Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Page:Complete Works of Count Tolstoy - 02.djvu/524 Velenchúk, five other soldiers of my platoon were warming themselves at the fire. In the best place, protected from the wind, on a cask, sat the gun-sergeant of the platoon, Maksímov, smoking a pipe. In the pose, the look, and all the motions of this man could be observed the habit of commanding and the consciousness of his personal dignity, even independently of the cask, on which he was sitting, and which, at a halt, formed the emblem of authority, and of the nankeen-covered fur half-coat. When I came up, he turned his head toward me; but his eyes remained fixed upon the fire, and only much later did they follow the direction of his head, and rest upon me. Maksímov was a freeman; he was possessed of some means, had taken instruction in the school of the brigade, and had picked up some information. He was dreadfully rich and dreadfully learned, as the soldiers expressed themselves. I remember how once, at gun-practice with the quadrant, he explained to the soldiers who were crowding around him that the level was "nothing else than that it originates because the atmospheric quicksilver has its motion." In reality, Maksímov was far from being stupid, and he knew his work very well, but he had an unfortunate peculiarity of speaking at times purposely in such a way that it was totally impossible to understand him, and so that, as I am convinced, he did not understand his own words. He was especially fond of the
WIKI
Wikipedia:Reference desk/Archives/Entertainment/2024 January 7 = January 7 = performing distant relatives I read in TV Guide Magazine, Tom Wopat has a distant relative who is also an actor. That relative was a part of the CSI franchise. If that's true, which show was that? Anyone know?2603:7000:8641:810E:10E7:18A9:93F7:C010 (talk) 12:57, 7 January 2024 (UTC) What is the Southwest Airlines Fan Zone on The Tonight Show Does it have something to do with flight 1380 (episode aired Jan 3 2023) <IP_ADDRESS> (talk) 14:58, 7 January 2024 (UTC) * Southwest Airlines Flight 1380 was in April 2018, and something seven years and about nine months prior like that would probably not be recent or topical for a skit or monologue joke on The Tonight Show Starring Jimmy Fallon. But someone uploaded this episode on Archive.org for registered users there to 'borrow', recorded from the feed of NBC station KNTV. Horizontal scrolling is disabled on the page if you have not signed up to 'borrow' the episode, but if you have a wide screen monitor you might be able to read the transcript at the 11:38pm mark, where Fallon points to a part of the studio audience and says to "welcome a very special part of our audience that were all flown here thanks to a special promotion from Southwest Airlines. Give it up for the Southwest Fan Zone". After the applause dies down, Fallon then at the 11:39pm mark mentions how in the previous week that Southwest "left passengers and luggage across the country stranded after they suffered a major meltdown and canceled more than 15,000 flights", that the company stated that the official cause was mainly because of "outdated technology", and then Fallon jokes that you never want to hear about an airline and the phrase "outdated technology" in the same sentence. I'll leave the interpretation to you as to whether the fan zone was an actual promotion from Southwest or it was part of the joke, because its not clear when I read it. Zzyzx11 (talk) 19:31, 7 January 2024 (UTC) * Oh. The canceled flights. <IP_ADDRESS> (talk) 21:21, 8 January 2024 (UTC) Science fiction movie or episode Yesterday I talked to a friend about a movie, where I thought James Mason stared. Looking at his filmography I couldn't find anything matching my memories. So I may err on the Mason-Part. But maybe you can help me find the movie/episode. And it isn't Silent Running either. The things I remember: * 1) two little roboters (like R2D2), one shiny and new, the counterpart old, with bumbs, etc. * 2) faceless, mindless "Crew" * 3) an autocratic leader (which I thought was Mason), Nemo-like. It is either a spaceship, a sphere, or submarine. There are "visitors" which don't belong to the crew, may be they were rescued. So, can someone help? Maresa63 Talk 21:21, 7 January 2024 (UTC) * No robots or mindless crewmen (just your standard minions), but Mason did play Captain Nemo in 20,000 Leagues Under the Sea. He rescues/captures people after sinking their ship, among them Kirk "I ain't Spartacus in this film" Douglas. Clarityfiend (talk) 23:34, 7 January 2024 (UTC) * The Black Hole with Maximilian Schell from 1979 perhaps? The robots would be V.I.N.CENT. and BO.B. The "crew" of the spaceship Cygnus consists of faceless, mindless humanoid drones (with mirrored faceplates), and the autocratic leader, played by Schell, would be Dr. Hans Reinhardt. (With his beard he even looks a bit like Mason did playing Captain Nemo in 20,000 Leagues Under the Sea.) Tea2min (talk) 08:36, 8 January 2024 (UTC) * @Tea2min That's it! And of course it was Maximilian Schell! Thank you very much. Such a relief! 💐Maresa63 Talk 17:41, 10 January 2024 (UTC)
WIKI
Wikipedia:Featured list candidates/List of NHL game sevens/archive1 * The following is an archived discussion of a featured list nomination. Please do not modify it. Subsequent comments should be made on the article's talk page or in Wikipedia talk:Featured list candidates. No further edits should be made to this page. The list was archived by PresN via FACBot (talk) 00:26, 29 April 2021 (UTC). List of NHL game sevens * Nominator(s): –Piranha249 15:31, 16 January 2021 (UTC) I am nominating this for featured list because it meets all the criteria necessary for such a nomination, including comprehensiveness, prose, structure, and style. –Piranha249 15:31, 16 January 2021 (UTC) Comment by Kaiser matias Not an overall review of the article, but I want to mention that Note A is not fully correct. While the 2-2-1-1-1 schedule is used now, it has not always been the case. For example, 1994 the Western Conference some series used the 2-3-2 format, including one on this list (1994 Maple Leafs-Sharks). Thus I would suggest re-wording the note. Kaiser matias (talk) 19:02, 17 January 2021 (UTC) — RunningTiger123 (talk) 23:13, 17 January 2021 (UTC) * Comments * The first two paragraphs in the lead need sources since they are discussing information not included in the table. * Images need alt text. * I would suggest using a different format for footnotes, such as Template:Efn. This would allow the footnotes to pop up by hovering over the note, similar to references, instead of forcing the user to click the link to another section. * Use Template:See also for link to List of NHL overtime game sevens (though I don't think that list is even necessary... an AfD may be in order for that list since all of the information it covers is in this list). * Edit: After further consideration and review of that list, I decided to change it to a redirect to this list per WP:CFORK and WP:BOLD. This means the "See also" link should be removed. RunningTiger123 (talk) 23:35, 17 January 2021 (UTC) * The green boxes and ^ symbols are not needed to denote game seven in the Stanley Cup Finals. Writing "Finals" in column 2 already conveys the same information without cluttering the table with more symbols. * Don't use small font for Oakland–Alameda County Coliseum Arena – just make the column wider. (Generally, smaller fonts should be avoided for accessibility reasons.) * The wikilinks in column 2 seem inconsistent. I see that you've avoided duplicate wikilinks for the same playoffs, but I think it would be better to have the links in every row and to distinguish the links by linking to specific sections. So, for example, the 2019 first round could link to 2019 Stanley Cup playoffs instead of just 2019 Stanley Cup playoffs and the 2019 second round could link to 2019 Stanley Cup playoffs. * The ∞ symbol and notes b/c are redundant. If the game is at a neutral site, obviously the winner was the designated home/road team when they won instead of actually being at home/on the road. * Use Template:Abbr to show that "Ref." in the last column means "References". * , I've done several of your suggestions, such as using Template:Efn and Template:Abbr. But I did run into issues with others: * The Green boxes were originally used in the NBA Game sevens article, also a featured list. Should that be in question, too? * What's the perfect width for Venue column? * How else is people supposed to know who was the designated home/road team in a neutral site game? * I'll look for sources wherever possible for the article lead. Now that the NFL season is over as of Sunday, this list will be one of my top priorities. –Piranha249 (Discuss with me) 18:23, 10 February 2021 (UTC) * To explain some of my points: * While the NBA list uses the boxes, I'm not a huge fan of it. Why say something twice when we can say it once? In my opinion, the additional green boxes and ^ notes get in the way and disrupt readability without adding anything new – the round is already noted in the second column – so we should remove them. Also, the NBA list was approved over 10 years ago, so I don't think it fully represents current FL standards. * I don't know what the "perfect width" is – there's no right or wrong answer as long as the table still fits comfortably on the page. * If a game is marked with the ∞ symbol, then a red row would indicate the winner was the designated road team and a white row would indicate the winner was the designated home team. Alternatively, if a winning team is marked with note b or c as the designated home/road team, the game must have been played at a neutral site. Either way, one of the two symbols can be removed – the latter probably does a better job. Again, why say something twice? * –RunningTiger123 (talk) 19:05, 10 February 2021 (UTC) * , I've already started to remove the green boxes at your suggestion, and I still have 5 (6?) left to remove. I also removed the notes regarding last year's playoffs (for consistency purposes, I used red rows). I still have to resolve the width of the venue column, but that's about it. –Piranha249 (Discuss with me) 00:33, 3 March 2021 (UTC) * –RunningTiger123 (talk) 19:05, 10 February 2021 (UTC) * , I've already started to remove the green boxes at your suggestion, and I still have 5 (6?) left to remove. I also removed the notes regarding last year's playoffs (for consistency purposes, I used red rows). I still have to resolve the width of the venue column, but that's about it. –Piranha249 (Discuss with me) 00:33, 3 March 2021 (UTC) I endorse all of the above and add..... * Comments * "Since its opening in 1968, eight game sevens have been played at the Madison Square Garden." - being British, I am no expert, but isn't it just called "Madison Square Garden" rather than "the Madison Square Garden"? * Shouldn't the latest name of the Winnipeg Jets (I) / Phoenix Coyotes be shown? Or are you only showing names under which the franchise played a game 7? * Think that's all that hasn't already been mentioned....... -- ChrisTheDude (talk) 17:18, 20 January 2021 (UTC) * , I've updated the MSG caption, and will do the same for the Coyotes. –Piranha249 (Discuss with me) 18:24, 10 February 2021 (UTC) * Further comments * As per RT123's comments, paras 1 and 2 of the lead still need sourcing * I also agree that the green box and symbol aren't needed given that "Finals" is noted in column 2 * Small text is still present - it should just be normal text * I also agree that if the infinity symbol is used to denote a neutral site game then notes b and c aren't needed. Or else get rid of the symbol and just keep the notes, in which case remove the full stops from the notes, as they are not complete sentences....... -- ChrisTheDude (talk) 16:49, 19 February 2021 (UTC) * , Is there a way to retract this featured list nomination, at least until I get all those issues resolved? I plan on renominating it when that happens. –Piranha249 (Discuss with me) 17:36, 19 February 2021 (UTC) * Well, if you really want to withdraw, you just have to state that here and one of the directors will close the nom. But TBH the outstanding issues aren't major, they should be resolvable within the timeframe of this FLC..... -- ChrisTheDude (talk) 19:35, 19 February 2021 (UTC) * , Thanks, I won't withdraw after all. But I'll have to find sources for those paragraphs sooner or otherwise ask for help. –Piranha249 (Discuss with me) 21:25, 19 February 2021 (UTC) * Well, at a quick glance I would say this covers basically the whole of para 2...... -- ChrisTheDude (talk) 10:29, 20 February 2021 (UTC) Source review Will do soon. Aza24 (talk) 01:53, 12 March 2021 (UTC) * Formatting * Consistent all around, retrieval dates, publisher/website * Reliability * Looks good, ref 1 is an NHL website, the rest are statistical info from the same site so no issue(s) here. * Verifiability * Checked 2, 14, 38, 66 all good * 170 appears to be the wrong reference * ref 173 is broken and not archived * Paragraph one, as others have said above, still needs a reference(s). Aza24 (talk) 02:38, 12 March 2021 (UTC) Comments from SNUGGUMS * No issues with File:Madison Square Garden, February 2013.jpg * I'll assume good faith that File:Detroit December 2015 59 (Joe Louis Arena).jpg is in fact the uploader's own work since no evidence to the contrary can be found * It doesn't sound right to say "game seven is the only one in a best-of-seven series that is not guaranteed more than one game in advance" when one team could theoretically win 4 consecutive games in a series before even a fifth is played * "The only active NHL franchise that has never played in a game seven is the Columbus Blue Jackets" seems like it would be better for the Jackets' article. Let's focus more here on who did reach a seventh game within a series. * Starting four sentences in a row with "the" feels repetitive (see the third paragraph). * Not sure "NHL Records" should be italicized. Either way, remove the italics for "hockey-reference.com" (which should read "Hockey Reference"). * Too much use of Hockey Reference. That doesn't mean it's a bad publication, just that you should implement some other sources for the sake of diversity. Literally the only citation (as of this revision) which doesn't come from that website is the first one, namely NHL Records. Mainly due to the excessive reliance on one publication, I oppose the nomination for now. SNUGGUMS (talk / edits) 02:29, 25 March 2021 (UTC) * I do think the lead needs some more citations, which would likely come from other sources, but there is nothing wrong with the large reliance on a single source for citations in an FL. See, for instance, the recently promoted FLs List of Billboard number-one country songs of 1953 (49/57 sources from Billboard) or List of international goals scored by Manon Melis (49/54 sources from the Royal Dutch Football Association). As long as it's reliable, there's nothing wrong with it. RunningTiger123 (talk) 04:05, 28 March 2021 (UTC) * Those cases aren't as reliant on a certain publication. My issue is that there's only a singular citation from anywhere else. Using one or two different sources doesn't feel like enough. I personally recommend using five different sources at minimum. More diversity within references helps show that more than one organization was interested in covering a subject. SNUGGUMS (talk / edits) 13:51, 28 March 2021 (UTC) Table accessibility review (MOS:DTAB): the table is missing column and rowscopes, and a caption. * Please add `|+ table caption` to the top of the table, or if it would duplicate a nearby section header you can visually hide the caption as `|+ ` * Each column header should be marked with `scope="col"`, e.g. instead of `! Year !! ...` it should be `! scope="col" | Year` with each header on its own line. * For each row, the 'primary' cell should be marked with `scope="row"`, e.g. instead of `| (1) || ...` it should be `!scope="row"| (1)`, with the rest of the row on its own line. If the way this changes the formatting of that column bothers you, you can add the `plainrowheaders` class to the top of the table at `{| class="wikitable"` * -- Pres N 14:53, 2 April 2021 (UTC) * courtesy ping for, there seem to be quite a few issues here that have now piled up a bit. Aza24 (talk) 22:35, 6 April 2021 (UTC) * , I'm aware of the issues, and will start to make changes to accommodate them. –Piranha249 (Discuss with me) 00:53, 7 April 2021 (UTC) This list has been here for over 3 months without any support, and an oppose has sat for a month without being addressed. Closing as a stalled nomination; feel free to re-nominate whenever the issues are addressed. -- Pres N 19:05, 28 April 2021 (UTC)
WIKI
List comprehensions in Python are a great feature but also a little hard to wrap your head around at first. Basically a list comprehension is a one line for loop that outputs a list. Let’s see a simple example. Suppose we wanted to output a list of five numbers, 0-4. If we use Python’s built-in range function we can do this with a simple for loop: numbers = [] for x in range(5): numbers.append(x) numbers #[0, 1, 2, 3, 4] With a list comprehension, we can write this in one line: my_numbers = [x for x in range(5)] my_numbers #[0, 1, 2, 3, 4] Powerful, right? But also a little confusing still since we haven’t described how the first “x” in our list comprehension differs from the second “x”. So let’s use square the numbers from 0-4 to see how position matters: squares = [] for x in range(5): squares.append(x**2) squares #[0, 1, 4, 9, 16, 25] Or with a list comprehension: squares = [x**2 for x in range(5)] #[0, 1, 4, 9, 16, 25] Our output expression comes first, in this case x**2, followed by a for clause around our variable, x, and then our input sequence, range(5). For beginners, the multiple “x”s here can be confusing, so let’s show what happens if the output expression and the variable are not the same thing. Here we’ve changed the output expression to a**2 and the variable to b. squares = [a**2 for b in range(5)] Traceback (most recent call last): File "<stdin>", line 1, in <module> File "<stdin>", line 1, in <listcomp> TypeError: unsupported operand type(s) for ** or pow(): 'list' and 'int' We get a TypeError because we’re trying to do an operation on something that doesn’t exist. But if we changed the variable and output expression to match, things will work, regardless of what we call them. squares = [a**2 for a in range(5)] squares #[0, 1, 4, 9, 16] Finally, let’s get crazy and call our variable this_could_be_anything to drive the point home further. squares = [this_could_be_anything**2 for this_could_be_anything in range(5)] squares #[0, 1, 4, 9, 16] Still works, see? There’s much more we can do with list comprehensions, especially around nesting. Now that we’ve covered the basics, the official Python docs which cover this all in detail will hopefully make more sense! Want to improve your Python? I have a list of recommended Python books.
ESSENTIALAI-STEM
Date of Award: 5-1967 Document Type: Dissertation Degree Name: Doctor of Philosophy (PhD) Department: Watershed Sciences Department name when degree awarded Fisheries Biology Committee Chair(s) William F. Sigler Committee William F. Sigler Committee William T. Helm Committee John M. Neuhold Committee Wallace N. Jibson Committee Elmer J. Taylor Committee George E. Shaw Abstract Zooplankton of the littoral and limnetic zones of Bear Lake, Idaho-Utah, were collected over a 17-month period. Twenty-three species of zooplankton were recorded, as well as nine other species represented by both flora and fauna. At the time of sampling 17 physical and chemical parameters were also measured. Methods of analysis for the plankton and the environment are described and discussed. The objectives of this project were fourfold: 1. To establish a record of the current zooplankton population before changes due to the increase of organic nutrients occur. 2. To compile a qualitative and quantitative standard against which future populations can be compared. 3. To assess the source and the amount of present nutrients which are being contributed to the lake. 4. To investigate the effect the present addition of nutrients is having on zooplankton productivity. The physical and chemical analysis of the Bear Lake waters showed a number of interesting trends. The measurement of total dissolved solids, when compared with previous investigations, showed a decline: i.e., it appears that a great dilution had taken place in the lake waters since 1912. The measurement of salinity revealed two chemical patterns in Bear Lake waters. First: chloride, sulfate, sodium, and potassium showed a decrease in concentration on a long-term basis. Second, calcium showed a slight rise with a leveling off, and magnesium showed a decline with a leveling off over the same period. Calcium is being precipitated as calcium carbonate, and the removal of sodium, potassium, sulfate, magnesium, and chloride is achieved through the pumping of lake waters outside the basin. Nitrogen was measured with respect to three of its forms--ammonia, nitrite, and nitrate. Ammonia was comparatively evenly distributed throughout the water column at all depths. The cycling of ammonia appeared to follow that of known oligotrophic lakes. Generally, the nitrite was low in the limnetic and allochthonous waters and higher in the littoral zone. The littoral and limnetic water exhibited lower nitrate levels than the allochthonous sources. This is believed to be due to the prevailing land use patterns. The production of cattle and sheep and the cultivation of extensively fertilized crops appear to give the most plausible answer. The littoral waters appeared to be higher with respect to ammonia, nitrite, and nitrate, in the microhabitats that are natural, and in others that are man-made: i.e., harbors, breakwaters, and shore based homes. The distribution of phosphate-phosphorous in the waters varied little during the study. The mean values were quite similar for the littoral and limnetic waters. The allochthonous waters had approximately four times the phosphate concentration of the lake waters. The chemical analysis of the bottom muds revealed that phosphorous as phosphate and as P2O5 were significantly higher in concentration between the 50- and 200-foot contours than at lesser depths. The low levels of soluble phosphate and the slight variation encountered in the water column seem to be related to the orthograde nature of the oxygen curve found in the lake. Relationships between chemical analysis and the zooplankton associated within a particular station in the lake were completed by correlation and regression analysis. Associations between independent and dependent variables apparently defined various environmental preferences or requirements necessary for the maintenance of particular individual species. In light of the basic taxonomic considerations these proposals appear to be within reason. Individual correlation and regression analysis were completed for three lake zones investigated: littoral, limnetic, and the haptobenthos. Individual analysis of variances were completed within the three Bear Lake zones in order to assess the affect of habitat on the plankton population. The statistical analyses were compared to the means for these several stations within one zone, and biological and statistical explanations were made. Supplementary water quality analyses were conducted in order to explain some abnormal chemical and biological results. Bacteriological testing of the Bear Lake waters revealed that a large percentage of the littoral and allied limnetic zone presented definite problems with respect to water quality and public use. Checksum 5dd75e6a6c8f0eb23ec3f4a1881d0b21 COinS      
ESSENTIALAI-STEM
Class 06A Topics Layout Positioning Web graphics File formats Image Compression Web graphics Web image types RGB images RGB images are a “true color” format, in that the original colors of the image are preserved to a high degree. RGB format (vs. CMYK, JPEG, or GIF) images should be used for your master Photoshop files. RGB – Each pixel can have any color, independent of all other pixels. Each pixel has a value for Red, Green, and Blue, and each color value has a range of 0-255 (or 00 to FF in hexadecimal). Bit depth = The number of different colors available for each pixel • 32bit = 16,777,216 colors + 256 shades of gray for the alpha channel • 24bit = 16,777,216 colors • 16bit = 65,536 colors Indexed images Indexed images are a limited palette image format that is used for the web, game machines and other situations where there is a need for reduced image size or hardware that supports a limited number of colors. Indexed – Pixels in an image are limited to a small number of colors available for the entire image. Each pixel has value that points to an entry in a table of colors (also known as a palette or CLUT -Color LookUp Table). Here is an example of the palette for the duck image below. Pixels in the image can only be one of the 8 colors in the image’s palette. index palette Bit depth = The number of different colors available for the entire image – i.e. number of colors in the palette. The fewer bits per pixel, the smaller the file. • 8bit = 256 colors • 6bit = 64 colors • 4bit = 16 colors • 2bit = 4 colors • 1bit = 2 colors Dithering Dithering is a way to fool the eye into thinking there are more colors in the image than are actually there. Dithering works by scattering pixels of different colors over an area so that the eye averages them to a color that’s a combination of the colors used. no dither dithered Non-dithered image (2382 bytes) Dithered image (3598 bytes) These are indexed images that use the same number of colors (8). The second image looks better through the use of dithering which creates the impression of gradients. The disadvantage of dithering is that it does not compress as well in the GIF format. Web image types GIF format A compressed file format for indexed images. It uses run-length encoding, which compresses a series of pixels of the same value (in the horizontal direction) as a single entry (e.g. 30 pixels of red), which saves space over specifying each pixel. This means that large blocks of a single color compress very well. It also means that dithering (which reduces the runs of the same pixels) usually makes the image compress poorly. • Best for – Graphic images with large areas of a single color, images with transparency, images with sharp edges, images with few colors. • Transparency – Defines one color to be transparent • Animations – Format supports multi-frame animations • Interlacing – A way to encode the image so that when a small amount of the image has been downloaded, it can be displayed in rough form. The image becomes progressively more clear until the whole image is downloaded. JPEG format A “lossy” compressed file format for RGB images. Among other things, it eliminates hard edges to achieve compression. The loss of quality in the image is controlled by the quality setting when you save a JPEG image. The lower the number, the worse the quality. • Best for – Photographic images, complex images, images with soft edges • No transparency or animation • Progressive – A format similar to interlacing for GIFs that displays the image with increasing quality as it downloads. The progressive format is not supported by some older browsers. PNG format A relatively new format that combines the best of GIF and JPEG. It supports both Indexed images and RGB images. It also supports a 256 color alpha channel for transparency. Not fully supported by older browsers. About the PNG‑8 format The PNG‑8 format uses 8‑bit color. Like the GIF format, PNG‑8 efficiently compresses areas of solid color while preserving sharp detail like those in line art, logos, or type. Because PNG‑8 is not supported by all browsers, you may want to avoid this format when you are distributing the image to a wide audience. The PNG‑8 format uses more advanced compression schemes than GIF does, and a PNG‑8 file can be 10% to 30% smaller than a GIF file of the same image, depending on the image’s color patterns. Although PNG‑8 compression is lossless, optimizing an original 24‑bit image as an 8‑bit PNG file can subtract colors from the image. Note: With certain images, especially those with simple patterns and few colors, GIF compression can create a smaller file than PNG‑8 compression. View optimized images in GIF and PNG‑8 format to compare file size. As with the GIF format, you can choose the number of colors in an image and control how colors dither in a browser. The PNG‑8 format supports background transparency and background matting, by which you blend the edges of the image with a web page background color. PNG‑8 with 256 colors and no dither (left), and PNG‑8 with 16 colors and dithering (right) About the PNG‑24 formatThe PNG‑24 format supports 24‑bit color. Like the JPEG format, PNG‑24 preserves the subtle variations in brightness and hue found in photographs. Like the GIF and PNG‑8 formats, PNG‑24 preserves sharp details like those in line art, logos, or type. The PNG‑24 format uses the same lossless compression method as the PNG‑8 format. For that reason, PNG‑24 files are usually larger than JPEG files of the same image. You may want to avoid PNG‑24 format when you are distributing your image to a wide audience. In addition to supporting background transparency and background matting, the PNG‑24 format supports multilevel transparency. You can have up to 256 degrees of transparency from opaque to completely transparent, so you can blend the edges of an image smoothly with any background color. However, not all browsers support multilevel transparency. More information about the PNG format can be found here. Image Compression using Photoshop Download and extract compression_test.zip. The primary goal in creating graphics for the web is to maintain high image quality, while creating files that are as small as possible. This is always a compromise, and requires a subjective judgement by the designer. The best approach is to experiment with different image settings to discover a good compromise appropriate for the image and web page. GIFs To make a GIF, do the following to an RGB image in Photoshop: • web settings - gifShow and hide any layers to get the image you need • Determine the color of the web page background that the image will be displayed against • Select FILE>SAVE FOR WEB… • Notice that the image is displayed in its compressed format. And at the bottom left of the screen, the size of the compressed image is shown. Keep track of both of these as you adjust the various settings. Keep in mind that, in general, the total size of a web page including all of its images should be less than 100K. • Select GIF 32 No Dither from the Settings pull down. This will provide a good starting point for your settings. • Select PERCEPTUAL, SELECTIVE, ADAPTIVE, OR WEB for the palette selection method. SELECTIVE is the default and will usually provide good results. Following are Photoshop’s definition of these methods, quoted from Adobe Photoshop Help: Perceptual – Creates a custom color table by giving priority to colors for which the human eye has greater sensitivity. Selective – Creates a color table similar to the Perceptual color table, but favoring broad areas of color and the preservation of Web colors. This color table usually produces images with the greatest color integrity. Selective is the default option. Adaptive – Creates a custom color table by sampling colors from the spectrum appearing most commonly in the image. For example, an image with only the colors green and blue produces a color table made primarily of greens and blues. Most images concentrate colors in particular areas of the spectrum. Web – Uses the standard 216-color color table common to the Windows and Mac OS 8-bit (256-color) palettes. This option ensures that no browser dither is applied to colors when the image is displayed using 8-bit color. (This palette is also called the Web-safe palette.) Using the Web palette can create larger files, and is recommended only when avoiding browser dither is a high priority. • Select NO DITHER. This will produce the smallest files, while the other Dither options may improve the image quality. If Dither is needed, you may want to consider JPEG for the image format. • Select the smallest number of colors that produces an acceptable looking image. You can reduce the color information if necessary by selecting the “color” pull down menu and with the right arrow reducing the color to 16, 8, 4 or perhaps even 2. • If you want the image to display while downloading,select the INTERLACED checkbox. Transparency in GIFs allows you to see through parts of the image to the background of the web page. Photoshop creates transparency in GIFs by using the mask transparency in the Photoshop file. • Create the transparency in your photoshop file, and set your layers so that you can see the checkerboard transparency in the file before you select SAVE FOR WEB • If you have created a mask for transparency, and want the background of the web page to show through the mask area, checkthe TRANSPARENCY box in the SAVE FOR WEB palette on the right side of the screen. • Select a MATTE color. This color selection affects the color of the anti-aliasing fringe used at the boundary between the image and the transparent areas. E.g. if your image will be displayed on a white web page, select white as the MATTE color to make a clean, anti-aliased edge for the image. JPEGs To make a JPEG, do the following to an RGB image in Photoshop: • web settings - jpegShow and hide any layers to get the image you need • Select FILE>SAVE FOR WEB… • Notice that the image is displayed in its compressed format. And at the bottom left of the screen, the size of the compressed image is shown. Keep track of both of these as you adjust the various settings. Keep in mind that the total size of a web page including all of its images should be less than 100K. • Select JPEG Medium from the Settings pull down. This will provide a good starting point for your settings. • Check the OPTIMIZED checkbox. This makes the file size smaller, and is compatible with almost all browsers. • Experiment with the QUALITY setting while checking the Optimized image for JPEG artifacts and looking at the resulting file size. Usually a setting between 40 – 60 works well. Choose the lowest quality setting acceptable so the file is the smallest. • If you want the image to display while downloading, select the PROGRESSIVE checkbox. Transparency is not available in JPEG images. But the MATTE feature described for GIFs can be used in JPEGS. If the photoshop image has transparency, the matte color you choose in SAVE FOR WEB will change the transparent areas of the image to that color. This is useful if you need to put an image against a particular color on a web page. Comments 1. Sara Sultanali November 30th Comment Arrow I found way to change the width and height. The option is in the naming pop up. This will be very helpful. 2. jamie December 1st Comment Arrow Hi Sara, Fantastic! I’m glad you found this option. Add Yours • Author Avatar YOU Comment Arrow About Author jamie Instructor for Graphic Design 65
ESSENTIALAI-STEM
Çanaqçı Çanaqçı or Chanakhchi or Chanakhchy or Chenakhchi may refer to: * Chanakhchi, Armenia * Zangakatun, Armenia * Çanaqçı, Dashkasan, Azerbaijan * Çanaqçı, Gadabay, Azerbaijan * Çanaqçı, Khojali, Azerbaijan
WIKI
Blog Posts for tag: gangrene On March 17th every year, millions of people gather to join in the celebration of Saint Patrick’s Day. St. Patrick is considered the patron saint of Ireland and is credited with bringing Christianity there. March 17th was the day of St. Patrick’s death. For the devoutly religious, church services and a temporary reprieve from Lenten promises is the perfect way to celebrate. For the rest of us, it’s pinching people not wearing green clothing and drinking oddly-colored green beer.  In fact, I only own one green shirt and I keep it solely for the purpose of wearing on St. Patrick’s Day. Although it is an uncommon condition, one type of green you don’t want to be seen wearing is gangrene. Gangrene arises from restricted blood flow, usually to the lower extremities. The skin and underlying tissue are not receiving adequate amounts of oxygen and they slowly begin to necrotize (die). This is a serious and potentially life threatening ailment. Gangrene is generally not something that will “just spring up”. There are risk factors and warning signs and knowing these will help you avoid complications.   WHO IS AT RISK? Gangrene has two primary causes: lack of blood supply and infection. Lack of blood supply can develop from many pre-existing conditions including: diabetes, atherosclerosis (blood vessel disease), vascular disease, Reynaud’s disease, smoking, obesity, injury, immunosuppression, and certain medications. Gangrene resulting from infection usually occurs after a bad injury that isn’t treated properly or from a wound following a medical procedure or as a complication of another injury such as a burn or frostbite.   TYPES OF GANGRENE There are two major types of gangrene and a couple of more rare ones. The most common type is dry gangrene. This type of gangrene takes days or even months to develop and generally stems from a preexisting vascular condition. Signs of dry gangrene vary with severity and location, but generally start with a cool and numb feeling in the affected area. Skin will change from healthy to brown, blue, or black accompanied by evidence of excessive dryness and shrinkage.  Eventually the body will slough off the affected area (meaning the tissue will fall off completely). While fatalities from dry gangrene are rare, it is still important to get treatment immediately because as tissue death progresses, more extreme measures may have to be taken to correct it. It is also not uncommon for dry gangrene areas to become infected and progress to wet gangrene, which is much worse. “Wet (also sometimes termed "moist") gangrene is the most dangerous type of gangrene because if it is left untreated, the patient usually develops sepsis and dies within a few hours or days. Wet gangrene results from an untreated (or inadequately treated) infection in the body where the local blood supply has been reduced or stopped by tissue swelling, gas production in tissue, bacterial toxins, or all of these factors in combination.” (http://www.medicinenet.com/gangrene/article.htm) Early symptoms of wet gangrene start with aching pain and swelling. A foul smelling discharge or pus will appear around ulcerations and the dying tissue takes on a moist, black appearance. Infection can also lead to gas buildup inside the body tissues, so you may feel a crackling under the skin where gas is trapped.   HOW IS GANGRENE DIAGNOSED? If you see any discoloration of the skin accompanied by numbness, get yourself to the doctor right away. If dry gangrene is suspected, your doctor will perform an angiography, which will show them how much blood is flowing in the affected tissues. For wet gangrene, blood cultures are used to determine the type of infection and MRIs are used to show the extent of damaged tissue or spread of gas. Removal (debridement or amputation) of the affected area is often necessary along with antibiotic treatment. Wounds can also be treated with hyperbaric oxygen treatment in conjunction to other methods. HOW DO I AVOID GANGRENE? Avoiding gangrene is generally easy. For diabetics this means maintaining steady glucose levels and checking your feet regularly. This should be a daily activity for those with vascular conditions affecting the feet. If you have any injury to an extremity (such as your toes), especially if it is a burn or cut, get treatment right away. Preventing infection is an important step to preventing gangrene. In short, as I have said many times before, just pay attention to your feet. If you suspect that you have signs of gangrene, contact our doctors immediately to make an appointment. Early diagnosis and treatment is important to reduce complications and speed healing time.
ESSENTIALAI-STEM
[][src]Crate tcp_test Programmatically test TCP programs using real TCP streams. Example Everything can be done using the channel() function: use tcp_test::{channel, read_assert}; use std::io::{Read, Write}; #[test] fn first_test() { let sent = b"Hello, reader"; let (mut reader, mut writer) = channel(); writer.write_all(sent).unwrap(); let mut read = Vec::new(); reader.read_to_end(&mut read).unwrap(); assert_eq!(read, sent); } #[test] fn second_test() { let sent = b"Interesting story"; let (mut reader, mut writer) = channel(); writer.write_all(sent).unwrap(); read_assert!(reader, sent.len(), sent); } #[test] fn third_test() { let sent = b"..."; let (mut reader, mut writer) = channel(); writer.write_all(sent).unwrap(); read_assert!(reader, sent.len(), sent); } Features By default, a panic in one of the internal threads causes all tests to exit, because in most cases the tests will just block indefinitely. The only_panic feature prevents this behaviour if enabled. Macros read_assert Convenience macro for reading and comparing a specific amount of bytes. Functions channel Returns two TCP streams pointing at each other. channel_on Returns two TCP streams pointing at each other.
ESSENTIALAI-STEM
Next: , Previous: , Up: A Complete C++ Example   [Contents][Index] 10.1.6.4 Calc++ Scanner The Flex scanner first includes the driver declaration, then the parser’s to get the set of defined tokens. %{ /* -*- C++ -*- */ # include <cerrno> # include <climits> # include <cstdlib> # include <string> # include "calc++-driver.hh" # include "calc++-parser.hh" // Work around an incompatibility in flex (at least versions // 2.5.31 through 2.5.33): it generates code that does // not conform to C89. See Debian bug 333231 // <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333231>. # undef yywrap # define yywrap() 1 // The location of the current token. static yy::location loc; %} Because there is no #include-like feature we don’t need yywrap, we don’t need unput either, and we parse an actual file, this is not an interactive session with the user. Finally, we enable scanner tracing. %option noyywrap nounput batch debug noinput Abbreviations allow for more readable rules. id [a-zA-Z][a-zA-Z_0-9]* int [0-9]+ blank [ \t] The following paragraph suffices to track locations accurately. Each time yylex is invoked, the begin position is moved onto the end position. Then when a pattern is matched, its width is added to the end column. When matching ends of lines, the end cursor is adjusted, and each time blanks are matched, the begin cursor is moved onto the end cursor to effectively ignore the blanks preceding tokens. Comments would be treated equally. %{ // Code run each time a pattern is matched. # define YY_USER_ACTION loc.columns (yyleng); %} %% %{ // Code run each time yylex is called. loc.step (); %} {blank}+ loc.step (); [\n]+ loc.lines (yyleng); loc.step (); The rules are simple. The driver is used to report errors. "-" return yy::calcxx_parser::make_MINUS(loc); "+" return yy::calcxx_parser::make_PLUS(loc); "*" return yy::calcxx_parser::make_STAR(loc); "/" return yy::calcxx_parser::make_SLASH(loc); "(" return yy::calcxx_parser::make_LPAREN(loc); ")" return yy::calcxx_parser::make_RPAREN(loc); ":=" return yy::calcxx_parser::make_ASSIGN(loc); {int} { errno = 0; long n = strtol (yytext, NULL, 10); if (! (INT_MIN <= n && n <= INT_MAX && errno != ERANGE)) driver.error (loc, "integer is out of range"); return yy::calcxx_parser::make_NUMBER(n, loc); } {id} return yy::calcxx_parser::make_IDENTIFIER(yytext, loc); . driver.error (loc, "invalid character"); <<EOF>> return yy::calcxx_parser::make_END(loc); %% Finally, because the scanner-related driver’s member-functions depend on the scanner’s data, it is simpler to implement them in this file. void calcxx_driver::scan_begin () { yy_flex_debug = trace_scanning; if (file.empty () || file == "-") yyin = stdin; else if (!(yyin = fopen (file.c_str (), "r"))) { error ("cannot open " + file + ": " + strerror(errno)); exit (EXIT_FAILURE); } } void calcxx_driver::scan_end () { fclose (yyin); } Next: , Previous: , Up: A Complete C++ Example   [Contents][Index]
ESSENTIALAI-STEM
Animal Bites Parent's Corner   1. We have several dogs at home and they have been vaccinated by the veterinarian. Can they still transmit the rabies virus? How can I protect my family? ANSWER: There have been reports of vaccinated dogs coming down with rabies. That is why their vaccination should be updated every year to ensure protection. Families with pet dogs should be given rabies vaccine even before they are bitten. This is called pre-exposure prophylaxis and is especially recommended for children who may be unaware of the dangers of an animal bite. 2. My daughter was walking home from school when she was bitten by my neighbor’s dog, what should I do? ANSWER: The first aid for bites is washing the wound with soap and water for at least 10 minutes, and then applying an antiseptic like povidone iodine or alcohol. Bringing your daughter to the doctor is a must for evaluation and rabies post-exposure vaccination. 3. What is the difference between pre-exposure and post-exposure rabies vaccinations? ANSWER: Pre-exposure prophylaxis is rabies vaccination given BEFORE a bite/exposure. It is given to high risk individuals such as staff in rabies laboratories or hospitals handling rabies patients, veterinarians, animal handlers and field workers. The Rabies Act of 2007 mandates rabies immunization for children aged 5-14 years living in highly endemic areas. It consists of 3 doses given on days 0, 7 and 21 or 28. Post-exposure prophylaxis is rabies vaccination given AFTER a bite/exposure. It includes wound care and administration of rabies vaccine with or without rabies immunoglobulin, depending on the severity/category of the exposure. Depending on the vaccine regimen, it can be given as 5 intramuscular doses (days 0, 3, 7, 14 and 28) OR as 8 intradermal doses (2 doses of 0.1 ml each intradermally on both deltoids on days 0, 3, 7 and 28 or 30). The doses beyond day 10 may be discontinued if the dog is still alive after 10-14 days. 4. Why does protection against rabies require many shots? Isn’t there a single dose vaccine that is completely protective? ANSWER: Unfortunately, there is no single shot rabies vaccine that will offer sufficient protection. The multiple doses are needed in order to induce antibody development as early as possible in a patient who has been bitten. And since this is a 100% fatal disease, it is a must that protective antibody levels be developed. However, studies evaluating the efficacy of reduced number of doses are underway. 5. While my daughter was playing with a stray cat, she was scratched on the face. What should I do? ANSWER: Bites and scratches by an animal’s paw can transmit rabies. The same is true for licks on open wounds and on mucous membranes such as the eyes, mouth and genitals. Exposures on the head, face and neck are especially dangerous. Washing of the wound with soap and water for 10 minutes followed by application of an antiseptic are important first aid measures. She should also undergo rabies vaccination. 6. My 2-month old baby woke up with a wound on her left big toe. I suspected it was a rat bite. Should I be worried? Does she need any vaccine? ANSWER: Rabies vaccination is not routinely given for rat bites since rats, mice, hamsters, guinea pigs and other members of the rodent family are not significant carriers of rabies. However, all animal bites are tetanus-prone. Your daughter should receive tetanus immunization (in the form of DPT). Washing of the wound with soap and water is recommended. 7. What animals are able to transmit the rabies virus? ANSWER: All mammals can theoretically transmit the rabies virus. However, the domestic dog is responsible for more than 98% of all human rabies cases. Rabies post-exposure prophylaxis is also required for bites of cats, other domestic animals (cows, pigs, horses, goats, etc.), bats and monkeys. 8. My son, who was bitten by a dog last year, had completed the full course of anti-rabies vaccine. He was bitten again a few days ago. Should he be given another course of vaccination or will the previous vaccination suffice? ANSWER: Even though your son has been previously vaccinated, he will still need rabies vaccine. However, since the previous vaccination has been completed, he will require only 2 booster doses, one on the day he was bitten, and another one 3 days later. 9. My 2-year old boy loves to bite his playmates. Should his playmates receive any vaccine? ANSWER: Unless he is infected by the rabies virus, your son cannot transmit rabies. Thus, his playmates do not need any rabies vaccine. In addition to local wound care and, though tetanus is a remote possibility, the vaccination history of the playmates in terms of tetanus-containing vaccines should be elicited from their parents.
ESSENTIALAI-STEM
--- title: The `signer` Module --- ## JSON-RPC methods - [signer_confirmRequest](#signer_confirmrequest) - [signer_confirmRequestRaw](#signer_confirmrequestraw) - [signer_confirmRequestWithToken](#signer_confirmrequestwithtoken) - [signer_generateAuthorizationToken](#signer_generateauthorizationtoken) - [signer_generateWebProxyAccessToken](#signer_generatewebproxyaccesstoken) - [signer_rejectRequest](#signer_rejectrequest) - [signer_requestsToConfirm](#signer_requeststoconfirm) - [signer_subscribePending](#signer_subscribepending) - [signer_unsubscribePending](#signer_unsubscribepending) ## JSON-RPC API Reference ### signer_confirmRequest Confirm a request in the signer queue #### Parameters 0. `Quantity` - The request id. 0. `Object` - Modify the transaction before confirmation. - `gasPrice`: `Quantity` - (optional) Modify the gas price provided by the sender in Wei. - `gas`: `Quantity` - (optional) Gas provided by the sender in Wei. - `condition`: `Object` - (optional) Condition for scheduled transaction. Can be either an integer block number `{ block: 1 }` or UTC timestamp (in seconds) `{ timestamp: 1491290692 }`. 0. `String` - The account password ```js params: [ "0x1", // 1 {}, "hunter2" ] ``` #### Returns - `Object` - The status of the confirmation, depending on the request type. #### Example Request ```bash curl --data '{"method":"signer_confirmRequest","params":["0x1",{},"hunter2"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": {} } ``` *** ### signer_confirmRequestRaw Confirm a request in the signer queue providing signed request. #### Parameters 0. `Quantity` - Integer - The request id 0. `Data` - Signed request (RLP encoded transaction) ```js params: [ "0x1", // 1 "0xd46e8dd67c5d32be8d46e8dd67c5d32be8058bb8eb970870f072445675058bb8eb970870f072445675" ] ``` #### Returns - `Object` - The status of the confirmation, depending on the request type. #### Example Request ```bash curl --data '{"method":"signer_confirmRequestRaw","params":["0x1","0xd46e8dd67c5d32be8d46e8dd67c5d32be8058bb8eb970870f072445675058bb8eb970870f072445675"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": {} } ``` *** ### signer_confirmRequestWithToken Confirm specific request with rolling token. #### Parameters 0. `Quantity` - The request id. 0. `Object` - Modify the transaction before confirmation. - `gasPrice`: `Quantity` - (optional) Modify the gas price provided by the sender in Wei. - `gas`: `Quantity` - (optional) Gas provided by the sender in Wei. - `condition`: `Object` - (optional) Conditional submission of the transaction. Can be either an integer block number `{ block: 1 }` or UTC timestamp (in seconds) `{ time: 1491290692 }` or `null`. 0. `String` - Password (initially) or a token returned by the previous call. ```js params: [ "0x1", // 1 {}, "hunter2" ] ``` #### Returns - `Object` - Status. - `result`: `Object` - The status of the confirmation, depending on the request type. - `token`: `String` - Token used to authenticate the next request. #### Example Request ```bash curl --data '{"method":"signer_confirmRequestWithToken","params":["0x1",{},"hunter2"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": { "result": { ... }, "token": "cAF2w5LE7XUZ3v3N" } } ``` *** ### signer_generateAuthorizationToken Generates a new authorization token. #### Parameters None #### Returns - `String` - The new authorization token. #### Example Request ```bash curl --data '{"method":"signer_generateAuthorizationToken","params":[],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": "bNGY-iIPB-j7zK-RSYZ" } ``` *** ### signer_generateWebProxyAccessToken Generates a new web proxy access token. #### Parameters 0. `String` - Domain for which the token is valid. Only requests to this domain will be allowed. ```js params: ["https://parity.io"] ``` #### Returns - `String` - The new web proxy access token. #### Example Request ```bash curl --data '{"method":"signer_generateWebProxyAccessToken","params":["https://parity.io"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": "MOWm0tEJjwthDiTU" } ``` *** ### signer_rejectRequest Rejects a request in the signer queue #### Parameters 0. `Quantity` - Integer - The request id ```js params: [ "0x1" // 1 ] ``` #### Returns - `Boolean` - The status of the rejection #### Example Request ```bash curl --data '{"method":"signer_rejectRequest","params":["0x1"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": true } ``` *** ### signer_requestsToConfirm Returns a list of the transactions awaiting authorization. #### Parameters None #### Returns - `Array` - A list of the outstanding transactions. #### Example Request ```bash curl --data '{"method":"signer_requestsToConfirm","params":[],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": [ ... ] } ``` *** ### signer_subscribePending Starts a subscription for transactions in the confirmation queue. Each event contains all transactions currently in the queue. An example notification received by subscribing to this event: ``` {"jsonrpc":"2.0","method":"signer_pending","params":{"subscription":"0x416d77337e24399d","result":[]}} ``` You can unsubscribe using `signer_unsubscribePending` RPC method. Subscriptions are also tied to a transport connection, disconnecting causes all subscriptions to be canceled. #### Parameters None #### Returns - `String` - Assigned subscription ID #### Example Request ```bash curl --data '{"method":"signer_subscribePending","params":[],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": "0x416d77337e24399d" } ``` *** ### signer_unsubscribePending Unsubscribes from pending transactions subscription. #### Parameters 0. `String` - Subscription ID ```js params: ["0x416d77337e24399d"] ``` #### Returns - `Boolean` - whether the call was successful #### Example Request ```bash curl --data '{"method":"signer_unsubscribePending","params":["0x416d77337e24399d"],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST localhost:8545 ``` Response ```js { "id": 1, "jsonrpc": "2.0", "result": true } ```
ESSENTIALAI-STEM
This post was written by Conway Hall Library & Archives volunteer, Paula Przybylowicz, who has been researching the pacifist ethics of our namesake Moncure Conway. Throughout his life, Moncure Conway’s moral convictions evolved to become not only ethical values but also deeds that encouraged social change. In this sense, his life perfectly incarnated the Shakespearean motto that heads the main hall of the institution he gave his name to—Conway Hall—: “To thine own self be true”. In fact, Conway considered self-truthfulness to be “the most complex of ethical problems”. He was raised in Virginia, yet he was against slavery. He was a Unitarian minister sceptic about the miraculous nature of Jesus and referred to himself as a “pre-Darwinite evolutionist”. He thought that women should be given “freedom and occupation” and that their salaries were unjust compared to men’s. But one thing Conway felt was most worth fighting for was peace. Conway already had “extreme peace principles” in his youth. In 1852, he wrote a plea for peace inspired by Thomas Carlyle’s French Revolution. Back then, he had not exposed his position as an abolitionist publicly. Still, very soon, this issue and his opposition to war acquired more relevance as the beginning of the American Civil War approached. Conway’s pacifism meant he rejected any project of abolition by violent means. After a period as a Methodist circuit rider, Conway moved to Washington, where he was a minister of the Unitarian Church. During that period, between 1855 and 1856, Conway’s discourse became more political. On January 26th of 1856, he delivered The One Path; or, the Duties of North and South, a strongly political sermon which was also printed and distributed as a pamphlet. In it, Conway appealed to conscience, to mutual concession not for political advantage but as a moral necessity. If North and South were firm in their position on slavery, Conway claimed, they should not continue to be united. Although he rejected slavery, thus sharing the North’s aim in this sense, he believed that separation of both sides was the only way to avoid perpetual discord. At the start of the Civil War, Conway joined President Lincoln to discuss anti-slavery and war, having gained recognition as a key abolitionist. He recognised Lincoln’s qualities, yet he considered that the president had full individual responsibility for the blood of the conflict. A year after his arrival at the capital, Conway’s preaching about slavery as a moral issue had led to his dismissal and he moved to Cincinnati, Ohio. It was not the last time that he lost public support because of his values. In 1863, Conway’s efforts as a campaigner led to the abolitionist leaders sending him to London to represent their interests in England. Once again, his moral commitment translated into a wrong move for his career. While in London, Conway sent a letter to the Confederate representative James Murray Manson “on behalf of the leading antislavery men of America”. He offered to preserve the Confederacy after the war if the South accepted the emancipation of the slaves. Manson, of course, rejected the proposal. Both men’s correspondence was exposed in the press, and a condemning public response followed. As a consequence, Conway lost the abolitionists’ support, and his influential position in the American anti-slavery movement was substantially damaged. From then onwards, Conway continued to professionally and intellectually develop in Europe, where he spent most of his adult life.
FINEWEB-EDU
Choking Victim Choking Victim was an American punk band formed in New York City, which lasted from 1992 to 1998. They played a mix of hardcore punk and ska (sometimes known as ska-core). Following the breakup of the band, which occurred the same day as the recording of their only studio album No Gods, No Managers, members went on to form Leftöver Crack and INDK, among others. Background The band became well-known at the C-Squat in the Lower East Side of Manhattan for their innovative music and politically charged lyrics. They also became infamous for their Satanic imagery and references to the vagrant lifestyle, including smoking both crack cocaine and marijuana, shoplifting, and squatting. The band prides itself on its atheism, and makes frequent references to Satan. On the album No Gods, No Managers, they use excerpts from the lectures of political scientist Michael Parenti. Breakup Choking Victim broke up after the first day of recording for their first full-length LP, No Gods, No Managers, but the recordings from that one day were enough to make a full album. After they broke up, Stza formed the band Leftöver Crack, and Skwert and Ezra formed INDK. Ezra joined Leftover Crack in 2001. Skwert is currently the front man for the NJ based ska punk band Public Serpents. Sascha has spent the last several years organically farming in upstate NY, and is a founding member of Icarus Project, a radical mental health network. Reunions On November 11, 2000, Choking Victim reunited to play a show in Tompkins Square Park with the lineup from their album, substituting former bassist Alec for Shayne. Later, in late 2005, Choking Victim reunited a second time, performing four shows. On June 11, 2006, they played a show at the Lower East Side's Tompkins Square Park, which featured various political speakers, including members of the Mislead Youth Project. At the end of July 2006, they toured the Dominican Republic, before Leftöver Crack embarked on their European Tour. In the Summer of 2012, lead singer Stza enlisted the help of Irish Ska/Punk band Chewing on Tinfoil and formed "The Choking Victim Show". This band, playing the songs of Choking Victim, toured throughout the UK, Ireland and France. Choking Victim has continued to play sporadic concerts worldwide between 2014 and 2017. Prior to 2017 these were one-off events, but, in 2017, they undertook their first tour in over a decade. Legacy In addition to Leftöver Crack and INDK, Choking Victim also spawned Public Serpents, Morning Glory and the Crack Rock Steady 7. Choking Victim have reformed for a few dates in the UK and Europe as The Choking Victim Show with Stza, Sascha, Alec and Ezra. Members * Scott "Stza" Sturgeon – vocals, guitar (1992–1999, 2000, 2005–2006, 2016–) * Sascha "Scatter" DuBrul – bass (1992–1994, 2005–2006) * John Dolan – drums (1992–1993, 2005–2006) * Skwert – drums (1993–1999, 2000, 2016–) * Alec Baillie – bass (1995–1996, 1996, 2000, 2016–2020; died 2020) * Shayne Webb – bass (1996, 1996–1999) * Ezra Kire – guitar (1998–1999, 2000) Albums * No Gods, No Managers (1999) EPs * Crack Rock Steady EP (1994) 2x1000 pressed * Squatta's Paradise (1996) 2x1000 pressed * Victim Comes Alive (1998) 1000 pressed Demos * Crack Rock Steady Demo (2000) Compilation albums * Crack Rock Steady EP/Squatta's Paradise Split CD (2000) * Songs in the Key of Lice – A Tribute to Choking Victim (2002) (various artists) * A Tribute to Choking Victim (2008) (various artists) * Load Yer Pipes: A Folk-Punk Tribute to Choking Victim (2015) (various artists) Live albums * Christmas with the Victim (2005) * Live 9/11 2005 (2005) Compilation appearances * Wicked City Soundtrack – 1998, Velvel Records ("Fuck America") * Give 'Em the Boot – 1997, Hellcat Records ("Infested") * Give 'Em the Boot II – 1999, Hellcat Records ("Crack Rock Steady") * Ska Sucks – 1998, Liberation Records ("Suicide (a better way)") * Smash Ignorance Up – 1998, Possible Problem Records ("Money") * Skanarchy III – 1997, Elevator Records ("Born to Die") * Picklemania NYC – 1995, Riot Records ("500 Channels") * Finding a Voice: A Benefit for Humans – 1999 Repetitively Futile Records ("Sweet Dreams")
WIKI
Wikipedia:Featured portal candidates/Portal:Buddhism * The following is an archived discussion of a featured portal candidate. Please do not modify it. Subsequent comments should be made on the portal's talk page or in Wikipedia talk:Featured portal candidates. No further edits should be made to this page. The portal was promoted by OhanaUnited 18:38, 5 April 2009. Portal:Buddhism Self-nomination. See archived peer review. Stats: 10 selected articles, all WP:FA or WP:GA, 11 selected biographies, all B-class or higher, 20 selected pictures, all free-use images, 20 sets of 3 DYKs, all had appeared previously at T:DYK, 20 selected quotes, all with free-use images. News updates with, and a Rotating In this month section. Things you can do has a link to a cleanup listing from, and articles with notability concerns from WP:WPNN. I believe the portal meets the standards for Featured Portal status. Cirt (talk) 01:26, 18 February 2009 (UTC) * Support: Looks good to me. Den dodge Talk Contribs 18:53, 22 February 2009 (UTC) * Support -- looks great, meets WP:WIAFPo.-- TRU CO 02:11, 27 February 2009 (UTC) * Support great work again Cirt. feydey (talk) 22:11, 1 March 2009 (UTC) * Support although disclosing I wrote some of the article content used in the portal. YellowMonkey ( click here to vote for world cycling's #1 model! ) 03:58, 5 March 2009 (UTC) * I do think that some of the selected material should be culled as they are not really about Buddhism, but just some celebrities + Lisa Simpson the cartoon who happen to be Buddhist, but which is not a large part of their notability. YellowMonkey ( click here to vote for world cycling's #1 model! ) 04:06, 5 March 2009 (UTC) * Comment: I removed Lisa Simpson from rotation at Portal:Buddhism/Selected article, and swapped in Double Seven Day scuffle instead (an FA quality article). Cirt (talk) 04:20, 5 March 2009 (UTC) * Heaps good. YellowMonkey ( click here to vote for world cycling's #1 model! ) 04:22, 5 March 2009 (UTC) * Okay great, thanks. Cirt (talk) 16:38, 5 March 2009 (UTC) * Support Great portal, definitely deserves the star! ☺ Spiby ☻ 07:52, 20 March 2009 (UTC)
WIKI
Pesa 730M The Pesa 730M is a 3-unit diesel multiple unit predestined to be used on a wide track that is manufactured in Poland, but actively used in Lithuania and Belarus. Lithuanian Railways using Pesa 730ML trains in Vilnius–Klaipėda Railway services.
WIKI
Page:Terminations (New York, Harper and Brothers, 1895).djvu/193 Rh reckoning of favor or neglect, betrayed no symptom of regret or speculation. Yet toward the last he gave a sign of having noticed that for two days Dr. Hugh had not been in his room, a sign that consisted of his suddenly opening his eyes to ask of him if he had spent the interval with the countess. "The countess is dead," said Dr. Hugh. "I knew that in a particular contingency she wouldn't resist. I went to her grave." Dencombe's eyes opened wider. "She left you 'something handsome'?" The young man gave a laugh almost too light for a chamber of woe. "Never a penny! She roundly cursed me." "Cursed you?" Dencombe murmured. "For giving her up. I gave her up for you. I had to choose," his companion explained. "You chose to let a fortune go?" "I chose to accept, whatever they might be, the consequences of my infatuation," smiled Dr. Hugh. Then, as a larger pleasantry: "A fortune be hanged! It's your own fault if I can't get your things out of my head." The immediate tribute to his humor was a long, bewildered moan; after which, for many hours, many days, Dencombe lay motionless and absent. A response so absolute, such a glimpse of a definite result, and such a sense of credit worked together in his mind and producing a strange commotion, slowly altered and transfigured his despair. The
WIKI
Talk:Batu Pahat "Towns" section This is really a city article about Batu Pahat, not an article about the entire district. Therefore, I've moved the "Towns" section here: Towns * Bandar Penggaram (capital) * Rengit * Yong Peng * Semerah * Parit Sulong * Sri Gading * Parit Raja * Ayer Hitam * Senggarang * Tongkang Pechah * Sri Medan * Parit Yaani * Bukit Pasir If we ever decide to have an article about every daerah in Johor, we can revisit this. Ikan Kekek (talk) 09:04, 14 February 2018 (UTC) Suspect typo from Correct typos in one click pedas->pedals? (omit) context: with their delicious blend of kicap pedas pedas (spicy soy sauce
WIKI
DOMS: Delayed Onset Muscle Soreness Have you ever been to the gym, tried an exercise that seemed absolutely fine at the time but the next day you could barely roll out of bed? This pain is not just confined to people who don’t exercise regularly but can also be experienced by athletes when they increase the demands upon their own body. It is called Delayed Onset Muscle Soreness (DOMS) and usually starts about 12 hours after the offending activity has been completed and can last for up to 72 hours or more! Ouch! Photo by Victor Frietas So, what is DOMS? An Overview Well, science isn’t exactly sure. There are six possible theories for DOMS: lactic acid, muscle spasm, connective tissue damage, muscle damage, inflammation and the enzyme efflux theories (Cheung, Hume and Maxwell, 2003). Originally it was thought to be due to inflammation as a result of muscle tears caused by eccentric exercise. It now looks as if inflammation does play a role, muscles not as much as first thought but nerves and fascia may also be key players in DOMS (or muscular hyperalgesia). Cheung, Hume and Maxwell (2003) believe that DOMS is aprobably a combination of at least two theories (but we still don’t know which two!). Each muscle fibre is covered in fascia and innervated by a nerve with many nerve endings. It is not difficult to imagine a scenario where during an exercise, there is some sort of damage to a nerve ending. In reaction to the injury, inflammatory markers are released to enable blood vessels to dilate and a host of other substances can quickly get to the injured site to enable repair.  For example, when the nerve is damaged, it produces Nerve Growth Factor (NGF) that ultimately helps nerves to recover and grow (neurogenesis) The nerve and muscle relationship: it is easy to imagine how a tear in the muscle fibre could elicit a nerve ending response As time progresses, the inflammation continues and the amount of additional fluid that has arrived at the injured site is more than can be taken away and so it seeps around cells to create swelling (oedema). Oedema pervades neighbouring tissues and oozes out of gaps in the vascular structures of the tissue and as it gets moved and compressed between different structures and fascial layers. Could it be that this oedema spreads NGF, causing widespread pain. When we experience DOMS we are temporarily weaker, our range of movement decreases and it is painful. But why would the body produce a response that inhibited our strength and movement albeit for a short time? Well, in our muscles there are various types of receptors, including a type called mechanoreceptors. These receptors respond to mechanical pressure or distortion. There is evidence that NGF helps to improve the threshold that these mechanoreceptors work: effectively increasing the resilience of these receptors. We also know that as we repeat an exercise over time, we get better at it and can increase the intensity of the workout. Thus, making those muscles stronger by making changes to adapt to the intensity of the exercise. This would make sense in evolutionary terms. It would also help to explain why we get used to performing a particular exercise and experience discomfort when we try something new! Leave a Reply
ESSENTIALAI-STEM
Sunrise problem The sunrise problem can be expressed as follows: "What is the probability that the sun will rise tomorrow?" The sunrise problem illustrates the difficulty of using probability theory when evaluating the plausibility of statements or beliefs. According to the Bayesian interpretation of probability, probability theory can be used to evaluate the plausibility of the statement, "The sun will rise tomorrow." The sunrise problem was first introduced publicly in 1763 by Richard Price in his famous coverage of Thomas Bayes' foundational work in Bayesianism. Laplace's approach Pierre-Simon Laplace, who treated it by means of his rule of succession. Let p be the long-run frequency of sunrises, i.e., the sun rises on 100 &times; p% of days. Prior to knowing of any sunrises, one is completely ignorant of the value of p. Laplace represented this prior ignorance by means of a uniform probability distribution on p. For instance, the probability that p is between 20% and 50% is just 30%. This must not be interpreted to mean that in 30% of all cases, p is between 20% and 50%. Rather, it means that one's state of knowledge (or ignorance) justifies one in being 30% sure that the sun rises between 20% of the time and 50% of the time. Given the value of p, and no other information relevant to the question of whether the sun will rise tomorrow, the probability that the sun will rise tomorrow is p. But we are not "given the value of p". What we are given is the observed data: the sun has risen every day on record. Laplace inferred the number of days by saying that the universe was created about 6000 years ago, based on a young-earth creationist reading of the Bible. To find the conditional probability distribution of p given the data, one uses Bayes' theorem, which some call the Bayes–Laplace rule. Having found the conditional probability distribution of p given the data, one may then calculate the conditional probability, given the data, that the sun will rise tomorrow. That conditional probability is given by the rule of succession. The plausibility that the sun will rise tomorrow increases with the number of days on which the sun has risen so far. Specifically, assuming p has an a-priori distribution that is uniform over the interval [0,1], and that, given the value of p, the sun independently rises each day with probability p, the desired conditional probability is: * $$ \Pr(\text{Sun rises tomorrow} \mid \text{It has risen } k \text{ times previously}) = \frac{\int_0^1 p^{k+1}\,dp}{\int_0^1 p^k \,dp}= \frac{k+1}{k+2}.$$ By this formula, if one has observed the sun rising 10000 times previously, the probability it rises the next day is $$ 10001/10002 \approx 0.99990002$$. Expressed as a percentage, this is approximately a $$ 99.990002 \%$$ chance. However, Laplace recognized this to be a misapplication of the rule of succession through not taking into account all the prior information available immediately after deriving the result: But this number [the probability of the sun coming up tomorrow] is far greater for him who, seeing in the totality of phenomena the principle regulating the days and seasons, realizes that nothing at present moment can arrest the course of it. E.T. Jaynes noted that Laplace's warning had gone unheeded by workers in the field. A reference class problem arises: the plausibility inferred will depend on whether we take the past experience of one person, of humanity, or of the earth. A consequence is that each referent would hold different plausibility of the statement. In Bayesianism, any probability is a conditional probability given what one knows. That varies from one person to another.
WIKI
Parse User Agents with Microsoft Excel An easy way to decode user agents! If you have a list of user agents in a spreadsheet or a text file and want to parse user agents in Excel but don't have the resources or need to build a whole system integration, then don't worry! You can simply use our free Microsoft Excel spreadsheet for all your parsing needs. It even works on our Free/Basic plans, so there is zero cost involved. If you have thousands (or millions!) of user agents the cost is minimal. Simply paste in your user agents and hit the "Parse" button to send them to our API... Easy and quick to use Simply download the free spreadsheet and open it, make sure Macros are enabled, paste your list of user agents in the "User Agents" sheet, paste your API Key in and hit the big "Parse" button and you're away! Once you have an API key, paste it into the API Key field and hit "Start Parsing User Agents" Contains all the technical information from the API It's a breeze to get the hardware types (phones, tables, computers, servers, TVs) and software types (browsers, bots etc), version numbers and so on; and if you're on a paid API plan with us you'll get version checking data so you know if they're up to date as well! Completely free to modify and keep Our sample spreadsheet is straightforward and purpose built so that you can simply paste in a list of user agents and press the "Parse" button for instant results, and if you want to modify your existing spreadsheet you are welcome and encouraged to take a look at our VBA macro that talks to the API. You can take any and all of it and put it into your system however you need. Download now WhatIsMyBrowser.com API - User Agent Parser Integration - v1.1.xlsm Our spreadsheet comes with a few sample user agents in it. When you're ready, delete them and paste in your own list. To get your free API Key, sign up for a free API account with us, then you can start using the spreadsheet. Troubleshooting If the "Start Parsing User Agents" button doesn't do anything (no alert confirmation windows appear etc), then you probably don't have macros enabled for this sheet. Close the spreadsheet and reopen it and you should see a "Security Warning" prompt... To enable the macros in this spreadsheet, click the Options... button and choose "Enable this content". This will allow the code in the spreadsheet to run and send the requests to our API. Remember; you should only do this for spreadsheets that you trust! Don't do this for random files you find on the internet! You are encouraged to view the source code for our sample spreadsheet to confirm that it behaves the way you expect. We have taken a lot of care to make sure that this spreadsheet behaves! Now you should be able to run the code in the spreadsheet and have the buttons perform the desired actions. Get in touch If you have any trouble with getting the Excel spreadsheet to work, just let us know - we're always happy to lend a hand. We we love hearing success stories too! Let us know how you go. Get started The API is free to use and easy to set up, so why not get started right now. Do you have a question? Get in touch! We'd love to help you.
ESSENTIALAI-STEM
Does ZMA really work? Rich JacobsArticles, Research, SupplementsLeave a Comment   ZMA (Zinc Monomethionine Aspartate) is a hot topic for debate. Many love to discuss whether it has a positive effect on both muscle growth and testosterone production.  There have been studies with results proving both sides of the debate, so who is right? Let’s break it down and you can be the judge.  We will start with Zinc. Zinc Zinc is a product of the citric acid cycle. It is found in all cells of the body.  It has a direct effect on both cell growth and repair. It’s also needed in over 80 enzymes and hormone functions, including reproductive hormones like testosterone. Aspartate The aspartic properties used in ZMA are used for better absorption into the cells. They also have a positive influence on cell retention and oxygen efficiency. Zinc levels have a direct correlation to testosterone levels.  Meaning, if there is a zinc deficiency, testosterone is probably also low.  Zinc is an inhibitor of the aromatase enzyme which prevents the increase of estrogen.  Increases in estrogen could cause a decrease in testosterone. This interferes with the muscle building process. Magnesium This mineral has several important functions in the body such as contraction and relaxation of muscles, production of protein, and transport of energy.  Magnesium deficiencies are rare if you eat a high level of dark vegetables, nuts, and fruit. However, many of us fail at this diet.  As evident by our growing obesity and disease rate, most people do not eat a healthy diet and we cannot always depend on our food to contain all the nutrients we need. (See Do We Need Supplements?) A lack of magnesium in the body causes confusion, fatigue, insomnia, muscle twitching, and also irritability.  Obviously, this can get in the way of training. A Note on B6 Like all B vitamins, B6 is a vitamin that helps to convert carbohydrates into glucose.  B6 specifically helps the body make neurotransmitters and is needed for both brain development and function.  Other uses are the production of the hormones serotonin, norepinephrine and melatonin.  These hormones are responsible for both mood regulation and sleep regulation.   If we look at ZMA as a whole, it is a supplement that may increase testosterone production through zinc (especially if levels are low), keep alertness levels higher and help to regulate sleep.  Most people will take ZMA to increase productivity at the gym, decrease body fat and also increase muscle mass.  Knowing that most of the population does not eat correctly and sleep long or deep enough, I would say that ZMA would have a positive effect for most people.  In order to increase testosterone levels and lose body fat, you must sleep.  Since ZMA may have a positive effect on sleep patterns and hormone regulation, it appears to be advantageous to use ZMA as a supplement to increase testosterone and decrease body fat.   References: University of Maryland Medical Center L.R. BRILLA1 AND VICTOR CONTE.  Effects of a Novel Zinc Magnesium Formulation on Hormones and Strength. Exercise and Sports Science Laboratory, Western Washington University, Bellingham, WA 98225-9067 See also: J Nutr, 1996 Apr, 126(4):842-8, “Dietary zinc deficiency alters 5 alpha-reduction and aromatization of testosterone and androgen and estrogen receptors in rat liver” Neuropharmacology, 2009, 56:531–540, “Zinc regulates the dopamine transporter in a membrane potential and chloride-dependent manner” National Institutes of Health: Effects of Zinc Magnesium Aspartate (ZMA) Supplementation on Training Adaptations and markers of Anabolism and Catabolism. J Int Soc Sports Nutr. 2004; 1(2): 12–20. Published online 2004 December 31. Copyright: maxxyustas / 123RF Stock Photo Leave a Reply Your email address will not be published. Required fields are marked * This site uses Akismet to reduce spam. Learn how your comment data is processed.
ESSENTIALAI-STEM
Bashir Makhtal Bashir Ahmed Makhtal (Bashiir Axmed Makhtal; born 1977) is a Canadian citizen formerly held in an Ethiopian prison, where he was accused of terrorism and faced the death penalty. The Canadian government was criticized by several groups for its initial inaction on demanding Makhal's release, including Amnesty International. Biography Makhtal was born in Ethiopia to Somali parents, who had fled war-torn Somalia in 1972. His grandfather was a founder of the rebel group Ogaden National Liberation Front (ONLF), which is classified as a terrorist organization by Ethiopia. In 1991, Bashir immigrated to Toronto, Canada, where he studied computer science at the DeVry Institute of Technology, later completing his bachelor's degree in Texas. In 1994 he was granted Canadian citizenship, and was employed as a computer programmer by the Bank of Montreal and CIBC. In 2002, Makhtal travelled to the United Arab Emirates, from which he travelled to Djibouti, Kenya, Eritrea, and Somalia, selling clothing to support himself. In 2006, after Ethiopia's militarily intervention in Somalia, Canadian Foreign Affairs advised Canadians in Somalia to flee the impending conflict. Makhtal flew to neighboring Kenya, but was arrested during the flight. After spending three weeks in Nairobi jail, Makhtal was extraordinarily renditioned to the Ethiopian-backed government in Somalia, which extradited him to Ethiopia. Makhtal was accused of being a member of the ONLF based on the prior membership of his grandfather, as well as collaborating with the Somali terrorist group al-Shabab. The Ethiopian government denied Makhtal representation in court by his Canadian lawyer, saying that Makhtal was already being represented by an Ethiopian lawyer. The Ethiopian court found Makhtal guilty of being a member of the ONLF and working with the Eritrean government to organize the financing, recruiting, and training of ONLF militants. Several reports claimed that Makhtal was tortured by interrogators while in prison, though the Ethiopian government denied this. In June 2007 he was able to have a letter delivered to his family. Throughout Makhtal's imprisonment, many people in Canada, including Makhal's family, called for his release. Makhtal's wife, Aziza Osman, campaigned for both his release and that of her uncle, who faced a similar renditioning. In August 2009, Makhtal's Canadian lawyer announced that he would sue the Canadian government to force it to halt aid to Ethiopia unless Makhtal was released. In December 2009, after the Ethiopian Supreme Court rejected Makhtal's appeal, his relatives in Canada asked Canadian Prime Minister Stephen Harper to directly intervene in the case. On April 18, 2018, Makhtal was released from prison, and returned to Canada on April 21. Canada At the time of Maktal's imprisonment, the ruling Conservative Party was accused by the NDP and the Liberal party of not aiding non-white Canadians imprisoned in foreign countries. After being assured of Maktal's well-being in March 2008, the Canadian government sent Deepak Obhrai, Parliamentary Secretary to the Minister of Foreign Affairs, to Ethiopia in June to inquire about Maktal's situation. In February 2009, the Canadian government announced that it would seek Makhtal's release. Ethiopia Responding to accusations of human rights violations, the Ethiopian government accused Western countries of not condemning the attacks of the Ogaden National Liberation Front.
WIKI
Gov. O'Malley Announces Plan To Deal With Climate Change « CBS Baltimore BALTIMORE (WJZ) An ambitious plan to deal with climate change. This week, Governor Martin O'Malley made major strides with the scientific community, which says our state is in the target zone for the effects of extreme weather. Mary Bubala has more. Extreme weather in Maryland. Experts say climate change is to blame for the increase in severe storms, flooding and extreme temperatures. Data shows Maryland is vulnerable to the rise in sea level, possibly losing precious land to climate change long term. Last year, we experienced the hottest year on record, O'Malley said. This week, Governor O'Malley hosted hundreds of scientists, business leaders and environmental advocates for a climate change summit. He released what he calls the country's most ambitious greenhouse gas reduction plan. This is not only about polar bears drowning, it's also more locally about the 168 Marylanders we've lost in severe weather events over the past decade and a half, O'Malley said. The plan, as he calls it for short, includes reducing greenhouse gas emissions 25% by 2020, cutting emissions from power plants by 40%, doubling Maryland's transit ridership by 2020 and eliminating 85% of Maryland's waste by 2030. Achieving that last goal means a huge increase in commercial and residential composting and recycling. Becoming a zero waste state, O'Malley said. The good news is we actually have one of the higher recycling rates already compared to the other 50 states, so we start from a very good base. The plan also calls for stricter vehicle emission standards and establishing more sources for renewable energy. The governor says these changes could create thousands of jobs and pump more than a billion dollars into the state's economy. Please log in using one of these methods to post your comment: You are commenting using your Twitter account. ( Log Out / Change ) You are commenting using your Facebook account. ( Log Out / Change ) You are commenting using your Google+ account. ( Log Out / Change ) Connecting to %s Notify me of new comments via email. Notify me of new posts via email. Listen Live
NEWS-MULTISOURCE
Anti-Sway/Anti-Roll Bar Service Anti-Sway/Anti-Roll Bar Service The repair opportunities on active anti-sway bars are increasing as vehicles age. Anti-sway bars (aka sway, stabilizer or anti-roll bars) never get the credit they deserve. If anti-sway bars were never invented, the ride and handling of vehicles would be a lot more harsh than it is today. That is because anti-sway bars act as a third spring controlling rolls stiffness of a vehicle.  An anti-sway bar has no effect if both sides simultaneously move in the same direction. If one side is moved up or down, like a dip or bump, half of the rigidity is effected. If the two sides are moving in opposite directions, like when the body sways, the full rigidity of the anti-sway bar is effected.  Cornering or lateral acceleration causes the chassis to roll. The faster the corner, the more the chassis will tend to roll. During a cornering maneuver, entire weight distribution of the vehicle changes. In a right hand corner, the most weight is placed on the left front wheel. The right rear wheel carries the least amount of weight. If the vehicle is breaking in the corner, even more weight is shifted the right front wheel.  Imagine a car without anti-sway bars. The car would experience body roll around corners, but off-road and in a straight line, the tires would maintain better contact with rougher roads at lower speed for better traction. However, at higher speeds, the body movement around corners would negate this effect. If you increased the spring rate, it would reduce body roll but would impact ride comfort.  Now, imagine a car with over-sized anti-sway bars and lower spring rates. The car would go great around corners with very little body movement. But, during braking, the rear-to-front weight transfer would cause nosedive and squat, making it painful to drive over rough or uneven pavement.  The other consideration determining anti-sway bar diameter is the spring rates at all four corners. An engineer may want to improve the ride quality by reducing the spring rates, but this might mean a stiffer roll bar to meet stability requirements. There is a lot of give-and-take to make a vehicle that handles well but is still comfortable.  The weakest points of any anti-sway bar system are the links that connect the bar to the suspension. Designs can vary from vertical links with bushings on both ends to full ball-and-socket joints. Both of these connections can wear over time and fail. Therefore, inspection is critical.  The anti-sway bar can break at the ends or in the middle. This type of failure is more common on smaller diameter rear anti-sway bars. Also, pay attention to the mounting bushings that attach the bar to the frame.  The repair opportunities on active anti-sway bars are increasing as vehicles age.   This video is sponsored by Auto Value and Bumper to Bumper You May Also Like Road to AAPEX Season 2 EP. 7 As Keene connects with the Lincoln Highway’s history, David Sickels glimpses into the future of automotive technology. Rolling through Nebraska, Babcox Media’s Joe Keene meets kindred spirits as he drives the rare Lincoln Blackwood he refurbished for his journey to AAPEX. Along the way, he meets a family traveling the Lincoln Highway section by section, taking in sights such as the Great Platte River Road Archway Monument and the Classic Car Collection, both in Kearney, Neb., and the Golden Spike Tower in North Platte, Neb. Road To AAPEX Season 2 EP. 6 It’s the unexpected moments that make a trip memorable. Road to AAPEX Season 2 Ep. 5 See how Babcox Media’s Joe Keene prepares the Lincoln Blackwood for the road. Vehicle Electrification: Trends and Power Solutions We are in an era of change with vehicle mobility. This video is sponsored by The Group Training Academy. Identifying The Correct Alternator Pulley Replace the OAD and tensioner with the belt as part of a mileage-based service. Sponsored by Litens. Other Posts Road to AAPEX Season 2 Ep. 4 PT. 2 To get it safe before getting on the road, the team continues the Blackwood’s required service procedures. Understanding the Role of Oil-Pressure Sensors in an Engine If the oil-pressure sensor fails or becomes damaged, it can cause serious problems. Sponsored by United Motor Products. Road To AAPEX Season 2 Ep. 4 PT. 1 When the team started looking at the Blackwood’s transmission, they knew they needed help to prevent a lonely breakdown. Road to AAPEX Season 2 Ep. 3 Episode 3 of Season 2 of The Road To AAPEX sets Joe Keene off on a search for parts to help restore the Blackwood.
ESSENTIALAI-STEM
High Commission of Cameroon, London The High Commission for the Republic of Cameroon in London is the diplomatic mission of Cameroon in the United Kingdom. A protest was held outside the embassy in 2013 following the murder of Cameroonian gay-rights activist Eric Lembembe. This led to several more protests in Cameroon, especially in the southern regions.
WIKI
Page:Shivaji and His Times.djvu/437 Rh It was Shivaji's settled policy to use his army to draw supplies from foreign dominions every year. "The troops were to go into cantonments in the home territory during the rainy season (June — September.) Grain, fodder and medicines were kept in stock for the horses, and the huts of the troopers were kept thatched with grass. On the day of Dasahara (early in October) the army should set out from the camp for the country selected by the Rajah. At the time of their departure a list was made of all the property that every man, high or low, of the army carried with himself. The troops were to subsist in foreign parts for eight months and also levy contributions. No woman, female slave or dancing-girl was to be allowed to accompany the army. A soldier keeping any of these was to be beheaded. No woman or child was to be taken captive, but only men. Cows were exempt from seizure, but bullocks might be taken for transport only. Brahmans were not to be molested, nor taken as hostages for ransom. No soldier should misconduct himself [during a campaign.] Eight months were to be passed in such expeditions abroad. On their return to their own frontier in Baishakh (April) the whole army was to be searched, the property found was to be compared with the old list, and the excess was to be deducted from their salary. Any one secreting any booty was liable to punishment on detection by the general. The generals on their return should see the
WIKI
create_dl_layer_concatT_create_dl_layer_concatCreateDlLayerConcatCreateDlLayerConcatcreate_dl_layer_concat (Operator) Name create_dl_layer_concatT_create_dl_layer_concatCreateDlLayerConcatCreateDlLayerConcatcreate_dl_layer_concat — Create a concatenation layer. Signature create_dl_layer_concat( : : DLLayerInputs, LayerName, Axis, GenParamName, GenParamValue : DLLayerConcat) Herror T_create_dl_layer_concat(const Htuple DLLayerInputs, const Htuple LayerName, const Htuple Axis, const Htuple GenParamName, const Htuple GenParamValue, Htuple* DLLayerConcat) void CreateDlLayerConcat(const HTuple& DLLayerInputs, const HTuple& LayerName, const HTuple& Axis, const HTuple& GenParamName, const HTuple& GenParamValue, HTuple* DLLayerConcat) static HDlLayer HDlLayer::CreateDlLayerConcat(const HDlLayerArray& DLLayerInputs, const HString& LayerName, const HString& Axis, const HTuple& GenParamName, const HTuple& GenParamValue) HDlLayer HDlLayer::CreateDlLayerConcat(const HString& LayerName, const HString& Axis, const HString& GenParamName, const HString& GenParamValue) const HDlLayer HDlLayer::CreateDlLayerConcat(const char* LayerName, const char* Axis, const char* GenParamName, const char* GenParamValue) const HDlLayer HDlLayer::CreateDlLayerConcat(const wchar_t* LayerName, const wchar_t* Axis, const wchar_t* GenParamName, const wchar_t* GenParamValue) const   (Windows only) static void HOperatorSet.CreateDlLayerConcat(HTuple DLLayerInputs, HTuple layerName, HTuple axis, HTuple genParamName, HTuple genParamValue, out HTuple DLLayerConcat) static HDlLayer HDlLayer.CreateDlLayerConcat(HDlLayer[] DLLayerInputs, string layerName, string axis, HTuple genParamName, HTuple genParamValue) HDlLayer HDlLayer.CreateDlLayerConcat(string layerName, string axis, string genParamName, string genParamValue) def create_dl_layer_concat(dllayer_inputs: MaybeSequence[HHandle], layer_name: str, axis: str, gen_param_name: MaybeSequence[str], gen_param_value: MaybeSequence[Union[int, float, str]]) -> HHandle Description The operator create_dl_layer_concatcreate_dl_layer_concatCreateDlLayerConcatCreateDlLayerConcatCreateDlLayerConcatcreate_dl_layer_concat creates a concatenation layer whose handle is returned in DLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatdllayer_concat. The parameter DLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsdllayer_inputs determines the feeding input layers. The parameter LayerNameLayerNameLayerNameLayerNamelayerNamelayer_name sets an individual layer name. Note that if creating a model using create_dl_modelcreate_dl_modelCreateDlModelCreateDlModelCreateDlModelcreate_dl_model each layer of the created network must have an unique name. A concatenation layer concatenates the data tensors of the input layers in DLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsdllayer_inputs and returns a single data tensor DLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatdllayer_concat. The parameter AxisAxisAxisAxisaxisaxis specifies along which dimension the inputs should be concatenated. The supported options for AxisAxisAxisAxisaxisaxis are: 'batch'"batch""batch""batch""batch""batch": Concatenation is applied along the batch-dimension. Example: if you concatenate two inputs A and B of shape (b, d, h, w) = (2, 1, 1, 1), where A = [A0, A1] and B = [B0, B1], you obtain the output [A0, A1, B0, B1] with shape (4, 1, 1, 1). 'batch_interleaved'"batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved": Concatenation is applied along the depth-dimension, but the output is reshaped as if the data was concatenated along the batch-dimension. For this axis, all inputs need to have exactly the same shape. Note that when the input batch_size is 1, the axes 'batch'"batch""batch""batch""batch""batch" and 'batch_interleaved'"batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved" are identical. Example: if you concatenate two inputs A and B of shape (b, d, h, w) = (2, 1, 1, 1), where A = [A0, A1] and B = [B0, B1], you obtain the output [A0, A1, B0, B1] with shape (4, 1, 1, 1). 'depth'"depth""depth""depth""depth""depth": Concatenation is applied along the depth-dimension. Example: if you concatenate two inputs A and B of shape (b, d, h, w) = (2, 1, 1, 1), where A = [A0, A1] and B = [B0, B1], you obtain the output [A0, A1, B0, B1] with shape (2, 2, 1, 1). 'height'"height""height""height""height""height": Concatenation is applied along the height-dimension. 'width'"width""width""width""width""width": Concatenation is applied along the width-dimension. Note that all non-concatenated dimensions must be equal for all input data tensors. The following generic parameters GenParamNameGenParamNameGenParamNameGenParamNamegenParamNamegen_param_name and the corresponding values GenParamValueGenParamValueGenParamValueGenParamValuegenParamValuegen_param_value are supported: 'is_inference_output'"is_inference_output""is_inference_output""is_inference_output""is_inference_output""is_inference_output": Determines whether apply_dl_modelapply_dl_modelApplyDlModelApplyDlModelApplyDlModelapply_dl_model will include the output of this layer in the dictionary DLResultBatchDLResultBatchDLResultBatchDLResultBatchDLResultBatchdlresult_batch even without specifying this layer in OutputsOutputsOutputsOutputsoutputsoutputs ('true'"true""true""true""true""true") or not ('false'"false""false""false""false""false"). Default: 'false'"false""false""false""false""false" 'num_trainable_params'"num_trainable_params""num_trainable_params""num_trainable_params""num_trainable_params""num_trainable_params": Number of trainable parameters (weights and biases) of the layer. Certain parameters of layers created using this operator create_dl_layer_concatcreate_dl_layer_concatCreateDlLayerConcatCreateDlLayerConcatCreateDlLayerConcatcreate_dl_layer_concat can be set and retrieved using further operators. The following tables give an overview, which parameters can be set using set_dl_model_layer_paramset_dl_model_layer_paramSetDlModelLayerParamSetDlModelLayerParamSetDlModelLayerParamset_dl_model_layer_param and which ones can be retrieved using get_dl_model_layer_paramget_dl_model_layer_paramGetDlModelLayerParamGetDlModelLayerParamGetDlModelLayerParamget_dl_model_layer_param or get_dl_layer_paramget_dl_layer_paramGetDlLayerParamGetDlLayerParamGetDlLayerParamget_dl_layer_param. Note, the operators set_dl_model_layer_paramset_dl_model_layer_paramSetDlModelLayerParamSetDlModelLayerParamSetDlModelLayerParamset_dl_model_layer_param and get_dl_model_layer_paramget_dl_model_layer_paramGetDlModelLayerParamGetDlModelLayerParamGetDlModelLayerParamget_dl_model_layer_param require a model created by create_dl_modelcreate_dl_modelCreateDlModelCreateDlModelCreateDlModelcreate_dl_model. Layer Parameters set get 'input_layer'"input_layer""input_layer""input_layer""input_layer""input_layer" (DLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsdllayer_inputs) 'name'"name""name""name""name""name" (LayerNameLayerNameLayerNameLayerNamelayerNamelayer_name) 'output_layer'"output_layer""output_layer""output_layer""output_layer""output_layer" (DLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatdllayer_concat) 'shape'"shape""shape""shape""shape""shape" 'type'"type""type""type""type""type" Generic Layer Parameters set get 'is_inference_output'"is_inference_output""is_inference_output""is_inference_output""is_inference_output""is_inference_output" 'num_trainable_params'"num_trainable_params""num_trainable_params""num_trainable_params""num_trainable_params""num_trainable_params" Execution Information Parameters DLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsDLLayerInputsdllayer_inputs (input_control)  dl_layer(-array) HDlLayer, HTupleMaybeSequence[HHandle]HTupleHtuple (handle) (IntPtr) (HHandle) (handle) Feeding input layers. LayerNameLayerNameLayerNameLayerNamelayerNamelayer_name (input_control)  string HTuplestrHTupleHtuple (string) (string) (HString) (char*) Name of the layer. AxisAxisAxisAxisaxisaxis (input_control)  string HTuplestrHTupleHtuple (string) (string) (HString) (char*) Dimension along which the input layers are concatenated. Default value: 'depth' "depth" "depth" "depth" "depth" "depth" List of values: 'batch'"batch""batch""batch""batch""batch", 'batch_interleaved'"batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved""batch_interleaved", 'depth'"depth""depth""depth""depth""depth", 'height'"height""height""height""height""height", 'width'"width""width""width""width""width" GenParamNameGenParamNameGenParamNameGenParamNamegenParamNamegen_param_name (input_control)  attribute.name(-array) HTupleMaybeSequence[str]HTupleHtuple (string) (string) (HString) (char*) Generic input parameter names. Default value: [] List of values: 'is_inference_output'"is_inference_output""is_inference_output""is_inference_output""is_inference_output""is_inference_output" GenParamValueGenParamValueGenParamValueGenParamValuegenParamValuegen_param_value (input_control)  attribute.value(-array) HTupleMaybeSequence[Union[int, float, str]]HTupleHtuple (string / integer / real) (string / int / long / double) (HString / Hlong / double) (char* / Hlong / double) Generic input parameter values. Default value: [] Suggested values: 'true'"true""true""true""true""true", 'false'"false""false""false""false""false" DLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatDLLayerConcatdllayer_concat (output_control)  dl_layer HDlLayer, HTupleHHandleHTupleHtuple (handle) (IntPtr) (HHandle) (handle) Concatenation layer. Module Deep Learning Training
ESSENTIALAI-STEM
Petrol Engine: How You Can Supply Fuel Effectively in Petrol Engine In a petrol engine, petrol derived from crude oil is used as fuel. So, you can run your vehicle smoothly. An internal combustion engine is operated by liquid or gaseous fuel also. Hence, the fuel supply in Petrol Engine is essential for engine running. Actually, gaseous fuel is most useful due to its high octane rating, less deposit trouble, and clean operation. But the use of this type of fuel is mostly restricted to those areas where gas is available. It is also quite difficult to carry gas for automobile purposes. However, in many metro cities compressed natural gas (CNG) is available and many vehicles are running on it. petrol engine fuel supply Still today liquid fuels, obtained from Petroleum (Crude Oil) are used to the largest extent primarily. This is due to large quantities of energy per unit volume. Also, the ease of handling, storage, and transportation. This type of fuel has some engineering disadvantages as like, vaporization, and atomization or at least partly vaporized during the process of mixing. petrol engine fuel supply system • What is the fuel supply system in a petrol engine?  Parts of Fuel Supply System in Petrol Engine 01) Fuel Storage Tank 03) Fuel Filter 04) Carburetor 05) Inlet manifold 06) Inlet Valve   The fuel can be supplied to the petrol engine under gravity or under pressure. • Gravity System Here, the fuel flows to the engine under gravitational force. In a gravity system, the fuel storage tank is placed at a higher level than the cylinder head. This system doesn’t require a fuel pump. • Pressure System Here, the fuel from the fuel tank is forced by the fuel pump through the filter to the carburetor. In a Pressure System, the fuel tank is placed at a lower level than the petrol engine head. Sometimes away from the petrol engine also. For example, motor cars, trucks, etc. Keep the fuel tank away from the hot engine. So, we can avoid the chances of catching fire in the event of an accident. In a fuel system for a petrol engine, the fuel storage tank is located well below the carburetor. The fuel is supplied by the fuel pump to the carburetor through the fuel filter. Hence fuel filter removes the dirt and other foreign particles from the petrol. This system is extensively used for motor cars. So, Here is the Description of  parts used in the fuel supply system • Fuel Pump A diaphragm-type fuel pump is used in petrol engines as there is no need for an extra high pressure of the fuel. So, the fuel pump is extensively used to pump the fuel from the fuel tank to the carburetor in the automotive engines. A flexible diaphragm is moved down against the force of the diaphragm spring. This is done by the diaphragm lever and the operating arm which is actuated by the camshaft eccentrically. The pressure falls in the pump chamber; hence the fuel from the fuel tank flows through the fuel inlet valve. The fuel inlet valve closes at the return stroke as the diaphragm spring forces the diaphragm upwards. Same time fuel outlet valve opens and thus the fuel starts flowing from the pump to the carburetor. To get rid of unwanted dirt, filters are used. So, a filter used to clean the air is known as an air filter. The fuel filter cleans the fuel, whereas the oil filter cleans the lubricating oil. In filters, paper elements, cloth elements, felt elements, and the combination of felt and cloth elements are used. Basically, there are two types of fuel filters used, a) Preliminary fuel filter b) Secondary fuel filter This is the device that mixes the fuel with air. A carburetor supplies this mixture to the induction manifold of the petrol engine. The carburetor controls the required quantity of fuel and breaks it up into minute globules. Afterward being mixed with the correct quantity of air. Types of the carburettor are a) Zenith carburetor b) Solex carburetor c) Amal carburetor Besides this information, you are suggested to read something more from below engineering books So, Here you find the Best Engineering Resources for further details To get the more details about the topic, I further recommended reading If you like the post, share it with your friends and also on social sites. Leave a comment This site uses Akismet to reduce spam. Learn how your comment data is processed. Battery Reconditioning Course
ESSENTIALAI-STEM
org.apache.avro.io Class Encoder java.lang.Object extended by org.apache.avro.io.Encoder All Implemented Interfaces: Flushable Direct Known Subclasses: BinaryEncoder, ParsingEncoder public abstract class Encoder extends Object implements Flushable Low-level support for serializing Avro values. This class has two types of methods. One type of methods support the writing of leaf values (for example, writeLong(long) and writeString(org.apache.avro.util.Utf8)). These methods have analogs in Decoder. The other type of methods support the writing of maps and arrays. These methods are writeArrayStart(), startItem(), and writeArrayEnd() (and similar methods for maps). Some implementations of Encoder handle the buffering required to break large maps and arrays into blocks, which is necessary for applications that want to do streaming. (See writeArrayStart() for details on these methods.) EncoderFactory contains Encoder construction and configuration facilities. See Also: EncoderFactory, Decoder Constructor Summary Encoder()               Method Summary abstract  void setItemCount(long itemCount)           Call this method before writing a batch of items in an array or a map. abstract  void startItem()           Start a new item of an array or map. abstract  void writeArrayEnd()           Call this method to finish writing an array. abstract  void writeArrayStart()           Call this method to start writing an array. abstract  void writeBoolean(boolean b)           Write a boolean value.  void writeBytes(byte[] bytes)           Writes a byte string. abstract  void writeBytes(byte[] bytes, int start, int len)           Write a byte string. abstract  void writeBytes(ByteBuffer bytes)           Write a byte string. abstract  void writeDouble(double d)           Write a double. abstract  void writeEnum(int e)           Writes an enumeration.  void writeFixed(byte[] bytes)           A shorthand for writeFixed(bytes, 0, bytes.length) abstract  void writeFixed(byte[] bytes, int start, int len)           Writes a fixed size binary object. abstract  void writeFloat(float f)           Write a float. abstract  void writeIndex(int unionIndex)           Call this method to write the tag of a union. abstract  void writeInt(int n)           Writes a 32-bit integer. abstract  void writeLong(long n)           Write a 64-bit integer. abstract  void writeMapEnd()           Call this method to terminate the inner-most, currently-opened map. abstract  void writeMapStart()           Call this to start a new map. abstract  void writeNull()           "Writes" a null value.  void writeString(CharSequence charSequence)           Write a Unicode character string.  void writeString(String str)           Write a Unicode character string. abstract  void writeString(Utf8 utf8)           Write a Unicode character string.   Methods inherited from class java.lang.Object clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait   Methods inherited from interface java.io.Flushable flush   Constructor Detail Encoder public Encoder() Method Detail writeNull public abstract void writeNull() throws IOException "Writes" a null value. (Doesn't actually write anything, but advances the state of the parser if this class is stateful.) Throws: AvroTypeException - If this is a stateful writer and a null is not expected IOException writeBoolean public abstract void writeBoolean(boolean b) throws IOException Write a boolean value. Throws: AvroTypeException - If this is a stateful writer and a boolean is not expected IOException writeInt public abstract void writeInt(int n) throws IOException Writes a 32-bit integer. Throws: AvroTypeException - If this is a stateful writer and an integer is not expected IOException writeLong public abstract void writeLong(long n) throws IOException Write a 64-bit integer. Throws: AvroTypeException - If this is a stateful writer and a long is not expected IOException writeFloat public abstract void writeFloat(float f) throws IOException Write a float. Throws: IOException AvroTypeException - If this is a stateful writer and a float is not expected writeDouble public abstract void writeDouble(double d) throws IOException Write a double. Throws: AvroTypeException - If this is a stateful writer and a double is not expected IOException writeString public abstract void writeString(Utf8 utf8) throws IOException Write a Unicode character string. Throws: AvroTypeException - If this is a stateful writer and a char-string is not expected IOException writeString public void writeString(String str) throws IOException Write a Unicode character string. The default implementation converts the String to a Utf8. Some Encoder implementations may want to do something different as a performance optimization. Throws: AvroTypeException - If this is a stateful writer and a char-string is not expected IOException writeString public void writeString(CharSequence charSequence) throws IOException Write a Unicode character string. If the CharSequence is an Utf8 it writes this directly, otherwise the CharSequence is converted to a String via toString() and written. Throws: AvroTypeException - If this is a stateful writer and a char-string is not expected IOException writeBytes public abstract void writeBytes(ByteBuffer bytes) throws IOException Write a byte string. Throws: AvroTypeException - If this is a stateful writer and a byte-string is not expected IOException writeBytes public abstract void writeBytes(byte[] bytes, int start, int len) throws IOException Write a byte string. Throws: AvroTypeException - If this is a stateful writer and a byte-string is not expected IOException writeBytes public void writeBytes(byte[] bytes) throws IOException Writes a byte string. Equivalent to writeBytes(bytes, 0, bytes.length) Throws: IOException AvroTypeException - If this is a stateful writer and a byte-string is not expected writeFixed public abstract void writeFixed(byte[] bytes, int start, int len) throws IOException Writes a fixed size binary object. Parameters: bytes - The contents to write start - The position within bytes where the contents start. len - The number of bytes to write. Throws: AvroTypeException - If this is a stateful writer and a byte-string is not expected IOException writeFixed public void writeFixed(byte[] bytes) throws IOException A shorthand for writeFixed(bytes, 0, bytes.length) Parameters: bytes - Throws: IOException writeEnum public abstract void writeEnum(int e) throws IOException Writes an enumeration. Parameters: e - Throws: AvroTypeException - If this is a stateful writer and an enumeration is not expected or the e is out of range. IOException writeArrayStart public abstract void writeArrayStart() throws IOException Call this method to start writing an array. When starting to serialize an array, call writeArrayStart(). Then, before writing any data for any item call setItemCount(long) followed by a sequence of startItem() and the item itself. The number of startItem() should match the number specified in setItemCount(long). When actually writing the data of the item, you can call any Encoder method (e.g., writeLong(long)). When all items of the array have been written, call writeArrayEnd(). As an example, let's say you want to write an array of records, the record consisting of an Long field and a Boolean field. Your code would look something like this: out.writeArrayStart(); out.setItemCount(list.size()); for (Record r : list) { out.startItem(); out.writeLong(r.longField); out.writeBoolean(r.boolField); } out.writeArrayEnd(); Throws: AvroTypeException - If this is a stateful writer and an array is not expected IOException setItemCount public abstract void setItemCount(long itemCount) throws IOException Call this method before writing a batch of items in an array or a map. Then for each item, call startItem() followed by any of the other write methods of Encoder. The number of calls to startItem() must be equal to the count specified in setItemCount(long). Once a batch is completed you can start another batch with setItemCount(long). Parameters: itemCount - The number of startItem() calls to follow. Throws: IOException startItem public abstract void startItem() throws IOException Start a new item of an array or map. See writeArrayStart() for usage information. Throws: AvroTypeException - If called outside of an array or map context IOException writeArrayEnd public abstract void writeArrayEnd() throws IOException Call this method to finish writing an array. See writeArrayStart() for usage information. Throws: AvroTypeException - If items written does not match count provided to writeArrayStart() AvroTypeException - If not currently inside an array IOException writeMapStart public abstract void writeMapStart() throws IOException Call this to start a new map. See writeArrayStart() for details on usage. As an example of usage, let's say you want to write a map of records, the record consisting of an Long field and a Boolean field. Your code would look something like this: out.writeMapStart(); out.setItemCount(list.size()); for (Map.Entry entry : map.entrySet()) { out.startItem(); out.writeString(entry.getKey()); out.writeLong(entry.getValue().longField); out.writeBoolean(entry.getValue().boolField); } out.writeMapEnd(); Throws: AvroTypeException - If this is a stateful writer and a map is not expected IOException writeMapEnd public abstract void writeMapEnd() throws IOException Call this method to terminate the inner-most, currently-opened map. See writeArrayStart() for more details. Throws: AvroTypeException - If items written does not match count provided to writeMapStart() AvroTypeException - If not currently inside a map IOException writeIndex public abstract void writeIndex(int unionIndex) throws IOException Call this method to write the tag of a union. As an example of usage, let's say you want to write a union, whose second branch is a record consisting of an Long field and a Boolean field. Your code would look something like this: out.writeIndex(1); out.writeLong(record.longField); out.writeBoolean(record.boolField); Throws: AvroTypeException - If this is a stateful writer and a map is not expected IOException Copyright © 2011 The Apache Software Foundation. All Rights Reserved.
ESSENTIALAI-STEM
Include a Local Drupal Settings file for Environment Configuration and Overrides Warning: This post is over a year old. I don't always update old posts with new information, so some of this information may be out of date. How to create and include a local settings file to define and override environment-specific variables, and keep sensitive things like your database credentials and API keys safe. At the bottom of settings.php, add the following code: $local_settings = __DIR__ . '/settings.local.php'; if (file_exists($local_settings)) { include $local_settings; } This allows for you to create a new file called settings.local.php within a sites/* directory (the same place as settings.php), and this will be included as an extension of settings.php. You can see the same technique being used within Drupal 8's default.settings.php file. Environment specific settings like $databases and $base_url can be placed within the local settings file. Other settings like $conf['locale_custom_strings_en'] (string overrides) and $conf['allow_authorize_operations'] that would apply to all environments can still be placed in settings.php. settings.php though is ignored by default by Git by a .gitignore file, so it won't show up as a file available to be committed. There are two ways to fix this. The first is to use the --force option when adding the file which overrides the ignore file: git add --force sites/default/settings.php The other option is to update the .gitignore file itself so that settings.php is no longer ignored. An updated .gitignore file could look like: # Ignore configuration files that may contain sensitive information. sites/*/settings.local*.php # Ignore paths that contain user-generated content. sites/*/files sites/*/private This will allow for settings.php to be added to Git and committed, but not settings.local.php. Questions? Comments? I’m @opdavies on Twitter. Tags About the Author Picture of Oliver Oliver Davies is a Full Stack Web Developer and System Administrator based in the UK. He is a Senior Software Engineer at Inviqa and a part-time freelancer specialising in Drupal, Symfony and Laravel development and Linux systems administration.
ESSENTIALAI-STEM
Steve Eise Steve Eise is a retired American soccer player who played professionally in the American Professional Soccer League. Eise, brother of David Eise, graduated from Rosary High School in St. Louis, Missouri. He attended St. Louis University, playing on the men's soccer team from 1985 to 1988. On July 9, 1989, the St. Louis Storm selected Eise in the second round of the Major Indoor Soccer League Amateur Draft. He never played a first team game with the Storm. He also played indoors with the Detroit Rockers during the 1990–91 National Professional Soccer League season. In 1990, Eise joined the Colorado Foxes of the American Professional Soccer League. He was a 1990 Second Team All Western Conference and a 1991 All League Honorable Mention defender.
WIKI
Page:Morning-Glories and Other Stories.djvu/190 Rh deal and was always taking notes of things he saw and heard, to be put in a great encyclopædia he was making. He didn't like romance, loved the truth, and wanted to get to the bottom of every thing. He was always trying to make little Fancy more sober, well-behaved, and learned; for she was a freakish, dreamy, yet very lovable and charming child. Aunt Fiction petted her to her heart's content, and might have done her harm, if Uncle Fact had not had a hand in her education; for the lessons of both were necessary to her, as to all of us. "Well, well, well! who is this?" he said briskly, as he turned his keen eyes and powerful glasses on the newcomer. Aunt Fiction told him all the children had said; but he answered impatiently,— "Tut, tut! my dear: I want the facts of the case. You are apt to exaggerate; and Fancy is not to be relied on. If the child isn't a fool, she must know more about herself than she pretends. Now, answer truly, Luly, where did you come from?" But the little mermaid only shook her head, and answered as before, "Fancy found me on the beach, and wants me to stay with her. I'll do her no harm: please, let me stay." "She has evidently been washed ashore from some wreck, and has forgotten all about herself. Her wonderful beauty, her accent, and these ornaments show that she is some foreign child," said Aunt Fiction, pointing to the earrings. "Nonsense! my dear: those are white pebbles, not pearls; and, if you examine them, you will find that those bracelets are the ones you gave Fancy as a reward
WIKI
Talk:Decalage Note We need to add the purpose of decalage (not currently stated). From memory, with a biplane if the top wing is set at a higher angle it stalls first and pitches the nose down, improving stall recovery behaviour. Decalage between wings and tailplanes is often about 4 degrees, setting the wing at the optimum angle of attack for cruise flight with the fuselage level (minimum drag). Would add it but I can't find a reference just now. Nimbus (Cumulus nimbus floats by) 23:11, 12 February 2009 (UTC) * Might be able to find something amongst the multitude of NACA technical reports – a bit of a dry read, but such are the sacrifices we make for the better good (Lol)! ;-)--Red Sunset 19:52, 13 February 2009 (UTC) * Take a look at the end of p.10 and p.11 – the conclusions of this MIT report. D'ya reckon it could be used? --Red Sunset 21:02, 13 February 2009 (UTC) * That's interesting, I had a skim through it. Based on wind tunnel testing in 1926, seems to indicate that positive decalage made the model more prone to spinning. Will have a better read of it later. That report talks about decalage between biplane wings, still need to find one on tailplane/wing angle of incidence which I have also heard described as 'longitudinal dihedral'. Good find there. Nimbus (Cumulus nimbus floats by) 21:48, 13 February 2009 (UTC) Can we find a citation showing Decalage = Longitudinal Dihedral? The 1927 NASA Paper shows Decalage as between the wings of a biplane. It doesn't show Decalage as the difference between the incidence angles of the wing and tail (which is longitudinal dihedral). There is some discussion over in Talk:Dihedral (aircraft) as to whether this is true. It looks like "Decalage" is used that way by at least one aerodynamics expert, but I'm not sure if it's used that way commonly by knowledgeable practitioners. It probably is, but a citation for it here would sure be nice! :-) Gummer85 (talk) 01:09, 26 August 2009 (UTC) * Possibly not! I do remember spending some time on this article and querying it in my own head, often on WP we take as read what has been written before ('must be right' syndrome), I think it is only now that we are finding much mythology in articles and fixing it. I note there is no French article which might have helped. Will have a look again and see if I can find anything. Nimbus (Cumulus nimbus floats by) 01:30, 26 August 2009 (UTC) * I have taken out the questionable alternative meaning until someone can add it back with a reference. I had a good look through my books and I couldn't find mention of the second meaning. I did find a book to support both the meaning of longitudinal dihedral and decalage as two separate things, it is: Whitehead, Gordon. Radio Control Scale Aircraft for Everyday Flying. Littlehampton, West Sussex: Radio Modeller Books Ltd, 1980. ISBN 0 903676 08 7 * Although this is an aeromodelling book the same principles apply, Gordon Whitehead is a very clever chap and a retired Royal Air Force engineering officer I believe. In his glossary of terms he explains both as: * Decalage: The difference in incidence between the upper and lower wings of a biplane. * Longitudinal dihedral: The difference in angle of incidence between wing and tailplane. * I think that he has it right, cheers. Nimbus (Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 15:18, 26 August 2009 (UTC) * There is an article on the French WP 'Calage' where it says: Calage d'une aile : angle formé par la corde du profil de l'aile et l'axe de référence de l'avion (généralement l'axe du fuselage). Which from my schoolboy French translates as The angle formed between the mean chord line of the wing and the reference plane of the aircraft (usually the fuselage) I would say that this is describing the angle of incidence. 'De calage' = The incidence? There is a drawing here of a Belgian aircraft which is showing the incidence angles of both a wing and tailplane with the term 'de calage' being used. Interesting. Nimbus <font style="color:#2F4F4F;">(Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 20:53, 26 August 2009 (UTC) Interesting response. I happen to agree that the definitions you cite above are most likely to be the way they are used by those knowledgeable professional practioners who actually need to use the terms (terms that are even obscure among "knowledgeable professional practioners"). I'm a "knowledgeable former professional practioner", but not one that had a need in my career to use the terms. It looks like (for now) that it's hard to pin it down. On one hand, the cursory (for me) searches show these definitions (above), but on the other hand we have at least one well known aerodynamics god (Dr. Mark Drela) who has used the "Decalage" to mean the difference in angle of incidence between wing and tailplane. It wouldn't be the first time a "knowledgeable professional practioner" used a term unconventionally in a such a way, i.e., in an unusual way that wasn't really that critical in the scheme of things. I'm thinking that Drela's "misusage", wasn't misusage, the terms are obscure and their meanings well-specified at the time of usage. So, I'm going to declare (in my mind) Drela's usage an anomaly, also that he's earned a right to redefine it if he wants. I'm going to leave the matter unsaid in the two articles because I don't know what to make of it. :-) Here are some links I copied over from Talk:Dihedral (aircraft): Mailing List Posting (A good diagram! (even though it uses "decalage" for "longitudinal dihedral")) --Gummer85 (talk) 18:08, 31 August 2009 (UTC) * I think the second meaning is out there, just need to find a good reference for it. Mark has an account on Commons perhaps we could ask him, I know of his work through RC gliding. I don't remember the term being used in my Royal Air Force engineering training but it's a very long time ago and I don't remember much else of the course either!! I've had a small brainwave, my boss is a French aerodynamicist, without priming him I could ask him for a definition of the word. Nimbus <font style="color:#2F4F4F;">(Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 22:17, 31 August 2009 (UTC) * I remembered to ask my French colleague today, the answer was interesting and slightly different to my guess above: * 'De' in French is the same as the English preposition 'De' which means to reverse or undo (as in delamination, detox etc.). * 'Calage' is the noun form of the verb 'Caler' (pronounced 'kallay'!, you can tell that I'm not a linguist!) which means to set, fix or adjust, so 'calage' is a 'setting'. * Decalage literally means 'to unset' or more correctly 'deliberately offset'. For this article then it means that biplane wing incidences are 'deliberately offset' and so too are the wing and tailplane incidences through longitudinal dihedral. As a Frenchman he said that he would use the term for both. * Another use is for a wheel chock (calage) or an aircraft chock (cale d'avions), more 'fixing' devices. 'Calibrate' is apparently related (to check a setting). All original research of course but at least we understand what the word actually means literally now (in French anyway!). Très bon! Nimbus <font style="color:#2F4F4F;">(Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 19:28, 5 September 2009 (UTC) * This is what you (I'm late to the party!) have been looking for, I think. It's the entry under "decalage/décalage" from the full Oxford English Dictionary: ''1917 R. B. Matthews Aviation Pocket-bk. (ed. 5) xii. 267 Decalage, the difference in the angle of incidence between any two distinct aerofoils on an aeroplane; e.g., the main plane and the tail; or more usually'' between the chords of the upper and lower planes of a biplane. 1933 Flight (Suppl. Aircraft Engin.) 27 Apr. 396d/1 The term aerodynamic decalage: defined as the angle that the no lift angle of the upper plane makes with the no lift angle of the lower plane, positive when the upper plane is at greater incidence than the lower. [My italics] * So the second usage (≡ longitudinal dihedral) is citable (first example). From an admittedly small sample of examples, I'd say longitudinal dihedral is more common, though not much more self-explanatory. Once you know what it means, there is sense in it as both dihedral (bog-standard) and longitudinal dihedral are ways of producing stability, one around the roll axis and the other the pitch. Both involve angular differences. Longitudinal is confusing (to me) but is short for longitudinal plane, I guess, not axis. * I'd like to make a pitch for a refining of the definition, something like the following: * from Decalage on a fixed-wing aircraft is the angle difference between the upper and lower wings of a biplane, i.e. the acute angle contained between the chords of the wings in question. * to Decalage on a fixed-wing aircraft is the difference between the angles of incidence of the upper and lower wings of a biplane or multiplane or between the angles of incidence of forward and rear aerodynamic surfaces. Equivalently, it is the acute angle contained between the chords of the surfaces in question, as projected onto the plane containing the roll and yaw axes. * The reason for expanding the second sentence is not just pedantry: when I first saw the definition I thought of a Tiger Moth, with different sweep on upper and lower planes. There's a non-zero angle between the chord lines in the horizontal plane, too. * Decalage has been applied to tandem wing aircraft, which are like biplanes with staggeringly large negative stagger and so less, but not negligible, aerodynamic interaction between wings. With negative decalage, the front wing stalls first so you put the ailerons on the rear, unstalled wing to retain lateral (roll!) control and avoid the spin. Something similar, but complicated by the higher pressure above the lower wing of a biplane (even with 0° decalage) must be true for them.TSRL (talk) 21:26, 23 May 2011 (UTC) Break I like the 1917 definition. The original question posed in this thread was can we cite the term 'longitudinal dihedral' as a meaning of decalage, I don't think we can just yet. More common, with British aircraft at least, is the simple term 'tailplane incidence', an angle measured relative to the fuselage datum line. This will also result in an angle difference between the mean chord lines of the wings as they should be bolted to the fuselage at their own angle of incidence!! Have to be careful not to introduce over-complication or our own analysis into the definition, forgive me for repeating it but the phrase as projected onto the plane containing the roll and yaw axes confuses me completely as a pilot and aircraft engineer. Both tailplane incidence and wing decalage are design features that can only affect an aircraft's stability in pitch about the lateral axis in conjunction with the fore and aft position of the centre of gravity. Out of interest I had to carry out full rigging checks (using an inclinometer) on our Tiger Moth last week as the tailplane has been rebuilt and the interplane struts have been removed for reconditioning. Despite the unequal dihedral, unequal sweepback and positive stagger the wing decalage is 0° at all rib stations, the wing incidence is 4° relative to the fuselage. Its tailplane incidence angle relative to the fuselage is 0° (so it is 4° relative to the wings). Would be nice to add a diagram and expand this article as it could possibly be tagged as a dictionary definition as it is. Cheers Nimbus <font style="color:#2F4F4F;">(Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 09:41, 24 May 2011 (UTC) Deletion Back in January 2009 a lot of content was deleted by an IP without any rationale. * ''Two different decalage definitions are commonly used: * '' Aerodynamic decalage is the angle difference between the zero lift lines of the wing's and stab's airfoils. * '' Geometric decalage is the angle difference between the chord lines of the wing and horizontal stab. * ''Decalage is often confused with incidence which is the angle between each of the surfaces (wing and horizontal stabilizer) and some other reference, usually the fuselage´s axis or the airflow. Just FYI, in case anything is missing from current text. 220 of Borg 02:12, 27 November 2015 (UTC) as an active commenter here. 220 of Borg 00:54, 28 November 2015 (UTC) * Looks like the images at least were restored in 2012, there still seems to be disagreement with what decalage actually is. Nimbus <font style="color:#2F4F4F;">(Cumulus <font style="color:#708090;">nimbus <font style="color:#D3D3D3;">floats by) 20:18, 28 November 2015 (UTC) External links modified (January 2018) Hello fellow Wikipedians, I have just modified 2 external links on Decalage. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20110716225431/http://aerade.cranfield.ac.uk/ara/1927/naca-tn-269.pdf to http://aerade.cranfield.ac.uk/ara/1927/naca-tn-269.pdf * Added archive https://web.archive.org/web/20090201153606/http://aerade.cranfield.ac.uk/index.html to http://aerade.cranfield.ac.uk/index.html Cheers.— InternetArchiveBot (Report bug) 13:29, 25 January 2018 (UTC)
WIKI
Gotchas (and workarounds) with ASP.NET double submit prevention using jQuery Double submit prevention is one of those things that developers sometimes have a hard time “getting”. It has an obvious fix – JUST CLICK THE BUTTON ONCE! No matter how obvious that fix is for us developers, chances are that at some point you’re going to be asked to go a little further and add code to prevent people from clicking your submit buttons twice – as was the case for me recently, when I had to look at this issue in  2 separate legacy codebases that we were lucky enough to inherit from other dev teams. Both were sending mail in the codebehind OnClick event, which can be fine if your mail server is nice and close (but is usually a bad idea), and in both cases doing full refactoring to get the delay of the click event down wasn’t an option due to budget, so I was looking for a quick and effective way to fix the problem. Both sites were running ASP.NET, and both used jQuery so I thought I’d give this commonly used approach a go: 1: $("form").live("submit",(function(e) { $('button[type=submit]', this).attr('disabled', 'disabled'); })); Despite this being commonly recommended, it didn’t work at all. After doing a bit of digging and testing of a few things (ASP.NET’s generated form name, multiple different jQuery versions, and a few other obvious debugging things) it became pretty apparent that something wasn’t quite right. It seems that when you set the CSS attribute of an ASP.NET button to ‘disabled’ in certain browsers (we’re looking at you here IE), then the ASP.NET engine decides that since the button is disabled then its event shouldn’t run. However as you’ve clicked and submitted, it still performs the postback, but without your code executing. So the page refreshes/reloads, but your code doesn’t execute - that’s less than ideal! So here’s a couple of alternative approaches you can use. All of these are pretty simple, and you’ll probably want to tweak them a little for your environment (especially if you are or aren’t using inbuilt ASP.NET validators): 1. Avoid the issue by using setTimeout 1: $(function () { 2:   3: $('[id$=btnTest]').click(function () { 4:   5: if (typeof(Page_ClientValidate) == 'function' && Page_ClientValidate() == false) { 6: return false; 7: } 8: 9: var button = this; 10:   11: setTimeout(function () { 12: $(button).attr('disabled', 'disabled'); 13: }, 100); 14: }); 15: }); As the title says, this disables the submit button 100ms after it was clicked. In effect this looks instant to the user, but allows the ASP.NET postback to run properly. In this example my button name is btnTest (and it’s being selected via a Wildcard so this will work fine in a master page), however you could also modify this to disable all buttons that match a specific class or disable all buttons using 'button[type=submit]’. The check for Page_ClientValidate is there to add ASP.NET validator support – as we don’t want to disable the button if the page’s content isn’t valid – if you’re not using ASP.NET validators then simply remove lines 5-7. What if you don’t like using setTimeout? Ok then: 2. Hide the button instead of disabling it 1: $(function () { 2: $("form").live("submit", (function (e) { 3:   4: if (typeof(Page_ClientValidate) == 'function' && Page_ClientValidate() == false) { 5: return false; 6: } 7:   8: $('.submitbutton').hide(); 9: $('.submitbutton').after('Please Wait, Submitting..'); 10: })); 11: }); ASP.NET doesn’t mind if we hide the button instead of disabling it, and that’s what the code above does. Again with ASP.NET validator support, this time we’re going to hide every button with a class of ‘submitbutton’ and replace it with some text. If you’ve got a lot of buttons on the page then this could look a bit funky, so replace the class with a specific id/wildcard if you need. Also if you prefer, instead of using ‘Please wait’ text, you could insert an AJAX spinner image, or insert a placeholder button which is set to disabled (as this new button wasn’t the one that was clicked, having it disabled isn’t an issue). Don’t like that approach? Right, I’ve got one more for you: 3. No visual changes, but add a click handler on submit 1: $(function () { 2: $("form").live("submit", (function (e) { 3:   4: if (typeof (Page_ClientValidate) == 'function' && Page_ClientValidate() == false) { 5: return false; 6: } 7:   8: $('input[type=submit]').click(function () { 9: alert('Quit your clicking!'); 10: return false; 11: }); 12: })); 13: }); This example (again with ASP.NET validator support) doesn’t change anything visually – however when the form is being submitted it’ll add click handlers to all the submit input elements that will pop up an alert to the user if they click again, and return false so your code won’t execute a second time. If you use buttons instead of inputs then simply change 'input[type=submit]’ in line 8 to ‘button[type=submit]’, and of course you could change the alert text to something educational for the user or simply remove it altogether. The above 3 examples are pretty simple, but are effective, and should be easy to adapt to different scenarios. Happy clicking! Tags: , , Posted on Saturday, November 5, 2011 3:11 PM | Like this? Share it! • # re: Gotchas (and workarounds) with ASP.NET double submit prevention using jQuery Gravatar Commented on 11/15/2011 7:48 PM Funny, I just had to do this today. But I ended up using jquery dialog with progress indicator. Seemedto work well. Post a comment Please add 5 and 2 and type the answer here: Remember me? Ensure the word in this box says 'orange':
ESSENTIALAI-STEM
0 the new search console is pointing out usability errors on mobile devices on WordPress upload pages, that is, pages where I can not change font size, viewport window and things like that, how do I solve it, or what to do with that Google does not take those pages into account. The errors are these: • Text too small for reading • The preview window is not set • The clickable elements are very close marked as duplicate by Stephen Ostermiller seo Apr 21 at 10:23 This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question. 0 You can deny googlebot to index that pages. Here is example of robots.txt I found, that optimizes wp for search bots: User-agent: * Disallow: /wp-admin Disallow: /wp-includes Disallow: /wp-content/plugins Disallow: /wp-json/ Disallow: /wp-login.php Disallow: /wp-register.php Disallow: */embed Disallow: */feed Disallow: /cgi-bin Disallow: *?s= Allow: /wp-admin/admin-ajax.php Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Australian shares set to record worst week in over 1-1/2 yrs after RBA rate hike June 10 (Reuters) - Australian shares were on track to mark their worst week in 19 months on Friday, with banking stocks leading the declines as the country's central bank hiked interest rates by the most in more than two decades in a move to tame surging inflation. The S&P/ASX 200 index .AXJO was down 0.9% at 6,959.90 by 0040 GMT, set for its worst week since October 30, 2020, if losses hold. The benchmark is on track to retreat 3.9% this week. In other key markets, Japan's Nikkei .N225 fell 1.3% at 27,886.30 and S&P 500 E-minis futures EScv1 edged 0.1% higher. Back home, financials .AXFJ rose 0.6%, although the sub-index slipped 7% for the week, its worst since March 20, 2020. Three of the "Big Four" banks were up between 1.3% and 1.6% on Friday. The Reserve Bank of Australia's 50-basis-point hike on Tuesday dragged the banks down this week, raising concerns about the housing market. The real estate index .AXRE dropped 1.4% to hit over a year low. Miners .AXMM sank 3%, on track for their worst day since a month as iron ore prices slipped on worries about weak profits at Chinese steel mills and fresh COVID-19 alerts in Shanghai and Beijing. IRONORE/ BHP Group BHP.AX, Rio Tinto RIO.AX and Fortescue Metals Group FMG.AX fell between 2.8% and 4.9%. Weak oil prices weighed on energy stocks .AXEJ that were down 2.1%, but the sub-index recorded a third straight week of gains. Woodside Energy Group WDS.AX and Santos STO.AX lost 2% and 1.5%, respectively. O/R Separately, AGL Energy AGL.AX, fell up to 2.6% as it expected a unit down since April at one of its power stations to restart in late September, more than a month later than earlier flagged, worsening the country's power crisis. Domestic technology stocks .AXIJ tracked Wall Street's sharp selloff ahead of U.S. consumer price data, sliding 2.5% to mark its worst week in nearly a month. .N New Zealand's benchmark S&P/NZX 50 index .NZ50 declined 1.2% to 11,080.56. (Reporting by Upasana Singh; Editing by Shailesh Kuber) ((Upasana.Singh@thomsonreuters.com)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
User:EyeHaveU - EyeHaveU - When you say the word "EyeHaveU" you realized that this name came from the Metal Gear Series. But it says there "Eye Have You" now, Eye Have U is a stop in store on the game "Metal Gear" wherein the store allows you to buy and sell items you get form the battle field or the ones that you purchased earlier in th e game. So that's this name is all about plus this name isn't Unique at all.
WIKI
The Return of Bruno (film) The Return of Bruno is a 1987 comedic film, originally aired as a one-hour special on HBO and later released on VHS. It is a mockumentary starring Bruce Willis as his fictitious alter-ego "Bruno Radolini," a legendary blues singer/musician who influenced, as the story goes, a number of other famous musicians. Phil Collins, Elton John, Ringo Starr, Jon Bon Jovi, Freddie Garrity, Brian Wilson, Grace Slick, Joan Baez, Graham Nash, Stephen Stills, Melvin Franklin, The Bee Gees, Paul Stanley and Bobby Colomby appear in the film as themselves, paying tribute to Radolini. It also features Bill Graham, Wolfman Jack, Michael J. Fox, Clive Davis, Henry Diltz and Don Cornelius. It is narrated by Dick Clark. It was written by Paul Flattery, Bruce V. DiMattia, and Kenny Solms. It was produced by Paul Flattery and directed by Jim Yukich. All the film's songs are taken from Willis' musical album The Return of Bruno except "No One's Home" by Bruce V. DiMattia and "Peter Gunn" by Henry Mancini. The film was nominated for a 1988 ACE award (Award for Cable Excellence) (now known as CableACE Awards) in the category "Writing a Musical Special or Series."
WIKI
Ara h 3 From Wikipedia, the free encyclopedia   (Redirected from Ara h3) Jump to navigation Jump to search Ara h 3 3c3v.jpg Identifiers OrganismArachis hypogaea (peanut) Symbolara h 3 UniProtB5TYU1 Ara h 3 is a seed storage protein from Arachis hypogaea (peanuts).[1] It is a heat stable 11S legumin-like globulin[2] with a stable trimeric form that comprises 19% of the total protein in peanut extracts. Structure[edit] Ara h 3 forms homotrimers and has a highly stable structure, mediated through hydrophobic interactions.[citation needed] It has been established as an allergen.[3] The trimeric assemblies are stabilized by multiple hydrogen bonds. Influence of Ara h 3 in peanut allergies[edit] The protein Ara h 3 plays an important role in peanut allergic reactions.[3] Ara h 3 makes up 19% of the total protein in peanut extracts and is classified as a major peanut allergen because it provokes sensitization of patients with this allergy. This protein is a very potent allergen and it causes a severe reaction. The symptoms can be: • Skin reaction: urticarial, redness or edema. • Itchy reaction: usually around the mouth and throat. • Digestive problems: such as diarrhea, stomach cramps, nausea or vomiting. • Breath problems: it has a relation with the inflammation reaction which causes the blockage of the air passages. • Heart problems: histamine can cause a coronary artery spasm. • Anaphylaxis: a whole-body allergic reaction that causes low blood pressure, suffocation and can bring a person to death. Treatment[edit] No treatment is currently available, avoidance is the only option for peanut-allergic individuals. Unfortunately, consumers can be inadvertently exposed to peanut allergens when food becomes contaminated from processing lines shared with other peanut products. Therefore, there can be labelling mistakes because companies may not include peanuts as ingredients. In consequence, therapeutic interventions and/or hypoallergenic peanuts are needed to prevent anaphylactic reactions caused by accidental ingestion of peanut-containing products by allergic individuals. References[edit] 1. ^ Guo B, Liang X, Chung SY, Maleki SJ (September 2008). "Proteomic screening points to the potential importance of Ara h 3 basic subunit in allergenicity of peanut". Inflammation & Allergy Drug Targets. 7 (3): 163–6. doi:10.2174/187152808785748182. PMID 18782022. 2. ^ Chruszcz M, Maleki SJ, Majorek KA, Demas M, Bublin M, Solberg R, Hurlburt BK, Ruan S, Mattison CP, Mattisohn CP, Breiteneder H, Minor W (November 2011). "Structural and immunologic characterization of Ara h 1, a major peanut allergen". The Journal of Biological Chemistry. 286 (45): 39318–27. doi:10.1074/jbc.M111.270132. PMC 3234756. PMID 21917921. 3. ^ a b Jin T, Guo F, Chen YW, Howard A, Zhang YZ (May 2009). "Crystal structure of Ara h 3, a major allergen in peanut". Molecular Immunology. 46 (8–9): 1796–804. doi:10.1016/j.molimm.2009.01.023. PMID 19251323.
ESSENTIALAI-STEM
Page:The writings of Henry David Thoreau, v2.djvu/114 least no more wholesome, at a greater cost, at the store. I saw that I could easily raise my bushel or two of rye and Indian corn, for the former will grow on the poorest land, and the latter does not require the best, and grind them in a hand-mill, and so do without rice and pork; and if I must have some concentrated sweet, I found by experiment that I could make a very good molasses either of pumpkins or beets, and I knew that I needed only to set out a few maples to obtain it more easily still, and while these were growing I could use various substitutes beside those which I have named. "For," as the Forefathers sang, * "we can make liquor to sweeten our lips * Of pumpkins and parsnips and walnut-tree chips." Finally, as for salt, that grossest of groceries, to obtain this might be a fit occasion for a visit to the seashore, or, if I did without it altogether, I should probably drink the less water. I do not learn that the Indians ever troubled themselves to go after it. Thus I could avoid all trade and barter, so far as my food was concerned, and having a shelter already, it would only remain to get clothing and fuel. The pantaloons which I now wear were woven in a farmer's
WIKI
Professional PCB manufacturing and assembly Building 6, Zone 3, Yuekang Road,Bao'an District, Shenzhen, China +86-13923401642Mon.-Sat.08:00-20:00 Industry news Industry news Explain the protective coating of circuit board to improve product reliability 29Nov Jeff 0 Comments Explain the protective coating of circuit board to improve product reliability Protective coating is used to enhance the performance and reliability of pcb assembly, so that it can be used in harsh environments such as underwater, aerospace and military applications. PCB manufacturers of consumer electronic products are increasingly using protective coatings as an economic method to improve product reliability. When the printed circuit assembly board without protective coating is exposed to humid air, a thick water molecular film will form on its surface, reducing the surface insulation resistance (SIR) of the circuit board. The lower the surface insulation resistance is, the worse the transmission performance of the electrical signal will be. The typical consequence is that it will cause crosstalk, electrical leakage and transmission interruption, which may lead to permanent interruption of the signal, namely short circuit. pcb board Circuit board The moisture film on the printed circuit board without protective coating also provides favorable conditions for metal growth and corrosion, which in turn will eventually affect the insulation strength and high-frequency signals. The dust, dirt and other environmental pollutants falling on the assembled PCB continuously absorb moisture, thus expanding its negative impact. Conductive particles such as metal fragments will also cause electrical bridging. Protective coating is a layer of coating wrapped around the PCB assembly board. The thickness of this film is 0.005in. It seals dust and environmental pollutants outside the circuit board. Of course, the protective coating may also seal the pollutants not removed in the pre cleaning process, so it is very important to clean the circuit board surface before applying the protective coating. The function of protective coating is as follows: 1) Protect the circuit from extreme environment to avoid the impact of moisture, fungi, dust and rust; 2) Prevent PCB from being damaged during fabrication, assembly and use, reduce the mechanical stress on PCB components and protect them from thermal oscillation; 3) Reduce wear during use; 4) As the protective coating increases the insulation strength between conductors, it strengthens the performance of the circuit board and allows greater component density. Just upload Gerber files, BOM files and design files, and the KINGFORD team will provide a complete quotation within 24h.
ESSENTIALAI-STEM
User:Vampirelord Ohayo Gozaimasu! How are ya? I tend to edit many articles and fix up spelling errors, you know, just in case you can't read it and all... I'm an Anime Freak ( yes, that is capitalized) and i like chocolatee and cheese... feel free to leave a comment... i'll probably respond, since I'm on often to check up on recent updates ( cause i like to read, not because i have no life, just so you know..)^^ I'll probably fix this up later...
WIKI
Page:United States Statutes at Large Volume 91.djvu/727 PUBLIC LAW 95-95—AUG. 7, 1977 may not be made with respect to a source which would close without regard to whether or not the proposed plan revision is approved. "(2) A temporary emergency suspension issued by a Governor under this subsection shall remain in effect for a maximum of four months or such lesser period as may be specified in a disapproval order of the Administrator. The Administrator may disapprove such suspension if he determines that it does not meet the requirements of this subsection. "(3) The Governor may include in any temporary emergency suspension issued under this subsection a provision delaying for a period identical to the period of such suspension any compliance schedule (or increment of progress) to which such source is subject under section 119 as in effect before the date of the enactment of this paragraph, or under section 113(d) upon a finding that such source is unable to comply with such schedule (or increment) solely because of the conditions on the basis of which a suspension was issued under this subsection.". 91 STAT. 693 Suspension period. Compliance schedule delay. Post, pp. 709, 712. Post, p. 705. IMPLEMENTATION PLANS SEC. 108. (a)(1) Section 110(a)(2)(A) of the Clean Air Act is Contents. amended by inserting "except as may be provided in subparagraph 42 USC 7410. (I) " after ' ' (A) ". (2) Section 110(a)(2)(B) of such Act is amended by striking out "land-use and" and by inserting after "transportation controls" the following: ", air quality maintenance plans, and preconstruction review of direct sources of air pollution as provided in subparagraph (D)". (3) Section 110(a)(2)(D) of such Act is amended by inserting after "(D) it includes" and before "a procedure" the following: "a program to provide for the enforcement of emission limitations and regulation of the modification, construction, and operation of any stationary source, including a permit program as required in parts C and D ai^d a permit or equivalent program for any major emitting facility, Post, pp. 731, within such region as necessary to assure (i) that national ambient air 746. quality standards are achieved and maintained, and (ii)". (4) Section 110(a)(2)(E) of such Act is amended to read as follows: " (E) it contains adequate provisions (i) prohibiting any stationary source within the State from emitting any air pollutant in amounts which will (I) prevent attainment or maintenance by any other State of any such national primary or secondary ambient \ air quality standard, or (II) interfere with measures required to be included in the applicable implementation plan for any other State under part C to prevent significant deterioration of air quality or to protect visibility, and (ii) insuring compliance with the requirements of section 126, relating to interstate pollution Post, p. 724. abatement:". (5) Section 110(a)(2)(F) of such Act is amended by striking out "and" before " (v) " and by inserting the following at the end thereof: "and (vi) requirements that the State comply with the requirements respecting State boards under section 128;" after "such authority;" Post, p. 725. (6)(A) Section 110(a)(2)(H) (ii) of such Act is amended by inserting after "to achieve the national ambient air quality primary or secondary standard which it implements" the following: "or to otherwise comply with any additional requirements established under the Clean Air Act Amendments of 1977". �
WIKI
Talk:Salvatore Fisichella Please don't use ALL CAPS! This is a polite request to the editor using ALL CAPS to put names etc. in upper and lower case. ALL CAPS is not used on WP because it looks bad typographically. Thanks! -- Klein zach 10:26, 22 July 2008 (UTC) Il ’’Bellini D’Oro’’ up until 1994 * I Premiati Francesco Pastura (alla memoria) Maria Gentile Franco Lo Giudice Gino Marinuzzi (alla memoria) Luciano Pavarotti Friedrich Lippmann Giulietta Simionato Ferruccio Tagliavini Joan Sutherland Tito Schipa (alla memoria) Giuseppe Di Stefano Leyla Gencer Margherita Carosio Giacomo Lauri Volpi (alla memoria) Caludio Muzio (alla memoria) Francesco Nicolosi * 1968 - Vittorio Gui * 1969 - Gianandrea Gavazzeni * 1971 - Elena Suliotis * 1972 - Montserrat Caballe * 1975 - Renata Scotto * 1977 - Mario Filippeschi * 1981 - Alfredo Kraus * 1985 - Gina Cigna * 1987 - Nicolai Gedda * 1988 - Richard Bonynge * 1989 - Fiorenza Cossotto * 1990 - June Anderson * 1991 - Mariella Devia * 1993 - Piero Cappuccilli * 1994 - Salvatore Fisichella Source - Libro: Premio Bellini D'Oro 1994, Teatro Massimo Bellini, Catania, 16 Ottobre 1994 Azienda Autonoma Provinciale Per L'Incremento Turistico. --Luis Miguel31 (talk) 19:54, 24 July 2008 (UTC) ***Please don't delete other people's comments*** This page is a record of discussions about this article so comments by other people should never be deleted. -- Klein zach 00:09, 25 July 2008 (UTC) Fisichella as a Bellini specialist The second paragraph now reads: "He is considered the only tenor during the 20th century to have played and sung the major opera roles of the cigno'' catanese Bellini." '' I think this needs further explanation under a new section. I've already discussed this with Luis Miguel31 on my talk page but I think we need to ask some questions here: -- Klein zach 00:04, 25 July 2008 (UTC) * 1. What are the 'major opera roles' of Bellini? Do they include Elvino in La Sonnambula? Has SF sung Elvino? Has he sung Salvini in Adelson e Salvini, Fernando in Bianca e Fernando, and Corasmino in Zaira? * 2. It's claimed that SF has sung Romeo in I Capuleti e i Montecchi - normally a mezzo role. Is there a reliable precedent/reference for this? * 3. Has SF sung more roles than Luciano Pavarotti (who recorded at least 5 parts - Arturo (Puritani), Pollione (Norma), Elvino (La Sonnambula), Orombello (Beatrice), and Tebaldo (I Capuleti e i Montecchi)), Nicolai Gedda (who recorded at least 4 parts - Arturo (Puritani), Elvino (La Sonnambula), Tebaldo (I Capuleti e i Montecchi), Pollione (Norma), and Orombello (Beatrice)), Giuseppe Di Stefano (who recorded Arturo (Puritani) +?), Tito Schipa (Elvino +?), Fernando De Lucia and the other bel canto specialists of the 20th century etc.? * He may be a Bellini specialist, but the article does not support this assertion: "He is considered the only tenor during the 20th century to have played and sung the major opera roles of the cigno catanese Bellini". First of all, the wording implies that no other tenors have sung leading Bellini tenor roles. Rockwell Blake, for example has performed on stage in La straniera, Il pirata, La Sonnambula, and I puritani. Secondly, it implies that Fisichella has sung all the major Bellini tenor roles. However, while Fisichella's repertoire list in the article lists Beatrice di Tenda, I Capuleti e i Montecchi (Romeo) and (Tebaldo), I puritani, Il pirata, La straniera and Norma (although no references are currently provided to verify this), it does not list Adelson e Salvini, Bianca e Fernando, Zaira and most importantly La sonnambula. Arguably the first three are relatively minor works (and very rarely staged today), but Sonnambula certainly isn't. * Even so I'd say that his total number of Bellini tenor roles performed on stage (I don't count studio recordings in this respect) is probably larger than any other 20th century tenor. As for Romeo in I Capuleti e i Montecchi, there is a tenor version of that role. Giacomo Aragall sang it a La Scala under Claudio Abbado in 1966. I think the quoted assertion above would be better rephrased to something like "No 20th century tenor has sung as many Bellini tenor roles on stage". But of course, the article needs to provide some kind of verification for all the roles sung. From the reviews and photographs on his Fisichella's web site, he certainly appears to have sung Norma, Straniera, Pirata, Puritani, and Beatrice di Tenda on stage. Beautiful voice, by the way! Voceditenore (talk) 10:57, 25 July 2008 (UTC) * This is what it says in the award (Bellini D'Oro Prize) given in 1994. * Azienda Autonoma Provinciale Per L'Incremento Turistico, Premio Bellini D'Oro 1994 Catania, 16 Ottobre 1994 - Ore 20,30 - Teatro Massimo Bellini, Le motivazioni del premio: * Salvatore Fisichella. "Continuatore ideale della grande tradizione vocale della provincia etnea, Salvatore Fisichella, dotato di straordinaria facilita e lucenterra, specie nel registro acuto e sovacuto, per come postura la scrittura musicale belliniana, risulta meritevole a pieno titolo del riconoscimento, per essere stato l'unico tenore del secolo ad aver interpretato in teatro i maggiori ruoli lirici del repertorio del Cigno catanese." * Luis Miguel31 (talk) 15:08, 25 July 2008 (UTC) * The problem is that even though the official prize says that, the way it's worded simply isn't true. To say in English (or Italian) that he is "the only tenor during the 20th century to have played and sung the major opera roles of the cigno catanese Bellini" means that no other 20th century singer has sung any leading tenor roles by Bellini. It also strongly implies that he's sung all the major Bellini tenor roles. If he hasn't sung Elvino in La sonnambula, then that isn't true either. Instead of using a translation of that quote as it stands. I would word the lead paragraph differently. In fact, I'm going to nip over the article and do it now, and then we'll see what you and other editors think of the new wording. Best, Voceditenore (talk) 16:36, 25 July 2008 (UTC) * The new wording clarifies this issue well, but it would be better to put the text in the 'Accolades, awards and distinctions' section where I think it belongs. -- Klein zach 00:08, 26 July 2008 (UTC) * Do you mean the original Italian text of the Bellini prize commentary which I had put in the ref for that rewording? I hadn't seen that the English version was already in the Accolade section. So, I removed it from the first ref and added it to the ref in the Accolade section. Wikipedia recommends that wherever possible, the original language text should be provided in a footnote, if an English translation has been used in the body of the article. Voceditenore (talk) 09:29, 26 July 2008 (UTC) * No, I meant "In 1994, he was awarded the Bellini D’oro prize . . . any other 20th century tenor." Normally this kind of thing goes in an awards section. Here it is given unusual prominence. -- Klein zach 11:39, 26 July 2008 (UTC) * Ah, I see what you mean. Have fixed it now. Best, Voceditenore (talk) 12:25, 26 July 2008 (UTC) Copyviol: Biography sections copied and pasted from www.salvatorefisichella.it The Biography sections have all been copied and pasted from http://www.salvatorefisichella.it/biography.html in a potential copyright violation. Is there any reason why they shouldn't be removed? -- Klein zach 00:27, 25 July 2008 (UTC) * I refer to you message above, which is noted. Please note that it is not a copyright violation as I represent Maestro Salvatore Fisichella here in wikipedia. All the materials I have (texts, newspapers clippings, other sources) came from him. At the same time, I have been cross referencing this with other websites along the way to make the article verifiable. This is a serious article. I am very new here in wikipedia and I feel that you are harrassing me. You have been visiting and editing this article some days after I set up the article here in wiki. You would notice & edit my formatting and other small things,... You have been coming to this article every day with small edits. WE had a discussion yesterday of the entry of SF being the foremost perfomer of Bellini's works in the 20th century (1901-1999) and about the Sicilian Tourist Authories awarding him that prize (and the former being the motivation for the award). I have proven these with newspaper articles and other references.... but, in you opinion, you are not convinced.... And today, it seems very odd that you now accuse the article of copyright violation ...even after several edits you've made.... I have cited my sources...and you can find them entered under sources. This is frustrating me.... I do hope you do not work for the Wikipedia, as you put them in a bad light with the way you are behaving.... Please do not tag the article with vandalism or whatever.... We are all adults here and I believe we should act our age. —Preceding unsigned comment added by Luis Miguel31 (talk • contribs) 08:15, 25 July 2008 (UTC) -Luis Miguel31 (talk) 08:24, 25 July 2008 (UTC) * First of all stop deleting the Copy and Paste tag. As the article now stands it's a copy from another website and that isn't allowed on WP. If Fisichella has really authorized the use of the material he should contact WP. Until that happens you should remove the material. The same goes for the pictures. I am currently editing several pages and articles. I don't have a particular interest in this page. I found it by accident and saw that it it had multiple problems -hence my involvement. -- Klein zach 08:28, 25 July 2008 (UTC) * I will ask him to contact Wikipedia NOW. Kindly refrain from further tagging/ vandalizing this article. —Preceding unsigned comment added by Luis Miguel31 (talk • contribs) 08:32, 25 July 2008 (UTC) * Luis, it doesnt matter whether you are representing him or not. What you can do is to do some editing in the wording, so it sounds a bit different. From what I see, his biography now is a replica of http://www.salvatorefisichella.it/biography.html. This is not allowed in Wikipedia. - Jay (talk) 08:37, 25 July 2008 (UTC) * One more, could you please justify the usage of "fair use" for all the images in the article? Not only you cant copypaste the text, you cant upload photos without the permission of the owner, in this case, The Met or the photographer. - Jay (talk) 08:51, 25 July 2008 (UTC) * : The user named Storkk helped me on that already. Thank you for your concern. --Luis Miguel31 (talk) 09:17, 25 July 2008 (UTC) Once again: Don't delete! Luis Miguel31: Once again don't delete sections as you did here. That is considered disruptive on WP. -- Klein zach 07:55, 25 July 2008 (UTC) Do not raise your tone on me.... You do not have the right to write to me in that tone. Please refrain. I am not a blogger, a chatter of any sort. .. --Luis Miguel31 (talk) 08:18, 25 July 2008 (UTC) Please put the biography section in userspace Luis Miguel31: If you intend to rewrite the biography section to meet WP requirements, can you please do that in your own userspace? In the meantime can you remove the copy and pasted 'copyviol' material? -- Klein zach 08:49, 25 July 2008 (UTC) * Dear Kleinzach, * I've already asked Mr. Fisichella to e-mail Wikepedia<EMAIL_ADDRESS>info@wikimedia.org). I shall move the biography for now. --Luis Miguel31 (talk) 09:22, 25 July 2008 (UTC) * Thank you. Can you also clarify about the pictures? Perhaps they should also go onto your user page if they are not public domain? -- Klein zach 10:02, 25 July 2008 (UTC) FYI Da: Salvatore Fisichella<EMAIL_ADDRESS>Inviato: venerdì 25 luglio 2008 12.04 A<EMAIL_ADDRESS><EMAIL_ADDRESS>Oggetto: authorization about use my materials in wikipedia Dear Sir/MadameI refer to the english article written about me, Salvatore Fisichella.Please note thatI hereby authorized the use of the materials found in my own website's biography page,which is www.salvatorefisichella.it/biography.hyml, for use in the article written about me in your website. Salvatore Fisichella —Preceding unsigned comment added by Luis Miguel31 (talk • contribs) 10:11, 25 July 2008 (UTC) * We shall wait for the reply from Wikipedia. Thank you. --Luis Miguel31 (talk) 10:15, 25 July 2008 (UTC) Style problems: making this more encyclopedic and less like a fan site Assuming the copyright problems for both pictures and biography text have been resolved (have they?), we need to consider how to make this more like a proper encyclopedia article - which has to be neutral in tone and less like a fan site (full of hyperbole etc). How are going to do this? -- Klein zach 10:15, 28 July 2008 (UTC) * I see the Fansite and Fancruft tags have been removed - unfortunately the style of the article remains unencyclopedic. An article in WP should really be factual. -- Klein zach 23:27, 30 July 2008 (UTC) Typography problems Tis article still has lots of typography problems. Please note that on Wikipedia we italicize names of operas (e.g. Tosca) but names of people and roles etc. are in roman (e.g. Verdi, Iago). -- Klein zach 13:09, 1 August 2008 (UTC) Permission granted Through the OTRS system, the following content has been released under the General Free documentation license. http://www.salvatorefisichella.it/biography.html. —— nix eagle 19:44, 3 August 2008 (UTC) Revisiting 2008 discussion Same problems persist. The text copied from the subject's website is not acceptable, per WP:RELIABLE, WP:NPOV and WP:COI. I've tagged it, and will likely take it to the BLP noticeboard, since this has persisted for years. <IP_ADDRESS> (talk) 15:47, 18 February 2013 (UTC)
WIKI
gst-plugins : plug-ins for GStreamer * to develop against uninstalled GStreamer core : add path to gstreamer-uninstalled.pc to PKG_CONFIG_PATH or run configure --with-pkg-config-path=(path to gstreamer uninstalled) * to register plug-ins in source tree run gst-register --gst-plugin-path=. * if a certain plug-in doesn't build, then redo configure with --disable-(plug-in) to disable it from the build * Additional documentation : GStreamer is developed under the terms of the LGPL (see LICENSE file for details). Some of our plug-ins however rely on libraries which are available under other licenses. This means that if you are using an application which has a non-GPL compatible license (for instance a closed-source application) with GStreamer, you have to make sure not to use GPL-linked plug-ins. When using GPL-linked plug-ins, GStreamer is for all practical reasons under the GPL itself. The plug-ins which use a GPL library are as follows: cdparanoia libcdparanoia (http://www.xiph.org/paranoia/) aasink aalib (http://aa-project.sourceforge.net/aalib/) xmms libxmms (http://www.xmms.org) decdvd ac3dec,mpeg2dec (http://linuxvideo.org/mpeg2dec/,http://linuxvideo.org/ac3dec/)a Plug-ins which use an LGPL library are as follows: colorspace Hermes (http://www.clanlib.org/hermes/) httpsrc libghttp (ftp.gnome.org/pub/GNOME/stable/sources/libghttp/) alsasink alsa (http://alsa-project.org) arts aRts (http://arts-project.org) sdlsink libsdl (http://www.libsdl.org) gnomevfssource gnome-vfs (ftp.gnome.org//pub/GNOME/stable/sources/gnome-vfs) gnomevfssink gnome-vfs esdsink libesd (ftp.gnome.org/pub/GNOME/stable/sources/esound) icastsend libshout (http://www.icecast.org) lame libmp3lame (http://www.mp3dev.org/mp3/) gst1394 libraw1394 (http://linux1394.sourceforge.net) flac libFLAC (http://flac.sourceforge.net) RTP ortp (http://www.linphone.org/ortp/) Plug-ins which use a BSD covered library are as follows: vorbisenc libogg/libvorbis (http://www.xiph.org/ogg/vorbis) vorbisdec libogg/libvorbis Plug-ins based on libraries with other free licenses: xvideosink libXv (MIT X11 / X Consortium license) gsm libgsm (MIT license http://kbs.cs.tu-berlin.de/~jutta/toast.html) Plug-ins using non-free libraries: wincodec win32ddl (http://divx.euro.ru/)
ESSENTIALAI-STEM
Prafulla Kumar Sen Prafulla Kumar Sen (died 24 March 1942), also known as Swami Satyananda Puri, was an Indian revolutionary and philosopher. Puri, had in his youth taught Oriental philosophy at the University of Calcutta and later at Rabindranath Tagore's Visva-Bharati University at Santiniketan. Encouraged by Tagore, he arrived in Thailand in 1932, and in 1939, he founded the Thai-Bharat Lodge, a cultural forum. Arriving in Thailand, Puri was appointed a professor at the Chulalongkorn University, lecturing in ancient Indian and Thai languages, and is said to have mastered the Thai Language in six months and went on to translate a number of Indian philosophical works and biographies, including the Ramayana and biographies of Gandhi to Thai. His literary work eventually was more than twenty volumes. At the onset of World War II in 1939, Puri also came to form the Indian National Council that, along with Giani Pritam Singh's Indian Independence League, was instrumental in stimulating the evolving Japanese interest in supporting armed Indian resistance for the Indian freedom movement. Singh and Puri were amongst the first people to negotiate with Fujiwara Iwaichi and the F Kikan regarding Japanese policies in an effort to obtain a commitment about the support of the movement that ultimately saw the foundation of the Indian Independence League and the Indian National Army. Both Puri and Pritam Singh were among the Indian delegates killed in a plane crash en route to the Tokyo conference in March 1942. The Swami Satyananda Puri foundation was established by the Thai-Bharat Cultural Lodge in 1942 in his honour. The SSPF library today is a reference library that houses many old and rare Indian texts. The foundation is also involved in promoting work on Indian culture, especially on the Ramayana.
WIKI
Colville Lake (Northwest Territories) Colville Lake is the 20th largest lake in Canada's Northwest Territories. The lake is located 100 km northwest of Great Bear Lake in the Sahtu Region. The lake has a perimeter of 121 km [http://atlas.nrcan.gc.ca/site/english/maps/topo/map?mapsize=428%20380&lat=67.1668013986&long=-126.0020631&mapxy=-1250248.09262+2290217.29876&scale=5000000&feature_na=Colville+Lake&location1=61&unique_key=0c74b759849c20c3462fb84428a2a84d&searchstring=Colville%20Lake&entity=LAKE&layers=fapfeature+fapfeature%20north_arrow%20other_features%20million_grid%20t50k_grid%20grid_50k_3%20roads%20hydrography%20boundary%20builtup%20vegetation%20populated_places%20railway%20power_network%20manmade_features%20designated_areas%20water_features%20water_saturated_soils%20relief%20contours%20toponymy%20contour%20nodata_ntdb_50k&urlappend=%26map_textzoom03_feature%3Dnew%26map_textzoom03_feature_points%3D-1252733.03122+2290803.32319%26map_textzoom03_class_text%3DColville%2BLake%26map_textzoom46_feature%3Dnew%26map_textzoom46_feature_points%3D-1252733.03122+2290803.32319%26map_textzoom46_class_text%3DColville%2BLake%26map_polygonresultzoom0_data%3Dfap_lakes%26map_polygonresultzoom0_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_polygonresultzoom1_data%3Dfap_lakes%26map_polygonresultzoom1_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_polygonresultzoom2_data%3Dfap_lakes%26map_polygonresultzoom2_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_polygonresultzoom0outline_data%3Dfap_lakes%26map_polygonresultzoom0outline_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_polygonresultzoom1outline_data%3Dfap_lakes%26map_polygonresultzoom1outline_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_polygonresultzoom2outline_data%3Dfap_lakes%26map_polygonresultzoom2outline_class_expression%3D0c74b759849c20c3462fb84428a2a84d%26map_arrowzoom03_feature%3Dnew%26map_arrowzoom03_feature_points%3D-1252733.03122+2290803.32319 Map of Colville Lake at the] Atlas of Canada and a net area of 416 km2 and a total area of 439 km2. The only community on the lake, Colville Lake, which is the Sahtu Dene village of 126 and is located on the southeast shore, along with Colville Lake/Tommy Kochon Aerodrome and Colville Lake Water Aerodrome. Like the community it is named for Andrew Colvile.
WIKI
Small investments in protective covers and tools can spare assemblers the cost of repairing accidental damage to finished goods. “Accidents are caused; they do not happen.” That was one my father’s favorite aphorisms when I was growing up. Hindsight being 20/20, perhaps I could have avoided breaking that pool cue or throwing a baseball through our kitchen window. Be that is it may, accidents do happen, particularly in the hustle and bustle of a high-volume assembly plant. Seemingly minor accidents-such as a power tool slipping off a fastener and marring a Class A finished surface-can cost an assembler thousands of dollars annually. A scratch just 1 centimeter long costs, on average, $175 to repair. Of course, that’s chump change if a scratched or dented assembly reaches the consumer. The cost of warranty claims, lost sales and consumer goodwill is incalculable. Fortunately, there are ways to protect assemblies from accidental dings and scratches. A small investment in protective coverings can save assemblers thousands in repair bills. This urethane pad was custom-made to hold a vehicle door as it’s transported down the assembly line. Photo courtesy Exotic Automation & Supply Protective Films One way engineers can protect finished surfaces is by covering them with a thin plastic film. Protective films are typically made from low-density polyethylene, but they can also be made from polyvinyl chloride, polypropylene or polyethylene. The films protect against dirt and grease from hands and boots, scratches during handling, and impacts from small objects, such as stray fasteners. The films are backed with a light, pressure-sensitive adhesive that has just enough tack to stick to the parts, but not so much that it leaves behind a residue or damages the surface upon removal. The adhesive is typically a low-tack water-based acrylic, but a variety of adhesive formulations is available, depending on the type and texture of the surface to be protected. “We have films for LCD screens that provide just 1 ounce of tack,” explains Rick Pietrykowski, president of Surface Armor LLC, a supplier of protective films. “To put that in perspective, masking tape has 34 ounces of tack and duct tape has 65 ounces of tack.” Protective films can be die-cut by the supplier, or they can be cut to shape on the shop floor. On the assembly line, films are usually applied manually, but some sheet metal suppliers can apply the film to steel or aluminum with a laminator as it’s being rolled. In the automotive industry, protective films are applied to glass, seats, armrests, steering wheels, carpeting and painted surfaces, especially doors, fenders and bumpers. Aerospace manufacturers apply the films to carpets, windows, seats and canopies. Appliance assemblers use the films to protect buffed or brushed aluminum, stainless steel, painted metal, and glossy plastic housings. In the electronics industry, the films protect flat-panel displays, cell-phone lenses, touch screens, and metal and plastic frames and housings. “Some computer parts are so highly polished, they show scratches like you wouldn’t believe,” says Pietrykowski. Engineers are well-advised to test a variety of material and adhesive combinations before choosing a protective film for their application. The choice of film and adhesive depends on the base material, paint, surface texture, mold release agents, location, environmental factors, length of service, and costs. Pietrykowski also stresses that protective films are intended for temporary use: Even low-tack pressure-sensitive adhesives can become more aggressive with age. This protective film is backed with a light, pressure-sensitive adhesive that has just enough tack to stick to the parts, but not so much that it leaves behind a residue. Photo courtesy Surface Armor LLC Reusable Plastic Shields Protective films are typically applied after a product is fully assembled. However, more robust protection is often required on the assembly line, where fixtures, air hoses, nutrunners, sockets and even belt buckles represent hazards to carefully finished paint jobs. Reusable plastic shields provide that extra protection. A good example is the HardGuard line of shields from Apogee Designs Ltd. The shields consist of two layers. The impact-resistant outer layer is made from a proprietary blend of rigid high-density polyethylene and other resins. The material is hard enough to withstand a hit from a screwdriver dropped from a height of 32 inches without damage. The soft inner layer is made from an energy-absorbing foam. The closed-cell foam doesn’t soak up fluids, and it has a high coefficient of friction, so it won’t slip off body pillars and other vertical surfaces. Each shield is custom-made to fit a specific part, explains Nathan Baturka, HardGuard program manager. Apogee can produce a shield from a sample part or directly from CAD data. After the outer layer has been thermoformed and trimmed, the foam is cut to shape and bonded to the inside surface. Manufacturers of cars, trucks, buses, motorcycles, military vehicles and even heavy equipment use plastic shields to protect fenders, fascias, doors, pillars, deck lids, steering wheels, instrument panels, radios and other finished or painted parts. The shields are less commonly used in the white-goods industry, where they are applied to refrigerator doors and other large, finished parts. The shields stay in place by keying on particular part features, such as edges or gaps. If necessary, nonmarring suction cups can be added to keep the shield in place. Shields can do more than just protect a part. Apogee has molded shields with features or pockets to hold tools, documents and transponders. “We spend a lot of time with our customers to understand their process,” says Baturka. “Are people leaning over the vehicle? If so, what spots are they touching? Only then can we determine the best methods of protection.” Shields aren’t only applied to parts and assemblies. They’re also applied to power tools, hose fittings and the tooling that holds and transports finished parts on the assembly line. Exotic Automation & Supply has been making such products since 1963. The company’s portfolio of custom-made products includes carrier pads, finger bumper strips, wear pads, body rest pads, rollers, rail covers and bumper pads. The products are molded or machined from urethane, plastic or foam. “We work with a wide range of materials that absorb energy and prevent scratches, dings and dents,” says Henry G. Testa, sales manager at Exotic Automation. “We work with our customers to identify where the damage is coming from, and then we come up with a tooling aid to eliminate the problem.” Like shields applied directly to parts, pads for tooling are typically made for a specific product. “If the part stays the same, you can reuse them,” says Testa. “But usually, the part changes shape, so you need a new pad to nest it. Typically, our pads last the life of a program, or about five to seven years.” Nonmarring Sockets Fastening tools don’t have to be dropped or dragged across a finished surface to cause damage. Just using the tool is enough to do harm. When the spinning socket rubs against the surface, it can leave behind a nasty circular scratch. Production Tool Co. has created a line of sockets that prevents this problem. The socket is covered with a free-spinning, nonmarring plastic sleeve that prevents metal-to-metal contact between the tool and the part. The plastic is soft enough to avoid scratching, but tough enough for constant use on an assembly line. The socket also contains a strong neodymium magnet that holds the fastener securely in place. This helps the assembler locate the hole and prevents the socket from slipping off the fastener during run-down. It also prevents dropped fasteners. An additional benefit of the free-spinning sleeve is operator safety, says Ron Carpenter, president of Production Tool. The sleeve eliminates pinch points that can snag threads from work gloves. “That tool could be spinning at over 1,000 rpm. If your glove gets caught, you could lose a finger,” says Carpenter, whose company also makes a line of nonmarring gap and flushness gauges. In the automotive industry, the sockets are used to install fasteners on the “B column” for door locks and striker plates. They’re also used to install air bags, quarter panels, fenders, alloy wheels, wheel covers, seats, seat belts, shoulder belts, visors, and the bed to a pickup truck frame. ASSEMBLY ONLINE For more information on fastening and damage prevention, visit www.assemblymag.com to read these articles: • Elastomeric Materials Protect Portable Electronics. • Avoiding ESD During Fastening. • How to Select the Best Joining Method for Your Assembly.
ESSENTIALAI-STEM
Talk:MAX Orange Line/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Reviewer: Gerald Waldo Luis (talk · contribs) 04:18, 5 January 2021 (UTC) I'll be reviewing this article. Note that my timezone is UTC+7. Gerald WL 04:18, 5 January 2021 (UTC) Images * The image File:Lawn sign supporting 1998 ballot measure for TriMet's then-planned South-North MAX project.jpg, used at the "Failed South/North Line" subsection, is currently nominated for deletion in Wikimedia Commons, concerning whether or not the image is actually de minimis., the nominator, also adds "The image of the streetcar is problematic." Although I think it is certainly de minimis, this must be addressed. Gerald WL 04:23, 5 January 2021 (UTC) * ✅ I've removed it. * Cannot the image simply be reduced to satisfy the issue? I would do so myself, but I have no idea how much reduction is considered necessary. I feel this image is a helpful and appropriate inclusion. – SJ Morg (talk) 11:02, 6 January 2021 (UTC) * , for now it's best to remove that image first. If the deletion nomination has been addressed and it's kept, it can be restored. Gerald WL 11:08, 6 January 2021 (UTC) * This is forced to be done since GAs must not have copyright violations, in which the file is tagged for as of now. Gerald WL 11:09, 6 January 2021 (UTC) * My question was directed at Truflip99, not the GAN reviewer. Removal of the questioned image is an easy solution, but is not the best solution, in my view. – SJ Morg (talk) 07:18, 7 January 2021 (UTC) Lead * Capitalize "States". Gerald WL 07:27, 5 January 2021 (UTC) * ✅ WOW, thanks for catching that. *facepalm* --truflip99 (talk) 08:03, 5 January 2021 (UTC) * "...just outside of Milwaukie proper in unincorporated Clackamas County." what does "proper" and "unincorporated" mean? Unfamiliar with the geography of the US, thus I'm unfamiliar with these terms. Gerald WL 07:27, 5 January 2021 (UTC) * ✅ I've added the appropriate wikilinks. Should suffice for GA. * Why is "car-free" in quotations? If it is what I think it is, suggest linking to Pedestrian zone. Gerald WL 07:27, 5 January 2021 (UTC) * It is not entirely car-free. This is explained in the body. * "...as a northbound service of the transit mall"-- Is that all good, or is the name of the mall literally Transit Mall? If so, it must be capitalized. Gerald WL 07:27, 5 January 2021 (UTC) * "Portland Transit Mall" is the proper name, while "transit mall" is a common noun (i.e. Portland, the city... Portland Transit Mall, the transit mall) * Recommend linking Tilikum Crossing in the infobox image caption. Gerald WL 07:27, 5 January 2021 (UTC) * I think since it's already in the lead, it's not necessary. Idk I've just been following the style of older FA articles (like Line 1 (Sound Transit)) * Daily ridership parameter in infobox has it "as of", but lead says "in September 2019." In means that it carried 11,000 during that month, while as of means that it carried 11,000 from its opening up to 2019. Gerald WL 07:27, 5 January 2021 (UTC) * Per the template's usage: "The template ... is used to mark potentially dated statements, and will add an article to the appropriate hidden sub-category of Category:Articles containing potentially dated statements. This allows editors to catalogue statements that may become dated over time." * Suggest linking At-grade railway and Elevated railway at the infobox "Character" parameter. Gerald WL 07:27, 5 January 2021 (UTC) Thank you very much for picking this up! --truflip99 (talk) 08:03, 5 January 2021 (UTC) * , you're welcome! That train looks awesome. Not the red one, of course. Gerald WL 08:08, 5 January 2021 (UTC) I'll start reverse here, from Services to History, from short to long. Service * "..supplemented by TriMet bus route 291–Orange Night Bus"-- that's the bus route name? "291–Orange Night Bus"? Aren't buses only marked by numbers? Gerald WL 08:26, 5 January 2021 (UTC) * Yes. TriMet likes to be unique in this way I think. * This is not remotely unusual in the United States. Many (maybe even a majority of) urban transit systems give both numbers and names to routes. I realize this is very unusual in Europe (according to my British friends), but it is very common in the United States (and Canada). – SJ Morg (talk) 10:49, 6 January 2021 (UTC) * "The Orange Line is the least busy MAX service"-- suggest changing "service" to "line". Gerald WL 08:26, 5 January 2021 (UTC) * I use "service" instead of "line" because American light rail systems are unique in that lines frequently overlap and it just helps with differentiating that fact. Not a fan of them doing this either. * Ref 108 reads "Predicted riders not showing up". Of course, Oregonian! TriMet are not time travellers! Gerald WL 08:26, 5 January 2021 (UTC) * Indeed. The issue is, ridership predictions are used to ask for money from citizens and the US government to build these lines, and since TriMet couldn't meet its predictions after building the line, people were upset. * I've heard many things about US public transport. Especially New York-- Gerald WL 06:03, 6 January 2021 (UTC) Route * So the map caption has an external link. WP:ELPOINTS says that "external links should not be used in the body of an article", with "rare exceptions" and with suggestion of using Template:External media, or having it as a reference. Does this case fall under the rare exception? Gerald WL 08:26, 5 January 2021 (UTC) * Nah, omitted. * "...although most northbound Orange Line trains through operate into the Yellow Line." Why the "through"? Gerald WL 08:26, 5 January 2021 (UTC) * It's a rail term: Through train * , but it reads: "trains through". Shouldn't it be "through trains"? Gerald WL 06:01, 6 January 2021 (UTC) * A "though train" (noun) "through operates" (phrasal verb) into another line. --truflip99 (talk) 06:14, 6 January 2021 (UTC) * Duplicate ref 88. Gerald WL 08:26, 5 January 2021 (UTC) * Where at? * , Stations para 1. Gerald WL 01:12, 6 January 2021 (UTC) * Found it! Thank you --truflip99 (talk) 04:33, 6 January 2021 (UTC) * Multi images: trivial, but I recommend replacing the Southeast Bybee Boulevard image with South Waterfront/Southwest Moody's, as it is the median of the station list. This is trivial, though. Gerald WL 08:26, 5 January 2021 (UTC) * I agree, but there aren't any good pics of that station... * All are commenced in 2015. Perhaps just merge them all? Gerald WL 08:26, 5 January 2021 (UTC) * Just following the style of other GA/FA articles * Hmm... but if you could make this more refreshed, why not? :) Gerald WL 06:01, 6 January 2021 (UTC) * Fair point. ✅ --truflip99 (talk) 06:27, 6 January 2021 (UTC) * I would have another legend in the Key table, in white, that reads "Northbound travel only", if that is what white symbolizes. Gerald WL 06:05, 6 January 2021 (UTC) * White/no color means both directions, as in normal service. --truflip99 (talk) 06:49, 6 January 2021 (UTC) * , that would have to be noted. Otherwise people (like me) will think that unmarked stuff are northbounds. Gerald WL 06:52, 6 January 2021 (UTC) * Given the topic, I really don't think it's necessary. It's fair assumption for any station in any part of the world to be served by trains running bi-directionally unless otherwise noted. Plus if that were the case, I would have added a "↑" icon next to those stations and a "Northbound only" key to indicate that. Please note that MAX Yellow Line and MAX Red Line both achieved FA without this being necessary. --truflip99 (talk) 07:04, 6 January 2021 (UTC) * , got it. I think I misread the article initially, assuming that it's southbound platform and not station. * Last thing I would suggest, is merging the yellow and green circles. After that I'll do a last checkup. Gerald WL 07:39, 6 January 2021 (UTC) * ❌ I've already tried that in the two years I've been tweaking these tables, and trust me when I say it just doesn't look as good. :) Plus there is no wiki MOS to say what this should look like. truflip99 (talk) 08:44, 6 January 2021 (UTC) * , roger that. Will do a last check; should be done soon as I read articles too fast in the last minute. Gerald WL 08:51, 6 January 2021 (UTC) * , roger that. Will do a last check; should be done soon as I read articles too fast in the last minute. Gerald WL 08:51, 6 January 2021 (UTC) Early proposals to Clackamas County * Since it's referred to as "the Columbia Region Association of Governments", the abbreviation must be "the CRAG", not just "CRAG". Gerald WL 13:32, 5 January 2021 (UTC) * Common usage omits the "the" in this case * The omission of "the" is fairly common when an initialism can be pronounced as a word, which applies here. The abbreviated name of this entity is commonly spoken as "crag" (but written CRAG, of course). – SJ Morg (talk) 10:54, 6 January 2021 (UTC) * Link light rail. Gerald WL 13:32, 5 January 2021 (UTC) * Suggest removing "regional government" after the word "Metro". Gerald WL 13:32, 5 January 2021 (UTC) * I used to not have it, but previous reviewers have insisted on its use to avoid confusion. I moved it to precede "Metro" though. Failed South/North Line * "That November, "nearly two-thirds" of Oregon voters"-- perhaps "Oregonian voters"? Gerald WL 13:32, 5 January 2021 (UTC) * "...to provide Oregon's local-area"-- Link Oregon? Gerald WL 13:32, 5 January 2021 (UTC) * May not be necessary as other GA/FA articles don't do this? Not quite sure about this one tbh, just following other styles. Revival and funding * "Metro, TriMet, Clackamas County, the cities of Portland and Milwaukie, and in-kind"-- suggest removing "the cities of", and change "and" with a comma. Gerald WL 13:32, 5 January 2021 (UTC) Construction and opening * "By that July, the project had reached 50-percent completion." Suggest changing to 'By that July, the project had been completed by 50%." I'm personally not a fan of alphebatizing percents, but if that's preferred you may keep that part. Gerald WL 13:32, 5 January 2021 (UTC) * ✅ I agree with you here. I've switched back and forth between spelling it out and not, just right now all of my articles spell it out. Do you know if there is a definitive wiki style for this? --truflip99 (talk) 19:33, 5 January 2021 (UTC) To add, I think I'll have to remove the majority of your archived links as they are already archived in the Newsbank database, and it would effectively be an archive of an archive. --truflip99 (talk) 19:35, 5 January 2021 (UTC) * , that would be fine. However if the URL has a rot potential, it's best to not remove it. Gerald WL 06:26, 6 January 2021 (UTC) Final check , this article is all good for GA. Just some more points: * Explanatory note c has an inappropriate boldface. Mind italicizing and unbolding, or just completely unbold? * Some sources need archive. They are ref: 32, 70, 83, 92, 93, and 99. * I will go ahead and do these once Wayback Machine stops lagging. Please note that archiving is not a pre-requisite to GA status. With that said, I always have archiving as part of my to-do list for articles that I eventually wish to push through to FA review. --truflip99 (talk) 16:38, 6 January 2021 (UTC) Gerald WL 11:28, 6 January 2021 (UTC) * Perhaps can help with the archiving. I am only able to archive one source manually: Toolforge doesn't archive the 6 sources above, and the Wayback Machine lags my laptop when I process it. Gerald WL 11:30, 6 January 2021 (UTC) Are you still waiting on a pending item? Did I miss anything? --truflip99 (talk) 15:44, 7 January 2021 (UTC) * , 'pologies the wait! I'm currently on mobile, so it's gonna be hard to GA it. Need to move to the desktop first, so be patient. By afternoon UTC+7 I'll push this up. Anyway, since you have the MAX article and the line articles all G or FA, dp you plan to make them a featured topic? Just wondering. Gerald WL 01:11, 8 January 2021 (UTC) * , I have erected the GA circle for this article. Congrats! Gerald WL 14:36, 8 January 2021 (UTC) * Thanks again for the thorough review of this article. I'm quite impressed with the things you've caught having actively edited on WP for just the past year. Good luck on your projects here, and should you want any assistance please don't hesitate to leave me a message. And yes, I do plan to pursue Good/Featured Topic in the future, when I'm less lazy :D --truflip99 (talk) 18:59, 8 January 2021 (UTC)
WIKI
blob: 145efe6f602b843fdfbb2e6f324a0d2a90c1d52b [file] [log] [blame] /* * Copyright 2014 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef ANDROID_GUI_BUFFERITEM_H #define ANDROID_GUI_BUFFERITEM_H #include <EGL/egl.h> #include <EGL/eglext.h> #include <ui/Rect.h> #include <ui/Region.h> #include <system/graphics.h> #include <utils/Flattenable.h> #include <utils/StrongPointer.h> namespace android { class Fence; class GraphicBuffer; class BufferItem : public Flattenable<BufferItem> { friend class Flattenable<BufferItem>; size_t getPodSize() const; size_t getFlattenedSize() const; size_t getFdCount() const; status_t flatten(void*& buffer, size_t& size, int*& fds, size_t& count) const; status_t unflatten(void const*& buffer, size_t& size, int const*& fds, size_t& count); public: // The default value of mBuf, used to indicate this doesn't correspond to a slot. enum { INVALID_BUFFER_SLOT = -1 }; BufferItem(); ~BufferItem(); static const char* scalingModeName(uint32_t scalingMode); // mGraphicBuffer points to the buffer allocated for this slot, or is NULL // if the buffer in this slot has been acquired in the past (see // BufferSlot.mAcquireCalled). sp<GraphicBuffer> mGraphicBuffer; // mFence is a fence that will signal when the buffer is idle. sp<Fence> mFence; // mCrop is the current crop rectangle for this buffer slot. Rect mCrop; // mTransform is the current transform flags for this buffer slot. // refer to NATIVE_WINDOW_TRANSFORM_* in <window.h> uint32_t mTransform; // mScalingMode is the current scaling mode for this buffer slot. // refer to NATIVE_WINDOW_SCALING_* in <window.h> uint32_t mScalingMode; // mTimestamp is the current timestamp for this buffer slot. This gets // to set by queueBuffer each time this slot is queued. This value // is guaranteed to be monotonically increasing for each newly // acquired buffer. union { int64_t mTimestamp; struct { uint32_t mTimestampLo; uint32_t mTimestampHi; }; }; // mIsAutoTimestamp indicates whether mTimestamp was generated // automatically when the buffer was queued. bool mIsAutoTimestamp; // mDataSpace is the current dataSpace value for this buffer slot. This gets // set by queueBuffer each time this slot is queued. The meaning of the // dataSpace is format-dependent. android_dataspace mDataSpace; // mFrameNumber is the number of the queued frame for this slot. union { uint64_t mFrameNumber; struct { uint32_t mFrameNumberLo; uint32_t mFrameNumberHi; }; }; union { // mSlot is the slot index of this buffer (default INVALID_BUFFER_SLOT). int mSlot; // mBuf is the former name for mSlot int mBuf; }; // mIsDroppable whether this buffer was queued with the // property that it can be replaced by a new buffer for the purpose of // making sure dequeueBuffer() won't block. // i.e.: was the BufferQueue in "mDequeueBufferCannotBlock" when this buffer // was queued. bool mIsDroppable; // Indicates whether this buffer has been seen by a consumer yet bool mAcquireCalled; // Indicates this buffer must be transformed by the inverse transform of the screen // it is displayed onto. This is applied after mTransform. bool mTransformToDisplayInverse; // Describes the portion of the surface that has been modified since the // previous frame Region mSurfaceDamage; }; } // namespace android #endif
ESSENTIALAI-STEM
Mariane Petersen Mariane Petersen (born 1937 ) is a Greenlandic poet, translator, museum curator, and politician. Biography Petersen was born in Maniitsoq, a town in western Greenland that was then known as Sukkertoppen. She is trained as a translator and has translated various books from Danish into Greenlandic. Significant works of translation include Vinterbørn by Dea Trier Mørch and Århundradets kärlekssaga by Märta Tikkanen. She also worked for many years as a curator at the Greenland National Museum, serving as director from 1982 until her retirement in 2004. In 1988 she published her first volume of poetry, Niviugaq aalakoortoq allallu. It was the first poetry collection published by a woman in Greenlandic. For this work, she was nominated for the Nordic Council Literature Prize in 1993. That year she published Inuiaat nunaallu, an epic poem bout the history of Greenland, followed by the collection Asuliivik asuli in 1997. In 2012, she was honored with the Frederik Nielsen Memorial Fund's 10,000-kroner prize. Her latest work, Piniartorsuit kinguaavi, was also nominated for the Nordic Council prize in 2013, though she lost to the Danish-Norwegian author Kim Leine. Petersen's poetry is generally humorous in tone and often deals with everyday life in Greenland. She writes in both Greenlandic and Danish, translating her own work. She is also a politician, having previously sat on the Nuuk Municipal Council. Poetry * 1988: Niviugaq aalakoortoq allallu * 1993: Inuiaat nunaallu * 1997: Asuliivik asuli * 2010: Piniartorsuit kinguaavi taallat/Storfangernes efterkommere Translations * 1977: Svend Otto S.: Tim og Trine, translated as Tim aamma Trine * 1978: Dea Trier Mørch: Vinterbørn, translated as Íssip nalâne inúngortut * 1980: Mogens Hoff: Børnene ved Krokodillesøen, translated as Meeqqat kuukkooriarsuit tasiata sinaamiut * 1981: Barbro Sedwall: Fiskarbarn, translated as Aalisartukkut paniat * 1981: Ole Hertz: Tobias pa sælfangst, translated as Tuppiarsi puisinniartoq * 1981: Ole Hertz: Tobias fisker fra isen, translated as Tuppiarsi sikumi aalisartoq * 1986: Aage Gilberg: Verdens nordligste læge, translated as Avanersuarmi nakorsaq * 1988: Glen Rounds: The Blind Colt, translated as Hesti piaraq tappiitsoq * 1989: Märta Tikkanen: Århundradets kärlekssaga, translated as Asanninneq naliitsoq * 1989: Mette Newth: Bortførelsen, translated as Aallarussineq * 1992: Ole Lund Kirkegaard: Mig og Bedstefar – og så Nisse Pok, translated as Uangalu aatagalu aammalu Nissi Pooq * 1993: Kenneth Thomasma: Naya Nuki, translated as Naya Nuki – niviarsiaraq qimaasoq * 1994: Torbjørn Borgen: Svampe i Grønland, translated as Pupiit Kalaallit Nunaanni * 1996: Jørgen F. Nissen: Erfaring, styrke – og håb, translated as Misilittagaqarneq, sapiissuseqalerneq, aamma neriunneq * 1996: Maaliaaraq Vebæk: Navaranaaq og andre, translated as Navaranaaq allallu * 1997: Jørgen F. Nissen: Uliv, translated as Inuunipalaaq * 2003: Ole Hertz: Tobias fisker ørred, translated as Tuppiarsi eqalunniartoq * 2006: Hans-Christian Gulløv: Grønlands forhistorie, translated as Kalaallit Nunaata itsarsuaq oqaluttuassartaa * 2016: Gunvor Bjerre: Månemanden og andre fortællinger fra Grønland, translated as Qaammatip inua oqaluttuallu allat Kalaallit Nunaanneersut
WIKI
Can switching to a far infrared mattress, bedding, or pajamas, *really* help you feel less sore after a heavy lifting session? By By Mara Santilli Advertisement Photo: Getty Images / Geber86 After an intense workout, ripping off your spandex and finally hitting your mattress for sleep is usually nothing but pure relief. It's getting out of bed the next morning-and attempting to walk upstairs-that hurts. After all, experts say it can take up to 72 hours for your body to completely recover after high-intensity exercise. (Related: The Best New Recovery Tools for When Your Muscles Are Sore AF) Luckily, your go-to sleep essentials are evolving to potentially help you recuperate after you push the limits toward your fitness goals. Mattresses, bedding, and even clothing are now being engineered with far infrared technology, which may boost your circulation throughout your system, helping with recovery while you sleep. Here, everything you need to know about the budding technology. How Does Far Infrared Technology Work While You Sleep? These new sleep products essentially use the same technology as an infrared sauna by taking your body heat and converting it to far infrared rays. This type of radiation is then able to penetrate the muscles at a deeper level underneath the skin. Theoretically, what's happening is that the far infrared rays are enveloping your muscles and improving your circulation, says Yanna Darilis, an IIN-certified integrative fitness, nutrition, and health coach-that's why far infrared products can be a great solution for people who have Reynaud's (a medical condition that causes reduced blood flow) or other circulation issues. Because of the influx of oxygen flooding the muscles, your muscles are better equipped to detox after exercise during their recovery stage and restore themselves to work out again. "The increase of local blood flow in the body yields an increase in oxygen, and quicker removal of toxins and waste products of exercise like lactic acid," Darilis says. Good circulation of blood and oxygen to the muscles is what gets you through the workout in the first place, and it's what saves you afterwards. (Related: This Is What the Ultimate Recovery Day Should Look Like) As for the research to back up these claims, some studies have found far infrared therapy to help patients with wound healing and chronic pain management, but others are inconclusive about its definitive benefits. Though many medical professionals haven't yet made definite statements on the legitimacy of these kinds of products, most far infrared technology sleep products are FDA-recognized as useful wellness products, and many products are still being developed. TL;DR? As with other emerging areas of wellness, scientists are studying further. In most cases, after exercise, your body is resting better to begin with due to the endorphins that are released, and your core body temperature is elevated, says Melissa Ziegler, Ph.D., R.K.T., executive director of the American Kinesiotherapy Association. That also means your body is primed to make the most of these far infrared products, she explains. Here, a few you can try out post-workout to speed up recovery and maybe even improve the quality of your sleep. Recovery Sleep Products to Try 1. Signature Sleep Nanobionic Recovery Mattress Made with Nanobionic, a far infrared textile that has been shown to have positive impacts on sports performance, the Signature Sleep Nanobionic Reset Mattress (from $360, amazon.com) returns 99 percent of infrared energy to the body. Essentially, the more infrared rays that are emitted, the more effective the mattress can be in restoring the muscles, explains Darilis. Inside the mattress, the latex coils help redistribute heat so that body heat doesn't get trapped and make you feel clammy. A gel- and charcoal-infused memory foam layer is what helps cool down your body temperature, and helps with odor protection (though hopefully you jumped in the shower post-workout before just hopping in bed). All of this is activated naturally, by your body heat, without plugging in a thing. 2. Under Armour Athlete Recover Sheet Set and Pillowcase Strip your bed for this far infrared bedding, including a sheet set ($226 for queen set, underarmour.com). There are tiny fibers inside the fabric of the sheets that house the far infrared technology, activated by your body heat. Once you lie on the fabric or wrap yourself in it, the infrared energy is released. Don't worry; they're just as useful as the sheets you're used to, if not more so. The fabric is infused with modal, making it both breathable and insanely soft. 3. Lunya Restore Loungewear After you get out of your sweaty leggings and sports bra and slip into some super-soft, restorative lounge pieces, you'll feel 10 times cozier already (that's the buttery pima cotton fabric that's blended with the far infrared fabric). Then, the compression of the fabric (made with a far infrared fiber called Celliant) will start working on your body. Like the mattresses and sheets above, the Lunya Restore Base Long Sleeve Tee ($88, lunya.co) and Lunya Restore Pocket Leggings ($98, lunya.co) use your body heat and convert it to far infrared rays to help boost oxygen flow to the muscles, which can help you to feel more rested when you wake up. The Bottom Line You may not feel the immediate benefits of switching to a far infrared mattress, bedding, or pajamas, but if you find yourself doing more CrossFit than gentle yoga practices, your muscles probably need all the help they can get to relax and restore themselves. "The higher intensity exercise you're doing, the longer recovery takes, because your glycogen (energy) stores are depleted faster," Ziegler says. "In theory, you need longer recovery time, so any way you could speed up the recovery time can be helpful," she adds. (Related: Why You Should Never Skip Your Post-Workout Cooldown) But when it comes down to it, it's your normal exercise routine that makes a major difference in your sleep health and ability to recover, Ziegler points out. "Regular physical activity leads to better sleep, better circulation, and therefore better muscle recovery." Comments (2) Anonymous March 8, 2019 How about get a wake up light https://amzn.to/2tVCsl8 instead? It is something that helps you achievea natural wake up, so you are less stressed and less grouchy in the morning. Anonymous March 8, 2019 Hi, my name is Ellen and I'm 30 years old. My weight loss journey started when I read Emma's story online. Emma's husband abandoned her for a younger woman. She turned to food for comfort and gained a lot of weight very fast. Luckily she discovered an amazing workout program that allowed her to achieve the best shape of her life. Read her story here >> https://bit.ly/getabikinibody
ESSENTIALAI-STEM
Page:The plea of Clarence Darrow, August 22nd, 23rd & 25th, MCMXXIII, in defense of Richard Loeb and Nathan Leopold, Jr., on trial for murder.djvu/36 happened, and it calls not for hate but for kindness, for charity, for consideration. I heard the State's Attorney talk of mothers. Mr. Savage is talking for the mothers, and Mr. Crowe is thinking of the mothers, and I am thinking of the mothers. Mr. Savage, with the immaturity of youth and inexperience, says that if we hang them there will be no more killing. This world has been one long slaughter house from the beginning until today, and killing goes on and on and on, and will forever. Why not read something, why not study something, why not think instead of blindly shouting for death? Kill them. Will that prevent other senseless boys or other vicious men or vicious women from killing? No! It will simply call upon every weak minded person to do as they have done. I know how easy it is to talk about mothers when you want to do something cruel. But I am thinking of the mothers, too. I know that any mother might be the mother of a little Bobby Franks, who left his home and went to his school, and who never came back. I know that any mother might be the mother of Richard Loeb and Nathan Leopold, just the same. The trouble is this, that if she is the mother of a Nathan Leopold or of a Richard Loeb, she has to ask herself the question: "How came my children to be what they are? From what ancestry did they get this strain? How far removed was the poison that destroyed their lives? Was I the bearer of the seed that brings them to death?" Any mother might be the mother of any of them. But these two are the victims. I remember a little poem that gives the soliloquy of a boy about to be hanged, a soliloquy such as these boys might make:
WIKI
Cholinergic synaptic potentials in the supragranular layers of auditory cortex June Horng Lue, Seu H. Chen, Jeng Yung Shieh, Chen Yuan Wen 研究成果: 雜誌貢獻文章同行評審 18 引文 斯高帕斯(Scopus) 摘要 Receptive-field plasticity within the auditory neocortex is associated with learning, memory, and acetylcholine (ACh). However, the interplay of elements involved in changing receptive-fields remains unclear. Herein, we describe a depolarizing and a hyperpolarizing potential elicited by repetitive stimulation (20-100 Hz, 0.5-2 sec) and dependent on ACh, which may be involved in modifying receptive-fields. These potentials were recorded, using whole cell techniques, in layer II/III pyramidal cells in the rat auditory cortex in vitro. Stimulation at low stimulus intensities can give rise to a hyperpolarizing response and stimulation at higher stimulus intensities can elicit a depolarizing response. The depolarizing response had a reversal potential of -35 mV, and was reduced by the combination of AMPA/kainate and NMDA glutamate receptor antagonists (AMPA/kainate: CNQX, DNQX, and GYKI 52466; NMDA: APV, MK-801) and by the muscarinic ACh receptor antagonist atropine. The hyperpolarizing response had a reversal potential of -73 mV and could be reduced by atropine, GABAA receptor antagonists (bicuculline and a Cl- channel blocker picrotoxin), and to a small extent a GABAB receptor antagonist (saclofen). This suggests that the hyperpolarizing response is likely to be mediated by ACh acting on GABAergic interneurons. Extracellular recordings, also made from layer II/III of cortical slices, yielded a negative-going potential which was reduced by ionotropic glutamate receptor antagonists (same as above) and by the ACh receptor antagonists atropine and scopolamine, suggesting that this potential was the extracellular representation of the depolarizing response. 原文英語 頁(從 - 到)118-130 頁數13 期刊Synapse 41 發行號2 DOIs 出版狀態已發佈 - 2001 ASJC Scopus subject areas • 生理學 • 神經科學 (全部) • 藥理 指紋 深入研究「Cholinergic synaptic potentials in the supragranular layers of auditory cortex」主題。共同形成了獨特的指紋。 引用此
ESSENTIALAI-STEM
Import the Policies to a Single Instance In this task, you will import the best practices policies that you want to schedule into Policy-Based Management on a single instance of SQL Server. You must perform this procedure on a server that is running SQL Server 2008 or a later version. Import the best practices policies for the Database Engine 1. Start SQL Server Management Studio, and then connect to the Database Engine. 2. In Object Explorer, expand Management, and then expand Policy Management. 3. Right-click Policies, and then click Import Policy. 4. In the Import dialog box, next to the Files to import box, click the ellipsis () button. 5. In the Look in list, browse to the following folder, which contains the best practices policies: C:\Program Files\Microsoft SQL Server\100\Tools\Policies\DatabaseEngine\1033 NoteNote The file path may vary, depending on where you installed the SQL Server program files, and the language identifier. 6. In the Select Policy dialog box, select one or more policy files. To select nonadjacent files, click one file, hold down the CTRL key, and then click each additional file. To select adjacent files, click the first file in the sequence, hold down the SHIFT key, and then click the last file. 7. When you are finished selecting files, click Open. 8. In the Import dialog box, make sure that the Policy state list is set to Preserve policy state on import (the default), and then click OK. The policies are imported into the Policies node under Policy Management. By default, the imported policies are set to "On demand" evaluation mode. Show:
ESSENTIALAI-STEM
UBS says to cooperate with French probe into 38,000 accounts PARIS (Reuters) - The French arm of Swiss bank UBS pledged on Thursday to cooperate fully with French authorities looking into a list of 38,000 accounts held by French citizens at the bank in Switzerland. “If there have been mistakes, we will recognize them and pay,” the bank said. “Our interest is that all light be shed on this so that the matter be closed as soon as possible.” Tax authorities forwarded the list to justice officials, a judicial source said, echoing a report in Le Point magazine. The weekly said in an report on its website that assets held in these accounts amounted in 2008 to 13 billion Swiss francs (now worth about $13 billion). Le Point said the case arose from Germany, where investigators found files during a search of premises of the bank and sent them to the French tax authorities. UBS said “very strict control mechanisms are in place at UBS. In this regard, the bank has required for several years that customers show compliance with tax regulations.” French authorities have challenged the Swiss bank and its French subsidiary on several occasions in tax evasion cases. In June 2013 UBS was placed under formal investigation for illegal solicitation, in July 2014 for aggravated tax fraud and money laundering and in March 2015 for abetting money laundering. It faces a record 4.88 billion euro fine if found guilty in the last case. Its French branch was suspected of having canvassed wealthy clients in France to convince them to open bank accounts in Switzerland, which it denies. (1 = 1.0108 Swiss francs) Reporting by Gerard Bon and Simon Carraud; Writing by Michael Shields in Zurich; Editing by Mark Potter
NEWS-MULTISOURCE
Beylik of Lâdik Lâdik or Inanjids (Modern Turkish: İnançoğulları Beyliği ) was an Anatolian beylik with its capital in Denizli. It was one of the frontier principalities established by Oghuz Turkish clans after the decline of Seljuk Sultanate of Rûm. Its name derives from that of Laodicea on the Lycus. The current Turkish province of Denizli was named the sanjak (sub-province) of Lâdik till the early years of the Republic of Turkey. Its rulers are listed below:
WIKI
Outbound delivery pools Tip Did you know you can try the features in Microsoft Defender XDR for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft Defender portal trials hub. Learn about who can sign up and trial terms here. Email servers in the Microsoft 365 datacenters might be temporarily guilty of sending spam. For example, a malware or malicious spam attack in an on-premises email organization that sends outbound mail through Microsoft 365, or compromised Microsoft 365 accounts. Attackers also try to avoid detection by relaying messages through Microsoft 365 forwarding. These scenarios can result in the IP address of the affected Microsoft 365 datacenter servers appearing on third-party blocklists. Destination email organizations that use these blocklists will reject email from those Microsoft 365 messages sources. High-risk delivery pool To prevent our IP addresses from being blocked, all outbound messages from Microsoft 365 datacenter servers that are determined to be spam are sent through the high-risk delivery pool. The high risk delivery pool is a separate IP address pool for outbound email that's only used to send "low quality" messages (for example, spam and backscatter. Using the high risk delivery pool helps prevent the normal IP address pool for outbound email from sending spam. The normal IP address pool for outbound email maintains the reputation sending "high quality" messages, which reduces the likelihood that these IP addresses appear on IP blocklists. The possibility that IP addresses in the high-risk delivery pool are placed on IP blocklists remains, but this behavior is by design. Delivery to the intended recipients isn't guaranteed, because many email organizations don't accept messages from the high risk delivery pool. For more information, see Control outbound spam. Note Messages where the source email domain has no A record and no MX record defined in public DNS are always routed through the high-risk delivery pool, regardless of their spam or sending limit disposition. Messages that exceed the following limits are blocked, so they aren't sent through the high-risk delivery pool: Bounce messages The outbound high-risk delivery pool manages the delivery of all non-delivery reports (also known as NDRs or bounce messages). Possible causes for a surge in NDRs include: • A spoofing campaign that affects one of the customers using the service. • A directory harvest attack. • A spam attack. • A rogue email server. Any of these issues can result in a sudden increase in the number of NDRs being processed by the service. These NDRs often appear to be spam to other email servers and services (also known as backscatter). Relay pool In certain scenarios, messages that are forwarded or relayed via Microsoft 365 are sent using a special relay pool, because the destination shouldn't consider Microsoft 365 as the actual sender. It's important for us to isolate this email traffic, because there are legitimate and invalid scenarios for auto forwarding or relaying email out of Microsoft 365. Similar to the high-risk delivery pool, a separate IP address pool is used for relayed mail. This address pool isn't published because it can change often, and it's not part of published SPF record for Microsoft 365. Microsoft 365 needs to verify that the original sender is legitimate so we can confidently deliver the forwarded message. The forwarded or relayed message should meet one of the following criteria to avoid using the relay pool: • The outbound sender is in an accepted domain. • SPF passes when the message comes to Microsoft 365. • DKIM on the sender domain passes when the message comes to Microsoft 365. You can tell that a message was sent via the relay pool by looking at the outbound server IP (the relay pool is in the 40.95.0.0/16 range). In cases where we can authenticate the sender, we use Sender Rewriting Scheme (SRS) to help the recipient email system know that the forwarded message is from a trusted source. You can read more about how that works and what you can do to help make sure the sending domain passes authentication in Sender Rewriting Scheme (SRS) in Office 365. For DKIM to work, make sure you enable DKIM for sending domain. For example, fabrikam.com is part of contoso.com and is defined in the accepted domains of the organization. If the message sender is sender@fabrikam.com, DKIM needs to be enabled for fabrikam.com. you can read on how to enable at Use DKIM to validate outbound email sent from your custom domain. To add a custom domain, follow the steps in Add a domain to Microsoft 365. If the MX record for your domain points to a third party service or an on-premises email server, you should use Enhanced Filtering for Connectors. Enhanced Filtering ensures SPF validation is correct for inbound mail and avoids sending email through the relay pool. Find out which outbound pool was used As an Exchange Service Administrator or Global Administrator*, you might want to find out which outbound pool was used to send a message from Microsoft 365 to an external recipient. Important * Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. To do so, you can use Message trace and look for the OutboundIpPoolName property in the output. This property contains a friendly name value for the outbound pool that was used.
ESSENTIALAI-STEM
Singing as you've never seen before Singing as you've never seen before 9:43am BST - 00:54 Extraordinary video imagery of what your tongue looks like when you sing and speak have been released by the Max Planck Institute for Biophysical Chemistry. The videos were filmed using 'realtime MRI' technology developed by Professor Jens Frahm, who has been nominated for the European Inventor Award. Jim Drury reports. ▲ Hide Transcript ▶ View Transcript Extraordinary video imagery of what your tongue looks like when you sing and speak have been released by the Max Planck Institute for Biophysical Chemistry. The videos were filmed using 'realtime MRI' technology developed by Professor Jens Frahm, who has been nominated for the European Inventor Award. Jim Drury reports. Press CTRL+C (Windows), CMD+C (Mac), or long-press the URL below on your mobile device to copy the code https://reut.rs/2KWWIKD
NEWS-MULTISOURCE
Talk:List of CAM companies This page is an alternative to the awkwardness that is List of CAD companies, which I find unuseable. To me, the purpose of this page, and records of all these commercial products is to record history. The companies are perfectly able to tell the world about themselves when they're here. But when they're gone it's easy to forget what happened. Software of this kind has a shelf-life measured in decades. Often there are several different products on sale now that came from the same source years ago. —Preceding unsigned comment added by Goatchurch (talk • contribs) * In what way is List of CAD companies unuseable? And even if it is, surely the answer is to fix that article, and not to create an almost duplicate list? Mdwh 14:56, 9 July 2006 (UTC) Please don't consider it yet. Although to the users there's a huge overlap between CAD and CAM, their development is exceedingly different. If you like, this is tracking the specific toolpath generating module often found in CAD products, of which there are few in number. It needs a separate list and life history. Likewise, if there was a List of Solid Modelling Kernels, of which there are, maybe, five in the whole world. On deeper thoughts, I think these lists are upside down. There is an untderlying history of CAM generating modules that are being bought and sold between these different companies. These modules should be listed at the top, and the company names who trade them made secondary. Anyone care to discuss? Goatchurch 12:25, 10 July 2006 (UTC) I can see that List of CAD companies is not the easiest list to edit but the intention was to provide more information than just a list of companies and their products. Not everyone reading will know that some CAD packages also have CAM modules or that a particular CAM software company also has some PDM software. I agree that keeping a history of packages is useful but that is not the only reason people come to this topic in Wiki, a summary of current state is also important. I actually think it is not easy to identify what company owns what software, imagine having to go round the web and digging into pages to get to the level of this collective list. The task should be to improve the existing list of companies making it easy to edit but providing full information. It is not possible to separate the CAx packages, they are all tools used by engineers and tend to overlap in some areas. Note also that there are categories to list CAM and CAD software packages (as apposed to companies). Also if people wish to have something specific to one of these areas it can go on that subject page. The Computer-aided manufacture page could defiantly do with some more professional informative input. --Freeformer 15:49, 11 July 2006 (UTC) CAD and CAM are two completely different animals. Most CAD users dont even care about CAM and vice-versa. There are many CAM companies that do not have CAD components. I would prefer to keep them seperate. - Anonymous CAM dude, I have very little knowledge of CAD software and that's why I am here. The list is helpful to me. Also, identifing CAD & CAM is helpful and knowing which company is also informative. Alphabetized is much better too, by the way. I am just researching in hopes to take some CAD courses and eventually design drawings for my company. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:00, 2 October 2007 (UTC) Redirecting to List of CAx companies List of CAx companies appears to be somewhat maintained, while this page clearly isn't. Delicious carbuncle (talk) 14:05, 6 June 2008 (UTC)
WIKI
Page:Popular Science Monthly Volume 44.djvu/713 HEN a private employer of labor wants work well done he tries to employ, in the first place, persons who are presumably, and to the best of his judgment, competent to do it well, and then he gives them an opportunity to show what their qualifications really are. He tests their work as they go on in every way possible, and, if he finds it satisfactory, he congratulates himself on the excellent service he is getting and on the prospect of still better results in the future as his workmen, clerks, superintendents, or whatever they may be, acquire greater experience. If any one were to come and suggest to him to inquire into the political opinions of his assistants and to replace any who did not think quite as he did by inexperienced persons whose one certified virtue was that their political complexion was exactly the same as his own, he would conclude that he had struck a lunatic, and would probably inform the gentleman that such was his opinion. But, turning to the people of the United States, we may say, in the words of the Roman poet, "The story is told of you with a simple change of name." Yet, after all, there is more than a change of name; for we have assumed that the private employer of labor would treat the person who made such a suggestion to him as a lunatic; but not so do the people of this country treat those who make like suggestions to them. Far from it; they have in past times appeared to find such advice good, and have made those who gave it their trusted counselors. They have cut short the official careers of men who had just begun, after a few years' necessary experience, to be fully competent in their several positions, in order that the work might be taken up by incompetent (because inexperienced) men of a different political profession of faith, on the understanding that the latter should remain in office only so long as their party was "on top" or so long as they themselves continued to be meet instruments of party policy. A given official might at a given moment be carrying on important investigations, the various threads of which were gathered in his own hands and head—possibly a post office inspector trying to get on the track of a series of mail robberies, or a customs officer similarly employed as regards frauds on the revenue, or a statistician marshaling an elaborate array of facts by methods which he himself had carefully devised and could alone apply with the best results, or the head of some scientific bureau who, after a battle with disorganization and sloth and the indifference bred of the political system, had conquered the forces of opposition, established order, and prepared the way for a vigorous advance of the important work committed to him—what would it matter?—whatever he was, or whatever he was doing, when the hour came that a stronger than he politically wanted his place, the supposed guardian of the public interests, cabinet minister or President, would order his dismissal, and bring in the new man to throw everything into confusion, or, at the very least, to retard in a more or less serious degree operations that might have been carried on without a break, to the great advantage of the community. We do not mean to say that changes have never been made for the better. That has been as it chanced; and certainly under our system changes for the better have for the most part been only too possible. Who that has any
WIKI
Souths Proper noun * 1) the (a rugby league club based in Sydney, Australia) * 1) the (a rugby league club based in Sydney, Australia)
WIKI
James Bonfield - 2005-05-09 It's getting to that stage where io_lib is well overdue for a major overhaul. Not least is the point that the ZTR format can cope with much more than the core Read structure allows, so I propose that the new format has a totally different Read structure (with backwards compatibility mode perhaps). It is also very inefficient when reading lots of formats due to the insistance on reading from disk. In-memory decoders would streamline the process immensly. Finally there's the issue of how to store data from different types of instruments or different styles of traces. Eg pyrosequencing data or SSCP analysis. Even the standard AB1 format has additional data (raw vs processed) which we'd like to support. I'm at the planning stage now, but please contact me (jkbonfield at users.sourceforge.net) if you have pet peeves you'd like addressed or if you have general feedback on things to include. Thanks, James  
ESSENTIALAI-STEM
Johnny & June Johnny & June is a compilation album and 60th overall album by American country singer Johnny Cash, released on Bear Family Records in 1978 (see 1978 in music). Like The Unissued Johnny Cash it consists of material that was either unreleased or not widely available. Most of the songs were recorded from 1964 to 1965, with the exception of "Smiling Bill McCall" from 1960. The songs, "Cotton Picking Hands" and "Wer Kennt Den Weg" and "In Virginia" (both in German) had been previously released on singles. "Thunderball" was recorded for the James Bond film, but was ultimately turned down in favor of Tom Jones (see also the 'Thunderball'' film and soundtrack articles). "One Too Many Mornings" is a Bob Dylan song from The Times They Are a-Changin'. Cash and Dylan would later (unsuccessfully) attempt a duet version of the song for Nashville Skyline, and Cash would record the song again for Heroes with Waylon Jennings. This version features Maybelle Carter playing autoharp. The Carters feature on several songs on the album; June Carter sings lead vocal on three songs and duets on another, and Anita Carter sings on "That's What It's Like to Be Lonesome."
WIKI
Talk:The Beatles bootleg recordings BBC Sessions 11-Disc Set "''The BBC Sessions: The Beatles regularly recorded live in studio for the BBC. In addition to performing their own material, they often did covers of other artists like Buddy Holly, Chuck Berry, Ray Charles. These sessions often were passed off as studio outtakes on many 1970s-era bootlegs. The popularity of Beatles BBC discs reached its apex with a celebrated nine-CD set by Great Dane Records, which aimed to supplant the varying configurations of BBC discs available on bootleg, while presenting the material in chronological order and in the best quality available at the time. The popularity of this release directly lead to the official, Beatles-sanctioned Live at the BBC 2 CD set. While the official disc did collect many of the otherwise-unreleased cover versions performed by the Beatles on the BBC, it did nothing to stem the tide of BBC bootlegs; in fact, collectors and archivists continue to discover new and improved sources for the BBC session material, much of which makes its way into internet bootleg. The current, "most-complete" version is an eleven-disc set available for free on the internet.''" Does anybody know where I can find this 11-disc set of BBC session material? I'd really like a copy, but I don't know where to find it. --Ian911299 I too was just wondering this. Anyone want to clear this up? --Jordan10la (talk) 00:53, 26 July 2009 (UTC) Old chitchat TraxPlayer I don't think that Beatles is so much bootlegged. I would say that Dylan is the most bootlegged artist. Every concert he has played in the last many years has been taped illegal. The Grateful Dead is more taped than Dylan as they allow bootlegs of their shows but the Beatles history from 60-70 is the best in rock and roll by the best group EVER Well, the Beatles bootleg recordings article should be deleted all together, except they may be still more "bootleggers" who sell recordings that claim to be the Beatles. See: votes for deletion. what about the vancouver show? i see that on every bootleg trader's site. Who the hell are the Hamburger Bunns???? Forget the Hamburger Bunns, i want to know who the hell the Lavender Circus is!!! —Preceding unsigned comment added by <IP_ADDRESS> (talk) 10:49, 17 January 2010 (UTC) I think I heard that the carnival of light thing is just a rumour. Carnival of Light is a hoax and should be removed. No, there actually are fake "Carnival Of Light" Mp3's circulating. -SW * The supposed "Carnival of Light" MP3 you refer to is a fake, because I know who did it. The story behind it is, back in the days when Napster was popular, there was an MP3 on the network, supposedly by George Harrison, called "Krishna is Here". This person decided it would be funny if they renamed it "Carnival of Light", and share it on the network. Napster users downloaded it and over time it spread to other P2P networks. Goldwings 05:33, 9 February 2007 (UTC) * I agree with you on your pionts about Dlyan and the Dead but I don't think this artical should be deleted. I just needs some dramatic cleaning, that's all. -paulisdead 21:05 15 Janurary, 2007. Dramatic cleaning is my vote. I love the Beatles and I love Dylan but the Beatles have a meager presence in the bootleg world considering they have sold the most records of all time. Based on the number of separate titles available (concerts, unreleased albums/tracks, alternative albums) the Beatles would not be in the top 100. Perhaps in the era when the bootleg had to be a pressed LP, they may have been, but since cassettes and even more since CD-R they can't be considered "one of the most" bootlegged artists. The argument above * The Grateful Dead is more taped than Dylan as they allow bootlegs of their shows but the Beatles history from 60-70 is the best in rock and roll by the best group EVER has nothing to do with the bootleg question. Regardless of all this, it is plain that the statement mentioned uses weasel words and is not documented anyway and should be removed. --Kevinskogg 21:03, 27 April 2007 (UTC) beatles/rolling stones fake bootleg? I remember a while ago being shown a supposed bootleg of the beatles and the rolling stones. It was quite fake and probably belongs in the section "A number of songs have been fraudulently passed off by bootleggers as unreleased Beatles songs..." if anyone knows any more about it than me --Hugzz 15:44, 28 January 2006 (UTC) You're probably thinking of the Masked Marauders, which wasn't a bootleg... it was just a parody. -SW God Save The Queen on Rooftop Concert This article, possibly incorrectly, has stated that God Save The Queen at the rooftop concert at the end of January, 1969 has not surfaced on bootleg albums. I have one bootleg album which contains it and be found on bootlegzone here: http://bootlegzone.com/album.php?name=omi30169&section=1 Just thought I'd check in with everybody else first before editing. Christmas Recordings bootlegs This part should probably be cleared up, I don't actually know what they are talking about when they say "that was Birds". * The Christmas Recordings: Each year, the Beatles recorded an EP of comedy and music that was Birds (also known as The Castle of the King of the Birds) – later released by McCartney A link to the official release would be nice, pointing out the various unreleased material found on these bootlegs, like the extra long version of "Christmas Time is Here Again!" and the "Hello Dolly!" outtakes from 1964. You know, once that "that was Birds" thing is cleared up. Danthemankhan 18:02, 24 April 2006 (UTC) Are the Christmas recordings really bootlegs? The article on Bootlegs defines them thus "A bootleg recording is an audio and/or video recording of a performance that was not officially released by the artist, or under other legal authority." A recording that is different to the orginal would therefore be a bootleg. If it is merely a reproduction of the original, it would, I suggest be a "copy" or "counterfeit." BryonyM (talk) 10:51, 15 September 2009 (UTC) * While there are some copies and counterfeits of the Christmas album, bootleggers commonly supplement the tracks with additional unreleased Beatles material (usually Christmas-related). Also, the original album was only "released" ("distributed" might be a better word) to fan club members and never made available for purchase by the general public. --Mainstream Nerd (talk) 02:00, 16 September 2009 (UTC) Thanks. BryonyM (talk) 07:08, 16 September 2009 (UTC) In Spite of all the danger I don't think that this was ever bootlegged, which is why its release om Anthology was so interesting. This should be removed from list of most commonly bootlegged tracks. Alanmoss 12:54, 4 August 2006 (UTC) * The Anthology version of Danger was edited because the disc was damaged (about 40 seconds). I believe complete versions of the original recording have leaked. Also That'll be the Day was played on a Buddy Holly special in 1985 with Paul McCartney's commentary over it. The 40 seconds that were broadcasted have been booted as well.Paulisdead 20:58, 15 Januray 2007 (UTC) Fair use rationale for Image:Beatles Great Dane.jpg Image:Beatles Great Dane.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in Wikipedia articles constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. If there is other other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images uploaded after 4 May, 2006, and lacking such an explanation will be deleted one week after they have been uploaded, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.BetacommandBot 02:20, 1 June 2007 (UTC) I enjoy the irony of deleting an image that a bootlegger created to sell an illegal collection! I think it unlikely that Great Dane would object if we could somehow trace them. Shame on the WP policy: this is fast becoming an over-bureaucratic site, but I guess these things have to be sorted before WP is sold to the highest bidder. Alanmoss 15:26, 1 June 2007 (UTC) Fair use rationale for Image:SessionsCover.jpg Image:SessionsCover.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. If there is other other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images uploaded after 4 May, 2006, and lacking such an explanation will be deleted one week after they have been uploaded, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.BetacommandBot 04:04, 6 June 2007 (UTC) Fair use rationale for Image:Yellow Dog Get Back cover.jpg Image:Yellow Dog Get Back cover.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. BetacommandBot 12:05, 6 July 2007 (UTC) Fair use rationale for Image:SessionsCover.jpg Image:SessionsCover.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. BetacommandBot 05:16, 29 September 2007 (UTC) --Wejfkbfefwe 13:12, 29 September 2007 (UTC) This page should redirect to another Beatles bootleg "KUM BACK" Nagra B rolls. Here is more info on "KUM BACK" B rolls, Fair use rationale for Image:Let It Be-Bootleg Vol 1.jpg Image:Let It Be-Bootleg Vol 1.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. BetacommandBot 14:37, 1 October 2007 (UTC) Fair use rationale for Image:Let It Be-Bootleg Vol 2.jpg Image:Let It Be-Bootleg Vol 2.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. BetacommandBot 14:38, 1 October 2007 (UTC) Fair use rationale for Image:Image-Beatles Great Dane.jpg Image:Image-Beatles Great Dane.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use. BetacommandBot 22:41, 6 November 2007 (UTC) Copyright tag Erm, we're talking about illegal use of an illegal image? Fistly, album images are if anything advertising the existence thereof and fall under all the other descriptions of 'fair use'. Secondly, How on gods green earth does anyone assume a pirate is going to come forward and sue anyone for advertising the existence of their product. And Thirdly, how can anyone actually own copyright of an illegal product in the first place? Agree witrh the comment above - WP has become just a tad too bureaucratic. bridesmill. <IP_ADDRESS> (talk) 00:29, 2 June 2008 (UTC) Srgt Pepper Master Tape leaks Complete masters for Srgt Pepper's Lonely Hearts Club Band, With A Little Help From My Friends, She's Leaving Home and A Day in the Life have leaked on the internet. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:11, 3 November 2008 (UTC) Decca recordings The section on the Decca audition mentions official releases from the tapes, including Anthology, but does not mention the LP "The Complete Silver Beatles". Pretty sure this contained the complete audition set, less the three Lennon/McCartney originals. It came out in the early 1980s - worth a mention? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:42, 5 July 2009 (UTC) The apostrophe This article should be called "The Beatles' bootleg recordings (section)"--andreasegde (talk) 16:59, 21 October 2010 (UTC) * This article is closely related to a discography, and WP discographies do not use possessives in the article titles. –Mainstream Nerd (talk) 22:35, 21 October 2010 (UTC) Assessment comment Substituted at 07:58, 30 April 2016 (UTC) The White Album (Kinfauns) demos (1968) Shouldn't this section be retitled "The White Album (Esher Demos) 1968" since that is what the Beatles themselves refer to them as? In the forthcoming November 9th, 2018 release of the 50th Anniversary edition of the White Album.... that is SPECIFICALLY what they are entitled on the CD release. <IP_ADDRESS> (talk) 11:26, 7 October 2018 (UTC) Wayne Shuman Live! at the Star-Club in Hamburg, Germany; 1962 It is written « ...nine of the songs would never be officially released in another version »... I count 10 !! Where is my mistake ? JeanPaulGRingault (talk) 14:39, 24 May 2021 (UTC) * 1) Your Feet's Too Big * 2) Reminiscing * 3) Little Queenie * 4) Falling in Love Again * 5) Be-Bop-A-Lula * 6) Red Sails in the Sunset * 7) I Wish I Could Shimmy Like My Sister Kate * 8) I Remember You * 9) Where Have You Been All My Life * 10) Sheila Pinwheel Twist; lost song Pinwheel Twist which featured Best on lead vocals is a lost song. 2600:1702:CC7:1A20:7DB7:6AFE:EBD0:A75F (talk) 01:10, 14 November 2023 (UTC)
WIKI
User:FigBars404 I am FigBars404, a wikipedian. I am the same person as User:FigBarZ404 but was locked out of that account. Some Areas I Focus On * Cars * Video Games
WIKI
User:BlueJive BlueJive is a user primarily aiming to look around Wikipedia for information purposes and edit falsities if necessary. Background information is limited and he rarely replies to messages.
WIKI
Besson Denies Penly EPR Nuclear Reactor Project Is Scrapped French Industry Minister Eric Besson has denied a report that a plan to build a second EPR nuclear reactor in northern France has been abandoned. “The project hasn’t been suspended,” Besson told reporters in Paris today. “There is no precise timetable.” France no longer has a schedule for the development of the next-generation reactor at Penly, Challenges magazine reported today, citing an interview with Total SA (FP) Chief Executive Officer Christophe de Margerie. The project is “apparently” no longer being studied, he was quoted as saying, adding that Total remains an investor in the installation. Electricite de France SA is developing France’s first EPR at Flamanville in Normandy, slated for commercial operation in 2014 and at a cost which has been revised upwards to 5 billion euros ($7.4 billion). French President Nicolas Sarkozy has said that nuclear power will remain the core of national energy policy , even as the accident at Japan ’s Fukushima Dai-Ichi plant led countries including Italy and Germany to retreat from atomic energy. State-controlled EDF, the biggest operator of nuclear reactors, was given control of the Penly project by Sarkozy in January 2009. Construction of that reactor was first scheduled to start in 2012 and be finished in 2017. The 1,650-megawatt EPR model was designed by Areva SA. EDF is pursuing the Penly project, including obtaining the necessary administrative steps to begin development, Carole Trivi, a spokeswoman, said today by telephone. French President Nicolas Sarkozy said yesterday the country will continue to invest in the nuclear industry. EDF will decide within about two years whether to develop the Penly EPR and will look for new partners if needed, Thomas Piquemal, chief financial officer, said on a conference call in November. He said a bigger priority for the utility was the EPR at Flamanville. To contact the reporters on this story: Tara Patel in Paris at Tpatel2@bloomberg.net ; To contact the editor responsible for this story: Will Kennedy at wkennedy3@bloomberg.net .
NEWS-MULTISOURCE
router-modem difference 01 Aug What is the Difference between a Router and a Modem? Routers and modems are two of the most important peripherals that help you get your Internet connection. Whether you are still using a separate router and modem or you are using a combo device, it is important that you understand the difference between these two devices. Router Simply put, a router is a little box that allows us to join multiple computers to one network. Older routers will feature several Ethernet ports that allow for wired connections, newer versions of the device are usually wireless. The newer wireless routers have one or two antennas which can be moved around for receptivity, but many will “hide” the antennas within the box. You can join smart devices such as phones and tablets to a single network using a wireless router. Using a router you can only be connected to a LAN; in order to connect to the Internet you will need to connect the router to a modem. This is why routers have an Ethernet port to connect to the Ethernet port of a cable or DSL modem. Modem As explained above, a modem is a device that help us access the Internet. The modem connects to your Internet Service Provider, a cable or DSL Internet service. The same type of able (coaxial) that is used for your TV set is used to connect cable modems to a cable port on a wall socket. DSL (Digital Subscriber Line) modems can be connected to your telephone line using a connector called the RJ-11 jack, which connects to the telephone wall socket. When you connect your modem to your router (instead of directly connecting it to your computer), all the devices that are affixed to your router will gain access to your modem, and through it, to the Internet. Your local IP address is generated by the router, but all connected devices will share the external IP address which is allocated by your ISP. Image Credits No Comments Sorry, the comment form is closed at this time.
ESSENTIALAI-STEM
Page:Firearms Act 1968 (UKPGA 1968-27 qp).pdf/7 4 Prohibition of certain weapons and control of arms traffic 5.—(1) A person commits an offence if, without the authority of the Defence Council, he has in his possession, or purchases or acquires, or manufactures, sells or transfers— * (a) any firearm which is so designed or adapted that, if pressure is applied to the trigger, missiles continue to be discharged until pressure is removed from the trigger or the magazine containing the missiles is empty; * (b) any weapon of whatever description designed or adapted for the discharge of any noxious liquid, gas or other thing; and * (c) any ammunition containing, or designed or adapted to contain, any such noxious thing. (2) The weapons and ammunition specified in subsection (1) of this section are referred to in this Act as “prohibited weapons” and “prohibited ammunition” respectively. (3) An authority given to a person by the Defence Council under this section shall be in writing and be subject to conditions specified therein. (4) The conditions of the authority shall include such as the Defence Council, having regard to the circumstances of each particular case, think fit to impose for the purpose of securing that the prohibited weapon or ammunition to which the authority relates will not endanger the public safety or the peace. (5) It is an offence for a person to whom an authority is given under this section to fail to comply with any condition of the authority. (6) The Defence Council may at any time, if they think fit, revoke an authority given to a person under this section by notice in writing requiring him to deliver up the authority to such person as may be specified in the notice within twenty-one days from the date of the notice; and it is an offence for him to fail to comply with that requirement. 6.—(1) The Secretary of State may by order prohibit the removal of firearms or ammunition— * (a) from one place to another in Great Britain; or * (b) from Great Britain to Northern Ireland; or * (c) for export from Great Britain, unless the removal is authorised by the chief officer of police for the area from which they are to be removed, and unless such other conditions as may be specified in the order are complied with.
WIKI
Page:United States Statutes at Large Volume 80 Part 1.djvu/1668 G U I D E TO LEGISLATIVE H I S TO R Y OF B I L L S E N ACT E D I N TO P U B L I C LAW—Continued NOTE: Companion bills are in parentheses Public Law No. Date approved 1966 89-804 89-805 89-806 89-807 89-808 89-809 89-810 Nov. 10 Nov. 10 Nov. 10 Nov. 11 Nov. 11 Nov. 13 Nov. 13 Report No. and Committee reporting 80 Stat. Dates of consideration and passage (Congressional Kecord: 1965, Vol. Ill; 1966, Vol. 112) Bill No. House Senate 1552 1076 Interstate and Foreign Commerce. Ways and Means 1104 2297 2143 Ways and Means. [Conference] Judiciary 1600 1521 S. 2893 2265 1521 H.R. 8436 1523 H.R. 11216 1525 S. 2770 1526 H.R. 14929 1639 H.R.13103 1591 H.R.15857 1558 2075, 2304 1450 2327 1656 2276 1679 1396 1527 Agriculture __ [Conference] Ways and Means. _ _ _ 1707 [Conference] 1609 District of Columbia [Conference] Commerce. _. House Senate . _ Oct. 17, 1966-__ Sept. 1, Oct. 19, 1966. Finance .. Oct. 21, 1965; Oct. 11, 1966. Oct. 20, 1966. Finance __. Oct. 21, 1965; Sept. 15, Oct. Oct. 20, 1966. 19, 1966. Judiciary. Oct. 3, 1966 July 25, Oct. 22, 1966. Agriculture and June 8, 9, Oct. Aug. 29-31, Forestry. 5, 21, 1966. Oct. 21, 1966. Finance . .. June 15, Oct. Oct. 12, 13, 22, 20, 1966. 1966. District of Columbia June 27, Oct. Sept. 21, Oct. 17, 1966. 14, 1966. �
WIKI
User:Petehvill If I think of things worth mentioning, or spot falsities, I'll edit a page to include/change it. It's always on a whim.
WIKI
The Evolution of Industrial Businesses and Industrial Uniforms Here in the United States, the “Industrial Revolution” did not start until the later part of the 19th Century. This was due, in part, to most people living in rural areas and, essentially, living off the land, as well as massive farms producing food for those people who chose to live in larger cities. While there were some small manufacturers making various products, it was not as large scale as some of the factories found overseas. However, that was about to change, thanks in part to Henry Ford and the invention of the automobile assembly line. Mr. Ford’s mass production process allowed for a larger number of goods and products to be built at lower costs than in the past. It was not too long before other industries, including clothing, food, and furniture, adapted a mass production model to further industrialize their operations. In the late 19th Century and early 20th Century, even with the industrialization of the United States, there were some major flaws in mass production factories. At that time, there were no labor laws and standards like we have today—minimum wage laws, child labor protections, and safety requirements. Rather, anyone who was willing and able to work in a factory would be allowed, including children. It was not uncommon for entire families to work at the same factory for long hours— sometimes 12 to 16 hours a day—and only get paid a few cents per hour. In addition, most laborers were required to wear their own clothing to work. The only exceptions were line foremen and floor supervisors, who often dressed in industrial work uniforms to distinguish themselves from other laborers. However, things were about to change with America’s entry into World War I. The war effort helped to start to bring about changes in the workplace to make working conditions fairer for employees. Among these, children were no longer able to work in factories the long hours they had in the past. Rather, children were to go to school during the day while their parents worked. After World War I, the U.S. economy spiraled downward and led to the Great Depression, which lasted from October 29, 1929 to 1939. During this time, factory and industrial jobs were hard to find and there were relatively few changes for those still in business. Then, in September 1939, Germany invaded Poland and set about the start of World War II (WWII). The United States refrained from entering the war directly, initially, but did commit to sending medical supplies, food, and other aid to the Allied Nations. Then, after the bombing of Pearl Harbor on December 7, 1941, the U.S. entered the war, which helped jumpstart the economy and numerous industrial jobs. Even women contributed to the war effort, with many taking on roles and jobs in factories previously held by men, which also included the wearing work uniforms. Since WWII, there have been many changes to industrial-type jobs, like the inclusion of specific safety gear as part of the work uniform in some environments. Today, work uniforms are standard in many factories and production facilities. To learn more about work wear and uniforms for your employees, please feel free to contact Prudential Overall Supply at (800) 767-5536 today!
FINEWEB-EDU
[Haskell-cafe] To [] Or Not To [] Johannes Waldmann johannes.waldmann at htwk-leipzig.de Mon Mar 13 10:43:02 UTC 2017 Hi Olaf - > I'd be interested whether there is a way to check > which of my lists in the source code the compiler managed to "deforest" away. > Which intermediate files should I look at? What are the tools to inspect? Good question, and I don't know an easy answer. The general advice is running ghc with "-ddump-simpl" but I find it quite challenging to scan the output. Here is a simple case where it works: $ cat Fuse.hs main = print $ sum $ map (^2) [1 .. 1000 :: Int] $ ghc -fforce-recomp -ddump-simpl -O0 Fuse.hs no optimisation - shows that "main" calls "map" etc. $ ghc -fforce-recomp -ddump-simpl -O2 Fuse.hs fusion works - nice non-allocating inner loop (lists gone, and Int replaced by Int#) Rec { -- RHS size: {terms: 18, types: 3, coercions: 0} Main.$wgo [InlPrag=[0], Occ=LoopBreaker] :: GHC.Prim.Int# -> GHC.Prim.Int# -> GHC.Prim.Int# [GblId, Arity=2, Caf=NoCafRefs, Str=DmdType <S,1*U><S,U>] Main.$wgo = \ (w_s5kV :: GHC.Prim.Int#) (ww_s5kZ :: GHC.Prim.Int#) -> case w_s5kV of wild_Xn { __DEFAULT -> Main.$wgo (GHC.Prim.+# wild_Xn 1#) (GHC.Prim.+# ww_s5kZ (GHC.Prim.*# wild_Xn wild_Xn)); 1000# -> GHC.Prim.+# ww_s5kZ 1000000# } end Rec } but the challenge is to find the path from "main" to that, wading through several other functions that may or may not be related. I can imagine a source annotation like "in the code compiled from this function f, that constructor C should never be called" but this is certainly not easy. Do we really mean "never", or do we mean "only a bounded number of times" (that is, not in the inner loop). Perhaps there is no code for f itself, because it gets inlined. But yes, *some* automated analysis (and human-readable print-out) of the code after simplification would be nice. This could be done as a compiler plug-in? https://downloads.haskell.org/~ghc/latest/docs/html/users_guide/extending_ghc.html#compiler-plugins - J. More information about the Haskell-Cafe mailing list
ESSENTIALAI-STEM
dysacusis Noun * 1) A hearing impairment characterized by difficulty in processing details of sound due to distortion in frequency or intensity, but not primarily a loss of the ability to perceive sound.
WIKI
Insect bites and stings From Wikipedia, the free encyclopedia   (Redirected from Insect bite) Jump to: navigation, search Insect bites and stings Aedes aegypti biting human.jpg Aedes aegypti, the yellow fever mosquito, biting Classification and external resources ICD-10 T14.1, X23-X25, W57 ICD-9 919.4, 989.5, E905.3, E905.5, E906.4 MedlinePlus 000033 MeSH D007299 Insect bites and stings occur when an insect is agitated and seeks to defend itself through its natural defense mechanisms, or when an insect seeks to feed off the bitten person. Some insects inject formic acid, which can cause an immediate skin reaction often resulting in redness and swelling in the injured area. Stings from fire ants, bees, wasps and hornets are usually painful, and may stimulate a dangerous allergic reaction called anaphylaxis for at-risk patients, and some wasps can also have a powerful bite along with a sting. Bites from mosquitoes and fleas are more likely to cause itching than pain. The skin reaction to insect bites and stings usually lasts for up to a few days. However, in some cases the local reaction can last for up to two years. These bites are sometimes misdiagnosed as other types of benign or cancerous lesions.[1] Signs and symptoms of insect stings[edit] Low-magnification micrograph showing wedge-shaped perivascular inflammation (superficial dermal perivascular lymphoeosinophilic infiltrate), the histomorphologic appearance of an insect bite (H&E stain). The reaction to a sting is of three types. The normal reaction involves the area around the bite with redness, itchiness, and pain. A large local reaction occurs when the area of swelling is greater than 5 cm. Systemic reactions are when symptoms occur in areas besides that of the bites.[2] The left side of the image is showing the temperature increase caused by an insect bite after about 28 hours. Characteristics of feeding bites of insects and other arthropods[edit] Feeding bites have characteristic patterns and symptoms, a function of the feeding habits of the offending pest and the chemistry of its saliva. Pest Preferred body part Felt at time of bite Reaction mosquitoes exposed appendages often Low raised welt, itches several hours. midges and no-see-ums exposed appendages usually Itches several hours. fleas prefer ankles and bare feet usually May make red itchy welt; several days. Later bites are less severe. biting flies (Tabanidae) any exposed skin painful and immediate Painful welt, several hours. bed bugs appendages, neck, exposed skin usually not Low red itchy welts, usually several together resembling rash, slow to develop and can last weeks. lice pubic area or scalp usually not Infested area intensely itchy, with red welts at bite sites. larval ticks Anywhere on body, but prefer covered skin, crevices. Usually not; may be scratched off before they are seen. Intensely itchy red welts lasting over a week. adult ticks covered skin, crevices, entire body usually not Itchy welt, several days. May transmit diseases Microscopic appearance[edit] The histomorphologic appearance of insect bites is usually characterized by a wedge-shaped superficial dermal perivascular infiltrate consisting of abundant lymphocytes and scattered eosinophils. This appearance is non-specific, i.e. it may be seen in a number of conditions including:[3] See also[edit] References[edit] 1. ^ Allen, Arthur C. (March 1948). "Persistent "Insect Bites" (Dermal Eosinophilic Granulomas) Simulating Lymphoblastomas, Histiocytoses, and Squamous Cell Carcinomas". Am J Pathol. 24 (2): 367–387. PMC 1942711. PMID 18904647.  2. ^ Goddard, Jerome (2002). Physician's guide to arthropods of medical importance. Boca Raton: CRC Press. p. 14. ISBN 0-8493-1387-2.  3. ^ Alsaad, KO.; Ghazarian, D. (Dec 2005). "My approach to superficial inflammatory dermatoses.". J Clin Pathol 58 (12): 1233–41. doi:10.1136/jcp.2005.027151. PMC 1770784. PMID 16311340.  External links[edit]
ESSENTIALAI-STEM
TRIP PLANNING COMMUNICATIONS OPTIONS IN THE OUTBACK Staying in touch has never been easier   It’s much more relaxing in the Outback when you know that reliable contact with the outside world is only a button-push away. We recommend the satellite telephone as the top communication option in the Outback, we never leave home without ours - and its battery chargers. It's a great comfort knowing that we are just a phone call away from help in an emergency situation. It's relatively inexpensive to hire one for a one-off trip or to buy if you're often away from a mobile service area. 80-channel cbUHF (CB) radios are great for vehicle to vehicle communication, but near on useless in an emergency if there isn't anyone close-by that also has one. Mobile telephones are great, when you're in a mobile service area - there's not much service in the Outback or remote areas. We know that 27MHz CB radio contact could be achieved across hundreds of kilometres, using the ionospheric ‘skip’ effect that bounces these frequency waves from the upper atmosphere back to the earth, and we’ve heard of freak conditions that allow a cell phone to work outside the cell network, but you cannot expect a mobile phone or any CB radio to provide reliable, long-distance communication in remote areas. Mobile ‘cell’ phones are designed to work only when inside the range provided by a transmission tower - around 30 kilometres. The only reliable, long-distance communications choices for remote area use today are HF (high frequency) radio and satellite phone. Vehicle to Vehicle Chathand held cb The best use for CB radios is for line of sight communications between vehicles. The height of the aerial, the type of terrain and the transmitting power of the radio dictate how far your signal will reach, but 15km is the practical limit in typical Australian conditions. Handheld radios reach less distance: about eight kilometres for a two-watt unit and around four kilometres for a cheap unit. A CB is a means of keeping in touch with your convoy mates, or swapping track information with passing vehicles. In some areas – notably the popular Simpson Desert - the CB is an essential safety tool, to check on the whereabouts of oncoming or overtaking vehicles. The high dunes in this Desert often make relying on visual contact a risky business. You can broadcast your GPS position regularly and scan the channels for other transmissions, to make it less likely you’ll have any dune-top surprises. HF Radio hf radioThe traditional means of Outback telecommunication is HF radio, commonly known as ‘Flying Doctor’ radio. Before the advent of satellite telephones HF radio was the only means of mobile communication that 4WD owners could rely on. High frequency radio transmissions are in the 2-25MHz (megahertz) waveband, just below the 27MHz AM CB band, and HF transmissions exploit the ‘reflect and bounce’ factor that can sometimes work for 27MHz radios, but with much more power and with tuneable aerials. Operating an HF radio isn’t as easy as simply picking up a mobile phone or a CB radio. There’s the additional complication of signals travelling great distances and potentially causing interference, so a licence is necessary to ensure that HF radio operators are aware of correct usage. It takes a little practice to get used to radio protocol, but once you’re in the swing of it the HF world is great fun. Most 4WD HF radio users join an organisation that has access to frequency channels, including Royal Flying Doctor Service channels, and a licence to use those frequencies is part of the membership procedure. The most popular 4WD organisation is the VKS-737 Radio Network, which has base stations in Adelaide, Alice Springs, Cairns, Charters Towers, Darwin, Derby, Newcastle, Perth, Sydney and Swan Hill. Basic HF radios allow free of charge communication between vehicles and between vehicles and network bases. VKS-737 HF radio bases can provide information on weather conditions and road closures, as well as providing a message service. HF broadcasts include Radio Australia, the BBC World Service and the Voice of America. The VKS-737 Radio Network has engaged Radtel to perform its radio telephone connections. We’ve used HF radios on land and sea for many years and find it reassuring to have the radio crackling from time to time with bush chatter or track condition reports. Satellite Phone satphoneThe best known Australian satellite phone networks are Iridium and Globalstar, but there’s a new player in the game, Thuraya. Thuraya phones are becoming available and offer combined GSM/satellite connection, but the model we checked out needed to be stationary when operating. The Iridium Network provides global coverage by using 66 low-orbit satellites, so a Telstra-Iridium phone can be used anywhere in the world. The main limitation of a satellite phone is the need for the handset aerial or wired-in remote aerial to have a clear view of the sky. HF or Sat There’s no doubt that a handset satellite phone is more portable than an HF radio that needs to be installed in a vehicle, with a power supply and a large aerial. A satphone can be carried when bush walking, or out in a ‘tinnie’, fishing. In many cases this portability answers the HF or satphone question. A satellite phone will set you back around two grand, but there are hire companies all over Australia that will happily rent you one for the duration of your trip. Where portability isn’t an issue an HF radio has some advantages over a satphone, including the ability to have free contact over long distances between vehicles and bases, including the Royal Flying Doctor Service. There’s also the community spirit enjoyed by HF radio club users, who can communicate with like-minded bush travellers and experienced base station operators. The cost of operating an HF radio is less than using a satphone, provided the user is taking advantage of free and low-cost communications options. However, using an HF radio for phone calls costs around a dollar per minute, or about the same as the average satphone call cost. A new HF radio with an auto tune aerial is a $4000 investment, but there is a large used radio market, with prices for basic sets starting at $500. A tip when looking at used Codans is that the first two model number digits denote the age: a 9323 is a later model than an 8528. It’s possible to hire HF radios and satphones, so if your bush communication needs are temporary that’s probably the way to go. Distress Beacons epirbDistress beacons are mandatory on boats travelling more than two nautical miles offshore, but they’re also popular with Outback travellers. Changes to the search and rescue system made many existing distress beacons obsolete from February 2009. Distress beacon transmitters, commonly called EPIRBs (emergency position indicating radio beacons) communicate with Cospas-Sarsat, the international satellite system for search and rescue operations. Analogue-signal distress beacons allowed location within a 20-kilometre circle, but the latest digital units shrink the search zone to around 120 metres. There used to be two operating frequencies - 406MHz and 121.5MHz – but as of 1 February 2009 the 121.5MHz analogue frequency was no longer received by the satellites. Relying on a 121.5 MHz distress beacon is dangerous, because the only receiver of a 121.5 MHz alert would be an over-flying aircraft, if the crew happened to be monitoring the frequency. Owners of 121.5MHz distress beacons need to replace them with digital 406MHz distress beacons. The change from analogue to digital was not change for change’s sake: the digital system allows quicker, more precise beacon positioning, and much faster response, as well as positive identification of the unit. Digital distress beacons aren’t affected by electronic interference that can be a problem with analogue units. Every 406MHz distress beacon must be registered with the Australian Maritime Safety Authority: it’s free and easily done on-line at the AMSA web site. The purpose of registration is identification of the beacon; giving search and rescue people information about the owner, as well as contact details so that the alert can be checked. Nearly all analogue distress beacon alerts are ‘false alerts’ and some have resulted in unnecessary and very costly rescue responses. With the contact details provided by registering a beacon an alert can be checked immediately. The best distress beacons are those with inbuilt GPS that provide precise location, if the unit can ‘see’ enough sky. EPIRBS and PLBs plbEPIRBS are designed for boats. They must float upright in water and transmit while afloat, operate for 48 hours and may be activated automatically by immersion. Australian-Standard PLBs (personal location beacons) float, but not necessarily in a manner that ensures signal transmission, operate for 24 hours and are manually activated. PLBs are much smaller than most EPIRBs and many are pocket-sized. A 406MHz PLB with inbuilt GPS capability costs around $600. There are some traps for the unwary distress beacon shopper. PLBs on sale in the USA and Canada are not required to float. These beacons do not meet the Australian Standard and will not be registered in Australia. A PLB is not a substitute for an EPIRB in the marine environment. Any 406MHz beacon registered with AMSA is required to be coded with an Australian country code. There may be difficulties recoding a 406MHz beacon produced for overseas markets. How EPIRBSs and PLBs Work epirb systemWhen a distress beacon is activated, it transmits a signal that is detectable by Cospas-Sarsat satellites and overflying aircraft. As the satellites orbit the Earth they ‘listen’ for any active beacons and report their position to rescue authorities. Beacons developed for the satellite system use digital technology that allows the beacon to transmit a unique code (HexID or UIN) that identifies the beacon. The code can be found on the label of all 406 MHz distress beacons. When the HexID is decoded it reveals the country code (503 is Australia) and, in the case of beacons with input, a GPS position. The Australian Maritime Safety Authority’s (AMSA) Rescue Coordination Centre (RCC) then accesses the registration database and finds the owner details, including up to three nominated emergency contacts. Distress beacons with GPS positioning allow location almost instantly, but positioning of non-GPS units requires several satellite passes and takes longer. Rescue response times depend on the time it takes for a search and rescue (SAR) unit, such as a helicopter, aircraft or ground party to be prepared and sent to the search area. The further you are from support the longer the rescue takes. Beacon or Satphone On Outback trips we always carry a PLB, but we also have an Iridium satellite phone. On two occasions we’ve needed to contact emergency services and both times we used the satphone. However, it was comforting to know that the PLB was at the ready. Regular Outback travellers may qualify for a satphone subsidy, which effectively reduces the price of a satphone to around $500: less than a PLB with GPS. Satphones and PLBs are available through various hire companies, for those who need only occasional Outback emergency support.     « Go Back
ESSENTIALAI-STEM
View All Articles Newer tests may help you better understand your child’s food allergy May 06, 2015 A severe food allergy is often a complex and confusing diagnosis. It’s also one of the most common medical issues, especially in children. Many parents of food-allergic kids remain somewhat perplexed about their child’s condition long after diagnosis. Will my child outgrow this allergy? What exactly is okay to feed to my child and what isn’t? Is this really a serious issue or can we relax a little? These questions often linger unanswered, and that’s not a good thing. Unfortunately, there isn’t a one-size-fits-all cure for these unanswered questions. Even as a healthcare professional, I have been the recipient of misinformation and misunderstanding about my own child’s food allergy, and I know I am not alone. However, there is some good news that may help parents like me: food allergy component testing for peanuts, egg and milk. Before we talk about food allergy component testing, there are some things about allergy testing that you should keep in mind. First, there is no perfect test that will give us all of the answers we desire. Food allergies are more like a puzzle than a fill-in-the-blank. Allergy tests can provide one piece of the puzzle that helps put together the whole picture, but testing alone can never give us the whole picture. Second, if we tested the blood of every person we know, many of those tests would come back positive. Does that mean that all of those people have a food allergy? It doesn’t. Many people who test positive for a food allergy aren’t actually allergic. This means that we can’t rely on tests alone to give us all of the information. The true test of whether someone is allergic or not is whether they have a reaction (such as vomiting, cramps, hives, trouble breathing) when they are exposed to a particular food. (For more information on the symptoms associated with food allergies, click here). Food allergy component testing However, for those children who have had a reaction when they’ve consumed a specific food, allergy testing can be a valuable tool in figuring out the puzzle for that child. If your child has had a suspected allergic reaction, your doctor may order a blood test. This will test your child’s blood for an immune response to the things likely causing an allergy. A positive blood test along with your child’s reaction when exposed to a particular food can help your doctor say with relative certainty that your child is allergic to that food. That used to be as far as the blood test could take us. Newer technology now allows us to take those blood tests a step further by testing which components of a food (if the allergy is to egg, milk or peanuts) your child is allergic to. As an example, think of a child who has had a reaction to milk and a positive blood test that indicates a milk allergy. We can now determine which of the proteins in the milk he is allergic to. What we know about these proteins allows us to create a profile of what your child’s allergy might look like. Helps you determine what foods may be tolerated Knowing which proteins your child is allergic to can help you figure out which foods he likely can or can’t tolerate. If he has a milk allergy is it necessary to avoid all products that have been made with milk (like breads and cakes) or only milk itself? The answer to this question will have a profound impact on your daily life, and component testing helps you answer that question. Some proteins are easily destroyed by heat, and if your child is allergic to one of these heat-sensitive proteins, he is likely to tolerate foods that include milk when the food has been baked. You may feel much more comfortable allowing your child to try a baked milk product knowing that there is a high likelihood he will be able to tolerate it. Helps you understand the likelihood of a severe reaction  Certain proteins contained in eggs, milk and peanuts are known for their ability to cause more severe reactions than others. Knowing which specific proteins your child is allergic to can help you gain a better understanding of the likelihood that your child will have a severe reaction if exposed. Because food allergies do have the potential to be severe and life-threatening this cannot offer you any guarantees, but again, may be one piece of the puzzle that helps you see the whole picture. Helps you understand the likelihood of outgrowing the allergy We know that children are more likely to outgrow an allergy to milk or eggs than to peanuts. Beyond that, we now know that certain proteins within each of these foods are associated with a higher chance of children outgrowing the allergy. While no test can tell you for certain that your child will outgrow their allergy, component testing allows you to gain a better understanding of your child’s individual likelihood of putting their food allergy behind them.  Helps you pinpoint crossreactivity Knowing which proteins within a food that your child is allergic to may also tell you something about other foods that could cause a reaction. For instance, a certain protein in milk is very similar to a protein in beef products. If you know your child is allergic to that milk protein, you might expose them to beef cautiously. Some proteins in peanuts are very similar to those of the birch tree, and a child might be sensitive to both. Helps you determine whether eligible for oral food challenge The true test of a person’s allergy is whether they react when exposed. There may come a time when your doctor wants to test whether your child’s reaction when given a certain food (in a safe and controlled manner, as directed by a doctor). This oral food challenge is the gold standard in answering questions about food allergies. However, it can be risky because of the potential for severe reactions. The information we gain from component testing- whether a child is likely to have severe reactions, the likelihood of a child outgrowing the allergy, potential crossreactivity- will be helpful information in deciding if and when to undergo an oral food challenge. Allergy component testing offers us a greater ability to piece together a picture of our child’s specific allergy, and it helps us gather information that will inform our choices and next steps. If your child has been diagnosed with a food allergy, you may want to ask your doctor if component testing would be helpful. Ask him or her what information you could gain from component testing and whether these tests might change how you understand your child’s diagnosis or how you proceed together in your child’s medical care.
ESSENTIALAI-STEM
0 Traditional recovery steps After a forced startup due to a wifi connection issue, the startup stayed stuck with a grey screen, Apple logo and turning spinning indicator. Then I tried all the following solutions: 1. Startup in Safe mode: failed 2. Reset the NVRAM: failed 3. Startup after checking disk and files with the disk utility of the recovery disk: failed. The disk check was successful and the permissions check revealed some inconsistencies but all have been repaired successfully. Startup on the recovery disk was successful. Using Single User startup mode Then I started in Single User Mode and followed some guidelines found on Apple pages and various forums. 1. I reach a #root prompt after hfs: mounted Macintosh HD on device root_device XPCM: registered Root device is mounted read-only With a proposed alternative to modify the files or to continue the booting process. 2. I applied /sbin/fsck_hfs -fy. It returned: ** The volume Macintosh HD seems to be OK ** and ***** The volume was modified ***** 3. I applied /sbin/mount -uw /. It finished with /dev/disk0s2 on / (hfs. local. journaled) 4. I applied launchctl load /System/Library/LaunchDaemons/com.apple.opendirectoryd.plist. It returned: Couldn't stat <plist> No such file or directory. Nothing found to load Using dscl(1) I read somewhere that the previous error message could be ignored in some situation, but it was impossible for me to determine if it was the case here. I went into dscl(1) as the issue seemed to come from Open Directories. I stayed in the interactive mode as I'm not expert to take the risk of modifying the files and I was not sure of which files to check. 1. The answer was the same than the previous error message indicated above: "nothing found to load" 2. A ls command returns: ls: DS error: eServer error; <dscl_cmd> DS Error: -14910 (eServer error;) 3. I exited the dscl interactive mode to come back at the #root prompt. Trying to look at plist content 1. Through the command line I changed the current directory to look at files in /System/Library/LaunchDaemons. All files are there, with dates, size and permissions. 2. Some things surprised me. When asking a simple cd not followed by options the return is -sh: -cd: HOME not set. Maybe this is due to the Single User startup mode? The other one is that when I ask cd .. whatever could be the current directory position in the tree I get -sh: -cd: No such file or directory 3. I then tried to open a plist to check its content with plutil -convert xml1 <file name> as I was in the LaunchDaemons directory. I first tried with another file, like com.apple.newsyslog.plist. It returns file doesn't not exists or is not readable or is not a regular file. The same answer is returned for the opendirectoryd.plist file. Files of this directory are all dated as of Sep 23, probably the date where the system was installed when I bought the MBP, the size of opendirectoryd.plist file is 698 ko and authorisations are -rw-r--r-- 4. I tried also to open one of my files in the user directories as this error message was maybe due that they were system files. But I had the same answer with a plist I built myself and I was sure to be valid as it's used by XCode in my developments. I'm now stuck there ignoring what could be the next step. I would like to avoid re-installing the system. I feel that it's like the startup is unable to find an entry point in the directories even if the command line finds files traditionally. But it's just an assumption. If its true, is thee a way to make him find the files? Add-on's after initial post 1. On Feb. 8 (22:50 UTC). I got another computer to connect the MBP in target mode. I was able to open the plist with PropertyList Editor to check that the content was not corrupted. Plist files are valid, even if I don't know if their content is pertinent with the situation. Thanks for your help. MacBook Pro (Retina, 13-inch, Late 2013), OS X Mavericks (10.9.1) 0 1 Answer 1 1 Your Mac has Internet Recovery, so you can boot to that and reinstall to a USB drive or SD card while leaving your internal SSD intact. • Should that fail, you have a good case to seek hardware repair from Apple or someone else you trust. • Should that work, then you can decide whether to wipe the SSD and reinstall or perhaps use the clean OS to assist in cleaning up or backing up files in preparation for reinstalling on the internal SSD. If you repeat your fsck in single user mode, it should eventually come up clean or with a permanent error. I would use the Recovery HD to run fsck / Disk Utility since that is less likely to have corruption than your OS (which still runs in a limited mode in single user mode). It's entirely possible you have software corruption that single user mode can't fix or a failing hard drive - but given the work you've done, I'd take a positive step by installing a clean OS on a clean drive before investigating the current OS more. 2 • Installation on an external HD was successful. But how to perform fsck on the former system's drive as it is no longer part of it. fsck actually checks only the external drive where new OS has just been installed. – phbardon Commented Feb 14, 2014 at 14:12 • @phbardon So internet recovery solved this for you? – bmike Commented Nov 11, 2015 at 17:44 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
ESSENTIALAI-STEM
hydroisomerization Noun * 1) The isomerization of alkane hydrocarbons via an intermediate alkene; used especially in oil refining
WIKI
A $21,634 bill? How a homeless woman fought her way out of tow-company hell | The Seattle Times The car Amanda Ogle lived in was stolen, then towed, then sold off for a measly $175. Not even a court order could get it back. But she didn't give in, and this week won a victory in court to reclaim the old car and her life. When calculating your bill, tow companies are sticklers for marking the passage of time. So let's note for the record that when it was finally over, it took Amanda Ogle a total of 369 days, 22 hours and 51 minutes to extract her car from tow-company hell. It also took two court orders. And it leaves unresolved the largest towing bill I've ever seen for $21,634. All due to a belligerent tug of war over a car valued at less than a grand. That's what it would be worth to you and me, anyway. But Ogle is homeless, and was living in her 1991 Toyota Camry. So the car is both the only thing of value she owns, and her home. They thought I would break and go away, Ogle told me outside the U District homeless shelter where she's staying these days. They ignored the wrong person. I am shocked by this case, said Ogle's attorney, Kevin Eggers. I do consumer law for a living, and it's totally outside my realm of experience to see a company just ignore a judge's court order for this long. Ogle's yearlong odyssey began in October 2017, when her car was stolen from North Seattle. She reported it to police. They told her the next day that her car was found parked at an apartment building in SeaTac, and then towed. Ogle went down to the tow yard and tried to get the car. No dice unless she paid $427, which she says she could not do. The tow yard, run by Dick's Towing, refused to give it back to her though they knew it had been stolen, and she told them she was homeless. At this point, nobody had really done anything wrong. But then Ogle filed a request for King County District Court to review the tow. This is a standard thing, and the form was provided to her by Dick's. But pre-typed on it was the name and address of Dick's sister company, Lincoln Towing of Seattle. The companies have the same president and general manager and are both owned by Road One West. This triggered the court notifying Lincoln Towing of the hearing (it was their form, after all). Ogle says she also called both tow companies, pleading with them to hold onto her car until the hearing. But the tow company claimed later they hadn't been properly notified, and so didn't show. Ogle represented herself. The judge, learning the basic facts of the story, concluded what any common-sense person would: The old car's everything to her, and she is blameless. So just give it back. The vehicle was stolen, Judge Ketu Shah wrote on his order. Vehicle must be returned to registered owner. Well that's where it gets infuriating. It turns out the towing company had already sold off Ogle's car for a measly $175. So I win a court order on my own, but I still lose, Ogle recalls thinking at the time. I almost gave up right there. I might have, if they had ever just called and said they were sorry or something. Instead, Ogle found the Northwest Consumer Law Center, a tiny two-lawyer shop formed in Seattle recently to help the poor with consumer problems. An attorney there, Eggers, sent Lincoln a letter citing the judge's order and asking for damages. Lincoln responded that it had bought the car back and Ogle could have it but only if she first released any claims against the companies. So basically they were using the car as leverage to get out of any liability, Eggers said. The car is Amanda's home, and it was the middle of winter. But to them it's a bargaining chip. Lincoln then played tow-company hardball. The company started gouging her $75 per day to store the car. That's $2,300 per month enough to rent the 27-year-old car its own apartment with granite countertops in a downtown high-rise. By Monday, the bill, with tax, had reached $21,634. Additional fees may apply, it says helpfully at the bottom. But that day, Ogle went before another judge and asked him to hold Lincoln in contempt. The two sides had incredibly filed 21 different pleadings totaling more than 300 pages. Lincoln, in its filing, said that it had gone to extraordinary lengths to return the car to Ogle by which it means offering her $1,000 to drop her lawsuit last spring. Judge Gregg Hirakawa laser-focused on how the first court order had been ignored for nearly a year. Judges can play hardball, too. For every calendar day Lincoln Towing does not return the vehicle, Lincoln Towing will forfeit a sum of two-thousand dollars to the court, Hirakawa's new order says. Message delivered, as Lincoln released the car that afternoon (though not the title). The two sides will continue to battle about damages in court, the title and that outrageous $21,634 bill. But Ogle said she feels like a lost year of her life has been found. I drove down the freeway, with the windows open, saying 'I'm free! I'm finally free,' she said. I can't top that, but will add two things. One is that Lincoln Towing is the city of Seattle's official tow partner. Hey Seattle, did you know you're in league with a company willing to charge homeless people car-storage fees higher than the average apartment rent? Two: Remember years ago when I wrote all those columns about the $800 tow and how Seattle was the price-gouging Wild West of towing? And politicians rushed in and passed new ordinances and state laws, then proclaimed they had fixed it all? Take it from Amanda Ogle: They didn't. Correction: In an earlier version of this story, Ogle's name was misspelled in the 6th paragraph.
NEWS-MULTISOURCE
Checkpoints and long queues as Wuhan goes into lockdown [Video] Checkpoints were in place in Wuhan, China on Thursday (January 23) as the death toll from the new flu-like virus rose to 25 and more than 800 cases have been confirmed, according to China's National Health Commission. Most of the cases were found in Wuhan city, where the virus is believed to have originated in a market which traded in illegal wildlife. Wuhan disinfected its public bathrooms on Thursday and long queues formed outside shops and markets, as people prepared to stay home during the Lunar New Year weekend. The World Health Organisation (WHO) on Thursday declared the new coronavirus an emergency for China but stopped short of declaring the epidemic of international concern.
NEWS-MULTISOURCE
Analysis with ImageJ and Visualization in the Jupyter Notebook fiji visualization imagej python imagej-ops jupyter #21 Can you successfully import imglyb (without importing any imagej) in that conda environment? #22 No, I can’t. It raises the same error. ImportError: DLL load failed: The specified module could not be found. I tried reinstalling from the terminal but still doesn’t work. activate imglyb (imglyb) C:\Users\User>conda install -c hanslovsky imglib2-imglyb #23 The issue is with the conda build of PyJNIus. I tried on a Windows laptop and I got the same error. I tried to build the conda package for PyJNIus again on Windows but it failed with the same error. Unfortunately, my windows knowledge and debugging skill is very limited. It already took me hours to get conda to (try and) build, so I cannot help here, unfortunately. #24 Until we find maintainers for the conda packages for Windows, I will not be able to provide PyJNIus on conda, unfortunately. The only other option would be to try and build PyJNIus yourself. My hope is that you could run imglyb then. #25 As stated in the other thread (Imglyb and PyJNIus conda package maintainers needed for Windows and OSX) it seems like I was able to fix the build issues on windows with the help of @jakirkham and @jjahanip PyJNIus (and eventually imglyb) will be available on conda-forge (instead of my personal channel): https://github.com/conda-forge/staged-recipes/pull/6091 @malj390 I will also update my anaconda channel tonight (when I have access to a Windows machine) with an updated Windows conda package, which should hopefully fix your particular issue for now. #26 @malj390 I just updated the imglib2-imglyb and imglyb-examples packages on my conda channel hanslovsky. I confirmed on a Windows 10 machine that it works. Please let me know if there are any issues.
ESSENTIALAI-STEM
I've Got So Much to Give "I've Got So Much to Give" is an R&B contemporary romantic ballad composed and recorded by popular soul artist Barry White and released in 1973. It was originally conceived by White as a single but then featured on the album of the same name (released in 1973), that peaked at number one on the Hot R&B Albums Chart. Composition Barry White composed and arranged both the instrumentals and the vocals. The song begins with a brief instrumental solo performed by The Love Unlimited Orchestra, the instrumentals are repeated while White speaks romantic words to his apparent love interest, this style is also used in his version of "Just the Way You Are". Influence and reception The romantic lyrics used in the song helped craft White's sexual persona, and his orchestral combination of instruments in an R&B song. The song is often used in romantic novels and films. In a play written by Mark Frank (included in the book A Collection of Plays Written by Mark Frank), one of the main protagonist transforms himself into Barry White and performs the song. Credits * Arrangements by Gene Page and Barry White * Composition and vocals by Barry White * Instrumentals and background vocals performed by The Love Unlimited Orchestra Chart performance The song peaked at number 32 on the Billboard Hot 100 chart and charted for 11 weeks. It also reached number five on the US Billboard R&B chart and number 46 on the US Adult Contemporary chart.
WIKI
How To Keep Tools from Rusting in Garage Eagle's Garage may collect a share of sales or other compensation from the links on this page. This comes at no additional cost to you, and all the prices and availability are accurate at the time of publishing. They’re called grease monkeys, not rust monkeys. Rusting is a leading cause of the death of your wallets and having to replace tools. A lot of them are passed down through generations of homeowners. To have a gift for your next generation, you’ll need to know the proper upkeep for your tools. These tips will help remove rust and keep tools from rusting in your garage. mechanical tools on shelf and on wall What is Rust? Rust is formed when metals react to water and oxygen. It’s a scientific reaction that most untreated metals go through. Rust can affect tools differently. Some tools can be rendered useless and others just damaged. You have to be aware of what your tools are and how to care for them. How Different Type of Tools Rust Iron and steel are the easiest materials to rust. Quickly after water and oxygen come in contact, oxidation starts almost immediately. Saltwater will not rust your tools but if your tools are already rusted, it will speed up the process. Acid rain also causes rust but that’s not as common of an issue. Some tools such as aluminum and copper do not rust by traditional means. Aluminum is a special case as it has a protective layer that prevents it from rusting. Copper does not rust by water but can be tarnished by the environment. Saltwater and heat can also cause copper to corrode at a more rapid rate. How to Prevent Tools From Rusting in Garage There are multiple ways to prevent your tools from rusting and corroding. Most ways involve the storage of the tools but there is a spray you can use. The anti-corrosive spray cleaner can both help prevent rust and clean off pre-existing corrosion. Use the spray to coat the tools and let them dry. It will last several months depending on how much you use the tool. Preventing damage is one of the simpler ways to preserve your tools. When you protect your tools, they will maintain their protective outer layer longer. Nobody is saying wrap up your tools and not use them but laying them carefully as to stop them from falling. Small chips and scratches create bigger openings for rust to settle in. Handling your tools with care is an amazing form of preservation. The air in your garage really controls how your tools rust. With moisture and oxygen being the two causes of rust, the humidity and airflow in your garage are important. Maintain the airflow in your garage by either installing a fan or making sure there is proper ventilation. Opening a window or keeping your garage door open for a few hours helps circulate air for a cheaper price. To remove moisture, a dehumidifier is a go-to. The combination of a dehumidifier and airflow will prevent most rust from starting in your garage. It shouldn’t be too much of an issue inside a garage but keep your tools from getting wet. Store your tools on a table or in an airtight container in case of flooding. If your tools are covered, it’s great to protect them from leaks in the roofs. Sturdy containers are also an extra protective layer from the environment. Moisture, drastic temperature changes, and random gusts of wind can be greatly diminished in a protective case. Easy Ways to Clean Rust Off Tools You can’t stop all your tools from rusting but when your tools rust you can remove the rust. Aside from the spray that was mentioned earlier, you can use lemon juice to remove rust. Submerge your rusty tool in lemon juice. After submerging, cover in coarse salt and wipe clean. This will remove most (if not all) of the rust. If not happy with the results, let soak in lemon juice and salt longer. Baking soda is another great way to remove rust. Pour baking soda and water into a bowl until a paste is formed. Use that paste to cover your tools and let sit for at least 3 hours. To remove the paste, run clean water as you scrub with a steel wool brush (steel wool balls are an acceptable substitute). Repeat the process as necessary until desired results. A vinegar bath is a smoother way to remove rust. Combine white vinegar and equal parts of water. Just let the tools soak in the white vinegar mixture. The reaction can take anywhere from one to three days. The chemical reaction will make the rust removable with a wipe of a clean cloth or towel. Properly dry the tools and store them back in the garage.  If you think this article is too long to read, just boil your tools in coke and cover them in cooking oil to preserve them. That’s an old back alleyway for it. It’s best if you just follow the article. For more tips and information, check out our website today. Leave a Comment Our Best Content In Your Inbox
ESSENTIALAI-STEM
Arvo Ketonen Arvo Mikael Ketonen (19 November 1888, Uusikaupunki – 27 May 1948) was a Finnish journalist, media executive and politician. He was a Member of the Parliament of Finland from 1939 to 1945, representing the National Progressive Party. His second wife, who followed him in running Turun Sanomat, was Irja Ketonen.
WIKI
Page:Buddhist Birth Stories, or, Jātaka Tales.djvu/105 TABLE II. THE KALILAG AND DAMNAG LITERATURE. 1. A lost Buddhist work in a language of Northern India, ascribed to Bidpai. See above, pp. lxx-lxxii. 2. Pēlvī version, 531-579 A.D. By Barzūyē, the Court physician of Khosru Nushīrvan. See above, p. xxix. 3. Syrian version of No. 2. Published with German translation by Gustav Bickell, and Introduction by Professor Benfey, Leipzig, 1876. This and No. 15 preserve the best evidence of the contents of No. 2, and of its Buddhist original or originals. 4. (Fables of Bidpai). Arabic version of No. 3, by Abd-allah, son of Almokaffa. Date about 750 A.D. Text of one recension edited by Silvestre de Sacy, Paris, 1816. Other recensions noticed at length in Ignazio Guidi's 'Studii sul testo Arabo del libro di Calila e Dimna' (Rome, 1873). 5. English version of No. 4, by Knatchbull, Oxford, 1819. 6. German version of No. 4, by Wolff, Stuttgart, 1839. 7. Greek version of No. 4, by Simeon Seth, about 1080 A.D. Edited by ''Seb. Gottfried Starke, Berlin, 1697 (reprinted in Athens, 1851), and by Aurivillius,'' Upsala, 1786. 8. Latin version of No. 7, by Father Possin, at the end of his edition of Pachymeres, Rome, 1866. 9. Persian translation of No. 4, by Abdul Maali Nasr Allah, 1118-1153. Exists, in MS. only, in Paris, Berlin, and Vienna. 10. Persian translation, through the last, of No. 4, by Husain ben Ali el Vāiz U'l-Kāshifī; end of the fifteenth century. 11. English version of No. 10, by Edward Eastwick, Hertford, 1854. 11a. Another English version of No. 10, by Arthur N. Wollaston (London, Allen). 12. French version of No. 10, by David Sahid, d'Ispahan, Paris, 1644, 8vo. 13. Italian version of No. 7, Ferrara, 1583; by Giulio Nūti. Edited by Teza, Bologna, 1872.
WIKI
Oil slips as US-China trade talks loom Oil prices ended the day little changed on Monday as U.S.-China trade talks loomed. Brent crude rose 13 cents or 0.2% to $58.50 a barrel, while U.S. West Texas Intermediate (WTI) crude settled down 0.1% at $52.75 per barrel. Both futures contracts ended last week with a more than 5% decline after dismal manufacturing data from the United States and China, with the trade row between the world's top economies undermining global economic prospects. U.S. and Chinese officials meet in Washington on Oct. 10-11 in a fresh effort to work out a deal, which U.S. President Donald Trump said his administration had a "very good chance" of achieving. On the supply side, deadly anti-government unrest has gripped Iraq, the second-largest producer among the Organization of the Petroleum Exporting Countries. The unrest helped buoy oil prices earlier in the day, with Brent and WTI gaining more than 1% each at one point. Iraq's oil exports of 3.43 million barrels per day (bpd) from Basra terminals could be disrupted if instability lasts for weeks, Ayham Kamel, Eurasia Group's practice head for Middle East and North Africa, said in a note. "Any oil production disruption would occur at a time when Saudi Arabia has lost a significant part of its energy system redundancies (spare capacity)," he said. The major Buzzard oil field in the British North Sea was also shut for pipe repair work, China's CNOOC said on Friday, while Shell maintains force majeure remains on exports of Bonny Light crude in Nigeria. Still, Total's giant Johan Sverdrup offshore oil field started up in the North Sea this month with a goal of achieving 440,000 bpd at peak production. Libya's National Oil Corporation (NOC) said on Sunday it would close the Faregh oil field at Zueitina port for scheduled maintenance from Monday until Oct. 14. But analysts said the resumption in Saudi Arabian production after Sept. 14 attacks could undermine a price rally. "The Saudi attacks have quickly been forgotten about and global growth is back to being the main driver of oil markets," said Craig Erlam, senior market analyst at OANDA. "Such complacency could come back to bite oil traders as another aggressive spike will likely accompany any further escalation in the region." Despite Monday's gains, Brent is still down more than 20% from the 2019 peak of $75.60 a barrel recorded in April. But OPEC Secretary-General Mohammed Barkindo said it was still too early for the group to discuss deeper oil output cuts to support prices, Russian news agency TASS reported on Monday.
NEWS-MULTISOURCE
1911 Encyclopædia Britannica/Azoximes From Wikisource Jump to navigation Jump to search AZOXIMES (furo [a.b.] diazoles), a class of organic compounds which contain the ring system HC = N   N = CH Rangle.svgO. They may be prepared by converting nitriles into amidoximes by the action of hydroxylamine, the amidoximes so formed being then acylated by acid chlorides or anhydrides. From these acyl derivatives the elements of water are removed, either by simple heating or by boiling their aqueous solution; this elimination is accompanied by the formation of the azoxime ring. Thus C6H5CN NH2OH   C6H5·CLangleIT.svg N·OH   NH2 boil with propionic anhydride [ C6H5C LangleIT.svg N·O·COC2H5   NH2 ] C6H5·C LangleIT.svg N·O   N RangleIB.svg C·C2H5 Azoximes can also be produced from α-benzil dioxime by the “Beckmann” change. Most of the azoximes are very volatile substances, sublime readily, and are easily soluble in water, alcohol and benzene. For detailed descriptions, see F. Tiemann (Ber., 1885, 18, p. 1059), O. Schulz (Ber., 1885, 18, pp. 1084, 2459), and G. Müller (Ber., 1886, 19, p. 1492); also Annual Reports of the Chemical Society).
ESSENTIALAI-STEM
Perrinia stellata Perrinia stellata is a species of sea snail, a marine gastropod mollusc in the family Chilodontaidae. Description The shell size varies between 9 mm to 17 mm Distribution This species is distributed in the Red Sea and the Western Indian Ocean.
WIKI
Lazhar Ben Mohamed Tlil Lazhar Ben Mohamed Tlil is a citizen of Tunis, and longtime resident of Italy. After traveling to Italy Tlil committed petty crimes to support a drug habit. During a period when he was trying to quit his addiction to drugs Tlil traveled to Afghanistan, and received some military training at an Afghan training camp. Upon his return to Italy Tlil returned to crime, and was caught, convicted and sentenced, for petty drug dealing. After al Qaeda's attacks on the Continental United States, on September 11, 2001, his attendance at the Afghan training camp became of acute interest to American security officials. When Italian prison officials allowed American security officials to interrogate him Tlil was able to identify several other Tunisians who were being held in Guantanamo. Tlil initially agreed to testify against individuals in Guantanamo, either in Italy, or in the United States. Tlil was released in return for his agreement to testify, and was placed in the Italian version of a witness protection program. When Adel Ben Mabrouk and Mohamed Ben Riadh Nasri, two Tunisians who also had a record of committing petty crimes in Italy, who had been captured in Afghanistan, and had spent seven years in extrajudicial detention in Guantanamo, were transferred to Italy, Italian prosecutor Elio Ramondini said it would be "impossible" to convict them without Tlil's testimony. According to reports from the Associated Press, from November and December 2009, while Lazhar had been willing to serve as a witness against the men, he had recently indicated that he might no longer cooperate, because he is unhappy with how Italy's witness protection program is administered. The Associated Press reported he was also being considered as a possible witness against some of the senior al Qaeda captives who were then expected to face trial in the USA. In 2012 Tlil was profiled in the news again, as a vocal critic of Italy's witness protection program.
WIKI
PID Temperature Controller RossS This is a PID (Proportional, Integral Derivative) temperature controller. It has been designed around the ATmega328P microcontroller utilizing the Arduino Duemilanove bootloader. *** NOTE - A separate Arduino board is NOT required, as this kit incorporates a basic Arduino clone.***** A PID controller works by measuring the error (difference between the Set Point (desired temp) and the Process Value (measured temp), It then performs 3 separate calculations on that error value, the first is PROPORTIONAL to the size of the error, the second is the INTEGRAL, which is the amount of time that the process has been in error, the third is the DERIVATIVE, in which it measures the rate of change of the Process Value. It then calculates the sum of the previous 3 calculations and applies that sum as a percentage of a given window of time in the form of a pulse to a solid state relay (in the case of temperature control loops). The Arduino code for this project has been adapted with single boiler home espresso machines particularly in mind, such as the Rancilio Silvia and the Le Lit PL041QE and others, however it is easily adapted to any other heating control application, such as Sous Vide Controllers, Kiln Controllers, etc The software for the Arduino PID controller itself consists of 3 main parts: the temperature reading code using the MAX31855 chip, the PID control algorithm code, and the menu system code, which allows changing of the Set Point and other parameters, such as temperature offset from boiler to group head. COMMENTS josephlee josephlee (Aug 22, 2013) With some adaption you could make a reflow soldering oven controller as an extension to this project.
ESSENTIALAI-STEM
How to Configure Custom Postfix Bounce Messages Since Postfix version 2.3, Postfix supports custom bounce messages. This guide shows how to set up custom Postfix bounce messages and max queue lifetime. 1 Postfix Version First you should find out about your Postfix version to make sure it supports custom bounce messages: postconf -d | grep mail_version server2:~# postconf -d | grep mail_version mail_version = 3.4.13 milter_macro_v = $mail_name $mail_version server2:~# If your Postfix is 2.3 or newer, then you're good to go. 2 Set maximal_queue_lifetime And delay_warning_time From http://www.postfix.org/postconf.5.html: maximal_queue_lifetime: The maximal time a message is queued before it is sent back as undeliverable. delay_warning_time: The time after which the sender receives the message headers of mail that is still queued. The postconf -n command shows the settings that are currently configured in /etc/postfix/main.cf, whereas the postconf -d command shows the default settings that are valid unless something else is set in /etc/postfix/main.cf. To find out about the current value of maximal_queue_lifetime, you can run postconf -d | grep maximal_queue_lifetime postconf -n | grep maximal_queue_lifetime If postconf -n doesn't display anything, this means the value from postconf -d is currently being used: server2:~# postconf -d | grep maximal_queue_lifetime maximal_queue_lifetime = 5d server2:~# postconf -n | grep maximal_queue_lifetime server2:~# The same goes for delay_warning_time: postconf -d | grep delay_warning_time postconf -n | grep delay_warning_time server2:~# postconf -d | grep delay_warning_time delay_warning_time = 0h server2:~# postconf -n | grep delay_warning_time server2:~# If you want to modify these settings, you can use the postconf -e command. It will write the settings to /etc/postfix/main.cf, e.g. like this: postconf -e 'maximal_queue_lifetime = 1d' postconf -e 'delay_warning_time = 0h' Restart Postfix afterwards: service postfix restart The reason that we care about these two settings is that their values can be used in the custom bounce messages. 3 Create A Custom Bounce Message From http://www.postfix.org/bounce.5.html: The template file can specify templates for failed mail, delayed mail, successful delivery or for address verification. These templates are named failure_template, delay_template, success_template and verify_template, respectively. You can but do not have to specify all four templates in a bounce template file. Each template starts with "template_name = <<EOF" and ends with a line that contains the word "EOF" We can now create the file /etc/postfix/bounce.cf which contains the templates like this (I'm using all four templates here, but you can leave out the ones you don't need). It is absolutely important that the file ends with an empty line! vi /etc/postfix/bounce.cf # # The failure template is used when mail is returned to the sender; # either the destination rejected the message, or the destination # could not be reached before the message expired in the queue. # failure_template = <<EOF Charset: us-ascii From: MAILER-DAEMON (Mail Delivery System) Subject: Undelivered Mail Returned to Sender Postmaster-Subject: Postmaster Copy: Undelivered Mail This is the mail system at host $myhostname. I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below. For further assistance, please send mail to <postmaster> If you do so, please include this problem report. You can delete your own text from the attached returned message. The mail system EOF # # The delay template is used when mail is delayed. Note a neat trick: # the default template displays the delay_warning_time value as hours # by appending the _hours suffix to the parameter name; it displays # the maximal_queue_lifetime value as days by appending the _days # suffix. # # Other suffixes are: _seconds, _minutes, _weeks. There are no other # main.cf parameters that have this special behavior. # # You need to adjust these suffixes (and the surrounding text) if # you have very different settings for these time parameters. # delay_template = <<EOF Charset: us-ascii From: MAILER-DAEMON (Mail Delivery System) Subject: Delayed Mail (still being retried) Postmaster-Subject: Postmaster Warning: Delayed Mail This is the mail system at host $myhostname. #################################################################### # THIS IS A WARNING ONLY. YOU DO NOT NEED TO RESEND YOUR MESSAGE. # #################################################################### Your message could not be delivered for more than $delay_warning_time_hours hour(s). It will be retried until it is $maximal_queue_lifetime_days day(s) old. For further assistance, please send mail to <postmaster> If you do so, please include this problem report. You can delete your own text from the attached returned message. The mail system EOF # # The success template is used when mail is delivered to mailbox, # when an alias or list is expanded, or when mail is delivered to a # system that does not announce DSN support. It is an error to specify # a Postmaster-Subject: here. # success_template = <<EOF Charset: us-ascii From: MAILER-DAEMON (Mail Delivery System) Subject: Successful Mail Delivery Report This is the mail system at host $myhostname. Your message was successfully delivered to the destination(s) listed below. If the message was delivered to mailbox you will receive no further notifications. Otherwise you may still receive notifications of mail delivery errors from other systems. The mail system EOF # # The verify template is used for address verification (sendmail -bv # address...). or for verbose mail delivery (sendmail -v address...). # It is an error to specify a Postmaster-Subject: here. # verify_template = <<EOF Charset: us-ascii From: MAILER-DAEMON (Mail Delivery System) Subject: Mail Delivery Status Report This is the mail system at host $myhostname. Enclosed is the mail delivery report that you requested. The mail system EOF You can customize the messages to your likings. In the messages, you can use all main.cf variables (e.g. $myhostname). If you take a look at the delay_template, you'll see that I use the additional variables $delay_warning_time_hours and $maximal_queue_lifetime_days. You could as well use $delay_warning_time_seconds, $delay_warning_time_minutes, $delay_warning_time_days, $delay_warning_time_weekes resp. $maximal_queue_lifetime_seconds, $maximal_queue_lifetime_minutes, $maximal_queue_lifetime_hours, $maximal_queue_lifetime_weeks, but keep in mind what http://www.postfix.org/bounce.5.html explains about these variables: delay_warning_time_suffix: Expands into the value of the delay_warning_time parameter, expressed in the time unit specified by suffix, which is one of seconds, minutes, hours, days, or weeks. maximal_queue_lifetime_suffix: Expands into the value of the maximal_queue_lifetime parameter, expressed in the time unit specified by suffix. See above under delay_warning_time for possible suffix values. So if you use the variable $delay_warning_time_minutes instead of $delay_warning_time_hours in your template, you should follow it by the word "minutes" instead of "hours". Next we configure Postfix to use the custom templates: postconf -e 'bounce_template_file = /etc/postfix/bounce.cf' To check what the templates look like when all variables are replaced with their real values, and to make sure that there are no errors in your templates (e.g. like a missing newline at the end of /etc/postfix/bounce.cf), run: postconf -b /etc/postfix/bounce.cf server2:~# postconf -b /etc/postfix/bounce.cf expanded_failure_text = <<EOF This is the mail system at host server2.example.com. I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below. For further assistance, please send mail to <postmaster> If you do so, please include this problem report. You can delete your own text from the attached returned message.                    The mail system EOF expanded_delay_text = <<EOF This is the mail system at host server2.example.com. #################################################################### # THIS IS A WARNING ONLY.  YOU DO NOT NEED TO RESEND YOUR MESSAGE. # #################################################################### Your message could not be delivered for more than 0 hour(s). It will be retried until it is 1 day(s) old. For further assistance, please send mail to <postmaster> If you do so, please include this problem report. You can delete your own text from the attached returned message.                    The mail system EOF expanded_success_text = <<EOF This is the mail system at host server2.example.com. Your message was successfully delivered to the destination(s) listed below. If the message was delivered to mailbox you will receive no further notifications. Otherwise you may still receive notifications of mail delivery errors from other systems.                    The mail system EOF expanded_verify_text = <<EOF This is the mail system at host server2.example.com. Enclosed is the mail delivery report that you requested.                    The mail system EOF server2:~# If no errors are shown, we can restart Postfix so that it can use the custom templates: service postfix restart Share this page: Suggested articles 5 Comment(s) Add comment Comments By: Phil at: 2009-06-23 12:49:17 Really handy, thanks :o) By: Murray at: 2010-09-21 12:07:48 Nice article. I used this to configure a custom bounce message so I could differentiate from fake spam bounce messages. By: marlon85ca at: 2017-10-02 22:47:35 Thanks for these helpfull article. It help me a lot becouse i'm my mother language is the spanish, an i understand the english but the clients.... they are other story... when the postfix bounces a message they think that the notification is in japanese... :) By: Shebin at: 2017-11-15 11:41:54 How can i send the bounce message to a different email address rather sending it back to the sender ?Thanks in advance! By: sergey at: 2019-02-02 21:23:48 i need know it too!!!! Thanks
ESSENTIALAI-STEM
Talk:Second Name About the title of the movie The title in Spanish (El Segundo Nombre) makes a reference to a person's middle name, so maybe the title in English should have been Middle Name, instead of the literal translation, Second Name.--RiseRover 09:56, 2 January 2006 (UTC)
WIKI
Geotechnical Engineering Essay Custom Student Mr. Teacher ENG 1001-04 18 December 2016 Geotechnical Engineering Starting primarily on the formal definition, geotechnical engineering is a branch of civil engineering that deals with the elements of the behavior, characteristics, and nature of earth materials involved in each structure construction and formation. Among the functions and services involved in this aspect are the critical investigation and observation of subsurface condition and materials, design of earthworks and structure foundation, analysis of their physical, mechanical and chemical properties of the earth materials in the site, and the review of the site condition during the actual construction phase. For these characteristics, the author of this paper has deemed the field of geotechnical engineering indeed significance for the concerns of sustainable land development and structure construction. Connotation/Denotation On extended views, the field of geotechnical engineering can be perceived in different view relative to the particular idea pointed out in the said field. By usual connotation, geotechnical engineering can be established as the aspect related particularly on the geological surveying and analysis relevant prior to the actual construction phase. In this idea, geotechnical engineering relates to the critical planning phase of the construction process and the developmental monitoring of the structure formation. As likewise connoted, the said field mainly points on the geological aspect of the process dealing significantly on the earth material involved and how to effectively deal with them. In addition, the term technical in the said field denotes the scientific process and approach involved in the concern of geotechnical engineering. Process Analysis Process analysis is also an important part of the different responsibilities that Geotechnical engineers should give consideration to. It could be noted that the process of Geotechnical Engineers in handling their projects is based on a certain pattern that naturally helps them come up with the most effective procedure that would help them in completing the tasks given to them in handling Geotechnical approaches in creating several public utilities that are to be used as infrastructures that would naturally serve the values of the public. Before their plans are actually approved for further building procedures, they still need to analyze the different elements of their plans very well. Doing so would mean that the said personnel be able to identify the different measures of safety assurance that they need to accomplish to say that a project is indeed feasible for a particular cause that would make it viable for approval. Graphics To present the different results of analysis, Geotechnical engineers are supposed to make graphical presentations that would make the other engineers understand the different issues that need their attention in the projects that they are supposed to pursue. The said presentations are likely to serve as visual representations of the matters that need to be seriously considered even before the final plan of the project is designed. History On historical perspective, geotechnical engineering can be considered as generally present on the primitive construction genre. As humans can historically dealt with earthworks as their primary material in each of their engineering construction, analysis and observation of the land and earthwork characteristics and properties have already been present though this concern is not yet developed into a systematic and scientific phase. In the development of the modern civil engineering field that the term of geotechnical engineering summarizing the significant concerns relating to earthworks properties and materials have been developed. Origin Considering also the origin of the field of geotechnical engineering, it is evident that the said concern was developed from the intersection of the field of geology and engineering wherein the scientific understanding from the prior was applied for the effectiveness of the application of the latter. With the application of the analysis, discovery, and understanding derive from the scientific approach of geology in the aspect of structure formation, the field of geotechnical engineering was developed contributing significant information to the effective and sustainable concern of construction and land development. Comparison By comparison on other fields, geotechnical engineering can be mainly defined as the special concern in the general subject of civil engineering. Relating to the other fields in the said subject, the concern of geotechnical engineering cover up the entire structure formation process starting from the planning stage, construction monitoring, and the material analysis making it a significant element for an effective engineering process. Generally, the scope of geotechnical engineering overlaps with other fields yet uniquely, this concern particularly focus on the geological phase, characteristics, and properties involved in the structure formation and construction. Cause and Effect People need to have a secured feeling when passing a bridge or using a skyway. This particular need causes the existence of Geotechnical engineers in the field of building construction services. Their vital role is to create mandated analysis within areas of building projects that ensures the strength and the capability of the environment to handle several stresses that are to be caused to it by the said construction. By doing so, the Geotechnical engineers set a fine foundation that identifies the insurance that each person could gain from the fact that the buildings constructed for them is based on a strong ensuring analysis that made the said construction of buildings possible for pursuance. Etymology On another view, generally basing from the idea employed by the term in geotechnical engineering, one can actually develop the etymological definition of the said concern. With the presence of the term geo relating to land and earth, technical determining the scientific nature of the field, and engineering signifying the concern which is construction, the definition that the said idea points to the scientific approach of understanding and analyzing the geological aspect and characteristics involved in the construction and structure formation process. Contract/Negotiation To be able to understand how the process of putting Geotechnical engineers are placed together with the others to establish a much stronger team for constructing a certain building, it is important to note how they are negotiated with by the companies that hire their services. As professionals in the industry, Geotechnical engineers are rather given the opportunity to work with others. They are rather recommended or solely chosen by the company. However they were chosen, each Geotechnical engineer should be able to keep their promise of working well with their team as noted in the contracts that they are to sign. Bibliography Das, Braja M. (2005). Principles of Geotechnical Engineering. Cengage-Engineering Publication. 6th Edition. Fang, H. -Y. and Daniels, J. (2005). Introductory Geotechnical Engineering : an environmental perspective. Taylor & Francis Publication. Holtz, Robert D. & Kovacs, William D. (1981). An Introduction to Geotechnical Engineering. Prentice Hall Publication. Mitchell, James K. & Soga, K. (2005). Fundamentals of Soil Behavior. John Wiley & Sons, Inc. Murthy, V. N. S. (2002). Geotechnical Engineering: Principles and Practices of Soil Mechanics and Foundation Engineering. CRC Publication. 1st Edition. Terzaghi, K. , Peck, R. B. and Mesri, G. (1996). Soil Mechanics in Engineering Practice. 3rd Ed. , John Wiley & Sons, Inc. Free Geotechnical Engineering Essay Sample B • Subject: • University/College: University of California • Type of paper: Thesis/Dissertation Chapter • Date: 18 December 2016 • Words: • Pages: We will write a custom essay sample on Geotechnical Engineering for only $16.38 $12.9/page your testimonials
ESSENTIALAI-STEM
The Man on Horseback/Chapter 36 gray, frowning walls of Spandau fortress swallowed Tom. Cut off he was from the world out side, in a small, neatly furnished room with bathroom attached, the windows doubly barred with steel, the doors, too, of steel and patrolled day and night by armed sentries. The food was good and plentiful, the treatment courteous but severe. Each day he was allowed three hours for exercise on the Kasernenhof, the barrack yard. "I regret it," General Unruh, who commanded the officers prison wing of the fortress, explained to him. "As a rule, the officers here are allowed complete lib erty. Are put on parole. But I understand that you broke parole in Berlin. Tut mir leid!" Tom resigned himself to the inevitable. With his clear, simple mind he thought the situation over from the start to the probable finish. The court-martial would come soon, and he had decided to play there a certain card. He would speak out, straight out. He would tell everything that had happened, exactly, without omitting a single detail, not only as to the duel, but also as to Bertha Wedekind and the reason why he had broken parole. For he had begun to realize that, at the very best, he was in for a term of years in Festung. Thus he would be unable to do what Martin Wedekind had asked him to—to see Bertha home to Spokane personally. He would therefore do the next best thing. He would raise such a row that the Germans simply would not dare double cross. Yes! He would give it to them, straight from the shoulder, regardless of what might happen to him. Of course he knew that court-martials were held in secret session, but something of the evidence given there was certain to leak out, into the outside world, the press, the ear of some sharp American newspaper correspondent, perhaps Trumbull, and the American Government would automatically be forced to act so as to protect Bertha. There was no doubt of it, and so Tom awaited the summons for court-martial with impatience. He was anxious about Bertha, terribly anxious. He was allowed neither mail nor newspapers. He had no idea what was going on in the outside world, and he fretted. There were times when he regretted the lost hopes, the lost promises of his young, vigorous manhood, when he cursed the mine in the Hoodoos—the Yankee Doodle Glory which was at the bottom of all his troubles. But he controlled himself with a will. He could not afford to break down, for there was the girl he loved, the girl he must get out of the German Eagle's clutches—and so he waited, waited, for the court-martial summons. At times he asked General Unruh, who shrugged his shoulders. "Lieutenant Graves," he said, smiling with his lips, "never in all my long experience as fortress prison commander have I seen anybody as anxious to stand trial as you. You must be very certain that you are going to get off scot-free!" "Well—but when will they try me?" "Can't say, I'm sure. You will have to compose yourself in patience." And Tom did. Very few visitors were allowed near him, and these only in the presence of the General or some other high-ranking officer. The little Ensign came. Too, von Quitzow, and one or two others. They muttered banalities and went on their way. No—they said, one and all—they had not seen a sign of Miss Wedekind. The Ensign understood that she was down with severe illness; nobody was allowed near her. And Tom waited, week after week, for the court-martial summons that did not come. He had an idea that they were trying to break his nerve, and he gritted his teeth and forced himself to be quiet. Outside, late winter changed suddenly into early spring. Green leaves of crocus and tulip peeped out overnight in the cement-framed grass plot next to General Unruh's quarters. The song birds returned from the South. The trees were clad in the delicate tracery of the new foliage. Even the drab, square Julius Tower that was said to house Prussia's mysterious golden war chest, was touched and softened by lacy sprays of color where ivy and vine crept up from the sandy Brandenburg soil. Thus May passed with soft winds and the virginal pink of hawthorn blossoms, and June came, with the first crass heat of summer, with the sunset sky of summer that was like a great, tropical moth, crimson and orange, its wings barred with black when a thunder storm boomed overland all the way from the chilly, foggy Baltic. And still he waited, with no word from Bertha, no summons to the court-martial that should decide his fate and hers. Every evening he paced up and down the cement walk in front of the prison wing, between armed soldiers. The rest of the day he spent at his window, looking out over the fortifications that dipped into the ground like gopher holes, suddenly, threateningly, where a sunken gun emplacement frowned its unseen challenge, farther on, to the east, flattened out into an immense, gray, dusty drill ground; and as the days passed into the cycle of weeks, this drill ground was used more and more. Nervous and swarming it was, like a beehive. Not only were the artillery men busy with the limbers and the steel thills of their gray-and-blue field guns, but also with sappers and cavalry and infantry. Wherever Tom looked, miniature battles were in progress. All one morning a dozen heaped batteries practiced drum fire with blank shells until Tom thought his ears would burst under the roar and slam and clank of the continuous salvos, wailing as the shells left the barrels and rushed on, madly crashing as they thumped down to their targets. The same at night, varied by star shells, flashing and vanishing in an intolerable orange haze, leaping and flickering up, then down, then along the ground in a gamut of flame. And again the deafening sequence of shells, overlapping, stretching into one unceasing roar, throbbing to the firmament like a gigantic drum, with triangular sheets of white, brilliant light flaring to the zenith, and countless projectiles rushing through the air with a noise as the tearing of silk. Or a sudden, terrible silence—more terrible than the inferno of sounds that had preceded it and a young officer's voice, high, shrill, foolish, frightfully inadequate: "Battery! Over there!" A non-commissioned officer's echoing voice: "Zu Befehl, Herr Leutnant!" And once more the latter's order: "Barrage! Ten rounds gun fire! Fire—fire!"—and the crash, the roar, the whining and wailing of tortured steel smiting tortured earth. The drum fire over, platoons of infantry or dismounted cavalry would be put through their paces. During his months in the army Tom had taken part in maneuvers and military reviews and was more or less familiar with the surface of ordinary tactics. But the drill which he watched day after day from his window was new to him. At times, indeed, the old traditional Prussian formation, the attack by massed phalanx, grenadiers charging, shoulder to shoulder, relying on brawn and weight to crush the enemy's opposition regardless of the cost in blood to their own men, was followed. But at other times the lines were deployed, in a thin loop, very much—Tom thought—as Western range riders spread, fan-like, when cattle stampede. Scouts these, the nerves of the army. Then another barrage, plopping and splashing unexpectedly in a screen of fire that melted from scarlet and gold to livid purple, and specially picked troops—he heard General Unruh call them Stosstruppen, shock troops—were sent forward, without rifle or bayonet, armed instead with trench knife and hand grenade, fused for instant action. Over and over again they would be hurled forth. Drill was incessant, discipline even more merciless than usual. Men who fell from exhaustion were kicked and cuffed and belted by the non-coms while the officers turned their heads, pretending not to see. No newspaper correspondents, no photographers, no civilians of any sort were allowed near the parade ground; and the troops that were trained did not remain the same. They changed every few days. On a Monday it would be the Maikäfer Grenadiers, forty-eight hours later the First Mecklenburg Regiment of Foot, again East Prussian fusiliers, until it seemed that the whole North Germany army corps were passing through the Spandau mill. Formerly Tom would have smiled. But not now. Formerly he would have said to himself that the German army was only the glitter, the vanity, the imagination of the nation concretely realized in color and pomp, very much like a cowboy who swaggers into town, his chaps dyed a violent vermilion. But now he saw the army as a working body, a pitiless, never-resting machine, and at times his thoughts swerved away from the figures, drilling out there in the heat and dust, and winged to the German homes; the homes where these men must have been born and bred. Puppets they were, puppets of an armed, rasping, insolent, ruling caste. But they had women and children; mothers and sisters and sweethearts. And what were these women thinking? What were they doing? Were they entirely inarticulate, like Siwash squaws? And what, then, of civilization, and progress, and culture, and Christianity? Thus Tom pondered—Tom, who was simple no more. He asked himself what it was all about, and he was afraid of finding the answer. Still the days passed, with no news from Bertha, no summons to court-martial, until one Saturday morning the General came to his room and told him that a visitor was there to see him. "Mrs. Wedekind. Colonel Wedekind's mother." A minute later the General left, and the sentry ushered Mrs. Wedekind in. It was fortunate for Tom that the officer on watch that day, the officer ordered to listen to the conversation between the prisoner and his callers and to make a detailed report of it to the proper authorities, was the Junker, von Quitzow, who had been forced into the Uhlan tunic by his father and who had never really quite forgotten his native good-humor and sentimentality—"damned civilian sentimentality" Tom one day had heard the Colonel characterize it. Mrs. Wedekind was close to the Biblical span of years. White haired she was, and wrinkled. But in her youth she had loved, very deeply, she had had her beautiful summer, and when her husband had died in his prime, her heart, instead of becoming blunted, had mellowed, had become receptive. She drew people to her, instinctively. Added to this was a great, slightly malicious, natural shrewdness, a wonderful charm of manner, a knowledge of man's vulnerable spots. This knowledge, this charm and shrewdness, she used now on Captain von Quitzow. She flashed a rapid look from her canny old eyes at Tom. But she shook hands first with the Junker. "Ah, guten Morgen, mein liebster Herr Hauptmann! It has been such a long time since I have seen you, since I had the pleasure of listening to your charming music. Why, my dear, they call you the Richard Wagner of the Uhlans! They do, positively. When will you come and play for me? Or—am I too old, perhaps, for a dashing young Captain like yourself?" Dashing! Tom hid a smile. That was the one thing which von Quitzow was not, but he took the bait, blushed, mumbled something, and bowed deep over Mrs. Wedekind's right hand while she, at the same fraction of a moment, passed a tiny envelope to Tom. He slipped it up his sleeve. Then came a banal conversation, lasting several minutes, at the end of which Mrs. Wedekind rose, shook hands with both men and went to the door. "Thanks for having come," said Tom. "You don't know when my court-martial's going to come off, do you?" Mrs. Wedekind looked straight at him. "Lieutenant Graves," she replied, "I have no idea. But at times I imagine that the Prussian army just now is too—ah—busy to waste precious days on such an altogether charming and altogether worthless young American like yourself!" And she swept out with an old-fashioned curtsy, followed by the still blushing von Quitzow, who had not caught the peculiar inflection of her parting speech. Tom had. But he had no time to think about it right then. For there was the envelope which she had given him. He tore it open, took out a slip of paper, read. There were just a few lines, from Bertha. "I am waiting, waiting!" she wrote. "Waiting for you! Come to me, dear. I need you. I want you. Every night I pray for you. Bertha." That was all. But Tom kissed the letter. He felt a hot tear running down his cheek, and he was not ashamed of it. Late that evening, and again the next morning, Mrs. Wedekind's words came back to him … "The army just now is too busy to waste precious days on you!" Directly bordering on the military prison was the mess barrack of the gunner officers. Heretofore, every night, the great banqueting hall had been silent and dark. The officers had been busy day and night, had snatched food on the run, to return, often past midnight, to their quarters and sleep the dreamless sleep of utter exhaustion. But to-night the room was festively lit. Around nine o'clock officers entered the building, and, an hour later, a banquet was in full swing. The windows had been thrown wide open, and very distinctly Tom could hear the popping of champagne corks, voices, laughter, the clinking of glass, once in a while the band thumping and scraping and braying a martial rhythm—playing the old favorites of the German army: "Maria Teresa, geh' nicht in den Krieg!" "Der alte Derflinger" "Lützows wilde, verwegene Jagd!" and many others. Then there was a silence and, after a minute, somebody giving a toast. Tom heard a few words: "The army is ready, meine Herren Offiziere! Ready to conquer …" Then somebody closed the windows of the banquet hall and Tom heard no more except vague, indistinct sounds. But he was nervous. He paced up and down. War? He shook his head. He was no more the provincial American, isolated in the valor of his ignorance. During the last months he had read the newspapers, the foreign news, the editorials. He knew that the German nation was nervous, fretful, on tenter-hooks, that a change had come over it. But … War? War, bloodshed, without rhyme or reason? And there was no reason. He had followed the news of the world. No, no! War would not come. Could, must not come! It was out of the question. Yet again the next morning, Sunday, when Tom, escorted by von Quitzow, went to hear service in the Garnisonskirche, the cantonment church, Mrs. Wedekind's strange words came back to him … And, too, other words: Vyvyan's, Martin Wedekind's, the Emperor's, the little professor's. The church was crowded with officers. Doctor Stöckl, the Kaiser's favorite, was in the pulpit. He had taken the sixteenth chapter of Revelations for his text: "And I heard a great voice out of the temple saying to the seven angels, Go your ways, and pour out the vials of the wrath of God upon the earth. …" Later on: "The sixth angel poured out his vial upon the great River Euphrates, and the water thereof was dried up, that the way of the Kings of the East might be prepared. …" The clergyman looked up. "The Kings of the East, brethren," he went on, "the Kings of the East! Our Emperor! The Emperor of Austria-Hungary! The Sultan of Turkey! The three Kings out of the East. …" Tom stopped his ears. He was not a religious man, but he had the fine, instinctive antipathy of the man of the open range against blasphemy. The clergyman droned on. Tom could hear his voice as from a great distance, vague, wiped over. He could not make out the words. But he saw the faces of the officers. They seemed utterly fascinated, utterly enwrapt.
WIKI
Few, yet enough Few, yet enough, Enough is One — To that ethereal throng Have not each one of us the right To stealthily belong?
WIKI
User:JerryGray82049/sandbox My name is Jerry Gray, born Aug. 20, 1949. I live near Natchitoches, La. I have a great interest in the history of the area I live in. Like a lot of high school kids, I did not like history at all.....now I love it. I also love to write and have written several articles for Wikipedia as well as other publications. It is my goal to read as much history as I can and help others understand their past.
WIKI
For ‘The Color Purple,’ a Delayed Box Office Bump “The Color Purple” got its post-Tonys bounce, one week late. The much-praised production, which won the Tony Award for best musical revival, had actually seen its grosses drop the week after the ceremony because its Tony-winning star, Cynthia Erivo, was in London for much of the week. (One of her co-stars, Danielle Brooks, also missed several performances that week.) But last week, with cast intact, the show fared much better, grossing $799,021, up 42 percent over the previous week. It was the musical’s best showing since Jennifer Hudson left the cast in early May. Overall, the period ending June 26 — a week that included the official start of summer — was a healthy one for Broadway. The 32 shows playing grossed $28.9 million, up from $28.2 million grossed by 34 shows the previous week. Three shows closed on Sunday — the new musical “Bright Star,” the musical revival of “The King and I,” and the play revival of “Long Day’s Journey Into Night.” The two musicals saw box office bumps as theatergoers seized their last opportunities to see the shows — “Bright Star” had the best week of its run, at $708,013, while “The King and I” grossed $840,824 for its best week since the departure of Kelli O’Hara. Also notable: “Shuffle Along, or the Making of the Musical Sensation of 1921 and All That Followed,” saw its grosses drop, from $973,686 to $814,942, apparently because last week was when its star, Audra McDonald, had initially been expected to begin a three-month leave to reprise her Tony-winning performance in “Lady Day at Emerson’s Bar & Grill” in London, which affected advance sales. As it turned out, Ms. McDonald became pregnant, canceled the London production, and extended her stay with “Shuffle Along” until July 24; last week the show’s producers decided to close the show when she leaves. The uplifting musical “Waitress,” which has been strengthening over time, had its best week yet at $1.1 million. Over all, the top grossing shows were “The Lion King,” at $2.1 million, “Hamilton,” at just over $2 million, and “Wicked,” at just under $2 million.
NEWS-MULTISOURCE