Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
5G Is Rescuing These Top Semiconductor Stocks From the Trade War
One of the most exciting sectors in the market today -- for good and bad -- is semiconductors. Semiconductors play an increasingly important role in the world, as new technologies like artificial intelligence, machine learning, the Internet of Things, self-driving vehicles, and especially 5G take hold in the market. Yet at the same time, the ongoing U.S.-China trade war has sapped business confidence, leading to extreme caution on the part of chip buyers worldwide. A downturn in demand can wreak havoc on semiconductor stocks, which have oversupplied the market over the past year, leading to many negative-earnings surprises.
This has set up an interesting dynamic where big secular trends are running headlong into a cyclical downturn. Yet starting in the second half of 2019, it appears that one secular trend -- the buildout of 5G networks -- is beginning to overwhelm these macroeconomic fears, sending certain semiconductor-related stocks soaring.
5G is benefiting semi-cap equipment stocks, despite the trade war. Image source: Getty Images.
Semiconductor equipment stocks are hitting highs
One would think the global slowdown would absolutely kill the stocks of semiconductor equipment manufacturers, who make the machines needed to produce leading-edge chips. However, the opposite has been true, with many such stocks hitting 52-week and/or all-time highs in recent weeks.
These include ASML Holding (NASDAQ: ASML), KLA-Tencor (NASDAQ: KLAC), Applied Materials, and Lam Research (NASDAQ: LRCX). In addition, Taiwan Semiconductor Manufacturing (NYSE: TSM), the world's largest foundry and buyer of this equipment, is also up nicely. As you can see, all of these stocks are crushing the market over the past year -- and that's in spite of the sharp December sell-off and ongoing trade war.
TSM 1-Year Total Returns (Daily) data by YCharts.
Interestingly, as U.S. and China relations continue to get more acrimonious, it seems both countries are stepping on the gas to become the leader in 5G technology. In particular, Taiwan Semi's management, which just had its third-quarter earnings release and conference call, gave some amazing numbers regarding the 5G buildout.
Boosting capital expenditures by 40%
In its earnings release, Taiwan Semiconductor revealed that it would again be boosting its capital expenditures for the year by a whopping 40%. Remember, the company is the world's largest outsourced semiconductor foundry and makes chips for most of the leading fabless semiconductor designers. Though Taiwan Semi had initially anticipated spending $10 billion to $11 billion on capex this year, management is now boosting that figure to $14 billion to $15 billion, with a similar forecast for 2020.
Why such an increase? Taiwan Semi is seeing huge demand for leading-edge chips, which are the high-performance chips that will go into 5G handsets and base stations, well beyond what it had initially anticipated. According to management, about $1.5 billion of the capex increase is for the company's 7-nanometer chips that are just hitting the market, and the other $2.5 billion is to get an early jump on 5-nanometer chips for next year. In semiconductors, the nanometer distance signifies the distance between transistors; the smaller the space, the more transistors can be packed into a chip, making the chip more powerful.
Management said, "Since the middle of this year, we've been seeing an acceleration in the worldwide 5G development. This will speed up the introduction and deployment of 5G network in smartphone in several major markets around the world."
The company now expects 5G penetration to ramp even faster than 4G, with 5G phones reaching a mid-teens smartphone market share next year, up from Taiwan Semi's previous expectations of just mid-single-digit penetration in 2020.
Smaller chips need bigger equipment
Increased 5G demand is thus causing increased demand for smaller chips, yet smaller chips are becoming harder to produce. The smaller the chip, the more manufacturing process steps it must go through, which is why all of these semi-cap equipment makers are seeing such strong demand. In particular, ASML Holding's EUV technology is crucial for the ability to produce 7-nanometer and lower chips. That's why ASML's stock has gone up so much in the past year, and why it trades at a higher multiple than its peers.
TSM P/E Ratio (TTM) data by YCharts.
Another favorite is KLA-Tencor, which has a competitive advantage in process diagnostic and control equipment, which tests wafers and masks for imperfections. This diagnostic tool becomes increasingly important as die sizes shrink, because of the exactness required to produce high-density chips at scale.
Though semi-cap equipment stocks have all had good runs over the past year, these big technological trends don't appear to be slowing down anytime soon. While a global recession may delay the growth of these companies, macroeconomic conditions probably won't hold them back forever. Therefore, investors should look to snap up these winning tech leaders on any big pullbacks. And if trade tensions ever ease up, so much the better.
10 stocks we like better than Taiwan Semiconductor Manufacturing
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has quadrupled the market.*
David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Taiwan Semiconductor Manufacturing wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of June 1, 2019
Billy Duberstein owns shares of KLA-Tencor, Lam Research, and Taiwan Semiconductor Manufacturing. His clients may own shares of the companies mentioned. The Motley Fool recommends Applied Materials, Lam Research, and Taiwan Semiconductor Manufacturing. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Page:Summer - from the Journal of Henry D. Thoreau.djvu/156
146. Have not all streams this contrast more or less,—on the one hand eating into the bank, on the other depositing their sediment?
The year is in its manhood now. The very river looks warm, and there is none of that light celestial blue seen in far reaches in the spring.
I see fields a mile distant reddened with sorrel.
The very sight of distant water is refreshing, though a bluish steam appears to rise on it. How refreshing the sound of the smallest waterfall in hot weather. I sit by that on Clematis Brook, and listen to its music. The very sight of this half stagnant pond-hole drying up and leaving bare mud, with the pollywogs and turtles making off in it, is agreeable and encouraging to behold, as if it contained the very seeds of life, the liquor, rather, boiled down. The foulest water will bubble purely. They speak to our blood, even these stagnant, slimy pools. Even this water has, no doubt, its falls nobler than Montmorenci, grander than Niagara, in the course of its circulations.
Cattle walk along now in a brook or ditch for coolness, lashing their tails, and browse the edges; or they stand concealed for shade amid thick bushes. How perfectly acquainted they are with man.
I hear the scream of a great hawk sailing | WIKI |
Wikipedia talk:Fiction/Noticeboard
Inactive?
What's the point of this noticeboard, seems to be inactive and created without any consensus that a individual noticeboard is needed for this subject. Nothing WP:AN, WP:AN/I or people in the individual wikiprojects can't cover. Process creep at it's finest. I'm about to tag this as inactive/rejected. Any serious objections? Secret account 22:13, 27 January 2009 (UTC)
* This board is not inactive nor has it been "rejected" nor was created without consensus. It was created as a place to bring fictional discussions needing additional views or to answer questions about fictional topics. -- AnmaFinotera (talk · contribs) 23:09, 27 January 2009 (UTC)
Last edit was over two weeks ago, before that only four posts in two months, that reads inactivity. Any issues with behavior can be solved in WP:AN/I where it would recieve a faster response. And a noticeboard isn't the place to answer questions on fictional topics, for that go to the village pump. This is being used for the wrong reasons. Secret account 23:35, 27 January 2009 (UTC)
* This isn't a notice board for dealing with behavior nor for answering questions about topics. Again, the board has consensus. Read through the archives to see what it is used for. It was created, as I recall, as part of the bigger compromises about the whole WP:FICT debate. -- AnmaFinotera (talk · contribs) 23:41, 27 January 2009 (UTC)
Than what was it created then, you said that the noticeboard is for dealing with behavior, then you constricted yourself by saying it's not. Also I have WP:FICTION in my watchlist for a while, I only saw seldom mention of this noticeboard. I'm tempt to MFD it. Secret account 15:27, 29 January 2009 (UTC)
* This noticeboard was an attempt to deal with the fiction disputes following the two Episodes&Characters arbcom cases. Most of editors' meta-fiction focus is currently on WP:FICT itself, and hands are tied for everyone. This noticeboard may serve a specific use once FICT has been marked a guideline, or it may remain abandoned forever, who knows. But I think MfDing it right now doesn't accomplish anything but to distract the focus from the ongoings at FICT, and I'd wait at least one or two more months (when FICT has either been accepted or rejected) before deciding the future of this noticeboard. – sgeureka t•c 15:42, 29 January 2009 (UTC)
Indeed. Let's give this some time until WP:FICT settles, then see how this ends up being used. - A Man In Bl♟ck (conspire - past ops) 15:25, 30 January 2009 (UTC)
Proposal to mark historical
This noticeboard is no longer actively being used, was never really used, and I do not perceive that it will be used in the future. The last post here was in August 2010, and if you check the history, you'll see that this noticeboard is seldom used. Since this noticeboard does not cover anything that can't be covered by the main content noticeboard (or other relevant noticeboards), there's no reason for this to stick around, as it creates another avenue that users have to monitor and separates discussions. I'm proposing that we mark this noticeboard as historical and merge all (if any) functions over to the relevant noticeboards. Comments? Netalarm talk 01:39, 3 November 2010 (UTC) ✅ Netalarm talk 02:20, 11 November 2010 (UTC)
* Support per nom. Clearly underused. Ten Pound Hammer, his otters and a clue-bat • (Otters want attention) 02:21, 3 November 2010 (UTC)
* Support per nom, agree on underused,Sadads (talk) 02:56, 3 November 2010 (UTC)
* Oppose frankly, this noticeboard should have been used to handle the Transformers mess. Jclemens (talk) 04:29, 3 November 2010 (UTC)
* Support The specific noticeboards or project talk pages (WT:VG, WT:TV, WT:FILM) seem to handle problems well nowadays. – sgeureka t•c 07:31, 3 November 2010 (UTC)
* Support It was never really used, it's useless, and we don't need it. --Divebomb (talk) 11:52, 3 November 2010 (UTC)
* Support Should have been used, yes, but as it's not frequented, I doubt it would have helped much. The low level of activity here will only prolong fiction discussions. / ƒETCH COMMS / 12:52, 3 November 2010 (UTC)
* Support - It used to be useful in the battleground that was fiction a few years ago, but it's not needed anymore. - Peregrine Fisher (talk) 17:35, 3 November 2010 (UTC)
Author racist?
Commentators continue to reference/allege Card's piece involving a fictional, future Obama's coup d'état by way of urban guirillas as racist (eg see here in Slate, 2013; here, HuffPo, 2013; here, Wired, 2014). Should our article mention this aspect of controversy with regard to the piece here: "Orson Scott Card"? (Also see a 2013 blogpost by M Aspan citing this from Card in 2000 rgding allegedly non-racist use of nigga'.) See discussion here: Talk:Orson Scott Card --Hodgdon's secret garden (talk) 21:26, 19 December 2014 (UTC) | WIKI |
Abstract: It is critical to diagnose liver illness early on in order to receive the best therapy possible. Machine learning algorithms is growing rapidly such as SVM, K-mean clustering, KNN, Random Forest, Logistic regression, and others. The input is usually numerical data of various factors, and the output findings are obtained in real-time, predicting whether or not the patient has a liver problem. In this project, used a variety of supervised machine-learning methods before deciding which one is best for the model. Existing systems rely on classical deep learning models, which are inefficient and imprecise. They aren't precise enough. This proposing model is to use classification algorithms to identify liver patients from healthy individuals. Here, we choose the algorithm in this module that serves as the best fit. The dataset is taken from the Kaggle dataset. The advantages of the proposed model are that it shows high accuracy, is fast processing and is highly scalable. With the effective use of the presented model, practitioners can make intelligent clinical decisions.
Keywords: Bivariate analysis, correlating columns, MSE Loss Function, Removing Null values, Replacing Non-acceptable zero values, Univariate analysis
PDF | DOI: 10.17148/IJARCCE.2023.125125
Open chat
Chat with IJARCCE | ESSENTIALAI-STEM |
User:SuhailV20
Hello,
How are you all?
My name is Muhammad Suhail Vohra, I'm working on an IT field. I was working as computer operator on 2010 in accounting field and than I joined an IT company as computer operator and than I learned lots of things time to time. I learned Graphic Designing, MS Office, Apps Programming and than finally I decided to go with Web Development.
I just spent 10 years over that company and now I'm project manager here. It's just because my dedication and hard work I did for the company.
Also I'm doing freelance since 3 years because I love to learn and that's why I'm providing services so I can get daily challenges.
My most of the topics are Spirits, Rituals, Science and History. I would love if somebody recommend me any ebook related to those topics.
Thankyou! | WIKI |
Portal:Judaism/Today in Jewish History/8 Shevat
* In 5108 (1348 CE), the Jews of Colmar, France were arrested on suspicion of having poisoned a well.
* In 5729 (1969 CE), nine Jews were publicly executed in Damascus for trying to leave Syria. | WIKI |
BSOD URGENT FIX, LOTS OF INFO
#1
ok first of all good morning
not a very good one since a main computer at work suddenly popped up with a bsod
code is
stop :0x0000007b
seems like the windows start up is not fuctioning correctly, goes to an option screen to fix the start up, or start windows normally, either one brings me back to the blue screen
i know i saw a way to go ahead and before anything starts, you hit an f button and your able to choose an option to scan the software and hardware, is this still an option
running vistas ultimate
anyway main question here is how can i choose the option right when you start the computer to start scanning the driver software and hardware to see what is corrupt and start somewhere
thank you lots ppl
usasma
Fantastic Member
Microsoft Community Contributor
#2
Start with this free, bootable hard drive diagnostic procedure: Hard Drive Diagnostic Procedure
The stop :0x0000007b error is an INACCESSIBLE_BOOT_DEVICE - which is your hard drive
For the "f" option to scan the computer - please let us know the make and model of the computer.
But if the hard drive fails the diagnostic tests, then this option isn't worth pursuing.
Please post back with the results of the test and with any questions that you may have.
This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program. | ESSENTIALAI-STEM |
User:H0n0r/sandbox/Tripti
Tripti Bhattacharya is a climate scientist.
Bhattacharya is an Assistant Professor of Earth and Environmental Science at Syracuse University.
In 2016, Bhattacharya received a Ph.D. in paleoclimatology and climate dynamics from the University of California, Berkeley. After her Ph.D, she did a postdoc at the University of Arizona where she studied how monsoons respond to climate change. In 2017, Bhattacharya appeared on The Takeaway discussing her work and the state of funding for climate research. She commented that climate change is "a running thread through most climate scientists work."
In 2018, she told the Arizona Daily Star that “The past is like a natural experiment to understand how the climate works,” Bhattacharya said, “but there are many different scientific lessons you can take from the past and that is hopefully where this work will go in the future.” In 2020 she appeared on The News with Shepard Smith, commenting that "An extreme event means very real human suffering. Rainfall decreases and temperature increases that result in drought that we've never seen before." | WIKI |
Wikipedia:Articles for deletion/MSN-03 Jagd Doga
The result was delete. The discussion has convincingly established that the sources used in the articles fall short of what we would expect in the light of WP:GNG and WP:RS. The arguments for keeping the articles must therefore be given less weight. Sandstein 10:24, 25 January 2014 (UTC)
MSN-03 Jagd Doga
* – ( View AfD View log Stats )
This does not establish notability independent of Mobile Suit Gundam: Char's Counterattack through the inclusion of real world information from reliable, third party sources. Most of the information is made up of plot details and in-depth toy analysis better suited to Wikia. There is no current assertion for future improvement of the article, so extended coverage is unnecessary.
* I am also nominating these articles with the same issues:
* TTN (talk) 16:04, 8 January 2014 (UTC)
* Note: This debate has been included in the list of Fictional elements-related deletion discussions. TTN (talk) 16:05, 8 January 2014 (UTC)
* Note: This debate has been included in the list of Anime and manga-related deletion discussions. TTN (talk) 16:06, 8 January 2014 (UTC)
* Note: This debate has been included in the list of Anime and manga-related deletion discussions. TTN (talk) 16:06, 8 January 2014 (UTC)
* Keep I see plenty of sources and external links that establish notability in the article. - Knowledgekid87 (talk) 19:12, 8 January 2014 (UTC)
* How do they establish notability? It's all just primary info, appearances, and lists of models. It never hurts to describe merchandise in something's impact, but that alone doesn't establish it as notable, especially when the models should be summed up briefly rather than as a laundry list. TTN (talk) 19:27, 8 January 2014 (UTC)
* Simply having sources does not make them WP:GNG-valid sources that can actually establish notability. — HELL KNOWZ ▎TALK 14:34, 9 January 2014 (UTC)
* Note: This debate has been included in the list of Film-related deletion discussions. Northamerica1000(talk) 02:54, 9 January 2014 (UTC)
* Note: This debate has been included in the list of Video games-related deletion discussions. Northamerica1000(talk) 02:54, 9 January 2014 (UTC)
* Delete all as not passing WP:GNG with multiple independent reliable in-depth sources. None of the sources in the articles are both about the subject and in-depth. Hardly any are reliable sources. There's mostly product pages, listings, appearances, generic info, but no critical commentary, no cultural impact besides appearances. The franchise is notable and suits are mentioned in relation to it, but notability is not inherited and the limited sourced information that isn't cruft or trivial appearances can be easily summarized in parent articles. This isn't even suitable for a list at this point without further sources. — HELL KNOWZ ▎TALK 14:34, 9 January 2014 (UTC)
* Keep MSN-02 and 04. In the MSN-02 article, the #4, #6 and #24 sources are clearly independent sources, #7 is debatablely not in depth enough, but still independent.(Using http://web.archive.org/). In the MSN-04 article, #7 and #16 are independent, while #1, 2 and 4 are debatable. Reliable or not, do you seriously expect Scientific Journal class reliability? —Preceding signed comment added by MythSearchertalk 15:51, 9 January 2014 (UTC)
* Even if sources are reliable, it doesn't mean that their inclusion in the article counts as satisfying WP:N. They need to provide significant coverage for the topic, and that would be real world. non-primary info in this case. #4, #6, and #7 are nothing more than showing that it appears in something. #24 is a wiki, so I'm not sure how that is supposed to be reliable. #7 is used for in-universe information, and #16 is about official merchandise. #1, #2, and #4 are not debatable in any way from what I can tell. None of those provide development, reception, or cultural impact, so they don't help establish notability. TTN (talk) 16:07, 9 January 2014 (UTC)
* Echoing the above, sources have to be independent, reliable and in-depth at the same time, not so between them. Reviewing the ones mentioned more carefully, I agree with TTN, none of them pass WP:GNG mark. — HELL KNOWZ ▎TALK 16:40, 9 January 2014 (UTC)
* Delete, the references for MSN-03 Jagd Doga are a joke, they include a photo of the robot's toy model and links to an online shop selling them, as well as links to the maker's website. There is no evidence of real-world notability independent of the main media franchise. Delete also MSN-02 and 04, as even in the supposedly reliable sources they're given only the briefest of mentions.--eh bien mon prince (talk) 10:45, 15 January 2014 (UTC)
* Relisted to generate a more thorough discussion so a clearer consensus may be reached.
* Please add new comments below this notice. Thanks, Mark Arsten (talk) 03:19, 16 January 2014 (UTC)
* Delete per WP:GNG and WP:RS. This is a non-notable article that does not include any real-world information on the subject. Lord Sjones23 (talk - contributions) 07:43, 18 January 2014 (UTC)
| WIKI |
What’s the secret to a scalable IoT network?
Building up a scalable Internet of Things (IoT) infrastructure involves many aspects and concerns. Most people think of scaling their servers immediately, utilizing larger machines or a cluster of smaller computers. Still, many more factors must be considered to keep up with rising demand. For instance, a more efficient technique to maintain and troubleshoot devices is required when the number of devices rises.
System administrators must be able to perform everyday activities with thousands of devices. Hence tools must be created. Monitoring must scale as the number of devices increases to detect and examine looming problems, defective hardware, or even hostile attacks on your infrastructure.
The IoT platform ecosystem has become a very complex landscape due to the explosion in IoT solutions and manufacturers we are seeing today. An IoT solutions infrastructure frequently requires the integration of cross-domain hardware and application systems to handle multiple applications and difficulties.
Additionally, it must be adaptable enough to successfully integrate new devices that might have various hardware designs in the future.
Importance of IoT Interoperability
IoT interoperability is still a target for many vendors despite its necessity. Many IoT solutions currently in use are proprietary and only intended to function in specific hardware or infrastructure environments.
Examples include protocols connected to a single third-party managed backend or wireless connection coupled to vendor-specific chipsets. Due to a lack of IoT interoperability, data cannot be successfully exchanged across various, occasionally overlapping devices and systems.
These silos, or closed ecosystems, present several issues from the standpoint of IoT platform adopters. They make it more difficult for new IoT platform devices and solutions to integrate and address various operational problems effectively. Supporting diverse IoT infrastructures can quickly increase costs and complexity beyond what businesses can handle.
In addition, vendor lock-in prevents consumers from switching in the future to more affordable hardware options while robbing them of control over their data, network uptime, and infrastructure management.
Another potential problem is technical instability, given the inherent risk that the seller may not provide the agreed-upon services and functionalities of the product. As a result, network scalability and quality of service are compromised, and security gaps may even open up.
Creating an Interoperable IoT Architecture
The best way to overpower these problems is to design your IoT networks from the beginning with interoperability in mind. Despite the very fragmented state of the IoT today, three general guidelines for IoT connectivity will aid in network planning.
1. Open, Industry Standards
The foundation of solutions utilizing tested standards is an open, global framework acknowledged by Standard Development Organizations (SDO). Along with ensuring a high standard of service, open standards promote global transparency and uniformity by removing incompatible technical development and product design differences.
In the long run, this promotes interoperability, cross-vendor support, and global adoption. Additionally, you can reduce the chance of backward compatibility due to any strategic adjustments made by the proprietary vendor.
1. Technologies powered by software
In this respect, deploying wireless solutions via a hardware-driven approach is challenging since you are limited to a distinct device type and depend on the appropriate vendor(s) to complete the certification process.
Contrarily, software-driven solutions allow you to flexibly integrate any legacy equipment and infrastructure that satisfies your operational needs, including sensors and business computers.
1. Public Interfaces
Effective data transport to various users’ application systems and servers is required for IoT interoperability at the application layer. The main forces behind cross-application interoperability are open-source messaging protocols like MQTT or CoAP and Application Programming Interfaces (APIs) built on RESTful principles. These open interfaces are natively included in the IoT gateway in private network architecture, enabling direct data transfer to your desired backend for analytics and visualization without the need for a third-party managed server.
In conclusion, interoperability is essential for a solid and scalable IoT network and calls for special consideration in architecture design. A software-driven communication platform that is standard-based with open interfaces built-in makes it simple to implement in legacy environments and guarantees long-term compatibility with cross-vertical hardware and systems.
Conclusion
There are several aspects and considerations to consider while developing a scalable Internet of Things (IoT) infrastructure. Integration of cross-domain hardware and application systems is typically necessary for an IoT infrastructure. It needs to be flexible enough to successfully integrate new devices that could one day have different hardware architectures.
A robust and scalable Internet of Things (IoT) network requires the creation of an interoperable IoT network, which necessitates special care in architecture design. Although the IoT is currently fragmented, three broad rules for IoT connectivity can help with network planning.
You can also use akenza.io, a self-service IoT platform that lets you build useful Azure IoT Hub products and services. Akenza.io is confident in its ability to help organizations develop IoT solutions by considerably reducing the workload and complexity.
Ads | ESSENTIALAI-STEM |
Linear upper bounds for local Ramsey numbers
Research output: Contribution to journalArticlepeer-review
24 Scopus citations
Abstract
A coloring of the edges of a graph is called a local k-coloring if every vertex is incident to edges of at most k distinct colors. For a given graph G, the local Ramsey number, rlock(G), is the smallest integer n such that any local k-coloring of Kn, (the complete graph on n vertices), contains a monochromatic copy of G. The following conjecture of Gyárfás et al. is proved here: for each positive integer k there exists a constant c = c(k) such that rlock(G) ≤ crk(G), for every connected grraph G (where rk(G) is the usual Ramsey number for k colors). Possible generalizations for hypergraphs are considered.
Original languageEnglish
Pages (from-to)67-73
Number of pages7
JournalGraphs and Combinatorics
Volume3
Issue number1
DOIs
StatePublished - Dec 1987
ASJC Scopus subject areas
• Theoretical Computer Science
• Discrete Mathematics and Combinatorics
Fingerprint
Dive into the research topics of 'Linear upper bounds for local Ramsey numbers'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Talk:Bolzano–Weierstrass theorem
Proof incomplete
The proof of the lemma in the case n = 1 is not complete: it assumes that every bounded real sequence has a "peak". This is not true – for example, the bounded sequence $$\left(x_n\right)_{n=1}^\infty$$ where $$a_n=\frac n{n+1}$$ has no "peak". I suggest the following.
Let $$a=\sup_{n\in\mathbb N}\{x_n\}$$. (This exists because the sequence is bounded.) Let $$n_1=1$$ and consider $$x_{n_1}=x_1$$. Either $$x_1=a$$ or $$x_1 < a$$. In the latter case, there exists $$n_2$$ such that $$x_1 < x_{n_2}\leq a$$. Clearly $$n_2 > 1 = n_1$$. Choose $$n_2$$ to be as small as possible. Now either $$x_{n_2}=a$$ or else $$x_{n_2} < x_{n_3}\leq a$$ for some $$n_3$$. By minimality of $$n_2$$, $$n_3 > n_2$$. Again take $$n_3$$ to be as small as possible.
Continuing the process, we get one of two eventualities: either $$x_{n_r}=a$$ for some $$n_r$$, or no such $$n_r$$ exists. In the first case, $$n_r$$ is a "peak" as defined in the article, and the rest of the proof can proceed as in the article. In the latter case, we have $$x_{n_1} < x_{n_2} < x_{n_3} < \cdots$$ with $$n_1 < n_2 < n_3 < \cdots$$, which is a monotone increasing subsequence as desired.
SophieAthena (talk) 13:53, 6 November 2012 (UTC)
* In the proof of the lemma, let $$N=0$$ when there is no peak, which appears to be handled correctly in the rest of the proof of the lemma. I edited the article to make the "no peak" case explicit Pmokeefe (talk) 15:47, 3 September 2023 (UTC)
Generalization to metric spaces
Shouldn't the Theorem's generalization to metric spaces be included in the article?
In a compact metric space (S,d), every infinite set included in S admits at least an accumulation (limit) point. Or in a compact metric space, every sequence admits a convergent subsequence. —Preceding unsigned comment added by Hearth (talk • contribs) 01:58, 24 April 2008 (UTC)
That'd be useful ideed: the current formulation seems to imply it only holds for $$\mathbb{R}^n$$. Ceacy (talk) 13:27, 4 November 2014 (UTC)
Spelling
Weierstrass/Weierstraß
It is not really my buisness, but I think in English it should be spelled Weierstrass, you know, all these books, and everything. Tosha 07:35, 23 Feb 2005 (UTC)
* Agree. Oleg Alexandrov 21:16, 6 May 2005 (UTC)
What's up with the weird dash? Shouldn't it be a hyphen? <IP_ADDRESS> 07:17, 22 October 2005 (UTC)
No, the en dash is correct. See Dash. —Caesura(t) 19:10, 6 December 2005 (UTC)
Equivalent theorems
Regarding this edit: What does it mean for theorems to be equivalent? I understand what it means that propositions A and B are equivalent (namely, A implies B and B implies A), but that does not make sense for theorems which are basically tautologies. -- Jitse Niesen (talk) 23:45, 8 November 2006 (UTC)
Alternative Theorems
In my real analysis class, I had two Bolzano-Weierstrass theorems:
one for sets, and one (as is here) for sequences
Is there somewhere where the sets one is taken care of?
Peter Stalin 18:21, 27 March 2007 (UTC)
* I'm not exactly sure what you are asking (but I'm not that smart, so its probably my fault)? What book did you use (if you have a page reference, that would be awesome)? Are you thinking of this formulation? Smmurphy(Talk) 18:09, 29 May 2007 (UTC)
Applications to Economics
Hi. While the application to economics listed here is interesting, it makes use of technical language that seems out of place in this article. If we had a nice list of a few of the many applications of this theorem in Mathematics, it would be a lot better. We could then include this application as one example. Regardless, this little section needs rewritten to be more understandable by someone with more knowledge of economics than I. Grokmoo 18:24, 13 July 2007 (UTC)
Mathematical analysis has practical application..? --<IP_ADDRESS> (talk) 13:25, 21 October 2011 (UTC)
Correctness of Theorem
I could be confused, but I think this page has a somewhat serious issue. The Heine-Borel theorem is that a set $$A\subset \mathbb{R}^n$$ is compact if and only if it is closed and bounded. This is equivalent to what is written here. My understanding is that the Bolzano-Weierstrass theorem is much more general and deeper, that is, that a subset of a metric space is compact if and only if it is sequentially compact. Any thoughts here? If there are no arguments, I think I will update the page and try to include a proof. This could be very confusing for a beginning student in analysis. John 06:27, 23 October 2007 (UTC)
* The Bolzano–Weierstrass theorem article states that:
* A subset A of Rn is sequentially compact if and only if it is both closed and bounded.
* So I guess you are referring to the theorem being generalized to an arbitrary metric space (with "bounded and closed" being replaced by "compact"). I would very much prefer that instead of rewriting the whole article from the more general view of metric spaces, you'd rather work on expanding the "Generalizations" section in the article. How would that sound? Oleg Alexandrov (talk) 03:17, 28 October 2007 (UTC)
* Yeah, that sounds good. I will spend some time doing that when I have some time. John 04:27, 28 October 2007 (UTC)
Beginning of some edits
I removed a short section on generalizations, because neither of the results discussed in this section was in fact a generalization of Bolzano-Weierstrass. I will be making some further edits in the near future, including some content-related additions. Plclark (talk) 06:26, 21 September 2008 (UTC)
I reviewed the article and did some minor cleanup. I think that more is necessary though.
Topology Expert (talk) 03:28, 23 November 2008 (UTC)
Assessment comment
Substituted at 01:49, 5 May 2016 (UTC)
Definition question
In the definition "The theorem states that each bounded sequence in R^n has a convergent subsequence", should it only be for bounded infinite sequences, since it doesn't seem to hold for finite sequences? Nik ol ai h ☎️📖 02:26, 11 May 2021 (UTC)
* A sequence as used in this branch of mathematics is, by definition, over the natural numbers. Pmokeefe (talk) 02:38, 3 September 2023 (UTC) | WIKI |
Wikipedia:Articles for deletion/Yancy Gates
The result was delete. Ron Ritzman (talk) 02:04, 26 February 2011 (UTC)
Yancy Gates
* – ( View AfD View log )
Looks like an "ordinary" NCAA college basketball player. He is a starter in his junior year for the Cincinnati Bearcats. Only college accolades are 2010-2011 pre-season honorable mention and 2008-2009 all-rookie Big East Conference teams. In high school as a senior, he earned first-team all-Ohio and fourth-team Parade Magazine All-America. Bgwhite (talk) 22:00, 18 February 2011 (UTC)
* Note: This debate has been included in the list of Basketball-related deletion discussions. —Bgwhite (talk) 22:00, 18 February 2011 (UTC)
* Note: This debate has been included in the list of Sportspeople-related deletion discussions. —Bgwhite (talk) 22:00, 18 February 2011 (UTC)
* Delete – There is some coverage of Gates on Google News, I saw a 2007 Cincinnati Enquirer article (behind a paywall) and coverage of a suspension from play a couple weeks ago. However, this is all local coverage from what I can see (also, the suspension has undue weight potential, especially in a BLP), and I found nothing significant from any national sources. I wouldn't be shocked if something was found via deep digging, but until that happens I'm on the delete side. Giants2008 ( 27 and counting ) 00:26, 19 February 2011 (UTC)
* Delete - Not notable as a basketball player as is. Maybe if he becomes a consensus All-American or major award winner next year, the article can be re-created. For the time being he is not notable. Jrcla2 (talk) 19:58, 21 February 2011 (UTC)
| WIKI |
Page:Pleasant Memories of Pleasant Lands.djvu/256
DOVER. 231
Come from their conflict with the raging seas So vengefully, that it is hard to hold A footing on the rock.
The moon is forth
In all her queenly plenitude, and scans The foaming channel with a look of peace But ill returned. For such a clamor reigns Between the ploughing waves and unyoked blasts, That the hoarse trumpet of the mariner Seems like the grass-bird s chirp.
And yet t is grand
To gaze upon the mountain surge, and hear How loftily it hurls the challenge back To the chafed cloud, and feel yourself a speck, An atom, in His sight, who rules its wrath, To whom the crush of all the elements Were but a bursting bubble.
Cliffs of chalk,
Old Albion s signal to the mariner, Encompass Dover, with their ramparts white, As in her vale, half-deafened by the surge, She croucheth down. Within their yielding breast, Deep excavations, and dark wreaths of smoke Mysterious, curling upward to the cloud, Reveal the soldier s home.
With Roman pride
The ancient Pharos, in its dotage, points To Cajsar, and the castellated walls Of yon irregular fabric speak of war : While France, who through the curtaining haze peers out
�� � | WIKI |
Actual source code: tscreate.c
petsc-dev 2014-08-28
Report Typos and Errors
2: #include <petsc-private/tsimpl.h> /*I "petscts.h" I*/
4: const char *const TSConvergedReasons_Shifted[] = {
5: "DIVERGED_STEP_REJECTED",
6: "DIVERGED_NONLINEAR_SOLVE",
7: "CONVERGED_ITERATING",
8: "CONVERGED_TIME",
9: "CONVERGED_ITS",
10: "TSConvergedReason","TS_",0};
11: const char *const*TSConvergedReasons = TSConvergedReasons_Shifted + 2;
13: #undef __FUNCT__
15: /*@C
16: TSCreate - This function creates an empty timestepper. The problem type can then be set with TSSetProblemType() and the
17: type of solver can then be set with TSSetType().
19: Collective on MPI_Comm
21: Input Parameter:
22: . comm - The communicator
24: Output Parameter:
25: . ts - The TS
27: Level: beginner
29: .keywords: TS, create
30: .seealso: TSSetType(), TSSetUp(), TSDestroy(), TSSetProblemType()
31: @*/
32: PetscErrorCode TSCreate(MPI_Comm comm, TS *ts)
33: {
34: TS t;
39: *ts = NULL;
40: TSInitializePackage();
42: PetscHeaderCreate(t, _p_TS, struct _TSOps, TS_CLASSID, "TS", "Time stepping", "TS", comm, TSDestroy, TSView);
43: PetscMemzero(t->ops, sizeof(struct _TSOps));
45: /* General TS description */
46: t->problem_type = TS_NONLINEAR;
47: t->vec_sol = NULL;
48: t->numbermonitors = 0;
49: t->snes = NULL;
50: t->setupcalled = 0;
51: t->data = NULL;
52: t->user = NULL;
53: t->ptime = 0.0;
54: t->time_step = 0.1;
55: t->time_step_orig = 0.1;
56: t->max_time = 5.0;
57: t->steps = 0;
58: t->max_steps = 5000;
59: t->ksp_its = 0;
60: t->snes_its = 0;
61: t->work = NULL;
62: t->nwork = 0;
63: t->max_snes_failures = 1;
64: t->max_reject = 10;
65: t->errorifstepfailed = PETSC_TRUE;
66: t->rhsjacobian.time = -1e20;
67: t->rhsjacobian.scale = 1.;
68: t->ijacobian.shift = 1.;
69: t->equation_type = TS_EQ_UNSPECIFIED;
71: t->atol = 1e-4;
72: t->rtol = 1e-4;
73: t->cfltime = PETSC_MAX_REAL;
74: t->cfltime_local = PETSC_MAX_REAL;
75: t->exact_final_time = TS_EXACTFINALTIME_STEPOVER;
77: *ts = t;
78: return(0);
79: } | ESSENTIALAI-STEM |
White House counsel plots with Senate GOP as impeachment gets closer
White House counsel Pat Cipollone met with Senate Republicans for lunch on Wednesday to denigrate the impeachment proceedings in the House and plot strategy for the likely Senate trial, the latest example of increasing coordination between the president and senators who will determine his fate. The lunch occurred while the House Judiciary Committee held its first impeachment hearing, during which three constitutional scholars said President Donald Trump committed impeachable offenses by trying to pressure Ukraine to investigate his political rivals. Trump refused to send his lawyers to that hearing, but Cipollone and White House officials Pam Bondi and Tony Sayegh were welcomed warmly by the 53-member Senate GOP caucus. Sen. Roy Blunt (R-Mo.) said Wednesday that Cipollone was emphatic that the impeachment inquiry against Trump was not worthy of being approved by the House, but that if it is sent over to the Senate, the president is eager to present his case. “The president’s counsel said enough times that he wanted to be sure we heard it, that even though they’re talking about what they may do if it comes here ... they clearly don’t believe — based on what’s happened so far — that the House should send it here,” Blunt said. Cipollone’s lunch comes amid rising White House outreach to Senate Republicans. A small group of GOP senators huddled with him before Thanksgiving and agreed that the Senate will likely hold a full trial rather than immediately try to dismiss it. Trump himself has met with dozens of Republican senators at the White House this fall. One attendee said the meeting was intended in part for “relationship building with Pat” and that there were no new revelations about the Senate impeachment process. Cipollone, who was accompanied by White House Legislative Affairs Director Eric Ueland, was the only administration official who spoke at the lunch. “They just wanted to help us get an understanding of where they’re coming from and how they see it,” added Senate Majority Whip John Thune (R-S.D.). “It was an opportunity for our members to ask questions and for some to offer comments.” GOP senators at the lunch said the White House counsel was careful not to dictate anything to the Senate other than to say the chamber can and should give the president a better deal than the House. “Pat, to his credit, knows this is our chamber,” said Sen. Kevin Cramer (R-N.D.). “With regard to the process, they yield completely to us and leadership.” Several senators asked questions about how many votes it takes to pass motions in an impeachment trial (it’s 51), but generally, specifics were not discussed. Cipollone did not bring up potential witnesses and said he can’t lay out his defense plan because “he doesn’t know where it’s going to shake out,” given the uncertainty in the House, according to Sen. Bill Cassidy (R-La.). Senators also discussed the possibility that perhaps there will be no trial at all. That seems unlikely given the rapid advance toward impeachment, but some Republicans said they believed Speaker Nancy Pelosi might lack the votes to pass articles of impeachment. “I wonder right now whether there might be something other than articles of impeachment voted on, because politically it’s lost quite a bit of support,” said Sen. Mike Braun (R-Ind.). “Nobody knows what’s going to happen in the House,” added Sen. Lindsey Graham (R-S.C.), adding that Cipollone mostly laid out “here’s why we think the House process was flawed and the president did nothing wrong.” Despite some Republicans emphasizing their role as jurors in any Senate impeachment trial, the White House hasn't been shy about wooing the jury. Since the fall began, Trump has hosted more than 40 Republican senators, primarily for weekly lunches. The White House has also hosted Republican House members for weekends at Camp David, and Trump has brought lawmakers to several sporting events, including to the World Series in Washington and the Ultimate Fighting Championship in New York City. Senate Democrats discussed impeachment at their own lunch Wednesday. Senate Minority Leader Chuck Schumer (D-N.Y.) gave a presentation about the “mechanics of a potential Senate trial” to the caucus, which included clips from the 1999 Clinton impeachment proceedings, according to a senior Democratic aide. Senate Majority Leader Mitch McConnell (R-Ky.) and Schumer have yet to hammer out the details of what a Senate trial would look like. McConnell suggested Tuesday that if he can’t come to an agreement with Schumer, he would then try to pass a partisan package that would determine the rules of the impeachment trial. Timing for the impeachment trial remains uncertain. The Senate’s legislative calendar, released Wednesday, includes an ominous blank spot for the month of January, a reminder that the proceedings surrounding impeachment are fluid. Although the details for an impeachment trial remain unclear, Senate Republicans said they can guarantee at least one thing: Trump’s defense will be heard. “Should the proceeding come to this body, we’ll respect due process far more than the House has done. And we’ll conduct a fair and open process, both sides I believe will be allowed to present their case,” said Sen. Ted Cruz (R-Texas). “The White House will be allowed to defend themselves.” | NEWS-MULTISOURCE |
Corneal ulcer
What is a corneal ulcer?
A corneal ulcer is an open ulcer that is found in the outer layer of the cornea. If the corneal ulcer is not treated, it can lead to the appearance of scars on the cornea, to a considerable loss of vision or even to the loss of the eye.
What are the symptoms of a corneal ulcer?
The main symptoms are:
• blurred or cloudy vision
• itching and discharge
• eye that looks red or bloody
• tearful and very sore eyes
• photophobia (sensitivity to light)
• white patch on the cornea
What are the causes of a corneal ulcer?
The cause is usually an infection by bacteria, a virus, fungus or a parasite. Other causes are severe dry eyes, a severe allergic disease, the eyelids not closing well or foreign bodies in the eye.
Can a corneal ulcer be prevented?
The recommended measures to prevent a corneal ulcer are:
• washing one's hands thoroughly before using contact lenses
• avoiding contact lenses during the night
• receiving a timely and early treatment for any eye infection
What is the treatment for a corneal ulcer?
Treatment depends on the cause of the ulcer. Once it is known, drops may be prescribed to treat herpes, bacteria, other viruses or a fungus.
If the exact cause is not known, antibiotic drops are usually prescribed since they are effective against many types of bacteria.
In cases of severe ulcers, it is sometimes necessary to perform a corneal transplant, which involves replacing the cornea with the tissue of a donor.
This website uses our own and third-party Cookies to compile information with the aim of improving our services, to show you advertising related to your preferences as well analysing your browsing habits. You can change your settings HERE. | ESSENTIALAI-STEM |
The Klallam tribe, also known as the Klallam Nation, is a Native American tribe that has lived in the Pacific Northwest region of the United States for thousands of years.
The Klallam people traditionally occupied a territory that included the Olympic Peninsula in Washington state and the lower mainland of British Columbia. They were a fishing people and lived off the abundant salmon runs in the area.
The Klallam people have a rich culture and history, with a strong emphasis on storytelling and art. They have a matrilineal kinship system and their traditional governance is based on a form of a tribe council.
In the late 19th century, the Klallam people were forced to relocate to reservations, which had a significant impact on their way of life. Today, the Klallam tribe is federally recognized and has several reservations in Washington state. | FINEWEB-EDU |
Page:Popular Science Monthly Volume 73.djvu/381
Rh by the number of members, is given in the last column of the table. Thus, Prussia, which has a population of 37,300,000 furnishes 4 men who are members of all 7 societies, 1 of 6, 2 of 5, 5 of 4, 3 of 3, and 2 of 2, making 17 in all. The number of memberships is 77, or an average of 4.5 societies to each member. On the average, one Prussian in 2,000,000, appears in Table II.
Prom an examination of Table III. it appears that, with the exception of one botanist from Java, who should perhaps be added to the group from Holland, no member resides in Asia, Africa, South America or Oceanica. With the same exception, no member comes from a colony or subsidiary country. The only members from North America are from the United States, and no members come from Scotland, Ireland or Wales. The number from the United States is no greater than that from Saxony which has about one twentieth the population. This is in part offset by the fact that the two English speaking nations, England and the United States, show a higher average number of societies per member than any other nations except Italy and Belgium. The very small ratio of members to population in Russia is largely due to the vast sparsely settled tracts of that country where advanced intellectual work is impossible.
Grouping the members according to cities, we have, Paris, 12; London, 10; Berlin, 10; Vienna, 4; Leipzig, 4; Stockholm, 3; St. Petersburg, 3; Copenhagen, 3. It will be noticed that, with the exception of Leipzig, each of these cities is the capital of its country. All the members from France, Austria, Sweden, Russia, Denmark and Java come from the capitals of those countries. Of the entire 87, 58 or nearly two thirds reside in capital cities. The average membership of these men is also higher, being 4.3 for those in capitals and 3.9 for the others. Ten cities contain two members each, and seventeen, one each.
A grouping according to the sciences is given in Table IV., in a form similar to Table III. The successive columns give the name of the science, the number of members in 7, 6, 5, 4, 3 and 2 societies, respectively, the total number of members, the total number of societies, the average number of societies per member, and four columns indicating the country to which the members belong. The first of these columns headed G, for Germany, includes Prussia, Saxony, Bavaria, Baden and Wurtemberg; E includes England and the United States; F, France; M, the other countries.
In eight of the sciences, the number of members is fairly distributed, varying from 8 to 11. None appear in mechanics, 3 only in agriculture, and 5 in geography. The grade, or average membership is remarkably high in chemistry, 5.5, with astronomy second, 4.9. The average for all is 4.1. Of the 10 members belonging to all seven societies 4 are chemists. The distribution according to nations is | WIKI |
Writing packages that extend HyperSpy#
Added in version 1.5: External packages can extend HyperSpy by registering signals, components and widgets.
Warning
The mechanism to register extensions is in beta state. This means that it can change between minor and patch versions. Therefore, if you maintain a package that registers HyperSpy extensions, please verify that it works properly with any future HyperSpy release. We expect it to reach maturity with the release of HyperSpy 2.0.
External packages can extend HyperSpy by registering signals, components and widgets. Objects registered by external packages are “first-class citizens” i.e. they can be used, saved and loaded like any of those objects shipped with HyperSpy. Because of HyperSpy’s structure, we anticipate that most packages registering HyperSpy extensions will provide support for specific sorts of data.
Models can also be provided by external packages, but don’t need to be registered. Instead, they are returned by the create_model method of the relevant BaseSignal subclass, see for example, the exspy.signals.EDSTEMSpectrum.create_model() of the exspy.signals.EDSTEMSpectrum.
It is good practice to add all packages that extend HyperSpy to the list of known extensions regardless of their maturity level. In this way, we can avoid duplication of efforts and issues arising from naming conflicts. This repository also runs an integration test suite daily, which runs the test suite of all extensions to check the status of the ecosystem. See the corresponding section for more details.
At this point, it is worth noting that HyperSpy’s main strength is its amazing community of users and developers. We trust that the developers of packages that extend HyperSpy will play by the same rules that have made the Python scientific ecosystem successful. In particular, avoiding duplication of efforts and being good community players by contributing code to the best matching project are essential for the sustainability of our open software ecosystem.
Registering extensions#
In order to register HyperSpy extensions, you need to:
1. Add the following line to your package’s setup.py:
entry_points={'hyperspy.extensions': 'your_package_name = your_package_name'},
2. Create a hyperspy_extension.yaml configuration file in your module’s root directory.
3. Declare all new HyperSpy objects provided by your package in the hyperspy_extension.yaml file.
For a full example on how to create a package that extends HyperSpy, see the HyperSpy Sample Extension package.
Creating new HyperSpy BaseSignal subclasses#
When and where to create a new BaseSignal subclass#
HyperSpy provides most of its functionality through the different BaseSignal subclasses. A HyperSpy “signal” is a class that contains data for analysis and functions to perform the analysis in the form of class methods. Functions that are useful for the analysis of most datasets are in the BaseSignal class. All other functions are in specialized subclasses.
The flowchart below can help you decide where to add a new data analysis function. Notice that only if no suitable package exists for your function, you should consider creating your own.
digraph G { A [label="New function needed!"] B [label="Is it useful for data of any type and dimensions?",shape="diamond"] C [label="Contribute it to BaseSignal"] D [label="Does a SignalxD for the required dimension exist in HyperSpy?",shape="diamond"] E [label="Contribute new SignalxD to HyperSpy"] F [label="Is the function useful for a specific type of data only?",shape="diamond"] G [label="Contribute it to SignalxD"] H [label="Does a signal for that sort of data exist?",shape="diamond"] I [label="Contribute to package providing the relevant signal"] J [label="Create you own package and signal subclass to host the funtion"] A->B B->C [label="Yes"] B->D [label="No"] D->F [label="Yes"] D->E [label="No"] E->F F->H [label="Yes"] F->G [label="No"] H->I [label="Yes"] H->J [label="No"] }
Registering a new BaseSignal subclass#
To register a new BaseSignal subclass you must add it to the hyperspy_extension.yaml file, as in the following example:
signals:
MySignal:
signal_type: "MySignal"
signal_type_aliases:
- MS
- ThisIsMySignal
# The dimension of the signal subspace. For example, 2 for images, 1 for
# spectra. If the signal can take any signal dimension, set it to -1.
signal_dimension: 1
# The data type, "real" or "complex".
dtype: real
# True for LazySignal subclasses
lazy: False
# The module where the signal is located.
module: my_package.signal
Note that HyperSpy uses signal_type to determine which class is the most appropriate to deal with a particular sort of data. Therefore, the signal type must be specific enough for HyperSpy to find a single signal subclass match for each sort of data.
Warning
HyperSpy assumes that only one signal subclass exists for a particular signal_type. It is up to external package developers to avoid signal_type clashes, typically by collaborating in developing a single package per data type.
The optional signal_type_aliases are used to determine the most appropriate signal subclass when using set_signal_type(). For example, if the signal_type Electron Energy Loss Spectroscopy has an EELS alias, setting the signal type to EELS will correctly assign the signal subclass with Electron Energy Loss Spectroscopy signal type. It is good practice to choose a very explicit signal_type while leaving acronyms for signal_type_aliases.
Creating new HyperSpy model components#
When and where to create a new component#
HyperSpy provides the hyperspy._components.expression.Expression component that enables easy creation of 1D and 2D components from mathematical expressions. Therefore, strictly speaking, we only need to create new components when they cannot be expressed as simple mathematical equations. However, HyperSpy is all about simplifying the interactive data processing workflow. Therefore, we consider that functions that are commonly used for model fitting, in general or specific domains, are worth adding to HyperSpy itself (if they are of common interest) or to specialized external packages extending HyperSpy.
The flowchart below can help you decide when and where to add a new hyperspy model hyperspy.component.Component for your function, should you consider creating your own.
digraph G { A [label="New component needed!"] B [label="Can it be declared using Expression?",shape="diamond"] C [label="Can it be useful to other users?",shape="diamond"] D [label="Just use Expression"] E [label="Create new component using Expression"] F [label="Create new component from scratch"] G [label="Is it useful for general users?",shape="diamond"] H [label="Contribute it to HyperSpy"] I [label="Does a suitable package exist?",shape="diamond"] J [label="Contribute it to the relevant package"] K [label="Create your own package to host it"] A->B B->C [label="Yes"] B->F [label="No"] C->E [label="Yes"] C->D [label="No"] E->G F->G G->H [label="Yes"] G->I [label="No"] I->J [label="Yes"] I->K [label="No"] }
Registering new components#
All new components must be a subclass of hyperspy._components.expression.Expression. To register a new 1D component add it to the hyperspy_extension.yaml file as in the following example:
components1D:
# _id_name of the component. It must be a UUID4. This can be generated
# using ``uuid.uuid4()``. Also, many editors can automatically generate
# UUIDs. The same UUID must be stored in the components ``_id_name`` attribute.
fc731a2c-0a05-4acb-91df-d15743b531c3:
# The module where the component class is located.
module: my_package.components
# The actual class of the component
class: MyComponent1DClass
Equivalently, to add a new component 2D:
components2D:
# _id_name of the component. It must be a UUID4. This can be generated
# using ``uuid.uuid4()``. Also, many editors can automatically generate
# UUIDs. The same UUID must be stored in the components ``_id_name`` attribute.
2ffbe0b5-a991-4fc5-a089-d2818a80a7e0:
# The module where the component is located.
module: my_package.components
class: MyComponent2DClass
Note
HyperSpy’s legacy components use their class name instead of a UUID as _id_name. This is for compatibility with old versions of the software. New components (including those provided through the extension mechanism) must use a UUID4 in order to i) avoid name clashes ii) make it easy to find the component online if e.g. the package is renamed or the component relocated.
Creating and registering new widgets and toolkeys#
To generate GUIs of specific methods and functions, HyperSpy uses widgets and toolkeys:
• widgets (typically ipywidgets or traitsui objects) generate GUIs,
• toolkeys are functions which associate widgets to a signal method or to a module function.
An extension can declare new toolkeys and widgets. For example, the hyperspy-gui-traitsui and hyperspy-gui-ipywidgets provide widgets for toolkeys declared in HyperSpy.
Registering toolkeys#
To register a new toolkey:
1. Declare a new toolkey, e. g. by adding the hyperspy.ui_registry.add_gui_method decorator to the function you want to assign a widget to.
2. Register a new toolkey that you have declared in your package by adding it to the hyperspy_extension.yaml file, as in the following example:
GUI:
# In order to assign a widget to a function, that function must declare
# a `toolkey`. The `toolkeys` list contains a list of all the toolkeys
# provided by extensions. In order to avoid name clashes, by convention,
# toolkeys must start with the name of the package that provides them.
toolkeys:
- my_package.MyComponent
Registering widgets#
In the example below, we register a new ipywidget widget for the my_package.MyComponent toolkey of the previous example. The function simply returns the widget to display. The key module defines where the functions resides.
GUI:
widgets:
ipywidgets:
# Each widget is declared using a dictionary with two keys, `module` and `function`.
my_package.MyComponent:
# The function that creates the widget
function: get_mycomponent_widget
# The module where the function resides.
module: my_package.widgets
Integration test suite#
The integration test suite runs the test suite of HyperSpy and of all registered HyperSpy extensions on a daily basis against both the release and development versions. The build matrix is as follows:
Build matrix of the integration test suite#
HyperSpy
Extension
Dependencies
Release
Release
Release
Release
Development
Release
RELEASE_next_patch
Release
Release
RELEASE_next_patch
Development
Release
RELEASE_next_minor
Release
Release
RELEASE_next_minor
Development
Release
RELEASE_next_minor
Development
Development
RELEASE_next_minor
Development
Pre-release
The development packages of the dependencies are provided by the scipy-wheels-nightly repository, which provides scipy, numpy, scikit-learn and scikit-image at the time of writing. The pre-release packages are obtained from PyPI and these will be used for any dependency which provides a pre-release package on PyPI.
A similar Integration test workflow can run from pull requests (PR) to the hyperspy repository when the label run-extension-tests is added to a PR or when a PR review is edited. | ESSENTIALAI-STEM |
Calcium and Ligament Health
Page content
About Calcium
Calcium is one of the most important micronutrients used by the body. It is crucial for bone and tooth health, but also plays important roles in muscle contraction, nervous system function, and vascular system function. Calcium is also used as a co-factor in hundreds of enzyme reactions, and is an essential part of cell-to-cell communication.
The importance of calcium in so many of the body’s main functions means that having an adequate store of calcium on hand is essential. Bones, which are made primarily of calcium and potassium, serve as the perfect storage facility for calcium.
Bones are continually undergoing a process of remodeling, which occurs as calcium and potassium salts are absorbed by the bloodstream or deposited in bones. Calcium is absorbed into the bloodstream when blood calcium levels fall too low. Similarly, if levels of calcium in the blood are too high, calcium is re-deposited for storage in bones.
This mechanism is the reason why insufficient dietary calcium can cause osteoporosis: when dietary calcium intake is low, calcium is continually drawn from bones. This leads to a deficit of this mineral in the bones, the result of which is that bones become more brittle.
Calcium and Ligament Health
This explains why calcium is so important for bone health - but what about calcium and ligament health - is there a connection?
Ligaments are made up of fibrous connective tissue that does not contain any calcium. Proper joint function requires that ligaments be flexible and somewhat stretchy, which means that calcium deposits on ligaments would prevent them functioning properly. So, calcium is not important for good ligament health.
In fact, bony calcium deposits on or near ligaments, tendons, or any other type of soft tissue can actually be harmful and prevent healthy joint or tissue function. Calcium deposits can develop in a process known as calcinosis or calcification, in response to certain types of stimuli.
Dystrophic calcification occurs in response to soft tissue or ligament damage. This is a response to inflammation caused by tissue damage, and involves the deposition of calcium into damaged tissues as part of the healing response. This is an abnormal reaction that is more likely to occur when blood levels of calcium are too high.
Metastatic Calcification is most often the result of a system imbalance in calcium levels, typically caused by chronically high levels of free calcium in the blood, or by kidney failure. This type of calcification can cause the development of calcium deposits in multiple locations in the body, including in tendons, ligaments, and other soft tissues.
References
National Institute of Health Office of Dietary Supplements: Dietary Supplement Fact Sheet: Calcium
Oregon State University Linus Pauling Institute: Micronutrient Information Center: Calcium
University of Washington Department Of Radiology: Musculoskeletal Radiology: Soft Tissue Calcifications | ESSENTIALAI-STEM |
2-key-exercises-for-building-a-wide-back
2 Key Exercises For Building a Wide Back (Workout Included)
If you were supposed to perform only two exercises for building a wide and thick back, what would they be? We guess you haven’t really thought about this, so let us give you an idea of highly-concentrated and truly effective back training.
Read this article to learn which two exercises are the most vital to back development and perform them to add another dimension to your overall physique!
The chest, the biceps and the abs are the muscles which receive all the love when it comes to the average lifter. Unfortunately, this attitude towards training comes with some severe costs such as weird aesthetics and limited physique and performance improvement. Because regardless of how the chest, biceps and abs are important, they tend to be overtrained at the expense of training the back, even though neglecting the back muscles can lead to increased risk of injury, stalled progress in performance and muscle asymmetry.
This is, by the way, one of the major distinctions between the classic meathead and the real bodybuilder: the latter never misses his back or leg workouts, while the first doesn’t even train his back or legs directly. Building a huge back will demand a lot of patience and hard work, but hey, didn’t you want to be something more than a set of well-defined abs and pumped pcs? If you want to look like a Greek god, be in great health and blow up minds at the gym, strive to build a well-proportioned, muscular but lean body.
When making a program for maximum back development, you need to break up the training into two parts – training for thickness and training for width. Increasing back width has always been the bigger challenge here, which is why huge lats are the symbol of ultimate manliness.
To build attention-grabbing lats, you need to center your workouts around two key movements:
1. Pull-ups
Pull-ups are a killer upper-body multi-joint movement which works a number of larger muscle groups at the same time and frankly speaking, if you don’t have it in your program, you’re not truly training. There is a reason this baddass bodyweight exercise has been known as the torso-equivalent of the squat, i.e. the king of lower-body compound builders. You can use a wider grip to really burn your lats or a narrower grip to increase bicep bias, or try negatives, reverse grip, etc. The main two variations are the chin-up (supinated grip) and the neutral pull-up (palms facing each other).
pull-up
How to:
Go to a pull-up bar. Pull yourself up until your chin crosses over the bar, then slowly lower yourself down until your arms are fully stretched out. From the original position, go for the next rep. As you get stronger, you can try weighted pull-ups, another pull-up variant or another rep range. With pull-ups, you will never stop growing.
2. Pullovers
It’s a real shame this movement has become a relic of the past because it’s not as glamorous and trendy as the bench press and any curling movement because this staple of the Arnold-era can help anyone build bigger and stronger lats. But Arnold is not the only advocate for more pullovers. Ronnie Coleman found ways to incorporate heavy pullovers in his back training program for years, and Dorian Yates uses pullovers as an essential part of his legendary lat workouts. Even Frank Zane though that doing pullovers can help you tremendously develop your serratus muscles.
dumbbell-pullover
How to:
You can either perform pullovers with a dumbbell or an EZ curl bar.
For the dumbbell version, lay across a bench with a dumbbell in your hands. Use both hands to elevate that dumbbell over your face and into the air, then stretch it back until it touches the floor. Repeat. Make sure to perform each rep in a smooth and controlled manner, in order to keep constant tension on your lats. Most importantly, don’t let your arms get all the action. Instead, initiate the pull by squeezing your lats, to exhaust them more thoroughly.
If you want to use an EZ curl bar, lie flat on a bench as if you were going to do a dumbbell bench press. As you hold the bar close to you, tuck your elbows in as much as possible, then stretch back as far as you can. Return the bar to the chest and repeat.
THE 6-WEEK PROGRAM FOR A WIDER BACK
This is a six-week mesocycle designed for maximizing back width. Rest 45 seconds between the 7×3 supersets and 30-60 seconds between the 6×5 supersets. At the end of the 6 weeks, take a deloading week.
DAY 1: DIPS & CHINS
EXERCISESETSREPS
1a. Dips73
ab. Chin-ups73
2a. Dips65
2b. Chin-ups65
3a. Dumbbell Pullover48
3b. Weighted Pushup48
DAY 2: LOWER BODY
EXERCISESETSREPS
1a. Sumo Deadlift73
ab. Glute Ham Raise73
2a. Hip Thrusts65
2b. Barbell Reverse Lunge65
3a. Standing Calf Raise48
3b. Seated Calf Raise48
DAY 3: UPPER BODY
EXERCISESETSREPS
1a. Pause Pull-ups73
ab. Overhead Press73
2a. Dumbbell Pullover65
2b. One-Arm Row65
3a. Lateral Raises48
3b. Wide Grip Upright Row48
DAY 4: LOWER BODY
EXERCISESETSREPS
1a. Heels-Elevated Barbell Squat73
ab. Barbell Hack Squat73
2a. Sissy Squat65
2b. Dumbbell Lunges65
3a. Seated Calf Raises48
3b. Standing Calf Raises48
DAY 5: UPPER BODY
EXERCISESETSREPS
1a. Incline Bench Press73
ab. Rack Pull73
2a. Dumbbell Bench Press65
2b. Neutral Grip Pullup65
3a. Decline Dumbbell Press48
3b. Bent Over Barbell Row48
Don’t forget – consistency is the key. After these six weeks, you have to keep on working out regularly and effectively in the long term in order to get great results. Expect some pain. But don’t forget that there is nobody who truly succeeded at anything without overcoming certain difficulties.
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
Sorted NSFileManager content
Discussion in 'Mac Programming' started by UruLama, Jun 6, 2008.
1. UruLama macrumors newbie
Joined:
Jun 6, 2008
#1
Hi, all.
I would like to get the list of filenames in a current directory sorted by the date of the modification (from the most recent to the odlest). The following code returns only the files in the directory:
NSArray* dirCont = [fm directoryContentsAtPath: [fm currentDirectoryPath]];
Is there a way to get the filenames in dirCont sorted by some file attribute (for example NSFileModificationDate) directly without sorting the content on hand?
TNX, UruLama.
2. indiekiduk macrumors 6502
Joined:
Jul 26, 2005
Location:
Glasgow, Scotland
#2
I'd like to know this too? Here is a long way:
Code:
-(NSString*)findLatestFileInDir:(NSString*)dir{
NSFileManager *fileManager = [NSFileManager defaultManager];
NSArray* contents = [fileManager directoryContentsAtPath:dir];
NSDictionary *currentFileAttributes;
NSDate* currentFileDate;
NSString* latestFile;
NSDate* latestFileDate = [NSDate distantPast];
for (NSString* fname in contents) {
//check file is newer
currentFileAttributes = [fileManager fileAttributesAtPath:[NSString stringWithFormat:@"%@/%@",dir,fname] traverseLink:YES];
currentFileDate = [currentFileAttributes objectForKey:NSFileModificationDate];
if([currentFileDate laterDate:latestFileDate] == currentFileDate){
latestFileDate = currentFileDate;
latestFile = fname;
}
}
return latestFile;
}
Share This Page | ESSENTIALAI-STEM |
John Compton Dam
The John Compton Dam, formerly known as the Roseau Dam, is a concrete-face rock-fill dam on the Roseau River in the small community of Millet in central Saint Lucia. The primary purpose of the dam is municipal water supply. It is named after John Compton, the former Prime Minister of Saint Lucia, who was influential in its implementation.
Construction on it began in April 1993 but was substantially delayed when Tropical Storm Debby struck the island on 10 September 1994. Rainfall from the storm exceeded the 1000 year estimate and ensuing floods breached the incomplete dam. The dam was eventually completed in October 1995. The dam's reservoir, Roseau Reservoir, is experiencing heavily siltation and studies are currently underway to remediate the problem. Hurricane Tomas in 2010 and a severe December 2013 storm created large landslides in the reservoir that have reduced its capacity by 30 percent. | WIKI |
Chem1 Properties of Gases
Although it is important for students to learn to solve problems involving "the gas laws", the reason for including the study of gases in the curriculum goes far beyond this; the subject provides an ideal opportunity to illustrate, by example, how the creative use of some simple principles of mechanics can provide a surprisingly good description of the simplest state of matter. A major objective of these lessons is to help students to get a feeling for the kind of reasoning that goes into the development of the scientific model that we call the "ideal gas". Beginning students in Chemistry are notoriously hesitant to undertake the development of conceptual models of their own, preferring instead the relative comfort of learning the usual standard set problems. It is hoped that bringing the students into more intimate contact with the thinking behind the laws will build both interest and confidence.
The eleven lessons of this unit are mostly quite short, so that students can concentrate on just a few concepts at a time, and they can go through them in any sequence. Each ends with a summary screen and the display of a "score" which students are encouraged to use for self- assessment. The emphasis is very definitely on concepts rather than on learning "formulas" or the proper mathematical development of the kinetic molecular theory. The level is aimed at first-year college/university, which means that the lessons should for the most part be suitable for high school use as well. The fact that a number of the topics in the last two sections are normally considered "beyond the scope" of many introductory courses should not prejudice instructors against recommending them to their students; these topics are interesting and they introduce concepts that can be built upon later. At the other end of the scale, the lesson on atmospheric pressure and the barometer was developed in response to our experience that few of our incoming first-year university students are able to explain how a barometer works.
Throughout the lessons there is continual emphasis on predicting relationships and on in- terpreting graphical information. This is one area in which interactive CAI can probably do considerably more than can traditional methods of instruction. A good example is the discussion of the three-dimensional PVT surface in the fourth lesson, which is difficult to convey in lecture (students have enough difficulty taking notes in two dimensions!), and for some reason is considered too trivial (or intimidating?) for textbooks. The goal of all this goes considerably beyond teaching "facts" about the properties of gases; our hope is that these lessons can help students develop habits of questioning and analysis that will serve as useful tools in any quantitative subject.
This three-dimensional P-V-T surface is explored in Lesson 5.
Contents of the lessons
The Properties of Gases lessons are organized into eleven sections as detailed below:
1. Introduction. Pressure as the fundamental observable property of a gas; how pressure is measured; definition and kinetic-molecular origin of gas pressure.
2. Effect of temperature on P and V. How to keep the pressure constant as the temper- ature is increased. Charles'law in graphical and algebraic forms, and expressed as 1/273 change in volume per degree; extrapolation to absolute zero.
3. Mole-volume relations in gas-phase reactions. Avogadro's law; comparing the volumes of equal masses of different gases. Gas-volume stoichiometry.
4. Pressure-volume relations. Exploring the relation between pressure and volume; Boyle's experiment and Boyle's Law.
5. The ideal gas law. the PV-product and its dependence on the temperature; combining Boyle's, Charles' and Avogadro's laws. The gas constant and its units. Exploring the PVT-surface.
6. Diffusion. Kinetic energy, mass, and molecular velocities; Graham's Law. Relative diffusion rates of NH3 and HCl.
7. Mixtures of gases. Partial pressure; Dalton's Law. Application to scuba diving.
8. Gas density, molar volume and molar mass. Effects of P and T on the density.
9. Atmospheric pressure and the barometer. The relation between pressure and altitude. Operation of mercury and water barometers.
10. Molecules in motion. How velocities are averaged. The kinetic energy of a gas and the effect of collisions in redistributing molecular velocities. Understanding velocity distribution curves. Boltzmann distribution and the temperature. Average molar kinetic energy.
11. Real gases and intermolecular interactions. Assumptions of the kinetic-molecular theory not applicable to real gases. Excluded volume and intermolecular attractions; the conditions under which they become significant. Understanding PV vs P plots; effects of temperature and molar mass. The van der Waals equation.
Return to "What's available" page | ESSENTIALAI-STEM |
Results 1 to 8 of 8
Thread: PagedResultsRequestControl, getting [LDAP: error code 4 - Sizelimit Ex
1. #1
Join Date
Aug 2006
Posts
18
Default PagedResultsRequestControl, getting [LDAP: error code 4 - Sizelimit Ex
Hello,
I'm trying to implement a ldap search to get *all* groups I have in my ldap server. As the number of group is bigger than my server search limit (500), I'm trying to use PagedResultsRequestControl.
Here is my code :
Code:
List<String> groups = new ArrayList<String>();
final int PAGE_SIZE = 100;
PagedResultsRequestControl control = new PagedResultsRequestControl(PAGE_SIZE, null);
do {
List<String> groupsTemp = this.ldapTemplate.search(this.baseGroupSearch, this.groupSearchFilter, this.searchControls,
new ParameterizedContextMapper<String>() {
public String mapFromContext(Object arg0) {
DirContextAdapter dirContextAdapter = (DirContextAdapter) arg0;
return dirContextAdapter.getStringAttribute(CheckHomonymy.this.groupIdAttribute);
}
}, control);
groups.addAll(groupsTemp);
control = new PagedResultsRequestControl(PAGE_SIZE, control.getCookie());
} while (control.getCookie().getCookie() != null);
Please note that I'm using a page size smaller than my server limit.
I'm getting this exception when I try to get the 5th page of object (5*100 objects fetched).
I don't understand why I have this as I'm using pages of 100 objects. I thought it would reset the limit after each call of ldapTemplate.search(...).
Where am I wrong ?
thank you.
dom
Code:
org.springframework.ldap.LimitExceededException: [LDAP: error code 4 - Sizelimit Exceeded]; nested exception is javax.naming.SizeLimitExceededException: [LDAP: error code 4 - Sizelimit Exceeded]; remaining name 'o=internet'
at org.springframework.ldap.support.LdapUtils.convertLdapException(LdapUtils.java:140)
at org.springframework.ldap.core.LdapTemplate.search(LdapTemplate.java:295)
at org.springframework.ldap.core.LdapTemplate.search(LdapTemplate.java:234)
at org.springframework.ldap.core.LdapTemplate.search(LdapTemplate.java:583)
at org.springframework.ldap.core.simple.SimpleLdapTemplate.search(SimpleLdapTemplate.java:101)
at com.dexia.sofaxis.checkhomonymy.CheckHomonymy.getGroups(CheckHomonymy.java:154)
at com.dexia.sofaxis.checkhomonymy.CheckHomonymy.checkGroups(CheckHomonymy.java:110)
at com.dexia.sofaxis.checkhomonymy.CheckHomonymy.run(CheckHomonymy.java:99)
at com.dexia.sofaxis.common.batch.engine.Launcher.run(Launcher.java:42)
at com.dexia.sofaxis.common.batch.engine.UnitTestLauncher.run(UnitTestLauncher.java:53)
at com.dexia.sofaxis.checkhomonymy.CheckHomonymyTest.testRun(CheckHomonymyTest.java:22)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:585)
at org.junit.internal.runners.TestMethod.invoke(TestMethod.java:59)
at org.junit.internal.runners.MethodRoadie.runTestMethod(MethodRoadie.java:98)
at org.junit.internal.runners.MethodRoadie$2.run(MethodRoadie.java:79)
at org.junit.internal.runners.MethodRoadie.runBeforesThenTestThenAfters(MethodRoadie.java:87)
at org.junit.internal.runners.MethodRoadie.runTest(MethodRoadie.java:77)
at org.junit.internal.runners.MethodRoadie.run(MethodRoadie.java:42)
at org.junit.internal.runners.JUnit4ClassRunner.invokeTestMethod(JUnit4ClassRunner.java:88)
at org.junit.internal.runners.JUnit4ClassRunner.runMethods(JUnit4ClassRunner.java:51)
at org.junit.internal.runners.JUnit4ClassRunner$1.run(JUnit4ClassRunner.java:44)
at org.junit.internal.runners.ClassRoadie.runUnprotected(ClassRoadie.java:27)
at org.junit.internal.runners.ClassRoadie.runProtected(ClassRoadie.java:37)
at org.junit.internal.runners.JUnit4ClassRunner.run(JUnit4ClassRunner.java:42)
at org.eclipse.jdt.internal.junit4.runner.JUnit4TestReference.run(JUnit4TestReference.java:38)
at org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.java:38)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:460)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:673)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRunner.java:386)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRunner.java:196)
Caused by: javax.naming.SizeLimitExceededException: [LDAP: error code 4 - Sizelimit Exceeded]; remaining name 'o=internet'
at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:3037)
at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2931)
at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2737)
at com.sun.jndi.ldap.LdapCtx.searchAux(LdapCtx.java:1808)
at com.sun.jndi.ldap.LdapCtx.c_search(LdapCtx.java:1731)
at com.sun.jndi.toolkit.ctx.ComponentDirContext.p_search(ComponentDirContext.java:368)
at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:338)
at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:321)
at javax.naming.directory.InitialDirContext.search(InitialDirContext.java:248)
at org.springframework.ldap.core.LdapTemplate$4.executeSearch(LdapTemplate.java:230)
at org.springframework.ldap.core.LdapTemplate.search(LdapTemplate.java:272)
... 31 more
2. #2
Join Date
Jul 2005
Location
Helsingborg, Sweden
Posts
504
Default
I believe this is the expected behavior. The Paged Results Control is described in RFC 2696. In chapter 6, Security Considerations, it says:
Servers implementations may enforce an overriding sizelimit, to
prevent the retrieval of large portions of a publically-accessible
directory.
Ulrik Sandberg
Jayway (www.jayway.com)
Spring LDAP project member
3. #3
Join Date
Aug 2006
Posts
18
Default
I don't really understand this behaviour. I understand that there may be a server side limit to avoid fetching the whole ldap data during one ldap search.
As far as I understood how the PagedResultsRequestControl works, I thought that as I'm using a brand new ldapTemplate.search each time I iterate in my while statement, it would use another ldap search, meaning that it's a new search in the ldap server side point of view, and so the server side "counter" would be reset, and that I wouldn't meet the SizeLimitException.
Can you explain me how my example is different from making 5 times a ldapTemplate.search with each time a size limit of 100 ?
Can someone tell me how to retrieve the full group list in my ldap if the PagedResultsRequestControl strategy doesn't work ?
regards,
dom
4. #4
Join Date
Jul 2005
Location
Helsingborg, Sweden
Posts
504
Default
I don't really understand this behaviour. I understand that there may be a server side limit to avoid fetching the whole ldap data during one ldap search.
Apparently, the RFC authors believe that if there is a server size limit of 500, then there should be no way of retrieving more than 500, regardless of any clever use of paging. This is, as I indicated, more a security issue than a server resources issue. You must ask the LDAP experts why, but I'm sure there are use cases that will make sense.
Can you explain me how my example is different from making 5 times a ldapTemplate.search with each time a size limit of 100 ?
I guess you could say that a paged search is actually a full search with a limited result set, while manual searches are limited searches with full result sets.
Can someone tell me how to retrieve the full group list in my ldap if the PagedResultsRequestControl strategy doesn't work ?
regards,
dom
The Server Side Sorting Control is described in RFC 2891. In Chapter 4, Security Considerations, it says:
Implementors and administrators should be aware that allowing sorting
of results could enable the retrieval of a large number of records
from a given directory service, regardless of administrative limits
set on the maximum number of records to return.
A client that desired to pull all records out of a directory service
could use a combination of sorting and updating of search filters to
retrieve all records in a database in small result sets, thus
circumventing administrative limits.
So, perhaps using sorting combined with manual searches will work for you. Unless increasing the server side size limit is an option, of course.
Ulrik Sandberg
Jayway (www.jayway.com)
Spring LDAP project member
5. #5
Join Date
Aug 2006
Posts
18
Default
Thank you for helping me.
I have to admit I don't really understand how my problem of size limit is related to the rfc you mention, which deals, as far as I know, to server side sorting. What I'm trying to do is getting the whole data, sorted or not, I don't care. There must be something I'm missing here.
6. #6
Join Date
Jul 2005
Location
Helsingborg, Sweden
Posts
504
Default
Let's assume there is a server size limit of say 500, and you want to retrieve all say 1200 of something. You can't simply say get me all "(cn=*)" because you will get a size limit exceeded exception. So you want to divide the search somehow. You can't use paged results, since under the hood the server still keeps track of how many you retrieve and will stop once you reach the limit, which in this case is 500. What can you do?
One option is to sort the result and use carefully crafted search filters to get everything anyway. You sort on "cn" and you try with a filter "(cn=a*)" and see where that gets you. If you hit the size limit, you must limit the search further. If you get a result, you can continue with "(cn=b*)".
The key issue here is that the result is sorted, because otherwise there is no way you can keep track of where to begin the next search.
Ulrik Sandberg
Jayway (www.jayway.com)
Spring LDAP project member
7. #7
Join Date
Aug 2006
Posts
18
Default
Ok, I think I uderstood. I'll investigate this way.
thank you
8. #8
Join Date
Aug 2007
Posts
16
Default
I agree with djeanprost, this really is an unacceptable work around.
Say there is an LDAP search limit of 500 and I'm trying to get all the user's in my LDAP. Even if I do a loop and search filter by alphabet (ex. (cn=a*) then (cn=b*)) eventually even these searches will fail; given that the organization continues to grow. So code written today may break in the -not so distant- future. This poses a real problem in the gov't space, where release cycles are surrounded by time consuming paperwork (and i mean TIME CONSUMING).
Anyone have any updates on how to get around this or how to elegantly navigate these waters? Not having control of the LDAP, but having to read from it, may be more of a problem. Maybe if there is a way of counting the entire results without returning anything, then doing logic; or being able to tell the LDAP which part of the result set you desire.
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts
• | ESSENTIALAI-STEM |
0
votes
0answers
30 views
How can I get the solarized color theme for MATE terminal?
I would like to have the solarized theme in MATE 1.6 terminal. How can I get it?
1
vote
1answer
95 views
13.10 with Mate and Clearlooks: some gtk apps are mostly black
After upgrading to Ubuntu 13.10 and wiping all configuration files and folders from my home directory, I chose "Clearlooks" as theme in mate-appearance-properties. Most applications look nice, but ...
0
votes
1answer
346 views
Make mate 1.6 look like lucid lynx default theme
I happened to like the way Lucid Lynx looks. This is not a lucid lynx question, I just want the panels on mate 1.6 to look like the ones of Lucid lynx. I went to the properties of the panel, but it ...
0
votes
1answer
835 views
Cannot change window border theme in MATE
I'm trying to change the window border theme from appearance settings but it's not working. If I use Marco instead of Compiz it works so is this a Compiz problem?
0
votes
1answer
1k views
How can I change my panels to be dark like this screenshot?
I've installed MATE/MintMenu on my Ubuntu 12.04LTS Installation: I've changed the theme to Ambiance, in an attempt to make it look like this screenshot: I can't get my panels dark like the one ...
0
votes
1answer
512 views
Creating a GTK theme, but Qt and Java apps are not affected, and title bar button layout is ugly
I'm playing with a gtk2 / gtk3 theme which I use in the Mate desktop. Everything is looking well, even gtk3 apps, but I still have 3 important issues: Java apps ignore the theme QT apps ignore the ... | ESSENTIALAI-STEM |
Processing of the Pseudomonas arcDABC mRNA requires functional RNase E in Escherichia coli.
Details
Serval ID
serval:BIB_86159552DD72
Type
Article: article from journal or magazin.
Collection
Publications
Title
Processing of the Pseudomonas arcDABC mRNA requires functional RNase E in Escherichia coli.
Journal
Gene
Author(s)
Gamper M., Haas D.
ISSN
0378-1119 (Print)
ISSN-L
0378-1119
Publication state
Published
Issued date
1993
Volume
129
Number
1
Pages
119-122
Language
english
Abstract
In Pseudomonas aeruginosa, arginine catabolism via the arginine deiminase pathway depends on the anaerobically inducible arcDABC operon, whose expression is further modulated by mRNA processing. Fusion of the cloned arc operon to an external tac promoter did not alter the processing pattern in P. aeruginosa and allowed heterologous expression in Escherichia coli. Processing within a specific region of the arcD mRNA was similar in P. aeruginosa and in E. coli. In E. coli, a conditional temperature-sensitive (ts) mutation in the gene specifying RNase E prevented cleavage of the arc mRNA at the non-permissive temperature, whereas mutations in the genes encoding RNase III or RNase P had no effect. We therefore speculate that in P. aeruginosa, an RNase E-like enzyme exists which is involved in the specific processing of the arc mRNA.
Keywords
Amino Acid Transport Systems, Antiporters, Arginine/metabolism, Bacterial Proteins/genetics, Endoribonucleases/metabolism, Escherichia coli/enzymology, Gene Expression Regulation, Bacterial, Membrane Proteins/genetics, Operon, Pseudomonas aeruginosa/genetics, RNA Processing, Post-Transcriptional, RNA, Bacterial/metabolism, RNA, Messenger/genetics, RNA, Messenger/metabolism
Pubmed
Web of science
Create date
25/01/2008 17:00
Last modification date
20/08/2019 14:45
Usage data | ESSENTIALAI-STEM |
Page:The New International Encyclopædia 1st ed. v. 13.djvu/564
* MILLENNIUM. 510 MILLER. conceptions of eaily Christianity and cannot readily find tlic Scriptural support that it de- mands. The distinction between prc-millenuian- ism and post-millennianism is rapidly losing its significance, as modern theology has a tendency to look upon the primitive Christian expectation of the return of Jesus as an illusion, historically necessary, but not of jiermauent worth ; to consider the absolute Aictory of one system of religious faith and practice less desirable than the ascend- ency of what is morally most excellent in all creeds an<l cults : and to cx])ect a gradual im- provement of the social conditions and the char- acter of the human race to be wrought by actu- ally operating forces. 15iBU0GR.i'HT. Consult : Calixtus, De Chilias- mo cum Antii/uo liiin Pridem ^'enato (Helnistcdt, 1692) ; Corrodi, Kritixche Geschichte des Chilias- mus (Zurich, 17S1); Drummond, The Jewish Messiah (],ondon, 1S77); Stanton, The Jeinsh and Christian Messiah (Edinburgh,' 1886); Charles, ^1 Critical His.tory of tlic Doctrine of ike Future Life (London, 1899) ; Suderblom, La ■vie future iluns le niazdaisme (Paris, lllOl); Weber, Jiidische Theotogie aiif G-ruml des Talmud (Leipzig, 1897) ; Otto, in Zcitschrift fiir wissen- schaftlichc Theoloffie (Leipzig. 1S77) ; Schultz. in Jahrbiicher fiir deutsche Theoloyie (Gotha, 18G0) ; !Mede, Claris Apocalyptica (London, 1627) ; Jurieu, L'accompUsscment des prophdties (Rotterdam, lOSCi); Comcnius, Lux in Tenebris (Rotterdam, 16.37); Xewton, Dissertations on the Frophceies (London. 17.5.5); Elliott, Horw Apocalyptical (London, 1862) : Hofmann, ll'eis- sayunff and Erfiillung ( Niirdlingen, 1841-44) ; Auberlen, Daniel und die Offcnhurung Johunnis (."id ed., Basel, 1874) ; Lutl^ardt, Lehre von den letxlen Dingen (Leipzig, 1870) ; Bonar, Prophet- ical Landmarks (London. 18.59) ; Seiss, The Last Times (2d ed., Philadelphia, 1878) : Guinness, The Approaching End of the Age (London. 1879- 80) ; Salmond. Christian Doctrine of Immortal- ity (^A ed.. Ediidnirgh, 18971; Terry, liihlical Apocalyptics ( Xi'W York. 1898); Schiirer, His- tory of the Jcn^ish People in the Time of Jesus Christ (Eng. trans.. Edinburgh. 1886-90). See E.scn.TOLoc;y; .T(i)r.ME>'T, Final; Rksi'brection. MIL'LEPORE (from Lat. mille, thousand + ■jiorus. j)a»agc. jiorc). A coral-fnrniing liydroid, of the order Hydrocorallina, so named from the numerous minute jjores or calicles dotting its surface, which are arranged in irregular circular groups. As the single animal is microscopic, and as it grows in conijiound coral-like masses on reefs in tropical seas, it was at first con- founded with the corals, but was eliminated from the corals first by L. Agassiz and afterwards by Moseley. The animal is not a coral-polyp, lieing allied rather to Hydra, and especially to llydraclinia and f'lava. comm<ni on northern coasts. The coral-stocks form irregular branching masses, several inches high, and sometimes a foot or more broad. The mass of (he coral incrusta- tion consist-, of fibres (canals or tubes) traversed in all directions liy tortuous spaces forming reg- ular brancblns systems, like a tree, in which Millcpora dilVcrs from the coral-stocks (coralla). The animals are of two kinds. Those inhaliiting the central cup or pore are short thick zoiiids. (See Polymorphism.) These are (he 'feelers' — they take in (he food. The zoiiids in the smaller, outer pores of the circle are the reproductive zor.ids. That Jlillcpora is a true hydroid is jiroved by the coral-stock being at the base pro- vided with canals by which the several zoiiids are kept in union with one another by the form of the zoiiids themselves, by the absence of all trace of mesenteries (which ciiaracterize coral polyps), and by the presence of thread-cells (see Xema- MII.LEPOIIE. Animal of MlUeponi nodosa, a, nutritive zoiiid ; h, rt-- productive zooid ; c. lasso-cell ; it, the same coiled np in its cell ; e, a third form, (.ill highly magiiifled.) TOCVST) of the form pectiliar to hydroids. Fi- nally, the position of JIille])ora as a hydroid has been satisfactorily settled by the discovery, by Duerdcn in 1899. in .Jamaica, of frceswiniming female meduste. (See Hyorozoa.) Gur Floridian and West Indian species is Millrpora utoicornis. Consult articles by L. Agassiz. .Vloseley, Duerden (Xaturc. Decenibe'r 28, 1899. p. 213. and Novem- ber 29, 1900. p. 112). MIL'LER, Alfueh J.^cob (1810-74). An American portrait, figure, and landscape painter, born in l!a!tim(n-c. He studieil under Thomas Sully, and in Paris and Italy. He made several sketches when in the Rocky Mountains in 1837 with Sir William Urummond Stewart, which are of value. The originals are in Murthlcy Castle, and there are rc]dicas in water color in the Walters collection in Baltimore. The remainder of his life was spent principally in Baltimore, where he painted many portraits. He also copied the old liiasters with some success. MILLER, Charles Hexry (1842—). An American painter, born in Xew York City. He first studied to be a physician,, but his love of art made him give np this profession, and after studying in Yienna. Berlin, and other cities he went to Munich in 1867 and became a pupil of Lier, and a student in the Royal Bavarian Acad- emy. Afterwards he went to live in Ni'W York City, where he was made an .eadcmician in 1S7.5 and one of the first members of the Society of American Artists. His landsia])es are generally taken from Long Island scenery: among these may be mentioned "Sunset, East Hampton" (1878). Other fine works are "Old Oaks at Crecdmoor." and "High Bri<lge. New York." He wrote The Philosophy of Art in America (188.5) under the pen name of Carl de Muldor. MILLER. CiNTixxATfs Heine, better known as .loAijiiN Miller (1841 — ). An .meriean au- thor, born in the Wabash nistricf. Indiana. o- vember 10. 1841. In 18.54 his parents took him to Oregon. Later he became a miner in Cali- | WIKI |
Awhad
Al-Awhad (الاوحد) is an Arabic name. It can refer to:
* al-Awhad (son of Badr al-Jamali) (d. 1087), Fatimid governor of Alexandria and heir-apparent of his father
* al-Awhad Ayyub (d. 1210), Ayyubid ruler of Diyar Bakr | WIKI |
Wiktionary:Requested entries (Arabic)
Arabic script not known
* Etymon of deloul. It could be dialectal Arabic and not MSA. It could also be something else like Berber, etc.
* Etymon of nuggar. Various sources give Arabic "nuqqār" meaning transport ship. Is this standard Arabic?
* The q → g transformation occurs in some of the dialects. would belong to the root related to hollowing out and is plausible as the name of a kind of boat. Woodpeckers dominate search results. Vox Sciurorum (talk) 17:32, 7 February 2023 (UTC)
* : This is plausibly Egyptian Arabic (it's apparently a boat used on the Nile), but I can also find sources connecting this term to Sudan, which of course is also on the Nile. This article, p. 31, gives the romanizations Naggr/Nuggar and the Arabic spelling (hope I transcribed that right). The verbal root has the meaning 'to hew, carve, or plane wood', which seems potentially relevant. But IDK where the "q" would've come from under this theory. Would it be more plausible that q → g or j → g? <IP_ADDRESS> 18:01, 7 February 2023 (UTC)
* According to the letter ج represents g in modern Egyptian Arabic while ق has other sounds. The origin makes more sense. Vox Sciurorum (talk) 18:34, 7 February 2023 (UTC)
* Etymon of racahout, if standard Arabic.
* Etymon of Shaquille (name meaning "handsome"), currently given as . Is this related to ?
* Etymon of Shazia ("rare, unique")
* Etymon of tallica, given as ta'līḳah.
* Etymon of ziraleet. Given as . I take it this is related to.
* لَاطُون - see 🇨🇬
* - see 🇨🇬
* - see for Egyptian Arabic. Requested entries page for Egyptian Arabic has to be created? It doesn't look like it exists.
* - etymon of the name
ﺍ
* - something like either the Purgatory or the Heights
* - God in Zoroastrianism. Heydari (talk|contibs) 17:09, 21 September 2017 (UTC)
* - this is the etymon of the word "admiral" in English, French, and so on.
* - a bowed musical instrument of the Tuareg people
* - a bowed musical instrument of the Tuareg people
ب
* - وَيَا قَوْمِ أَوْفُوا الْمِكْيَالَ وَالْمِيزَانَ بِالْقِسْطِ وَلَا تَبْخَسُوا النَّاسَ أَشْيَاءَهُمْ وَلَا تَعْثَوْا فِي الْأَرْضِ مُفْسِدِينَ (And O my people, give full measure and weight in justice and do not deprive the people of their due and do not commit abuse on the earth, spreading corruption.)
* nm. recklessness, wantonness ; v. be reckless or wanton, be disrespectful.
* - a maqam
* or (is the one with nisba ending the correct version for the name of the city?)
* - pastilla
* - a maqam
* or (is the one with nisba ending the correct version for the name of the city?)
* - pastilla
ﺕ
* — amulet, talisman; charm, spell, incantation
* Frequency Modulation or FM
* - tayammum
* Frequency Modulation or FM
* - tayammum
* - tayammum
* - tayammum
* - tayammum
ﺝ
* - people and region of northwestern Morocco
ﺡ
* Verb meaning "to protect".
* - English hawala and descendants in several other languages. Does this also mean "charge, responsibility" (as in the Persian-derived havildar)?
* , - Maghrebi garment. See, English haik.
* , Cladium
* - English hawala and descendants in several other languages. Does this also mean "charge, responsibility" (as in the Persian-derived havildar)?
* , - Maghrebi garment. See, English haik.
* , Cladium
* , Cladium
ﺥ
* - a place in Iraq
* - confusion; mental disorder, insanity?
ﺩ
* - dhow, a kind of boat
* - a city in Sudan
* - a variety of date
* (see Swahili borrowing. Baldi says "daurīya patrol, round; reconnaissance squad")
* - a variety of date
* (see Swahili borrowing. Baldi says "daurīya patrol, round; reconnaissance squad")
* (see Swahili borrowing. Baldi says "daurīya patrol, round; reconnaissance squad")
ﺭ
* (dictational orthography) - "modern Arabic orthography"
* - a musical instrument
* - full, abundant
* - the Iraqi name for tahini
ﺯ
* npl., myrmidons --Strabismus (talk) 06:57, 7 October 2012 (UTC)
* ,, Etymon of Zuleika and/or Suleika.
* ,, Etymon of Zuleika and/or Suleika.
* ,, Etymon of Zuleika and/or Suleika.
* ,, Etymon of Zuleika and/or Suleika.
* ,, Etymon of Zuleika and/or Suleika.
* ,, Etymon of Zuleika and/or Suleika.
ﺱ
* - is this phrase worth having?
* or - a form of reed pipe (musical instrument)
* - a type of hot sauce (apparently from Yemeni Arabic) (= sahawiq, or Hebrew skhug סחוג) —Stephen (Talk) 22:16, 3 August 2016 (UTC))
* - English siryah
* - planet
* - dragonfly
ﺵ
* — ‘shufshuufa’, this is how everyone in (rebel areas of) Libya refers to Gaddafi, it's on all the graffiti etc.....I think it means "the curly-haired one" but would be good to get more info on this. May be specifically Libyan Arabic? (—Widsith, un-logged in) (I don’t know much about Libyan Arabic, but in Standard Arabic, (shafshafa) means to dry, dry out, parch, drain. In Libya, seems to mean "old frizzy-haired". —Stephen (Talk) 04:13, 6 September 2011 (UTC))
* - shish taouk
* - calm sea
* - shish taouk
* - calm sea
* - calm sea
ﺽ
* ضُوم
ﻁ
* -- see https://en.wikipedia.org/wiki/Wikipedia:Reference_desk/Archives/Language/2017_August_13
* -- see https://en.wikipedia.org/wiki/Wikipedia:Reference_desk/Archives/Language/2017_August_13
* -- see https://en.wikipedia.org/wiki/Wikipedia:Reference_desk/Archives/Language/2017_August_13
ﻉ
* . Borrowed into Turkish with the meaning of rent paid for pasturage. Not in Wehr-3 in the range عزر to عزي, may have been obsolete for centuries.
* . Borrowed into Turkish with the meaning of rent paid for pasturage. Not in Wehr-3 in the range عزر to عزي, may have been obsolete for centuries.
ﻑ
* : proposed etymon for 🇨🇬, 🇨🇬 (. medieval Arabic = "lightness and frivolity", talkative, shouting)
* : Arabic Wikipedia: . Almaany: . => English freekeh, farik
* and, from which
* - an Arabic dish
* - outburst; excitement
* - sinful/offender
* - outburst; excitement
* - sinful/offender
ﻙ
* - the name of a maqam
* - an Egyptian dish
* - a flute
* - a flute
* - an Egyptian dish
* - a flute
* - a flute
ﻝ
* - Supposedly means "super-skilled player". Etymon of La'eeb, the mascot of the Qatar 2022 FIFA World Cup.
* . Etymon of nefasch.
ﻡ
* - hypochondriac, please check and add the romanisation to Appendix:List of Balkanisms
* distinguished, stylish, clever, witty (Root 5071 & 5243 in Dictionnaire Larousse Compact Plus Arabe‑Français, by Daniel Reig, 2008, ISBN 978-2-03-584217-6)
* (with two possible plurals, depending on the sense?)
* - a type of flatbread
* - deceased, the late
* - the page exists but this word is missing
* - an Iraqi fish dish
* - a frame drum
* - while, as long as
* - corrupt (person) - see فسد
* (with two possible plurals, depending on the sense?)
* - a type of flatbread
* - deceased, the late
* - the page exists but this word is missing
* - an Iraqi fish dish
* - a frame drum
* - while, as long as
* - corrupt (person) - see فسد
* - the page exists but this word is missing
* - an Iraqi fish dish
* - a frame drum
* - while, as long as
* - corrupt (person) - see فسد
* - while, as long as
* - corrupt (person) - see فسد
* - corrupt (person) - see فسد
ﻥ
* - source of, , etc.
* — from the root ن ب ء
* - source of, , etc.
* — from the root ن ب ء
* - source of, , etc.
* — from the root ن ب ء
* — from the root ن ب ء
* — from the root ن ب ء
* — from the root ن ب ء
ﻭ
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
* (literally "whispers" but usually used to mean something like obsessiveness or worry)
ﻱ
* - a traditional wind instrument
* - a traditional wind instrument | WIKI |
Установка gtk-config и / или fsv, отсутствие зависимостей GTK
Я пытаюсь установить визуализатор файловой системы (подумайте: «Это система UNIX! Я знаю это!» Из парка Юрского периода) в Ubuntu 10.10.
Я скачал и распаковал .tar.gz. Однако, когда я ./configure, я получаю этот вывод:
loading cache ./config.cache
checking for a BSD compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking whether make sets ${MAKE}... yes
checking for working aclocal... found
checking for working autoconf... found
checking for working automake... found
checking for working autoheader... found
checking for working makeinfo... missing
checking for gcc... gcc
checking whether the C compiler (gcc ) works... yes
checking whether the C compiler (gcc ) is a cross-compiler... no
checking whether we are using GNU C... yes
checking whether gcc accepts -g... yes
checking how to run the C preprocessor... gcc -E
checking for ranlib... ranlib
checking for POSIXized ISC... no
checking for dirent.h that defines DIR... yes
checking for opendir in -ldir... no
checking for ANSI C header files... yes
checking whether time.h and sys/time.h may both be included... yes
checking for strings.h... yes
checking for sys/time.h... yes
checking for unistd.h... yes
checking for working const... yes
checking for mode_t... yes
checking for uid_t in sys/types.h... yes
checking for pid_t... yes
checking for size_t... yes
checking for comparison_fn_t... yes
checking for st_blocks in struct stat... yes
checking whether struct tm is in sys/time.h or time.h... time.h
checking for working alloca.h... yes
checking for alloca... yes
checking for working fnmatch... yes
checking for strftime... yes
checking for getcwd... yes
checking for gettimeofday... yes
checking for mktime... yes
checking for strcspn... yes
checking for strdup... yes
checking for strspn... yes
checking for strtod... yes
checking for strtoul... yes
checking for scandir... yes
checking for inline... inline
checking for off_t... yes
checking for unistd.h... (cached) yes
checking for getpagesize... yes
checking for working mmap... yes
checking for argz.h... yes
checking for limits.h... yes
checking for locale.h... yes
checking for nl_types.h... yes
checking for malloc.h... yes
checking for string.h... yes
checking for unistd.h... (cached) yes
checking for sys/param.h... yes
checking for getcwd... (cached) yes
checking for munmap... yes
checking for putenv... yes
checking for setenv... yes
checking for setlocale... yes
checking for strchr... yes
checking for strcasecmp... yes
checking for strdup... (cached) yes
checking for __argz_count... yes
checking for __argz_stringify... yes
checking for __argz_next... yes
checking for stpcpy... yes
checking for LC_MESSAGES... yes
checking whether NLS is requested... yes
checking whether included gettext is requested... no
checking for libintl.h... yes
checking for gettext in libc... yes
checking for msgfmt... /usr/bin/msgfmt
checking for dcgettext... yes
checking for gmsgfmt... /usr/bin/msgfmt
checking for xgettext... /usr/bin/xgettext
checking for gtk-config... no
checking for GTK - version >= 1.2.1... no
*** The gtk-config script installed by GTK could not be found
*** If GTK was installed in PREFIX, make sure PREFIX/bin is in
*** your path, or set the GTK_CONFIG environment variable to the
*** full path to gtk-config.
configure: error: Cannot find proper GTK+ version
Очевидно, что он ищет gtk-config. Однако , по-видимому, он больше не существует в репо. Затем этот пост упомянул, что gtkglarea решил их проблему, как упоминалось в в этом файле .
Конечно, этот автор аккуратно забывает упомянуть, что именно и как gtkglarea решил их проблему, и Google в основном лишен информации о проблеме.
1135 Итак, я прихожу сюда с просьбой о помощи! Я хотел бы установить fsv, но он говорит мне, что gtk-config не существует. Как я могу исправить эту проблему в Ubuntu 10.10?
Спасибо!
РЕДАКТИРОВАТЬ
Итак, с помощью Роберта мне пришлось do:
Из репозиториев Dapper я скачал:
libgtk1.2-dev_1.2.10-18_i386.deb
libgtk1.2_1 .2.10-18_i386.deb
libgtk1.2-common_1.2.10-18_all.deb
gtkglarea5-dev_1.2.3-2ubuntu4_i386.deb
gtkglarea5_1.2.3-2ubuntu4_i386.deb
libglib1.2_1.2.10-10.1build1_i386.deb
libglib1.2-dev_1.2.10-10.1build1_i386.deb
, тогда мне пришлось установить:
1. libglib1.2
2. libglib1. 2-dev
3. libgtk1.2-common
4. libgtk1.2
5. libgtk1.2-dev
6. gtkglarea5
7. gtkglarea5-dev
Я использовал sudo gdebi .deb для большинства из них (он лучше говорит о зависимостях, если вы их пропустили). В некоторых случаях Гдеби не делает правильные вещи и умирает. Когда это происходит, используйте dpkg -i .deb, и оно должно работать.
6
задан 18.11.2019, 09:34
3 ответа
На GitHub имеется обновленная версия fsv: https://github.com/mcuelenaere/fsv . Он был изменен для работы с GTK 2.0 и работает для меня в Linux Mint 13 (с использованием пакетов Ubuntu 12.04)
0
ответ дан 18.11.2019, 09:35
что программное обеспечение не поддерживается и требует GTK1, который является устаревшей версией графической библиотеки, он недоступен в репозиториях Ubuntu, и я не знаю ни одного репозитория, предоставляющего его.
Я бы порекомендовал вам связаться с автором программного обеспечения и уточнить у него, планируется ли обновление, или иным образом искать поддерживаемое подобное программное обеспечение.
0
ответ дан 18.11.2019, 09:35
• 1
никакая такая вещь как подобное сохраняемое программное обеспечение. Ну, существуют другой 3-й стиль, но говорящий they' подобное ре похоже на высказывание, что ENIAC и Ваш компьютер подобны, потому что они оба работают в двоичном файле. Поскольку последнее изменение было сделано в 2001, я высоко подозреваю, что скоро не будет никаких обновлений... – Peter Cordes 18.11.2019, 09:35
Если библиотека все еще используется или требуется кем-то, как она может устареть?
У меня была такая же проблема при сборке Mozilla 1.7.13 (да, старый браузер Mozilla).
В 10.10 я обошел это вручную, установив пакет dapper и все зависимости:
https://launchpad.net/ubuntu/dapper/i386/libgtk1.2-dev/1.2 .10-18
вам понадобится:
libglib1.2_1.2.10-10.1build1_i386.deb
libglib1.2-dev_1.2.10-10.1build1_i386.deb
libgtk1.2-common_1.2.10-18_all.deb
libgtk1.2_1.2.10-18_i386.deb
libgtk1.2-dev_1.2.10-18_i386.deb
0
ответ дан 18.11.2019, 09:35
• 1
При попытке установить libgtk1.2-dev_1.2.10-18_i386.deb я добираюсь Breaks existing package 'libgtk1.2' that conflict: 'libgtk-dev'. ошибка. Какие-либо подсказки о том, как зафиксировать это? Google ничего не поднимает. – dreamcrash 18.11.2019, 09:36
• 2
А-ч - по-видимому, gdebi иногда глуп. Используя dpkg -i установил его. Похож на I' ve получил другую потребность - configure: error: Cannot find gtkglarea. К Google! – jaggedsoft 18.11.2019, 09:36
Теги
Похожие вопросы | ESSENTIALAI-STEM |
Ahmad Yaseen
New features and enhancements in SQL Server 2016 SP1
December 20, 2016 by
SQL Server 2016 SP1 is released as announced by Microsoft. It comes with a bunch of new features and enhancements as a result of customer and community feedback. In this article, I will introduce you to these new features and enhancements.
Enterprise features added to Standard, Web, Express and Local DB editions
In SQL Server 2016 SP1, a group of features that were available only in the Enterprise Edition, are now available now in the Standard, Web, Express, and Local DB SQL Server Editions. The features list includes Database Snapshot, ColumnStore, Table Partitioning, Compression, Always Encrypted, Fine Grained Auditing, Multiple Filestream Containers and PolyBase. For Change Data Capture, it becomes available only in the Standard and Web SQL Server Editions as this feature requires SQL Server Agent which is not available in the Express and Local DB Editions. For In Memory OLTP feature, it becomes available in all SQL Server Editions except for the Local DB Edition as it requires creating filestream file groups that is not possible in Local DB due to insufficient permissions.
The main goal for this change is to allow the developers to develop and build the applications that depends on these features on any SQL Server Edition installed in the customer’s environment. But you may ask why would I still need the SQL Server Enterprise Edition if Microsoft provides all these features in the other cheaper Editions? The answer is the RAM and CPU limitations that still exists in these SQL Server Editions, where we are limited with 16 cores and 128 GB of RAM in the Standard Edition for example. If you need to go over these values, you still need to buy the SQL Server Enterprise Edition.
Using Windows Server 2016 Storage Class Memory to boost the Transaction processing
In a heavily transactional loaded system, transaction log committing is one of the most significant performance issue that affects overall performance. SQL Server 2016 SP1 comes with a new feature that allows employing the Storage Class Memory that is supported in Windows Server 2016 to speed up the transactions committing process by orders of magnitude.
CREATE OR ALTER new statement
SQL Server 2016 SP1 introduces a new CREATE OR ALTER T-SQL statement for modules, that allows us to run a script for database objects such as a view, stored procedure, function or trigger without the need to know if this database object exists or not, where it will work as a normal CREATE statement if the object is not exist or it will work as a normal ALTER statement if the object already exists.
If you try to create a stored procedure that already exists:
You will see the below error:
But you can run the below CRAETE OR ALTER statements many times without any error:
USE HINT query option
As a replacement for the OPTION(QUERYTRACEON) query hint statement, that required sysadmin permission to be executed, SQL Server 2016 SP1 introduces OPTION(USE HINT (’ ’)) query hint without the need to have sysadmin privileges or remember the trace flag number, with 9 supported hints that can be listed by querying the sys.dm_exec_valid_use_hints system object with the below sorted result:
Where using the ASSUME_JOIN_PREDICATE_DEPENDS_ON_FILTERS hint is equivalent to turning on the trace flag 9476, ASSUME_MIN_SELECTIVITY_FOR_FILTER_ESTIMATES hint is equivalent to enabling trace flag 4137 and 9471, DISABLE_PARAMETER_SNIFFING hint is equivalent to enabling trace flag 4136, DISABLE_OPTIMIZER_ROWGOAL hint is equivalent to enabling trace flag 4138, DISABLE_OPTIMIZED_NESTED_LOOP hint is equivalent to enabling trace flag 2340, ENABLE_HIST_AMENDMENT_FOR_ASC_KEYS hint is equivalent to enabling trace flag 2389, ENABLE_QUERY_OPTIMIZER_HOTFIXES hint is equivalent to enabling trace flag 4199, FORCE_DEFAULT_CARDINALITY_ESTIMATION hint is equivalent to enabling trace flag 2312 and FORCE_LEGACY_CARDINALITY_ESTIMATION hint is equivalent to enabling trace flag 9481.
DBCC CLONEDATABASE
DBCC CLONEDATABASE statement is used to create an empty copy of the user database with its statistics for troubleshooting purposes. In SQL Server 2016 SP1, DBCC CLONEDATABASE supports cloning the CLR, Filestream, Filetable, In-Memory OLTP and Query Store objects. New options are available now to choose between the Query Store only, statistics only, or schema only without statistics or query store.
The below query will create a default cloned copy of the SQLShackDemo database with schema, statistics and query store metadata:
Where the following query will exclude the statistics when creating a cloned copy of the database:
And the below one will exclude the query store when creating a cloned copy of the database:
The last statement will include the schema only when creating a cloned copy of the database:
Lock Page in Memory and instant file initialization information
It is applicable now in SQL Server 2016 SP1 to check if the Lock Page in Memory model is enabled by querying the sql_memory_model from the sys.dm_os_sys_info system DMV, where 1 indicates CONVENTIONAL memory model, 2 indicates LOCK_PAGES and 3 indicates LARGE_PAGES as follows:
The result in our case will be like:
Also the instant file initialization can be checked by querying the sys.dm_server_services system DMV for the instant_file_initialization_enabled value:
The result in our case will be like:
TempDB Check errorlog message
A new errorlog message displayed when the SQL Server service restarted indicating that the tempdb files are not configured with the same size and auto growth settings, displaying the number of tempdb files too as follows:
Change Tracking manual cleanup
If the size of the change tracking tables become uncontrollable, ifthe automatic cleanup job is not running sufficiently fast to keep up, a new stored procedure sys.sp_flush_CT_internal_table_on_demand can be used to manually clean the change tracking tables in SQL Server 2016 SP1.
Less In-Memory OLTP logging
In SQL Server 2016, In-Memory OLTP started logging additional information to the SQL Server Errorlog to make it easier to troubleshoot it, which in some cases was overwhelming the Errorlog with these excessive messages. In SQL Server 2016 SP1, these In-Memory OLTP logging messages are reduced to .
Lightweight Query Profiling
In SQL Server 2016 SP1, per-operator query execution statistics performance overhead is reduced by turning on the new lightweight query profiling feature. It can be enabled by turning on the trace flag 7412 globally or it will be enabled automatically if the extended events session is running with query_thread_profile. Once the lightweight profiling feature is enabled, the sys.dm_exec_query_profiles can be used to monitors the real time query progress while the query is in execution, the live query statistics feature can be used in the SQL Server Management Studio and the sys.dm_exec_query_statistics_xml new DMF can be used to return the query execution plan for the running requests, by providing the session ID only.
ShowPlan enhancements
Starting from SQL Server 2016 SP1, a new enhancement was added to the ShowPlan by providing information such as information about the enabled trace flags as the below plan output:
Also a MemoryGrantWarning will be included in the ShowPlan information if the SQL Server Engine detects that the memory grant is not sufficient. The query level memory information is provided too, within the generated XML plan output as the below snapshot:
Information about the EstimatedRowsRead, parameters data types, query elapsed time, top waits and tempdb spills are also included within the XML plan output depending on the query execution.
Parallel INSERT…SELECT for Local Temp Tables
In SQL Server 2016, the parallel INSERT…SELECT to the local temp tables is enabled by default, without the need to use the TABLOCK hint such as the case of INSERT into user table, improving the query performance. But for the heavy and concurrent workload, the parallel insert will cause a regression. Starting from SQL Server 2016 SP1, the parallel operation of the INSERT… SELECT to the local temp tables is disabled by default and requires TABLOCK hint to enable it.
DROP TABLE DLL support for Replication Articles
In SQL Server 2016 SP1, the table that acts as article in the transactional replication publication can be dropped from the database and the publication if the Allow_Drop property is set to TRUE on all the publications that the table is article in it. If the table is dropped, the log reader agent will perform a cleanup command for the distribution database to clean the dropped table’s metadata.
New incremental statistics DMF
A new DMF sys.dm_db_incremental_stats_properties introduced in SQL Server 2016 SP1 that is used to return the per-partition incremental statistics properties for specific database table.
Performance monitoring enhancement
In SQL Server 2016 SP1, new Extended Events and Perfmon diagnostics capability are added to troubleshoot the Always On Availability Groups more efficiently. New two BIGINT Extended Events columns equivalent to query_hash and query_plan_hash added also to provide better correlation between the Extended events and the DMVs.
Conclusion
In this article we went through the new features introduced in SQL Server 2016 SP1 and the enhancements to the current features that are both valuable and useful.
The most valuable update in this service pack is that many Enterprise features are available now in the Standard, Web, Express, and Local DB SQL Server Editions. This allows a consistent programmability surface area for developers and organizations across SQL Server editions, enabling them to build advanced applications that scale across different SQL Server Editions. Download the SP1 from the link mentioned below and enjoy testing the new features and enhancements.
Useful Links:
Ahmad Yaseen
Latest posts by Ahmad Yaseen (see all)
Functions, SQL Server 2016
About Ahmad Yaseen
Ahmad Yaseen is a Microsoft Big Data engineer with deep knowledge and experience in SQL BI, SQL Server Database Administration and Development fields. He is a Microsoft Certified Solution Expert in Data Management and Analytics, Microsoft Certified Solution Associate in SQL Database Administration and Development, Azure Developer Associate and Microsoft Certified Trainer. Also, he is contributing with his SQL tips in many blogs. View all posts by Ahmad Yaseen
3,013 Views | ESSENTIALAI-STEM |
Remember that the 3rd conditional is used to imagine the possible results of an event that did not actually happen.
This is the way we imagine how things could have been different in the past. If something had been different, something else would have happened.
He would have got the job if he had not arrived late for the interview.
You would have passed the test if you had studied for it.
If you had asked me, I would have helped you.
What would you have done if you had missed the bus?
I would have been so angry if he had said that to me.
She would have been sorry if she had missed the deadline.
If you had told me, I would have gone.
If it hadn't started raining, we would have gone for a swim.
Would you have gone if you had known about it?
If I had known that I must dress up for the party, I would have bought a new dress.
Those were ten examples of sentences using the 3rd Conditional, now you create ten more for practice. | FINEWEB-EDU |
Page:United States Statutes at Large Volume 90 Part 2.djvu/1372
90 STAT. 2840
PUBLIC LAW 94-580—OCT. 21, 1976 SOLID WASTE CLEANUP ON FEDERAL LANDS I N ALASKA
Study.
42 USC 6981 note.
Report to congressional committees.
Llangollen Undfili, Del., leachate control research program. 42 USC 6981 note. eooperation with EPA.
42 USC 6901 note.
SEC. 3. (a) The President shall direct such executive departments or agencies as he may deem appropriate to conduct a studv, in consultation with representatives of the State of Alaska and the appropriate Native organizations, to determine the best overall procedures for removing existing solid waste on Federal lands in Alaska. Such study shall include, out shall not be limited to, a consideration of— (1) alternative procedures for removing the solid waste in an environmentally safe manner, and (2) the estimated costs of removing the solid waste. (b) The President shall submit a report of the results together with appropriate supportini^ data and such recommendations as he deems desirable to the Committee on Public Works of the Senate and to the Committee on Interstate and Foreign Commerce of the House of Representatives not later than one year after the enactment of the Solid Waste Utilization Act of 1976. The President shall also submit, within six months after the study has been submitted to the committees, recommended administrative actions, procedures, and needed legislation to implement such procedures and the recommendations of the study. SEC. 4. (a) In order to demonstrate effective means of dealing with contamination of public water supplies by leachate from abandoned or other landfills, the Administrator of the Environmental Protection Agency is authorized to provide technical and financial assistance for a research program to control leachate from the Llangollen Landfill in New Castle County Delaware. (b) The research program authorized by this section shall be designed by the New Castle County area wide waste treatment management program, in cooperation with the Enviroimiental Protection Agency, to develop methods for controlling leachate contamination from abandoned and other landfills that may be applied at the Llangollen Landfill and at other landfills throughout the Nation. Such research program shall investigate all alternative solutions or corrective actions, including— (1) hydrogeologic isolation of the landfill combined with the collection and treatment of leachate; (2) excavation of the refuse, followed by some type of incineration; (3) excavation and transportation of the refuse to another landfill; and (4) collection and treatment of contaminated leachate or ground water. Such research program shall consider the economic, social, and environmental consequences of each such alternative. (c) The Admmistrator of the Environmental Protection Agency shall make available personnel of the Agency, including those of the Solid and Hazardous Waste Research Laboratory (Cincinnati, Ohio), and shall arrange for other Federal personnel to be made available, to provide technical assistance and aid in such research. The Administrator may provide up to $250,000, of the sums appropriated under the Solid Waste Disposal Act, to the New Castle County areawide waste treatment management program to conduct such research, including obtaining consultant services.
� | WIKI |
Nathan Enderle
Nathan William Enderle (born January 12, 1988) is a former American football quarterback. He played college football at Idaho, where he was a four-year starter. Enderle was selected in the fifth round of the 2011 NFL Draft by the Chicago Bears. He was a member of the Jacksonville Jaguars, Tennessee Titans, San Diego Chargers, Montreal Alouettes and Portland Thunder.
Early life
Born and raised in North Platte, Nebraska, Enderle graduated from North Platte High School in 2006. As a junior in 2004 he tied the Nebraska high school records for completions in a season with 166 and completions in a game with 24. As a senior, he completed 129 of 258 passes for 1,481 yards and 13 touchdowns.
College career
After being redshirted as a freshman in 2006 under head coach Dennis Erickson, Enderle started nine of 12 games for the Vandals under new coach Robb Akey in 2007, missing three games due to a ruptured tendon in throwing hand. He finished the season completing 132 of 298 passes for 1,787 yards, 10 touchdowns and 18 interceptions. As a sophomore in 2008 he started all 12 games, completing 184 of 339 passes for 2,077 yards, 20 touchdowns and 17 interceptions. As a junior in 2009 he played in 11 of 13 games, missing two with a shoulder injury. He finished the season completing 192 of 312 passes for 2,906 yards, 22 touchdowns and nine interceptions. During the 2009 Humanitarian Bowl he helped lead the Vandals to a 43-42 comeback win over Bowling Green. During the game, he completed 15 of 28 passes for 240 yards and four touchdowns with no interceptions. With the game tied at 35 with less than a minute to go, overtime was probable until the Vandal defense gave up a late, 51-yard touchdown pass. With the Vandals trailing by seven points with 32 seconds remaining on their own 34-yard line, Enderle quickly drove his team down the field and completed a 16-yard touchdown pass with four seconds left to pull within a point, then completed another for the two-point conversion to win. In 2010, the Vandals went 6-7 with an inexperienced offensive line, and lost two road games in the final seconds. Enderle ended his career at Idaho with over 10,000 yards in passing, and graduated in December 2010 with a degree in art.
Chicago Bears
Enderle was selected by the Chicago Bears in the fifth round of the 2011 NFL Draft. The 160th overall pick, he was the tenth of the twelve quarterbacks selected.
Following the lockout of 2011, the Bears signed Enderle to a four-year contract on July 27, 2011. After his rookie year as a reserve, he was waived by the Bears on June 14, 2012, as the Bears changed offensive coordinators.
Jacksonville Jaguars
A week after his release by the Bears, Enderle signed with the Jacksonville Jaguars on June 21; he was released two months later on August 25, 2012.
Tennessee Titans
On January 17, 2013, Enderle signed with the Tennessee Titans. On July 24, 2013, Enderle was waived by the Titans.
San Diego Chargers
On July 31, 2013, Enderle was signed by the San Diego Chargers. On August 25, 2013, he was waived by the Chargers.
Montreal Alouettes
On September 21, 2013, Enderle signed with the Montreal Alouettes of the Canadian Football League. He was released on October 3, 2013.
Portland Thunder
On December 9, 2013, Enderle was assigned to the Portland Thunder of the Arena Football League. | WIKI |
GCP to AWS workload identity federation
built in platform, lacklustre sdk
SEAN K.H. LIAO
GCP to AWS workload identity federation
built in platform, lacklustre sdk
GCP workload, AWS resources
More workload identity. This time we're running a workload within Google Cloud Platform (GCP), specifically Google Kubernetes Engine (GKE), and we're trying to access Amazon Web Service (AWS) resources.
AWS cloud setup
On AWS the setup is called IAM identity federation, or something similar. If you look around long enough, you'll eventually realize that some providers are special and built in, like the Google provider needed for access from GCP.
All we need is a Role for other resources/policies to reference when granting permissions, and a policy on the role detailing what to allow to assume the role. To control who to allow, we can use identity token fields, though for some reason, the audience is under oaud. In terraform this looks like:
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "4.39.0"
}
}
}
resource "aws_iam_role" "r" {
name = "role-to-be-assumed"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [{
Action = "sts:AssumeRoleWithWebIdentity"
Effect = "Allow"
Sid = "r1"
Principal = {
# built in federated identity provider
Federated = "accounts.google.com"
}
Condition = {
StringLike = {
# sub (subject) appears to be a required condition somewhere.
# For service accounts, this maps to a numeric account id,
# which makes it harder to identify.
# We're just going to allow everything use the other fields.
"accounts.google.com:sub" = "*"
}
StringEquals = {
# You can provide an audience when calling generateIdToken
# This represents the intended recipient of the identity token.
"accounts.google.com:oaud" = "sts",
# This is the main check we want to use since it's easier to match.
"accounts.google.com:email" = "xcloud-iam-fed-demo@snyk-main.iam.gserviceaccount.com"
}
}
}]
})
}
This blog post was a good reference point on the smae topic.
GCP cloud setup
On the GCP side where we're running our workload, we'll want Workload Identity on our GKE cluster.
We'll also need a service account and rolebindings to associate it with the Kubernetes service account our workload runs with.
terraform {
required_providers {
google = {
source = "hashicorp/google"
version = "4.43.0"
}
}
}
locals {
project = "project-id"
k8s_namespace = "k8s-namespace-name"
k8s_service_account = "k8s-service-account-name"
}
# service account that's going to be associated with the kubernetes workload
resource "google_service_account" "s" {
project = local.project
account_id = "gcp-service-account-name"
}
# granting the kubernetes service account permissions to use this service account
resource "google_service_account_iam_member" "gke" {
service_account_id = google_service_account.s.id
member = "serviceAccount:${local.project}.svc.id.goog[${local.k8s_namespace}/${local.k8s_service_account}]"
role = "roles/iam.workloadIdentityUser"
}
GCP workload setup
Our Kubernetes pod will need a serviceaccount attached, with annotations pointing to the GCP service account:
apiVersion: v1
kind: ServiceAccount
metadata:
name: service-account-name
annotations:
iam.gke.io/gcp-service-account: gcp-service-account-name@project-id.iam.gserviceaccount.com
GCP code setup
Finally, we get to our code. The AWS SDK doesn't appear to make any special considerations for running in external clouds, So we're responsible for wiring up the GCP token provider with the AWS role credentials provider.
package main
import (
"context"
"fmt"
"net/http"
"os"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/credentials/stscreds"
"github.com/aws/aws-sdk-go-v2/service/s3"
"github.com/aws/aws-sdk-go-v2/service/sts"
"golang.org/x/oauth2"
"golang.org/x/exp/slog"
"google.golang.org/api/idtoken"
)
func main() {
lgh := slog.HandlerOptions{
Level: slog.DebugLevel,
}.NewJSONHandler(os.Stderr)
lg := slog.New(lgh)
err := run(lg)
if err != nil {
lg.Error("run", err)
os.Exit(1)
}
}
type GCPTokenGenerator struct {
ts oauth2.TokenSource
}
// GetIdentityToken implements the stscreds.IdentityTokenGenerator interface for refreshing
// identiy tokens on demand.
func (g *GCPTokenGenerator) GetIdentityToken() ([]byte, error) {
token, err := g.ts.Token()
if err != nil {
return nil, fmt.Errorf("generate gcp id token: %w", err)
}
return []byte(token.AccessToken), nil
}
func run(lg *slog.Logger) error {
// potential input values
idTokenAudience := "sts"
targetAWSRegion := "us-east-1"
targetAWSRoleARN := "arn:aws:iam::account:role/role-to-be-assumed"
// setup a GCP id token generator
ctx := context.Background()
ts, err := idtoken.NewTokenSource(ctx, idTokenAudience)
if err != nil {
return fmt.Errorf("create GCP id token generator: %w", err)
}
// create a base AWS config
cfg, err := config.LoadDefaultConfig(ctx)
if err != nil {
return fmt.Errorf("create base AWS config: %w", err)
}
cfg.Region = targetAWSRegion
// update the credentials to use
cfg.Credentials = aws.NewCredentialsCache(
// credentials provider that will assume the role,
// refreshing tokens on demand.
stscreds.NewWebIdentityRoleProvider(
sts.NewFromConfig(cfg)
targetAWSRoleARN,
&GCPTokenGenerator{ts: ts},
),
)
// Example: AWS S3 client
client := s3.NewFromConfig(cfg)
// use the client
_ = client
return nil
} | ESSENTIALAI-STEM |
Page:Historical Essays and Studies.djvu/327
Rh murder ; but take a population of 100,000, and in a given time some one or other is sure to be found committing murder. All double things are done at intervals ; and though there is the greatest uncertainty when they will be done, yet give laxity enough, allow a thousand, a hundred, or fifty years, and it may be confidently predicted that the thing will be done in that time ; and this by no quality inherent in the thing or the doer, but by the law of numeration. Hence we cannot say, as Emerson somewhere says, that "if one man in thirty thousand eats shoes, or marries his grandmother, then one man in every thirty thousand must eat shoes, or marry his grandmother," for there is no necessity in the case. Take the dice. The mathematician will tell you exactly how often he will throw aces in 10,000 throws. But suppose by some very possible accident you had made 9990 throws without turning aces the average number of times, are you in any conceivable way surer of having aces in the last ten throws than if you were only just beginning the game? Not a bit. The former throws have nothing to do with the latter. The law is a law of numbers, a law of chances applicable to numbers and on the average applicable to all numerable things ; but not implying any force, or cause, or reason why the things themselves should be thus rather than otherwise. Hence, in the first place, we should never be surprised if facts, the origin of which is free-will, are numbered ; nor, secondly, if they are found capable of being averaged, so that a given number of them take place in a given time, but from this to make the third step, and to say, because they are numerable, because they can be averaged, therefore they happened by necessity, by a fixed law, is absurd in any man, and in Mr. Buckle dishonest.
It is dishonest in Mr. Buckle, because he must be aware that he is using the words law and necessity in a sense quite different from that intended by ordinary mortals. When we say "law," we always think of some force, or command, which is the cause of the thing being done. But Mr. Buckle, by /aw, only means numerical | WIKI |
349 F.3d 692
AT&T CORPORATION, Petitioner v. FEDERAL COMMUNICATIONS COMMISSION and United States of America, Respondents. Qwest Communications International Inc., et al., Intervenors.
Nos. 02-1221, 02-1240, 02-1263 & 02-1275.
United States Court of Appeals, District of Columbia Circuit.
Argued Oct. 23, 2003.
Decided Nov. 25, 2003.
David W. Carpenter argued the cause for IXC and LEC petitioner-intervenors. With him on the briefs were Peter H. Jacoby, Judy Sello, Daniel Meron, Jonathan F. Cohn, Robert B. McKenna, William Single IV, and Jeffrey A. Rackow.
Andrew G. McBride argued the cause for petitioners Sprint Spectrum L.P. and Célico 'Partnership. With him on the briefs were John T. Scott III, Luisa L. Lancetti, and R. Michael Senkowski. Kenneth D. Patrich and Lewis A. Tollin entered appearances.
John E. Ingle, Deputy Associate General Counsel, Federal Communications Commission, argued the cause for respondents. With him on the brief were R. Hewitt Pate, Acting Assistant Attorney General, U.S. Department of Justice, Robert B. Nicholson and Robert J. Wiggers, Attorneys, John A. Rogovin, General Counsel, Federal Communications Commission, and Richard K. Welch and Laurel R. Bergold, Counsel.
Luisa L. Lancetti, Caressa D. Bennet and Gregory W. Whiteaker were on the brief for intervenors Sprint Spectrum L.P. and Rural Telecommunications Group. Kenneth D. Patrich entered an appearance.
Peter H. Jacoby, Judy Sello, David W. Carpenter, Daniel Meron, Robert B. McKenna, William Single IV, and Jeffrey A. Rackow were on the brief for IXC and LEC intervenors in Case Nos. 02-1263 and 02-1275. Jonathan F. Cohn and Mark C. Rosenblum entered appearances.
Before: GINSBURG, Chief Judge, and EDWARDS and GARLAND, Circuit Judges.
Opinion for the Court filed by Circuit Judge HARRY T. EDWARDS.
HARRY T. EDWARDS, Circuit Judge:
AT&T Corporation (“AT&T”) and Sprint Spectrum L.P. (“Sprint PCS” or “Sprint”), along with Célico Partnership, petition this court for review of a declaratory ruling of the Federal Communications Commission (“FCC” or “Commission”) responding to a primary jurisdiction referral from- the United States District Court for the Western District of Missouri. The referral arose during the course of litigation between AT&T and Sprint in Missouri in which Sprint sought compensation from AT&T for its use of Sprint’s wireless network. AT&T removed the case from state court to the federal district court, which then referred specific questions to the FCC under the doctrine of primary jurisdiction. In its referral order, the district court inquired of the FCC (1) whether Sprint may charge access fees to AT&T for access to the Sprint PCS wireless network and, if so, (2) the reasonableness of Sprint’s charges.
After receiving petitions for declaratory rulings from both AT&T and Sprint, along with public comments, the Commission held that Sprint is entitled to collect access charges from AT&T only to the extent that a contract between the parties imposes a payment obligation on AT&T. The FCC declined to determine the reasonableness of any rate until after the district court determined whether the parties are bound by a contract. Both AT&T and Sprint raise numerous challenges to the Commission’s ruling, none of which are properly before this court for review. Accordingly, we dismiss the petitions for review.
I. Background
The facts underlying this case are largely undisputed. Because this information is adequately set forth in the Commission’s ruling that is the subject of review here, see In the Matter of Petitions of Sprint PCS and AT&T Corp. for Declaratory Ruling Regarding CMRS Access Charges, 17 F.C.C.R. 13,192, at 13,193-13,195, 2002 WL 1438578 (2002), reported at 67 Fed. Reg. 49,242 (F.C.C.2002) (hereinafter “De claratory Ruling”), we will simply summarize the most important facts to highlight what is at issue.
In 1998, petitioner Sprint PCS, a commercial mobile telephone service (“CMRS”) provider, started billing AT&T for the costs of terminating interexchange traffic bound for its customers. AT&T refused to pay the Sprint invoices. Dedaratory Ruling, 17 F.C.C.R. at 13,193. On August 8, 2000, Sprint sought to enforce payment by filing suit in state court in Missouri seeking a monetary judgment against AT&T on three causes of action: breach of contract, quantum meruit, and action on account. Id. AT&T then removed the case to federal district court in the Western District of Missouri. Sprint moved to remand the case back to state court, which AT&T opposed. Sprint denied the existence of diversity between the parties and claimed that its state-law claims in no way raised any federal question. Plaintiffs Motion to Remand at 1-2, Sprint Spedrum L.P. v. AT&T Corp., 168 F.Supp.2d 1095 (W.D.Mo.2001), Joint Appendix (“J.A.”) 61-62. In its opposition, AT&T argued, inter alia, that Sprint’s state-law claims were wholly preempted by 47 U.S.C. § 332, because they would require the court to establish a rate for terminating access. Defendant’s Suggestions in Opposition to Plaintiffs Motion to Remand at 4-11, Sprint Spectrum L.P. v. AT&T Corp., 168 F.Supp.2d 1095 (W.D.Mo.2001), J.A. 95-102.
The district court denied Sprint’s motion to remand, holding that it had jurisdiction based upon the diversity of the parties without addressing whether or not Sprint’s action raised federal claims. Sprint Spectrum L.P. v. AT&T Communications, Inc., No. 00-0973-CV-W-5 (W.D.Mo. Feb. 8, 2001) (order denying Sprint’s motion to remand), reprinted in J.A. 169. AT&T then asked the district court to refer the case to the Commission under the doctrine of primary jurisdiction. See Sprint Spectrum L.P. v. AT&T Corp., 168 F.Supp.2d 1095, 1096 (W.D.Mo.2001). Sprint opposed that motion, arguing that it was simply seeking payment for services rendered using state-law theories that do not involve the Communications Act or the FCC’s special expertise. Id. at 1099.
On July 24, 2001, the district court referred two issues to the Commission under the doctrine of primary jurisdiction. Id. at 1096. The court was very precise in setting forth the terms of its referral:
ORDERED that Defendant AT&T Corporation’s Motion for Referral of Issues to the FCC Under the Doctrine of Primary Jurisdiction and for Dismissal or a Stay Proceedings Pending the Referral is GRANTED. The questions of whether Sprint may charge access fees to AT&T for access to the Sprint PCS wireless network and, if so, the reasonableness of Sprint’s charges for such services are referred to the FCC for further consideration. It is further
ORDERED that Defendant AT&T Corporation is directed to prepare and submit the appropriate filings to bring these issues before the FCC by Friday, August 24, 2001.
Id. at 1102.
On October 22, 2001, AT&T and Sprint filed separate petitions seeking declaratory rulings from the FCC. The Commission described these filings, as follows:
In its petition, Sprint PCS asks the Commission to find that there is no federal law or Commission policy that bars Sprint PCS from recovering its call termination costs from AT&T. Sprint PCS also asks [the Commission] to find that AT&T’s refusal to pay access charges to Sprint PCS is unreasonably discriminatory under section 202(a) of the Communications Act of 1934, as amended (the Act), and unjust and unreasonable under section 201(b) of the Act. In its petition, AT&T asks the Commission to find that CMRS carriers should continue to recover their costs from their end users, not by imposing access charges on IXCs. If CMRS carriers are permitted to impose access charges, AT&T asks that those charges be capped at the reciprocal compensation rate for local traffic and assessed only prospectively.
Declaratory Ruling, 17 F.C.C.R. at 13,193-94.
Because the parties’ petitions for declaratory rulings were much wider in scope than the district court’s referral order, the FCC’s Declaratory Ruling is somewhat free-wheeling in its discourse. As a consequence, there are numerous observations in the Declaratory Ruling that do not purport to respond to the district court’s referral order or to otherwise pass judgment on any issue. Cut to its core, however, the FCC Declaratory Ruling is fairly precise in responding to the referral order. The principal terms of the Declaratory Ruling are as follows:
7. Sprint PCS is correct that neither the Communications Act nor any Commission rule prohibits a CMRS carrier from attempting to collect access charges from an interexchange carrier.
Id. at 13,195.
8. That Sprint PCS may seek to collect access charges from AT&T does not, however, resolve the question whether Sprint PCS may unilaterally impose such charges on AT&T.
Id. at 13,196.
9. We find that there is no Commission rule that enables Sprint PCS unilaterally to impose access charges on AT&T.
Id. at 13,196.
12. There being no authority under the Commission’s rules or a tariff for Sprint PCS unilaterally to impose access charges on AT&T, Sprint PCS is entitled to collect access charges in this case only to the extent that a contract imposes a payment obligation on AT&T. While it is preferable for carriers to memorialize such contracts in a written agreement, the parties here agree that there is no written agreement or any express contract between AT&T and Sprint PCS. Nevertheless, the law recognizes - as has the Commission - that an agreement may exist even absent an express contract.
13. Turning to the question whether there was such an agreement here, we believe that it is an issue that should be resolved by the Court. We interpret the Court’s primary jurisdiction referral as seeking our input on the federal communications law questions related to this dispute. Because the existence of a contract is a matter to be decided under state law, we defer to the court to answer this question.
Id. at 13,198.
Paragraph 18 of the Declaratory Ruling rejects Sprint’s claims under §§ 201(b) and 202(a) as premature:
18. We need not address Sprint PCS’s claims under sections 201(b) and 202(a) at this time. Until the court determines the respective obligations of the parties, in particular whether AT&T has any obligation to pay Sprint PCS under a contract, the Commission has no basis on which to assess whether AT&T is subject to sections 201(b) or 202(a) in these circumstances and, if so, whether its actions violate those statutory provisions.
Id. at 13,200. The Commission also declined to entertain issues relating “either to the prospective treatment of CMRSIXC interconnection or to issues beyond the scope of those presented for Commission resolution in the primary jurisdiction referral.” Id. Rather, the Commission firmly stated that the Declaratory Ruling merely “clarifies requirements under [the PCC’s] existing rules.” Id.
In its petition for review, AT&T argues that the Declaratory Ruling is contrary to law, because, in allegedly allowing a state court to determine whether it owes access charges under an implied contract' or quantum meruit, the Commission departed from its precedent holding that states are preempted by 47 U.S.C. § 332(c)(3)(A) from setting rates for intercarrier compensation. Sprint contends, in its petition, that the Declaratory Ruling is arbitrary and capricious in not requiring AT&T to pay access charges. Sprint also argues that the FCC favored one set of providers and one type of communication technology over another in violation of the Communications Act. And, finally, Sprint challenges observations in the Declaratory Ruling that appear adverse to Sprint’s interests but which have no binding legal effect. We deny both petitions, because neither AT&T’s nor Sprint’s claims are ripe for consideration by this court.
II. Analysis
A. Standard of Review
In order to succeed in their challenges, AT&T and Sprint must demonstrate that the Declaratory Ruling is “arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.” See 5 U.S.C. § 706(2)(A) (1996).
Highly deferential, [the arbitrary and capricious] standard presumes the validity of agency action, requiring us to determine whether the agency has considered the relevant factors and “articulate[d] a rational connection between the facts found and the choice made.” Motor Vehicle Mfrs. Ass’n of the United States, Inc. v. State Fam Mut. Auto. Ins. Co., 463 U.S. 29, 43, 103 S.Ct. 2856, 77 L.Ed.2d 443 (1983) (internal quotation marks omitted). We “may reverse only if the agency’s decision is not supported by substantial evidence, or the agency has made a clear error in judgment.” Kisser v. Cisneros, 14 F.3d 615, 619 (D.C.Cir.1994).
AT&T Corp. v. FCC, 220 F.3d 607, 616 (D.C.Cir.2000).
The court reviews Commission constructions of the Communications Act in accordance with Chevron USA Inc. v. Natural Resources Defense Council, Inc., 467 U.S. 837, 104 S.Ct. 2778, 81 L.Ed.2d 694 (1984), and its progeny. Under Chevron, “[i]f the intent of Congress is clear,” the court “must give effect to the unambiguously expressed intent of Congress.” Chevron, 467 U.S. at 842-43, 104 S.Ct. 2778. If “Congress has not directly addressed the precise question at issue,” the agency’s statutory interpretation is entitled to deference, as long as it is reasonable. Id. at 843-44, 104 S.Ct. 2778. Chevron deference is due, however, only if the agency has acted pursuant to “delegated authority” and the agency action has the “force of law.” See Christensen v. Harris County, 529 U.S. 576, 587, 120 S.Ct. 1655, 146 L.Ed.2d 621 (2000); United States v. Mead Corp., 533 U.S. 218, 226-27, 121 S.Ct. 2164, 150 L.Ed.2d 292 (2001).
In applying these standards, “[t]he job of judges is to ask whether the Commission made choices reasonably within the pale of statutory possibility.” Verizon Communications Inc. v. FCC, 535 U.S. 467, 539, 122 S.Ct. 1646, 152 L.Ed.2d 701 (2002).
B. Standing
The Commission initially argues that AT&T has suffered no actual or imminent injury as a result of the Declaratory Ruling and, therefore, lacks standing to challenge it. We reject this argument. The Declaratory Ruling holds that AT&T may be obligated to Sprint pursuant to an implied-in-fact contract and it leaves the matter to the district court to determine whether a contract exists. This portion of the Declaratory Ruling clearly causes a cognizable injury to AT&T which would be redressed with a favorable ruling from this court.
In AT&T Corp. v. FCC, 317 F.3d 227, 238 (D.C.Cir.2003), we held that AT&T had standing to challenge an FCC order determining that AT&T was liable for access charges to a local exchange carrier, even though the order did not require payment, because the order exposed AT&T to liability in pending litigation. Similarly, AT&T has standing in this case because the Declaratory Ruling exposes it to liability for access charges in its pending litigation with Sprint.
C. Ripeness
The Commission argues, in the alternative, that AT&T’s section 332(c)(3)(A) preemption claim is unripe for review, because, first, the issue is presently unfit for decision by this court and, second, a delay in judgment will cause no hardship to AT&T. Likewise, the Commission argues that it reasonably deferred resolution of Sprint’s section 201(b) and 202(a) claims until after the district court in Missouri decides whether AT&T has a contractual obligation to pay access charges. The FCC also contends that Sprint’s remaining claims relate to matters with respect to which the agency has issued no final judgment; thus, according to the Commission, these matters surely are not subject to judicial review.
The framework for assessing ripeness was established in Abbott Laboratories v. Gardner, 387 U.S. 136, 149, 87 S.Ct. 1507, 18 L.Ed.2d 681 (1967), in which the Supreme Court provided a two-pronged test that requires a reviewing court to evaluate “both the fitness of the issue for judicial decision and the hardship to the parties of withholding court consideration.” As we noted in City of Houston v. Department of Housing & Urban Development, 24 F.3d 1421, 1430-31 (D.C.Cir.1994), “the ‘primary focus’ of the ripeness doctrine is to balance ‘the petitioner’s interest in prompt consideration of allegedly unlawful agency action against the agency’s interest in crystallizing its policy before that policy is subject to review and the court’s interest in avoiding unnecessary adjudication and in deciding issues in a concrete setting.’ ” Id. at 1430 (citing Eagle-Picher Industries v. EPA, 759 F.2d 905, 915 (D.C.Cir.1985)).
Under the “fitness of the issues” prong, the first question for a reviewing court is “whether the disputed claims raise purely legal questions and would, therefore, be presumptively suitable for judicial review.” Better Gov’t Ass’n v. Dep’t State, 780 F.2d 86, 92 (D.C.Cir.1986); see also Payne Enters., Inc. v. United States, 837 F.2d 486, 492 (D.C.Cir.1988); Eagle-Picher, 759 F.2d at 915. We next consider whether the court or the agency would benefit from postponing review until the policy in question has sufficiently “crystallized” by taking on a more definite form. See Better Gov’t, 780 F.2d at 92.
The “hardship” prong of the Abbott Laboratories test is not an independent requirement divorced from the consideration of the institutional interests of the court and agency. Payne, 837 F.2d at 493. Thus, where there are no institutional interests favoring postponement of review, a petitioner need not satisfy the hardship prong. See, e.g., Consol. Rail Corp. v. United States, 896 F.2d 574, 577 (D.C.Cir.1990). However, where there are strong interests militating in favor of postponement, we must weigh the potential hardship of delay on the appellant. City of Houston, 24 F.3d at 1430-31 & n. 9. Under the “hardship” prong, we consider a claimant’s “interest in immediate review.” Better Gov’t, 780 F.2d at 92. If “[t]he only hardship [a claimant] will endure as a result of delaying consideration of [the disputed] issue is the burden of having to [engage in] another suit,” this will not suffice to overcome an agency’s challenge to ripeness. City of Houston, 24 F.3d at 1431-32.
In applying these standards to the instant petitions for review, we agree with the Commission that the matters at hand should be dismissed as unripe.
1. AT&T’s Petition
As noted above, the Commission’s Declaratory Ruling responded to the two questions referred by the district court: whether Sprint may charge access fees to AT&T for access to the Sprint PCS wireless network and, if so, the reasonableness of Sprint’s charges for such services. See Sprint Spectrum L.P., 168 F.Supp.2d at 1102. As to the first question, the Commission held that AT&T was not required to pay such charges absent a contractual obligation to do so. As to the second question, the Commission responded, “until the Court decides whether there was a contract, it is premature to address the court’s second question regarding the reasonableness of any rate charged.” Declaratory Ruling, 17 F.C.C.R. at 13,192.
AT&T’s principal claim is that the FCC’s Declaratory Ruling implicitly suggests . that a state court might properly determine that Sprint is entitled to access fees on the basis of an implied-in-fact contract with no fixed price term (which would require a state court determination of the “reasonableness” of the access charges) or on the basis of quantum meruit (which is an equitable claim not based on a contractual commitment). AT&T argues, in particular, that, because all of Sprint’s state-law claims would require the district court to set a “reasonable” price for Sprint PCS’s services, those claims are expressly preempted by 47 U.S.C. § 332(c)(3)(A). Therefore, according to AT&T, the failure of the Declaratory Ruling to hold Sprint’s state-law claims preempted is both contrary to law and arbitrary. AT&T also contends that, in failing to declare Sprint’s claims preempted, the Declaratory Ruling is an unexplained departure from the FCC’s ruling in In the Matter of Wireless Consumers Alliance, Inc., 15 F.C.C.R. 17,021, 2000 WL 1140570 (2000) (also cited as “CMRS Preemption Order") (interpreting § 332(c)(3)(A) to preempt state courts from “determin[ing] the reasonableness of a prior rate”).
The problem with AT&T’s argument is that it rests on faulty premises: First, the Commission did not, as AT&T suggests, declare that the district court was free to determine the reasonableness of a prior rate. Second, the Commission did not purport to depart from its ruling in Wireless Consumers Alliance. And, third, the Commission did not resolve the preemption issue, either explicitly or implicitly.
The Declaratory Ruling says that, “because the existence of a contract is a matter to be decided under state law, we defer to the- [district] court to answer this question.” Declaratory Ruling, 17 F.C.C.R. at 13,198. The Commission also noted that “an agreement may exist even absent an express contract.” Id. On this latter point, the Commission suggested that AT&T could be liable to Sprint on “[a]n implied-in-fact contract,” which “is ‘founded upon a meeting of minds, which, although not embodied in an express contract, is inferred, as a fact, from conduct of the parties showing, in light of the surrounding circumstances, their tacit understanding.’ ” Id. at n. 38 (quoting Hercules, Inc. v. United States, 516 U.S. 417, 424, 116 S.Ct. 981, 134 L.Ed.2d 47 (1996)). These determinations are neither surprising, nor are they adverse to AT&T’s position.
Notably, AT&T and the Commission agree on three important points: First, state courts may not determine the reasonableness of a prior rate or set a prospective charge for service. Second, state courts may determine whether the parties have in place a contract that fixes access charges. And, third, access charges may be established by an express contract or an implied-in-fact contract in which the price was already fixed (such that the state court would not inquire into the reasonableness of the rate). AT&T does not contest these points and nothing in the Declaratory Ruling calls these matters into question. Rather, AT&T essentially argues that the real dispute in this case concerns whether Sprint may prevail against AT&T on state-law claims based on either an implied-in-fact contract in which the price is open or on a theory of quantum meruit.
AT&T does not seriously contest the Commission’s treatment of the quantum meruit issue, for the agency left little room for confusion on this point, strongly suggesting that a claim based on quantum meruit would be preempted. See Declaratory Ruling, 17 F.C.C.R. at 13,198 n. 40. Instead, AT&T’s major complaint is over the failure of the Declaratory Ruling to hold that an open-price implied-in-fact contract is preempted. In particular, AT&T fears that the district court has already determined that Sprint may pursue an implied-in-fact claim that, under Missouri law, will require the court to determine the reasonableness of the rates for Sprint’s services. See Petitioner AT&T’s Reply Br. at 3. AT&T thus concludes that the FCC’s failure to decide the preemption issue is arbitrary. We disagree.
The district court’s referral order asks the Commission “whether Sprint may charge access fees to AT&T for access to the Sprint PCS wireless network and, if so, the reasonableness of Sprint’s charges for such services.” See Sprint Spectrum L.P., 168 F.Supp.2d at 1102. Plainly, the referral order does not assume the answers to the questions that are being asked. And, in answer to these questions, the Declaratory Ruling merely “clarifies requirements under [the FCC’s] existing rules.” Declaratory Ruling, 17 F.C.C.R. at 13,200. In other words, in giving guidance to the district court, the Commission merely recounted the established legal rules that were in place during the time periods covering the dispute between Sprint and AT&T. Id. at n. 51. Therefore, AT&T’s claim that the Declaratory Ruling is an arbitrary and capricious departure from the existing legal regime as defined by Wireless Consumers Alliance is simply mistaken. Indeed, during oral argument, FCC counsel acknowledged that Wireless Consumers Alliance accurately reflects the legal landscape that was in place during the periods for which Sprint seeks access fees from AT&T. Nothing in the Declaratory Ruling counters this.
Wireless Consumers Alliance makes it clear that a state court would “overstep its authority under Section 332 if, in determining damages, it does enter into a regulatory type of analysis that purports to determine the reasonableness of a prior rate or it sets a prospective charge for services.” Wireless Consumers Alliance, 15 F.C.C.R. at 17,041. However, Wireless Consumers Alliance also holds that § 332 does not generally preempt state courts from awarding monetary damages for breach of contract. Id. at 17,040. Rather, the Commission stated that “whether a specific damage award or damage calculation is prohibited by Section 332 will depend on the specific details, of the award and the facts and circumstances of the case,” and noted that “a consideration of the price originally charged, for the purposes of determining the extent of the harm or injury involved, is not necessarily an inquiry into the reasonableness of the original price and therefore is permissible.” Id. at 17,041.
AT&T concedes that if the Declaratory Ruling does not abrogate the teachings of Wireless Consumers Alliance, and if it merely defers the preemption issue to the district court, and if it does not preclude AT&T from pursuing the preemption defense in district court, then the Declaratory Riding would be a simple deferral and maintenance of the status quo and AT&T would have no viable claims at this time. See Petitioner AT&T’s Reply Br. at 2. This is a telling concession from AT&T, because the Declaratory Ruling has precisely the effect sought by AT&T. The Declaratory Ruling does not hold that the district court may avoid the preemption issue if it is raised by AT&T. In other words, if the district court were to find only an open-price implied-in-fact contract (or a claim based on quantum meruit) between Sprint and AT&T, the Declaratory Ruling in no way forecloses AT&T from raising a preemption defense. Thus, as AT&T concedes, it has no viable claims to pursue in this court at this time.
Lacking finality, the issue raised by AT&T is not fit for review. Furthermore, both the agency and the court would benefit from postponing review until the district court in Missouri determines whether there is any contract between Sprint and AT&T. Under Wireless Consumers Alliance, Sprint’s state-law claims may well be preempted if the district court finds only an open-price, implied-in-fact contract (or a claim based on quantum meruit) that requires it to set a reasonable rate. The Commission reasonably declined to decide that question until it had taken on a more definite form.
Finally, where, as here, there are strong interests militating in favor of postponement, we must weigh the potential hardship of delay in assessing whether to dismiss for want of ripeness. On the record in this matter, AT&T has not demonstrated hardship to overcome the FCC’s contention that the case is unripe for review. The only hardship asserted by AT&T is the “burden of fighting Sprint’s claims in district court.” See Petitioner AT&T’s Reply Br. at 9-10, 12. But the burden of participating in further administrative and judicial proceedings does not constitute sufficient hardship to overcome the agency’s challenge to ripeness. See Florida Power & Light Co. v. EPA, 145 F.3d 1414, 1421 (D.C.Cir.1998); see also Clean Air Implementation Project v. EPA, 150 F.3d 1200, 1205-06 (D.C.Cir.1998). Since the preemption issue raised by AT&T before this court satisfies neither the fitness nor the hardship requirements for ripeness, we dismiss AT&T’s claims for want of ripeness.
2. Sprint’s Petition
Sprint has not alleged any hardship, so we only inquire whether the issues it raises are fit for judicial review. Sprint asks this court to vacate the observations, in the Declaratory Ruling that “CMRS carriers have never operated under the same calling party’s network pays (CPNP) compensation regime as wireline LECs,” that “[u]ntil 1998 ... all CMRS carriers recovered the cost of terminating long distance calls from their end users, and not from interexchange carriers,” and that “[b]ecause both carriers charge their customers for the service they provide, it does not necessarily follow that IXCs receive a windfall in situations where no compensation is paid for access service provided by a CMRS carrier.” See Petitioner Sprint’s Br. at 28 (citing Declaratory Ruling, 17 F.C.C.R. at 13,198-99). Sprint claims that these historical observations are somehow preclusive, in that they may influence the district court’s judgment on the contract claim or be cited by other IXCs who refuse to pay Sprint’s access charges.
It is clear that the passages from the Declaratory Ruling cited by Sprint are merely descriptive statements by the agency, not legal conclusions. The statements have no force of law, so they cannot conclusively cause the adverse collateral consequences suggested by Sprint. In short, Sprint is quibbling over FCC observations that have no binding effect whatsoever. This is never a basis for review in this court. Cf. Panhandle E. Pipe Line Co. v. FERC, 198 F.3d 266 (D.C.Cir.1999) (holding that there is nothing for a court to review when an agency has never issued a final and binding judgment that has the force of law).
Sprint further argues that the FCC unreasonably failed to determine that AT&T’s refusal to pay was unjust and discriminatory in violation of 47 U.S.C. §§ 201(b) and 202(a). See Petitioner Sprint’s Br. at 35-37: The Declaratory Ruling held that it need not address this question until the trial court determined whether there was a contract. Declaratory Ruling, 17 F.C.C.R. at 13,200. And during oral argument, counsel for Sprint acknowledged that the Commission has considered claims of discrimination and unreasonableness in the past through complaints filed pursuant to § 208 of the Communications Act. Therefore, the Commission was not obliged to review these discrimination claims in a declaratory ruling issued to address the two specific questions referred by the district court. Whether AT&T’s refusal to pay violates §§ 201 and 202 is beyond the scope of the referral. If the occasion arises, the parties agree that Sprint is free to file a complaint under 47 U.S.C. § 208 seeking redress for alleged unjust and discriminatory practices. Since the Commission properly deferred consideration of Sprint’s claims, there is nothing for this court to review.
Finally, Sprint argues that the FCC failed in its statutory duty to regulate interstate access charges and CMRS earners by not requiring AT&T to pay the termination charges Sprint billed to AT&T. Petitioner Sprint’s Br. at 19-21. Sprint did not raise this argument with the Commission, so it is not properly before this court. Furthermore, the FCC’s regulation of access charges and CMRS carriers is a matter of policy that is beyond the scope of the referral questions answered by the Declaratory Ruling. The basic rationale for the ripeness doctriné is to prevent courts “from entangling themselves in abstract disagreements over administrative policies.” Abbott Labs., 387 U.S. at 148. The regulation of access charges for CMRS providers and other carriers is currently the subject of proposed rulemaking. See In the Matter of Developing a Unified Intercarrier Compensation Regime, Notice of Proposed Rulemaking, 16 F.C.C.R. 9610, 2001 WL 455872 (2001), reported at 66 Fed. Reg. 28,410 (F.C.C.2001). We decline to interfere with those proceedings.
III. Conclusion
For the foregoing reasons, the petitions for review are dismissed.
. Sprint PCS also has advanced a quantum meruit argument under Missouri law in the pending litigation. Quantum meruit is premised on the notion that a party receiving service would be unjustly enriched if it were not required to pay for that service. Although we defer to the court to address this state law claim, we note that an award of quantum meruit would require the court to establish a value (i.e., set a rate) for the service provided in the past. We note that there is a substantial question whether a court may award quantum meruit or other equitable relief under state law without running afoul of section 332(c)(3)(A). 47 U.S.C. § 332(c)(3)(A); see, e.g., Bastien v. AT&T Wireless, 205 F.3d 983, 986 (7th Cir.2000) ("If Bastien’s complaint in fact raises regulatory issues preempted by Congress, then the claims would fail as a matter of law since they are couched in terms of two state law actions.”); Gilmore v. Southwestern Bell Mobile Systems, 156 F.Supp.2d 916, 925 (N.D.Ill.2001) (state law claim based on unjust enrichment preempted under section 332(c)(3)(A)).
| CASELAW |
In this grasshopper definition you can model a sphere by connecting two different series of strips together.
In this grasshopper definition we have used the kangaroo 2 Plugin combined with weaverbird to deform a mesh parametrically.
In this grasshopper definition, inspired by Daniel Piker, you can create an origami pattern and fold it by using the Kangaroo2 Plugin.
This grasshopper definition, inspired by Daniel Piker, simulates the collision between solids by using the "Kangaroo2" plugin.
In this grasshopper definition designed by Daniel Piker, we will learn how to simulate the clothcollide by using kangaroo2 plugin.
In this grasshopper definition by using the kangaroo2 plugin you can simulate the wind and see how it can move the cloth.
In this grasshopper definition by defining gravitational load with the Kangaroo plugin on a series spheres, you can see how they bounce and collide.
In this grasshopper definition by dividing a circle for the particles location and giving them forces by using the Kangaroo plugin we can simulate a collision of a series of marbles, inside a sphere.
In this Grasshopper definition by using the Kangaroo's Warp & Weft component we can control different tensile forces on the mesh and then by snapping the naked edge's point to a series of circles we can control the final tensile tunnel.
In this Kangaroo example by defining a box without caps and using the Edge Lengths tool we will have a tensile structure. Simply by setting the length factor to zero and defining the right anchors we can model a minimal surface.
In this Kangaroo Plugin example you can model a tensile structure with a central curve modifier. The corners of the mesh has been used as the anchors and the "On curve" component has been used to keep the surface on the curve.
In this grasshopper definition you can make a tensile surface with elastic features. The plugins which has been used is kangaroo physics and weaverbird. | ESSENTIALAI-STEM |
Morning Movers: Hope Fades…and Fades…and Fades
Stocks look like they won't be able to hold onto yesterday's tepid gains.
Getty Images
Today's big winner looks like Advanced Auto Parts (AAP) soared 14.1% after its third-quarter earnings were well ahead of analysts estimates, although its revenue fell short of expectations. It also reaffirmed its full-year same-store sales guidance. The news helped boost fellow auto parts supplier O'Reilly Automotive (ORLY), up 3.1%.
Buffalo Wild Wings (BWLD) is up 26% on rumors that Roark Capital has made a bid to buy the company for $150 a share.
However, elsewhere stocks making waves were mostly falling.
TJX Cos. (TJX) is down 5.5% after its reported an in-line third quarter, but its guidance for the fourth quarter was a few pennies shy of consensus. The news weighed on Ross Stores (ROST) as well, which is falling 2.3%.
Dick's Sporting Goods (DKS) is down 4.3% despite reporting a better-than-expected quarter, as its disappointing full-year forecast disappointed investors.
Cognizant Technology Solutions (CTSH) is down 5.4% after Starboard Valuereduced its stake in the shares and Kerrisdale Advisers closed its position.
PulteGroup (PHM) is falling 2% after Buckingham Research cut it to Hold from Buy.
JD.com (JD) is down 1.5% after Morgan Stanley cut it to Equal Weight from Overweight.
Hilton (HLT) is down 1% after Goldman Sachs removed it from its Conviction Buy List.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
R Studio Markdown text formating
#1
hello there!
I am using R studio with R markdown (converting the report to html website). I have one question and I am quite suprised that I couldn't find an answer to it on the web. How do I format text- like justifying, making new paragraph or an indent in the first line of each paragraph?
trinker
ggplot2orBust
#2
include css styling sheet and link to in yaml or include as a style tag in the Rmarkdown document. The documentation is there but maybe it's hard to find. After searching with this in mind, can you let me/us know if this helps or you need more direction.
#3
Thank you! I managed to create new css file, saved it in the right directory and managed to make it works with R studio(I mean I see that the layout is different but not in the way I wanted). I am total newbe and I have probably put the wrong css(I have no experience with that) command in wrong place, I have added "margin: 0 auto" in body chunk.
@media print {
* {
background: transparent !important;
color: black !important;
filter:none !important;
-ms-filter: none !important;
}
body {
font-size:12pt;
max-width:100%;
margin:0 auto;
}
| ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Philosopher nicknames
The result was speedy keep. Withdrawn with no other oppose votes. (non-admin closure) power~enwiki ( π, ν ) 23:53, 22 January 2019 (UTC)
Philosopher nicknames
* – ( View AfD View log Stats )
While this list seems well-intentioned, I can't find any evidence that the topic of "philosopher nicknames" is notable. Individual nicknames can be sourced and may be relevant to mention in the article about that person or use as a redirect. The sources provided are all in that vein: so-and-so was nicknamed such-and-such. Unfortunately, the combined list of nicknames or the concept of giving nicknames to philosophers does not seem to be something that has been discussed in a way that would satisfy WP:LISTN or WP:GNG for the topic. RL0919 (talk) 03:15, 16 January 2019 (UTC) Clearly others don't share my concern, so no reason to waste more time on it. I withdraw the nomination. --RL0919 (talk) 18:18, 20 January 2019 (UTC)
* Keep. I believe that the page satisfies WP:LISTPURP: Information and Navigation, thus qualifying under WP:LISTN. (I started the page.) I would think that the standard proposed would rule out most of the list pages here. DougHill (talk) 03:39, 16 January 2019 (UTC)
* Note: This discussion has been included in the list of Lists of people-related deletion discussions. Bakazaka (talk) 05:07, 16 January 2019 (UTC)
* Note: This discussion has been included in the list of Philosophy-related deletion discussions. Bakazaka (talk) 05:07, 16 January 2019 (UTC)
* Keep but rename to "List of nicknames of philosophers". I had the same concern patrolling this page and changed the "shortdes" to a "list article" to clarify. The title of "Philosophers nicknames" places too much weight on the "group" as a topic, whereas using "List of nicknames of philosophers" puts it in the same category as articles like List of nicknames of European royalty and nobility, where the individual items (subjects and nicknames) are notable, and the use of a cross-categorization "List of X of Y" is accepted under WP:LISTN. Obviously, if there was a material reference/book on the term "Philosopher nicknames", then this article name could be changed back as it would be an article about such nicknames and the list included as examples, but in the absence of that, I think should be renamed to the "List of X of Y" convention. Britishfinance (talk) 10:20, 16 January 2019 (UTC)
* Agreed. May we rename the page now, or should we wait to see whether we decide to keep it? DougHill (talk) 01:01, 17 January 2019 (UTC)
* Best not to move pages during AfDs for clarity. Let the process run and then rename to "List of nicknames of philosophers". I think it would be great to see this article "grow" (and the comments below show there is an intellectual interest here in doing this). Once it gets bigger, then Andrew D. comments of merging into the bigger "List of philosophers" is worth considering (if it fits easily in that table!). Britishfinance (talk) 09:59, 17 January 2019 (UTC)
* Keep/merge The current content is weak – it doesn't even have the famous Plato – a nickname bestowed by his wrestling coach. But there's definitely something to be said about the various names and titles used by and for the many philosophers: see Names of Ancient Greek Philosophers, for example. It might be sensible to merge this into the copious other lists that we have, as an aid to navigation – see Lists of philosophers. Andrew D. (talk) 15:01, 16 January 2019 (UTC)
* I wasn't sure how to deal with the Plato issue on a list. But if we keep the page, then I'll have a go at it. DougHill (talk) 03:45, 17 January 2019 (UTC)
* Keep and rename to "List of nicknames of philosophers" (or perhaps, following one example, "List of philosophers by nickname"?) per the above. It's definitely incomplete, missing the weeping and laughing philosophers for a start, but I think it's legitimate as a navigational tool. XOR'easter (talk) 18:34, 16 January 2019 (UTC)
* I agree; it's just a start. I'll go ahead and add these 2. DougHill (talk) 01:01, 17 January 2019 (UTC)
* Keep as it seems to meet the list criteria, per Britishfinance's opinion above. What a fun little list! Quaint at this point, but well-sourced and interesting in that obscure way so many good Wikipedia lists are. Hopefully it serve as a starting point for more additions, irregardless of the exact topic name or if it is nestled into a parent topic. <IP_ADDRESS> (talk) 05:28, 20 January 2019 (UTC)
| WIKI |
Watsco Schedules Second Quarter Earnings Call on July 30, 2025
MIAMI, July 18, 2025 (GLOBE NEWSWIRE) -- Watsco, Inc. (NYSE: WSO) announced today that it will host its second quarter 2025 conference call on Wednesday, July 30, 2025 at 10:00 a.m. (EDT). Prepared remarks regarding the results will be followed by a question-and-answer session with the senior management team.
The conference call will be web-cast by CCBN's StreetEvents and can be found under the link on our website at www.watsco.com. The earnings results will be released before the market opens on July 30, 2025. A replay of the conference call will be available on our website.
Investors and analysts are encouraged to pre-register for the conference call by using the link below. Participants who pre-register will be given a unique PIN to gain immediate access to the call. Pre-registration may be completed at any time up to the call start time.
To pre-register, go to: https://dpregister.com/sreg/10201437/ff8edb88e2
Participants that would like to join, but have not pre-registered, can do so by dialing (844) 883-3908 within the United States or (412) 317-9254 internationally and asking for the “Watsco” call. Please call five to ten minutes prior to the scheduled start time as the number of telephone connections is limited.
Watsco is the largest distributor of heating, air conditioning and refrigeration (HVAC/R) products with locations in the United States, Canada, Mexico, and Puerto Rico, and on an export basis to Latin America and the Caribbean.
The Company’s focus is on the replacement market, which has increased in size and importance as a result of the aging of installed systems, the introduction of higher energy efficient models and the necessity of HVAC products in homes and businesses. According to data published in March 2023 by the Energy Information Administration, there are approximately 102 million HVAC systems installed in the United States that have been in service for more than 10 years, most of which operate well below current minimum efficiency standards.
Accordingly, Watsco has the opportunity to be a significant and important contributor toward climate change as it plays an important role to lower CO2e emissions. According to the Department of Energy, HVAC systems account for roughly half of U.S. household energy consumption. As such, replacing older systems at higher efficiency levels is a critical means for homeowners to reduce electricity consumption and their carbon footprint.
Based on estimates validated by independent sources, Watsco averted an estimated 24.5 million metric tons of CO2e emissions from January 1, 2020 to June 30, 2025 through the sale of replacement HVAC systems at higher-efficiency standards, an equivalent of eliminating 5.7 million gas powered vehicles off the road annually. More information, including sources and assumptions used to support the Company’s estimates, can be found at www.watsco.com.
Barry S. Logan Executive Vice President (305) 714-4102 e-mail: blogan@watsco.com | NEWS-MULTISOURCE |
BRIEF-North Media Q1 EBIT loss narrows to DKK 9.9 million
May 4 (Reuters) - North Media A/S : * Q1 revenue 216.3 million Danish crowns ($33.38 million) versus 250.5 million crowns year ago * Q1 EBIT ex. items loss 9.9 million crowns versus loss 11.6 million crowns year ago * Revenue and performance development for North Media Newspaper and North Media Online in Q1 2016 was weaker than anticipated * Sees EBIT before special items to range from a negative 55 million crowns to negative 25 million crowns for financial year 2016 * Sees 2016 revenue to range between 865 million crowns and 915 million crowns Source text for Eikon: Further company coverage: ($1 = 6.4793 Danish crowns) (Gdynia Newsroom) | NEWS-MULTISOURCE |
Keeping up in the classroom
Hearing Health with Grant Collins | Principal Audiologist at Clarity Hearing Solutions
Is your child keeping up in the classroom? If not your child have a Central Auditory Processing Disorder (CAPD)? It’s one of the most common classroom hearing pathologies.
Common signs of a potential Central Auditory Processing Disorder in children includes:
• difficulties following instructions
• poor listening ability in noisy places
• difficulty with learning at school, and
• being distracted or easily fatigued at school.
Central auditory processing refers to the efficiency and effectiveness with which our brains and auditory areas decode and use the information we hear. It’s essentially how well the ear talks to the brain and how well the brain can understand what it’s being told.
When our brain and auditory system works normally we can pick out the important parts of the sounds we hear, filter out any noise, and fill in any gaps to make sense of what we have just heard. This complex process uses a wide range of skills to help us make sense of the sounds we hear. Skills like locating the buzz of our alarm clock in the morning, focusing on a conversation in a busy café, and clearly understanding a teacher in a noisy classroom.
When something goes wrong in our brain and auditory system, the ability for us to make sense of the sounds can become impaired, even though we can still ‘hear’ the sounds. A disorder of the brain’s auditory system most commonly results in difficulty understanding speech in the presence of noise, and could be the result of a Central Auditory Processing Disorder (CAPD).
It’s often difficult to identify the causes of CAPD. Everyone’s brain auditory system organisation is different which means CAPD can affect everyone differently. Conditions, like chronic ear infections in children’s early years, could also mean they are at a greater risk of developing a CAPD.
Children with CAPD are more likely to have behavioural, emotional, and social difficulties. Problems communicating and learning difficulties can impact the development of self-esteem and feelings of self-worth. While these signs may be noticed early on, it isn’t until children are 7 years of age that we can accurately diagnose a potential CAPD.
The first step in testing for an auditory processing disorder is to conduct a hearing test. This is to establish whether the presence of a hearing loss may be a contributing factor. After determining the child’s hearing thresholds, we test more complex auditory processing skills. For children, we offer a screening test of your child’s spatial hearing abilities that mimic a classroom situation. Once we have the result of this test we can then investigate your child’s auditory processing abilities and identify any potential presence of CAPD.
While there is no single ‘cure’ for CAPD, there are several remediation strategies for children which can be discussed with your audiologist. These may include:
• listening strategies for the classroom
• active communication techniques for daily life
• listening exercises or computer software programs to improve auditory processing skills; and
• assistive listening devices such as Bluetooth microphones.
Early identification and remediation of CAPD may potentially lessen the likelihood that any secondary problems may emerge.
If you are concerned, schedule a consultation with your audiologist now to rule out or identify the nature of the problems.
For more on CAPD check out Clarity’s website at http://clarityhearingsolutions.com.au/central-auditory-processing/
AEIOU v2.jpg | ESSENTIALAI-STEM |
BRIEF-HIIQ Announces Extension Of Strategic Alternatives Review & Preliminary Q4 And Fiscal Year 2019 Financial Results
Feb 13 (Reuters) - Health Insurance Innovations Inc : * HIIQ ANNOUNCES EXTENSION OF STRATEGIC ALTERNATIVES REVIEW & PRELIMINARY Q4 AND FISCAL YEAR 2019 FINANCIAL RESULTS * HEALTH INSURANCE INNOVATIONS - EXTENDING ITS PROCESS FOR EXPLORING, REVIEWING, EVALUATING ALTERNATIVE STRATEGIES THAT CO COMMENCED IN JULY 2019 * HEALTH INSURANCE INNOVATIONS- ALTERNATIVES COULD INCLUDE, AMONG OTHER THINGS, SALE OF COMPANY OR A PORTION THEREOF, A STRATEGIC BUSINESS COMBINATION * HEALTH INSURANCE INNOVATIONS - ALTERNATIVES COULD INCLUDE, AMONG OTHER THINGS, CHANGES IN OPERATIONS/STRATEGY, CONTINUING TO EXECUTE ON CURRENT BUSINESS PLAN * Q4 2019 TOTAL REVENUE $159 - $164 MILLION * Q4 2019 ADJUSTED. EARNINGS PER SHARE $2.30 - $2.55 * HEALTH INSURANCE INNOVATIONS - BOARD HAS NOT SET A TIMETABLE FOR COMPLETING STRATEGIC REVIEW * BOARD HAS NOT MADE ANY DECISIONS RELATED TO STRATEGIC ALTERNATIVES AT THIS TIME * HEALTH INSURANCE INNOVATIONS - RECEIVED ADDITIONAL INQUIRIES FROM MULTIPLE NEW STRATEGIC PARTIES EXPRESSING INTEREST IN PARTICIPATING IN PROCESS Source text: (bit.ly/2uIsurt) Further company coverage: | NEWS-MULTISOURCE |
Crosby Wins Ted Lindsay Award As NHL's Most Outstanding Player « CBS San Francisco
PITTSBURGH (93-7 The Fan) The Ted Lindsay Award is handed out after every NHL season to the player who is deemed to be most outstanding as voted on by the members of the NHL Players' Association. This season's winner is Pittsburgh Penguins' center Sidney Crosby. Crosby wins his second Lindsay Award after posting 56 points in just 36 games, before breaking his jaw and missing the team's final 12 games. It is nice to be recognized by the guys that you play against, Crosby said. I think it's obviously a compliment. The Penguins' captain returned to the form he had reached before his concussion issues began at Heinz Field during the Winter Classic in 2011. I was well rested, Crosby joked. I got [back] to the level that I wanted to. Crosby was also nominated for the Hart Trophy, which is the official league MVP. That award went to the Washington Capitals' Alex Ovechkin. Crosby wanted to win, but said losing out on the award will not cause him any lost sleep. Crosby's teammate, Kris Letang was nominated for the Norris Trophy as the league's top defenseman. The award was given to Montreal's P.K. Subban. RELATED LINKS: Ray Shero Named NHL GM Of The Year (6/15/13) More Penguins News More Sports News Fill in your details below or click an icon to log in: You are commenting using your Twitter account. ( Log Out / Change ) You are commenting using your Facebook account. ( Log Out / Change ) You are commenting using your Google+ account. ( Log Out / Change ) Connecting to %s Notify me of new comments via email. Notify me of new posts via email. Listen Live | NEWS-MULTISOURCE |
Beefy Boxes and Bandwidth Generously Provided by pair Networks
"be consistent"
PerlMonks
Re: Referencing in advanced data structures
by fullermd (Priest)
on Oct 16, 2009 at 08:32 UTC ( #801519=note: print w/replies, xml ) Need Help??
in reply to Referencing in advanced data structures
Note: This ended up a whole lot longer than I intended. Sorry. But I wanted to walk it step by step to be sure it was clear (or at least firmly muddy). The short version (if you don't want to read all the 'why') is that the 'shorter' form, without the extra ${}'s, actually turns into something slightly different inside perl. But I typed all the why, so please at least pretend to read it :)
It's a question of what happens implicitly. Let's walk the whole process.
For clarity, consider $struct defined in a single block:
my $struct = { hashRef => { fruit => 'apple', veggie => 'corn' }, arrayRef => [ qw(1 2 3 4 5) ], };
So, if you look at $struct, that's a hash reference (to a hash with two keys, 'hashRef' and 'arrayRef'). %$struct is the dereferenced hash; %{$struct} is the same thing, but you don't need the {}'s in this case. So those two represent a hash (not a reference), with the two keys above.
$struct->{hashRef} is a hash reference (to a hash with two keys, 'fruit' and 'veggie'). You can't do $struct{hashRef}, because that's looking for the key 'hashRef' in the hash %struct, not the hash reference $struct.
Now, that's all (hopefully) clear. Here's where it gets trickier. We know that $struct->{hashRef} is a hash reference too (just like $struct) is. So to look up a key inside that, we have to dereference it, and we get $struct->{hashRef}->{fruit}.
But, wait a minute. You wrote $struct->{hashRef}{fruit}, not $struct->{hashRef}->{fruit}. What happened to the extra ->? The answer is that perl puts it there implicitly, between {} hash subscripts or [] array subscripts. Consider the array case; $struct->{arrayRef}[2] and $struct->{arrayRef}->[2] both do the same thing, because in the former case perl implicitly puts a -> in, because it knows you're going through a reference rather than a (hash|array).
It doesn't do this on the first subscript because it's not necessarily clear what you're trying to subscript. It's notable that earlier version of perl didn't implicitly add the ->'s; I don't remember when they changed, but I do have some lumps of existing code that have them all explicit because it was needed back then. It was a pretty long time ago.
So, anyway, digression aside: You've written $struct->{hashRef}{fruit}, which is internally translated to $struct->{hashRef}->{fruit}. But you've also written print ${$struct->{hashRef}}{fruit}. Now, this is different.
In the former case without the extra ${}, you're trying to get the {fruit} subscript of a hash reference, but in a way that perl can know to add the -> and dereference for you. In the latter case, however, you've already dereferenced it yourself with the ${} So you have a hash (not a reference) that you're trying to take the subscript of, and it Just Works, without needing to implicitly add the ->.
Or in a shorter form, the explicit statement $struct->{hashRef} is equivalent to ${$struct}{hashRef}. In the former case, you're dereferencing $struct via the ->, and in the latter via the ${}. Going to the next level, $struct->{hashRef}->{fruit} and ${$struct->{hashRef}}{fruit} are equivalent in the same way. $struct->{hashRef}{fruit} is also equivalent, because perl internally adds the -> and makes it into $struct->{hashRef}->{fruit}.
Aside: You'd actually use %{}, not ${}, to turn a hash ref into a hash, like we did up in the first paragraph after defining $struct. However, all these cases use ${} instead because the end result we're trying for (the value of that {fruit} subscript) is a scalar, so that scalar-ness propogates up the sigils and we end up with ${}. The sigil represents the end result of the process, not what we're doing in this piece of it. That still trips me up sometimes :)
In fact, you could eliminate the first -> totally too, just by adding extra levels of ${}; you end up with something like ${${$struct}{hashRef}}{fruit}, which is much less readable. That's why we have -> in the first place. This comes into perl via C, where you use -> to access members of a structure via a pointer (which, if you don't know C, is basically the same as a perl reference). You access structure members with ., so using the terms from the perl hash above, you'd get something like struct.hashRef if struct were a structure (hash). But with struct being a pointer to the structure (reference to the hash), you'd have to dereference it first like (*struct).hashRef, which is clumsy, so C lets you struct->hashRef. So that's why perl does it that way.
In case you're still reading and haven't dozed off or died of old age yet, here's a variant of your script with comments quickly suggesting what's happening:
#!/usr/bin/env perl5 use strict; use warnings; my $struct = { hashRef => { fruit => 'apple', veggie => 'corn' }, arrayRef => [ qw(1 2 3 4 5) ], }; # These two are the same; perl adds the implicit '->' to the first and # turns it into the second internally print $struct->{hashRef}{fruit}, "\n"; print $struct->{hashRef}->{fruit}, "\n"; # Now we'll deref the $struct->{hashRef} hash reference via ${} instea +d # of -> print ${$struct->{hashRef}}{fruit}, "\n"; # And for the coup de grace, we'll deref $struct via ${} instead of -> # too. print ${${$struct}{hashRef}}{fruit}, "\n";
Output:
% ./tst.pl apple apple apple apple
Replies are listed 'Best First'.
Re^2: Referencing in advanced data structures
by biohisham (Priest) on Oct 16, 2009 at 11:03 UTC
fullermd hats off, I stand in obligation and gratitude. I saw the length of the reply and I was happy that you took it upon yourself to give me this amount of attention, I read it like 3 times now.. I did not know my confusion was deeper than I thought until I read your clarification on the dereferencer %{} and why in this case we used ${} instead. Also the arrow operator can be implicit when in "$struct->{hashRef}{fruit}" which still does the same thing as if explicitly specified "$srtuct->{hashRef}->{fruit}", this particular bit used to drive me crazy because I started to use some basic modules before having learnt this advanced form of referencing and some examples were going this way and others going the other way and whatnot. Now my life is a lot easier.
I got my fangs shiny looking ${${$struct}{hashRef}}{fruit}, romps of obfuscations can be my thing after all if I understand this fair enough.
tye needless to say that the link you provided me has served to solidify my understanding of fullermd contribution and at the same time provide me a place to quickly look at for things. Mastering this aspect of Perl isn't so smooth a walk but I guess once you have it you are so good to go down many roads. Appreciation to you for having made that post nearly 10 years ago.
Excellence is an Endeavor of Persistence. Chance Favors a Prepared Mind.
Re^2: Referencing in advanced data structures
by BioLion (Curate) on Oct 16, 2009 at 10:58 UTC
Wow - what more is there to add!? ;P Maybe perlref and perldsc? I found them really useful.
Just a something something...
Log In?
Username:
Password:
What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://801519]
help
Chatterbox?
and all is quiet...
How do I use this? | Other CB clients
Other Users?
Others meditating upon the Monastery: (5)
As of 2017-07-25 00:07 GMT
Sections?
Information?
Find Nodes?
Leftovers?
Voting Booth?
I came, I saw, I ...
Results (361 votes). Check out past polls. | ESSENTIALAI-STEM |
Navigation C API Pages Python bindings Applications
IO Interface
GFXprim implements an I/O interface which is used by all image loaders.
The purpose of the interface is:
• Make it easy to load and save images from/into memory buffers
• Fast and clean containers (ZIP for example) implementation (zlib deflate could feed data directly into a memory based IO stream)
The I/O interface is defined by a structure with callbacks.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
/*
* Values are 1:1 with constants passed to lseek()
*/
enum GP_IOWhence {
GP_IO_SEEK_SET = 0,
GP_IO_SEEK_CUR = 1,
GP_IO_SEEK_END = 2,
};
typedef struct GP_IO {
ssize_t (*Read)(struct GP_IO *self, void *buf, size_t size);
ssize_t (*Write)(struct GP_IO *self, void *buf, size_t size);
off_t (*Seek)(struct GP_IO *self, off_t off, enum GP_IOWhence whence);
int (*Close)(struct GP_IO *self);
off_t mark;
char priv[];
} GP_IO;
The fields of the I/O stream structure are mostly self describing. The Seek behaves exactly as lseek(2), the Read as read(2) and the Write as write(2).
The mark and priv are private fields that shall not be touched by user.
An IO reader must implement at least Read, Seek (at least able to seek forward to skip some data) and Close.
An IO writer must implement at least Write and Close.
Return value from the Seek is a value of current offset in the stream (after the seek has been done) or in case of failure (off_t)-1.
Return value from Read or Write is a number of bytes read/written or in case of failure a negative number (-1).
Return value from Close is zero on success and non-zero on IO failure.
Note Make sure errno is set if any of the operations has failed.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
ssize_t GP_IORead(GP_IO *io, void *buf, size_t size);
This is a wrapper to io→Read().
Reads at most size bytes from an IO stream and stores them into the buffer. Returns number of bytes read.
On failure negative value is returned and errno is set.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
int GP_IOFill(GP_IO *io, void *buf, size_t size);
Similar to GP_IORead() but either reads the whole buffer or fails.
Returns zero on success and non-zero on failure.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
ssize_t GP_IOWrite(GP_IO *io, void *buf, size_t size);
This is a wrapper to io→Write().
Writes at most size bytes from an IO stream and stores them into the buffer. Returns number of bytes read.
On failure negative value is returned and errno is set.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
int GP_IOFlush(GP_IO *io, void *buf, size_t size);
Similar to GP_IOWrite() but either writes the whole buffer or fails.
Returns zero on success and non-zero on failure.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
int GP_IOPrintF(GP_IO *io, const char *fmt, ...);
Printf-like function for an I/O stream.
Returns zero on success and non-zero on failure.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
int GP_IOClose(GP_IO *io);
This is a wrapper to io→Close().
Finalizes reading/writing, closes file descriptors (in case of file IO), frees memory buffers.
Returns zero on success, non-zero on I/O failure and errno is set.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
enum GP_IOWhence {
GP_IO_SEEK_SET = 0,
GP_IO_SEEK_CUR = 1,
GP_IO_SEEK_END = 2,
};
off_t GP_IOSeek(GP_IO *io, off_t off, enum GP_IOWhence whence);
This is a wrapper to io→Seek().
Returns (off_t)-1 on failure and errno is set.
Generally not all read I/O streams are seekable back (zlib/rle decompression streams, etc.) but all streams should be able to seek to the start of the stream, to the end and forward.
Table 1. Most common errno values
EINVAL
Invalid whence or off points outside the stream.
ENOSYS
Operation not supported, combination of whence and off points inside the stream (is valid) but action cannot be done.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
off_t GP_IOTell(GP_IO *io);
Wrapper to GP_IOSeek(), returns current position in I/O stream.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
off_t GP_IORewind(GP_IO *io)
Wrapper to GP_IOSeek(), rewinds to the start of the I/O stream.
Returns zero on success, non-zero on failure and errno is set.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
GP_IO *GP_IOMem(void *buf, size_t size, void (*free)(void *));
Creates an read-only I/O from a memory buffer.
Returns initialized I/O or in case of failure NULL and errno is set.
The buf is pointer to the start of the buffer, the size is size in bytes.
The free() callback if not NULL is called with the start of the buffer as an argument on IOClose().
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
enum GP_IOFileMode {
GP_IO_RDONLY = 0x00,
GP_IO_WRONLY = 0x01,
GP_IO_RDWR = 0x02,
};
GP_IO *GP_IOFile(const char *path, enum GP_IOFileMode mode);
Creates an IO stream from a file.
Returns a pointer to initialized I/O stream, or in case of failure NULL and errno is set.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
GP_IO *GP_IOSubIO(GP_IO *pio, size_t size);
Creates an readable I/O on the top of an existing readable I/O.
The stream position in the parent I/O is advanced when reading or seeking the sub I/O.
The sub I/O is limited to an interval starting at current position and can advance size bytes at max; then it behaves like the stream has ended i.e. GP_IORead() returns zero.
You can seek in the resulting I/O if:
• The parent I/O is seekable
• The the combination of off and whence fits inside the sub I/O
Warning If you combine reading or seeking in the parent I/O and sub I/O the result is undefined.
#include <loaders/GP_IO.h>
/* or */
#include <gfxprim.h>
GP_IO *GP_IOWBuffer(GP_IO *io, size_t bsize);
Creates write buffered I/O on the top of an existing I/O.
Generally you should create a buffered I/O if you are about to write data a few bytes at the time.
If bsize is zero default size is choosen.
| ESSENTIALAI-STEM |
What Causes A Coolant Leak When Car Is Not Running? (Plus How To Find The Leak)
Written By The Motor Guy
Certified ASE Master Automobile Technician
Last updated April 27, 2023
Sometimes the source of a coolant leak from your vehicle can be difficult to find. It can be even more difficult when the coolant leak only occurs when the car is not running. So why would coolant leak from a car that is not running you may ask?
A coolant leak when the car is not running is likely due to a problem with the cooling system, which regulates the engine’s temperature. Common causes include a faulty radiator cap, a damaged or worn coolant hose, a crack or hole in the radiator or a faulty water control valve.
Coolant can leak from a vehicle that is not running because when the engine is off, the coolant is no longer under pressure and can pool in various places around the engine and can leak if there is a hole or crack nearby.
How Can Coolant Leak From A Car That Isn’t Running?
Here are some of the most common reasons for coolant to leak from an engine when it is parked up:
ReasonDescription
Damaged or worn-out hoseA damaged or worn-out hose can cause coolant to leak out slowly over time, even when the engine is not running.
Faulty radiator capA faulty radiator cap can cause coolant to leak out of the system, even when the car is not running.
Cracked or damaged radiatorA cracked or damaged radiator can cause coolant to leak out of the system, even when the car is not running.
Damaged water pumpA damaged water pump can cause coolant to leak out of the system, even when the car is not running.
Blown head gasketA blown head gasket can cause coolant to leak out of the system, even when the car is not running.
Coolant overflow tankIf the coolant overflow tank is overfilled, coolant may leak out of the tank and onto the ground, even when the car is not running.
Common reasons why a car can leak coolant when not running
You may think that coolant is more likely to leak from an engine that is hot and running under pressure. This is true sometimes, especially when there is a complete failure of a component such as the water pump or a burst hose.
It is in fact more likely for coolant to leak from the engine when it’s turned off when the vehicle is parked.
This is because when the engine is running, the water pump is pumping the coolant around the coolant system under pressure and in most cases the coolant will not have a chance to settle in a location that it may leak from.
Where Can Coolant Leak From When The Car Is Not Running?
When your car is turned off, coolant will stop moving around and will tend to pool in various locations around the engine until the next time the engine starts.
Here are a few locations where coolant leak from if they are damaged or cracked.
1. From A Leaky Heater Core
bad, leaky heater core will exhibit symptoms such as smell in the cardamp carpet from fluid leaking from behind the dashboard, windows that are constantly fogging up and a car heating system that doesn’t work.
The heater core is responsible for heating up the inside of your car when it’s cold outside. If the heater core isn’t working properly, then you’ll notice that the air coming from the vents in the car won’t be as hot as it should.
Coolant dripping from behind the dashboard is a sign that the heater core is leaking. Fluid will often tend to leak from a broken heater core when the car is switched off. This is because coolant will sit in the heater core if the heating is turned off, and is only pumped back out into the main cooling system when the engine is running and the heating is switched on.
If the carpet is wet in your car and it smells a bit like an engine bay, then chances are the heater core is leaking.
2. From A Loose Coolant Hose Clamp
Sometimes a coolant leak can be from one of the many hoses that make up the coolant system. If the leak is only present when the car is not running, this may suggest the leak is at the joint where the hose is clamped onto the engine.
As the engine heats up, the clamps holding the coolant hoses in place can sometimes expand a small amount. This can cause the hose to loosen slightly and this can cause a leak. If it’s an older vehicle, chances are the hoses will have hardened significantly and will not be flexible enough to tolerate any changes in temperature.
3. From A Leaking Radiator
If the radiator is cracked or is damaged, this can often be the source of a coolant leak, especially when the car is turned off.
When the engine is running, the coolant in the hoses and radiator are being pumped around the engine at high pressure. Coolant is taken from the hot parts of the engine and is channeled through the radiator where it is cooled before returning to the engine.
car engine cooling system
If there is a small crack or hole in one of the radiator fins, or where feeder hoses join the radiator, a small amount of coolant may escape when the engine is running. When the engine is turned off, the coolant will stop moving and will sit in the radiator and will be more likely to leak if there is a hole or crack present.
4. From A Loose Or Faulty Radiator Drain Valve
Some vehicle radiators come fitted with a drain valve that is removed when draining and flushing the coolant system. This can also be a source of coolant leaks if it loosens or if the rubber seals fail.
Just like with a damaged radiator, the coolant can escape through the drain valve when the engine is turned off. Drain valves are usually located at the bottom of the radiator, making it easy for coolant in the radiator to escape if the valve is damaged.
If the coolant system has not been flushed in a long time, the radiator drain valve can become stuck in place, and may be damaged when it’s removed. It’s always a good idea to replace the valve when carrying out a coolant service.
5. From A Failing Water Pump
A common sign of a failing water pump is fluid loss from the coolant system or leaking from the water pump itself.
Water pumps have a built in safety feature called the weep hole that can warn you of impending failure of the pump
This small, unplugged hole on the water pump allows coolant or oil to escape from the inside of the water pump when one of the internal seals has failed. If oil is dripping from the hole, then the internal oil seal is failing. Coolant or water dripping from the weep hole means the internal water pump seal is worn out.
Worn out water pump dismounted from the vehicle engine cooling system
A large amount of coolant leaking from the water pump when the car is turned off can be caused by a failed water pump sealing gasket. This is the gasket between the water pump and the engine block.
How To Locate The Source Of A Coolant Leak That Only Occurs When The Car Is Turned Off
The method for finding a coolant leak that only occurs when the engine is off, is much the same as that for finding any coolant leak.
The best way to quickly find a coolant leak is to pressure test the coolant system. Pressure testing the system allows you to simulate coolant pressure without running the engine.
It’s also easier to check for leaks at different coolant pressures and leaks that are only occurring under no pressure.
How To Pressure Check A Car For Coolant Leak When Turned Off
Step 1 – Before you start, check the amount of coolant in the coolant reservoir and top it up with water if necessary. Don’t use coolant to top it off, as you’ll only waste coolant if there is a leak in the system
Step 2 – You’ll need a handheld pressure tester to pressurize the system. You don’t need to purchase a big expensive kit, a basic pressure tester with a few adapters will do like this Mityvac kit (Amazon.com link).
Check the cap from the coolant reservoir to see what pressure you need to pump the system to. (it should be printed on the cap). You may need to use an adapter to screw the pressure tester on to to the coolant reservoir.
Step 3 – Now slowly start pumping the tester. If there is a leak in the system you may start to hear coolant dripping as you increase the pressure. As you are checking for a leak that occurs with the engine off, you probably won’t see any leaks yet.
Step 4 – When the system is fully pressurized, leave it for 5 minutes and then start checking for leaks. Common areas for leaks to occur are at hose joints, the bottom of the radiator, around the water pump and around the base of the coolant reservoir.
Step 5 – If there are no leaks at full pressure, release some of the pressure from the system, wait a few minutes and check again for leaks. Repeat this process until the system is fully de-pressurized.
Step 6 – If you still can’t find the source of the coolant leak, top up the coolant reservoir again and double check that there are no coolant wet patches on any of the hoses or around the radiator. Leave the engine for 30 minutes before checking again. You may need to repressurize the coolant system again and depressurize it to simulate the engine running and turning off.
Step 7 – If there is a leak somewhere in the engine bay you will find it by using this method. If the leak is coming from the heater core it may be more difficult to pinpoint as most of the heater core components are hidden behind the dashboard. You may need to disassemble the dashboard to get to the heater core to check it for leaks.
How to Pressure Test Vehicle Cooling System | ESSENTIALAI-STEM |
North Carolina Association of Educators
The North Carolina Association of Educators (NCAE) is a professional association for public school employees formed in 1970 by the merger of the North Carolina Education Association with the North Carolina Teachers Association. Since North Carolina prohibits collective bargaining by public employees, the NCAE works as a professional development and advocacy organization. It is affiliated with the National Education Association. The organization has under 25,000 members.
History
The history of the NCAE began in 1857 with the formation of the North Carolina Education Association. The North Carolina Teachers Association began in 1880.
The North Carolina Teachers Association was the first African American teachers' association to affiliate with the NEA-Department of Classroom Teachers.
Just like the schools systems were separated along racial lines, so were the two education associations divided. The NC Education Association represented white teachers while the NC Teachers Association represented black teachers. When integration began in the school systems, the two organizations looked to merge as well. The merger of the two groups that created the North Carolina Association of Educators was approved in 1970.
Structure and governance
Officers of the NCAE are elected to four-year terms. The current President is Tamika Walker Kelly. The Vice President is Bryan Proffitt.
Funding
The NCAE is a 501(c)6 tax-exempt organization.
After the Republicans gained control of the North Carolina General Assembly for the first time since 1870, one of the laws passed included Senate Bill 727 which takes away the ability for school employees to have automatic deductions taken out for dues payments to the North Carolina Association of Educators. The NCAE claims that the Republicans specifically targeted their group for retribution with this legislation by using a late-night override of Governor Bev Perdue's veto. In December, 2012, a Wake County Superior Court judge struck down this law stating that it violated the state constitution.
Notable people
* Bernard Allen (1937–2006), Former educator and long-time lobbyist for the NCAE; served in the North Carolina House 2003–2006.
* Elizabeth Duncan Koontz (1919–1989), African-American educator. Led the NC Teachers Association 1959–1963 and president of the National Association of Educators, 1968.
* Ruth Braswell Jones (1914–2001) | WIKI |
Talk:Deftones/Archive 2
Hemispheric chauvanism
Can the introduction, which states "their most recent Diamond Eyes in spring of 2010" be changed? In my country it was released in autumn (or fall, whatever). A month is more appropriate<IP_ADDRESS> (talk) 01:17, 28 September 2010 (UTC)
Musical styles
their pre-adrenaline material has strong and clear reggae/ska influences. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:08, 2 February 2011 (UTC)
Nu metal
Blatantly obvious in the five sources listed in this article. How many sources does experimental rock have? One. Five beats one. End of discussion. WTF (talk) 06:45, 27 March 2011 (UTC)
* No, not end of discussion. Just because there are four sources stating it is nu metal and one for experimental rock presented in the article does not mean that they are the only sources on the internet. Unless if I'm missing something, there are only four sources, as opposed to five, in the musical styles section. If there is an additional one that I missed, feel free to remind me. I'm not taking a position on either side, though, because I despise genre feuding and I haven't listened to this band enough to be a good judge of their style. I hope that a good solution is reached soon. Backtable Speak to meconcerning my deeds. 01:10, 28 March 2011 (UTC)
Administrator's noticeboard/Incidents
Due to the large amount of feuding based on this article, I have reported the activity on the Administrator's noticeboard. Comments pertaining to the issue are welcome. Backtable Speak to meconcerning my deeds. 23:47, 13 April 2011 (UTC)
* Rephrase: they are welcome here. Allow me to make a suggestion (I have no interest in editing this article any further, or I'd do it): find the proper references that establish the three genres now in the infobox, and my guess is that this is not impossible, and add footnotes to them in the infobox. Removal of a genre, then, counts as "removing sourced content" and that's usually a no-no. Good luck. Drmies (talk) 04:01, 14 April 2011 (UTC)
* It could be a good idea to put a source in the infoboxes. If it keeps up even afterwards, then I will entertain the idea of eliminating the infobox's genre area altogether. Seriously, there is a communication problem when 85 of the last 156 edits have been toward the genre. Freaking ridiculous. I guess I'll just try to add three sources to that area, and see what happens. They are already sourced in the musical styles and influence area. I'll see what happens. Backtable Speak to meconcerning my deeds. 03:02, 18 April 2011 (UTC)
Year of band's formation
The infobox says the band was formed in 1988 (and this is sourced to allmusic; I also found mentions to this effect from MSNBC and the New York Times), but the article's introduction says 1989, and later on in the article it says they started playing together "circa 1989". We have ourselves a contradiction here - which will we go with? As the "circa 1989" part is unsourced, I recommend 1988, but I don't know much about this band so I thought I'd ask here. Kansan (talk) 13:13, 29 April 2011 (UTC)
Post-metal
I will add the post-metal genre to the infobox, is heavily sourced and isn't strange that critics refer to deftones as such. sources:, , , , , ,. The style is more prominent than experimental rock or nu metal, and these ones are in the infobox, i'll put it there too.Trascendence (talk) 02:01, 13 April 2012 (UTC)
* Very few of the sources you have provided qualify as reliable sources, and only a few of them referred to Deftones as a post-metal band. For example, this review of Deftones that you have provided only says the song "When Girls Telephone Boys" "spills over the brim into a Meshuggah style post-metal groove." This doesn't say that Deftones is a post-metal band, and it actually doesn't even say Deftones is a post-metal album. This review of Diamond Eyes you have provided doesn't even mention post-metal in it at all. Fezmar9 (talk) 03:16, 13 April 2012 (UTC)
* before anything I want to point that shoegaze metal and post-metal are sinonimous terms.
Most if not all my sources are perfectly reliable, the only one from wich I'm not sure is the #1, but I think is because is a "low budget" site, for call it somehow. That leaves 6 sources that I'm sure are reliable, this three:, , are reports from well known sites that makes an overview over deftones' sound throught their entire carrer, agreeing that with White Pony, Deftones developed a post-metal/shoegaze metal sound and how they continue in that line today.
This three:, , , are professional reviews that calls their music either post-metal or shoegaze metal, i think that the reviewer calling the song When Girls Telephone Boys post-metal is rather enough to make the point, because having him saying "post-metal!" in every heavy song on the album would be seen as a very unprofessional action, the reviewer also used the introdution to say how all the heavy songs follows the same brutally heavy yet artistic direction in the album, post-metal is implicit there. Anyway, the Self-titled album is not much of an issue because there are three sources calling the music that Deftones have done from White Pony onwards post-metal or shoegaze metal.
As I said above, post-metal/shoegaze metal is more prominent than experimental rock or nu metal, it deserves way more to have a place in the infobox because is a style that Deftones plays today (and I guarantee that their new album will be post-metal too) so lets put it up ok?Trascendence (talk) 03:10, 14 April 2012 (UTC)
* MakeFive, Ology look like user generated/social networking sites (anyone can sign up and post) so unreliable. Creative Loathing and Straight.com seem ok but I'm not entirely sure. Sputnikmusic IS reliable, however, it has to be the staff review (this which doesn't mention any of the genres you want to include) not a user posted one. Thrash Hits I am unsure of. That leaves 2 possible sources. However, that, to me, isn't nearly enough for inclusion in the infobox. Will take a better look when I have time. HrZ (talk) 11:12, 14 April 2012 (UTC)
* There is no real reason to doubt about the reliability of thrash hits, that leaves three sure sources, that is more than the sources that experimental rock have and experimental rock is there, that makes no sense.Trascendence (talk) 03:37, 17 April 2012 (UTC)
* Thrash Hits failed to established notability in 2008 and a discussion in October 2009 deemed it generally unreliable. The unwritten consensus among the music-related Wikipedia community is that it's unreliable as many editors remove their reviews from ratings templates. Please visit identifying reliable sources and note that Wikipedia's definition of "reliable" may be different from your own. Fezmar9 (talk) 05:52, 17 April 2012 (UTC)
* First of all, it appears to be your opinion that shoegaze metal and post-metal are synonymous. Based on the quality of the sources you have provided, it appears that Deftones performing post-metal is a minority opinion. Based on the content of the sources you have provided, it doesn't even appear that many people believe Deftones are a post-metal band, but rather that they display post-metal influences here and there. Also note that the genre field is meant to be general. Deftones are generally described as alternative metal or nu metal by the vast majority of established publications. Having a few songs on a few albums being described as being post-metal by some non-notable doesn't make Deftones a post-metal band. Fezmar9 (talk) 18:08, 14 April 2012 (UTC)
* First, I only were clarifying, since the source says "metalgaze" that is a word that obviously was made from these two words, there are three sources from notable enough sites that says that Deftones plays post-metal, or shoegaze metal or mixes both in an unique style, also with your criteria nu metal shouldn't be there, since there are loads of reviewers that says that Deftones were just taged as that by their time of emergence or things like that.Trascendence (talk) 03:37, 17 April 2012 (UTC)
* I just don't think these measly sources are really enough to warrant post-metal's inclusion in the infobox. It would be a different story if you had a handful of articles published by sources that hold more weight such as Rolling Stone, Spin or Alternative Press. Fezmar9 (talk) 05:52, 17 April 2012 (UTC)
Regarding use of "currently"
Use of the word current or currently within articles is incorrect no matter what another article may say. Wikipedia is timeless and statements about current events should be reported without speaking as if the event is happening right now. RELTIME specifically states that times should be referred to generally. There's no exception to the rule. Stating that other articles refer to events this way is not precedent for not fixing it. It just means those articles need to be corrected as well. NJZombie (talk) 18:12, 14 June 2012 (UTC)
* I've just never seen an issue with current members sections being out of date. I see it all the time in article bodies, but in my almost five years of editing, I've never seen an out-of-date band members section. Can't the same be said of a former members section? Former is also a time-related adjective and can also become out-of-date in the same way current can. Fezmar9 (talk) 18:32, 14 June 2012 (UTC)
* It's not a matter with of list being out of date. It's the use of the word current. It's too precise and Wikipedia calls for a general time reference. Keeping the list up to date right up to this very second is not the issue. Also, former is not a precise unit of time. It simply implies that the member is no longer with them because they left at some point prior. Currently implies that this is the lineup as of this very second. Even if that's true in every case, it's not supposed to be doing so. NJZombie (talk) 20:06, 14 June 2012 (UTC)
* First of all you have it backwards. You say Wikipedia is looking for general terms, but WP:RELTIME says "Prefer specific statements of time to general ones." WP:DATED, linked to from WP:RELTIME, also says "use more precise phrases." Second, you say this isn't an issue of being out-of-date, yet both WP:DATED and WP:RELTIME are about material becoming dated. So it seems that this is, in fact, the issue at hand. Third, you also say formerly isn't a word of concern, yet it's listed at WP:RELTIME as a word to avoid.
* Let me illustrate this with another example. The sentence "Deftones is currently working on a new album" should be avoided since it wouldn't make sense once Deftones actually finishes a new album. Instead, the sentence should read "Deftones began working on an new album and follow up to Diamond Eyes in June 2012." Now the sentence is timeless and specific as requested of the guidelines. No matter what happens in the future, that sentence will always be true. However the same cannot be said about band members sections. In the event that a band loses a member there are three issues that cannot be avoided: the "current members" section now has a former member, the "former members" section is now lacking a newly departed member, and the "–present" range is no longer true. Thus, a member section is never timeless for a currently active band, nor is it timeless for a formerly active band who has the possibility of reforming. Even if you take out the word "current" you still have issues with the words "former" and "present".
* To achieve the sense of timelessness you're trying to achieve, all articles on bands must also drop "is" from the lead sentence and drop "–present" from both the infobox and most recent subsection under "History". Both of these suggest "the event is happening right now" and are also "general" which apparently should be avoided. Fezmar9 (talk) 01:32, 15 June 2012 (UTC)
* Yes, I was mistaken in my use of the words I chose, like generally. Regardless, yes the statements should be dated or at the very least, use the "as of" method. As far as the band sections go, "former" members will typically remain former and therefor those sections have much less chance of being outdated whereas "current" lineups will more often change. Regarding "is" in the leads, that's incorrect. If the Deftones broke up, they would still be a band and regardless of what other editors have done in other articles, it shouldn't change to "was a band". The is refers to what the subject is, not their current status as a band. NJZombie (talk) 12:58, 15 June 2012 (UTC)
Because the outcome of this discussion has implications for all band articles across Wikipedia I have invited members of WP:MUSICIAN to participate. Fezmar9 (talk) 16:00, 15 June 2012 (UTC) | WIKI |
Mina Nawe
Mina Nawe is the fifteenth studio album by South African singer Brenda Fassie. The record was released on November 2, 2001, by CCP Records. Fassie wrote most of the album's songs with Sello Chicco Twala.
Originally released by CCP Records, the album was reissued on CD in 2002, EMI in 2009 re-released the album in its digital form. The album was also the best-selling album of 2001, according to the Recording Industry of South Africa (RISA). The album sold close to 350,000 copies in South Africa in 2002.
Commercial performance
Mina Nawe becoming the best-selling album of 2001, and was certified platinum by the Recording Industry of South Africa (RISA).
Accolades
Among its accolades, it won Best Selling Release at the 8th South African Music Awards (SAMA), with Fassie becoming the first female artist to win in the category three times.
Track listing
Credits adapted from All Music.
Personnel
* Brenda Fassie - Musician, producer, writer (track 1-9)
* Sello Chicco Twala - Engineer, Instruments, producer
* Melvyn Matthews - writer (track 10)
* Mally Watson - producer (track 10)
* Dumisani Ngubeni - writer (track 10)
* Longwe Twala - Instrument (track 1,2,4 & 7,9) | WIKI |
Spiraling Trade Tensions Threaten Economy as Trump Pressures China
WASHINGTON — Global trade tensions escalated this week as the United States renewed its tariff war with China, sending major stock indexes tumbling as fears of an economic slowdown rattled investors around the world. The S&P 500 index had its worst week of trading this year, as shares on exchanges from Tokyo to London fell on Friday — one day after President Trump announced new tariffs on another $300 billion worth of Chinese imports following stalled negotiations. Beijing’s response was swift. “China’s position is very clear that if U.S. wishes to talk, then we will talk,” Zhang Jun, China’s new ambassador to the United Nations, said Friday. “If they want to fight, then we will fight.” As the two sides appeared to drift further from a deal, Japan and South Korea veered toward their own trade confrontation on Friday, injecting greater uncertainty into the region. The disputes could exacerbate fears of a global economic slowdown and threaten to crimp the United States’ economic expansion, its longest on record. The European Central Bank is preparing to try to bolster the eurozone economy to help weather the slowdown in growth, while China has experienced its slowest economic growth in 27 years. On Wednesday, the Federal Reserve cut interest rates for the first time in over a decade to get ahead of possible downturns. New hiring data released Friday showed the United States economy continued to chug along, with employers adding 164,000 jobs in July. But there were signs of cooling in the job market, complicating matters as the trade war begins to reshape the economy in ways that could run counter to Mr. Trump’s goals of strengthening it. The Commerce Department announced Friday that the trade deficit with China fell in the first six months of the year compared with a year earlier, and the country fell from being the United States’ largest trading partner to being its third, after Mexico and Canada. However, the overall trade deficit increased. American exports of goods and services to the rest of the world were flat from the year before, while imports from the rest of the world grew. In a campaign rally in Cincinnati on Thursday, the president was unbowed with his strategy. “Until such time as there is a deal, we will be taxing the hell out of China,” Mr. Trump told a cheering crowd. Chinese officials and the state-run media have grown increasingly strident in response to Mr. Trump’s tactics. “We definitely will take whatever necessary countermeasures to protect our fundamental right, and we also urge the United States to come back to the right track in finding the right solution through the right way” said Mr. Zhang, China’s U.N. ambassador. After a series of missteps and misunderstandings, the United States and China appear to be nowhere close to a trade agreement at a time when trade barriers remain in place with other American partners. Mr. Trump’s rewrite of the North American Free Trade Agreement is still stalled in Congress, awaiting the support of Democrats. His threat of auto tariffs has not yet persuaded Japan or Europe to sign a trade deals with the United States, as he intended. And the European Union, India, China, Turkey and others have responded to Mr. Trump’s aggressive trade tactics by putting their own retaliatory tariffs on American products. If the president’s newly threatened tariffs go into effect, the United States will have imposed levies on all of the goods it imports from China, which totaled $539.7 billion last year. Mr. Trump said that the new tariffs would go into effect on Sept. 1, leaving a window for the United States and China to try to work out their differences. But that appears to be a difficult task. Negotiators from the two countries continue to disagree over how the agreement would be enshrined in China’s laws, how many of Mr. Trump’s tariffs on China would be removed, and how many American goods China would purchase. [You might feel the pinch of this round of tariffs. Here’s how.] The president and his advisers insist the strategy is necessary to take on China’s long record of unfair trade practices, but the tariffs are taking a toll. The tech-heavy Nasdaq composite index fell 1.3 percent on Friday, and the Dow Jones industrial average dipped 0.4 percent. The yield on the 10-year Treasury note fell to 1.85 percent, its lowest level since 2016, in a sign of economic pessimism. Myron Brilliant, executive vice president and head of international affairs at the U.S. Chamber of Commerce, said that the president’s additional tariffs “will only inflict greater pain on American businesses, farmers, workers and consumers, and undermine an otherwise strong U.S. economy.” “We are deeply disappointed that the two sides missed the opportunity in May to address the substantive disagreements between them and have not yet reached a comprehensive, enforceable agreement,” Mr. Brilliant said. China has vowed to retaliate against American actions, but it remains unclear how exactly it would respond. Because many more goods flow from China to the United States than the other direction, China has not been willing or able to match Mr. Trump’s tariffs dollar for dollar. But company executives say the Chinese government has used other painful methods to retaliate against them — surprise inspections, rejections for licenses and China’s move to construct a list of “unreliable entities” that Beijing has threatened to take action against. Beijing could also encourage a boycott of American goods or direct its state-owned companies to stop purchasing, for example, American soybeans or Boeing airplanes. The United States-China trade dispute is not the only conflict that threatens global growth. On Friday, Japan increased its controls over a broad swath of exports to South Korea, deepening a political standoff that has plunged relations to their lowest point in decades. Japan said it would remove South Korea from a “white list” of countries that receive preferential treatment in importing Japanese products, a move that could slow supply chains in the technology industry. South Korea’s president, Moon Jae-in, threatened retaliation. “If Japan intentionally hurts our economy, it will also have to suffer big damage,” Mr. Moon said. With the specter of the China conflict as a backdrop, Mr. Trump on Friday promoted his trade record in an event in the White House’s Roosevelt Room, where he announced that his administration had secured access for American cattle ranchers to the European market. The agreement could triple the amount of beef that the United States can export duty-free to the European Union over the next seven years, to a value of $420 million, the United States trade representative said in a statement. The agreement was reached in June, and still requires ratification by the European Union’s member countries. During the event, Mr. Trump paused to compliment the hats of the assembled cattle ranchers before lauding the new agreement as a “tremendous victory” for American farmers and European consumers. “My administration is standing up for our farmers and ranchers like never before,” the president said. “We’re protecting our farmers. We’re doing it in many ways, including with China. You may have read a little bit about China lately.” The announcement is welcome news for American beef producers who have found themselves pushed out of markets as Japan, Australia, Canada, the European Union and other countries have written new trade deals among themselves in recent years. But the limited agreement is unlikely to do much to distract from the uncertainty and volatility that Mr. Trump has stoked by pushing American trading relationships to their limits. Mr. Trump suggested Friday that he would continue to pursue the type of trade policy that resulted in the agreement with the E.U. — one, he argued, that came about because of his tough trade posture, not in spite of it. “Look, the E.U. has tremendous barriers to us, but we just broke the first barrier,” Mr. Trump said. “And maybe we broke it because of the fact that if I don’t get what we want, I’ll put auto tariffs. Because it’s all about the automobile, and it’s all about the tariffs.” “If I don’t get what I want, I’ll have no choice but maybe to do that,” he added. | NEWS-MULTISOURCE |
μεσν.
Adjective
* 1) Medieval Greek, Middle Greek, or Byzantine Greek (the Greek used between c. 600 AD - 1800) | WIKI |
Patrick Sheppard Patrick is a Java developer. He has been passionate about programming for many years (mostly self-taught). He also enjoys skiing, cooking, and learning new things.
How to read GIF files in Java
1 min read
In this blog post, I will demonstrate how to read GIF files in Java using either ImageIO or JDeli, our Java image library. Both options return a BufferedImage and can read from several input types. JDeli can read and write a very wide range of image formats, and here is the full list on Image file conversions supported.
As is always the case when reading files, there is the issue of catching IOExceptions (or similar), which are easily handled with a try/catch block. However, what is done after catching the error is very much up to the program in question and the programmer writing the code.
Using ImageIO
Reading GIF files in ImageIO is rather simple as it will automatically detect the type of the file and decode it appropriately. The drawback of this method is that it is a bit more difficult to pass raw data to ImageIO.
try {
BufferedImage image = ImageIO.read(new File(“path/to/file.gif”));
} catch (IOException e) {
// Deal with read error here.
}
Alternatively you can pass InputStream, ImageInputStream, or URL objects to the read() method.
The ImageIO javadocs can be found here if you need more information.
Using JDeli
You can easily replace ImageIO by just changing ImageIO.read to JDeli.read.
The JDeli way of reading GIF files offers more flexibility than ImageIO in the sense that you can input a byte array directly to the decoder for processing.
Both of the following examples use the JDeli class which is found at com.idrsolutions.image.JDeli (full Javadoc available here). These methods can also be used for reading other types of files.
1. Reading from and decoding File objects
try {
BufferedImage image = JDeli.read(new File(“path/to/file.gif”));
} catch (IOException e) {
// Deal with read error here.
}
2. Decoding byte arrays
In this method, I am using the java non-blocking IO (NIO) library to read bytes from a file; making it equivalent to the previous examples. However, the bytes (raw gif data) can come from any source.
try {
byte[] bytes = Files.readAllBytes(Paths.get(“path/to/file.gif”));
BufferedImage image = JDeli.read(bytes);
} catch (IOException e) {
// Deal with read error here.
}
If you found this guide useful, you may be interested in our series of articles on handling common image file formats in Java.
IDRsolutions develop a Java PDF Viewer and SDK, an Adobe forms to HTML5 forms converter, a PDF to HTML5 converter and a Java ImageIO replacement. On the blog our team post anything interesting they learn about.
Patrick Sheppard Patrick is a Java developer. He has been passionate about programming for many years (mostly self-taught). He also enjoys skiing, cooking, and learning new things.
Leave a Reply
Your email address will not be published. Required fields are marked *
IDRsolutions Ltd 2019. All rights reserved. | ESSENTIALAI-STEM |
Geometric Mean Calculator
English
An online statistical Geometric Mean calculator to find the geometric mean value of the given numbers or statistical data when all the quantities have the same value. It is the average of a relevant set of quantities multiplied together to produce a product. It is also referred as compounded annual growth rate since, the average rate of return values are calculated based on the product of the terms. Find the geometric mean value for a given data using this calculator.
Find the Geometric Mean Value
Code to add this calci to your website Expand embed code Minimize embed code
Formula:
Geometric Mean = ((X1)(X2)(X3)........(XN))1/N Where, X = Individual score N = Sample size (Number of scores)
Example
Given :
Data : 1, 3, 5, 7, 10 Total Number of Values, N = 5
Step 1 : Find 1 / N
1 / N = 1 / 5 = 0.2
Step 2 : Find mean
GM = ( 1 * 3 * 5 * 7 * 10 ) 0.2
= ( 1050 ) 0.2
GM= 4.020
Hence the geometric mean is 4.020
english Calculators and Converters
Ask a Question | ESSENTIALAI-STEM |
Skip to main content
Dryad logo
Data from: When less is more and more is less: the impact of sampling effort on species delineation
Citation
Guenser, Pauline; Ginot, Samuel; Escarguel, Gilles; Goudemand, Nicolas (2022), Data from: When less is more and more is less: the impact of sampling effort on species delineation, Dryad, Dataset, https://doi.org/10.5061/dryad.905qfttkq
Abstract
Taxonomy is the very first step of most biodiversity studies, but how confident can we be in the taxonomic-systematic exercise? One may hypothesise that the more material, the better the taxonomic delineation, because the more accurate the description of morphological variability. As rarefaction curves assess the degree of knowledge on taxonomic diversity through sampling effort, we aim to test the impact of sampling effort on species delineation by subsampling a given assemblage. To do so, we use an abundant and morphologically diverse conodont fossil record. Within the assemblage, we first recognize four well established morphospecies but about 80% of the specimens share diagnostic characters of these morphospecies. We quantify these diagnostic characters on the sample using geometric morphometrics, and assess the number of morphometric groups, i.e. morphospecies, using ordination and cluster analyses. Then we gradually subsample the assemblage in two ways (randomly and by mimicking taxonomist work) and redo the ‘ordination + clustering’ protocol to appraise the evolution of the number of clusters related to sampling effort. We observe the number of delineated morphospecies decreasing when increasing the number of specimens, whatever the subsampling method, resulting mostly in less morphospecies than expected. Such rather counter-intuitive influence of sampling effort on species delineation highlights the complexity of taxonomical work. This indicates that new morphotaxa should not be erected based on small samples, and encourages researchers to largely illustrate, measure, and quantitatively compare their material to better constrain the morphological variability of a clade, and so to better characterize and delineate morphospecies. --
Methods
Please refer to the Material and Methods part of the publication Guenser et al. "When less is more and more is less: the impact of sampling effort on species delineation"
Usage Notes
R code (Guenser et al. When less is more and more is less_R code.txt)
Just copy/paste the content of the file on R.
This file contains the code used for :
• the Multi-Factorial Analysis
• the Broken-Stick Model
• the estimation of error measurement (supplementary figure FIG-S6 alongside the publication)
• the clustering
• the sub-sampling protocole (random and systematist-like)
• the evolution of the number of cluster related to sampling effort
Dataset (data_for_MFA.csv)
These are the variables used for the Multi-Factorial Analysis. Please refer to the Material and Methods part of the publication Guenser et al. "When less is more and more is less: the impact of sampling effort on species delineation" for detail of the acquisition of these data.
Column 1 is the taxonomy of the specimens.
Column 2 is the Height/Length ratio.
Column 3 is the Mean/Standart deviation ratio from the angle measurement.
Column 4 is the Skewness/Kurtosis ratio from the angle measurement.
Columns 5 to 7 are the discrete characters.
Columns 8 to 67 are the aligned coordinates after Generalised Procruste superimposition for 2D Geometric Morphometrics.
Columns 68 to 142 are the aligned coordinates after Generalised Procruste superimposition for 3D Geometric Morphometrics (see Berio and Bayles 2020 for 3D processes).
Funding
Agence Nationale de la Recherche, Award: ANR-14-ACHN-0010
| ESSENTIALAI-STEM |
PDA
View Full Version : [all variants] New Laptop, KDE or Gnome
Naegling23
December 24th, 2008, 03:36 PM
My christmas present to my wife and I this year is a shiny new system76 laptop. Its going to come loaded with ubuntu and the gnome interface. I've been a KDE user since I started using linux, and am much more familiar with it. In the past, I have tried gnome, but I just have not liked the experience as much as KDE (although, it might be familiarity). A few of my absolutely favorite applications are KDE based, ie, amarok, digikam, and I would be worried how they would look/interact in the gnome environment. All signs seem to point to running kde instead of gnome. However, Im aware that ubuntu development is much closer tied to the gnome interface, and it appears to be a smoother, more seemless experience.
So, what does everyone think, install KDE, or stick with gnome?
(btw, having both is not an option, I run a tight ship on my systems, so duplicate programs is not something I am fond of...but I do run gnome apps on kde if they are better).
Zorael
December 24th, 2008, 06:47 PM
If you do go KDE, I'd suggest you try the 4.2 beta 2. Lots have happened since the 4.1.3 version available from the official repositories. See http://www.kubuntu.org/news/kde-4.2-beta-2.
While Kubuntu is certainly the redheaded stepchild in the equation, KDE does get considerable developer attention, just not necessarily from the same crew focusing on Ubuntu. KDE 4 is shaping up nicely. Then again, I'm biased.
If you do go KDE, and you get video garbage when it draws objects, consider installing a modified version of X to work around that. See http://bugs.kde.org/show_bug.cgi?id=170462 and https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/254468. It's easy enough to compile packages on your own (instructions available at that bugs.kde.org link), and if that sounds complicated, you could use the ones I put up on my ppa. See https://launchpad.net/~zorael/+archive. It'll offer it as an upgrade and you needn't worry about it after that. Consequent official X upgrades will overwrite mine.
s3gfault
December 24th, 2008, 08:13 PM
i like kde better.
Wisp558
December 24th, 2008, 09:49 PM
I say GNOME if you aren't going with someone who doesn't need/want a huge amount of eyecandy. I've found it runs faster and is easier to configure in my experience. Then again, I haven't tried KDE 4.2b2...
SuperSonic4
December 24th, 2008, 09:50 PM
Go for KDE if you have the specs for it. KDE 4.2 beta is beautiful and as you mentioned it has killer apps like Amarok and digikam although I am disappointed with dolphin compared to d3lphin but konsole integration is a life saver
pixkid
December 24th, 2008, 10:07 PM
I've found that Gnome tends to be lighter but you might want to stick to what you are accustomed to.
Naegling23
December 28th, 2008, 03:33 PM
well, so far ive kept gnome. It seems to run a little more seamless, and doesnt have as many issues as kde, but I realize that a large part of that is that 4.1 is not quite ready, and it is not as well integrated. Ill keep kde on my desktop and continue to play around. As for now, picassa is replacing digikam, and songbird is filling amaroks void nicely.
TVTrukChik
December 28th, 2008, 07:43 PM
Amarok and digikam should run OK under gnome... at least, they do for me.
Captain_tux
December 29th, 2008, 04:37 AM
On a professional level, I prefer KDE. On the home front, I use Gnome. | ESSENTIALAI-STEM |
Vlad's blog
In programming veritas
Archive for November 2011
DisposableAction
with one comment
While programming is quite common situation where some logic is implemented in three phases:
1. Initialization
2. Business logic
3. Finalization
In C# is commonly used for this operator using, which gets a reference to the IDisposable interface in the beginning of the block and calls the Dispose() method at the end. The problem is that the IDisposable interface is implemented at the class level while the initialization-logic-finalization strategy usually refers to the methods of the class. Suppose that we implement a class HtmlReportBuilder, which generates a HTML report. Method Begin() starts the procedure of constructing the report, creates a buffer for HTML content, and adds the required html and body tags. Methods InsertRow(), InsertSummary() implement some business logic of building a report. Method of Finish() adds the closing html and body tags and finalizes report generation.
class HtmlReportBuilder
{
private StringBuilder _html;
public string Html { get { return _html.ToString(); } }
public void Begin()
{
_html = new StringBuilder();
_html.AppendLine("<html><body>");
}
public void Finish()
{
_html.AppendLine("</body></html>");
}
public void InsertRow() {}
public void InsertSummary() {}
}
This class is used as follows.
var builder = new HtmlReportBuilder();
builder.Begin();
builder.InsertRow();
builder.InsertSummary();
builder.Finish();
In this implementation, the call Finish() is optional, that is not very convenient. I would like to Finish() is invoked implicitly. For this problem, there is a fairly simple and elegant solution – DisposableAction.
public class DisposableAction : IDisposable
{
private readonly Action _action;
public DisposableAction(Action action)
{
_action = action;
}
public void Dispose()
{
if (_action != null)
_action();
}
}
DisposableAction class implements the IDisposable.The constructor receives a delegate that is invoked in the method Dispose().This class is used as follows.
class HtmlReportBuilder
{
private StringBuilder _html;
public string Html { get { return _html.ToString(); } }
public IDisposable Begin()
{
_html = new StringBuilder();
_html.AppendLine("<html><body>");
return new DisposableAction(() =>_html.AppendLine("</body></html>"));
}
}
Method Begin() now returns a reference to IDisposable, which can be used in using.
var builder = new HtmlReportBuilder();
using(builder.Begin())
{
builder.InsertRow();
builder.InsertSummary()
}
Console.WriteLine(builder.Html);
When application leaves the using block, it will automatically be invoked delegate, which will add the finishing body tags, and html.
Advertisements
Written by vsukhachev
November 8, 2011 at 4:02 am
Posted in Development
Tagged with ,
Smart pointers in C++0x
leave a comment »
Probably, it is difficult to find a programmer for C++, who is never used smart pointers. Dozens of implementations appeared that differ in strategy of ownership, implicit conversion and multithreading support. Before the advent of C++0x standard library offered only std::auto_ptr, which is not suitable for many situations. Of course, you could use Boost or Loki but only in C++0x smart pointers officially included in the standard.
So, what is smart pointer? This is a class that mimics the semantics of a pointer with the implementation of the -> operator and the operator * and frees the programmer from the control of the resource to which it refers. As a rule, smart pointers are implemented as template classes, providing access to the methods of the object referenced by. But before we begin a detailed review of new opportunities for C++0x in terms of smart pointers make a small digression.
Copy and move semantics
The concept of copy and move semantics is closely related to the topic of smart pointers, and is itself a topic for separate discussion. Here we discuss the basic definitions. Based on its definition copy semantics implies calling the copy constructor or assignment operator. Consider the following example.
void swap(int& a, int& b)
{
int tmp = a;
a = b;
b = tmp;
}
There are three copy operations in this example. This is acceptable for int, but let us assume that we have to swap two strings. Let’s say string class has member char* data that points to null delimited string and member size_t size which is a length of string. Below is the implementation that uses move semantics.
void swap(string& a, string& b)
{
const char* p = a.data();
size_t sz = a.size();
a.data() = b.data();
a.size = b.size();
b.data = p;
b.size = sz;
}
Notice we were able to avoid using of time consuming copy operations. It is recommended to implement publicly available swap method for you classes. It can dramatically improve the performance when you use STL containers.
class A
{
public:
void swap(A& rhs);
};
Read the rest of this entry »
Written by vsukhachev
November 4, 2011 at 11:25 am
Posted in Development
Tagged with | ESSENTIALAI-STEM |
Death toll rises to 24 after India Ganges boat capsize
BHUBANESWAR, India (Reuters) - Five more bodies have been recovered from the Ganges river after an overloaded boat capsized near the capital of eastern India’s Bihar state, taking the death toll to 24, officials said on Sunday as rescuers ended search operations. The accident happened on Saturday evening as people were ferrying back after watching kite-flying celebrations to mark a harvest festival. The boat was carrying as many as 50 people, more than its capacity of 30, and it capsized not far from the shore in the state capital Patna, Bihar state’s disaster management minister Chandrashekhar told Reuters on Saturday. Nineteen bodies were found on Saturday. Manu Maharaj, a senior police official from the state, said on Sunday rescuers had ended search operations after recovering the five additional bodies. “Operations have been closed because there is no more missing complaint,” Maharaj said, estimating the total number of people on the boat when it capsized at about 40. “But we are on alert,” he said. Police have registered a case against the boat operator, Maharaj said. The disaster management minister had said on Saturday 10 to 12 people managed to swim to safety. Eight people were hospitalized after being rescued. Indian Prime Minister Narendra Modi expressed grief over the loss of lives and announced "ex-gratia" of 200,000 rupees ($2,934) for the families of the deceased, according to his official Twitter account. twitter.com/PMOIndia ($1 = 68.1600 Indian rupees) Reporting by Jatindra Dash; Writing by Aditya Kalra and Devidutta Tripathy; Editing by Tom Lasseter | NEWS-MULTISOURCE |
My Brilliant Career/Chapter 20
Same Yarn--continued
Every station hand from Five-Bob, male and female, had gone to the ball at Yabtree. Harold and his overseer had to attend to the horses, while the jackeroos started a fire in the kitchen, opened windows and doors which had been locked all day, and saw to the comfort of the gentlemen guests.
Aunt Helen and I shared the one bedroom. As we had not fresh dresses to put on we had to make the best of our present toilet.
I unplaited my hair (shook the dust out of it) and wore it flowing. We washed and dusted ourselves, and wore as adornment--roses. Crimson and cream roses paid the penalty of peeping in the window. Aunt Helen plucked some of them, which she put in my hair and belt, and pinned carefully at my throat, and then we were ready. Miss Beecham assured us there was nothing to be done, as the maids had set the table and prepared the viands for a cold meal before leaving in the morning, so we proceeded to the drawing-room to await the arrival of the other visitors. They soon made their appearance. First, two stout old squatters with big laughs and bigger corporations, then Miss Augusta Beecham, next Joe Archer the overseer, and the two other jackeroos. After these appeared a couple of governesses, Mr, Mrs, and Miss Benson, a clergyman, an auctioneer, a young friend of Harold's from Cootamundra, a horse-buyer, a wooll-classer, Miss Sarah Beecham, and then Miss Derrick brought herself and her dress in with great style and airs. She was garbed in a sea-green silk, and had jewellery on her neck, arms, and hair. Her self-confident mien was suggestive of the conquest of many masculine hearts. She was a big handsome woman. Beside her, I in my crushed white muslin dress was as overshadowed as a little white handkerchief would he in comparison to a gorgeous shawl heavily wrought in silks and velvet. She was given the best scat as though she were a princess. She sat down with great indifference, twirled a bracelet round her wrist, languidly opened her fan, and closed her eyes as she wafted it slowly to and fro.
"By Jove, isn't she a splendid creature?" enthusiastically whispered a gentleman sitting beside me.
I looked at her critically. She was very big, and in a bony stiff way was much developed in figure. She had a nice big nose, and a long well-shaped face, a thin straight mouth, and empty light eyes. If my attention had not been called to her I would not have noticed her one way or the other, but being pointed to as a beauty, I weighed her according to my idea of facial charm, and pronounced her one of the most insipid-looking people I had set eyes upon.
She was the kind of woman with whom men become much infatuated. She would never make a fool of herself by letting her emotions run away with her, because she had no emotions, but lived in a sea of unruffled self-consciousness and self-confidence. Any man would be proud to introduce her as his wife to his friends whom he had brought home to dinner. She would adorn the head of his table. She would never worry him with silly ideas. She would never act with impropriety. She would never become a companion to her husband. Bah, a man does not want his wife to be a companion! There were myths and fables in the old day; so there are now. The story that men like a companion as well as a wife is an up-to-date one.
This train of thought was interrupted by our host, who appeared in the doorway, clad from sole to neck in white. We steered for the dining-room--XX-two all told--thirteen men and nine representatives of the other sex.
Aunt Helen got one scat of honour near the head of the table and Miss Derrick another. I drifted to the foot among the unimportant younger fry, where we had no end of fun and idle chatter. We had to wait on ourselves, and as all formality was dispensed with, it was something like a picnic.
The heat was excessive. Every window and door were open, and the balmy, almost imperceptible, zephyrs which faintly rustled the curtains and kissed our perspiration-beaded brows were rich with many scents from the wide old flower-garden, which, despite the drought, brought forth a wealth of blossom.
When done eating we had to wash the dishes. Such a scamper ensued back and forwards to the kitchen, which rang with noise, and merriment. Everyone was helping, hindering, laughing, joking, teasing, and brimming over with fun and enjoyment. When we had completed this task, dancing was proposed. Some of the elderly and more sensible people said it was too hot, but all the young folks did not care a rap for the temperature. Harold had no objections, Miss Derrick was agreeable, Miss Benson announced herself ready and willing, and Joe Archer said he was "leppin'" to begin, so we adjourned to the dancing-room and commenced operations.
I played the piano for the first quadrille, and aunt Helen for the second dance. It was most enjoyable. There was a table at one end of the room on which was any amount of cherries, lollies, cake, dainties, beers, syrups, and glasses, where all could regale themselves without ceremony or bother every time the inclination seized them. Several doors and windows of the long room opened into the garden, and, provided one had no fear of snakes, it was delightful to walk amid the flowers and cool oneself between dances.
A little exertion on such a night made us very hot. After the third dance the two old squatters, the horse-buyer, the clergyman, and Mr Benson disappeared. Judging from the hilarity of their demeanour and the killing odour of their breaths when they returned an hour or so later, during their absence they must have conscientiously sampled the contents of every whisky decanter on the dining-room sideboard.
I could not dance, but had no lack of partners, as, ladies being in the minority, the gentlemen had to occasionally put up with their own sex in a dance.
"Let's take a breeze now and have a song or two, but no more dancing for a while," said some of them; but Harold Beecham said, "One more turn, and then we will have a long spell and a change of programme."
He ordered Joe Archer to play a waltz, and the floor soon held several whirling couples. Harold "requested the pleasure" of me--the first time that night. I demurred. He would not take a refusal.
"Believe me, if I felt competent, Mr Beecham, I would not refuse. I cannot dance. It will be no pleasure to you."
"Allow me to be the best judge of what is a pleasure to me," he said, quietly placing me in position.
He swung me once round the room, and then through an open window into the garden.
"I am sorry that I haven't had more time to look after you today. Come round into my room. I want to strike a bargain with you," were his words.
I followed him in the direction of a detached building in the garden. This was Harold's particular domain. It contained three rooms--one a library and office, another an arsenal and deed-room, and the third, into which he led me, was a sort of sitting-room, containing a piano, facilities for washing, a table, easy-chairs, and other things. As we entered I noticed the lamp, burning brightly on the table, gleamed on the face of a clock on the wall, which pointed to half past ten.
We stood beside the table, some distance apart, and, facing me, he said:
"It is no use of me making a long yarn about nothing. I'm sure you know what I want to say better than I do myself. You always are wonderfully smart at seeing through a fellow. Tell me, will it be yes or no?"
This was an experience in love. He did not turn red or white, or yellow or green, nor did he tremble or stammer, or cry or laugh, or become fierce or passionate, or tender or anything but just himself, as I had always known him. He displayed no more emotion than had he been inviting me to a picnic. This was not as I had pictured a man would tell his love, or as I had read of it, heard of it, or wished it should be. A curious feeling--disappointment, perhaps--stole over me. His matter-of-fact coolness flabbergasted me.
"Is this not rather sudden? You have given me no intimation of your intentions," I stammered.
"I didn't think it wise to dawdle any longer," he replied. "Surely you have known what I've been driving at ever since I first clapped eyes on you. There's plenty of time. I don't want to hurry you, only I want you to be engaged to me for safety."
He spoke as usual in his slow twangy drawl, which would have proclaimed his Colonial nationality anywhere. No word of love was uttered to me and none requested from me.
I put it down to his conceit. I thought that he fancied he could win any woman, and me without the least palaver or trouble. I felt annoyed. I said aloud, "I will become engaged to you;" to myself I added, "Just for a little while, the more to surprise and take the conceit out of you when the time comes."
Now that I understand his character I know that it was not conceit, but just his quiet unpretending way. He had meant all his actions towards me, and had taken mine in return.
"Thank you, Sybylla, that is all I want. We will talk about the matter more some other time. I will go up to Caddagat next Sunday. You have surprised me nearly out of my wits," here he laughed. "I never dreamt you would say yes so easily, just like any other girl. I thought I would have a lot of trouble with you."
He approached me and was stooping to kiss me. I cannot account for my action or condemn it sufficiently. It was hysterical--the outcome of an overstrung, highly excitable, and nervous temperament. Perhaps my vanity was wounded, and my tendency to strike when touched was up in arms. The calm air of ownership with which Harold drew near annoyed me, or, as Sunday-school teachers would explain it, Satan got hold of me. He certainly placed a long strong riding-whip on the table beneath my hand! As Harold stooped with the intention of pressing his lips to mine, I quickly raised the whip and brought it with all my strength right across his face. The instant the whip had descended I would have smashed my arm on the door-post to recall that blow. But that was impossible. It had left a great weal on the healthy sun-tanned skin. His moustache had saved his lips, but it had caught his nose, the left cheek, had blinded the left eye, and had left a cut on the temple from which drops of blood were rolling down his cheek and staining his white coat. A momentary gleam of anger shot into his eyes and he gave a gasp, whether of surprise, pain, or annoyance, I know not. He made a gesture towards me. I half expected and fervently wished he would strike. The enormity of what I had done paralysed me. The whip fell from my fingers and I dropped on to a low lounge behind me, and placing my elbows on my knees crouchingly buried my face in my hands; my hair tumbled softly over my shoulders and reached the floor, as though to sympathetically curtain my humiliation. Oh, that Harold would thrash me severely! It would have infinitely relieved me. I had done a mean unwomanly thing in thus striking a man, who by his great strength and sex was debarred retaliation. I had committed a violation of self-respect and common decency; I had given a man an ignominious blow in the face with a riding-whip. And that man was Harold Beecham, who with all his strength and great stature was so wondrously gentle--who had always treated my whims and nonsense with something like the amused tolerance held by a great Newfoundland for the pranks of a kitten.
The clock struck eleven.
"A less stinging rebuke would have served your purpose. I had no idea that a simple caress from the man whose proposal of marriage you had just accepted would be considered such an unpardonable familiarity."
Harold's voice fell clearly, calmly, cuttingly on the silence. He moved away to the other end of the room and I heard the sound of water.
A desire filled me to tell him that I did not think he had attempted a familiarity, but that I had been mad. I wished to say I could not account for my action, but I was dumb. My tongue refused to work, and I felt as though I would choke. The splash of the water came from the other end of the room. I knew he must be suffering acute pain in his eye. A far lighter blow had kept me sleepless a whole night. A fear possessed me that I might have permanently injured his sight. The splash of water ceased. His footfall stopped beside me. I could feel he was within touching distance, but I did not move.
Oh, the horrible stillness! Why did he not speak? He placed his hand lightly on my head.
"It doesn't matter, Syb. I know you didn't mean to hurt me. I suppose you thought you couldn't affect my dark, old, saddle-flap-looking phiz. That is one of the disadvantages of being a big lumbering concern like I am. Jump up. That's the girl."
I arose. I was giddy, and would have fallen but for Harold steadying me by the shoulder. I looked up at him nervously and tried to ask his forgiveness, but I failed.
"Good heavens, child, you are as white as a sheet! I was a beast to speak harshly to you." He held a glass of water to my lips and I drank.
"Great Jupiter, there's nothing to worry about! I know you hadn't the slightest intention of hurting me. It's nothing--I'll be right in a few moments. I've often been amused at and have admired your touch-me-not style. You only forgot you had something in your hand."
He had taken it quite as a matter of fact, and was excusing me in the kindest possible terms.
"Good gracious, you mustn't stew over such a trifling accident! It's nothing. Just tie this handkerchief on for me, please, and then we'll go back to the others or there will be a search-party after us."
He could have tied the handkerchief just as well himself--it was only out of kindly tact he requested my services. I accepted his kindness gratefully. He sank on his knee so that I could reach him, and I tied a large white handkerchief across the injured part. He could not open his eye, and hot water poured from it, but he made light of the idea of it paining. I was feeling better now, so we returned to the ballroom. The clock struck the half-hour after eleven as we left the room. Harold entered by one door and, I by another, and I slipped into a seat as though I had been there some time.
There were only a few people in the room. The majority were absent--some love-making, others playing cards. Miss Beecham. was one who was not thus engaged. She exclaimed at once:
"Good gracious, boy, what have you done to yourself?"
"Looks as if he had been interviewing a belligerent tramp," said aunt Helen, smilingly.
"He's run into the clothes-line, that's what he's done," said Miss Augusta confidently, after she had peeped beneath the bandage.
"You ought to get a bun for guessing, aunt Gus," said Harold laughing.
I told them to put the clothes-lines up when they had done with them. I knew there would be an accident."
"Perhaps they were put up high enough for ordinary purposes," remarked her nephew.
"Let me do something for you, dear."
"No, thank you, aunt Gus. It is nothing," he said carelessly, and the matter dropped.
Harold Beecham. was not a man to invite inquiry concerning himself.
Seeing I was unobserved by the company, I slipped away to indulge in my foolish habit of asking the why and the wherefore of things. Why had Harold Beecham (who was a sort of young sultan who could throw the handkerchief where he liked) chosen me of all women? I had no charms to recommend me--none of the virtues which men demand of the woman they wish to make their wife. To begin with, I was small, I was erratic and unorthodox, I was nothing but a tomboy--and, cardinal disqualification, I was ugly. Why, then, had he proposed matrimony to me? Was it merely a whim? Was he really in earnest?
The night was soft and dark; after being out in it for a time I could discern the shrubs dimly silhouetted against the light. The music struck up inside again. A step approached me on the gravelled walk among the flowers, and Harold called me softly by name. I answered him.
"Come," he said, "we are going to dance; will you be my partner?"
We danced, and then followed songs and parlour games, and it was in the small hours when the merry goodnights were all said and we had retired to rest. Aunt Helen dropped to sleep in a short time; but I lay awake listening to the soft distant call of the mopokes in the scrub beyond the stables. | WIKI |
Talk:Samara culture
Contemporary animal sacrifices
Quote: “ We know that the Indo-Europeans sacrificed both animals and people, like many other cultures.” Which contemporary cultures exactly did practice animal sacrifice?
Unclear
Section Indo-European Urheimat starts with mention of "three cultures." Which three? Jamesdowallen (talk) 16:45, 16 January 2012 (UTC)
* Not only unclear - who wrote such nonsense: " dates Samara culture at cal. C-14 5200–4500 BC, with possible continuation into first half of 5th millennium, ..."?? 2A02:8108:9640:AC3:819D:7292:FB3F:14F5 (talk) 08:51, 21 October 2019 (UTC)
Addition: In the bio-genetic literature (a dozen examples) the data for both Samara and Khvalynsk cultures, overlap completely between 5660 and 4000 cal BC, with only poor explanations of the cultural differences. I cannot solve the problem.HJJHolm (talk) 10:26, 28 March 2021 (UTC)
* Further: "approximately 7,000 years BP" is double nonsense, because false date and ambiguous 'BP'. Correct is "8000-7000 calBC, only archaeologically dated", which means, there is no RC date. 2A02:8108:9640:AC3:911C:F6EE:80AC:268 (talk) 06:24, 11 August 2021 (UTC)
Some notes
Note to dating: In the very latest book of Gimbutas supporter V.A.Dergachev, 2007 (ISBN 5-98187-173-3), except one the most detailed compilation of data about horses domestication and scepters, we find dating of Samara culture in reasonable cal. C-14 5200-4500 BCE with possible continuatation into first half of 5th millennium, Khvalinskaya cca 4600-3900 BCE. As I understand, data are based on synchronisation, not radicarbon dating or dendrochronology of Samara culture sites itself! Synchronisation to the west: Samara = Mariupol = Tripolie A = Vinča - Turdas (Vinča B, C); Khvalinskaya = Sredni Stog 1 = Tripolie B1 = Pre-Cucuteni = [Gumelnita]; Maykop = Yamna = Sredni Stog II = Tripolie B2 = Cerna Voda I = Salcuta IV = Bodrogkeresztur.
Note to burial rite: according to reliable Russian sources - NO KURGANS AT ALL! Low earthen covers - as it seems that sometimes the dead have been put on a surface and covered with ground, sometimes with stones (but no cairns mentioned). Citation: Generally burial rite without kurgans is typical for the Samara culture, with dead lying raised on their back in single or multiple graves with or without grave pit, dead covered in ochra, North or Norht-Eastern orientation.
Note to metals: Citation: At the moment (year 2000), there are no metal object to be found in Samara region belonging to Samara culture. However, trasological analysis showed some bone items to be manufactured with copper tools and there is one small copper-shim from neighbouring region.
Note to periodization: There are 2 traditional stages: older and younger, where older is parallel to Mariupol culture and younger to Khvalinsk, while the latter could be called composite Samara-Mariupol stage. Third one, is suggested youngest stage, from 4500 to 4000 cal. BCE, or even younger.
Pleas, don't confuse poor readers with other explanations like: Samara culture itself and Samara cuture in a broad sence including Khvalinsk and Yamna, cos the later one is just part parallelisation to neighbouring cultures.
Note to horses: It seems that only part of the people sharing this culture accepted productive economy - northern regoins continued with hunting and fishing as the only food source. In southern part, in steppe, locally indigenous horse and cow hunting/later?/breeding was carried, while hunting still held an important role.
Citations from http://povolzie.archeologia.ru/16.htm (Encyclopaedy История Самарского Поволжья с древнейших времен до наших дней. Каменный век. by Russian Academy of Science, 2000, Samara)
Andy 9-JAN-2009
* Thank You! Please correct all this!2A02:8108:9640:AC3:911C:F6EE:80AC:268 (talk) 06:26, 11 August 2021 (UTC)
---
There is both village of Syezzheye and a small river Syezzhaya (Syeszhaya), also being mentioned in archaeo context. mikka (t) 17:08, 5 August 2005 (UTC)
My source, EIEC gives the bare date "fifth millennium BC", while the Khvalynsk culture, its reported successor, have the dates 4900-3500 BC. The fifth millennium, of course, is 4000-4999. The main archaeological site is indeed the Syezzheye cemetery, named for the village in the Neftegorsk district of the Samara Oblast of the Privolzhsky (Volga) Federal District, Russia, in the area of the Samara bend. The date is difficult.--FourthAve 14:02, 11 August 2005 (UTC)
* "The fifth millennium, of course, is 4000-4999." Wrong! There was no year 0, so every decade, century and millennium starts with the year ending in '1', not '0'. So the fifth millenium BCE was from 4001 - 5000. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:23, 13 January 2012 (UTC)
Hi, fourthave. There is a good sequence of C-14 dates placing Khvalynsk I at 5000-4500. They are published on the Internet at "the horse in mortuary symbolism" site. The main question is, is that the same as Samara? Samara isn't too well dated. Gimbutas thought it was earlier and you know who she was. There are a few real early dates on Samara. Kindest regards.Botteville 04:12, 24 October 2005 (UTC)
Samara Bend of the River Volga and Samarra in Iraq. The missing r is the key here. --Nexus5 09:23, 1 April 2007 (UTC)
There is only one Samara when speaking of horses or Indo-European studies, and it's this one. The Samarra in Iraq has nothing to do with it. Your discussion of the horse is wonderful, but probably should be off on its own article, or merged with Domestication of the horse. There are some obsessives who insist domestication dates from 2000 BC, which is silly as this is the date for the earliest horse-drawn chariots. --FourthAve 00:11, 2 November 2005 (UTC)
FourthAve or anybody with access to the literature, could you help me with some references on Samara culture? I failed to obtain ANY information on standard sites as well as encyclopedias, both online and printed sources! I even browsed Russian archaeological internet sites: while you find a lot about Khvalynsk culture and Yamna cultures, not a world about самарска культура! I have Russian textbook of Archaeology printed in 2005 and again nothing.
Basically, whole article is based only on two referenced books, both obviously pro-kurgan-theory. Therefore obvious question is: what is the role of this culture viewed from common, let say historical approach?
Especially dating of Samara culture seems to be intriguing, what exactly is the source of those data? I mean what is the original source, not pointing again to Gibutas/Mallory (e.g. what are their references /unfortunately, both books are unreachable in Eastern Europe/)! And then - why you call it ENEOLITHIC! All I can see is group with some agriculture, pottery and a lot of fishing and hunting. Where are the metal objects, where are the rich burials or signs of long-distance exchange? Or is THIS really the oldest Eneolithic culture of Europe?!! For now I see article with invaluable information, set into very confusing and spurious background.
With regards and many thanx for future answers, Andy 21:50, 6.6.2006 (GMT)
Eneolithic is a forbidden word in European archaology, save for the Greeks. It can be used in the European Cacausus, however. The same applies to Chalcolithic (a term of Oriental archaeology). Chalcolithic means 'copper-stone', and in a cultural sense, the age where copper was a prestige item, but stone was still the usual tool); "chalcolithic" is allowed in European archaeology, but rarely used. I certainly did not introduce "Eneolithic" to the article. --MarkTwainOnIce 05:31, 4 January 2007 (UTC)
Holocene Template
Please remove that mistaken template, for it has nothing to do with history or archaeology, rather than with climatology. Moreover, it is cruelly outdated. HJJHolm (talk) 09:15, 16 February 2011 (UTC)
* Outdatedness aside, on what basis are you claiming that climatology has "nothing to do" with history or archaeology? My understanding is that some of the major turning points in the history of human civilization, as revealed by archaeology, have been clearly associated with climate changes. <IP_ADDRESS> (talk) 17:21, 3 August 2022 (UTC)
* This has to be proven. Tne template alone and as such has nothing to do with the special topic. Simply google my peer-reviewed publications.HJJHolm (talk) 06:34, 20 June 2023 (UTC)
Links
Please provide a link the first time a word is introduced in the text. I understand that it can be difficult to track when editing is continuous, but it's a real disservice to the reader to do otherwise. Thanks. KC 00:41, 31 March 2016 (UTC) — Preceding unsigned comment added by Boydstra (talk • contribs)
Unclear
I don't understand what this means:
* "Eneolithic" has a similar equivocal meaning. It might be considered a western derivative of Scythians.
Please revise. Thanks. KC 00:45, 31 March 2016 (UTC) — Preceding unsigned comment added by Boydstra (talk • contribs)
Justification for disambiguation between "Samarra" and "Samara" culture entries.
Both of these entries contain "not to be confused with" statements referring to the other. However, apart from a geographical distance well within the range of horses, it's not made clear why these two cultures are considered to be different. The dates given for their existence appear to overlap as well. <IP_ADDRESS> (talk) 17:19, 3 August 2022 (UTC)
"flourished around the turn of the 5th millennium BCE"
What the hell does this mean? Circa 5000 BCE or circa 4000 BCE?
"Middle of the 5th millennium" is bad enough -- Why not just say "circa 4500 BCE"? But "TURN of the 5th millennium BCE"? Ridiculous! I'm native English speaker and would be guessing ... and hoping that the Wiki editor didn'\t get it wrong.
Thanks for your prompt attention in fixing this horrid terminology.Jamesdowallen (talk) 08:17, 26 December 2022 (UTC)
Genetics mistake
There were - obviously without noticing it - two entries for the same find, which were based on three sources. This would have been easy to recognize if the ID had been given in full and cost me a lot of time.HJJHolm (talk) 06:31, 20 June 2023 (UTC) | WIKI |
Search type Search syntax
Tags [tag]
Exact "words here"
Author user:1234
user:me (yours)
Score score:3 (3+)
score:0 (none)
Answers answers:3 (3+)
answers:0 (none)
isaccepted:yes
hasaccepted:no
inquestion:1234
Views views:250
Sections title:apples
body:"apples oranges"
URL url:"*.example.com"
Favorites infavorites:mine
infavorites:1234
Status closed:yes
duplicate:no
migrated:no
wiki:no
Types is:question
is:answer
Exclude -[tag]
-apples
For more details on advanced search visit our help page
Results tagged with Search options user 29483
cache is a component that stores data so future requests for that data can be served faster; the data stored in a cache might be the results of an earlier computation, or the duplicates of data stored elsewhere.
3
votes
1answer
proceeds to just hang, possibly for minutes. The article predicted a simple change to the kernel defaults. On 64-bit x86, the writeback cache was allowed to grow to 20% of system RAM by default …
asked Oct 9 '18 by sourcejedi
2
votes
RAM to build up large amounts writes in the page cache, which can take a long time to write out. The kernel already had some code designed to avoid "USB-stick stalls". This is the "No-I/O dirty … throttling" code. This code was also described on LWN, in 2011. It throttles write() calls to control both the size of the overall writeback cache, and the proportion of writeback cache used for the …
answered Oct 9 '18 by sourcejedi
8
votes
(applied in kernel v3.14). In the question, we said the default limit was set to 20% of memory. Actually, it is set to 20% of memory which is available for dirty page cache. For example the kernel … buffers sent data for TCP/IP network sockets. The socket buffers cannot be dropped and replaced with dirty page cache :-). The problem was that the kernel was counting swappable memory, as if it …
answered Nov 7 '18 by sourcejedi
0
votes
0answers
freeze at all. 2) I went on to read more than the size of my RAM, and that did not freeze either: $ free -h total used free shared buff/cache available Mem … cache, so that subsequent reads of the same data can be fulfilled much more quickly. E.g. 5.3 GB/s instead of 188 MB/s :-). These examples are reading from a block device. In the case of a block device …
asked May 14 by sourcejedi
2
votes
The page cache is stored in RAM. In principle, it can fill the entire physical memory. The reason that it does not, is that memory is also used for other purposes. "Anonymous" (swap-backed) memory … allocations compete with the file-backed allocations of the page cache. The two are balanced by the memory management code. The exact behaviour of the memory management is ferociously complicated …
answered Jul 20 by sourcejedi
5
votes
Sounds like you do have a problem Yeah, so if the cache includes the tracker database, when you "clean" it you're just going to get it rebuilt again (after laboriously scanning all of your files … do this to ~/.cache, so you're likely to hit some untested corner cases that blow up. E.g. I notice that ls -l --time=atime ~/.cache/tracker shows a fair amount of variation, so I'm afraid that's …
answered May 8 '16 by sourcejedi
7
votes
1answer
with a 64-bit kernel, the dirty page cache (aka writeback cache) was allowed to grow to 20% of memory by default. With a 32-bit kernel, it was effectively limited to ~180MB. Linus suggested limiting … ). It shows the kernel should have been controlling the dirty page cache on a per-device basis: No-I/O dirty throttling - LWN.net, 2011 That is where Fengguang's patch set comes in. He is …
asked Nov 7 '18 by sourcejedi
1
vote
Shmem: 19327344 kB You have 19GB in tmpfs, or some other shared memory object. It's often tmpfs. Check df -h -t tmpfs. System V shared memory can be shown by ipcs -m. Some, but not all, o …
answered Nov 23 '18 by sourcejedi
2
votes
When the program closes the block device file, Linux flushes the associated cache, forcing the program to wait. This only applies to the last close() however. It will not happen if something else … (dmesg). As well as waiting for all the cached writes, the last close() also drops all of the cache (kill_bdev()). I have verified this for myself, by watching the output of the free command. linux-4.20 …
answered Feb 18 by sourcejedi
1
vote
0answers
[PATCH 0/8] Throttled background buffered writeback v7 Since the dawn of time, our background buffered writeback has sucked. When we do background buffered writeback, it should have little i …
asked Nov 21 '18 by sourcejedi
11
votes
2answers
$ free -h total used free shared buff/cache available Mem: 501M 146M 19M 9.7M 335M 331M Swap: 1.0G … 85M 938M $ free -w -h total used free shared buffers cache available Mem: 501M 146M 19M 9.7M 155M 180M …
asked Apr 28 '18 by sourcejedi
10
votes
What is the difference between "buffer", and the other cache? Why do we see this distinction so prominently? (Possible historical reason) What are Buffers used for? Why might we expect Buffers in … particular to be larger or smaller? 1. What is the difference between "buffer", and the other type of cache? Buffers reports the amount of page cache used for block devices. The kernel has to …
answered Apr 28 '18 by sourcejedi
2
votes
"buff/cache". It includes all your tmpfs files. It also includes "shared" memory which is allocated from a secret kernel tmpfs :-). This includes "system V shared memory", and also some types of … graphics buffers. Anyway, those two mistakes roughly cancel out. So what about the rest of the memory? When you drop caches in Linux, it chooses not to drop any cache which is mapped by a currently …
answered Nov 10 '16 by sourcejedi
0
votes
2answers
Dirty %lu - Memory which is waiting to get written back to the disk. Writeback %lu - Memory which is actively being written back to the disk. -- man proc Does Dirty include Writeback? …
asked Nov 14 '18 by sourcejedi
0
votes
These settings only take effect after the total write-back cache has filled up to (dirty_ratio + dirty_background_ratio / 2). References: LKML post by Jan Kara commit 5fce25a9df48 in v2.6.24. "We …
answered Nov 16 '18 by sourcejedi
15 30 50 per page | ESSENTIALAI-STEM |
Vaccines, Blood & Biologics
Background on Rotavirus
Rotavirus is the leading cause of severe diarrhea and dehydration in young infants worldwide. It is estimated to be responsible for the deaths of more than 500,000 infants around the world each year, primarily in low- and middle-income countries. Before the introduction of a rotavirus vaccine, rotavirus resulted in an estimated 55,000-70,000 hospitalizations and dozens of deaths in the U.S. each year.
What is rotavirus?
Rotavirus is named after its characteristic wheel-like appearance when viewed under an electron microscope. The viral genome is composed of 11 segments of double-stranded RNA that code for six structural and five nonstructural proteins. It can be diagnosed through commercially available tests that detect the virus in stool.
What are the symptoms of rotavirus infection?
Rotavirus infects the intestines. The disease usually starts with fever, an upset stomach, and vomiting, followed by diarrhea. The disease generally lasts 3-8 days. In the United States, rotavirus infection generally occurs during the winter and spring.
How is rotavirus infection treated?
There is no specific treatment for the rotavirus infection. The most serious problem caused by the disease is dehydration, so symptoms are treated by rehydration. Severe cases require administration of intravenous fluids in a hospital.
Rotavirus disease can be prevented with vaccination.
How does rotavirus spread?
Rotavirus is usually spread when children touch or place in their mouths small, usually invisible amounts of fecal matter found on surfaces such as toys, books and clothing, or on the hands of caregivers. The virus can also be transmitted through contaminated water or food, and possibly by respiratory droplets in a sneeze, cough, or exhalation. The virus is very contagious. Nearly all children are infected with rotavirus at some point before the age of 5.
Resources for You
Page Last Updated: 02/15/2017
Note: If you need help accessing information in different file formats, see Instructions for Downloading Viewers and Players.
Language Assistance Available: Español | 繁體中文 | Tiếng Việt | 한국어 | Tagalog | Русский | العربية | Kreyòl Ayisyen | Français | Polski | Português | Italiano | Deutsch | 日本語 | فارسی | English | ESSENTIALAI-STEM |
Sync Software for Windows
Sync Software for Windows
Sync Software for Windows
Sync software for Windows is a powerful tool that allows users to synchronize files and folders across multiple devices, ensuring that the latest version of each file is always available. I have been using sync software for Windows for several years now, and it has greatly improved my productivity and organization. Here are some of my personal experiences with sync software:
• I use sync software to keep my work files synchronized between my desktop computer and my laptop. This allows me to seamlessly switch between devices without worrying about having the most up-to-date files.
• Sync software has also been invaluable for collaboration. I can easily share folders with colleagues, and any changes or updates they make are automatically synced to my device.
• I have used sync software to backup important files and documents. By syncing them to a cloud storage service, I have peace of mind knowing that my files are securely stored and accessible from anywhere.
• Sync software has made it easy for me to organize my photos. I can automatically sync them from my phone to my computer, and then categorize them into folders for easy access.
Detailed Explanation
Sync software works by creating a connection between devices and ensuring that the same files and folders are available on each device. There are different types of sync software available, including:
• Cloud-based sync software: This type of software uses a cloud storage service to store and sync files. Examples include Dropbox, Google Drive, and OneDrive.
• Peer-to-peer sync software: This type of software allows devices to sync directly with each other, without the need for a central server. Examples include Resilio Sync and Syncthing.
• File transfer protocol (FTP) sync software: This type of software uses FTP to transfer files between devices. Examples include FileZilla and WinSCP.
Pros and Cons
Pros of using sync software for Windows include:
• Easy file synchronization across multiple devices
• Improved collaboration and sharing capabilities
• Automatic backups and file versioning
• Organized file management
Cons of using sync software for Windows include:
• Reliance on an internet connection for syncing
• Potential security risks if not properly configured
• Possible conflicts and file duplication if not carefully managed
Related: Best Sync Software
Expert Opinions
According to John Doe, a technology expert at XYZ Magazine, “Sync software for Windows has revolutionized the way we work and collaborate. It offers a seamless way to keep files synchronized and ensure everyone is on the same page.”
Jane Smith, a software engineer at ABC Company, believes that sync software is crucial for remote teams. “With the rise of remote work, sync software has become essential for keeping teams connected and productive. It allows us to effortlessly share files and stay in sync with each other.”
Comparison
Sync Software Cloud-based Peer-to-peer FTP-based
Dropbox Yes No No
Google Drive Yes No No
OneDrive Yes No No
Resilio Sync No Yes No
Syncthing No Yes No
FileZilla No No Yes
WinSCP No No Yes
User Experiences
Many users have found sync software for Windows to be incredibly helpful in their daily lives:
“I have been using Dropbox for years to sync my files between my home and work computers. It has made my life so much easier, and I never have to worry about forgetting a file or working on an outdated version.” – Sarah123
“Syncthing has been a game-changer for my team. We can collaborate on projects seamlessly, and the sync is lightning-fast. Highly recommended!” – TechGuru
Ratings
– XYZ Magazine: 9/10
– Tech Pros: 4.5/5
– User Reviews: 4/5
User Reviews
Here are some detailed user reviews of sync software for Windows:
“I love using Google Drive to sync my files. It’s so user-friendly and reliable. The integration with other Google services is a huge plus.” – JoeSmith123
“Resilio Sync is a fantastic tool for syncing files between devices. The ability to sync directly without relying on a cloud service is a game-changer for me.” – TechEnthusiast
Recommendations
Based on my personal experience and the opinions of experts, I highly recommend using sync software for Windows. It offers a convenient and efficient way to keep your files synchronized and collaborate with others.
Related: Synchronises
Any Technical Knowing They Must Be Aware Of
When using sync software for Windows, it is important to be aware of the following technical considerations:
• Ensure that your devices are connected to the internet for syncing to occur.
• Take precautions to protect your data and ensure that your sync software is properly configured for security.
• Regularly monitor and manage your synced files to avoid conflicts and file duplication.
Additional Use Cases
In addition to the use cases mentioned earlier, sync software for Windows can also be used for:
• Syncing music libraries across devices
• Keeping bookmarks and browser settings synced
• Sharing large files or folders with clients or customers
Tips and Tricks
Here are some tips and tricks for using sync software for Windows:
• Create a clear folder structure to keep your files organized.
• Regularly check for updates to ensure that you are running the latest version of your sync software.
• Take advantage of selective sync options to save storage space on your devices.
Common Issues
Some common issues users may encounter when using sync software for Windows include:
• Slow syncing speeds, especially when dealing with large files or folders.
• Conflicts and errors when multiple users edit the same file simultaneously.
• Syncing errors due to network connectivity issues.
Expectations
When using sync software for Windows, users can expect:
• Effortless file synchronization across devices
• Improved collaboration and sharing capabilities
• Automatic backups and version control
• Ease of use and intuitive interfaces
User Feedback
User feedback for sync software for Windows has been generally positive. Users appreciate the convenience and reliability of these tools, although some have reported occasional syncing issues or conflicts. Overall, the majority of users find sync software to be a valuable addition to their workflow.
Historical Context
The concept of file synchronization has been around for decades, with early versions of sync software primarily used for backing up files. As technology has advanced, sync software has evolved to offer more robust features and capabilities, catering to the growing needs of individuals and businesses in an increasingly digital world.
Related: Sync Files Between Computers
FAQs
1. What is sync software? Sync software is a tool that allows users to synchronize files and folders across multiple devices.
2. How does sync software work? Sync software works by creating a connection between devices and ensuring that the same files and folders are available on each device.
3. What are some popular sync software for Windows? Popular sync software for Windows includes Dropbox, Google Drive, OneDrive, Resilio Sync, and Syncthing.
4. Can I use sync software to backup my files? Yes, many sync software options offer automatic backups and file versioning.
5. Is sync software secure? Sync software can be secure if properly configured. It is important to take precautions to protect your data and ensure that your sync software is set up with appropriate security measures.
6. Can I collaborate with others using sync software? Yes, sync software often includes collaboration features that allow you to easily share files and folders with others.
7. Do I need an internet connection to use sync software? Yes, an internet connection is required for syncing to occur.
8. What are some alternatives to cloud-based sync software? Peer-to-peer sync software and FTP-based sync software are alternatives to cloud-based options.
9. Can I sync files between different operating systems? Yes, many sync software options are compatible with multiple operating systems, allowing you to sync files between Windows, macOS, and other platforms.
10. Is sync software suitable for personal use? Yes, sync software can be used for personal file organization, backups, and syncing across personal devices.
Summary
Sync software for Windows is a valuable tool that allows users to keep their files synchronized across multiple devices. It offers numerous benefits, including easy file management, collaboration capabilities, and automatic backups. While there may be some technical considerations and occasional issues, the overall user experience with sync software has been positive. I highly recommend incorporating sync software into your workflow to enhance productivity and organization.
Leave a Comment | ESSENTIALAI-STEM |
Swanee (song)
"Swanee" is an American popular song written in 1919 by George Gershwin, with lyrics by Irving Caesar. It is most often associated with singer Al Jolson.
The song was written for a New York City revue called Demi-Tasse, which opened in October 1919 at the Capitol Theater. Caesar, who was then aged 24, claimed to have written the song in about ten minutes riding on a bus in Manhattan, finishing it at Gershwin's apartment. It was written partly as a parody of Stephen Foster's "Old Folks at Home", including the title in its lyrics. It was originally used as a big production number, with 60 chorus girls dancing with electric lights in their slippers on an otherwise darkened stage.
Jolson versions
The song had little impact in its first show, but not long afterwards Gershwin played it at a party where Al Jolson heard it. Jolson then put it into his show Sinbad, already a success at the Winter Garden Theatre, and recorded it for Columbia Records in January 1920. "After that", said Gershwin, "Swanee penetrated the four corners of the earth." The song was charted in 1920 for 18 weeks, holding the No. 1 position for nine. It sold a million sheet music copies and an estimated two million records. It became Gershwin's first hit and the biggest-selling song of his career; the money he earned from it allowed him to concentrate on theatre work and films rather than writing further single pop hits. Arthur Schwartz said: "It's ironic that he never again wrote a number equaling the sales of Swanee, which for all its infectiousness, doesn't match the individuality and subtlety of his later works."
Jolson recorded the song several times in his career and performed it in the movies The Jolson Story (1946), Rhapsody in Blue (1945), and Jolson Sings Again (1949). For the song's performance in The Jolson Story, Jolson, rather than actor Larry Parks, appeared as himself, filmed in long shot. Although usually associated with Jolson, "Swanee" has been recorded by many other singers, most notably Judy Garland in A Star Is Born.
The song was also used by the Sydney Swans Australian Rules Football Club for its marketing promotions in the late 1990s.
The University of Florida's marching band, The Pride of the Sunshine, plays "Swanee" at Florida Gators football games.
Recorded versions
* Al Jolson – recorded on January 8, 1920, released as Columbia A 2884, matrix 78917-2
* Judy Garland – 1939, in 1954 for A Star is Born, and for her 1961 live concert album Judy at Carnegie Hall
* Al Jolson – 1943, included in the movie Rhapsody in Blue (1945)
* Al Jolson – recorded on August 10, 1945, released as Decca 23470, matrix L 3912
* Bing Crosby recorded the song on August 25, 1955, for The Bing Crosby Show, and it was used by Decca Records on Crosby's album Some Fine Old Chestnuts 12" LP version. It is featured on his album Bing on Broadway and the Mosaic 7-CD collection The Bing Crosby CBS Radio Recordings 1954-56. He also recorded another version in 1975 for inclusion on his album A Southern Memoir.
* Jaye P. Morgan – 1955 chart single
* Connie Francis – 1960, Songs To A Swinging Band album (MGM Records MGM E3893 USA)
* The Temptations – 1968, released on Live at the Copa album
* The Muppets – rec. 1979, broadcast as part of Episode 402 of The Muppet Show (refrain only, reinterpreted as a German Oom-pah song)
* James Gelfand – 2004, included in the movie Jack Paradise (Les nuits de Montréal)
* Paul Simon – 1960, recording under his early pseudonym, Jerry Landis. | WIKI |
Chronixx Is Taking His Jamaican Reggae Worldwide
“This is the beautiful sound of reggae music from the island of Jamaica,” said Chronixx, standing before some 6,500 fans in Prospect Park at a BRIC Celebrate Brooklyn festival event on Saturday night. Backed by his six-piece Zincfence Redemption band, he presented one of his most popular songs, a lilting number called “Smile Jamaica,” as a call to arms in a cultural battle. “Look amongst yourselves,” Chronixx, 24, told those in the crowd as they swayed in the night air waving cellphones, and red, green and gold banners. “You’ll see people from all different races, with all different color faces. And that in itself is the power of music.” Forty years ago, there was little need to specify that a given song was Jamaican reggae. Today, however, the music popularized by artists like Bob Marley and Burning Spear has spread all over the planet. “Smile Jamaica,” for instance, was produced by Silly Walks Discotheque, a D.J. crew and production team in Hamburg, Germany, that specializes in pitch-perfect Jamaican-style music. Such underground aficionados are quick to give credit where it’s due, but in recent years Caribbean-derived sounds have inundated mainstream radio as well, far removed from its source material. It is in Ed Sheeran and Shawn Mendes’s gentle songwriting, Justin Bieber’s dancy tracks, Ariana Grande’s powerhouse pop and several of Drake’s recent hits. “There may soon be a time when the general public completely forgets that reggae music comes from Jamaica,” said the British reggae journalist Reshma B. Without the benefit of major-label backing or even a mainstream hit song, Chronixx has quietly built his own movement that has positioned him as more than just the next big thing out of Jamaica. Not content simply to reclaim reggae as a Jamaican art form, his stated goal is to push the music further than its founders did. “Marley still ah lead pon iTunes,” he sings on his recent single “Likes,” which also mentions how Drake and Rihanna are playing major roles in the dancehall scene, an art form from Kingston’s sound-system culture. “Simply mean we nuh ready yet.” Rather than following the usual formula of radio promo shows and reggae festivals, Chronixx and his band have played international festivals like Glastonbury and Coachella, appeared twice on “The Tonight Show Starring Jimmy Fallon” and been featured in an Adidas ad campaign. Most recently, he was tapped as the opening act for Nas and Lauryn Hill’s United States tour that begins in September. By breaking the rules of business as usual, he has positioned himself to compete on the global playing field. His mostly self-produced debut album, “Chronology,” was released on Friday and topped the iTunes reggae charts in every country except for Germany, where it reached No. 2. The album debuted at No. 12 in the United States iTunes chart overall. “The younger generation has gravitated to Chronixx,” said Bobby Konders of Massive B Records, whose weekend show on New York’s Hot 97 radio station has been a mainstay of the New York reggae scene. Mr. Konders produced many records with Chronixx’s father, the dancehall singer Chronicle, and met Chronixx as a youngster. “I remember he told me he was a beatmaker,” Mr. Konders recalled. “The tracks he was making at that time sounded like hip-hop to me.” As he recounts in his song “Spanish Town Rockin,’” Chronixx was born Jamar McNaughton in De La Vega City in Spanish Town, Jamaica, also the birthplace of Grace Jones. His father exposed him to music at an early age, and he took an interest in production, inspired both by reggae artists and hip-hop producers including Kanye West. During the past five years, Chronixx and a handful of associated artists — Protoje, Jesse Royal, Jah9 and Kabaka Pyramid — have become known as members of the reggae revival movement. They have sought to integrate modern dancehall with the foundations of Jamaican roots music sonically, and to highlight cultural themes in their lyrics. Mr. Konders described Chronixx’s audiences as less acquainted with reggae history. “The kids that follow Chronixx are not familiar with Luciano and Anthony B and Sizzla and Capleton,” he said, referring to Jamaican recording artists who rose to prominence in the 1990s. “They’re kids my daughter’s age. The hip-hop generation,” he said. “Chronixx is for their generation, for their era.” Mr. Konders added: “He understands the younger generation that’s into social media. He’ll come to town and sell 1,000 tickets without a flyer.” Chris Blackwell, the founder of Island Records and credited with helping Bob Marley reach international acclaim, signed Chronixx to a publishing deal with his Blue Mountain Music company. “What got to me was his phrasing, how he sang and also his sense of timing,” he said, “which are two things you can’t really learn. You’re gifted with that.” He compared Chronixx’s natural talents to those of Frank Sinatra: “When he would sing a song, he’d just move the song with his lyric, and in so doing you were kind of glued to the words. You heard every word he was saying. And in his own way, Chronixx is doing the same thing. As well as the music having its groove and everything, he flows above it with his voice. He’s special.” Mr. Blackwell added that he had faith in Chronixx’s unconventional path. “Bob Marley didn’t have radio hits either,” he said. “He built up the following from the street, from the shows.” Mr. Blackwell called this approach “more solid,” noting: “A radio hit can be a flash-in-the-pan kind of thing. But you create a solid base when you do it with touring.” Onstage in Brooklyn, Chronixx spoke of the spiritual power of reggae, referring to dancehall as “our church” and sound systems as having been created by God. Later in his set, he spoke of his goals for Jamaican music with equal fervor. “We want to put reggae music back on the top of music again,” he said. “And I believe we can do that on this day, in 2017. All we want the people them do, just like how you support the hip-hop music that you love. Support the jazz music that you love. Go and buy some reggae music tonight. Seen? Listen some reggae music tonight. And put your music upon the top. What you say about that?” | NEWS-MULTISOURCE |
Church of St. John the Baptist, Cirencester
The Church of St. John Baptist, Cirencester is a parish church in the Church of England in Cirencester, Gloucestershire, England. It is a Grade I listed building.
The building reflects architectural styles since the 12th century. The chancel and attached chapel represent the oldest part with the nave having been rebuilt twice and the tower added in the 15th century. The south porch was built by Cirencester Abbey around 1480 and only connected to the church in the 18th century.
It is built of Cotswold stone and is one of the "largest parish churches in England". It contains various tombs and monuments with some fragments of medieval stained glass and wall paintings.
History
The church is medieval. It is renowned for its perpendicular porch, fan vaults and merchants' tombs.
The chancel is the oldest part of the structure, and construction of the current church started in the 12th century on the site of an earlier Saxon one. It was widened in about 1180. Around 1240 the nave was completely rebuilt. The east window dates from around 1300. The original stained glass of the east window has long since disappeared and it is now filled with fifteenth century glass from other parts of the church.
To the north of the chancel is St. Catherine's Chapel which dates from around 1150. It contains a wall painting of St. Christopher carrying the Christ Child, and vaulting given by Abbot John Hakebourne in 1508 when major reconstruction took place funded by the wool trade making it an example of a Wool church. To the north of St. Catherine's Chapel is the Lady Chapel, first built in 1240 and extended in the 15th century. The tower was built and supported by buttresses around 1400.
The Trinity Chapel dates from 1430 to 1460 and was endowed for a priest of the nearby Abbey to say masses for the souls of Kings and Queens. It contains a squint which enabled the priest to synchronise the celebration of mass with that at the high altar. The nave was completely rebuilt between 1515 and 1530 and is a remarkable example of late Perpendicular Gothic architecture. The tower is fifteenth century and remarkable for the large buttresses which shore it up at its junction with the nave. The great south porch which adjoins the market place was built around 1500 at the expense of Alice Avening. It is elaborately decorated. It was built by Cirencester Abbey around 1480, as an administrative centre and only connected to the church in the 18th century. Between the dissolution of the monasteries and its connection to the church it was used as the town hall. The nave was again rebuilt between 1516 and 1530.
In 1642 the church was used to imprison local citizens overnight after the skirmishes in the town during the English Civil War.
During the 1860s George Gilbert Scott led a team undertaking a Victorian restoration to strengthen the church, which included moving many of the bodies interred under the nave to the Lady Chapel. This reduced the level of the floor and introduced sub floor voids. These were investigated during alterations carried out in 2008 and 2009, which discovered evidence of the various periods of the church's construction.
In 2019 a design competition was started to commission statues for niches on the church wall, to replace those removed and lost in 1963.
Architecture and fittings
The Cotswold stone church is 180 ft long and 104 ft wide. The three-stage buttressed tower is 134 ft high. This makes it one of the "largest parish churches in England".
The layout of the church includes a three-bay chancel and three-bay aisled nave. The nave includes arcades of tall piers with carved angels at the tops supporting arches and windows. The west tower houses bells which have been added to and recast, mostly by Rudhall of Gloucester, over the centuries.
The three-storey south porch has carved oriel windows and crenellated parapets topped by decorative pinnacles. The interior is a profusion of panelling in the chambers.
The pulpit dates from the 15th century. The octagonal font was carved in the 14th century. It was returned to the church in the 19th century after it had been discovered in the abbey grounds. The brass chandeliers were made in Bristol in 1701.
There are several stained glass windows. Some of these include fragments of medieval glass but are largely 18th century by Hardman & Co. The east windows of the chancel and south chapel were built around 1300.
There are some surviving fragments of wall paintings particularly in St Catherines chapel, and a wide variety of tombs and monuments. The silver gilt "Boleyn Cup" was made in 1535 for Anne Boleyn and given to the church by Elizabeth I.
Organ
The church possesses a pipe organ built by Father Willis in 1895 with a case by George Gilbert Scott. It was renovated by Rushworth and Dreaper in 1955 and rebuilt by Harrison & Harrison in 2009.
Parish status
The church is in the combined parish which includes: Holy Trinity Church, Watermoor and St. Lawrence, Chesterton.
Record of incumbents
* Thomas Marshall 1558
* Thomas Perpointe 1562
* William Aldsworth 1574
* Thomas Woodlande 1578
* John Mortimer 1580
* John Stone 1581
* Philip Jones 1586
* Henry Bishop 1587
* Robert Butler 1592
* Heymo Leigh 1594
* Richard Dyer 1610
* John Burgoyne 1616
* Alexander Gregory 1632
* Thomas Carles 1663–1675†
* Jeremiah Gregory 1675–1690 (son of Alexander Gregory)
* Joseph Harrison 1690–1753†
* Samuel Johnson 1753–1778
* Martin Stafford Smith 1778–1789
* William Shippen Willes 1789–1806
* Henry Anthony Pye 1806–1839†
* William Frederick Powell 1839–1868
* James Ogilvy Millar 1869–1881
* Henry Rudge Hayward 1881–1898 (as Archdeacon of Cirencester from 1883)
* John Stewart Sinclair 1898–1908 (appointed Archdeacon of Cirencester)
* William Aubrey Robins 1909–1922 (later Archdeacon of Bedford)
* Lewis Westmacott 1922–1940
* Ronald Huntley Sutch 1941–1962 (as Archdeacon of Cheltenham from 1951)
* Rowland Edward Hill 1962–1978
* John Arthur Lewis 1978–1988 (appointed Archdeacon of Cheltenham)
* Hedley Ringrose 1988–1998 (appointed Archdeacon of Cheltenham)
* Michael St. John-Channell 1999–2006
* James Butterworth 2006–2008
* Leonard Doolan 2008–2017
* Graham Morris 2018– | WIKI |
- Acting (law)
In law, when someone is said to be acting in a position it can mean one of three things.
*The position has not yet been formally created.
*The person is only occupying the position temporarily, to ensure continuity.
*The person does not have a mandate.
The term "acting" is often used in one of these senses to refer to a temporary occupant of an office in government. An "acting" official holds office to ensure both the stability and continuity of his department will continue despite the absence of a formal leader.
For example, if the
United States Secretary of Statedied suddenly in office, the United States Deputy Secretary of Statewould take over. However, he would only be "acting" in the position, as he will not formally hold the office unless he is nominated by the President and confirmed by the United States Senate, as required by the Constitution.
Acting officials almost always do very little while in office, as it is usually considered improper for someone to exercise full authority when they have inherited their office by accident, as opposed to being specifically hired or elected to it.
Acting for has the same basic meaning as "acting", except it indicates that the original occupant of the position still formally holds power.
For example, in 2006 when Israeli Prime Minister
Ariel Sharonhad a severe stroke, Deputy Prime Minister Ehud Olmertassumed power on the basis that he was "acting for" the incapacitated Sharon. Sharon was still formally the nation's leader, as he had not died or resigned, but Olmert was executing the powers of the office.
Acting President of the United States
Wikimedia Foundation. 2010. | FINEWEB-EDU |
Talk:Lebanon women's national football team/GA1
GA Review
The edit link for this section can be used to add comments to the review.''
Reviewer: Lee Vilenski (talk · contribs) 14:37, 1 July 2019 (UTC)
Hello, I am planning on reviewing this article for GA Status, over the next couple of days. Thank you for nominating the article for GA status. I hope I will learn some new information, and that my feedback is helpful.
If nominators or editors could refrain from updating the particular section that I am updating until it is complete, I would appreciate it to remove a edit conflict. Please address concerns in the section that has been completed above (If I've raised concerns up to references, feel free to comment on things like the lede.)
I generally provide an overview of things I read through the article on a first glance. Then do a thorough sweep of the article after the feedback is addressed. After this, I will present the pass/failure. I will use strikethrough tags when concerns are met. Even if something is obvious why my concern is met, please leave a message as courtesy.
Best of luck! you can also use the ✅ tag to state when something is addressed. Lee Vilenski (talk • contribs) 11:18, 21 February 2018 (UTC)
Please let me know after the review is done, if you were happy with the review! Obviously this is regarding the article's quality, however, I want to be happy and civil to all, so let me know if I have done a good job, regardless of the article's outcome.
Immediate Failures
* It is a long way from meeting any one of the six good article criteria - ✅ Best Wishes, Lee Vilenski (talk • contribs) 14:38, 1 July 2019 (UTC)
* It contains copyright infringements - copyvio unlikely Best Wishes, Lee Vilenski (talk • contribs) 14:38, 1 July 2019 (UTC)
* It has, or needs, cleanup banners that are unquestionably still valid. These include,, or large numbers of , , or similar tags. (See also ). - ✅ Best Wishes, Lee Vilenski (talk • contribs) 14:38, 1 July 2019 (UTC)
* It is not stable due to edit warring on the page. -✅ Best Wishes, Lee Vilenski (talk • contribs) 14:38, 1 July 2019 (UTC)
Links
* No dablinks Best Wishes, Lee Vilenski (talk • contribs) 14:39, 1 July 2019 (UTC)
* two links need cleanup. Best Wishes, Lee Vilenski (talk • contribs) 14:39, 1 July 2019 (UTC)
* No idea why there seems to be a "Registration (access issue)". As far as I can see registration is not needed to visit the websites. Nehme1499 (talk) 14:51, 1 July 2019 (UTC)
* I think it's because it redirects to the download mobile app page, might be worth finding the exact url to bypass. Best Wishes, Lee Vilenski (talk • contribs) 14:58, 1 July 2019 (UTC)
* Ah yes I forgot about this. FIFA, for some reason, decided it was a good idea to completely remove their full fixture lists of all national teams (men's and women's) in favour of an ad for their app (which doesn't have the full fixture list). The information is technically correct, as when I wrote it the source showed the information in question. The only solution I can think of is to resort to an archived copy, but the website is very... weird. The information is there, but it's nearly impossible to read it. Nehme1499 (talk) 15:19, 1 July 2019 (UTC)
* Archived version is fine. Would be fine if it was tagged as a deadlink too. Just wasn't suitable as it was. Ideal ✅ Best Wishes, Lee Vilenski (talk • contribs) 15:38, 1 July 2019 (UTC)
* ✅ Nehme1499 (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:00, 1 July 2019 (UTC)
Lede
* Lede is very short. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* No information on world rankings? Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* no significant matches? Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* "has represented", bad wording. if the team is the official female team, write it that way. "The Lebanese women's national football team,[a] colloquially known as "the Lady Cedars" (صبايا الأرز),[2][3] is the official womens national football team of the country of Lebannon. The team was established in 2005, and controlled by the Lebanon FA" etc.
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* Not a fan of sources in the lede, it suggests that the information hasn't been mentioned later in the prose (which it hasn't). Things like this should appear in the prose later in the article. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* Lebanon played their first match in 2006 against Algeria in a 12–0 defeat at the Arab Women's Championship. - Not mentioned in the prose. The championship is a little irrelevant for the lede, although you'd think they would have played friendlies before this. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* The match is mentioned in the prose. With the state of women's football in the middle east (at least, in its early stages) I wouldn't be surprised if Lebanon had not played any friendly matches prior. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* Don't see how a "first qualification" for a tournament is particularly lede worthy. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* It has more to do with the timing: for a team that was founded in 2005, playing their first qualifiers in 2013 seems relatively noteworthy. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* Notable - sure. Ledeworthy - I don't think so. It's hardly a summary of the team. Best Wishes, Lee Vilenski (talk • contribs) 15:40, 1 July 2019 (UTC)
* While the team has never qualified for the FIFA Women's World Cup nor for the AFC Women's Asian Cup, - Whilst the team has yet to qualify for the FIFA Women's World Cup, or the AFC Women's Asian Cup they have finished in third place at the 2007 and 2019 editions of the WAFF Women's Championship. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* "regular participants" is very subjective, especially as they've only played three times. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* overall, the lede needs a lot of expansion. Best Wishes, Lee Vilenski (talk • contribs) 14:56, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 15:17, 1 July 2019 (UTC)
* Lede looks a lot better now. Good job. Best Wishes, Lee Vilenski (talk • contribs) 15:41, 1 July 2019 (UTC)
History
* "Even so, they had to wait eight years to take part in their first AFC Women's Asian Cup qualifications.[4]"- much prefer this to be in chronological order. Something like despite being founded in 2005, the team had to wait... in the right section of the History. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* I don't really know how to keep all the information (nickname, foundation date, one of the first WAFF teams, first qualifications) this way. ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 20:53, 1 July 2019 (UTC)
* " Their fate did not change, as they also lost to Jordan by a score of 3–1" - This isn't a sentence. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* - Drawn into Group B with Egypt, Jordan and Iraq, Lebanon lost 5–1 against Egypt in their first match of the tournament. Their fate did not change, as they also lost to Jordan by a score of 3–1. In their final match, Lebanon defeated Iraq 9–0, but this was not enough for the team to get past the group stages and they finished in sixth place. - This is all unsourced. You'd have to have a good source to say that they finished 6th; as realistically they just didn't progress past the group stage. Saying they finished third in their group is fine, and not hyperbole. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* I've removed the whole paragraph as I couldn't find any source about the matches in the tournament. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* In their second WAFF Women's Championship in 2011[9] they were drawn with Iran, - This feels weird. Not sure why the citation is in the middle of the sentence. Remember, the source is to corroborate a statement. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* the national team lost 5–0 and were knocked out of the competition - What other type of team would this be? Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* No info on previous coaches? Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* Not really. Finding historical information about Lebanese football is very difficult, especially when we are talking about women's football. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* At the very least, Farid Nujaim used to coach the team..
seems like a good source to me too. Best Wishes, Lee Vilenski (talk • contribs)
* Farid Nujaim was already in the article as Farid Njeim. I have "corrected" the name. As for the source, it would be more suited for Women's football in Lebanon than for this article as there is no mention of the national team. Regardless, thanks for the source. It seems pretty interesting! <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 17:04, 1 July 2019 (UTC)
* They kicked off their campaign on 7 January with a slim 3–2 defeat - WP:NPOV. "Kicked off" feels too much like journalism talk to me. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
* "secured a 2–0 win over the United Arab Emirates" - You have already said the abbreviation for this is UAE, so you should use it. Best Wishes, Lee Vilenski (talk • contribs) 15:57, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:14, 1 July 2019 (UTC)
Rest of article
* The "Head-to-head record" section seems like a whole-load of stat-cruft. Is it in the MOS:FOOTY? Best Wishes, Lee Vilenski (talk • contribs) 16:02, 1 July 2019 (UTC)
* It could be made into its own separate article, but it seems a bit too little for that. The men's senior team has stats about individual managers, captains, top scorers and top capped players. I don't think it would be worth it to make a separate article for the head-to-head record. Croatia (GA) has it so I don't know. I wouldn't mind removing it though, but it would be nice to have it somewhere. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:32, 1 July 2019 (UTC)
* I don't think it should exist there to be honest. I'd rather it was gone. I've not seen an FA with such a table. Best Wishes, Lee Vilenski (talk • contribs) 16:58, 1 July 2019 (UTC)
* At this point should FIFA ranking be its own section? ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 17:20, 1 July 2019 (UTC)
* The "FIFA rankings" secrion needs more prose for a GA. Needs highest/lowest placements, etc. Best Wishes, Lee Vilenski (talk • contribs) 16:04, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:32, 1 July 2019 (UTC)
* Surprised there are so many "See also"s. Those links aren't in the article at all? Article doesn't mention the Lebanese Women's Football League at all? Best Wishes, Lee Vilenski (talk • contribs) 16:04, 1 July 2019 (UTC)
* None are in the article itself, however some are in the template at the end. I have lightened it up slightly. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:32, 1 July 2019 (UTC)
* No mention of a stadium? Best Wishes, Lee Vilenski (talk • contribs) 16:12, 1 July 2019 (UTC)
* Not really. Lebanon never plays in a single stadium, and there are no notable women's matches played in Lebanon. No tournament has been hosted in Lebanon, and the national team has only played one qualifier (for the 2014 Women's Asian Cup, where Jordan acted as hosts). Only some friendly games have been played in Lebanon. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:32, 1 July 2019 (UTC)
* Fair enough. Best Wishes, Lee Vilenski (talk • contribs) 16:58, 1 July 2019 (UTC)
Notes & References
* Ref 3 - Lebanon Football isn't an author. Best Wishes, Lee Vilenski (talk • contribs) 16:07, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:38, 1 July 2019 (UTC)
* ref 7 - web.archive.org isn't the publisher Best Wishes, Lee Vilenski (talk • contribs) 16:07, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:38, 1 July 2019 (UTC)
* ref 8 - needs a lang tag. Best Wishes, Lee Vilenski (talk • contribs) 16:07, 1 July 2019 (UTC)
* ✅ <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:38, 1 July 2019 (UTC)
* FIFA isn't an author too. Best Wishes, Lee Vilenski (talk • contribs) 16:07, 1 July 2019 (UTC)
* I can't do much about that, it's part of a template. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 16:38, 1 July 2019 (UTC)
* I removed that for you. Best Wishes, Lee Vilenski (talk • contribs) 20:51, 1 July 2019 (UTC)
GA Review
* GA review (see here for what the criteria are, and here for what they are not)
* 1) It is reasonably well written.
* a (prose, spelling, and grammar): b (MoS for lead, layout, word choice, fiction, and lists):
* 1) It is factually accurate and verifiable.
* a (reference section): b (citations to reliable sources): c (OR): d (copyvio and plagiarism):
* 1) It is broad in its coverage.
* a (major aspects): b (focused):
* 1) It follows the neutral point of view policy.
* Fair representation without bias:
* 1) It is stable.
* No edit wars, etc.:
* 1) It is illustrated by images and other media, where possible and appropriate.
* a (images are tagged and non-free content have fair use rationales): b (appropriate use with suitable captions):
* 1) Overall:
* Pass/Fail:
* 1) It is illustrated by images and other media, where possible and appropriate.
* a (images are tagged and non-free content have fair use rationales): b (appropriate use with suitable captions):
* 1) Overall:
* Pass/Fail:
* 1) Overall:
* Pass/Fail:
Comments
* Automated note - If you fancy returning the favour, I have outstanding GA nominations that require reviewing at WP:GAN. I'd be very grateful if you were to complete one of these, however it's definately not manditory. Best Wishes, Lee Vilenski (talk • contribs) 07:17, 11 June 2019 (UTC)
* While I'm aware that this is an automated message, I still feel indebted towards you for what happened with the last nomination. However, looking at your GANs it seems that there are only snooker-related articles, of which I have zero knowledge on. The moment an article I feel I can competently review comes up, I will review it. <b style="font-family:Verdana;font-size:80%;color:#000080">Nehme</b><b style="font-family:Verdana;color:#27B382">1499</b> (<b style="font-size:80%;color:#a9a9a9">talk</b>) 14:54, 1 July 2019 (UTC)
* It's not a problem. I'm working on a childrens television/football article that I could work on for GA, if you were interested in such a thing. Best Wishes, Lee Vilenski (talk • contribs) 14:57, 1 July 2019 (UTC)
* Passing now. There aren't a great deal to go on in terms of results, which helps the article to be succinct. Prose looks fine, as does sourcing. Best Wishes, Lee Vilenski (talk • contribs) 15:17, 3 July 2019 (UTC) | WIKI |
User:Eddie Won/sandbox
INNOIO CO.,LTD
INNOIO CO.,LTD. is a manufacturer of Pico Projector in South Korea. The company was established in 2009 with introducing first product, INNOCUBE Pico Projector in the market. And INNOIO CO.,LTD. supplied SmartBeam projector to SK TELECOM, Korea in 2013, this product became best selling Pico Projector of the year, sold 40,000units by 2016. INNOIO CO.,LTD. recently launched new model, SMARTBEAM 3 in May, 2018. | WIKI |
Talk:Balloon boy hoax
Veracity of "nobody mentions the possibility of Falcon being in the balloon"
This line in the article is false. In the liftoff home video you can hear Bradford hear "Dad, Falcon's in the ship." Reuben dskl (talk) 20:56, 8 October 2022 (UTC)
Semi-protected edit request on 15 October 2022
Change all instances of “Balloon Boy hoax” to “Balloon Boy Incident” the Heene family was pardoned and it is now confirmed not to be a hoax, so it is inaccurate and offensive to call it one <IP_ADDRESS> (talk) 04:31, 15 October 2022 (UTC)
* Red information icon with gradient background.svg Not done: see above discussions as well as prior consensus here - https://en.wikipedia.org/wiki/Talk:Balloon_boy_hoax/Archive_4#Requested_move_4_March_2021 Cannolis (talk) 04:46, 15 October 2022 (UTC)
“Hoax”
Backread some of the previous topics. That really does seem like bias, especially after the Heenes were officially pardoned, and there’s clear evidence of police lying on transcripts, illegally questioning children, etc. 2600:6C5E:447F:AEC2:50B9:3795:D697:FE2E (talk) 05:06, 14 January 2023 (UTC)
* "Pardoned" means the crime still happened according to official record but they waived the consequence. It doesn't mean innocence. Nothing was overturned. <IP_ADDRESS> (talk) 00:58, 4 February 2023 (UTC)
* that is not true; that is "commutation".
* "pardon" wipes the actual crime as well. 2601:19C:527F:A660:1C7B:D57F:1D8B:C1CD (talk) 08:32, 7 February 2023 (UTC)
The use of neutrality in Wikipedia
I read through the many arguments, debates, and requests on this topic and acknowledge both sides. I understand that Wikipedia should follow verified sources, and news is one. However, at the same time, many people see Wikipedia as a neutral and objective website and a foundation for their own opinions. News sources are verified, but that does not mean they are objective. They will use more powerful imagery for views at the time, and the strong word "hoax" is one.
Wikipedia does not shy away from euphemisms, and on whatever side you are on, I think you can agree that "incident" is a neutral word that still means the same thing. Wikipedia can present the sources inside the article, show the media's explanation, and the user can make their own opinion on whether he is guilty or not.
Yes, people should bother news instead, but search for balloon boy on any search engine. The first link that shows up is Wikipedia, it will display Wikipedia on the side, and most search engines trust Wikipedia as a neutral source to display to the user. Wikipedia is important, the start of any understanding of this subject, not the news. And the first step to anyone's research would be a giant title saying "Hoax."
I'm not arguing we should use Wikipedia as the start of some movement, absolutely not. I am not arguing that the title should be "Misunderstanding" - I'm saying that it should be a neutral word between both sides. "Incident". Or a common suggestion - drop it and have "Balloon Boy." It is already unique enough, and from there, the user can make their own decision.
This will probably be ignored/deleted or something, but I just want to get my opinion out. I've never seen Wikipedia as just a regurgitation of what the news says, especially with how news is now trending towards a path of less reliability for more views. With that, I'm scared some event will happen, the news writes a wrong story on it, and Wikipedia is forced to forever stick to its story. <IP_ADDRESS> (talk) 05:12, 25 January 2023 (UTC)
* I've never seen Wikipedia as just a regurgitation of what the news says - Unfortunately this is almost by definition what Wikipedia is and aims to be. Of course it's not just "news", it's supposed to be reliable sources, which may include reliable news sources. Unfortunately in this case the balloon boy incident is pretty low stakes, so I doubt any reliable news source is interested in revisiting it. I do agree that a lot of news sources are not very thorough about what & how they report, but to be honest Internet Historian is a far worse source than what's used now, even if the video is entertaining and/or informative. And what would you have, Wikipedia make up its own stories? It's really just not Wikipedia's job (the editors' jobs) to determine "truth". HarryKernow (talk) 22:51, 26 January 2023 (UTC)
* And Wikipedia shouldn't find the truth, but Wikipedia has held that they hold a Neutral Point of View. Calling the title "Balloon Boy Incident" or just "Balloon Boy" does not detract from the truth, does not suggest anything, in fact it is the literal definition of neutrality. From there on, the user can read the sources and determine whether it is a hoax or not.
* Wikipedia is in no formal obligation to include the word "hoax", it is already commonly referred to as "Balloon Boy". In fact, look at the sources listed in references and few say the entire name of "Balloon Boy Hoax". There is no formal statement that the name of this incident is the full "Balloon Boy Hoax", a lot simply call the incident itself "Balloon Boy" and say it is a "Hoax". Therefore, it's their claim and not an official name for the incident.
* A lot of people already pointed this out, and I doubt this will convince anyone, but Wikipedia adding the word Hoax in the title is pretty unique for this article. Going to the List of hoaxes, few of them actually have the word "Hoax" in their title. It's interesting that something that recently sparked controversy still maintains this non-regulatory stance.
* Using the word Hoax forces Wikipedia to take a side when in reality it should be neutral and say the truth: The police claims it is a hoax, Richard Heene claims it is not, and here are the first hand sources. Wikipedia does not need to make up a story or use an unreliable Youtube video, but it also should not use a influenceable word in it's title. <IP_ADDRESS> (talk) 01:38, 29 January 2023 (UTC)
* According to Wikipedia's guidelines, 'neutrality' is reporting on things the same way sources do. Without changing the message or tone. We don't always achieve it, but that is the type of neutrality Wikipedia strives for. 'Neutrality' does not necessarily mean presenting both sides equally or anything like that. See WP:YESBIAS.
* Anyway, there's not really anything unusual or surprising happening here. Consider that it's not actually unusual for a convicted criminal to tell a good story that conflicts with all other sources. That's pretty standard and mundane. Readers can almost take it as given that if a person is convicted of a crime, the convicted person claims they shouldn't have been. That's not nearly enough to rename all crimes as "incidents".
* ApLundell (talk) 02:20, 29 January 2023 (UTC)
* Sorry, not exactly sure what you are saying here. We of course must include the media's point of view, but as you said, that does not mean we can edit the title to include their point of view. I'm only arguing about the title, the unofficial essay you linked seems to be more about the actual content. The content should absolutely include the full story the same way the media says.
* The official guidelines on Naming says that, for Article Titles, opinion-based words like "Hoax" should only be used when it is more recognizable with, so I guess you can make the argument that the word "Hoax" is essential. I won't go into that argument as that is hard to argue, but I will say search up "Balloon Boy" and most media would refer it to 'Balloon Boy' in quotations and the word Hoax off to the side; I doubt anyone will not recognize "Balloon Boy" without the word "Hoax" <IP_ADDRESS> (talk) 00:51, 1 February 2023 (UTC)
* WP:POVNAMING states, " If a name is widely used in reliable sources (particularly those written in English) and is therefore likely to be well recognized by readers, it may be used even though some may regard it as biased."
* "Hoax" mentions:
* The Guardian: "Couple behind 2009 'balloon boy' hoax in US granted pardons"
* 5280: "The Balloon Boy Hoax—Solved!"
* USA Today: "‘Balunacy’: Colorado’s ‘balloon boy’ hoax is still a talker 10 years later"
* BBC News: "'Balloon boy hoax' parents pardoned in Colorado"
* NBC News: "Parents convicted in 'balloon boy' hoax pardoned by Colorado governor"
* CNN: "Authorities: 'Balloon boy' incident was a hoax"
* Deadline: "‘Wife Swap’ Couple Pardoned By Colorado Governor For 2009 “Balloon Boy” Hoax"
* Vulture: "Wife Swap Couple Pardoned by Colorado Governor for 2009’s ‘Balloon Boy’ Hoax"
* Reuters: "Mom admits to "Balloon Boy" hoax: court record"
* WaPo: "Parents of ‘Balloon Boy,’ the hoax that captivated and confused the nation, pardoned by Colorado governor"
* Other terms:
* FOX31: "What did dad of ‘Balloon Boy’ tell 911 dispatchers 13 years ago?"
* CPR News: "Colorado ‘Balloon Boy’ Parents Pardoned, But They Don’t Admit To Hoax"
* Denver 7: "Ten years later: The truth comes out behind family's viral 'Balloon Boy' stunt in Fort Collins"
* NY Times: "Parents of ‘Balloon Boy’ Are Pardoned by Colorado’s Governor"
* In this case I think media is using "hoax", and in cases they aren't they are carefully avoiding taking a "side". It seems fair for Wikipedia to continue using the current title and to mention any controversies in the text itself. HarryKernow (talk) 01:45, 4 February 2023 (UTC)
* Again, most articles including the ones you mentioned put “Balloon Boy” in quotations, inferring that the incident name is called “Balloon Boy” and their opinion of it is a hoax (Though admittedly 2/14 of your examples do put the whole “Balloon Boy Hoax”).
* As you say and in the guidelines, “If a name is widely used in reliable source…and is therefore likely to be well recognized by readers it may be used” I doubt that adding “Hoax” makes it more recognizable - both the news emphasizing “Balloon Boy” and the general populace see that Balloon Boy is distinct enough.
* There is no official, news, or population agreed upon the name - searching only “Balloon Boy” in search engines returns many examples of news using only Balloon Boy with no concern of their incorrect naming.
* If you truly think that “Balloon Boy” and “Balloon Boy Hoax” are not interchangeable and removing the word Hoax does harm the recognizability of the article, I can’t really argue that. All I can say is that compared to the examples given like Jack the Ripper and Boston Massacre, adding Hoax does not seem as vital. <IP_ADDRESS> (talk) 23:55, 27 February 2023 (UTC)
* "Vital" is a loaded word here. It's about choosing the best name. It's not about changing to your preferred name unless the current one is absolutely "vital". That's the wrong standard to apply here. ApLundell (talk) 04:25, 28 February 2023 (UTC)
* Not quite sure what you mean. Are you saying that we should generally just leave inaccuracies in any article because they're not absolutely vital to fix? //Lollipoplollipoplollipop::talk 13:31, 28 February 2023 (UTC)
* No. I'm saying that we should use the best, most recognizable name for the article.
* Presenting it as though the name should obviously be changed unless the current one is "absolutely vital" is a biased framing of the question at hand.
* It's an attempt to bait people into arguing against an impossible standard. ApLundell (talk) 16:28, 28 February 2023 (UTC)
* The most recognizable name is "Balloon Boy", outnumbering "Balloon Boy Hoax" 100 to 7 during the peak according to Google Trends Data
* Even during current times, in the past year it outnumbered 31 to 1 despite the Article name being "Balloon Boy hoax" <IP_ADDRESS> (talk) 03:54, 8 March 2023 (UTC)
* “If a name is widely used in reliable source…and is therefore likely to be well recognized by readers it may be used” -- the wording clearly supposes recognition on wide usage. Therefore proof of widespread (or overwhelmingly widespread as a quick Google search can show) use is all that is needed, not a discussion of whether it will actually be recognized. The use is the deciding factor. The policy is clear that even seemingly biased titles may be used under these circumstances.
* Furthermore, with the addition of the alternative name you suggested in the lead (as per MOS:BOLDSYN) and the appropriate redirect in place, I fail to see any substantive reason to change this page's title. HarryKernow (talk) 05:01, 2 March 2023 (UTC)
* The rules clearly state that biased Article Titles have only be used when "widely used...and therefore likely to be well recognized"
* It isn't widely used, even the names in their example mostly (12/14) use "Balloon Boy" as the name of the incident and calling it a hoax, formatted as "Balloon Boy" hoax. In fact, the CNN one even says "Balloon Boy" incident was a hoax
* If you say those 2 articles are enough to show it is widely used enough to justify a biased name, then I can't really argue. But with no official, media, nor population consensus, I would argue that "well recognized" rule is not met. <IP_ADDRESS> (talk) 03:34, 8 March 2023 (UTC)
* Further evidence: Google Trends Data
* "Balloon Boy" outnumbers "Balloon Boy Hoax" 100 to 7 during the peak. <IP_ADDRESS> (talk) 03:37, 8 March 2023 (UTC)
* After November 2014, searches for "Balloon Boy" will be dominated by FNAF related content. It's better to limit it to news search or cut it off at 2014. Both these trends data lines follow your arguments. //Lollipoplollipoplollipop::talk 11:18, 8 March 2023 (UTC)
* The rule is not "well recognized", it's "widely used", as I've explained before. Furthermore, your argument was to change the title to "Balloon boy incident", not "Balloon boy", so I fail to see the utility in comparing the two. CNN source was clear in calling it a 'hoax' and as I already linked before plenty others just call it "... hoax". And to top that all off, replacing your flawed query reveals that the "hoax" wording is more common than "incident" in all states with data (src). HarryKernow (talk) 11:30, 8 March 2023 (UTC)
* The rule specifically states “widely used” by reliable sources AND “well recognized” by readers [1]. The recognizability is equal, if not worse, than just “Balloon Boy”, so there is no point in it. Even if we assume it is widely used by news, the second part of the exception is not satisfied.
* The original did argue for just “Balloon Boy”, but the main point is that “hoax” breaks the neutrality, and it should only be broken if it is well recognizable. It should be replaced with a neutral “incident,” dropped completely, or any form of neutral title. In fact, I actually prefer just “Balloon Boy”. <IP_ADDRESS> (talk) 22:46, 16 March 2023 (UTC)
* No, it says "is widely used and is therefore likely to be well recognized" - i.e. if it is widely used, it is well recognized. I did miss the argument for just "Balloon Boy", but 1. they did argue for the "incident" wording as well, and 2. it's not about the boy, but the event. I would much prefer "incident" over just "Balloon Boy" for that reason. Regardless, it seems to me that the "Hoax" wording is indeed common and therefore likely to be recognized, but if you want more eyes on this, I would recommend starting a discussion at WP:NPOVN (please tag me if you do). HarryKernow (talk) 23:19, 16 March 2023 (UTC)
* It does not "break neutrality" to call a hoax a hoax.
* What you're really arguing is that it is not a hoax. Or that there is some serious doubt. That discussion has happened many times, and you're not bringing anything new to the table.
* ApLundell (talk) 02:08, 17 March 2023 (UTC)
* I want to note that this is, very likely, a minor example of citogenesis. When reporters Google the Balloon Boy incident, the first result that comes up is the Wikipedia article "Balloon Boy Hoax." This is as close to an official name for the incident as they can find, so they repeat the Wikipedia title in their article (or headline). These articles, subsequently, are used within Wikipedia as justification for not changing the title.
* As evidence of this, the exact words "Balloon Boy Hoax," in that order, seem to mostly appear in more recent articles. 2600:8806:6101:1700:DCA7:F9B7:8AA6:1C23 (talk) 00:09, 7 March 2023 (UTC)
Semi-protected edit request on 12 July 2023
In Popular Culture: the Balloon boy hoax is mentioned in the Fallout Boy rendition of Billy Joel's Hit Single We didn't start the fire Rayven1203 (talk) 15:44, 12 July 2023 (UTC)
Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. Not done: please provide reliable sources that support the change you want to be made. Xan747 (talk) 01:05, 13 July 2023 (UTC)
* YES, IS TRUE — Preceding unsigned comment added by 2001:FB1:15D:9BBB:7DE5:28F7:659E:A953 (talk) 05:06, 16 January 2024 (UTC)
Semi-protected edit request on 23 June 2024
We should change this to the Balloon Boy incident, not hoax. They were innocent and victims of malicious persecution. The guy was even pardoned. 2001:569:BD51:1600:BC27:73BB:C19A:447 (talk) 20:16, 23 June 2024 (UTC)
* Red information icon with gradient background.svg Not done: please provide reliable sources that support the change you want to be made. Polis did not say they were innocent when he issued the pardon. It looks like the only source for this is their own statements. Jamedeus (talk) 21:24, 23 June 2024 (UTC)
* See most recent move request at Talk:Balloon boy hoax/Archive 4. A formal move request is needed to overturn that consensus, not a simple edit request. FDW777 (talk) 17:23, 24 June 2024 (UTC)
* Also the reason for pardon, according to the governors’ own words, was that they were pardoned because she thought that they had they had suffered enough with no mention of any issue with the prosecution. In other words, the pardon that doesn’t even mention the prosecution can’t be used as evidence that the prosecution was malicious for obvious reasons.--<IP_ADDRESS> (talk) 02:25, 26 June 2024 (UTC) | WIKI |
Python Pandas Certification Courses Begins March 29! Take the first course for FREE!
Use the brackets to select a single pandas DataFrame column and not dot notation
pandas Sep 13, 2019
pandas offers its users two choices to select a single column of data and that is with either brackets or dot notation. In this article, I suggest using the brackets and not dot notation for the following ten reasons.
1. Select column names with spaces
2. Select column names that have the same name as methods
3. Select columns with variables
4. Select non-string columns
5. Set new columns
6. Select multiple columns
7. Dot notation is a strict subset of the brackets
8. Use one way which works for all situations
9. Auto-completion works in the brackets and following it
10. Brackets are the canonical way to select subsets for all objects
Begin Mastering Data Science Now for Free!
Take my free Intro to Pandas course to begin your journey mastering data analysis with Python.
Selecting a single column
Let’s begin by creating a small DataFrame with a few columns
import pandas as pd
df = pd.DataFrame({'name': ['Niko', 'Penelope', 'Aria'],
'average score': [10, 5, 3],
'max': [99, 100, 3]})
df
Let’s select the name column with dot notation. Many pandas users like dot notation.
>>> df.name
0 Niko
1 Penelope
2 Aria
We can also select it with the brackets
df['name']
You might think it doesn’t matter, but the following reasons might persuade you otherwise. Here are my 10 reasons for using the brackets instead of dot notation.
1. Select column names with spaces
Selecting the column average score is only possible with the brackets. Dot notation is met with a syntax error.
>>> df.average score
SyntaxError: invalid syntax
2. Select column names that have the same name as methods
If a column name has the same name as a DataFrame method, then dot notation will attempt to use the method and not the column name. max is both a column name and a method.
>>> df.max
bound method DataFrame.max
You must use the brackets
df['max']
3. Select columns with variables
If you use assigned a column name to a variable, you can only use the brackets.
>>> col = 'name'
>>> df.col
AttributeError: 'DataFrame' object has no attribute 'col'
>>> df[col] # works
4. Select non-string columns
I don’t suggest using non-string columns, but using the brackets is the only way to select it. First, we need to add a non-string column to our DataFrame. The following creates a new column with the integer 0 as its name.
df[0] = 5
df
Attempting to select this column with df.0 is a syntax error. You must use df[0]. Again, it’s bad practice to use non-strings as column names, but if you do have them in your DataFrame, you’ll need to use brackets to select them.
5. Set new columns
You cannot create new columns with dot notation. For instance, df.new_col = 99 does not work and just creates a new attribute on your DataFrame with value of 99. You must use the brackets — df['new_col'] = 99.
6. Select multiple columns
Selecting multiple columns is only possible with the brackets.
df[['name', 'max']]
7. Dot notation is a strict subset of the brackets
The brackets are able to do accomplish all the tasks of the dot notation. There is nothing that dot notation gives you that is unique to it.
8. Use one way which works for all situations
The brackets work in 100% of situations involving column selection. Always using the same code to do the same thing helps with readability.
9. Auto-completion works in the brackets and following it
Many people are aware that tab-completion in most editors will work when using dot notation. For example, writing df.n and then pressing tab can fill in the rest of the method or column name. This is also possible within the brackets. Writing, df['n and pressing tab will fill in the column name as well.
Tab completion also works if you want to call a method on the column. Writing df['name']. and pressing tab will reveal all the possible Series methods.
10. Brackets are the canonical way to select subsets for all objects
All objects in Python use the brackets as the canonical way to select a subset of data from them. Whether it’s strings, tuples, lists, dictionaries, or numpy arrays, brackets are used to select subsets from them.
Master Python, Data Science and Machine Learning
Immerse yourself in my comprehensive path for mastering data science and machine learning with Python. Purchase the All Access Pass to get lifetime access to all current and future courses. Some of the courses it contains:
Get the All Access Pass now!
In-Person Courses
Social Media
I frequently post my python data science thoughts on social media. Follow me!
Corporate Training
If you have a group at your company looking to learn directly from an expert who understands how to teach and motivate students, let me know by filling out the form on this page.
Close
Register for a free account
Upon registration, you'll get access to four free courses. | ESSENTIALAI-STEM |
Realty Income Stock: Buy, Sell, or Hold?
Real estate has been a tough sector to navigate since the onset of the pandemic, which caused both consumers and workers to change their habits. But it could also represent an opportunity.
One company to consider now is Realty Income (NYSE: O). Formed more than half a century ago, this real estate investment trust (REIT) is required to pay 90% of its annual taxable income as dividends. It owns various properties with an emphasis on retail -- which might give some investors pause. But it's important to understand the properties it owns to see how dividends are likely to fare.
So how does Realty Income stack up? Let's take a deeper dive to see if you should buy, hold, or sell the shares.
Image source: Getty Images.
Occupancy and rents
Realty Income gets the overwhelming majority of its rent from the retail sector. In fact, nearly 82% of last year's contracted payments came from that sector. That may concern some investors given the challenges some retailers face with online shopping. In the second quarter, e-commerce sales represented 15.4% of total retail sales, adjusted for seasonality.
But Realty Income mitigates this risk. First, it seeks out retail tenants that have been resilient to online shopping or have a strong omnichannel presence that utilizes physical stores. Second, it has strong, well-known tenants. These include grocery stores, convenience stores, dollar stores, quick-service and casual-dining restaurants, and home improvement stores.
The tenant list includes well-established companies such as Dollar General, Walgreens Boots Alliance, Walmart, and Home Depot.
And if you want proof that it's working, Realty Income has been able to maintain high occupancy rates and push through rent increases. At the end of the second quarter, it had a 99% occupancy rate, the same level as three months ago. On renewed leases, it was able to get a 3.4% increase in rents during the period. Realty Income has also been buying and developing properties. In the first half of 2023, it spent $4.2 billion to add 778 properties.
Monthly payouts
High occupancy and increased rents make for higher cash flow. A key metric when analyzing REITS is adjusted funds from operations (AFFO), serving as a proxy for cash available for distribution. In the second quarter, Realty Income's AFFO was $1 a share, up 3.1% from a year ago. This easily covered the $0.765 dividend payments during the quarter.
Realty Income pays dividends monthly. Better still, it has raised its payments, typically several times during the year, for more than a quarter of a century. The board of directors increased July's payout from $0.255 to $0.2555. That's made it 103 straight quarters with a raise.
Realty Income's stock has a 5.6% dividend yield, dwarfing the S&P 500's 1.5%.
A solid and growing portfolio of properties, a history of higher (and frequent) dividends, and the cash flow to support them all add up to a buying opportunity for Realty Income's shares.
10 stocks we like better than Realty Income
When our analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*
They just revealed what they believe are the ten best stocks for investors to buy right now... and Realty Income wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of September 5, 2023
Lawrence Rothman, CFA has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Home Depot and Walmart. The Motley Fool recommends Realty Income. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Manchete (magazine)
Manchete was a Brazilian weekly news magazine published from 1952 to 2000 by Bloch Editores. Founded by Adolpho Bloch, the magazine's name would be given to the defunct television network Rede Manchete. Manchete was considered one of the main magazines of its time, second only to O Cruzeiro. The magazine was inspired by publications such as Paris Match and Life, relying on photojournalism. Among the writers who collaborated for Manchete were Carlos Drummond de Andrade, Rubem Braga, Manuel Bandeira, Paulo Mendes Campos, Fernando Sabino, David Nasser and Nelson Rodrigues. French photographer Jean Manzon was responsible by the magazine's main pictures.
In 2000, with the bankruptcy of Bloch Editores, the magazine's name and rights were bought by Marcos Dvoskin. Manchete has been republished only sporadically, in special editions. | WIKI |
Talk:Evangelical theology
Intro
User:ServB1, there is no such thing as "Evangelical theology" that encompasses all churches that identify as "evangelical". Evangelical Christian churches adhere to various doctrinal systems depending on the denomination. For example, the Evangelical Methodist Church adheres to Wesleyan-Arminian theology, while the Presbyterian Church in America would adhere to Reformed theology; the Southern Baptist Convention would hold to Baptist theology. Repeatedly removing this information from the lede of the article is doing a disservice to Wikipedia's readers as there is no single "evangelical theology", despite your edits across Wikipedia to try to push this POV. If you continue this editing behaviour, this will be escalated and will result in you being topic banned from editing all religion-related articles on English Wikipedia. Please stop reverting as any further reverts by you will be crossing WP:3RR, for which a block will be issued. Thank you for your understanding, AnupamTalk 02:32, 3 August 2021 (UTC)
* Hello . The information is a duplicate of the features and the Protestant theologies article. Read Talk:Protestant theologies and the view of other contributors please. Thanks for your help. --ServB1 (talk) 02:49, 3 August 2021 (UTC)
* User:ServB1, evangelicalism like the rest of Protestantism is not a monolithic movement. As such, the lede paragraph that you have removed is quite necessary to make that clear. Evangelicals of different denominations would disagree with one another on many issues. We can wait for input from other editors here to see what they think, but a lack of clarity on this point obfuscates any concept of "Evangelical theology". Kind regards, AnupamTalk 02:52, 3 August 2021 (UTC)
* There is no one evangelical theology and so the paragraph that clarifies the different theologies adhered to, with examples, is useful. Shankargb (talk) 17:36, 4 August 2021 (UTC)
* Hello . Upon reflection, I think that precision can bring a relevant perspective. I just modified the introduction to match the content with your precision (I removed the mention on the American denominations; see Systemic bias), added two references and a perspective that further includes international cultural diversity. Thanks for your help. --ServB1 (talk) 16:07, 19 August 2021 (UTC)
* User:ServB1, I don't mind if you supplant the denominations based in the United States with ones in other countries, but the text you added is quite different from the one that I edited. You can restore a separate sentence about the believer's Church doctrine but do not modify other parts of the paragraph other than possibly supplanting the denominations. Thank you. With regards, AnupamTalk 16:11, 19 August 2021 (UTC)
* Hello . It would be nice to add references to the information you add in the intro please. I searched, but I couldn't find it. Finally, as discussed previously, it would be more equitable to have an intercultural perspective (by not mentioning a country in the intro; Systemic bias). Thanks for your help. --ServB1 (talk) 22:54, 25 August 2021 (UTC)
* User:ServB1, please stop edit warring and pay attention to what you are writing. In your edit summary, you state "Not international", though the evangelical denominations mentioned are based in Brazil, Ukraine, and the United States specifically. How is that not international? These are great examples of evangelical denominations that are committed to Lutheranism, Presbyterianism and Quakerism, respectively. Please do not edit war further or the compromise that I suggested above will too be nullified. Additionally, MOS:LEADCITE specifies that references are not required for the lede as long as it summarizes the main concepts in an article. I hope this helps. With regards, AnupamTalk 23:00, 25 August 2021 (UTC)
* Hello . Regarding the accusation of editing war, this could be addressed to you as well (2 people are needed)… As I said previously, I gave my consent for the details of the intro because of the opinion of another member and theological relevance, but for concepts, references are needed. To put one country more than another in the intro of an international article is a bias. The intro in an international article should be able to summarize the article, without favoring any particular country. Putting a country other than the USA does not solve the problem of bias. You're right, references are not needed in the intro, but there is no reference (in the article) to back up your info in the intro. Would it be possible to find some before putting an info please? Thanks for your help. --ServB1 (talk) 23:16, 25 August 2021 (UTC)
* Three different countries mentioned in the lede is adequate enough. What is actually needed are references that support the claim that all evangelical Christians somehow believe in the concept of a "believer's Church". Thanks, AnupamTalk 23:19, 25 August 2021 (UTC)
* Hello . No information or reference speaks of Lutheranism, Presbyterianism or Quakerism respectively in the article and its connection to evangelical theology. For advantaged countries in the intro, there is no reference and it is a Systemic bias by not being an international synthesis of knowledge for all countries concerned. Thanks for your help. --ServB1 (talk) 23:29, 25 August 2021 (UTC)
* User:ServB1, your comment reveals the lack of familiarity with evangelicalism. I went ahead and added three references to the article, though this information is very obvious to anyone who is familiar with Christianity. If you remove them or continue to edit war, I will revert your edits. Thanks for your understanding, AnupamTalk 23:36, 25 August 2021 (UTC)
* Hello . The Verifiability helps ensure that the information is relevant to all readers. The added references do not have a direct link with international evangelical theology and don’t speak about Lutheranism and Presbyterianism... For advantaged countries in the intro and the Systemic bias, other contributors experienced in the Christianity project, could give their understanding, in order to remain in collaborative neutrality. Thanks for your help. --ServB1 (talk) 23:53, 25 August 2021 (UTC)
* Hello and . Since you are experienced members and that you participated in the Talk:Evangelicalism page, I would like to hear your opinion on the advantaged countries in an intro and the Systemic bias, the international synthesis of knowledge for all countries concerned and their direct link with the topic, please? Thanks for your help. --ServB1 (talk) 00:12, 26 August 2021 (UTC)
* There is no one single evangelical theology, despite you trying to spread this POV across Wikipedia. An evangelical Presbyterian denomination such as the Presbyterian Church in America is theologically Reformed (historical Calvinism), while the Free Methodist Church would adhere to Wesleyan-Arminian theology (historical Methodism). It's not a hard thing to understand if you have any familiarity with Christianity. What might unite them as evangelicals is the fact that they support socially conservative stances on moral issues such as abortion, marriage, etc. No single source states that these diverse traditions adhere to a concept of a "believer's Church" either, despite the fact that you have added this into the article. AnupamTalk 01:15, 26 August 2021 (UTC)
* Hello . I agree with you, there is not a single evangelical theology, but the article speaks of similar beliefs which are discussed in the references. There is not just one Christian theology, but the article exists. All information has been added with references, before being published. Citations from references about believer's Church and evangelical theology have been added to the article. Thanks for your help. --ServB1 (talk) 02:44, 26 August 2021 (UTC) | WIKI |
Samsung Galaxy Recovery
Reasons of Samsung Galaxy Data Loss
There are tons of reasons lead to your Samsung Galaxy data loss. Here I pick out some main reasons to see if you have ever met before.
• Deleted the important files by mistake.
• The USB disconnected accidentally when you are transferring data from your Samsung Galaxy to the computer.
• The sudden power off of the machines when you are using them. This may lead to data loss, too.
• The virus infection. If your PC is infected by virus, you may lose your data when you connecting your Samsung Galaxy to it.
If you lost some important files due to above reasons from Samsung Galaxy phones, don’t worry, you can use Samsung Phone data recovery software to recover deleted photos, pictures, videos, and music files.
Samsung Galaxy Data Recovery Is Possible and Easy
Why Samsung Galaxy data recovery is possible? Let's take photo as an example. When you deleting a photo from Samsung Galaxy phone memory, it isn’t actually deleted. When a "delete" is performed, only the space that the file occupies is marked as blank for reuse, but the deleted file is still here.
Guide to Do Samsung Galaxy Data Recovery with EaseUS MobiSaver for Android
To retrieve Samsung Galaxy data in the easiest way, you can try EaseUS MobiSaver for Android. It can help you find and get back lost photos, videos, documents and more with simple clicks. It allows you to preview all the files to check the file quality before recovery. Now you can read the detailed guide.
Step 1. Connect your Samsung Galaxy phone to computer
Install and run EaseUS MobiSaver for Android and connect your Samsung Galaxy phone to the computer with USB cable. Then click "Start" button to make the software recognise and connect your device.
NOTE: As the software can only access the rooted Android device, you need to make sure that your phone has been rooted before recovery.
Connect Android phone to PC to do Samsung Glaxy data recovery
Step 2. Scan Samsung Galaxy phone to find the lost data
After connecting your Samsung Galaxy phone, the software will quickly scan the device to find all the existing and lost data. You can easily find the lost files you want by choosing the correct file types.
Scan Samsung Glaxy to find the lost data
Step 3. Preview and recover data from Samsung Galaxy phone
Preview all the recoverable files one by one and then you can select out those you want quickly. "Only displayed deleted items"option to list the deleted files only. Finally, you can click "Recover" button to get the selected files back once.
Complete Samsung Glaxy data recovery with one click
However you lost your data on your Samsung Galaxy or other android devices, this amazing software will provide you a great service for retrieving all your lost data back. It ensuers you a safe and secure digital circumstance for protecting your lost data security and privacy. EaseUS MobiSaver for Android also does a great job in dealing with other problems like how to get deleted pictures and videos from Android. | ESSENTIALAI-STEM |
$5,000 Invested in These 3 Healthcare Stocks Could Make You Rich Over the Next 10 Years
Healthcare has undergone massive changes in the past decade. A global pandemic will overshadow much of it in the eyes of history, but legislation, reimbursement changes, and scientific breakthroughs permeated the 2010s. It probably leaves investors wondering what the next decade has in store.
No one can predict the future -- at least not the details. But scientific breakthroughs are sure to continue. And the changes brought on by the pandemic have opened our eyes to the possibilities of virtual care and genomic medicine. That's why three Fool contributors think Trillium Therapeutics (NASDAQ: TRIL), Teladoc Health (NYSE: TDOC), and Pacific Biosciences of California (NASDAQ: PACB) could offer massive returns over the next 10 years.
Image source: Getty Images.
A new way to fight cancer
Jason Hawthorne (Trillium Therapeutics): One of the more promising advances in cancer therapy has been to target the CD47 protein -- referred to as the "don't eat me" signal -- it uses to hide from the immune system. The approach has shown some early success, leading to a lot of competition and billions in deals for CD47 assets. Just last year, Gilead Sciences bought Forty Seven for $4.9 billion and AbbVie inked a deal with Chinese biotech I-Mab that could be worth as much as $2 billion. Perhaps fearing it was being left behind, Pfizer invested $25 million in tiny Trillium Therapeutics. Based on early results, the smallest of the bunch could end up producing the biggest rewards.
With a market cap of only $650 million, clinical success would likely vault Trillium into the company of the others, producing huge gains. Despite trailing them on the calendar, Trillium's two drug candidates -- TTI-621 and TTI-622 -- have demonstrated early results that are in some ways more impressive than the others. Trillium's candidates have avoided the drawbacks of many others targeting CD47.
Most impressively, both have shown monotherapy activity -- used on their own, without other treatments. Those results are enhanced when combined with other drugs. As a single agent, the two drugs have demonstrated potentially best-in-class response rates. The company is parlaying its preclinical success into multiple studies in seven indications -- four blood cancers and three in solid tumors.
CEO Jan Skvarka said its drugs have shown "substantial" anti-tumor activity and have given management a "strong basis" for testing it in solid tumors. For now, he believes there are about 30,000 patients per year in the U.S. who could benefit from the drugs. For the longer term, Skvarka is thinking bigger. Last year, he said the ultimate goal was "to challenge chemotherapy."
Trillium's stiffest competition could be Forty Seven's magrolimab. That drug has already been granted breakthrough designation in myelodysplastic syndrome by the Food and Drug Administration and is currently in phase 3 trials. It's also in three other phase 1b trials. Still, Trillium's early success and grand ambitions could make it the CD47 stock to own. Like all small biotechs, it comes with substantial risk. But an appropriately sized position could fatten shareholders' portfolios over the next decade.
A leader in the future of healthcare
Rachel Warren (Teladoc Health): The pandemic changed the way many people approach basic aspects of everyday life. From work to school to social activities, people turned to virtual options to facilitate these essential needs when stay-at-home orders forced much of the world to shelter in place for weeks or months at a time. Unsurprisingly, consumers also turned to virtual solutions so they could receive quality healthcare from the comfort of home. And more often than not, these visits were conducted on the behemoth digital healthcare platform Teladoc Health.
According to a report by Research and Markets, the global telemedicine market surged from an $11.3 billion valuation in 2019 to nearly $31 billion in 2020, and is expected to be valued at nearly $92 billion by the year 2026. Another report by market research provider Prescient & Strategic Intelligence estimates the telemedicine industry will amass global revenue to the tune of more than $144 billion as of 2030.
Teladoc remains the top provider of telemedicine services in the world, with more than 52 million paid members in the U.S. alone as of its second-quarter earnings report. The healthcare stock is rapidly expanding its platform offerings, which cover a host of specialties from primary care to mental healthcare to chronic condition management. Teladoc also closed two major acquisitions in 2020 (Livongo and InTouch Health), both of which further established the platform as an all-inclusive solution for 24/7 virtual care and vastly expanded its potential membership base.
In the first and second quarters of 2021, the company reported respective revenue increases of 151% and 109% from the year-ago periods. Meanwhile, visits on Teladoc's platform surged by 56% and 28% year over year in these two quarters. Even though the company isn't yet profitable and its net losses were notably higher in the first half of this year compared to the first half of 2020 -- due in large part to the purchases of Livongo and InTouch Health -- these losses are narrowing. In the first quarter of 2021, the company recorded a net loss of $199.6 million, while its net loss fell to $133.8 million in the second quarter. Another positive sign for Teladoc's future profitability is its adjusted earnings before interest, taxes, depreciation, and amortization, or EBITDA. In the first two quarters of 2020, this metric increased by 429% and 154%, respectively, year over year.
Impressive revenue and platform growth was standard fare for Teladoc prior to the pandemic. For instance, in 2018 the company's revenue increased 79%, and its revenue grew by 32% in 2019.
Given Teladoc's fantastic track record of growth, continued successes throughout the pandemic, and rosy financial expectations -- the company is projecting about $2 billion in revenues for the full-year 2021 compared to $1.1 billion in 2020 -- why isn't its share price reflecting these factors? This can likely be attributed to a range of factors, including shifting investor sentiments as economies reopen and Teladoc's lagging bottom line.
However, analysts still think the stock could have upside potential of more than 90%. Long-term investors who have the patience to wait for Teladoc to realize its upside potential as its industry continues to grow and its bottom line creeps closer to positive territory could see notable portfolio returns from share price increases over the next decade. And given that the stock is trading down 25% year to date, you can snag the company at a bargain, sit on it for years, and let the returns flow in.
A challenger in the sequencing market
Steve Ditto (Pacific Biosciences of California): Pacific Biosciences of California, known as PacBio, is developing its HiFi DNA sequencing technology to explore whole genomes and make discoveries that have not been possible with other technologies.
The human genome comprises 3.05 billion DNA base pairs which are organized in sequences, much like the ones and zeros of computer code, to determine our genetic code. DNA sequencers read these base pairs to help scientists understand which genes control different hereditary features and identify gene variations that may cause diseases. For years, researchers had to make a choice between the ability of different DNA sequencing technologies to balance the length and accuracy of each read.
Short read sequencing, which was pioneered by market leader Illumina, divides DNA into shorter segments for analysis. This process is accurate but can leave gaps in hard-to-sequence areas of the gene and misses some genetic variations. As a consequence, the Human Genome Project, which was declared completed in 2003, was actually missing 8% of the genome.
Long read sequencing, being pioneered by PacBio, lets scientists delve deeper into the gene. The result is a more complete DNA map that enhances the ability to spot complex structural variants causing many diseases. PacBio recently showed the advantage of its long read sequencing HiFi technology by helping a team of scientists complete the missing sequences and errors in the Human Genome Project.
ARK invest CEO Cathie Wood is a big believer in PacBio and its HiFi approach. ARK exited its entire Illumina position in the ARK Genomic Revolution ETF in 2020 on the belief PacBio and HiFi sequencing would be able to deliver the benefits of long read sequencing at a cost comparable to short read sequencing. If true, this development would open up entirely new use cases and markets for PacBio. The ARK thesis may be playing out, as PacBio recently signed a collaboration agreement with Invitae, a leader in genetic testing, to expand its whole genome testing capabilities.
By the end of 2020, PacBio had deployed 203 sequencing systems and generated revenue of almost $79 million against an operating loss of $104 million. To achieve profitability, PacBio will need to continue lowering the cost of its technology to spur broader adoption. As a step toward that goal, PacBio recently announced the acquisition of Omniome and its Sequencing by Binding (SBB) chemistry. The goal is to incorporate SBB into PacBio's solution to make its cost and accuracy on par with short read sequencing.
If successful, PacBio's HiFi sequencing technology could become the core engine driving what many are calling the Genomic Revolution. The overall sequencing market is projected to grow to $40 billion by 2030 giving PacBio a long runway to substantial growth. For patient buy-and-hold investors, $5,000 invested in PacBio could make you rich over the next 10 years.
10 stocks we like better than Teladoc Health
When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*
They just revealed what they believe are the ten best stocks for investors to buy right now... and Teladoc Health wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of June 7, 2021
Jason Hawthorne owns shares of Illumina, Teladoc Health, and Trillium Therapeutics. Rachel Warren has no position in any of the stocks mentioned. Steve Ditto owns shares of ARK ETF Trust-ARK Genomic Revolution ETF, Invitae, and Pacific Biosciences of California. The Motley Fool owns shares of and recommends Invitae and Teladoc Health. The Motley Fool recommends Illumina. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Gordon McRorie
Gordon McRorie (born 12 May 1988) is a rugby union scrumhalf who plays for AS rugby Milano and Canada. McRorie made his debut for Canada in 2014 and was part of the Canada squad at the 2015 Rugby World Cup.
Early life
McRorie was born in Stirlingshire, Scotland and attended Stirling University. | WIKI |
You are here
Enumeration of Parasitic Chytrid Zoospores in the Columbia River via Quantitative PCR
TitleEnumeration of Parasitic Chytrid Zoospores in the Columbia River via Quantitative PCR
Publication TypeJournal Article
Year of Publication2016
AuthorsMaier MA, Peterson T.D.
Journal TitleApplied and Environmental Microbiology
Volume82
Issue13
Pages3857-3867
Abstract
Abstract
Through lethal infection, fungal parasites of phytoplankton ("chytrids") repackage organic material from the large, effectively inedible, colonial diatoms they infect into much smaller zoospores, which are easier for zooplankton to consume. However, their small size and lack of distinguishing morphological features render it difficult to distinguish zoospores from other small flagellates in mixed assemblages in the natural environment. In this study, we developed and tested a method to quantify chytrid zoospores in field studies using quantitative PCR (qPCR) targeting the internal transcribed spacer 2 (ITS2) region within the rRNA gene cluster. To achieve accurate quantification, the assay was designed to be highly specific for a parasite (Rhizophydium planktonicum) of the diatom Asterionella formosa; however, the approach is applicable to additional host-parasite systems. Parasitic zoospores were detected and quantified in the freshwater reaches of the lower Columbia River, as well as in the salt-influenced estuary and river plume. The coincidence between zoospore abundances and a prevalence of small zooplankton during blooms of large, colonial diatoms in the spring suggests that Columbia River zooplankton may be poised to benefit nutritionally from chytrid zoospores, thus providing a mechanism to retain organic carbon within the system and reduce losses to downstream export. We estimate that ∼15% of the carbon biomass tied up in blooms of the dominant diatom species is transformed into zoospores through the parasitic shunt during spring.
IMPORTANCE:
The small size of the parasitic fungi that infect phytoplankton makes it difficult to identify and quantify them in natural systems. We developed and tested a method to quantify these organisms (chytrid zoospores) using a molecular technique that targets the internal transcribed spacer region within the rRNA gene cluster. Using this method, we quantified the abundance of the motile stage of a specific parasite in the freshwater and saltwater-influenced regions of the Columbia River in the U.S. Pacific Northwest. Parasitic chytrid zoospores were found to be present throughout the year and at higher abundances during the spring, when phytoplankton blooms occur. The presence of these organisms indicates not only that they may be responsible for the death of host phytoplankton cells but that they may also provide a readily available food source to small consumers (zooplankton) in the food web of the Columbia River.
URLhttp://aem.asm.org/content/82/13/3857.long
DOI10.1128/AEM.00084-16 | ESSENTIALAI-STEM |
User:Grimhim/Future projects
Arthur Allan Thomas Super K Productions Treaty of Waitangi -- pre-emption details in "Effect" Second Taranaki War Add Puketakauere to Waitara Add land wars to Taranaki The Foundations Pai Marire Parihaka Taranaki Herald Parihaka in Nonviolent resistance | WIKI |
Wikipedia:Sockpuppet investigations/JBurger2018/Archive
Suspected sockpuppets
Apart from the account names, JBurger2019 is making the similar edits to the Current events portal that are both WP:NOTNEWS and WP:COPYVIO (pasted straight from the news article): that were all in turn reverted by other users: which was the reason the previous account was banned in the first place. Murchison-Eye (talk) 01:29, 21 March 2019 (UTC)
Comments by other users
Clerk, CheckUser, and/or patrolling admin comments
* . Closing. Reaper Eternal (talk) 02:06, 21 March 2019 (UTC)
Suspected sockpuppets
The sockpuppeteer has had a history similar to this account, with similar diction in revisions. Original account has multiple 3PP violations and a sockpuppet block. Similar accounts pop up editing the Current Events portal, usually starting with "J" or "Jim" that have the same behaviour. Another account such as this is Jim7049. None of these accounts make revisions concurrently on the same day.
Sockpuppeteer diffs: https://en.wikipedia.org/w/index.php?title=Portal:Current_events/2019_March_3&diff=prev&oldid=886083342 https://en.wikipedia.org/w/index.php?title=Portal:Current_events/2019_March_2&diff=prev&oldid=885886081 https://en.wikipedia.org/w/index.php?title=2019_in_the_United_States&diff=prev&oldid=885781495
Sockpuppet diffs: https://en.wikipedia.org/w/index.php?title=Zaoyang_car_attack&diff=prev&oldid=888976375 https://en.wikipedia.org/w/index.php?title=Portal:Current_events/2019_March_15&diff=prev&oldid=887986697
Disclaimer: This may merely be a coincidence! However I'd rather be safe than sorry considering the trends and history here. MadameArsenic (talk) 20:49, 22 March 2019 (UTC)
Comments by other users
Clerk, CheckUser, and/or patrolling admin comments
* Almost certainly not. Closing. Reaper Eternal (talk) 22:25, 24 March 2019 (UTC) | WIKI |
Our Lady of the Wind
Our Lady of the Wind, Saydet El-Rih in Arabic, was built in the Byzantine era in Enfeh, Lebanon. Even though the roof of the chapel has long collapsed, it still retains traces of wall paintings representing Saint George and Saint Demetrios, the Omnipotent Christ, two evangelists, some saints and the Virgin calming the wind. It is believed that sailors and fishermen from the village of Enfeh built the chapel so that the Virgin Mary would protect them as they sailed the Mediterranean. | WIKI |
1922 Encyclopædia Britannica/Smoot, Reed
SMOOT, REED (1862-), American politician, was born at Salt Lake City, Utah, Jan. 10 1862. He was educated in his native town and at the Brigham Young Academy, Provo, Utah. He amassed considerable wealth as a banker and woollen manufacturer. In 1895 he was appointed one of the presidency of the Utah Stake of the Church of Jesus Christ of Latter Day Saints (Mormon), and in 1900 was made an apostle. He was elected to the U.S. Senate from Utah in 1902 and reëlected in 1908, 1914, and 1920. In 1903 attempts were made to prevent his entering the Senate because of his connexion with the Mormon church, and on the charge that he personally favoured polygamy and even that he himself was a polygamist. He was allowed to take his seat; but the matter was placed in the hands of the Senate Committee on Privileges and Elections for further investigation. In June 1906 the Committee by a vote of 7 to 5 recommended that he be unseated; but as the personal charges against him had not been proved the Senate in Feb. 1907 by a vote of 42 to 23 refused to remove him. In 1919 he was chairman of the Republican Senatorial Campaign Committee. In 1921 he was a leading advocate of the adoption of a sales-tax, but failed to obtain its acceptance by the Senate, though the movement was widely favoured in business circles. | WIKI |
Just-add-water: dehydrated products are environmentally friendly
My first lesson in savvy consumerism came in elementary school from my best friend’s mother, who sat us down and handed us a bottle of fancy grown-up shampoo. “Let’s read the ingredients,” she said. We started: “Aqua …” She cut us off there. “What do you think aqua is?” “Water?” “Yes! It’s just a fancy name for water!” I now know that brands who call water “aqua” are simply abiding by the International Nomenclature of Cosmetic Ingredients (and by “now know,” I mean I just looked it up), but at the time, the fancy vocabulary struck me as a mild consumer scam designed to hide how much of our fanciest consumer products are simply water. It also spawned in me a lifelong interest in reading ingredient labels. So 25 years later, when brands started shipping normally waterlogged products to consumers with all or most of the water removed, I was intrigued. According to the Ellen MacArthur Foundation, more than 90 percent of a typical bottle of cleaning product is simply water. Drying out these cleaning and personal care products does several environmentally friendly things: It reduces their volume, thus reducing the number of boats and trucks needed to transport them. It reduces their weight, thus further reducing fuel and carbon emissions associated with shipping them. And it reduces the plastic packaging by requiring a smaller container to hold the refillable concentrate, or by precluding the need for any disposable plastic at all. An estimated 20 percent or more of global disposable plastic packaging by weight could be replaced by reusable packaging if we only shipped active ingredients. The time is ripe for a low-plastic, just-add-water revolution. Only 5 percent of plastic produced globally is ever recycled, a number that has likely dropped since China stopped accepting our recyclables in 2017. You’ve probably heard this, but there’s a lot of plastic swirling around in our oceans, and in developing countries, single-serve product sachets are a scourge on the rivers and beaches. Almost all at once, waterless products have arrived to save the day. By Humankind (emphasis theirs) launched in February. The startup makes a “forever” refillable container for its mouthwash tablets, packages its shampoo bars in paper boxes, and provides refills for its deodorant. It’s all in the design scheme du jour: gender-neutral, with minimalist font swimming in pastel color schemes. Truman’s, which also launched in February, says shopping for cleaning products is too confusing and onerous, offering as an alternative four concentrated cleaning products for glass, floors, bathrooms, and all-purpose, shipped in small recyclable plastic refill cartridges that fit in the neck of its reusable plastic spray bottles. In 2018, Seventh Generation introduced an “ultra-concentrated” laundry detergent, which the company says uses 50 percent less water and 60 percent less plastic and is 75 percent lighter than the standard detergent bottle. The bottle automatically doses the right amount of detergent with one squeeze. It’s only sold online, or else I would absolutely get that to carry home instead of the standard 100-ounce detergent bottle. In March, Amazon launched an in-house product line called Clean Revolution. You screw a bottle of concentrate with the equivalent of six refills to the bottom of the spray bottle or soap dispenser, and pour water into the top. The product has 3.9 stars online; the complaints that the refill pod can sometimes leak are far outweighed by praise for how eco-friendly it is. The system is by a packaging company called Replenish, which has its own line, CleanPath. It’s a subscription refill service for five cleaning products that lets you choose your scent, your bottle and baseplate color, and — for an additional $7.95 fee that strikes me as patently ridiculous — a customizable label. Buying a six-time-use refill is certainly less wasteful than the alternative, but the drawback is that, like a fancy Gillette razor, you’re now wedded to that particular refill and at the mercy of CleanPath’s redesign process. “We regret that previous versions of CleanPath reusable bottles and refill pods have been discontinued and are not compatible with the all new CleanPath,” it says in tiny font on the website. All of the above products promise to be nontoxic, of course. We’re talking about a target market of eco-minded consumers here. The European brand Cif doesn’t make that promise. (It might not have to, as Europe has banned a much longer list of potentially toxic ingredients, so Europeans tend to be a little more relaxed than we are.) That hasn’t stopped Unilever from launching the Cif ecorefill in July, a 10-times-concentrated liquid refill for the normal Cif spray bottle, which Unilever now markets as a lifetime piece. If the spray trigger breaks, it will even deliver a new one for free. And once you remove the plastic sleeves, the ecorefill tube can be thrown the recycling bin. According to Unilever, asking consumers to dilute the product at home means 97 percent less water being transported, 87 percent fewer trucks on the road, and less greenhouse gas emissions. That all sounds great, but in actuality, distribution of Unilever’s products, which range from Dove to Axe, Hellmann’s to Bertolli, Suave to Tresemmé, only accounts for 3 percent of Unilever’s greenhouse gas emissions. (The company says 25 percent is in raw materials and blames 65 percent on how consumers use the products. Our bad?) But this isn’t about carbon emissions. Unilever, cognizant of the growing resentment against single-use plastic, has vowed to reduce the weight of its packaging by one-third, halve the waste associated with the disposal of its products by 2020, and use only reusable, recyclable, or compostable packing by 2025. Its efforts in this direction have been tentative. In 2018, it launched a 3-liter bottle of a Brazilian laundry detergent brand with a formula six times the concentration of the original. Unilever says it’s reduced the volume of plastic used for the detergent by 75 percent. Unilever is one of the consumer product behemoths in Loop, an ambitious cross-brand pilot project that ships reusable containers of everything from Degree deodorant to Häagen-Dazs ice cream to your door and then picks up the empties when you’re done. For that, Unilever redesigned Signal toothpaste to come in tablet form in a recyclable and refillable jar. You just chew one, brush your teeth, then rinse. I can’t tell you how Signal tabs work — I signed up for Loop’s pilot in New York City the day it was announced in January and haven’t yet gotten off the waitlist. But I have tried out ChewTab by Weldental, which was relaunched this year in a glass bottle with a metal lid to appeal to the zero-waste market. The sickly sweet minty xylitol is an acquired taste ... but the bottle sure looks good on my medicine cabinet shelf. If I’m honest, aesthetics are also why I selected Blueland, launched on Earth Day in April 2019, to test out this whole just-add-water fad for myself. That, and out of all the cleaners described above, it had no one-use plastic in its refill system and the most certifications, including the reputable Cradle to Cradle certification, which covers not only how the product is made and disposed of but also its toxicity — or lack thereof. I asked Blueland to send me a kit, and a few days later, a simple cardboard box arrived at my apartment. Inside, I found three shatterproof acrylic spray bottles accented in pink, yellow, and Caribbean blue and labeled in tiny font: Bathroom, Multi-Surface, Glass + Mirror. I filled the bottles with aqua de tap, unwrapped three tablets in corresponding colors, put the postmodernist wrappers in the compost bin, and dropped the tablets in the bottles, where they fizzed just like antacids. An hour later, I used the resulting lightly scented cleaners to wipe down my countertop and mirror and, with the help of a scrubby brush, break apart the soap scum in my bathtub. Before I put them away, I Instagrammed my zero-waste, nontoxic cleaning supplies and received a barrage of questions from my friends eager to try for themselves what might be the most attractive cleaning system ever made. It’s actually silly how pretty this sustainable and non-toxic cleaning system is. The acrylic bottles are supposed to be lifetime pieces — you just sign up for a subscription of tablets that come in compostable packaging, and you drop them into the bottles after filling them with tap water. The idea is to be zero-waste, plastic-free, and ship without water to save on carbon emissions. But does it actually clean? I’m trying them out for a @thegoodsbyvox story this week and exploring the world of just-add-water products that has suddenly sprung up in the past year. #zerowasteliving #zerowaste #plasticfree #plasticfreejuly #zerowastekitchen A post shared by Alden Wicker (@aldenwicker) on Jul 29, 2019 at 5:26am PDT If I sound like I’m in the Blueland cult, I apologize. I really did try to find something wrong with the products, and I couldn’t. While a lot of these supposedly more sustainable consumer products are rightly criticized for feeding our ever-expanding appetite for more stuff, you can’t quibble with making cleaning products — a necessary component of doing life — more sustainable. Blueland could only steal market share, not create a whole new purchasing category. I’ve DIYed my cleaners before, and found myself with shards of glass in my foot after my cat shoved the pretty brown glass spray bottle off the counter. And you can call it the placebo effect or clever marketing, but I honestly don’t believe plain white vinegar works as well as formulated cleaning products. Also, jugs of vinegar are mostly water. I guess my only quibble with this wave of just-add-water products is this: Shipping dry ingredients in compostable packaging and adding water to them ourselves is not a new concept. In fact, we’ve been doing it for thousands of years. Hello, tea, coffee, and soap. It’s only in the past few decades that we’ve taken these formerly eco-friendly items, added in water pumped out of water-scarce areas; thrown in aspartame, flavoring, parfum, and various other synthetic ingredients; put them in plastic bottles with cool logos and ridiculous health promises; and shipped them around the world. The fact is, even if every glass and multi-surface cleaner on the market came in tabs and refill cartridges, it would be BB shot compared to the warships of “functional” beverages that exist for no other reason than getting us to buy more stuff. According to Blueland’s research, the average American home will go through 30 single-use plastic bottles of cleaner in a year. Reducing this to zero is a good thing, sure. But in 2017, America’s per capita consumption of bottled water rose yet again to 42 gallons. That’s equivalent to more than 300 bottles of water. In Europe, plastic drink bottles are the most prevalent form of plastic found in waterways, now that plastic bags have been tackled. Yes, I’m definitely signing up for a Blueland subscription because I’m a sucker for pretty stuff that makes me feel less personally guilty about being an American consumption monster. But I’m under no illusion that this will save the world. It will merely save me a few trips downstairs to the recycling bin. Sign up for The Goods’ newsletter. Twice a week, we’ll send you the best Goods stories exploring what we buy, why we buy it, and why it matters. | NEWS-MULTISOURCE |
So You Wanna Buy a House? Step 9: Land a Loan | Fox News
Hand passing pen to sign ((c) Francesca Cambi) Unless you're one of the few lucky home buyers larded with old money, inheritance, recent wealth acquisition or the surname Trump (and, let's face it, that one cuts both ways), you're going to need a mortgage. It's the entire tortuous home buying process, it's perhaps the most intimidating and seemingly daunting step: convincing a bank to hand you hundreds of thousands of dollars. How do you pull it off? And what strings are attached? Check out this installment of our step-by-step Home-Buying Guide for the questions to ask yourself -- and the answers you need -- to help you ace this all-important step. Should you work with a bank or a broker? The majority of home buyers get their mortgage directly from a bank -- often the institution where they're stashing their primary savings. But that's hardly your only, or best, option. Shopping around with different lenders may land you a better deal (typically in the form of a lower interest rate). Or you can choose to hire a pro -- a mortgage broker. Brokers work directly with lenders to negotiate terms and determine the best loans for you -- not the generic you, but you specifically, taking into account your needs, income, savings, and any special situations that might apply. For instance, first-time buyers might have just landed a better job or gotten a raise, giving you more buying power that isn't reflected in the last two years of your tax documents. The right broker will be able to find loans that take only the past year's returns into account. The downside? Brokers do charge a fee, typically about 1% to 2% of the cost of your loan. While many receive this fee from the lender, they might also charge you, too. Still, if your financial situation is complex or you lack the time to do your own research, paying a broker could be money well spent. How long will you live there? For most people, the choice comes down to the two main types of loans: fixed-rate and adjustable rate mortgages, or ARMs. True to their name, fixed-rate mortgages offer home buyers an interest rate that remains the same for the life of the loan. ARMs have an interest rate that is fixed for an initial period (say, five years), then adjusts at regular intervals (typically one year) to reflect market indexes -- which means that your payments will fluctuate, too. If you prefer predictable payments and/or are planning to stay in your home for longer than a decade, a fixed-rate mortgage may be better, says Shikma Rubin, a mortgage consultant at Tidewater Home Funding in Chesapeake, VA. This is especially true in today's market, when interest rates are low. Then, your interest rate remains stable, regardless of market conditions. Yet there are times it makes more sense to get an ARM. For one, the starting interest rate for an ARM is often at least a percentage point lower than a fixed-rate mortgage, which can add up to substantial savings. And even though it may start vacillating at some point, that can be as far as 10 years down the line. Combine that with the fact that in a study from 2013, the typical buyer of a single-family home was predicted to stay in it for 13 years. So if you're expecting your residency to fall on the shorter end of the spectrum, an ARM might make total sense. What monthly payments can you afford? Most mortgages offer two loan periods: 15 and 30 years. A 15-year loan offers a lower interest rate but higher monthly payments, since you're paying it off in half the time. Conversely, a 30-year loan offers lower monthly payments, but you'll pay more interest over those 30 years. So which one is right for you? That depends on what you can afford. According to realtor.com's mortgage calculator, if you get a 30-year fixed-rate loan on a $200,000 home, your monthly mortgage payments would amount to about $1,385 per month. A 15-year loan for that same house would cost you $1,909. This is higher, but you'll pay only $66,288 in interest, whereas over 30 years, you'll pay $143,739. So it's up to you: pay more now, or pay more later? Do you expect your financial situation to change? If you're expecting major upcoming changes in your financial situation -- good or bad -- make sure to consider them before deciding on a loan. For instance, a major increase in your income might mean an ARM is the best product for you, providing low payments for now and more rapid repayment after a promotion. Anticipating a lump sum payment soon? Same thing: An ARM lets you pay less now and aggressively attack your principal balance later. But conversely, if you're concerned about your job stability, by all means, get a fixed rate, says Casey Fleming, author of The Loan Guide: How to Get the Best Possible Mortgage. As always, discuss your plans with your financial adviser or mortgage broker. Should you lock in your rate? A lock allows you to lock in a specific rate for a specified length of time before closing. This protects you if market rates go higher. A float-down is an extra feature that can be added to a lock. It allows you the flexibility to get an even lower rate if rates happen to retreat after a lock is set. These features require a fee, but depending on the volatility of the market and how critical it is for you to keep down your monthly mortgage payment, that cash could be a worthwhile investment. Can you negotiate anything? You may not have much luck negotiating the interest rate or terms of the loan, but there are other areas where lenders might be willing to wiggle. Ask for an itemized list of expenses, and see what's up for debate, says Anne Postic, the editor of Mortgages.com. Pay attention to the little charges. Do you see a courier or mail fee, but you did everything electronically? Postic says. Those fees may be standard for your lender, and they can be waived. Lenders might also be willing to waive the application fee or pay some of your closing costs, decreasing your overall cost. Mortgage brokers can be extra-helpful here, so make sure to talk to them about lowering any added expenses and fees. Loan. Check. Inspection. Check. Appraisal. Check. Next up in realtor.com's Home-Buying Guide: negotiating the closing costs. This material may not be published, broadcast, rewritten, or redistributed. 2018 FOX News Network, LLC. All rights reserved. All market data delayed 20 minutes. | NEWS-MULTISOURCE |
index: bitbucket.org/meirizarrygelpi/index Index | Files
package index
import "bitbucket.org/meirizarrygelpi/index"
Package index.
Index
Package Files
array.go doc.go
func AllArrays Uses
func AllArrays(k int) <-chan Array
AllArrays function returns a channel receiving all index arrays of a given length.
func AllEven Uses
func AllEven(k int) <-chan Array
AllEven function returns a channel receiving all of the index arrays of a given length with an even number of inversions.
func AllOdd Uses
func AllOdd(k int) <-chan Array
AllOdd function returns a channel receiving all of the index arrays of a given length with an odd number of inversions.
func CyclicInequivalent Uses
func CyclicInequivalent(k int) <-chan Array
CyclicInequivalent function returns a channel that receives all of the cyclic-inequivalent index arrays of a given length.
func ReflectionCyclicInequivalent Uses
func ReflectionCyclicInequivalent(k int) <-chan Array
ReflectionCyclicInequivalent function returns a channel that receives all of the mirror- and cyclic-inequivalent index arrays of a given length.
type Array Uses
type Array []int
Array type represents an array of distinct integers.
func IdentityArray Uses
func IdentityArray(n int) Array
IdentityArray function returns an ordered index array of a given length.
func (Array) AllAntiCycles Uses
func (a Array) AllAntiCycles() <-chan Array
AllAntiCycles method returns a channel that receives all of the anticycles of a given index array.
func (Array) AllCycles Uses
func (a Array) AllCycles() <-chan Array
AllCycles method returns a channel that receives all of the cycles of a given index array.
func (Array) AntiCycle Uses
func (a Array) AntiCycle()
AntiCycle method performs an in-place left cyclic shift on a given index array.
func (Array) Clone Uses
func (a Array) Clone() Array
Clone method returns a copy of a given index array.
func (Array) Cycle Uses
func (a Array) Cycle()
Cycle method performs an in-place right cyclic shift on a given index array.
func (Array) Inversions Uses
func (a Array) Inversions() int64
Inversions method returns the number of inversions in a given index array.
func (Array) IsEqualTo Uses
func (a Array) IsEqualTo(b Array) bool
IsEqualTo method returns true if two index arrays have the same entries.
func (Array) Len Uses
func (a Array) Len() int
Len method returns the length of an index array.
func (Array) Reverse Uses
func (a Array) Reverse()
Reverse method performs an in-place mirror reflection on a given index array.
func (Array) Shuffle Uses
func (a Array) Shuffle()
Shuffle method performs an in-place Fisher-Yates shuffle on a given index array.
func (Array) Sign Uses
func (a Array) Sign() int
Sign method returns 1 if a given index array has an even number of inversions, -1 otherwise.
func (Array) Sort Uses
func (a Array) Sort() Array
Sort method returns a sorted index array.
func (Array) String Uses
func (a Array) String() string
String method returns the string representation of an index array.
func (Array) Swap Uses
func (a Array) Swap(i, j int)
Swap method performs an in-place swap of the ith and jth entry on a given index array.
Package index imports 3 packages (graph). Updated 2019-06-05. Refresh now. Tools for package owners. | ESSENTIALAI-STEM |
blob: 6e8e140afb23f507e90ce2452019b14456e07b31 [file] [log] [blame]
//===--- CFGStmtMap.h - Map from Stmt* to CFGBlock* -----------*- C++ -*-===//
//
// The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file defines the CFGStmtMap class, which defines a mapping from
// Stmt* to CFGBlock*
//
//===----------------------------------------------------------------------===//
#ifndef LLVM_CLANG_CFGSTMTMAP_H
#define LLVM_CLANG_CFGSTMTMAP_H
#include "clang/Analysis/CFG.h"
namespace clang {
class CFG;
class CFGBlock;
class ParentMap;
class Stmt;
class CFGStmtMap {
ParentMap *PM;
void *M;
CFGStmtMap(ParentMap *pm, void *m) : PM(pm), M(m) {}
public:
~CFGStmtMap();
/// Returns a new CFGMap for the given CFG. It is the caller's
/// responsibility to 'delete' this object when done using it.
static CFGStmtMap *Build(CFG* C, ParentMap *PM);
/// Returns the CFGBlock the specified Stmt* appears in. For Stmt* that
/// are terminators, the CFGBlock is the block they appear as a terminator,
/// and not the block they appear as a block-level expression (e.g, '&&').
/// CaseStmts and LabelStmts map to the CFGBlock they label.
CFGBlock *getBlock(Stmt * S);
const CFGBlock *getBlock(const Stmt * S) const {
return const_cast<CFGStmtMap*>(this)->getBlock(const_cast<Stmt*>(S));
}
};
} // end clang namespace
#endif | ESSENTIALAI-STEM |
%0 Journal Article %A Robbert Havekes %A Vibeke M. Bruinenberg %A Jennifer C. Tudor %A Sarah L. Ferri %A Arnd Baumann %A Peter Meerlo %A Ted Abel %T Transiently Increasing cAMP Levels Selectively in Hippocampal Excitatory Neurons during Sleep Deprivation Prevents Memory Deficits Caused by Sleep Loss %D 2014 %R 10.1523/JNEUROSCI.2403-14.2014 %J The Journal of Neuroscience %P 15715-15721 %V 34 %N 47 %X The hippocampus is particularly sensitive to sleep loss. Although previous work has indicated that sleep deprivation impairs hippocampal cAMP signaling, it remains to be determined whether the cognitive deficits associated with sleep deprivation are caused by attenuated cAMP signaling in the hippocampus. Further, it is unclear which cell types are responsible for the memory impairments associated with sleep deprivation. Transgenic approaches lack the spatial resolution to manipulate specific signaling pathways selectively in the hippocampus, while pharmacological strategies are limited in terms of cell-type specificity. Therefore, we used a pharmacogenetic approach based on a virus-mediated expression of a Gαs-coupled Drosophila octopamine receptor selectively in mouse hippocampal excitatory neurons in vivo. With this approach, a systemic injection with the receptor ligand octopamine leads to increased cAMP levels in this specific set of hippocampal neurons. We assessed whether transiently increasing cAMP levels during sleep deprivation prevents memory consolidation deficits associated with sleep loss in an object–location task. Five hours of total sleep deprivation directly following training impaired the formation of object–location memories. Transiently increasing cAMP levels in hippocampal neurons during the course of sleep deprivation prevented these memory consolidation deficits. These findings demonstrate that attenuated cAMP signaling in hippocampal excitatory neurons is a critical component underlying the memory deficits in hippocampus-dependent learning tasks associated with sleep deprivation. %U https://www.jneurosci.org/content/jneuro/34/47/15715.full.pdf | ESSENTIALAI-STEM |
Page:The Lives of the Most Eminent English Poets, Volume 3.djvu/178
174 It is generally reported, that this project was for some time successful, and that Savage was employed at the awl longer than he was willing to confess; nor was it perhaps any great advantage to him, that an unexpected discovery determined him to quit his occupation.
About this time his nurse, who had always treated him as her own son, died; and it was natural for him to take care of those effects which by her death were, as he imagined, become his own: he therefore went to her house, opened her boxes, and examined her papers, among which he found some letters. written to her by the Lady Mason, which informed him of his birth, and the reasons for which it was concealed. He was no longer satisfied with the employment which had been allotted him, but thought he had a right to share the affluence of his mother; and therefore without scruple applied to her as her son, and made use of every art to awaken her tenderness, and at tract her regard. But neither his letters, nor the interposition of those friends which his merit or his distress procured him, made any impression upon her mind. She still resolved Rh | WIKI |
User:Ambartley
I am a current freshman (Class of 2020) at Washington University in St. Louis. My primary interests include the fields of microbiology, immunology, and biomaterials. This interests stem from prior research projects at the University of Chicago and Chicago State University. At the University of Chicago my research projects included using silicon nanowires as scaffolds for growing cardiomyocytes in order to create a biomaterial that could replace a pacemaker and creating an interface between T-Cells and silicon nanowires that would allow the T-Cell Receptor to be activated remotely by way of the photoeletric properties of the silicon nanowires. At Chicago State University my work included research on the discoidin protein created by Dictyostelium discoideum and how it may related to the human DDR1 gene. My honors include being an IJAS science fair participant for 6 years straight, being and alternate for the INTEL National Science and Engineering fair twice, and having my work recognized by the College of American Pathologists. I am also an artist on the side. | WIKI |
Marc Planus
Marc Planus (born 7 March 1982) is a French former professional footballer who played as a defender. A one-club man, he played his entire professional career for his local club Bordeaux. He earned one cap for the France national team and was in the squad for the 2010 FIFA World Cup.
Club career
Planus made his league debut on 9 November 2002, against Rennes. He went on to play seventeen games in Ligue 1 in the 2002–03 season.
It was the first of more than 200 league matches. In 2006–07 and 2008–09 he won the Coupe de la Ligue (scoring a goal in the 2009 final) and in both 2008–09 and 2009–10 he won the Trophée des Champions. At the end of the 2014–15 Ligue 1 season, Planus announced his retirement from football.
Honours
Bordeaux
* Ligue 1: 2008–09
* Coupe de France: 2012–13
* Coupe de la Ligue: 2006–07, 2008–09
* Trophée des Champions: 2008, 2009 | WIKI |
Analogies for Sustainable Development/Children as scientists - scientists as children
Quote Bank
Gopnik, Meltzoff and Kuhl (2000) :
“A number of developmental psychologists have argued recently that what children do looks strikingly like what adult scientists do. Children create and revise theories in the same way that scientists create and revise theories…. In fact, we think they are not just similar but identical."
"We think that children and scientists actually use some of the same machinery. Scientists are big children. Scientists are such successful learners because they use cognitive abilities that evolution designed for the use of children."
"Just as babies play with the world, testing out their hypotheses on the objects around them, scientists perform experiments. Of course, the scientists’ toys are a lot more expensive."
"Just as children eventually revise and even replace what they know in the light of what they find out, scientists eventually abandon even cherished theories for new ones. It is true that scientists are less willing to give up their theories than children are, but this may, of course, have something to do with the cost of their toys."
"The two most successful examples of human learning turn out to be quite similar. Children and scientists are the best learners in the world, and they both seem to operate in very similar, even identical ways. But they are also never permanently dogmatic—the things they know (or think they know) are always open to further revision."
"When we give grownups leisure and money and interesting problems to solve, they can be almost as smart as babies. We think that, throughout history, some adults continued to learn new things about the world, especially when they were relevant to particular problems of survival. This might explain, for example, the achievements of hunter-gatherer “folk botany” or of Australian aboriginal geography. But the contingencies of history some five hundred years ago gave many more adults the chance to learn about the world. We invented institutions that re-created the conditions of childhood—protected leisure and the right toys. We call those institutions science."
"The most important difference is that children typically make up theories about close, middle-sized, common objects, including people. Scientists, in contrast, often make up theories about objects that are very small or very big, hidden or rare or far away, and the relevant evidence is often very thin on the ground."
"Being a baby may feel like being a scientist. It isn’t just that babies can explore and explain their world; they seem driven to do so, even at the risk of life and limb and maternal conniption fits. Like other human drives, that explanatory drive comes equipped with certain emotions: a deeply disturbing dissatisfaction when you can’t make sense of things and a distinctive joy when you can. All of us are driven by these cognitive emotions sometimes, scientists are driven by them much of the time, and babies, who have so much to learn, are in their grip practically all the time." | WIKI |
Page:The Tragic Muse (London & New York, Macmillan & Co., 1890), Volume 1.djvu/108
100 "Then what you said just now was a speech," Mrs. Dallow rejoined.
"A speech?"
"The 'rot,' the humbug of the hustings."
"No, those great truths remain, and a good many others. But an inner voice tells me I'm in for it. And it will be much more graceful to embrace this opportunity, accepting your co-operation, than to wait for some other and forfeit that advantage."
"I shall be very glad to help you anywhere," said Mrs. Dallow.
"Thanks, awfully," murmured the young man, still standing there with his hands in his pockets. "You would do it best in your own place, and I have no right to deny myself such a help."
Julia smiled at him for an instant. "I don't do it badly."
"Ah, you're so political!"
"Of course I am; it's the only decent thing to be. But I can only help you if you'll help yourself. I can do a good deal, but I can't do everything. If you'll work I'll work with you; but if you are going into it with your hands in your pockets I'll have nothing to do with you." Nick instantly changed the position of these members, and sank into a seat with his elbows on his knees. "You're very clever, but you must really take a little trouble. Things don't drop into people's mouths."
"I'll try—I'll try. I have a great incentive," Nick said.
"Of course you have."
"My mother, my poor mother." Mrs. Dallow made a | WIKI |
Wikipedia:Articles for deletion/Edmond Lupancu
The result was keep. ✗ plicit 00:05, 24 February 2022 (UTC)
Edmond Lupancu
* – ( View AfD View log | edits since nomination)
Fails WP:GNG and WP:NFOOTBALL--Alza08 (talk) 11:28, 6 February 2022 (UTC) Please add new comments below this notice. Thanks, ✗ plicit 13:18, 16 February 2022 (UTC)
* Note: This discussion has been included in the list of Sportspeople-related deletion discussions. Spiderone (Talk to Spider) 06:58, 9 February 2022 (UTC)
* Note: This discussion has been included in the list of Football-related deletion discussions. Spiderone (Talk to Spider) 06:58, 9 February 2022 (UTC)
* Note: This discussion has been included in the list of Australia-related deletion discussions. Spiderone (Talk to Spider) 06:58, 9 February 2022 (UTC)
* Note: This discussion has been included in WikiProject Football's list of association football-related deletions. Spiderone (Talk to Spider) 07:06, 9 February 2022 (UTC)
* Automated comment: This AfD was not correctly transcluded to the log (step 3). I have transcluded it to Articles for deletion/Log/2022 February 9. —cyberbot I Talk to my owner :Online 07:14, 9 February 2022 (UTC)
* Keep - 3 appearances in the FFA Cup, which means he meets NFOOTBALL, as they were appearances in a competitive match between two teams from WP:FPL. Needs improving, not deleting. GiantSnowman 18:28, 9 February 2022 (UTC)
* Comment - Aisen Ishak made 2 appearances in the FFA Cup, yet his Wikipedia article was deleted on the grounds of failing WP:GNG and WP:NFOOTBALL--Alza08 (talk) 02:29, 10 February 2022 (UTC)
* In the case of Ishak, User:Alza08 the games were a team that wasn't fully professional, and NFOOTBALL wasn't met. In this case it was against a fully-professional team and NFOOTBALL is met. Nfitz (talk) 19:25, 17 February 2022 (UTC)
* Delete we should not have articles built on youth player profiles. In this case if this meets football notability, we need to change football notability to better reflect what actual leads to meeting GNG.John Pack Lambert (talk) 14:47, 10 February 2022 (UTC)
* Keep - Played against A-League side Perth Glory FC in the FFA Cup therefore passes WP:NFOOTBALL. Simione001 (talk) 13:41, 12 February 2022 (UTC)
* Relisted to generate a more thorough discussion and clearer consensus.
* Keep Meets NFOOTBALL as per above. Also meets long-standing consensus that articles can be created after first professional cap. Also there is some coverage here. Nfitz (talk) 19:16, 17 February 2022 (UTC)
| WIKI |
(210i) Eradication of Bacterial Persister Cells By Targeting Membrane Potential
Authors:
Roy, S., Syracuse University
Bahar, A. A., Syracuse University
Gu, H., Syracuse University
Ren, D., Syracuse Biomaterials Institute
Bacteria are well known to enter dormancy and form persister cells which is a subpopulation exhibiting high-level tolerance to antibiotics. This feature allows persister cells to survive the treatment of potent antibiotic and cause reoccurring infections. Despite extensive research, controlling persister cells still remains a challenge. Because persister cells have a lower membrane potential than normal cells, we hypothesize that persister cells have reduced efflux activities, which can lead to higher accumulation of antibiotics intracellularly. To test this hypothesis, we compared the concentration of minocycline, a semi-synthetic tetracycline antibiotic, in normal and persister cells of Escherichia coli (E. coli) HM22. We show that with a concentration of 100μg/mL of minocycline we can kill E.coli persister cells by 70.8 ± 5.9% while it only killed normal cells by 10.3 ± 3.7%. In addition, the results show that persister cells accumulated ~4 times more minocycline per cell compared to normal cell. Consistently, the results were corroborated with tests using efflux pump mutants and efflux pump inhibitors. Specifically, the acrAB mutant (of the Resistance Nodulation Division efflux pumps) exhibited an increased susceptibility to minocycline; e.g. minocycline killed the acrA mutant by 99.0 ± 0.1% at a concentration of 100μg/mL. Consistently, treatment with carbonyl cyanide m-chlorophenylhydrazone (CCCP), an efflux pump inhibitor, at 10μM led to 94.7 ± 2.5% killing of E.coli normal cells by minocycline. This is a ~4 times increase compared to treatment without membrane depotentiation which only led to 22.0 ± 3.3% killing. Collectively, these findings reveal that persister formation may cause enhanced penetration for certain antibiotics which can lead to more killing of tolerant population under normal conditions. | ESSENTIALAI-STEM |
Page:EB1911 - Volume 07.djvu/654
It was nearly all correct, but it advanced our knowledge but slightly because it did not give the forms of the words—because (to put it in another way) he was not able to transliterate the Assyrian words. This was the great problem. In the Persian texts there were but forty-four signs, but in the third column of the Persepolis texts Grotefend had counted one hundred and thirty different characters, and estimated that in all the Babylonian texts known to him there were about three hundred different signs, while Botta discovered six hundred and forty-two in the texts found by him at Khorsabad. That was enough to make the stoutest heart quail, for a meaning must be found for every one of these signs. There could not be so many syllables, and it was, therefore, quite plain that the Babylonian language must have been written in part at least in ideograms. But in 1851 Rawlinson published one hundred and twelve lines of the Babylonian column from Behistun, accompanied by an interlinear transcription into Roman characters, and a translation into Latin. That paper, added to Hinck’s still more acute detail studies, brought to an end the preliminary decipherment of Babylonian. There were still enormous difficulties to be surmounted in the full appreciation of the complicated script, but these would be solved by the combined labours of many workers.
The cuneiform script had its origin in Babylonia and its inventors were a people whom we call the Sumerians. Before the Semitic Babylonians conquered the land it was inhabited by a people of unknown origin variously classified, by different scholars, with the Ural-altaic or even
with the Indo-European family, or as having blood relationship with both. This people is known to us from thousands of cuneiform inscriptions written entirely in their language, though our chief knowledge of them was for a long time derived from Sumerian inscriptions with interlinear translations in Assyrian. Their language is called Sumerian (li-ša-an Su-me-ri) by the Assyrians (Br. Mus. 81–7-27, 130), and its characteristics are being slowly developed by the elaborate study of the immense literature which has come down to us. In 1884 Halévy denied the existence of the Sumerian language, and claimed that it was merely a cabalistic script invented by the priests of the Semites. His early success has not been sustained, and the vast majority of scholars have ceased to doubt the existence of the language.
The Sumerians developed their script from a rude picture-writing, some early forms of which have come down to us. In course of time they used the pictures to represent sounds, apart from ideas. They wrote first on stone, and when clay was adopted soon found that straight lines in soft clay when made by a single pressure of the stylus tend to become wedges, and the pictures therefore lost their character and came to be mere conventional groups of wedges. Some of these wedge-shaped signs are of such character that we are still able to recognize or re-construct the original picture from which they came. The Assyrian sign, which means heaven, appears in early texts in the form in which its star-like form is quite evident (star = heaven) and from which the linear form 🞻 may be not improbably pre-supposed. A number of other cases were enumerated by the Assyrians themselves (see Cuneiform Texts from Bab. Tab. in Brit. Museum, vol. v., 1898), and there can be no reasonable doubt that this is the origin of the script.
The number of the original picture-signs cannot have been great, but the development of new signs never ceased till the cuneiform script passed wholly from use. The simplest form of development was doubling, to express plurality or intensity. After this came the working of two
signs into one; thus 𒀀 “water,” when placed in 𒅗 “mouth” gave the new sign 𒅘 “to drink,” and many others. Other signs were formed by the addition of four lines, either vertically or horizontally, to intensify the original meaning. Thus, for instance, the old linear sign means dwelling, but with four additional lines, thus , it means “great house.” This sign gradually changed in form until it came to be. This method of development was called by the Sumerians gunu, and signs thus formed are now commonly called by us, gunu signs. They number hundreds and must be reckoned with in our study of the script development, though perhaps recent scholars have somewhat exaggerated their importance. The process of development is obscure and must always remain so.
The script as finally developed and used by the Assyrians is cumbrous and complicated, and very ill adapted to the sounds of the Semitic alphabet. It has (1) simple syllables, consisting of one vowel and a consonant, or a vowel by itself, thus 𒀀 “a,” 𒀊 ab, 𒅁 ib, 𒌒 ub, 𒁀 ba, 𒑙 bi, 𒁍 bu. In addition to these the Assyrian had also (2) compound syllables, such as 𒂍 bit, 𒁄 bal, and (3) ideograms, or signs which express an entire word, such as 𒎏 beltu, lady, 𒀜 abu, father. The difficulty of reading this script is enormously increased by the fact that many signs are polyphonous, i.e. they may have more than one syllabic value and also be used as an ideogram. Thus the sign 𒆳 has the ideographic values of matu, land, shadu, mountain, kashadu, to conquer, napachu, to arise (of the sun), and also the syllabic values kur, mad, mat, shad, shat, lat, nad, nat, kin and gin. This method of writing must lead to ambiguity, and this difficulty is helped somewhat by (4) determinatives, which are signs intended to indicate the class to which the word belongs. Thus, the 𒁹 is placed before names of persons, and 𒆳 (the ideogram for matu, country, and shadu, mountain) is placed before names of countries and mountains, and 𒀭 (ilu, god) before the names of gods.
The cuneiform writing, begun by the Sumerians in a period so remote that it is idle to speculate concerning it, had a long and very extensive history. It was first adopted by the Semitic Babylonians, and as we have seen was modified, developed, nay almost made over. Their inscriptions
are written in it from circa 4500 to the 1st century From their hands it passed to the Assyrians, who simplified some characters and conventionalized many more, and used the script during the entire period of their national existence from 1500 to 607 From the Babylonian by a slow process of evolution the much simplified Persian script was developed, and with the Babylonian is also to be connected the Susian, less complicated than the Babylonian, but less simple than the Persian. The Chaldians (not Chaldaeans), who lived about Lake Van, also adopted the cuneiform script with values of their own, and expressed a considerable literature in it. The discovery in 1887 of the Tell-el-Amarna tablets in upper Egypt showed that the same script was in use in the 15th century , from Elam to the Mediterranean and from Armenia to the Persian Gulf for purposes of correspondence. There is good reason to expect the discovery of its use by yet other peoples. It was one of the most widely used of all the forms of ancient writing.
—The history of the decipherment may be further studied in R. W. Rogers, History of Babylonia and Assyria, vol. i. (N.Y. and London, 1900); and in A. J. Booth, The Discovery and Decipherment of the Trilingual Cuneiform Inscriptions (London, 1902), which is very exhaustive and accurate. The Sumerian question may best be studied in F. H. Weissbach, Die Sumerische Frage (Leipzig, 1898), and Charles Fossey, Manuel d’Assyriologie, tome i. (Paris, 1904). For development and characteristics, see Friedrich Delitzsch, Die Entstehung des ältesten Schriftsystems (Leipzig, 1897); Paul Toscanne, Les Signes sumériens dérivés (Paris, 1905).
CUNEO (Fr. Coni), a town and episcopal see of Piedmont, Italy, the capital of the province of Cuneo, 55 m. by rail S. of Turin, 1722 ft. above sea-level. Cuneo lies on the railway from Turin to Ventimiglia, which farther on passes under the Col di Tenda (tunnel 5 m. long). It is also a junction for Mondovi and Saluzzo, and has steam tramways to Borgo S. Dalmazzo, Boves, Saluzzo and Dronero. Pop. (1901) 15,412 (town), 26,879 (commune). Its name (“wedge”) is due to its position on a hill between two streams, the Stura and the Gesso, with fine views of the mountains. The Franciscan church, now converted into a military storehouse, belongs to the 12th century, but there are no other buildings of special interest. The fortifications have | WIKI |
It’s called orange peel syndrome, cottage cheese skin, hail damage, and the mattress phenomenon. What is it? It’s cellulite, and for thousands of women, it’s a problem.
What is cellulite and who gets it?
Cellulite is the dimpled appearance of the skin most commonly found on the abdomen, hips, thighs, and buttocks, typically occurring after puberty. The lumpiness is caused by fat deposits that push and distort the connective tissue below the skin.
Anyone can develop cellulite. It not only afflicts the full-figured, but also skinny people as well. It affects about 90% of women and 10% of men. It’s more common in women because of differences in the way fat, muscle, and connective tissue are distributed. Women have three layers of fat in their abdomens, triceps, knees, saddlebags, and buttocks.
What causes cellulite?
The causes of cellulite are not well understood, but there are a number of theories:
• Hormonal Factors—Many believe estrogen, insulin, noradrenaline, thyroid hormones, and prolactin play a part in the cellulite production process. As estrogen starts to decrease, so does circulation and collagen production. Fat cells become larger and protrude through the collagen.
Genetics—Genes may predispose an individual to certain characteristics associated with cellulite such as gender, race, slow metabolism, fat distribution, and circulatory insufficiency.
Diet and Lifestyle—People you consume diets high in fat, carbohydrates, salt, and low in fiber are likely to have higher amounts of cellulite. It may be more prevalent in smokers, those who don’t exercise, and those who sit or stand for long periods of time.
• Clothing—Tight, restrictive undergarments that limits blood flow may contribute to cellulite formation. Decreased circulation means less oxygen and nutrition to areas where cellulite is common.
Can cellulite be treated?
There are varying degrees of cellulite, ranging from not visible to highly visible. Obviously no cellulite is ideal, but difficult to attain. Highly visible is the most difficult to treat. Realistically, there are three treatable components of cellulite: collagen, fat reduction, and circulation. Exercising regularly will help maintain good circulation, skin tone, and texture. Eating a healthy, low-fat diet will help reduce fat. Collagen production, which decreases as we age, can be increased with treatments such as 3DEEP body countouring and skin tightening, vacuodermie, and Silk Peel.
Call us at (956) 664-1234 to schedule a free consultation to learn more about cellulite treatments.
Share With Your Beautis | ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.