Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Haris Jauhari
Haris Jauhari is an Indonesian journalist, born in Jakarta, May 1, 1960.
Biography
Haris was the chairman of Ikatan Jurnalis Televisi Indonesia - IJTI for the 1998–2001 term. He was also the chairman of Indonesian Journalists' Protection Committee and was a chairman of Journalistic Section in the Indonesia Chambers of Commerce.
He has served several of Indonesia's newspapers such as Prioritas, Pikiran Rakyat, Investor Daily and has also held the position of general manager for Investor Magazine.
Haris held many positions in TV Broadcasting:
* Chief Editor of Televisi Pendidikan Indonesia - TPI and Executive Producer & Host of the talk show Partai Partai
* Corporate Secretary of OkeVision, TrenTV, and Global TV
* Hosted the political talk show Demi Bangsa
Today
Haris is currently the Senior Consultant of the National Communications Institute and is active in the National Media Practitioners Communications Forum. | WIKI |
Talk:Carabus lusitanicus
Lusitanicus or loshnikovi?
the reference link goes to a page for a species named carabus loshnikovi. the article says the species is endemic to russia. loshnikovi sounds russian but a species named lusitanicus should be native to portugal, as lusitania is the roman name for that country. what gives?Toyokuni3 (talk) 05:24, 7 May 2013 (UTC)
* Fixed it, sorry, it was one of my first articles on insects.--Mishae (talk) 01:26, 25 December 2013 (UTC) | WIKI |
User:BETTYSWALLOCKZ/sandbox
ADAM JOHN BOYD
This boy has many hidden talent but one of his more noticable appendages windsock. With this he can tell the direction of any wind and the speed at which it blows however, if the wind becomes too vigorous it may split and cause hurt to him. | WIKI |
How to Pair Bose Earbuds to Android
There are a few different ways that you can pair your Bose earbuds to your Android device. The first thing that you need to do is make sure that your Bluetooth is turned on. Once you have verified that, you can then go into your settings and look for the Bluetooth menu.
From there, you should see an option to add a new device. When you select that option, it will search for any nearbyBluetooth devices. Your Bose earbuds should show up on the list of available devices.
Simply select them and they should be paired with your Android device.
• Open the case of the Bose earbuds and make sure that they are turned on
• On your Android device, open the Settings menu and select Bluetooth
• Make sure that Bluetooth is enabled on your device and then select “Search for Devices”
• Your Bose earbuds should appear in the list of available devices
• Select them to pair them with your Android device
How to Connect Bose SoundSport Free with Android Device?
How Do You Put Bose Wireless Earbuds in Pairing Mode?
If you’re having trouble connecting your Bose wireless earbuds to your device, make sure they’re in pairing mode. To do this, press and hold the multi-function button on the right earbud for approximately two seconds until you hear “Ready to pair”. Then, open the Bluetooth settings on your device and select “Bose SoundSport Free” from the list of available devices.
How Do I Make My Bose Earbuds Discoverable?
If you’re having trouble connecting your Bose earbuds to your device, there are a few things you can try. First, make sure that both your earbuds and your device are turned on and in range of each other. Then, open the Bluetooth settings on your device and look for “Bose” under the list of available devices.
If you don’t see “Bose,” try holding down the button on the right earbud for 5 seconds until you hear an audio cue. Once you see “Bose” appear in the Bluetooth settings, select it to pair the earbuds with your device.
Why Won’T My Bose Earbuds Connect to My Phone?
If you’re having trouble connecting your Bose earbuds to your phone, there are a few things you can try. First, make sure that your earbuds are fully charged. If they’re not, connect them to a power source and wait a few minutes before trying again.
Next, check that the Bluetooth on your phone is turned on and that it’s in range of your earbuds. If both of those things are fine, then try restarting your phone and/or earbuds. Sometimes this can clear up any connection issues.
If you’re still having trouble, it’s possible that there’s something wrong with the hardware itself. In this case, you may need to get in touch with Bose customer support for further troubleshooting assistance.
How Do I Pair My Bose Headphones to My Samsung?
If you’re having trouble connecting your Bose headphones to your Samsung device, don’t worry—it’s easy to do. Simply follow these steps and you’ll be listening to music in no time. First, make sure that your Bose headphones are turned on and in pairing mode.
To do this, press and hold the power button for about 2 seconds until the light on the headphones turns red and begins flashing. Next, open the Bluetooth settings on your Samsung device. You can do this by going into the Settings app and scrolling down to the “Connections” section.
Tap on Bluetooth, then tap on the toggle switch at the top of the screen to turn it on. Once Bluetooth is enabled, your Samsung device will start scanning for nearby devices that it can connect to. When it finds your Bose headphones, they will appear in a list under “Available Devices.”
Tap on them to select them, then enter the PIN code if prompted (the default PIN code is 0000). Once you’ve done that, your Bose headphones should be successfully paired with your Samsung device!
How to Pair Bose Earbuds to Android
Credit: www.youtube.com
How to Connect Bose Sport Earbuds to Android
If you’re a fan of Bose’s line of Sport earbuds, you may be wondering how to connect them to your Android device. Luckily, it’s a relatively simple process. Here’s what you need to do:
1. Make sure your Bose Sport earbuds are powered off. If they’re not, press and hold the power button for about two seconds until you see the LED indicator light flash red and white. 2. Open the Bluetooth settings on your Android device.
This can usually be found in the Settings app under “Connections” or “Wireless & networks.” 3. Tap on “Pair new device.” Your Android device will now begin scanning for nearby Bluetooth devices.
4. Select your Bose Sport earbuds from the list of available devices. You may need to enter a PIN code, which is typically 0000 or 1234, to complete the pairing process. Once your Bose Sport earbuds are connected to your Android device, you’ll be able to stream audio wirelessly from any compatible apps or services.
Enjoy!
Conclusion
If you have a pair of Bose earbuds and an Android device, you may be wondering how to connect them. Here’s a quick guide on how to do just that. First, make sure your Bose earbuds are powered off.
Then, open the Bluetooth settings on your Android device and select “Bose QuietComfort 35 II.” Once your devices are paired, you should be able to hear audio through your earbuds. Enjoy! | ESSENTIALAI-STEM |
5 Hotel Stocks to Buy for a Summer Travel Boom
It's a volatile stock market out there right now as investors eye the start of the Federal Reserve's first rate-hike cycle in years and geopolitical uncertainty stemming from the war in Ukraine.
With so much attention focused on these two issues, many investors might be missing opportunities available in a recovering travel industry, particularly among hotel stocks.
Since mid-January, new COVID-19 cases in the U.S. are down nearly 98% from their mid-January high, according to data from the Centers for Disease Control and Prevention.
SEE MORE 20 High-Volatility Stocks for the Market's Next Swing
And while TSA data shows that current travel volumes are running about 10% or so below 2019 levels, recently upgraded forecasts from airlines suggest a vigorous rebound later this year.
Airlines certainly give us insight into current and future travel demand, but they might not be the best investment option at the moment given their exposure to oil prices and high levels of debt. Hotel stocks, on the other hand, have much better economics and pricing power. Further, hotels didn't have to dilute shares and borrow money as excessively as airlines during the pandemic. And many were able to use the downturn to improve operating margins.
With this in mind, here are five hotel stocks to buy amid a summer travel boom. To create the list, we examined only top-rated stocks in the Stock News POWR Ratings universe. The stock-rating tool measures more than a hundred different factors – from balance-sheet strength to analyst sentiment to momentum – to find which names are poised to outperform the market. All of the hotel stocks listed here have Buy or Strong Buy ratings.
SEE MORE The 22 Best Stocks to Buy for 2022
Data is as of March 27. Dividend yields are calculated by annualizing the most recent payout and dividing by the share price.
Getty Images
InterContinental Hotels Group
Market value: $12.8 billion
Dividend yield: N/A
POWR Ratings overall rating: B (Buy)
InterContinental Hotels Group (IHG, $69.82) owns, manages, franchises and leases hotels in various countries worldwide. The U.K.-based company has approximately 6,000 hotels and 886,000 rooms in roughly 100 countries.
IHG operates under several brands, including EVEN Hotels, Regent Hotels & Resorts, InterContinental Hotels & Resorts, Hotel Indigo, Crowne Plaza, Holiday Inn and Holiday Inn Express. It also provides an IHG Rewards loyalty program.
Large hotel operators like IHG have been able to use the pandemic to pursue growth opportunities while smaller operators were more focused on survival. The company opened 291 hotels in 2021 and signed another 437 into its pipeline of properties.
InterContinental Hotels Group's full-year 2021 results showed a strong average daily rate (ADR) – a key metric in the hospitality industry that measures revenue earned on occupied room – in all of its regions, particularly in the U.S.
Overall, IHG saw 32% year-over-year (YoY) evenue growth in 2021 compared to 2020, though it still remains 33% below 2019 levels. International, business and group travel remain laggards, and the firm has more exposure to these segments than many other operators given its international presence.
Buying IHG is an implicit bet on improvement in these categories as many leisure areas across its North American properties are already above pre-pandemic levels.
InterContinental Hotels Group has an overall B (Buy) rating in the POWR Ratings system. B-rated stocks have posted an average annual return of 20.1% which compares favorably to the S&P 500's annual return of 8.0%.
Included in the firm's score is a Quality Grade of B, considering IHG is one of the top hotel stocks in the space with ownership of well-known brands and premium properties. IHG also has a Sentiment Grade of B, with four out of the five Wall Street analysts covering the stock giving it a Strong Buy rating. Check out the complete POWR Ratings for IHG, including a deeper dive into its component scores.
SEE MORE What the Russia Oil Ban Means for Stocks
Getty Images
Travel + Leisure
Market value: $5.0 billion
Dividend yield: 2.8%
POWR Ratings overall rating: B (Buy)
Travel + Leisure (TNL, $58.48) provides hospitality services and products in the U.S. and abroad. The company was formerly known as Wyndham Destinations and Wyndham Worldwide and is headquartered in Orlando, Florida.
TNL operates in two segments: Vacation ownership and leisure travel and membership. The company's portfolio is made up of hotels and resorts, and includes brands such as Club Wyndham, Worldmark by Wyndham and Margaritaville Vacation Club by Wyndham.
The company generates the bulk of its revenue from timeshares. This type of business experienced a steep decline during the pandemic, but Travel + Leisure's most recent earnings report shows that a turnaround has already begun.
Overall in 2021, TNL had $3.1 billion in sales, up 45% YoY, but down 22% on a two-year basis. The company also reported $3.56 in earnings per share (EPS) – a vast improvement over 2020's per-share loss of $2.96, but not quite at the $5.50 per share Travel + Leisure earned in 2019. In 2022, analysts are forecasting $3.6 billion in sales, on average, and $4.45 in EPS.
The company's improving fundamentals can also be seen in its growing dividend. TNL recently hiked its quarterly dividend by 14.3% to 40 cents per share, or $1.60 per share on an annual basis. This works out to a current dividend yield of 2.8%, higher than the S&P 500's 1.3%.
Another sign of strength is that Travel + Leisure completed a bond offering of $275 million at interest rates between 3% and 4%.
TNL is another of the B-rated hotel stocks in the POWR Ratings universe, which equates to a Buy. Travel + Leisure has strong component grades across the board including a B for Value – based on the firm's forward price-to-earnings (P/E) ratio of 10.5x, well below the S&P 500's 18.9x. Take a look at the full breakdown of TNL's POWR Ratings component scores.
SEE MORE The Pros' 10 Best S&P 500 Stocks to Buy Now
Getty Images
Target Hospitality
Market value: $584.2 million
Dividend yield: N/A
POWR Ratings overall rating: B (Buy)
Target Hospitality (TH, $5.73) is one way to play the red-hot energy sector via hotel stocks. The specialty rental and hospitality services company caters to a variety of clients, including those in the oil and gas equipment & services industry.
TH offers housing and hospitality solutions across key locations for energy firms, including the Permian, Bakkan and Anadarko oil fields. Currently, the company owns around 16,000 rooms across 31 different locations.
While TH services for a variety of end-users, the bulk of its revenue comes from companies in the energy sector. As such, it is not surprising that revenues were depressed alongside energy prices in 2020. And while oil prices started to see a recovery in 2021, drilling activity in North America didn't materially pick up until 2022 when oil started approaching the $100-per-barrel level.
U.S. rig counts came in at 670 for the week ended March 25, according to energy technology firm Baker Hughes, up 60.7% from the year-prior. The number could keep rising too, given expectations that North American oil production should exceed pre-pandemic levels by the fourth quarter.
And Russia's invasion of Ukraine may mark an inflection point for energy prices as bipartisan support and appreciation for domestic energy production rises. Both developments bode well for TH.
Another positive is that the company has reduced costs and improved operations. This is evidenced by its free cash flow per share being higher than pre-pandemic levels, despite revenue being lower by about 3%.
In 2021, Target Hospitality lost 5 cents per share, while bringing in $291 million in revenue. But in 2022, analysts are forecasting a profit of 9 cents per share and $332 million in revenue.
As such, the stock has a Growth Grade of A – part of its overall B (Buy) rating in the POWR Rating system. Also helping its growth score is its exposure to two sectors with very strong momentum: Energy and hospitality. Check out the full POWR Ratings breakdown for TH.
SEE MORE 5 Super Stocks to Stave Off Sizzling Inflation
Getty Images
Choice Hotels
Market value: $8.0 billion
Dividend yield: 0.7%
POWR Ratings overall rating: B (Buy)
Choice Hotels (CHH, $143.09) is a unique company relative to other hotel stocks. CHH franchises lodging properties under several brands, including Comfort Inn, Clarion, EconoLodge and Rodeway Inn. It currently franchises more than 7,100 hotels in no fewer than 40 countries and territories.
Franchising means higher margins than operating a hotel. This is evidenced in CHH's gross margin of 56.1%, well above the industry average of 28.9%. Choice Hotels also markets cloud-based property management software to non-franchised hoteliers, which helps boost margins too.
While higher margins are supportive of multiple expansion, the recovery in travel will help accelerate earnings growth. And Choice Hotels is poised to be a major beneficiary of this increase in travel, as it has a 24% market share of middle-market hotels and a 20% market share of economy properties. Plus, 80% of its portfolio is in the U.S., which is the market seeing the strongest recovery.
Another reason to like Choice Hotels is that its revenues are nearly back to pre-pandemic levels, with room for more recovery across multiple categories. As such, the company has a Growth Grade of B in the POWR Ratings system, part of its overall B (Buy) rating.
What's more, free cash flow – or the money left over after a firm has paid its expenses, interest on debt, taxes and long-term investments needed to grow the business – and earnings that are above 2019 levels.
CHH also has a grade of A for Quality due in part to its return on invested capital. At 26.1%, this is well above the industry average. Take a closer look at the rest of CHH's POWR Ratings.
SEE MORE 15 Mighty Mid-Cap Stocks to Buy for 2022
Getty Images
Bluegreen Vacations Holding
Market value: $655.6 million
Dividend yield: N/A
POWR Ratings overall rating: A (Strong Buy)
Bluegreen Vacations Holding (BVH, $30.62) markets and sells vacation ownership interests and manages resorts in popular leisure and urban destinations. The company provides a variety of services in addition to resort management, including financing to qualified vacation ownership interest (VOI) purchasers and management solutions to vacation clubs and homeowners' associations.
A major source of revenue for BVH is its Bluegreen Vacation Club. This is a flexible, points-based, deeded vacation ownership plan with 68 Club and Club Associate Resorts and access to nearly 11,300 other hotels and resorts through partnerships and exchange networks.
BVH is an example of a company that used the pandemic to reduce costs and boost margins. Despite 2021 revenues being lower by roughly 4% compared to 2019, the company's free cash flow was up by 50%. This is because Bluegreen Vacations Holding raised prices and sold more premium services and products.
And momentum is picking up. In the fourth-quarter of 2021, revenue was 22% higher than the same period in 2019. This is despite slightly fewer vacation packages sold last quarter compared to Q4 2019.
Plus, the $63 billion in free cash flow BVH generated for the full fiscal year is nearly 10% of its market cap. Thus, it's not surprising that Bluegreen Vacations Holding added $50 million to its share buyback program. This brings its total purchasing power to $90 million worth of shares, which equates to about 14% of its total market cap.
For 2022, the average analyst estimate is for earnings of $3.36 per share – a 20% increase over 2021. Revenue is expected to increase by 8.3% to reach $820 million. Notably, analysts have hiked their 2022 and 2023 EPS estimates by around 20% since the start of the year. Despite such strong growth expectations, BVH is quite cheap with a forward P/E of 8.1x.
Given this combination of growth and value, it's not surprising that BVH is one of the best hotel stocks in the POWR Ratings system, with an overall A (Strong Buy) rating. A-rated stocks have posted an average annual performance of 31.1%, which compares favorably to the S&P 500's average annual 8% gain.
In terms of its component grades, BVH has an A for Sentiment as the stock has a consensus price target of $57.50, implying potential upside of nearly 88%. See the complete POWR Ratings breakdown for BVH.
SEE MORE 12 Super Small-Cap Stocks to Buy for 2022 and Beyond
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Preliminary studies of the application of near infrared spectroscopy in the diagnosis of deep vein thrombosis
Lino K. Korah, Frederick D. Scott, G. Melville Williams, Kyung A. Kang
Research output: Contribution to journalArticlepeer-review
2 Scopus citations
Abstract
A feasibility study for diagnosing deep vein thrombosis utilizing near-infrared continuous wave spectroscopy was performed, as a real-time, non-invasive, and inexpensive method. The probe contains two light sources and two detectors with optical filters that monitor reflected light at wavelengths 760 and 850 nm to measure the changes in the amount of deoxyhemoglobin and oxyhemoglobin, respectively. These changes and the blood volume changes are recorded while the subject performs a series of light leg exercises. The test protocol is designed to determine the muscle tissue blood volume capacity, rate of blood filling (venous valve functionality test), and efficiency to promote one-directional venous flow from the leg to heart. The subject pool consists of the patients with leg deep vein thrombosis (DVT) diagnosed by the Johns Hopkins Hospital Vascular Surgery Department and of normal subjects as the control. Abnormal venous systems showed distinct characteristics: high blood volume in the leg; high rate of blood filling while the subject stands upright; and the inability to decrease the blood volume during the muscle contraction. The NIR device proved to be an inexpensive, effective, and portable device that can detect DVT in the leg in real-time.
Original languageEnglish (US)
Pages (from-to)697-706
Number of pages10
JournalAdvances in experimental medicine and biology
Volume530
DOIs
StatePublished - 2003
Externally publishedYes
Keywords
• Blood Volume
• Deep Vein Thrombosis
• NIR spectroscopy
• Oxy- and deoxyhemoglobin
ASJC Scopus subject areas
• General Biochemistry, Genetics and Molecular Biology
Fingerprint
Dive into the research topics of 'Preliminary studies of the application of near infrared spectroscopy in the diagnosis of deep vein thrombosis'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
James Balfour Paul
Sir James Balfour Paul (16 November 1846 – 15 September 1931) was the Lord Lyon King of Arms, the officer responsible for heraldry in Scotland, from 1890 until the end of 1926.
Life
Balfour Paul was born in Edinburgh, the second son of the Reverend John Paul of St Cuthbert's Church, Edinburgh and Margaret Balfour (granddaughter of James Balfour of Pilrig), at their home, 13 George Square, Edinburgh. His great-grandfather was Sir William Moncreiff, 7th Baronet. He was educated at Royal High School and University of Edinburgh.
He was admitted an advocate in 1870. Thereafter, he was Registrar of Friendly Societies (1879–1890), Treasurer of the Faculty of Advocates (1883–1902), and appointed Lord Lyon King of Arms in 1890. He was created a Knight Bachelor in the 1900 New Year Honours list, and received the knighthood on 9 February 1900. Among his works was The Scots Peerage, a nine-volume series published from 1904 to 1914.
He tried two interesting heraldic cases in Court of the Lord Lyon, the first being in 1909, when Sir Colin Macrae claimed the right to use the coat of arms as Chief of the Name of Clan Macrae, which was opposed by Colonel John MacRae-Gilstrap. The second was action brought against Mrs. Fraser Mackenzie by Colonel James Stewart-Mackenzie, 1st Baron Seaforth, in connection with the bearing of arms in right of her father. In the second case, the Lyon's ruling was upheld on appeal by the House of Lords.
Shortly before his retirement in 1926, he was appointed a Knight Commander of the Royal Victorian Order (KCVO) in the 1926 New Year Honours list. He was also admitted an Esquire and then a Commander of the Order of St John of Jerusalem, elected a Fellow of the Society of Antiquaries of Scotland, and was a member of the Royal Societies and University (Edinburgh) Clubs. He was also Secretary of the Order of the Thistle. He gave the Rhind Lectures in 1898, on heraldry.
He resided at 30 Heriot Row, Edinburgh. Sir James married, in 1872, Helen Margaret (d. 20 December 1929), daughter of John Nairne Forman of Staffa (WS). They had four children: three sons and a daughter. One son, John William, also became a heraldic officer, while another, Arthur Forman, became an architect and partner of Robert Rowand Anderson.
Sir James is buried with other family in Dean Cemetery in Edinburgh, in the north section immediately east of the opening in the wall between the original cemetery and the north extension.
Published works
* History of the Royal Company of Archer (1875)
* (ed.) Record Series of Registrum Magni Sigilli (1882–1883)
* Handbook to the Parliament House (1884)
* Heraldry in relation to Scottish History and Art (1890)
* An Ordinary of Arms Contained in the Public Register of All Arms and Bearings in Scotland (1893) 1st ed., (1903) 2nd ed.
* Memoir and Remains of John M. Gray in 2 vols. (1895)
* (ed.) The Scots Peerage Vol. I (1904), with successive volumes up to Vol. IX (1914)
* (ed.) Accounts of the Lord High Treasurer of Scotland Vols. II–XI, 1900–1916
* Vol. 2: AD 1500–1504. 1900; Vol. 3: AD 1506–1507. 1901; Vol. 4: AD 1507–1513. 1902; Vol. 5: AD 1515–1531. 1903; Vol. 6: AD 1531–1538. 1905; Vol. 7: AD 1538–1541. 1907; Vol. 8: AD 1541–1546. 1908; Vol. 9: AD 1546–1551. 1911; Vol. 10: AD 1551–1559. 1913; Vol. 11: AD 1559–1566. 1916.
* "Ancient Artillery, with some notes on Mons Meg" in The Proceedings of the Society of Antiquaries of Scotland, volume 50, 1915–1916, pps: 191–201
* (ed.), Diary of George Ridpath, Minister of Stitchell, 1755–1761; Scottish History Society (1922) | WIKI |
Page:The pilgrim's progress by John Bunyan every child can read (1909).djvu/151
Rh the hill Lucre; and, had we gone over, as he desired us, and as thou wast inclining to do, my brother, we had, for aught I know, been made ourselves, like this woman, a spectacle for those that shall come after to behold.
I am sorry that I was so foolish, and am made to wonder that I am not now as Lot's wife; for wherein was the difference betwixt her sin and mine? She only looked back, and I had a desire to go see. Let God's goodness be praised; and let me be ashamed that ever such a thing should be in mine heart.
Let us take notice of what we see here, for our help for time to come. This woman escaped one judgment, for she fell not by the destruction of Sodom; yet she was destroyed by another, as we see: she is turned into a pillar of salt.
What a mercy is it that neither thou, but especially I, am not made myself this example! This gives reason to us to thank God, to fear before Him and always to remember Lot's wife.
I saw, then, that they went on their way to a pleasant river, which David the King called "the river of God," but John, "the river of the water of life." Now their way lay just upon the bank of this river; here, therefore, Christian and his companion walked with great delight; they drank also of the water of the river, which was pleasant and enlivening to their weary spirits. Besides, on the banks of this river on either side were green trees | WIKI |
Number
Many entities have Number attributes, such as lastTriggered, which represents the exact time an Event was triggered the last time, expressed in milliseconds.
Field Type: Number
Filters Available: exact , range, gt (>), gte (), lt (<), lte (), isnull
exact
Filter for an exact match of the Number
https://industrial.api.ubidots.com/api/v2.0/events/?lastTriggered=1583248038207
//Returns Array result with events exactly matching the lastTriggered
{
"count": 1,
"next": null,
"previous": null,
"results": [
{
"label": "test-event",
"lastTriggered": 1583248038207,
...
}
]
}
range
Filters numbers that are in the range of the values provided.
GET https://industrial.api.ubidots.com/api/v2.0/events/?lastTriggered__range=1583248038206,1583248038208
//Returns Array 'results' with the lastTriggered value being in the range
{
"count": 1,
"next": null,
"previous": null,
"results": [
{
"lastTriggered": 1583248038207,
...
}
]
}
gt [greater (or equal) than]
__gt filters for values greater than (>), __gte filters for values greater than or equal to ().
https://industrial.api.ubidots.com/api/v2.0/events/?lastTriggered__gt=1583248038206
//Returns Array result with events greater than (later than) 1583248038206
{
"count": 1,
"next": null,
"previous": null,
"results": [
{
"label": "test-event",
"lastTriggered": 1583248038207,
...
}
]
}
https://industrial.api.ubidots.com/api/v2.0/events/?lastTriggered__gte=1583248038207
//Returns Array result with events greater than or equal to 1583248038207
{
"count": 1,
"next": null,
"previous": null,
"results": [
{
"label": "test-event",
"lastTriggered": 1583248038207,
...
}
]
}
The same logic applies anologically to __lt which filters for values less than (<) and __lte which filters for values less than or equal to ().
The __isnull filter can be applied to Numbers as described in the Boolean section. | ESSENTIALAI-STEM |
أساطين
Noun
(normally plural, singular )
* 1) prominent personalities, stars, celebrities, masters | WIKI |
Class: QgsNumericFormat
class qgis.core.QgsNumericFormat
Bases: sip.wrapper
Default constructor
QgsNumericFormat(QgsNumericFormat)
A numeric formatter allows for formatting a numeric value for display, using a variety of different formatting techniques (e.g. as scientific notation, currency values, percentage values, etc)
This is an abstract base class and will always need to be subclassed.
Methods
clone
Clones the format, returning a new object.
configuration
Returns the current configuration of the formatter.
create
Creates a new copy of the format, using the supplied configuration.
formatDouble
Returns a formatted string representation of a numeric double value.
id
Returns a unique id for this numeric format.
sortKey
Returns a sorting key value, where formats with a lower sort key will be shown earlier in lists.
suggestSampleValue
Returns a suggested sample value which nicely represents the current format configuration.
visibleName
Returns the translated, user-visible name for this format.
writeXml
Writes the format to an XML element.
clone(self) → QgsNumericFormat
Clones the format, returning a new object.
The caller takes ownership of the returned object.
Return type
QgsNumericFormat
configuration(self, context: QgsReadWriteContext) → Dict[str, Any]
Returns the current configuration of the formatter. This value can be used in a call to create() in order to recreate this formatter in its current state.
Parameters
context (QgsReadWriteContext) –
Return type
Dict[str, Any]
create(self, configuration: Dict[str, Any], context: QgsReadWriteContext) → QgsNumericFormat
Creates a new copy of the format, using the supplied configuration.
The caller takes ownership of the returned object.
Parameters
Return type
QgsNumericFormat
formatDouble(self, value: float, context: QgsNumericFormatContext) → str
Returns a formatted string representation of a numeric double value.
Parameters
Return type
str
id(self) → str
Returns a unique id for this numeric format.
This id is used to identify this numeric format in the registry with QgsNumericFormatRegistry.format()
Return type
str
sortKey(self) → int
Returns a sorting key value, where formats with a lower sort key will be shown earlier in lists.
Generally, subclasses should return QgsNumericFormat.sortKey() as their sorting key.
Return type
int
suggestSampleValue(self) → float
Returns a suggested sample value which nicely represents the current format configuration.
Return type
float
visibleName(self) → str
Returns the translated, user-visible name for this format.
Return type
str
writeXml(self, element: QDomElement, document: QDomDocument, context: QgsReadWriteContext)
Writes the format to an XML element.
Parameters | ESSENTIALAI-STEM |
Manipur Progressive Secular Alliance
The Manipur Progressive Secular Alliance (MPSA) (formarly known as Secular Progressive Front (SPF) or Secular Progressive Alliance (SPA)) is a political alliance in India. The alliance includes six parties on a basis of an 18-point Common Agenda.
Secular Progressive Front
The Leader of the Opposition and ex-Chief Minister of Manipur Okram Ibobi Singh formed the Secular Progressive Front. The Congress President Sonia Gandhi accepted its formation. The SPF was founded after the resignation of three Members of the Legislative Assembly (MLA) from the Bharatiya Janata Party, four from the National People's Party, one from the All India Trinamool Congress, and the withdrawal of one Independent from the National Democratic Alliance in Manipur on 17 June 2020.
On 18 June 2020, Singh said that the Indian National Congress had formed a coalition of like-minded parties in Manipur and called a special Assembly session to prove a majority. The Secular Progressive Front met with Manipur's Governor Najma Heptulla to attempt to form a government in Manipur. The SPF also seeks the removal of the Speaker of the Manipur Assembly, Yumnam Khemchand Singh. However later the alliance didn't work & The SPF failed to form government in 2020.
MSPA formation
Later before the 2022 Manipur Legislative Assembly election the Congress rebranded the SPA alliance with new partners. The Congress allied with CPI, CPI(M), Forward Bloc, Revolutionary Socialist Party & the Janata Dal (Secular). On 5 February 2022 Congress manipur incharge Jairam ramesh announced that the new alliance will be called as Manipur Progressive Secular Alliance or simply the MPSA.
Members in Manipur assembly
The Front has the 5 members in the Manipur Legislative Assembly. | WIKI |
User:Yogesh Dolar/sandbox
Yogesh dolar is HR Professional ,he belong from the Junagadh(Saurashtra, ) | WIKI |
Scaling Kaspersky Sandbox
To attain and maintain optimum performance of the Kaspersky Sandbox solution in various conditions, you need to take into account the number of devices on the network, the topology of the network, and the functionality of the solution that you need.
You can choose an optimum configuration of the solution using the following table.
Configurations supported by the Kaspersky Sandbox solution
Physical server configuration
Number of Kaspersky Endpoint Agent workstations
Workload when receiving files via API (objects per hour)
CPU: 4 cores with Hyper-Threading support (8 threads), 2.1 GHz
RAM: 32 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
250
75
CPU: 8 cores with Hyper-Threading support (16 threads), 2.2 GHz.
RAM: 48 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
500
150
CPU: 12 cores with Hyper-Threading support (24 threads), 2.2 GHz.
RAM: 64 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
750
225
CPU: 16 cores with Hyper-Threading support (32 threads), 2.2 GHz.
RAM: 64 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
1000
305
CPU: 14 cores with Hyper-Threading support (28 threads), 2.6 GHz.
RAM: 64 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
1000
305
2 CPUs: 18 cores with Hyper-Threading support (72 threads), 2.2 GHz
RAM: 196 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
5000
910
Example of Kaspersky Sandbox performance:
Physical server configuration:
CPU: 4 cores with Hyper-Threading support (8 threads), 2.1 GHz
RAM: 32 GB
Two hard drives in a RAID 1 array:
• volume: 600 GB each
• rotation speed: 10,000 rpm
Two network adapters with 1 Gbit/s data transfer rate.
On a server with the specified configuration, Kaspersky Sandbox can:
• Process objects received from Kaspersky Endpoint Agent workstations. Maximum number of workstations: 250.
• Process objects received from external systems via the API. Maximum objects per hour: 75.
For example, if you want to double the performance of Kaspersky Sandbox (to receive objects from 500 workstations or 150 objects per hour from external systems via the API), you can combine 2 servers into a cluster.
Kaspersky Endpoint Agent can be installed on a terminal server, file server, or a network-attached storage (NAS).
If Kaspersky Endpoint Agent is installed on a terminal server, the load generated by Kaspersky Endpoint Agent is calculated as follows: one Kaspersky Endpoint Agent instance on a terminal server serving X users generates the same load as X Kaspersky Endpoint Agent instances on a workstation (X users = X Kaspersky Endpoint Agent instances).
If Kaspersky Endpoint Agent is installed on a file server or a network-attached storage, the load generated by Kaspersky Endpoint Agent is calculated as follows: one Kaspersky Endpoint Agent instance on a file server or network-attached storage generates the same load as 20 Kaspersky Endpoint Agent instances on a workstation.
Hardware and software requirements of Kaspersky Sandbox virtual machine
Kaspersky Sandbox supports the following virtual machine configuration:
Virtual machine settings:
1. Expose hardware assisted virtualization to the guest OS check box selected.
2. Latency Sensitivity option set to High.
3. Entire RAM reserved (32 GB).
4. Entire CPU clock rate reserved.
You can use the following formula to calculate the entire CPU clock rate: 12 * <clock rate in MHz>.
When configuring the virtual machine, your configuration must match the description above. Only the CPU clock rate can be varied: you can configure a value of 2.2 GHz or higher. If the configuration of your virtual machine deviates from the description above, correct installation and operation of Kaspersky Sandbox is not guaranteed.
Installed on a virtual machine, Kaspersky Sandbox can process objects from up to 250 workstations or 100 objects per hour received using the API.
Page top | ESSENTIALAI-STEM |
Utah fends off Washington State for 4th straight win
Senior guard Justin Bibbins scored 24 points to help Utah register a 77-70 victory over Washington State on Saturday in Pac-12 action at Beasley Coliseum in Pullman, Wash. Senior forward Gabe Bealer had 18 points on six 3-pointers for the Utes (17-9, 9-6 Pac-12), who won their fourth consecutive game. Senior forward Tyler Rawson contributed 15 points and a career-best 15 rebounds to help Utah defeat the Cougars for the ninth consecutive time. Sophomore guard Malachi Flynn had 20 points and four steals while junior forward Robert Franks tallied 18 for Washington State (10-16, 2-12), which lost for the eighth time in the past nine games. Junior guard Viont’e Daniels added 14 points for the Cougars, who were 15-of-41 from 3-point range and shot 36.1 percent overall. The Utes shot 50 percent from the field, including 12-of-31 from 3-point range. Utah used a 17-0 surge in the first half to open up a huge lead, but Washington State refused to go away. Utah led by 10 at halftime before scoring the first seven points of the second half to make it 45-28 with 17:08 left. The lead was again 17 when Bealer drained a 3-pointer 6 1/2 minutes later. Washington State later used a 10-3 spurt to pull within 62-56 on a 3-pointer by Daniels with five minutes left. Utah pushed its advantage back to 12 before Flynn and Franks knocked down 3-pointers to again get the Cougars within six. Daniels hit a 3-pointer with 2:13 remaining to bring Washington State within 70-65 and another one 30 seconds later to cut the Utes’ lead to four. But Bibbins lofted a short arching bank that kissed high off the glass before dropping in with 25.9 seconds remaining to make it 74-68, and Utah closed it out. Rawson had 11 points and seven rebounds in the first half, as Utah held a 38-28 advantage. Washington State trailed 16-13 before the Utes began their stretch of 17 consecutive points. Bibbins began the spurt with a 3-pointer and Bealer drained two during the run that gave Utah a 20-point lead with 5:52 left. The Cougars pulled within seven in the final minutes before the Utes took a 10-point lead into the break. —Field Level Media | NEWS-MULTISOURCE |
Wikipedia:Help desk/Archives/2023 October 22
__EXPECTED_UNCONNECTED_PAGE__ = October 22 =
Too much quoted text?
I need some feedback on whether there is too much quoted text from references at Intel HEX. I added a banner for this issue, but I'm not sure if it is the correct one. Thanks in advance! • Sbmeirow • Talk • 01:41, 22 October 2023 (UTC)
* Yes. Many of those quotations appear to be from online source that are not behind paywalls so the quotations are not really necessary. If the quotations are important to the article, put them in the article body and cite them. Quotations require citations; citations do not require quotations.
* —Trappist the monk (talk) 02:07, 22 October 2023 (UTC)
Horizontal scrolling table?
Just wondering if someone more clever than me could fix the ethnicity table (to stop it from overflowing horizontally, or at least do it gracefully) at Saint Petersburg. Thanks. Brycehughes (talk) 03:12, 22 October 2023 (UTC)
* The percentage columns were unnecessarily wide (due to the length of the heading). I have fixed that. Clarityfiend (talk)
* Thanks. I gave another shot at the horizontal scroll and it seems to work okay... not sure if it's perfect but maybe good 'nuff. Brycehughes (talk) 10:23, 22 October 2023 (UTC)
* Now if somebody could left indent the population figures, that would be nice (I can't find the documentation for that). Clarityfiend (talk) 03:37, 22 October 2023 (UTC)
* I have right-aligned them. PrimeHunter (talk) 12:47, 22 October 2023 (UTC)
updating profile picture...
How do I update the profile picture on a biography page I'm working on? Is there a guide somewhere specifically about the correct procedure? Heideana (talk) 03:45, 22 October 2023 (UTC)
* Take a photograph of Martin Burckhardt (if it is he) yourself, so that you, indisputably, are the copyright holder. Upload it to Wikipedia Commons, copylefting it (or, if you prefer, waiving all rights to it). Categorize it, etc. If you upload it there under some filename (say, Martin Burckhardt 2023.jpg), then in Wikipedia you can invoke it with the same filename (you don't have to say that it's at Commons).
* But I don't think you need to worry about the image. Rather, the text. The "About" section contains some Deep Thought, involving, inter alia, "our sequential great Universal Machines with their outsourced historical unconscious Psychotopes" [Come again?], and it's completely unreferenced. -- Hoary (talk) 03:58, 22 October 2023 (UTC)
* The draft article needs to provide evidence that anyone has taken Burckhardt's ideas seriously. Maproom (talk) 07:32, 22 October 2023 (UTC)
* The draft also needs proper citations for almost the entire content. Or at least, all that remains after the postmodernist gobbledygook is removed. AndyTheGrump (talk) 10:23, 22 October 2023 (UTC)
Sandbox
A subpage I made to experiment with Infobox country was deleted for using Wikipedia as a web host. If I put a disclaimer that it is experimentation along with various family trees and infoboxes relating to a personal project on my sandbox, will it be deleted for the same reason? I wanted to make sure about things this time. Doctor Alex (talk · contributions · sandbox) 04:47, 22 October 2023 (UTC)
* Your use of Wikipedia should be for the benefit of Wikipedia, Blocky44 ("Doctor Alex"), not for "a personal project". For the personal project, well, Mediawiki is free software, so you'd be free to install it on your own webserver and use it there. -- Hoary (talk) 06:20, 22 October 2023 (UTC)
* But it would be placed on my sandbox and with a disclaimer. Also I do not have a webserver and did not realize I still had Doctor Alex in my signature. The sandbox is for experimentation, isn't it?
* Blocky44 (talk · contributions · sandbox) 06:23, 22 October 2023 (UTC)
* , your sandbox is for experimentation directly related to improving Wikipedia, not for general experimentation. Cullen328 (talk) 07:37, 22 October 2023 (UTC)
* Alright, but where would I put general experimentation? Would I have to obtain a webserver for MediaWiki? If so, what does that mean and how?
* Blocky44 (talk · contributions · sandbox) 07:49, 22 October 2023 (UTC)
* Anywhere other than Wikipedia, . Web server gives an overview of the software and hardware requirements. Cullen328 (talk) 07:54, 22 October 2023 (UTC)
Fellow claiming to be a Wikipedia Moderator
A Fellow claiming to be a Wikipedia Moderator emailed me this evening and offered to create a Wikipedia page. While I am aware some of this is BS I'd like to refere to email - and the headers - to the appropriate notice board. Any suggestions? Or should I ignore. Whiteguru (talk) 09:39, 22 October 2023 (UTC)
* See WP:SCAM for instructions. 331dot (talk) 09:43, 22 October 2023 (UTC)
* OK, thanks. Whiteguru (talk) 09:46, 22 October 2023 (UTC)
Deleting all of my edits on a specific article
Can I request for deletion of all of my edits on a specific article? Plus looking for policy/guideline about deleted edits. Thanks. --Mann Mann (talk) 15:09, 22 October 2023 (UTC)
* As it says at the bottom of every edit page By publishing changes, you agree to the Terms of Use, and you irrevocably agree to release your contribution under the CC BY-SA 4.0 License and the GFDL. Having articles written by multiple contributors subject to later arbitrary deletion by a single contributor would very likely be damaging to such articles, even if it were possible. AndyTheGrump (talk) 15:30, 22 October 2023 (UTC)
Spoilers in biographical articles
I posted a comment about this on one of the help or policy pages. I do not know where -- I can't find it "Spoilers" again. It's on one of the FAQ pages, perhaps; it took me an hour to find an appropriate place the first time. I never got any response.
My position was that spoilers are all right in an article about media, such as the solution to the murder mystery in an article about a "Columbo" show, a "Perry Mason" show or any number of other shows. I think that is established in the "Spoiler" policy; it's part fo the plot. However, it is not appropriate to say in a biographical article about an actor that the actor played the murderer. This came about because I am watching old Perry Mason shows (the shows do not have individual articles, where the spoiler would be part of the "Plot" section) and when I look up an actor, sometimes the article says he was the murderer on the show. That "spoiled" the show for me. I have been editing these spoilers out.
However, I just discovered that one was changed back without explanation. I have left a note on the talk page for that article. https://en.wikipedia.org/wiki/Talk:Kevin_Hagen
I want to know if I doing the right thing, or should I not bother. I can give up any time. We can have spoilers in biographical articles, viz. In the article about Orson Welles, we can say he played the crooked cop and murderer in "Touch of Evil" as well as directing the movie. I don't think that's a good idea, but if someone boldly does it, would it be right to edit it out? Wastrel Way (talk) 20:40, 22 October 2023 (UTC) Eric
* As usual, Wastrel Way, it comes down to what the sources say. If the sources identify the character played by this actor as the murderer, then the WP article may say so. If they don't, then that's probably original research, and shouldn't be in an article. (I suppose it's really synthesis, because the identity of the character as the murderer is presumably explicit in the show, which is an acceptable source for itself. But that's still a sort of OR). ColinFine (talk) 20:54, 22 October 2023 (UTC)
* See Spoiler. Basically, it is irrelevant for Wikipedia whether information is a spoiler, and so spoilers can occur anywhere, and indeed should occur everywhere where they serve an encyclopaedic purpose. That a character played by an actor is a murderer sounds like encyclopaedically relevant information. Please do not remove spoilers from articles unless they need to be removed for reasons unrelated to being a spoiler. —Kusma (talk) 21:20, 22 October 2023 (UTC)
Rev'ed by draft author
I added a maintenance category + Template:Draft to the two draft articles Draft:Batman: The Video Game (Game Boy) and Draft:Mr. Tuff
My edits were later reverted by the author with the reasoning that i "wasn't an admin and i didn't had the authors permission to edit his draft" and that the edits were apparently "ruining his workflow"
Where do i go from here? Because I have no clue if i did something wrong --Trade (talk) 22:12, 22 October 2023 (UTC)
* I'm about to post a message on the user's talk page. -- Hoary (talk) 22:41, 22 October 2023 (UTC)
* See this. -- Hoary (talk) 22:48, 22 October 2023 (UTC)
* @Trade: I just updated Category:Draft articles about video games with the instructions "This category is populated by draft topics template, using the parameter value "video-games". It should not be used directly." I also updated the drafts in this category. GoingBatty (talk) 17:22, 23 October 2023 (UTC)
* How did you got the draft topics template to do that? Trade (talk) 18:26, 23 October 2023 (UTC)
* It doesn't look like draft topics actually places drafts in the category Trade (talk) 00:08, 24 October 2023 (UTC) | WIKI |
Page:Hendryx--Connie Morgan with the Mounted.djvu/22
4 The spring “break-up” had come that very morning, and the whole surface of the river was heaving with huge ice-cakes that ground and crushed against each other as they were swept seaward upon the crest of the resistless flood.
“Ye can’t do no good that-a-way!” called a man to those who ran out upon the shore floe.
“Nor no other way, neither!” supplemented another. “His cake ain’t a-goin’ to rub the shore ice, nohow—an’ he’ll be past ’fore they c’n git there.”
“Isn’t there something we can do?” cried a young man—evidently a chechako.
“Not a blame thing!” answered another. “It’s tough, pardner, to hev to stand an’ see a man carried down ag’in’ that—but it's got to be.” He pointed toward a spot a half-mile below, where, at the head of a white-water rapid, the ice-cakes had formed a huge jam. Cake after cake swept against the barrier, reared high—crunching, grinding, climbing—only to fall back upon other cakes with the roar of a thousand thunders. And it was toward this that the man on the floe was drifting in the middle of the mile-wide river! Men on the bank stared in white-faced fascination, | WIKI |
2012–13 NCAA Division I women's ice hockey season
The 2012–13 NCAA Division I women's ice hockey season will begin in October, 2011, and ended with the 2013 NCAA Division I Women's Ice Hockey Tournament's championship game in March, 2013.
Offseason
* May 31: Taylor Gross has been named captain for the Penn State Nittany Lions in their inaugural NCAA Division I season.
Patty Kazmaier Award finalists
* Amanda Kessel, Winner, Minnesota Golden Gophers
* Megan Bozek, Minnesota Golden Gophers
* Noora Raty, Minnesota Golden Gophers
AHCA Coach of the Year
* Brad Frost, Minnesota
First team
* Forward, Brianne Jenner, 2012-13 First Team All-America selection
* Forward, Amanda Kessel, 2012-13 First Team All-America selection
* Forward, Jocelyne Lamoureux, 2012-13 First Team All-America selection
* Defense, Monique Lamoureux-Kolls, 2012-13 First Team All-America selection
* Defense, Megan Bozek, 2012-13 First Team All-America selection
* Goaltender, Noora Raty, 2012-13 First Team All-America selection
Second team
* Forward, Alex Carpenter, 2012-13 Second Team All-America selection
* Forward, Kendall Coyne, 2012-13 Second Team All-America selection
* Forward, Brianna Decker, 2012-13 Second Team All-America selection
* Defense, Blake Bolden, 2012-13 Second Team All-America selection
* Defense, Lauriane Rougeau, 2012-13 Second Team All-America selection
* Goaltender, Alex Rigsby, 2012-13 Second Team All-America selection | WIKI |
UNITED STATES of America, Plaintiff-Appellee, v. Wilkerson ESTELAN, a.k.a. Estalan Wilkerson, Defendant-Appellant.
No. 05-11411
Non-Argument Calendar.
D.C. Docket No. 04-80010-CR-DTKH.
United States Court of Appeals, Eleventh Circuit.
Nov. 28, 2005.
Anne R. Schultz, U.S. Attorney’s Office — S.D. of Florida, Miami, FL, for Plaintiff-Appellee.
Bernardo Lopez, Ft. Lauderdale, FL, Kathleen M. Williams, Miami, FL, Robin Cindy Rosen-Evans, Federal Public Defender, West Palm Beach, FL, for Defendant-Appellant.
Before MARCUS, WILSON and FAY, Circuit Judges.
PER CURIAM:
Wilkerson Estelan appeals his convictions and total 135-month sentence following a jury trial for being a convicted felon in possession of one or more firearms, in violation of 18 U.S.C. §§ 922(g)(1) and 924(a)(2) (“Count 1”); possession with intent to distribute five grams or more of cocaine base, in violation of 21 U.S.C. § 841(a)(1), (b)(1)(B)(iii) (“Counts 2 & 7”); possession of cocaine, in violation of 21 U.S.C. § 844 (“Count 3”); and possession with intent to distribute a detectable amount of cocaine base, in violation of 21 U.S.C. § 841(a)(1), (b)(1)(C) (“Counts 4, 5 & 6”). Estelan argues that the district court (1) applied an incorrect legal standard in determining that Estelan’s post-arrest statements were voluntary; (2) abused its discretion in denying Estelan’s objection to the government’s introduction of expert testimony from a Drug Enforcement Administration (“DEA”) agent regarding drug-distribution amounts, pursuant to Fed.R.Evid. 702; and (3) plainly erred in counting prior state convictions, which the court had found to be constitutionally invalid for purposes of enhancement under 21 U.S.C. § 851, in calculating Estelan’s criminal-history points. For the reasons set forth more fully below, we affirm.
Estelan filed three motions to suppress post-arrest statements. In his first suppression motion, he argued that, on December 22, 2003, after he was arrested, and after he invoked his right to remain silent under Miranda v. Arizona, 384 U.S. 436, 444-45, 86 S.Ct. 1602, 1612, 16 L.Ed.2d 694 (1966), law enforcement officers (1) continued to question him, and (2) secretly recorded conversations he had with family members. In Estelan’s second suppression motion, he contended that his post-arrest statement on December 22, 2003, in which he admitted to possessing drugs recovered during the execution of a search warrant, also should be suppressed because it was the product of unlawful threats and intimidation by law enforcement officers, that is, the product of an officer’s threat to arrest his mother and sister if he did not admit ownership of the drugs. Finally, in Estelan’s third suppression motion, he again contended that the post-arrest statements he made to officers on December 22, 2003, should be suppressed because they were (1) obtained in violation of his right to remain silent, and (2) the result of unlawful threats and intimidation by officers.
The government responded that, on November 18, 2003, officers did not threaten to arrest members of Estelan’s family if Estelan refused to claim ownership of the drugs and firearms that the officers had recovered. The government also responded that an officer’s statement on December 22, 2003, that is, that he might arrest Estelan’s mother and sister for possessing drugs, was not unduly coercive because the officer had probable cause to make these arrests.
After conducting an evidentiary hearing, the magistrate issued a report, recommending that all of Estelan’s suppression motions be denied. Although the record on appeal does not contain a transcript of this evidentiary hearing, Estelan did not challenge in his objections to the magistrate’s report the magistrate’s factual findings, at least as they relate to Estelan’s arguments on appeal. Moreover, Estelan has failed to argue on appeal that these factual findings were erroneous, plainly or otherwise. See United, States v. Warren, 687 F.2d 347, 348 (11th Cir.1982) (explaining that the absence of objections to the magistrate’s report, prepared pursuant to 28 U.S.C. § 636(b)(1)(B), limits appellate review of factual findings to plain error or manifest injustice). We, therefore, conclude that Estelan has abandoned any challenges to the following factual findings by the magistrate in her report.
Officer Brian Hermanson, an officer with the Lake Worth Police Department since October 1991, and a member of a special investigation unit that focuses on narcotics and gang activity, testified that, on November 18, 2003, at approximately 12:26 p.m, he helped execute a search warrant at a residence in Lake Worth, Florida. When the officers arrived at this residence, they knocked and announced their presence. On hearing a door slam, the officers entered the residence. Another officer found Estelan in the restroom, bent over a toilet containing a large piece of cocaine base. Estelan’s mother and another person also were present in the residence. After Estelan was arrested and advised of his Miranda rights, he told Officer Hermanson that the firearms and drugs found in a drawer in the bedroom of the residence belonged to him. The officers neither used force against Estelan, nor threatened to arrest his family members. Moreover, Estelan was lucid, had normal speech patterns, and did not appear to be under the influence of drugs or alcohol.
Officer Sanjay Raja, an officer with the West Palm Beach Police Department since February 2004, testified that, on December 22, 2003, as part of his previous employment with the Lake Worth Police Department, he executed a search warrant of this same residence. On entering the residence, he observed Estelan’s mother, Violette Estelan, in the living room, in close proximity to a stack of boxes, on top of which officers ultimately recovered in plain view a dime-size piece of cocaine base, weighing approximately. 1 grams. The officers executing the search warrant also recovered cocaine base in a compact-disc case and $725 in a small refrigerator in the north bedroom. Estelan’s sister, Wilda Estelan, arrived at the residence during this search, at which time she identified the north bedroom as her bedroom and agreed to call Estelan.
Officer Raja further stated that, when Estelan responded by coming to the residence, Estelan was detained, was advised of his rights, and waived his right to remain silent. Officer Raja then informed Estelan what contraband the officers had recovered from the residence, along with explaining that they did not want to arrest anyone who was not involved with the drugs. When Officer Raja asked Estelan if he was involved with the drugs, Estelan gave conflicting answers over his ownership of the drugs. The officers then took Estelan outside the residence and questioned him while he was sitting next to his mother and sister. Although Estelan first stated that the drugs belonged to him, and not his mother and sister, he recanted this statement within minutes. During this questioning, Estelan again appeared lucid, had normal speech, was clear eyed, did not appear to be under the influence of drugs or alcohol, and did not request an attorney.
Estelan, who was 21 years’ old and had completed the 11th grade at the time of the evidentiary hearing, also testified, stating, among other things, that Officer Hermanson informed him, after his November 18, 2003, arrest, that the officers would have Estelan’s mother and grandmother deported and/or arrested for possession of the drugs and guns if Estelan did not admit to owning this contraband. Although both his mother and grandmother were legal residents, Estelan still feared for their freedom. Estelan also testified that, on December 22, 2003, he admitted to owning drugs recovered from the residence only because he was scared that his mother and sister would be arrested. Additionally, the magistrate noted that, in a videotape of Estelan’s November interrogation, Estelan appeared relaxed and “laid back,” and he did not ask about his family.
The magistrate determined, among other things, that, the post-arrest statement made on November 18, 20003, was not coerced because Officer Hermanson’s testimony, that he did not threaten to arrest Estelan’s family members, was more credible than Estelan’s contrary testimony. The magistrate also concluded that Estelan’s waiver of his right to remain silent on December 22, 2003, was voluntary, despite that Estelan testified that the officers threatened, otherwise, to arrest his mother and sister, because the officers had found cocaine base in plain view of Estelan’s mother and drugs in the bedroom occupied by Estelan’s sister. The magistrate concluded that, based on these facts, the officers had probable cause to arrest these family members for possession of drugs, and their threat to do so, therefore, was not coercive. The magistrate also explained that her review of the videotapes of the November interrogation of Estelan, during which Estelan was relaxed and did not ask about his family, showed that Estelan voluntarily waived his right to remain silent. The court summarily adopted the magistrate’s report and denied all of Estelan’s suppression motions.
At trial, the government offered the following additional evidence. Officer Neil Honkala, an officer with the Lake Worth Police Department, testified that, on November 18, 2008, when he entered the residence in question to execute a search warrant, he heard a toilet flushing and determined that the restroom door was locked. When Officer Honkala attempted to kick the restroom door open, Estelan, who was inside the restroom, forcefully slammed the door shut. Officer Honkala eventually forced the door open, at which time he observed the toilet flushing and several large pieces of cocaine base inside it.
Officer Hermanson testified, and the parties stipulated, that, after the officers arrested Estelan and searched the residence on November 18, 2003, they recovered miscellaneous documents in Estelan’s name on the dining room table and in the top drawer of a dresser in the residence’s north bedroom. The officers also found cocaine base and powder in the top drawer of the same dresser, as well as a loaded semiautomatic pistol on the top shelf of a closet inside the north bedroom, and a loaded assault rifle wrapped in a football jersey in another bedroom.
Officer Raja also testified at trial, explaining that, on December 22, 2005, in addition to the dime-size amount of cocaine base that the officers recovered from the living room, they discovered in one of the bedrooms a small unplugged refrigerator containing $725 in cash and an open CD case containing more cocaine base. When Estelan’s 14-year-old sister entered the residence during this search, the officers instructed her to call Estelan, gave her and Estelan’s mother Miranda warnings, and handcuffed them outside the apartment. When Estelan arrived at the apartment, he also was handcuffed and given Miranda warning, after which Estelan was informed that, based on the locations of the drugs found in the residence, the officers had probable cause to arrest his mother and sister. After giving conflicting statements inside the residence, Estelan was taken outside the residence, where he stated, in front of his mother and sister, that he owned the drugs and that the officers should release these family members.
After being re-sworn, Officer Herman-son additionally testified that, on January 3, 2004, on two separate occasions, a confidential informant (“Cl”) of the Lake Worth Police Department, while being videotaped, made undercover buys of cocaine base from Estelan. Estelan was not arrested on this date because of the ongoing nature of the investigation and the police department’s need to keep the Cl’s identity confidential. Officer Raja also testified again, after being re-sworn, stating that, on January 22, 2004, pursuant to a federal arrest warrant for Estelan, Officer Raja and other officers attempted to arrest Estelan. When Estelan ran away from them, Officer Raja observed Estelan throw a small fluorescent object over a fence. After apprehending Estelan and searching the area where Estelan threw this object, Officer Raja discovered a fluorescent green Excedrin bottle containing a substance that the government later confirmed was cocaine base.
Furthermore, during trial, the government sought to qualify Special Agent Richard Bonner, a special agent with the U.S. Drug Enforcement Administration (“DEA”), as “an expert in street level narcotics and trafficking and specifically in crack cocaine and cocaine powder.” Special Agent Bonner testified that, as an agent with the DEA for approximately four years and four months, he had (1) received specialized training in the distribution and trafficking of illegal drugs, particularly with Schedule I and II controlled substances; (2) participated in hundreds of investigations involving the distribution of cocaine base; and (3) interviewed in excess of 100 persons involved in the illegal distribution of cocaine and cocaine base. Prior to serving in his current position, Special Agent Bonner also had been employed for approximately eight years as a police officer, working extensively on narcotic cases.
On questioning by Estelan, Special Agent Bonner conceded that he never had published articles on street-level dealing of cocaine base, nor been subject to peer review or evaluation. Special Agent Bonner also agreed that his methodology for his opinions was based solely on his training, observations, and experiences. Estelan then objected to Special Agent Bonner testifying as an expert witness, arguing that the government had failed to meet Rule 702’s requirements for such testimony. The court overruled this objection, summarily explaining that, after examining caselaw both from this Court and the Supreme Court, it had concluded that this expert testimony was admissible under Rule 702. Special Agent Bonner then testified on how cocaine base typically is sold and why the amounts of cocaine base that were recovered from the toilet, drawer, and refrigerator in Estelan’s residence, and the cocaine base contained in the Excedrin pill bottle that Estelan threw over the fence, were indicative of distribution, instead of personal use. On May 5, 2004, the jury convicted Estelan of all counts in his indictment.
Prior to sentencing, Estelan filed a denial of the three prior state convictions on which the government was relying in attempting to statutorily enhance his sentence, pursuant to 21 U.S.C. § 851. Attaehing copies of the transcripts of his change-of-plea hearings, Estelan argued that these convictions were constitutionally invalid because (1) they were the result of guilty pleas that were not knowing and voluntary, and (2) he did not receive effective assistance of trial counsel. The government opposed Estelan’s denial, arguing that the plea transcripts and the plea-waiver forms showed that Estelan received effective assistance of counsel, and that his pleas followed the requirements outlined in Boykin v. Alabama, 395 U.S. 238, 89 S.Ct. 1709, 23 L.Ed.2d 274 (1969).
Also prior to sentencing, a probation officer prepared a PSI, recommending that Estelan’s offense level be set at 28, pursuant to U.S.S.G. § 2D1.1(c)(6), and that it be increased two levels, pursuant to U.S.S.G. § 2D1.1(b)(1), because Estelan possessed a dangerous weapon. The PSI also included that Estelan had nine criminal-history points, which included seven points, pursuant to U.S.S.G. § 4A1.1(c), based on Estelan’s prior convictions, and two additional points, pursuant to U.S.S.G. § 4A1.1(e), because he committed the instant offense less than two years from his date of release from custody for a prior offense. With a total offense level of 30 and a criminal history category of IV, Estelan’s guideline range was 135 to 168 months’ imprisonment.
On January 19, 2005, at sentencing, Estelan renewed his objection to the court’s reliance on three prior convictions for purposes of statutorily enhancing his sentence under § 851. After hearing arguments from counsel and extensive testimony from Estelan, the court determined that these prior convictions could not be used to support a statutory sentencing enhancement under § 851, because the “plea colloquies [did not] measure[] up to the requirements of due process,” and the government had not shown that Estelan, during the state allocutions, had fully understood “what he was doing [and] the nature of his acts.” The court, however, noted that it was not finding that Estelan’s trial counsel was ineffective. The court also restated, without objection, the PSI’s calculations, including that Estelan had a criminal history category of IV, and a resulting guidelines range of 135 to 168 months’ imprisonment.
The court then considered the sentencing factors listed in 18 U.S.C. § 3553(a), including Estelan’s discretionary guideline range. In doing so, the court stated that it had “looked carefully at [Estelan’s] prior convictions, what they consisted of, the way they were treated and so on.” The court ultimately sentenced Estelan to a total sentence of 135 months’ imprisonment, 4 years’ supervised release, and a $625 special assessment fee. When the court asked Estelan if he had any new objections to the court’s pronouncement of his sentence, Estelan answered in the negative.
Issue 1: Estelan’s Post-Arrest Statements
Estelan argues that the court erred in denying his motion to suppress post-arrest statements he made to law enforcement officers on November 18 and December 22, 2003, because the court did not look at the totality of the circumstances in deciding whether these statements were voluntary. Estelan contends that the court, instead, focused entirely on its conclusion that the officers had probable cause on December 22, 2003, to arrest Estelan’s mother and sister. Without identifying what circumstances the court ignored, Estelan also asserts that, if the court had examined the totality of the circumstances, it would have concluded that his post-arrest statements were not the product of his free and rational choice. Finally, Estelan claims that, because the post-arrest statements were the “only real evidence that the government had that the drugs and firearms belonged to [him],” and because the government failed to show that these statements did not contribute to his convictions, the error was not harmless.
“[We] review[ ] a district court’s factual findings supporting the denial of a motion to suppress for clear error, and in the light most favorable to the [g]overnment. The application of the law to the facts is reviewed de novo. United States v. Thompson, 422 F.3d 1285, 1295 (11th Cir.2005) (citation omitted). Under the Fifth Amendment to the United States Constitution, the government may not use an involuntary confession against a defendant in a criminal trial. Id. We focus our voluntariness inquiry “on whether the defendant was coerced by the government into making the statement: The relinquishment of the right [to remain silent] must have been voluntary in the sense that it was the product of a free and deliberate choice[,] rather than intimidation, coercion or deception.” Id. (internal marks and quotations omitted). Moreover, “[t]he district court must consider the totality of the circumstances in assessing whether police conduct was ‘causally related’ to the confession.” Id. (quotation omitted).
Under certain circumstances, police deception invalidates an accused’s waiver of his right to remain silent. Thompson v. Haley, 255 F.3d 1292, 1296 (11th Cir.2001) (citing Rogers v. Richmond, 365 U.S. 534, 81 S.Ct. 735, 5 L.Ed.2d 760 (1961) (in a habeas case, a confession was involuntary when the police pretended that, if the defendant did not confess, the defendant’s ailing wife would be arrested)). However, in Thompson, we determined that a law enforcement officer’s statement to a habeas petitioner that his codefendant girlfriend might face the electric chair if the petitioner did not confess to committing a murder did not render the petitioner’s post-arrest statement involuntary because the petitioner’s girlfriend had voluntarily implicated herself in the murder prior to the defendant’s arrest. Thompson, 255 F.3d at 1296. We explained that, under these circumstances, the officer had probable cause to arrest the petitioner’s girlfriend and the officer’s statement of this fact to the petitioner, therefore, did not constitute coercion. Id. at 1297.
Similarly, in Martin v. Kemp, 760 F.2d 1244 (11th Cir.1985), we examined a habeas petitioner’s argument that his guilty plea was involuntary because it was prompted by police threats to bring charges against the petitioner’s young, pregnant wife. Id. at 1247-48. Although we ultimately determined that the record was unclear on whether the police had probable cause to file charges against the petitioner’s wife at the time this threat was made and that remand, thus, was warranted, we clarified that whether a threat to prosecute a third party is coercive depends upon whether probable cause exists to believe that the third party has committed a crime at the time that the threat is made. Id. at 1248-49.
Here, to the extent Estelan is arguing that the court should have concluded that his post-arrest statement on November 18, 2003, was coerced because he testified that he made this statement only because officers threatened, otherwise, to arrest members of his family, the court, through adopting the magistrate’s report, determined that testimony denying such threats were made was more credible. Because “[t]he credibility of a witness is in the province of the factfinder,” we “will not ordinarily review the factfinder’s determination of credibility.” See United States v. Copeland, 20 F.3d 412, 413 (11th Cir.1994). Moreover, Estelan has not challenged Officer Hermanson’s credibility on appeal, and a review of the record does not show that the court clearly erred in making this finding. Indeed, the court noted that, in the videotape of Estelan’s November interrogation, Estelan appeared relaxed and “laid back,” and he did not ask about his family.
In examining Estelan’s December 22, 2003, post-arrest statement, Officer Raja admitted during the evidentiary hearing that he informed Estelan on this date what contraband the officers had recovered from the residence, along with explaining that they did not want to arrest anyone who was not involved with the drugs. Officer Raja, however, also testified that, when he entered the residence in question, he observed Estelan’s mother in the living room, sitting in close proximity to cocaine base that was in plain view. Moreover, Officer Raja recovered cocaine base and $725 in cash from a small refrigerator in the room that Estelan’s sister identified as her bedroom. Thus, similar to the facts in Thompson and Martin, probable cause existed to arrest Estelan’s mother and sister for possession of drugs, and Officer Raja’s statement to that effect did not result in Estelan’s December post-arrest statement being involuntary. See United States v. Clay, 355 F.3d 1281, 1284 (11th Cir.) (explaining that “constructive” possession is sufficient to prove the possession prong under § 841(a), and that constructive possession in drug cases is established “by showing ownership or dominion and control over the drugs or over the premises on which the drugs are concealed” (quotation omitted)), cert. denied, 543 U.S. 999, 125 S.Ct. 626, 160 L.Ed.2d 456 (2004).
Furthermore, to the extent Estelan is arguing that the court erred in denying his suppression motions because the court failed to examine the totality of the circumstances, and that these combined circumstances should have compelled the court to rule otherwise, as discussed above, a court must consider the totality of the circumstances in assessing whether a confession was voluntary. See Thompson, 422 F.3d at 1295. Estelan, however, neither raised this argument in the district court, nor has he identified on appeal other factors that rendered his statements involuntary.
Regardless, the record reflects that the court, although focusing primarily on Estelan’s arguments relating to threats to arrest his family members, examined the other circumstances surrounding both of the post-arrest statements. Indeed, in summarizing the testimony given during the evidentiary hearing, the court specifically noted that (1) the November search was conducted at 12:26 p.m. in the afternoon; (2) the officers on this date, in addition to not threatening to arrest his family members, did not use force against him; and (3) Estelan was lucid, had normal speech patterns, and did not appear to be under the influence of drugs or alcohol. The court also included that, during the December incident, Estelan appeared lucid, had normal speech, was clear eyed, did not appear .to be under the influence of drugs or alcohol, and did not request an attorney. In addition, the court noted that Estelan was 21 years’ old and had completed the 11th grade at the time of the evidentiary hearing. Thus, we conclude that the district court considered the totality of the circumstances, and it did not err in admitting at trial Estelan’s post-arrest statements.
Issue 2: Expert Testimony
Estelan also argues that the court abused its discretion in denying his motion to exclude the expert testimony of DEA Agent Bonner regarding drug-distribution amounts when the government faded to show that the testimony met the requirements for admission of scientific expert testimony under Rule 702 and Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579, 113 S.Ct. 2786, 125 L.Ed.2d 469 (1993). Estelan explains that, in overruling his objection to this expert testimony on an issue that was critical to three of his convictions, the court ignored the facts that the expert could not identify the facts and data that were the basis for his opinion, could not explain what method he used in reaching his opinion, and conceded that whatever method he used had not been subjected to peer review and publication.
We will reverse when a district court’s Daubert ruling “amount[s] to an abuse of discretion that affected the outcome of a trial.” United States v. Brown, 415 F.3d 1257, 1266 (11th Cir.2005). An abuse of discretion can occur where the district court applies the wrong law, follows the wrong procedure, bases its decision on clearly erroneous facts, or commits a clear error in judgment. Id. However, “the task of evaluating the reliability of expert testimony is uniquely entrusted to the district court under Daubert, ” and we “give[s] the district court considerable leeway in the execution of its duty.” Id. (internal quotation and marks omitted). Moreover, this rule is applicable whether the court admits or excludes expert testimony, and even if the Daubert issue is outcome determinative. Id.
Rule 702 includes as follows:
If scientific, technical, or other specialized knowledge will assist the trier of fact to understand the evidence or to determine a fact in issue, a witness qualified as an expert by knowledge, skill, experience, training, or education, may testify thereto in the form of an opinion or otherwise, if (1) the testimony is based upon sufficient facts or data, (2) the testimony is the product of reliable principles and methods, and (3) the witness has applied the principles and methods reliably to the facts of the case.
Fed.R.Evid. 702.
In Daubert, the Supreme Court generally discussed the district court’s role as a gatekeeper in determining whether expert testimony on scientific matters is admissible under Rule 702. Daubert, 509 U.S. at 589, 113 S.Ct. at 2794-95. The Daubert Court also set out a list of “general observations” for determining whether expert testimony is sufficiently reliable to be admitted under Rule 702, including (1) whether it can and has been tested; (2) whether it has been subjected to peer review and publication; (3) what its known or potential rate of error is, and whether standards controlling its operation exist; and (4) whether it is generally accepted in the field. Id. at 593-94, 113 S.Ct. at 2796-97. The Daubert Court, however, clarified that federal courts should not apply these factors rigidly, but instead should use them as “flexible” guidelines in applying Rule 702. Id. (explaining that “[m]any factors will bear on the inquiry, and we do not presume to set out a definitive checklist or test”).
In Kumho Tire Co., Ltd. v. Carmichael, 526 U.S. 137, 119 S.Ct. 1167, 143 L.Ed.2d 238 (1999), the Supreme Court subsequently elaborated on the flexible nature of this inquiry, explaining that Daubert’s list of specific factors neither necessarily nor exclusively applies to all experts or in every case. Id., 526 U.S. at 141, 119 S.Ct. at 1171. Whether the Daubert opinion factors are even pertinent to assessing reliability in a case will “depend[] on the nature of the issue, the expert’s particular expertise, and the subject of his testimony.” Id. at 150, 119 S.Ct. at 1175. The Kumho Court further explained that it could:
neither rule out, nor rule in, for all cases and for all time the applicability of the factors mentioned in Daubert, nor [could it] now do so for subsets of cases categorized by category of expert or by kind of evidence. Too much depends upon the particular circumstances of the particular case at issue.
Id.
We have determined that the Supreme Court’s holding in Kumho means that “expert testimony that does not meet all or most of the Daubert factors may sometimes be admissible.” Brown, 415 F.3d at 1268. Indeed, in Brown, we concluded that a court did not abuse its discretion in admitting expert testimony from two government witnesses on the chemical structure of certain drugs, which testimony the experts explained was “based on their knowledge, skill, and experience,” and on “sufficient facts and data,” even though the government failed to show Daubert factors such as “testability’ and peer review. Id. at 1268-69.
In the instant case, the court overruled Estelan’s objection to Special Agent Bonner’s testimony, as “an expert in street level narcotics and trafficking and specifically in crack cocaine and cocaine powder,” on how cocaine base typically is sold and why the amounts of cocaine base that were recovered from the toilet, drawer, and refrigerator from Estelan’s residence, and the cocaine base in the Excedrin pill bottle, were indicative of distribution, instead of personal use. Special Agent Bonner conceded that he never had published any articles on street-level dealing of cocaine base, nor been subject to peer review or evaluation. Special Agent Bonner also agreed that his methodology for his opinions was based solely on his training, observations, and experiences. Thus, similar to the facts in Brown, the government failed to establish all of the factors discussed in Daubert.
Regardless, as discussed above, “expert testimony that does not meet all or most of the Daubert factors may sometimes be admissible.” See Brown, 415 F.3d at 1268. The government elicited from Special Agent Bonner that, as an agent with the DEA for approximately four years and four months, he had (1) received specialized training in the distribution and trafficking of illegal drugs, particularly with Schedule I and II controlled substances; (2) participated in hundreds of investigations involving the distribution of cocaine base; and (3) interviewed in excess of 100 persons involved in the illegal distribution of cocaine and cocaine base. Special Agent Bonner also stated, without any challenges, that he previously had been employed for approximately eight years as a police officer, working extensively on narcotic cases, and that, as a result of this training and experience, he had become familiar with the conduct and trafficking techniques of street-level narcotic distributors.
Furthermore, “[t]he rule is well-established that an experienced narcotics agent may testify about the significance of certain conduct or methods of operation unique to the drug distribution business.” See United States v. Butler, 102 F.3d 1191, 1199 (11th Cir.1997) (quotation omitted). In Butler, we concluded that the district court did not abuse its discretion in allowing testimony that money seized was packaged in “dealer folds” — a manner of packaging peculiar to drug dealers. See id. Similarly, in United States v. Robinson, 870 F.2d 612 (11th Cir.1989), we determined, albeit prior to Daubert, that the district court did not err in admitting as expert opinion a police officer’s testimony on drug dealing in Tallahassee, Florida, when the officer had been a police officer for over six years, had worked for the majority of this time in an area of the city where the major law enforcement problem was cocaine base, had arrested approximately 100 suspects for cocaine base offenses, and, for 8 months prior to his testimony, and had been a member of a police unit whose sole responsibility was to investigate cocaine base offenses. See id. at 613. Because Special Agent Bonner also offered uncontested testimony that he had extensive training and experience in the trafficking of cocaine base, we conclude that the court did not err in admitting his expert testimony on drug-trafficking amounts. See Brown, 415 F.3d at 1266.
ISSUE 3: Criminal-History Points
Estelan last argues that the court plainly erred when it used prior convictions that it had declared constitutionally invalid in calculating Estelan’s criminal history category. Citing to U.S.S.G. § 4A1.1, comment. (n.6) and United States v. Cornog, 945 F.2d 1504, 1509 (11th Cir.1991), Estelan contends that, when a district court finds that a prior conviction is constitutionally invalid for a purpose other than criminal history, it also must exclude that conviction and its corresponding sentence “from all of its criminal history calculations.” Estelan also asserts that this error was plain because his resulting higher guideline range created a reasonable probability of a different outcome at sentencing. Moreover, Estelan summarily asserts that use of a constitutionally infirm criminal conviction to enhance a defendant’s sentence affects the fairness, integrity, or public reputation of the judicial proceedings.
When a defendant raises an argument for the first time on appeal, such as here, our review is only for plain error. See United States v. Peters, 403 F.3d 1263, 1270 (11th Cir.2005). “Under plain error review, which is authorized by Fed. R.Crim.P. 52(b), federal appellate courts have only a limited power to correct errors that were forfeited because they were not timely raised in the district court.” Id. at 1270-71 (internal quotations and marks omitted). Thus, we
may not correct an error the defendant failed to raise in the district court unless there is: (1) error, (2) that is plain, and (3) that affects substantial rights.... Even then, we will exercise our discretion to rectify the error only if it seriously affects the fairness, integrity, or public reputation of judicial proceedings.
Id. at 1271 (internal quotations and marks omitted).
In Cornog — the case relied on by Estelan — we examined a defendant’s challenge to the district court’s inclusion in its calculation of his criminal-history points convictions that the court had determined were constitutionally invalid for purposes of sentencing the defendant as a career offender, pursuant to U.S.S.G. § 4B1.1. Cornog, 945 F.2d at 1508-09. We concluded that, “if the [district] court properly held that the convictions were invalid — and therefore could not be counted — then it was bound to exclude them from all of its criminal history calculations.” Id. at 1509. We further explained that this rule was true, even though the collateral inquiry undertaken by the court in determining the defendant’s career-offender status was discretionary. Id.
In the instant case, both parties agree that, although the court determined that three of Estelan’s prior felony convictions were constitutionally invalid for purposes of enhancing his statutory sentence under § 851, the court counted these convictions in calculating Estelan’s criminal-history points under U.S.S.G. § 4A1.1. Moreover, the government is not challenging the fact that the inclusion of the three criminal-history points from these convictions resulted in Estelan having a criminal history category of IV, and a guideline range of 135 to 168 months’ imprisonment, instead of a criminal history category of III, and a guideline range of 121 to 151 months imprisonment. Instead, the government is arguing that this calculation was not erroneous under this Court’s holding in Cornog because Cornog was decided prior to the Sentencing Commission’s 1990 amendment to U.S.S.G. § 4A1.2 — the guideline that specifies what convictions count in a defendant’s criminal history score.
Indeed, when we decided Cornog in 1991, Application Note 6 to § 4A1.2 read in part: “Convictions which the defendant shows to have been constitutionally invalid may not be counted in the criminal history score.” U.S.S.G. § 4A1.2, comment, (n.6) (1990). Note 6, however, was amended in November 1993 to read:
Sentences resulting from convictions that (A) have been reversed or vacated because of errors of law or because of subsequently discovered evidence exonerating the defendant, or (B) have been ruled constitutionally invalid in a prior case are not to be counted. With respect to the current sentencing proceeding, this guideline and commentary do not confer upon the defendant any right to attack collaterally a prior conviction or sentence beyond any such rights otherwise recognized in law {e.g., 21 U.S.C. § 851 expressly provides that a defendant may collaterally attack certain prior convictions).
U.S.S.G. § 4A1.2, comment, (n.6) (1993) & (2003). Based on a similar earlier amendment, this Court sitting en banc in United States v. Roman, 989 F.2d 1117 (11th Cir.1993), held that the revised § 4A1.2 does not authorize a sentencing court to inquire into the constitutional validity of a prior conviction, unless the defendant adduces evidence sufficient to demonstrate that the conviction used to enhance his sentence is presumptively void, which cases “are small in number and are perhaps limited to uncounseled convictions.” Id. at 1119-20.
Unlike the facts in Roman, however, Estelan challenged at sentencing the constitutional validity of three prior convictions under § 851 — a statutory exception that the amendment to Application Note 6 explicitly discussed. (See Rl-66; R6 at 562); see also U.S.S.G. § 4A1.2, comment. (n.6) (1991). Indeed, we have explained that § 851(c) specifically sets forth a procedure by which a defendant who is subject to a statutory sentence enhancement may challenge the constitutionality of an earlier conviction that is the basis for the enhancement. See United States v. Mikell, 102 F.3d 470, 477 (11th Cir.1996). The 1991 amendment to Application Note 6, therefore, did not affect our holding in Cornog, at least to the extent that the evidentiary hearing in which the sentencing court examined challenges to the constitutional validity of prior convictions was conducted under § 851. Thus, contrary to the government’s response on appeal, the court’s counting under § 4A1.2 of three convictions that it had found to be constitutionally invalid under § 851 was erroneous under Cornog, and this error was plain.
Nevertheless, Estelan has failed to show that this error substantially prejudiced him. To establish substantial prejudice, Estelan has the burden of showing that “there is a reasonable probability of a different result” if the court had not erred in calculating his criminal-history points. See United States v. Rodriguez, 398 F.3d 1291, 1301 (11th Cir.) (applying plain-error test to error under United States v. Booker, 543 U.S. 220, 125 S.Ct. 738, 160 L.Ed.2d 621 (2005)), cert. denied, — U.S. -, 125 S.Ct. 2935, 162 L.Ed.2d 866 (2005). “[W]here the effect of an error on the result in the district court is uncertain or indeterminate — where we would have to speculate — the appellant has not met his burden of showing a reasonable probability that the result would have been different but for the error.” Rodriguez, 398 F.3d at 1301.
Here, other than stating that his guideline range should have been 121 to 151 months’ imprisonment, instead of the 135 to 168 month range that the court considered, Estelan has not cited to authority showing, or even explained, why he was substantially prejudiced when the court sentenced him to 135 months’ imprisonment. Cf. United States v. Richardson, 166 F.3d 1360, 1361-62 (11th Cir.1999) (reversible plain error occurred where the difference in the defendant’s enhanced guideline range of 180 to 188 months was much greater than his unenhanced range of 70 to 87 months). Indeed, in discussing why it was imposing post-Booker a 135-month sentence, the court explained that it had considered § 3553(a)’s factors, and that it had “looked carefully at [Estelan’s] prior convictions, what they consisted of, the way they were treated and so on.” (See R6 at 638); see also U.S.S.G. § 4A1.2, comment, (n.6) (instructing that “the criminal conduct underlying any conviction that is not counted in the criminal history score may be considered pursuant to § 4A1.3 (Adequacy of Criminal History Category)”). Thus, although the court erred in calculating Estelan’s guideline range, Estelan failed to establish that this error substantially prejudiced him.
Accordingly, we conclude that the district court did not err in determining that Estelan’s post-arrest statements were voluntary and, thus, in denying Estelan’s motions to suppress them. The court also did not abuse its discretion in denying Estelan’s objection to the government’s introduction of expert testimony from Special Agent Bonner regarding drug-distribution amounts. Furthermore, although the court did plainly err in calculating Estelan’s criminal-history points, Estelan has failed to establish that such error resulted in any prejudice. We, therefore, affirm Estelan’s convictions and sentences.
AFFIRMED.
. Although the magistrate judge in her report and recommendation construed Estelan’s third suppression motion as challenging post-arrest statements Estelan made on November 18, 2003, Estelan clarified in his objections to this report that his third suppression motion involved the post-arrest statement he made on December 22, 2003. Thus, to the extent Estelan is challenging on appeal the post-arrest statement he made on November 18, 2003, he arguably did not raise this challenge in the district court. Nevertheless, because the magistrate addressed this statement in her report, and because the government has not argued that this challenge is newly raised on appeal, we also will treat Estelan’s suppression motions as covering statements made on both dates.
. The district court, in adopting the magistrate’s report and recommendation, denied Estelan's motions to the extent he was arguing that they were obtained after he invoked his right to remain silent. Because Estelan has not challenged this determination on appeal, we deem any arguments on it abandoned. See United States v. Levy, 416 F.3d 1273, 1275 (11th Cir.) (explaining that an argument not raised in an appellant’s opening brief is deemed abandoned), cert. denied, - U.S. -, 126 S.Ct. 643, -L. Ed.2d - (2005).
. Officer Raja also conceded that, after he spoke with Estelan’s mother and sister about the possibility of arresting them, and after the officers transported Estelan to the police station, he permitted these family members to speak to Estelan, with their conversations "surreptitiously videotaped,” with the hope that Estelan would admit to them that he owned the drugs.
. Estelan objected to this report, arguing that the fact that he made post-arrest statements did not establish that he voluntarily waived his right to remain silent. Estelan contended that he testified that he was threatened with the arrest of family members on November 18, 2003, and that the government did not claim that the officers had probable cause to arrest members of his family on this date. He also argued that the officers did not have probable cause to arrest his mother and sister on December 22, 2003, because (1) the probable cause affidavits for both search warrants were based solely on Estelan’s illegal activity, (2) his mother and sister were not arrested after the first search revealed both drugs and guns in their residence, (3) the cocaine base recovered from the cluttered living room was a small amount; and (4) the cocaine base recovered from his sister’s room was in a closed container.
. Although the government asked Officer Honkala about a search on November 13, 2003, it, presumably, was referring to the November 18, 2003, search.
. Although Officer Raja first stated that he arrested Estelan in January 2, 2004, he subsequently clarified that the arrest occurred on January 22, 2004.
. In addition to raising at trial his objection to Special Agent Bonner's expert testimony, Estelan filed pretrial a motion to exclude this testimony. The court, however, did not address this motion until the trial had commenced.
. The court also denied Estelan’s objection to the introduction of this expert testimony to the extent Estelan was relying on Fed.R.Evid. 401 and 403. Because Estelan has not challenged this ruling on appeal, we deem any arguments on it abandoned. See Levy, 416 F.3d at 1275.
. The government had filed a pretrial notice, pursuant to 21 U.S.C. § 851, notifying Estelan of its intent to rely on three of his prior state felony drug convictions in seeking an enhanced sentence in the instant offense, as required in 21 U.S.C. § 851(b).
. These prior convictions included three convictions that Estelan had denied and that the court eventually found at sentencing to be constitutionally invalid for purposes of relying on them to statutorily enhance Estelan’s sentence under 21 U.S.C. § 851, that is, (1) two consolidated state convictions in Palm Beach County, Florida, for felony sale of cocaine, in Case Nos. 02-14569CFA02 and 02-2291CFA02, on May 30, 2003; and (2) a state conviction in Palm Beach County, Florida, for felony possession of marijuana, in Case No. 03-10472CFA02, on October 10, 2003.
. As discussed above, the government argues that, even if the court erred in denying Estelan’s suppression motions and in admitting his post-arrest statements, this error was harmless. The Supreme Court has determined that an erroneous admission of a coerced confession can be harmless error. See Arizona v. Fulminante, 499 U.S. 279, 295, 111 S.Ct. 1246, 1257, 113 L.Ed.2d 302 (1991). However, in determining whether a coerced confession was harmless error, the Supreme Court explained in Arizona that "[a] confession is like no other evidence.” Indeed, "the defendant’s own confession is probably the most probative and damaging evidence that can be admitted against him.” See Fulminante, 499 U.S. at 296, 111 S.Ct. at 1257 (quotation and marks omitted). Here, we need not determine the issue of harmless error because no error occurred.
. Although Estelan included in the heading for this argument that the court erred in failing to hold an evidentiary hearing to determine whether the "fingerprint evidence” met the requirements of Rule 702 for admission as scientific expert testimony, he failed in his discussion to explain or cite to the record in support of this contention. Thus, it appears that the inclusion of this contention was not intended.
. Alternatively, as the government contends, the reversal is not warranted because the admission of this evidence did not affect the outcome of Estelan’s trial. See Brown, 415 F.3d at 1266; see also United States v. Sellers, 906 F.2d 597, 601 (11th Cir.1990) (explaining that non-constitutional evidentiary error not reversible under there is a "reasonable likelihood that the defendant’s substantial rights were affected”). In addition to Special Agent Bonner’s testimony on drug-distribution amounts, evidence at trial that demonstrated Estelan's intent to distribute included (1) on November 18, 2003, officers recovered cocaine base and powder in the same bedroom as a loaded Glock model 30, .45 semiautomatic pistol; (2) on December 22, 2003, officers recovered from the same refrigerator cocaine base and $725 in cash; and (3) on January 3, 2004, on two separate occasions, a Cl made undercover videotaped buys of cocaine base from Estelan.
. In November 1990, Application Note 6 was amended to read as follows: "[S]entences resulting from convictions that a defendant shows to have been previously ruled constitutionally invalid are not to be counted .....” See U.S.S.G. § 4A1.2, comment, (n.6) (1990)
. Section 851(c)(1) specifically provides that, if a person files a written response to a § 851 information, denying any allegation of a prior conviction or claiming that a prior conviction is invalid, “the court shall hold a hearing to determine any issues raised by the response which would except the person from increased punishment.” See 21 U.S.C. § 851(c)(1).
| CASELAW |
User:DarkHorizon/Books/Victoria and Waterloo
Victoria line and Waterloo & City line
* Victoria line
* Victoria line
* Walthamstow Central station
* Blackhorse Road station
* Tottenham Hale station
* Seven Sisters station
* Finsbury Park station
* Highbury & Islington station
* King's Cross St. Pancras tube station
* Euston tube station
* Warren Street tube station
* Oxford Circus tube station
* Green Park tube station
* London Victoria station
* Pimlico tube station
* Vauxhall station
* Stockwell tube station
* Brixton tube station
* Waterloo & City line
* Waterloo & City line
* Bank-Monument station
* Waterloo tube station | WIKI |
1959–60 NYU Violets men's basketball team
The 1959–60 NYU Violets men's basketball team represented New York University in intercollegiate basketball during the 1959–60 season. The team finished the season with a 22–5 overall record while winning the Metropolitan New York Conference with a perfect 4–0 record in league play. The Violets earned their second NCAA Division I basketball tournament Final Four appearance (their first was in 1944–45). They were led by second-year head coach Lou Rossini. During this season and the season after that, at least one of New York University's players in Ray Paprocky (with potentially two more players also in mind) was involved with the 1961 NCAA University Division men's basketball gambling scandal once that situation came to light a season later. However, due to the discovery not taking place until a full season later combined with the university not finishing with a top 3 finish, New York University would not rescind their Final Four appearance afterward.
Roster
Source | WIKI |
Amazon Removes Holiday Ornaments With Images of Auschwitz After Criticism
A bottle opener, a mouse pad and other products displayed images of the Nazi concentration camp. Amazon on Sunday removed from its marketplace holiday ornaments, a bottle opener and other products displaying images of the Nazi concentration camp Auschwitz after the Auschwitz-Birkenau Memorial and Museum in Poland shared images of the products on social media, prompting widespread outrage. In a tweet early Sunday morning, the memorial said the ornaments were inappropriate and called the bottle opener “rather disturbing and disrespectful.” Within hours, the post was shared thousands of times, prompting angry replies and questions about how Amazon vets the products sold through its platforms. At 1:30 p.m., the memorial said in another post that Amazon appeared to have removed the ornaments. By Sunday night, none of the products appeared to be available for purchase. An Amazon spokeswoman said in a statement that the products had been removed and that “all sellers must follow our selling guidelines and those who do not will be subject to action, including potential removal of their account.” It was not immediately clear how long the merchandise was advertised on the online retail platform. Amazon declined to answer further questions. According to Amazon’s policy on offensive and controversial materials, products “related to human tragedies” are prohibited. The company decides which products are appropriate by considering a “global community of customers and cultural differences and sensitivities.” The policy does not apply to books, music, videos or DVDs. The Auschwitz-Birkenau Memorial and Museum did not immediately respond to requests for comment on Sunday. “It is hard to fathom why anyone would want to hang a Christmas ornament adorned with images of a concentration camp,” said Jonathan A. Greenblatt, chief executive of the Anti-Defamation League. “These ornaments are deeply offensive by any measure. We’re relieved that Amazon has removed these items from sale.” The online retail giant has been accused of poorly policing its platforms before. In July 2018, two nonprofit groups reported that shoppers could buy onesies for babies stamped with alt-right images, Nazi-themed action figures and anti-Semitic books and music. The groups accused Amazon’s policies banning hateful or offensive merchandise of being “weak and inadequately enforced,” allowing hate groups to “generate revenue, propagate their ideas and grow their movements.” Weeks later, under pressure from lawmakers, Amazon said it would not let third-party retailers sell products that feature Nazi and white nationalist symbolism on its platform. Chris McCabe, a former Amazon employee and founder of ecommerceChris, a firm that consults with marketplace sellers, said repeat issues with offensive content partly reflected Amazon’s “reactive” approach to enforcing its policies. Mr. McCabe said that algorithms trawl the website, looking for items that might violate Amazon policies. Items identified by the algorithm are then typically reviewed by humans who determine whether they should be removed. The sheer volume of items being sold on Amazon through third-party sellers makes it challenging to identify and remove all offensive items before they are found by the public, Mr. McCabe said. The volume, he added, also makes it impossible for humans to review all items before they are posted. More than half of the products sold on Amazon.com are from third-party sellers. Mr. McCabe said that the shopping spike during Black Friday and Cyber Monday — the busiest shopping times of the year — would probably stretch Amazon’s enforcement capabilities even further. “I have no doubt that these weren’t flagged,” he said. “I don’t think it is, for example, a technical error. I think they were flagged. They just weren’t reviewed in a timely manner.” But he also said the episode on Sunday showed that Amazon could be doing a better job of policing products on its website, such as better prioritizing what was reviewed first. “We’re hopeful that additional resources, both on the investigation side and in terms of their online tools on the technical side, will result in a reduced likelihood that offensive material will appear in the future,” he said. Removing all offensive items, though, “would be very difficult,” he added. The memorial, based in Oswiecim, Poland, preserves the site of the former German Nazi Auschwitz concentration and extermination camp, the largest of the death camps, where about 1.3 million people were deported. The camp encompasses 500 acres, 155 buildings and 300 ruins. | NEWS-MULTISOURCE |
Grimm Tales Made Gay/How Beauty Contrived to Get Square with the Beast
Miss Guinevere Platt Was so beautiful that She couldn’t remember the day When one of her swains Hadn’t taken the pains To send her a mammoth bouquet. And the postman had found, On the whole of his round, That no one received such a lot Of bulky epistles As, waiting his whistles, The beautiful Guinevere got!
A significant sign That her charm was divine Was seen in society, when The chaperons sniffed With their eyebrows alift: “Whatever’s got into the men?” There was always a man Who was holding her fan, And twenty that danced in details, And a couple of mourners, Who brooded in corners, And gnawed their mustaches and nails.
John Jeremy Platt Wouldn’t stay in the flat, For his beautiful daughter he missed: When he’d taken his tub, He would hie to his club, And dally with poker or whist. At the end of a year It was perfectly clear That he’d never computed the cost, For he hadn’t a penny To settle the many Ten thousands of dollars he’d lost!
F. Ferdinand Fife Was a student of life: He was coarse, and excessively fat, With a beard like a goat’s, But he held all the notes Of ruined John Jeremy Platt! With an adamant smile That was brimming with guile, He said: “I am took with the face Of your beautiful daughter, And wed me she ought ter, To save you from utter disgrace!”
Miss Guinevere Platt Didn’t hesitate at Her duty’s imperative call. When they looked at the bride All the chaperons cried: “She isn’t so bad, after all!” Of the desolate men There were something like ten Who took up political lives, And the flower of the flock Went and fell off a dock, And the rest married hideous wives!
But the beautiful wife Of F. Ferdinand Fife Was the wildest that ever was known: She’d grumble and glare, Till the man didn’t dare To say that his soul was his own. She sneered at his ills, And quadrupled his bills, And spent nearly twice what he earned; Her husband deserted, And frivoled, and flirted, Till Ferdinand’s reason was turned.
He repented too late, And his terrible fate Upon him so heavily sat, That he swore at the day When he sat down to play At cards with John Jeremy Platt. He was dead in a year, And the fair Guinevere In society sparkled again, While the chaperons fluttered Their fans, as they muttered: “She’s getting exceedingly plain!”
The Moral: Predicaments often are found That beautiful duty is apt to get round: But greedy extortioners better beware For dutiful beauty is apt to get square! | WIKI |
Page:History of the orders of knighthood of the British Empire; of the Order of the Guelphs of Hanover; and of the medals, clasps, and crosses, conferred for naval and military services.djvu/5
HISTORY
OF THE
ORDERS OF KNIGHTHOOD
OF
THE BRITISH EMPIRE:
OF THE
ORDER OF THE GUELPHS OF HANOVER
AND OF THE
Medals, Clasps, and Crosses,
CONFERRED FOR
NAVAL AND MILITARY SERVICES
BY
SIR NICHOLAS HARRIS NICOLAS,
CHANCELLOR AND KNIGHT GRAND CROSS OF THE ORDER OF SAINT MICHAEL AND
SAINT GEORGE; KNIGHT OF THE ORDER OF THE GUELPHS
VOLUME THE THIRD.
PUBLISHED FOR JOHN HUNTER, MADDOX STREET,
(ROBE MAKER TO HER MAJESTY)
BY WILLIAM PICKERING, CHANCERY LANE; AND
JOHN HODWELL, NEW BOND STREET.
MDCCCXLIl | WIKI |
Angel Dust (film)
Angel Dust (エンジェル・ダスト) is a 1994 psychological crime horror film directed by Japanese filmmaker Gakuryū Ishii. It stars Kaho Minami as a forensic psychiatrist who is brought in by the police to help stop a serial killer who strikes on a crowded Tokyo subway once a week.
The film has received positive reviews, with praise for its direction, cinematography, musical score, and performances.
Plot
Forensic psychiatrist Dr. Setsuko Suma is called in by the Tokyo Metropolitan Police Department to assist in solving a case of serial murders occurring on the Tokyo subway. During the last two Mondays, at 6 pm, a seemingly random young woman had been killed on a crowded train – injected with a hypodermic needle containing deadly rhodotoxin. Setsuko is known as an expert in abnormal criminal cases, as she has the ability to assimilate the thoughts and emotions of perpetrators by interacting with the bodies of the victims. After examining the bodies, she believes that they were chosen because they had strong feelings of self-destruction and isolation – emotions that they shared with the killer.
Setsuko suspects that the killer personally knew the first victim, a student named Yumiko, as she was the only one who was injected in the back instead of in the front. She learns that Yumiko was a former member of a cult called the Ultimate Truth Church and that she was deprogrammed at a mountain facility called the Re-Freezing Psychorium. This facility is run by the disgraced psychiatrist Dr. Rei Aku, who is Setsuko's former lover. Aku's "reverse brainwashing" techniques have been very controversial, being called "unscientific" and compared to mind control. Setsuko goes to visit Aku to ask for information on Yumiko, but he refuses her.
The murders continue, but now take place outside of the subway system, on residential streets and in urban areas. Setsuko begins to feel paranoid and restless after she receives a call from Aku, telling her that because of her research, the killer's mind will start to manifest itself inside of her. She attempts to visit Aku again, suspecting that he is involved with the murders. This is based on clues, such as his color blindness linking him to the red clothing worn by all the victims. Setsuko also believes that Aku's sense of isolation is similar to the one felt by the victims. She accuses him of being heartless and manipulative during their relationship, while he says that his feelings of love toward her have not changed.
When Setsuko leaves, Aku watches old tapes which focus on the deprogramming of a cult member named Yuki. As a child, Yuki experienced the death of her mother and blames herself for it. Her mother had fallen into a pit, and though Yuki was trying to help her out, she was stung by a bee, forcing her to let go of her mother's hand.
The following Monday, Setsuko stalks the subway station in order to prevent another murder but collapses after seeing Aku approach her. During her recovery, she dreams of Aku and receives a call from him, telling her to come to the Re-Freezing Psychorium. Aku tells Setsuko that she is under his control and that she wants to be with him, despite her denial. When Setsuko arrives, she is locked in a room with a television screen playing a looped recording of Aku mocking her free will. This prolonged captivity drives Setsuko mad and makes her believe that the murders are her fault for leaving Aku. She is forced to tell Aku that she loves him, and after that, Yuki enters the room. Setsuko escapes through the unlocked door, but when she returns home, she finds that her husband, Tomoo, has been killed. During the autopsy, it is discovered that Tomoo was intersex. Setsuko tells the police that all of the killings were committed by her and Aku, and she is confined to a psychiatric hospital. Aku has disappeared and cannot be located.
While she is being transferred to another hospital, Setsuko is kidnapped by Aku. When she wakes up in his facility, he prepares to kill her, but she defends herself by stabbing him with a knife. Yuki enters the room, revealing herself to have perpetrated the subway murders in revenge for Aku's manipulative brainwashing. She attempts to kill both him and Setsuko with her needle. Aku subdues her and then convinces her to kill herself by evoking her childhood trauma, saving Setsuko in the process. He then reveals that the story about Yuki's mother's death was not real; he implanted it in her mind in order to control the murderous compulsions that she had inside of her. These false memories backfired and turned Yuki into a serial killer who used needles to "sting" her victims.
The police arrive and Yuki is declared the perpetrator of the serial murders. With a blank expression, Setsuko rests in Aku's arms, now completely devoted to him. Aku smiles.
Release
The film premiered in Japan on September 23, 1994. It premiered in the United States on January 24, 1997.
Critical reception
Angel Dust has received positive reviews. Stephen Holden of The New York Times praised the atmosphere, cinematography, and soundtrack of the film, though criticized the ending. David Rooney of Variety said the plot is "at times on the fuzzy side," but Ishii "keeps the heady brew cooking, exercising a steely fascination that doesn't let up." He also complimented the editing, acting, and camerawork in the film. Richard Scheib of Moria Reviews gave Angel Dust three-and-a-half stars, calling it a "beautifully composed and serenely cool film". He compared the film to The Silence of the Lambs and praised the journey of the main heroine, although criticizing the execution of the overarching plot.
Michael Hewis of Cinema of the Abstract described the film as "an incredibly unsettling psychological horror film which creeps you out to the end" and cited similarities to other crime thriller films, such as Se7en and Manhunter. Hewis praised the atmosphere and setting of the film and also complimented the dreamlike quality to its storytelling. Marc Savlov of The Austin Chronicle said Angel Dust is "that rare avis, a cat-and-mouse thriller that lives up to – and surpasses – expectations." He praised Ishii's "crazed, shock-cut editing, surreal cinematography, and bombastic use of high-decibel industrial music," saying that the style creates an "infectious new twist" on the old "serial-killer subgenre." | WIKI |
Wikipedia:Articles for deletion/Short-lived recurring characters on Saturday Night Live
The result was delete. Cirt (talk) 15:08, 7 February 2010 (UTC)
Short-lived recurring characters on Saturday Night Live
* – ( View AfD View log • )
Fancruft, virtually unsourced. The name is virtually contradictory to WP:NOTABLE. —Justin (koavf)❤T☮C☺M☯ 06:38, 22 January 2010 (UTC)
* Delete Too many entries to be useful, no information about when the character appeared in the last 35 seasons, no sourcing -- and worst of all, 100+ humorless and boring descriptions of the 100+ items on the list. This dates from the early days of Wikipedia when every article was a big wall that each passerby would write some graffiti upon, kind of like "Hey, remember Dana Carvey as 'Lyle, the Effeminate Heterosexual'? I can remember the theme song even-- 'He walks like a girl, he throws like a girl, he talks on the phone like a girl... but he's just as straight as me, and probably as you...'" etc. etc. This type of information makes more sense as a section in each individual season article, where one can be more detailed about recurring sketches and characters. Mandsford (talk) 13:46, 22 January 2010 (UTC)
* Delete Unreferenced fancruft. Warrah (talk) 17:47, 22 January 2010 (UTC)
* Comment I think this list needs to go, but since we're on the topic, these three articles probably should go with it: http://en.wikipedia.org/wiki/Recurring_Saturday_Night_Live_characters_and_sketches ; http://en.wikipedia.org/wiki/Recurring_Saturday_Night_Live_characters_and_sketches_%28listed_chronologically%29 ; http://en.wikipedia.org/wiki/Recurring_Saturday_Night_Live_characters_and_sketches_%28listed_by_cast_member%29 Tyrenon (talk) 06:46, 23 January 2010 (UTC)
* If someone nominates them, they would each need to be judged on their own merits. Mandsford (talk) 20:23, 23 January 2010 (UTC)
Please add new comments below this notice. Thanks, Scott Mac (Doc) 11:55, 30 January 2010 (UTC)
* Keep For an extremely notable show, this is not inappropriate. In fact, I think one of the delete !votes is saying it should be deleted because of the lack of detail, which I think is somewhat odd, as that is a prime example of what can be fixed by editing. DGG ( talk ) 03:30, 28 January 2010 (UTC)
* Relisted to generate a more thorough discussion so consensus may be reached.
* Delete. A few sketches, such as "Lothar of the Hill People" do have secondary sources, but they can be or already are covered in other articles. Otherwise this article is a refuge for non-notable material. Abductive (reasoning) 12:02, 30 January 2010 (UTC)
* Do not delete, although I agree with virtually every comment made by the editors above. However, the show is notable, and parts of this content can be salvaged or merged. I just don't see the need for the delete button here. Xymmax So let it be written So let it be done 22:35, 30 January 2010 (UTC)
| WIKI |
Ghostkeeper
Ghostkeeper is a 1981 Canadian supernatural slasher film directed by James Makichuk, and starring Riva Spier, Georgie Collins, and Murray Ord. Its plot centers on a trio of snowmobilers in the Canadian Rockies who become stranded at an abandoned hotel where the elderly female innkeeper is hiding an evil entity within the building. The film is inspired by the Windigo legend of North America.
Filmed in Banff, Alberta under a tax shelter in December 1980, the film had an unstable financial situation and the filmmakers nearly halted the production mid-way through due to depletion of its budget. The film was given a minuscule theatrical run in Canada and the United States and is consequently little-known among horror film fans, but has attained a cult following over the years.
The independent cult label Code Red Releasing later acquired the film, and released on DVD for the first time in April 2012. In August 2017, they reissued the film on Blu-ray featuring a new 2K scan of the original film elements.
Plot
Jenny, Marty, and Chrissy are spending their New Year's Eve on a snowmobiling trip in the Rocky Mountains. After talking with a storekeeper at a ski shop, the three decide to go riding before dark, but end up caught in a blizzard. Looming before them is a seemingly abandoned hotel at the top of the snow trail, isolated from tourists and miles away from the skiing area. The three enter the building to escape the increasingly harsh conditions, and find that the heat is on, but there are no lights. As night falls, they start a fire and tell stories and reminisce. Marty decides to go into the hotel kitchen where he finds an old woman lurking. She is brash and apprehensive of their presence, and they learn that she lives in the hotel with two unseen sons.
Though hesitant, the woman lodges them in rooms. Marty and Jenny argue in their bedroom, while Chrissy goes down the hallway to take a bath since the plumbing in the rooms is obsolete. While in the bathtub, Chrissy is attacked by one of the sons, Danny, and held underwater. A restless Jenny goes to check on Chrissy, but the candle-lit bathroom is empty; Jenny then runs into the old woman and they have a conversation about the hotel and her sons. Meanwhile, Danny carries Chrissy to the basement of the hotel, where he slits her throat and then stores her body in a freezer. Jenny awakens in the night and hears the old woman talking to someone downstairs.
The next morning, Marty goes outside to the snowmobiles to activate them, with no success. Suspecting that they have been tampered with, he goes outside to an old shed for tools, while Jenny stays in the kitchen with the old woman. After accepting the tea from the offering woman, Jenny inquires about Chrissy's disappearance, but the old woman is evasive. Jenny returns to a lounge in the hotel where she realizes she's been drugged, and falls unconscious. She awakens in the basement, where she finds a book on First Nations folklore and reads that a Wendigo is often "kept" by an old woman who had the power passed on to her from another. She opens the freezer and discovers a human Windigo inside, being the old woman's second son. Danny then comes down to the basement with a chainsaw and chases Jenny throughout the hotel, up into the attic. Jenny exits through a window onto a small balcony; she manages to push him over, where he is impaled on an iron fence below.
Jenny finds Marty outside, who appears to be possessed and rambling to himself while wandering into the woods. Meanwhile, the storekeeper arrives at the hotel, where he is stabbed by the old woman. Jenny re-enters the hotel, where she finds Danny's body has been dragged into the foyer. She locates a shotgun in a storage room, and is confronted by the old woman, who claims that she is Jenny's deceased mother. Jenny shoots and kills her. Strangely overtaken, she visits the Wendigo in the freezer where she says that she "will look after you now." and finds Marty's body outside with no reaction. In the end, Jenny sits in a lounge chair in front of a fireplace as the old woman's voice is heard.
Cast
* Riva Spier as Jenny
* Murray Ord as Marty
* Sheri McFadden as Chrissy
* Georgie Collins as Ghostkeeper
* Les Kimber as Storekeeper
* Bill Grove as Danny (credited as Billy Grove)
* John MacMillan as Windigo
Development
Ghostkeeper was co-written and directed by James Makichuk in his directorial debut, having started his career as a camera operator for local television stations before directing commercial ads. After three years of this, Makichuk would later admit that he had grown tired of the job and decided to make his next project a feature film. Development for the film would only start after Makichuk had a chance meeting with writer and producer Doug MacLeod during a film project with a mutual friend of the two, which later fell through. The two quickly became good friends, deciding to collaborate on a feature-length project, wanting to capitalize on the growing popularity of the horror genre after the recent success with John Carpenter's Halloween (1978), that could be filmed at a single location with a small cast. Early on in the development process, the filmmakers chose the Deer Lodge, a winter hotel in Banff, Alberta as the primary filming location after learning that one of Makichuk's friends knew someone who owned the hotel. For the film's antagonist, filmmakers drew inspiration from the Native American legend of the Wendigo, a cannibalistic spirit that possessed humans, roaming the wilderness in search of human flesh. According to Makichuk, the Wendigo was originally intended to have a more substantial role in the film, but many scenes had to be removed due to budget restraints.
The majority of the cast were locally-hired actors in the Calgary area, with the exception being lead Riva Spier, who was an actress hired out of Montreal. For the majority of the cast, Ghostkeeper was their first and final film credit; Georgie Collins was primarily a well-known stage actress in Calgary, and was cast in the role of the mysterious elderly hotel proprietor. Spiver, who had previously starred in minor roles prior to the film, would later go on to have a successful voice acting career.
Filming
Ghostkeeper was filmed on location in Lake Louise and the Banff National Park in Alberta, Canada. Filming began on November 30, 1980, and finished on December 23, 1980. The film was photographed by cinematographer John Holbrook. Producer Harry Cole commented during the shoot: "It's a producer's dream— it has one location in a controlled environment." Cole also described the film as more a "suspense movie" along the lines of Psycho (1960).
Ghostkeeper was produced via a tax shelter on a budget of approximately CA$750,000–$1 million. Its tax shelter funding made the production's financial situation rather unstable; James Makichuk said that he was given the option of halting the film's production when the funding began to run low, but he pursued to finish the film anyway—
"They told us that the money is almost all gone. We had a choice of stopping the movie, pulling the plug and I said, ‘No way, we’ve gotten over half of it shot.’ So every day I made up the scene as we’re going along, which is not the way to make a movie. That’s what made it so uneven and without the terrific ending that we had hoped for. But the thing I wanted with Johnny Holbrook, who is a great cameraman, is to have a mood. A dark sort of mood, an ominous thing going on – and I think for the most part it works. The prints that got finished were so dark but the distributors, those guys, they don’t care at all."
According to Makichuk, prior to the depletion of the budget, his original intention was to film a much longer ending, including an extended chase sequence with Spier and the Wendigo creature on the rooftop of the Deer Lodge hotel.
Music
The film's score was composed by Paul Zaza, who also composed music for fellow Canadian slasher film productions Prom Night (1980), My Bloody Valentine (1981), and Curtains (1983). Zaza got on board due to the involvement of film editor Stan Cole. In fact, some of the musical themes featured in Ghostkeeper were also used in Prom Night.
Alternate opening
An alternate opening to the film was shot by distributors two years after the initial production. In the opening, a young man flees from the hotel during the day, running into the woods until backing up against a tree. While pinned, he is killed (presumably by Danny) and stabbed with a sharp wooden stake. This opening was not featured in the 1986 VHS.
Release
Ghostkeeper was to screened out of competition at the Cannes Film Festival in May 1981. On October 29, 1981, director Makichuk appeared in a CBC television interview segment promoting the film, which included the airing of two scenes. It subsequently had its North American theatrical premiere at Calgary's Tivoli Theater on March 3, 1982.
Critical response
Rosemary McCracken of the Calgary Herald commented on the film's screenplay, noting that it carries "distinct echoes of Stanley Kubrick's The Shining," adding that "despite the flaws in the script, the film has a fair bit going for it. The performances are a notch above those being offered in much of the American horror fare being served up in our theaters."
Of contemporary reviews, the horror film website The Terror Trap gave the film a positive review stating, "Not for all tastes, the methodically paced Ghostkeeper is an exercise in disciplined mood generation; its bare claustrophobia either works for the viewer or not. But for those who prefer their chills straightforward, pre-sneer and pre-sarcasm, Keeper can be a most rewarding snow trap".
J.A. Kerswell from Hysteria Lives! gave the film a negative review calling the film "flawed", and "muddled". In The Blockbuster Entertainment Guide to Movies and Videos (1999), the film was rated two-and-a-half stars out of five, deemed "an absurd thriller." Eric Cotenas of DVD Drive-In noted the film's prominent atmosphere and drew comparisons to Stephen King's The Shining as well as cinematographer John Holbrook’s "aesthetic response to the desolate location."
Home media
The film did not receive a home video release until September 1986, when it was released in the United States through New World Pictures' home video branch.
Director James Makichuk stated in an interview that he was trying to get a DVD released through Netflix with a quality print of the film.
In April 2012, Ghostkeeper was released for the first time on DVD through Code Red Releasing. The DVD included a commentary with James Makichuck, Riva Spier and Murray Ord, an interview with director of photography John Holbrook as well as an interview with actress Georgie Collins. The film is presented in 1.78.1 anamorphic widescreen for the first time on video and has been restored from the only known existing film elements. On August 18, 2017, Code Red issued a Blu-ray edition of the film featuring a new 2K scan of the original film elements. | WIKI |
Anant Ramachandra Gokhale
Anant Ramachandra Gokhale (14 February 1907 – 25 June 1978) was an educationalist. In 20th century India, many great personalities walked in multifaceted fields of Indian society. Many amongst them served the nation in different capacities through various occupations. Some of them contributed immensely in the field of education all over India. Gokhale was amongst such personalities who worked all his life for women education and welfare.
Early life
Anant Ramachandra Gokhale, popularly known as A.R. Gokhale or Nanasaheb was born in Ichalkaranji, then a small state (now in Kolhapur District) of Maharashtra in a Chitpavan Brahmin family. His parents Ramachandra Vishnu Gokhale, himself a Sanskrit scholar and Mathurabai played an important role in ensuring higher education for their son. Anant Ramachandra Gokhale spent his early life in Belgaum, Karnataka. He finished his high school education from Beynon Smith High School Belgaum which was run by the missionaries. After matriculation, he studied in Willingdon College Sangli and graduated from Rajaram College Kolhapur in the year 1927. He also did his M.A. in English and Sanskrit from Deccan College Pune and B.T. from Tilak College of Education, Pune.
Anant Ramachandra Gokhale started his life as school teacher in American Missionary School, Vengurla where he came across Dr. Robert H. H. Goheen, an American academic who was known for his selfless service and simple living with high thinking. Dr. Goheen's son Robert F. Goheen went on to become the president of Princeton University and United States Ambassador to India. Gokhale also worked with the New English High School Satara.
A.R.Gokhale was associated with the Servants of India Society, formed by Namdar Gopal Krishna Gokhale. A.R.Gokhale was involved in the activities of Bharat Sevak Samaj, founded by India's first Prime Minister Pandit Jawaharlal Nehru. He was also a member of Maharashtra Samajik Parishad.
Servants of India Society
Anant Ramachandra Gokhale's life took a new turn in the 1930s when he was influenced by the preachings of great scholar of mathematics and leader Namdar Gopal Krishna Gokhale and joined the Servants of India Society which was founded by him in Pune.
The Servants of India Society was running an English Daily The Hitavada since 1911. With his flair for journalism and great command over English, Marathi and Sanskrit, Gokhale went on deputation to Delhi in early 1930s as a special correspondent for the newspaper and covered the proceedings of Central Legislative Assembly (Now known as Lok Sabha). He had a great opportunity to closely observe and meet leaders like Pandit Motilal Nehru, Barrister Muhammad Ali Jinnah who then represented the Indian National Congress, Vithalbhai Patel, the co-founder of Swaraj Party, Barrister M. R. Jayakar of Pune who was a founder of Pune Vidyapeeth, and several other leaders. Thus his life was enriched by a spell of journalism.
Influence of Women's Education
A.R. Gokhale, during his college days in the 1920s was highly influenced by great personalities like Maharshi Dhondo Keshav Karve who had started Hingne Stree Shikshan Sanstha for destitute and child widows who lived life of Alawan. The institute grew up to become Shreemati Nathibai Damodar Thackersey Women's University. Thus the tradition of women's emancipation from slavery flourished in Maharashtra. Another pioneer of women education Ramabai Ranade, wife of Justice Mahadev Govind Ranade of Bombay High Court had founded Pune Sevasadan Society in Pune in the 1909 for poor and destitute child widows to make them self-reliant and independent through education. Her contemporary, Pandita Ramabai was also a fountainhead of women's liberation.
The women in the Central Provinces and Berar had a similar fate like rest of Maharashtra. In Nagpur, then the capital of Central Provinces and Berar, eminent people like Bhawani Shankar Niyogi, who later became the Chief Justice of Nagpur High Court, Justice W. R. Puranik of Nagpur High Court and Colonel K. V. Kukade and their friends were impressed by the work of Pune Sevasadan Society and the Nagpur branch of Pune Sevasadan came into existence on 2 January 1927 with G. B. Garud as Nagpur Sevasadan's first Superintendent. He served there till 1936.
In the year 1936, A.R. Gokhale, concluded his tenure with The Hitavada and moved to Nagpur along with his wife Mrs. Sushilabai Gokhale, herself a Fergusson College, Pune graduate, to follow his ideals and there began a long journey with Sevasdan Nagpur.
Sevasadan Education Society
Anant Ramchnadra Gokhale's life turned a new corner to devote 40 years of life to women's education in 1936. Pune Sevasadan was looking for a young graduate couple in those days and had plans to take Nagpur Sevasadan forward. Gokhale and his wife Sushilabai Gokhale, both of whom were English, Marathi and Sanskrit scholars and orators was an apt couple to take over the reins and nurture Nagpur Sevasadan. Thus A.R.Gokhale became the superintendent of Sevasadan at a young age of 29. He was a teacher of English in high school for the 9th, 10th and 11th standards. Though he was the Superintendent of the school and was devoted to other aspects like school administration, fund raising for construction of buildings, he was also teaching English to female students of the school.
Gokhale took keen interest in the administration and also laid foundation of fledgling Sevasadan into a bigger institution. Nagpur Sevasadan had begun its journey in a rented bungalow in Dhantoli. He always wanted Sevasadan to move into a large premises and was in real sense a creator of converting this dream into reality for the benefit of destitute women and girls. He was continuously talking to the then Central Provinces and Berar Government and secured a plot for the school from them in the year 1939. Sevasadan shifted to its new building in 1940. His work did not stop only at the creation of one building, but he was toiling hard for the betterment of women's education and erected buildings for a High School, Pre-Primary Teachers Training College and Women's Hostel to bring Nagpur Sevasadan to its current status.
In those days, women in India were dependent on their families for survival because they were uneducated. The child widows had no choice to remarry and had to work for well-to-do families with a meagre income and no future, thus being exploited by the society as they were poor and uneducated. Their condition was pitiable, so it was necessary to make them educated and self-supportive. Nagpur Sevasadan gave them shelter in its women's hostel. Gokhale started many schemes in the society for their welfare. He brought in the concept of 'Earn and Learn' for these women so they could live their lives with respect in the society. The women who could not afford education and had no place to stay were accommodated in the women's hostel allowing them to work for the school and paid for the work done by them and also take up education and attend classes in the school or in the training colleges of Sevasadan.
Gokhale was a well known figure in Nagpur as a social worker and educator. During those days, the girl students hailing from Hyderabad State appeared for S.S.C examination of Nagpur Board and used to come to Nagpur for examinations in the summer. The poor girls had no accommodations for short period of 2 months. Gokhale ensured the girl students were allowed to stay in Sevasadan Hostel and helping them. Similarly, girls from refugee families who migrated from Pakistan were supported by him for taking up the exam in Nagpur, making facilities available for those students in the premises of Nagpur Sevasadan. For him, he preached what he taught ensuring equality among all his students irrespective of caste, creed and religion.
During the 1950s, there were no trained teachers for Balak Mandirs (Children School). So Gokhale and his wife started a Pre-Primary Teachers Training College for women and Mrs. Gokhale as its Principal helped the institute to bring out qualified teachers.
Gokhale was a founder President of Superintendents’ Association (now known as Headmasters' Association) in the 1940s for safeguarding the interests of the institutions. He was the President again in the early 1970s. Through his tireless efforts, construction of a hall for the Association's office and meetings came into a reality at Laxmi Nagar, Nagpur.
Gokhale breathed Sevasadan all through his life and developed the institute for women's education and their welfare.
End of an Era
Gokhale believed in the maxim of ‘High Thinking and Simple Living’ and he lived all his life as per his ideals. He breathed his last in Sevasadan on 25 June 1978 at the age of 71. He dedicated his life to Sevasadan. Such devoted servants of society are rare to find in new set.
Nagpur Sevasadan celebrated Mr. A.R. Gokhale's birth centenary year in 2006–2007 and installed his statue in the premises of Nagpur Sevasadan as a mark of respect and a book was published in his memory on the same occasion. The congratulatory message for the said book was received from Hon.Prof.Ram Shevalkar and Dr. Rajan Welukar then Vice Chancellor of YCMOU.
Current website of Sevasadan Nagpur acknowledges Mr.A.R.Gokhale as past management committee member.
The school is still run carrying the same principles and morals for which it was founded way back in 1927.
Publications
* 1) Sevasadan Speaks is a book describing celebrations on the occasion of Golden Jubilee of Nagpur Sevasadan in the year 1977.
* 2) Biography of Charles Freer Andrews: He was a missionary who served in India in the early 1920s and was closely associated with Annie Besant’s Home Rule League. He was an educator and social reformer in India and close friend of Mahatma Gandhi and an influential factor in convincing Gandhi to return to India from South Africa.
* 3) Sadhu Sundar Singh, a saint from Punjab who was a missionary in the early 1920s. | WIKI |
PHP Tip: Binding variables in a SQL WHERE IN clause
Have you ever wondered if it is possible to bind an unknown amount of variables in a SQL WHERE IN clause, e.g.:
SELECT id, text FROM myTable WHERE id IN (:myId1, :myId2, myId3, ...)
Use a OCI collection object and wonder no more:
$keyList = array(100, 250, 350);
$stmt = oci_parse($cnn, "SELECT id, text FROM myTable WHERE id IN (SELECT column_value from table(:myIds))");
$coll = oci_new_collection($cnn, 'ODCIVARCHAR2LIST','SYS');
foreach ($keyList as $key) {
$coll->append($key);
}
oci_bind_by_name($stmt, ':myIds', $coll, -1, OCI_B_NTY);
oci_execute($stmt);
while($row = oci_fetch_array($stmt, OCI_ASSOC)) {
echo "{$row['ID']}, {$row['TEXT']}";
}
I found the above solution by ThinkJet on stackoverflow.
Join the Conversation
3 Comments
Leave a Reply to Savaj Cancel reply
Your email address will not be published. Required fields are marked *
1. What does oci_new_collection() do exactly and are the parameters (what are they, what do they mean, etc.)?
1. Unfortunately, this function is not documented very well. Quoting from the The Oracle + PHP Cookbook:
Collections are PL/SQL structures that can be used in Oracle in the same manner that arrays can be used in PHP
and from the PHP documentation:
$cnn: An Oracle connection identifier
‘ODCIVARCHAR2LIST’: Should be a valid named type (uppercase).
‘SYS’: Should point to the scheme, where the named type was created. | ESSENTIALAI-STEM |
Howard Blatchford
Wing Commander Howard Peter "Cowboy" Blatchford (25 February 1912 – 3 May 1943) was a flying ace, who achieved the first Canadian victory in World War II.
Blatchford was born in Edmonton, Alberta on 25 February 1912, and enlisted in the Royal Air Force in February 1936. He was posted to No. 41 Squadron RAF in early 1937. In April 1940 he was posted to No. 212 Squadron RAF, flying photo-reconnaissance operations. In June he joined the Photographic Development Unit as a flight commander, later transferring to No. 17 Squadron RAF in September, flying Hawker Hurricanes. He soon joined No. 257 Squadron RAF, under the command of Squadron Leader Robert Stanford Tuck.
In December 1940, Blatchford was awarded the Distinguished Flying Cross: Flight Lieutenant Howard Peter BLATCHFORD (37715), No. 257 Squadron. In November, 1940, this officer was the leader of a squadron which destroyed eight and damaged a further five enemy aircraft in one day. In the course of the combat he rammed and damaged a hostile fighter when his ammunition was expended, and then made two determined head-on feint attacks on enemy fighters, which drove them off. He has shown magnificent leadership and outstanding courage.
Blatchford became commanding officer of No. 257 Squadron RAF in July 1941. He was promoted to wing commander in September that year, becoming wing leader of the Digby Wing. On 23 September 1941, John Gillespie Magee, the author of the famous flying poem "High Flight," arrived at Digby for his first operational posting, on RCAF 412 Squadron. On 12 October 1941, Magee's squadron moved from the Digby aerodrome to the nearby RAF Wellingore, from which he was operating when he died. Blatchford finished his tour of duty in April 1942, returning to operations in February 1943 as wing leader of the Coltishall Wing. On 29 March 1943 his Spitfires propeller was hit by Flak splinters during morning sortie (ca. 08.45-10.30), FB/Cat.A, but he landed safely. On 4 April 1943 while leading 167 Squadron on a sortie escorting 24 Lockheed Venturas attacking Rotterdam, his Spitfire was severely hit by a Jagdgeschwader 1 fighter with cannon and machine gun fire.
Leading the Coltishall Wing to escort bombers attacking a power station in Amsterdam, Blatchford was shot down and killed in action on 3 May 1943 by Obfw. Hans Ehlers of II Gruppe, JG1. His body was never found. He is commemorated on the Air Forces Memorial at Runnymede.
At the time of his death, Blatchford had claimed five aircraft shot down, three shared aircraft shot down, three "probables", four damaged and one shared damaged. | WIKI |
Rivers State Ministry of Chieftaincy and Community Affairs
The Rivers State Ministry of Chieftaincy and Community Affairs is the government ministry that administers issues related to chieftaincy and community in Rivers State, Nigeria. The ministry has its headquarters at 11th floor, State Secretariat, Port Harcourt. Incumbent commissioner is Sylvanus Nwankwo.
List of commissioners
* Charles Okaye
* John Bazia
* Sylvanus Nwankwo | WIKI |
Page:Summer on the lakes, in 1843.djvu/157
Rh such as the various colors of the ray, showed distinct influences upon her. The electric fluid was visible and sensible to her when it was not to us. Yea! what is incredible! even the written words of men she could discriminate by touch.
These experiments are detailed under their several heads in the book.
From her eyes flowed a peculiar spiritual light which impressed even those who saw her for a very short time. She was in each relation more spirit than human.
Should we compare her with anything human, we would say she was as one detained at the moment of dissolution, betwixt life and death; and who is better able to discern the affairs of the world that lies before, than that behind him.
She was often in situations when one who had, like her, the power of discerning spirits, would have seen her own free from the body, which at all times enveloped it only as a light veil. She saw herself often out of the body; saw herself double. She would say, “I seem out of myself, hover above my body, and think of it as something apart from myself. But it is not a pleasant feeling, because I still sympathize with my body. If only my soul were bound more firmly to the nerve-spirit, it might be bound more closely with the nerves themselves; but the bond of my nerve-spirit is always becoming looser.”
She makes a distinction between spirit as the pure intelligence; soul, the ideal of this individual man; and nerve-spirit, the dynamic of his temporal existence. | WIKI |
stairs: Stairs
Description
Calculates the staircase-ness measure.
Usage
1
stairs(tree)
Arguments
tree
a tree of class phylo or phylo4. The tree should be binary and rooted; if not it will be coerced into a binary rooted tree using multi2di, if possible.
Value
Two numbers corresponding to the two staircase-ness measures for a tree. Defined in Norstrom et al., Evolutionary Bioinformatics online, 8:261 (2012) doi: 10.4137/EBO.S9738, these are two related measures:
Author(s)
Michael Boyd mboyd855@gmail.com
Michelle Kendall michelle.louise.kendall@gmail.com
Examples
1
2
3
## Find the staircase-ness measures in a random tree with 20 tips:
stairs(rtree(20))
Questions? Problems? Suggestions? or email at ian@mutexlabs.com.
All documentation is copyright its authors; we didn't write any of that. | ESSENTIALAI-STEM |
Monster Magic
Monster Magic is an out-of-print collectible card game by Trio Toys. It was released in 1995. The first and only set was called Alpha Series and had 104 cards. The packaging for the game suggested that four more expansions may have been released, which would bring the total to 520 cards — however it is unlikely that they were ever released.
The game was reviewed by Scrye and gameplay was described as little more than a set of playing cards. Each card had a horror motif, with glossy cards using rock star puns for the card names, such as "Axel Rhodes" that depicted a skeleton with a microphone. | WIKI |
Spion Kop (mountain)
Spion Kop (, ; Spioenkop, ) is a mountain in the province of KwaZulu-Natal, South Africa. It is located near the town of Ladysmith, 27 km to the WSW and about 2.5 km to the north of the Spioenkop Dam, a reservoir for the waters of the Tugela River.
History
This mountain has historical significance. Its hilltop was the site of the Battle of Spion Kop (one of the most important battles of the Boer Wars) from 23 to 24 January 1900. near the Tugela River, Natal in South Africa
Spion Kop Nature Reserve is located beneath the southern side of this mountain. | WIKI |
Selecting The Right Structures for Indian Solar Projects | Mahindra Susten
knowledge arena
One stop for all the information you need
Selecting The Right Structures for Indian Solar Projects
Ms. Monika Rathi
Head Business Development
Mahindra Susten
Mr. Tejvinder Sondhi
Design Manager
Mahindra Susten
2018 has been a roller coaster ride for the Indian solar industry, where the ups included the increase of installed capacity to 25.21 GW as of 31 December 2018, while the downs included the higher GST rate and introduction of safeguard duty. While falling prices and generation of 101.83 billion units of renewable power in 2018 is definitely good news for the industry, it has also put tremendous pressure on the developers and EPC to optimize costs.
With the constant decrease in the tariff prices it becomes more important that the system design must be optimised vis a vis costs, generation, land utilisation and most importantly the asset quality. One of the prime drivers in the asset valuation of a solar power plant is the Module Mounting Structures (MMS) which is a key ingredient in the successful running of a solar power plant. While most of the BoS components such as inverter DC cables junction boxes transformers, etc. are readily bought from the equipment suppliers the workmanship and the expertise of an EPC contractor is reflected mainly through module mounting structures and its design.
The design of module mounting structure depends largely on site location, wind speed and soil type. As a PV plant is expected to last more than 25 years, it is important that the mounting structure remains intact until the lifetime of the project, and also sustains the natural phenomenon which are not prevalent but could happen during its lifetime including storms within design speed, and water logging as per site conditions. Let’s look at some of the salubrious principles which must be adhered to ensure that the plant runs smoothly and efficiently for its desired service life.
Wind Loading: Wind loading in India is governed by the provisions of the IS 875 Part III – 1987 revised in 2015. The main factors pertaining to an MMS are as follows.
A) Basic wind speed – The basic wind speed data is contained in the wind map of India which specifies the wind speed inn m/s for a 3s gust at a height of 10m from the ground level for 50 years return period. It is different for different regions based on the Latitude and Longitude of the location.
• k1 - probability factor- While the basic wind speed accounts for 50 years return period, k1 factors out this basic speed into design life of 5, 25, 50 or 100 years. Generally, for an MMS k1 is considered for a 25 years life.
• k2 - terrain roughness and height factor is how closely spaced are the obstruction around the structure for which this factor is being calculated. Generally, MMS category lies in between category 2 & category 3.
• k3 - topography factor considers the general level of site above sea level
• k4 - importance factor for the cyclonic region is applicable only if the site is situated within a fetch distance of 60kms from the nearest coast.
• Kd – Is 875 P III-2015 allows for consideration on directionality factors which is considered as 0.9 since generally the MMS is made up of lattice structures.
Other coefficients that depend on the tilt of the module is calculated from Table 8 of IS. While the latest version of IS 875 allows for a reduction in the wind pressure up to 20 % it also demands that the coefficients considered in calculation of wind loads normal to the module plane considers the eccentricity effect also as suggested in the foot note to Table 8. Hence any reduction in wind pressure must be backed by considering the most critical effect on eccentricity.
For example, basic wind speed in Rajasthan is 47 m/s. For a design life of 25 years k1 = 0.9, k2=1, k3=1 & k4=1. This implies Vz=47x0.9 = 42.3 m/s. Pz = 1.073 kN/m2. With kd =0.9, ka=1 & kc =1, Pd= 0.966 kN/m2. However further 20 percent reduction would mean the design wind pressure (pd) = 0.772 kN/m2. So any optimisation in tonnage from 0.966 to 0.772 kN/ m2 is on account of applying a reduced wind pressure and not by way of any better design.
IS 875 also has laid down coefficients in table 29 which are to be used for force calculation on individual exposed width of the members of an MMS. Many a times these forces are not considered leading to under design of the structures. These forces are to be considered acting in combination with the pressure & suction forces normal to the surface of the module.
The coefficients mentioned in table 8 are calculated from wind tunnel tests, some designers insists on conducting site specific wind tunnel test to study the laminar flow of wind on closely spaced rows with variations resulting from row spacing and the collector width. More important wind tunnel test results are valid only if the ground slope is less than 3 degrees. For ground slopes more than 3 degrees the factor k3 must be increased suitably.
B) Structure design: Structure design for steel structures is governed by IS 800-2007 for HR members while IS 801-1975 for cold formed structures. In earlier days, structures were twopoled and were not strong enough to bear various loads, however, soon were the days, when industry moved toward single pole structure for topographic modularity, reduction of foundations and subsequent efforts, labour and energy associated with it. It is extremely important to consider the correct effective length of buckling in calculation of actual stresses in vertical post.
With markets flooding with high strength steel, and in the race to reduce the consumption of steel/MW many a times the designers are tempted to increase the permissible yield strength to arrive at a lower weight section. However, it is a well-known fact from the inherent nature of material steel, any increase in yield strength will invariably lower the ductility of the material. Ductility ensures the structure remains flexible under effect of cyclic loading under wind. Hence in considering use of high strength steel a proper account of the stress strain curve is a must to ensure that the material remains below its permissible yield strength.
C) Corrosion Protection: Mounting structure life is highly affected by corrosion and it is important that structure galvanization should be sufficient to protect it from corrosion. The typical structure galvanization thickness is kept of the order of 80 Microns HDG for Horizontal Rails and 550 GSM Pre-galvanized for Cold Form Rails. In case of purlin the structure can be cold formed steel with a lesser galvanization thickness of the order of 80 microns. As the solar penetration is increasing, more and more solar parks are coming in tougher terrains where water logging is expected. In such scenarios, the corrosion protection of the structure needs to be suitably increased to ensure life cycle of >25 years for the structure.
To summarize, a good structure design can significantly reduce structure weight per MW, however this should be done considering proper design criteria and safety margins. Moreover structure with an integrated wiring management system can be developed so that cables can run through perforated sections, which will help save the overall BoS cost. With over 3.2 GW of Solar projects, Mahindra Susten ensures provision of a structure that could last for the lifetime of a plant, a structure which does not sag due to thermal expansion and a structure whose resilient design and integrated wiring management depicts its strength and durability.
\ | ESSENTIALAI-STEM |
Gavran (surname)
Gavran is a Serbo-Croatian language surname from a nickname meaning "raven" in Serbo-Croatian. Notable people with the name include:
* Ivan Gavran (born 1980), Serbian footballer
* Luka Gavran (born 2000), Canadian soccer player
* Miro Gavran (born 1961), Croatian writer | WIKI |
Install symfony in ten seconds
The symfony sandbox is a ready-to-go version of symfony, that works instantly once unpacked into your web root folder. You can start to experiment with symfony in ten seconds, without any PEAR installation or web server configuration.
How is it possible?
The sandbox is an empty symfony project where all the required libraries (symfony, pake, creole, propel and phing) are already included, and where the basic configuration is already done. You can add modules to the default 'frontend' application, or create an application of your own. This symfony package has all the features of the standard version, and it is even shipped with the command line tool.
Who is it for?
The sandbox is made for symfony beginners, who never installed it before, and who want to play with it or try the tutorials by skipping the installation section.
It is compatible with Windows and *nix platforms, and needs only PHP5 and a web server to run.
If you already have a version of symfony installed, you probably won't want to use the sandbox, as it is not upgradeable. If you want to start a real symfony application, we advise you to use the PEAR version instead, which can be changed and upgraded independantly of your project.
Which version of symfony is it?
The current sandbox contains a 0.6 alpha version of the symfony framework. It means that it contains features that are not documented yet, and others for which the documentation is not up to date.
It also means that the stability of the application is not guaranteed, but it is definitely enough for you to experiment with symfony.
Where do I sign?
Now that trying symfony has never been easier, you can't miss it anymore. Download the sandbox (it's a simple .tgz archive), read the included readme file, and enjoy the ease of use of the symfony framework.
Help the Symfony project!
As with any Open-Source project, contributing code or documentation is the most common way to help, but we also have a wide range of sponsoring opportunities.
Comments
I unzipped it as instructed, but I get the message
[exception] sfConfigurationException [message] Module directory "/home/amathur/public_html/sf_sandbox/apps/frontend/modules" does not exist or is not readable [code] N/A [class] sfConfigCache [file] /home/amathur/public_html/sf_sandbox/lib/symfony/config/sfConfigCache.class.php [line] 282 [symfony] v. @[email protected] (symfony-project.com) [PHP] v. 5.1.1 [stack trace] at sfConfigCache::loadConfigHandlers() in [/home/amathur/public_html/sf_sandbox/lib/symfony/config/sfConfigCache.class.php:58] at sfConfigCache::callHandler() in [/home/amathur/public_html/sf_sandbox/lib/symfony/config/sfConfigCache.class.php:157] at checkConfig() in [/home/amathur/public_html/sf_sandbox/lib/symfony/symfony.php:49] at require_once() in [/home/amathur/public_html/sf_sandbox/apps/frontend/config/config.php:84] at require_once() in [/home/amathur/public_html/sf_sandbox/web/frontend_dev.php:8]
Do I need to install some modules ?
and the ./symphony.sh -T fails saying
: bad interpreter: No such file or directory
ashish: Thanks for asking your question in the forum. It will soon be deleted from this page.
I've just got the same error of ashish, and I solved it by just creating that missing folder. I've already had to load mod_rewrite, to set to "Off" magic_quotes_gpc and restart Apache. I'm sorry but I couldn't find this discussion in the forum, so I answrered here. Feel free to delete my post at any time. :-)
Greetings, Antinoo
thank you for your work
Great job guys...
Comments are closed.
To ensure that comments stay relevant, they are closed for old posts. | ESSENTIALAI-STEM |
Problem linking a foreign static library
• Hi, I'm working with Qt-4.6.3 and VTK on Windows (MinGW), Linux and Mac-OSX. My app is working on these platforms, but I am exploring static link possibilities to simplify deployment. I'm starting with the Windows-MinGW platform, and have built the VTK libraries statically. When I try to build my app with QtCreator I get a large number of "undefined reference" errors from the linker. Here is a sample:
./release\myvtk.o:myvtk.cpp:(.text+0x1c3): undefined reference to _imp___ZN11vtkRenderer11RemoveActorEP7vtkProp' ./release\myvtk.o:myvtk.cpp:(.text+0x238): undefined reference to_imp___ZN8vtkActor3NewEv'
./release\myvtk.o:myvtk.cpp:(.text+0x259): undefined reference to _imp___ZN8vtkActor11GetPropertyEv' ./release\myvtk.o:myvtk.cpp:(.text+0x292): undefined reference to_imp___ZN11vtkProperty8SetColorEddd'
./release\myvtk.o:myvtk.cpp:(.text+0x46a): undefined reference to _imp___ZN9vtkProp3D10RotateWXYZEdddd' ./release\myvtk.o:myvtk.cpp:(.text+0x47d): undefined reference to_imp___ZN11vtkRenderer8AddActorEP7vtkProp'
./release\myvtk.o:myvtk.cpp:(.text+0x64c): undefined reference to _imp___ZN8vtkActor3NewEv' ./release\myvtk.o:myvtk.cpp:(.text+0x66d): undefined reference to_imp___ZN8vtkActor11GetPropertyEv'
./release\myvtk.o:myvtk.cpp:(.text+0x6a6): undefined reference to _imp___ZN11vtkProperty8SetColorEddd' ./release\myvtk.o:myvtk.cpp:(.text+0x6b9): undefined reference to_imp___ZN11vtkRenderer8AddActorEP7vtkProp'
./release\myvtk.o:myvtk.cpp:(.text+0x799): undefined reference to `_imp___ZN11vtkRenderer11RemoveActorEP7vtkProp'
There are many more (about 75), presumably one for every call to a function in one of the VTK libraries I'm linking (-lvtkCommon -lvtkGraphics -lvtkFiltering -lvtkIO -lvtkImaging -lvtkRendering -lQVTK). Each symbol that isn't found corresponds to a symbol in one of the libraries. For example in libvtkrendering.a there is the symbol __ZN11vtkRenderer11RemoveActorEP7vtkProp.
It looks as if the compiler is being somehow instructed to add the "imp" prefix to all the VTK functions referenced in myvtk.cpp, i.e. all the functions associated with using a QVTKWidget with interactor capabilities, as if the libraries are shared . When I look in myvtk.o I see all those "imp" symbols. Unfortunately I understand only enough of this stuff to be dangerous. I have been in touch with someone who has managed to link static VTK libraries to a shared Qt build, but he uses cmake. There must be a way to tell qmake how to find the VTK functions, but I don't think it's within my unaided capabilities to figure it out - at least not in a reasonable amount of time.
Help appreciated!
Cheers
Gib
<edit> Note that each occurrence of "imp" has an underscore '_' before and after, but these do not show up online.
• Moderators
I think you are being set up by C++ name mangling: To enable overloading C++ needs to make types part of the name of a function. To do that it "mangles" the name in a certain way to form the names of the symbols in the object files.
If you are using a gcc-based compiler you can use c++filt to unmangle the name again.
Since c++filt from can not unmagle the names you got there my guess is that your libraries were build with MSVC which is not compatible with mingw.
• Hi Tobias,
The VTK libraries are built static with cmake and MinGW. The Qt app that tries to link the VTK libraries is built with QtCreator, using MinGW. In case you didn't notice the symbol names in the VTK libraries are exactly those that get compiled into the application object file myvtl.o, except that imp is prepended. Therefore I don't think it is an issue of name mangling. Instead, QtCreator (i.e. qmake/MinGW) thinks that it needs to access symbols in a shared library, and therefore it adds the imp to what would otherwise be the correct names. I need to know how to get qmake to tell g++ that the library functions are static.
I need to repeat that I used 'nm -g' to look at the symbols in the libraries and the object file. Without the imp prefix there will be no problem.
Cheers
Gib
• This has been resolved. There were two issues. First, I had an error in the include path that pointed to the wrong vtkConfigure.h, which had
#define VTK_BUILD_SHARED_LIBS in it (this needed to be commented out). This prevented the mangled symbol names from being translated into C++ function references. Second, I had failed to realize that in the case of static libraries, it is necessary to explicitly link all the supporting libraries as well (about 20 of them!). It's all working now.
Log in to reply
Looks like your connection to Qt Forum was lost, please wait while we try to reconnect. | ESSENTIALAI-STEM |
Page:Shivaji and His Times.djvu/80
60 could, and then quickly return to the defence of their respective posts. (Adab. 147b.)
A Maratha attempt to loot the city of Ahmadnagar was defeated;Multafat Khan, the qiladar of the fort, took effective steps to defend the city at its foot, and removed the property of the inhabitants for greater safety within the fort. (Adab. 148b.)
After Nasiri Khan's victory over Shiva in the Ahmadnagar district, he was ordered by Aurangzib to "pursue the Marathas and extirpate them," (end of May.) But this could not be done. The rains now set in with the full violence of the monsoons, and the campaign had to be closed. Shiva retreated to his own country and the Mughal officers fell back on their appointed stations, watching the frontier. "There was peace in the whole district." (Adab. 156a, 149a.)
June, July and August 1657 passed in enforced idleness for the imperial troops. In September the situation was complicated by the illness of Shah Jahan and the preparations for a War of Succession among his sons. Bijapur made peace with the Mughals. But throughout the month of September Aurangzib continued to urge his officers not to relax their vigilance, but hold the S. W. frontier in force, lest Shiva should renew his raids. About the middle of October he wrote to the governor of Ahmadnagar to take care of the city and keep his troops in readiness, lest when Nasiri Khan went back, Shiva | WIKI |
Page:Ruffhead - The Statutes at Large, 1763.djvu/243
A. D. 1328. Anno fecundo Edwardi III. C. 3,~4', i97 Ex Rot. in Turr. Lond. ^aoles procurez countre forme de leftatut fait en temps le Roi Edward Ael noftre Seignur le Roi qore eft en quele eft contenuz qe les Juftices as af- fifes prendre affignez fils foient lais facent ks deli- verances et ft lun foit clerc & lautre lais qe le dit lais aflbcie a lui un autre du pays facent la delive- rance des gaols par quei acorde eft & eftabli qe tiels Jufticeries ne foient mes grantees countre la forme du dit eftatut & qe les affiles atteintes & certifica- cions foient prifes devant les Juftices communement affignez qe foient bones gentz & loialx & coniffantz de la lei & nemie autres folonc la forme dun autre eftatut fait en temps meifme le Ael Et qe les oiers et terminers ne foient grantees forfque devant les Juftices de lun Baunk & de lautre ou les juftices errantz & ce pur led & orrible trefpas & de lefpe- ciale grace le Roi folonc forme de ftatut de ce or- dene en temps meifme le Ael & nemie autrement. 6R.2 amng Juftica cf Jljife 4, EJ. 3. c. 2. 20 Ed. 3. c. 3 & 6. iGu. 1. f. 4.5. 21 Ceo. 2. c. It. fell. I. cured by great Men againft the Form of the Statute made in the xxvii Tear of the Reign of King Ed- WARD, Grandfather to our Lord the King that now is, wherein is contained, that Juftices affigned to take Affifes, if they be Laymen, {hall make Delive- rance; and if the one be a Clerk, and the other a Layman, that the Lay -judge, with another of the Country aflbciate to him, {hall deliver the Gaols: (4.) Wherefore it is enacted, That fuch Juftices {hall Who ">=" *>«' not be made. againft the Form of the faid Statute ; > n, ^ s °{ £v . . . a^,- a ■ 1/-1 t * 1' and Oaol-deu- and that the Affiles, Attaints, and Certifications be vety _. taken before the Juftices commonly affigned, which i 3 Ed. j, flat, i.- {hould be good Men and lawful, having Knowledge c. 30. ' of the Law, and none other, after the Form of ano- ,2Bd '»' fl*'- 1 - ' ther Statute made in the Time of the faid King Ed- c ' 3 ' 4 ' ' ward the firft. (6) And that the Overs and Ter- To whomOjws ' miners {hall not be granted but before Juftices- of the ^ n al, b e J Tinted, ' one Bench or the other, or the Juftices Errants, and an( j f or v ° nat ' that for great Hurt, or horrible TrefpafTes, and of caufe. ' the Kind's fpecial Grace, after the Form of the Sta- Regift. 124,206.' ' tute thereof ordained in Time of the faid Grandfa- ^3 Ed. i.tot. 1. ' ther, and none otherwife.' %k fattier un- c 5. 8.R.2.<.- iiR.acul. 2oR.2.c.%. 14H.6.C.3. 33 II. 8. C. 2fr,fc3l, C A p; III. No Man fhall come before the Juftices or go or ride armed; ENfement acorde eft & eftabli qe nul grant ne petit de quele condition qil foit fauve les Ser- I jantz le Roi en la prefence le Roi & les Miniftres le ; Roi enfefantz execution des mandementz leRoi ou j de lour office & ceux qi font en lour compaignies eidantz as ditz miniftres & auxint autri de fait darmes de pees & ce en lieux ou tielx faitz fe fer- ront foit fi hardi de venir devant les Juftices le Roi ou autres Miniftres le Roi enfefant lour office a force & armes ne force mefner en affrai de la pees ne de chivaucher ne daler arme ne de nuit ne de jour en faires marchees nerf prefence des Juftices ne dautres Miniftres ne nule part aillours fur peins de perdre lour armures au Roi & de lour corps a la prifone a la volunte le Roi. Et qe Juftices le Roi en lour prefences vifcountes & autres Miniftres le Roi en lour baillies feignours des fraunchifes et lour baillifs en yceles et Meire et Baillifs des Citees et Burgs deinzmeifmes les Citees et Burghs Btirghal- dres coneftables et gardeins de la pees deinz lour gardes eient poair affaire execution de ceft acorde. Et qe les Juftices affignez a lour venu en pais eient poair denquere coment tielx Miniftres et feignurs ont ufe lour office en ce et de punir ceux qils trove- ront qi nount mie fait ce qe a lour office appent. T EM it is enacted, That no Man great nor {mall, 3 V*- &<& of what Condition foever he be, except the King's ^??' d 71 ' „- Servants in his Prefence, and his Minifters in exe- 3 cuting of the King's Precepts, or of their Office, and fuch as be in their Company affifting them, and alfo the fame in fuch Places where fuch Acts happen, be of Arms of fo hardy to come before the King's Juftice?, or other Pea - ce ' of the King's Minifters doing their Office with Force and Arms, (2) nor bring no Force in affray of the Peace, (3) nor to go nor ride armed by Night nor by Day, in Fairs, Markets, nor in the Prefence of the Juftices or other Minifters, nor in no Part elfe- where, upon Pain to forfeit their Armour to the King, • and their Bodies to Prilbn at the King's Pleafure. (4) And that the King's Juftices in their Prefence, She-' riffs, and other Minifters in their Bailiwicks, Lords of Franchifes, and their Bailiffs in the fame, and - Mayors and Bailiffs of Cities and Boroughs, within the fame Cities and Boroughs, and Borough-holders, Conftables, and Wardens of the Peace v/ithin their Wards, {hall have Power to execute this Act. (5) ' And that the Juftices affigned, at their coming down into the Country, {hall have Power to enquire how CAP. IV. A Confirmation of the Statute of Lincoln, concerning the Sufficiency of Sheriffs, &c. ET pur ce qe la pees ne poet mie eftre bien garde fauntz bons miniftres come vifcountes baillifs & hvndreders qi deivent faire execution 1 auxibien des privetez le Roi come dautres chofes tochantes le Roi & -fon poeple acorde eft & eftabli qe leftatut fait en temps le Roi Edward piere le " TTEM, Becaufe the Peace cannot be well kept " 1 without good Minifters, as Sheriffs, Bailiffs, and " Hundreders, which ought to do Execution as well' of "' the King's Privities as of other Things touching our " Lord the King and his People;" '* (2J it is ordained ' and eftabliflied;, That the Statute made in the Time ' of
* upon a Cry made for Arms to keep the Peace, and «Thofeof Featj
* fuch Officers and Lords have exercifed their Offices
* 'in this Cafe, and to punifh them whom they find 7 F.d. 1. flat. 1.
* that have not done that which pertained to their Of- ^forced by 7 R.
* lice.' 2.C.13. zoR. | WIKI |
Peloton hit with $150 million music licensing suit – TechCrunch
Streaming video is the key to Peloton’s success. But like any good spin class, it’s the soundtrack that really does the heavy lifting. A new suit filed by The National Music Publishers’ Association alleges that the wildly successful exercise startup used north of 1,000 songs in its classes without the proper licensing. The suit features a laundry list of publishers: Downtown Music Publishing, Big Deal Music, Reservoir, Round Hill, Royalty Network, Pulse Music Publishing and TRO Essex Music Group. While the list of musicians is a who’s who of Top 40 musicians: Rihanna, Bruno Mars, Lady Gaga, Katy Perry, Justin Timberlake, Shawn Mendes, Ed Sheeran, Wiz Khalifa, Thomas Rhett, Ariana Grande, Justin Bieber, Florida Georgia Line, Drake and Gwen Stefani, for starters. The plaintiffs are seeking more than $150 million in damages over the improper use of songs. “Unfortunately, instead of recognizing the integral role of songwriters to its company, Peloton has built its business by using their work without their permission or fair compensation for years,” NMPA president and CEO David Israelite said in a statement. “It is frankly unimaginable that a company of this size and sophistication would think it could exploit music in this way without the proper licenses for this long, and we look forward to getting music creators what they deserve.” The association is quick to note that Peloton managed to pull in a $4 billion valuation last year, not a great look if the claims turn out to be accurate. Update: Peloton offered TechCrunch the following comment, “We just received the complaint yesterday, and we are evaluating it. Peloton has great respect for songwriters and artists. In fact, we have partnered with each of the major music publishers, record labels and performing rights organizations, and many leading independents. We have also invested heavily to build a best-in-breed reporting and licensing system to support our partners and provide our members with a world-class fitness experience.” | NEWS-MULTISOURCE |
# Stackobj.pm # # Copyright (c) 1996 Malcolm Beattie # Copyright (c) 2010 Reini Urban # Copyright (c) 2012 cPanel Inc # # You may distribute under the terms of either the GNU General Public # License or the Artistic License, as specified in the README file. # package B::Stackobj; our $VERSION = '1.10'; use Exporter (); @ISA = qw(Exporter); @EXPORT_OK = qw(set_callback T_UNKNOWN T_DOUBLE T_INT VALID_UNSIGNED VALID_INT VALID_DOUBLE VALID_SV REGISTER TEMPORARY); %EXPORT_TAGS = ( types => [qw(T_UNKNOWN T_DOUBLE T_INT)], flags => [ qw(VALID_INT VALID_DOUBLE VALID_SV VALID_UNSIGNED REGISTER TEMPORARY) ] ); use Carp qw(confess); use strict; use B qw(class SVf_IOK SVf_NOK SVf_IVisUV SVf_ROK); use B::C qw(ivx nvx); use Config; # Types sub T_UNKNOWN () { 0 } sub T_DOUBLE () { 1 } sub T_INT () { 2 } sub T_SPECIAL () { 3 } # Flags sub VALID_INT () { 0x01 } sub VALID_UNSIGNED () { 0x02 } sub VALID_DOUBLE () { 0x04 } sub VALID_SV () { 0x08 } sub REGISTER () { 0x10 } # no implicit write-back when calling subs sub TEMPORARY () { 0x20 } # no implicit write-back needed at all sub SAVE_INT () { 0x40 } # if int part needs to be saved at all sub SAVE_DOUBLE () { 0x80 } # if double part needs to be saved at all # # Callback for runtime code generation # my $runtime_callback = sub { confess "set_callback not yet called" }; sub set_callback (&) { $runtime_callback = shift } sub runtime { &$runtime_callback(@_) } # # Methods # sub write_back { confess "stack object does not implement write_back" } sub invalidate { shift->{flags} &= ~( VALID_INT | VALID_UNSIGNED | VALID_DOUBLE ); } sub invalidate_int { shift->{flags} &= ~( VALID_INT | VALID_UNSIGNED ); } sub invalidate_double { shift->{flags} &= ~( VALID_DOUBLE ); } sub as_sv { my $obj = shift; if ( !( $obj->{flags} & VALID_SV ) ) { $obj->write_back; $obj->{flags} |= VALID_SV; } return $obj->{sv}; } sub as_int { my $obj = shift; if ( !( $obj->{flags} & VALID_INT ) ) { $obj->load_int; $obj->{flags} |= VALID_INT | SAVE_INT; } return $obj->{iv}; } sub as_double { my $obj = shift; if ( !( $obj->{flags} & VALID_DOUBLE ) ) { $obj->load_double; $obj->{flags} |= VALID_DOUBLE | SAVE_DOUBLE; } return $obj->{nv}; } sub as_numeric { my $obj = shift; return $obj->{type} == T_INT ? $obj->as_int : $obj->as_double; } sub as_bool { my $obj = shift; if ( $obj->{flags} & VALID_INT ) { return $obj->{iv}; } if ( $obj->{flags} & VALID_DOUBLE ) { return $obj->{nv}; } return sprintf( "(SvTRUE(%s))", $obj->as_sv ); } # # Debugging methods # sub peek { my $obj = shift; my $type = $obj->{type}; my $flags = $obj->{flags}; my @flags; if ( $type == T_UNKNOWN ) { $type = "T_UNKNOWN"; } elsif ( $type == T_INT ) { $type = "T_INT"; } elsif ( $type == T_DOUBLE ) { $type = "T_DOUBLE"; } else { $type = "(illegal type $type)"; } push( @flags, "VALID_INT" ) if $flags & VALID_INT; push( @flags, "VALID_DOUBLE" ) if $flags & VALID_DOUBLE; push( @flags, "VALID_SV" ) if $flags & VALID_SV; push( @flags, "REGISTER" ) if $flags & REGISTER; push( @flags, "TEMPORARY" ) if $flags & TEMPORARY; @flags = ("none") unless @flags; return sprintf( "%s type=$type flags=%s sv=$obj->{sv} iv=$obj->{iv} nv=$obj->{nv}", class($obj), join( "|", @flags ) ); } sub minipeek { my $obj = shift; my $type = $obj->{type}; my $flags = $obj->{flags}; if ( $type == T_INT || $flags & VALID_INT ) { return $obj->{iv}; } elsif ( $type == T_DOUBLE || $flags & VALID_DOUBLE ) { return $obj->{nv}; } else { return $obj->{sv}; } } # # Caller needs to ensure that set_int, set_double, # set_numeric and set_sv are only invoked on legal lvalues. # sub set_int { my ( $obj, $expr, $unsigned ) = @_; my $sval = B::C::ivx($expr); # bullshit detector for non numeric expr, expr 'lnv0 + rnv0' $sval = $expr if $sval eq '0' and $expr; runtime("$obj->{iv} = $sval;"); $obj->{flags} &= ~( VALID_SV | VALID_DOUBLE ); $obj->{flags} |= VALID_INT | SAVE_INT; $obj->{flags} |= VALID_UNSIGNED if $unsigned; } sub set_double { my ( $obj, $expr ) = @_; my $sval; if ($expr =~ /[ a-dfzA-DF-Z]/) { # looks not like number $sval = $expr; } else { $sval = B::C::nvx($expr); # non numeric expr, expr 'lnv0 + rnv0' $sval = $expr if $sval eq '0.00' and $expr; } runtime("$obj->{nv} = $sval;"); $obj->{flags} &= ~( VALID_SV | VALID_INT ); $obj->{flags} |= VALID_DOUBLE | SAVE_DOUBLE; } sub set_numeric { my ( $obj, $expr ) = @_; if ( $obj->{type} == T_INT ) { $obj->set_int($expr); } else { $obj->set_double($expr); } } sub set_sv { my ( $obj, $expr ) = @_; runtime("SvSetSV($obj->{sv}, $expr);"); $obj->invalidate; $obj->{flags} |= VALID_SV; } # # Stackobj::Padsv # @B::Stackobj::Padsv::ISA = 'B::Stackobj'; sub B::Stackobj::Padsv::new { my ( $class, $type, $extra_flags, $ix, $iname, $dname ) = @_; $extra_flags |= SAVE_INT if $extra_flags & VALID_INT; $extra_flags |= SAVE_DOUBLE if $extra_flags & VALID_DOUBLE; bless { type => $type, flags => VALID_SV | $extra_flags, sv => "PL_curpad[$ix]", iv => "$iname", nv => "$dname" }, $class; } sub B::Stackobj::Padsv::load_int { my $obj = shift; if ( $obj->{flags} & VALID_DOUBLE ) { runtime("$obj->{iv} = $obj->{nv};"); } else { runtime("$obj->{iv} = SvIV($obj->{sv});"); } $obj->{flags} |= VALID_INT | SAVE_INT; } sub B::Stackobj::Padsv::load_double { my $obj = shift; $obj->write_back; runtime("$obj->{nv} = SvNV($obj->{sv});"); $obj->{flags} |= VALID_DOUBLE | SAVE_DOUBLE; } sub B::Stackobj::Padsv::save_int { my $obj = shift; return $obj->{flags} & SAVE_INT; } sub B::Stackobj::Padsv::save_double { my $obj = shift; return $obj->{flags} & SAVE_DOUBLE; } sub B::Stackobj::Padsv::write_back { my $obj = shift; my $flags = $obj->{flags}; return if $flags & VALID_SV; if ( $flags & VALID_INT ) { if ( $flags & VALID_UNSIGNED ) { runtime("sv_setuv($obj->{sv}, $obj->{iv});"); } else { runtime("sv_setiv($obj->{sv}, $obj->{iv});"); } } elsif ( $flags & VALID_DOUBLE ) { runtime("sv_setnv($obj->{sv}, $obj->{nv});"); } else { confess "write_back failed for lexical @{[$obj->peek]}\n"; } $obj->{flags} |= VALID_SV; } # # Stackobj::Const # @B::Stackobj::Const::ISA = 'B::Stackobj'; sub B::Stackobj::Const::new { my ( $class, $sv ) = @_; my $obj = bless { flags => 0, sv => $sv # holds the SV object until write_back happens }, $class; if ( ref($sv) eq "B::SPECIAL" ) { $obj->{type} = T_SPECIAL; } else { my $svflags = $sv->FLAGS; if ( $svflags & SVf_IOK ) { $obj->{flags} = VALID_INT | VALID_DOUBLE; $obj->{type} = T_INT; if ( $svflags & SVf_IVisUV ) { $obj->{flags} |= VALID_UNSIGNED; $obj->{nv} = $obj->{iv} = $sv->UVX; } else { $obj->{nv} = $obj->{iv} = $sv->IV; } } elsif ( $svflags & SVf_NOK ) { $obj->{flags} = VALID_INT | VALID_DOUBLE; $obj->{type} = T_DOUBLE; $obj->{iv} = $obj->{nv} = $sv->NV; } else { $obj->{type} = T_UNKNOWN; } } return $obj; } sub B::Stackobj::Const::write_back { my $obj = shift; return if $obj->{flags} & VALID_SV; # Save the SV object and replace $obj->{sv} by its C source code name $obj->{sv} = $obj->{sv}->save; $obj->{flags} |= VALID_SV | VALID_INT | VALID_DOUBLE; } sub B::Stackobj::Const::load_int { my $obj = shift; if ( ref( $obj->{sv} ) eq "B::RV" or ($] >= 5.011 and $obj->{sv}->FLAGS & SVf_ROK)) { $obj->{iv} = int( $obj->{sv}->RV->PV ); } else { $obj->{iv} = int( $obj->{sv}->PV ); } $obj->{flags} |= VALID_INT; } sub B::Stackobj::Const::load_double { my $obj = shift; if ( ref( $obj->{sv} ) eq "B::RV" ) { $obj->{nv} = $obj->{sv}->RV->PV + 0.0; } else { $obj->{nv} = $obj->{sv}->PV + 0.0; } $obj->{flags} |= VALID_DOUBLE; } sub B::Stackobj::Const::invalidate { } # # Stackobj::Bool # @B::Stackobj::Bool::ISA = 'B::Stackobj'; sub B::Stackobj::Bool::new { my ( $class, $preg ) = @_; my $obj = bless { type => T_INT, flags => VALID_INT | VALID_DOUBLE, iv => $$preg, nv => $$preg, preg => $preg # this holds our ref to the pseudo-reg }, $class; return $obj; } sub B::Stackobj::Bool::write_back { my $obj = shift; return if $obj->{flags} & VALID_SV; $obj->{sv} = "($obj->{iv} ? &PL_sv_yes : &PL_sv_no)"; $obj->{flags} |= VALID_SV; } # XXX Might want to handle as_double/set_double/load_double? sub B::Stackobj::Bool::invalidate { } 1; __END__ =head1 NAME B::Stackobj - Stack and type annotation helper module for the CC backend =head1 SYNOPSIS use B::Stackobj; =head1 DESCRIPTION A simple representation of pp stacks and lexical pads for the B::CC compiler. All locals and function arguments get type annotated, for all B::CC ops which can be optimized. For lexical pads (i.e. my or better our variables) we currently can force the type of variables according to a magic naming scheme in L. my $_i; IV integer my $_ir; IV integer in a pseudo register my $_d; NV double Future ideas are B as attributes B, B, B, B, B, B such as in our int $i : unsigned : ro; our double $d; Type attributes for sub definitions are not spec'ed yet. L attributes and objects should also be recognized, such as C and C. B: Note that only B attributes are resolved at B, B attributes are resolved at B. So the compiler will only see type attributes for our variables. See L and L. TODO: To represent on this stack not only PADs,SV,IV,PV,NV,BOOL,Special and a SV const, but also GV,CV,RV,AV,HV use B::Stackobj::Const. =head1 AUTHOR Malcolm Beattie C I<(retired)> =cut # Local Variables: # mode: cperl # cperl-indent-level: 2 # fill-column: 78 # End: # vim: expandtab shiftwidth=2: | ESSENTIALAI-STEM |
One Airlines
One Airlines was a Chilean airline that provided air transportation for passengers and regular charters for mining, since October 2013. Initially they used a fleet of two Boeing 737-400s, operated by Xtra Airlines. It was in a semi-operational state, flying for mining operations in northern Chile, operating with a single 737-300 leased from GECAS. It had its headquarters established in the Arturo Merino Benítez International Airport in Santiago de Chile. On June 24, 2020, the airline ceased all operations.
History
Founded in July 2013 One Airlines is a Chilean airline providing air transportation services and charter passenger Sinami since 2013. The operations center is located in the Arturo Merino Benítez International Airport in Santiago de Chile.
The airline announced on June 24, 2020, that it has ceased operations due to the hard financial situation caused by the COVID-19 crisis. The owner and Chairman, Claudio Fischer Llop, blamed the competition from SKY, JetSMART, and LATAM, which are offering charters at prices that ONE cannot compete with, and the lack of financial support from the Chilean government, making ONE’s operation non-viable during the present and near future.
Current Fleet
The One Airlines fleet consists of the following aircraft (as of August 2019):
Former fleet
The airline previously operated the following aircraft:
* 2 Boeing 737-400 | WIKI |
%A María Paula López-Fernóndez, and Sara Maldonado %T Programmed cell death in seeds of angiosperms %0 Journal Article %D 2015 %J J Integr Plant Biol %R 10.1111/jipb.12367 %P 996-1002 %V 57 %N 12 %U {https://www.jipb.net/CN/abstract/article_27669.shtml} %8 2015-12-01 %X
During the diversification of angiosperms, seeds have evolved structural, chemical, molecular and physiologically developing changes that specially affect the nucellus and endosperm. All through seed evolution, programmed cell death (PCD) has played a fundamental role. However, examples of PCD during seed development are limited. The present review examines PCD in integuments, nucellus, suspensor and endosperm in those representative examples of seeds studied to date.
López-Fernández MP, Maldonado S (2015) Programmed cell death in seeds of angiosperms. J Integr Plant Biol 57: 996–1002 doi: 10.1111/jipb.12367
| ESSENTIALAI-STEM |
Revolutionary medicine: to crowdsourcing and beyond
5 minute read
How will health care change with the development of technology? Collective intelligence and blockchain open new doors to high-quality treatment, advanced research, and accurate diagnosis, leaving mistakes in history. Future developments aid both patients and doctors, and the aim is to be able to provide equal, high-quality healthcare to all people. What will the new problems look like?
AI and social intelligence
for accurate diagnosis
Medical errors cause 251,000 deaths every year in the US solely. Misdiagnosis takes place in 8-12% of hospitalizations in Europe and is becoming one of the top causes of death worldwide. Various reasons like fatigue, the lack of education, and overcrowded hospital spaces make giving accurate diagnosis difficult. In South Africa, 25% of patients are misdiagnosed and wrongly triaged. In response to this issue, doctor Mohammad Dalwai founded The Open Medicine Project South Africa (TOMPSA). Its Mobile Triage App assists nurses to prioritize injuries and perform a triage in the right way. Whereas to enhance the accuracy of diagnosis, TOMPSA has recently introduced HIV Clinical Guide App and GeneXpert Support App to treat HIV and tuberculosis on time. These illnesses have 60% of confection-rate posing a significant threat to the region, and addressing them becomes one of the top priorities for national health.
Additionally, the complexity of certain diseases like fibromyalgia, multiple sclerosis, and lupus makes them hard to diagnose. This difficulty becomes another threat to global healthcare along with self-diagnosis. In 2013, 59% of adults in the US used their gadgets to check for medical information, and 38% decided that there is no need to consult professionals after their Internet search. The consequences of self-diagnosis are diverse from insignificant errors to severe health complications. The lack of time or access to healthcare perceives self-diagnosis as a well-weighted solution. CrowdMed redefines its nature. This platform enables high-quality assistance at hand without leaving home. Simply filling out the questionnaire uploads a unique case to the website and gives a possibility to unveil the mystery of an unknown condition. Taking advantage of the collective intelligence of talented experts makes diagnoses accurate and brings consultation to a next level. Multidisciplinary doctors available online helped CrowdMed gain its recognition in the healthcare segment. Since 2013, CrowdMed resolved hundreds of cases while making healthcare available to everyone.
Open-source and digitalization are the driving forces of the healthcare industry – CrowdMed and TOMPSA are the examples of their application. Embracing the beauty of data and its access upsurges people’s awareness about their conditions and decreases medical errors and interest in self-diagnosis. Taking advantage of apps and indicative tools is a new prevention strategy. With digitalization of healthcare, reduction of misdiagnosis cases is highly reachable. Whereas adopting digital solutions internationally is a pathway to superior and safe assistance with high access rates globally.
Using people capital
for scientific research
Since 2050, drug-resistant infectious diseases are forecasted to kill 10 million people annually. United Nations Environment Assembly sees a spread of antibiotic-resistant bacteria as one of the major eco-threats. Involving more people in the research becomes critical. With crowdsourcing on the rise, it is now possible to explore this problem in more detail. For example, a crowd-sourced study among surfers revealed that people fond of this sport and other water activities were more exposed to antibiotic-resistant bacteria – E.coli. Its presence in one’s gut might lead to the development of dangerous medical conditions like meningitis and urinary infections. The effectiveness of crowdsourced projects led to their spread worldwide – Murphy Lab at UIC started attracting locals to their researches to discover new antibiotics. There are many reputable institutions focusing on crowd-sourcing across the UK and US. Joe Shelby, executive director of Patient-Centered Outcomes Research Institute, sees the bright future behind crowd-sourcing. “Engaging patients and other healthcare decision-makers in identifying research needs and guiding studies is a hallmark of our patient-centered approach to research, and crowd-sourcing offers great potential to catalyze such engagement”, Shelby claims. Involving people capital becomes a new major trend defining the future of research, helping the society reach global health goals. The data-driven reality unveils a curtain to the digital healthcare world.
Augmented healthcare future
The Internet of Things and AI give a kickoff to digitalization and require medical professionals to reconsider innovations in this sphere. While healthcare plans become crucial parts of the infrastructure of smart cities, and to be embedded into the urban environment. Smart open-source healthcare is on the rise with cloud, big data, AI, and robots as groundbreaking forces. These tech-based innovations are projected to improve detection of illnesses, focus on decision-making based on evidence-based practice, and treatment on time. Australia and the USA have already started active investments in these initiatives. For example, the OpenMRS community sees the future behind Health IT. Currently, this project works on the creation of an international and highly flexible healthcare platform to ensure rapid and equal delivery of healthcare assistance to different parts of the world.
In the USA, electronic health record (EHR) is the major instrument to store and share patients’ data. Now, more than 50 open-source EHRs are obtainable for active usage in the medical sphere. Blockchain technology could systematize patients’ data and store it logically in one space – any change in healthcare records will be approved, united with previous data and adjoined as another block. As a result, doctors will have a full image of patients’ conditions – more precise diagnosis will be the major consequence in this case. Thus, the future of healthcare is unpredictable with a lot of buzz around it – the sci-fi scenes projected soon to be a reality. High volumes and access to patients’ information make healthcare and medicine data-driven and society-oriented. But, simultaneously, this raises the questions: “Will blockchain and EHR violate privacy and enable leakage of personal information? How to find a right balance?”
Insight Box
The future of healthcare is amplified. Openness and data are the new definers of open-source medicine with less diagnostic errors, higher quality and speed of medical assistance. Crowd-sourcing and blockchain optimize health records and make this information highly accessible. Governments, policy-makers, and healthcare-enthusiasts have to change their attitudes towards innovation in the healthcare segment and adopt arising know-hows to make it prosper. Thus, ensuring safety and privacy of EHR remains a challenge - leakage of personal data and violation of privacy might occur as a consequence.
#blockchain #diagnosis #future trends #HealthCare #medicine #open source
FocusingFuture at LinkedIn Follow FocusingFuture at Twitter Follow us | Order RSS feed of FocusingFuture new articles in any category Order RSS
About the category
World has turned into data-driven society. Nowadays humanity produces twice as much data as through all the time till 2007. Big Data is a statistical instrument with potential to improve world’s operations, increase its speed, make more intelligent decisions, and, consequently, forecast the future.It is essential to know how to operate and use the data we produce.
Punda investigates how Big Data influences on our daily life and business environment, which obstacles does it bring and ways to overtake them.
Data Driven Society /
AR and AI capturing advertising
This article dives in the future of effective marketing strategy and current trends.
Read more…
ME = Consumer /
Going back to the roots
Finding one’s identity through genealogy, heritage tourism and traditional cuisine.
Read more…
Business Solutions /
Pine branching into new industries
New technologies are constantly being invented that enable the use of pine as raw material for plastics, textiles and fuel. What are the newest innovations derived from pine wood?
Read more…
“Environmental issues is not an interest, but an obligation.” Sir David Attenborough.
Read more… | ESSENTIALAI-STEM |
194 Held in Bangladesh Mass Arrests May Have Militant Ties, Police Say
DHAKA, Bangladesh — The Bangladeshi police on Friday ended a week of mass arrests in response to the three-year campaign of killings by Islamist militants, saying that among the more than 11,000 people detained in the sweeps, 194 were believed to be linked to militant networks. The arrests came under sharp criticism from human rights activists and opposition leaders in Bangladesh, who said the authorities hoped mainly to show the public they were taking vigorous action to stop the killing. The police, they said, often round up men without providing evidence of wrongdoing or due process. A Bangladeshi Nationalist Party leader said more than 2,700 people were detained because they were critics of the government. “The government is responsible for identifying the real militants and arresting them,” said Ruhul Kabir Rizvi, the party’s senior joint secretary general. “Now, they are arresting a large number of B.N.P. leaders, activists and supporters to hide their failure.” The sweeps reflect pressure on the Bangladeshi authorities to respond to the broad-daylight killings of bloggers, academics and other secularist voices. The police say that 151 of the 194 they arrested and consider militants are associated with a single group, Jama’atul Mujahedeen Bangladesh. All of them figure on a police list of 800 important suspected militants, and 20 are considered “very significant arrests,” said Monirul Islam, director of counterterrorism for the Dhaka Metropolitan Police. When the attacks began occurring regularly in 2013, little-known figures were singled out. But recently the killers have edged closer to the governing elites. The sweeps have received heavy television coverage here. One photograph released by the police showed a village where officers had distributed bamboo truncheons to local men, to use if they spotted militants. Despite the roundup, a new attack took place on Wednesday, when three men with machetes attacked a Hindu math instructor. His neighbors heard his screams and intervened, saving his life and catching one attacker, said Uttam Kumar Paul, superintendent of the police in Madaripur, a district in central Bangladesh. The police say they have made some breakthroughs. On Thursday, Mr. Islam announced the arrest of Sumon Hossain Patwari, 20, accused of cutting the throat of a publisher, Ahmedur Rashid Tutul, last October. He survived. Human Rights Watch, an advocacy group based in New York, said the sweeps sought to compensate for what had been a “slow and complacent response to these horrific attacks.” Brad Adams, the group’s Asia director, said demonstrative arrests often left thousands of innocent people coping with criminal cases. “In the best-case scenario, they are taking all these people and trying to put them through a sifter,” he said. | NEWS-MULTISOURCE |
package Catalyst::Plugin::ErrorCatcher::Plugin::CleanUp::CaughtException; { $Catalyst::Plugin::ErrorCatcher::Plugin::CleanUp::CaughtException::VERSION = '0.0.8.13'; } { $Catalyst::Plugin::ErrorCatcher::Plugin::CleanUp::CaughtException::DIST = 'Catalyst-Plugin-ErrorCatcher'; } use strict; use warnings; sub tidy_message { my $plugin = shift; my $errstr_ref = shift; ${$errstr_ref} =~ s{ Caught\s+exception\s+in\s+ \S+\s+ " (.+?) \s+at\s+ \S+ \s+ line \s+ .* " $ }{$1}xmsg; $errstr_ref; } 1; # ABSTRACT: cleanup caught exception messages from Pg __END__ =pod =head1 NAME Catalyst::Plugin::ErrorCatcher::Plugin::CleanUp::CaughtException - cleanup caught exception messages from Pg =head1 VERSION version 0.0.8.13 =head1 AUTHOR Chisel =head1 COPYRIGHT AND LICENSE This software is copyright (c) 2011 by Chisel Wright. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. =cut | ESSENTIALAI-STEM |
KLE Society's Raja Lakhamagouda Science Institute
The Raja Lakhamagouda Science Institute is an autonomous education institution run by Karnatak Lingayat Education Society in Belagavi city. It was established in 1935 and was named after the head of the former princely state Vantamuri, Raja Lakhamagouda Saradesai in 1941 who had donated ₹20,000 to the institute. Initially, the institute was a part of Lingaraj Arts college, Belagavi. It started as a science wing in Lingaraj Arts college, and was separated in 1958. In 1944, the noble laureate Sir C. V. Raman inaugurated the degree course in science in the institute. | WIKI |
Lab Report Essay Example - Essay Example
Define chemical element
Copper is a chemical element naturally reddish-brown. Apart from being a good conductor or electricity, the element is found in group two of the periodic table. It is found as a mineral of many mineral forms such as cuprite, bornite, azurite, and chalcocite. Copper also occurs in plants and animals. The commercial production of copper occurs through smelting as it is extracted from its natural ores. The element is highly reactive to oxidizing acids such as nitric acid as we shall see later in the experiment. Some properties of copper include having an atomic number of 29, valence of 1 and 2, and atomic weight of 63.546.
We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU
For Only $13.90/page
order now
Purpose
The purpose the experiment is to observe various properties of copper and how it reacts with various components.
1. It aims at cycling solid copper through a series of chemical forms via phase reactions
2. Learn about different types of solvent reactions
3. Calculate percentage concentration of copper.
Experiment 1
Procedure
The first experiment involved the reaction of copper and concentrated nitric acid. 0.5g of copper was weighed and placed in a 250ml beaker. 5.0ml of concentrated nitric acid was then added. The nitric acid was poured until it covered the copper metals. The copper was allowed to dissolve.
Observation
The colorless conc. Nitric acid is poured on the brown copper metals. A reddish brown gas is produced.
4HNO3(l) + Cu(s) =Cu(NO3)2(aq) + 2NO2(g) + 2H2O(l)
Discussion
The Colorless liquid is the concentrated nitric acid. The gas produced is the Nitrogen (IV) Oxide. The solution formed is copper (II) nitrate. The rationale behind the reaction is that concentrated nitric acid is a strong oxidizing agent. The experiment demonstrated the oxidization of Cu (s) to Cu+2 (aq).
Experiment 2
Procedure
The next procedure was to add 20ml 6M NaOH onto the sample from experiment 1 above.
Observation
There is the production of a light blue precipitate
Equation
CU(NO3)2(aq) + 2NaOH(aq) = Cu(OH)2(s) + 2NaNO3(aq)
Discussion
The light blue precipitate is the copper (II) hydroxide. The compound does not dissolve in water, for that reason, it forms a precipitate.
Experiment 3
Procedure involved putting the content f experiment 3 above in a hot water bath.
Observation
The blue precipitate changes to black
Equation
Cu(OH)2(s) + heat= CuO
Discussion
When Copper II Oxide is heated, it produces Copper II Oxide and water.
Experiment 4
Procedure
Dilute sulphuric acid is added to copper II oxide.
Observation
A blue solution is formed
CUO(s) + H2SO4(aq)= CUSO4(aq) + H20(l)
Discussion
The solution formed is called Copper II Sulphate. The reaction is neutralization reaction and involves a base and an acid. | ESSENTIALAI-STEM |
Unicaja
Unicaja is a Spanish savings bank based in Málaga and chartered as a caja de ahorros providing retail banking services. The banks full name is Monte de Piedad y Caja de Ahorros de Ronda, Cádiz, Almería, Málaga y Antequera after the names of all the merged entities and the mount of piety structure.
It is similar to what would be called a savings and loan association in the United States or a building society or trustee savings bank in the UK and Ireland. It operates primarily in the south of Spain.
Unicaja has been designated as a Significant Institution since the entry into force of European Banking Supervision in late 2014, and as a consequence is directly supervised by the European Central Bank.
History
Unicaja was founded 18 March 1991 with the merger of five similar institutions, each of which contributed its location to the corporate name of the merged entity:
* Monte de Piedad y Caja de Ahorros de Ronda (founded 1909)
* Caja de Ahorros y Monte de Piedad de Cádiz (founded 1884)
* Monte de Piedad y Caja de Ahorros de Almería (founded 1900)
* Caja de Ahorros Provincial de Málaga (founded 1949)
* Caja de Ahorros y Préstamos de Antequera (founded 1904)
On 30 December 2020 it was announced Unicaja is buying Liberbank. The new merged company will be the fifth largest of Spain.
Sponsorships
The company sponsors several major sports clubs in its region. It is the owner of the basketball club Baloncesto Málaga, the sponsor of the volleyball club CV Almería, and is also a major sponsor, though not name sponsor, of Málaga CF. | WIKI |
Special counsel team met with Trump lawyers on day of Cohen raid
(CNN)Special counsel Robert Mueller's investigators met with members of President Donald Trump's legal team on the same day that the FBI was launching a raid targeting the President's personal attorney, according to sources familiar with the matter. The timing of the Monday raid made for an awkward meeting, which had been previously scheduled as part of preparations for a possible interview between the President and Mueller's team. Jay Sekulow, who leads the President's legal team, did not comment on the timing of the meeting. "We do not discuss conversations we have had or have not had with the special counsel," he said. The raid on Cohen's home, hotel room and office brings the Mueller investigation deep inside the President's inner circle -- Cohen has worked with Trump for years and is treated as a confidant and a member of his family. A source close to the President said there have been ongoing negotiations between Mueller's team and the President's legal team for a potential interview, but the raid on the President's personal attorney has upended those discussions. CNN reported last week that members of the legal team have been informally prepping the President for a possible interview, though no decision on the matter has been made. The President's anger over the raid as well as a new assessment of what the implications of the raid could be for Cohen's most prominent client, Trump, are factors that the President's legal team has to take into account. | NEWS-MULTISOURCE |
AV Atletics Nijverdal
ASV Atletics is a Dutch athletics club based in Nijverdal in the province of Overijssel. It was established in 1986. It has ±260 members. AV Atletics is affiliated to the Netherlands Athletics Federation.
History
Since 1984, there is an organised group of runners in the community of Hellendoorn. In the beginning of 1985, this group decided to found AV Atletics.
Accommodation
Since November, 1997 AV Atletics is situated at their current location, in the middle of a nature reserve called De Groene Mal in the north of Nijverdal.
Events
Each year, on the last Saturday in October, the Diepe Hel Holterbergloop (Diepe Hel Holterberg Run) is held by AV Atletics. The Diepe Hel Holterbergloop is one of the most beautiful and most exciting running events in The Netherlands.
In 2010 and 2011, AV Atletics is organizing the Dutch Cross Country Championships. | WIKI |
promethium
(redirected from Element 61)
Also found in: Dictionary, Thesaurus, Medical.
Related to Element 61: Element 65, Element 64, Element 62, Element 43
promethium
(prōmē`thēəm), artificially produced radioactive chemical element; symbol Pm; at. no. 61; mass no. of most stable isotope 145; m.p. 1,042°C;; b.p. 3,000°C; (estimated); sp. gr. unknown; valence +3. Although the chemical and physical properties of promethium are not well defined, it is similar to neodymium and samarium, the rare-earth metalsrare-earth metals,
in chemistry, group of metals including those of the lanthanide series and actinide series and usually yttrium, sometimes scandium and thorium, and rarely zirconium. Promethium, which is not found in nature, is not usually considered a rare-earth metal.
..... Click the link for more information.
preceding and following it in the lanthanide serieslanthanide series,
a series of metallic elements, included in the rare-earth metals, in Group 3 of the periodic table. Members of the series are often called lanthanides, although lanthanum (atomic number 57) is not always considered a member of the series.
..... Click the link for more information.
in Group 3 of the periodic tableperiodic table,
chart of the elements arranged according to the periodic law discovered by Dmitri I. Mendeleev and revised by Henry G. J. Moseley. In the periodic table the elements are arranged in columns and rows according to increasing atomic number (see the table entitled
..... Click the link for more information.
. All its isotopes are radioactive and fairly short-lived. Promethium-145, the most stable isotope, has a half-life of almost 18 years. The most useful isotope is promethium-147 (half-life 2.62 years); it is produced in nuclear reactors. It is a beta emitter and is used in making phosphorescent materials. When it is mixed with a phosphor, the light emitted can be used to power a photocell. It must be used with caution; although the beta rays it emits are relatively harmless, they may produce X rays when they interact with atoms of heavy elements. The existence of promethium was predicted at the beginning of the 20th cent. In 1926, B. S. Hopkins and his coworkers claimed to have discovered the element and proposed the name illinium. About the same time Luigi Rolla and his associates (in Italy) reported its discovery and suggested the name florentium. However, definite chemical identification of the element did not occur until 1947, although it may have been synthesized earlier. J. A. Marinsky, L. E. Glendenin, and C. D. Coryell identified the element by ion-exchange chromatography during the course of experiments at Oak Ridge National Laboratory, Tenn., involving the fission of uranium and subsequent neutron bombardment of neodymium. Since observable quantities of the element have never been found in nature, this identification is considered the first actual discovery of the element. The name promethium was suggested by these investigators and adopted in 1949 by the International Union of Pure and Applied Chemistry.
Promethium
(Pm), a radioactive chemical element of group III of Mendeleev’s periodic table; one of the lanthanides. Atomic number, 61.
There are 16 known promethium isotopes, with mass numbers 141–154, and two nuclear isomers. The most stable isotope is the almost unobtainable 145Pm (half-life T½ ~ 18 years during radioactive decay by electron capture), and β-radioactive l47Pm (T½ = 2.7 years) is the isotope with the greatest importance.
The search for promethium, begun in the early 20th century, for a long time proved futile. Attempts to synthesize element 61 with the aid of nuclear reactions were initiated in 1938 by the American physicists M. Pool and L. Quill, who irradiated neo-dymium (atomic number 60) with deuterons; however, the scientists were unable to prove the formation of a new element. The discovery date for promethium is considered to be 1945, when the American researchers J. Marinsky, L. Glendenin, and C. Coryell isolated the element from uranium fission products using ion-exchange chromatography and identified it chemically. The new element was named after Prometheus. In 1968 the existence of promethium—isotope 147Pm—was discovered in uranium-bearing ores. This isotope, in the quantity ~4 × 10-15g per kg ore, is formed by the nuclear fission of 238U and 235U.
Promethium is a metal with a density of 7.26 g/cm3 and a melting point of 1080°C; the electronic configuration of the highest energy levels is 4f56s2. The element has the chemical properties typical of lanthanides and exhibits an oxidation number, or valence number, of + 3 in compounds. The light-brown hydroxide Pm(OH)3 yields the oxide Pm2O3 upon calcination. Water-soluble promethium salts include the yellow chloride PmCl3 and pink nitrate Pm(NO3)3; examples of insoluble salts are the fluoride PmF3 and oxalate Pm2(C2O4)3. 10H2O.
Promethium, composed chiefly of the isotope 147Pm, is obtained from 235U fission fragments that are formed during the operation of nuclear reactors; several hundred grams of promethium accumulate in large reactors over a one-year period. Promethium is isolated from the other lanthanides in fission fragments by chromatography and is used in the preparation of long-lived phosphors. The β-rays of l47Pm make it possible to measure the thickness of various materials, hence the use of promethium in thickness gauges employing radioisotopes. The isotope l47Pm also serves as a base for miniature, nuclear-powered batteries with a service life of several years. In these batteries, the energy of 147Pm β-rays is converted into electric energy.
REFERENCES
Lavrukhina, A. K., and A. A. Pozdniakov. Analiticheskaia khimiia tekhnetsiia, prometiia, astatina i frantsiia. Moscow, 1966.
Trifonov, D. N. Prometii—element no. 61. Moscow, 1968.
S. S. BERDONOSOV
promethium
[prə′mē·thē·əm]
(chemistry)
A chemical element, symbol Pm, atomic number 61, produced artificially in nuclear reactors; atomic weight of the most abundant separated isotope is 147; a member of the rare-earth group of metals.
promethium
a radioactive element of the lanthanide series artificially produced by the fission of uranium. Symbol: Pm; atomic no.: 61; half-life of most stable isotope, 145Pm: 17.7 years; valency: 3; melting pt.: 1042°C; boiling pt.: 2460°C (approx.) | ESSENTIALAI-STEM |
Lothair of Italy
Lothair of Italy may refer to:
* Lothair I (d. 855), emperor and king
* Lothair II of Italy (d. 950), king | WIKI |
Evangelical Lutheran Church (United States)
The Evangelical Lutheran Church (ELC) was a Lutheran denomination that existed from 1917, when it was founded as the Norwegian Lutheran Church of America (NLCA), until 1960, when it joined two other church bodies to form the second American Lutheran Church.
In 1959, just before its merger into the ALC, the ELC had 2,242 pastors, 2,482 congregations, and 1,125,867 members.
Background
The Norwegian Lutheran Church of America was formed by the merger of the Hauge Synod (est. 1876), the Norwegian Synod (est. 1853), and the United Norwegian Lutheran Church of America (est. 1890). The NLCA changed its name to the Evangelical Lutheran Church (ELC) in 1946 as part of its Americanization process. In 1960, the ELC joined with Lutheran churches of German and Danish backgrounds to form The American Lutheran Church, the first Lutheran body in North America to have multiple ethnic backgrounds. This coalescence of Lutheran churches continued into recent times, with the ALC later joining others 28 years later to form the Evangelical Lutheran Church in America in 1988.
Colleges associated with the ELC
* Augustana College (South Dakota)
* Concordia College, Moorhead
* Luther College
* Pacific Lutheran University
* St. Olaf College
* Waldorf College (junior college at that time)
ELC seminary
* Luther Theological Seminary Saint Paul, Minnesota
Presidents of the ELC
* Hans Gerhard Stub, 1917–1925
* Johan Arnd Aasgaard, 1925–1954
* Fredrik A. Schiotz, 1954–1960
Conventions of the ELC
From 1917 to 1926 a general convention was held triennially. There was need of holding several extraordinary conventions, so beginning in 1928 (called the 8th) it was held biennially with the general convention always falling on the even numbered years. Voting members of the conventions were pastors who were currently serving congregations of the Church, and one lay representative from each parish consisting of one congregation and two representatives from each parish consisting of two or more congregations.
* Organizing convention, 1917, Saint Paul, Minnesota
* 1st extraordinary, 1918, Fargo, North Dakota
* 1st general convention, 1920, Minneapolis, Minnesota
* 2nd extraordinary convention, 1922, Minneapolis, Minnesota
* 2nd general convention, 1923, Saint Paul, Minnesota
* 3rd extraordinary convention, 1925, Saint Paul, Minnesota
* 3rd general convention, 1926, Minneapolis, Minnesota
* 8th general convention, 1928, Minneapolis, Minnesota
* 9th general convention, 1930, Minneapolis, Minnesota
* 10th general convention, 1932, Minneapolis, Minnesota
* 11th general convention, 1934, Minneapolis, Minnesota
* 12th general convention, 1936, Minneapolis, Minnesota
* 13th general convention, 1938, Minneapolis, Minnesota
* 14th general convention, 1940, Minneapolis, Minnesota
* 15th general convention, 1942, Minneapolis, Minnesota
* 16th general convention, 1944, Minneapolis, Minnesota
* 17th general convention, 1946, Minneapolis, Minnesota
* 18th general convention, 1948, Minneapolis, Minnesota
* 19th general convention, 1950, Minneapolis, Minnesota
* 20th general convention, 1952, Minneapolis, Minnesota
* 21st general convention, 1954, Minneapolis, Minnesota
* 22nd general convention, 1956, Minneapolis, Minnesota
* 23rd general convention, 1958, Minneapolis, Minnesota
* 24th general convention, 1960, Minneapolis, Minnesota | WIKI |
Page:United States Statutes at Large Volume 114 Part 3.djvu/445
PUBLIC LAW 106-398—APPENDIX 114 STAT. 1654A-403 Defense ^encies: Inside the United States—Continued Agency TRICARE Management Activity Installation or location Fleet Combat Training Center, Dam Neck, Virginia Fort Bragg, North Carolina Fort Campbell, Kentucky Naval Air Station, North Island, California Naval Air Station, Oceana, Virginia.. Naval Amphibious Base, Coronado, California Naval Amphibious Base, Little Creek, Virginia Pearl Harbor, Hawaii Edwards Air Force Base, California.. Marine Corps Base, Camp Pendleton, Eglin Air Force Base, Florida Fort Drum, New York Patrick Air Force Base, Florida Tyndall Air Force Base, Florida William Beaumont Medical Center, Texas Total: Amount $5,500,000 $8,600,000 $16,300,000 $1,350,000 $3,400,000 $4,300,000 $5,400,000 $9,900,000 $17,900,000 $14,150,000 $37,600,000 $1,400,000 $2,700,000 $7,700,000 $4,200,000 $256,906,000 (b) OUTSIDE THE UNITED STATES.— Using amounts appropriated pursuant to the authorization of appropriations in section 2403(a)(2), the Secretary of Defense may acquire real property and carry out military construction projects for the installations and locations outside the United States, and in the amounts, set forth in the following table: Defense Agencies: Outside the United States Agency Installation or location Amount Defense Education Activity Defense Finance and Accounting Service Defense Logistics Agency Hanau, Germany Hohenfels, Germany Osan, Korea Royal Air Force, Feltwell, United Kingdom Royal Air Force, Lakenheath, United Kingdom Schweinfurt, Germany Seoul, Korea Sigonella, Italy Taegu, Korea Wuerzbtirg, Germany Kleber Kaserne, Germany Defense Fuel Support Point, Andersen Air Force Base, Guam Defense Fuel Support Point, Marine Corps Air Station, Iwakuni, Japan Defense Fuel Support Point, Misawa Air Base, Japan Defense Fuel Support Point, Royal Air Force, Mildenhall, United Kingdom $2,030,000 $13,774,000 $892,000 $1,800,000 $5,650,000 $1,750,000 $2,451,000 $3,450,000 $806,000 $2,635,000 $7,500,000 $36,000,000 $22,400,000 $26,400,000 $10,000,000
� | WIKI |
Narendra
MDB
1 Answer(s) 7 years ago
Posted in : EJB
Advertisement
View Answers
May 29, 2008 at 3:39 PM
Hi friend,
i am sending simple code. Actually MDBs only live in an EJB server - all the Swing code you've supplied is not MDB, its regular JMS MessageListeners / consumers as its not using MDBs or EJB.
import javax.swing.*;
import javax.swing.JFrame;
public class TestConsumerMDB extends JFrame {
public static final long serialVersionUID = 1L;
public TestConsumerMDB consumer;
public static void main(String args[]){
System.out.println("Welcome to consumer MBD1");
System.out.println ("** BEGIN: TestConsumerMDB.main ()");
System.out.println ("** instantiate TestConsumerMDB");
new TestConsumerMDB();
System.out.println ("\n** TestConsumerMDB instantiated");
System.out.println ("** END:TestConsumerMDB.main ()");
}
// constructor
private TestConsumerMDB(){
super("This is simple MBD form");
System.out.println ("BEGIN: Start TestConsumerMDB.constructor");
consumer = new TestConsumerMDB();
this.setDefaultCloseOperation(EXIT_ON_CLOSE);
this.setVisible(true);
System.out.println("Test consumer consructor end from");
}
}
----------------------------------------------------------
Read for more information.
http://www.roseindia.net/java/example/java/swing/
Related Tutorials/Questions & Answers:
MDB - EJB
MDB Hi All, can we make MDB is Synchronous ??? if yes then how???? Hi friend, i am sending simple code. Actually MDBs only live in an EJB server - all the Swing code you've supplied is not MDB, its regular JMS
EJB-MDB - EJB
EJB-MDB What are the MDB transaction attributes
Advertisements
Copy .mdb file for backup.
Copy .mdb file for backup. hi.. i am new to java... in my application , at one place for taking back up i have to copy .mdb file from one place to another ... please can anyone help me, how can i do that ....and also if possible
jms to mdb - JMS
jms to mdb how to invoke MDB from JMS? is there any server configuration file? Hi Friend, Please visit the following link: http://www.roseindia.net/ejb/MessageDrivenBeans.shtml http://www.roseindia.net/ejb
.MDB Files to open on mac.. DATABASE
.MDB Files to open on mac.. DATABASE how to open .mdb files on mac.. I have a database file that has sent to me through email. Since i have a mac... confused is the .mdb file tranferred to my project
Is there any website available to open .mdb file online?
Is there any website available to open .mdb file online? I am having an .mdb file. And I don't have MS Office in my computer. So for, I need to view the .mdb file in online. Could you tell me any website
Issue when deploying mdb jar in weblogic
Issue when deploying mdb jar in weblogic Hi, I have written the code to read messages from queue.But when i deploy this in weblogic 9.2 after... { System.out.println("\n\n\t(mdb) MyMDB Received \n
Listener ports - JMS
Listener ports I am getting the following error on my server. Please...] 00000150 MDBListenerIm I WMSG0043I: MDB Listener CLSMGUncorrelatedMDBListenerPortA...:25:392 CST] 000000b8 MDBListenerIm I WMSG0042I: MDB Listener
how can i export a .jar file include .mbd file?
how can i export a .jar file include .mbd file? i have a project of java.it includes a .mdb file, when i export to .jar file i eclipse, it show a error that can't export .jar file width the .mdb file ? how can i import this .mdb
Accessing MS ACCESS databse using a HTML webpage [created using Javascript]
... I have to save some datas in an MS ACCESS database file [*.mdb], after... columns in the *.mdb file. Then, the datas in that *.mdb file should
java
" + "(*.mdb, *.accdb)};DBQ=C:\\Database\\register.accdb...:Driver={Microsoft Access Driver " + // "(*.mdb, *.accdb.... In the User DSN tab click add 5. Then select "Driver Microsoft assces (*.mdb
connect database without specifying dsn name in java
(*.mdb)};DBQ=E:/Final Project/Lalit.mdb"); st=c.createStatement
JSF Command button problem - Java Server Faces Questions
JSF Command button problem Hi Frnds... I have retrieved the records from the mdb file in backing bean..if i click the submit button those records will be displayed in the form of table... Records are displaying
JDBC-SERVLET
;Microsoft Access Driver(*.mdb)->finish->Typed source name->clicked on select...=DriverManager.getConnection("jdbc:odbc:{Microsoft Access Driver(*.mdb... jdbc:odbc:{Microsoft Access Driver(*.mdb)} First set the datasoruce name
cannot insert data into ms access database - Java Server Faces Questions
Microsoft Access Driver(*.mdb) 5. Select database name and Create the DSN name
JDBC - JDBC
String url = "jdbc:odbc:Driver={Microsoft Access Driver (*.mdb)};DBQ=D
database connectivity - JDBC
a user DSN 4. Select Microsoft Access Driver(*.mdb) 5. Select database name
Identify the use and behavior of the MessageDrivenContext interface methods.
bean instances MUST NOT call this method (caller is unknown for MDB... MUST NOT call this method (caller is unknown for MDB... bean instances MUST NOT call these methods (MDB has no home/local-home
java.lang.ArrayIndexOutOfBoundsException: - Java Beginners
") || ind.equals("mdb")) { //System.out.println("mdb or xls"); //path...="\Properties.jsp"; alert("Choose mdb or xls file only."); window.history.back
Given a list of responsibilities, identify whose which are the Container's with respect to transactions, including the handling of getRollbackOnly, setRollbackOnly, getUserTransacti
, or Mandatory (for MDB - ONLY with Required) transaction attribute as follows... method executing with the Supports, NotSupported, or Never (for MDB..., or Mandatory (for MDB - ONLY with Required) transaction attribute
jsp to access query
Access Driver(*.mdb). 3)After selecting the driver, click finish button. 4
unable to connect database in java
=DriverManager.getConnection("jdbc:odbc:Driver={Microsoft Access Driver(*.mdb)};DBQ=E:/Final Project
java
)Click Add button and select the driver Microsoft Access Driver(*.mdb). 3)After
settings in control panel before jdbc
the driver Microsoft Access Driver(*.mdb). 3)After selecting the driver, click finish
Java
Access Driver(*.mdb) Select database name and Create the DSN name (e.g emp) Click
JDBC Connectivity - JDBC
:odbc:Driver={Microsoft Access Driver (*.mdb)};DBQ="; database
Nota ble to build EJB application - EJB
\tempAnt.xml:69: Can't create a mdb element under ejbdoclet. Make sure the jar file
unable to connect database in java
=DriverManager.getConnection("jdbc:odbc:Driver={Microsoft Access Driver(*.mdb)};DBQ=E:/Final Project... Microsoft Access Driver(*.mdb). 3)After selecting the driver, click finish
Chapter 1. EJB Overview
beans (MDB) - a stateless components that are invoked by the container as a result of the arrival of a JMS message (MDB does not have home/home-local
jsp coding please.
and select the driver Microsoft Access Driver(*.mdb). 3)After selecting the driver
jdbc
Driver(*.mdb). 3)After selecting the driver, click finish button. 4)Then give Data | ESSENTIALAI-STEM |
skip to main content
SciTech ConnectSciTech Connect
Title: Understanding strain-induced phase transformations in BiFeO3 thin films
Bismuth ferrite (BiFeO3) is a promising lead free multiferroic with large polarization, ferroelectricity and robust antiferomagnetism. Experiments demonstrate that epitaxial strain substantially enhance the piezoelectric response of BiFeO3 thin films. Here, through a synergestic combination of theory and experiments, we characterize the co-existing polymorphs (specifically an intermediate S' phase between the bulk rhombohedral-R and the pseudotetragonal T' phases) observed in strained BiFeO3 thin films. We show that the S' phase, although energetically very close to the T' phase, exhibits structural similarities with the bulk R phase. G-type antiferromagnetic ordering is predicted for the S' and R phases, whereas, the G/C-type antiferromagnetic order types are energetically indistinguishable for the T' phase. Furthermore, we predict a blue-shift in the band gap Eg when moving from R to S' to T', which we confirm by Electron Energy Loss Spectroscopy measurements. The flat energy landscape and the absence of an energy barrier between the T and S' phases indicate that a reversible phase transformation between the two is possible under the application of an external electric field. This may make it possible to strain engineer the electromechanical response or, utilizing the corresponding changes in Eg, create unique photonic structures.
Authors:
[1] ; [2] ; [3] ; [4] ; [5] ; [6] ; [6] ; [7] ; [7] ; [1]
1. Oak Ridge National Lab., Oak Ridge, TN (United States)
2. Oak Ridge National Lab., Oak Ridge, TN (United States); Florida State Univ., Tallahassee, FL (United States); National High Magnetic Field Lab., Tallahassee, FL (United States)
3. Argonne National Lab. (ANL), Argonne, IL (United States)
4. Oak Ridge National Lab., Oak Ridge, TN (United States); ASML, Veldhoven (The Netherlands)
5. Univ. of Michigan, Ann Arbor, MI (United States); Univ. of California, Los Angeles, CA (United States)
6. Univ. of Michigan, Ann Arbor, MI (United States)
7. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Publication Date:
OSTI Identifier:
1212888
Grant/Contract Number:
AC02-05CH11231; FG02-06ER46273; AC02-06CH11357; AC05-00OR22725
Type:
Accepted Manuscript
Journal Name:
Advanced Science
Additional Journal Information:
Journal Name: Advanced Science; Journal ID: ISSN 2198-3844
Publisher:
Wiley
Research Org:
Argonne National Lab. (ANL), Argonne, IL (United States); Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Sponsoring Org:
USDOE Office of Science (SC)
Country of Publication:
United States
Language:
English
Subject:
36 MATERIALS SCIENCE; multiferroic BiFeO₃; phase coexistence; piezoelectric response; solid-state nudged elastic band method; 75 CONDENSED MATTER PHYSICS, SUPERCONDUCTIVITY AND SUPERFLUIDITY | ESSENTIALAI-STEM |
With our local hospitals in the news so much these days, what can you tell us about the city’s first hospital?
One medical historian suggests that a physician likely accompanied Jean-Baptiste le Moyne, Sieur de Bienville, on his first visit to what would become the city of New Orleans in 1718. Author John Duffy surmises that since Bienville’s expedition was a military one, French law would have called for a doctor to be along for the trip. Still, the exact date of the opening of the city’s first hospital is not known.
We do know that a military hospital called Royal Hospital opened soon after the city’s founding and was located near Gov. Nicholls and Chartres streets. In fact, the original name of Gov. Nicholls was Hospital Street. It was changed in 1909 to honor Confederate Gen. Francis T. Nicholls.
The hotel was named after the first owners: Peter Jung Sr. and sons Peter Jr. and Arthur.
Historian Samuel Wilson Jr. dates the Royal Hospital to 1722. It was destroyed by a hurricane in 1732 and rebuilt in 1734. In its early years, the hospital was staffed by Ursuline nuns, who first arrived here in 1727.
Since Royal Hospital only cared for French military personnel and those in the king’s service, there was a need for another hospital that would serve the city, particularly its poor. Funded by the estate of a wealthy shipbuilder named Jean Louis, the first Charity Hospital opened in 1736. It was located near Chartres and Bienville.
Over the years, two other Charity Hospitals were built on Basin Street before a fourth one opened in 1815 on Canal Street. Another Charity Hospital opened in 1832 on Tulane Avenue, near the site of the one most readers are familiar with today, which opened in 1939 but has been closed since Hurricane Katrina. Last year, the LSU Board of Supervisors approved plans to redevelop the building. | FINEWEB-EDU |
New Game + (TV programme)
New Game + is a cancelled Czech television programme hosted by Alžběta Trojanová and Mikoláš Tuček, broadcast in 2019 on Televize Seznam, focused on reviews, rankings, news, reports and interesting things from the gaming world.
The premiere episode was broadcast on Television Seznam on 21 March 2019. The weekly was broadcast every Thursday at 18.00 on Television Seznam, now only recaps of previous episodes are broadcast. It is archived on the online broadcast of Television Seznam and on Stream.cz. After the broadcast of the program, a live debate with the creators of the program Alžběta Trojanová and Mikoláš Tuček on followed the Twitch platform.
The show stopped airing in July 2019. The original information about a holiday hiatus changed in 2020 to the definitive cancellation of the show and a change of format to New +. The final episode aired on 11 July 2019, owing to declining ratings; the last episodes could not cross the 10,000 audience mark. In comparison, the first three episodes started with 30,000 viewers.
Authors and Moderators
* Alžběta Trojanová previously worked as editor-in-chief of the server Hratelně.cz and host of the programme Re-play.
* Mikoláš Tuček performed in the programs such as Re-play, Game Page, SCORE live, Applikace and FRAG live. For several years, he was editor-in-chief of SCORE magazine.
Editors
External editors led by Alžběta Trojanová participated in creation of individual sections. This includes Melichar Oravec (FlyGunCZ), Radek Starý (Sterakdary), Zuzana Cinková (Baty Alquawen), Jana Kilianová (megayuffie), Barbara Hacsi (barbarahacsi), Šárka Tmějová (still_not_sane), Petr Ciesarík (cisi82), Zbyněk Povolný (zypomann), Václav Pecháček (engiecz), Miroslav Ježek, Tomáš Baksa (bajtygame) and Michael Irišek (michaelirisek).
Program sections
* Review
* Review +
* Interview with a guest
* Discussion
* TOP 5
* Competition | WIKI |
Juraj Križanić
Juraj Križanić (c. 1618 – 12 September 1683), also known as Jurij Križanič, Yuriy Krizhanich, Iurii Krizhanich, and Yury Krizanitch (Юрий Крижанич; Georgius Crisanius, Jiří Križanić, Georges Krijanich), was a Croatian Catholic missionary and polymath who is often regarded as the earliest recorded pan-Slavist. His ideal, often misunderstood - even today - was to bring about a union of the churches, which Rome and Constantinople had tried to do without success for centuries. He believed that this might come about through closer relations between Slavic Catholicism and the Russian Orthodox Church, and supported the idea that all Slavs had a common language and ethnic origin.
However, he was not a pan-Slavist if this meant seeking the political unity of all Slavic peoples under Russian leadership. He considered that the only possible role for the tsar to 'correct' or unify the orthography and script used in Slavic-language books and awaken Slavic consciousness was through works conducive to education and logic. In extremis the South Slavs might join with the Russian tsar as a sovereign of the same language and people if the Catholic rulers supported his leadership in a war against the Ottomans.
After lengthy travels and fifteen years of exile in Siberia, Križanić died, misunderstood and disappointed, in battle during the Ottoman siege of Vienna in 1683. Although he had no direct followers, Križanić's work influenced many later South Slavic thinkers who championed both reliance on Russia and South Slavic cultural and political unification.
Early life, education, and early missionary work
Križanić was born in Obrh, near Ozalj (in present-day Croatia, then part of the Habsburg Kingdom of Croatia) in 1618, a period of political turmoil and of Turkish invasions into Croatia. He attended a Jesuit grammar school in Ljubljana and a Jesuit gymnasium in Zagreb from 1629 to 1635. His father died when he was 17 years old, at approximately the same time he graduated from the gymnasium. He studied in Graz, then began attending the University of Bologna in 1638 to study theology and graduated in 1640. Shortly after graduating Križanić began attending the Greek College of St. Athanasius, a center in Rome for the training of Catholic missionaries who would work with Orthodox Christians; he graduated from this College in 1642. By the end of his life he was proficient in ten languages. While Križanić had a strong desire to travel to Moscow with the ambitious goal of uniting the Roman Catholic and Russian Orthodox churches, he was assigned missionary duties in Zagreb, where he taught at the Zagreb Theological Seminary as well as serving as a priest in several neighboring towns.
Time in Russia
Križanić managed to secure permission from the papacy for a brief visit to Moscow from 25 October to 19 December 1647 as part of a Polish embassy. However, he was not able to secure permission for a prolonged stay in the Tsardom of Russia until 1658 (permission was retracted shortly after being issued, a fact that Križanić simply ignored) and he did not arrive in Moscow until 17 September 1659. One author writes that he pretended to be an Orthodox Serb. He was assigned the duty of translating Latin and Greek documents and of preparing an improved Slavic grammar. However, he was exiled to Siberia on 20 January 1661. The reason for his exile remains unknown. Possible explanations put forward have included the fact that he was a Roman Catholic priest, his criticism of Russian society and of the Greeks, with whom Patriarch Nikon of Moscow (in office: 1652-1666) was attempting reconciliation, and other political and social motives. Križanić postulated that he was exiled because of "some foolish thing" he had said to someone, and that whatever he had said had been mentioned to the authorities.
After having lived roughly a year and a half in the Russian capital, Križanić arrived in Tobolsk in Siberia, on 8 March 1661. He lived there for 15 years, surviving on a state stipend and working on the treatises On Divine Providence, On Politics, and On Interpretation of Historic Prognostications, amongst others. In these books, written in his self-devised "Common Slavonic language" (a Pan-Slavonic grammar named Grammatitchno Iskaziniye that incorporated numerous Slavic languages), he set forth a comprehensive program of reforms proposed for the Russian state, including reforms to administration, Russian serfdom, economic policy, education, grammar, and Russia's primitive agricultural system. Many of the reforms he recommended were in fact carried out by Peter the Great ((r. 1682 – 1725)), although there is no concrete evidence of Križanić's direct influence in his doing so. Križanić's Politika which he wrote between 1663 and 1666, was published by Peter Bezsonov (Russia in the Seventeenth Century, 1859–60) and for the first time in English in 1985, and is his most well-known and influential work.
His appeal to the Tsar to head the Slavs in the fight against the Germans shows a remarkable political foresight. Tsar Aleksei died in January 1676; Križanić was freed from exile by the new Tsar, Feodor III, on 5 March 1676.
Final years
Križanić remained in Moscow until 1678, when he travelled to Vilnius and later to Warsaw. He lived in Poland and joined the Jesuits. He accompanied a Polish force on its way to liberate besieged Vienna from the Ottomans during the 1683 Battle of Vienna. He died near Vienna on 12 September 1683 while participating with the Ukrainian troops fighting alongside the troops of the Polish king Jan Sobieski in the city's defence against the Turks.
Ideas and theories
Križanić was one of the earliest proponents of Pan-Slavism. The language he created and used in his writing was called Ruski jezik ("Russian language"), but in reality it was a mixture of several Slavic languages and was devised to serve as a symbol of and even to promote Slavic unity. He wanted to unite the Slavic nations under the Russian Tsar and unite Catholic and Orthodox against the German Protestants and Turkish Muslims.
A key component of Križanić's theories concerning necessary reforms for the Russian state were his "Five Principles of Power." His five principles were: Full autocracy (essentially absolute monarchy), closed borders, compulsory labor or a ban on idleness, government monopoly of foreign trade, and ideological conformity. Križanić argued that Russia would be strengthened if immigration were tightly restricted and if native Russians were prohibited from leaving the country without justification. The autocrat should use his power to eliminate bad customs, modernize the country and give the nobles and clergy privileges on the model to the Western Ständestaat.
His works, which also include writings on music and economics, were re-discovered and printed in the mid-19th century.
Important works
* The Križanić Memorandum of 1641 (1641)
* Asserta Musicalia (1656)
* Gramatično izkazanje ob ruskom jeziku (1659-1666)
* On Politics also known as the Politika (in original "Razgovory o vladatelstvu") (1666)
* On Divine Providence (in original "De Providentia Dei") (1667)
* Holy Baptism (1669)
* An Interpretation of Historical Prophesies (1674)
* Chinese Foreign Trade (1675)
* History of Siberia (1680) | WIKI |
Dudley Peter Allen
Dudley Peter Allen (1852 – 1915) was an American surgeon, teacher, writer, and art patron.
He was born in a family of physicians and was educated first at Oberlin College and later Harvard Medical School, becoming an M.D. in 1879. After briefly working in Massachusetts General Hospital, he went to Europe to attend medical and surgical lectures and clinics in Berlin, Vienna, London, Paris, and other medical centers. In 1883, he settled in Cleveland where he began a surgical career in the department of surgery in the Western Reserve University, where in time he became professor of surgery and clinical surgery.
He joined the surgical staff of the Lakeside Hospital where ultimately he became surgeon-in-chief. His professional practice rapidly grew to large proportions, and he was frequently called for operations or consultations to distant parts of the state and even beyond it. During all this time he was a frequent contributor to medical literature, and an active supporter and a patron of the Cleveland Medical Library. On August 4, 1892, he married the local wealthy philanthropist Elisabeth Severance in Cleveland.
He wrote a chapter in the 1887 Magazine of Western History where he described his predecessor, Horace A. Ackley, a brilliant man of many talents, "On the organization of the medical College in Cleveland, he was appointed to the chair of surgery, which he occupied until 1855."
He held many honorary positions during his life. At one time he was president of the Ohio State Medical Society, and for a number of years was secretary, and finally president (1906–1907), of the American Surgical Association. About this time he was elected an honorary fellow of the Philadelphia Academy of Surgery, and later was awarded the degree of LL. D. from his alma mater, Oberlin. In 1910, he retired his medical positions and traveled around the world with his wife.
He was an art collector of paintings and engravings, but especially of old Chinese porcelains. On this subject, he became a recognized expert.
Allen died suddenly of pneumonia in New York City on Wednesday, January 6, 1915, aged 62.
Legacy
After his death, Allen's widow commissioned several buildings in his name; most notably the estate "Glen Allen" where she lived the rest of her life, the local medical library, and the Oberlin Art museum. While working on finishing his work expanding St. Luke's hospital, she met and married her second husband, Francis Fleury Prentiss, who had taken over Allen's position. | WIKI |
-- CNN Hires ABC News’s Tapper to Anchor New Weekday Program
Time Warner Inc.’s CNN said it hired
ABC News Washington reporter Jake Tapper to anchor a weekday
show, following through on the news network’s President Jeff Zucker ’s pledge to create new programming. Tapper will begin anchoring and serve as CNN’s chief
Washington correspondent early next year, Christa Robinson, a
spokeswoman for CNN, said in a telephone interview. He joined
Walt Disney Co. (DIS) ’s ABC News in 2003 and most recently served as
the network’s senior White House correspondent. CNN announced Nov. 29 it hired former NBC Universal chief
Zucker as it attempts to improve ratings after struggling in
recent years to compete with News Corp.’s Fox News and Comcast
Corp. (CMCSA) ’s MSNBC. Zucker said last month the network needed “to
find new programs that will make everything better.” Zucker
officially begins in January. “Jake is an exceptional reporter and communicator, and we
look forward to developing a program that takes advantage of all
of his strengths,” CNN Executive Vice President Ken Jautz said
today in a statement . To contact the reporter on this story:
Alex Sherman in New York at
asherman6@bloomberg.net To contact the editor responsible for this story:
Nick Turner at
nturner7@bloomberg.net | NEWS-MULTISOURCE |
Prince of Wales Drive
Prince of Wales Drive (Ottawa Road #73) is a road serving Ottawa, Ontario. The northern section is a low-speed street running along the west bank of the Rideau River, while southern portions of the road were formerly Highway 16 (downgraded after the construction of Highway 416).
Prince of Wales Drive is the continuation of Queen Elizabeth Driveway beyond Preston Street. It runs around Dow's Lake and through the Central Experimental Farm before reaching a roundabout. The speed limit is 50 km/h down to Fisher Avenue, at which point it increases to 60 km/h. There is a major intersection with Hunt Club Road, where several commuters from south Nepean use the bridge to cross the Rideau River.
Prince of Wales Drive follows the Rideau River past Barrhaven and Manotick. South of the intersection with Jockvale Road, the road diverts from the river and heads in a southwesterly direction toward North Gower, where it terminates at Fourth Line Road.
Prior to the construction of Highway 416, the stretch of Highway 16 that included Prince of Wales continued south to the Canada–US border into Saint Lawrence County, New York
In May 2007, the City approved the start of an environmental assessment study in regards of the future widening of the road from Fisher Avenue to Woodroffe Avenue from two to four lanes in accommodation to future expansion in Barrhaven, Manotick and Riverside South.
Major Intersections
* Preston Street
* Baseline Road & Heron Road
* Meadowlands Drive & Hog's Back Road
* Hunt Club Road
* Fallowfield Road
* Merivale Road
* Strandherd Drive
* Longfields Drive
* Bankfield Road
* 4th Line Road | WIKI |
Alias John Law
Alias John Law is a 1935 American Western film directed by Robert N. Bradbury and starring Bob Steele. It was produced by Supreme Pictures and released by William Steiner Productions on a states-rights basis. It was remade in 1950 as West of the Brazos.
Cast
* Bob Steele as Everett Tarkington 'John' Clark
* Roberta Gale as JoAnne Vallon
* Buck Connors as Bootch Collum
* Earl Dwire as The Kootney Kid, posing as Everett Tarkington Clark
* Robert McKenzie as Judge
* Steve Clark as Henchman Simi
* Jack Rockwell as Marshal Lamar Blyth
* Roger Williams as Sheriff
* Jack Cowell as Attorney Wagner | WIKI |
Page:A Leaf in the Storm.djvu/45
38 Cogez by taking the portrait of Alois in the meadow; and when the child who loved him would to him and nestle her hand in his, he would smile at her very sadly, and say with a tender concern for her before himself,—
"Nay, Alois, do not anger your father. He thinks that I make you idle, dear, and he is not pleased that you should be with me. He is a good man and loves you well: we will not anger him, Alois."
But it was with a sad heart that he said it, and the earth did not look so bright to him as it used to do when he went out at sunrise under the poplars down the straight roads with Patrasche.
The old red mill had been a landmark to him, and he had been used to pause by it, going and coming, for a cheery greeting with its people as her little flaxen head had risen above the low mill-wicket, and her little rosy hands had held out a bone or a crust to Patrasche.
Now the dog looked wistfully at a closed door, and the boy went on without pausing, with a pang at his heart, and the child sat within with tears dropping slowly on the knitting to which she was set on her little stool by the stove; and Baas Cogez; working among his sacks and his mill-gear, would harden his will, and say to himself, "It | WIKI |
Talk:National Data Buoy Center
The first buoys deployed by US Coast Guard...
'The first buoys deployed by NDBC were the large 12-m discus hulls constructed of steel. These were generally deployed in deep water off the U.S. East Coast and in the Gulf of Mexico...' And proudly towed out to the Gulf and the Atlantic by the USCGC Acushnet. 2600:1700:A760:C10:F13C:79F8:4A6D:9C17 (talk) 16:44, 14 August 2018 (UTC) | WIKI |
Interstate 81
Interstate 81 (I-81) is a north–south (physically northeast–southwest) Interstate Highway in the eastern part of the United States. Its southern terminus is at I-40 in Dandridge, Tennessee; its northern terminus is on Wellesley Island, New York at the Canadian border, where the Thousand Islands Bridge connects it to Highway 137 and ultimately to Highway 401, the main Ontario freeway connecting Detroit via Toronto to Montreal. The major metropolitan areas along the route of I-81 include the Tri-Cities of Tennessee; Roanoke in Virginia; Harrisburg and the Wyoming Valley in Pennsylvania; and Syracuse in New York.
I-81 largely traces the paths created down the length of the Appalachian Mountains through the Great Appalachian Valley by migrating animals, indigenous peoples, and early settlers. It also follows a major corridor for troop movements during the Civil War. These trails and roadways gradually evolved into US Route 11 (US 11); I-81 parallels much of the older US 11. Being mostly rural in nature, I-81 is heavily used as a trucking corridor and is often used as a bypass of busier and more congested Interstates to the east such as I-95; for this reason, it is also used heavily by drug and human traffickers, as it is less monitored by law enforcement than I-95. This led to the Federal Bureau of Investigation (FBI) forming a taskforce to combat the issue in 2017.
The I-81 Corridor Coalition, a six-state coalition, was organized to handle issues along I-81, such as truck traffic and air pollution; the commission meets annually. I-81 is part of the fastest route between the capital of the US (Washington, D.C.) and the capital of Canada (Ottawa) and Mexico (Mexico City).
Route description
I-81 is part of the National Highway System, a network of highways that are considered essential to the country's economy, defense, and mobility by the Federal Highway Administration (FHWA).
* TN || 75.66 mi
* VA || 324.92 mi
* WV || 26.00 mi
* MD || 12.08 mi
* PA || 232.76 mi
* NY || 183.60 mi
* Total || 855.02 mi
* }
* PA || 232.76 mi
* NY || 183.60 mi
* Total || 855.02 mi
* }
* Total || 855.02 mi
* }
* }
Tennessee
I-81 begins in Tennessee at I-40 in Dandridge, a route that connects to Knoxville to the west and Asheville to the east. I-81 meets I-26 and US 23, which go to Kingsport and Johnson City. At milemarker 75, I-81 leaves Tennessee and enters Virginia.
Virginia
I-81 in Virginia is largely a rural route with brief concurrencies with I-77 and I-64. The route parallels the Appalachian Mountains for much of its route through Tennessee and Virginia, serving such cities as the twin cities of Bristol, Tennessee and Virginia; Wytheville; Roanoke; Christiansburg; Lexington; Staunton; Harrisonburg; and Winchester. In Harrisonburg, I-81 cuts through James Madison University. It parallels its older counterpart, US 11, for its entire length in Virginia.
West Virginia
I-81 briefly enters the Eastern Panhandle of West Virginia for about 26 mi, serving the city of Martinsburg. The entire routing is in Berkeley County and serves the Eastern WV Regional Airport. The West Virginia segment was completed in 1966 and there have been no realignments since.
Maryland
In Maryland, the Interstate Highway runs 12.08 mi from the West Virginia state line at the Potomac River in Williamsport north to the Pennsylvania state line near Maugansville. I-81 is the primary north–south Interstate Highway in Washington County, connecting Hagerstown with Chambersburg and Harrisburg to the north and Martinsburg, Winchester, and Roanoke to the south. It is the shortest mainline Interstate in Maryland and contains the shortest portion of I-81 of all six states through which the Interstate highway passes. The Interstate was dedicated as Maryland Veterans Memorial Highway in 1987. I-81 passes through the state of Maryland at one of its narrowest points, the "Hub City" of Hagerstown where it intersects with a large number of other routes, most notably I-70. Hagerstown Regional Airport is served by this Interstate Highway.
Pennsylvania
I-81 forms a major north–south corridor through the state of Pennsylvania, serving the boroughs of Chambersburg and Carlisle, where it meets the Pennsylvania Turnpike (I-76) but does not directly interchange with it (motorists must use US 11 to connect). Around the state capital of Harrisburg, the route forms the northern section of Pennsylvania's Capital Beltway. The route then travels northeast toward the Wyoming Valley, where it serves the cities of Wilkes-Barre and Scranton, then heads north through the Endless Mountains region toward the state line.
New York
In New York, I-81 crosses the Pennsylvania state line southeast of Binghamton. The freeway runs north–south through Central New York, serving the cities of Binghamton, Syracuse, and Watertown. It passes through the Thousand Islands in its final miles and crosses two bridges, both part of the series of bridges known as the Thousand Islands Bridge. South of Watertown, I-81 closely parallels US 11, the main north–south highway in Central New York prior to the construction of I-81. At Watertown, US 11 turns northeastward to head across New York's North Country while I-81 continues on a generally northward track to the Canadian border. From there, the road continues into the province of Ontario as Highway 137, a short route leading north to the nearby Highway 401.
History
I-81 roughly parallels the Great Indian Warpath, an old Indian trail that connected New York to the Piedmont via Virginia and West Virginia. A series of roads linking Virginia to Maryland through Martinsburg were present on maps as early as 1873. New York was originally served by New York State Route 2 (NY 2), a road built in 1924; NY 2 was replaced by US 11 in 1927. A highway that largely followed the path of US 11 was built and became known as the Penn-Can Highway. On August 14, 1957, the highway was redesigned as I-81. In New York, the first segments of I-81 were begun in 1954. In Maryland, the Interstate was begun with the Hagerstown Bypass in the mid-1950s. After several bouts of expansion, the freeway was completed from US 40 (now Maryland Route 144 [MD 144]) to the Pennsylvania state line in 1958 and marked as I-81 in 1959. Bidding on contracts in West Virginia opened in July 1958. In Virginia, the first Interstate hearing was held in February 1957. At the end of 1957, construction began on a 1 mi stretch near Buchanan, Virginia. A 4 mi section of the Interstate opened in 1959. A stretch in Harrisonburg was opened as well. By late 1963, 85 mi in Virginia were open.
The first statewide segment to be completed was that of West Virginia, which was finished in 1966. The section opened on October 19, 1966. In western Maryland, various parts of I-81 were built in the early 1960s, and the remainder of the highway south to the Potomac River was under construction by 1965 and opened in 1966. Since then, I-81 in Maryland has remained largely unchanged. In Tennessee by 1965, 336 mi of the 997 mi of Interstate Highways were completed. Construction was expected to be finished in 1969, but a large portion of the work would not be completed until 1974, and most of the road was open by December 1974. The final major segment of the Interstate in the north to be built was a 17 mi section in New York, opened in October 1968. That same year, work in Pennsylvania was completed. The road would not be completely built in Tennessee until August 1975. Construction on parts in Virginia dragged on until it was finished in July 1987. The segment in New York cost $270 million (equivalent to $ in ) to build.
Major intersections
* Tennessee
* near Dandridge, northeast of Knoxville
* between the Tri-Cities
* Virginia
* in Bristol
* several times
* in Wytheville; concurrent from Wytheville to Fort Chiswell.
* in Roanoke
* in Lexington; concurrent through Staunton.
* in Harrisonburg
* in Middletown
* in Winchester
* Maryland
* in Hagerstown
* in Hagerstown
* Pennsylvania
* in Middlesex Township (near Carlisle)
* in Mechanicsburg
* in Harrisburg. I-81/US 322 concurrent throughout Harrisburg.
* in Harrisburg
* near Jonestown
* near Hazleton
* in Dupont (near Pittston)
* in Dunmore (near Scranton)
* in Clarks Summit
* New York
* in Binghamton
* in Binghamton
* in Syracuse
* in downtown Syracuse
* in North Syracuse
* in Watertown
* ; freeway ends at Canada–US border (Thousand Islands Bridge)
Auxiliary routes
I-81 has six related, auxiliary Interstate Highways that connect the main freeway to downtowns and other cities. I-381 runs 1.5 mi, connecting Bristol, Virginia, to I-81. I-581 is a 6.35 mi spur that connects Roanoke, Virginia, to I-81. It is proposed to be overtaken by I-73. Pennsylvania Route 581 (PA 581) connects Harrisburg, Pennsylvania, to I-81. It runs 7.36 mi. I-481 serves as an eastern bypass of Syracuse, New York. NY 481 is a northwestern extension of I-481 that ends in Oswego. I-781 extends for 4.9 mi, that connects Fort Drum, New York, to the Interstate. NY 281 is a north–south state highway in Central New York in the US that extends for 16.56 mi across Cortland and Onondaga counties, roughly paralleling I-81 and connecting at both ends.
I-181 was a 23.85 mi offshoot of I-81, linking to Kingsport, Tennessee. It was decommissioned in August 2005 when I-26 took over I-181's entire length. I-281 was replaced in January 1970 by I-481. I-81E was replaced by the current I-380. | WIKI |
Eusko Alderdi Sozialista
Eusko Alderdi Sozialista (Basque Socialist Party; EAS) was an underground revolutionary socialist Basque political party.
History
ETA(m) considered that armed struggle and mass struggle should be independent and clearly separated, unlike their rivals of ETA (pm) that considered that political and armed struggle were the same. In line with this idea, ETA (m) created a political party composed only of civilians that should participate and/or lead the mass struggle in Euskal Herria. The party participated in the social unrest that existed in the Basque Country during the last years of Francoism.
The party disappeared in 1975 when it merged with their Basque-French counterparts of Herriko Alderdi Sozialista, to form Euskal Herriko Alderdi Sozialista, the first Basque party at both sides of the border. | WIKI |
ML Model Cards
An Introduction to ML Model Cards
ML Model Cards serve as standard documentation tools for detailing key information about machine learning (ML) models. They outline a model's applications, constraints and deliver comprehensive insights about the model. The goal of these cards is to boost the transparency of ML by offering additional information regarding model training, performance metrics, potential biases, and intended applications. Model cards play an essential role in uncovering potential issues and biases in ML models.
Key Aspects of Model Cards
While the contents of a Model Card may differ based on its application, the following components should always be present:
• Model Information: This includes details like the model’s name, its version, creators, and relevant specifics.
• Purpose: Defines the model's target audience, its functionality, and potential restrictions.
• Performance Metrics: This involves the model’s performance parameters, such as accuracy, precision, recall, and F1 score, tested across diverse datasets and scenarios.
• Training Data: Details regarding the quantity, quality, and provenance of the training. Pre-processing and data augmentation techniques, if applied, can also be found here.
• Evaluation Data: Information about the data used for evaluation and the selection process.
• Architecture: Elaboration on the technicalities, including the model’s layers, hyperparameters, and other technical features.
• Ethical Considerations: Outlines issues regarding model’s compliance with fairness, privacy, or security.
• Limitations: Discusses potential biases or assumptions inherent in the data or model and constraints of the model itself.
• References: Lists research papers, databases, or other resources utilized during the model's development and evaluation.
Benefits of Model Cards
Model Cards bring innumerable benefits, including:
• Trustworthiness: They enable ethical and safe use of ML by providing detailed model documentation to all users and stakeholders.
• Transparency: Exposing users to the developmental process, training data, and the model's intended applications enhances informed decision-making.
• Bias Reduction: They aid in highlighting and reducing biases in training data, design, and model evaluation when used for significant applications.
• Reproducibility: Detailed model documentation encourages other researchers to reproduce or refine the original work.
• Accountability: They document model’s performance metrics, ethical considerations, and potential limitations thus facilitating users to take responsibility for the model's impact.
Applications of Model Cards
• Education: They can be employed to teach about ethical and legal implications of ML, thereby enhancing understanding of transparency, responsibility, and ethical AI usage.
• Research: Scientists can use these cards to document model specifics, share results, and boost reproducibility and collaboration.
• Administrations: Government organizations may use model cards to evaluate pros and cons of applying ML in sectors like healthcare, banking, and transportation.
• Non-Profit Organisations: These organizations can use model cards to examine how ML models affect diverse groups, identify biases or ethical issues, and promote more inclusive AI practices.
• Industry: Commercial entities can utilize model cards to explain their ML models, present their performance to clients, and other stakeholders. By demonstrating fair and ethical AI usage through model cards, businesses may earn trust from their customers in their products and accountabilities.
In conclusion, ML model cards have extensive potential applications and can aid in enhancing transparency, accountability, and responsible use of ML in various sectors.
Integrate | Scan | Test | Automate
Detect hidden vulnerabilities in ML models, from tabular to LLMs, before moving to production. | ESSENTIALAI-STEM |
Essar Delays Refinery Shutdown as Customers Face Supply Shortage
Essar Energy Plc (ESSR) , the operator of
India ’s second-largest private refinery, has delayed a plan to
halt its plant after calls from government-run companies facing
shortages of petroleum products. Essar planned to shut the Vadinar unit in western India for
35 days starting in the third week of May, two people with
knowledge of the matter said March 16. The works will be
postponed until September, the company said today in a
statement. This will not affect plans to expand capacity at the
refinery, it said. The expansion will boost capacity to 375,000 barrels a day
from about 300,000 barrels a day, the company said. The majority
of the increased production is expected to begin operating from
the middle of the fourth quarter of this year, Essar said. Government-run refiners Bharat Petroleum Corp., Hindustan
Petroleum Corp. and Indian Oil Corp., all Essar’s customers,
asked the company to continue production because of insufficient
supply in Asia of oil products such as gasoil or diesel,
according to the statement. Essar Energy is the London-listed arm of India’s Essar
Group, whose interests include shipping, telecoms and steel. The
group also operates a Mumbai-based unit called Essar Oil Ltd. (ESOIL) To contact the reporter on this story:
Pratish Narayanan in Singapore at
pnarayanan9@bloomberg.net . To contact the editor responsible for this story:
Clyde Russell at crussell7@bloomberg.net . | NEWS-MULTISOURCE |
Five CBT & Autism Q and A’s
What is CBT?
Cognitive Behavioural Therapy for Autism has been widely researched over the last 30 years seeing such courses which claim to practically cure young people of Autism. Of course CBT alone does not. There is no cure for Autism. However, with careful intervention of a number of alternative therapies, diet and lifestyle, there can always be a significant change in the individual.
I believe that Autism is a disorder which is the result of the environment the person is in at that moment. Shift the environment and the traits of Autism ‘disappear.’ The key to the ultimate intervention is the environment. All the other methods and strategies simply support rather than remedy.
CBT was designed to help people with post-traumatic stress disorder, depression and eating disorders such as anorexia. Yet the intervening CBT with Autism is still a relatively new concept which is being found to be highly beneficial with many clients and their families.
Who will it help?
CBT will help your child enormously if they fit into the following criteria;
1. They are of an age where they can be responsible for their own actions (for example, from the age of 8 upwards)
2. They have at best some reasonable control over their behaviour
3. That behaviour is led by a thought process.
4. They have the following disorders: Asperger’s syndrome and/or high functioning Autism.
Cognitive behavioural therapy focuses on how someone thinks and encourages them to identify negative thought patterns which cause unwanted behaviour. For your child, CBT can be highly effective for helping ease meltdowns and outbursts; shouting, swearing, pathological demand avoidance syndrome and communication.
CBT helps people who have social and communication issues and also those who would benefit from developing these skills for a more rewarding lifestyle. It looks at how we think and who we behave in relation to how we interact with others and how our behaviours affect people and society around us.
Will it help my child to cope with society?
Where people are keen to develop a sense of being so that they can fit into society, then CBT is a very good place to start. With my son, Jon, he found CBT very effective as his belief was not to stand out from the crowd as being ‘different’ but the desire to want to fit into the world and live as normally as possible. With many young people on the spectrum who have a capacity to think outside their Autism, there is a notable wish to be accepted in society, therefore CBT is another pathway that is open to them to make the transitions needed. CBT gives these people the right tools to help them overcome situations which they would ordinarily find troublesome and stressful.
Can it help stop meltdowns?
We covered thought processes and keep a though log in the first part of the Masterclass course. This is an exercise which is widely used to help people understand the link between thoughts and behaviours. We looked schemas and negative thought patterns which are often the cause misinterpretation thus leading to meltdowns. In my book ‘Extraordinary Journey’ I talk about the time when my son Jon, had the most incredible meltdown in a café which had been triggered by his misinterpretation of my mother’s actions. A meltdown that would have been avoided had he realised what she was doing.
CBT can help enormously with the following:
• Anger and aggressive behaviour
• Anxiety
• Depression in teenagers
• Social difficulties
• Self-harm
• Repetitive behaviour
• Communication problems
Where Can I Find Out More?
You can find out more by downloading our FREE guide here which covers signs and symptoms of Autism, Asperger’s syndrome and early intevention. Or you can sign up below if you want to join our Member’s Only Unleashing The Positive Masterclass
get your child's social and comunication skills up to speed today!Like this post? You will love How To Turn Your Child’s Autism Around And Save Money!michelle hatcher
Michelle Hatcher is the author of the Progress Pentagon parenting courses and founder of the best-selling : Unleashing The Positive Mind Masterclass. She is a certified CBT Therapist, NLP Practitioner, mother of 15 year old Jon who has Autism and PDA and certified Life Coach.
She is also a member of the Complimentary Medical Association, the International Alliance of Holistic Therapists
and The Association of Integrative Psychology. Her autobiography, How To… uncovers the secrets of Autism and how to overcome it plus it tracks her life as a mother of an Autistic child, how she developed her best-selling courses using CBT and NLP with Autism. She is also a public speaker on Autism Awareness.
She lives in Wiltshire with husband Nick, son, Jon and three cats; Apple, Missy and Augusta. | ESSENTIALAI-STEM |
ehcache
Uses of Interface
net.sf.ehcache.writer.CacheWriterManager
Packages that use CacheWriterManager
net.sf.ehcache This package contains the public API for using ehcache.
net.sf.ehcache.config This package contains the cache configuration code.
net.sf.ehcache.constructs The constructs package builds on top of the core ehcache classes to create implementations for common caching patterns.
net.sf.ehcache.constructs.classloader ClassLoader contstructs package
net.sf.ehcache.store Store package.
net.sf.ehcache.store.disk This package contains the disk store.
net.sf.ehcache.transaction.local This package contains the local transactions subsystem.
net.sf.ehcache.transaction.xa This package contains the functionality to provide XA support to a transactional Cache.
net.sf.ehcache.writer.writebehind This package contains the write behind functionalities.
net.sf.ehcache.writer.writethrough This package contains the write through functionalities.
Uses of CacheWriterManager in net.sf.ehcache
Methods in net.sf.ehcache that return CacheWriterManager
CacheWriterManager Ehcache.getWriterManager()
Obtain the writer manager that's used by this cache instance.
CacheWriterManager Cache.getWriterManager()
Obtain the writer manager that's used by this cache instance.
Uses of CacheWriterManager in net.sf.ehcache.config
Methods in net.sf.ehcache.config that return CacheWriterManager
abstract CacheWriterManager CacheWriterConfiguration.WriteMode.createWriterManager(Cache cache, Store store)
Create a new WriterManager for a particular cache instance
Uses of CacheWriterManager in net.sf.ehcache.constructs
Methods in net.sf.ehcache.constructs that return CacheWriterManager
CacheWriterManager EhcacheDecoratorAdapter.getWriterManager()
Obtain the writer manager that's used by this cache instance.
Uses of CacheWriterManager in net.sf.ehcache.constructs.classloader
Methods in net.sf.ehcache.constructs.classloader that return CacheWriterManager
CacheWriterManager ClassLoaderAwareCache.getWriterManager()
Obtain the writer manager that's used by this cache instance.
Uses of CacheWriterManager in net.sf.ehcache.store
Methods in net.sf.ehcache.store with parameters of type CacheWriterManager
boolean Store.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean MemoryStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean LruMemoryStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean LegacyStoreWrapper.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean ElementIdAssigningStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean CacheStore.putWithWriter(Element element, CacheWriterManager writerManager)
Element Store.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element MemoryStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element LruMemoryStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element LegacyStoreWrapper.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element ElementIdAssigningStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element CacheStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Uses of CacheWriterManager in net.sf.ehcache.store.disk
Methods in net.sf.ehcache.store.disk with parameters of type CacheWriterManager
boolean DiskStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
Element DiskStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Uses of CacheWriterManager in net.sf.ehcache.transaction.local
Methods in net.sf.ehcache.transaction.local with parameters of type CacheWriterManager
boolean LocalTransactionStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
boolean JtaLocalTransactionStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
Element LocalTransactionStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Element JtaLocalTransactionStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Uses of CacheWriterManager in net.sf.ehcache.transaction.xa
Methods in net.sf.ehcache.transaction.xa with parameters of type CacheWriterManager
boolean XATransactionStore.putWithWriter(Element element, CacheWriterManager writerManager)
Puts an item into the store and the cache writer manager in an atomic operation
Element XATransactionStore.removeWithWriter(Object key, CacheWriterManager writerManager)
Removes an item from the store and the cache writer manager in an atomic operation.
Uses of CacheWriterManager in net.sf.ehcache.writer.writebehind
Classes in net.sf.ehcache.writer.writebehind that implement CacheWriterManager
class WriteBehindManager
Implements a WriterManager that writes elements to a queue first and in the background sends the to the CacheWriter.
Uses of CacheWriterManager in net.sf.ehcache.writer.writethrough
Classes in net.sf.ehcache.writer.writethrough that implement CacheWriterManager
class WriteThroughManager
Implements a WriterManager that writes elements directly through to the underlying store.
ehcache
Copyright 2001-2016, Terracotta, Inc. | ESSENTIALAI-STEM |
Makefile.cvs [plain text]
VERSION = $(shell cat configure.in |grep INIT_AUTOMAKE |sed -e 's/.*,//;s/^ //;s/.$$//' )
SRCDIR = $(shell pwd)
all: autogen.sh configure.in
./autogen.sh
grep-$(VERSION).tar:
[ -e configure.in ] || ( echo Must be run from grep source dir ; exit 1 )
rm -rf /tmp/grep-$(VERSION) && cp -aR $(SRCDIR) /tmp/grep-$(VERSION) && cd /tmp/grep-$(VERSION) && make -f Makefile.cvs cvs-clean && make -f Makefile.cvs && rm -rf autom4te.cache && (find . -type d -name CVS |xargs rm -rf) && cd .. && tar chf $(SRCDIR)/grep-$(VERSION).tar grep-$(VERSION)
grep-$(VERSION).tar.bz2: grep-$(VERSION).tar
bzip2 -9f grep-$(VERSION).tar
grep-$(VERSION).tar.gz: grep-$(VERSION).tar
gzip -9f grep-$(VERSION).tar
rpm: grep-$(VERSION).tar.bz2
rpm -ts --define '_srcrpmdir $(SRCDIR)' grep-$(VERSION).tar.bz2
# make cvs-clean blatantly stolen from KDE CVS ;)
cvs-clean:
@if test ! -d CVS; then \
echo "You don't have a toplevel CVS directory."; \
echo "You most certainly didn't use cvs to get these sources."; \
echo "But this function depends on cvs's information."; \
exit 1 ;\
fi;\
pwd=`pwd` ;\
dirs=`find . -type d | grep -v CVS | sed -e "s#^./##"` ;\
for i in $$dirs; do \
if test ! -d "$$pwd/$$i/CVS"; then \
echo "D $$i" ;\
rm -rf "$$pwd/$$i"; \
continue; \
fi ;\
cd $$pwd/$$i ;\
for f in * .*; do \
if test ! -d "$$f"; then \
if grep "^/$$f/" CVS/Entries > /dev/null; then \
a="b"; \
else \
echo "F $$i/$$f"; \
rm -f "$$pwd/$$i/$$f"; \
fi; \
fi ; \
done; \
done | ESSENTIALAI-STEM |
59 F.3d 1373
Kenneth ABRAMS; et al., Appellants Cross-Appellees v. COMMUNICATIONS WORKERS OF AMERICA, An unincorporated Labor Organization, Appellee Cross-Appellant.
Nos. 93-7171, 93-7172.
United States Court of Appeals, District of Columbia Circuit.
Argued Nov. 21, 1994.
Decided July 21, 1995.
Hugh L. Reilly, Springfield, VA, argued the cause for the appellants/cross-appellees. On brief was Raymond J. LaJeunesse, Jr., Springfield, VA.
James B. Coppess, Washington, DC, argued the cause for the appellee/cross-appellant. On brief was Laurence S. Gold, Washington, DC.
Before: SILBERMAN, HENDERSON and TATEL, Circuit Judges.
Separate opinion concurring in part and dissenting in part filed by Circuit Judge TATEL.
KAREN LeCRAFT HENDERSON, Circuit Judge:
The appellants are four telephone company employees (employees) represented by the Communications Workers of America (CWA or Union) in collective bargaining with their respective employers. They are not members of the Union and have objected to paying CWA a mandatory agency fee above the amount necessary to compensate it for the costs of representing them. The employees allege that the Union has breached its duty of fair representation by providing inadequate notice to workers of their right to object and by using improper procedures to calculate the portion of its expenses attributable to collective bargaining and to processing objections. They appeal the district court’s grant of summary judgment against them on all but one issue as well as the denial of their two motions for class certification. We affirm in part and reverse in part.
I. BACKGROUND
As the district court recognized, “[t]he facts of this case are long and complicated. They are, however, not in dispute.” Abrams v. Communications Workers of Am., 818 F.Supp. 393, 395 (D.D.C.1993). In summary, the Union is the appellants’ exclusive representative under the National Labor Relations Act (NLRA). 29 U.S.C. § 159(a). The NLRA authorizes the Union to require as part of its collective bargaining agreement with employers that all nonmember employees represented by it “shall as a condition of employment pay or tender to the Union amounts equal to the periodic dues applicable to members.” 29 U.S.C. § 158(a)(3); see Joint Appendix (JA) 172. To opt out of subsidizing union expenses unrelated to worker representation, a nonmember employee must affirmatively object each year to paying an amount equivalent to the dues paid by member employees.
CWA informs nonmembers of their right to object by a notice distributed yearly to all employees. The notice appears in the Union newsletter, the CWA News. JA 74. The notice provides a general description of the Union’s procedure for receiving and handling objections and the classes of expenses it considers both “chargeable” (related to collective bargaining and other employee representation activities) and “nonchargeable” (related to other union activities). Id. The Union distributes the notice in March and objectors may file at any time through mid-June. CWA’s fee year begins in July. The Union accepts late objections only from new employees or those with a “reasonable excuse.” 818 F.Supp. at 397. At the beginning of the fee year an objector receives from the Union an “advance reduction” payment equal to the amount attributable to nonchargeable expenditures that will be deducted from his paychecks during the coming year. Along with the payment the Union provides a detailed accounting of its expenses and a description of the expenses it considers chargeable and nonchargeable. The description is more detañed than the one included in the Union’s general notice. JA 75-91.
The amount of advance reduction payment is calculated by an outside accounting firm. The firm bases its calculation on the portion of time Union employees spent on activities not related to coUective bargaining during the preceding year. It obtains the data underlying its calculation from timesheets distributed to the Union staff once every thirteen weeks. Any employee who challenges the amount of the advance reduction must do so within 30 days of receiving the payment. Under CWA policy the objection is then referred to arbitration. JA 74.
In October 1987 the employees brought suit against CWA in district court. JA 38. Their complaint alleged that the Union’s objection procedures violated its duty of fair representation arising under the NLRA. The district court initiaUy denied the employees’ request for class certification of
nonmembers of the CWA employed by employers in interstate commerce who are subject to eoHective bargaining arrangements made under color of NLRA § 8(a)(3) ... and § 9(a) ... which require them to pay fees to CWA as a condition of employment.
JA 9 (D.D.C.1989). It subsequently denied the employees’ motion to certify two subclasses, one comprised of objectors, the other of “free-riders,” whom the district court described more simply as one of “potential objectors.” JA 13 (D.D.C.1991).
The employees’ claims faU into three categories. First, they chaUenge the Union’s notice of its objection procedures, asserting that the notice is premised on an overbroad definition of chargeable expenditures and does not adequately notify the employees of their rights. Second, they argue that the Union’s accounting methods are unreliable and inaccurate. Third, they challenge the CWA’s system for receiving objections and processing refunds, maintaining that the Union can neither limit the period for objectors to object, including on an annual basis, nor require arbitration of fee disputes. The district court granted summary judgment to the Union on all claims except CWA’s arbitration policy. 818 F.Supp. at 400-07. The employees appeal the summary judgment as well as the denial of their class certification requests and CWA cross-appeals the district court’s ruling on its arbitration policy.
II. DISCUSSION
The Union’s status as an exclusive bargaining representative “includes a statutory obligation to serve the interests of all members without hostility or discrimination toward any, to exercise its discretion with complete good faith and honesty, and to avoid arbitrary conduct.” Vaca v. Sipes, 386 U.S. 171, 177, 87 S.Ct. 903, 910, 17 L.Ed.2d 842 (1967). These obligations are referred to as the duty of fair representation. See id. A claim that a union has breached its duty of fair representation ordinarily is evaluated to determine whether “a union’s conduct toward a member of the collective bargaining unit is arbitrary, discriminatory, or in bad faith.” Id. at 190, 87 S.Ct. at 916. A union’s fair representation duty in the context of a mandatory agency fee hinges on its compliance with section 8(a)(3) of the NLRA, 29 U.S.C. § 158(a)(3). Communications Workers of Am. v. Beck, 487 U.S. 735, 742-44, 108 S.Ct. 2641, 2647-48, 101 L.Ed.2d 634 (1988).
“Taken as a whole, § 8(a)(3) permits an employer and a union to enter into an agreement requiring all employees to become union members as a condition of continued employment, but the ‘membership’ that may be so required has been ‘whittled down to its financial core.’ ” Id. at 745, 108 S.Ct. at 2648 (quoting NLRB v. General Motors Corp., 373 U.S. 734, 742, 83 S.Ct. 1453, 1459, 10 L.Ed.2d 670 (1963) (footnote omitted)). The Supreme Court has defined the types of expenses within the financial core that a union can lawfully require nonmember employees to pay and has outlined procedures necessary to protect the rights of objectors. See, e.g., Ellis v. Railway Clerks, 466 U.S. 435, 104 S.Ct. 1883, 80 L.Ed.2d 428 (1984) (delineating permissible expenses under section 2, Eleventh of the Railway Labor Act); Chicago Teachers Union v. Hudson, 475 U.S. 292, 106 S.Ct. 1066, 89 L.Ed.2d 232 (1986) (describing adequate procedures to protect objectors). This case requires us to decide whether CWA correctly designated the expenses within the financial core and whether CWA’s objection procedures are authorized under Supreme Court precedent.
A Class Certification
We initially consider whether the district court erred in denying the employees’ requests for class certification. The employees sought under Fed.R.Civ.P. 23 to certify a class comprised of “themselves and all other nonmembers of the CWA employed by employers ... who are subject to collective bargaining agreements made under or under color of [the NLRA], which require them to pay fees to CWA as a condition of employment.” JA 40. The district court denied certification, reasoning, first, that no cause of action existed for a “potential” objector because a worker’s dissent cannot be presumed and, second, that the plaintiffs had not shown that their claims for relief are typical of all nonmembers, whether “potential” objectors or “actual” objectors who had expressed their dissent. JA 10. We conclude, however, that all agency shop employees can assert a common interest for the purpose of class certification in challenging the adequacy of the union’s notice alerting them to their right to object to full payment of union dues.
It is irrelevant to the notice issue whether an agency shop employee later becomes an “actual” objector or remains a “potential” objector since the union must provide notice in advance of an employee’s decision to object. All members of the class sought to be certified have an interest in requiring the Union to fully inform them of their objection rights so they can decide whether to exercise them. The district court’s concern that the relief sought might not be typical of all class members is answered by the same analysis. If the Union’s notice were found to be inadequate, all workers would be entitled to injunctive and declaratory relief.
Despite the district court’s suggestion to the contrary, see JA 10, no court has held that a class consisting of all agency shop employees may not be certified for the purpose we have described. Although an employee’s dissent “is not to be presumed,” International Ass’n of Machinists v. Street, 367 U.S. 740, 774, 81 S.Ct. 1784, 1802-03, 6 L.Ed.2d 1141 (1961), this mandate does not control where the class seeks to vindicate its right to notice, directly affecting whether an employee will become an “affirmative dissenter.” Compare id. (finding class inappropriate in suit for injunctive relief against political expenditures and for restitution because all members of proposed class had not “specifically objected to the exaction of dues for political purposes.”); Brotherhood of Ry. & S.S. Clerks v. Allen, 373 U.S. 113, 119, 83 S.Ct. 1158, 1162, 10 L.Ed.2d 235 (1963) (same). In misapplying the holdings in Street and Allen, the district court committed reversible error. Frazier v. Consolidated Rail Corp., 851 F.2d 1447, 1456 (D.C.Cir.1988) (denial of class certification may be reversed “only if it resulted from the application of incorrect legal criteria or if it constituted an abuse of discretion.”)
The district court similarly erred in denying the employees’ subsequent motion to certify a subclass of “true dissenters” who have objected to paying full agency fees. JA 13-14. The district court did little more than restate its earlier reasoning even though the proposed class fully met the concerns expressed by the Supreme Court. In Street the Court concluded that the action was “not a true class action, for there is no attempt to prove the existence of a class of workers who had specifically objected to the exaction of dues for political purposes.” 367 U.S. at 774, 81 S.Ct. at 1802. The employees have made the attempt here and the subclass of actual objectors can, and should, be certified for the portion of the lawsuit challenging CWA’s objection procedure.
B. Notice to Employees and Definition of Chargeable Expenses
The next question is whether the Union provides adequate notice to workers of their right to object and of the nature of the expenses they are required to pay. The employees initially challenge the facial validity of the union-security clause contained in the collective bargaining agreement between their employers and CWA inasmuch as it requires workers to make payments “equal to the periodic dues applicable to members” even though workers are obligated to pay only those expenses included in the financial core. In International Union of Elec., Elec., Salaried, Mach. & Furniture Workers v. NLRB (IUE), 41 F.3d 1532, 1538-39 (D.C.Cir.1994), we recently rejected an identical argument regarding a clause which on its face mandated union membership and we need not revisit that question here.
More troubling is the side notice the Union provides to workers informing them of their right to object. The notice, which restates the Union’s objection policy, provides in part:
Under the Communications Workers of America policy on agency fee objections, employees who are not members of the Union, but who pay agency fees, may request a reduction in that fee based on their objection to certain kinds of Union expenditures ____
The policy provides an objection period each year during May, followed by a reduction in the objector’s fee for the twelve months beginning with July and running through June the following year.
Briefly stated, CWA’s objection policy works as follows:
1. The agency fee payable by objectors will be based on the Union’s expenditures for those activities or projects normally or reasonably undertaken by the Union to represent the employees in its bargaining units with respect to their terms and conditions of employment.
JA 74 (emphasis added). In Hudson the Supreme Court held that “[bjasie considerations of fairness ... dictate that the potential objectors be given sufficient information to gauge the propriety of the union’s fee.” 475 U.S. at 306, 106 S.Ct. at 1076. We conclude that CWA’s notice is inadequate because it defines financial core expenses too broadly and because it fails to adequately inform employees of their right to object.
Beck answered in the negative the question “whether [the] ‘financial core’ includes the obligation to support union activities beyond those germane to collective bargaining, contract administration, and grievance adjustment.” 487 U.S. at 745, 108 S.Ct. at 2648. In Hudson the Court found the union’s disclosure “inadequate” where
[i]nstead of identifying the expenditures for collective bargaining and contract administration that had been provided for the benefit of nonmembers as well as members — and for which nonmembers as well as members can be charged a fee— the Union identified the amount that it admittedly had expended for purposes that did not benefit dissenting nonmembers.
475 U.S. at 306-07, 106 S.Ct. at 1076 (emphasis added). The definition of chargeable expenses included in CWA’s notice as activities undertaken to represent employees “with respect to their terms and conditions of employment” does not adequately notify the employees of their right to object or of the legitimate scope of chargeable expenses under Beck. While in Ellis, on which the Beck decision relied, the Court stated that “the test must be whether the challenged expenditures are necessarily or reasonably incurred for the purpose of performing the duties of an exclusive representative of the employees in dealing with the employer on labor-management issues,” id. 466 U.S. at 448, 104 S.Ct. at 1892, the Beck opinion appears to embrace a more restrictive formulation of the test. See 487 U.S. at 745, 108 S.Ct. at 2648 (“financial core” of employee obligations owed to union representatives may not include support for activities “beyond those germane to collective bargaining, contract administration, and grievance adjustment.”). The Court also stated that it was “construing both § 8(a)(3) and § 2, Eleventh as permitting the collection and use of only those fees germane to collective bargaining,” id. at 754, 108 S.Ct. at 2653, and noted that the legislative history of § 8(a)(3) “is consistent with the view that Congress understood § 8(a)(3) to afford nonmembers adequate protection by authorizing the collection of only those fees necessary to finance collective bargaining activities.” Id. at 759, 108 S.Ct. at 2656.
The objectors in both Beck and Ellis challenged the expenditure of agency fees for activities that included “participating in social, charitable, and political events,” id. at 740, 108 S.Ct. at 2646; yet the same activities could fall within the scope of the phrase “represent[ing] employees ... with respect to their terms and conditions of employment” contained in the CWA policy. JA 74. The fact that the CWA notice lists “legislative activity” and “support of political candidates” as non-chargeable expenses does not cure the imprecision, and therefore overbreadth, of the notice. The Beck and Ellis holdings foreclose the exaction of mandatory agency fees for such activities, and, in our view, additionally require that the Union notice not use language which might lead workers to conclude that such activities are chargeable.
We also conclude that the CWA notice inadequately explains the nature of a worker’s right to object to payment of the full agency fee. The notice describes the right to object as arising “[ujnder the Communications Workers of America policy” instead of from the restrictive interpretation placed on the Union’s statutory authority by the Beck Court. In light of our determination in IUE that the union-security clause in the collective bargaining agreement need not alert workers to their right, we believe that an adequate side notice under Hudson must alert an employee to his legal right to object to payment of a full agency fee. Characterizing the right as CWA “policy” could lead an employee to conclude that objecting would be futile because the decision to grant a reduction rests entirely within the Union’s discretion. 475 U.S. at 306, 106 S.Ct. at 1075-76.
Finally we address the adequacy of the information the Union gives to new employees. The CWA notice provides that “agency fee payers who are new to the bargaining unit may object within thirty days of receiving this notice (retroactive to the commencement of their union security obligation and for the duration of the annual objection period).” JA 74. One reading of the notice is that a new employee is charged a full agency fee from the time of his hire until receipt of the notice and can obtain a rebate in fees only if he objects. If so read, the policy is clearly inconsistent with Ellis, which held that “by exacting and using full dues, then refunding months later the portion that it was not allowed to exact in the first place ... the union obtains an involuntary loan for purposes to which the employee objects.” 466 U.S. at 444, 104 S.Ct. at 1890. Although CWA represented at oral argument that new employees receive some further notice at the time of hiring, we cannot determine from the policy language or elsewhere in the record whether the notice is timely and adequate. Accordingly, we will remand to the district court for further findings on this issue.
C. Accounting for Chargeable Expenses
The employees further contend that CWA’s method of accounting for its chargeable expenses does not furnish a reliable basis for calculating the fees they must pay. “Since the unions possess the facts and records from which the proportion of political to total union expenditures can reasonably be calculated, basic considerations of fairness compel that they, not the individual employees, bear the burden of proving such proportion.” Allen, 373 U.S. at 122, 83 S.Ct. at 1163. The union must demonstrate by a preponderance of the evidence that its expenses are chargeable. Ellis, 466 U.S. at 457 n. 15, 104 S.Ct. at 1897 n. 15. Although the parties vigorously dispute the issue, we agree with the district court that CWA has met its burden.
For one week of every thirteen weeks CWA employees record their activities on time sheets according to one of twenty-four categories. JA 252. An outside firm, Westat, Inc., determines from the time sheets how much time is spent on chargeable and non-chargeable activities. Westat also randomly telephones employees to verify the information provided. Its verification has discovered few reporting errors that resulted in a chargeable activity being reclassified as nonchargeable. 818 F.Supp. at 405. Independent certified public accountants annually audit the allocations resulting from Westat’s work. Each year they have issued “unqualified” opinion letters, the strongest assurances available, concluding that the allocations fairly represented the CWA’s chargeable and nonchargeable expenses. Id. at 404. The employees counter with a report prepared by a professor of accounting and auditing at Harvard Business School who concluded that the Union’s method allows CWA employees to skew time reporting toward chargeable activities. The report primarily asserts that advance notice of the reporting period allows CWA personnel to bunch chargeable time during that period. JA 191. The employees argue that only contemporaneous daily time reports “with an expanded comment section requiring specific identification of the activities performed and recorded” can ensure accuracy. JA 198.
The record supports the district court’s determination that CWA met its burden of proof. The Union’s evidence established that Westat’s verification discovered few discrepancies between the time reported on the time sheets and the information gathered during its telephone checks and that the overall data did not support an inference of systematic misreporting. JA 106-08 (DiGaetano Decl. ¶¶ 13-14). In response, the employees offered no evidence that CWA in fact packed disproportionate amounts of its chargeable time into the monitored weeks. Accordingly, we uphold the district court on this issue.
D. Objection Procedures and Arbitration
Finally, the employees argue that CWA’s objection procedure violates its duty of fair representation by requiring them to object within a limited “window period” each year and to renew their objections annually. As did the district court and other courts considering similar union procedures, we find neither procedure unduly burdensome. Regarding the window period, “[t]he union, as well as the employees, have an interest in the prompt resolution of obligations and disputes. The ... window facilitates prompt resolution and leaves no doubt as to the timing of the requirement for making an objection.” Kidwell v. Transportation Communications Int’l Union, 731 F.Supp. 192, 205 (D.Md.1990), aff'd in part and rev’d in part on other grounds, 946 F.2d 283 (4th Cir.1991), cert. denied, 503 U.S. 1005, 112 S.Ct. 1760, 118 L.Ed.2d 423 (1992). Similarly, the annual renewal requirement is permissible in light of the Supreme Court’s instruction that “dissent is not to be presumed — it must affirmatively be made known to the union by the dissenting employee.” Street, 367 U.S. at 774, 81 S.Ct. at 1803. “[W]e do not consider unreasonable the [policy] provision that each member be required to object each year so long as the union continues to disclose what it must before objections are required to be made.” Tierney v. City of Toledo, 824 F.2d 1497, 1506 (6th Cir.1987).
We also affirm the district court’s ruling that CWA’s procedure requiring an objector who challenges the allocation of chargeable and non-chargeable expenses to exhaust Union-provided arbitration violates its duty of fair representation by limiting the choice of forum for the challenge. “The law compels a party to submit his grievance to arbitration only if he has contracted to do so.” Gateway Coal Co. v. United Mine Workers of Am., 414 U.S. 368, 374, 94 S.Ct. 629, 635, 38 L.Ed.2d 583 (1974). Nothing in the collective bargaining agreement requires arbitration; it is provided for only in CWA’s constitution. JA 172, 175. CWA contends that it has not in fact breached its duty inasmuch as it merely raised the arbitration issue as an affirmative defense below. The employees’ challenge, however, is to the facial validity of the CWA policy and on that score there is little doubt that the CWA’s fair representation duty has been breached.
For the foregoing reasons, we reverse the judgment of the district court regarding the Union’s notice to employees of their objection rights as well as the Union’s definition of chargeable expenses. We also reverse the district court’s denial of class certification. We remand for further proceedings consistent with this opinion regarding the Union’s notice to new employees of their right to object. In all other respects, we affirm.
So ordered.
TATEL, Circuit Judge,
concurring in part and dissenting in part:
I agree that neither CWA’s method of accounting for expenses chargeable to nonunion employees nor its requirement that objecting employees lodge their objections annually during a prescribed window violates the duty of fair representation. I also agree that CWA violates its duty of fair representation by requiring nonunion employees challenging CWA’s allocation of chargeable and nonchargeable activities to exhaust union-provided arbitration. I therefore concur in parts II.C and D of the court’s opinion. I respectfully dissent from part II.B because I believe that CWA’s notice adequately informs employees of their right to object to funding nonrepresentational activities.
In rejecting CWA’s notice, the court concludes that some employees who might otherwise object may choose not to do so out of a mistaken sense of futility because they erroneously believe that “the decision to grant a reduction rests entirely within the Union’s discretion.” Maj. Op. at 892. Yet CWA’s notice clearly states that “[t]he agency fee payable by objectors will be based on the Union’s expenditures” for representational activities. Joint Appendix (J.A.) at 74 (emphasis added). And of critical importance, nothing in the record establishes or even suggests that CWA’s notice has ever led any employees in any way to misunderstand their rights after the Supreme Court decided Communications Workers of America v. Beck, 487 U.S. 735, 108 S.Ct. 2641, 101 L.Ed.2d 634 (1988). I therefore do not believe that CWA’s use of this particular notice is arbitrary, discriminatory, or in bad faith, as is required to constitute a breach of the duty of fair representation. See Vaca v. Sipes, 386 U.S. 171, 190, 87 S.Ct. 903, 916-17, 17 L.Ed.2d 842 (1967).
As I read Beck and its progenitors, I also believe that CWA’s notice adequately informs potential objectors of the type of union activities that they are obligated to fund. The notice states that objectors must pay only for “those activities or projects normally or reasonably undertaken by the Union to represent employees in its bargaining units with respect to their terms and conditions of employment.” J.A. at 74. To me, this definition is equivalent to what the Supreme Court in Ellis v. Brotherhood of Railway, Airline & Steamship Clerks, 466 U.S. 435, 448, 104 S.Ct. 1883, 1892, 80 L.Ed.2d 428 (1984), called “the test” of chargeable expenses: “whether the challenged expenditures are necessarily or reasonably incurred for the purpose of performing the duties of an exclusive representative of the employees in dealing with the employer on labor-management issues.”
Acknowledging both the Ellis formulation and the Supreme Court’s subsequent reliance on this formulation in Beck, my colleagues conclude that Beck adopted “a more restrictive formulation of the test” by limiting chargeable expenses to “‘those germane to collective bargaining, contract administration, and grievance adjustment.’” Maj. Op. at 392 (quoting Beck, 487 U.S. at 745, 108 S.Ct. at 2648-49). With all due respect, I can find nothing in Beck or elsewhere indicating that this alternative formulation is any more restrictive than the Ellis test. While the phrase “collective bargaining, contract administration, and grievance adjustment” appears repeatedly in Beck, in my view it is but a shorthand reference to exactly the same class of activities described in the Ellis test. Had the Supreme Court adopted a more restrictive test in Beck, I doubt that it would have reiterated the Ellis formulation as its concluding paragraph. See 487 U.S. at 762-63, 108 S.Ct. at 2657-58. To my ear, moreover, the language of CWA’s policy— “activities or projects normally or reasonably undertaken by the Union to represent the employees in its bargaining units with respect to their terms and conditions of employment” — sounds like the very definition of the term “collective bargaining.” In fact, section 8(d) of the National Labor Relations Act defines collective bargaining in part as “confer[ring] in good faith with respect to wages, hours, and other terms and conditions of employment.” 29 U.S.C. § 158(d) (1988).
Nor do I think that Chicago Teachers Union v. Hudson, 475 U.S. 292, 106 S.Ct. 1066, 89 L.Ed.2d 232 (1986), will sustain the court’s conclusion that CWA’s notice provided “ ‘potential objectors’ ” with insufficient information. Maj. Op. at 391-393 (quoting Hudson, 475 U.S. at 306, 106 S.Ct. at 1075-76). Although I agree with the proposition that potential objectors to a union security clause must always receive “sufficient” information about their rights, see Maj. Op. at 391 n. 6, the issue before us is what constitutes sufficient information. Hudson answered this question only with respect to nonunion employees who have already qualified for a reduced agency fee, addressing the amount of information they need to determine whether to object further to the union’s specific apportionment of chargeable and nonchargeable activities. See 475 U.S. at 306-07, 106 S.Ct. at 1075-76. Here, unlike in Hudson, the issue is the amount of information necessary for nonunion employees to determine in the first instance whether to object to paying the union’s full agency fee. (Again, no evidence in the record suggests that any nonunion employees lacked sufficient information to understand that by objecting to CWA’s full agency fee they would be charged a reduced fee that excluded nonrepresentational expenses.) Were the appellants here challenging the sufficiency of the information that CWA provides at the second stage of its objection policy, when CWA promises objectors “a full explanation of the basis for the reduced fee,” J.A. at 74, Hudson would be relevant, but this is not appellants’ challenge. The court has thus applied Hudson to an issue Hudson did not consider, demanding far more of the union than Beck and Ellis require.
I too have some concerns about the adequacy of notice initially given new employees. But because no new employees have claimed that they received inadequate notice at the time of their hire, and because the record does not contain evidence that any new employees have been prejudiced, I would be comfortable affirming on this record. My view would be different if new employees had made such a claim and the facts were not as the union represented at oral argument.
I would affirm the district court in all respects.
. The court previously affirmed an order dismissing the employees’ first amendment claim and denying them preliminary injunctive relief. Abrams v. Communications Workers of America, 702 F.Supp. 920 (D.D.C.1988), aff'd, No. 88-7234, 1989 WL 76740 (D.C.Cir. July 13, 1989).
. In Beck the Supreme Court confirmed the jurisdiction of federal courts to evaluate section 8(a)(3) claims "insofar as such a decision is necessary to the disposition of [a] duiy-of-fair-representation challenge” even though primary jurisdiction lies in the National Labor Relations Board. 487 U.S. at 743, 108 S.Ct. at 2647-48. Here, as in Beck, the employees "claim that the union failed to represent their interests fairly and without hostility by negotiating and enforcing an agreement that allows the exaction of funds for purposes that do not serve their interests and in some cases are contrary to their personal beliefs.” Id.; see Complaint ¶¶ 5-8 (reprinted in JA 40-42). CWA, again as in Beck, defends "on the ground that the statute authorizes precisely this type of agreement.” 487 U.S. at 743, 108 S.Ct. at 2647-48; see CWA Br. at 17.
. Section 8(a)(3) makes it an unfair labor practice for an employer
by discrimination in regard to hire or tenure of employment or any term or condition of employment to encourage or discourage membership in any labor organization: Provided, That nothing ... shall preclude an employer from making an agreement with a labor organization ... to require as a condition of employment membership therein____ Provided further, That no employer shall justify any discrimination against an employee for nonmembership in a labor organization (A) if he has reasonable grounds for believing that such membership was not available to the employee on the same terms or conditions generally applicable to other members, or (B) if he has reasonable grounds for believing that membership was denied or terminated for reasons other than the failure of the employee to tender the periodic dues and initiation fees uniformly required as a condition of acquiring or retaining membership.
The provision applies to the union through 29 U.S.C. § 158(b)(2), which makes it an unfair labor practice for a labor organization or its agents "to cause or attempt to cause an employer to discriminate against an employee in violation of subsection (a)(3) of this section.”
. Moreover, an "actual” objector in one year becomes a "potential” objector the next year as a result of CWA's policy requiring workers to renew their objections annually.
. We need not consider the other proposed subclass of "free riders” or “potential objectors” since the only interest of that subclass, that of receiving adequate notice of its objection rights, is included in the interest pursued by the class of all agency shop employees.
. The dissent takes issue with our interpretation of Hudson but the quoted language makes clear that potential objectors must be given adequate notice. Although the Supreme Court addressed the issue in the context of “information about the basis for the proportionate share” of financial core expenses, 475 U.S. at 306, 106 S.Ct. at 1075, the same "basic considerations of fairness” necessarily extend to a union’s notice to workers of their right to object to payment of any expenses beyond the financial core.
. Although in Hudson the challenge to the union agency fee was made on constitutional grounds, its holding on objection procedures applies equally to the statutory duty of fair representation inasmuch as the holding is rooted in "[bjasie considerations of fairness, as well as concern for the First Amendment rights at stake.” 475 U.S. at 306, 106 S.Ct. at 1076.
. We disagree with the employees' contention that CWA must demonstrate that chargeable expenses provide an "actual benefit” to nonmembers. As the district court declared, "[p]laintiffs want CWA to have to prove that all charged ’ expenses, no matter how squarely those expenses fall with the Supreme Court's definition of chargeable ones, actually benefit them. There is no basis for such a requirement in Supreme Court precedent or in CWA's statutory duty of fair representation.” 818 F.Supp. at 404.
. In Ellis the Court stated that objectors can be required to pay "not only the direct costs of negotiating and administering a collective-bargaining contract and of settling grievances and disputes, but also the expenses of activities ... employed to implement or effectuate the duties of the union as exclusive representative of the employees in the bargaining unit." 466 U.S. at 448, 104 S.Ct. at 1892. The statement derives from the recognition that Congress permitted mandatory agency fees in order to ensure that a union could recover its expenses from employees "on whose behalf the union was obliged to perform its statutory functions, but who refused to contribute to the cost thereof.” Id. Because the union’s function under the NLRA is to "be the exclusive representative[ ] of all the employees ... for the purposes of collective bargaining," 29 U.S.C. § 159(a), the Ellis language is no more than a restatement of the established proposition that expenses must be "germane to collective bargaining.” Allen, 373 U.S. at 121, 83 S.Ct. at 1163 (emphasis added).
. The accountants do not audit the underlying data generated by Westat, accepting the data as "a recognized statistical group" and Westat's sampling methods as "recognized procedures." JA 248 (Beans Dep.).
. 818 F.Supp. at 403 and cases discussed infra.
. The holding in DelCostello v. Int’l Bhd. of Teamsters, 462 U.S. 151, 103 S.Ct. 2281, 76 L.Ed.2d 476 (1983), which the employees rely on to assert that a six-month limitations period is the applicable period within which to assert a claim based on the union’s duty of fair representation, is inapposite to the window period issue for two reasons. First, DelCostello considered only whether the state or federal statute of limitations contained in section 10(b) of the NLRA applies to a claim of breach of the duty of fair representation. Id. at 154, 103 S.Ct. at 2285. Second, an employee's annual objection to making payments to CWA above the financial core is not a claim for breach of a union's duty of fair representation.
. As the district court made clear in denying the Union’s motion for reconsideration, CWA’s policy is "if a nonmember chose to challenge CWA's fee determination before some impartial decisionmaker, the nonmember had to do so through arbitration rather than through suit in federal court, before the National Labor Relations Board, or in some other forum." 830 F.Supp. 17, 18 (D.D.C.1993) (emphasis in original). Nevertheless we believe, as did the district court, that the CWA policy is facially invalid inasmuch as "arbitration 'is the only avenue CWA provides objectors to challenge the CWA calculation,' and ... this ‘arbitrary forum choice' violates CWA's duty of fair representation.” Id. at 18 (quoting 818 F.Supp. at 407) (emphasis in original).
.Communications Workers of Am. v. American Tel. & Tel. Co., 40 F.3d 426 (D.C.Cir.1994), relied on by the union, is inapposite. The case involved the exhaustion requirement contained in the Employee Retirement Income Security Act.
| CASELAW |
Organic Chemistry Content from the guide to life, the universe and everything
Organic Chemistry
6 Conversations
Introduction to Chemical Formulae
Organic Chemistry | Alkanes | Alkenes | Alkynes | Alkanols
Alkanoic acids | Esters | Alkanals | Alkanones | Further information
Organic chemistry is a branch of science that studies carbon-based molecules and reactions1. As the name would suggest, most of its applications have to do with biological functions and medicinal research. It was first born in 1828 when Friedrich Wöhler accidentally synthesized urea2 while he was trying to synthesize ammonium cyanate, an inorganic molecule. Up until Wöhler's discovery, scientists had assumed that organic chemicals could not be created through inorganic means. Wöhler opened up an entirely new field of study for the scientific world.
Types of Organic Molecules
Some of the many types of molecules that fall under the jurisdiction of organic chemistry are as follows:
• Alkanes, alkenes, and alkynes are varieties of molecules that have a chain of carbon atoms as their basis.
• Alkyl halides are a halogen molecule (fluorine, chlorine, bromine, iodine, or astatine) bonded to a carbon atom on a carbon-based molecule.
• Aromatic hydrocarbons are carbon atoms (usually six) bonded together in a ring formation.
• Alcohols are carbon-based molecules with a hydroxide group (an oxygen atom and a hydrogen atom bonded together) attached.
• Ethers are an oxygen molecule with two carbons (or carbon chains) attached.
• Amines are a nitrogen atom with three carbon or hydrogen molecules/groups attached to it.
• Aldehydes and Ketones are two varieties of molecules with a carbon atom double-bonded to an oxygen atom.
• Carboxylic Acids are a carbon atom double-bonded to an oxygen atom with a hydroxide group attached (usually written as -COOH, although this does not represent its actual shape or bonding structure).
Other types of molecules studied in organic chemistry include esters, nitriles, and amides, but they are a bit more complicated and are used less frequently at a basic level than some of the others.
Topics and Concepts of Organic Chemistry
A great deal of time is spent in organic chemistry trying to come up with ways to synthesize different types of molecules. It is therefore necessary to study what chemicals you can use to create what you want, which entails spending countless hours staring at diagrams of reaction mechanisms. Before long, you realise that molecules can be extremely stubborn and annoying little things, refusing to do what you want them to, even if the textbook disagrees with them.
The basic point of synthesis is to put a specific atom (or group of atoms) at a specific point on another molecule. To do this, chemists can use certain chemicals, conditions, and reaction pathways. It is also sometimes necessary to eliminate or create multiple bonds between parts of the molecule.
Since there is so much of an emphasis on synthesizing molecules, it is necessary to spend time looking at each of the above types of molecule and how they react to certain types of situations. Each type of atom affects a molecule differently depending on where it is placed in that molecule, so there can be mind-boggling numbers of variables involved in determining what exactly might happen in a given reaction. However, there are general rules that apply to each basic type of molecule, and there are certain chemicals that usually work well to gain a desired affect.
Other factors involved in synthesis include stereochemistry (a painful subject that looks at the specific 3-D relationship of each atom in relation to the rest of the molecule), thermochemistry (a slightly less painful subject that looks at heat and energy to see how or if the reaction will proceed), and kinetics (which tries to determine how long it will take the reaction to go to completion).
What to Expect in an Organic Chemistry Lab
The most common characteristic of organic labs is that they smell awful. One of the chemicals frequently used in a lab is ether, which was used as an anaesthetic in the past and causes nausea. It is not uncommon for organic labs to create some pretty nasty stuff, so don't stick your nose or hands in anything unless you are absolutely certain what it is. Even then, it's not a bad idea to ask someone who knows what they're doing.
Many of the techniques and procedures in labs are fairly ubiquitous to all of chemistry, but here are some that particularly come in handy for organic chemistry:
• Synthesis procedures - most techniques for synthesis have to do with fiddling with the reaction temperature, pressure, or atmosphere. Examples might include boiling (also called refluxing) or cooling, increasing/decreasing the atmospheric pressure on the reaction pot, or conducting the reaction in the presence of a certain gas.
• Separation procedures - once a chemical has been synthesized, it has to be separated out of the rest of the chemicals used in the reaction. Some ways of doing this include crystallization, filtration, and distillation (varieties of which include fractional, steam, and vacuum).
• Analysis procedures - it does little good to separate out a certain chemical if is not then analyzed to determine its content and purity. The basic method of doing this is to use heat, a solvent, or magnetic fields to pull one chemical out of another, thereby separating a sample into its component chemicals. Each chemical can then be analyzed through whatever type of detector is appropriate. Two common analysis methods are chromatography (gas, thin layer, liquid, and column) and spectroscopy (mass, infrared, ultraviolet, and nuclear magnetic resonance).
College courses offered in organic chemistry are almost universally dreaded. This is not without good reason. They are awful. The labs in particular smell bad (trust us on this one) and only small parts of them make any sense whatsoever. If someone tells you that you should study organic chemistry, hit them over the head and then run away very fast.
1Because silicon behaves in similar ways to carbon, some branches of organic chemistry now include the study of silicon based molecules and reactions.2An organic molecule found in - you guessed it - urine.
Bookmark on your Personal Space
Edited Entry
A388217
Infinite Improbability Drive
Infinite Improbability Drive
Read a random Edited Entry
Categorised In:
Written by
Write an Entry
"The Hitchhiker's Guide to the Galaxy is a wholly remarkable book. It has been compiled and recompiled many times and under many different editorships. It contains contributions from countless numbers of travellers and researchers."
Write an entry
Read more | ESSENTIALAI-STEM |
Augmented sphenocorona
In geometry, the augmented sphenocorona is the Johnson solid that can be constructed by attaching an equilateral square pyramid to one of the square faces of the sphenocorona. It is the only Johnson solid arising from "cut and paste" manipulations where the components are not all prisms, antiprisms or sections of Platonic or Archimedean solids.
Construction
The augmented sphenocorona is constructed by attaching equilateral square pyramid to the sphenocorona, a process known as the augmentation. This pyramid covers one square face of the sphenocorona, replacing them with equilateral triangles. As a result, the augmented sphenocorona has 16 equilateral triangles and 1 square as its faces. The convex polyhedron with its faces are regular is the Johnson solid; the augmented sphenocorona is one of them, enumerated as $$ J_{87} $$, the 87th Johnson solid.
Properties
For the edge length $$ a $$, the surface area of an augmented sphenocorona is by summing the area of 16 equilateral triangles and 1 square: $$ \left(1+4\sqrt{3}\right)a^2\approx7.92820a^2,$$ Its volume can be calculated by slicing it into a sphenocorona and an equilateral square pyramid, and adding the volume subsequently: $$ \left(\frac{1}{2}\sqrt{1 + 3 \sqrt{\frac{3}{2}} + \sqrt{13 + 3 \sqrt{6}}}+\frac{1}{3\sqrt{2}}\right)a^3\approx1.75105a^3.$$ | WIKI |
Louise Dumont
Louise Dumont (née Louise Maria Hubertine Heynen; 22 February 1862, in Cologne – 16 May 1932, in Düsseldorf) was a German actress and theater director.
Life
Louise Maria Hubertine Heynen, born on 22 February 1862 in Cologne near Neumarkt, was the second of eleven or twelve siblings. Her parents were the merchant Christian Joseph Hubert Heynen (born in 1837) and Maria Elisabeth Elise Dumont (born 1836 or 1837). By 1879, Louise was working as a seamstress, following her father's second bankruptcy. Louise Dumont auditioned in 1882 at the Residenz Theater in Berlin, where she received her first role. As her artist's name she chose her mother's maiden name, Dumont. In 1888, she won an engagement at the Royal Court Theatre in Stuttgart, where she became acquainted with and a friend of Queen Charlotte of Wurttemberg. In 1898 Dumont left Stuttgart in order to join the Deutsches Theatre in Berlin, where she achieved her greatest successes, especially as a performer of pieces by Henrik Ibsen.
In 1903, she met Gustav Lindemann. As it was not possible for them to establish a theatre in Berlin because of local court intrigues, they then attempted to do so in Darmstadt, also without success. They finally succeeded in Düsseldorf, where Louise Dumont and Gustav Lindemann founded the Schauspielhaus Düsseldorf on 16 June 1904, as a direct competitor to the municipal theatre. Louise Dumont and Gustav Lindemann both contributed financially to the project, as did ten members of prestigious families like the Poensgens and the Luegs. The theatre opened on October 28, 1905, to which a theatre academy was later added. The academy trained a number of actors who significantly influenced German theatre life, such as Gustaf Gründgens, Peter Esser, Adolf Dell, Paul Henckels, Paul Kemp, Wolfgang Langhoff, Maria Alex and Henry Orthmayer.
In 1907, Louise Dumont married Gustav Lindemann. They separated in the 1920s, after which Dumont was attached to a number of young actresses, including Fita Benkhoff, Hanni Hoessrich and Luise Rainer. It has been presumed that she was bisexual.
Assessment
Louise Dumont is considered the 20th century successor to Friederike Caroline Neuber. She exerted less of a mimic-erotic fascination than a strong, convincing and defining gravity, which she understood as performing faithful service to the words of the author.
Dumont died in 1932 in Düsseldorf and was buried in the local cemetery. Her grave is decorated with a sculpture by Ernst Barlach. Her husband donated in her memory a necklace with a pearl-encircled topas that she had received as a present from Queen Charlotte of Württemberg, to be awarded to outstanding actresses during their lifetime. In 1976 she was featured on a postage stamp issued by the Deutsche Bundespost. The Louise-Dumont-Straße in Düsseldorf-Pempelfort was named after her. | WIKI |
The Lady of the Lake (poem)
The Lady of the Lake is a narrative poem by Sir Walter Scott, first published in 1810. Set in the Trossachs region of Scotland, it is composed of six cantos, each of which concerns the action of a single day. There are voluminous antiquarian notes. The poem has three main plots: the contest among three men, Roderick Dhu, James Fitz-James, and Malcolm Graeme, to win the love of Ellen Douglas; the feud and reconciliation of King James V of Scotland and James Douglas; and a war between the Lowland Scots (led by James V) and the Highland clans (led by Roderick Dhu of Clan Alpine). The poem was tremendously influential in the nineteenth century, and inspired the Highland Revival.
Background
The first hint of The Lady of the Lake occurs in a letter from Scott to Lady Abercorn dated 9 June 1806, where he says he has 'a grand work in contemplation … a Highland romance of Love Magic and War founded upon the manners of our mountaineers'. He saw this as doing for the Highlands what The Lay of the Last Minstrel had done for the Borders.
But in January 1807 he had decided to postpone the Highland work in favour of Marmion since 'it would require a journey of some length into the country not only to refresh my faded or inaccurate recollection of the scenery; But also to pick up some of the traditions still floating in the memory of the inhabitants' The poem was eventually begun during a visit to the southern Highlands at the end of August and beginning of September 1809, but in the early stages it seems not to have been composed in a straightforward manner, Scott writing to his Highland correspondent Mrs Clephane on 27 October of the same year: 'I have been amusing myself with trying to scratch out a Douglas tale but this is only for your own ear and family as I have not formed any serious intention of combining or systematizing the parts I have written'. But the poem now had its name, The Lady of the Lake.
Scott announced good progress in November and December. There was some interruption from legal business, but the first two cantos were in print by 14 March, and the next two by 14 April with the fifth in the press and the sixth within sight of completion.
Editions
The first edition of The Lady of the Lake was published on 8 May 1810 in Edinburgh by John Ballantyne and Co. and in London on 16 May by Longman, Hurst, Rees, and Orme, and William Miller. The price was two guineas (£2 2s or £2.10), and 2000 copies were printed. Several more editions followed in the same year, and in 20 February Scott informed John Leyden that 'no less than 25,000 copies have disappeared in eight months and the demand is so far from being abated, that another edition of 3,000 is now at press'.
A critical edition of The Lady of the Lake is due to appear as Volume 3 of The Edinburgh Edition of Walter Scott's Poetry.
Characters
* James V of Scotland travelling incognito as James Fitz-James, the Knight of Snowdoun
* Ellen Douglas, daughter of James Douglas
* James Douglas, once the Earl of Bothwell, the mentor of the youthful King James, now exiled as an enemy
* Allan-Bane, a bard
* Roderick Dhu, the chief of Clan Alpine, outlawed after committing a cold-blooded homicide at the Scottish court
* Lady Margaret, the mother of Roderick Dhu
* Malcolm Graeme, a young highland chief and former courtier of King James, loved by Ellen
* Brian the Hermit, a pagan prophet in the druid tradition
* Duncan, a leading member of Clan Alpine who has just died
* Angus, the son of Duncan
* Norman, a bridegroom and member of Clan Alpine
* Mary, Norman's bride
* Blanche of Devan, a lowland Scottish woman, whose bridegroom was murdered on her wedding day by the men of Clan Alpine, causing Blanche to lose her reason
Canto I: The Chase
The poem begins with a rapid-moving hunt, chasing a stag in the forests of the Trossachs. The stag outruns the hunt, exhausting all its members until only one huntsman – who, we later learn, is James Fitz-James – follows it until his horse falls down dead of exhaustion.
The huntsman blows his horn to try to contact someone, and wanders to the shore of Loch Katrine where a young woman, Ellen Douglas, rows across and picks him up in a skiff. He is then taken to a lodge, which he suspects is a concealed hide-out of a highland chief. There he is given dinner by Ellen, the bard Allan-Bane, and Lady Margaret, and a bed for the night.
That night he dreams of Ellen, only to see her face suddenly change to that of his exiled enemy, James Douglas – leading him to suspect that Ellen and Douglas are related.
Canto II: The Island
Fitz-James leaves the island first thing in the morning. Ellen and Allan Bane discuss Roderick Dhu, Malcolm Graeme, and Fitz-James, agreeing that the first is bloodthirsty and homicidal, but the only person who would defend Douglas, and that Fitz-James is an attractive person, but may be a secret foe of their kinsfolk.
Clan Alpine escort Roderick Dhu to the island, singing the boat song, 'Hail to the Chief'. Roderick asks Douglas for Ellen's hand in marriage, to conclude an alliance between Douglas and Clan Alpine, which can be the basis of an uprising against King James. Douglas refuses, partly because he will not force Ellen into a loveless marriage, partly also because he remains, despite all the injuries he has suffered, loyal to King James.
Roderick and Malcolm quarrel over Ellen, and are about to draw their swords against each other, but Douglas declares that the first to draw will be his foe. Douglas also says that it is an insult for an exile for his daughter to be the spoil of a battle between two chiefs. Roderick tells Malcolm to leave his territory, which he does, refusing even to borrow a boat, swimming across the loch to the shore.
Canto III: The Gathering
Despite Douglas' refusal to participate in the uprising, Roderick decides to commence the rebellion anyway. With a pagan prophet, Brian the Hermit, he fashions and sets alight the fiery cross, and hands it to his henchman, Malise, to summon the members of the clan to war.
The members of the clan drop everything they are doing to respond to the summons of their chief. Malise runs around the countryside, finally passing the burning cross on to Angus, the son of Duncan, a leading member of the clan who has just died; and Angus, in his turn, passes the summons on to Norman, a bridegroom, interrupting Norman's wedding.
Douglas flees the island for a hermit's cave so that he will not be associated with the Clan Alpine uprising. As Roderick is about to leave the island, he overhears Ellen singing a hymn to the Virgin. He sadly realizes that this is the last time he will ever hear Ellen's voice, and then prepares to go off to battle.
Canto IV: The Prophecy
Malise and Norman discuss the upcoming battle. Roderick has decided that the women and old men should take shelter on the island in the middle of Loch Katrine. When Norman asks why Roderick is staying apart from the main body of the troops, Malise says it is the result of a prophecy made by Brian. Roderick Dhu had consulted Brian as to what will be the outcome of the battle. To determine this, they sacrificed one of the finest animals that the clan had received from one of its cattle raids, a milk-white bull. Brian prophesied that: 'Which spills the foremost foeman's life, / That party conquers in the strife' (stanza 6; lines 2524–25).
Roderick asks if any of the local friendly clans will fight on Clan Alpine's side; when he hears that none will, he sheds a tear, but at once masters himself and says that Clan Alpine will fight in Trossachs glen. Ellen, meanwhile, is worrying about the fate of her father, who stated that they would meet in heaven next if they met nowhere else. Allan-Bane seeks to distract her by singing the ballad of Alice Brand.
When the ballad ends, Fitz-James appears. He has asked a guide, Murdoch, to bring him back to Loch Katrine. There he pleads with Ellen to leave the Highlands and elope with him. Ellen says she cannot marry him; first, she is the daughter of an outlaw; second, her heart is promised to another. Fitz-James is disappointed, but before he leaves he gives her a ring, saying that if she needs anything from the King of Scotland, she has but to present the ring and it will bring her to him and he will grant her wish.
Murdoch guides Fitz-James further, when they encounter Blanche of Devan. Blanche's bridegroom was slain by Clan Alpine on her wedding day, whereupon she lost her reason. Blanche sings a song of hunting, to warn Fitz-James that Murdoch and the other Clan Alpine men plan to trap and murder him. Fitz-James then draws his sword; Murdoch shoots off an arrow, which misses Fitz-James, but hits Blanche, fatally wounding her. Fitz-James pursues Murdoch and stabs him to death. He returns to Blanche, who warns him of the ambush. Blanche has been wearing a lock of her bridegroom's hair ever since his murder. Blanche dies. Fitz-James cuts off a lock of Blanche's hair, mingles it amidst the hair of her bridegroom, and imbrues it in her blood, promising to steep the lock in the blood of Roderick.
Fitz-James then plans to make his way out of the trap in the Highlands by walking out by night. He succeeds in doing this until he turns a rock and suddenly comes upon a mountaineer sitting by a fire. The warrior challenges him, and Fitz-James says he is not a friend to Roderick. However, the two men recognize each other as worthy warriors, and the mountaineer promises Fitz-James safe passage to Coilantogle ford. The two share a meal and go to sleep side by side.
Canto V: The Combat
Dawn breaks, and the two men set out. They begin to argue about the relations between Highlanders and Lowlanders; Fitz-James condemns the clans' thefts and feuds, while his guide responds by referring to the many appropriations and legalized crimes of the Lowlanders. Finally, Fitz-James declares that if he ever encounters the chieftain he will revenge himself in full. On this, the mountaineer whistles, and five hundred men stand up from their hiding places; the mountaineer reveals that he is Roderick. Wishing to have this combat all to himself, he dismisses the men who were waiting to ambush.
On arriving at the ford, they begin to fight, the chieftain scorning to settle their differences any other way. Though Roderick is stronger, he is less skillful, and is badly wounded; when Fitz-James stops to address him, the chieftain defiantly seizes him by the throat; but he has lost too much blood, and his strength fails him. Fitz-James wins after a long struggle, and with his bugle summons medical aid for Roderick before setting off for Stirling, where a festival is taking place.
As he approaches the castle, he sees Douglas in the distance. Douglas has come to surrender himself in order to save Roderick and Malcolm; but before doing so, he stops to participate in the games of the festival. He wins so many events that he is brought to meet the king, but the king, giving him the purse of prize-money, will not acknowledge him as an acquaintance. Provoked, Douglas names himself, and is immediately seized.
A messenger rushes up to announce that the Earl of Mar is about to begin battle against Roderick Dhu, and he is ordered to return with the news that both Roderick and Douglas have been captured and that no battle is needed.
Canto VI: The Guard-Room
The next morning, Ellen and Allan-Bane enter the guard-room at Stirling Castle, hoping to visit Douglas in prison. Ellen is taken to a furnished room upstairs to wait; Allan-Bane is shown to the cell of the gravely injured Roderick, who dies as Allan sings of the recent battle between Roderick's men and the royalist forces. Meanwhile, leaning out of the window, Ellen is startled and heartbroken to hear the voice of Malcolm, singing in one of the turrets. Soon afterwards Fitz-James arrives to tell her that it is time for her audience with the king.
Ellen enters the room and looks around for King James. To her surprise, every man has doffed his hat except for Fitz-James, and she realises that Fitz-James is the king himself.
Terrified, Ellen collapses, but the king lifts her up and reassures her that her father has been pardoned, and asks whom else she would like released. Her generous first thought is of Roderick, but James tells her that he has died. Ellen is about to ask for Malcolm, but cannot speak; divining her wish, the king jokingly orders that Malcolm be put in fetters, and after putting a gold chain around the man's neck, gives the clasp to Ellen.
Reception
The Lady of the Lake in general received a very positive critical reception, some considering it Scott's best poem to date. Several reviewers considered that defects perceived in Marmion had been eliminated, George Ellis speaking for many when he wrote in The Quarterly Review: 'The plot is not laid in the marvellous concurrence of improbable accidents; it is not obscurely and laboriously unravelled; there is no petty intricacy or entanglement; the principal actors are not contaminated by such vices as destroy our interest in their fate; there is no inattention to Scotish feelings or Scotish character; no allusions to English black letter books; and not one word about servants' liveries'. The smoothness of the style was appreciated, but there were doubts about the number of songs introduced, and their variable quality.
Influences
The Lady of the Lake continued to be a standard reading in elementary schools until the early twentieth century. Its influences are both extensive and diverse, given that both the last name taken by the leading African-American abolitionist, Frederick Douglass, and the Ku Klux Klan custom of cross burning derive from the influence of the poem (through the film The Birth of a Nation.) But, the Fiery cross or Crann Tara was a device for rallying people in Scotland and did not carry racist connotations.
Rossini's La Donna del Lago
Gioachino Rossini composed an opera, La Donna del Lago, based on the poem. The opera downplays the other plots in favor of the love story. In the opera, James Douglas tells Ellen that she must marry Roderick Dhu. Some of the characters' names are changed slightly: Roderick Dhu becomes Rodrigo, Ellen becomes Elena, and James Fitz-James becomes Uberto.
Schubert's Sieben Gesänge aus Walter Scotts "Fräulein am See"
Walter Scott's poem, in the German translation by Adam Storck, was set to music by Franz Schubert in his work entitled Sieben Gesänge aus Walter Scotts "Fräulein am See" (Seven songs from Walter Scott's Lady of the Lake). This includes the three "Ellen songs": "Ellens Gesang I", "Ellens Gesang II", and "Ellens Gesang III." Owing to its opening words, "Ave Maria", Ellens Gesang III is sometimes also referred to as "Schubert's Ave Maria". However, the music has become more famous in a later adaptation that replaced the Scott/Storck text with the Latin text of the Catholic "Ave Maria" ("Hail Mary") prayer.
Other songs from the poem set by Schubert are "The Boat-Song" beginning with the famous lines "Hail to the Chief", a mourning song sung for Duncan, "Coronach", "Normans Gesang", sung by Norman to Mary when he learns that he must join the Clan-Alpine muster, and finally "Lied des gefangenen Jägers" (Song of the imprisoned huntsman), sung by Malcolm Graeme, the betrothed of Ellen Douglas, while captive in Stirling Castle. "Boot Gesang" and "Coronach" are choral pieces, and as the other songs in the cycle are for solo voice, complete performances of the cycle are thus very rare.
Frederick Douglass
Frederick Douglass took his last name from the poem. When Douglass escaped from slavery, he changed his last name to Johnson to hide from his former master. A friend, Nathan Johnson of New Bedford, Massachusetts, proposed a new one: I gave Mr. Johnson the privilege of choosing me a name, but told him he must not take from me the name of "Frederick." I must hold on to that, to preserve a sense of my identity. Mr. Johnson had just been reading the Lady of the Lake, and at once suggested that my name be "Douglass."
Ellen Douglas Birdseye Wheaton
Ellen Douglas Birdseye Wheaton (1816–1858), author of The Diary of Ellen Birdseye Wheaton (1923, privately printed, Boston), wife of the abolitionist Charles Augustus Wheaton (1809–1882), was named for the Scott heroine by her parents.
Cross burning
In the third canto of the poem, a burnt cross is used to summon Clan Alpine to rise against King James. This method of rallying supporters and publicizing their attacks was adapted by the second Ku Klux Klan in 1915 after the film, The Birth of a Nation.
Walter Scott notes when seeking assistance from neighboring villages, Scottish highland chieftains killed a goat, made a cross of light wood, lit the four ends on fire, and extinguished the flames with the sacrifice of the goat's blood. The cross was carried to the first village by a messenger who spoke one word; the place to meet. The village would send a messenger with the cross to the next village and relay the same message.
Any man between the ages of 16 and 60 able to bear arms who failed to arrive at the appointed tryst in full battle gear met the same fate as the goat and cross – himself slain and his chattels burnt.
Classics Illustrated edition
In September 1950, the comic-book publisher, Gilberton Company, Inc., of New York City, issued Classics Illustrated number 75, "The Lady of the Lake". It was illustrated by Henry C. Kiefer, one of Gilberton's best graphic artists for the comic-book genre. The editor was Helene Lecar, who transformed the cantos into a concise narrative that would be interesting to school-age children. It has 44 pages devoted to the story by Sir Walter Scott, plus one page of biography of Sir Walter. Classics Illustrated number 75 originally sold for 10 cents, and tens of thousands of copies were printed on cheap newsprint. It remains a collector's item more than six decades later, and is widely sold in used comic-book stores.
Dramatisation
Henry Siddons' adaptation of the poem for the stage was produced at the Theatre Royal, Edinburgh in 1811 and the Theatre Royal, Dundee in 1812.
Film adaptation
In 1928 the poem served as the basis for a silent film The Lady of the Lake directed by James A. FitzPatrick and starring Percy Marmont and Benita Hume. It was made at Islington Studios by Gainsborough Pictures. | WIKI |
Smashing Square Pegs into Round Holes! Because yet another Linux Distro would just be Bloody Stupid!
This is the second pseudo-release of Bloody Stupid Linux, which of course has nothing to do with the first release. The first BSL was a 50Mb ISO Live run CD based on DamnSmall Linux. I had a lot of fun hacking around DamnSmall, and apparently it drew a little attention. John, the lord master of DamnSmall, even was kind enough to link to me off of the DSL relatives page. I got a few mails, most about the image to the right, about a hundred downloads or so, and some of those were even people I didn't know. However, making a DSL mod distro was just too useful, I needed to do something Stupid, so here we go with 0.02a:
Introducing Bloody Stupid Linux 0.02alpha
BSL 0.02a is based around an initramfs compiled into the kernel. ( for specifics on setup, take a look at the README) Here's how it works:
• 1. The BSL kernel boots, this can be using the provided floppy image, ISO, or if you like, CF, or if you're feeling really sexy: PXE booting. The BSL kernel doesn't need to turn around and have support for whatever it just booted from, so basically anything you can get an x86/x86-64 BIOS to boot, you can get the BSL kernel to work.
• 2. The kernel unpacks its 800kb root filesystem cpio archive into ramfs. This was compiled into the kernel, and was basically the whole reason for this project. Once I read the menuconfig description it seemed too neat not to try. Now that's stupid!
• 3. Init fires off on the mini filesystem (which is built entirely on BusyBox), its a very short ash script that:
• A. Looks to see if there's 256Mb of system RAM available. If not, it makes fun of you and drops to a shell.
• B. Tries to get a DHCP lease, failing that it will prompt for the usual: IP, gateway IP, netmask, and the IP of the image server (we'll get to that in a minute.)
• C. Mounts some ramdisk, wget's a tarball of its modules from the image server, unpacks that, and then tries to modprobe all of them.
• D. Mounts some more ramdisk, wget's a 53Mb tarball of a Slackware root filesystem from the image server, unpacks that, pivot_root's over to that and fires off the local Slackware /sbin/init.
• 4. The 53Mb tarball unpacked to a 170Mb-ish Slackware that runs through its init up to runlevel 3, starting sshd and no other network daemons. The root password, unsurprisingly is "bsl". The only differences between it and a fresh Slackware install are:
• A. /etc/rc.d/rc.S has been edited not to overwrite /etc/motd at boot.
• B. /etc/motd has been changed to display a Bloody Stupid message.
• C. /etc/hosts and /etc/HOSTNAME have been set to bloodystupid.bloodystupid.org
• D. /etc/rc.d/rc.udev has been chmod'd non-executable. I was having issues with udev and the fact that / was tmpfs.
• E. /etc/inittab has been changed so that instead of agetty you just get bash on all 6 of the basic ttys. No need to login, thanks again to Knoppix for making that easy.
• Why go to all this trouble? The BSL kernel is basically a life support system for ram and network cards, since it wget's support for everything else on the machine the kernel is very small. The initial aim was to fit it on a single floppy, then PXE booting became attractive, and really, since the kernel doesn't need to support whatever it just booted from in order to have its root filesystem, its very flexible. Yeah, I know an initrd can do the same thing, but its more fun this way. As it stands, BSL makes for an excellent repair system, the framework for a bulk installer, a neat toy, and an alright thin client ( as long as you've got a gob of RAM handy.)
Most of all, this whole thing is incredibly hackable. If you wanted to use a different slackware image, just tar one up, name it image.tar.gz and stick it in the /bsl directory of your image web server. If you need that image to unpack to larger than 170Mb, hack up the init script in the cpio archive, rebuild the archive, then recompile the kernel... sounds like a lot, but it really isn't. Want to replace the whole image with Debian/SuSe/Fedora/Arch/DSL/Gentoo? Go to it!
For anyone interested in how bad of a DSL/Knoppix Hacker I was, the old 0.1 ISO is Here
2b22a51f24ad91176d8e2d276adbb3cc BSL-0.1.iso
Right now 0.1 looks marginally functional.
root: bsl
bob: whatever
Cheers,
Finegan
fin@bloodystupid.org | ESSENTIALAI-STEM |
Wikipedia:Reference desk/Archives/Miscellaneous/2012 June 28
= June 28 =
Clock with red areas
It's a picture of a clock with red areas on the dial. Do they serve a purpose or just decoration?
http://i49.tinypic.com/humznl.png
<IP_ADDRESS> (talk) 10:14, 28 June 2012 (UTC)
* We probably need more context. Where is the clock found? --Tagishsimon (talk) 10:19, 28 June 2012 (UTC)
* It's a radio room clock - see 500 kHz for an explanation. -- Finlay McWalterჷTalk 10:38, 28 June 2012 (UTC)
* Although Finlay directed you to the relevant article, I think a brief answer here is in order: The red areas mark the times during which radio stations using the international distress frequency of 500 kHz should stop transmitting and listen to see if any distress calls are being sent. --Thomprod (talk) 21:37, 30 June 2012 (UTC)
Typing pinyin
What are the alt codes for a, e, i, o, and u with the macron and caron, and what are the alt codes for ü with all four accents (acute, grave, macron, and caron)? --<IP_ADDRESS> (talk) 16:11, 28 June 2012 (UTC)
* Check the page on Alt codes; the references at the bottom of the page will answer your questions. -- <IP_ADDRESS> (talk) 16:52, 28 June 2012 (UTC)
* That page doesn't have alt codes for any of those characters. --<IP_ADDRESS> (talk) 21:16, 28 June 2012 (UTC)
* I don't know how accurate this page is, but it lists codes for all of the pinyin vowels. Marco polo (talk) 14:27, 29 June 2012 (UTC)
* Those don't work. --<IP_ADDRESS> (talk) 16:16, 29 June 2012 (UTC)
* Don't work in what way? If they produce no result (i.e. you type and nothing appears on-screen), you should check you are using the numeric keypad. See the instructions here: http://tlt.its.psu.edu/suggestions/international/accents/codealt.html#using. If you mean that the character produced is not correct, something else is wrong. Post back here if that's the case. - Cucumber Mike (talk) 16:31, 29 June 2012 (UTC)
* That numeric keypad link led me through a series of other articles you might find useful - first to Chinese input methods for computers, which links to Google Pinyin, which links to Pinyin input method. You might find something useful in one of those. - Cucumber Mike (talk) 16:34, 29 June 2012 (UTC)
Hawks
I have a neighbor that is scared to death to leave her Yorkie (dog) out because we have red-shouldered hawks in the area. I tell her they will not carry her off. Am I right? I told her she should worry more about the Great Horned Owl. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:05, 28 June 2012 (UTC)
* Yes. And yes. The Red-shouldered hawk is quite small; unless her Yorkie is the size of a chipmunk, it probably outweighs the poor hawk handily. Horned owls on the other hand are larger and much more ambitious... Matt Deres (talk) 18:54, 28 June 2012 (UTC)
* A ball and chain attached to the dog's collar will prevent even a horned owl from carrying off its carcass. μηδείς (talk) 19:45, 28 June 2012 (UTC)
* As would cementing the dog's paws into the pavement. Arguably it's not very useful advice though. --Tagishsimon (talk) 19:55, 28 June 2012 (UTC)
* Especially not if it's a spherical Yorkie. μηδείς (talk) 20:08, 28 June 2012 (UTC)
Why did New Math fail?
From what I've read about it, it seems like it was a lot better than current math instruction. The focus on abstraction especially seems like it would've been helpful. --<IP_ADDRESS> (talk) 19:48, 28 June 2012 (UTC)
* The focus on abstraction was precisely the problem -- it produced people who were unable to deal with the concrete. Our article New Math covers the issues reasonably well. As a personal note, I think the criticisms tend to be a bit overstated -- I went to elementary school during the New Math era myself, and the techniques worked reasonably well for me -- however I ended up going to graduate school in math, so perhaps my ability to handle abstraction is a bit better than most people's. Looie496 (talk) 20:02, 28 June 2012 (UTC)
* It failed for two reasons mentioned in different parts of the article. Primarily, it failed because the concepts of math are cumulative and, to use Looie's terms, children must master the concrete to the point of automatization before they can conquer more abstract notions. The second problem was that most teachers did not themselves fully grasp the notions. μηδείς (talk) 21:49, 28 June 2012 (UTC)
* Abstract concepts are easier to grasp than concrete ones (i.e. rote memorization of multiplication tables, etc.). --<IP_ADDRESS> (talk) 21:58, 28 June 2012 (UTC)
* ... only for some people at some ages. D b f i r s 22:09, 28 June 2012 (UTC)
* 146 is incorrect, unless he's an unusual genius and can do it that way. Learning by the young needs to go from the specific to the general, not the other way around. Tom Lehrer, who taught university-level math, said it well during his song about New Math: "In the new approach, the important thing is to understand what you're doing, rather than to get the right answer." ←Baseball Bugs What's up, Doc? carrots→ 00:08, 29 June 2012 (UTC)
* It's not a question of ease, but of priority. There is some leeway. But learning to count precedes addition, which precedes multiplication, which precedes algebra, which precedes calculus. Some higher level concepts like powers may take much less effort to learn than mastering the multiplication table, but doing so cannot precede learning the multiplication table. μηδείς (talk) 01:56, 29 June 2012 (UTC)
* I would also just add that it's not clear that it really "failed" in the sense of being expunged. When I was in high school in the early 1990s, I was in a New Math-like program (Interactive Mathematics Program) that focused on concepts rather than rote. Frankly I found the concepts very easy by comparison to the rote, but one doesn't always want to start every calculation problem from first principles. My mathematical skills are pretty crap and have been since then; I somewhat wonder if I had been taught by rote I'd be a bit better off. I can still do all of the rote math that I did in elementary school; pretty much everything from high school onward is lost except for things that were reinforced by rote (like SOCATOA and all that). Just my two cents, results no doubt vary with the student. --Mr.98 (talk) 03:23, 29 June 2012 (UTC)
* New Math was introduced in elementary school, or was in my day. I am not sure exactly what you would have been learning by rote in high school, when things like sets, modular math, estimation, and bases and the like would actually have been appropriate. μηδείς (talk) 06:04, 29 June 2012 (UTC)
* There's lots of formulas in algebra, trig, and geometry to memorize, from the quadratic formula and Pythagorean theorem on up. StuRat (talk) 06:06, 29 June 2012 (UTC)
* I think that's pretty typical. Things we learn but never use are soon forgotten. This does bring up the question of why we spend years of our lives learning things we will never remember. There must be a better way, with far more specialization in our chosen field. StuRat (talk) 05:54, 29 June 2012 (UTC)
* How many 7 year olds have a "chosen field" already? As for learning stuff that in retrospect seems "useless", it was in fact useful in broadening your scope of experience and exposure to things, and with helping to discipline your mind. ←Baseball Bugs What's up, Doc? carrots→ 13:34, 29 June 2012 (UTC)
* snap. FiggyBee (talk) 14:55, 29 June 2012 (UTC)
* crackle. pop. so what do kellogg's rice crispies have to do with anything? ←Baseball Bugs What's up, Doc? carrots→ 23:43, 29 June 2012 (UTC)
* 7 ? That seems a bit early. I probably remember just about everything I learned in school then, since I do use basic math, vocabulary, etc., every day. I'd have a standard curriculum up through grammar school (10-11), then allow students to specialize, depending on their interests. StuRat (talk) 05:48, 30 June 2012 (UTC)
* One, because many children may be interested in mathematics, languages, science etc, but would never have been exposed to it otherwise. How can you have a "chosen field" if you've grown up with no education, in a house with no books and Jersey Shore on the TV? Two, because the most important thing people learn in school is not the content of the lessons, but to sit down, shut up, and do what they're told. :) FiggyBee (talk) 13:34, 29 June 2012 (UTC)
* That's an important lesson, to be sure. ←Baseball Bugs What's up, Doc? carrots→ 23:43, 29 June 2012 (UTC)
* They would be exposed to a bit of every field early on, enough to know what they like and don't like. As for forcing kids to study subjects they hate, this probably is largely responsible for the massive dropout rate in many places. Learning should be fun. Even if they stay in school and learn things they hate, long enough to graduate, those items will be forgotten almost immediately. StuRat (talk) 05:51, 30 June 2012 (UTC)
* New math, like anything new, really, would have to be MUCH better to justify switching to a new method. Otherwise, it doesn't justify all the confusion caused when people using the two different systems try to communicate. Is new math that much better ? It looks like it's not. StuRat (talk) 05:54, 29 June 2012 (UTC)
* My father taught new math in the early 1970s. He said that the mathematically gifted students would learn the abstractions being taught and then be able to reason out the specific examples for themselves, so they learned more than they would have if they had just learned by rote. Average students, on the hand, were completely baffled by it and didn't learn much of anything.--Wikimedes (talk) 07:28, 29 June 2012 (UTC)
* Must have also led to some disastrous tutoring sessions where the gifted students tried to teach the others. StuRat (talk) 07:40, 29 June 2012 (UTC)
* I did New Maths, the Schools Mathematics Project, loved it, and we were expected to tutor each other, and that worked too. But that was with a particularly good teacher, and the system was too dependent on having good committed teachers. The French national curriculum incorporates some elements that in UK/USA were in New Math(s), in particular the emphasis on functions. I still think that the main New Maths route is a logical one. A bit of set theory, not so much it gets dull, just element, union, intersection, Venn diagrams. Then map one set onto another. One-to-one/one-to-many/many-to-one mappings, they can see when there is and isn't an inverse. Then introduce function terminology and notation, using arithmetical examples. Graphing functions, distinguishing linear, quadratic and cubic functions. Trig functions, and this helps to show that trig isn't just a headache introduced for no reason. And then with luck they should be able to grasp the idea of a derived function. Itsmejudith (talk) 08:28, 29 June 2012 (UTC)
* There were often tutoring sessions where gifted students taught the others, StuRat. I was one of those students, and I taught dozens of my classmates. The sessions were far from disastrous, however; they were very straightforward and quite successful. Sometimes the others just needed one-on-one attention that a classroom teacher could not provide. → Michael J Ⓣ Ⓒ Ⓜ 12:41, 29 June 2012 (UTC)
From reading the Wiki-article, I think they got the balance between setting up rigorous frameworks and just teaching about maths wrong. In my learning and teaching experience, I've found that it is important to separate the two things. On the one hand you want to be able to teach a lot about mathematics so that it becomes interesting. You then don't want to be constrained to have to stick to formulate everyting you do in the form of rigorously proven theorems. On the other hand, you have to later prove things rigorously.
This is how we teach most other subjects. In case of languages, you don't wait with reading books, writing etc. until they have mastered grammar perfectly. Only in math do we have this ridiculous attitude and the results are abysmal. We end up teaching the same stupid sums over and over again, boring school children to death. Because they then don't do very well on average, we wrongly interpret this as these sorts of problems being close to the limit of their abilities. But these same children don't have any problems doing things on their computer that involves more logical/abstract thinking than you need to solve graduate level university math problems. Count Iblis (talk) 15:56, 29 June 2012 (UTC)
* As recently as 2004 Norway introduced "The Knowledge Promotion"Kunnskapsløftet to school education with a new maths curriculum Matematikk (here in norwegian). One might expect it to recognize the ubiquitous pocket calculator and/or computer owned by every norwegian child, which was not the case when the New Math was conceived in the 1960s. In fact it fails at an elementary level: the symbols that the teacher uses for elementary arithmetic operations of addition, subtraction, multiplication and division are respectively + — . :. If everyone agrees to use one symbol for one thing, it doesn't matter what that symbol is. However this teacher does a disservice to an 8th grade pupil who may need in future to share and understand mathematics with non-norwegians, who already has a calculator whose keys look like this and who will routinely encounter advertisements that say SALE ÷ 20% (a deprecated usage of the obelus noted here ). DriveByWire (talk) 18:28, 29 June 2012 (UTC)
* I'd be very confused if I saw that advert. Is it common in Norway? D b f i r s 07:13, 30 June 2012 (UTC)
* It is routinely seen in newspapers, the streets of the capital Oslo, and in Denmark, especially during the January sales. "Salg" is Sale in Norwegian. DriveByWire (talk) 01:21, 2 July 2012 (UTC)
German symmetry minute
On tonight's meander through Wikipedia I came across the article on Clock-face scheduling, which contains this fascinating sentence: "These developments have led to "integrated timetable islands", which all do adhere to the Germany-wide symmetry minute (58½), which is used also in Switzerland and partially in other European Countries."
I can't for the life of me think what a 'Germany-wide symmetry minute' is, but it sure sounds interesting. Can anyone shed any light? - Cucumber Mike (talk) 20:08, 28 June 2012 (UTC)
* This is not easy to figure out. The concept developed in European transport scheduling, and the term derives from the German word Symmetrieminute. In fact, the German Wikipedia has a long article about it, http://de.wikipedia.org/wiki/Symmetrieminute. The basic idea, to the extent that I understand it (which is not a very great extent), is to arrange routes so that both arrivals and departures occur at the same time each hour. The usual setup, I gather, is for routes to begin at 1½ minutes before the hour. Why they do it that way, I can't make out. It seems like the sort of thing that only a German engineer could dream up. Looie496 (talk) 21:08, 28 June 2012 (UTC)
{e/c}This seems to be a translation of the German wiki page, and that has a link to de:Symmetrieminute. Basically you have a whole lot of rail routes running an hourly frequency in both directions, pick major stations one hour apart as interchange hubs, where trains arrive at :57 each hour and depart at :00 allowing change of train. At any other station t minutes from the hub, the standard times are 58½-t in one direction and 58½+t in the other as shown in the diagram on that page. I think that's it anyway. Sussexonian (talk) 21:10, 28 June 2012 (UTC)
* Knooppuntdienstregeling.gif. I must admit that the German article hasn't really made this much clearer for me (especially since my German isn't really up to dealing with all the technical terms, so I'm relying on GTranslate. That gives me delightful sentences like "The determined in this way symmetry minute is initially a code that help can be determined as follows: When traveling from place A to a given route to a destination B at a different route and return the transfer time in the opposite direction can only be accurately the same if both lines have the same symmetry time. At various times symmetry is that the difference of the transfer times of the direction and the opposite direction is always twice the difference of the symmetry times."
* I can sort of see why it's useful for trains to arrive at set times past the hour (buses in London are often advertised on timetables as 'at the following minutes past the hour: 00, 12, 24, 36, 48') but there seems to be more in it than that, all to do with interchanges, and a rather complex gif (right). I'm genuinely interested in why this system is beneficial. Can anyone help to translate the de article? - Cucumber Mike (talk) 16:47, 29 June 2012 (UTC)
* Well, that gif is useless because it looks like the trains are just going backwards and forwards between two stations each, when actually they are going along whole routes and there are other trains going in the other direction. As far as I can tell, the idea behind this "symmetry minute" is just so that you never have to wait around for a long time when changing trains. Regardless of what train you are getting off, it will get into the hub at 3 minutes to the hour and, regardless of what train you are getting on, it will leave the hub on the hour. That means when you aren't at a hub, the train times in one direction are always the mirror image of the train times in the other direction. The system seems to rely on having trains that are on time, though, so wouldn't work in Britain. Our official statistics only consider a train to be late if it is more than 5 minutes late, or 10 minutes for long distance trains, so if we used a symmetry minute we would constantly be missing our connections. Instead, we just coordinate certain timetables where there are a lot of people wanting to move from one train to another and it is practical to have that train wait for the first one to arrive. --Tango (talk) 06:52, 30 June 2012 (UTC)
* Actually the British definition is that a (long distance) train is only officially late is it's over 10 minutes late at its final destination. This gives rise to little timetabling ruses, e.g. the London to Crewe local London Midland services is timetabled to take 14 minutes between Euston and Watford Junction, but incoming trains to Euston are allowed 18 minutes from Watford, which of course improves the chances of a train arriving "on time". -- Arwel Parry (talk) 12:38, 30 June 2012 (UTC)
* Can we imagine the chaos of allowing only 3 minutes to change trains at Clapham Junction? Itsmejudith (talk) 12:50, 30 June 2012 (UTC)
travel to america
so, I'll be spending a couple of weeks in america soon, but I'm wondering, having never been there before, what else than flights do I need to organise? any need to sort out a visa or some such beforehand? any idea where I can get a nice travel insurance at short notice? what else might I need to get organised still? thanks so much for your help
<IP_ADDRESS> (talk) 20:20, 28 June 2012 (UTC)
* Google is your friend --Tagishsimon (talk) 20:24, 28 June 2012 (UTC)
it's a nice list, but I can't see whether I need a visa, how to get one or where to buy insurance... <IP_ADDRESS> (talk) 20:35, 28 June 2012 (UTC)
* Things like visas and insurance are pretty important, did you not think about them before you booked the flights? should have all the info you need-- Jac 16888 Talk 20:48, 28 June 2012 (UTC)
* Noting that the IP geolocates to London -- if you are a British citizen, you won't need a visa, although you will of course need a passport. Looie496 (talk) 20:52, 28 June 2012 (UTC)
* <IP_ADDRESS> probably doesn't need a visa, but not all UK passport holders qualify for the waiver. -- Finlay McWalterჷTalk 20:56, 28 June 2012 (UTC)
* As your IP suggests you're in the UK, I'll answer with regard to that. You may not need a visa. See Visa Waiver Program for those that don't (it depends on your citizenship, type of passport, and some other stuff like arrest record); if you qualify you fill out an ESTA online a few days before you travel - it's your responsibility to ensure that you do qualify (those articles link to US government website that explain), and if you don't they'll refuse you entry. If you don't qualify, you need a tourist visa from the US embassy in London (and you're probably much too late to apply for that). You can get travel insurance from any travel agent, insurance office, supermarket, or from the post office. Phone your credit card company and tell them you're going, so they don't see the unusual transactions and cancel the card when you're abroad. -- Finlay McWalterჷTalk 20:56, 28 June 2012 (UTC)
OK, this is fun, to get an ESTA organised, I need flight information, but I don't know what flight I'll be getting until I know how long it'll take for the ESTA to be organised. any advice? <IP_ADDRESS> (talk) 22:12, 28 June 2012 (UTC)
* ESTA doesn't take any time to be organised - there's no paperwork. It's just a website; you go there 3 days before your flight leaves and enter a small amount of info (e.g. "are you a war criminal [yes/no]") and you pay online. -- Finlay McWalterჷTalk 22:18, 28 June 2012 (UTC)
is it three days? the website implied that it was about that, but could potentially be more or less in some situations <IP_ADDRESS> (talk) 22:40, 28 June 2012 (UTC)
* It's 1 minute, really. ESDA is just a formfill; it's not a visa, and having done it doesn't amount to any human having looked at your records and approved anything. It's the electronic equivalent of mailing in a paper form, but they don't mail you back. They only say 3 days because they don't want you to wait until the last day and find the website is broken that day. -- Finlay McWalterჷTalk 23:46, 28 June 2012 (UTC)
Entry to USA can be severely complicated if you have a criminal record. Some useful links and a bunch of anecdotes here. The cynical line seems to be that it's a problem especially (rather than even) if the record is for petty crime, the implication being that if you'd done something seriously bad, you'd be welcomed. Not sure that's true. --Dweller (talk) 07:01, 29 June 2012 (UTC)
* It's not a criminal record, just an arrest record, that matters. Some crimes count, some don't - the test (which is complicated, and subject to much interpretation) is moral turpitude. It's an archaic and rather odd standard - someone with several recent convictions for loan sharking (surely someone many Americans would feel at least ambivalent about letting in) would qualify, but someone with a 30 year old police caution for shoplifting an apple would not. Rather than trying to interpret what CBP will consider "moral turpitude", various US embassies simplify that with advice that reads something like "Under United States visa law people who have been arrested at anytime are not eligible to travel visa free under the Visa Waiver Program(VWP); they are required to apply for visas before traveling." -- Finlay McWalterჷTalk 12:48, 29 June 2012 (UTC)
* Do the British police really cooperate with the Americans to share information about unconvicted arrests? --Dweller (talk) 13:10, 29 June 2012 (UTC)
* I don't know, and I don't think they're very specific about saying what they share and how far back. The trouble is that if you chance not disclosing your apple-thieving past, you risk the bureaucratic tangle of supplementary inspection and expedited removal. -- Finlay McWalterჷTalk 13:17, 29 June 2012 (UTC)
* Extraordinary. --Dweller (talk) 13:28, 29 June 2012 (UTC)
* I can't comment on the specifics of the US, but I'm pretty sure when it comes to tourists most countries rely primarily on honesty when it comes to things like arrest or criminal records. (Immigrants or those planning to stay for long periods may be required to provide the records.) Similar to what FM said, when people lie, they're likely to find themselves deported at a minimum (which may make it almost impossible to get back in to whatever country in the future, and likely even more difficult in others even if you could have gotten in with just the crime or arrest) and probably fined, and in some countris possibly even detained or arrested so there is a disincentive to lying. There is of course the risk immigration authorities will be aware of the information, e.g. suggests Canada and the US share most information on arrest and criminal records. Nil Einne (talk) 14:21, 29 June 2012 (UTC)
* BTW the above ref also suggests the UK does not routinely share such information with the US immigration officials (I didn't mention it because I wasn't confident on its accuracy), but (original source ) and seem to confirm it's the case. Even Australia and NZ don't routinely share such information . This doesn't mean I'm suggesting you lie, as I mentioned it seems a dumb idea particularly if you have a fair chance of being allowed in anyway with some additional bureaucratic hurdles. Nil Einne (talk) 15:33, 29 June 2012 (UTC)
I don't know specifically about the US, but given what I've read I doubt they'd be very different from NZ and Australia. If so, bear in mind technically qualifying for the visa waiver (i.e. right passport, no criminal record, having a return ticket) doesn't mean you'll actually be allowed in. If whoever processes you when you arrive doesn't believe you are genuinely going for the purposes allowed by the visa they probably have the right to reject you. Organisaing your travel at the last minute to the extent of not even knowing what you have to do or how you're going to get there is likely to be a big red flag. Coming from the UK will reduce concerns some what (although not if you've recently travelled to various parts of Africa, South America or Asia). If I were you, I would at least contact the US embassy and explain your situation. You also want to make sure you have things like travel plans, accomodation and finances sorted since the lack of these are likely to be additional red flags. Nil Einne (talk) 10:15, 29 June 2012 (UTC)
* One of the key things to gaining admission to any country (if you are not planning to immigrate to that country) is clear evidence of a paid return trip to your home country, in your case, proof that you have paid for your return flight. Other key things are 1) evidence of prearranged overnight accommodations at least for your first night or two, such as a hotel or hostel reservation confirmation, and 2) proof of funds sufficient to cover your expenses during your trip. Something like a bank statement should show that you have more than enough readily available money to cover your travel plans — maybe $100 or roughly £60 for each day of travel if you plan to get around by bus and stay in youth hostels, more if you plan to stay in nicer hotels or hire a car with more evidence of prepaid flights helpful if you plan to get around on domestic flights. That said, unless you have an arrest record or have traveled to countries viewed by the US government with suspicion (such as Yemen or Pakistan), if you are a UK native and have enough money for your trip, you should not have any problems. Marco polo (talk) 14:20, 29 June 2012 (UTC)
where in the world are the urban cabel cars and what do they do?
where in the world are the urban cabel cars and what do they do? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:05, 28 June 2012 (UTC)
* Do you mean this type of cable car, or this one? San Francisco has the U.S.A.'s most famous one of the former. Bielle (talk) 21:49, 28 June 2012 (UTC)
* The new Emirates Air Line (cable car) will take visitors across the Thames to the 2012 Summer Olympics. Alansplodge (talk) 23:30, 28 June 2012 (UTC)
Kindle 3G and Wikipedia language editions
I'm planning to finally get a Kindle 3G Touch, with the intention of using it mainly as a traveling companion. One of the biggest selling points for me is that I'd be able to use Wikipedia for free while on the road - that alone would cut down the number of travel guides I have to lug around by about a dozen per trip :) . I read our article and did a bit of googling around, but I don't seem to be able to find out whether the Kindle can access en.wikipedia only or all language editions. I'd sure miss it.wikipedia and fr.wikipedia while traveling...can anyone who owns a Kindle 3G shed any light on this? As a side question, if the Kindle is able to display all language editions, is its web browser able to display Kanji? If it isn't, accessing the Japanese Wikipedia might be slightly difficult. Thanks in advance, Ferkelparade π 23:08, 28 June 2012 (UTC)
* The Kindle 3G accesses Wikipedia through an experimental browser. You can use the browser to access pretty much any website, though navigation can be slow, and I had trouble accessing email through my Kindle Keyboard when I first got it. Having just typed jprs.jp into my Kindle, I can confirm that it displays Kanji (or something similar - I can't read Kanji).--Wikimedes (talk) 07:59, 29 June 2012 (UTC)
* Thanks - so I can actually use the web browser over 3G and not just over Wifi? I read conflicting things about that, the latest articles I read seemed to indicate that web browsing over 3G was limited to amazon's whispernet which provides a mirrored copy of Wikipedia (hence my question, I was curious whether they provide a mirror of en.wikipedia only or of the whole range of languages). -- Ferkelparade π 15:21, 29 June 2012 (UTC)
* Are you sure whispernet provides a mirrored copy of Wikipedia? Since whispernet is simply Amazon's cloud storage solution which deliver documents over either 3G or wifi, I don't get why they'd bother mirroring wikipedia on their cloud storage unless the do something like remove images or compress it in some way. The big data cost is going to come from the last mile for the mobile (3G) connection, it's unlikely delivery from their cloud storage is going to save much money. Unless perhaps they can't be bothered limiting whispernet access to the wikimedia servers properly so it's easier for them to just limit access to their mirror. (But I believe the WMF is fine with working with companies interested in providing wikipedia access for free, e.g. the zero project.) Or do you mean they deliver a mirror of wikipedia over whispernet (I guess only when wifi is present otherwise they could easily spend more data by caching the whole of wikipedia for everyone) which is then cached locally? Either way, many sources quoting Amazon's clarification on the webbrowser seem to suggest you can access wikipedia (but not other sites) over 3G, although don't explicitly mention if it's from the wikimedia servers or some Amazon cloud cache . Bear in mind if they've set up their limiting poorly, you may still be unable to access non English wikipedias even if it's coming directly from the WMF servers (the servers are the same, but the domains aren't if they aren't using the old secure site). In the absence of someone confirming it here, your best bet may be to ask Amazon and hold them to their word. Nil Einne (talk) 15:54, 29 June 2012 (UTC)
* The Touch Kindle 3G seems to only allow the Experimental Browser over WiFi. The keyboard Kindle 3Gs allow it over 3G as well. Not sure how that impacts the question, though; I have a keyboard Kindle 3G though and can definitely access any language Wikipedia with it. On the keyboard Kindle, when you highlight a word, you can look it up on Wikipedia automatically, which just shunts it off to the Experimental Browser. So if there are really 3G limitations there, they would almost surely apply. Don't have a Touch to test it with, alas. The Japanese Wikipedia looks fine on it, though I don't read Japanese. But it's got all the Japanese-looking characters. I'm a little dubious that Whispernet is "mirroring" Wikipedia, but I don't really know. --Mr.98 (talk) 16:48, 29 June 2012 (UTC)
* I had the older Kindle Keyboard 3G, which probably has the same terms as the Kindle Touch 3G. I could access any website (that didn't require plugins) over WiFi, but only Wikipedia over 3G. I could access both the English and Spanish Wikipedias, and I could do so in multiple countries (New Zealand and Argentina). Access was to the live Wikipedia (and I could access the mobile Wikipedia also at m.en.wikipedia.org). I even made an edit with it, although it was a painful process without a touch screen. I would recommend you use the "Chick" skin for Wikipedia with a small screen such as the Kindle's as it removes the left toolbars and gives you more screen space.- gadfium 22:38, 29 June 2012 (UTC)
* I would not assume, a priori, that the Touch and the Keyboard Kindle 3Gs have the same capabilities. That is the technical point of contestation in most of the posts on the subject; the Touch has differently listed abilities as the Keyboard (it only says browser over WiFi), and it's not clear whether that is entirely inclusive or not (in terms of meaning, only over WiFi, and not 3G). I don't know the answer, personally. --Mr.98 (talk) 02:47, 30 June 2012 (UTC)
* Well the link above with the clarification from Amazon at the time of launch appears to agree it means browser only over wifi. But it excludes wikipedia. I don't really understand why gadfium has a different experience from what the Kindle Keyboard is supposed to support (as their experience is similar to what the Touch appears to be like), but perhaps the experimental browsing over wifi is only promised for those in the US? I believe Amazon has been somewhat inconsistent in where you can use the 3G and whether you have to pay any additional fees. (Their desire to keep things simple and let people use 3G inmost places without fees is likely one of the reasons why they exclude browsing over 3G in the Touch, with wikipedia being important enough that they are probably willing to bear the cost as they do with content they sell.) Nil Einne (talk) 11:21, 30 June 2012 (UTC)
* The Kindle Keyboard 3G allowed full access to the internet via 3G only in the USA. I believe the Kindle touch has the same limitations (only Wikipedia via 3G) in the USA as in other countries. My earlier post failed to make clear that I was not considering US users.- gadfium 01:05, 1 July 2012 (UTC) | WIKI |
Catalogo Articoli (Spogli Riviste)
OPAC HELP
Titolo:
CENTRAL ANTITUSSIVE ACTIVITY OF THE NK1 AND NK2 TACHYKININ RECEPTOR ANTAGONISTS, CP-99,994 AND SR-48968, IN THE GUINEA-PIG AND CAT
Autore:
BOLSER DC; DEGENNARO FC; OREILLY S; MCLEOD RL; HEY JA;
Indirizzi:
UNIV FLORIDA,COLL VET MED,DEPT PHYSIOL SCI GAINESVILLE FL 32610 SCHERING PLOUGH RES INST,ALLERGY KENILWORTH NJ 07033
Titolo Testata:
British Journal of Pharmacology
fascicolo: 2, volume: 121, anno: 1997,
pagine: 165 - 170
SICI:
0007-1188(1997)121:2<165:CAAOTN>2.0.ZU;2-I
Fonte:
ISI
Lingua:
ENG
Soggetto:
COUGH REFLEX; SUBSTANCE-P; OPIOID RECEPTORS; FICTIVE COUGH; BRONCHOCONSTRICTION; CAPSAICIN; AGONISTS; CODEINE; SITES; DRUGS;
Keywords:
COUGH; ANTITUSSIVE; TACHYKININ RECEPTOR ANTAGONISTS; CP-99,994; SR 48968;
Tipo documento:
Article
Natura:
Periodico
Settore Disciplinare:
Science Citation Index Expanded
Science Citation Index Expanded
Citazioni:
32
Recensione:
Indirizzi per estratti:
Citazione:
D.C. Bolser et al., "CENTRAL ANTITUSSIVE ACTIVITY OF THE NK1 AND NK2 TACHYKININ RECEPTOR ANTAGONISTS, CP-99,994 AND SR-48968, IN THE GUINEA-PIG AND CAT", British Journal of Pharmacology, 121(2), 1997, pp. 165-170
Abstract
1 The purpose of this study was to investigate the antitussive activity and sites of action of the NK1 and NK2 tachykinin receptor antagonists, CP-99,994, SR 48968, and the racemate of SR 48968, SR 48212A in the cat and guinea-pig. 2 Guinea-pigs were dosed subcutaneously (s.c.) with CP-99,994, SR 48212A or SR 48968 one hour before exposure to aerosols of capsaicin (0.3 mM) to elicit coughing. Coughs were detected with a microphone and counted. 3 Intracerebroventricular (i.c.v.) cannulae were placed in the lateral cerebral ventricles of anaesthetized guinea-pigs. Approximately one week later, the animals were dosed with CP-99,994 or SR 48212A (i.c.v.) and exposed to aerosols of capsaicin (0.3 mM) to elicit coughing. 4 Cough was produced in anaesthetized cats by mechanical stimulation of the intrathoracic trachea and was monitored from electromyograms of respiratory muscle activity. Cannulae were placed for intravenous (i.v.) or: in separate groups of animals, intravertebral arterial (i.a.) administration of CP-99,994, SR 48212A or SR 48968. Dose-response relationships for i.v. and i.a. administration ofeach drug were generated to determine a ratio of i.v. ED50 to i.a. ED50, known as the effective dose ratio (EDR). The EDR will be 20 or greater for a centrally active drug and less than 20 for a peripherally active drug. 5 In the guinea-pig, CP-99,994 (0.1-30 mg kg(-1), s.c.), SR 48212A (1.0-30 mg kg(-1), s.c.), and SR 48968 (0.3-3.0 mg kg(-1), s.c.) inhibited capsaicin-induced cough in a dose-dependent manner. Capsaicin-induced cough was also inhibited by i.c.v. administration of CP-99,994 (10 and 100 mu g) or SR 48212A (100 mu g). 6 In the cat, both CP-99,994 (0.0001-0.3 mg kg(-1), i.a., n=5; 0.003-3.0 mg kg(-1), i.v., n=5) and SR 48212A (0.003-1.0 mg kg(-1), i.a., n=5; 0.01-3.0 mg kg(-1), i.v., n=5) inhibited mechanically induced cough by either the i.v. or i.a. routes in a dose-dependent manner. SR 48968 (0.001-0.3 mg kg(-1), i.a., n=5; 0.03-1.0 mg kg(-1), i.v., n=5) inhibited cough when administered by the i.a., route in a dose-dependent manner, but had no effect by the i.v. route up to a dose of 1.0 mg kg(-1). Intravenous antitussive potencies (ED50, 95% confidence interval (CI)) of these compounds were: CP-99,994 (0.082 mg kg(-1), 95% CI 0.047-0.126), SR 48212A (2.3 mg kg(-1), 95% CI 0.5-20), and SR 48968 (>1.0 mg kg(-1), 95% CI notdetermined). The intra-arterial potencies of these compounds were: CP-99,994 (1.0 mu g kg(-1), 95% CI 0.4-1.8), SR 48212A (25 mu g kg(-1), 95% CI 13-52), and SR 48968 (8.0 mu g kg(-1), 95% CI 1-32). The derived EDRs for each compound were: CP-99,994, 82; SR 48212A, 92; and SR 48968, >125. 7 We concluded that CP-99,994 and SR 48968 inhibit cough inthe guinea-pig and cat by a central site of action. In the cat, the antitussive action of these compounds appears to be solely by a centralsite.
ASDD Area Sistemi Dipartimentali e Documentali, Università di Bologna, Catalogo delle riviste ed altri periodici
Documento generato il 15/01/21 alle ore 18:17:57 | ESSENTIALAI-STEM |
Paul Ryan's treacherous political future
Paul Ryan and those in his close-knit political orbit have long shunned prognosticating about the speaker’s political ambitions. Young kids. Unpredictable political climate. And the speakership is a tough job. But the speaker’s allies have become keenly aware of his precarious political future, the daunting challenge of governing under a President Hillary Clinton or Donald Trump, and the rough task of rebuilding a GOP that many Hill Republicans believe has been overrun by anti-free trade populists who favor bombastic bomb-throwing over thoughtful policy discussions. All while weighing the possibility of his own bid for president, which Ryan did not rule out in a speech on Wednesday. Whether he goes that route or not, Ryan is likely in for a tumultous next few years. If Trump wins and Ryan retains the speakership, the Wisconsin Republican will be forced to continue to wedge his positions into Trump’s alternate Republican universe. If Clinton wins, Ryan will have to preside over a slimmed Republican majority, more heavily populated with burn-the-house-down conservatives. He’ll have to cut deals and do business with Hillary Clinton — a woman he’s met with privately just twice — while at the same time keeping conservatives content. It’s a governing scenario that people close to him are beginning to envision, according to multiple sources in his political orbit — and not a particularly pleasant one. Indeed, the challenge for Ryan of selling a policy agenda and building out his vision of the Republican Party, while dealing with the whack-a-mole nature of everyday governance, is daunting. “I think at the end of the day, it will be Paul Ryan’s biggest challenge,” Rep. Steve Womack (R-Ark.) said of rebuilding the Republican brand while governing the House. Ryan’s “Better Way” policy agenda is aimed at giving House Republicans an election-year message, but it has barely registered on a national scale, according to a recently released Morning Consult poll. Fifteen percent of voters think it’s a Republican plan, and an equal number believe it came out of the White House or Nancy Pelosi’s office. Ryan is already quietly beginning to plot a GOP revival strategy, according to multiple sources familiar with his operation’s planning. He’s planning a series of public rallies this fall to help his House colleagues, a mission aimed at keeping his majority and boosting his brand of conservatism. It’s an extraordinarily rare role for a House speaker — a figure who’s typically more of a liability than an asset. And the drumbeat of election-season policy speeches in New York and Washington is a purposeful attempt to ensure him a prominent voice in the policy discussion. On Thursday, he’ll be at The Atlantic’s Washington Ideas Festival for his second policy-focused event of the week. Yet even if Ryan won’t openly say it, and no matter how much he tries to train attention on policy, he knows it won't be long before he'll be under pressure to decide his own political future. The Wisconsin Republican is noncommittal on whether he’ll run for the White House — or if he’s even considering it — but is notably not dousing the possibility. “You never say never to these things,” he said at the Economic Club of Washington on Wednesday, “but I’ve never really had this ambition.” He added, “I have presidential-size policy ambition. I’ve really never had presidential-size personal ambition. It just was never really in my DNA.” The presidential speculation is not surprising given his meteoric rise. He was elected to Congress at 29, became Budget Committee chairman by 41, was the vice presidential nominee at 42, then speaker at 46. He’s defied political gravity throughout much of that time: In the early days of the GOP majority, the National Republican Congressional Committee and senior members of the GOP leadership balked at his proposals to cut federal spending, warning of steep political liabilities as Democrats ran against the much-vilified “Ryan budget.” Ryan pressed on, and the GOP majority grew, as did his own prominence. In less than a year as speaker, he’s amassed a fundraising operation that has surpassed John Boehner’s very formidable one. Though his push to pass a budget and appropriations bills was stymied by competing factions within his conference, Ryan has avoided the kind of public legislative brawls that damaged Boehner so badly. On Wednesday night, Ryan was on the brink of pushing through a government-funding bill without much of a struggle. Of course, speculation is always rampant about Ryan's standing in the House. Inside the Republican Conference, there's private musing about whether he’ll even run again for speaker. Some conservatives have started pressuring him for changes to internal GOP rules. And the political climate next year is already looking grim. “You’re going to get a very unpopular president … and you’re going to have a smaller yet more conservative House majority,” said one former House GOP leadership staffer. “The margin for error for Republican leaders is going to be so so thin, particularly with the motion to vacate” — the mechanism conservatives used to instigate Boehner’s ouster — “still hanging out there.” “It will be difficult for them to do the basics of governing, from funding the government to reauthorizing noncontroversial programs,” the person said. Ryan’s allies say he won’t be held hostage. Some of them say he’d be better off politically not running for speaker, with all the day-to-day trench warfare involved. But for now, Ryan isn’t going anywhere. “He intends to continue serving this team as speaker in the next Congress,”· Ryan spokesman Brendan Buck said. | NEWS-MULTISOURCE |
What is the example of co location?
What is the example of co location? I need to make the bed every day. My son does his homework after dinner.
What is the difference between a data center and a colocation? A data centre is a purpose-built facility designed to efficiently store, power, cool and connect your IT infrastructure. Colocation is one of many services data centres provide, and is the act of hosting your IT hardware (like servers) outside of your premises and in a data centre.
What is colocation in hosting? Colocation or colocation hosting is a highly secure data center facility where equipment, servers, space, and bandwidth are available for purchase to businesses. Colocation is a data center facility that companies can buy space in to host their servers and experience higher security and guaranteed uptime.
What is colocation vs cloud? The main distinction between colocation vs. cloud lies with functionality. A colocation facility operates as a data center that rents floor space to an organization that has outgrown its own data center, whereas the private cloud enables designated users within an organization to act as tenant administrators.
What is the example of co location? – Additional Questions
Is AWS a colocation?
AWS’s Colocation Strategy Today
It requires customers to purchase hardware directly from AWS, instead of using servers they already own. It supports fewer types of cloud services — mainly virtual machines, object storage, and databases — than competing hybrid cloud frameworks.
What is colocation in Azure?
Colocation means storing related information together on the same nodes. Queries can go fast when all the necessary data is available without any network traffic. Colocating related data on different nodes allows queries to run efficiently in parallel on each node.
What is the meaning of colocation?
Definition of colocate
: to locate (two or more things) together or be located together: such as. a transitive : to cause (two or more things) to be in the same place or close together They [fog signals] are usually co-located with another form of aid such as a light … —
Is colocation private cloud?
Is Colo a private cloud? Colocation, or colo, falls into the category of private cloud and refers to a data center facility that rents floor space to organizations that cannot or prefer not to manage their own IT infrastructure.
What is a cloud based network?
Cloud networking is a type of IT infrastructure in which some or all of an organization’s network capabilities and resources are hosted in a public or private cloud platform, managed in-house or by a service provider, and available on demand.
What is virtualization in cloud?
Introduction. Virtualization in cloud computing is defined as a creation of a virtual version of a server, a desktop, a storage device, an operating system, or network resources.
What are the 3 types of virtualization?
Types of Virtualization
• Desktop Virtualization.
• Application Virtualization.
• Server Virtualization.
• Network Virtualization.
• Storage Virtualization.
What are 2 types of virtualization?
When it comes to desktop virtualization, there are two main methods: local and remote. Local and remote desktop virtualization are both possible depending on the business needs. However, local desktop virtualization has many limitations, including the inability to use a mobile device to access the network resources.
What are the 4 general types of virtualization?
It’s time to get this straight.
• Network virtualization. Network virtualization takes the available resources on a network and breaks the bandwidth into discrete channels.
• Storage virtualization.
• Desktop virtualization.
• Application virtualization.
What is virtualization used for?
Virtualization relies on software to simulate hardware functionality and create a virtual computer system. This enables IT organizations to run more than one virtual system – and multiple operating systems and applications – on a single server. The resulting benefits include economies of scale and greater efficiency.
What is the most common form of virtualization?
OS Virtualization—aka Virtual Machines
Virtualizing an operating system environment is the most common form of virtualization. It involves putting a second instance or multiple instances of an operating system, like Windows, on a single machine.
What is an example of virtualization?
Better-known examples include VMware, which specializes in server, desktop, network, and storage virtualization; Citrix, which has a niche in application virtualization but also offers server virtualization and virtual desktop solutions; and Microsoft, whose Hyper-V virtualization solution ships with Windows and
What is the difference between cloud and virtualization?
Cloud computing is a set of principles and approaches to deliver compute, network, and storage infrastructure resources, services, platforms, and applications to users on-demand across any network.
Cloud Computing.
Virtualization Cloud
Workload Stateful Stateless
Tenancy Single tenant Multiple tenants
What are disadvantages of virtualization?
Cons of Virtualization :
• Data can be at Risk – Working on virtual instances on shared resources means that our data is hosted on third party resource which put’s our data in vulnerable condition.
• Learning New Infrastructure – As Organization shifted from Servers to Cloud.
• High Initial Investment –
Which technology is used for virtualization?
A number of different virtualization technologies are available in the market today, including the following: Full software virtualization. Hardware-assisted software virtualization or Hardware Virtual Machine (HVM) Paravirtualization or paravirtualized machine (PV)
Who invented virtualization?
Few people are more aware of that history than Jim Rymarczyk, who joined IBM as a programmer in the 1960s just as the mainframe giant was inventing virtualization.
What are alternatives to virtualization?
Top 10 Alternatives to Microsoft Application Virtualization
• VirtualBox.
• VMware vSphere Hypervisor.
• VMware Fusion.
• VMware Workstation Pro.
• Oracle VM.
• Citrix Hypervisor.
• SUSE Linux Enterprise Server.
• Vagrant. | ESSENTIALAI-STEM |
SugarCRM
SugarCRM is a software company based in Silicon Valley. It produces the on-premises and cloud-based web application Sugar, a customer relationship management (CRM) system.
SugarCRM's functionality includes sales-force automation, marketing campaigns, customer support, collaboration, Mobile CRM, Social CRM and reporting.
The company operates a number of websites, including its commercial website Sugarcrm.com and Sugar Outfitters (for third-party extensions), and an online user forum called SugarClub.
In February 2014, in a blog post that provoked a strong reaction from the development community, SugarCRM announced that they would no longer be releasing new open-source versions of their Community Edition application; from now on this would be a bug-fix-only application.
History
John Roberts conceived of the idea and name of SugarCRM while riding his mountain bike named Sugar in the Santa Cruz Mountains. Clint Oram, John Roberts, and Jacob Taylor started full-time work on the SugarCRM open source project in April 2004, and incorporated the company in California in June 2004. Roberts served as the CEO from 2004 to 2009, Oram was the vice president, and Taylor was the CTO & vice president of engineering.
In June 2004, Josh B. Stein of DFJ invested $2 million into the startup and became a board member. With the help of this investment, Sugar expanded quickly and by September 2004, potential users had downloaded 25,000 copies of the application, then named Sugar Open Source. In October 2004, the company was named "Project of the Month" on SourceForge.
The popularity of this project allowed the company to raise $86 million of venture capital from Draper Fisher Jurvetson, Walden International, New Enterprise Associates and Goldman Sachs.
In 2006, SugarCRM launched SugarCon, a conference for Sugar customers, users and developers. It has since become an annual conference, held in the San Francisco Bay Area to begin with but in 2018 the conference was moved to Las Vegas.
By 2008, SugarCRM employed over 150 people.
In June 2008, co-founder Taylor left the company, during what technology website The Register called "a mysterious exodus of senior and experienced business staff" from SugarCRM. Clint Oram replaced him as the CTO.
In May 2009, co-founder and CEO Roberts left the company. He was replaced as CEO by SugarCRM board member Larry Augustin, who had previously founded and served as the CEO of VA Linux (now known as Geeknet).
In June 2010, Sugar launched Sugar 6, a major upgrade emphasizing ease of use and introducing a complete UI overhaul of Sugar Professional and Sugar Enterprise.
In June 2017, SugarCRM released SugarCRM Hint, a new product which searches the web for additional information on users in SugarCRM.
Private equity firm Accel-KKR became a single investor in August 2018, describing the investment as being "nine figures".
Editions
SugarCRM sells CRM software in on-premises and Cloud variants:
Sales force automation includes:
* Sugar Sell (available in Essentials, Advanced, and Premier editions)
* Sugar Enterprise on-premises (available in Enterprise and Enterprise+ editions)
Sugar Market (marketing automation) and Sugar Serve (customer service software) are also offered, along with several additional optional capabilities.
Community edition
SugarCRM provided a community edition, Sugar CE, previously known as Sugar Open Source. It was available free of charge alongside paid editions until version 6.5.
In 2013, Sugar version 7 was announced but was only released in Sugar's hosted paid environment. No update to the community edition was announced with it. SugarCRM's community support team have stated that 7.0 will not be available in a community edition, and that no release date for an updated community edition was known. After that SugarCRM released a notice saying that they "have no plans" to release 7 to Open Source.
In April 2018, Clint Oram, CMO & Founder of SugarCRM, Inc., posted to the company's community blog that the Community Edition open source project had officially ended.
Deployment options
Sugar is a software as a service (SaaS) product. As of Sugar 7, customers can opt to use an on-premises product, SugarCRM's Sugar Cloud, one of SugarCRM's partners, or public cloud services (such as Amazon Web Services, Microsoft Azure, Rackspace Cloud or IBM SmartCloud).
License
SugarCRM initially licensed Sugar Open Source under the SugarCRM Public License (based on the Mozilla Public License and the Attribution Assurance License). While users could freely redistribute Sugar and the license allowed for the inspection and modification of the source code and for the creation of derived works, critics, including Dan Farber, editor in chief at CNET, expressed some concern over SugarCRM's use of the term "commercial open source" to describe its products.
On July 25, 2007, SugarCRM announced the adoption of the GNU General Public License (version 3) for Sugar Community Edition, the offering previously known as Sugar Open Source. This license took effect with the release of Sugar Community Edition 5.0.
On April 11, 2010, SugarCRM announced that starting with version 6.0.0, the Sugar Community Edition would be licensed under the GNU Affero General Public License version 3. The charts module, customer portal, mobile support, some SOAP functions and most of the default theme templates were removed from the AGPLv3 licensed Sugar Community Edition 6.
In 2014 the project announced there would only be proprietary licenses starting at Sugar 7.
In 2020, a statement SugarCRM updated is license management support for it licensed products and could be found on SugarCRMs website.
Open source forks of community edition
* Vtiger CRM, 2004 fork of V1.0 of SugarCRM
* SarvCRM, 2012 fork of Community Edition 5.5.4
* SuiteCRM, 2013 fork of SugarCRM Community Edition 6.5
* SpiceCRM, 2016 fork of SugarCRM Community Edition adding an Angular-based UI leveraging Lightning Design from Salesforce | WIKI |
Table of Contents
Tutorial: Load batch data using Hadoop
This tutorial shows you how to load data files into Apache Druid (incubating) using a remote Hadoop cluster.
For this tutorial, we'll assume that you've already completed the previous batch ingestion tutorial using Druid's native batch ingestion system and are using the micro-quickstart single-machine configuration as described in the quickstart.
Install Docker
This tutorial requires Docker to be installed on the tutorial machine.
Once the Docker install is complete, please proceed to the next steps in the tutorial.
Build the Hadoop docker image
For this tutorial, we've provided a Dockerfile for a Hadoop 2.8.3 cluster, which we'll use to run the batch indexing task.
This Dockerfile and related files are located at quickstart/tutorial/hadoop/docker.
From the apache-druid-0.15.1-incubating package root, run the following commands to build a Docker image named "druid-hadoop-demo" with version tag "2.8.3":
cd quickstart/tutorial/hadoop/docker
docker build -t druid-hadoop-demo:2.8.3 .
This will start building the Hadoop image. Once the image build is done, you should see the message Successfully tagged druid-hadoop-demo:2.8.3 printed to the console.
Setup the Hadoop docker cluster
Create temporary shared directory
We'll need a shared folder between the host and the Hadoop container for transferring some files.
Let's create some folders under /tmp, we will use these later when starting the Hadoop container:
mkdir -p /tmp/shared
mkdir -p /tmp/shared/hadoop_xml
Configure /etc/hosts
On the host machine, add the following entry to /etc/hosts:
127.0.0.1 druid-hadoop-demo
Start the Hadoop container
Once the /tmp/shared folder has been created and the etc/hosts entry has been added, run the following command to start the Hadoop container.
docker run -it -h druid-hadoop-demo --name druid-hadoop-demo -p 50010:50010 -p 50020:50020 -p 50075:50075 -p 50090:50090 -p 8020:8020 -p 10020:10020 -p 19888:19888 -p 8030:8030 -p 8031:8031 -p 8032:8032 -p 8033:8033 -p 8040:8040 -p 8042:8042 -p 8088:8088 -p 8443:8443 -p 2049:2049 -p 9000:9000 -p 49707:49707 -p 2122:2122 -p 34455:34455 -v /tmp/shared:/shared druid-hadoop-demo:2.8.3 /etc/bootstrap.sh -bash
Once the container is started, your terminal will attach to a bash shell running inside the container:
Starting sshd: [ OK ]
18/07/26 17:27:15 WARN util.NativeCodeLoader: Unable to load native-hadoop library for your platform... using builtin-java classes where applicable
Starting namenodes on [druid-hadoop-demo]
druid-hadoop-demo: starting namenode, logging to /usr/local/hadoop/logs/hadoop-root-namenode-druid-hadoop-demo.out
localhost: starting datanode, logging to /usr/local/hadoop/logs/hadoop-root-datanode-druid-hadoop-demo.out
Starting secondary namenodes [0.0.0.0]
0.0.0.0: starting secondarynamenode, logging to /usr/local/hadoop/logs/hadoop-root-secondarynamenode-druid-hadoop-demo.out
18/07/26 17:27:31 WARN util.NativeCodeLoader: Unable to load native-hadoop library for your platform... using builtin-java classes where applicable
starting yarn daemons
starting resourcemanager, logging to /usr/local/hadoop/logs/yarn--resourcemanager-druid-hadoop-demo.out
localhost: starting nodemanager, logging to /usr/local/hadoop/logs/yarn-root-nodemanager-druid-hadoop-demo.out
starting historyserver, logging to /usr/local/hadoop/logs/mapred--historyserver-druid-hadoop-demo.out
bash-4.1#
The Unable to load native-hadoop library for your platform... using builtin-java classes where applicable warning messages can be safely ignored.
Accessing the Hadoop container shell
To open another shell to the Hadoop container, run the following command:
docker exec -it druid-hadoop-demo bash
Copy input data to the Hadoop container
From the apache-druid-0.15.1-incubating package root on the host, copy the quickstart/tutorial/wikiticker-2015-09-12-sampled.json.gz sample data to the shared folder:
cp quickstart/tutorial/wikiticker-2015-09-12-sampled.json.gz /tmp/shared/wikiticker-2015-09-12-sampled.json.gz
Setup HDFS directories
In the Hadoop container's shell, run the following commands to setup the HDFS directories needed by this tutorial and copy the input data to HDFS.
cd /usr/local/hadoop/bin
./hadoop fs -mkdir /druid
./hadoop fs -mkdir /druid/segments
./hadoop fs -mkdir /quickstart
./hadoop fs -chmod 777 /druid
./hadoop fs -chmod 777 /druid/segments
./hadoop fs -chmod 777 /quickstart
./hadoop fs -chmod -R 777 /tmp
./hadoop fs -chmod -R 777 /user
./hadoop fs -put /shared/wikiticker-2015-09-12-sampled.json.gz /quickstart/wikiticker-2015-09-12-sampled.json.gz
If you encounter namenode errors when running this command, the Hadoop container may not be finished initializing. When this occurs, wait a couple of minutes and retry the commands.
Configure Druid to use Hadoop
Some additional steps are needed to configure the Druid cluster for Hadoop batch indexing.
Copy Hadoop configuration to Druid classpath
From the Hadoop container's shell, run the following command to copy the Hadoop .xml configuration files to the shared folder:
cp /usr/local/hadoop/etc/hadoop/*.xml /shared/hadoop_xml
From the host machine, run the following, where {PATH_TO_DRUID} is replaced by the path to the Druid package.
mkdir -p {PATH_TO_DRUID}/conf/druid/single-server/micro-quickstart/_common/hadoop-xml
cp /tmp/shared/hadoop_xml/*.xml {PATH_TO_DRUID}/conf/druid/single-server/micro-quickstart/_common/hadoop-xml/
Update Druid segment and log storage
In your favorite text editor, open conf/druid/single-server/micro-quickstart/_common/common.runtime.properties, and make the following edits:
Disable local deep storage and enable HDFS deep storage
#
# Deep storage
#
# For local disk (only viable in a cluster if this is a network mount):
#druid.storage.type=local
#druid.storage.storageDirectory=var/druid/segments
# For HDFS:
druid.storage.type=hdfs
druid.storage.storageDirectory=/druid/segments
Disable local log storage and enable HDFS log storage
#
# Indexing service logs
#
# For local disk (only viable in a cluster if this is a network mount):
#druid.indexer.logs.type=file
#druid.indexer.logs.directory=var/druid/indexing-logs
# For HDFS:
druid.indexer.logs.type=hdfs
druid.indexer.logs.directory=/druid/indexing-logs
Restart Druid cluster
Once the Hadoop .xml files have been copied to the Druid cluster and the segment/log storage configuration has been updated to use HDFS, the Druid cluster needs to be restarted for the new configurations to take effect.
If the cluster is still running, CTRL-C to terminate the bin/start-micro-quickstart script, and re-reun it to bring the Druid services back up.
Load batch data
We've included a sample of Wikipedia edits from September 12, 2015 to get you started.
To load this data into Druid, you can submit an ingestion task pointing to the file. We've included a task that loads the wikiticker-2015-09-12-sampled.json.gz file included in the archive.
Let's submit the wikipedia-index-hadoop-.json task:
bin/post-index-task --file quickstart/tutorial/wikipedia-index-hadoop.json --url http://localhost:8081
Querying your data
After the data load is complete, please follow the query tutorial to run some example queries on the newly loaded data.
Cleanup
This tutorial is only meant to be used together with the query tutorial.
If you wish to go through any of the other tutorials, you will need to: * Shut down the cluster and reset the cluster state by removing the contents of the var directory under the druid package. * Revert the deep storage and task storage config back to local types in conf/druid/single-server/micro-quickstart/_common/common.runtime.properties * Restart the cluster
This is necessary because the other ingestion tutorials will write to the same "wikipedia" datasource, and later tutorials expect the cluster to use local deep storage.
Example reverted config:
#
# Deep storage
#
# For local disk (only viable in a cluster if this is a network mount):
druid.storage.type=local
druid.storage.storageDirectory=var/druid/segments
# For HDFS:
#druid.storage.type=hdfs
#druid.storage.storageDirectory=/druid/segments
#
# Indexing service logs
#
# For local disk (only viable in a cluster if this is a network mount):
druid.indexer.logs.type=file
druid.indexer.logs.directory=var/druid/indexing-logs
# For HDFS:
#druid.indexer.logs.type=hdfs
#druid.indexer.logs.directory=/druid/indexing-logs
Further reading
For more information on loading batch data with Hadoop, please see the Hadoop batch ingestion documentation. | ESSENTIALAI-STEM |
Athena created the first man out of clay and water with the help of Prometheus. She had the ability to create as well as sustain life through these myths. The great goddess of wisdom, strength and reflection is a symbol of matriarchal strength. Athena represents a pyramid of stability where the base of her warrior instincts, strategy, and aggression flow into her benevolence, skills and eventually her intellect. She is the unifying element between the strength of humanity and natural forces.
Zeus became so upset that he decided to inflict terrible punishment on both man and Prometheus. First in order to punish man, Zeus created a beauty named Pandora. Pandora however was created with deceptive heart and lying tongue. Resorting back to how Prometheus was chained to the rocks to begin with was because of his trick on Zeus. Zeus had his servants force and violence seize Prometheus and take him to Caucasus mountains where Prometheus was chained to a rock with unbreakable chains and was tormented day and night by a giant eagle tearing at his liver.
All heroes must followed the rule because if they did not, they would be punished by the immortals, and would not be recognized as heroes. When Odysseus reach the land of the Cyclops race. Odysseus decided to pick his best men, goods offered as gifts, and headed toward a Cyclops's cave. When his men saw cheese, pens, and lamb on lying on the racks, they pleading to Odysseus, "Why not take these cheeses, get them stowed, come back, throw all the pens, and make a run for it? We'll drive thekids and lambs aboard.
This co... ... middle of paper ... ...ling Medusa. In summary, the Greek Gods and Goddesses interacted with humans mainly for individual gain, and sometimes for divine assistance of heroes. In conclusion, the creation of the Greek Gods and Goddesses by the ancient Greeks are simply a masterpiece of many years of work. With the creation of the Gods came along an array of myths following the great adventures of these Gods. These great adventures also told us much more about the Gods themselves, in ways of how they looked and acted, their powers, and types of interaction.
Regardless of what they have done or thought to have done, they have made an impact on the way man foresees woman. I will discuss three women characters that play a role in the mother archetype, and explain why these rolls are important to their culture. Demeter will be the first goddess in this examination on the mother archetype, followed by Isis. These women are man made stories, to try and help explain why certain things are the way they are. The last mother archetype I will discuss was a woman that is still worshipped today, and with the help of man made stories, she has become immortal.
The first category included the major goddesses of Olympus. The goddesses placed in this category were Hera, Athena, Aphrodite, Hestia, Demeter, and Artemis because most people knew and worshipped them. The people held these six goddesses the most high and with the most respect ( Hamilton 28 ). Hera, the goddess of the protection of marriage, took care of married women. The sister and also wife of Zeus, the king of the gods, Hera may be the most well known of the goddesses.
He tricked Zeus into getting the bad side of the bargain. This bargain was to give the better parts of the sacrificed animals to Prometheus’ humans and to give the paltry parts to the gods. Prometheus also stole a piece of Zeus’ sun, giving fire to his human race. Zeus became furious by these events and chained Prometheus to a rock on top of a mountain. Zeus condemned Prometheus by dictating that an eagle would come every day for eternity and eat his liver, only to have it grow back over night.
Moreover, Helios messages the thunder god to kill those who ate his cattle. It was this decree that made Zeus throw a bolt at Odysseus’ men, killing them all. Nevertheless, Odysseus’ prayer shields him from death. The cry to Zeus conveys that the hero needs help from the gods and is unable to do everything himself, thus showing Zeus he is learning humility. This shows progression because in the beginning of the journey Odysseus announces his successes and obstacles whereas, on Helios island, the hero calls for help knowing he can not surpass famine/every challenge.
Frankenstein is seen as a modern image of the ancient myth. Prometheus, the Greek God, and Victor Frankenstein, the creator of the monster, have contrasting qualities and behaviors that allowed them to go against their gods, to create life, then to be punished by the hands of their creations. Prometheus, a Greek Titan, was severely punished by Zeus for stealing a flame from the gods as well as tricking the gods out of the best portion of meat during their feast; giving these to mankind instead. “Zeus ties the titan to the rock, drives a wedge through his chest, and sets an eagle on the daily task of eating his liver from his body” (Lutrell 17). At night the liver grows back, allowing the eagle to be able to do this every day for what was suppose to be
Well, it is time to talk about Prometheus and his trickster ways. One of Prometheus tricks was to trick Zeus by setting up two piles of a sacrificed Ox, one with bones wrapped in fat and another one with the good meat hidden in the stomach of the ox. After he had deceived the meat he told Zeus to choose any pile of his pleasing. Zeus took the pile that had nothing but bones and considering that he had given his word he had to accept a pile of bones for any future sacrifices. This trick that Prometheus pulled made Zeus so mad he took fire away but Prometheus took his torch and lit it with the sun. | FINEWEB-EDU |
Page:Sorrell and Son - Deeping - 1926.djvu/326
had ever dared to challenge. He had eyes, deep under bushy eyebrows, that gave the world quick, acute and sidelong glances. When watching him Kit had always been struck by the perfect stillness of the great man's hands.
To Christopher old Gaunt was a great man. Sorrell's son had not that pettifogging type of mind, the mind of little facetious envies that must tie a sneer to the tails of a man's coat. Kit was sanguine and creative. He knew how hard it was to do the great things well, and that old Gaunt had done them well. The little people who tickled life with straws were not to his liking.
Old Gaunt held out a wholesome, fresh-coloured hand to Kit.
"Well, Sorrell,—here we are."
And Christopher blushed. He had a feeling that there was something in the air, a "Tinker Bell" of a nice conspiracy to set some disgraceful but pleasant piece of favouritism floating in through the windows of St. Martha's. But unlike Peter Pan Kit did not set great store by his own shadow. Other people saw to the length and the substance of Kit's shadow. Had not Thomas Roland said they would?
At dinner Sir Ormsby and Kennard talked about needlework pictures and Japanese ivories, and since Sorrell senior knew a good deal about needlework pictures, Kit was less voiceless than he might have been. He called Sir Ormsby "sir," with perfect naturalness, for to Kit the great man was eminently "sir." Later, they became less archaic, and talked "shop." Kennard was one of the pioneers of the new thoracic surgery, and while Sir Ormsby probed his methods and his results, Christopher sat and listened with the air of a young man who enjoyed every word of it; which he did. Later still, they arrived at hospital gossip, and it seemed to Kit that their gossiping concealed personal tendencies. Lawson was going to retire. Sandys would move up and become a senior. There would be a vacancy for an assistant surgeon.
Sir Ormsby, giving Kit one of his sidelong and shrewdly beneficent glances, supposed that Sorrell would apply for the post.
"A St. Martha's man. "One or two outsiders may be putting up." | WIKI |
Page:Bird Life Throughout the Year (Salter, 1913).djvu/330
240 to take front rank. Every bird is keen on pushing his own business and in such a hurry that manners have to go. In the midst of their quarrelling they suddenly dart into the air, and begin frantically manœuvring, then fall as if shot, striking the ground with a thud. Just as they do this, a Sparrow-hawk dashes through their ranks, and, without checking its flight, goes off with one of their number.
A wet December, when the streams run bank-high, floods the river-flats and forms wide, shallow plashes beloved of the lapwings and equally attractive to wandering gulls and wading-birds of all sorts. A tall, moody-looking Heron comes to see whether the newly-discovered lakelet affords scope for his piscatorial craft. Such Meadow Pipits and Pied Wagtails as have not left us trip daintily about the water's edge, and, as the floods subside, the Carrion Crow comes to look over the slimy deposit which remains on chance of stranded fish or drowned-out mice. The month seldom passes without more or less rough weather, and sometimes brings a storm which, upon the coast, may vie with the worst of the autumn gales. The shore-haunting gulls, with a premonition of what is coming, pass overhead drifting inland for shelter. All night it blows great guns, and next morning, when the air is full of spindrift and flying foam-flakes, we see the Kittiwakes, under ordinary circumstances | WIKI |
Page:Appletons' Cyclopædia of American Biography (1900, volume 2).djvu/618
586 Rome, which was dissolved by the viceroy, Count of Rezende, under suspicion that it was a political association. Gama was sent as a prisoner to Por- tugal in 1785, narrowly escaped banishment to Angola, and was only set at liberty in 1780. About this period he became an enemy of the Jesuits, and published his poem of '• Uruguay " (1789), the object of which is to show that they had attempted to found an independent state among the Indians of that province. The poem of " Uruguay " contains some clever descriptions of the forest scenery of South America, but, while inveighing against the Jesuits, says nothing of the civilization they introduced, or of its destruc- tion by their banishment from the colonies of Spain and Portugal. Da Gama afterward was elected a member of the Academy of Lisbon. He is buried in the church of Boa Hora in that city. He also published " Lenitivo da Saudade do prin- cipe D. Jose " (1788). and " Quitubia," another poem, named after a negro chief who assisted the Portuguese in an expedition against Angola (1791).
GAMA, José Bernardo Fernandez, Brazilian historian, b. in Pernambuco in 1802 ; d. in Rio de Janeiro in 1802. In his youth he entered the army, participated in the constitutional revolution of Bahia, 10 Feb., 1821, and also in forcing the Portu- guese troops to abandon Brazil, 15 Feb., 1822, and the subsequent declaration of independence at Ipi- ranga, 7 Sept., 1822. For the action of Bahia he was decorated with the military medal that was instituted in commemoration of that movement, and in 1837 received the order of the Cruceiro ; but, as he was of humble family and had no friends in government circles, he never advanced above the rank of lieutenant of the staff, and as such was re- tired in 1842. He then gave up his time to his- torical researches, and published a work which established his name as a writer, " Memorias Histo- ricas da Provincia de Pernambuco, precedidas de um ensaio topogi'aphico-historico " (4 vols., Per- nambuco, 1844-'9). As he was too poor to have this work printed, the provincial assembly of Per- nambuco autliorized him, in 1843, to establish a quarterly lottery to the extent of fifteen contos de reis ("about $7,500), the proceeds of which were to be invested in its publication.
GAMARRA, Agustin (gah-mar'-ra), Peruvian soldier, b. in Cuzco, 27 Aug., 1785 ; d. in Ingavi, Bolivia, 18 Nov., 1841. He studied theology in the college of San Bueiuxventura of his native city, but entered the Spanish army in 1809 as a volunteer. He rose gradually to the rank of lieutenant-colonel, served in Bolivia against the Argentine forces, and in 1821 came to Lima in command of the 2d bat- talion of the regiment of Cuzco. He then joined the Independents, was promoted colonel and then brigadier, and served as chief of the staff of the Peruvian contingent under Bolivar and Sucre in 1824. He was promoted general of division, appoint- ed prefect of Cuzco, and in 1828 was commander- in-chief of the army in the campaign against Bo- livia, concluding the war by the treaty of Piquisa, for which he was rewarded with the rank of grand marshal. He afterward pronounced against La- mar, president of Peru., was declared provisional president in 1829, and in the same year elected president for four years. His administration was progressive, although constantly interrupted by revolutionary movements. When his term was finished he delivered the executive to Gen. Orbe- gozo, but soon headed a rebellion against him. He acknowledged the government of Orbegozo in 1834, and emigrated to Bolivia. When Gen. Santa Cruz interfered in the Peruvian struggle between Orbe- gozo and Salaverry, Gamarra opposed the inter- vention with a force that he had raised in the- south of Peru, but was defeated by Santa Cruz at Vanacocha, and banished to Chili in June, 1835. When war was declared between Chili and Peru in 1837, Gamarra joined the second Chilian expedi- tion, and in 1839 was again elected president of Peru. In 1841, when the Bolivians overthrew the government of Ballivian and pronounced again in favor of Santa Cruz, Gamarra invaded the neigh- boring republic at the head of an army, but was defeated and killed in battle at Ingavi.
GAMARRA Y DAVALOS, Juan Benito, Mexican author, b. in Zamora, Mexico, in 1745 ; d. in the city of Mexico, 1 Nov., 1793. He was educated in the College of San Ildefonso in the city of Mexico, and in November, 1764, entered the congregation of San Felipe Neri m the town of San Miguel. Here his superiors appointed him their attorney-general, and sent him to Madrid and Rome to conclude arrangements for the final es- tablishment and endowment of the congregation in Mexico. Pope Clement XIII. made him apos- tolic prothonotary, and he was given the degree of doctor of theology by the University of Pisa, and elected a member of the Academy of Bologna. On his I'eturn to Mexico he brought a collection of paintings, drawings, a large library, and a collec- tion of physical instruments for his college. He reorganized the plan of studies of the college, and was also the first in Spanish America to introduce a course of lectures on modern philosophy. He took great interest in the advancement of instruc- tion in New Spain, and was the founder of many new colleges. The viceroy pi'oposed him for sev- eral high offices, but Gamarra refused them all. At the time of his death he was preparing a plan for the organization of another university for the vice- royalty. He published " Musa Americana " (Cadix, 1769): " Elementa recentioris Philosophiie " (Mex- ico, 1774); "Academias filosoficas" (1774); "Las antigiiedades de Xochicalco " (Bologna, 1774) : " Errores del Entendimiento Humano " (Puebla,. 1770); "Maximas de Educaeion " (Mexico, 1780) ; " Reflexiones Criticas sobre las Historias Escojidas del Antiguo Testamento" (1781); and left others- in manuscript, which are preserved in the National library of Mexico and by private collectors.
GAMBIER, James, admiral, b. in the Bahama islands, 13 Oct., 1750 ; d. in Iver, near Uxbridge, England, 19 April, 1833. His ancestors were French Protestants, who were expatriated by the revocation of the edict of Nantes, and his father was lieutenant-governor of the Bahamas. James entered the navy at an early age and obtained the rank of post-captain in 1778. He commanded the frigate " Raleigh '" and was engaged in the reduction of Charieston, S. C, in 1780. ' In the following year he aided in repelling the French attack upon Jersey. He was appointed to command the " Defence," of 74 gunS, in 1793, and aided Lord Howe against the French fleet, which was commanded by Villaret de Joyeuse. The " Defence " was the first to break through the enemy's line in the engagement, which took place on 1 June, 1794. He was advanced to the rank of rear-admiral in 1795, of vice-admiral in 1799, and was third in command of the channel fleet in 1801. In 1802 he was appointed to be the governor of Newfoundlaud. Having been raised to the rank of full admiral in 1805, he commanded the fleet during the three days' bombardment of Copenhagen in September, 1807. He captured the Danish forces, and in return for his services was made a baron and offered a pension, which he declined. In | WIKI |
How do I know if my engine is single phasing?
How do you know if a motor is single phasing?
Single phasing simply means that one of the line connections of a motor is not connected, resulting in the motor running on a single phase. A single-phase condition subjects the motor to an excessive voltage imbalance, often meaning high currents and motor heating.
How do you know if its single-phase?
Look at the ‘main switch’ or ‘normal supply main switch’ on your switchboard. If the switch looks like three switches combined into one and is wider than 3 cm, you have 3-phase power. If it’s a single switch and slim, you have single-phase power.
How do you know if its single-phase or three-phase?
The best way to tell if a property has a three phase supply is by looking at the electrical fuse (sometimes called electricity supply, service head, cut out). Typically a single phase will have one fuse and a three phase will have three 100amp fuses.
What happens if single phasing occurs when the motor is running?
If due to some reason, one phase of the motor gets disconnected, the motor will continue to run from the active 2-phase supply. This is called single phasing. The motor will continue to run with vibration and reduced speed.
IT IS INTERESTING: How much does it cost to get your check engine light reset?
What happens if a motor loses a phase?
A phase loss that goes undetected can rapidly result in unsafe conditions, equipment failures, and costly downtime. Under phase loss conditions motors, pumps, blowers, and other equipment draw excessive current on the remaining two phases which quickly overheats the motor windings.
Is 240V single-phase or 3-phase?
240V power is used in the US and parts of the world. In the US 120 / 240V 1 Phase 3 Wire is the standard for homes and 240V 3 Phase Open Delta is the standard for small buildings with large loads. In parts of the world 240V Single Phase 2 Wire is the standard for homes.
Is 240V single-phase or 2 phase?
Single Phase 120/240
It may also be called Split Phase 240. This configuration consists of 2 voltage legs that are 180 degrees apart. The voltage between the two legs (called phase to phase or line to line) is 240V and the phase to neutral voltage is 120V.
What does a single-phase plug look like?
The single-phase wire has the two hot wires surrounded by black and red insulation, the neutral is always white and there is a green grounding wire.
Can 240V be single-phase?
For 240V circuits, the potential difference is between two hot wires that are 180° out of phase (see Figure 1). Because we only measure across two wires, both 120V and 240V are referred to as single-phase power. (It’s rare to find three-phase AC power in residential situations).
Can you have 3 phase at home?
The short answer is yes, you can get 3-phase power at home. Electricians can handle the electrical work but they are not allowed to change the supply, which must be done by the distribution network operator (DNO).
IT IS INTERESTING: Are engines covered under warranty?
What causes a motor to single phase?
The single-phasing can occur as a result of a fuse blowing or protective device opening on one phase of the motor. Other possibilities include feeder or step-down transformer fuses blowing.
How do I stop single phasing?
How to Protect Motor from Damage Due to Single Phasing?
1. Electromagnetic Overload Device. In this device, all the three phases of the motor are fitted with an overload relay. …
2. Thermistors. Credit: Wikimedia. …
3. Bi-metal strip. Credit: Wikimedia. …
4. Standard motor starter overload protection.
Do single phase motors need overload?
Single Phase Motor Overload Protection
The overload relay is designed so the current to the motor is shared between phases, so if you only wire up one phase, then all the motor current goes through one of the contacts on the overload, and you can actually create an overload condition. | ESSENTIALAI-STEM |
-- Corn Climbs to Six-Week High in Chicago on Weather Concerns; Wheat Drops
Corn rose to a six-week high in
Chicago trading on concern that dry weather in South America may
hurt crops. Wheat declined. “The weather remains dry in Argentina in the most
important grain-growing regions,” Dennis Gartman , an economist
and author of the Gartman Letter, wrote in a report today. It
also “remains dry, or drier than the grain bears would like it
to remain, in the important grain-producing regions of Brazil,”
he said. Corn futures for March delivery rose 4.25 cents, or 0.7
percent, to $6.065 a bushel at 1:15 p.m. London time on the
Chicago Board of Trade. The price earlier rose to $6.07 a
bushel, the highest since Nov. 9. Prices have climbed 46 percent
this year. Dry weather, which has already hurt crops, will return to
Argentina from Dec. 25 and persist through next week, according
to a report from AccuWeather.com. Argentina is the world’s
second-biggest shipper of corn and third-largest exporter of
soybeans, U.S. Department of Agriculture data show. March-delivery soybeans were little changed at $13.38 a
bushel in Chicago after rising earlier today to $13.4025, the
highest since Nov. 12. Prices advanced 28 percent this year. Wheat futures for March delivery fell for a second day,
declining 3.75 cents, or 0.5 percent, to $7.6125 a bushel in
Chicago. Prices have advanced 41 percent this year. To contact the reporters on this story:
Tony C. Dreibus in London at
tdreibus@bloomberg.net ;
Supunnabul Suwannakij in Bangkok at
ssuwannakij@bloomberg.net . To contact the editor responsible for this story:
Claudia Carpenter at
ccarpenter2@bloomberg.net . | NEWS-MULTISOURCE |
Portal:Cars/Anniversaries/March 17
* 1834 — Gottlieb Daimler is born
* 1960 — The upscale Mercury Comet compact car is introduced.
* 2000 — Ford Motor Company announces that it will acquire Land Rover from BMW | WIKI |
Template:Attached KML/Ontario Highway 522B
Ontario Highway 522B.kml normal #line-1267FF-50 highlight #line-1267FF-51 ff0000ff 5 </Style> <Style id="line-1267FF-51"> <LineStyle> ff0000ff 5 </LineStyle> </Style> <Placemark> Ontario Highway 522B <styleUrl>#line-1267FF-5</styleUrl> <ExtendedData> </ExtendedData> <LineString> 1 -79.35945,45.98706,0 -79.35942,45.98807999999999,0 -79.35941,45.98825,0 -79.35939999999999,45.98864,0 -79.35939999999999,45.98897,0 -79.35941,45.98921000000001,0 -79.35943000000002,45.98949,0 -79.35944000000001,45.98965999999999,0 -79.35947,45.98989,0 -79.3596,45.99077000000001,0 -79.35974,45.99168999999999,0 -79.35983,45.99232,0 -79.35988999999999,45.99274,0 -79.36015,45.99451,0 -79.36021,45.99488000000001,0 -79.36024000000001,45.99506,0 -79.36028,45.99523,0 -79.36031,45.99531,0 -79.36036,45.99543,0 -79.36041,45.99554999999999,0 -79.36049,45.99569000000001,0 -79.36060000000001,45.99587,0 -79.36073000000002,45.99601,0 -79.36084,45.99612,0 -79.36099000000002,45.99625,0 -79.36114000000001,45.99638000000001,0 -79.36126,45.99647,0 -79.36132000000001,45.99649999999999,0 -79.36158,45.99664,0 -79.36197,45.99679999999999,0 -79.36236,45.99693,0 -79.36303,45.99710999999999,0 -79.36320000000001,45.99716000000001,0 -79.36397,45.99739,0 -79.36481000000001,45.99762,0 -79.36509,45.99771,0 -79.36535000000001,45.99778,0 -79.36547,45.99782,0 -79.36597,45.99797,0 -79.36738,45.99837,0 -79.36754000000001,45.99842000000001,0 </LineString> </Placemark> </Document> | WIKI |
Front of Patriotic Action
The Front of Patriotic Action (FAP) (Frente de Ação Patriotica) is a political party in Mozambique. In the 1999 general elections, the FAP participated in the RENAMO-EU electoral alliance alongside Mozambique's former rebel group RENAMO and nine other small opposition parties. | WIKI |
Dome Narita
Dome Narita (成田 童夢) is a Japanese former snowboarder and subculture tarento. He competed in the half-pipe snowboarding event at the 2006 Winter Olympics. His main activities and interests are anime, manga, video games, idol MC, and wotagei. He is also an onstage actor and has appeared in short films, which makes him a multi-tarento.
Narita's father is a snowboarding coach called Takashi Narita, his sister is also a former snowboarder, called Melo Imai, and his younger brother, Grim Narita, is a freestyle skier, snowboarder, and wakeboarder, among other sports, who plans to compete in the 2018 PyeongChang Winter Paralympics for snowboarding. | WIKI |
OAuth authorization and PUT requests
Hello, I’m implementing a client for the OSM api.
The authorization is working fine with osm-oauth (https://github.com/osmlab/osm-auth) and I can make all the GET requests, but all PUT or DELETE requests fail with a ‘401 Unauthorized’ message, although the request headers are identical (or is this the problem?).
If anybody can give me a working example of a PUT request I would be very thankful.
I’d suggest either looking at the source code of JOSM, or running JOSM and capturing the traffic with wireshark. or similar.
Actually a lot of this is output by JOSM, anyway.
If you don’t get a reply with specific examples, other places you mgiht consider searching / asking are :
o the dev mailing list https://lists.openstreetmap.org/listinfo/dev
o the help site http://help.openstreetmap.org
o #osm-dev on IRC (see http://wiki.openstreetmap.org/wiki/IRC )
The fact that you can do a GET and not a PUT I suspect means that you’re not authorized (anyone can do a GET, regardless of logged-in status).
I’d also prepare yourself for lots of people asking about programmatic access to the API, since there’s a general nervousness about wide-ranging changes to OSM data (e.g. imports). I’m not implying that you’re doing anything “bad” here; just suggesting that you might need to explain that you’re not :slight_smile: | ESSENTIALAI-STEM |
Doppler Shift
Quantum and Nuclear | Light Sound and Waves
The Doppler effect
Physics Narrative for 14-16 Supporting Physics Teaching
The whistle of moving steam locomotives may appear to change pitch
Stand on the footplate of a speeding locomotive and, no matter what the speed at which the countryside passes, you'll always hear the same note from the whistle. But stand outside, trackside, in that same countryside and you'll hear something very different: the whistle will be of higher pitch as the train approaches and of lower pitch as it recedes. This change in pitch is the result of the Doppler effect, and you get the same shift in pitch from all radiations where there is relative movement between detector and source. The change in pitch depends on the relative speed of the source and detector, so the effect is not easy to detect until you have rather high speeds: walking won't do for sound, for example. Perhaps this explains why trains are so much a part of the history of the Doppler effect and why its discoverer, Christian Doppler (1803–1853), was alive during the railway age. In the 21st century there are so many high-speed objects that once pointed out, you'll notice Doppler effects everywhere.
Red shifting – pitch of vibrations depends on relative movement
As you move towards a source, or it moves towards you, so the pitch of the vibrations increases. As the source and detector separate, so the pitch of the vibrations decreases. This effect is not specific to sound: you can find exactly the same effect in electromagnetic radiations; and you can detect the same effect with ultraviolet, infrared, or X-ray radiation. If the detector and source are moving apart (there is no especially privileged point of view – no absolute axes – so it does not make sense to decide which is actually moving), the detected frequency of the radiation is lower than the emitted frequency.
If it is light, then it will appear redder. All frequencies are shifted – by the same ratio – towards the red end of the spectrum. Such an effect is called redshift: all frequencies are lower than they were.
Looking out into the universe – things appear redder
If, on average, whichever direction you look in, things appear redder than expected, then you might reasonably guess that those same things are moving away from you. If things are moving away from you in all directions, and you don't think that there is anything special about where you are standing (so if you moved a few paces, or perhaps light-years, to the left you'd see the same effect), then the best guess has to be that everything is moving apart from everything else. This is the chain of reasoning that leads to the belief that the universe is expanding.
Notice that it is not simple or straightforward: for example, there is quite a lot hidden in the statement things appear redder than expected. On what basis do we have this expectation? It's quite an extrapolation from what you can observe in the laboratory to speculate how red we'd expect the emissions from a particular part of the universe to be with no relative movement between us and that part.
A physical analogue of the Doppler effect
In a bicycle time trial, the riders set off from the start at regular intervals and arrive at the finish at irregular intervals, because they travel at different speeds. Not so for photons, which always travel at the same speed, so if they set off from the source at regular intervals, they'll arrive at the detector at those same regular intervals. In fact this constancy of interval will also apply to any travelling radiations, since these also travel at a constant speed: blips from adjacent pulses leaving at a fixed interval will arrive with that same fixed interval intact. Unless something odd happens to the start or finish lines, the emitted frequency will be the same as the detected frequency.
Some bicycle races are run under handicap (the parents' race at school sports day is another example – often having a start line set by the decade of the starter): the start line, or the finish line, is not in the same place for all: not all riders cover the same distance, and this too can affect the interval between riders. This applies also to photons, even though they always travel at the speed of light, so covering the distance from source to detector at a constant rate.
Explaining the Doppler effect
One can even imagine races where the start line or finish line moves at a constant rate, so that the interval between photons, or blips, is increased or decreased by a constant amount. The larger the relative speed between source and detector, the greater this increase or decrease. This steady alteration of the distance that the radiations must traverse between source and detector is exactly what happens in the Doppler effect.
Doppler Shift
can be described by the relation (f_o)/(f_s)=(v+v_o)/(v-v_s) 1+z=Δλ/λ
has the special case Redshift
can be exhibited by Progressive Wave
IOP DOMAINS Physics CPD programme
Energy CPD videos
Our new set of videos gives teachers and coaches of physics a preview of the training we offer ahead of this term's live support sessions.
Find out more | ESSENTIALAI-STEM |
Michigan councilman demanded alcohol, food from bar in exchange for political favors, suit claims
A new lawsuit claims Detroit City Councilman Gabe Leland asked for free food and drinks from a bar in exchange for political favors.
(Facebook/Gabe Leland) A Michigan lawmaker is accused of asking for free alcohol and food from a bar in exchange for political favors, according to a lawsuit filed Monday. The co-owner of Centre Park Bar -- which has since shut down -- accused Detroit City Councilman Gabe Leland of offering to help the bar with multiple issues it faced, including tickets for violations. In exchange, the lawsuit alleged, Leland requested free food, drinks and admittance into parties for himself and a friend, the Detroit Free Press reported . The offer was unsolicited, according to the lawsuit. Leland told Centre Park co-owner Kenneth Scott Bridgewater that it was “normal practice” for restaurants in Detroit to provide free services to city officials “upon request,” according to the suit. Bridgewater complied, and Leland received more than $5,000 in food and drinks and ran up bar tabs with his friends that at times exceeded $200, the lawsuit claims. “Bridgewater feared that if he did not honor Defendant Leland’s demands that Defendant Leland would make sure that Centre Park Bar would continue to be ticketed and closed,” the lawsuit stated. This isn’t the first time that Leland has been accused of extortion. In March, Bob Carmack, owner of an auto repair shop, alleged that Leland asked him for $15,000 in exchange for help with a property dispute between Carmack and the city, WJBK-TV reported . Carmack said he wore a wire and recorded conversations that backed up his allegation and subsequent lawsuit. PENNSYLVANIA MAYOR CONVICTED ON CORRUPTION CHARGES At the time, Leland’s attorney told WJBK that the accusations were a “blatant lie” with “absolutely no basis for it in fact.” In January, Leland was part of an FBI probe into a Detroit towing mogul. Leland dated Gasper Fiore’s daughter, Jennifer, and was caught on an FBI wiretap seeming willing to provide the Fiore family with information pertinent to the business, according to the Detroit Free Press . Leland has not been charged with a crime, but Fiore has pleaded guilty to bribing a different elected official and faces up to five years behind bars, according to the Detroit Free Press. FBI RAIDS HOME OF CALIFORNIA MAYOR, CITY HALL, MARIJUANA DISPENSARY IN CONNECTION WITH CORRUPTION PROBE “Anyone that questions my integrity as a result of any personal relationship is also mistaken,” Leland previously told the newspaper. “My personal relationships have never gotten in the way of my responsibilities as a councilman.” Prior to representing the 7th District , Leland served in the Michigan state House. He did not respond to a request for comment on the latest allegations from Fox News. | NEWS-MULTISOURCE |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.