NCAA. LaBate shifted from wing to center in his junior season at Wisconsin and skated in all 37 games for the Badgers.
He scored a career-high 11 goals with 11 assists and was -3 with 22 penalty minutes. After four seasons with the Wisconsin Badgers, he signed a contract with the Canucks. He was sent down to the Utica Comets and posted his first professional career goal against the Lehigh Valley Phantoms after a gruesome fight with Samuel Morin. He participated in the Canucks 2016-17 preseason games, posting a goal, but was eventually sent down to the Comets.
On November 21, he was recalled to the NHL for the first time in his career. He made his NHL debut two days later, on November 23, 2016, logging 5:55 minutes of ice time in a 4–1 victory over the Arizona Coyotes. He played 13 total games with the Canucks. Following the 2017–18 season, and after his third full season within the Canucks organization, LaBate became a free agent after he was not tendered a qualifying offer by the club. On August 20, 2018, LaBate secured a one-year AHL contract with the Belleville Senators, affiliate of the Ottawa Senators.
Labate left the Belleville Senators following the 2020–21 season, his third year with the club, and continued his career in the AHL by signing a one-year contract with the Milwaukee Admirals on July 29, 2021. In the following 2021–22 season, LaBate added a veteran presence to the Admirals forward group, adding 5 goals and 12 points through 56 regular season games. He appeared in a career-high 9 playoff games, adding 2 points.
As a free agent from the Admirals, LaBate was signed to a one-year contract with defending Calder Cup champions, the Chicago Wolves, on July 18, 2022, where he totaled 22 points in 53 games.
After 8 professional seasons in North America, LaBate signed as a free agent to a one-year contract with Kazakh-based club, Barys Astana of the KHL on July 4, 2023. He is currently a first line center for the club and has an impressive 12 points in 30 games with Barys.
Playing style
LaBate described himself as: "I would say that I am somewhere in the middle at this point of my career. But I am honestly putting a large emphasis on becoming a more physical player. I am working on the physical aspect of the game, and watching David Backes [who I referred to as a player that he has been compared to] play, you can tell that he plays with a physical edge on the ice. That's something that I'm trying to incorporate into my game. I skated with Ryan Malone this past summer, and I have started watching more of his stuff as well." | WIKI |
Hughesnet Community
SMTP server blacklisted?
cancel
Showing results for
Search instead for
Did you mean:
tukatshak
Freshman
SMTP server blacklisted?
As of about 7 p.m. EDT this evening (08/18/18), I am not able to send any emails, as I am getting the message that the HughesNet SMTP server IP address is blacklisted. Is this one of those things where I have to wait 24 hours? I know that spam traffic has been terrible of late.
Any suggestions? Thanks!
Sukie in the Hudson Valley
13 REPLIES 13
MarkJFine
Professor
@tukatshak
Turns out smtp.hughes.net [69.168.97.48] is listed on spam.dnsbl.sorbs.net (as is smtp.lithium.com [208.74.204.5], btw).
Not to be pedantic, but that shouldn't technically prevent you from sending email. Some email servers my reject receiving it, preventing the intended recipient from getting it.
How exactly are you getting notified of this? Bounce email from the receiving server, perhaps?
Edit:
@Liz
@Amanda
Note to admins. I did notice this in the headers. Probably want to have the tech folks fix the SPF in your DNS entry:
Received-SPF: neutral (smtp01.hughes.cmh.synacor.com: 97.73.80.47 is neither permitted nor denied by domain of hughes.net)
Setting the SPF helps to validate email from a specific domain and might alleviate getting listed on some blacklists due to forged/stolen senders coming from other email servers.
Edit2:
To do this, add a TXT record to the DNS entry that says something like:
v=spf1 a mx ip4:97.73.80.47 -all
The IP was taken from above, but it might have to be duplicated for the various servers used by Synacor (e.g., if there's a smtp02, smtp03, etc.).
* Disclaimer: I am a HughesNet customer and not a HughesNet employee. All of my comments are my own and do not necessarily represent HughesNet in any way.
Did manage to check the SPF record using a third party tester that I use for my own domain(s).
Seems the record is there (and includes quite a range of allowable IPs) but is terminated by a '?'. That's what's causing the neutral response. If the '?' is changed to a '-all' it will cause the forged emails to fail.
You can also add a TXT record to implement DMARC reporting of successful/failed emails based on SPF and DKIM (if that's also implemented - doesn't look like it though).
* Disclaimer: I am a HughesNet customer and not a HughesNet employee. All of my comments are my own and do not necessarily represent HughesNet in any way.
Brooke
Alum
Hello tukatshak, apologies on the delayed response. Is this issue still ongoing for anyone?
-Brooke
@Brooke wrote:
Hello tukatshak, apologies on the delayed response. Is this issue still ongoing for anyone?
smtp01.hughes.cmh.synacor.com is currently listed on:
cbl.abuseat.org
pbl.spamhaus.org
xbl.spamhaus.org
zen.spamhaus.org
smtp.hughes.net is currently listed on:
dnsbl-1.uceprotect.net
spam.dnsbl.sorbs.net
https://bgp.he.net/ip/69.168.97.48#_rbl
smtp.lithium.com is currently listed on:
spam.dnsbl.sorbs.net
#ugh
* Disclaimer: I am a HughesNet customer and not a HughesNet employee. All of my comments are my own and do not necessarily represent HughesNet in any way.
Dear Brooke,
Wow. 9 days to get a response?
My issue lasted at least 24 hours. During this time, both native WebMail, and my popped Outlook account were completely hosed. Then things righted themselves. I have no way of knowing what happened in the background.
MarkJFine, bless his heart, has been trying to report all the places where HughesNet is blocked or reported on spam lists. I hope someone at HughesNet will now look into this.
Thank you for inquiring. Now, if HughesNet would just stop all the spammers from using our addresses to produce spam....so we don't get on the bad lists....
@tukatshak wrote:
Now, if HughesNet would just stop all the spammers from using our addresses to produce spam....so we don't get on the bad lists....
Pretty sure changing that softfail '?' to hardfail '-all' in the DNS SPF record might help to do that as long as all three smtp IPs I mentioned as well as 'a' and 'mx' are included.
Might be advantageous to employ DKIM if possible, but that may not be practical.
* Disclaimer: I am a HughesNet customer and not a HughesNet employee. All of my comments are my own and do not necessarily represent HughesNet in any way.
maratsade
Distinguished Professor IV
"9 days to get a response?"
It takes as long as it takes -- there may not be a fast fix for this. And if they applied a fast fix and it didn't work, you'd be here ranting about how the fix didn't work. Try to be patient.
GabeU
Distinguished Professor IV
@tukatshak wrote:
Dear Brooke,
Wow. 9 days to get a response?
This is the General Discussion section. It's not meant for support, which is clearly stated in the section description.
If you have a future technical issue with which you would like help from a HughesNet representative I suggest posting in the Tech Support section to get that help.
I am sorry I made a mistake. The heading to “Tech Support” says “Tips and Tricks”, and I did not need a tip or trick. I needed immediate help. I thought someone in the community might be able to help. Again, I thank MarkJFine, who is far more technical that I could ever be for trying to point out that settings having nothing to do with my personal account might be changed to help a lot of people.
My apologies, again. Perhaps someone could have pointed me in the right direction a little earlier....
GabeU
Distinguished Professor IV
@tukatshak
No problem. I think HughesNet assumes, possibly mistakenly, that people will automatically know what Tech Support means and they then added the part about tips and tricks to say that the section includes those things, as well. Perhaps the description is something that they should look at clarifying. I've been on here so long that I don't even tend to read the section descriptions anymore, and I didn't realize that Tech Support said that.
Customers like Mark, maratsade, myself, and many others, will often help, even when someone asks technical questions in this section. And no doubt about it, Mark knows his stuff, and far more than I do, as well. This is especially true of the type of issue being discussed in this thread.
If the issue were still occurring it's very possible that Brooke would move this thread to Tech Support.
@GabeU wrote:
@tukatshak
Mark knows his stuff, and far more than I do, as well.
Well, I wouldn't go that far. I know a little bit about a few things. 🤣
* Disclaimer: I am a HughesNet customer and not a HughesNet employee. All of my comments are my own and do not necessarily represent HughesNet in any way.
Hi tukatshak, I hope everything has been well since I've last heard from you. I'm going to close this thread due to inactivity, but don't hesitate to reach out again, we'll be here to help!
Thank you.
-Brooke
Tukatshak, I do apologize my response was not quick to you, once I saw your post I began addressing the issue to our engineers the following Monday and I believe the issue has been resolved.
Thank you for the update!
-Brooke | ESSENTIALAI-STEM |
source code for PeerDeviceNet core runtime, connection manager and peer connector
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
design
samples/PeerDeviceNet_Chat
src
user_guide
README.md
README.md
PeerDeviceNet: Secure Ad-Hoc Peer-Peer Communication Among Computing Devices
source code for PeerDeviceNet core runtime, connection manager and peer connector.
src/PeerDeviceNet_Router:
PeerDeviceNet kernel runtime
* the core runtime which handles network detection, peer discovery, peer device connection and group communication.
* provides 3 layers of APIs(idl/messenger/intents) to access the runtime functions as documented in user_guide.
* run as a service in a background process.
* a pure generic kernel without enforcing any kind of connection strategy or GUI.
* packaged as an android library project, which you can add to your application project's dependencies to gain all functionalities.
src/PeerDeviceNet_Core:
PeerDeviceNet kernel runtime + ConnectionManager and PeerConnector
* add ConnectionManager preference GUI to show connected devices and connection parameters.
* support peer discovery and connection thru network multicast.
* add PeerConnector(GUI) to support discovery and connection by using NFC/Beam or camera scanning QR code.
* implement the full peer-join protocol for discovery and connection as described in design doc.
* an standalone android app which can be reused directly as a component of another connected mobile app; can be invoked thru android intent (See PeerDeviceNet_Chat for a sample).
src/zxing_client_latest:
a customized subset of ZXing's android client code, an android library project which PeerDeviceNet_Core uses for QR code scanning.
samples/PeerDeviceNet_Chat:
a sample chat android app project
* reuse ConnectionManager/PeerConnector for peer device discovery and connection, via android intent.
* exchange chat messages with peers, using PeerDeviceNet's three kinds of APIs (idl, messenger,intents). | ESSENTIALAI-STEM |
George Pilkington (disambiguation)
George Pilkington can refer to:
* George Pilkington (born 1981), English footballer
* George Pilkington (footballer, born 1926), English footballer
* George Pilkington (painter) (1879–1958), South African painter
* George Augustus Pilkington (1848–1916), English politician | WIKI |
R9 (New York City Subway car)
The R9 was a New York City Subway car model, which was built by the American Car and Foundry Company and the Pressed Steel Car Company in 1940 for the Independent Subway System (IND) and its successors, which included the New York City Board of Transportation and the New York City Transit Authority. Identical to the preceding R7/As, the R9s had distinctive curved ends on the rollsign boxes and contained distinct 2CY air compressors not featured on the older cars in the R1–9 fleet. A total of 153 cars were built, numbered 1650–1802, and arranged as single units. They were the last R1–9 type cars that were ordered before the merger of the IND with the IRT and BMT in 1940.
The R9s were ordered in preparation for the opening of the IND Sixth Avenue Line, the second IND trunk line in Manhattan to open after the IND Eighth Avenue Line. They were used primarily for increased service in Queens and the opening of the Crosstown Line. They served exclusively on all IND lines for most of their service lives, but were also used on the BMT Division during their final years. The R46s replaced the R9 cars, with the final run taking place on March 31, 1977. Three cars were preserved, while the rest were scrapped.
History
A total of 153 R9 cars were ordered from two different manufacturers. Cars 1650–1701 were built by ACF, while cars 1702–1802 were built by Pressed Steel. 150 of the new cars were ordered for service on the new IND Sixth Avenue Line, which opened on December 15, 1940. The Sixth Avenue Line was the second IND Manhattan trunk line (joining the 1932 IND Eighth Avenue Line), and therefore the additional cars were needed for the new service. The remaining 3 cars, cars 1800–1802, were ordered as replacements for three older IND cars (R1 cars 212 & 378 and R4 car 472) that had been damaged beyond repair as a result of a February 17, 1936 collision on the Smith St. Line between 7th Ave. and Church Ave.
The 153 R9 cars remained the newest part of the IND fleet until the arrival of the R10 cars in 1948. The R9s were also used for service on the IND exclusively until 1968 and almost exclusively in Queens, when they were displaced by the new R40 cars. They were then transferred to the East New York Yard of the BMT Eastern Division and used on the former BMT, , , , and routes.
Retirement
The fleet of R9 cars stayed largely intact and in service until being replaced by the R46s between 1976 and 1977, with several replaced by renumbered R4 cars in 1973. The last day of R9 cars in service was on March 31, 1977, as the cars made their final run on the train.
Following their retirement, the majority of the cars were scrapped. However, three have been preserved:
* Car 1689 has been preserved by the Shore Line Trolley Museum in East Haven, Connecticut, and restored. The car was modified with trolley poles and is used for various tourist rides around the museum.
* Car 1801 has been preserved by the New York State Museum in Albany, New York, located in the museum's Metropolis Hall.
* Car 1802 has been preserved by Railway Preservation Corp. and restored. It is the last car of the R1–9 fleet. | WIKI |
Animal
Home > Animals & Exhibits > PPG Aquarium > Blacktip Reef Shark
Blacktip Reef Shark
The blacktip reef shark (Carcharhinus melanopterus) inhabits tropical and warm temperate seas. They are pelagic sharks meaning that they spend their entire lives swimming in the water column as opposed to resting on the bottom. They must always remain in motion in order to respire valuable dissolved oxygen from the water.
Size: The blacktip reef shark can reach up to six and a half feet in length.
Life Span: 12 to 25 years
Color: The body of this shark type is a bluish-gray color.
Range: Pacific and Indian Oceans
Habitat: The blacktip reef shark is very common in the coral reefs and shallow lagoons of the tropical Indian and Pacific Oceans. They are also beginning to enter the Mediterranean.
Food: The sharks most commonly feed on snakes and reef fish.
Reproduction: The blacktip reef shark has litters of two to four pups after a 16-month gestation period. They most commonly give birth in November and they give birth to live young.
Fun Facts: With a sleek body and speedy tail, the blacktip reef shark sneaks up on prey with ease. Cruising coastlines in large schools, blacktip reef sharks often jump out of the water during a feeding frenzy of schools of fish, rays and even small sharks. | ESSENTIALAI-STEM |
Every Tester is a Performance Tester
…at least to some degree. Well, there are human conditions that distort the perception of time but it’s highly unlikely that you’re one of them. So you are a performance tester too.
The biggest annoyance for a performance tester is to get code into a performance environment that CLEARLY has issues that can be detected by the simplest means available (well.. second most annoying, as finding obvious functional defects is even worse). This is where you as a (whatever kind of) tester come in.
You know the times you drum your fingers on the desk waiting for that spinning wheel in the browser to come back? The batch job where the execution is exactly “making one cup of coffee” long? The usual response from you would be to shrug and say something like “This is just the environment. It’s system test afterall.” or “Let performance testing take care of it”.
Now, I can totally relate to such sentiments! We’re all busy and have deadlines to meet. I’d make the case though that you’d actually help the project as a whole and thereby yourself too by not ignoring such issues.
First off, why should you even care?
We’ve all had it drummed in, the earlier we find a defect, the cheaper it is to fix. It might not hold quite as true any more but it’s a no-brainer that finding defects earlier is better. More importantly, if you find issues on a scaled down environment which is only used by a select few, then the issue is most likely BIG. Since you’re not explicitly executing tests to find performance issues and your expertise is unlikely to be in this area you will have false positives and often it will be an environmental issue. Seeing the potential for harm though I’d go with the chance of being wrong.
Why is this so important to a Performance Tester?
Performance cannot find defects in parallel, as other testing areas do. Like a hose with lots of restrictions you can only find the biggest restriction and mitigate it before you hit the next one in line. When you fix a performance issue the clock starts over. Usually all previous test results become invalidated and now you have to re execute your tests.
Performance test execution takes a long time at best. It is not uncommon that a suite of tests can take days to execute. Performance issues are often well hidden so that you could miss something for days and this is not adding the time for analysis. Analysis is a whole different kettle of fish and with complex systems as we have today will take lots of time and effort too.
Put simply, in performance testing everything grinds to a halt when a defect is found. Then analysis follows and once the defect is fixed you usually start over. Hours and days can be lost very quickly. So each defect you can mitigate early will have a direct and substantial impact on performance testing, the project deadline and project cost.
This becomes even more obvious if you’re in a nimble environment (aka agile, Scrum, XP,….). There you are interested in direct and fast feedback to your developer. By the time a performance tester will get hands-on, the project/scrum team has moved along. Maybe the people are even no longer available. So fixing issues becomes so much harder and costlier. Potentially having severe effects on the backlog and delivery dates.
Ok, so now you’re motivated! GREAT! But the question is how do you actually detect if something is slow? How can you get a bit more confidence that what you just found is an issue at all? Or are there things you can do off the bat to actually search for these performance issues?
Where do performance issues come from?
To give you an idea what kind of defects a performance tester comes across I’ve gathered the below. Some of these can be detected early without too much special know-how. The list should give you examples of what you could think of when testing an application.
Load & Stress
Means that if lots of transactions are happening simultaneously the application is always impacted. Any odd behaviour here is detected while doing dedicated performance testing. I would not expect these issues to be raised by a tester.
Network / Infrastructure
Again, most likely a performance test phase thing. Infrastructure becomes an issue when the workload goes up. Networks and servers have limits as what they can deal with. If you are starting to exasperate the physical connections this will impact performance directly. The System Test environment will likely be much different (smaller) so infrastructure issues are likely but irrelevant for performance testing (i.e. red herring).
Architecture / Design
This is a difficult one. By the time we usually get on to a project this has been well done & dusted. Doesn’t mean that there isn’t a problem there. Architectural issues are the deadliest to an endeavour. These issues can be something that sends the whole project back to the drawing board (and believe me I have seen this happen!). It can be a death knell to the project if these are found late. We’re potentially talking fixes that can cost millions.
And yes, this is something you can detect early too, at least if you’ve been around a bit.
Take a calculator, the architectural design, something that describes general functionality and head off into a quiet corner for a few hours (maybe while you wait for that new release). You look at high level technical specs of solution components, make some educated guesses about use, networking traffic, database footprint per transaction, load balancing strategy, firewall specs and then start using your calculator. See where you get. Issues usually stick out like a sore thumb. It’s those, where you run through the calculation several times trying to find out if you accidentally added one or two zeros at the end. Or, a simpler case, the metrics listed above (or similar metrics) are not even available. That means that performance has not even been a consideration yet.
I do this regularly on new projects too. It is cheap and very effective. Anything that turns up here is BIG.
You find things like…
• Trying to get 125MB across a 100Mbit connection in a second
• The drive allocated to the database has capacity for two weeks of production use
• The monitoring regimen doesn’t highlight the biggest issues that can happen
• The Load Balancer and Firewall licensing isn’t tuned for the same throughput
• Wrong assumptions about the frequency of use (usually factors too big! So there can be savings in downsizing!)
• Over-engineered designs. From a theoretical perspective all “best-practices” have been applied but the result is a practical mess and will never fly. Example could be too many tiers, all adding latency or bad fail-over design, that adds latency that is not viable.
• Assumptions of downtime for operational tasks, which actually don’t exist
• Potential bottlenecks where there are single points of failure or a lack of vertical scaling ability
• Have manufacturer tuning guides been applied after/while deploying?
This kind of analysis needs a lot of know-how and I would not expect anyone to think of all of the above but should you be able to pick just one off this could have a big positive effect. Even if you just ask those “dumb” tester questions like “has anyone checked the capacity of the drive for the DB is sized according to expected production use?”. If they have, the team members are usually annoyed and say “but of-course we have!! What a question!”. If they haven’t, they will say the same thing but their facial expression will start to show slight panic. 😉
Environment
You have a lower spec environment. Of course things will run slower! That is true but you still have a chance to find something. Performance in large parts is relative (and I don’t mean relative between environments but within an environment). So, say your login to a website takes 2 minutes but once you’re logged in actions take just milliseconds i.e. nowhere close to what the login took. The login functionality is unique and there can be a good reason for the slow response but it is not congruent with the rest of the application. Users will naturally pick up on this and see it as an issue. So it is worthwhile getting a developer to take another look if something is wrong or something can be tuned.
Application Tiers
As even as a functional/non-specialist tester I suggest you get acquainted with the system under test (SUT). Get access to stats and logs from your server(s) and application(s). If you see something is slow a cursory glance at a CPU graph might show you the culprit. If it’s the web-server, the app-layer or the database. Again, this is something worth highlighting early and that is usually of interest to other team members.
The Code
I am not suggesting you trawl through the code that you get thrown from your developers or manage to “obtain” from GitHub. What I am talking about are simple things. If you think your website could be a bit faster have a look at the HTML code. Or better call up the developer view on your browser and look at how your web-page is loading and what it does (more on how to below).
But also ask your developer and db-expert, if they have looked at what they did from a tuning perspective. These people are professionals and they know where issues are instinctively. They just forget to look because they are driven by deadlines, more functionality and managers wanting weekly reports. Reminding them to take a step back and look at their code helps immensely! They just need a reminder every now and again.
If you know that your trusty coder is a junior or graduate, then make sure a code review has happened. Not only do they lack experience but like with architecture above they can apply “best-practice” and fail because in real life it doesn’t scale. Most experienced developers pick up on that instinctively. So a code review is often all that is needed.
Get your architect involved as a reviewer too. Is the delivered application actually congruent with his design and expectations? He can see 1st hand if he has forgotten something or got some assumption(s) wrong.
Other Stuff
Projects are unique and I can’t list everything here. Spend some spare time (when you’re waiting for that next build….again) thinking about what performance issues are likely in your project or what Quick & Dirty things you could do to verify some of them. I’m sure you’ll think of something.
Now to the HOW part
My favourite performance testing tool I have already mentioned. This….
calculator
And if you don’t have one this is always available (or equivalent)
WinCalc
So go play with some numbers! 😉
High level and vague is all that is needed at this point. If it turns out to be of interest others will do the low-down verification.
Then there are the really simple things. When you test you should always have something that shows you the total response time of your application. Since most our apps today are accessed through a web browser this is easy. I’ll give a FireFox example. There is a addon called Extended Status Bar (https://addons.mozilla.org/en-GB/firefox/addon/extended-statusbar/?src=search).
StatusBarFirefox
It will show you a status bar that includes page size and total load time (see picture above). Large pages have the tendency to clog up your bandwidth (need to check caching strategy) and the response time is a no-brainer. Long = Bad.
If you want to get a bit more into the detail, most browsers nowadays have a developer mode and/or extensions (firebug on Firefox, in Chrome it is built in). They have “networking” tabs that show the actual way a page loads (see below). They are just a click or two away.
Network
Also try things like YSlow (http://yslow.org/), GTmetrix (https://gtmetrix.com) and other performance analyzers. They evaluate a page and let you know if performance related standard practices have been followed. This is really low hanging fruit. These reports can often be handed to developers as is.
GTmetrix
So…
I hope I’ve given you some food for thought and got you excited to actually raise the issues you see. I know testers are also gluttons for Mnemonics so the different areas that you can look at for performance spell out LANDETC.
(L)oad
(A)rchitecture
(N)etwork
(D)esign
(E)nvironment
(T)iers
(C)ode
Good luck and thanks for helping us performance testers!!
by Oliver Erlewein
2 thoughts on “Every Tester is a Performance Tester
1. Pingback: Testing Bits – 2/21/16 – 2/27/16 | Testing Curator Blog
2. Pingback: Every Tester is a Performance Tester – Neotys Testing Roundup
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
w
Connecting to %s | ESSENTIALAI-STEM |
People looking to lose weight often decide to adopt a high-protein diet. Eating protein helps a person feel full, which can lead to them eating fewer calories overall. High-protein diets typically include large quantities of protein and only a small amount of carbohydrate.
Most people can follow a high-protein diet by eating meat, fish, dairy products, beans and legumes, eggs, and vegetables that are relatively rich in protein, such as asparagus and spinach.
People on this diet will often choose to reduce their carbohydrate intake, which may involve limiting their consumption of highly processed foods, bread and other baked goods, candy, and white pasta and rice.
There are some well-known high-protein diet plans, such as the Atkins diet. However, a person can increase their protein intake on their own with or without adjusting their intake of other food groups.
In this article, we explain how to eat a high-protein diet, foods to include and exclude, and the potential adverse effects of adopting this diet.
High-protein chickpea, vegetable and bean chili stew with bread and seasoningShare on Pinterest
Combining beans and legumes with other sources of protein can ensure a person gets all essential amino acids.
Choosing the right foods when eating a high-protein diet is important for maximum effectiveness.
Below are some excellent protein choices that could be suitable for a variety of dietary plans:
• eggs
• leaner cuts of beef
• chicken breasts
• turkey breasts
• beans, such as garbanzo beans or black beans
• shrimp
• nuts and seeds, such as pumpkin seeds, peanuts, and almonds
• fish, including salmon, flounder, and haddock
• sprouted grain bread, such as Ezekiel bread
• whey or plant protein shakes
• lentils
• quinoa
• chickpeas
• oats
• dairy products, such as Greek yogurt, cow’s milk, or cheese
• vegetables, including Brussels sprouts and broccoli
People with necessary dietary restrictions should also continue to exclude unsuitable foods. For example, a person who has lactose intolerance should not use milk products to increase their protein intake.
A person should generally also avoid the following foods as part of the high-protein diet:
• products that contain refined sugar, such as candy, baked goods, and sodas
• highly processed foods
• foods that manufacturers market as “diet” products, as they often contain excessive amounts of artificial sweetener
In addition to aiding weight loss, protein provides the body with some essential benefits. The benefits of protein include:
• providing enzymes that help power thousands of chemical reactions throughout the body
• helping the body maintain and repair hair, skin, muscles, and bones
• certain proteins are necessary to produce hormones that help the body’s organs and cells communicate
Protein also provides amino acids. There are 22 amino acids, nine of which are essential to obtain from the diet because the body does not produce them.
Protein from animals tends to contain all of the amino acids, so people refer to it as a complete protein. In contrast, many plant proteins only provide some of the amino acids, meaning that people need to combine them with other protein sources to get all of the essential amino acids.
What does the science say?
There has been a lot of research on the role of protein in short-term weight loss and muscle gain. However, the long-term effects of a high-protein diet require further study.
Some studies suggest that health problems may potentially result from eating a high-protein diet for extended periods. The authors of a review paper focusing on the high-protein diet warned that it could lead to higher acid loads for the kidneys and that people may be at risk of the health conditions that come with eating high amounts of animal fat.
In addition, diets that limit carbs may harm a person’s health. Children and teenagers are at particular risk of malnutrition from eating insufficient carbohydrate.
Still, most research indicates that high-protein diets are beneficial for weight loss, at least in the short term.
Share on Pinterest
Keeping a food journal can help when following a diet plan.
There are many possible ways to include more protein in the diet, even for those with other dietary restrictions.
For example, people who follow a vegetarian or vegan diet or those who avoid dairy can still eat a high-protein diet.
People can either adjust their current diet to include more protein or follow a specific high-protein diet plan.
Taking the steps below may help a person when they start a high-protein diet:
• figuring out their individual protein needs, which will depend on their body weight
• making meal plans for the week
• finding and using high-quality proteins
• including at least 25–30 grams (g) of protein in each meal
• keeping a food journal to track the amount and types of food that they eat
• eating well-balanced meals
• including both plant and lean animal sources of protein in the diet
Share on Pinterest
A person should speak to their doctor when considering a high-protein diet.
Most people can safely follow a high-protein diet, at least for a short period.
While some studies indicate that high levels of protein may negatively affect the kidneys, other research shows that people with healthy kidneys will not experience any adverse effects.
However, clinical evidence does suggest that people with kidney disease should not eat a high-protein diet.
Similarly, it seems that people who are susceptible to kidney stones should avoid high-protein diets, particularly those that include lots of animal proteins.
People with other medical conditions should speak to a healthcare professional before adopting a high-protein diet.
Although short-term studies show that high-protein diets can encourage weight loss,
it is important to remember that there is no research looking at the long-term effects of high-protein diets on overall health.
People looking to adopt a high-protein diet can follow an existing diet plan or adjust their intake of protein themselves to suit their needs. However, those who want to increase their protein intake should aim for each of their meals to include 25–30 g of protein.
People should focus on eating a combination of lean animal proteins and plant-based proteins for optimal results. Anyone with kidney disease should not follow a high-protein diet.
A healthcare professional or registered dietitian can provide more advice on how to start a high-protein diet and how to increase protein intake healthfully. | ESSENTIALAI-STEM |
Status of Whisper ASR Libraries
Whisper ASR is a great technology with many innovative things. For example, multiobjective transcription/translation training, a huge 600k hours training dataset or long-context decoding were really revolutionary at the time Whisper arrived.
Unfortunately Whisper ecosystem has hundreds of packages without proper support for model features. It is very hard to properly use the Whisper model unless you understand the features the model provides.
1. Whisper is trained on a long context of 30 seconds. It works best for long context decoding like long podcasts. This is why everyone in the podcast industry is excited. It doesn’t work well for short commands and is not supposed to work like that. Standard ASR databases for tests include short chunks thus are not really suitable for testing Whisper. Simple VAD chunking doesn’t really work either.
2. Between, training is also better done on 30 second chunks! Not on a standard ASR database (like everyone is doing).
3. I expect the 30-second audio better be a single speaker. Effect of multiple speakers in an audio is not investigated yet. Is it better to decode speakers separately and then merge or jointly. (no numbers on that)
4. Whisper is very good for English but not extremely good for many other languages. You’d better finetune it. For Chinese FunASR is much better for example.
5. Streaming doesn’t really work either unless you tolerate 30-second delay.
6. Batching chunks is critical for high performance
7. Continuous batching (packing multiple requests into one) should also work but I haven’t seen implementation of this. For LLMs it works.
8. Beam search is a must for low quality audio and a must overall for stable decoding.
9. Whisper assigns punctuation but punctuation accuracy is not really known (no numbers on that).
10. Quantization works pretty well, large models could be quantized to just 4 bits without loss of accuracy. All modern LLM quantization tricks like quantization to 1.5 bits might also work. It is much better to use large quantized model than small float model if you are restricted on memory. Quantized models must be faster too if quantization implemented properly (reduced CPU cache load)
11. Advanced LLM tricks like Flash attention significantly improve decoding speed.
12. LORA finetuning makes sense for Whisper as well.
13. Whisper trained on huge and diverse database including music sources, very good at decoding song lyrics compared to other systems (no numbers on that)
14. Whisper is not trained on silence, silence MUST be excluded before decoding.
15. There are efficient algorithms to inject vocabulary lists into Whisper (TCPGen), but nobody implements them. There is a patch in Espnet though and the code from the authors.
16. Prompts for Whisper are yet to be investigated, but in general they have huge effect on accuracy (like on every LLM)
17. Whisper returns normalized text, it is actually not trivial to properly evaluate the accuracy of it. You have to denormalize it properly.
18. Timestamps Whisper assigns are not millisecond accurate. I haven’t seen the research on the timestamp accuracy yet.
19. There is no confidence.
If we consider current libraries, features are not quite uniform
1. Original Whisper. No batching, no quantization, no VAD. Some initial hallucination detection on silence
2. Whisper.CPP. Very good quantization, no batching, no VAD. No good python API (current ones do not support GPU).
3. Faster Whisper. VAD, batching. No good quantization (original models are still large). Flash attention recently implemented see also here.
4. HuggingFace Whisper. Quantization, batching. No VAD, No good Python API. LORA fine tuning with bits and bytes.
5. Insanely-fast-whisper. Flash attention + batching. No VAD, no quantization, questionable advertizing
6. Whisper-jax. No VAD, no quantization, questionable advertising. Slow on GPU, gonna work on TPU mostly.
7. Sherpa-ONNX with Whisper-ONNX. Good batching, ok quantization (8 bits), but not 4 bits. A good candidate actually but VAD is not straightforward.
8. WhisperX. Uses Faster Whisper
Some recent numbers for quantization of Whisper Large V3 model measured on Russian audiobooks (single file processing, about 7 second utterances) GPU processing on RTX3090.
Model WER CER Speed xRT
Original Large V3 10.4 4.7 0.270
Original Medium 16.5 7.5 0.216
HuggingFace Large V3 10.8 5.3 0.190
Faster Whisper Large V3 32bit 10.3 4.1 0.172
Faster Whisper Large V3 8 bit 10.2 4.1 0.112
Faster Whisper Medium 8 bit 13.2 5.0 0.094
Whisper.CPP Large V3 16 bit 10.7 5.0 0.128
Whisper.CPP Large V3 4 bit 11.0 5.2 0.108
Whisper.CPP Medium 5 bit 47.9 35.8 0.092
As you can see, the large 4 bits model makes a lot of sense. Large V3 model is only 800Mb then decoding takes about 2.5Gb of memory on the card. As for medium model, it simply doesn’t work on 4 or 5 bits. Not sure why, is it bad quantization or just the model size constrains. However, it needs testing on a larger dataset, including noisy samples. So don’t take these numbers for granted.
Conclusion. If you can only add Whisper.CPP quantization to something like Faster Whisper and mix it with flash attention and LORA tuning from HF and implement a good Python library on top of that, it is going to be a perfect mix. | ESSENTIALAI-STEM |
Borgå Akilles
Borgå Akilles (Porvoon Akilles), or more commonly just Akilles, is a Finnish sports club from the city of Porvoo. Akilles, named for Achilles in ancient Greek mythology, was founded in 1902 and is one of the oldest active football clubs in Finland.
In Finland the club is mostly known for bandy. It plays in the highest division, Bandyliiga. It became Finnish champions in 1981, 1985, 2020 and 2021 and won the Finnish Cup in 2019.
The football team won promotion to the Finnish Third Division in 2006. The club also has active sections in cycling, track and field, handball, orienteering, skiing, and fitness sport.
Results in football
* 13 seasons in Suomensarja
* 20 seasons in II Divisioona
* 30 seasons in Kolmonen
* 11 seasons in Nelonen
* 4 seasons in Vitonen
* 1 season in Kutonen
Official homepage
* Borgå Akilles official website
* Borgå Akilles history | WIKI |
Wikipedia talk:Articles for deletion/Hot Bom-om
I wrote this article and would like to clarify that although the game may not have made it onto the internet, it is very popular at my high school, and extremely well known. I suspect that if it hasn't made it intoi the spotlight yet, it will soon.
Once it has made it to the spotlight and has become popular so that it's being played everywhere, then come back and write the article. Wikipedia isn't here to promote things that nobody but a small group of people knows. Zoe 05:32, September 10, 2005 (UTC)
. . . and is a something of a cult subculture at many American High Schools today. Okay, seriously, why are there no sources to back up this ridiculous claim? - Orioneight 22:11, 10 September 2005 (UTC) | WIKI |
Harmonic number
Harmonic number
The term harmonic number has multiple meanings. For other meanings, see harmonic number (disambiguation).
In mathematics, the n-th harmonic number is the sum of the reciprocals of the first n natural numbers:
H_n= 1+frac{1}{2}+frac{1}{3}+cdots+frac{1}{n}
=sum_{k=1}^n frac{1}{k}.
This also equals n times the inverse of the harmonic mean of these natural numbers.
Harmonic numbers were studied in antiquity and are important in various branches of number theory. They are sometimes loosely termed harmonic series, are closely related to the Riemann zeta function, and appear in various expressions for various special functions.
Calculation
An integral representation is given by Euler:
H_n = int_0^1 frac{1 - x^n}{1 - x},dx.
This representation can be easily shown to satisfy the recurrence relation by the formula
int_0^1 x^n,dx = frac{1}{n + 1},
and then
x^{n} + frac{1 - x^n}{1 - x} = frac{1 - x^{n+1}}{1 - x}
inside the integral.
Hn grows about as fast as the natural logarithm of n. The reason is that the sum is approximated by the integral
int_1^n {1 over x}, dx
whose value is ln(n). More precisely, we have the limit:
lim_{n to infty} H_n - ln(n) = gamma
(where γ is the Euler-Mascheroni constant 0.5772156649dots), and the corresponding asymptotic expansion:
H_n = gamma + ln{n} + frac{1}{2}n^{-1} - frac{1}{12}n^{-2} + frac{1}{120}n^{-4} + mathcal{O}(n^{-6})
Special values for fractional arguments
There are the following special analytic values for fractional arguments between 0 and 1, given by the integral
H_alpha = int_0^1frac{1-x^alpha}{1-x},dx
More may be generated from the recurrence relation H_alpha = H_{alpha-1}+frac{1}{alpha}.
H_{1/2} = 2 -2ln{2},
H_{1/3} = 3-frac{pi}{2sqrt{3}} -frac{3}{2}ln{3}
H_{1/4} = 4-frac{pi}{2} - 3ln{2}
H_{1/6} = 6-frac{pi}{2}sqrt{3} -2ln{2} -frac{3}{2}ln(3)
H_{1/8} = 8-frac{pi}{2} - 4ln{2} - frac{1}{sqrt{2}} left{pi + ln(2 + sqrt{2}) - ln(2 - sqrt{2})right}
Generating functions
A generating function for the harmonic numbers is
sum_{n=1}^infty z^n H_n =
frac {-ln(1-z)}{1-z},
where ln(z) is the natural logarithm. An exponential generating function is
sum_{n=1}^infty frac {z^n}{n!} H_n =
-e^z sum_{k=1}^infty frac{1}{k} frac {(-z)^k}{k!} = e^z mbox {Ein}(z)
where mbox{Ein}(z) is the entire exponential integral. Note that
mbox {Ein}(z) = mbox{E}_1(z) + gamma + ln z =
Gamma (0,z) + gamma + ln z,
where Gamma (0,z) is the incomplete gamma function.
Applications
The harmonic numbers appear in several calculation formulas, such as the digamma function:
psi(n) = H_{n-1} - gamma.,
This relation is also frequently used to define the extension of the harmonic numbers to non-integer n. The harmonic numbers are also frequently used to define γ, using the limit introduced in the previous section, although
gamma = lim_{n rightarrow infty}{left(H_n - lnleft(n+{1 over 2}right)right)}
converges more quickly.
In 2002 Jeffrey Lagarias proved that the Riemann hypothesis is equivalent to the statement that
sigma(n) le H_n + ln(H_n)e^{H_n},
is true for every integer n ≥ 1 with strict inequality if n > 1; here σ(n) denotes the sum of the divisors of n.
See also Watterson estimator, Tajima's D, coupon collector's problem.
Generalization
Generalized harmonic numbers
The generalized harmonic number of order n of m is given by
H_{n,m}=sum_{k=1}^n frac{1}{k^m}.
Note that the limit as n tends to infinity exists if m > 1.
Other notations occasionally used include
H_{n,m}= H_n^{(m)} = H_m(n).
The special case of m=1 is simply called a harmonic number and is frequently written without the superscript, as
H_n= sum_{k=1}^n frac{1}{k}.
In the limit of nrightarrow infty, the generalized harmonic number converges to the Riemann zeta function
lim_{nrightarrow infty} H_{n,m} = zeta(m).
The related sum sum_{k=1}^n k^m occurs in the study of Bernoulli numbers; the harmonic numbers also appear in the study of Stirling numbers.
A generating function for the generalized harmonic numbers is
sum_{n=1}^infty z^n H_{n,m} =
frac {mbox{Li}_m(z)}{1-z},
where mbox{Li}_m(z) is the polylogarithm, and |z|<1. The generating function given above for m=1 is a special case of this formula.
Generalization to the complex plane
Euler's integral formula for the harmonic numbers follows from the integral identity
int_a^1 frac {1-x^s}{1-x} dx =
- sum_{k=1}^infty frac {1}{k} {s choose k} (a-1)^k
which holds for general complex-valued s, for the suitably extended binomial coefficients. By choosing a=0, this formula gives both an integral and a series representation for a function that interpolates the harmonic numbers and extends a definition to the complex plane. This integral relation is easily derived by manipulating the Newton series
sum_{k=0}^infty {s choose k} (-x)^k = (1-x)^s,
which is just the Newton's generalized binomial theorem. The interpolating function is in fact just the digamma function:
psi(s+1)+gamma = int_0^1 frac {1-x^s}{1-x} dx
where psi(x) is the digamma, and gamma is the Euler-Mascheroni constant. The integration process may be repeated to obtain
H_{s,2}=-sum_{k=1}^infty frac {(-1)^k}{k} {s choose k} H_k.
References
Search another word or see Harmonic Numberon Dictionary | Thesaurus |Spanish
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature
FAVORITES
RECENT
; | ESSENTIALAI-STEM |
-- Brazil Braces for More Protests Despite Rousseff Promise
Thousands of Brazilians took to the
streets as the national soccer team prepares to meet Uruguay in
the semifinals of the Confederations Cup, reigniting mass
protests that have made officials rush to respond to demands for
better health care and education. Fifty thousand marched toward the main stadium in Belo
Horizonte, Brazil ’s third-largest urban area, the G1 news
website reported, before the match that is part of a dry run for
next year’s World Cup. Police prepared for another 50,000 to
gather in Brasilia, where protesters tried to set fire to the
Foreign Ministry building last week. President Dilma Rousseff , saying she will listen to the
“voices of the streets,” this week proposed a plebiscite to
give citizens a stronger say in government while vowing to
improve health care and boost education spending. She won
support yesterday from Supreme Court Chief Justice Joaquim Barbosa and the head of the Senate, Renan Calheiros, for
political reform aimed at quashing corruption that has fueled
the biggest street revolt in two decades. “All I can hope is that they are peaceful and there are no
clashes with the police,” national team striker Fred told
reporters on the eve of today’s match. “We asked the people to
unite and give only joy for at least 90 minutes of this game.” Demonstrations began three weeks ago against an increase in
bus fares and have since given voice to discontent over
everything from government corruption to spending on stadiums
for next year’s World Cup . While 40 million people emerged from
poverty over the past decade, accelerating inflation and slow
growth have pushed Rousseff’s approval rating down eight
percentage points since March. Brazil’s Currency Brazil’s currency has weakened 6.4 percent this year,
helping lead the Ibovespa stock benchmark to a 27 percent slump
in dollar terms, the second-worst performance among 94 major
indexes. Calheiros, himself a target of anti-corruption protests,
said yesterday he would suspend a Senate recess until lawmakers
vote on Rousseff’s proposals to quell the protests. In a late-night session, lower house lawmakers voted 430-9
to scrap a proposal that protesters said would have limited
public prosecutors’ power to investigate corruption. The
constitutional amendment No. 37, as it was known, was a rallying
cry for many of the protesters. The lower house also approved a bill earmarking oil
royalties for education, in the process modifying Rousseff’s
goal of funneling 100 percent of that revenue to schools.
Instead, 75 percent will go to education and the remainder to
improving health care. The bill now goes to the Senate. Secret Ballots Other proposals spawned by the protests and being debated
include a proposal to eliminate bus fares for students and a
constitutional amendment ending the use of secret ballots in
disciplinary votes against fellow lawmakers. Still, Rousseff had to partially backtrack on her biggest
political gamble, a plebiscite to win support for rewriting part
of the constitution to restructure the political system, amid
claims by the opposition and jurists that such a move is illegal
and unnecessary. Instead, the government will seek ask voters to endorse
specific actions based on government consultations with
activists, unions and political parties, Education Minister
Aloizio Mercadante said today. Those could include longstanding
proposals to toughen campaign financing laws and a move away
from the current voting system based on party lists toward a
U.S.-styled one based on electoral districts. The government
will send the request for a plebiscite to Congress by July 2,
said Jose Ramos, a presidential spokesman. More Accountable “We need to include the people in the debate over
reforms,” Barbosa, the nation’s first black chief justice, said
yesterday after a meeting with Rousseff, in which he endorsed
the president’s call to make politicians more accountable.
“Brazil is tired of reforms by the elites.” In a Datafolha poll among protesters in Sao Paulo , 30
percent of those interviewed said they would vote for Barbosa in
next year’s presidential election compared to 10 percent for
Rousseff. Barbosa said yesterday he was “flattered” by the
support though has no desire to run for the post. Seven Helicopters In Belo Horizonte, the capital of Minas Gerais state,
authorities declared a public holiday and are deploying 5,000
extra security personnel ahead of today’s game, which FIFA chief
Sepp Blatter is expected to attend. Soccer’s governing body said
in a statement that it has “full trust” in the safety and
security plan. Crowds of protesters have gathered outside stadiums since
the start 11 days ago of what they’ve taken to calling the
“Demonstrations Cup.” In Belo Horizonte , an estimated 10,000
protesters clashed with police during a Mexico-Japan match. More
than 1 million took to the streets on June 20 across Brazil,
with police firing rubber bullets and tear gas. Four people have
died. Sport was also on the minds today of protesters in Brasilia
in the form of 594 soccer balls -- one for each lawmaker --
lined up in front of Congress to push for goal-scoring reforms.
Police fenced off the presidential palace and installed flood
lights to assist in crowd control ahead of the protests. They’ll
also block traffic and search protesters for explosives and
dangerous objects to prevent attacks on public buildings, said
Daniel Barroso, a police spokesman. Legitimate Demands Finance Minister Guido Mantega , in his first public remarks
since last week’s unrest, downplayed the threat posed by the
protesters, whose demands for a better quality of life he said
are legitimate. “In Brasilia we’re used to street movements, every week
there’s thousands of demonstrators on one issue or another,” he
said in congressional testimony today. “I didn’t see anyone in
the street talking about the economy being out of control.” Meanwhile, protesters are digging in for a long fight. “We can’t stop now, we won’t stop,” said Carla Zambelli,
the 32-year-old founder of Nas Ruas, an anti-corruption group
planning a demonstration tomorrow in the northeastern city of
Salvador . “The people showed that the main issues are
corruption and miserable public services. Either the politicians
stop stealing from us, or we’ll shut down Brazil.” To contact the reporters on this story:
Tariq Panja in Rio de Janeiro at
tpanja@bloomberg.net ;
Raymond Colitt in Brasilia Newsroom at
rcolitt@bloomberg.net ;
Joshua Goodman in Rio de Janeiro at
jgoodman19@bloomberg.net ;
Alex Cuadros in Sao Paulo at
acuadros@bloomberg.net To contact the editor responsible for this story:
Andre Soliani at
asoliani@bloomberg.net | NEWS-MULTISOURCE |
Maxwell's demon
From RationalWiki
(Redirected from Maxwell's Demon)
Jump to navigation Jump to search
The facts of the matter
Physics
Physicon.png
May the mass times acceleration be with you
Let's get physical!
Atoms trying to understand atoms
Maxwell's demon is the name given to a thought experiment designed to question the possibility of violating the second law of thermodynamics. It was formulated and named after the Scottish physicist James Clerk Maxwell in 1867.
Premise[edit]
The centre of the thought experiment involves a box of gas molecules, evenly distributed and with an equilibrium distribution of energy: referred to as the Boltzmann distribution. In this case some molecules will have high energy, others will have lower energy - on the molecular level this is how quickly the particles move about, and manifests itself in the macroscopic world as heat. Maxwell hypothesized that if you separated this box with a barrier and had a demon stand at a gate between the two sections, it could selectively open the gate to allow the higher energy (faster moving) particles into one room. It could also bar the way for the slower moving particles, allowing them to only travel in the opposite direction. The energy consumed by the demon while doing this can be minuscule, as it is merely opening a doorway, rather than actively transporting molecules from one side to the other. If left running like this, the system would create a temperature differential between the two compartments that could be used to perform work - and would reverse the entropy of the system. As the thought experiment asks that the demon does not expend energy to open the gate (or consumes only a minute amount) to create this differential, the system would create a perpetual motion machine.
This would violate the laws of thermodynamics as perpetual motion is impossible - you cannot get more energy out than you put in. Yet the demon of the thought experiment, given the ability to look at a molecule and open a gate, would consume far less energy than the entire system generated. This apparently simple way to get around the fixed laws of thermodynamics puzzled James Clerk Maxwell and many other scientists of the era. How to prove that Maxwell's demon could not work (leaving the laws of thermodynamics intact) had to wait some time.
Solution[edit]
It is known from looking at conventional perpetual motion engines that it's not possible to get more energy out than you put in. With Maxwell's demon, the action of watching the molecules in order to identify their kinetic energy, and the action of opening and closing the gate require energy. While the energy barrier to opening the gate could, in principle, be reduced to negligible quantities, the part about processing information to identify the appropriate "hot" and "cold" molecules always consumes energy. To do this, without resorting to magic, at the very least the molecules would have to come into physical contact with a detector, or interact with photons to sense their properties remotely, and this would consume energy. Information processing by the demon, then, is a process that necessarily consumes energy and equals any work that could be derived from a heat gradient produced by the demon. This led to the introduction of information into the world of thermodynamics, and how order, energy and information were related very closely.
The concept of information being related to energy and entropy is a key part of the physics underlying computer processes. RAM chips that store information are, in fact, ever so slightly heavier than RAM chips without information because of the relationship between energy and information, and the relationship between mass and energy (E=mc2). Particularly, information and entropy are very closely related concepts: lots of information is a low entropy state, less information is a high entropy state. So storing information, organising the bits on a computer chip into a less random pattern, requires energy to be pumped into a system to reverse the natural entropy experienced and organise the degrees of freedom available.[1]
It would also involve working with demons, which are notoriously unreliable.[citation NOT needed]
Pop culture[edit]
Maxwell's demon supplied inspiration for the idea of Morton's demon which is used to describe the mental processes of creationists.
See also[edit]
References[edit] | ESSENTIALAI-STEM |
The Benefits of Chess in
Education By John Saade
The beauty of Chess is that when it is utilized with these children they are actually developing the parts of the brain that are directly linked to problem solving, deductive reasoning, focusing and concentration, the same exact skills that we are trying to promote through the teaching of more reading, more math, and more writing. What is significant here is that children do not view Chess as a teaching tool.
I often like to compare the effects of Chess on a child’s ability to succeed in other areas of life to the movie The Karate Kid. When Mr. Miyagi, played by Noriyuki Morita, engages Daniel LaRusso, played by Ralph Macchio, in around the house chores (painting the fence, waxing cars…), he is preparing Daniel physically in the martial arts without Daniel even knowing it. What eventually happens is that Daniel’s engagement in these chores is actually a backdoor plan by Mr. Miyagi to enhance Daniel’s karate prowess. The engagement of Chess plays a similar role when it comes to helping children develop and strengthen their minds for academic, social, and intra-personal purposes
Academically, Chess has the ability to foster and promote such skills as:* Pattern recognition: * Sequencing: * Memory skills: * Planning: * Enhanced decision-making skills: Children learn from their mistakes and correct them, just as we all do in real life situations; * Problem solving: The Chess player is constantly engaged in solving problems on the Chessboard, thus generalizing those problem-solving skills across their academic environment, as well as real life situations.
* Analyzing and evaluating: The Chess player takes his/her time analyzing and evaluating what moves will benefit him/her, thus allowing for more positive decisions to be made. Moreover, this aspect of Chess playing helps to reduce instances of impulsivity due to the child taking his/her time to make the best move possible.
Socially, Chess has the ability to foster and promote such skills as: * Turn taking:* Good sportsmanship: * Positive peer interactions: * Competition: Chess allows children to experience success and a healthy concept of winning, thus helping to elicit high levels of achievement in all areas of life.
Intra-personally, Chess has the ability to develop an array of skills such as: * Patience: * Elevation of self-esteem: * Perseverance: Chess play offers the opportunity to promote the importance of never giving up and sticking to the task at hand.
I remember Maurice in the beginning of the year. He wasn’t very talkative and didn’t have a smile on his face. Once he started learning chess, it seemed to give him a new found peace of self-esteem. He smiled a lot and challenged classmates and it seemed to have a profound impact on his sociability. I also think chess was great for him because finally there was something that could motivate him to do his work and comply with rules. Maurice was a hard kid to reach but chess grabbed hold and wouldn’t let him go.
On a personal note, I was an At-Risk child. Because of my education, as well as my experience, I am quite certain that I had, and may still have, Attention Deficit Disorder (ADD). I hated school. It was quite a burden for me. My highest math course was Math 3-4- your basic addition, subtraction, multiplication and division course.
I think I received a D in the course, as well as my other classes. The math teacher basically read the newspaper while the kids in the classroom shot spitballs at each other and got into fights. Fortunately, my life didn’t end in that classroom. I eventually went to college in hopes of pursuing bigger and better things. Being an At-Risk student, I didn’t quite realize the challenges that awaited me in college. In order for me to have moved on to my major, I needed to complete two years of math.
Therefore, my first math course was the basic math, which I did fairly well in. However, when I got into Algebra I fell apart. I simply couldn’t understand it. Because of my inability to understand, I withdrew from the class three times. After these failed attempts, I began to play Chess for several hours a day. I began to realize that playing that intensely was strengthening my mind to a degree that was quite noticeable, at least to me.
That fall, I went back to that Algebra class and realized that something just clicked. I began doing those math problems backwards! It was amazing. It was obvious to me that playing Chess for several hours a day really increased my ability to think in ways I never have. I was able to put things on the back burner, so to speak. Because of that experience, I was truly convinced that Chess had helped me become a stronger thinker.
My success in Algebra, as well as college, may also be due to the fact that I also became more patient. Playing Chess forced me to think things out before I made my move. This is similar to children with impulsivity problems. It forces them to contemplate; therefore, forcing them to take their time and, without realizing it, develop a very valuable skill.
John Saade, age 40 is a Teacher/Counselor for the Positive Education Programin Cleveland, Ohio. He has a degree in English Literature and an Education degree for grades 7-12. He lives in Lakewood, Ohio with his wife and three children. John teaches Chess to all the children he comes in contact with throughout his teaching career. He also enjoys playing the flute (Jethro Tull style), playing volleyball, writing, reading and inventing new ideas. | FINEWEB-EDU |
PageSpeed is a WebServer module that automatically optimizes pages and the resources they use. Google offers it as a free service through their DNS product.
learn more… | top users | synonyms
1
vote
0answers
27 views
Google PageSpeed suggests compression - but my site is https
Google PageSpeed suggests to deliver some static files like e.g. JavaScript, CSS. But as our site is HTTPS only we disabled compression in our web server because of security reasons. As far as I ...
0
votes
1answer
90 views
Apache2 Serverload / CPU increase from 1% up to 90% - How to debug?
I´m using: Google Cloud Compute Engine Linux Debian + Apache2 Google Cloud SQL Wordpress Yesterday my CPU started increasing from 1-5% to 80-90%. I was developing on a wordpress site as it ...
-3
votes
1answer
65 views
Strange folders in Pagespeed cache folder. Did I get hacked? [duplicate]
I have a Centos7 server with nginx and google pagespeed. I wanted to clear pagespeed cache for a reason but i saw lots of chinese site caches in my pagespeed cache folder like baidu.com, ly.com, ...
1
vote
1answer
146 views
mod_pagespeed refuses to flush cache
I have mod_pagespeed running on my Dreamhost Ubuntu 12.04 VPS. Every time I turn on mod_pagespeed again the old header display (top black bar with data I removed - is shown on all pages. This despite ...
-2
votes
1answer
41 views
How to check my site speed? [closed]
im the developer and in charge of a company's Wordpress based site our site started to run a lot slower recently and i am trying to figure it out for two weeks now! My main problem is that every ...
-2
votes
2answers
548 views
Installing ngx_pagespeed with nginx 1.6.2 (Backport) on debian 7 (wheezy)
I am struggling to install nginx 1.6.2 with module ngx_pagespeed 1.9.32.1-beta Can anyone please help me to install this on my debian 7. Any working tutorial i have tried ...
0
votes
0answers
39 views
How to cache particular file in folder using .htaccess
i tried google and found one solution at 'http://webmasters.stackexchange.com/questions/24881/cache-a-particular-image-using-htaccess' but it cache all the file of folder, i want to cache only ...
0
votes
0answers
115 views
Nginx Installation generating Error 127
NginX installation is generating make: * [install] Error 127 Error. /root/nginx/nginx_1.4.6/debian/nginx-common.dirs: 1: /root/nginx/nginx_1.4.6/debian/nginx-common.dirs: etc/nginx: not found ...
-1
votes
2answers
124 views
Nginx and its caching systems. Are they all the same?
I'm a bit confuse about PageSpeed, Microcaching and Memcached. Are they just different tools that do the same job? I was initially thinking in use PageSpeed with Nginx. If I do that, do I need ...
0
votes
2answers
91 views
Very high First Byte Time
A client of mine which I will be completely re-building the site for, is having some major speed issues with the current site. It takes on average 4.4 to 4.8 seconds before the First Byte Time to ...
-1
votes
1answer
253 views
pagespeed on apache with nginx as reverse proxy
I have a VPS and using the following stack: NGINX as front-end proxy on port 80. Also port 443 for SSL Apache on 8080 for dynamic content (mostly PHP) Now, I want to use PageSpeed module by Google. ...
0
votes
1answer
117 views
Can I use the Nginx PageSpeed module together with SSI?
Is it possible to use the Nginx PageSpeed module together with SSI? I can't get SSI up and running when PageSpeed is enabled. But as soon as I disable PageSpeed, SSI works again: location ~ ...
0
votes
3answers
747 views
Is it sensible to use both pagespeed and cloudflare?
We're using google's pagespeed service. From what I can gather it just draws the page from our webserver and runs it through the mod_pagespeed optimisation module. I'm wondering does it do any ...
1
vote
2answers
358 views
Pagespeed GZIP facebook like button
I am using mod-deflate on httpd to compress resources. Pagespeed complains that an external resource (facebook like button) is not being compresssed: Compressing ...
0
votes
0answers
324 views
How to get IIS to accept-encoding: gzip(gfe)
Google's PageSpeed Service forwards requests with the accept-encoding header set to gzip(gfe). Unfortunately IIS chokes on this with the following: HTTP/1.1 400 Bad Request Content-Type: text/html; ...
0
votes
1answer
257 views
mod_pagespeed own js and css render blocking
My mod_pagespeed gives a lower score because it's own js and css are render blocking. Given that the tool is designed to speed up, not slow down, I don't think this is desired behavior by design. Has ...
0
votes
1answer
51 views
uk vps server route to thailand? [closed]
I'm just a Javascript developer using node.js... My host has got me a vps sever in england. I have had someone test my site loading in england and it is lightning fast. I've also had someone test in ...
1
vote
1answer
25 views
Force ngx_pagespeed to use png8
I used ngx_pagespeed to optimize my web server with Nginx. One of the servers is an image reverse proxy that supposed to fetch images from a remote server, optimize it, and send back to the client. ...
2
votes
0answers
188 views
Is it possible to configure a CDN so that it will step out of the way for a subset of regional IPs?
We have a website which targets customers in China, both expat and local Chinese. We have an ICP license which allows us to host in a datacenter inside China. Internet in China is actually as fast as ...
0
votes
1answer
423 views
serving static file from cookieless domain: alternative cookieless directory
I'm trying to follow all the guidelines of "Google Page Speed". The directive "Minimize request overhead" requires static content (images, js, css, etc.) on a static server (ie cookieless): ...
4
votes
3answers
4k views
How do I enable gzip Compression on NGINX PageSpeed Module resources?
I have been focusing heavily on optimizing a certain website so that it scores 100 on the Google PageSpeed Insights tool (for both mobile and desktop). Most of the items are working flawlessly, but I ...
1
vote
2answers
295 views
How to not redirect if requesting server_name only
Most people type in the browser bar: mysite.com and not https://mysite.com. Alot of developers including myself have something like this in their Nginx config file which means that this mysite.com ...
2
votes
1answer
2k views
Time to first byte: why is it so high? [closed]
I recently changed the host of one of my websites, and I noted that pages are loading slowly. The elements of the page themselves are quickly loaded (the pages are lightweight, CSS and JS are ...
6
votes
0answers
3k views
How to Build nginx 1.4.0 and ngx_pagespeed in Ubuntu/Debian? [closed]
How to Build nginx 1.4.0 and ngx_pagespeed in Ubuntu Create a directory to download necessary packages (optional) : mkdir pagespeed && cd pagespeed Make sure that you have latest version ...
0
votes
1answer
55 views
Is the website directory path length important for server operations speed in any sense?
I'm using a website and I do lots of operations (its a basis for mobile app). If I place the website in a long path directory of the server will that slow down the operations in any sense? I mean ...
1
vote
1answer
788 views
How to Check Download/Upload Speed to Web Server?
I have a web server in the US (MS Windows 2008). Chinese users are complaining of slow speeds and SQL command timeouts. Other Asian and European users are not.How do I check the speed ...
2
votes
1answer
1k views
enabling gzip with htaccess…why is it hit or miss?
I have shared hosting through Justhost. I use the HTML5 Boilerplate .htaccess (have tried other methods from here and there without luck) the compression part is as follows: <IfModule ...
0
votes
1answer
1k views
How to set expiration date for external files? [closed]
I have a site included lots of external files, most of them are gif format. I have no control on the external files, but have to use them(with permission). When I check the site using Google ...
0
votes
1answer
46 views
how to determine problems with page load [closed]
Im hosting a website in a shared hosting environment. i think im pretty decent coder. I have done every possible way to improve my page performance including caching and gzipping the content. Still my ...
1
vote
0answers
712 views
Apache mod-pagespeed installation affects mod-spdy?
Recently my site (an https connection, running on an Amazon EC2 ubuntu apache2.2) has this issue where I need to load the page several times (3-4) before it will load normally without issue. It will ...
2
votes
1answer
316 views
apache2 access log , thousands of logs from the IP of the same server
I was Trying to read the apache access log for my vps 1.1.1.173 server and i have found something wired , it has almost 98% of the requests from same IP address of the vps here is an example of ...
0
votes
1answer
43 views
Hosting of jQuery script, which makes more sense with respect to page load time?
I'm thinking about whether it makes more sense to include the http://code.jquery.com/jquery-latest.min.js file from the jQuery website, rather than hosting it on your own server, since 1st time ...
1
vote
2answers
2k views
Google Page Speed message: https://ajax.googleapis.com/ajax/libs/jquery/1.6/jquery.min.js (1 hour)
Google Page Speed is telling me to leverage browser caching for only this object: https://ajax.googleapis.com/ajax/libs/jquery/1.6/jquery.min.js (1 hour) As this is being delivered from an external ...
2
votes
2answers
392 views
Any way to speed up my website in other countries?
My website(social network) was built with django, cassandra && memcache, rabbitmq, mysql it used rabbitmq to serve POST requests (often it user submitted contents), to balance the load of ...
0
votes
1answer
62 views
Please help me select a webserver configuration [duplicate]
Possible Duplicate: Please help me select a webserver configuration I have a website, which has grown from 10 visits per day, to 100 per day in couple of months, and now to about 800 unique ...
2
votes
2answers
96 views
Reducing Loading of Advertisers Scripts
I have a website (http://dev2.liquor.com) that loads very quickly when I remove the advertisers and tracking scripts our partners give us. Of course we need to reduce page load time from 6 seconds to ...
2
votes
3answers
234 views
How to downgrade a 120 Mbit line, to test website speed?
How to downgrade a 120mbit line (our current connection) temporary to a 10mbit to test what our potential clients with less speedy internet are experiencing as the website loads? At this moment ...
7
votes
1answer
1k views
When should you use and not use Etags?
I was just looking at our site on WebPageTest.org and one of their recommendations for speeding up a website is: ETag headers should generally not be used unless you have an explicit reason to ... | ESSENTIALAI-STEM |
Right now, it is often asserted that cannabis has lots of positive aspects, this is why a lot more people are profiting from its use. The demand for such solutions is regularly increasing, specifically because it has some exclusive qualities, rendering it ideal for medical objectives in truth. A lot of research indicates that marijuana has specified features which render it worthwhile for some types of conditions and health conditions. You might be wanting to know just what these items are, and why they create it useful. So, for you to know the performance of cannabis, you have to know more details on its framework.
Initially, we must require a brief investigate the compound constitution of cannabis. This plant contains several principal parts: delta-9-tetrahydrocannabinol (THC), cannabidiol (CBD), together with an amino acid known as THC-acid. The primarypart and THC, is located in two various kinds of marijuana, which might be either THC-locked (THC) or no-THC cannabis. Of the two, CBD would be the a single most frequently found in marijuana. It has been established that CBD is able to reduce the negative impacts brought on by a number of kinds of cancers cellular material, while not producing any unwanted side effects on our body.
Now, allow us to have a look at many of the physiologic aspects of this grow. They are a lot less numerous, even though many of the busy ingredients present in THC are also included in CBD. Also, CBD has zero-inflammatory homes, which can help alleviate a number of the signs of osteoarthritis and other similar health issues. It copies the end results of THC. That’s additionally, it can reduce certain cardiovascular ailments and stimulate the mind.
The primary reason regarding these-outlined physiologic facet of CBD. THC is definitely the one in charge of developing the euphoric sensation and “substantial” experienced by the majority of people under the influence of marijuana. Since CBD does not have the psychotropic (imagination altering) residence of THC, it does not make the very same result. But CBD can even minimize a number of symptoms in connection with some types of depression. Therefore, it is often advised make use of CBD next to medications for therapy of depressive disorder. It is additionally thought that CBD can reduce the level of certain neurotransmitters in the body, in so doing improving the overall running from the brain.
Besides both of these, CBD has also proven some guarantee in reducing indications of various ailments including Parkinson’s and Alzheimer’s. It can also slow down the process of getting older and lower the likelihood of heart and soul strikes and cerebrovascular accident. In addition to this, CBD also revealed commitment in enhancing head functions and psychological functionality. CBD is known to counteract specific oxidative stress-relevant disorders just like atherosclerosis and cataracts. This is the reason why it is usually employed in mobile malignancy therapy.
Above and beyond these, CBD could also energize the disease fighting capability and boost total immune system efficiency. CBD may be able to enable you to should you suffer from almost any constant medical condition. Simply because it has an zero-inflammatory impact, it can reduce joint infection in people today affected by arthritis. Additionally, it can lessen hacking and coughing and therefore can certainly help in eliminating coughs and the common cold. Thus far, the studies in connection with results of CBD is rather restricted, but so far it provides found assure in various distinct regions.
Aside from most of these marijuana rewards, CBD is likewise thought to eliminate pain and cure spasticity. It is rather a lot essential to consult a competent prior to taking CBD however. There are a few crucial cautions in terms of consuming CBD. Or if you suffer from seizures, then never consider CBD under the proper care of a doctor, when you have liver or renal illness. It is advisable to consult your health care professional prior to taking CBD notably if you have a history of epilepsy and other seizure diseases.
In brief, CBD can be viewed as being a “marijuana without having the side effects”. So, substantially, there is absolutely no damaging adverse reaction related to CBD. However, just like any product or prescription drug, you will need to consult with a professional before taking it. For everyone who is thinking of employing this medication, it is good to refer to a medical practitioner or expert in nutrition. This enables you to make proper final decision and steer clear of medical conditions sooner or later.
If you have any inquiries pertaining to where and just how to utilize Vancouver Weed Delivery Same Day https://budora.cc, you could contact us at our own website.
Relevant content pointed out by visitors from the web site:
Just click the following internet site
Read Full Report | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/S. Scott Conner
The result was delete. Ron Ritzman (talk) 01:02, 22 May 2012 (UTC)
S. Scott Conner
* – ( View AfD View log • Stats )
Clear puff piece for a local radio and TV host. As far as I can tell, his main claim to notability is having hosted The Scott Conner Show, a local television variety show (Albuquerque, N.M.) that only aired one season. Very little coverage even in local sources, which does not bode well for notability. I was only able to find three nontrivial mentions of Conner in the Albuquerque Journal, the most significant of which is "Hoping for a winner - Aspiring talk show host selling rights to his program on eBay" (December 2, 2007). This is a decent-length (900 word) article about Conner's (ultimately unsuccessful) effort to finance a second season of his show, and includes some biographical details. However I believe this article is more indicative of the novelty factor of trying to sell a show on eBay than of any real notability on Conner's part. The other two articles aren't actually about Conner, but do quote him in connection with some failed film projects he was involved with. In short, I believe he fails WP:GNG and is well short of qualifying under WP:ENTERTAINER or WP:ARTIST. Camerafiend (talk) 00:27, 14 May 2012 (UTC)
* Note: This debate has been included in the list of Radio-related deletion discussions. ★☆ DUCK IS JAMMMY ☆★ 00:43, 14 May 2012 (UTC)
* Note: This debate has been included in the list of Television-related deletion discussions. ★☆ DUCK IS JAMMMY ☆★ 00:43, 14 May 2012 (UTC)
* Note: This debate has been included in the list of Actors and filmmakers-related deletion discussions. ★☆ DUCK IS JAMMMY ☆★ 00:43, 14 May 2012 (UTC)
* Note: This debate has been included in the list of Arts-related deletion discussions. ★☆ DUCK IS JAMMMY ☆★ 00:43, 14 May 2012 (UTC)
* Delete Generally in this time, a "late-night (TV) Talk & Variety show" on local TV means "subject purchased paid programming time on the station to put across their views", which means they paid money to get on TV rather than being cast neutrally on a program by the station, which seriously wounds notability, and the radio show mentions are of programs which are of solely local interest. Not really finding anything notable about this person. Nate • ( chatter ) 03:54, 14 May 2012 (UTC)
* Delete - reeks of a resume, not an article. Bearian (talk) 18:58, 15 May 2012 (UTC)
| WIKI |
PIER
Progress In Electromagnetics Research
ISSN: 1070-4698, E-ISSN: 1559-8985
Home | Search | Notification | Authors | Submission | PIERS Home | EM Academy
Home > Vol. 99 > pp. 339-354
EFFECT OF TEMPERATURE AND MULTIPLE SCATTERING ON RAIN ATTENUATION OF ELECTROMAGNETIC WAVES BY A SIMPLE SPHERICAL MODEL
By E. Setijadi, A. Matsushima, N. Tanaka, and G. Hendrantoro
Full Article PDF (285 KB)
Abstract:
Specific rain attenuation is discussed from the viewpoint of numerical solution for scattering and absorption of electromagnetic waves related to dielectric spheres. Special attention is paid to the quantitative evaluations considering the change of temperature and the existence of multiple scattering effect. The analysis is based on the set of Stratton's vector spherical wave functions and its addition theorem, which lead to the simultaneous linear equations for the expansion coefficients with adaptively selected truncation numbers. Computed extinction cross sections lead directly to the specific rain attenuation, where the Weibull raindrop distribution model is used. It is discussed how the dependence of the permittivity of water on temperature and frequency affects the attenuation property. Furthermore, the effect of multiple scattering is evaluated in terms of the root mean square of attenuation deviation from the simple superposition of single scattering (Mie's) coefficients. Contrary to general belief, this deviation is the highest at around the boundary between microwave and millimeter wave bands.
Citation:
E. Setijadi, A. Matsushima, N. Tanaka, and G. Hendrantoro, "Effect of temperature and multiple scattering on rain attenuation of electromagnetic waves by a simple spherical model," Progress In Electromagnetics Research, Vol. 99, 339-354, 2009.
doi:10.2528/PIER09102609
http://www.jpier.org/PIER/pier.php?paper=09102609
References:
1. Brussaard, G. and P. A. Watson, Atmospheric Modelling and Millimetre Wave Propagation, Sec. 4.2, Chapman & Hall, London, 1994.
2. Lin, D.-P. and H.-Y. Chen, "An empirical formula for the prediction of rain attenuation in frequency range 0.6--100 GHz," IEEE Trans. Antennas Propagat., Vol. 50, No. 4, 545-551, 2002.
doi:10.1109/TAP.2002.1003391
3. Zhu, L., X.-G. Li, and G.-W. Lou, "Analysis of characters of submillimeter wave attenuation by rain medium," Microwave Opt. Tech. Lett., Vol. 50, No. 4, 1025-1028, 2008.
doi:10.1002/mop.23286
4. Bahrami, M. and J. Rashed-Mohassel, "An exact solution of coherent wave propagation in rain medium with realistic raindrop shapes," Progress In Electromagnetics Research, Vol. 79, 107-118, 2008.
5. Oguchi, T., "Scattering properties of Pruppacher-and-Pitter form raindrops and cross polarization due to rain: Calculation at 11, 13, 19.3, and 34.8 GHz," Radio Science, Vol. 12, No. 1, 41-51, 1977.
doi:10.1029/RS012i001p00041
6. Ishimaru, A., "Multiple scattering calculations of rain effects," Radio Science, Vol. 17, No. 6, 1425-1433, 1982.
doi:10.1029/RS017i006p01425
7. Tsolakis, A. I. and W. L. Stutzman, "Multiple scattering of electromagnetic waves by rain," Radio Science, Vol. 17, No. 6, 1495-1502, 1982.
doi:10.1029/RS017i006p01495
8. Rogers, D. V. and R. L. Olsen, "Multiple scattering in coherent radiowave propagation through rain," COMSAT Technical Review, Vol. 13, 385-401, 1983.
9. Pruppacher, H. R. and R. L. Pitter, "A semi-empirical determination of the shape of cloud and rain drops," J. Atomos. Sci., Vol. 28, No. 1, 86-94, 1971.
doi:10.1175/1520-0469(1971)028<0086:ASEDOT>2.0.CO;2
10. Bruning, J. H. and Y. T. Lo, "Multiple scattering of EM waves by spheres part I --- Multipole expansion and ray-optical solutions," IEEE Trans. Antennas Propag., Vol. 19, No. 3, 378-390, 1971.
doi:10.1109/TAP.1971.1139944
11. Hamid, A.-K., I. R. Ciric, and M. Hamid, "Electromagnetic scattering by an arbitrary configuration of dielectric spheres," Can. J. Phys., Vol. 68, No. 12, 1419-1428, 1990.
12. Matsushima, A., Y. Momoka, M. Ohtsu, and Y. Okuno, "Efficient numerical approach to electromagnetic scattering from three-dimensional periodic array of dielectric spheres using sequential accumulation," Progress In Electromagnetics Research, Vol. 69, 305-322, 2007.
doi:10.2528/PIER06123002
13. Stratton, J. A., Electromagnetic Theory, Ch. 7, McGraw-Hill, NY, 1941.
14. Cruzan, O. R., "Translation addition theorem for spherical vector wave functions," Quart. J. Appl. Math., Vol. 20, 33-39, 1962.
15. Marshall, J. S. and W. M. Palmer, "The distribution of raindrops with size," J. Meteorology, Vol. 5, 165-166, 1948.
16. Atlas, D. and C. W. Ulbrich, "The physical basis for attenuation rainfall relationships and the measurement of rainfall parameters by combined attenuation and radar methods," J. Rech. Atmos., Vol. 8, 275-298, 1974.
17. Sekine, M., C.-D. Chen, and T. Musha, "Rain attenuation from log-normal and weibull raindrop-size distributions," IEEE Trans. Antennas Propagat., Vol. 35, No. 3, 358-359, 1987.
doi:10.1109/TAP.1987.1144099
18. Utsunomiya, T. and M. Sekine, "Rain attenuation at millimeter and submillimeter wavelengths," Int. J. Infrared Millimeter Waves, Vol. 26, No. 6, 905-920, 2005.
doi:10.1007/s10762-005-5662-5
19. Liebe, H. J., G. A. Hufford, and T. Manabe, "A Model for the complex permittivity of water at frequencies below 1 THz," Int. J. Infrared Millimeter Waves, Vol. 12, No. 7, 659-675, 1991.
doi:10.1007/BF01008897
20. Harrington, R. F., Time-harmonic Electromagnetic Fields, Ch. 3, McGraw-Hill, NY, 1961.
21., ITU-R P.838-3, "Specific attenuation model for rain for use in prediction methods," May 2005.
22. Waterman, P. C., Matrix formulation of electromagnetic scattering, Proc. IEEE, Vol. 53, 805-812, 1965.
23. Ohtsu, M., Y. Okuno, A. Matsushima, and T. Suyama, "A combination of up- and down-going Floquet modal functions used to describe the field inside grooves of a deep grating," Progress In Electromagnetics Research, Vol. 64, 293-316, 2006.
doi:10.2528/PIER06071401
© Copyright 2014 EMW Publishing. All Rights Reserved | ESSENTIALAI-STEM |
DTMFA
Etymology
Coined by sex advice columnist, in .
Verb
* , as advice to a partner in a relationship. | WIKI |
I've been yelled at for my graphs a lot. So after yet another chiding from my adviser, he suggested that I write up a blog post of the bare minimum requirements for competent data visualization.
1. Label Everything
Or well, not everything, but everything not obvious. So label every axis, as clearly as possible and include units when plotting something that has them, like time, temperature, calories.
Advertisement
The x axis doesn't get labeled because the tick marks clearly indicate that these are dates. The figure title alludes to the relationship/pattern the graph is attempting to describe. Never title a graph something like views vs. uniques vs. dates-that's what labels are for. Explain the big picture in the title. And, when labeling all your data, don't let your labels obscure information.
Instead, move the offending label so that the data is clearly visible and label anything that needs it.
2. Work with the Numbers
Be aware of the sort of scale the data lies on. Is it in the millions, hundreds, microns? What scale is the data usually on? Is the scale affecting the interpretation in any way?
In the graph above, the data looks fairly consistent 'cause the scale was set somewhat arbitrarily. On the other hand, in the graph below the data looks highly variable because the scale is set to the data. An accurate scale would be based on the typical number of comments an open thread gets.
3. Choose Colors Carefully
The following graphs all visualize the exact same data, but you'd be hard pressed to know that because the color messes with the interpretation. Stick to a few hard and fast basics and you'll be fine, and if you want to get all fancy, colorbrewer is a fantastic resource for colormaps and colourlovers is great for palettes.
Sequential data use colors in the same family (so pale red to dark red or yellows to oranges to reds or the like) and arrange them from lightest/mildest color to most vivid in the order that matches your data. So large value in your data is important? That's red. Small value important? Than that's red.
Advertisement
Divergent data if your data centers around some neutral central value-like hot and cold temperatures-make that central value a neutral color (like white) and use opposing colors on each side of the neutral (like shades of red for hot and shades of blue for cold).
Qualitive data such as whether a town is rural, urban, or suburban, use a map where the shades are different enough from each other that it is really clear that the data points are somewhat independent.
4. Know the Audience
As is evident from this post, I'm a huge fan of xkcd style plots. I think they're kind of adorable for blog posts, but that's about the only place they're useful. Sometimes they can be worked into a presentation and sometimes they just won't go over well, and creating for the audience is key. Pay attention to fontstyles, linestyles, point sizes, line weights, font sizes, anything else that's a part of how the graph looks rather than the information in it, because those read very differently in a paper, a presentation, and on the web.
Advertisement
While I may feel the following graph is better suited for the web because of its casualness and very heavy line weights, the one underneath would be far more appropriate in an academic environment.
5. Use the Correct Graph
I know that this should seem trivial, but all too often people either get enraptured with a visualization technique (chord graphs) or are really comfortable with a handful of techniques and try to use them where they just don't belong.
This should not be a line graph because each data point is independent of the other data point, so it is hard to see what is going on. A bar chart does a much better job of showing how much the different hackerspace authors are dominating the front page at the moment.
And yes, everyone hates on pie charts, but they're reasonably good at showing how parts relate to a whole. There's a great argument for pie charts only having two slices (how one part relates to a whole), but the key is that the proportionality of the slice must be clearly identifiable.
There's no hard and fast rule for choosing the correct type. My adviser's suggestion is to think about the questions the visualization is supposed to answer and then work backward from there. There's a similar concept among data visualization people of starting with the story the data is supposed to tell.
For more resources, check out my IPython Notebook of all the graphs in this post, fosslien's Stop Visually Assulting Me, Andrew Abela's Chart Chooser, Krygier's Geo 353, and pretty much anything Tufte.
Advertisement
ETA: Edited some of the graphs per Kuiper Belle's suggestions. The notebook has been updated to show the new graphs and still has the old graphs in it.
ETA2: Alejandro and lostwallet brought up a great addendum to rule #2. When plotting two things of the same type (like pageviews) and in a similar range, keep the scales consistent within the graph and across graphs. | ESSENTIALAI-STEM |
Shōrei-ryū
Shōrei-ryū (昭霊流) is a style of Okinawan karate and is one of the two oldest karate styles, alongside Shōrin-ryū. It was developed at the end of the 19th century by Higaonna Kanryō in Naha, Okinawa, Japan.
Etymology
Shōrei-ryū means "the style of inspiration" and certain martial arts scholars believe that the term Shōrei is derived from the Shoreiji Temple located in either Fujian or Mount Jiulian of Longnan, Jiangxi.
Origin
Little is known about the origins of Shōrei-ryū, but it was influenced in its early development by Shuri-te. Kanryo Higashionna originally studied Shuri-te with Sokon Matsumura and learnt quanfa from Chinese Wai Xinxian (assistant of Xie Zhongxiang). Higaonna later traveled to China to perfect his skills, which he probably succeeded in because he learned many new kata from Fujian, the home of Baihequan (Chinese 白鶴 拳, Pinyin báihèquán) and adopted it in his style. The teachings of this temple provided the basis for the Naha-te style of Okinawan karate.
Following passing of Higaonna Kanryo, the style began to take a new direction and became a purely "internal" combat style. This was due in large part to the influence of Choki Motobu.
Although Motobu's sensei style is still considered Naha-te, it actually had nothing to do with Higashionna. When Motobu became the leader of Shōrei-ryū, he began to guide his development in another direction, mainly because he trained with Anko Itosu of the Shuri-te style, a disciple of the great Sokon Matsumura.
Features of style
The main features of Shōrei-ryū are the use of open hands, circular block techniques, and kicks to the gedan (lower-level) area.
In addition, the use of short and hard techniques in close combat in combination with throwing techniques is a specialty, especially from the sanchin and shiko-dachi stances. Great importance is also attached to training on the makiwara.
Another peculiarity is that the handling of Kobudō weapons such as bo, tonfa or sai is also very practiced.
Shōrei-ryū Kata
Shōrei-ryū originates various kata that would be used in descendant styles like Gōjū-ryū and others.
Further development
Modern descendants of Shōrei-ryū include styles such as Gōjū-ryū and Ryūei-ryū. Gōjū-ryū is considered the direct evolution of Shōrei-ryū.
The Shitō-ryū style also contains many elements of Shōrei-ryū, since Mabuni Kenwa was a student of Higaonna, and even the Shōtōkan style contains kata from Shōrei-ryū, which, however, did not get there directly, but were passed on to Funakoshi Gichin and his students via Mabuni Kenwa.
The Shōrei-ryū name (alternatively, Goju-Shorei-Ryu and later, Shorei-Goju Ryu) was also used for the style of karate brought to the United States by Robert Trias. Later, Trias used the name Shuri-ryu, although some lineages still use the Shorei Ryu name. This style should not be confused with traditional Shōrei-ryū. Trias's karate incorporated elements from Naha-te, Shuri-te, Tomari-te, and others. | WIKI |
User:Morganllywelyn23/sandbox
Garin Prys Williams (Gazzaa) is a young man from the Dolgellau area. He is a very hansome and cute boy with a smile that would break your heart. He is an avid bird watcher and this along with playing croquet for the Afghanistani team Al Maladies is how he spends his weekends. | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.