Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Mail app not syncing on Windows? Here’s how to fix it
0
One of the main advantages of using apps like Outlook and the Mail app is synchronization between devices: changes you make on your laptop will reflect on your phone or PC. However, these applications may occasionally stop synchronizing on Windows, as was the case recently with Mail, which is an email client designed by Microsoft.
Below, we take a look at why the Mail app may stop syncing on Windows and the solutions you can try to fix the problem.
Why isn’t the Mail app syncing?
There can be several reasons why the Mail app may not sync on your Windows. Here are the most common:
• The app may be out of date. Many outdated apps have issues syncing and sending or receiving emails. That said, you should also ensure that you are using an updated version of the Windows operating system.
• Sync settings in the Mail app are not configured correctly.
• A temporary bug or corruption error has infected your Mail account. The problem can also be with the operating system itself, so it’s wise to use tools to scan both the program and the system.
Now that we know the potential causes, let’s take a look at the solutions that can help you get rid of this problem for good. However, before you begin, make sure you are connected to a stable internet connection, as most troubleshooting methods will require internet access to be implemented successfully.
1. Update your messaging app
If you’re having trouble with the Mail app, the first thing you should do is make sure the app is updated. Outdated programs not only miss the latest features but also become prone to issues like this and vulnerable to security threats.
If Mail app updates aren’t installing automatically, follow the steps below to do it manually:
1. Launch Microsoft Store and click on the Library icon located at the bottom left.
2. In the next window, click on the three dots in the upper right corner and choose Downloads and updates from the context menu.
3. Click on the Get updates button to install all pending updates. If you only want to continue updating the Mail app, locate the Mail and Calendar option in the list and click on it. The update download should start.
4. Once the update is complete, restart your PC.
On reboot, check if the issue is resolved.
While you’re at it, we also highly recommend updating your Windows to the latest version available, especially if updating the app didn’t fix the problem for you. It is also possible that you are facing an issue due to an incompatibility issue due to your outdated operating system.
Installing the update fixes a number of technical issues within the system, so it’s worth a try. Just go to Settings > Windows Update. Click on the Check for updates button and install the available ones.
2. Adjust mail app sync settings
You may also experience the issue because the Mail app sync settings are not accurate. If this scenario applies, the easiest way to fix the problem is to adjust the settings.
Here’s how you can do it:
1. Launch the Mail app and go to Accounts section.
2. Right-click on the problematic account and choose Account settings from the context menu.
3. Click on Change mailbox sync settings in the next window.
4. Expand the drop-down menu under Download new mail and choose the every 15 minutes option.
5. In the same window, scroll down to Sync options and enable the toggle for E-mail.
6. After making changes, restart your PC and check if the issue is resolved.
3. Add your account
If the problem is caused by a temporary glitch or a bug, you can also try deleting your account and then re-adding it to fix the problem. This simple method has worked for several users, so we recommend giving it a try.
Here is all you need to do:
1. Launch the Mail application and click on the gear icon located in the bottom pane.
2. Click on Manage Accounts.
3. Choose the problematic account and click Delete account from this device.
Once the account is deleted, add it back and see if that makes a difference.
4. Run Windows Store Apps Troubleshooter
You can also fix bugs and other corruption errors in Microsoft Store apps by running the built-in Windows Store troubleshooter designed by Microsoft (see common Microsoft Store issues and fixes for more information.)
This utility will scan your system for potential issues, identify problems, and then automatically apply fixes. You can find the Windows Store app troubleshooter in the Troubleshoot section of the Settings app.
Hopefully the troubleshooter will fix the problem for you in no time. While you’re at it, we also recommend running two other useful troubleshooting utilities built into Windows. SFCs and DISMs. These two utilities work almost like the troubleshooter. They will scan system files for potential problems and replace problematic files with their healthier counterparts.
Mail app sync issues, fixed
The Windows Mail app is an excellent email client that’s easier to use and built into Windows. But while it works fine most of the time, it’s not uncommon to run into problems when using it. We hope that one of the methods mentioned above solved the mail app sync problem for you. If the problem persists, it’s a good idea to let Microsoft know and switch to another alternative like Outlook or Gmail until the problem is resolved.
Share.
About Author
Comments are closed. | ESSENTIALAI-STEM |
Checking date: 02/02/2023
Course: 2022/2023
Optoelectronic systems
(18431)
Study: Bachelor in Industrial Electronics and Automation Engineering (223)
Coordinating teacher: SANCHEZ PENA, JOSE MANUEL
Department assigned to the subject: Electronic Technology Department
Type: Electives
ECTS Credits: 6.0 ECTS
Course:
Semester:
Requirements (Subjects that are assumed to be known)
Electronic Instrumentation Electronic Instrumentation Systems
Objectives
By the end of this content area, students will be able to have: 1. A coherent knowledge of their branch of engineering including some at the forefront of the branch in optoelectronic instrumentation. 2. The ability to apply their knowledge and understanding of optoelectronic instrumentation to identify, formulate and solve engineering problems using established methods. 3. The ability to apply their knowledge and understanding to develop and realise designs to meet defined and specified requirements. 4. An understanding of design methodologies, and an ability to use them in the design of optoelectronic systems. 5. The ability to design and conduct appropriate experiments, interpret the data and draw conclusions. 6. Workshop and laboratory skills. 7. The ability to select and use appropriate equipment, tools and methods. 8. The ability to combine theory and practice to solve problems of optoelectronic instrumentation. 9. An understanding of applicable techniques and methods in optoelectronic instrumentation, and of their limitations.
Skills and learning outcomes
Description of contents: programme
1. Introduction to light. Basic magnitudes. Basic laws of optics 2. Optical sources. Semiconductor devices. Electronic circuits. VLC systems 2.1 Working principle of optical emitters based on semiconductors; Energy bands. Absorption, emission processes spontaneous and stimulated emission 2.2 Types of optical emitters: LED and LASER. Comparison of basic characteristics. Efficiencies 2.3 Electrooptic characteristic curves; Optical power-current curve; Spectral response curve. Bandwidth; Operation dependence on temperature 2.4 Application circuits 2.5 LED-based VLC systems: basic principles 2.6 Mono and multicarrier modulations 2.7 Applications in different environments: vehicles, infoentretainment, etc. 3. Photodetectors and optocouplers. Electronic conditioning circuits 3.1 Absorption process in sc. Principle of operation of photodetectors 3.2 Types of photodetectors: p-n, pin, APD, phototransistors 3.3 Responsivity and efficiency. Spectral and E/O characteristic curves 3.4 Concept of noise in photodetectors: types and evaluation 3.5 Conditioning circuits in photodetectors 4. Electro-optical materials, optical and electrical properties. Devices. Applications 4.1 Electro-optical effects on radiation / matter interaction 4.2 E / O materials: Liquid crystals, Electrochromic and Electrophoretic. Operating principles and characteristic E/O curves 4.3 Electrical equivalent circuits. 4.4 Applications: sensing, privacy control, communications, biomedical, etc. 5. Propagation of light. Optical Fibers: Attenuation and Dispersion 5.1 Propagation in guided media: wave equation 5.2 Characteristic parameters F.O: Singlemode and multimode fibers 5.3 Attenuation in F.O. Communications windows 5.4 Dispersion in F.O.: intermodal, chromatic and PMD 5.5 Bandwidth 6. Optical sensors and fiber optic sensors. Applications 6.1 Introduction. General characteristics of optical sensors. 6.2 Types of sensors depending on the magnitude: T, pressure, stress, etc. 7. Optoelectronic instrumentation systems in industrial applications. 7.1 Basic components of instrumentation systems 7.2 S.I. for applications in environment, space, etc.
Learning activities and methodology
The teaching methodology will include: - Magisterial Classes, where the students will be presented with the basic knowledge they must acquire. Students will be supplied with lecture notes and key reference texts which will enable them to complete and acquire a more in depth knowledge of the subject. - Problems Classes, these are aimed at the solving of exercises and examples within the context of real case studies. These classes will be complimented with the resolution of practical exercises on behalf of the student. - Laboratory Practical Sessions - Group tutorials
Assessment System
• % end-of-term-examination 40
• % of continuous assessment (assigments, laboratory, practicals...) 60
Calendar of Continuous assessment
Basic Bibliography
• B.E.A. Saleh , M.C. Teich. Fundamentals of Photonics. Wiley - Interscience. 2007
• R.P. Khare. Fiber Optics and Optoelectronics. Oxford. 2004
Additional Bibliography
• Edel Uiga. Optoelectronics. Prentice Hall. 1995
The course syllabus may change due academic events or other reasons. | ESSENTIALAI-STEM |
Page:The Journal of English and Germanic Philology Volume 18.djvu/565
Glosses to Spenser's "Shepheardes Calender" 561 tours (V), gars (IV), glitterand (VII), *greete (IV & VIII)., 22 hale (VII), *heame (XI), 23 bent (II), *herse (XI), inly (IX), 24 kirke (V), 25 "latched (III), *levin (VII), 26 *loorde (VII), melling (VII), *meynt (VII & XI), mister (IX), narre (VII), *nye (V), 27 (XI), sike mister men (VII), sneb (II), 29 *steven (IX), stounds (V), *stoure (I), 29 *tene (XI), 30 tydes (X), 31 wae (IX), warke(V), weetelesse (VII), welkin (III & IX), wightly (IX), wite the witelesse (VIII), wonne (II & IX), wracke (II), 32 wyten (V), yode (V). All of the words listed up to this point undoubtedly existed in Middle English; and assuredly the old authors were for Spenser a very mine of verbal curiosities. Of the words that remain unless they were either miss-glossed by E. K. or over- looked by N. E. D. none can have had a Middle English origin. Of these, two or three seem to have come either from Middle Scots literature 33 or else Scots or North English dialects of Spenser's own day: May (XI) is a fairly certain example. Warre (IX) and welter (VII) may also occur in Middle English: it will be difficult to ascertain until either N. E. D. publishes the volume on W or until someone compiles a M. E. dictionary more dependable than Stratmann. 22 The sense in the gloss does not fit the text very well. N.E.D., as usual, accepts the gloss; and, as I have been able to find no literary or dialectical mean- ing that fits the text better, I give it at least provisional acceptance. 23 Characteristically Yorks., E. K. calls it "Northerly"; this suggests that he did not use "Northerly" in general to refer to Cambridge, as Long would have us suppose. 24 The meaning in the gloss fits the text only fairly well. 25 D.D. lists it in Derby, Lincoln and Devon as well as the North. 26 Characteristically Scotch dialect. 27 Midland as well as Northern. 28 Widely diffused over England. 29 Seemingly inaccurate glossing that may be due simply to carelessness. 30 Midland as well as Northern. 31 Widely diffused. The sense of "seasons" is probably merely tropical in any case. 32 Listed in Scot. Oxf. Brks. Dor. and Dev. 33 Jamieson's Dictionary and more especially the glossaries in Gregory Smith's Specimens, and in the standard editions of Douglas, Barbour and Dunbar, have served as tests.
* cragge (II & IX), *dight (IV), ecked (IX), *fayne (V), fay-
* poynte of worthy wite (VI), *quell (III), 28 sam (V), *shene | WIKI |
Copper slags
Avoiding metal losses in metallurgical slag based on the example of copper recovery
The joint project "Copper slags" developed a method to avoid metal losses in metallurgical slag based on the example of copper recovery. The majority of metals produced in the world today are extracted by smelting. The slags formed in the process still contain a share of the valuable metals, which means these slags represent an important source of secondary raw materials. Their potential can be better exploited by targeted separation and concentration of the valuable elements in marketable product phases.
The project partners developed an efficient and flexible treatment process for slags from primary metal production, which maximises the total output of valuable metallic components like copper compared to conventional processes.
The innovative part of this method is the combination of a conventional electric furnace with a downstream stir reactor, whose magnetic field helps to achieve a better mixture and then to separate the metals from the slag tank. Adding reducing agents in parallel causes the reduction of oxidised, chemically bound metals.
The innovative combination of processes results in increased flexibility and improved process quality. Besides increasing the output of valuable metals, the co-product iron silicate stone is also produced. Due to its low heavy metal content, this can be used for constructing roads and hydraulic engineering applications.
The process conserves natural resources because both ore concentrates and natural rock can be substituted. The process combination can also optimize output in other slag systems. Furthermore, slag heaps can also be treated using this method in the sense of "urban mining".
Document (only in German)
This website only uses session cookies. Data protection | ESSENTIALAI-STEM |
MapStruct 사용하기 고급
By | 2021년 1월 25일
Table of Contents
MapStruct 사용하기 고급
DTO – Entity 준비
@Setter
@Getter
@NoArgsConstructor
@Entity
public class TestBrands {
private String brandId;
private String partnerId;
private String brandName;
private String useyn = "Y";
private String partnerId2;
}
@Getter
@Setter
@NoArgsConstructor
public class TestBrandsDto {
private String brandId;
private String partnerId;
private String brandName;
private String useyn;
private String brandName2;
}
스프링과 mapstruct 을 사용할 경우 componentModel = "spring"
반드시 붙여주어야 오류가 발생하지 않는다.
@Mapper(componentModel = "spring")
public interface TestBrandsMapper {
TestBrands toEntity(TestBrandsDto dto);
TestBrandsDto toDto(TestBrands entity);
}
일치하지 않는 필드 무시하기
ReportingPolicy.IGNORE 를 설정해서 일치하지 않는 필드를 무시할 수 있다.
@Mapper(componentModel = "spring", unmappedTargetPolicy = ReportingPolicy.IGNORE)
public interface TestBrandsMapper {
TestBrands toEntity(TestBrandsDto dto);
TestBrandsDto toDto(TestBrands entity);
}
무시할 필드를 명시할 수 있다.
@Mapper(componentModel = "spring")
public interface TestBrandsMapper {
@Mapping(target = "partnerId2", ignore = true)
@Mapping(target = "useyn", ignore = true)
TestBrands toEntity(TestBrandsDto dto);
@Mapping(target = "brandName2", ignore = true)
@Mapping(target = "useyn", ignore = true)
TestBrandsDto toDto(TestBrands entity);
}
일치하지 않는 필드를 수동으로 매핑
@Mapper(componentModel = "spring")
public interface TestBrandsMapper {
@Mapping(source = "partnerId", target = "partnerId2")
@Mapping(target = "useyn", ignore = true)
TestBrands toEntity(TestBrandsDto dto);
@Mapping(source = "brandName", target = "brandName2")
@Mapping(target = "useyn", ignore = true)
TestBrandsDto toDto(TestBrands entity);
}
상속받은 클래스 매핑
@SuperBuilder 를 붙여준다.
@Getter
@SuperBuilder
class BaseDto {
private Long id;
}
@SuperBuilder
@Getter
@ToString
public class UserDto extends BaseDto {
private String name;
private String lastName;
private String username;
private String password;
private String profilePicturePath;
}
Embedded class 를 쪼개서 매핑하고 싶을 때
Embedded class 의 변수명과 점을 붙여준다.
@Mapper(unmappedTargetPolicy = ReportingPolicy.IGNORE, componentModel = "spring")
public interface ItemOptionToSearchServiceConverter {
@Mapping(source = "id.itemId", target = "itemId")
@Mapping(source = "id.itemOption", target = "itemOption")
@Mapping(target = "id", ignore = true)
SearchItemOptionEntity convert(SrcItemOptionEntity srcItemOptionEntity);
}
답글 남기기 | ESSENTIALAI-STEM |
Measuring visceral fat, subcutaneous fat and skeletal muscle area changes by computed tomography in acute pancreatitis: a retrospective, single-centre study.
Abstract
OBJECTIVE To show that body composition of intensive care unit patients can be analysed with existing computed tomography (CT) images. We planned to describe changes in visceral fat area (VFA), subcutaneous fat area (SFA) and muscle area (MA) on analysis of specific CT images during acute pancreatitis requiring an ICU admission. DESIGN, SETTING AND PARTICIPANTS Retrospective analysis of body composition using existing CT images, in an ICU of a tertiary university-affiliated hospital 2005-2010, examining 21 patients with acute pancreatitis and CT imaging on two separate occasions within their hospital admission. MAIN OUTCOME MEASURES VFA, SFA, VFA:SFA ratio and MA. Medical records were hand searched to identify ICU and hospital mortalities and other clinical outcomes. RESULTS Three women and 18 men had 84 CT scans analysed, from the level of the right renal hilum and L3 vertebra. The median patient age was 52 years. The median time between CT scans was 9.4 days and the mean Acute Physiology and Chronic Health Evaluation II score was 20.2. ICU mortality was 9%. Analysis showed a decrease in VFA from a median of 229.2 cm2 to 202.1 cm2 (P < 0.01) and a decrease in VFA:SFA ratio from a median of 1.20 to 1.05 (P < 0.01) during the acute illness. MA did not change significantly. CONCLUSIONS The body composition of ICU patients can be analysed through existing CT images. Pancreatitis requiring ICU admission causes a 12% decrease in VFA.
Cite this paper
@article{Brewster2014MeasuringVF, title={Measuring visceral fat, subcutaneous fat and skeletal muscle area changes by computed tomography in acute pancreatitis: a retrospective, single-centre study.}, author={David J Brewster and Boyd Josef Gimnicher Strauss and Timothy M Crozier}, journal={Critical care and resuscitation : journal of the Australasian Academy of Critical Care Medicine}, year={2014}, volume={16 1}, pages={42-7} } | ESSENTIALAI-STEM |
Pregnancy and Healthy Baby – What you need to know
pregnancy care classes
Pregnancy is a crucial time in the life of a woman. The body is changing drastically and the baby inside the stomach does pose new demands on the mother’s body. The onus is on doing everything right, so that you have a healthy baby. If you are seeking professional help, the pregnancy care classes will be a blessing in disguise.
Some birth defects have been linked to lack of vitamins and minerals. Now the question is how you pick the right form of prenatal vitamins to ensure a healthy pregnancy for the baby. Should you rely on the advice of your doctor or do you need to know more. Should you avail prenatal classes even after your pregnancy is over? You need to look deeper on what are the needs of a mother before and after the course of pregnancy. It is such a critical time that you would need to ensure a proper array of vitamins, minerals along with a dose of fatty acids for a healthy pregnancy. It does pose a lot of effort on breastfeeding and the body is deprived of omega 3 fatty acids. You would need to target each stage of pregnancy with the perfect balance of nutrients.
Studies point to the fact that women who receive the correct amount of DHA, during pregnancy have babies with increasing level of attention spans in the first two years of their life. The benefits of consumption of Omega 3 acids before as well as after the pregnancy are something really amazing. You need to take into consideration that the baby will first need to develop and grow, and for this reason the body might suffer if the necessary amount of vitamins or minerals is not provided to the body.
Healthy baby
Every mineral or vitamin has an important job to do for both the mother and the baby. The development of the baby depends on it. The right type of vitamins will help to build the bones and teeth of the baby, and in the process, it ensures that the baby has a healthy start to their life.
In this regard eating a variety of healthy foods is important, but with morning sickness, hectic lifestyles and the changing nutritional demands of the baby it is pretty difficult to adopt. Indeed, nutrition is important, during the recovery and when you are breastfeeding the little one.
Prenatal vitamins
Just picking up any normal course of vitamins from a drugstore is not a healthy habit. The prenatal vitamins are full of packed nutrients that will support and nourish your baby during the course of pregnancy. Now the question is how do you figure out which are the right prenatal vitamins and whether it will be good for your baby or not? These vitamins are important as during the stages of pregnancy, women tend to have a feeling of nausea or vomiting which may force them to skip meals. So these forms of nutrients do a great balancing job.
These vitamins can be taken on a daily basis to ensure that a woman is receiving their regular dosage of supplements. Say for example, calcium and magnesium are very important during pregnancy, and better you can forget folic acid needed before and after pregnancy.
Author: admin
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
Senate set to kill parties' competing spending-cut bills - Washington Times
Sign In Another short-term budget likely Manage Newsletters How to save the news industry beyond the COVID-19 pandemic Taking constitutional rights seriously during COVID-19 pandemic Showing respect in a time of lockdown because of the coronavirus crisis House Republicans said Tuesday they will likely have to write another short-term spending bill to avert a government shutdown on March 18, as a deal over funding the final seven months of the fiscal year remained elusive. Senators are scheduled to vote Wednesday on two competing proposals: the House Republicans' plan, which includes $57 billion in new cuts from 2010 spending levels, and the Senate Democrats' proposal, which draws the line at $4.7 billion in new cuts. But both sides acknowledge those votes will be mostly to show that neither bill can pass. We want the American people to know that [the House bill] is dead. And we'll get there, said Senate Majority Leader Harry Reid, Nevada Democrat. TOP STORIESTrump urges nation to pray to God for 'protection and strength'Serbia's coronavirus crackdown and a warning for AmericaChinese markets again selling bats -- likely source of deadly pandemic -- reporters say But the path beyond those votes remains murky. Neither side is prepared to give in, and Vice President Joseph R. Biden Jr., tapped last week to lead negotiations, is out of the country. With the current funding expiring on March 18, House Republicans said they lack faith the Senate will act in time. So they are preparing another short-term spending bill to keep the government open. Because of their lack of action and the vice president starting negotiations and then leaving the country, I think Republicans will be prepared in the House to do another two- or three-week [spending bill], House Majority Whip Kevin McCarthy told reporters at a breakfast discussion sponsored by the Christian Science Monitor. Mr. Reid, though, said he is opposed to more short-term measures. All of the debate is over spending for the current fiscal year, which began Oct. 1 more than five months ago. The House, on the strength of Republican votes, passed a bill last month that cuts an additional $57 billion from 2010 spending levels. The Senate, though, has yet to pass a bill, and Mr. Reid has not yet scheduled the kind of free-flowing debate that could produce a bill on the Senate floor. Part of the reason is that party leaders in the Senate are having a tough time corralling their members. Conservative Republican senators want to see deeper cuts than the House bill, while less-conservative members of the GOP think the bill goes too far. Meanwhile, Sen. Joe Manchin III, West Virginia Democrat, took to the Senate floor to blast both the GOP and Democrats and to demand more leadership from President Obama. Why are we doing all this when the most powerful person in these negotiations our president has failed to lead this debate or offer a serious proposal for spending and cuts that he would be willing to fight for? Mr. Manchin said. Mr. Obama last week said he would get more involved and said Mr. Biden would lead talks, but Mr. Biden is in Europe this week for meetings with foreign leaders. House Majority Leader Eric Cantor, Virginia Republican, said Wednesday's Senate votes rejecting both proposals on the table will take away two numbers from the discussion, though he also said it's premature for House Republicans to abandon their position of higher cuts. Earlier this year, rank-and-file House Republicans pressed their leadership to dig deeper on cuts, and on Tuesday Rep. Tom Graves, a Georgia Republican who helped organize that push, said his colleagues remain firm. I know the House is going to stand strong. What's awesome about this freshman class is that they're focused on the next generation and not the next election, Mr. Graves told the Washington Times-affiliated American's Morning News radio program. They're willing to put up the tough votes, because that's what it's going to take. • David Eldridge contributed to this article. Copyright 2020 The Washington Times, LLC. Click here for reprint permission. Click to Read More and View Comments Click to Hide Terms of Use / Privacy Policy / Manage Newsletters | NEWS-MULTISOURCE |
John Peel (writer)
John Peel (born 1954) is a British writer, best known for his TV series tie-in novels and novelisations. He has written under several pseudonyms, including "John Vincent" and "Nicholas Adams". He lives on Long Island, New York. While his wife is a US citizen, Peel continues to travel under a British passport.
Career
During the 1980s, Peel wrote a licensed spin-off novel based on the popular 1960s TV series The Avengers, titled Too Many Targets. He is also known for his various books based on Doctor Who, Star Trek and James Bond Jr. (written as "John Vincent").
Doctor Who books
A friend of the television writer Terry Nation, Peel wrote novelisations of several Doctor Who stories for Target Books featuring Nation's Daleks; he is reportedly one of the few writers to have been willing to do so, given the high percentage of the author's fee that Nation's agents demanded for the rights to use the Daleks. For similar reasons, Peel is one of the few novelists to have used the Daleks in full-length, original Doctor Who novels, examples of which include War of the Daleks (1997) and Legacy of the Daleks (1998), written for the BBC Books Eighth Doctor Adventures range. Neither novel was especially well received by fans of the series, in part due to Peel's re-writing of Dalek history as depicted in the TV series (in particular the destruction of Skaro in the 1988 serial Remembrance of the Daleks), to bring their story more into line with Nation's vision.
With the publication of Timewyrm: Genesys (1991), Peel became the first author to write a full-length Doctor Who novel, featuring the Doctor, not to be based on either a TV or radio script. He had been selected by editor Peter Darvill-Evans to launch the Virgin New Adventures range, to resume the story of the Doctor's travels from where the now-cancelled TV series had left off. He also wrote the Evolution (1994) for their sister range, Missing Adventures (featuring previous Doctors and companions), and also The Gallifrey Chronicles (1991, not to be confused with the Eighth Doctor Adventures book), a compendium of the history of the Doctor's planet, Gallifrey.
Select bibliography
* Maniac
* Poison
* Shattered
* Talons
* The Mystery Files of Shelby Woo: Hot Rock
* The Secret of Dragonhome
* The Secret World of Alex Mack: I Spy, Lost in Vegas
* The Young Astronauts: Ready for Blastoff! (as "Rick North")
* Freedom's Fire (as "J.P. Trent")
Are You Afraid of the Dark? series
* The Tale of the Sinister Statues
* The Tale of the Restless House
* The Tale of the Zero Hero
* The Tale of the Three Wishes
Carmen Sandiego series
All published by Western Publishing.
* Where in America is Carmen Sandiego?
* Where in America's Past is Carmen Sandiego?
* Where in Europe is Carmen Sandiego?
* Where in Space is Carmen Sandiego?
* Where in the World is Carmen Sandiego?
* Where in the USA is Carmen Sandiego?
* Where in the USA is Carmen Sandiego, Part II?
* Where in Time is Carmen Sandiego?
* Where in Time is Carmen Sandiego, Part II?
Diadem series
The first six books were originally published by Apple. After the cancellation of the series by Apple, they were re-printed by Llewellyn Publications between 2004 and 2005. Books seven through ten were published directly by Llewellyn. Books eleven and twelve were only published in a one-volume edition, by Dragonhome Books, in 2012.
Also published in French by AdA Éditions, under the title Les mondes de la magie du Diadème.
* Book of Names (August 1997, Paperback ISBN 0-590-05947-5, Re-print ISBN 0-7387-0617-5)
* Book of Signs (August 1997, Paperback ISBN 0-590-05948-3, Re-print ISBN 0-7387-0616-7)
* Book of Magic (August 1997, Paperback ISBN 0-590-05949-1, Re-print ISBN 0-7387-0615-9)
* Book of Thunder (Hardback ISBN 0-590-05950-5, Re-print ISBN 0-7387-0614-0)
* Book of Earth (February 1998, Paperback ISBN 0-590-14965-2, Re-print ISBN 0-7387-0613-2)
* Book of Nightmares (April 1998, Paperback ISBN 0-590-14966-0, Re-print ISBN 0-7387-0612-4)
* Book of War (May 2005, ISBN 0-7387-0611-6)
* Book of Oceans (September 2005, ISBN 0-7387-0748-1)
* Book of Reality (February 2006, ISBN 0-7387-0843-7)
* Book of Doom (June 2006, ISBN 0-7387-0842-9)
* Book of Time & Book of Games (November 2012, ISBN<PHONE_NUMBER>007)
Doctor Who series
* The Chase
* The Daleks' Master Plan, Part I: Mission to the Unknown
* The Daleks' Master Plan, Part II: The Mutation of Time
* The Power of the Daleks
* The Evil of the Daleks
* War of the Daleks
* Legacy of the Daleks
* The Gallifrey Chronicles
* Evolution
* Timewyrm: Genesys
Dragonhome Series
* The Secret of Dragonhome (1998)
* The Slayers of Dragonhome
* The Siege Of Dragonhome
Eerie, Indiana series
* Eerie, Indiana: Bureau of Lost (ISBN 0-380-79775-5)
* Eerie, Indiana: Simon and Marshall's Excellent Adventure (ISBN 0-380-79777-1)
James Bond, Jr. series
All published by Puffin Books in 1992 under the pen name "John Vincent".
* A View to a Thrill
* The Eiffel Target
* Sandblast
* Live And Let's Dance
* Sword of Death
* High Stakes
Shockers series
Published by Grosset & Dunlap.
* Shockers: Alien Prey
* Shockers: Blood Wolf
* Shockers: Dead End
* Shockers: Ghost Lake
* Shockers: Grave Doubts
* Shockers: Night Wings
Star Trek: The Next Generation series
* Here There Be Dragons (1993)
* The Death of Princes (1997)
Star Trek: Deep Space Nine, Young Adult series
* Prisoners of Peace (1994)
* Field Trip (1995)
Star Trek: Deep Space Nine series
* Objective: Bajor (May 1996, ISBN 0-671-56811-6)
Tombstones series
Published by Pocket Books in 1995.
* Dances With Werewolves
* The Last Drop
2099 series
* Doomsday (September 1999, ISBN 0-439-06030-3)
* Betrayal (November 1999, ISBN 0-439-06031-1)
* Traitor (January 2000, ISBN 0-439-06032-X)
* Revolution (March 2000, ISBN 0-439-06033-8)
* Meltdown (May 2000, ISBN 0-439-06034-6)
* Firestorm (July 2000, ISBN 0-439-06035-4)
Written as "Nicholas Adams"
All published by HarperCollins. "Nicholas Adams" is also the pen name for Debra Doyle and James D. Macdonald.
* I.O.U. (1991)
* Santa Claws (1991)
* Horrorscope (1992, ISBN 0-06-106109-3)
Comics
Peel has written Doctor Who comic strips for Doctor Who Monthly:
* Doctor Who (art by John Stokes):
* "Devil of the Deep" (Doctor Who Monthly #61)
* "The Fires Down Below" (Doctor Who Monthly #67) | WIKI |
Talk:Narrow Water Castle
Untitled
Is Narrow Water Castle a Water castle, meaning: Is it surrounded by water-ditches or is it just at the bank of the river and the other 3 sides are not protected by water? In the latter case I will take Narrow Water Castle out of the article Water castle. Those of you, who have seen the castle: Please answer. --Rheinländer 09:48, 29 November 2006 (UTC)
* It's a castle at the Narrow Water of Carlingford Lough, as I understand it. There's also a tower on the opposite shore of the narrows, to control passage in the lough. Certainly when I visited, Narrow Water Castle was at the side of the lough-side road, between the road and the shore of the lough. I walked round the exterior landside wall - it was not moated (but whether it may have been moated in the past, I don't know). Man vyi 13:56, 6 December 2006 (UTC)
* Thank you, Man vyi! The Castle is not a typical water castle, so I will take it out of the article water castle. There is Motte on the map only a few hundred meters away from the castle. --Rheinländer 10:15, 7 December 2006 (UTC)
Narrow Water Keep
This whole page is completely inaccurate. This article is about 'Narrow water Keep'. Narrow water castle is actually a different building on the other side of the dual carriageway, the current residence of the Hall family which hosts music concerts, art shows and horse riding competitions. Please ammend.
Requested move 28 May 2017
The result of the move request was: Not moved. The presented evidence seems to suggest common name is the "castle" version — Amakuru (talk) 13:32, 15 June 2017 (UTC)
Narrow Water Castle → Narrow Water Keep, Warrenpoint – Narrow Water Castle is a completely different site. This article is clearly about the building known as the Narrow Water Keep Lisburn lovely (talk) 18:43, 28 May 2017 (UTC)
* Further evidence
* Google search: Narrow Water Castle: About 799,000 results
* Google search: Narrow Water Keep: About 2,970,000 results
As per WP:COMMONNAME it should be renamed.
* Oppose. "Narrow Water Keep" returns only 9 hits on Google Books, compared to 1680 for "Narrow Water Castle". The current name appears to be the WP:COMMONNNAME.--Cúchullain t/ c 18:07, 5 June 2017 (UTC)
* Comment: The other "Narrow Water Castle" is a 19th Century stately home that now offers tourist accomodation, see Warrenpoint. It's probably not notable, so the question is simply which is the common name for the older building. Andrewa (talk) 08:39, 6 June 2017 (UTC)
| WIKI |
At your Surrogacy Screening appt, you may have already been given an approximate timeline and protocol. Each protocol is individual but here is a sample of the most common:
• Call the clinic on your Day 1. Day 1 is the first day of full flow of your period.
• Day 21, Lupron shot, Lupron is an injection commonly given in the buttocks that helps to “shut down” your own cycle. It is much like the birth control Depo-Vera, and puts you in a menopausal like state. Common side effects are that of menopause, hot flashes, slight bloating, headaches, and mood swings. Because Lupron is a slow releasing drug, you will most likely still get your period or some breakthrough bleeding.
• Accordingly to your individual protocol you may be asked to get blood work done after a couple of weeks to ensure the Lupron has taken effect, this is called Suppression Check.
• Once the doctor determines you are ready, often times you will begin Estrace, a form of estrogen. This is to start your cycle back up in sync with your IM or an egg donor. It will build your endometrial lining in preparation for a baby. You can expect to have some bloating and water retention however many of the side effects you had with Lupron will disappear. Baby Aspirin is often added at this time as well.
• Sometime within the next few weeks you will go in again for what is known as lining check. They will measure the thickness of your lining. Most clinics like it to be .8 or higher.
• Once your lining is at the desired level, you may begin Progesterone as well as the medication you are currently taking. This medication comes in 2 forms, oil and suppositories. Often times girls are put on both.
• Progesterone in oil is done usually once per day again in the buttock. It’s an easy injection many girls do on their own, and you will be taught how to do it. Side effects are typical as those of pregnancy, with the exception of the nausea that one only gets when actually pregnant. Progesterone suppositories are typically done vaginally 3 times per day. Again side effects are much like pregnancy, as both forms of progesterone trick your body into thinking that you’re pregnant.
• You will continue on these medications until your blood work is done, 2 weeks after pregnancy, to determine if you are pregnant or not. If you are pregnant, you will continue the medications until your 12th week of pregnancy. | ESSENTIALAI-STEM |
Open source Puppet documentation
A Puppet master server provides several services via HTTP API, and the Puppet agent application uses those services to resolve a node’s credentials, retrieve a configuration catalog, retrieve file data, and submit reports.
In general, these APIs aren’t designed for use by tools other than Puppet agent, and they’ve historically relied on a lot of shared code to work correctly. This is gradually changing, although we expect external use of these APIs to remain low for the foreseeable future.
Puppet will often send garbage URL parameters, such as fail_on_404 and ignore_cache. The server will ignore any parameters it isn’t expecting.
V1/V2 HTTP APIs (Removed)
The V1 and V2 APIs were removed in Puppet 4.0.0. The routes that were previously under / or /v2.0 can now be found under the /puppet/v3 API or /puppet-ca/v1 API.
Starting with version 2.1, the Puppet Server 2.x series provides both the current and previous API endpoints, and can serve nodes running Puppet agent 3.x and 4.x. However, Rack masters, WEBrick masters, and Puppet Server 2.0 cannot serve nodes running Puppet 3.x.
Puppet and Puppet CA APIs
Beginning with Puppet 4, Puppet’s HTTP API has been split into two APIs, which are versioned separately. There is now an API for configuration-related services and a separate one for the certificate authority (CA).
All configuration endpoints are prefixed with /puppet, while all CA endpoints are prefixed with /puppet-ca. All endpoints are explicitly versioned: the prefix is always immediately followed by a string like /v3 (a directory separator, the letter v, and the version number of the API).
Authorization
Authorization for /puppet endpoints is still controlled with Puppet’s auth.conf authorization system.
Puppet Server ignores auth.conf for /puppet-ca endpoints. Access to the certificate_status endpoint is configured in Puppet Server’s ca.conf file, and the remaining CA endpoints are always accessible. Rack Puppet master servers still use auth.conf for /puppet-ca.
When specifying authorization in auth.conf, the prefix and the version number (e.g. /puppet/v3) on the paths must be retained, since Puppet matches authorization rules against the full request path.
Puppet V3 HTTP API
The Puppet agent application uses several network services to manage systems. These services are all grouped under the /puppet API. Other tools can access these services and use the Puppet master’s data for other purposes.
The V3 API contains endpoints of two types: those that are based on dispatching to Puppet’s internal “indirector” framework, and those that are not (namely the environment endpoints).
Every HTTP endpoint that dispatches to the indirector follows the form: /puppet/v3/:indirection/:key?environment=:environment where:
• :environment is the name of the environment that should be in effect for the request. Not all endpoints need an environment, but the query parameter must always be specified.
• :indirection is the indirection to dispatch the request to.
• :key is the “key” portion of the indirection call.
Using this API requires significant understanding of how Puppet’s internal services are structured, but the following documents attempt to specify what is available and how to interact with it.
Configuration Management Services
These services are all directly used by the Puppet agent application, in order to manage the configuration of a node.
These endpoints accept payload formats formatted as JSON or PSON (MIME types of application/json and text/pson, respectively) except for File Content and File Bucket File which always use application/octet-stream.
Informational Services
These services are not directly used by Puppet agent, but may be used by other tools.
Environment Endpoints
The endpoints with a different format are the /puppet/v3/environments and the /puppet/v3/environment/:environment endpoints.
These endpoints will only accept payloads formatted as JSON and respond with JSON (MIME type of application/json).
Puppet Server-specific endpoints
When using Puppet Server 2.3 or newer as a Puppet master, Puppet Server adds additional /puppet/v3/ endpoints:
Error Responses
The environments endpoint will respond to error conditions in a uniform manner and use standard HTTP response code to signify those errors.
• When the client submits a malformed request, the API will return a 400 Bad Request response.
• When the client is not authorized, the API will return a 403 Not Authorized response.
• When the client attempts to use an HTTP method that is not permissible for the endpoint, the API will return a 405 Method Not Allowed response.
• When the client asks for a response in a format other than JSON, the API will return a 406 Unacceptable response.
• When the server encounters an unexpected error during the handling of a request, it will return a 500 Server Error response.
• When the server is unable to find an endpoint handler for an http request, it will return a 404 Not Found response
All error responses will contain a body, except when it is a HEAD request. The error responses will uniformly be a JSON object with the following properties:
• message: (String) A human readable message explaining the error.
• issue_kind: (String) A unique label to identify the error class.
A JSON schema for the error objects is also available.
CA V1 HTTP API
The certificate authority (CA) API contains all of the endpoints supporting Puppet’s public key infrastructure (PKI) system. This endpoint is now handled entirely through Puppet Server. See Puppet Server’s HTTP API docs for detailed information.
Serialization Formats
Puppet sends messages using several different serialization formats. Not all REST services support all of the formats.
YAML was supported in earlier versions of Puppet, but is no longer for security reasons.
Back to top | ESSENTIALAI-STEM |
Natural Remedies for Type 1 Diabetes
(BlackDoctor.org) — Also known as childhood-onset diabetes,
type 1 diabetes requires regular blood sugar tests and medical intervention.
According to research or other evidence, the following self-care steps may be
helpful:
What You Need To Know:
• Go for the chromium
Under the supervision of a doctor,
take 200 mcg a day of this essential trace mineral to improve glucose tolerance
• Fight back with fiber
Under a doctor’s supervision,
stabilize your blood sugar by eating fiber from whole grains, beans (legumes),
vegetables, and fruit, and consider using a fiber supplement such as psyllium or
guar gum
• Protect with alpha lipoic acid
Protect against diabetic
complications, such as nerve and kidney damage, by taking 600 to 1,200 mg of
this supplement per day
• Discover EPO
Help relieve pain from diabetic
neuropathy by taking 4 grams of evening primrose oil supplements per day
• Get to know niacinamide
Talk to a knowledgeable
healthcare provider to determine if taking large amounts of the supplement
niacinamide might prevent or limit the severity of type 1 diabetes in your
family
These recommendations are not comprehensive and are not intended to replace
the advice of your doctor or pharmacist. Continue reading the full diabetes
article for more in-depth, fully-referenced information on medicines, vitamins,
herbs, and dietary and lifestyle changes that may be helpful.
Dietary changes that may be
helpful
Eating carbohydrate-containing foods, whether high in
sugar or high in starch (such as bread, potatoes, processed breakfast cereals,
and rice), temporarily raises blood sugar and insulin levels. The blood
sugar–raising effect of a food, called its “glycemic index,” depends on how
rapidly its carbohydrate is absorbed. Many starchy foods have a glycemic index
similar to table sugar (sucrose). Beans, peas, fruit, and oats have low glycemic
indexes, despite their high carbohydrate content, due mostly to the
health-promoting effects of soluble fiber. Controlled studies have found that
people with type 1 diabetes who follow a low-glycemic-index diet have better
long-term control over their blood sugar levels compared with those following a
high-glycemic-index diet. However, other studies find similar benefits from
training patients to adjust their insulin doses according to the total
carbohydrate content of each meal or snack (“carbohydrate counting”). People
with type 1 diabetes should always discuss changes in their diet with their
treating physician.
Diabetes disrupts the mechanisms by which the body controls blood sugar.
Until recently, health professionals have recommended sugar restriction to
people with diabetes, even though short-term high-sugar diets have been shown,
in some studies, not to cause blood sugar problems in people with diabetes.
Currently, the American Diabetic Association (ADA) guidelines do not prohibit
the use of moderate amounts of sugar, as long as blood levels of glucose,
triglycerides, and cholesterol are maintained within normal levels.
Most doctors recommend that people with diabetes cut intake of sugar from
snacks and processed foods, and replace these foods with high-fiber, whole
foods. This tends to lower the glycemic index of the overall diet and has the
additional benefit of increasing vitamin, mineral, and fiber intake. Other
authorities also recommend lowering the glycemic index of the diet to improve
the control of diabetes. | ESSENTIALAI-STEM |
Trump huddles with Alibaba, despite piracy pledge
NEW YORK — On the campaign trail, Donald Trump threatened to crack down on China’s “outrageous theft” of U.S. goods. Now, as president-elect, he’s huddling with a company that the U.S. government just labeled as a haven for counterfeits. On Monday, Trump met privately with Jack Ma, the founder and executive chairman of Alibaba Group, a China-based tech giant whose online platform for small sellers — an eBay-like website called Taobao — has long faced criticism for pirated items sold on its platform. Entering the meeting here at Trump Tower, a spokesman for Alibaba Group said Trump and Ma would discuss “how Alibaba will create 1 million U.S. jobs by enabling 1 million small businesses” to sell on its site. The aide later declined to specify whether the target is new or exactly how the company would reach it, but exiting the session, Ma told reporters: “We are helping American small business.” In December, though, the government's primary trade arm, the Office of the U.S. Trade Representative, returned Alibaba to its list of “notorious markets,” an annual roster of websites that it views as facilitating copyright piracy and trademark infringement. Many U.S. manufacturers and sellers told the government that “Alibaba platforms, particularly Taobao, are used to sell large quantities of counterfeit goods,” according to the report. Trump himself has been especially critical of China for failing to stop the sale of pirated goods: His website pledged he would “use every lawful presidential power to remedy trade disputes if China does not stop its illegal activities,” including piracy. And the president-elect has selected Robert Lighthizer, a China hawk, as his nominee to head USTR. But the issue did not come up at the meeting Monday, according to Alibaba. "Jack and I are going to do some great things," Trump told reporters after the private gathering Monday. A spokesman for the transition didn't immediately comment for this story. For Alibaba, the meeting Monday reflects the high stakes for Ma and his enterprise in Trump’s new Washington. After Alibaba raised roughly $25 billion in a record-breaking, historic public offering in 2014, the company embarked on a campaign to attract more U.S. buyers and sellers. But Alibaba must now forge new ties with a president-elect who premised much of his 2016 campaign around slamming China. Ma previously has expressed optimism about his company's prospects in the U.S. "I don't fear [a Trump presidency],” he told CNN in 2016. “I think a healthy and positive China-U.S. relationship is so critical.” After the meeting with Trump on Monday, Alibaba described the session as positive. Ma pledged that Alibaba, in working with more U.S. businesses, could help generate more than 1 million U.S. jobs over five years, though the company itself apparently isn't doing the hiring. As part of the effort, Alibaba said it would hold a workshop for small business owners in the Midwest later this year. While the company did not provide further details, its announcement follows a pattern of corporate leaders who have tried to woo Trump by pledging to hire or invest in the United States, even if the targets they've announced predate his presidency. SoftBank, for example, has attributed its plans for a $100 billion investment fund to Trump's election victory, even though the Japanese conglomerate had publicized its effort much before that. Alibaba hired its first lobbyists in Washington after its Taobao marketplace landed on the U.S. notorious markets list in 2011. The following year, the company escaped that designation, after the U.S. said it had taken steps to crack down on piracy. But U.S. businesses kept complaining, and those criticisms led USTR to revive its designation in December 2016. Last year, for example, an organization representing auto parts manufacturers told the U.S. government that the “the majority of automotive parts, tools and equipment marketed with their brands on Alibaba Group’s family of websites are counterfeits.” The American Apparel and Footwear Association also “strongly urge[d] that Alibaba and its constituent platforms, including Taobao” be included on the government’s annual name-and-shame list. Others, like the U.S. Chamber of Commerce, took aim at China generally. “China and Hong Kong together are estimated as the source for 86 percent of global physical counterfeiting, which translates into $396.5 billion worth of counterfeit goods each year,” the business lobbying group told the Obama administration in October. The U.S. Chamber did not comment for this story. Alibaba, however, fiercely has defended its platform. "The decision ignores the real work Alibaba has done to protect [intellectual property] rights holders and assist law enforcement to bring counterfeiters to justice," Michael Evans, president of Alibaba Group, said in a statement in December. "The more than 100,000 brands that operate on Alibaba’s marketplaces cannot all be wrong — they are a clear demonstration of the trust that rights holders place in us. We question whether the USTR acted based on the actual facts or was influenced by the current political climate." Doug Palmer contributed to this story. | NEWS-MULTISOURCE |
10899
On the origin of yet another channel
Petr Svenda, Vaclav Matyas
Masaryk University, Brno, Czech Republic
21th International Workshop on Security Protocols (SPW 2013), 2013
@incollection{vsvenda2013origin,
title={On the origin of yet another channel},
author={v{S}}venda, Petr and Maty{‘a}{v{s}}, V{‘a}clav},
booktitle={Security Protocols XXI},
pages={223–237},
year={2013},
publisher={Springer}
}
Cryptanalysis of a cryptographic function like stream, block or hash function usually requires human cryptanalytical skills and labour. However, some automation is possible – e.g., by randomness testing suites like NIST/Diehard that can be applied to test statistical properties of cryptographic function outputs. Yet such testing suites are limited only to predefined statistical functions.We propose more open approach based on combination of software circuits and evolutionary algorithms to search for unwanted statistical properties like next bit predictability or random data non-distinguishability. Design of a software circuit acting as a testing function is automatically evolved by a stochastic optimization algorithm and uses the potentially unknown other channel" leaking information during cryptographic function evaluation. We tested this approach on candidate algorithms for SHA-3 and eStream competitions with comparable (but slightly worse) results as STS NIST and Diehard tests w.r.t. the number of rounds of the inspected algorithm, where tests are still able to detect unwanted statistical properties in output. Additionally, the proposed approach is not limited only to assess randomness-like properties in function output, but can be also used for other tests like whether a function is invertible or how does its avalanche effect degrade.
No votes yet.
Please wait...
* * *
* * *
HGPU group © 2010-2019 hgpu.org
All rights belong to the respective authors
Contact us: | ESSENTIALAI-STEM |
Universal Forest to Acquire SE Panel Biz - Analyst Blog
Universal Forest Products, Inc. ( UFPI ) recently announced to have signed an agreement, through one of its subsidiaries, to acquire some assets of SE Panel and Lumber Supply. Financial terms of the transaction have not been disclosed.
SE Panel and Lumber Supply is a South Daytona, Fla.-based distributor of Olympic Panel overlay concrete forming panels and commodity lumber products. Key end markets served include concrete forming and construction industries.
The transaction is anticipated to be complete by mid-Nov 2013. Universal Forest Products will gain from easy accessibility of the acquired assets to end markets served, especially the southeastern region of the United States.
Universal Forest Products has compelling long-term growth prospects. The company looks forward to improving its top-line growth through accretive acquisitions and addition of new customers and products to its portfolio. Revenue generation is targeted to reach $3 billion with operating margins at normal historical levels by 2017.
The Zacks Consensus Estimate for Universal Forest Products is currently pegged at $1.74 for year 2013 and at $2.63 for year 2014, representing year-over-year growth of 62.3% and 51.2%, respectively.
Universal Forest Products is a large player in the lumber supply chain and has a market capitalization of $778 million. The stock currently holds a Zacks Rank #3 (Hold). Other stocks to watch out for in the industry are Boise Cascade Company ( BCC ), with a Zacks Rank #1 (Strong Buy) while Armstrong World Industries, Inc. ( AWI ) and Masco Corporation ( MAS ), each come with a Zacks Rank #2 (Buy).
ARMSTRONG WORLD (AWI): Free Stock Analysis Report
BOISE CASCADE (BCC): Free Stock Analysis Report
MASCO (MAS): Free Stock Analysis Report
UNIVL FST PRODS (UFPI): Free Stock Analysis Report
To read this article on Zacks.com click here.
Zacks Investment Research
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Erlang and WebAssembly?
This just turned up in Ruby Weekly:
Proposal to Merge WASI-Based WebAssembly Support into Ruby
There have been experiments before, but having WebAssembly as an officially supported target for Ruby would open up some interesting use cases. While this is exciting news, it’s very early days and with a variety of expected limitations (e.g. around threading). A story we’ll keep an eye on, for sure, and hopefully a headline feature for Ruby 3.2.
So I was wondering whether there have been any Erlang related efforts?
I currently know of Lumen:
Lumen is not only a compiler, but a runtime as well. It consists of two parts:
• A compiler for Erlang to native code for a given target (x86, ARM, WebAssembly)
• An Erlang runtime, implemented in Rust, which provides the core functionality needed to implement OTP
The primary motivator for Lumen’s development was the ability to compile Elixir applications that could target WebAssembly, enabling use of Elixir as a language for frontend development. It is also possible to use Lumen to target other platforms as well, by producing self-contained executables on platforms such as x86.
Lumen is different than BEAM in the following ways:
• It is an ahead-of-time compiler, rather than a virtual machine that operates on bytecode
• It has some additional restrictions to allow more powerful optimizations to take place, in particular hot code reloading is not supported
• The runtime library provided by Lumen is written in Rust, and while very similar, differs in mostly transparent ways. One of the goals is to provide a better foundation for learning how the runtime is implemented, and to take advantage of Rust’s more powerful static analysis to catch bugs early.
• It has support for targeting WebAssembly, as well as other targets.
The result of compiling a BEAM application via Lumen is a static executable. This differs significantly from how deployment on the BEAM works today (i.e. via OTP releases). While we sacrifice the ability to perform hot upgrades/downgrades, we make huge gains in cross-platform compatibility, and ease of use. Simply drop the executable on a compatible platform, and run it, no tools required, or special considerations during builds. This works the same way that building Rust or Go applications works today.
Are there any more? Do you think this could be good for Erlang? Any thoughts on WASM in general?
5 Likes | ESSENTIALAI-STEM |
Obligation to Negotiate Access to the Pacific Ocean
Obligation to Negotiate Access to the Pacific Ocean (Bolivia v. Chile) was a case at the International Court of Justice. In the case, Bolivia petitioned the Court for a writ of mandamus obligating Chile to negotiate with Bolivia to restore Bolivia's access to the Pacific Ocean, which it had lost to Chile in 1879 during the War of the Pacific. In 2018, the court rejected Bolivia's arguments, finding that Chile was under no such obligation.
Background
When Bolivia gained independence from Spain in 1825, it controlled the Atacama Desert and thus had direct access to the Pacific Ocean. As a result of disputes over control and taxation of natural resources, Bolivia and Peru went to war with Chile in 1879. During the ensuing War of the Pacific, Bolivia lost territory to Chile, including its entire coastline, and the war ended with the Treaty of Ancón and the Treaty of Valparaíso.
In the Treaty of Ancón, Chile and Peru agreed that a plebiscite would be used to determine territorial control, and that neither nation could cede contested territory to a third without the consent of both. In the Treaty of Valparaíso, Bolivia and Chile agreed that Chile would temporarily administer territory taken from Bolivia, and that Bolivia had a right to freely trade at Chilean ports. In 1895, Chile and Bolivia agreed to the Treaty on the Transfer of Territories, under which Chile would sell Tacna and Arica to Bolivia. However, this treaty was never implemented, as neither of the nations' congresses approved the agreement. In the 1904 Treaty of Peace and Friendship, Bolivia and Chile agreed that Antofagasta, the territory taken by Chile during the war, would be Chilean, and, in exchange, a railroad would be constructed, at Chile's expense, between Arica and La Paz. Also, Bolivia would be granted free trade rights at Chile's Pacific ports and allowed to establish customs facilities in them.
Since the treaty, Bolivia has attempted to obtain some form of sovereign access to the Pacific Ocean, and both nations have engaged in occasional negotiations in attempts to resolve the issue. In 1920, the representatives of the two nations met in La Paz. At this meeting, Chilean representatives said that they were "willing to seek that Bolivia acquire its own access to the sea, ceding to it an important part of that zone in the north of Arica and of the railway line which is within the territories subject to the plebiscite stipulated in the Treaty of Ancón." In 1926, Miguel Cruchaga, the Chilean ambassador to the United States, discussed the possibility of dividing the contested territory between Bolivia, Chile, and Peru with Frank B. Kellogg, the United States Secretary of State. After this, Bolivia sought resolution to the disagreement at the League Of Nations, despite objections from Chile, which sought unilateral negotiations. In 1950, the two nations agreed to enter into formal negotiations over the issue. However, instead they discussed improvements to the current arrangement. In the early 1960s, both countries sought negotiations, but they did not take place. In 1975 and 1976, Chile and Bolivia agreed to a territorial swap with the Charaña Accords, but, under the terms of the Treaty of Ancón, this would require the approval of Peru. Peru instead proposed a region of shared sovereignty between the three nations, which was rejected by both Chile and Bolivia. In 1978, Bolivia cut diplomatic ties with Chile, as a result of the lack of progress in negotiations. Since 1978, the two nations have not had full diplomatic relations; maintaining relations at a consular level. In recent years, unsuccessful attempts have been made by both nations to negotiate a resolution, at various venues.
Access to the Pacific Ocean has long been an issue in Bolivian politics. Despite lacking a coastline, Bolivia still has a navy, which was founded in 1963, and Bolivians annually celebrate the Day of the Sea. The Bolivian president, Evo Morales, made Bolivia's access to the ocean a key issue for his administration. He also used it to bolster his reelection efforts. When Pope Francis visited Bolivia in 2015, he called for dialogue between the two nations, saying, "Dialogue is indispensable. Instead of raising walls, we need to be building bridges."
Case and arguments
In 2013, Bolivia suspended ongoing negotiations and brought a petition against Chile before the International Court of Justice (ICJ). In the petition, Bolivia asked that the ICJ find that Chile was obligated to negotiate with Bolivia towards granting Bolivia sovereign access to the sea. In 2014, Chile raised preliminary objections to the court's jurisdiction, citing Article VI of the Pact of Bogotá, which prohibited ICJ proceedings on matters agreed upon prior to its agreement in 1948. Chile argued that the 1904 Treaty of Peace and Friendship settled all issues regarding the border, and that, while Bolivia had a right to non-sovereign access through Chilean territory, it had no right to sovereign access. Bolivia contended that the issue was an obligation independent of the treaty. Chile countered that the issue was one of territorial sovereignty. According to Zach Kleiman, the ruling on the preliminary objection would be determined by the definition of the case's subject matter. On 24 September 2015, the court found that it did have jurisdiction to hear the case, rejecting Chile's preliminary objection, and finding that the case was in respect of an obligation separate from the Treaty of Peace and Friendship. The court also reframed the complaint, limiting it solely to an obligation to negotiate without specifying the goal. Judge Gaja voted against the majority opinion's findings and, in a separate declaration, proposed that matters that had been settled could become unsettled through subsequent conduct. He stated that a determination on this issue would not be appropriate at the preliminary stage.
Bolivia argued that both nations were obligated to negotiate by their prior statements, basing parts of its argument on ICJ precedents, including Aegean Sea Continental Shelf (Greece v. Turkey) and Case Concerning Maritime Delimitation and Territorial Questions Between Qatar and Bahrain (Qatar v. Bahrain). Bolivia also argued that it had a right to coastal access because of the harmful economic effects of being landlocked. Zach Kleiman says that trade to and from Bolivia is much slower and more expensive than equivalent trade in Chile, and logistical costs are 31% higher than the average in the region. He also observed that in previous cases, such as Temple of Preah Vihear (Cambodia v. Thailand) and Nuclear Tests Case (New Zealand v. France), the court found that obligations were created through the unilateral conduct of officials.
Outcome and results
On the Sunday preceding the decision, Catholic bishops in both countries asked congregants to accept the court's decision. In expectation of the decision, Bolivians gathered in public spaces across the country to watch the decision be read out on large screens erected for this purpose. On 1 October 2018, a twelve-judge majority ruled that Chile did not have an obligation to negotiate with Bolivia towards an access to the Pacific Ocean, rejecting Bolivia's complaint and all eight of its arguments. However, the court did not rule on which nation rightfully controlled the disputed territory. The court found that in none of the statements or actions of either country did the two countries show an intent to be legally bound. Alonso Dunkelberg suggests that the court ruled against Bolivia to avoid the possible precedent it would set "if passage of time in longstanding, stalemated disputes can change the way in which certain traditional terms are read." He further suggested that Bolivia could also have brought complaints about Chile's violations of the Treaty of Peace and Friendship, which it has previously raised at the Latin American Integration Association, and raised the possibility of Bolivia negotiating with Peru, which has previously agreed to treaties expanding Bolivia's rights to trade at the Peruvian coast.
While the court ruled against Bolivia, Abdulqawi Yusuf, president of the court, said that the ruling "should not be understood as precluding the parties from continuing their dialogue and exchanges, in a spirit of good neighborliness, to address the issues relating to the landlocked situation of Bolivia, the solution to which they have both recognized to be a matter of mutual interest." Evo Morales interpreted this as a "call to continue with the dialogue" and promised that Bolivia "will never give up" its pursuit of access to the Pacific Ocean. In response to the decision, Sebastián Piñera, the president of Chile, said that Morales "made us waste five years which could have been spent building a healthy relationship between the two countries." He also praised the court's decision, saying, "The court has done justice and has put things in their place, establishing clearly and categorically that Chile has never had any obligation to negotiate an exit to the sea."
After the decision, Morales continued efforts to begin negotiations with Chile. However, Bolivia also planned to decrease its dependence on Chilean ports by transitioning trade to Peruvian ports. | WIKI |
Nabi Bakhsh Baloch
Nabi Bakhsh Khan Baloch (نبي بخش خان بلوچ; 16 December 1917 – 6 April 2011) was a Sindhi research scholar, historian, sindhologist, educationist, linguist and writer. He predominantly wrote in Sindhi, including Urdu, English, Persian and Arabic. He has been described as the "moving library" of the Pakistani province of Sindh.
The author of some 150 books, he contributed to many subjects and disciplines of knowledge which include history, education, folklore, archeology, anthropology, musicology, Islamic culture and civilisation. He contributed two articles - on Sindh and Baluchistan - which appeared in the Fifteenth Edition of Encyclopædia Britannica, 1972.
Baloch did pioneering work on the classic poets of Sindh, culminating in the ten-volume critical text of Shah Jo Risalo, the poetic compendium of the Sufi poet of Sindh, Shah Abdul Latif Bhittai. He edited 42 volumes on Sindhi folklore, with scholarly prefaces in English, under the heading of the Folklore and Literature Project.
In addition, he compiled and published a Sindhi dictionary, Jami'a Sindhi Lughaat in five volumes which was later revised into three volumes. With Ghulam Mustafa Khan, he also compiled Sindhi-to-Urdu, Urdu-to-Sindhi dictionaries. His works also include the compilation and editing of classical Sindhi poets including Shah Inayat Rizvi, Qadi Qadan, Khalifo Nabibakhsh, and Hamal Faqir. In the field of history, he edited works including Tareekh Ma'soomee, Chachnama, Tuhfatul Kiram by Mir Ali Sher Qania, Lubb-i-Tareekh Sindh by Khudad Khan, Tareekh-i-Tahiree by Mir Tahir Muhammad Nisyani, Beglar Nama by Idrakee Beglaree.
Early life
Nabi Bakhsh Baloch was born in the village of Jaffer Khan Laghari, Sanghar District, Sindh, Pakistan, on 16 December 1917. His secondary education was undertaken at Naushero Feroz High School. He attended Junagarh College at Bombay University, then studied further at Aligarh Muslim University. He studied at Columbia University, New York, for a Ph.D. in education. After this, he declined a post with the United Nations and returned to Pakistan.
Career
In 1950, Baloch joined the Pakistan Ministry of Information. He initiated the monthly magazine Naeen Zindagi and numerous other publications about Pakistan to educate the public. In addition, he promoted the folk music and folk culture of the five provinces through radio.
In 1951, Baloch was appointed as Public Relations officer for the Pakistan Mission in Damascus. However, he opted to participate in the establishment of the Sindh University, Hyderabad, Sindh, and once again returned to Pakistan. There he established the first Department of Education in Pakistan and later became Vice-chancellor. During his tenure at the university he was responsible for initiating several publications and editing monographs such as: Journal of Education, Journal of Research: Arts and Social Sciences, Historical Perspective on Education, Methods of Teaching Hasil-a-lNijh of Jafar al- Bubakani, and Report on Education in Sindh with an extensive introduction by Baloch (drawn by B.H. Ellis, first printed for the Government at the Bombay Education Society Press in 1856).
Baloch also played a key role in the establishment of various institutes associated with the University of Sindh. The Department of Sindhi began work in 1953. A Sindhi Academy, initiated earlier by Baloch, developed into the concept of the Institute of Sindhology. Baloch worked out the draft of the scheme to establish it and served as the Director. He initiated the publication of the monthly journal of the Institute under the name Ilmee Aa'eeno (Mirror of Knowledge).
Parallel to these scholarly endeavours, Baloch during his tenure at the Sindh University was a guiding force for several institutes in Sindh. He worked as Honorary Secretary Bhitshah Cultural Centre where he organized literary conferences during the annual functions. He promoted the rural cultural milieu, spreading the message of Shah Abdul Latif Bhitai. In this regard he published studies on Shah Jo Risalo. The first biographical work on Shah Abdul Latif written in Persian by Mir Abdul Hussain Khan Sangi, Lutaif-i-Lateefee, was edited and introduced by Baloch and published by Bhitshah Cultural Centre in 1967. The manuscripts of Shah Jo Risalo were procured from London and published in 1969.
Mehran Arts Council was established with Baloch as honorary secretary. He devised the idea, persuaded authorities to give grants, bought a plot for the council in Latifabad and had a building constructed. He wrote Musical Instruments of the Lower Valley of Sindh (1966), and an article as an appendix: '‘Shah Abdul Latif as the Founder of a New Musical Tradition'’. Baloch also edited Aziz Baloch's work, ‘'Spanish Cante Jundo and its origin in Sindhi Music'’, published by Mehran Arts Council in 1968. Among other articles and monographs, the Council also published Sabhai Rangga (All Hues) on all aspects of folkloric poetry in 1969, edited and introduced by Baloch.
On an international level, Baloch collaborated with Dr. Eugene Knez in setting up the ‘Sindhi House of Pakistan’ at the Smithsonian Institution, Washington D.C., and made arrangements for the relevant material to be exported.
It was also during Baloch's term as the Vice- chancellor of Sindh University (1973 - 1976) that an international conference titled "Sindh Through the Centuries" was held from 2 to 7 March 1975 at Karachi, jointly hosted by Karachi and Sindh universities. Baloch, as one of the chief hosts, took the delegates to visit historical and archaeological sites, most of which had been discussed in the papers presented at the conference. Participants included H. T. Lambrick, Johanna van Lohuizen-de Leeuw, John Andrew Boyle, Simon Digby, Charles Fraser Beckingham, Annemarie Schimmel and E. I. Knez.
From January 1976 to June 1989, Baloch worked for the Government of Pakistan in Islamabad. He was Secretary for Culture, Archaeology, Sports and Tourism for one year. Important projects supervised and guided by Baloch include the Centenary Celebrations of Quaid e Azam Mohammad Ali Jinnah (1976) and Allama Muhammad Iqbal (1977). He also served as Member Federal Pay Commission and Member Federal Review Board.
From 1 July 1979 and up to October 1979, Baloch was chairman of the National Commission on Historical and Cultural Research.
Baloch planned a project of 25 volumes of history of the Muslim Rule in the Subcontinent to be published by the institute.
In November 1980, Baloch was appointed the first Vice-chancellor of the International Islamic University, Islamabad. He resigned in August 1982 and continued his work at the National Institute of Historical Research until October 1982. From 1983 to 1989, Baloch served as adviser to the National Hijra Council. Here, he began work on the "One Hundred Great Books of Islamic Civilization" project. In all, eleven works were published out of which five were produced under Baloch’s supervision. The work on remaining six was finalized, but published after he left the organization and returned to Hyderabad.
Books that were edited with introductions by Baloch under the Great Books Project are as follows:
* 1) Al Khawarazmi’s The Compendious Book on Calculation by Completion and Balancing, original Arabic text with Rosen’s translation, introduction by Ayidin Sayili, and explanatory notes by Mullek Dous, was published in 1989.
* 2) Banu Musa, Kitab al-Hiyal (The Book of Ingenious Mechanical Devices), translated, annotated, and introduced by Donald Hill.
* 3) Al-Jazari’s Kitabul Hiyal, (Integration between Theory and Practice in the Application of Mechanics), translated into English by Ahmad Y. al-Hassan and introduced by Donald Hill, 1989.
* 4) Al-Biruni’s Kitab al-Jamahir fee Ma’ arifat al-Jawahir, translated by Hakim Mohammad Said, and edited by Baloch, 1988. The work discusses al-Beruni’s experiment which for the first time introduced the concept of specific gravity.
* 5) Hamidullah Khan, The Prophet Establishing A State, 1989.
In 1989, Baloch began the compiling, rearranging and editing the text of the anthology of Shah Abdul Latif Bhitai, Shah Jo Risalo. This project involved extensive research and deep understanding of the poet’s philosophy as well as expertise in the Sindhi language. In this regard he also produced a companion dictionary, Roshni, for the understanding of text.
In 1991, the Sindhi Language Authority was established by the Government of Sindh, with Baloch as its chairman. He remained with this institute for 27 months during which numerous works were published on a multitude of topics pertaining the teaching and promotion of Sindhi Language. During his tenure, he was also given the additional charge of Minister for Education with the caretaker government for a period of three months.
Baloch remained Professor Emeritus Allama I.I Kazi Chair, University of Sindh, established in 1990 until his demise.
Awards and recognition
* Tamgha-e-Imtiaz (1962)
* Sitara-i-Quaid-i-Azam (1971)
* Pride of Performance by the President of Pakistan in 1979
* Conferment of I’zaz-i-Kamal Award by the President of Pakistan (1991)
* Sitara-i-Imtiaz (Star of Excellence) Award by the President of Pakistan in 2002
* Conferment of D. Litt, by the University of Karachi (1990)
* Shah Latif and Mysticism Award by the Pakistan Academy of Letters in 1999
* Kamal-e-Fun Award (Lifetime Achievement Award) by Pakistan Academy of Letters in 2005
* Conferment of Degree of Doctorate of Educational Management, (Honours Causa) Institute of Business Administration, University of Karachi (2009)
* Hilal-i-Imtiaz (Crescent of Excellence) Award by the President of Pakistan (2011)
* Appointed Life Patron of Dr. N.A. Baloch, Institute for Heritage Research, Department of Antiquities, Government of Sindh, 2009, founded after his name in recognition of his outstanding academic services to Pakistan and Sindh
Publications
* Sindhi Jami'a Lughaat (Sindhi language dictionary) (First edition in 5 volumes 1960–1988 published by Sindhi Adabi Board; 2nd revised edition in 3 volumes, published by Sindhi Language Authority 2004–2006 (third volume in Press))
* Roshni, Sindhi to Sindhi one volume dictionary, 1998, published by Sindhi Language Authority
* Sindhi Lok kahaniyoon (7 volumes)
* Madahoon Ain Munaajaatoon
* Munaqibaa
* Moajiza
* Molood
* Teeh Akhriyoon
* Hafta Deinh Ratyoon Ain Maheena
* Jang Naama
* Waqiaati Bait
* Munazira
* Sindhi Senghar (Shairy)
* Paroliyoon, Dunoon, Muamaoon Ain Bol
* Gujhartoon
* Door
* Geech
* Lok Geet
* Bait
* Narr Ja Bait
* Kafiyoon
* Mashahoor Sindhi Qisa
* Rasmoon Riwaj Ain Sanwan Saath
* Sindhi Hunr Shairy
* Kulyat-e-Hamal
* Mubeen Shah Jo Kalam
* Miyeen Shah Inaat [Inaayat] Jo Risalo
* Khalifay Nabi Bakhsh Laghari Jo Risalo
* Shah Lutfullah Qadri Jo Kalam
* Nawab Wali Muhammad LAghari Jo Kalam
* Kulyat-e-Sangi
* Beylaain Jaa Bola
* Laakho Phulani
* Kazi Qazan Jo Kalam
* Ragnamo
* Soomran Jo Daur
* Sindhi Mosiqee Je Mukhtasir Tarikh
* Sindhi Boli Ain Adab Jee Tarikh
* Sindhi Sooratkahti Ain Khatati
* Gadah
* Shah Jo Risalo by Shah Abdul Latif Bhittai (10 volumes), 1989 to 1999, published by various publishers
* Sindh Main Urdu Shairy (Urdu)
* Molana Azad Subhani (Urdu)
* Deewan-e-Matam (Urdu)
* Deewan-e-Shuq-e-Afza or Deewan-e-Shair
* Talaba Aur Taleem (Urdu)
* Advent of Islam in Indonesia, 1980
* Muslim Luminaries: Leaders of Religious, Intellectual and Political Revival in South Asia, 1988
* Kabul Ki Diary (Memoirs of Mawlana Obaidullah Sindhi during his days of residence in Kabul, compiled by Mawlana Abdullah Laghari, edited by N. A. Baloch
* Sindh: Studies Historical (English)
* Sindh: Studies Cultural (English)
* Traditional Arts & Crafts of Hyderabad Region (Sindh, 1966, Mehran Arts Council)
* Musical Instruments of the Lower Indus Valley of Sindh, 1966, Mehran Arts Council Hyderabad
* Gosha-e-Baloch, published by Urdu Department, University of Sindh
* Chachnama edited and translated into English (Persian, English)
* Baqiyaat az Kalhora (Persian)
* Beglar Naama by Idraki Beglari (Persian)
* Takmilatul- Takmilah, Addendum to Qania's Maqalatush-Shu'raa and Takmilla of Mohammad Ibrahim Khalil, published by Arts Faculty, Allama I.I. Kazi Campus, Sindh University, 2007 (Persian text, Sindhi preface)
Death and legacy
Nabi Bakhsh Khan Baloch died on 6 April 2011 at Hyderabad. Among his survivors are five sons and three daughters. Among the personalities attending his funeral were Pir Mazharul Haq, Sassui Palijo, Dr Ghulam Ali Allana and Imdad Hussaini. Tributes were paid to him at an event organized by the Pakistan Academy of Letters. Mir Mukhtar Talpur of Sindhi Adabi Sangat said that Baloch worked hard all his life to document everything about Sindh and recalled his lifelong contributions in preserving the culture and folklore of Sindh. He added that Baloch visited every nook and corner of Sindh to preserve its history and culture.
In 2017, a tribute was paid to him on his 100th birthday by Pakistan Academy of Letters Chairperson Muhammad Qasim Bughio. | WIKI |
Siege of Stralsund (1628)
The siege of Stralsund was a siege laid on Stralsund by Albrecht von Wallenstein's Imperial Army during the Thirty Years' War, from 13 May 1628 to 4 August 1628. Stralsund was aided by Denmark and Sweden, with considerable Scottish participation. The lifting of the siege ended Wallenstein's series of victories, and contributed to his downfall. The Swedish garrison in Stralsund was the first on German soil in history. The battle marked the de facto entrance of Sweden into the war.
Belligerents
Christian IV of Denmark had declared war on the Holy Roman Empire in 1625. He then invaded the empire with an army commanded by Ernst von Mansfeld to oppose the Catholic League's army commanded by Johann Tserclaes, Count of Tilly. In response, Ferdinand II, Holy Roman Emperor, had Albrecht von Wallenstein raise an additional army to support Tilly. Wallenstein defeated Mansfeld in the Battle of Dessau Bridge in 1626. The remnants of Mansfeld's army left Central Germany, and turned to Silesia and Hungary to regroup with Gabriel Bethlen's forces.
After Tilly had defeated Christian IV in the Battle of Lutter am Barenberge in August 1626, and Bethlen was neutralized in the (third) Peace of Pressburg in December, Tilly and Wallenstein were able to subsequently expel Christian IV from the North German plain, organized in the Lower Saxon and Upper Saxon imperial circles, and pressure him even in Danish Jutland. The internally divided Upper Saxon circle, to which the Duchy of Pomerania with Stralsund belonged, was incapable of self-defence and had formally declared neutrality.
Christian IV's army staff heavily relied on Scottish expertise: with 300 Scottish officers in his service, Scottish officers outnumbered Danish and Norwegian officers combined by 3:1. Also, Christian IV had issued patents to raise 9,000 Scottish troops in 1627, adding to 2,000-3,000 Scottish troops raised by Donald Mackay for Ernst von Mansfeld's army, but who had been deployed to Denmark instead.
Gustavus Adolphus of Sweden was since 1626 involved in the Polish-Swedish War, with Poland allied to the Holy Roman Empire. In this war, Scotsman Alexander Leslie started his career in Swedish service as commandant and governor of Pillau in East Prussia. Gustavus Adolphus had made plans to intervene in the Holy Roman Empire, of which the Riksdag commission approved in the winter of 1627/28.
Situation in Pomerania
In November 1627, the Duchy of Pomerania had capitulated to the forces of the Holy Roman Empire. Bogislaw XIV, Duke of Pomerania, on 10 November signed the Capitulation of Franzburg with Hans Georg von Arnim, who on behalf of Albrecht von Wallenstein commanded the imperial occupation forces in Pomerania. With the occupation, Wallenstein sought to secure the southern coastline of the Baltic Sea for Ferdinand II, Holy Roman Emperor against Christian IV of Denmark.
The Capitulation of Franzburg required all towns except for ducal residences to take in imperial troops, and Wallenstein had ordered Arnim to occupy the Pomeranian ports and seize their vessels already in October. Stralsund however was unwilling to give in, as its status as a Hanseatic town had provided for considerable self-determination and independence from the Pomeranian dukes. Thus, Stralsund ignored Bogislaw's order to adhere to the capitulation, issued since February 1628, and instead turned first to Denmark and then to Sweden for support.
Siege
Starting in May 1628, siege was laid on Stralsund by Albrecht von Wallenstein's troops, commanded by Hans Georg von Arnim. By then, the town with its 20,000 inhabitants was defended by a citizen force of 2,500, a levy of 1,500, and another 1,000 enlisted men. The first major imperial assault on the city took place between 16 and 24 May.
Christian IV of Denmark had reacted positively to Stralsund's call and deployed a force including 900 of Mackay's Scotsmen, organized in seven companies, and a company of Germans in her defence. Though dispatched already on 8 May, they only landed on 24 May. Initially, the Danish-German mercenary Heinrich Holk was appointed governor. When Holk retired to seek reinforcements, he was succeeded by Scotsman Lieutenant Colonel Alexander Seaton of Mackay's Regiment.
The Imperial army renewed its assault on 26 and 27 May. When checked, Arnim resorted to bombardment awaiting Wallenstein's personal appearance.
On 20 June, a Swedish auxiliary expedition, dispatched already on 2 June, arrived with 600 men commanded by Colonel Fretz, Colonel James MacDougall, and Major Semple.
On 23 or 25 June, Stralsund concluded an alliance with Gustavus Adolphus of Sweden, scheduled to last twenty years. Gustavus Adolphus then stationed a garrison in the town, the first such on German soil in history. This event marked the starting point of Swedish engagement in the Thirty Years' War. Robert Monro recorded that Semple was killed almost upon arrival and Macdougall temporarily captured. However he noted that this Swedish contingent "did come voluntarily come to succour and help our Nation" indicating the sheer number of Scots from both the standing Danish garrison and the Swedish relief force.
On 27 June, Wallenstein took command of the besieging forces, and renewed the assaults starting the very same night. The Scottish troops, entrusted with the defence of a crucial section of Stralsund's fortifications, distinguished themselves by an extremely fierce way of fighting. The main assault was on the eastern district of Franken, commanded by major Robert Monro. Of 900 Scots, 500 were killed and 300 wounded, including Monro. Rosladin was able to relieve Monro's force and re-take lost ground. An overall 2,000 defenders were killed and captured in this assault. Monro later recalled that "we were not suffered to come off our posts for our ordinary recreation, nor yet to sleepe" - for a period of six weeks.
The following night, on 28 and 29 June, Wallenstein succeeded in taking the outer works of the fortifications. Rosladin was wounded and governor Seaton took over his command.
On 29 June, Bogislaw XIV, Duke of Pomerania sent two of his high-ranking nobles, the count von Putbus and his chancellor von Horn, to persuade Stralsund to adhere to the Capitulation of Franzburg and surrender to Wallenstein. On 30 June, Rosladin persuaded the city not to enter into negotiations with Wallenstein, who had resorted to bombardment again. The same day, ten Swedish vessels reinforced Stralsund with 600 troops, while under heavy fire by Wallenstein's forces. Soon after, Christian ordered another Scottish regiment, that of Alexander Lindsay, 2nd Lord Spynie, to help with the defence of the town. These troops arrived around 4 July and suffered huge casualties (being reduced from a regiment to four companies) in the ensuing assaults, many led by Wallenstein in person. On 10 July, Wallenstein and Stralsund negotiated a treaty in the Hainholz woods northwest of the town, requiring Stralsund to take in Pomeranian troops. The treaty was signed by Wallenstein and Bogislaw XIV on 21 July, but not by Stralsund. Though Bogislaw vouched for the town, the treaty did not come into effect.
Already on 2 July, Stralsund had been reinforced by 400 Danish troops, and by 1,100 troops of the Danish-Scottish regiments of Donald Mackay and Alexander Lindsay, 2nd Lord Spynie in the following week. By the 17 July Scotsman Alexander Leslie, arrived with 1,100 troops, including more Scottish volunteers, and succeeded Seaton as Stralsund's governor. Leslie commanded a total of 4,000 to 5,000 troops. The Danish support amounted to 2,650 troops deployed during the siege. One of Leslie's first actions was an audacious all-out assault on the besieging troops which Robert Monro described as follows:
Sir Alexander Leslie being made governour, he resolved for the credit of his countrymen to make an out-fall upon the Enemy, and desirous to conferre the credit on his own Nation alone, being his first Essay in that Citie
Heavy rainfall between 21 and 24 July turned the battlefield into a marsh. On 4 August, Wallenstein lifted the siege, acknowledging his first misfortune in the Thirty Years' War.
Aftermath
After the unsuccessful siege, Wallenstein headed to nearby Wolgast, to fight a final battle with Christian IV: Danish troops had landed in the area and occupied the island of Usedom, and had taken the town of Wolgast on 14 August without fighting. On 22 August, Wallenstein retook the town.
Also in August, Swedish chancellor Axel Oxenstierna came to Stralsund, and offered negotiations to Wallenstein. The latter however refused. The inability to take Stralsund was to become one of the obstacles which led to Wallenstein's temporary dismissal in 1630.
When Gustavus Adolphus' invaded Pomerania in June 1630, he used his bridgehead in Stralsund to clear the flanks of his landing forces. Bogislaw XIV concluded an alliance with the Swedish king in the Treaty of Stettin in July. Wallenstein's forces were subsequently driven out of the Duchy of Pomerania, and Swedish forces had taken complete control of the duchy when Wallenstein's forces in Greifswald surrendered in June 1631.
During the Swedish campaign, Alexander Leslie was succeeded as the governor of Stralsund by another Scot in Swedish service, James MacDougal, in 1630. From 1679 to 1697, the position was to pass to yet another Scot, Peter Maclean.
Part of Wallenstein's forces were infected with the Black Death. During the siege, the epidemics swept into the town, killing 2,000 in the months of August and September alone.
The battle of Stralsund entered Pomeranian folklore. The population of Stralsund commemorates the siege of 1628 with an annual festival, "Wallensteintage" ("Wallenstein Days"). | WIKI |
List of Top Country LP's number ones of 1969
Top Country Albums is a chart that ranks the top-performing country music albums in the United States, published by Billboard. In 1969, six different albums topped the chart, which was at the time published under the title Top Country LP's, based on sales reports submitted by a representative sample of stores nationwide.
In the issue of Billboard dated January 4, Glen Campbell was at number one with the album Wichita Lineman, the record's sixth week in the top spot. The album remained at number one through the issue of Billboard dated April 12 and its run of 20 consecutive weeks atop the chart was the longest achieved since the listing was first published in 1964. When the album was finally displaced from the top of the chart it was by another of Campbell's albums, Galveston, which remained at number one for 12 consecutive weeks, meaning that Campbell had held the top spot without interruption for 32 weeks. Having reached the top of the chart with five other records in 1968, Campbell had achieved seven number-one albums within an 18-month period, but although his smooth country-pop style remained popular into the 1970s, he would not top the albums chart again until 1975. Campbell's occupation of the top spot came to an end in the issue of Billboard dated July 5 when Hank Williams Jr reached number one for the first time with Songs My Father Left Me, an album featuring recordings of songs written by his father, Hank Williams, who had died in 1953. The younger Williams had been promoted since an early age as the heir to his father's legacy and had recorded many of his songs, but it was not a role which he felt fit him well. Following a succession of personal problems he finally developed his own musical identity in the mid-1970s and went on to become one of the biggest country stars of the 1980s.
In the issue of Billboard dated August 2, Johnny Cash reached number one with the live album Johnny Cash at San Quentin (sometimes referred to simply as At San Quentin, but listed by Billboard with the artist's name as part of the title ) which tied the record set by Campbell earlier in the year by spending 20 consecutive weeks atop the chart. Recorded at San Quentin State Prison in California, it was the second chart-topping album by Cash to have been recorded live at a correctional facility, following the previous year's Johnny Cash at Folsom Prison. The album recorded at San Quentin also topped Billboard's all-genre Top LP's chart, a feat also achieved earlier in the year by Glen Campbell's Wichita Lineman, and is considered a high point of Cash's lengthy career. It was displaced from the number-one position on the country albums listing by the compilation The Best of Charley Pride by Charley Pride, which held the top spot for the final two weeks of 1969. | WIKI |
User:Suzie-Ann Bakker from the World Duchenne Organization
Communication Manager at the World Duchenne Organization
February 2018 - Current
Create and implement the communication strategy. Internal and external communications with member patient organizations and stakeholders. Co-create and facilitate educational programs on patient advocacy. Part of the World Duchenne Awareness Day team. | WIKI |
Template talk:World championships in 2019
Rugby is a winter sport <IP_ADDRESS> (talk) 09:01, 16 September 2019 (UTC) | WIKI |
When it comes to cravings, protein drinks and bars may also help cure your need for sugar, says Juge. He recommends mixing a flavored protein powder in a blender with as much ice as possible, so it'll taste more like a milkshake. Day Five's protein shake includes a cup of berries, which will also help with sugar cravings. Once or twice per week, Juge adds, you can have a low-sugar, high-protein bar. The newest varieties taste more like candy bars, with state-of-the-art sweetening techniques.
a. Count your calories: You could use a calorie counting app to know exactly what is in the food you're eating while you're trying to plan how to lose weight. This way, you can keep an exact track of the calories and nutrients you're consuming. b. Reduce the number of your meals: Make it a habit to eat dinner early and avoid eating anything post dinner to help in digestion of your food. c. Cut down on condiments: Certain sauces and condiments are dense in calories. Avoid including those in your routine diet. d. Load up on veggies: Limit starchy carbs and added fats in your plate but load up on fresh and healthy veggies instead. e. Opt for lean proteins: Even while consuming protein dense foods, choose proteins that are lower in fat such as chicken and fish. f. Don't drink calories: Avoid sugary drinks, aerated drinks and sodas during the diet. Instead opt for water and zero-calorie drinks. Protein shakes are good too, but count them as a meal since they are quite filling.
The internal and external obliques, which I like to call "nature's girdle," are located at the sides of the rectus abdominis. They are the muscles you use when you bend sideways at the spine or twist at the waist. They also contract to compress the abdomen, so you should work them just as hard as you work the rectus abdominis. Adding a twist to crunches works, as well as dumbbell side bends, but be careful not to use any jerky motions, especially if you've had back problems.
In the modern world, our diets can often overwhelm the liver, creating too much of a burden for it cope with and function properly. Major contributors to this over-burdening of the liver are processed foods, meats and dairy products. Poor quality meats can often contain antibiotics and processed foods are filled with toxins. As these foods are digested, the byproducts they produce and the chemicals they contain must be eliminated from the body by the liver.
Directions: Rinse 1 cup of quinoa in cold water. In a medium saucepan, combine quinoa with 1 tablespoon curry powder and 1 teaspoon turmeric. Add 2 cups low-sodium chicken broth and bring to a boil. Cover and simmer until the water is absorbed—about 15 minutes. Stir in 1 cup shredded carrots and 1 cup cubed firm tofu. Makes about 4 one-cup servings. Refrigerate remaining servings for an easy, healthy snack or meal later in the week.
Carbohydrates are converted into sugar when they enter your bloodstream. Since your body doesn’t usually need all the energy that the sugar produces, it converts most of the energy into fat. The plummet in blood sugar levels that always follows a spike causes you to feel hungry for more sugar. If this cycle is continually repeated, you won’t be able to lose weight fast; in fact, you might gain weight.
Consider liposuction. Liposuction is a surgical option for fast, targeted weight loss, generally only recommended for people with 1-2 specific areas of highly fatty tissue but an otherwise relatively healthy body weight. Because it is a surgical procedure, it carries significant health risks and should only be performed by a licensed professional.[25]
Lose weight, eat well and feel great with this easy weight loss diet plan. This simple 1,200-calorie meal plan is specially tailored to help you feel energized and satisfied while cutting calories so you can lose a healthy 1 to 2 pounds per week. Each day of this 7-day diet plan features the best foods for weight loss, being high protein, high fiber foods (a combination that research shows can help with weight loss by keeping you feeling fuller for longer), and strategically balances calories throughout the day so you won't feel starved. The calorie totals are listed next to each meal so you can easily swap things in and out as you see fit. Couple this healthy meal plan with daily exercise and you're on track to lose the weight.
If you're not up for crunching numbers every day, you can take a more generalized approach. “For some people, it’s knowing, ‘Typically I eat a whole sandwich,’” says Gagliardi. “Now, I’m going to eat half a sandwich at lunch and save the other half for my dinner and cut my calories in half." To get started, consider these 25 ways to cut 500 calories a day.
Going long periods of time without food does double-duty harm on our healthy eating efforts by both slowing down your metabolism, and priming you for another binge later in the day. (Think: You've skipped breakfast and lunch, so you're ready to takedown a whole turkey by dinner!) Make it your mission to eat three meals and two snacks every day, and don't wait longer than three to four hours without eating. Set a "snack alarm" on your phone if needed.
中文: 在一周内快速减肥, Deutsch: In weniger als 7 Tagen abnehmen, Español: bajar de peso en menos de 7 días, Français: perdre du poids en moins de 7 jours, Bahasa Indonesia: Menurunkan Berat Badan Kurang Dari 7 Hari, Italiano: Perdere Peso in Meno di 7 Giorni, Русский: сбросить вес менее чем за 7 дней, Português: Perder Peso em Menos de Sete Dias, العربية: فقدان الوزن في أسبوع, Nederlands: In één week afvallen, Tiếng Việt: Giảm cân trong vòng 1 tuần, ไทย: ลดน้ำหนักใน 1 อาทิตย์, 日本語: 1週間で体重を落とす
Eating can become just as disorganized and chaotic as any other activity that isn't thought out ahead of time. Planning establishes structure, which can help you stay within a calorie budget, reduce daily decision-making, and prevent overeating. Carve out some time today to think through a plan for the week. Start with a few basic foods to eat each day and add others to diversify your meals. Make a grocery list as you go. (Make it even easier! Cook quick meals at home that taste great and fight fat! Sign up for Chef'd and get all the ingredients and recipes delivered to your doorstep.)
Once you get results, you will be encouraged to try this diet a few more times. So if you want to shed those stubborn kilos, this diet is tailor-made for you. It might be a fast-paced diet and a little difficult to follow considering the radical changes you have to make to your diet, but it sure will help you reach your weight-loss goals within a very short time!
The soup recipe given can be consumed in unlimited quantities. It will be a pleasure to eat while you are following this diet regime. In case you do not like the ingredients, you can add other vegetables like cauliflower, corn, peas, asparagus, cabbage and others. try to stay away from all type of beans (kidney, lima, pinto etc) they are said to be high in calories.
Obsessed with losing weight? Tell me who isn’t! Every second person would tell you they want to change their body. Losing weight isn’t impossible, as many people think it is. It does take a lot of dedication and a little bit of hard work. Well, actually it takes immense dedication and a whole lot of hard work. However, here is a secret diet plan to slim down your body and cut down your weight in just 7 days! This is the best vegetarian diet to lose weight. Are you wondering why this diet is any different? When you have tried almost everything possible in the world and haven’t got the best results. This vegetarian diet to lose weight will help you lose weight very quickly. It is also called as the GM Diet plan.
It’s pretty common for men to pack some extra poundage around their midsection. In fact, the average man is about 24lbs heavier today than men in 1960, according to stats from The State of Obesity—and the figures are rising. We’ve seen slimmer days, but don’t think this is a grim sentence, dooming you to eternal chubbiness. There are dozens, if not hundreds, of ways for you to burn belly fat—fast.
Harvie, M. N., Pegington, M., Mattson, M. P., Frystyk, J., Dillon, B., Evans, G., … Howell, A. (2011, May). The effects of intermittent or continuous energy restriction on weight loss and metabolic disease risk markers: A randomized trial in young overweight women. International Journal of Obesity (London), 35(5), 714–727. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3017674/
Another win for your morning cup of joe: Caffeinated coffee keeps things moving through the digestive tract. Since staying regular is key to a tighter-looking tummy, drinking about 8 to 16 ounces of java at the same time every day can help you stay on schedule. Remember: Sugary drinks can lead to weight gain, so skip fancy flavorings and synthetic sweeteners containing sugar alcohols, which can cause bloating.
A little garlic in your meals could mean a lot less weight around your middle. The results of a Korean study found that mice given a high-fat diet supplemented with garlic lost significantly more weight and abdominal fat than those who just ate fatty foods. Even better, they also improved their liver health, making it easier to stay healthy and burn off that excess fat in the long term. For more flavorful ways to make your food more enjoyable, turn to the metabolism-boosting spicy recipes and watch those pounds melt away.
The Vegetarian diet plan for weight loss is not just to lose weight, but it is also a maintenance method for a slim and proportionate body. Along with these, it will help you practice eating vegetables and fruits which will help to boost up the metabolic rate. Vegetarian diets and weight loss go hand it hand (1). It is the healthiest and the fastest way to shed pounds. This vegetarian diet program has become famous around the world. Every one is addicted to it, it actually works!
Many people struggle with weight loss issues. Losing belly fat in particular is about more than just aesthetics: visceral fat, the kind of fat that tends to settle around the midsection, can cause an increase in your body's production of stress hormones that can affect your body's insulin production. As a result, excess belly fat can lead to serious complications like type 2 diabetes and heart disease.[1] There is no way to target belly fat, but diet and exercise will eventually burn off belly fat. Knowing how to take the first step can help you feel better and get you on the road to a healthier, more active lifestyle.
× | ESSENTIALAI-STEM |
Jetson Nano second PWM-FAN
Good afternoon, dear Nvidia! I already successful attached PWM2 to sysfs but now I have to read its tacho that we attached to pin PV0.
I tried to find in the internet common solution how to throw tacho to sysfs but couldn’t find anything. Then I tried to create pwm-fan2 and encountered the next problem:
turn4:~$ ls /sys/devices/pwm-fan
cur_pwm driver_override fan_kickstart fan_rpm_in_limit kickstart_params of_node pwm_cap pwm_state_map state_cap subsystem target_pwm uevent
driver fan_available_profiles fan_profile hwmon modalias power pwm_rpm_table rpm_measured step_time tach_enable temp_control
turn4:~$ ls /sys/devices/pwm-fan2
driver_override modalias of_node power subsystem uevent
It seems that the driver was not attached smoothly. How could I fix this? My devtree:
tegra210-porg-pwm-fen.dtsi:
/*
* Copyright (c) 2018, NVIDIA CORPORATION. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify it
* under the terms and conditions of the GNU General Public License,
* version 2, as published by the Free Software Foundation.
*
* This program is distributed in the hope it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*/
#include <dt-bindings/pwm/pwm.h>
/ {
pwm_fan_shared_data: pfsd {
num_resources = <0>;
secret = <47>;
active_steps = <10>;
active_rpm = <0 1000 2000 3000 4000 5000 6000 7000 10000 11000>;
active_rru = <40 2 1 1 1 1 1 1 1 1>;
active_rrd = <40 2 1 1 1 1 1 1 1 1>;
state_cap_lookup = <2 2 2 2 3 3 3 4 4 4>;
pwm_period = <45334>;
pwm_id = <3>;
step_time = <100>; /* mesecs */
state_cap = <7>;
active_pwm_max = <255>;
tach_gpio = <&gpio TEGRA_GPIO(Z, 2) GPIO_ACTIVE_LOW>; /* TEGRA_GPIO_PZ2 */
pwm_gpio = <&gpio TEGRA_GPIO(E, 7) GPIO_ACTIVE_LOW>; /* TEGRA_GPIO_PE7 */
pwm_polarity = <PWM_POLARITY_NORMAL>;
suspend_state = <0>;
tach_period = <1000>;
};
pwm-fan {
compatible = "pwm-fan";
status = "okay";
pwms = <&tegra_pwm 3 45334>;
shared_data = <&pwm_fan_shared_data>;
active_pwm = <0 80 120 160 255 255 255 255 255 255>;
};
pwm_fan_shared_data2: pfsd {
num_resources = <0>;
secret = <47>;
active_steps = <10>;
active_rpm = <0 1000 2000 3000 4000 5000 6000 7000 10000 11000>;
active_rru = <40 2 1 1 1 1 1 1 1 1>;
active_rrd = <40 2 1 1 1 1 1 1 1 1>;
state_cap_lookup = <2 2 2 2 3 3 3 4 4 4>;
pwm_period = <45334>;
pwm_id = <2>;
step_time = <100>; /* mesecs */
state_cap = <7>;
active_pwm_max = <255>;
tach_gpio = <&gpio TEGRA_GPIO(V, 0) GPIO_ACTIVE_LOW>;
pwm_gpio = <&gpio TEGRA_GPIO(E, 6) GPIO_ACTIVE_LOW>;
pwm_polarity = <PWM_POLARITY_NORMAL>;
suspend_state = <0>;
tach_period = <1000>;
};
pwm-fan2 {
compatible = "pwm-fan";
status = "okay";
pwms = <&tegra_pwm 2 45334>;
shared_data = <&pwm_fan_shared_data2>;
active_pwm = <0 80 120 160 255 255 255 255 255 255>;
};
};
pinmux for pwm and tacho pins:
pe6 {
nvidia,pins = "pe6";
nvidia,function = "pwm2";
nvidia,pull = <TEGRA_PIN_PULL_NONE>;
nvidia,tristate = <TEGRA_PIN_DISABLE>;
nvidia,enable-input = <TEGRA_PIN_DISABLE>;
};
lcd_bl_pwm_pv0 {
nvidia,pins = "lcd_bl_pwm_pv0";
nvidia,pull = <TEGRA_PIN_PULL_UP>;
nvidia,tristate = <TEGRA_PIN_DISABLE>;
nvidia,enable-input = <TEGRA_PIN_ENABLE>;
};
pe7 {
nvidia,pins = "pe7";
nvidia,function = "pwm3";
nvidia,pull = <TEGRA_PIN_PULL_NONE>;
nvidia,tristate = <TEGRA_PIN_DISABLE>;
nvidia,enable-input = <TEGRA_PIN_DISABLE>;
};
pz2 {
nvidia,pins = "pz2";
nvidia,pull = <TEGRA_PIN_PULL_UP>;
nvidia,tristate = <TEGRA_PIN_DISABLE>;
nvidia,enable-input = <TEGRA_PIN_ENABLE>;
};
pwm-fan is working well and tacho is working well too but my pwm-fan2 (that I created) is not at all.
I need to configure pwm-fan2 like pwm-fan with the tacho or you could help me to forward tacho2 to sysfs without pwm2 then I continue to use pwm2 separately from sysfs and will read tacho2 from sysfs separately too.
Hi ATAineri,
Are you using the devkit or custom board for Jetson Nano?
What’s your Jetpack version in use?
Do you mean that you want to read the rpm of the fan controlled by PWM2?
Please also share the full dmesg for further check.
I’m using Jetpack 32.7.4 - the final version for JN.
I only want to read tacho, I even don’t need second fan to be announced in devtree. Is it possibly to somehow simply forward tach2 to sysfs?
Now we are using custom board but in the terms of PWM and tacho it is copy of devboard.
Do you mean that you want to read the rpm of the fan controlled by PWM2?
Yes)
Could you read the tacho through /sys/devices/pwm-fan/rpm_measured?
If so, why you need another tach2?
I thought you have the second fan and want to measure its rpm.
I need tacho 2 for another FAN. I using PWM2 from sysfs manually for another FAN and it is working but I cannot read its tacho 2. In pinout I see that there are 3 tacho pin and I want to use 2 of it but I cannot understand how to provide this 2nd tacho to sysfs.
It seems something not configured for pwm-fan2.
Please share the full dmesg for further check.
Please also share the block diagram of your connection for both pwm-fan and pwm-fan2.
dmesg.txt (59.1 KB)
pwm-fan2 told that it cannot use PV0 for fan-tach I don’t understand why…
sudo cat /sys/kernel/debug/pinctrl/700008d4.pinmux/pinmux-pins
pin 168 (LCD_BL_PWM PV0): (MUX UNCLAIMED) tegra-gpio:168
sudo cat /sys/kernel/debug/gpio
gpio-168 (GPIO07 |pwm-fan-tach ) in hi IRQ
Part of the scheme:
image
I checked that this pin is not using in dev tree in another part - it have to be OK, but not.
Is it even possible to use PV0 as tach?
I tried to use for tacho2 GPIO4 because it has IRQ and it didn’t work too.
Then I tried to assign GPIO4 as tacho for fan1 and gpio8 that worked on fan1 attach to fan 2 and now fan1 is working with gpio4 as tacho normally but fan2 is not forking because of GPIO8 that working normally on fan1.
Then it seems that all pins that I tried to use as tacho for the fan2 is not working with the same error -16 unable to request tacho pin and all of this pins is working normal on fan1.
I cannot understand what function is returning -EBUSY on gpio_request function:
fan_data->tach_irq = gpio_to_irq(fan_data->tach_gpio);
err = gpio_request(fan_data->tach_gpio, "pwm-fan-tach");
if (err < 0) {
dev_err(&pdev->dev, "fan tach gpio request failed\n");
goto tach_gpio_request_fail;
}
It is pretty obvious that tacho initialization crashes here, I greped all over gpio-tegra driver in the kernel and in the nvidia folder near the kernel, I greped pinctrl tegra driver and found only 1 function that could return -EBUSY but it appears that the only function that could threw -EBUSY gpio_is_accessible is not calling during the PWM fan initialization. I tried to printk smth out of this and nothing was peinted as if that function was not called at all.
I discovered what is throwing -EBUSY:
static int __gpiod_request(struct gpio_desc *desc, const char *label)
{
struct gpio_chip *chip = desc->gdev->chip;
int status;
unsigned long flags;
bool hogged = false;
spin_lock_irqsave(&gpio_lock, flags);
/* NOTE: gpio_request() can be called in early boot,
* before IRQs are enabled, for non-sleeping (SOC) GPIOs.
*/
if (test_and_set_bit(FLAG_REQUESTED, &desc->flags) == 0) {
desc_set_label(desc, label ? : "?");
status = 0;
} else {
if (test_bit(FLAG_IS_HOGGED, &desc->flags)) {
hogged = true;
desc_set_label(desc, label ? : "?");
clear_bit(FLAG_IS_HOGGED, &desc->flags);
status = 0;
} else {
printk(KERN_INFO "Exact -EBUSY I tried to find!\n");
status = -EBUSY;
goto done;
}
}
It seems that the method I declared tacho pin in devtree is bringing up its IRQ before its initialization as tacho pin, why is this happening and how could I fix this?
sudo cat /sys/kernel/debug/gpio
gpio-65 ( |pwm-fan-tach ) in lo IRQ
I declared 2nd fan exact the same method that 1st fan was declared and the 1st fan is working fine but the 2nd has that problem with the tacho pin. How could I fix this?
Do you mean the GPIO pin is not initialized before it is requested from pwm-fan driver?
If so, please try to put the device node pwm-fan to the bottom in device tree.
Or try to build it as loadable kernel module to load it after boot up and check if it could work.
I just modified pwm-fan driver to add here second tacho and it worked. Solved.
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed. | ESSENTIALAI-STEM |
Talk:Enguerrand de Marigny
Untitled
Jean of Marigny: I thought that Marigny had gotten for his brother the archbishopric of Sens, which included the bishopric of Paris. I had never heard about Beuvais. Who knows something about it? | WIKI |
Talk:Saint Thomas Christians/Archive 3
Attempt to vandalize Kerala Christian related content by Vilmeenkodi
From the contributions from the user Vilmeenkodi in many pages related to Syrian Christians of kerala and general topics, it can be seen that he has a personal agenda against Kerala Christians and is communal in nature.
He wants to prove that Kerala christians did not exist, or are a portugese creation, etc. Without knowing the facts and history, just based on his conspiracy theories, he goes on vandalizing pages. — Preceding unsigned comment added by Sijucm (talk • contribs) 00:24, 6 February 2011 (UTC)
NB Malankara Mar Thoma Syrian Church
Just to bring into above merger discussion frame of reference. NOT proposing merger. In ictu oculi (talk) 09:51, 15 October 2011 (UTC)
Knanaya edits
Why did you remove information from the article while discussion is going on? That's not at all fair.Thom100 (talk) 16:35, 14 October 2011 (UTC)
* We removed incorrect material that had nothing to do with the above discussion. The material appears to misrepresent Menachery, who elsewhere has stated that "St. Thomas Christian" and "Nasrani" are equivalent. No other source I can find claims that "Knanaya" and "St. Thomas Christians" are two branches of "Nasranis". I already listed various sources that say Knanaya are a subgroup of Saint Thomas Christians/Nasranis. Here they are again:--Cúchullain t/ c 16:44, 14 October 2011 (UTC)
* Dear Thom100 I understand your concern. But please let me tell you the passage that is there right now is the result of heavy vandalism that went on in 2009 or little earlier. I became too tired to revert it and it stayed on. What you see right now is pure misrepresentation with the fake tree classification diagram of nasrani = st thomas christians and Knanaya. for your benefit I am posting the original passage as it was before it was mutilated in the incessant revert wars by so called great editors who put in their own passages in existing references. So here is the original passage that was there in the early part of 2008. I hope this passage could now be restored after all these years of vandalism.
''The Nasranis are an ethnic people, and a single community. As a community with common cultural heritage and cultural tradition, they refer to themselves as Nasranis. However, as a religious group, they refer to themselves as Mar Thoma Khristianis or in English as Saint Thomas Christians, based on their religious tradition of Syriac Christianity. ''
Thank you. I hope this resolves the problem. Also I am aware that today the most widely used term for the group is either Syrian Christian or Saint Thomas Christian. However it would be most appropriate to have a separate page with the traditional appellation of Nasrani Mappila for the socio cultural and ethnic aspect of the community. Anyway the Knanaya people are a part of the religious tradition referred to as Saint Thomas Christian. thanks Robin klein (talk) 17:33, 14 October 2011 (UTC)
* Dear Robin klein, Thank you.
* When the Europeans were in Kerala, they changed the name of many places in Kerala so that they could pronounce it easily. In the same way, they called all Nasranis in Kerala, Saint Thomas Christians. They did not bother about the term Nasrani or the groups within Nasranis.
* What I want to mention here is that all Saint Thomas Christians in Kerala are Nasranis, but all Nasranis in Kerala do not follow the same Tradition and Rituals.
* The Knanaya Nasranis, although they are part of the Syriac Christian community, and thereby part of the Nasrani community in Kerala, strictly speaking, the origin of their tradition is different from the origin of the Kerala Saint Thomas Christian Tradition and they follow some different rituals. They still try to keep a distinct identity within the Syriac Christian community in Kerala. In that case, the very basic information which is "based on ethnicity" that is correct, should not be removed from the article Saint Thomas Christians.
* Now, if the article Syrian Malabar Nasrani is to be merged with the article Saint Thomas Christians, the information on different ethnic groups within the Nasranis, the tradition and rituals of Knanaya Nasranis etc will also have to be conveyed properly in this article. How all these information can be shown in one article? So my opinion is that it would be better to have two articles and these two articles would complement each other as is the case now. That's why I oppose this idea of Merger. ThanksThom100 (talk) 02:41, 15 October 2011 (UTC)
* Dear Thom100, Yes I understand what you are saying and I agree with you that this merger should not happen. But the text mutilated by vandalism years ago has to be restored and misrepresentation of references has to be rectified. Once again let me say I also oppose the merger. thanks Robin klein (talk) 05:28, 15 October 2011 (UTC)
* Dear Robin klein, I wanted to have a consensus on this paragraph, but the user Ashleypt removed this paragraph again. He doesn't know that this information is there on many other articles, and on different sites and in many books. So it doesn't make any difference, if this information is hidden in this article, the effect would be this article would lack this vital info based on origin and ethnicity. Many users are ignorant of this info and this ignorance is the main reason behind this idea of Merger.
* I have a suggestion to improve this paragraph by combining both the information, that is information based on origin and ethnicity (distinction) which is already there and information based on religious tradition of Syriac Christianity (co-operation) which you have pointed out.
* For the time being, at least till the discussion on Merger is over, it's not fair to make any changes in the article. So I am going to add back the portion which was removed by the user Ashleypt in the middle of the discussion. Thanks.Thom100 (talk) 01:06, 16 October 2011 (UTC)
* Dear Thom100, Your account history suggests, you are a new comer in Wikipedia. First of all, you please create a User Page. Regarding your contention mentioned above, it's not at all unfair to remove any content with fake citation even while the discussion is going on. Here in the discussion, you are the only person suggesting to keep that fake equation. --Ashleypt (talk) 09:28, 15 October 2011 (UTC)
* Ashleypt,
* It's really unfortunate and frustrating. You removed the correct information again.
* Please read the following.
* During the time of King Shapur II (310–379) of Persia, a group of 400 immigrants (72 families) from Persia arrived in Malabar under the leadership of merchant Knai Thomman. They were engaged in trade and settled down in Kodungallur.Another immigration from Persia occurred around 825 under the leadership of Persian merchant Marwan Sabriso, with two Bishops, Mar Sapro and Mar Prodh. Together they were known as Knanaya (Kanahi people. They continued to remain an endogamous group within the Nasrani community. They cooperated with the Malankara Church, attended worship services together but remained a separate identity.
* "By the 10th century, in Malabar there were two Nasrani groups, the Saint Thomas Christians and the Knanaya community".
* Reference: Mathew N.M. (History of the Marthoma Church. (Malayalam), Volume 1. Page 92-94 and souvenirs published by Knanaya parishes in Kerala.
* Hope you realise your mistake and undo your own revision.Thom100 (talk) 12:04, 15 October 2011 (UTC)
* Please stop posting the same material under every comment. It makes the conversation nearly impossible to sort out. I responded to this comment above.Cúchullain t/ c 12:38, 19 October 2011 (UTC)
Knanaya/Nasrani passage
I think there is clear consensus to restore the previous version of the passage on the Nasrania and Knanaya. The dubious material about the Knanaya was added on November 8, 2010 here. As has been pointed out by various editors above, the material is demonstrably wrong and misuses the sources. Thom100 is literally the only user who objects to restoring it, and has resorted to edit warring and name calling to keep it in. If there are no objections from anyone besides Thom100, I'll be restoring the more correct (but still not perfect) version, which is: The Nasranis are an ethnic people, and a single community. As a community with common cultural heritage and cultural tradition, they refer to themselves as Nasranis. However, as a religious group, they refer to themselves as Mar Thoma Khristianis or in English as Saint Thomas Christians, based on their religious tradition of Syriac Christianity.--Cúchullain t/ c 12:46, 19 October 2011 (UTC)
* The correct information based on origin was added on 08 November 2010 and has been there since. This issue has started now only after the discussion on Merger of the article Syrian Malabar Nasrani with the article Saint Thomas Christians began just 5 days back. Since this information is there on many other articles on Wikipedia itself, all of a sudden this existing passage in this article alone cannot be removed. There are many users on Wikipedia. Two users joining together and trying to vandalise the article cannot be accepted. Two or Three users are not enough for a consensus on an information which is there on many articles on Wikipedia.Thom100 (talk) 14:11, 19 October 2011 (UTC)
* Look, literally everyone else who has weighed in besides you sees the problem with this passage. It misuses the source and makes demonstrably false claims. Consensus is against you. Sorry.--Cúchullain t/ c 14:15, 19 October 2011 (UTC)
* Since this information is there on many other articles on Wikipedia, it cannot be removed from this article alone on your own. It won't be accepted. It's not a false claim. Since the information is correct, it will be added back.Thom100 (talk) 14:25, 19 October 2011 (UTC)
* Sorry, you alone don't dictate what goes in articles (and you are literally alone in this discussion). At least three other editors besides myself have expressed concern with your material over the last five days, yet you refuse to listen. And edit warring and threatening to edit war is not acceptable behavior. I highly recommend you stop doing it.--Cúchullain t/ c 14:36, 19 October 2011 (UTC)
* Only two users argue with me. You added the dubious tag yesterday only and trying to remove the passage today. Since this information is acceptable to users in many other articles on Wikipedia, the dubious tag added by you in this article alone doesn't make sense and therefore will be removed.Thom100 (talk) 14:46, 19 October 2011 (UTC)
* Four different editors have tried to explain the problems to you, you just refuse to listen. Threatening to edit war is not appropriate or productive.--Cúchullain t/ c 14:53, 19 October 2011 (UTC)
* I repeat, only two users argue with me. Same rules apply to all users.Thom100 (talk) 15:03, 19 October 2011 (UTC)
* No, it's four, and literally everyone else to have weighed in besides you. I've restored the passage. Please don't resort to edit warring.--Cúchullain t/ c 16:27, 20 October 2011 (UTC)
* Thom100 has already got 2 warnings for vandalism. I doubt this account as a socket puppet. --Ashleypt (talk) 17:11, 20 October 2011 (UTC)
* From the behaviour of two editors, Cuchullain and Ashleypt, its clear that they are trying to implement their own "pre-planned agenda" here which is not acceptable as per Wikipedia norms. Moreover, Cuchullain's edits on different articles reveal that this user is very biased against the Syriac Churches in Kerala especially the Malankara Churches.Thom100 (talk) 00:32, 21 October 2011 (UTC)
* More personal comments from a tendentious editor. I'm not rising to it.--Cúchullain t/ c 12:49, 21 October 2011 (UTC)
* to Cúchullain, Ashleypt, re Thom100 I cannot at this point in the editing pattern see anything specific for a sockpuppet enquiry, but if the User pulls any more stunts like deleting tags then admin involvement and (at least) a topic ban would be appropriate. Back to the actual subject. We have one oppose who is behaving correctly and has made a different argument from Thom100.
* to Robin Klein, so your points don't get submerged in the noise of others, can you please restate: do we have any WP:RS justifying the fork between these 2 articles yet? I cannot see so far in the discussion above any dated WP:RS to prevent a merge. But willing to look at anything you present. Thanks! In ictu oculi (talk) 02:05, 22 October 2011 (UTC)
* Dear In ictu oculi, thanks for considering my views. Well, I should state that there is no source that uses the term Syrian Malabar Nasrani and there is no difference between what is stated as Syrian Malabar Nasranis and Saint Thomas Christians. The subject of both the terms is one and the same that is: The "Nasrani Mappila" to be precise regardless of the extremely low usage of the term.
To put it simply, my point is: There need to be two different pages, one dealing with the said people as an ethnic group (to be precise “Nasrani Mappila” or “Malabar Nasranis”). By popular usage the term could be "Saint Thomas Christians" and another page dealing with the religious tradition of the said group ("Saint Thomas Christian Tradition"). Just as there are two different main pages dealing with Christianity and christians. One dealing with Christianity (the christian religious tradition) and the other dealing with Christian (people following or adhering to the religious tradition). In traditional usage this is often said in terms of Nasrani (dealing with the Malabar Nasrani ethnic people as a whole) and Mar Thoma Khristiani Sabha (dealing with the Saint Thomas christian religious tradition).
Neither the term Syrian Malabar Nasrani nor Saint Thomas Christian is classically precise. 'Syrian Malabar Nasrani' is used only in wikipedia while 'Saint Thomas Christian' is the most widely used term popularized in recent decades. Historically though the precise term is indeed Nasrani Mappila or just Malabar Nasrani.
If the policy of the wikipedia was to use the most precise term rather than the most commonly used term for a subject then I guess the most appropriate term for the subject in question would be Nasrani Mappila.
To sum my point. There needs to be two pages:
a.) Saint Thomas Christians (by Popular usage) or Malabar Nasrani (by precise usage) - dealing with the said people as an ethnic group (present life, semitic origin, current occupations, historical role in trade, jewish heritage, Naming tradition, pesaha practices, portuguese inquisition, persecution of Nasranis and Cochin Jews by Hyder Ali and Tipu Sultan, present day declining Syrian Nasrani population, modern diaspora, etc (much to be done....)
b.) Saint Thomas Christian Tradition or Mar Thoma Khristiani Sabha (by precise usage) - dealing with the religious practices. The various various denominations, the similarities and probable differences between the denominations, the jurisdictions of various churches, the causes of the split, the timeline of the religious practices and split etc....
By Common usage the page dealing with Saint Thomas Christian Tradition could be forked out from the page Saint Thomas Christians. By precise usage the page Saint Thomas Christian Tradition could be forked out from the page Malabar Nasrani
Thanks Robin klein (talk) 17:05, 22 October 2011 (UTC)
* Hi Robin, okay thanks for that explanation and refs - that is along the lines of what I had understood from your previous Talk posts but because of background noise it wasn't visible with such clarity. You evidently have a point, WP:RS sources do distinguish religious and ethnic identity for other groups - Huguenots once exiled from France became, in Ireland, Netherlands etc, an ethnic as well as religious identity. This might particularly be the case in Kerala where caste/religion have some linkage. The problem is going to be marshalling reliable WP:RS for the distinction, and then the question of whether ethnic StTC and practising StTC deserve separate articles or a separate paragraph - given the high overlap. What I think might be a way of fixing this (and the reason I say "might" is because I'm not sure what there is in English rather than Malayalam in the way of RS) could be to tackle Saint Thomas Christians (ethnic group) and Saint Thomas churches (India) or something - taking care to select titles that reflect WP:EN, we cannot use Malayalam terms as titles in en.wikipedia where English terms exist. What you say is certainly a more sensible division than the current division (duplication) of the two pages. What I can see as potential problems (which other editors have alluded to above) is (a) avoiding mish-mash of the semi-legendary origins of the group with modern sources, though oral history and legend/tradition is fine when sourced, (b) how do GOI/GOK policies treat St Thomas Christians - and do the GOI/GOK distinguish practising, (c) how tensions between StTC ethnic identity and religious membership work out - I remember seeing an editorial in a paper about the cultural dislocation felt by StTC converts to Pentacostalism for example, were they still StTC? That's the sort of thing where WP:RS might be difficult to find. Overall I'm much more persuaded by your argument than the editor Thom100, but on the other hand based purely on what's in the two jumbled articles now the 2 editors proposing a merge have a good case based on what's there now. In ictu oculi (talk) 03:23, 24 October 2011 (UTC)
* Nasrani Mappila was not a term of universal use for the Christians of St. Thomas in early Malabar. Mappila was not an ethnic term, but an honorary title given to some Christians by the local Kings, in early Malabar. Moreover, in some parts of Kerala, Christians of Saint Thomas consider it as derogatory to be called Mappila, as it was previously used to name Semitic immigrants and in that period "Southist Christians were called "Mappilas" after Thomas of Cana. My point is, the term "Nasrani Mappila" can't be considered as an ethnic name for majority of Saint Thomas Christians. "Malabar Nasrani" is also an artificial name, and we could see little genuine results if we search in "Google Scholar". Of course, 'Marthomma Nasranis' ("Marthomma Nasranikal" in Malayalam) is a popular name used for Christians of Saint Thomas(A period of decline of the Mar Thoma Christians, 1712-1752 Issue 171 of Oriental Institute of Religious Studies, India, Author-Joseph Perumthottam) but never attained the status of universal ethnic name for StTC. Before the arrival of Portuguese, StTC were simply referred as Christians (Christianikal in Mal), because no other Christians were there in the Land of Kerala (But still grouped into Northists and Southists). Later, the christians in Kerala were classified as Syrian Christians and Latin Christians based on ethnicity (U know the context). Concluding, Saint Thomas Christians would be the correct ethnic name for these people, and they can't be considered as a single religious group. Could cite more WP:RS if needed. -- AshLey Msg 09:45, 24 October 2011 (UTC)
* The point is it doesn't matter what the people are called or were called. Whatever they are or were called. There needs to be two different pages. One dealing with the people, life and other social aspects and another dealing with the religious denominations. I am happy at least In ictu oculi got my point. thanks Robin klein (talk) 12:58, 24 October 2011 (UTC)
* In ictu oculi has it right: based on what's in these two articles now, and what they are titled now, they describe the same exact subject, and make only tentative efforts to suggest they're different. I fail to see the need for a separate article on religion, but if we decide we need one, that would really be an entirely new article. As it stands currently, these articles cover the same topic and need to be merged into one decent article, rather than two poor ones.--Cúchullain t/ c 13:15, 24 October 2011 (UTC)
* Dear Cúchullain and In ictu oculi I agree with both of you. Thank you for your understanding. There is no need for two articles if both of them have the same content as of now. However, wikipedia articles usually tend to grow or expand over time. So it is proper to have two different pages in order to help develop the pages in the necessary directions later on. For this to happen now We could put all details dealing with religious denominations in one page and all the details dealing with social aspects in another article whatever they are called. This needs to be done now so that later on there would not be problem when whosoever may need to expand the articles in the necessary direction. Besides talking about redundancy. The page that needs to be merged is the page: History of the Saint Thomas Christians. It is almost an exact copy of the page Saint Thomas Christians as it exists now. thanks Robin klein (talk) 13:36, 24 October 2011 (UTC)
* Hi Robin
* I think what's needed now to separate (a) church (b) ethnic group is a clear WP:RS source that shows (a) St Thomas church (b) St Thomas ethnic group being distinguished. It makes sense that there should be a source out there, and I suspect GOI census material or SC regulations may be the place to look?. In ictu oculi (talk) 06:46, 6 November 2011 (UTC)
* Dear In ictu oculi, the evidence for the distinct conception of the church as compared to the ethnic community is ever present. It is described by Hermann Gundert the first writer/ compiler of the Malayalam dictionary (and also the grandfather of the Nobel Prize winning author Hermann Hesse). Herman Gundert described the term Mappila as a term for the entire kerala community of West Asian descent. Further, there are three sections that comprise of the Mappila community of West Asian Descent in kerala. These sections include 1.) the first section of Mappila people called Juda Mappila (Jewish Community following Halakhic Judaism); 2.) the second section of Mappila people called the Nasrani Mappila (christian Jewish community - people of Jewish descent following Saint Thomas Christianity) and 3.) the third section of Mappila of west Asian descent called Jonakan Muslim Mappila (for people of West Asian Arab descent who became Muslims, this section also includes Nasranis and Jews forcefully converted to Islam by Hyder Ali in the late 1790s). The term for the Christian Jewish community as an ethnic group is Nasrani Mappila at least according to credible source like that of Hermann Gundert the person who wrote the first malayalam dictionary.
Robin klein (talk) 10:56, 6 November 2011 (UTC)
The term for the unique tradition of Hebrew Syriac christian tradition that the Nasrani Mappila community follows is Mar Thoma Nasrani which is loosely translated in to English as Saint Thomas Christian Tradition. Where Mar Thoma refers to Saint Thomas the apostle and Nasrani is the hebrew syriac term for Jewish christian, hence the commonly used loose translation in to English as Saint Thomas Christian tradition.
Therefore for Wikipedia the appropriate term for the people as an ethnic group is Mar Thoma Nasrani and the appropriate term for the christian tradition of the people is Saint Thomas Christian Tradition. thanks Robin klein (talk) 10:36, 6 November 2011 (UTC)
In fact if things have to be precise. The page Mappila should fork into 3 pages. 1.) Cochin Jews or Juda Mappila; 2.) Mar Thoma Nasrani or Nasrani Mappila; and 3.) Jonakan Muslim Mappila or just Muslim Mappila. While the page Cochin Jews could have the sub page of paradesi jews; and the page Mar Thoma Nasrani could have the sub page Saint Thomas Christian tradition. The point is that the Mosaic religions did not ethnically split in kerala as it did in the Mediterranean world. At least not till the advent of globalization. thanks Robin klein (talk) 10:36, 6 November 2011 (UTC)
* You're confusing the issue. Neither this article nor the one title "Malabar Syrian Nasrani" discuss Jewish or Muslim Indians; they both discuss the people known as St. Thomas Christians/Nasranis. IF there were two articles the correct titles would be "St. Thomas Christians" and "St. Thomas Christian churches" or some such, but there's no actual need for two articles at this point. I recommend we just go ahead with the merge, which has clear consensus, and if we need to split off another article we can.--Cúchullain t/ c 15:25, 6 November 2011 (UTC)
* Yes, Mr.Cuchullain is correct. There is no reason to delay the merging. Robin Klein's ideas are to be considered for advanced research, but at present we do not have much supporting WP:RSs to consider Saint Thomas Christians as Jewish Christians. At the most, the article could mention the possibilities of Semitic Admixture with native people. When Robin states "Nasrani is the hebrew syriac term for Jewish Christian", I think, he is deliberately misinterpreting the WP:RS. Actually, Nazrani was a term used by Jews to describe Followers of Christ. -- AshLey Msg 11:49, 8 November 2011 (UTC)
* Mr Ashley_thomas80 wrote, "Robin Klein's ideas are to be considered for advanced research",
when will the time for advanced research come? If there is a time then this is it. Robin klein (talk) 15:53, 8 November 2011 (UTC)
Mr Ashley_thomas80 wrote, "When Robin states "Nasrani is the hebrew syriac term for Jewish Christian", I think, he is deliberately misinterpreting the WP:RS. Actually, Nazrani was a term used by Jews to describe Followers of Christ. "
Thank you for the accusation that I am deliberately misinterpreting. I would like to remind that the early christians were Jewish. It is not a deliberate misinterpretation that Nasrani is a term for early Jewish Christians. The early Christians were indeed Jewish. Now I understand the reason for desperately asking for the merger. It is to remove all references to Jewish origins and to propagate the myth of high caste brahmin tradition. Now I understand the purpose of this merger. Good Luck with your agenda. But, please do not accuse me of misinterpreting something deliberately. Robin klein (talk) 15:53, 8 November 2011 (UTC)
* We need to return to civility here and leave personal comments out. No one is "deliberately misinterpreting" anything, and no one is trying to "propagate a myth". I can't speak for everyone, but my desire to merge the articles is simply to remove the falsehood that "Saint Thomas Christians" and "Syrian Malabar Nasrani" are separate groups and to follow what the sources say to create a decent encyclopedia article. --Cúchullain t/ c 20:22, 8 November 2011 (UTC)
Dear Cúchullain, Thanks for your understanding. Yes, there is no deliberate misinterpreting here. I know and completely acknowledge that Saint Thomas Christians and Syrian Malabar Nasrani are not two different groups but one and the same people. I don't mind a merger of the three pages (don't forget the extremely redundant page History of the Saint Thomas Christians). The only reason I would like two different pages for the same people is to have one page to describe the ethnic aspects of the people and another page to deal with the plethora of churches and subdivisions among the community. The pages could be called Saint Thomas Christians and Saint Thomas Christian Churches just as you proposed if needed. thanks Robin klein (talk) 03:15, 9 November 2011 (UTC)
* Pardon me if my comments hurt your feelings. But it would be wrong to stress on "Hypothesis of Jewish Origin" against the actual content in WP:RSs. Some sources mention the genetic miscegenation among natives and Jewish people in the earliest Christian community in Kerala. Also it is true that the Jewish colonies in Malabar had paved the way for disciples of Christ to visit this land. It would be highly extrapolating to state that Saint Thomas Christians are predominantly Jewish in Ethnicity. Last month, I even raised this content issue in Dispute Resolution Board, and the mediator also commented on the undue weight given to Jewish things in the article. Some research is going on to establish the lineage of this community, but we have to wait until they are published in some WP:RSs. When I support the proposal to merge, I look forward to clean up the article under the guidance of some administrators. I would readily accept the views of Mr.Robin, once they are published in a reasonable number of WP:RSs.
* In Apostolic Age itself, church started admitting Gentiles. Increasing number of Gentiles caused to cease the imposition of Circumcision in early church. That was the case in Israel. In Malabar, while Jewish Christians involved in the overseas trade, the indigenous Christians engaged in spice-production and other agricultural activities in the hinterland part of Kerala. Please refer Maritime India: Trade, Religion and Polity in the Indian Ocean by Dr.Pius Malekandathil, published by Primus Books, New Delhi, 2010. The proportion of Jewish factor is just a matter of logic. -- AshLey Msg 14:19, 9 November 2011 (UTC)
Merger proposal
This is a long time coming, but Syrian Malabar Nasrani needs to be merged into St. Thomas Christians. As has been pointed out numerous times, both articles describe the same people. First, "Syrian Malabar Nasrani" is a made-up construct that barely exists outside of Wikipedia and its forks (Virtually all of these books are all either reprints of Wikipedia articles, or are referencing Wikipedia). The actual term used in India is simply "Nasrani" (or something related such as the honorific "Nasrani Mappila"). "Nasrani" is a term meaning "Christian"; in an Indian context, it specifically means the people better known in English as the St. Thomas Christians. Any number of sources demonstrate that "Nasrani" and "St. Thomas Christian" are synonymous. There is some attempt here to claim "Nasrani" is the "ethnic" name and "St. Thomas Christian" is the "religious" name, but this does not mesh with usage of the terms outside of Wikipedia.--Cúchullain t/ c 14:04, 13 October 2011 (UTC)
* Support as nominator.Cúchullain t/ c 14:04, 13 October 2011 (UTC)
* Oppose. You have started this topic. The information on Knanaya Nasranis is relevant in this discussion. The nominator should not remove information from the article while discussion is going on.Thom100 (talk) 17:16, 14 October 2011 (UTC)
* Please read the following.
* During the time of King Shapur II (310–379) of Persia, a group of 400 immigrants (72 families) from Persia arrived in Malabar under the leadership of merchant Knai Thomman. They were engaged in trade and settled down in Kodungallur.Another immigration from Persia occurred around 825 under the leadership of Persian merchant Marwan Sabriso, with two Bishops, Mar Sapro and Mar Prodh. Together they were known as Knanaya (Kanahi people. They continued to remain an endogamous group within the Nasrani community. They cooperated with the Malankara Church, attended worship services together but remained a separate identity.
* "By the 10th century, in Malabar there were two Nasrani groups, the Saint Thomas Christians and the Knanaya community".
* Reference: Mathew N.M. (History of the Marthoma Church. (Malayalam), Volume 1. Page 92-94 and souvenirs published by Knanaya parishes in Kerala.Thom100 (talk) 12:18, 15 October 2011 (UTC)
* Sorry, but that Malayam source (and your "souvenirs") are directly contradicted by the various English provided in various places below that demonstrate that the Knanaya are one group of St. Thomas Christians/Nasranis. Additionally, your posting all over the place is making this conversation unreadable.--Cúchullain t/ c 13:58, 17 October 2011 (UTC)
* I would explain again. All Saint Thomas Christians in Kerala are Nasranis but all Nasranis in Kerala do not follow the same tradition. One group of Nasranis follows the 1st century Kerala Saint Thomas Christian Tradition while another group (Knanaya Nasranis) follows another tradition. That's why this distinction based on origin and ethnicity exists. I have pointed out this distinction in order to show that this idea of Merger is not right.Thom100 (talk) 14:53, 17 October 2011 (UTC)
* They might claim that, but that doesn't make it true. Once again, (1). "Saint Thomas Christians" and "Nasranis" are synonymous. (2). The Knanaya are a group of St. Thomas Christians/Nasranis.--Cúchullain t/ c 15:18, 17 October 2011 (UTC)
* I like to add that this distinction on the basis of origin is enough to prove St.Thomas' visit to Kerala in the 1st century. Those who have doubts about his presence in Kerala, are not aware enough of this distinction. So this very important information cannot be overlooked, it must be shown properly in this article. This article is on a section of people in Kerala, India, and the Official Language of Kerala is Malayalam, so information in Malayalam sources can be taken as the Original one.Thom100 (talk) 23:51, 18 October 2011 (UTC)
* What? Of course this doesn't "prove" that Thomas visited India in the 1st century. And no, your Malayam-language souvenir books are not superior to the reliable sources, some of them published by university presses, that demonstrate that "St. Thomas Christians" and "Nasranis" are synonyms and that the Knanaya are a group of St. Thomas Christians/Nasranis.--Cúchullain t/ c 12:38, 19 October 2011 (UTC)
* There is no consensus. It's better to stop this discussion and drop the Merger proposal.Thom100 (talk) 15:46, 19 October 2011 (UTC)
* Simply because you don't agree with the consensus doesn't mean it doesn't exist. It looks pretty clear actually.--Cúchullain t/ c 16:05, 19 October 2011 (UTC)
* Oppose. The idea of two articles is to have a page dealing with the community as a single ethnic group Syrian Malabar Nasrani and another to deal with their myriad religious variations within the broader frame of Saint Thomas Christians. This is done for a lot of different people who have a single ethnic identity but variation in religious and historical practices. E.g. Parsi dealing with the Parsi people as a single identity and Zoroastrianism dealing with the long diverse history of the people with diversity across Iran, Asia Minor and India. This happens also with pages like German Culture and Germany, and Jews dealing with the Jewish people as a single ethnic group and Judaism dealing with the diverse and long and complex history of the Jewish religious practices across the Jewish Diaspora. The same thing is the case with Syrian Malabar Nasrani and Saint Thomas Christians. Moving this is an impractical idea. The contents are too huge and is not all the same in both the articles. In any case it is not possible to put all information on the same page. If at all one of the pages could be forked as an sub article of the other. Which is already the case. Besides the term Nasrani is the ethnic term for all Saint Thomas Christians. Even Geroge Menachery has a volume called as Nasranis and another set of volume titles Saint Thomas Christian Encyclopedia. The two terms are distinct though with lots of overlapping themes. I am not making the differentiation. Wikipedia is not a place for original research where I or anyone else can try and make any differentiation. I am refering to the works of George Menachery. He has published a volume called Nasranis and also has set of volumes called Saint Thomas Christian Encyclopedia. They both are distinct though as I said have overlapping themes. Besides if the article is going to be merged then one has to remember that probably hundreds of article link to syrian malabar nasrani. A lot of pages would loss link unless every link is restored. thanks Robin klein (talk) 14:36, 13 October 2011 (UTC)
* ''All though I would say that a much better and appropriate thing to do would be to move Syrian Malabar Nasrani to Nasrani Mappila or Malabar Nasrani as a more distinct ethnic term than a term involving religious variations like saint Thomas Christians. thanks Robin klein (talk) 14:41, 13 October 2011 (UTC)
* Actually, I'm afraid you're wrong about George Menachery. The full title of his book on the "Nazranis" is The Nazranies: Church History Classics On India's Ancient Malabar Christians Of St. Thomas. The page for the book on his website, indianchristianity.com, contains multiple references indicating that "St. Thomas Christians" and "Nazranies" are one and the same. And I already included a number of other links above demonstrating that the terms are synonyms. Again, the claim that "Nasranis" is an "ethnic" term and "St. Thomas Christians" is a "religious" term is simply not correct.--Cúchullain t/ c 15:05, 13 October 2011 (UTC)
* Again on second thoughts would it not be better and appropriate to merge both Saint Thomas Christians and Syrian Malabar Nasrani to a page like Nasrani Mapilla or Malabar Nasrani or just Nasrani as Nasrani is the traditional appellation for the said people. thanks Robin klein (talk) 15:10, 13 October 2011 (UTC)
* No, because "Saint Thomas Christians" (and related terms like "Thomas Christians" or "Christians of Saint Thomas" are much more common in English, and Wikipedia practice is to use common names. For example, "Nasrani"+India returns fewer relevant Google Books hits than "Thomas Christian"+India.--Cúchullain t/ c 15:17, 13 October 2011 (UTC)
* Support. The sources listed clearly demonstrate that the two terms refer to the same group. In addition to this, a merge would go a long way toward solving the disputes on the page, in my opinion. — Mr. Stradivarius ♫ 16:30, 13 October 2011 (UTC)
* Support: The name Syrian Malabar Nasrani is vague, especially for a non-Malayalee. The word Syrian is misleading; the word Malabar is an anachronism and the word Nasrani is unfamiliar to many. Wikipedia articles are read by people all over the world. But the name Saint Thomas Christians (not St. Thomas Christians) is specific and more suitable for a worldwide publication. So, I support the merger. Neduvelilmathew (talk) 18:03, 13 October 2011 (UTC)
* I oppose this Merger because the articles Saint Thomas Christians and Syrian Malabar Nasrani are complementary to each other. There is a slight distinction between these two terms, based on origin. Nasranis = (Saint Thomas Christians who trace their origin from the first century Christians baptized by St.Thomas in Kerala) + (Knanaya Christians who are descendants of Christians from West Asia to Kerala in the later centuries). Thom100 (talk) 04:44, 14 October 2011 (UTC)
* Thom100, can you please clarify, is the word "Nasrani" in Malayali used for all Christians in Kerala?
* The term "Nasrani" was used to mention all Christians in Kerala until the 16th century, thereafter, this term is used only for Syrian Christians in Kerala. So the term "Nasrani" is not used for Latin Catholic Christians and some new Christians in Kerala. Thom100 (talk) 08:35, 14 October 2011 (UTC)
* "Saint Thomas Christian" isn't used for Latin Catholics or other Christians either. Today the terms are synonymous. We already have substantial evidence for this, can you produce any evidence that they aren't?--Cúchullain t/ c 12:52, 14 October 2011 (UTC)
* "Saint Thomas Christians" is not used for Latin Catholics or other Christians in Kerala, because they don't follow the 1st century Kerala Saint Thomas Christian Tradition.
* This article on Saint Thomas Christians itself shows under the heading, "Classification of Nasranis based on Ethnicity" the following information.
Nasranis (Malabar Syrian Christians) = (Saint Thomas Christians + Knanaya Christians)
* So, evidence is here itself and it proves that, strictly speaking, these two terms are not exactly the same. I hope Wikipedia would correct those people who do not know this difference. Thom100 (talk) 14:49, 14 October 2011 (UTC)
* The image you're talking about was created by a Wikipedia editor and has no sources. You'd need some evidence from outside of Wikipedia that the terms are not synonymous. For the record, here are some sources indicating that the Knanaya are a group of Saint Thomas Christians/Nasranis.
* The equation is a fake one. There are no reliable sources approving the same. Knanaya community was not an independent group, but just a tiny sub group of Saint Thomas Christians. They don't have any independent liturgy or culture. If we keenly observe, some of the traditions are different among Knanaya, but just a few in number. Similarities largely overwhelms the differences, and for an external observer, both communities are same. I haven't ever met any Knanaya person who is conversant in Syriac, even among their priests.
* Moreover, the comments on Portugese Observation is erroneous. They had made some observations Knanaya people but didn't considered them as a group outside Saint Thomas Christians. "The earliest reference is from a Portuguese report written by Penteado in 1518 .He narrates the origins of the Christians of St. Thomas both in Quilon and Cranganore to the King of Portugal. The first origins are from the Apostle Thomas. For the period after St. Thomas, as far as Cranganore is concerned, there came an Armenian merchant advanced in age......" Ref: --Ashleypt (talk) 10:30, 15 October 2011 (UTC)
* Ashleypt,
* It's really unfortunate and frustrating. You removed the correct information again.
* Please read the following.
* During the time of King Shapur II (310–379) of Persia, a group of 400 immigrants (72 families) from Persia arrived in Malabar under the leadership of merchant Knai Thomman. They were engaged in trade and settled down in Kodungallur.Another immigration from Persia occurred around 825 under the leadership of Persian merchant Marwan Sabriso, with two Bishops, Mar Sapro and Mar Prodh. Together they were known as Knanaya (Kanahi people. They continued to remain an endogamous group within the Nasrani community. They cooperated with the Malankara Church, attended worship services together but remained a separate identity.
* "By the 10th century, in Malabar there were two Nasrani groups, the Saint Thomas Christians and the Knanaya community".
* Reference: Mathew N.M. (History of the Marthoma Church. (Malayalam), Volume 1. Page 92-94 and souvenirs published by Knanaya parishes in Kerala.
* Hope you realise your mistake and undo your own revision.Thom100 (talk) 12:04, 15 October 2011 (UTC)
* The sources are not verifiable. Please check Wikipedia policies while citing references. If you are interested in doing more research on the subject, kindly try to refer the books of University of Kerala, Menachery, Benedict Vadakkekara, Skariya Zackariya, The Catholic encyclopedia: an international work of reference on the constitution doctrine discipline and history of the Catholic church Volume 14, Volume 190 of Orientalia Christiana analecta etc (Available On-Line). — Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:24, 15 October 2011 (UTC)
* Who is this Anonymous Unsigned User with IP <IP_ADDRESS> please ?Thom100 (talk) 17:21, 15 October 2011 (UTC)
* Yep, it was me. But you can't insert those contentious texts and graph without reliable and verifiable sources. I would have to refer the case if you are continue doing this. Please correct your parochial view on this matter. For your better understanding, the term "St.Thomas Christians" was not a name used exclusively for the people who were Christianized by Thomas the Apostle, but it was an inclusive name given to all the Christians, whom were found as Christians in the Malabar by the various visiting Scholars. Furthermore there were other Knanaya communities who migrated from Cana during various persecutions and the Knanaya community in Malabar was identified specifically as "Knanaya St.Thomas Christians". Please refer the book "The Old Testament as authoritative Scripture in the early churches of the East By Vahan Hovhanessian". Many other historians specifies like "St. Thomas Christians including Knanaya community". Also, the term "Knanaya" was coined in 20th century only, and before they were called as "Thekkumbhagakkar". I'm not against covering the history of Knanaya community with due significance in the article of Saint Thomas Christians. If Knanaya community is an outsider one to Saint Thomas Christians, why you are trying to mention their case in this article. Here, we cann't divert from the established ways of prominent historians as we wish to keep the quality of the article in the upper echelons. Even if the suggestion put forward by you is some what reasonable, since "Thekkumbhagakkar" was a minority community, almost fully dependent on the parent community of Vadakkumbhagakkar; no historical records consider them as an outsider one wrt Saint Thomas Christians. Instead they classified Saint Thomas Christians as Thekkumbhagakker and Vadakkumbhagakkar. You could understand this wider aspect of historical classification despite what the nomenclature portrays, while considering the case of the word "Hindu" which is also attributed to all persons professing any Indian religion (i.e. Hinduism, Jainism, Buddhism or Sikhism).Hope you could follow the ways of historians and uphold the quality of this document. "Wikipedia is NOT a place to post primary research." --Ashleypt (talk) 08:57, 17 October 2011 (UTC)
* This information was added earlier by editors who know the history of Christianity in Kerala. This was not added by me. This information is there in many other articles, and on different sites and in many books. From your arguments, its very clear that you lack the basic knowledge on Christianity in Kerala, that cannot be compensated by reading some books. If you edit articles on Kerala Christians on Wikipedia with half knowledge, these articles will not convey the correct information. Thom100 (talk) 09:15, 17 October 2011 (UTC)
* This has already been refuted above. Several reliable sources demonstrating that the Knanaya are a group of St. Thomas Christians/Nasrani have been provided.--Cúchullain t/ c 13:58, 17 October 2011 (UTC)
* English terms are wrongly used in many articles. An outsider will not be able to understand the correct meaning or the correct information.Thom100 (talk) 14:53, 17 October 2011 (UTC)
* Sorry, but this is the English Wikipedia, and we go with common usage in English. And at any rate, terminology aside, the Knanaya are a group within the community known as the St. Thomas Christians/Nasrani.--[[User:Cuchullain|Cúchullain t/ c 15:18, 17 October 2011 (UTC)
* I was not talking about articles on Wikipedia, but the sources you have mentioned, those sources may have used English terms wronly. I always want correct information on WikipediaThom100 (talk) 15:47, 17 October 2011 (UTC)
* Dear Thom100, How adamant you are with your parochial views. You please go through the arguments above and introspect yourself. Nobody is born with knowledge but it's an acquired virtue through experience or education. Since I'm a native Syrian Christian and also a Catechism teacher,I believe, I could claim enough experience in this regard. And the books you contemptuously neglected above are adored as the best tools for education all around the world. I rigorously collected many rare books and tried hard to explore the history of Christianity in Kerala. But I'm sure, I failed to acquire a thousandth of available knowledge and shockingly, the unavailable section proved invaluable to me. For example, 1st three centuries and 12-14 centuries are called dark ages in the history of Christianity in Malabar. I'm really sorry to say that what you have attributed - HALF THE KNOWLEDGE - is impossible for me to achieve. If you continue posting ur arguments on the basis of some verifiable sources, I would be happy to comment on it, with my limited knowledge. --Ashleypt (talk) 09:38, 19 October 2011 (UTC)
* Assuming the issue of Malayalam-English Translation in this matter is just beating about the bush. Prof. George Menachery, the author of "The St. Thomas Christian Encyclopaedia of India" is a native Syrian Christian and he categorically states in his book as "The Nothist-Southist endogamous division among the Christians of St. Thomas is attributed to the arrival of Thomas of Cana in Malabar". The same book is the pivotal source for the article: Syrian Malabar Nasrani. Mathias A. Mundadan, another renowned Malayali auther also shares the same view in his book History and beyond (1997) and states "A typical example is the Northist section of the St Thomas Christians as compared to the Southist section." Similarly Joseph Thekkedath states in his book: The troubled Days of Francis Garcia S. J. Archbishop of Cranganore (1641-1659) Volume 187 of Analecta Gregoriana - "St. Thomas Christians of Malabar are divided into two communities called the Northists (Vadakkumbhagakkar, in Malayalam) and the Southists (Thekkumbhagakkar)." --Ashleypt
* Support evidence of a distinction of ethnic and religious community not born out under this name at least per Google Scholar: current title 10 of which 6 false positives, 4 genuine hits, 633x for "St Thomas Christians" 109x for "Saint Thomas Christians" ... I must admit I had my concerns about this article title when coming across it earlier this year. In ictu oculi (talk) 07:30, 14 October 2011 (UTC)
* Out of 4 positive hits mentioned genuine above, 3 refer to Wikipedia article Syrian Malabar Nasrani. So, only one genuine hit for Syrian Malabar Nasrani, and it too in a book of totally different subject related to Kalaripayattu, a martial art in Kerala. Since the book is as new as 2008, it's author also could have referred Wikipedia. Ashleypt (talk) 13:09, 14 October 2011 (UTC)
* Thanks. strike above, Ashleypt is correct, the 2008 evidently is a circular ref to Wikipedia too. Strengthen support for merge. In ictu oculi (talk) 09:46, 15 October 2011 (UTC)
* Support : Both terms are synonymous and mutually interchangeable in any context. Prof. George Menachery has confirmed this view and anybody could contact him over EMail<EMAIL_ADDRESS>to clarify further. Thom100's observation is partially correct but has some errors too. Later West Asian immigrants to Malabar were just absorbed to the larger and earlier community of St.Thomas Christians and altogether they were all called Saint Thomas Christians or Nasranis. --Ashleypt (talk) 09:22, 14 October 2011 (UTC)
* Why did you remove information from the article while discussion is going on? That's not at all fair.Thom100 (talk) 17:16, 14 October 2011 (UTC)
* Thom100 - could you help by comment on the difference between articles സുറിയാനി ക്രിസ്ത്യാനിക and സുറിയാനി മലബാർ നസ്രാണികൾ on Malayali wikipedia? In ictu oculi (talk) 09:46, 15 October 2011 (UTC)
* Shall we conclude: 5 Supports and just 2 Opposes. In the opposing side, Robin klein do not agree with the pivotal argument of Thom100. Supporting side cited multitude of sources while the same was just scant with opposing side. It is clearly observed that the discussion on the "Proposal to Merge" has already reached a consensus to approve the same with 71% majority. --Ashleypt (talk) 15:02, 20 October 2011 (UTC)
* Only seven users participated, and opposition is here. This discussion started only on 13 October 2011, please notice the haste in concluding. The most important point is, no more new support after I have added the facts to prove my points at 12:18 on 15 October 2011.. Another point is that, two users, Cuchullain and Ashleypt have come here with a "pre-planned agenda" which is against Wikipedia norms. This is very evident from their behaviour. I have evidence to prove this point also. Moreover, Cuchullain's edits on different articles reveal that this user is very biased against the Syriac Churches in Kerala especially the Malankara Churches. Because of this "pre-planned agenda", this proposal has to be dropped.Thom100 (talk) 01:15, 21 October 2011 (UTC)
* Utter nonsense. Don't make personal comments. You should also stop bludgeoning the conversation and stop edit warring or you will be blocked.--Cúchullain t/ c 12:49, 21 October 2011 (UTC)
This proposal has been going on for well over a month now. It looks to me like consensus to merge has been clearly established, but if there are still objections we can ask an uninvolved admin to come and close the discussion for us. Thom100, are you satisfied that enough time has passed to establish a consensus? — Mr. Stradivarius ♫ 04:21, 20 November 2011 (UTC)
* Okay, more than enough time has passed here, and consensus seems to be clear that these two terms refer to the same exact group of people. I'm willing to spearhead the work involved, but I'd like a formal closure to the discussion considering how much effort will be required and the sentiments of certain editors, including single-purpose accounts.Cúchullain t/ c 15:27, 7 December 2011 (UTC)
* Agreed, and I would be willing to help with the merge too. Also, for those who haven't noticed, I have requested that this discussion be closed over at Administrator's noticeboard, if you want to look. — Mr. Stradivarius ♫ 15:36, 7 December 2011 (UTC)
* Sorry folks, I know this has been waiting to be closed for some time, but I hope you'll bear with me and wait a bit longer as I've noticed that there are related articles; as this merger would have a knock on effect on some other articles I have some queries. What is proposed should happen to the articles Nasrani Hagbah and List of Syrian Malabar Nasranis and the template Template:Nasrani people? I have looked at the point raised by Robin klein that Nasrani refers to an ethnic group while Saint Thomas Christian is their faith, as in Jews and Judaism - the main source for this appears to be George Menachery's work. This review for Glimpses of Nazraney Heritage, has the comment, "Many of the earliest existing documents in Kerala history deal with the Christians or Mar Thoma Nazranies of Kerala often called the Syrian Christians", which seems to indicate that we are talking about the same people; so the point is taken that there is a religion and there are the specific people who follow this religion. Robin klein's other point that there is already a mass of information, which means that a merge would entail sub-articles, is also worth considering. Can I ask - is it feasible to have an article on the people who follow this religion distinct from the religion itself? At present the two article titles are geared to talk about the people. Would it be possible to have an article on the faith - Saint Thomas Christianity and an article on the people Saint Thomas Christians (or Nasrani)? SilkTork ✔Tea time 18:57, 8 December 2011 (UTC)
* No problem, Silk, and thanks for taking the time to try and sort this out. One of the main causes of confusion here is the claim that "Nasrani" is an "ethnic" name, while "St. Thomas Christian" is a "religious" name. This is incorrect; in the context of India, the terms are synonyms, and are used as such in Menachery's work. I believe that Robin agreed with this? Anyway, personally, I don't see the need for separate articles on the St. Thomas Christians as an ethnic group and as a religious group. There's just too much overlap; I'd rather have one good article on the subject than two that just duplicate each other. At any rate, as our current articles just cover the same thing, what we'd really be talking about is a merge of both current articles plus forking some content to a separate "religion" article. That might be feasible, but as I said below, I'd recommend calling the main merged article "St. Thomas Christians" and the religion article "St. Thomas Christian churches" or something similar.
* As for those other articles you mention, I don't think it will be a big problem. As I say, "Nasrani" in this context is a synonym for "St. Thomas Christian", so there's not a really pressing need to move all related articles. However, "Syrian Malabar Nasrani" is a made-up construct that barely exists outside of Wikipedia, so any article using it needs to change.--Cúchullain t/ c 21:59, 8 December 2011 (UTC)
* Thanks for your response. I'm closing this as consensus to merge. SilkTork ✔Tea time 09:11, 9 December 2011 (UTC)
Moving forward with the merger
Okay, the merge discussion has closed as consensus to merge, and it's time to get started. I think everyone involved understands that this is going to require a lot of work, as this is a big subject and these two articles have been separate for years. The first step will be merging the page histories of the two pages. I'll do this today. All previous versions will be found in the history, so we can bring in any necessary material as we work. Once the actual merger is done we can start combining the material from both previous articles (and obviously any new material that would improve it as well). This is what's going to take the most time and energy. I will try to work on this through the week as time permits. Some users have discussed having a separate article on the religion of the St. Thomas Christians, to be called "Saint Thomas Christian Churches" or something similar. If Robin klein or any other editor wants to get started on that, the material from both existing articles will be available in the article history, and can be forked over at any time. This will be a big project, but it's a necessary one, and a long time coming. Hopefully it will go a long way to improving Wikipedia's coverage of the Saint Thomas Christians.--Cúchullain t/ c 16:23, 12 December 2011 (UTC)
* Okay, the page histories are extremely complex and overlapping, so I'm not going to perform a history merge, at least not quite yet. We can get started on merging content from the Nasrani page over here and attribute it properly.--Cúchullain t/ c 16:30, 12 December 2011 (UTC)
* Got a start on it today. I removed some duplicate information and plugged the gaps with information from Malankara Church, including the academic sources used there.Cúchullain t/ c 22:16, 12 December 2011 (UTC)
Persian connection
Paragraph 2 begins by saying that, Historically the Saint Thomas Christian community was part of the Church of the East, centred in Persia.
* I am interested to find historical evidences to prove this claim.
* Reading about recent excavations at Muziris and Berenice Troglodytica, I know that there was close contact between Muziris in Kerala and Alexandria in Egypt during the first century BCE to third century CE.
* Reading the Church History by Eusebius, Book V, Chapter 10, I find that Pantaenus the Philosopher from Alexandria came to Muziris in 2nd century. (The Ecclesiastical History of Eusebius Pamphilus, Bishop of Caesarea in Palastine. Translated from the originals by The Rev. Christian Frederick Cruse. George Bell & Sons, London. 1874.)
Now, is it possible to show some such evidences that the Saint Thomas Christians (Marthoma Nazranis) had some such relation with Iran (Persia) in the first and second century. Also names of the Bishops/priests and what they were doing in Kerala. If you have only evidences written by historians in the last few centuries, or only in an internet article, please explain how they came to this conclusion. If you have no substancial, evidences please consider this as inaccurate and delete this sentence.Neduvelilmathew (talk) 18:21, 14 December 2011 (UTC)
* The fact that the Saint Thomas Christians were connected with the Church of the East is very well known, and the material is now correctly cited in the article. The sources we're citing that indicate this are G. Menachery, Erik Frykenberg, and Wilhelm Baum & Dietmar W. Winkler. The Frykenberg book in particular has a lengthy section on it that can be previewed through Google Books. Not that it matters for our purposes, but there are indeed plenty of primary sources on this as well, for instance the work of Cosmas Indicopleustes and writings of Patriarch Mar Timothy, who established India as a separate province.Cúchullain t/ c 19:09, 14 December 2011 (UTC)
Hello Chuchulian. I have been reading the note above and see that the earliest note that you have is the Christian Topography by Cosmas Indicopleustes, a rich Christian merchant (who later became a monk) from Alexandria in Egypt. (Please note that he was from Alexandria and not from Persia) He visited India in 522 CE and there he saw a Persian bishop. I hope you are not saying that seeing a Persian bishop in India means that he was ruling over the Indian Christians.
Around 120 years before the visit of Cosmas, during the time of Safur II, 72 families escaped from Persia arrived in 345 CE, and settled in Kerala under the leadership of Knai Thomma. They were also Nazranis but not necessarily Marthoma Nazranis (Saint Thomas Christians). Probably it was during their time Persian bishops or priests began arriving. Nazranis were there in Malabar (Kerala) before 345 CE. Also very well known facts need not be always true. Once the fact that the earth was flat was very well known.Neduvelilmathew (talk) 17:37, 17 December 2011 (UTC)
* You can look into the cited sources for further information. As I've explained to you elsewhere, Wikipedia relies on reliable secondary sources by the experts in the field, rather than primary sources, which can be interpreted differently by different people. Also keep in mind that the article only says that an organized Christian presence can be traced to around the 3rd century, when East Syrian Christians from Persia settled in India. Over time, stronger and stronger links with the Persian Church (the Church of the East) were established, and eventually India was separated into an Ecclesiastical Province with its own metropolitan bishop. There may indeed have been Christians in India long before that, and I think the article makes that clear.Cúchullain t/ c 19:55, 17 December 2011 (UTC)
The term "Nasrani"
Robin klein asked me to look into the removal of some instances of the term "Nasrani". It looks like that may not have been the specific intention of the editor, who made other style improvements and additions. On the term, I'll reiterate what I've said before - there's nothing wrong with using the term "Nasrani". In an Indian context it means the same thing as "Saint Thomas Christian". The Wikipedia-originated construction "Syrian Malabar Nasrani", however, needs to be removed, as really no sources uses it, as does anything not supported by the sources, bad grammar and capitalization, etc.--Cúchullain t/ c 17:30, 25 January 2012 (UTC)
* The edit warring is clearly revealing an agenda edit going on against Syriac traditions of the Nasranis. Saint Thomas Christians is clearly a modern english translation of the syriac term Mar Thoma (Saint Thomas) Nasrani. This is a case of editors coming together and hounding others. Besides stating a 19th century comment of 'Hindu Christian' as indicating hindu connotation is farcical. The term Hindu was largely used instead of the term 'India'. Anthropologically what Buchannan meant was 'Indian Christian'. But then long before the independence of India all people were referred to as Hindu regardless of their religious or socio-ethnic cultural origins and affiliations. As for the English translation, yes the reference used by the editor might have been questionable but most sources referenced in the article clearly states Mar Thoma Nasrani as the original appellation for the Syriac community of Malabar and Saint Thomas Christian is clearly a derivative. Please stop bullying other editors by using administrator status. Robin klein (talk) 14:11, 27 January 2012 (UTC)
* I'm getting pretty tired of your unproductive utterly baseless accusations and personal comments, Robin. I have been polite with you so far and endeavored to work with you to take care of your concerns, but comments like the above make that very difficult. Please comment on the content, not the contributors.
* On the issue of the term "Mar Thoma Nasranis", that's simply not at all what those sources say. They say, quite specifically, that the local name at the time of European contact was Nasrani or Nasrani Mappila, NOT "Mar Thoma Nasranis". "Saint Thomas Christians" is not an English translation of an Indian term (if that term was even used at the time); if anything it's a cognate of the Portuguese term for the Nasrani (Cristãos de São Tomé). In fact, despite your claim, not a single one of the sources even mentions the term "Mar Thoma Nasranis"; I have no clue where you get the idea that they do. Further, the source does not say the group was known as "Syrian Christians", it says "Syrians", and makes no mention of the liturgy. Sorry, but we go with what the sources say, with better sources taking precedence.
* On the "Hindu Christian" stuff, I agree with you. That whole segment sourced to the 1811 book is suspect. I'll remove it.--Cúchullain t/ c 14:35, 27 January 2012 (UTC)
Dear Cuchullain,
I agree with you that accusing you is not a nice thing and no way to deal with an issue. I agree with what you have stated about the term 'Mar Thoma Nasrani'. But I am afraid your delay in acknowledging that the whole segment of misleading usage of 'Hindu Christian' etc.. being suspect and need to be removed came only after I made a 'noise' about it even though the other editor kept on deleting it but only in vain. I may have been wrong in my accusation and wish that I am wrong in this case. But the edit warring seemed otherwise. Hope we could avoid this in future by being truly fair in our edit and deletions and reverts. thanks Robin klein (talk) 14:59, 27 January 2012 (UTC)
* I shouldn't have to tell you to assume good faith about other contributors. I didn't notice that the "Hindu Christian" stuff had been added, and even today didn't immediately recognize it as problematic until you pointed it out. You certainly didn't deal with it yourself or even bring it up on the talk page, which should be expected if you took issue with it. At any rate, I'm working on that section now, using academic sources.--Cúchullain t/ c 15:30, 27 January 2012 (UTC)
* Okay, I believe I have removed the problematic material (and a lot more of unsourced or poorly sourced material in that section). I replaced it academic sources and material adapted from Malankara Church. I will continue to work on the article as time permits. In the future, if you see anything that needs changing, please at least bring it up on the talk page.--Cúchullain t/ c 16:33, 27 January 2012 (UTC)
Dear Cuchullain,
Thanks for your work. You are right I should have taken up the work myself. But I should say that I feel threatened by the bullying behavior of certain editors with fierce nationalistic casteist agenda. I feel intimidated to make changes or add material by intimidating behavior of individuals with casteist ideology in the form of relentless edit war without discussion that I experienced over the past couple of months. Such things should have been avoided in order to not scare away editors. I hope editors watching this page may not allow bullying and do not support it through silence for the purpose of nationalistic and casteist ideology. thanks Robin klein (talk) 17:01, 27 January 2012 (UTC)
* I am very sorry if you are feeling put upon by others, and would be happy to help you deal with such things if you hit me up on my talk page. But I can tell you that you're making some pretty serious accusations, and making such comments without anything to back them up will get us precisely nowhere.
* As to the article, again, if you see anything that needs to be dealt with (there's a ton of that here) at least bring it up on the talk page. I've done a lot of work here and will continue to do more as time and resources permit.--Cúchullain t/ c 17:16, 27 January 2012 (UTC)
* Robin Klein - thanks for contacting me on my Talk page re the edits here, however, I have to say that on the contrary it appears to be Cúchullain and the other editors who are simply editing straight and following WP guidelines in basing WP:Title, etc, on WP:RS. And I should also say that with "fierce nationalistic casteist agenda" you are violating WP:NPA and need to avoid that in future. All that is happening is that a badly written article is being improved and conformed to reliable WP:V. Best regards. In ictu oculi (talk) 17:45, 27 January 2012 (UTC)
Dear In ictu oculi and Cuchullain,
Thanks for your response. I shall bring up on the talk page any further issues. thanks Robin klein (talk) 19:41, 27 January 2012 (UTC)
* Why the Sources: C Buchanan and Michael Geddes are unreliable for you? Both are treasures of invaluable information about Syrian Christians. Social stratification on the basis of caste is a ground reality in India. Now Indian Govt has ordered a caste bases census and it has already launched in many cities. Why does Mr. Robin find it reasonable to mention the Jewish account of Syrian Christians while he considers the terms Hindu, Brahmin etc as casteist? -- AshLey Msg 16:55, 28 January 2012 (UTC)
* Ashley, the Buchanan and Geddes sources are problematic because they are so old. The Geddes work is essentially a primary source, which we can't use for any kind of interpretation. It is fine for things like direct quotes of the wording, but any interpretation needs to come from up-to-date modern sources. Similarly, sourcing entire paragraphs only to Buchanan's work, which is over 200 years old, is a bit of an issue. Fortunately we have many modern works on the Saint Thomas Christians we can use to cover the same things, and which will have access all the research that has occurred since 1806.Cúchullain t/ c 13:26, 30 January 2012 (UTC)
A couple of holes that might be filled
I don't know if these details strike anyone else as interesting/relevant but think it might help the article if anyone can provide sourced edits adding:
* What is the word "Nasrani" in Malayalam? - evidently it's from Syriac "Nazarene" meaning "Christian" is it actually a loan-word into Malayalam for Christian or just some Christians?
* the official name(s) of the Mar Thoma church(es) followed by the format "(Malayalam script, romanization, "literal translation")
* the official name of the ethnic group in GOI census materials.
* The official Bible of the Mar Thoma church(es) per Bible translations into Malayalam. Does the canon include the Deutero-canonicals?
* Other? In ictu oculi (talk) 03:08, 28 January 2012 (UTC)
* I can answer a few of these questions.
* "Nasrani" is a term used in various languages, including Malayam, for "Christian". In the Indian context, the term refers only to the Saint Thomas Christians - it's not used for Latin Catholics, Protestants, etc. The term is of Arabic origin, and appears to be derived from "Nasareth".
* The different Saint Thomas Christian churches use different Bibles depending on their affiliation. Except for Protestants, all Christians use the "deuterocanonicals", though they vary on which ones they include. Among the Saint Thomas Christians, the Catholic churches (Syro-Malabar Catholic Church and Syro-Malankara Catholic Church) use local versions derived from the standard Catholic Bible. The Syrian Orthodox-affiliated/influenced churches use versions derived from the Syriac Bible (the Peshitta). I believe that all (or nearly all) the churches currently use Bibles in Malayam; the difference is which version they were translated from (and therefore which books they include). Prior to the 16th century, the Saint Thomas Christians would have used the Church of the East's version of the Peshitta, which is slightly different from the modern Syriac Orthodox Bible.--Cúchullain t/ c 14:29, 30 January 2012 (UTC)
* Thanks, interesting to know that a non-Saint Thomas Christian would not be called "Nazarene" in Malayalam, this probably should be in this article. The information on versions I have copied verbatim in the translations article, since although anecdotal it agrees in much more detail with what other sources have said. In ictu oculi (talk) 23:33, 30 January 2012 (UTC)
* Sure. I'll try to find track down a more direct source for this. The gist of it is that in the original sense, "Nasrani" (or its cognates) just refers to Christians in general. For centuries the only Christians in southern India were the Thomas Christians (and Syrian natives associated with them). Later on when European Christians and Indian converts came onto the scene, "Nasrani" served to distinguish them from not only Hindus and Muslims, but other Christians as well. Another interesting term used at the time of European contact was "Nasrani Mappila", which means something along the lines of "Christian Brother-In-Law", i.e., Christians native to Malabar.Cúchullain t/ c 03:26, 31 January 2012 (UTC)
Edit warring
The section on Portuguese contact was re-written with superior sources per the discussion above. Editors had some problems with the wording and the sources, so I rewrote them more neutrally using academic sources. The material is well sourced, directly relevant, and removed unsourced and poorly sourced passages. Please stop removing them. Additionally, the issues with the term "Mar Thoma Nasranis" are also explained above. Specifically, that term is not common and does not appear in any of the sources. The source specifically says that the local name was "Nasrani" or "Nasrani Mappila", NOT "Mar Thoma Nasrani". "Mar Thoma Nasrani" appears to be a very uncommon term, and it is not the source for the English term "Saint Thomas Christian" (that's a cognate of the Portuguese term for them, Cristãos de São Tomé. The website added does not appear to be a reliable source. Thank you.--Cúchullain t/ c 16:02, 30 January 2012 (UTC)
* As the edit warring has continued without discussion, it leaves no choice but to seek administrator intervention.Cúchullain t/ c 16:35, 30 January 2012 (UTC)
* It is unfortunate that one edit warrior has caused an article that is actively being worked on to be protected, but action was clearly necessary. Let's move forward with the discussion. For the reasons just explained, this version is much better sourced and neutral than what currently appears. All the material is attributed to high-quality, recent academic sources, compared to this, which is replete with material attributed to out-of-date or inferior sources, material that doesn't appear in the cited sources, incomplete citations, poor writing, and lengthy passages with no sources whatsoever. I look forward to hearing the thoughts of others. Once we sort this out I will continue updating the article with new sources.Cúchullain t/ c 17:15, 30 January 2012 (UTC)
Dear Cuchullain,
It is indeed unfortunate that the page had to be protected but then it was needed. I thank you for painstakingly rewriting the section on Portuguese Persecution. I agree with your write up for the section. thanks Robin klein (talk) 17:24, 30 January 2012 (UTC)
* Presumably that closes the page to IP edits for a period? Thanks to the admin. Now Cuchallain's last edit needs to be restored - but carefully copying in the page protection template left by the Admin. In ictu oculi (talk) 00:04, 31 January 2012 (UTC)
* Thank you In ictu. The page is actually full-protected; no one can edit it. It's frustrating since we're activelly working on improving it, but sometimes that's what needs to be done to stop the disruption. In the meantime we can pursue consensus on the talk page.Cúchullain t/ c 03:26, 31 January 2012 (UTC)
* Oh well never mind. I think the admin is probably right to go with a full PP, it's just unfortunate that the IP's edit which both you and Robin had agreed on was on top. In the meantime (a) any tendentious issues can still be discussed here, and (b) other Christianity in Kerala pages such as the Bible translations into Malayalam and several others can be improved. In ictu oculi (talk) 03:36, 31 January 2012 (UTC)
* Please don't spread misinformation. Saint Thomas Christians never formed an alliance with the Portuguese, it was "forced upon" them by the Portuguese. So please be careful while editing.<IP_ADDRESS> (talk) 06:37, 31 January 2012 (UTC)
* <IP_ADDRESS>, not a promising start. Your edits are the main recent factor that has got the page frozen. I barely know anything about this subject, but even a cursory look shows that the academic sources you are objecting to (and have deleted) are not the only ones but representative of all texts:
* Edward René Hambye, George Menachery -The St. Thomas Christian encyclopaedia of India 1982 "Even the waning Portuguese power could still muster enough authority to help out Christian communities belonging to the Padroado, which had never lived in any territory controlled by the Portuguese crown"
* A. Mathias Mundadan - The arrival of the Portuguese in India and the Thomas Christians 1967 "OTHER RELATIONS OF THE ST. THOMAS CHRISTIANS WITH THE PORTUGUESE TILL ABOUT 1520 Here we pass on to examine the first fruits of the new alliance the community of St. Thomas Christians has just entered into with the Portuguese."
* Leslie Brown The Indian Christians of St Thomas 1956 "So when the Portuguese came, the St Thomas Christians were delighted at the prospect of getting a new protector who was also a Christian like themselves"
* It took literally 3 minutes to find those. Do you have any WP:RS to support your edits? In ictu oculi (talk) 10:31, 31 January 2012 (UTC)
* Agree. The material is well sourced and ought to stay. Robert Frykenburg is a well respected scholar in the field of South Asian studies and the book was published by Oxford. In contrast, Buchanan, though invaluable for his time period, was a minister and missionary, and his book is over 200 years old. It can't be used to contradict the current scholarship.--Cúchullain t/ c 13:53, 31 January 2012 (UTC)
* Hi, I agree that the standard of the current presentation is to be improved. But the situation which led to the conflict between Syrians and Portuguese is more complex in nature. The cultural and liturgical identity of Syrians were totally unacceptable for the Europeans and finally it led to the crack. This point should be indented in Cochullains edits. Acts and Decrees of the Synod of Diamper throws light on this aspect. Social implications of the Synod also need an attention since we are dealing with an ethnic group. Syrian Christians were living as a Hindu Upper Caste before the arrival of Portuguese and there were systemic disturbances and resettlement after the latinization of this community. Their upper caste status was derived from the deep rooted belief that a good portion of the early Christians in Malabar were brahmins and the community still keeps pride in the traditional beliefs.
* A Historical-developmental study of classical Indian philosophy of morals - Rajendra Prasad, Centre for Studies in Civilizations (Delhi, India) - ISBN<PHONE_NUMBER> - - Page 484 ".......the sudden removal of these caste rules lowered the status of Syrian Christians.............." "While they remained Christian in faith, they retained typical Hindu social customs"
* Origin of Christianity in India: a historiographical critique By Benedict Vadakkekara Page 32 - "the claim to a brahmanic origin made their position all the more secure" ....- Page 78 - " The Synod of Diamper imperiled the communities high-caste status....." and "Malabr Christians had strong objections to pollute themselves even by kissing the ring of Portuguese Archbishop..."
* These points are to be mentioned to render a ralistic picture of the Christians of St Thomas as an Indian ethnic group in the original context. If these are exculded considering casteist, we would miss some factual information in this article which is essential in the Indian context.
* One more, Mar Thomma Christians is the Malayalam usage of the original Portuguese term for Malabar Christians, "Cristãos de São Tomé". (Ref: Origin of Christianity in India: a historiographical critique By Benedict Vadakkekara - Page 46) Also I believe, before the arrival of Portuguese, they were just "Christians" (Mal: ക്രിസ്ത്യാനികള് - pron: kristianikal) for the Malabar society. AshLey --Msg 14:42, 31 January 2012 (UTC)
* I agree that this material could be included in that section. Much of that was already touched on in my edit - specifically, it mentions that the Synod officially anathemized certain customs (especially local customs also associated with Hindus) that the Portuguese considered "superstitious" or just plain didn't like, and it reformed the liturgy to purge it of elements the Portuguese didn't approve of. The sources you mention We do need to be careful not to go off on tangents - we have a great deal to cover in this article, so what we do include needs to be given proper weight. But of course any (well-sourced and neutral) material we can't get into here would certainly be appropriate for include in other articles.--Cúchullain t/ c 15:09, 31 January 2012 (UTC)
* Thank u. Kudos to your efforts for improving the article. Since Indians value their culture and heritage more than anything, I recommend such contents to be included, but surely you could purge any tangential and unrealistic stuff. -- AshLey Msg 15:22, 31 January 2012 (UTC)
* I think it's certainly worth working in in more detail. The Synod of Diamper was a major event in the history of the community. I'm also working on a few paragraphs for the period between between the earliest days and Portuguese contact, which hopefully will be a good bridge between those two sections.--Cúchullain t/ c 16:46, 31 January 2012 (UTC)
* I look forward eagerly to see the improvements as you mentioned above, but when this Full Protection will be removed? --<IP_ADDRESS> (talk) 13:22, 1 February 2012 (UTC)
* It will expire later today, but obviously it will be restored if there's any further edit warring.--Cúchullain t/ c 13:31, 1 February 2012 (UTC)
Okay, as consensus appeared to be quite clear I went ahead and made the discussed changes.--Cúchullain t/ c 21:30, 1 February 2012 (UTC)
* " Despite the reform, groups such as the Knanaya people preserved some elements of their culture due to their tradition of endogamy." This sentence is misleading in the present context. There is no relation between Portuguese reforms and Knanaya endogamy. In the Portuese period both the Northists and Southists were endogomous.(The St. Thomas Christian encyclopaedia of India: Volume 1 -"The Nothist-Southist endogamous division among the Christians of St. Thomas is attributed to the arrival of Thomas of Cana and his men. The Portuguese, who witnessed many quarrels between these two rival groups during the 16th century".....Page 3) No academic sources are there to support the challenged point as it is. The given sources have some content on the preservation of Knanaya traditions by the Southists, aided by their endogamous nature and that has been quoted here out of context. -- AshLey Msg 14:33, 2 February 2012 (UTC)
* Thanks for the catch. I don't have access to all those sources, but it does strike me as a logical error and therefore a reason to doubt that the sources really connect Knanaya endogamy to the particular reforms of the Synod of Diamper. We may be able to work the material in elsewhere, but we need to be sure we're following what the sources actually say.--Cúchullain t/ c 15:16, 2 February 2012 (UTC)
* Thank u. Many of those sources are inaccessible. I'll try to get some hard copy. -- AshLey Msg 16:02, 2 February 2012 (UTC)
* It is true that the passage dealing with knanaya traditions need not be there in the section on portuguese persecution. However the sources are legitimate especially the one by Shalva Weil from Hebrew University Jerusalem published in an academic Journal of Sociology. The text has to be added in the appropriate section. Robin klein (talk) 16:38, 2 February 2012 (UTC)
* I agree that the sources themselves look legit. I personally don't have a way of checking into them, so I can't verify the material to make sure it's not taken out of context. Do you have access to them?--Cúchullain t/ c 17:07, 2 February 2012 (UTC)
* I have read the paper by Shalva Weil from Hebrew University Jerusalem. She states that the traditions of Knanaya Nasranis and Cochin Jews are very similar. She also mentions in the very same paper that until recent times the so called Syrian Christians of Kerala were mostly referred to as "Nasrani" including in governmental documents. She also mentions in the same paper that there are traditions that state that even the so called Northists claim to be descendants of Jewish settlers in the Malabar. thanks Robin klein (talk) 17:29, 2 February 2012 (UTC)
* "Some traditions of Knanaya Nasranis(Southists) and Cochin Jews are very similar." - This point could be included in the portion dealing with cultural identity. But the statement- "There are traditions that state that even the so called Northists claim to be descendants of Jewish settlers in the Malabar." - is purely arbitrary and there are more reliable sources to confirm the indigenous origin of Northists. -- AshLey Msg — Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:25, 3 February 2012 (UTC)
* The Weil source is certainly reliable, though we do need to be absolutely certain that we're really indicating what that and the other cited sources say. Robin, could you give us the exact quote from p. 16 of the article relating to the Knanaya and their endogamy?--Cúchullain t/ c 18:47, 3 February 2012 (UTC)
* Dear Cuchullain, Right now I have no access to that paper by Prof S. Weil. But the paper discusses at length the similarities between the Knanaya community and the Cochin Jews. It also tries to give a common cultural background of the syrian christian nasrani community and shows the similarities among the said communities. thanks Robin klein (talk) 01:15, 4 February 2012 (UTC) | WIKI |
REST Assured Tutorial 74 – Problem With JSONassert While Ignoring Fields From JSON Documents
Introduction
As a part of the End to End REST Assured Tutorial, in this post, we will learn about some challenges and its solution with JSON assert.
I have covered concepts of JSONassert library which are used to compare JSON documents. But comparing JSON documents as a whole with some customization like ignoring some fields is not so simple and proper when ignoring field is not present in JSON documents to be compared.
Did you know that I have started a YouTube channel as well and I need your support to make it successful. Please do watch content then comment, like, share, and obviously subscribe.
What happens when an ignored field is not present in simple JSON Object
We know how to ignore fields from a comparison in JSON Objects but we have a scenario where the ignored field may not be present in JSON objects. In the case of dynamic JSON Objects, we may not know if the field will be present always. Let’s run an example program and observe the output.
Please note problem occurs when a field is not present in the second JSON object. If a field is missing from the first JSON Object there will be no error.
JSON Object 1
{
"id": 1,
"first_name": "Amod",
"last_name": "Mahajan",
"married": false,
"salary": 123.45
}
JSON Object 2
{
"id": 1,
"first_name": "Amod",
"last_name": "Mahajan",
"married": false
}
As we can see “Salary” is missing from the second JSON Object. We want to ignore this field from comparison as we assume that this field may or may not present. For a scenario that may be salary of board members will not be visible.
Sample Program
package IgnoringFieldsDuringComparision;
import org.json.JSONException;
import org.skyscreamer.jsonassert.Customization;
import org.skyscreamer.jsonassert.JSONAssert;
import org.skyscreamer.jsonassert.JSONCompareMode;
import org.skyscreamer.jsonassert.comparator.CustomComparator;
import org.skyscreamer.jsonassert.comparator.JSONComparator;
public class IgnoringFieldsFromSimpleJsonObjectsNonExistence {
public static void main(String[] args) throws JSONException {
String s1 = "{\r\n" +
" \"id\": 1,\r\n" +
" \"first_name\": \"Amod\",\r\n" +
" \"last_name\": \"Mahajan\",\r\n" +
" \"married\": false,\r\n" +
" \"salary\": 123.45\r\n" +
"}";
String s2 = "{\r\n" +
" \"id\": 1,\r\n" +
" \"first_name\": \"Amod\",\r\n" +
" \"last_name\": \"Mahajan\",\r\n" +
" \"married\": false\r\n" +
"}";
JSONComparator com = new CustomComparator(JSONCompareMode.LENIENT,
new Customization("salary", (o1, o2) -> true));
JSONAssert.assertEquals(s1, s2, com);
}
}
Output
From the above example, we can learn that if an ignored field is not present in the second JSON object then we will get an assertion error as above. This is not what we wanted. If a field is ignored then it should be ignored without checking if it is missing from the second JSON Object. But it does not work in this way.
There is no direct solution to it. Instead, we need to override multiple methods.
Solution
If you debug the code while comparing JSON using JSONassert then you will find a method named “checkJsonObjectKeysExpectedInActual()” in an abstract class “AbstractComparator” which is called internally. The default implementation is as below:-
protected void checkJsonObjectKeysExpectedInActual(String prefix, JSONObject expected, JSONObject actual, JSONCompareResult result) throws JSONException {
Set expectedKeys = getKeys(expected);
for (String key : expectedKeys) {
Object expectedValue = expected.get(key);
if (actual.has(key)) {
Object actualValue = actual.get(key);
compareValues(qualify(prefix, key), expectedValue, actualValue, result);
} else {
result.missing(prefix, key);
}
}
}
By default, they check for the presence of a key in JSON Object and fail if is not missing. We can override this method and can remove ignored keys directly.
package JsonObject;
import java.util.Set;
import org.json.JSONException;
import org.json.JSONObject;
import org.skyscreamer.jsonassert.Customization;
import org.skyscreamer.jsonassert.JSONCompareMode;
import org.skyscreamer.jsonassert.JSONCompareResult;
import org.skyscreamer.jsonassert.comparator.CustomComparator;
public class MyComparator extends CustomComparator{
private final Set attributesToIgnore;
public MyComparator(JSONCompareMode mode, Set attributesToIgnore, Customization... customizations) {
super(mode, customizations);
this.attributesToIgnore = attributesToIgnore;
}
@Override
protected void checkJsonObjectKeysExpectedInActual(String prefix, JSONObject expected, JSONObject actual, JSONCompareResult result) throws JSONException {
//Remove ignored keys from json object
attributesToIgnore.forEach(attribute -> expected.remove(attribute));
super.checkJsonObjectKeysExpectedInActual(prefix, expected, actual, result);
}
}
Example Program
package IgnoringFieldsDuringComparision;
import java.util.Arrays;
import java.util.HashSet;
import org.json.JSONException;
import org.skyscreamer.jsonassert.Customization;
import org.skyscreamer.jsonassert.JSONAssert;
import org.skyscreamer.jsonassert.JSONCompareMode;
import org.skyscreamer.jsonassert.comparator.JSONComparator;
public class IgnoreFieldsUsingMyComparator {
public static void main(String[] args) throws JSONException {
String s1 = "{\r\n" +
" \"id\": 1,\r\n" +
" \"first_name\": \"Amod\",\r\n" +
" \"last_name\": \"Mahajan\",\r\n" +
" \"married\": false,\r\n" +
" \"salary\": 123.45\r\n" +
"}";
String s2 = "{\r\n" +
" \"id\": 1,\r\n" +
" \"first_name\": \"Amod\",\r\n" +
" \"last_name\": \"Mahajan\",\r\n" +
" \"married\": false\r\n" +
"}";
JSONComparator com = new MyComparator(JSONCompareMode.LENIENT,
// Pass attributes to ignore
new HashSet(Arrays.asList("salary")),
new Customization("firstName", (o1, o2) -> true),
new Customization("age", (o1, o2) -> true));
JSONAssert.assertEquals(s1, s2,com);
}
}
This time comparison will pass which was failing above but this will not work if nested JSON object or arrays. You may need to override many methods to handle these scenarios.
You can also use the above concept with asserting portion of JSON document as discussed in this post.
you can clone the git repo consisting above examples from here.
You can subscribe to my YouTube channel RetargetCommon to learn from video tutorials.
If you have any doubt, feel free to comment below.
If you like my posts, please like, comment, share and subscribe.
#ThanksForReading
#HappyLearning
Find all Selenium related posts here, all API manual and automation related posts here, and find frequently asked Java Programs here.
Many other topics you can navigate through the menu.
Leave a Reply
Your email address will not be published. Required fields are marked * | ESSENTIALAI-STEM |
Quick Answer: How Can I Edit An EXE File?
Open EXE/DLL File with Resource Tuner
Resource Tuner contains a number of methods for opening files.
To open a file for browsing or editing resources, click the toolbutton to the left or click File > Open [CTRL+O].
How can I edit an EXE file in Notepad?
How to Open a .exe File in Notepad!
• Step 1: Open Notepad. Press Windows Logo Button + R Then “Run” Should Come Up. Type In “notepad” And Hit Enter.
• Step 2: Opening Part 1. Go to File Then Click Open.
• Step 3: Opening Part 2. After That Select A Program That You Want To Open Then Click Open.
• Step 4: Finished. After You Clicked Open Just Wait Then
How do I unpack an EXE file?
To extract an MSI file from an EXE installer, you need to: Launch your .exe file.
Follow the steps below.
1. Download 7-Zip from this page and install it.
2. Right-click on the .exe file (from which you want to extract an .msi file) and from the shortcut menu choose 7-Zip > Open Archive.
3. Do not extract any files yet.
What program opens EXE files?
Inno Setup Extractor is perhaps the easiest exe file opener for Android. After you download your desired exe on your Android phone, just download and install Inno Setup Extractor from the Google Play Store, then use a file browser to locate the exe file, and then open that file with the app.
How do you edit a .DLL file?
Part 2 Editing DLLs with Hex Editor
• Install the Hex Editor.
• Click File.
• Select Open.
• Click Open File….
• Find the DLL you want to edit.
• Select the DLL.
• Click Open.
• Edit the DLL’s contents.
Can you edit an EXE file?
For viewing and editing the raw binary data contents of the DLL file, use Hex Editor. EXE and DLL files are not plain, traditional text files that you can easily read and edit. You cannot simply open up an .EXE like a document file and start editing or reading the contents.
Can we edit EXE file?
The .exe file is a windows executable file which is non-editable. But if you want to change its Resources(icon etc.) , then you can use resource hacker tool. Uniextract tool lets you extract if it is an extractable packaged exe file. Also, Reverse engineering is required for truely EDITING an exe file.
Are EXE files dangerous?
Not all of them are viruses. A virus too can be in the form of an exe file too. It is even possible that the exe file is of a nice software, but a virus is contained in an attached file. So, you should make sure the file you are gonna execute is from a trusted source and is scanned using a latest antivirus before use.
Is an EXE file high risk?
Executable files commonly have an EXE file extension, but there are hundreds of other executable file formats. Such files, which are considered to pose a high security risk, include EXE, BAT, COM, CMD, INF, IPA, OSX, PIF, RUN and WSH.
How do I run a .EXE file?
Method 1 Running EXE Files (Windows)
1. Double-click an EXE file to run it.
2. Open the Registry Editor if you can’t run EXE files.
3. Navigate to.
4. Right-click on the “(Default)” entry and select “Modify”.
5. Type.
6. Navigate to.
7. Right-click on the “(Default)” entry and select “Modify”.
8. Enter.
How do you open DLL files?
Navigate to the location of the new DLL file. If you are using Windows 7 or newer, open the folder containing the new DLL file, hold the Shift key and right-click in the folder, and select “Open command window here”. The Command Prompt will open directly to that folder. Type regsvr32 dllname .dll and press Enter.
How can I see the code of a DLL file?
Method 1 – to Open DLL File
• First you have to go to the window registry.
• Open the command prompt.
• Click on the start menu bar and pressing the window key +R.
• Typing “cmd.” Navigate to the location of the DLL files and hold the shift key “Open command window here.
• Type” regsvr32 dllname.dll” and press enter.
Is a DLL file a driver?
A DLL file is a compiled library that contains a set of procedures and/or drivers that are referenced and executed by a Windows program. It allows multiple programs to access shared functions through common libraries. mfc42u.dll – A Microsoft Foundation Class (MFC) library required by some Windows programs to run.
How can we open .exe file?
Most of the time, you open EXE files directly by double-clicking them in Windows. To begin, click Start and select the “Search” function. When you type the name of the EXE file you want to open, Windows displays a list of the files it finds. Double-click on the EXE filename to open it.
How do I open and edit a DLL file?
Launch Visual Studio and go to File > Open. Go to the .dll or .exe file you are trying to open, and before clicking Open. Now you’ll be at a screen that has all of the available resources to you. You can edit DLL file in the window and then save it.
Is it possible to get source code from EXE file?
The short answer is no – the source is not available if only the .exe is available. The source code is an entirely separate file which is generally not shared with the public.
What is PE Explorer?
PE Explorer is a powerful tool that provides everything you might need to inspect the inner workings of 32-bit Windows executable files.
What does resource hacker do?
Resource Hacker (also known as ResHacker or ResHack) is a free resource extraction utility and resource compiler for Windows developed by Angus Johnson. It can be used to add, modify or replace most resources within Windows binaries including strings, images, dialogs, menus, VersionInfo and Manifest resources.
How does a DLL work?
DLL files are nothing more than a means for developers to use shared code and data, allowing to upgrade functionalities without the need to re-link or re-compile applications. In other words, DLL files contain code and data that is used by several different applications. | ESSENTIALAI-STEM |
Radiation reaction for a massless charged particle
P. O. Kazinski, A. A. Sharapov
Research output: Contribution to journalArticlepeer-review
20 Citations (Scopus)
Abstract
We derive effective equations of motion for a massless charged particle coupled to the dynamical electromagnetic field with regard to the radiation back reaction. It is shown that unlike the massive case, not all the divergences resulting from the self-action of the particle are Lagrangian, i.e., can be cancelled out by adding appropriate counterterms to the original action. Besides, the order of renormalized differential equations governing the effective dynamics turns out to be greater than the order of the corresponding Lorentz-Dirac equation for a massive particle. For the case of a homogeneous external field, the first radiative correction to the Lorentz equation is explicitly derived via the reduction of order procedure.
Original languageEnglish
Pages (from-to)2715-2725
Number of pages11
JournalClassical and Quantum Gravity
Volume20
Issue number13
DOIs
Publication statusPublished - 7 Jul 2003
Externally publishedYes
ASJC Scopus subject areas
• Physics and Astronomy(all)
Fingerprint Dive into the research topics of 'Radiation reaction for a massless charged particle'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Dirk ter Haar
Dirk ter Haar FRSE FIP DSc (Oosterwolde, 19 April 1919 – Drachten, 3 September 2002) was an Anglo-Dutch physicist.
Life
Dirk ter Haar was born at Oosterwolde in the province Friesland in the north of the Netherlands on 19 April 1919. He studied physics as an undergraduate at the University of Leiden. In 1946 he was a research fellow of Niels Bohr at the Institute for Theoretical Physics in Copenhagen (now the Niels Bohr Institute), and returned to Leiden in 1948 to obtain his PhD. His supervisor was the renowned Hendrik Kramers and his PhD dissertation was on the origin of the Solar System. From 1947 to 1950 he was a visiting associate professor of physics at Purdue University.
In 1950 he obtained a post as professor of physics at the University of St. Andrews, and later became a British citizen. In 1952 he was elected a Fellow of the Royal Society of Edinburgh. His proposers were Jack Allen, David Jack, Daniel Edwin Rutherford and Edward Thomas Copson.
He became a Fellow and Senior Tutor of Magdalen College, Oxford and Reader in theoretical physics at the University of Oxford.
In 1966 Ter Haar became a corresponding member of the Royal Netherlands Academy of Arts and Sciences.
Many prominent scientists studied under Ter Haar, including Anthony Leggett, winner of the Nobel Prize in Physics in 2003, and Deng Jiaxian, one of the leading scientists and founders of Chinese nuclear weapons programs.
Dirk could read Russian, and played a prominent role in disseminating the works of Soviet physicists such as Landau and Kapitsa to the western world. He also translated the classic monograph Quantum Mechanics by Alexander Davydov into English.
He retired from his positions at Oxford in 1986, and died at Drachten in the northern Netherlands on 3 September 2002.
Family
In 1949 Dirk ter Haar married Christine Janet Lound and together they had two sons and a daughter. His daughter, Gail ter Haar, became a reader in physics as well, specializing in therapeutic ultrasound.
Works
He wrote numerous books on physics, such as Elements of Statistical Mechanics (1954). In addition, he wrote a book on Kramers and was a founding editor for Physics Letters (1962) (later Physics Letters A) and Physics Reports (1971). In 1984 the book Essays in Theoretical Physics in honour of Dirk ter Haar was published in honour of his work in statistical physics and quantum mechanics.
* D. ter Haar, Elements of Statistical Mechanics. London: Constable (1954). 2ed (1966) New York: Holt, Rinehart & Winston; 3ed (1995) Oxford: Butterworth-Heinemann
* D. ter Haar and H.N.S. Wergeland, Elements of Thermodynamics, Addison-Wesley, 1966
* D. ter Haar, Elements of Hamiltonian Mechanics, Pergamon Press, Oxford.
* D. ter Haar, The Old Quantum Theory, Pergamon Press, Oxford, 1967.
* D. ter Haar, "On the Origin of the Solar System", Annual Review of Astronomy and Astrophysics, Vol.5, Oxford, 1967:267-278,.
* D. ter Haar, Lectures on Selected Topics in Statistical Mechanics, Pergamon Press, Oxford, 1977.
* D. ter Haar, Master of Modern Physics. The Scientific Contributions of H. A. Kramers, Princeton University Press, 1998. | WIKI |
Skip to content
API v1 - Driver
The Driver API endpoint provides the list of Drivers available within the Matillion ETL instance. You can only use this API endpoint if you're running a Matillion ETL instance, and you have been assigned the Admin role.
Driver API provides the resource data, meaning the information returned by an API. These resources usually have various endpoints which are combined with multiple HTTP methods for each endpoint. The Driver API has one PATH /driver to retrieve the data available in a Matillion ETL instance.
Prerequisites
• To use Matillion ETL API services, you must know how to make REST API calls, either by employing a REST API GUI client such as Postman, or employing a command line interface (CLI) like cURL.
• If you are new to Matillion ETL's API, read our Matillion API introduction and explore the v1 API map.
• Matillion ETL API endpoints require authorization to make any REST API call, so ensure a username and password for the Matillion ETL instance is configured before making any API call.
Using the API
Returns a list of drivers in a Matillion ETL instance by making a GET call with the form:
<InstanceAddress>/rest/v1/driver/<endpoint>
Note
<InstanceAddress>/rest/v1/driver is the base URI for the API driver endpoints. Add the specific <endpoint> information for the following function, documented below.
Where:
• <instanceAddress> is the URI of your Matillion ETL instance in the form http://host:port.
• <endpoint> is the name of the API endpoint that accomplishes the task you want to perform. The endpoint is documented in the following section.
GET driver
Returns the drivers available in this Matillion ETL instance.
To return a list of drivers, make the following GET call:
<InstanceAddress>/rest/v1/driver
A successful GET call to the endpoint will return the following response from the server, in JSON format:
[
{
"driverName": "Oracle",
"files": [
{
"group": "<groupname>",
"fullFilePath": "<file path>",
"fileName": "<file name>"
}
]
},
{
"driverName": "SAPHana",
"files": []
},
{
"driverName": "SQL Server (Microsoft Driver)",
"files": []
},
{
"driverName": "MySQL",
"files": []
}
]
• driverName: The name of the driver.
• group: The group that contains the driver.
• fullFilePath: The absolute path of the file or directory.
• fileName: The name of the file. | ESSENTIALAI-STEM |
Code covered by the BSD License
Highlights from
Toolbox Fast Marching
image thumbnail
Toolbox Fast Marching
by
Gabriel Peyre (view profile)
24 Oct 2004 (Updated )
A toolbox for the computation of the Fast Marching algorithm in 2D and 3D.
perform_farthest_landmark_sampling.m
function landmark = perform_farthest_landmark_sampling( W, landmark, DL_landmark, base_points, DL_base, nbr_points )
% perform_farthest_landmark_sampling - samples landmark using least error seeding strategy
%
% points = perform_farthest_landmark_sampling( W, points, nbr_points, DL, base_points );
%
% points can be []
% DL is the distance map to base_points, wich is a 2 x p matrix
%
% Copyright (c) 2005 Gabriel Peyr
if size(base_points,1)~=2
base_points = base_points';
end
if size(landmark,1)~=2
landmark = landmark';
end
if size(base_points,1)~=2
error('base_points and landmark should be of size 2xp');
end
n = size(W,1);
nbr_bp = size(base_points,2);
nbr_lm = size(landmark,2);
% number of seeded point for each trial
nbr_trial = 50;
for i=1:nbr_points
% new potential location at random
trial = floor( rand(2,nbr_trial)*n ) + 1;
err = [];
for k=1:nbr_trial
% compute distance to trial
D = perform_fast_marching(W, trial(:,k));
% new list of distance
DL = cat(3, DL_landmark, D);
% compute cummulative error with this new point distance
e = 0;
for s=1:nbr_bp
D1 = compute_distance_landmark(base_points(:,s),DL,landmark,'align');
m = D1-DL_base(:,:,s);
e = e + sum( m(:).^2 );
end
err = [err, e];
end
% retrieve best match
[tmp,I] = min(err);
% add it to list
landmark = [ landmark, trial(:,I) ];
end
Contact us
| ESSENTIALAI-STEM |
Birds & Associated Problems
The Pigeon
The Pigeon, or Rock Pigeon, is found just about all over the world. They are kept by pigeon fanciers for show, racing and as pets. However, many of the pigeons seen around Perth are feral birds. Along with the Sea Gull and Crow, they are the primary scavengers of Perth. They congregate in all areas where food can be found. Place such as rubbish tips, recreational parks, roadside, industrial sites and inner city are popular attractions.
Pigeons are prolific breeders, and eggs are produced all year round but mainly in summer. They have a nest made of loose twig and sticks on a flat ledge. The breeding pair will usually produce 2 white eggs.
The Sea Gull
The Sea Gull is a common site around Perth’s shorelines, beaches, cliffs and waterways. It is effectively an ocean scavenger, but has changed its behaviour because of human development. They congregate in large flocks to feed on rubbish, decaying matter and are attracted to flood lights over water or lawn areas, in search of insects. The Sea Gull will travel long distances to find food, following watercourses inland or fishing boats out to sea.
The Sea Gull breeds from spring to autumn and has nests that a made up of cups of vegetation on the ground or in a shrub. The eggs are blotched and they usually produce 2-4 per breeding pair.
The Swallow
The Swallow is a common resident of open air spaces around Perth, whether it be over bushland, roads or open grassed areas. It has benefited from the urban spread, using buildings and fixtures as suitable nesting sites. It is very vocal, calling constantly when in flight or perching, especially when arriving at a nest. It gets its name from the habit of building nests above doorways or on porches. The Swallow may be partially migratory with populations decreasing in summer, and increasing again in autumn. Their flocks can become quite large, with up to 100 birds or more, and will perch along powerlines or fences to regroup. They can be found all over Perth in all habitat types.
They breed between August and December and have a nest in a half-bowl of vegetation fused together with mud, and connected to flat vertical surface. The produce 4-6 eggs that are white and speckled.
The Dove
The Dove is a familiar resident to the Perth area but is not native to Perth as it was introduced in 1896. This bird breeds all year round, but many broods fail as the nests are usually on a precarious branch and the nests are feebly made, as well as the chicks being a favourite food of domestic cats. The adults are very nervous and take to flight at sight of a human or sound of a loud noise; however they seem not to notice cars when feeding on the road and this frequently proves to be fatal. Doves eat various grains, seeds, small grass shoots and grit from the roadsides. They will frequently visit gardens where seed is left out and can gather in large flocks of up to thirty birds. They thrive in densely populated areas, and are usually seen perching on rooftops, TV antennae, telephone wires and roadsides.
The Magpie
The Magpie is a well-known icon of Australia. The males have a full white back and the females having a speckled back. Magpies live in close family groups and are extremely territorial. The groups have a strict hierarchy structure headed by the dominant male and female. Females build nests high, usually in the outer part of a tree. Although there are numerous accounts of Magpies attacking humans, they will usually keep their distance unless provoked or bad past experiences make them aggressive, in fact, Magpies will become quite tame if trust can be established. Magpies have a varied diet, including insects, larvae, beetles, seed and will occasionally take food from picnics or BBQ’s. | ESSENTIALAI-STEM |
Together In Fitness
Exercises that has to be avoided during pregnancy
Exercises that has to be avoided during pregnancy
As we all know exercise is good and is safe but when it comes to pregnant women, there are some exercises that should be avoided as it may harm them while performing those exercises.
Some exercises can be harmful because of over exertion which not only affects the mother but also the baby. So, it is always advised pregnant women who exercise should be aware about the exercises that they need to avoid. By being aware about these said exercises, they can exercise peacefully and have a safe pregnancy state.
Following are some of the exercises that should be avoided by pregnant woman.
The foremost thing a pregnant woman needs to consider before exercising is the safety of her child. Keeping this in mind, any exercise which can lead to a fall needs to be completely avoided. Exercises like snowboarding, gymnastics, horseback riding are all known to have a tendency to fall. So it must be avoided strictly.
Another form of exercise that needs to be avoided is the exercise which would entail them into using the back for sitting along with sit ups. This kind of exercise decreases the blood flow to the uterus which would result in one's heart rate to fall down.
Exercises are not the only thing that women need to restrict during pregnancy but also the places they visit needs to be reconsidered. Women are advised not to go to places with high altitude as high altitude places have less oxygen levels which will cause in a reduced intake of baby's oxygen needs.
The Closer View
Too much manganese sparks attention deficit problems
Too much manganese sparks attention deficit problems
Attention deficit hyperactivity disorder (ADHD) is one of the most common disorders among children. The symptoms include hyperactivity, impulsiveness, and basically being inattentive while play, at school or at home. While everyone has the tendency of being hyperactive or being inattentive, for…
• Overcome Your Propensity for Weight Gain Due to Your Genes
• Lentils - the natural weight-loss food
• Those Who Lose Weight After 40 Are More At Risk For Dementia
Editor's Pick
How can dancing be considered a fitness program?
How can dancing be considered a fitness program?
You must’ve heard about Zumba. The popular dance workout looks like more of a dance party than a fitness program! The US National Library of Medicine or the NCMI recognises dance as a form of exercise. According to their report, many people don't feel the need to exercise and stay…
Reader's Choice
What you can learn from 11 year-old weightlifter Elle Hatamiya
What you can learn from 11 year-old weightlifter Elle Hatamiya
You have probably already heard about 11-year-old weightlifter Elle Hatamiya. She has recently gone viral with her story of how she has impressed people at the gym. It is easy to tell what a bright future is waiting for this brave and perseverant girl. Before we start mentioning what things we can…
• Music that makes exercise fun for girls of all ages
Music that makes exercise fun for girls of all ages
• What 2 group school sports help girls stay fit?
What 2 group school sports help girls stay fit?
• How to make workouts less boring
How to make workouts less boring
• Does female weight-lifting mean gaining large muscles?
Does female weight-lifting mean gaining large muscles?
Recent commented
• What Can You Learn at www.buzzle.com?
What Can You Learn at www.buzzle.com?
• Why Swimming Is a Great Workout
Why Swimming Is a Great Workout
• How Can Rhythmic Breathing Help You Perform Exercises
How Can Rhythmic Breathing Help You Perform Exercises
Photography
• Examples of Burpee Exercises | ESSENTIALAI-STEM |
User:Talha kamboh
Talha Kamboh - A citizen of Pakistan. Works in gaming specially games developed by SUPERCELL. Help others about game-play on YouTube. YouTube channel: ''https://www.youtube.com/channel/UCPg9gr9HiWkN2B-DPUv83DQ '' | WIKI |
3
I have a selenium grid2 set up on an AWS instance, and I was wondering if there's a way I could view the logs on my local machine?
I understand I can visit: http://MyServerAddress/grid/console and view all of the nodes but I want the actual log. Its a bit of a pain having to remote desktop to the server each time I want to view it.
I was thinking something like http://MyServerAddress/grid/log but alas, it doesnt seem to be an option.
6
There's nothing available out of the box. But you can build this on your own.
• You would first need to enable logging for your Grid and have the logs dumped to a specific folder.
• You would now need to build a custom Servlet and inject it into the servlet (See here for details on how to do it )
• Assuming that your servlet is called "HubLogServlet", you should be able to access it via the link http://localhost:4444/grid/admin/HubLogServlet
You can refer to this LogServlet for a sample.
• This answers my question. Thanks for this. – Festivejelly Jan 23 '17 at 14:06
Your Answer
By clicking "Post Your Answer", you acknowledge that you have read our updated terms of service, privacy policy and cookie policy, and that your continued use of the website is subject to these policies.
Not the answer you're looking for? Browse other questions tagged or ask your own question. | ESSENTIALAI-STEM |
User:Dddwww
Roc
The roc is a mythical creature that is said to guard jewels. Many people have tried to find the hidden valley where the jewels reside and take them. But, when the roc sees the villagers, it launches a ferocious attack. Even elephants don't even stand a chance against a roc ripping them up into pieces. A roc will either eat whatever it happens to kill, or it will feed it to it's young. | WIKI |
2010 FIA GT1 Brno round
The FIA GT1 Brno round was an auto race held at the Masaryk Circuit, Brno, Czech Republic on 21–23 May 2010. It was the third round of the 2010 FIA GT1 World Championship season. The Brno circuit was last visited by the former FIA GT Championship in 2008. Support series for the event include the FIA GT3 European Championship, Porsche Carrera Cup Italia, and the Lamborghini Blancpain Super Trofeo.
Qualifying result
For qualifying, Driver 1 participates in the first and third sessions while Driver 2 participates in only the second session. The fastest lap for each session is indicated with bold. | WIKI |
Breaking
Exercise Is The Universal Medicine For Almost Anything That Ails Us
Following a healthy diet and a regular exercise can keep your body strong. Physical activities can also help boost brain health, according to Dr. Ronald Tarrel, a neurologist specializing in stroke and neurocritical care at the Noran Neurological Clinic.
Regular Exercise Is Good For Your Brain And Body
Dr. Tarrel, always advises his patients to exercise because it is the most universal medicine for any health problem. A regular exercise can strengthen your bones, muscles, and joints thus helping your body move better physically. Moreover, exercise can also help regulate body functions such as glucose, insulin, and blood pressure.
Unfortunately, not everyone knows that regular exercise can do wonders on the body. It can significantly boost your brain health in four ways.
It Can Make Your Brain Stronger
New brain cells are created by the human brain through the process called neurogenesis. Exercise is needed for this process since physical activity helps “increase neurons’ creation, resistance to damage, and survival.” A regular exercise can strengthen your brain more.
It Can Boost Your Mood
Your brain chemistry can possibly be affected by physical activities. During work-out, endorphins are released by your body. Endorphins are the “feel goods” chemicals that can help trigger positive feelings. Also, exercising helps release serotonin, a neurotransmitter that functions as a natural antidepressant.
Your mood can be improved by both endorphins and serotonin. That’s why, whenever you feel anxious or stressed, physical exercise can help you relax.
It Can Improve Learning And Memory
Since physical activity can increase your heart rate, it can help improve the flow of blood and nutrients to your brain. Blood flow and nutrients are both considered as the main factors for boosting learning, memory, and the ability for abstract reasoning.
According to research, exercising can help increase the actual size of the hippocampus, the part of the brain that is responsible for verbal memory and learning.
It Can Enhance Your Attention Span And Focus
Exercise can be a form of “moving meditation,” which can help you have an easier time concentrating on a particular task. It can also help you deal with daily stressors. For instance, you can do some yoga poses, swim a couple of laps in the pool, or bike for several times to forget your day’s irritations and simply concentrate on your body’s movement.
Through moving meditation, you can forget daily stressors, become calmer, and more level-headed, thereby making you more focused at work.
In general, your brain benefits from anything that is good for your heart. The benefits of regular exercise for both your mind and body can be reaped no matter what your age is.
It was concluded by Dr. Tarrel that you can boost your brain health even if you just stick to activities that you enjoy. However, you can also try out a new activity if you want to make your routine more challenging. He further added that activities such as martial arts, rock climbing, or ballroom dancing will have a greater impact on cognitive functions (e.g., thinking, reasoning, and remembering) over just exercise or mental tasks.
Exercise Tips For Brain Health
If you want to start exercising to boost your brain function, you can follow some of the guidelines below:
Strength Training
Strength training, like lifting weights or resistance training helps strengthen your bones and build muscles. Moreover, it can also boost your mood, and improve brain power, and enhance concentration.
Aerobic Exercise
Regular endurance exercises, such as swimming, biking, and running can help improve heart health, promote new brain cell growth, and preserve existing brain cells.
Flexibility
Your flexibility will gradually diminish as you age. By improving your flexibility, you can have more energy, improve your posture, and minimize your risk of injury. To help you stay more flexible, you can try activities like stretching, yoga or Taichi.
Balance
As you age, your balance will steadily decline, however you can remedy this with balance training. Balance training will help you prevent fall and improve your overall movements. Some training you can try to include simple exercises such as standing on one foot or walking backward.
No comments:
Powered by Blogger. | ESSENTIALAI-STEM |
Poor relief regulation of 1847
The Poor relief regulation of 1847 (Swedish: 1847 års fattigvårdförordning) was a Swedish Poor Law which organized the public poor relief system in Sweden. With some alterations in 1853 and 1871, it established the basis for the poor relief system until the Poor Care Law of 1918 was passed.
History
The law replaced the 1642 års tiggareordning which had previously regulated the public poor relief system. At the time the 1847 reform was enacted, care for the poor was largely organized in the traditional rotegång system, administered by the church.
The 1847 regulation established a public board of directors for poor relief in each parish. Though the church was no longer directly involved, the vicar in each parish was to be given a seat on the board. The law also made it mandatory to contribute to the parish poor fund. The ban for paupers who received benefits to move to another parish was also lifted, and the right of the parish to refuse a pauper (not born in the parish) to settle in the parish was abolished.
The Poor Care Board had the task of granting benefits to the needy and arranging a place in a poor house. If the community did not have a poor house, the board was responsible for arranging housing for the pauper with a parishioner and paying the benefits to the parishioner. The pauper's hosts had the legal right to demand household work of their tenant benefactors, a practice that had been customary in the rotegång system. The benefactors were also allowed to file complaints of abuse.
The traditional rotegång system was kept in force as a parallel system for adult paupers, but it was abolished for children. This ban on rotegång for children, who were to be placed in foster homes by the poor care board, lead to pauper actions becoming more common for children. The new law had the effect that children were often placed in foster homes with the parishioners who had made the lowest 'bid' for a stipend.
The poor relief regulation of 1847 was not changed much by the new act of 1853 (1853 års fattigvårdförordning). The law eventually came to be regarded as too liberal and generous. By the time of the Swedish famine of 1867–1869, the law had come to be interpreted very strictly, and it was replaced shortly thereafter. The poor relief regulation of 1871 (1871 års fattigvårdförordning), though it largely kept the form and provisions of the 1847 regulation, severely diminished the applicability of the law. Only the elderly, children, invalids and the insane were granted benefits under this law. It was not until the Poor Care Law of 1918 (1918 års fattigvårdslag) that the entire poor relief system in Sweden was truly reformed. Among its provisions, the 1918 law abolished the rotegång system, pauper auctions, child auctions, and poor houses. | WIKI |
NCCR
NCCR may refer to:
* National Centre for Coastal Research, an attached office of Ministry of Earth Sciences
* National Centre of Competence in Research, a research instrument of the Swiss National Science Foundation (SNSF)
* National Convention for Construction and Reform–Mageuzi, a political party in Tanzania
* National Council of Chain Restaurants, a division of the American National Retail Federation
* National Council of Churches Review, a journal of the National Council of Churches in India
* New Cape Central Railway, a former railway company in South Africa
* North Cork Community Radio, a former Irish pirate radio station
* Non-consensual condom removal | WIKI |
James Atkins (offensive tackle)
James Curtis Atkins (born January 28, 1970) is a former professional American football offensive lineman playing seven seasons for the Seattle Seahawks, the Baltimore Ravens, and the Detroit Lions. | WIKI |
시간 제한메모리 제한제출정답맞힌 사람정답 비율
1 초 128 MB3711721.875%
문제
Bytie-boy is one of the youngest habitats of Byteburg. Let the fact that he has only just learnt to read and write speak for his age. He is, however, old enough to go school by himself. Every morning he leaves home and comes by all his friends; the whole group goes to school together only when everyone is joined.
One day the teacher asked Bytie to prepare a list of the streets Bytie walks on his way to school, and to read it loud during the very next class. It soon turned out that the list is very long; so long in fact that it could take a vast amount of paper. Therefore it was decided that Bytie-boy would write down only the first letter from the name of every street he walks. The streets Byteburg are, with no exception, one-way, and each one connects two different crossings.
While reading the list of letters, Bytie makes a pause only at the spots at which he picked up a friend. Thus each part of his walk can be treated as a single word. Reading is still somewhat difficult for the boy: sometimes he reads from right to left instead of left-to-right. So he may read the word milk as milk, but also as klim. As Bytie's parents are aware of his problems, they decided to aid him by finding a route whose every fragment remains the same whether it is read left-to-right or right-to-left. For obvious reasons, the parents would also like to keep each fragment (word) as short as possible. They ask you for help.
Write a programme that
• reads the city's description from the standard input,
• determines a route from Bytie's house to the school such that each of its fragments is as short as possible and its description reads the same left-to-right and right-to-left,
• prints out the description (with fragments suitably separated) to the standard output.
입력
The first line of the standard input contains two integer, n and m, separated by a single space (2 ≤ n ≤ 400, 1 ≤ m ≤ 60,000). These denote, respectively, the number of crossings in Byteburg and the number of streets connecting them. The streets descriptions follow in the next m lines. Three numbers are given in the (i+1)-th line: xi, yi, ci (1 ≤ xi ≤ n, 1 ≤ yi ≤ n, xi≠yi); these denote, respectively, the start of the street, the end of the street, and the first letter of the street's name, and are separated by single spaces. The letters are lowercase, English. Any two crossings are connected by at most one street per direction (at most one in one direction and at most one in the opposite). The following line contains a single integer d (2 ≤ d ≤ 100) denoting the number of crossings that Bytie-boy passes through on his way to school. The next line contains d integers si (1 ≤ si ≤ n), also separated by single spaces. These mean that Bytie lives by the crossing no. si, the school is by the crossing no. sn, and along the way Bytie picks up successively his friends living by the crossings no. sn,s2,s3,…,sn-1. Every two successive numbers of crossings on the list are distinct, but some two numbers on the list can be the same. Moreover, if it is not possible to get from one crossing to another complying with restrictions set in the task, Bytie takes a short cut and writes nothing on his sheet.
출력
The output should consist of d-1 lines. There should be a number ri ans a sequence of characters wi in the i-th line, separated by a single space. The number ri denotes the minimum length of the route complying with the task's conditions that connects the crossings si and si+1, while wi is the sequence of first letters of the streets in this rout. If there is no route between some two crossings that satisfies aforementioned conditions, -1 should be output. It is possible there are several possible sequences wi. In that case print any.
예제 입력 1
6 7
1 2 a
1 3 x
1 4 b
2 6 l
3 5 y
4 5 z
6 5 a
3
1 5 3
예제 출력 1
3 ala
-1
힌트 | ESSENTIALAI-STEM |
Published online by Cambridge University Press: 08 July 2021
New York City had a significant role in Richard Wright’s search for political and artistic freedom. During the ten years he spent there, the emerging writer reached the pinnacle of his career amid the city’s magazines, newspapers, publishers, and cultural brokers. Wright utilized various professionalizing networks, including the CPUSA and WPA, and he published Uncle Tom’s Children and Native Son shortly after his arrival in 1937. Additionally, he radicalized the short-lived New Challenge, exposed Harlem’s poverty in the Daily Worker, and fictionalized his research on black domestic workers and juvenile delinquency in “Black Hope” and Rite of Passage, respectively. Wright’s years in New York were his career’s most productive, and this success was reflected in his personal life, which included settling into marriage and fatherhood as well as the 7 Middagh artistic community. Although New York fostered these interracial domestic relationships, its boroughs were not free from the Jim Crowism African Americans lived under elsewhere. The prejudices Wright encountered in Brooklyn and Manhattan, on top of those he had experienced in the South, influenced his decision to leave the U.S., as he believed the move to Paris would free him to write with new perspective on American race relations. | FINEWEB-EDU |
Jack Kroll (labor leader)
Jack Kroll (June 10, 1885 – May 26, 1971) was a 20th-century London-born American labor leader. He served as vice president (1928–1966) of the Amalgamated Clothing Workers of America (ACW) under Sidney Hillman, affiliated throughout with either the AFL or CIO or merged AFL–CIO. He also was head of the CIO-PAC (1946–1955), and was close to U.S. Presidents Franklin Delano Roosevelt and Harry S. Truman.
Background
Jack Kroll was born in London, United Kingdom, on June 10, 1885 and came with his family to the United States of America in 1886. He became an American citizen in 1892 and studied in public schools in Rochester, New York, from 1890 to 1900.
Career
In 1901, Kroll became a clothing cutter, first in Rochester, then in Chicago in 1901. By 1910, he had become a volunteer labor organizer. In 1920, he joined the Amalgamated Clothing Workers (ACW), founded in 1914 by Sidney Hillman. He worked in the New York City office.
By 1928, Kroll had become ACW vice president.
In 1946, he succeeded Hillman as chair of the CIO-PAC. When the CIO reunited with the AFL to form the AFL–CIO in 1955, Kroll became co‐director of AFL–CIO Committee on Political Education.
In addition to his national role, Kroll was an early member of the board of directors of a Democrat-Republican "City Charter Committee" in Cincinnati as well as president of the Ohio CIO council (1932–1952).
Personal and death
In 1920, Jack Kroll married Sara Sylvia Ruben, whom he had met the year before on a picket line.
He was a member of Histadrut (Zionist labor organization). He was also of Rockdale Temple in Cincinnati.
Kroll died age 85 in Cincinnati, Ohio, survived by his wife, son, and five grandchildren.
Legacy
Kroll was the "political arm" of Sidney Hillman. | WIKI |
Secondary structure conversions of Alzheimer's Aβ(1-40) peptide induced by membrane-mimicking detergents
Anna Wahlström, Loïc Hugonin, Alex Perálvarez-Marín, Jüri Jarvet, Astrid Gräslund*
*Corresponding author for this work
Research output: Contribution to journalArticleResearchpeer-review
86 Citations (Scopus)
Abstract
The amyloid β peptide (Aβ) with 39-42 residues is the major component of amyloid plaques found in brains of Alzheimer's disease patients, and soluble oligomeric peptide aggregates mediate toxic effects on neurons. The Aβ aggregation involves a conformational change of the peptide structure to β-sheet. In the present study, we report on the effect of detergents on the structure transitions of Aβ, to mimic the effects that biomembranes may have. In vitro, monomeric Aβ(1-40) in a dilute aqueous solution is weakly structured. By gradually adding small amounts of sodium dodecyl sulfate (SDS) or lithium dodecyl sulfate to a dilute aqueous solution, Aβ(1-40) is converted to β-sheet, as observed by CD at 3 °C and 20 °C. The transition is mainly a two-state process, as revealed by approximately isodichroic points in the titrations. Aβ(1-40) loses almost all NMR signals at dodecyl sulfate concentrations giving rise to the optimal β-sheet content (approximate detergent/peptide ratio = 20). Under these conditions, thioflavin T fluorescence measurements indicate a maximum of aggregated amyloid-like structures. The loss of NMR signals suggests that these are also involved in intermediate chemical exchange. Transverse relaxation optimized spectroscopy NMR spectra indicate that the C-terminal residues are more dynamic than the others. By further addition of SDS or lithium dodecyl sulfate reaching concentrations close to the critical micellar concentration, CD, NMR and FTIR spectra show that the peptide rearranges to form a micelle-bound structure with α-helical segments, similar to the secondary structures formed when a high concentration of detergent is added directly to the peptide solution.
Original languageAmerican English
Pages (from-to)5117-5128
Number of pages12
JournalFEBS Journal
Volume275
Issue number20
DOIs
Publication statusPublished - Oct 2008
Keywords
• Amyloid β peptide
• CD
• NMR
• Oligomer
• SDS
Fingerprint Dive into the research topics of 'Secondary structure conversions of Alzheimer's Aβ(1-40) peptide induced by membrane-mimicking detergents'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.
classification
Title: --install-data doesn't effect resources destination
Type: behavior Stage: resolved
Components: Distutils2 Versions: Python 3.3
process
Status: closed Resolution: out of date
Dependencies: Superseder:
Assigned To: tarek Nosy List: alexis, eric.araujo, tarek, trevor
Priority: normal Keywords:
Created on 2011-08-24 10:18 by trevor, last changed 2022-04-11 14:57 by admin. This issue is now closed.
Messages (2)
msg142878 - (view) Author: trevor (trevor) Date: 2011-08-24 10:18
attempting to point the relative destination with "--install-data" does not seem to have an effect. the specified directory is created, but resources are still installed relative to the present working directory.
setup.cfg:
[files]
resources =
externalfiles/tobemoved.txt = support
% pysetup3 run install_dist --install-data /tmp/example
/tmp/example is created with no files, ./support/tobemoved.txt is created
msg142889 - (view) Author: Éric Araujo (eric.araujo) * (Python committer) Date: 2011-08-24 17:29
This is one of the things that were left under-specified when the resources subsystem was introduced by adding working code instead of a PEP. I think that --install-data is obsolete now, and that there should be another way to override specific sysconfig variables or paths (which are used to install data files/resources) from the command line and config files, to replace --install-data.
History
Date User Action Args
2022-04-11 14:57:21adminsetgithub: 57039
2014-03-13 03:49:55eric.araujosetstatus: open -> closed
resolution: out of date
stage: resolved
2011-08-24 17:29:47eric.araujosetmessages: + msg142889
2011-08-24 10:18:09trevorcreate | ESSENTIALAI-STEM |
Talk:Xj
I made this redirect to Jaguar XJ instead of some random motorbike from Japan. <IP_ADDRESS> (talk) 17:06, 13 May 2009 (UTC) | WIKI |
Template talk:Did you know nominations/Martin Research
Hook modifications
GalliumBot (talk • contribs) (he/it) 03:25, 12 February 2023 (UTC)
* ... that for an additional $25, Martin Research shipped their 1975 book on microcomputers with an Intel 8008? [2023-02-12 at 02:02:01, by ]
* ... that for an additional US$25, Martin Research shipped their 1975 book on microcomputers with an Intel 8008? [2023-02-12 at 02:42:42, by ]
Hook modifications
GalliumBot (talk • contribs) (he/it) 11:25, 13 February 2023 (UTC)
* ... that for an additional US$25, Martin Research shipped their 1975 book on microcomputers with an Intel 8008? [2023-02-13 at 09:45:17, by ]
* ... that for an additional US$25, Martin Research shipped their 1975 book on microcomputers with an Intel 8008? [2023-02-13 at 11:09:37, by ] | WIKI |
Mark Zuckerberg's congressional testimony: Questions we'd ask
Mark Zuckerberg testifies before Congress starting Tuesday in a pair of hearings on Facebook's user privacy policies and handling of the Cambridge Analytics data leak. It's the first time before Congress for the founder and CEO and comes amid a firestorm of user concerns and government probes. The social media giant is facing questions after reports that research firm Cambridge Analytica improperly gained access to the personal information of as many as 87 million Facebook users. In a prepared testimony released on Monday, Zuckerberg said that Facebook made a "big mistake," adding: "I started Facebook, I run it, and I'm responsible for what happens here." At least some lawmakers have publicly agreed. Zuckerberg will appear at a joint hearing of the Senate Judiciary and Commerce committees Tuesday and at a hearing of the House Energy and Commerce Committee Wednesday. After reading his testimony, here are some of the tough questions we'd like answers to: Facebook has said it first learned about Cambridge Analytica's unauthorized access in 2015, more than two years before the leak was made public by a pair of reports by The Observer newspaper in the U.K. and The New York Times. The company claims it acted then to ensure the data had been deleted, but the news outlets alleged Cambridge Analytica still had the data as recently as last month. Despite banning the platform in 2015, Facebook didn't suspend Cambridge Analytica from its platform again until last month and it didn't act to notify users that their data had been improperly accessed until this week. So why didn't Facebook do more in the two years when it knew about the leak and we didn't? It's unclear whether Cambridge Analytica still has access to personal user information. Both Facebook and the research firm have said the data was deleted, but whistleblowers and news reports claim it still exists. That's a pretty significant discrepancy. If the data still exists, then it's likely Facebook doesn't know and its process for ensuring the data was deleted was ineffective. So, how exactly did Facebook ensure Cambridge Analytica had deleted the data, does it still believe its process was effective and will it continue to use that process going forward as it begins to audit every third party app on its platform? Facebook outlined a number of steps it would take immediately following the reports of data mishandling, including an audit of all third party apps to understand what data they were collecting and how it was being used. The company just this weekend suspended a second data analytics firm after CNBC discovered it had been engaging in deceptive data practices. So, does Facebook feel confident it has the resources and capacity to audit every third party app, and will it be able to continue doing so for new apps that request access to user information? CNBC's report over the weekend of a second firm, CubeYou, using tactics similar to Cambridge Analytica, suggests that there may be more firms that have resold data or used it in ways that haven't been disclosed to consumers. While advertising is an obvious use for Facebook's user data, it's not the only industry that could benefit from some type of data collaboration. For example, CNBC has also reported that Facebook had explored a project that asked several major U.S. hospitals to share anonymized data about their patients, such as illnesses and prescription info. Facebook said that project never progressed "past the planning phase," but it raises the question of what other uses Facebook has thought up for user information. So, how many firms are accessing data without user knowledge and has Facebook considered other data projects that haven't been publicly reported? The Cambridge Analytica leak, for many Facebook users, was a stark realization about just how much information the company collects — and keeps — on its users. (If you haven't yet downloaded your Facebook archive, you can follow CNBC's steps here. And if you're less than comfortable with what you find, you can delete your data by following the steps here.) COO Sheryl Sandberg has said a version of Facebook that doesn't require so much data would have to be a paid product — something users have begun to ask for but the company hasn't historically been eager to offer. When Facebook formed more than a decade ago, it would have been difficult to predict that it would become the shepherd over the data of 2 billion people. The company has since shown, on multiple occasions, that its actions have unintended consequences. So, should any one entity, let alone one that uses data for profit, be trusted with such a large responsibility? If Facebook can't protect our data, does it still deserve to have it? | NEWS-MULTISOURCE |
Talk:Private (novel series)/to do
* Edit grammar error ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Un-space dashes ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Include lowercase wording throughout headers (except for proper nouns) ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Include standard publisher/author/date information where applicable ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Increase citations in "Series overview" and "Characters" sections ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Condense "Book releases" section into one for now ✅ --James26 (talk) 15:52, 10 April 2008 (UTC)
* Remove flowery/in-universe prose ✅ --James26 (talk) 08:26, 14 April 2008 (UTC)
* Expand the Character Section with more Info on each. | WIKI |
Comparative studies of gene expression and the evolution of gene regulation
Irene Gallego Romero, Ilya Ruvinsky, Yoav Gilad*
*Corresponding author for this work
Research output: Contribution to journalReview articlepeer-review
281 Scopus citations
Abstract
The hypothesis that differences in gene regulation have an important role in speciation and adaptation is more than 40 years old. With the advent of new sequencing technologies, we are able to characterize and study gene expression levels and associated regulatory mechanisms in a large number of individuals and species at an unprecedented resolution and scale. We have thus gained new insights into the evolutionary pressures that shape gene expression levels and have developed an appreciation for the relative importance of evolutionary changes in different regulatory genetic and epigenetic mechanisms. The current challenge is to link gene regulatory changes to adaptive evolution of complex phenotypes. Here we mainly focus on comparative studies in primates and how they are complemented by studies in model organisms.
Original languageEnglish (US)
Pages (from-to)505-516
Number of pages12
JournalNature Reviews Genetics
Volume13
Issue number7
DOIs
StatePublished - Jul 2012
ASJC Scopus subject areas
• Molecular Biology
• Genetics
• Genetics(clinical)
Fingerprint
Dive into the research topics of 'Comparative studies of gene expression and the evolution of gene regulation'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Virgilio Rodríguez Macal
Virgilio Rodríguez Macal (June 28, 1916 – February 13, 1964) was a Guatemalan writer, journalist, and diplomat who won various international and national prizes. As a novelist he is noted for integrating his deep knowledge of Mesoamerican and Guatemalan history and geography into his stories, often setting his novels in colorful Guatemalan jungle settings including its biologically rich flora and fauna.
Biography
Macal was born on June 28, 1916, in Guatemala City. He is considered one of the most popular novelists in Central American literature. Many of his works are based in the departments of Alta Verapaz and Baja Verapaz and are noted for displaying his factual knowledge of the fauna and traditions and the richness of his characters and locations.
His most acclaimed work is his novel La mansión del pájaro serpiente which has been translated into several languages. His personality, like that of men born in the early decades of the twentieth century, was influenced by the long dictatorship of Jorge Ubico, the revolution of 1944 and by the so-called liberation movements which occurred in 1954. Macal also served some time as a diplomat, and was a consul in Barcelona, Spain. Later Rodriguez Macal, settled in Santiago, Chile for many years, and was a frequent collaborator of the great newspaper El Mercurio. Later, residing in Guatemala, he was the director of Diario de Centroamérica.
Guayacán
This book contains some similarities with the author's life as the main character Valentine Ochaeta returns after several years studying abroad, his hometown, with a suitcase full of hopes and dreams that are contrary to the reality of their families who are in misery. This forces the subject of the novel to become more adventurous in the jungles of Peten as he seeks fortune out of the plight of his family. Through this journey he explores the roots of Guatemala history and their ancestors as he matures and becomes a man.
The novel addresses the issues facing the hopes and dreams experienced by the young juveniles juxtaposed against the stark reality that confronts them as an adult. The novel won the Central sciences, Literature and Fine Arts Award on September 15, 1953.
El mundo del misterio verde
This book contains the stories collected from the lips of the Q'eqchi' Indian Lish Zenzeyul. The fauna and flora from the jungles of Peten and Verapaz are portrayed in this picturesque novel entering a "world of green mystery" as it means, with snakes and monkeys contrasted against the white man's world, the men of cities. In his words, the forest is more open and more logical than civilisation.
La mansión del pájaro serpiente
Meaning "the mansion of the snake bird" the author makes beneficial use of the oral histories of Mayan mythology and the experiences of the novel's subject, the tireless adventurer. Beautiful stories where animals humanize themselves from the jungles of the Central American tropics are told in a colorful story surrounded by the lush greenery of the tropical forest.
Carazamba
The novel is a narrative work set in 1940s Guatemala. The novel takes the reader to different latitudes of the country, from the port city of Livingston, Izabal, to the jungle region of Peten. This novel tells of the misfortunes of the narrator and his steward Pedro. This book, apart from having much action and romance, is told in an emotional style with an element of "disguised" political criticism towards the military government during this period in the country of Guatemala.
Works
* La mansión del pájaro serpiente°
* El mundo del misterio
* Carazamba
* Jinaya
* Guayacán
* Negrura
* Sangre y clorofila | WIKI |
Talk:Sahn
August 2007
Mardavich, can you please state what your problem was? This is the second time you remove the changes made; the first time I thought you were upset for removing the picture (which is duplicate by the way) so I kept one copy of it.
You also removed the category, the link to courtyard and the stubs; I added them because the sahn is used extensively in Arab Architecture so the categoery is relevent, the suhn is actually a courtyard so the link is relevent and I believe the article is more than a stub; I also believe the photos are relevent because they show more than one sahn in different types of buildings and different uses besides, they are nice photos.
Can you please explain your objection so that we can come to a compromise? --Maha Odeh 07:20, 8 August 2007 (UTC) | WIKI |
Machine Vision Applications and Examples
The Terminator movie franchise brought the concept of machine vision to the big screen like no other film before it, showing how machines might view the world. Although the movies were from the viewpoints of autonomous military robots, the machine antagonists – and protagonists, depending on the film – also imagined aspects of machine vision that today’s artificial intelligence (AI) can now achieve.
Machine VisionOutside the movie world, custom automation has caught machine vision up to and in some cases even surpassed the artificial eyesight envisioned in films. Today, machine vision is used for a wide array of different processes in manufacturing. Automation that mimics human eyesight can distinguish whether parts are absent or present in a manufactured product, read bar codes, verify colors, detect defects, verify that a part meets specifications, sort product and more. While the reality of machine eyesight may be more mundane, its usefulness in manufacturing automation is only beginning to be realized.
Real World Automation: Engineering Machines That See
As the brain processes all the things that human eyes see, a machine’s sight begins with a computer. Using video cameras as eyes, the computer converts the resulting visual data via analog to digital conversion (ADC) or digital signal processing (DSP). Just like organic eyes, machine vision can have varying sensitivity and resolution, allowing sight in dim light or to differentiate between objects. These two aspects of vision are symbiotic, with increasing sensitivity reducing resolution while decreasing sensitivity improves it.
There are many benefits to machine vision technology that make it superior to human sight. While human eyes see electromagnetic wavelengths from 390-770 nanometers, some video cameras can see a much wider range, with some having capabilities to see wavelengths in infrared, ultraviolet and even X-ray. Even binocular vision has been achieved in machines, which simply requires a greater amount of random-access memory (RAM), a more advanced processer, high-resolution cameras and an AI programmed to give it depth perception.
GIGI & Custom Automation for Sight
Most machine vision used for practical purposes outside of movies happens in factories. Manufacturing automation applications for machine vision require certain skills. One primary ability is simple pattern recognition, which allows a machine to rapidly and accurately find a component along a production line. These actions must also be repeatable. Machine vision can be categorized into four elements, represented by the acronym GIGI.
Guidance
Guidance involves locating a part, identifying its orientation, comparing tolerances and angling it correctly. Machine vision allows a robot to be more accurate and quicker than a human worker.
This enables robots to:
• Find and align components for assembly.
• Geometric pattern matching to pick up variations in lighting, contrast, scale, position and other patterns.
• Locating key features on components to enable precise positioning by aligning other machine vision tools.
• Package parts from conveyor belts.
• Pick components from or put them onto pallets.
• Put parts onto shelves.
• Remove components from bins.
These guidance techniques allow more versatile manufacturing automation, allowing companies to produce multiple products on the same production line and reducing the hardware required for inspection.
Identification
Machine vision can identify and recognize items in much the same way as scanners in stores read barcodes and other patterns based on shape, size or color. Using automation, manufacturing techniques can use machine vision to help prevent errors, monitor and adjust production, resolve production problems like bottlenecks and enable effective strategies to isolate issues regarding assembly.
This ability to trace products allows better:
• Asset tracking.
• Technical support.
• Tracking of warranty repair service.
• Verification of component authenticity.
Unlike conventional barcodes used in retail, production lines require codes that store a greater amount of information, such as unique serial numbers, lot numbers, product numbers and manufacturer.
Gauging
In order for a robot to act upon an object along an assembly line, it must be able to calculate distances and gauge the location of an object in space. When it comes to this sort of automation, engineering vision systems to see when measurements are incorrect allows a robot to ensure parts meet specifications.
Inspection
A key element that machine vision can fulfill lies in quality assurance of components during manufacturing. Automation helps identify irregularity and defects in parts that affect its function, along with other flaws that may occur during fabrication. Machine vision can inspect to:
• Automatically identify and classify potential defects based on geometry, contrast and texture through the use of statistical analysis.
• Calculate the number of items in a product, such as the number of cans in a case, pills in a bottle or pieces in a kit.
• Detect when machining operations do not meet specifications.
• Determine positioning of objects for labeling.
• Distinguish when products are contaminated.
• Ensure products are correctly packaged, with safety caps, seals and rings on containers are securely placed.
• Identify products with flaws, including bent needles, incomplete soldering or surface scratching.
• Measure infinitesimally small lengths, such as gaps on spark plugs.
• Note when features of specific products are incomplete.
• Sorting products once they have been identified, located and obtained.
• Verify quality standards for products.
To support machine vision systems, software applications utilize machine vision to conduct many different types of inspections, including libraries containing images of parts to show how they should appear.
Other Applications of Machine Vision
Machine Vision CameraWhen it comes to manufacturing automation, engineering machine vision to perform effectively during production allows robots and automated machinery to perform a wide array of tasks. Yet custom automation also allows an AI to perform a number of other tasks beyond the factory floor.
Applications for machine vision also include:
• Allows vehicles to operate without drivers by identifying objects and interpreting situations in order to make decisions by utilizing algorithms that detect and classify objects.
• By applying machine learning algorithms to medical images, doctors can detect, classify and partition images in order to perform tasks like identifying tumors, monitoring patient health and fitness, diagnosing diseases and more.
• Distinguishing characters through patterns of lightness and darkness in order to identify letters and numbers by font so as to make scanned documents editable.
• Recognizing faces has pushed the envelope of vision automation, engineering software that uses the geometric relationship of specific features and their patterns to identify people visually.
• Verifying signatures and handwriting by tracking not only the appearance of the handwriting upon an image plane and comparing it to other examples, but also examining how the signature or handwriting is generated.
An array of different uses likely will continue to improve current visual automation. Engineering machine vision to ensure currency authenticity is already being used by the US Bureau of Engraving and Printing. They currently use machine vision to inspect security features like watermarks and fluorescent threads when producing new $20, $50 and $100 bills. | ESSENTIALAI-STEM |
Statue of J. Marion Sims
J. Marion Sims is a bronze sculpture depicting the American physician of the same name by Ferdinand Freiherr von Miller.
Description
The sculpture consists of a nearly 9-foot-tall image of a standing Sims upon a plinth resting on a pedestal, and supporting piers on either side with roundels containing descriptions. The figure of Sims is cast in bronze, and the other elements of the sculpture are granite from North Jay, Maine.
History
The statue was cast in Munich, Germany, in 1892 and was dedicated on October 20, 1894. Originally erected in Bryant Park in 1894, it was taken down in the 1920s amid subway construction, and moved to the northeastern corner of Central Park, at 103rd Street, in 1934, opposite the New York Academy of Medicine.
This statue became a cause of controversy in 2017 due to Sims' experimental operations on enslaved black women. In August of that year, the statue was vandalized, with someone writing the word "racist" on it in spray paint. Activists' push to remove the statue intensified following the publication of the book Medical Apartheid. In April 2018, the New York City Public Design Commission voted unanimously to have the statue removed from Central Park and installed in Green-Wood Cemetery, near where Sims is buried. The following day, the statue was moved to Green-Wood, where it was temporarily placed in storage. The pedestal or supporting piers remain at Central Park. The cemetery plans to place the statue near Sims' gravesite once a historical display on Sims' life is created. | WIKI |
Pimelea urvilleana
Pimelea urvilleana is a ground spreading shrub in the Thymelaeaceae family. There are two intraspecifics: Pimelea urvilleana subsp. nesica, and Pimelea urvilleana subsp. urvilleana.
Description
Pimelea urvilleana subsp. urvilleana is a small prostrate shrub, with stout, flexible stems up to 30 cm long. The branchlets are covered with dense matted white hair. The older stems are grey brown and slightly hairy. The decussate leaves are usually distichous. and flat or slightly keeled. There are many stomata on the adaxial surface, but few to none on the abaxial surface. The tips are obtuse. The inflorescences have 5-7 white flowers, which are hairy on the outside. This subspecies has only been found in the Auckland region and is relatively rare.
Pimelea urvilleana subsp. nesica differs in having paler and larger green leaves which are not keeled and less hairy branchlets, than subspecies urvilleana. Pimelea urvilleana subsp. nesica is found in the islands east of Auckland and Coromandel.
Distribution
Pimelea urvilleana is found in New Zealand, on the North Island and thought to be extinct on the South Island.
Taxonomy
It was first described in 1832 by Achille Richard, but was redescribed in 2009 by Colin James Burrows when the two subspecies were differentiated and P. urvilleana subsp. nesica was erected.
Conservation status
In both 2004 and 2008, the subspecies urvilleana was assessed as "Not Threatened", and in 2012 was declared "Data Defiicient" but the 2018 assessment declared it "Not Threatened". The subspecies nesica was declared "Not Threatened" in 2009 and 2012, but in 2018 was declared "Data Deficient" under the New Zealand Threat Classification System. | WIKI |
The Lunatics of Terra
The Lunatics of Terra is a collection of science fiction short stories by John Sladek, published in 1984.
Contents
* "The Last of the Whaleburgers"
* "Great Mysteries Explained"
* "Red Noise"
* "Guesting"
* "Absent Friends"
* "After Flaubert"
* "The Brass Monkey"
* "White Hat"
* "The Island of Dr Circe"
* "Answers"
* "Breakfast with the Murgatroyds"
* "The Next Dwarf"
* "An Explanation for the Disappearance of the Moon"
* "How To Make Major Scientific Discoveries at Home in Your Spare Time"
* "The Kindly Ones"
* "Fables"
* "Ursa Minor"
* "Calling All Gumdrops!"
Reception
Dave Langford reviewed The Lunatics of Terra for White Dwarf #57, and stated that "He's especially good on pseudoscience, getting right inside that viewpoint in the tragicomic 'An Explanation for the Disappearance of the Moon'. Topnotch stuff."
Reviews
* Review by Chris Morgan (1984) in Fantasy Review, September 1984
* Review by Edward James (1984) in Vector 122
* Review by Andrew M. Butler (2006) in Vector 247 | WIKI |
Analyzing Azure Table Storage data with HDInsight
HDInsight was optimized from the start to be able to quickly analyze data on Azure's blob storage service using Hadoop by using the WASB file system to expose the data there as a native Hadoop file system. But the spirit of Hadoop has always been to be able to analyze data wherever it is, so in this post I'll show you how to analyze data residing the more structured Azure table storage service. This would enable you to analyze tables that have millions/billions of rows in them using Hadoop/Hive to distribute that analysis to many compute nodes in Azure.
Prerequisites
To follow along in this post, you'll need to:
1. Have a valid Azure subscription.
2. Install Azure PowerShell and connect to your subscription - follow this article for details on how to do that.
3. Have a storage account in your subscription that's selected as the default in your PowerShell session.
4. Have git and Maven installed and in your PATH in your PowerShell session.
Creating a table to analyze
You can skip this step if you already have a table you want to analyze (and hey if you're reading this chances are good that this is the case). But just to get a quick-and-dirty example going, here's is a simple PowerShell script to create an example table for us to analyze:
function InsertRow($table, [String]$partitionKey, [String]$rowKey, [int]$intValue)
{
$entity = New-Object "Microsoft.WindowsAzure.Storage.Table.DynamicTableEntity" $partitionKey, $rowKey
$entity.Properties.Add("IntValue", $intValue)
$insertResult = $table.CloudTable.Execute(`
[Microsoft.WindowsAzure.Storage.Table.TableOperation]::Insert($entity))
}
$exampleTable = New-AzureStorageTable tobehadooped
for ($p = 1; $p -le 10; $p++)
{
for ($r = 1; $r -le 100; $r++)
{
InsertRow $exampleTable "P$p" "R$r" $r
}
}
Setting up the cluster
Now that we have data we want to analyze, let's setup an HDInsight cluster to analyze it. In this tutorial I'll be using the extensions in my github project azure-tables-hadoop to be able to access Azure tables from Hive, so we'll need to get it and package it:
Update (6/27/2014): Since writing this post HDInsight and Hive have advanced forward in a not very backwards-compatible way. I've updated my git project so now it works with HDInsight 3.1 (version 0.0.3 of my jar). If you want the HDInsight 2.1-compatible version please git checkout hdp1compat before the mvn package step below. And if you want the HDInsight 3.0-compatible version please git checkout Hive12 instead.
git clone https://github.com/mooso/azure-tables-hadoop.git
cd .\azure-tables-hadoop
mvn package
After that, we need to create a cluster with this JAR accessible to Hive. To do that, we'll use the AdditionalLibraries option when creating the cluster that's documented here. So we'll need to create a container to put this JAR in, put it there, then create the cluster that points to it:
# Please customize the lines below to choose your own user name, password and cluster name
$creds = New-Object System.Management.Automation.PSCredential 'myUser',`
('Please ch00se a different password :)' | ConvertTo-SecureString -force -asplaintext)
$clusterName = "mycluster"
$hiveLibsContainer = New-AzureStorageContainer hiveontableslib
$azureJar = ".\target\microsoft-hadoop-azure-0.0.1.jar"
$azureJarBlob = Set-AzureStorageBlobContent -Container $hiveLibsContainer.Name `
-Blob $(Split-Path $azureJar -Leaf) -File $azureJar -Force
$hiveConf = New-Object $('Microsoft.WindowsAzure.Management.' + `
'HDInsight.Cmdlet.DataObjects.AzureHDInsightHiveConfiguration')
$hiveConf.AdditionalLibraries = New-Object $('Microsoft.WindowsAzure' + `
'.Management.HDInsight.Cmdlet.DataObjects.AzureHDInsightDefaultStorageAccount')
$storageAccount = $(Get-AzureSubscription -Current).CurrentStorageAccountName
$hiveConf.AdditionalLibraries.StorageAccountName ="$storageAccount.blob.core.windows.net"
$hiveConf.AdditionalLibraries.StorageAccountKey = (Get-AzureStorageKey $storageAccount).Primary
$hiveConf.AdditionalLibraries.StorageContainerName = $hiveLibsContainer.Name
$clusterContainer = New-AzureStorageContainer $clusterName
$clusterConf = New-AzureHDInsightClusterConfig -ClusterSizeInNodes 1 |
Set-AzureHDInsightDefaultStorage -StorageAccountName $storageAccount `
-StorageAccountKey $(Get-AzureStorageKey $storageAccount).Primary -StorageContainerName $clusterContainer.Name
$clusterConf = $clusterConf | Add-AzureHDInsightConfigValues -Hive $hiveConf
$cluster = $clusterConf | New-AzureHDInsightCluster -Credential $creds `
-Name $clusterName -Location $(Get-AzureStorageAccount $storageAccount).Location
If all goes well, this should take around 10 minutes then you'll have a newly minted single-node HDInsight cluster to play with.
Exploring the data using Hive
The easiest way to explore this data is to use Hive with its SQL-like query language (you can also use Map-Reduce directly or use Pig or other Hadoop ecosystem components, but I'll ignore those for this post). The main trick we use to expose Azure tables to Hive is to have a custom Storage Handler for it, so we need to use the STORED BY clause to specify that the table data resides in an Azure table. Then we use the TBLPROPERTIES clause to specify the information about the table.
$hiveQuery = "CREATE EXTERNAL TABLE ExampleTable(IntValue int)
STORED BY 'com.microsoft.hadoop.azure.hive.AzureTableHiveStorageHandler'
TBLPROPERTIES(
""azure.table.name""=""$($exampleTable.Name)"",
""azure.table.account.uri""=""http://$storageAccount.table.core.windows.net"",
""azure.table.storage.key""=""$((Get-AzureStorageKey $storageAccount).Primary)"");"
Out-File -FilePath .\HiveCreateTable.q -InputObject $hiveQuery -Encoding ascii
$hiveQueryBlob = Set-AzureStorageBlobContent -File .\HiveCreateTable.q -Blob "queries/HiveCreateTable.q" `
-Container $clusterContainer.Name -Force
$createTableJobDefinition = New-AzureHDInsightHiveJobDefinition -QueryFile /queries/HiveCreateTable.q
$job = Start-AzureHDInsightJob -JobDefinition $createTableJobDefinition -Cluster $cluster.Name
Wait-AzureHDInsightJob -Job $job
This should create the Hive table for us, so now we can finally explore it! For example, to get the average of the IntValue column:
$avgJobDefinition = New-AzureHDInsightHiveJobDefinition -Query "SELECT AVG(IntValue) FROM ExampleTable"
$job = Start-AzureHDInsightJob -JobDefinition $avgJobDefinition -Cluster $cluster.Name
Wait-AzureHDInsightJob -Job $job
Get-AzureHDInsightJobOutput -JobId $job.JobId -Cluster $cluster.Name
Behind the scenes
Let me air out the dirty laundry and explain how this all works. The main way I expose Azure tables data to Hadoop is by having an InputFormat defined for it. An InputFormat for Hadoop has two main responsibilities:
1. Figure out how to split the input into chunks that can be processed separately by individual mappers (thus getting the distributed processing power of Hadoop).
2. For each split, figure out how to read the data.
The second responsibility for our purposes is just grunt work: we just use the excellent Azure Storage SDK to read the data and pass it on as WritableEntity objects (in Hive, the StorageHandler understands those and maps them to columns). The first one though is a bit trickier: there is no universally good way to partition data to get the most out of our cluster. Ideally, if you have a 100 nodes (each with 4 mapper slots) processing your data, you want at least 400 splits among your mappers. Also, you want each mapper's data to fit in memory, so you don't want too many rows per mapper (also because if a mapper runs for an hour then fails it'll have to redo that all over again). But you don't want each mapper to have too little to do either: then your job run time will be dominated by overhead from starting/stopping all these mappers. So in short: it's an art to tune this partitioning step, and I certainly don't have it right by default for most real-world situations. By default: I query for all the partition keys in the table (one-by-one, so it's a slow process if there are many keys), then split the table by assigning each mapper to one of those values. If you want to customize the partitioning for your data, you can do that by using the configuration knob 'azure.table.partitioner.class' to specify a custom partitioner that you can provide.
Hope that helps! Please leave comments here and/or create issues/pull requests on the project in github if you have any suggestions/feedback. | ESSENTIALAI-STEM |
fül
Etymology
From. Compare 🇨🇬, 🇨🇬, 🇨🇬, 🇨🇬, 🇨🇬.
Noun
* 1) ear organ of hearing in humans and animals
* 2) ear acuteness of hearing or skill in music
* 3) handle in a semicircle shape, such as that of a bag, pot, mug, etc.
* 4) flap anything broad and flexible that hangs loose
* 5) tab navigational widget for switching between documents or panels
* 1) flap anything broad and flexible that hangs loose
* 2) tab navigational widget for switching between documents or panels
* 1) tab navigational widget for switching between documents or panels
* 1) tab navigational widget for switching between documents or panels
Adjective
* 1) lazy, shiftless, indolent, slothful
* 2) foul, putrid, rotten | WIKI |
Clodoveo Ferri
Clodoveo Ferri (born 22 March 1947) is an Italian researcher of clinical rheumatology, immunology and internal medicine. Since January 2003, Clodoveo Ferri has been a professor of rheumatology, Chief of the Chair of Rheumatology and director of the Postgraduate School of Rheumatology at the University of Modena and Reggio Emilia in Modena, Italy. A native of Cropani, a small town in Calabria, Italy, Clodoveo Ferri graduated cum laude from the University of Pisa and later specialized in internal medicine and rheumatology.
Since 1972, the majority of Ferri's work has been in the fields of systemic sclerosis, cryoglobulinemic vasculitis and other autoimmune systemic disorders in the Rheumatology Unit of the University of Pisa. In January 2003, he moved to his current position at the University of Modena and Reggio Emilia.
His most notable discovery is on the causative role of the hepatitis C virus (HCV) in the majority of patients with mixed cryoglobulinemia (cryoglobulinemic vasculitis) and in a significant percentage of patients with B-cell non-Hodgkin's lymphoma.
Ferri is a member of the SIR (Italian Society of Rheumatology) and GISC (Italian Group for the Study of Cryoglobulinemias), and an international fellow of the American College of Rheumatology.
Scientific activity
Ferri has been involved in the clinical and laboratory investigations of different autoimmune and neoplastic diseases. In particular, he investigated the pathogenetic role of some viruses in mixed cryoglobulinemia (cryoglobulinemic vasculitis) and systemic sclerosis (scleroderma). In 1991, soon after the discovery of the hepatitis C virus (HCV), he demonstrated the presence of serum viral genome (HCV-RNA) in a large series of mixed cryoglobulinemia patients. This finding suggested a causative role for the same virus in other extrahepatic manifestations of HCV infections, including autoimmune and lymphoproliferative disorders. The association of HCV with B-cell non-Hodgkin’s lymphoma was first demonstrated in 1994. On the basis of these studies, which were confirmed and expanded by other authors worldwide, Clodoveo Ferri suggested the term "HCV syndrome." This term refers to particular autoimmune-neoplastic complexes triggered by HCV infections in predisposed individuals.
Starting in 1999, Ferri investigated the pathogenetic role of parvovirus B19 and cytomegalovirus (CMV) in systemic sclerosis (scleroderma). A significantly higher prevalence of parvovirus B19 infections was originally demonstrated in both bone marrow and skin scleroderma patients compared to controls.
Since the 1970s, Ferri has published over 300 scientific papers in international journals that are available via PubMed on the following topics:
1. Etiopathogenetic role of different viruses in autoimmune and neoplastic diseases:
* 1990-91: identification of HCV as main triggering factor of mixed cryoglobulinemia (cryoglobulinemic vasculitis).
* 1994: identification of HCV as triggering factor of a significant percentage of patients with B-cell non-Hodgkin’s lymphoma.
* 1993: possible role of HCV in patients with porphyria cutanea tarda, autoimmune hepatitis, autoimmune thyroiditis, and type 2 diabetes.
* 1999: possible role of HCV in papillary thyroid cancer.
* 1999: possible role of parvovirus B19 and CMV in systemic sclerosis (scleroderma).
2. Serological studies and therapeutic trials on different rheumatic disorders (rheumatoid arthritis, SLE, systemic sclerosis, mixed cryoglobulinemia)
3. Etiopathogenesis, clinical features, survival, and treatment of mixed cryoglobulinemia (cryoglobulinemic vasculitis) patients
4. Etiopathogenesis and clinical follow-up of Raynaud’s phenomenon and systemic sclerosis including classification, visceral involvement (heart, lung), survival, and treatment
5. Role of plasmapheretic and dietetic treatments in some rheumatic disorders (cryoglobulinemic vasculitis, SLE, scleroderma, IgA nephropathy) | WIKI |
Author:Edmund Spenser Bouchier
Works
* Monastic Remains Near Oxford (1905)
* Life and letters in Roman Africa (1913)
* Spain under the Roman Empire (1914)
* Syria as a Roman Province (1916)
* Sardinia in Ancient Times (1917)
* A Short History of Antioch (1921)
Edited
* The Roman System of Provincial Administration to the Accession of Constantine the Great, 3rd edition, by William Thomas Arnold (1914)
Translation
* Posterior Analytics by Aristotle (1901) | WIKI |
Lăpușna County (Romania)
Lăpușna County was a county (județ) in the Kingdom of Romania between 1925 and 1938 and between 1941 and 1944.
Geography
The county was located in the eastern part of Greater Romania, in the center of the historical region of Bessarabia. Currently, the territory of the county is entirely part of the Republic of Moldova. The county was bordered by the Soviet Union to the east, the counties of Orhei to the north, Bălți to the north-west, Iași and Fălciu to the west, Cahul to the south-west and Tighina to the south.
Administration
The county consisted of five districts (plăși):
* 1) Plasa Călărași, headquartered at Călărași
* 2) Plasa Chișinău, headquartered at Chișinău
* 3) Plasa Hâncești, headquartered at Hâncești
* 4) Plasa Nisporeni, headquartered at Nisporeni
* 5) Plasa Vorniceni, headquartered at Vorniceni
The county contained two urban localities: Chişinău (the county seat, with the status of the municipality, the second largest city of Greater Romania after Bucharest) and Călărași-Târg (with the status of urban commune or town).
History
After the Union of Bessarabia with Romania in 1918, the county belonged to Romania, which set up the county formally in 1925.
After the 1938 Administrative and Constitutional Reform, this county merged with the counties of Tighina, Cetatea Albă and Orhei to form Ținutul Nistru.
The area county of the county was occupied by the Soviet Union in 1940 and became part of the Moldavian SSR. The area returned to Romanian administration as the Bessarabia Governorate following the Axis invasion of the Soviet Union in July 1941. A military administration was established and the region's Jewish population was either executed on the spot or deported to Transnistria, where further numbers were killed. As the Soviet Union's offensive pushed the Axis powers back, the area again was under Soviet control. On September 12, 1944, Romania signed the Moscow Armistice with the Allies. The Armistice, as well as the subsequent peace treaty of 1947, confirmed the Soviet-Romanian border as it was on January 1, 1941. The area of the county, along with the rest of the Moldavian SSR, became part of the independent country of Moldova.
Population
According to the census data of 1930, the county's population was 419,621, of which 77.8% were ethnic Romanians, 11.9% Jews, 7.1% Russians, as well as other minorities. From the religious point of view 86.1% of the population was Eastern Orthodox, 12.1% Jewish, as well as other minorities.
Urban population
In the year 1930, the county's urban population was 119,672, of which 41.2% were ethnic Romanians, 37.3% Jews, 16.6% Russians, 1.2% Poles, as well as other minorities. From a religious point of view, the urban population consisted of 58.4% Eastern Orthodox, 37.7% Jewish, 1.5% Roman Catholic, as well as other minorities. | WIKI |
-- Banking Industry Will Contract, Lazard’s Parr Says: Tom Keene
The global banking industry will
contract during the next few years as firms sell businesses,
Lazard Ltd. (LAZ) Vice Chairman Gary Parr said. “There will be less companies competing in the global
wholesale business, but it won’t be by mergers,” Parr said
today in an interview on Bloomberg Television’s “Surveillance
Midday” with Tom Keene from Davos, Switzerland, where he’s
attending the World Economic Forum’s annual meeting. “It will
be by a number of firms just departing the business. They’ll be
shutting down, they may exit some lines or sell them.” U.S. and European banks are selling businesses and cutting
back amid capital requirements , regulation and investor concern
of a global recession. Financial firms globally announced more
than 200,000 job losses in 2011, up from about 58,000 in 2010,
according to data compiled by Bloomberg. Parr said the world’s
largest banks won’t get bigger than they are now. “When you look at the capital charge and the regulatory
things that get layered on when you get to a certain size, it is
better to be smaller,” Parr said. Parr, 54, has been a director of Hamilton, Bermuda-based
Lazard, the world’s largest independent merger adviser, since
2010 and joined the firm in 2003. His strategic advice has
focused on financial institutions, and he has guided the sale of
Lehman Brothers Holdings Inc.’s North American investment-
banking business to Barclays Plc and Bear Stearns Cos.’s sale to
JPMorgan Chase & Co. “The world needs global providers of capital, truly global
providers, but it doesn’t need as many as it used to have,”
Parr said. “So in the next few years, I think it will continue
to concentrate, not consolidate by mergers, but basically
concentrate to five to eight institutions that will be global.” To contact the reporter on this story:
Laura Marcinek in New York at
lmarcinek3@bloomberg.net . To contact the editor responsible for this story:
David Scheer at dscheer@bloomberg.net . | NEWS-MULTISOURCE |
NCBI Bookshelf. A service of the National Library of Medicine, National Institutes of Health.
StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2021 Jan-.
Cover of StatPearls
StatPearls [Internet].
Show details
Nitrogen Narcosis In Diving
; ; ; .
Author Information
Last Update: August 22, 2020.
Continuing Education Activity
Nitrogen narcosis, also known as depth intoxication or rapture of the deep, is a change in consciousness and neuromuscular function caused by breathing compressed inert gas. Classically, this condition occurs in scuba divers that breathe compressed nitrogen, however, it can also occur when other inert gases, such as neon, argon, krypton, and xenon are inhaled. This activity reviews the presentation, evaluation, and management of nitrogen narcosis and stresses the role of an interprofessional team approach to the care of affected patients.
Objectives:
• Identify the gases associated with nitrogen narcosis.
• Describe the history and physical exam findings typically seen in patients with nitrogen narcosis.
• Identify the treatment options for nitrogen narcosis.
• Explain modalities to improve care coordination among interprofessional team members in order to improve outcomes for patients affected by nitrogen narcosis.
Earn continuing education credits (CME/CE) on this topic.
Introduction
Nitrogen narcosis is a change in consciousness, neuromuscular function, and behavior brought on by breathing compressed inert gasses. It has also been called depth intoxication, “narks,” and rapture of the deep. Traditionally the gas involved in narcosis is nitrogen, and it is associated with dysfunction when breathed by scuba divers from their tanks containing compressed air. Other inert gasses associated with narcosis include neon, argon, krypton, and xenon, with the latter having an anesthetic effect even at sea level. Interestingly, helium does not cause inert gas narcosis and therefore, is used in deep diving as heliox (helium and oxygen mixture).[1][2][3]
Etiology
In underwater diving, narcosis (nitrogen narcosis, inert gas narcosis, raptures of the deep, Martini effect) is a reversible change in consciousness that occurs while a person is diving at deep depths. Certain gases at high-pressure cause an anesthetic effect that alters a diver's consciousness.
Epidemiology
Due to variability in reporting of information, publication of diving-related injury statistics is inconsistent. The Divers' Alert Network (DAN) acts as a medical information and referral service for diving-related injuries. According to DAN, fewer than 1% of divers experience decompression sickness (DCS).
Pathophysiology
Breathing compressed air while at atmospheric pressures greater than 1 ATM increases the partial pressures of nitrogen and oxygen, in the blood. The nitrogen atoms inhaled in the compressed air while at pressure remain chemically unchanged in the blood, leading to the belief that there is a physical component to the involvement of nitrogen in causing narcosis. The effect of nitrogen on the body takes place in the central nervous system (CNS), but the exact site and mechanism are still debated. The lipid solubility hypothesis by Meyer and Overton noted that there is a correlation between the solubility of an anesthetic in lipid and its narcotic power. They also stated that "all gaseous and volatile substances induce narcosis if they penetrate cell lipids in a definite molar concentration which is characteristic for each type of cell." This theory was expanded by applying the "critical volume" concept which states that narcosis occurs when the inert gas or anesthetic changes a lipid portion of the cell. This is often thought to be the cell membrane, causing that portion of the cell to swell to a certain volume, impairing its function for that specific cell type.[4][5][6]
History and Physical
The effects of nitrogen narcosis are highly variable among divers with all divers being significantly impaired while breathing air at 60 to 70 meters, whereas some divers are affected at 30 meters. The effects are not progressive with time while depth is maintained, but symptoms progress and new symptoms develop as a diver descends deeper to greater pressures. The narcotic symptoms observed are quickly reversible upon ascent.
The symptoms seen in nitrogen narcosis begin first with effects of the higher function such as judgment, reasoning, short-term memory, and concentration. The diver may also experience a euphoric or stimulating feeling initially similar to mild alcohol intoxication. Further increases in the partial pressure of nitrogen in the blood from descending deeper lend to impairments in manual dexterity and further mental decline including idea fixation, hallucinations, and finally stupor and coma. Death can result from unconsciousness associated with severe narcosis or from severely impaired judgment leading to an accident of some form during the dive. Other factors have been linked to increased risk of nitrogen narcosis during dives while breathing compressed air and they include alcohol, fatigue, anxiety, and hypothermia. The concentration of carbon dioxide in the blood is thought to have an additive, rather than synergistic effect to nitrogen narcosis.
Evaluation
Measuring the effects of nitrogen narcosis have been studied and have been broken down into looking at cognition and behavior as well as neurophysiological changes that occur during narcosis. One study on simple arithmetic and reaction time showed the qualitative progressive decline in the participant’s ability to complete the test’s tasks with increasing pressures while breathing compressed air. Another study designed to see the difference between nitrogen narcosis in a laboratory setting versus in an open water setting. It reported that "divers were tested at 3 and 30 meters at a shore base and in the open sea. Intellectual functions, as assessed by memory test, sentence comprehension, and simple arithmetic, showed evidence of narcosis in both 30-meter dives but the decrement was greater in the ocean dives. This may be due to the greater psychological stress in the open sea," hinting at a greater impairment from narcosis when the diver is also experiencing anxiety from other factors outside of the narcosis.
Neurophysiological testing has been done using an electroencephalogram to measure brain wave activity. Studies have found decreased voltages in the basal rhythm of the brain and the appearance of low voltage theta waves. Cortical evoked potentials were also studied. These evoked potentials are differences on electroencephalogram readings that show a response in the brain to sensory stimuli, such as visual images. US Navy divers were studied using these visual evoked responses and showed that reliable and significant differences in visual evoked responses were apparent in the divers when they were breathing compressed air at depth, and these differences were not apparent when breathing compressed helium-oxygen mixtures.
Treatment / Management
Nitrogen narcosis can be prevented in different ways. Limiting the depth of a dive is one of the least invasive. It is agreed upon that the maximum depth limit for a diver to use compressed air is 30 to 50 meters. Beyond this, a gas mixture other than air is suggested for use to prevent nitrogen narcosis. For dives greater than 50 meters the diving community commonly substitutes helium or helium-nitrogen as the diluent gasses for oxygen. Helium has not been shown to have an anesthetic or narcotic effect on divers at depth breathing compressed gases. Helium imposes a greater decompression burden upon divers than does nitrogen.
Treatment of narcosis involves early recognition of symptoms by the diver or the diver’s partner while at depth. Symptoms resolve completely within minutes upon ascent of the diver. If the symptoms persist, the dive should be aborted.[7][8][9][10]
Differential Diagnosis
• Arterial gas embolism
• Caustic cocktail from rebreathing circuit
• Contaminated gas mixture
• Decompression sickness
• Face squeeze
• Hypothermia
• Nitrogen narcosis
• Oxygen toxicity
• Pulmonary barotrauma (pulmonary overpressurization syndrome)
• Sinus barotrauma
Prognosis
Inert gas narcosis completely resolves upon ascent. It poses no problem in the long term and does not lead to chronic issues or predispose to increased (or decreased) susceptibility to recurrent exposures. However, inert gas narcosis will recur on exposure to pressure, it is unpredictable in severity and can lead to fatalities while diving, due to cognitive impairment in the marine environment.
Pearls and Other Issues
Although helium does not cause inert gas narcosis, it can cause at deep depths. This is an unrelated phenomenon which is interestingly treated by adding nitrogen back into the breathing mixture.
Enhancing Healthcare Team Outcomes
The management of nitrogen narcosis is usually done with an interprofessional team that includes an emergency department physician, neurologist, intensivist and an HBO expert. The key is to educate the patient who undertake water sports. Nitrogen narcosis can be prevented in different ways. Limiting the depth of a dive is one of the least invasive. It is agreed upon that the maximum depth limit for a diver to use compressed air is 30 to 50 meters. Beyond this, a gas mixture other than air is suggested for use to prevent nitrogen narcosis. For dives greater than 50 meters the diving community commonly substitutes helium or helium-nitrogen as the diluent gasses for oxygen. Treatment of narcosis involves early recognition of symptoms by the diver or the diver’s partner while at depth. Symptoms resolve completely within minutes upon ascent of the diver. If the symptoms persist, the dive should be aborted.
The outcomes after nitrogen narcosis depend on the depth of the dive, rapidity of ascent and other comorbidities. Those who have neurological signs may have residual impairment after treatment, but for the most part, full recovery is expected in most divers.
Continuing Education / Review Questions
References
1.
Rocco M, Pelaia P, Di Benedetto P, Conte G, Maggi L, Fiorelli S, Mercieri M, Balestra C, De Blasi RA., ROAD Project Investigators. Inert gas narcosis in scuba diving, different gases different reactions. Eur J Appl Physiol. 2019 Jan;119(1):247-255. [PubMed: 30350155]
2.
Naqvi A, Clarence D. A case of decompression illness not responding to hyperbaric oxygen. J Intensive Care. 2018;6:29. [PMC free article: PMC5963052] [PubMed: 29796283]
3.
Raymond KA, West B, Cooper JS. StatPearls [Internet]. StatPearls Publishing; Treasure Island (FL): Sep 29, 2020. Diving Buoyancy. [PubMed: 29261960]
4.
Steinberg F, Doppelmayr M. Executive Functions of Divers Are Selectively Impaired at 20-Meter Water Depth. Front Psychol. 2017;8:1000. [PMC free article: PMC5476772] [PubMed: 28676772]
5.
Magee P. Circle (CO2 reabsorbing) breathing systems: Human applications. Proc Inst Mech Eng H. 2017 Jul;231(7):617-624. [PubMed: 28661230]
6.
Van Wijk CH, Martin JH, Meintjes WA. Diving under the influence: issues in researching personality and inert gas narcosis. Int Marit Health. 2017;68(1):52-59. [PubMed: 28357837]
7.
Abraini JH, David HN, Vallée N, Risso JJ. Theoretical considerations on the ultimate depth that could be reached by saturation human divers. Med Gas Res. 2016 Apr-Jun;6(2):119-121. [PMC free article: PMC5110125] [PubMed: 27867478]
8.
Khan K. [Diving accidents]. Dtsch Med Wochenschr. 2016 Jun;141(12):890-4. [PubMed: 27305307]
9.
Pendergast DR, Moon RE, Krasney JJ, Held HE, Zamparo P. Human Physiology in an Aquatic Environment. Compr Physiol. 2015 Sep 20;5(4):1705-50. [PubMed: 26426465]
10.
Tikkinen J, Siimes MA. Age-related effects of increased ambient pressure on discrimination reaction time: A study in 105 professional divers at 6.0 atm abs. Undersea Hyperb Med. 2015 Jan-Feb;42(1):33-9. [PubMed: 26094302]
Copyright © 2021, StatPearls Publishing LLC.
This book is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, a link is provided to the Creative Commons license, and any changes made are indicated.
Bookshelf ID: NBK470304PMID: 29261931
Views
• PubReader
• Print View
• Cite this Page
Related information
• PMC
PubMed Central citations
• PubMed
Links to PubMed
Similar articles in PubMed
See reviews...See all...
Recent Activity
Your browsing activity is empty.
Activity recording is turned off.
Turn recording back on
See more... | ESSENTIALAI-STEM |
Talk:Hurricane Dean (1989)
Todo
It's a high start, but there's still a little to be done for B class. First, the whole thing needs another look through. In a lot of places, the wording doesn't make sense. The unit of knots should not be used; the Imperial and Metric equivalents should be. The storm history jumps a bit. Write it as if you're drawing a line. For example.
* Dean's forward speed increased to 15 kts as the trough to the west of the storm deepened. The eastern half of the eyewall brushed Bermuda as Dean reached a category 2 status.
That could probably be smoother. The sentence after that is a fragment. Throughout the storm history, dates and locations would be good. The first paragraph of the preparations should be trimmed a bit, or split into two paragraphs. The impact should be in a clear order; one paragraph for Carib, one for Bermuda, and maybe one for North America (lumping US and Canada). Be sure add the rest of the categories and the button bar. All in all, not a bad start. Hurricanehink ( talk ) 14:50, 7 November 2006 (UTC)
* I changed the storms foward speed into Imparial and metric eq and fixed the fragement in the storm history. Storm05 14:56, 7 November 2006 (UTC)
* And i split the first half of the preparations into two paragraphs and the US/Canadian impacts are already lumped togeather. Storm05 14:58, 7 November 2006 (UTC)
I'd still like to see some more dates and location markings. For example, when did it make its closest approach to the Lesser Antilles, and how close was it? Also, Bermuda should be its own paragraph in the storm history. Are you sure there's no more effects in the Lesser Antilles? No rough surf? No erosion? How much rain did it cause? I just fixed a few small things, but the article needs another look-through. Please use a spell checker. Phrases like "Puetro Rico" should be in the article. It's getting there, but not quite B class. Could you also finish adding metric units to the article? Hurricanehink ( talk ) 18:39, 7 November 2006 (UTC)
* The tcr and the newspaper archive doesnt mention any more effects in the Lesser Antilles or mentions when it made its closest approach to the Lesser antillies. Storm05 14:38, 8 November 2006 (UTC)
* There's other sources than the tcr and the newspaper. Hurricanehink ( talk ) 20:19, 8 November 2006 (UTC)
* Yeah, but most of the other sources have info that is already in the article. Storm05 13:18, 9 November 2006 (UTC)
* Try Reliefweb, they have some Caribbean info on Dean, and enough to justify its own section. Hurricanehink ( talk ) 15:38, 9 November 2006 (UTC) | WIKI |
class ngraph::op::util::SubGraphOp::ConcatOutputDescription
Overview
Produces an output by concatenating an output from each iteration. More…
#include <sub_graph_base.hpp>
class ConcatOutputDescription: public ngraph::op::util::SubGraphOp::OutputDescription
{
public:
// fields
static constexpr type_info_t type_info {"ConcatOutputDescription", 0};
int64_t m_start {0};
int64_t m_stride {0};
int64_t m_part_size {0};
int64_t m_end {0};
int64_t m_axis {0};
// construction
ConcatOutputDescription(
uint64_t body_value_index,
uint64_t output_index,
int64_t start,
int64_t stride,
int64_t part_size,
int64_t end,
int64_t axis
);
ConcatOutputDescription();
// methods
virtual const type_info_t& get_type_info() const;
virtual std::shared_ptr<OutputDescription> copy() const;
};
Inherited Members
public:
// typedefs
typedef DiscreteTypeInfo type_info_t;
// fields
uint64_t m_body_value_index {0};
uint64_t m_output_index {0};
// methods
virtual std::shared_ptr<OutputDescription> copy() const = 0;
virtual const type_info_t& get_type_info() const = 0;
Detailed Documentation
Produces an output by concatenating an output from each iteration.
Construction
ConcatOutputDescription(
uint64_t body_value_index,
uint64_t output_index,
int64_t start,
int64_t stride,
int64_t part_size,
int64_t end,
int64_t axis
)
Constructs a new instance.
Parameters:
body_value_index
A body value that produces the output
output_index
The SubGraphOp output index
start
First index for slices
stride
Step amount for slices
part_size
Width of slices
end
Last index for slices
axis
Axis being sliced | ESSENTIALAI-STEM |
Tshibinda
Tshibinda is a group of pyroclastic cones in the east of the Democratic Republic of the Congo. It has a prominence of 1460 m. It last erupted during the Pleistocene epoch. | WIKI |
How to Adjust LED Headlight Beam Pattern?
Properly adjusted headlights allow you to see better in the nighttime. If the vehicle’s headlights are towards the sky or facing sideways, you can’t see the street and its surroundings. Automobile manufacturers make it simple to change headlights with a few equipment and skills.
If we replace the headlight bulb with LEDs, we rotate the connection to change the beam pattern. Reflectors fit with LED and halogen lights. Each reflector’s internal structure is different.
LED can’t generate 360º lights like halogen. So, when fitting it into a particular beam reflector, we must adjust the light beam pattern first. Learn how to perform this significant safety operation by reading the article.
How Can I Tell If the Headlights Need to Be Adjusted?
If approaching cars are frequently flashing the headlights from low to high at you, it is because your headlights are blinding them. Maybe the high beams are kept on or the low beams are not correctly adjusted.
Headlights are not adjusted properly if you can’t see more than 25 or 35 feet ahead of you when driving. And if the headlights are too high all you will see is the sky at night or the top of the trees. So, this is how you can tell that the headlights of your vehicle need to be adjusted.
How Can Headlights Lose Their Alignment?
There are a variety of factors that might cause the headlights to beam wrongly and become misaligned. Any form of accident might cause the headlight to become imbalanced. Driving over road holes and other road conditions might potentially throw off the headlights.
If you see any of the problems mentioned above, make sure you examine the headlight adjustments. If the adjustments are not fixed you may drive out of control on road.
Tools and Materials to Adjust Headlights.
• User manual
• A screwdriver
• A ruler
• Tape or painters
• Light-blocking cloth or board
• A 30-foot-wide space to start working
Steps To Adjust the Headlights
Check the User Manual
Headlight adjustments are not available in all cars. Check the user manual to check whether the headlights of your vehicle are adjustable. Follow the instructions for adjusting light screw positions. Some automobiles include headlight adjustment bubbles. User manuals will explain the kind and position of adjustment screws.
Park the Vehicle on a Flat Surface
Choose a level surface to beam headlights on a garage wall. Ensure the vehicle’s tires are properly inflated and the petrol tank is at least half full. Also, attempt to replicate the regular amount of load you normally carry. Then turn on the lights to see the beam aimed at the garage wall.
Create a Central Axis
Next, wait until night or sunrise. Park 7 feet from the garage wall. Turn the headlights to low beam. Outline the horizontal and vertical lines of the beam’s central axis using masking tape. The tape should make a cross on the headlights.
Comparing the Distance between Headlights
Measure both headlight lines to check whether the distance between headlights is the same. If the measures don’t match, reduce the high centerline to the lowest. Some automobiles include headlight pointers that assist you to detect the beam’s focal point. You can get these instructions in the user manual.
Reverse the Vehicle Away from the Wall
Check the user manual-recommended range, around 20 feet. Reverse the automobile to the 20-feet mark, maintaining the surface level. Notice where the headlight’s sharpest part strikes the taped area on the garage wall.
Get Ready for the Adjustment
Remove the headlight’s ring or frame and store it safely. Grab a screwdriver, a cloth, and a board. Find the vertical and horizontal adjustment screws.
Vertically Adjust
Turn off the headlights while you’re in front of the vehicle. Then, place a black cloth or board above one headlight and again turn the headlights on. Move the adjustment screw slightly clockwise to lower or raise the beam. Adjust the headlights so the brightest portion of the beam reaches the wall’s taped midline.
Horizontally Adjust
Rotate the screws counterclockwise for outward adjustment and clockwise for inward. The headlight beam must be on the center-right. Then, cover the adjusted headlight and adjust the other light vertically and horizontally.
Adjust the Settings to Perfection
Adjust the headlight’s horizontal and vertical settings till the tape markings on the wall match up. Set the vehicle for a test drive, and if any of the headlights isn’t adjusted correctly, repeat the steps.
Final Note
Misaligned headlights may affect the eyesight of other drivers by flashing into their windshield. Proper headlight alignment is essential for the security and ability to see traffic signs and obstructions. With the procedures mentioned above, you can adjust your headlights which will work correctly without harming you or other drivers.
So, adjust the headlights as early as possible. These headlight adjustments can save various lives on roadways.
Leave a Comment | ESSENTIALAI-STEM |
Page:History of England (Froude) Vol 7.djvu/230
210 REIGN OF ELIZABETH. [CH, 43. Scotland to be employed in secret service. So highly she valued his abilities, that notwithstanding her poverty she settled on him an annual pension of a thousand marks twice the income perhaps of the richest nobleman in Scotland. 1 He was already ac- quainted with Elizabeth, who, according to his own account, had spoken confidentially with him about the Queen of Scots' marriage. This Melville it was whom Man^ Stuart now selected to be her instrument to pacify and cheat Elizabeth, to strengthen her party at the English Court, and to arrange with Lady Lennox for Darnley's escape to Scotland. She directed him to apologize to Elizabeth for the hasty letter which she had written, and to beg that it might be forgotten. He was to entreat her not to allow his mistress's interests to suffer any prejudice in Parliament ; and further, he had secret instructions from Mary's own lips, the nature of which he indicates without explaining himself more completely ( to deal with the Spanish ambassador, Lady Margaret Douglas, and sundry friends she had in England of different opinions.' Melville left Edinburgh towards the end of Septem- ber, 2 preceded by Randolph, who, after communicating with Elizabeth, was on the point of returning to Scotland 1 So Melyille himself says in his Memoirs ; hut, Melville's credibility is a very open question. 2 The copy of his instructions printed in his Memoirs is dated Sep- tember 28. But Melville was in London on Michaelmas-day, when Lord llobert Dudley was created Earl of Leicester, and was present at the ceremony ; 28 is perhaps a mis- print for 20. | WIKI |
Defining requirements in schedules
You can define performance requirements for a schedule to specify acceptable thresholds of performance and to validate service level agreements. Starting from version 9.2.0.1, you can define both performance and functional requirements in the schedules. The verdict of the schedule is computed based on the requirements defined in the schedule. You can view the verdict in the Requirements report.
Procedure
1. In the Test Navigator, browse to the schedule and double-click it. The schedule opens.
2. In the Schedule Element Details area, select the Requirements category, and select Enable Requirements. The page contains a table of performance requirements that apply to the schedule. From 9.2.0.1, you can view both performance and functional requirements. Within the table, the requirements are organized into common requirements, which pertain to all protocols, protocol-specific requirements, and requirements that pertain to resource data being collected. From 9.2.0.1, you can also view functional requirements and testing infrastructure (agents) requirements.
3. Expand the requirements tree, click the requirement to define, and define the requirement as follows:
Option Description
Name You can change the name of a requirement to improve readability. However, changing a requirement name causes a mismatch between the Requirements report, which uses the changed name, and the other reports, which use the default name. Therefore, when you change a requirement name, be sure to keep track of the original name.
Operator Select an operator.
Value Type a value.
Standard Click to make the requirement standard. If a standard requirement is not met, the schedule run will have a verdict of fail. Clear to make the requirement supplemental. In general, supplemental requirements are used for requirements that are tracked internally. A supplemental requirement cannot cause a run to fail, and supplemental results are restricted to two pages of the Requirements report.
4. Optionally, select Hide Undefined Requirements to hide the shaded rows. Shading indicates that a requirement is not defined.
5. Select a requirement and click Clear to remove its definition. The requirement is still available and can be redefined.
Example
You can define performance requirements in a test, if your protocol supports it, or in a schedule. When you define a requirement in a test, the requirement is defined individually for each test element—even if you select multiple test elements. When you define a requirement in a schedule, the requirement is applied to the aggregate of test elements.
For example, assume that you select every page in a test and define this requirement: Average response time for page [ms] [For Run] must be less than 5 seconds. This means that if one page in the test has a response time of 6 seconds, the requirement on that page fails. The other pages, which have a response time of less than 5 seconds, pass.
Assume that you open a schedule and define this requirement: Average response time for all pages [ms] [For Run] must be less than 5 seconds. This measures the average response time for all of the pages. One page can have a response time of 30 seconds, but if enough pages have sufficiently low response times to counter the negative effect of that one page, the requirement passes.
For information on defining requirements in HTTP tests, see Defining requirements in tests.
Feedback | ESSENTIALAI-STEM |
Figures of the Renaissance - Ferdinand Magellan
Ferdinand Magellan was a leader of the Renaissance and a benefactor to modern science. The results of his voyage around the globe were such that the average person living during the Renaissance re-thought their paradigms of the world surrounding them, even know most scholars and other educated types knew that in fact, the world was round in shape. Ferdinand, however, proved it. Thus he lays claim to having circumnavigated the first voyage around the world.
Born 1480 to lesser nobles living near Vila Real in northern Portugal, Magellan was raised as a page to the Portuguese king John II in the royal court at Lisbon. Magellan was educated from then on, becoming interested in geography and astronomy, thus in 1496 he became a squire. In the year 1505 Magellan would get his first taste of the sea, at the age of 20. He was sent to India to install Portuguese viceroy Francisco de Almeida, as well as establish naval bases along the way. As it turns out, Magellan also had his first combat experience on this mission. A local king refused to pay a tribute to the king, and as such Magellan and Almeida 's party attacked, conquering the city of Kilwa in what is now modern-day Tanzania. Magellan continued to do well in his seafaring missions, and was eventually promoted to captain, when in 1510 he sailed a ship east without permission losing him his command and forcing him back to Portugal. After being sent on a mission against a Moorish-Moroccan force, he received a knee injury after which he was accused of illegal trade with the Moors. This coupled with a bad report of Magellan by Almeida to the Portuguese court after Magellan took leave without permission caused him to fall out of favor with current King Emanuel I, who told Magellan that after May 15, 1514. Thus Magellan renounced his nationality and changed his name from the Portuguese "Fernão de Magalhães" to the Spanish "Fernando de Magallanes" and sought to offer his
Bibliography: Strong, C.F. The Early Modern World. Clarke, Irwin & Co. Ltd., 1961 Chronology of World History. Geddes & Grosset, 1995 West and Eastman, S. Mack. World Progress. Unknown Publisher, 194? | FINEWEB-EDU |
HealthSheets™
Ischemic Colitis
Front view of colon showing arteries supplying blood to colon.
Ischemic colitis happens if blood flow to a part of the colon is reduced.
Ischemic colitis happens when blood flow to the colon is reduced or blocked. Bloody diarrhea and severe belly pain are the most common symptoms. Other symptoms include vomiting, fever, and fainting. Diarrhea can lead to severe dehydration. This is the rapid loss of the fluids your body needs to function. Because of the severe pain and the risk for dehydration, ischemic colitis should be treated right away.
Causes of ischemic colitis
The cause of the reduction or blockage of blood flow to the colon is not well understood. In some cases, a sudden drop in blood pressure, or dehydration, leads to an episode. Ischemic colitis is more likely in people with blood clotting problems or heart and blood vessel disease.
Diagnosing ischemic colitis
The presence of severe belly pain and bloody diarrhea is often enough to diagnose ischemic colitis. After these symptoms are treated, a test called a colonoscopy will likely be done. This helps rule out other colon problems. The test uses a thin, flexible scope with a light and camera on the end. The scope is inserted through the rectum into the colon. The scope sends pictures from inside the colon to a video screen. A small sample of tissue (biopsy) from the colon may be taken for further testing in a lab.
Treating ischemic colitis
Episodes are treated in the hospital. You may remain in the hospital for several days or longer:
• An IV line is put into a vein in your hand or arm. You will be given fluids through the IV to treat dehydration. You are also given IV pain medicines if you need them.
• You may be given IV antibiotics (medicines that treat infection).
• To rest the bowel, you will not eat or drink for a few days. In rare cases, when symptoms are very severe, you will be given nutrition through the IV.
• If you lost a lot of blood during the episode, you may receive a blood transfusion.
• In rare cases, an episode causes severe damage to the colon. In this case, surgery may need to be done to remove the damaged section. Your healthcare provider can tell you more if this is needed.
Follow-up
While you are being treated, your healthcare provider will work to find the cause of your ischemic colitis. After you recover, you may need to make lifestyle changes, such as quitting smoking, or take medicines to decrease your risk of another episode. Call 911 or go to the emergency room right away if your symptoms return.
© 2000-2018 The StayWell Company, LLC. 800 Township Line Road, Yardley, PA 19067. All rights reserved. This information is not intended as a substitute for professional medical care. Always follow your healthcare professional's instructions.
Powered by Krames Patient Education - A Product of StayWell | ESSENTIALAI-STEM |
Shokanbetsudake Mountains
Shokanbetsudake Mountains (暑寒別岳連峰) are a group of volcanic mountains on the western coast of Hokkaidō (暑寒別岳連峰). It is part of the Mashike Mountains, separated from the other part of the Mashike Mountains to the south, the Kabato Mountains by the Hamamasu River. To the north lie the Teshio Mountains. Shokanbetsudake mountains are part of Shokanbetsu-Teuri-Yagishiri Quasi-National Park.
The peaks of the Shokanbetsudake Mountains include the following:
* Mount Shokanbetsu (1492m)
* Mount Kunbetsu (1376m)
* Mount Okutoppu (1346m)
* Mount Hamamasu (1258m)
* Mount Minami Shokan (1257m)
* Mount Ofuyu (1198m)
* Mount Etai (1060m)
Mount Minami Shokan, Mount Kunbetsu and Mount Etai define a triangle that surrounds the Uryū Wetlands (雨竜沼湿原).
Flora and fauna
Unlike on Honshū, you can see alpine plants at altitudes as low as 1000 meters in the Mashike mountains. | WIKI |
Page:The three colonies of Australia.djvu/361
"We were all astir at daylight, and found the water frozen in the bucket, and the top of our blankets quite wet within the tent. The loads were adjusted, and the blacks, with the two men, started under the guidance of the company, and returned about noon by a short cut, we remaining to erect the tent. On loading them again, one fellow complained that a pot of beef hurt his head, so I gave him a roll of brown paper, but soon found my mistake, as not a man would move without the same, so that when I came to the last there was not a scrap left; he had only bedding to carry, and I explained to him that no pad was necessary, but he drew himself up and asked if I thought him a fool; 'Another one black fellow hab it [sic].' He was evidently in earnest, and would have left his load there and then, had I not clapped a calling-card on his shaggy bullet head, and he went off quite proud; we gave them one shilling each and their rations, which is high pay for a black. Many return at once, without giving it one minute's trial. I saw one party arrive, six respectable looking hardworking men, all well provided with tools, clothes, and provisions. As I stood conversing with one of them, who was putting his things together to move to their tent, a parcel unrolled, and a Bible and Prayer-book fell out. He looked up, and said they should not forget these even for gold, to which I assented, with the remark that men would get none the less gold for minding them."
The Turon, which, like many Australian names, was scarcely known beyond its immediate neighbourhood before the gold discoveries, rises in the county of Roxburgh, near Cullen Cullen, and flows, like the Summerhill Creek, into the Macquarie. On its banks Sofala has been founded. Here it was that the art of cradling gold and washing gold was learned by thousands who have since removed to Mount Alexander and other districts.
The gold-fields of the Turon include river-bed claims and dry diggings.
In the river-bed claims it is the object to clear a deep hole of water, and then wash the mud and sand which have been carried there in the course of ages; partly washed to the hand of the miner by the torrents of nature. "In dry diggings" the earth after being raised must be carefully broken up and washed.
Fortunate diggers come from time to time upon lumps or "nuggets" of various sizes, which once excited great attention and curious comparison between those found in quartz, in clay, in alluvial mould; but now in the auction-rooms of Sydney and Melbourne they excite no more attention, unless of rare beauty, than so much copper or lead. | WIKI |
Bare feet on the floor as man steps out of bed, an example when you might hear cracking and popping noises in joints.
PREVENT
The reason behind that cracking noise in your joints
Walking around in the winter, you'll sometimes hear your bones creak and your joints pop. People often ask me what the noise is all about. In adults, most of the time the noise is harmless and comes from movement of the fluid in your joints. But when creaking and popping is accompanied by pain, there might be a problem.
Symptoms and treatment options
• Air bubbles in joint fluid: This is the most common reason you'll hear cracking noises in your joints. There is a membrane that surrounds joints, and it contains fluid to help the joint move smoothly. During movement, low in the joint space allows a gas bubble to form. A study in 2015 revealed that it is actually the formation of these gas bubbles that causes the sound, not the bursting of the bubble. This is the noise commonly heard when someone cracks their knuckles. There are no treatment options needed for air bubbles in your joint fluid.
• Muscle weakness: If you have muscle weakness in your upper legs, this can cause noise and discomfort in the knee joints. If you hear a loud "pop" this might indicate a meniscus tear (cartilage located in the knee), and you should see a doctor. Treatment options for muscle weakness include physical therapy exercises and electrical stimulation to strengthen quad muscles.
• Irritated or swollen tendon: Muscles and tendons become less flexible over time and we may hear noise when stiff muscles or tendons snap over normal bony bumps surrounding our joints. Tendons can become irritated, especially in areas of continuous movement like the joints. Treatment options include rest, ice, elevation, medicines to reduce swelling, limiting sports activities, exercise or surgery in cases of severe injury.
• Arthritis/loss of normal joint cartilage: If your joints are stiff and swollen when you hear the creaking noises, it could be arthritis. Treatment options for arthritis include gentle stretching, ice packs on sore areas, resting the joint, over the counter medications, injections, and taking warm showers to relieve your symptoms.
When to seek treatment
If you're not sure about your creaking bones, see an orthopedic provider. They can do a thorough exam, discuss your symptoms and talk about your options for care. As any doctor will tell you, we want people to keep moving and live their lives to the fullest – don't let aches and pains rule your life!
Experiencing creaky bones or joint pain? Schedule an appointment with an orthopedic or sports medicine specialist to create a care plan right for you.
WHAT YOU CAN DO
Share this article
MORE LIKE THIS
Tips to keep your joints healthy
Our joints are complex structures that allow us to move, whether it's knitting a sweater to walking your dog, or playing piano to running a marathon. Injuries, strain from repetitive motion, obesity, some health conditions and the effects of aging can interfere with joint movement, and lead to pain and disability. The good news is, you can prevent injuries and maintain your bone and joint health throughout your life.
Continue reading
EMPOWER YOURSELF
Get fun, inspiring, provider-reviewed articles sent to your inbox.
Sign up for our email newsletter | ESSENTIALAI-STEM |
Macros Design Patterns
I was reading the thread What are some fun or useful macros? on reddit and it reminded me of another thread that appeared in the Pro mailing list. These kind of threads are always enjoyable because each time you learn something new and see really interesting things. While reading them, it crossed my mind that another variant of this question would be what are some fun or useful macros design patterns. Instead of examples of specific code macros (general or not) it would be nice to see common programming practices using macros. So, for a lack of a better expression name, let’s call them macros design patterns.
My favorite one is to configure an algorithm, especially when we want to use the correct types. Essentially, we write an algorithm using a macro that takes types or configuration arguments and then we expand it to the appropriate desired configurations. For example, if you have an algorithm that operates on different types of sequences, instead of writing several duplicate functions with the same algorithm but with the associated type declarations, just apply this pattern. A simple but contrived example: we want to compute the mean of a vector but use its proper type. In addition, we might also want the possibility of using a key to access the vector elements. We can write the following macro:
(defmacro mean-body (vector vector-type vector-ref key)
(let ((size (gensym)) (i (gensym)))
`(locally
(declare (type ,vector-type ,vector))
(let ((,size (length ,vector)))
(/ (loop for ,i from 0 below ,size
sum ,(if key
`(funcall ,key (,vector-ref ,vector ,i))
`(,vector-ref ,vector ,i)))
,size)))))
The macro contains the algorithm (in this simple case the mean) and the arguments allow us to configure the multiple versions we need. If we want a simple-vector, the macro will expand to use the correct type declaration and svref. If a key function is needed it will also include it. Then, we can call the macro with the several configurations value inside the main function:
(defun mean (vector &optional key)
(typecase vector
(simple-vector
(if key
(mean-body vector simple-vector svref key)
(mean-body vector simple-vector svref nil)))
(vector
(if key
(mean-body vector vector aref key)
(mean-body vector vector aref nil)))
(otherwise
(if key
(mean-body vector sequence elt key)
(mean-body vector sequence elt nil)))))
This can be very useful in situations where we want to optimize code since it becomes easy to add the proper type declarations to the input arguments of an algorithm. Moreover, we keep the algorithm in a single place, making it easier to maintain. Depending on the situation, we can also define a function for each configuration. In the example we could have a mean-simple-vector and mean-vector.
I don't know if it has already a specific name but I like to call it the configurable algorithm pattern. I find it very useful. And thinking back to the reddit thread, what are your favorite macros design patterns? Which ones do you find useful and use them regularly? If you want to share, feel free to drop a line. I am interested in seing and learning other patterns!
Advertisements
4 Replies to “Macros Design Patterns”
1. Hi JD,
Don’t forget it’s a macro, so the expansion with nil is:
CL-USER> (macroexpand-1 '(mean-body vector simple-vector svref nil))
(LOCALLY
(DECLARE (TYPE SIMPLE-VECTOR VECTOR))
(LET ((#:G870 (LENGTH VECTOR)))
(/
(LOOP FOR #:G871 FROM 0 BELOW #:G870
SUM (SVREF VECTOR #:G871))
#:G870)))
There is no funcall key. Compare it with a key:
CL-USER> (macroexpand-1 '(mean-body vector simple-vector svref #'first))
(LOCALLY
(DECLARE (TYPE SIMPLE-VECTOR VECTOR))
(LET ((#:G872 (LENGTH VECTOR)))
(/
(LOOP FOR #:G873 FROM 0 BELOW #:G872
SUM (FUNCALL #'FIRST (SVREF VECTOR #:G873)))
#:G872)))
According to the configuration, you produce the code you want.
1. Pingback: :: nklein software
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Connecting to %s | ESSENTIALAI-STEM |
Hitrino train derailment
On 10 December 2016, a freight train derailed, exploded and caught fire in the village of Hitrino in Shumen Province, Bulgaria, killing at least seven people and injuring 29 others.
Accident
At 05:37 local time (03:37 UTC) on 10 December 2016, a Bulmarket freight train travelling from Burgas to Ruse derailed in Hitrino, Shumen Province, Bulgaria. The train had changed direction of travel in Karnobat and Sindel, and had passed through Aytos, Velichkovo, Dalgopol, Provadiya, Kaspichan, Pliska, Velino. Upon entering the area of the railway station, according to the order of the on-duty railway traffic manager, the train was diverted to a side (parallel to the main) track- presumably in order to free the main track which had to be temporarily used by an oncoming train coming from the railway station of Samuel. The Kaspichan-Samuel-Ruse railway is a single line. The train was supposed to pass through the diverting element of the railway arrow at a speed of up to 40 km/h (27 miles/hour), but actually passed at 78 km/h (52 miles/hour). The train company specializes in transport of fuels over rail and road. Two of the wagons, which were carrying propane-butane and propylene, struck a power line pole, exploded and caught fire, engulfing at least fifty buildings, one of which collapsed, trapping several children. The three train drivers (two in the lead and the third driver in the second electric locomotive) survived the accident. Seven people were killed and 29 injured. An evacuation of the village was ordered as 150 firefighters fought the blaze; it was extinguished by midday. The injured were taken to hospitals in Shumen and Varna; some of them had sustained burns to 90% of their bodies.
It was reported that sparks had been seen coming from the locomotive of the train immediately before the accident, possibly indicative of heavy braking.
Background
The incident occurred on the oldest railway line in Bulgaria, connecting the country's main riverine port on the Danube in the city of Ruse and the main port on the Black Sea in Varna. The line was built during Ottoman rule by British private investors in the 1860s. The railway station in Hitrino was also the site of the first railway accident in Bulgaria in 1866.
The train operator Bulmarket Rail Cargo was founded in 2004 and in the same year acquired a license for railway operations. It operates second-hand Danish (Class 86) and British (Class 87) electric locomotives like those involved in the incident (lead locomotive nr.86.003 and second locomotive nr.87.025), as its mainline motive rolling stock, as well as diesel-hydraulic locomotives for shunting duties. Bulmarket DM, the mother corporation of Bulmarket Rail Cargo, has its headquarters and main base of operations, with its own railway yard, Bulmarket Port and fuel storage facilities, in the city of Ruse.
Investigation
Bulgaria's Chief Prosecutor opened an investigation into the accident. The owner of Bulmarket DM, Stanko Stankov, expressed his intention to involve an international team of railway incident experts from France, Germany and the Czech Republic to execute an independent investigation into the case. This was rebutted by the Attorney General's Office; it issued a statement that according to Bulgarian law such an investigation has absolutely no legal basis and justification, because the Attorney General's Office (Главна Прокуратура) and its special division for investigation of severe crimes and incidents — the National Inquiry Service (Национална Следствена Служба) — are the only legal bodies authorized by the country's laws to execute such investigations. On that basis, the police authorities guarding the perimeter denied access to the crash site to technical experts involved by the train operator. Residents were not allowed into their homes as a state of emergency was declared, but volunteers were allowed to be in Hitrino. Bullmarket DM also had to remove cisterns within 15 days.
According to the State Agency for National Security (semi-autonomous agency within the Bulgarian Ministry of the Interior, tasked with counter-terrorism, counter-espionage and high-profile corruption cases) the probable trigger for the incident was a railroad switch that had not been properly secured.
The investigators from the National Inquiry Service of the Attorney General's Office found that upon derailment at the railroad switch a crash between the fifth and sixth tank wagons led to the towing hook of one of them causing a rupture in the lower frontal part of the gas tank of the other. The discharged gas fumes from the liquid gas reached a bakery located in immediate proximity to the railway station, and its furnaces ignited them, causing the violent explosion. According to ammunition experts, the chain of events led to an equivalent of an oversized thermobaric weapon with blasting energy four to five times greater than the TNT-equivalent.
Reactions
Bulgarian Prime Minister Boyko Borisov visited the scene. He called for people to donate blood as there was a shortage in the local hospitals. Local response alleviated the shortages. Bulgarian Transport Minister Ivaylo Moskovski also visited the site, along with top rail officials. A national day of mourning was declared for 12 December 2016.
The Bulgarian Government announced that a fund of 10 million leva (€5.1 million) was to be made available following a special Cabinet meeting on 12 December. The money would be distributed in two ways: 5 million leva (€2.55 million) would go to the Hitrino Municipality, and the other 5 million leva (€2.55 million) would go to the Labour and Social Policy Ministry. The Interior Ministry stated that people who had lost identity documents, passports and driving licences in the fire would have them replaced free of charge. | WIKI |
Guy of Ibelin (bishop)
Guy of Ibelin (Fr: Guy d'Ibelin) (died 29 March 1367) was the dominican bishop of Limassol, Cyprus from 27 April 1357 until his death. He belonged to the noble Cypriot house of Ibelin, closely linked by intermarriage with the kings of Cyprus. His father Balian of Ibelin (d. 28 October 1333), Lord of Arsuf, was a direct descendant of the first Balian of Ibelin, an important crusader. His mother, Margaret of Ibelin, continued to hold the title Lady of Arsuf after her husband's death. In the second half of the fourteenth century the fortunes of the house of Ibelin were in decline, as the once-powerful family became extinct. Guy's brother Philip became the last Ibelin to hold the title Lord of Arsuf. He was executed in Genoa in late 1373 for taking part in the assassination of King Peter I of Cyprus in 1369; King James I of Cyprus subsequently bestowed the title on John of Neviles, viscount of Nicosia, in 1389.
Instead of receiving a prebend, the normal path for a younger son of a high aristocratic family to join the church and enjoy the comfortable life of an ecclesiastical nobleman, Guy chose to join the austere dominican order, perhaps in the same monastery in Nicosia where he was later laid to rest. Two years after his elevation to bishop in 1357, he was the presiding bishop at the coronation of Peter I in the cathedral of St Sophia, Nicosia. It appears that he took part in the campaign to capture Alexandria in 1365, before succumbing to illness in his mansion in Nicosia in 1367.
Guy bequeathed 20,000 bezants towards the construction of the cathedral of St Nicholas in Limassol. A detailed inventory of his belongings survives him; although his main residence, in addition to his three rural estates, was not furnished in an opulent manner, – Turkish carpets and cushions typical of the Latin orient replacing courtly tapestries – he still indulged in hunting, the favourite pastime of the nobility, having three falconers in his service, a modest number for the time. | WIKI |
PMCC PMCC
Search tips
Search criteria
Advanced
Results 1-6 (6)
Clipboard (0)
None
Select a Filter Below
Journals
Year of Publication
Document Types
1. Combined Industrial Wastewater Treatment in Anaerobic Bioreactor Posttreated in Constructed Wetland
BioMed Research International 2013;2013:957853.
Constructed wetland (CW) with monoculture of Arundo donax L. was investigated for the posttreatment of anaerobic bioreactor (ABR) treating combined industrial wastewater. Different dilutions of combined industrial wastewater (20, 40, 60, and 80) and original wastewater were fed into the ABR and then posttreated by the laboratory scale CW. The respective removal efficiencies of COD, BOD, TSS, nitrates, and ammonia were 80%, 78–82%, 91.7%, 88–92%, and 100% for original industrial wastewater treated in ABR. ABR was efficient in the removal of Ni, Pb, and Cd with removal efficiencies in the order of Cd (2.7%) > Ni (79%) > Pb (85%). Posttreatment of the ABR treated effluent was carried out in lab scale CW containing A. donax L. CW was effective in the removal of COD and various heavy metals present in ABR effluents. The posttreatment in CW resulted in reducing the metal concentrations to 1.95 mg/L, 0 mg/L, and 0.004 mg/L for Ni, Pb, and Cd which were within the permissible water quality standards for industrial effluents. The treatment strategy was effective and sustainable for the treatment of combined industrial wastewater.
doi:10.1155/2013/957853
PMCID: PMC3876802 PMID: 24396832
2. 2-(Naphthalene-2-sulfonamido)-3-phenylpropanoic acid
In the title compound, C19H17NO4S, the phenyl ring and the naphthalene ring system are oriented at a dihedral angle of 4.12 (2)° and the molecule adopts a U-shaped conformation. The Cc—C—N—S (c = carboxy) torsion angle is 90.98 (15)°. In the crystal, molecules are linked by O—H⋯O and N—H⋯O hydrogen bonds, resulting in (100) chains incorporating centrosymmetric R 2 2(14) and R 2 2(10) loops. Weak aromatic π–π stacking is also observed [centroid–centroid separations = 3.963 (2) and 3.932 (2) Å].
doi:10.1107/S1600536813000081
PMCID: PMC3569255 PMID: 23424478
3. Interaction of Hepatitis C virus proteins with pattern recognition receptors
Virology Journal 2012;9:126.
Hepatitis C virus (HCV) is an important human pathogen that causes acute and chronic hepatitis, cirrhosis and hepatocellular carcinoma worldwide. This positive stranded RNA virus is extremely efficient in establishing persistent infection by escaping immune detection or hindering the host immune responses. Recent studies have discovered two important signaling pathways that activate the host innate immunity against viral infection. One of these pathways utilizes members of Toll-like receptor (TLR) family and the other uses the RNA helicase retinoic acid inducible gene I (RIG-I) as the receptors for intracellular viral double stranded RNA (dsRNA), and activation of transcription factors. In this review article, we summarize the interaction of HCV proteins with various host receptors/sensors through one of these two pathways or both, and how they exploit these interactions to escape from host defense mechanisms. For this purpose, we searched data from Pubmed and Google Scholar. We found that three HCV proteins; Core (C), non structural 3/4 A (NS3/4A) and non structural 5A (NS5A) have direct interactions with these two pathways. Core protein only in the monomeric form stimulates TLR2 pathway assisting the virus to evade from the innate immune system. NS3/4A disrupts TLR3 and RIG-1 signaling pathways by cleaving Toll/IL-1 receptor domain-containing adapter inducing IFN-beta (TRIF) and Cardif, the two important adapter proteins of these signaling cascades respectively, thus halting the defense against HCV. NS5A downmodulates the expressions of NKG2D on natural killer cells (NK cells) via TLR4 pathway and impairs the functional ability of these cells. TLRs and RIG-1 pathways have a central role in innate immunity and despite their opposing natures to HCV proteins, when exploited together, HCV as an ever developing virus against host immunity is able to accumulate these mechanisms for near unbeatable survival.
doi:10.1186/1743-422X-9-126
PMCID: PMC3538621 PMID: 22726246
Hepatitis C virus; Toll-like receptors; Anti-viral pathways
4. Molecular epidemiology of hcv among health care workers of khyber pakhtunkhwa
Virology Journal 2011;8:105.
Background
Studies of the molecular epidemiology and risk factors for hepatitis C virus (HCV) in health care workers (HCWs) of Peshawar, Khyber Pakhtunkhwa region are scarce. Lack of awareness about the transmission of HCV and regular blood screening is contributing a great deal towards the spread of hepatitis C. This study is an attempt to investigate the prevalence of HCV and its possible association with both occupational and non-occupational risk factors among the HCWs of Peshawar.
Results
Blood samples of 824 HCWs, aged between 20-59 years were analysed for anti-HCV antibodies, HCV RNA and HCV genotypes by Immunochromatographic tests and PCR. All relevant information was obtained from the HCWs with the help of a questionnaire. The study revealed that 4.13% of the HCWs were positive for HCV antibodies, while HCV RNA was detected in 2.79% of the individuals. The most predominant HCV genotype was 3a and 2a.
Conclusion
A program for education about occupational risk factors and regular blood screening must be implemented in all healthcare setups of Khyber Pakhtunkhwa province in order to help reduce the burden of HCV infection.
doi:10.1186/1743-422X-8-105
PMCID: PMC3060846 PMID: 21385397
5. Hepatitis C in Pakistan: A Review of Available Data
Hepatitis Monthly 2010;10(3):205-214.
Hepatitis C virus (HCV) infection is increasingly recognized as a major health care problem, and is found frequently in Pakistani settings. In this article we reviewed published and unpublished data related to the seroepidemiology of HCV infection in Pakistan. For this article, data from 132 published studies and three unpublished data sets published/ presented between the period 1992-2008 were utilized. Data of 1,183,329 individuals were gathered. Blood donors (982,481) and the general population (178,322) constituted the majority of these subjects. The frequency of HCV infection in blood donors and in the general population was 3.0 % (95% CI: 3.0- 3.1) and 4.7 (95% CI: 4.6 -4.8), respectively. The frequency among 6,148 pregnant females was 7.3% (95% CI = 6.7 – 8.0). The frequency in healthy children ranged from 0.4 to 4.1% (95% CI = 1.4 – 2.3). Pakistani HCV serofrequency figures are significantly higher (P < 0.0001) compared to those of the corresponding populations in surrounding countries like India, Nepal, Myanmar, Iran and Afghanistan.
PMCID: PMC3269085 PMID: 22308140
Hepatitis C Virus; Anti-HCV; Pakistan; Serofrequency
6. 2-(3-Methylbut-2-en-1-yl)-1,2-benzisothiazol-3(2H)-one 1,1-dioxide
In the title compound, C12H13NO3S, a saccharin derivative, the dihedral angle between the aromatic and isothiazole rings is 2.91 (12)°. The planar 3,3-dimethylallyl group [maximum deviation = 0.0086 (16) Å] is oriented at dihedral angles of 71.86 (7) and 74.35 (7)° with respect to the aromatic and isothiazole rings, respectively. In the crystal structure, weak intermolecular C—H⋯O interactions link the molecules into chains along the c axis. A weak C—H⋯π interaction is also present.
doi:10.1107/S1600536809012021
PMCID: PMC2977681 PMID: 21584024
Results 1-6 (6) | ESSENTIALAI-STEM |
What Are The Benefits Of Consulting A Vascular Surgeon?
Vascular disease is one of the most serious forms of health problems that can affect a person. This health problem is known to affect the blood vessels or the circulatory system. Blood vessels play a very important role in blood flow.
Your heartbeat pumps oxygen-rich and nutrient-rich blood to various parts of the body for tissue absorption. They also help in removing waste materials. If you are looking for a vascular doctor, then you may find the right vascular doctor via Vascular Institute.
vascular doctor near me
Image Source: Google
The role of a vascular physician recognizes the specific conditions that have affected an individual patient and then find ways to treat them. A qualified doctor and vascular surgeon can quickly identify problem areas and provide competent medical solutions for patients to help them recover quickly.
It is also important that every patient has access to first class medical diagnostics and treatment so that the disease can be managed and managed quickly. This is where surgery and vascular treatment come into play.
Leading vascular surgeons can help relieve a patient's pain and discomfort and provide medications and medications that can help with the condition.
By consulting with an experienced vascular surgeon you can analyze the severity of your case and then offer the right type of treatment and surgical solutions that can help relieve pain and discomfort. Therefore, consult your local vascular surgeon if you have any vascular problems. | ESSENTIALAI-STEM |
Coulter to Dems: Remind voters Trump 'hasn't kept any of his promises' | TheHill
Ann Coulter on Monday said Democrats should point out that President TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE "hasn’t kept any of his promises" in the wake of special counsel Robert MuellerRobert (Bob) Swan MuellerTrump calls for probe of Obama book deal Democrats express private disappointment with Mueller testimony Kellyanne Conway: 'I'd like to know' if Mueller read his own report MORE's report that found no evidence of collusion between the Trump campaign and Russia in the 2016 election. Coulter, a conservative commentator who has feuded with Trump over his failure so far to build a wall on the Mexican border, urged Democrats to tell voters Trump had failed to meet his promises. "Hey liberals! Hot tip for you: You want to go after Trump? Point out he hasn’t kept any of his promises," Coulter wrote on Twitter. Hey liberals! Hot tip for you: You want to go after Trump? Point out he hasn’t kept any of his promises. Democrats have opposed Trump's efforts to build a wall on the border, even passing a measure overturning his effort to declare an emergency to get the wall built. Trump vetoed that measure passed by the House and Senate. Attorney General William Barr sent a letter to Congress Sunday detailing the top-level findings of Mueller's report. His letter said the special counsel's investigation did not uncover evidence that the Trump campaign conspired or coordinated with the Russian government to interfere in the 2016 election — something which Trump and supporters have jumped on as clearing the president. While Mueller's team did not reach a conclusion on whether Trump obstructed justice while in the presidency, Barr said he and Deputy Attorney General Rod RosensteinRod RosensteinWhy the presumption of innocence doesn't apply to Trump McCabe sues FBI, DOJ, blames Trump for his firing Rosenstein: Trump should focus on preventing people from 'becoming violent white supremacists' MORE decided not to pursue an obstruction charge after reviewing the special counsel's findings. Coulter, once a prominent and vocal supporter of Trump, has repeatedly criticized the president in recent months over the negotiations on the wall. She criticized him for “folding” on the proposed border wall with Mexico by agreeing to a short-term spending deal to end the 35-day government shutdown without guaranteeing funding for the wall. Coulter also called Trump's State of the Union address earlier this year the “lamest, sappiest, most intentionally tear-jerking SOTU ever." View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Surface Finish: ENIG vs HASL
The full name of ENIG is Electroless Nickel/Immersion Gold, which is abbreviated as ENIG. In Chinese, it is called Electroless nickel immersion gold, chemical nickel gold or precipitated nickel gold. It is a type of PCB surface treatment process. ENIG is mainly used for surface treatment of circuit boards. It is used to prevent copper oxidation or corrosion on the surface of circuit boards. It is also used for welding and contact applications (such as buttons, gold fingers on memory modules, etc.)
Advantages:
(1) Surface smoothness (relative to tin spraying, etc.);
(2) It can be soldered, wired (gold wire, aluminum wire), and has good heat dissipation;
(3) Long storage time (more than 1 year in Vacuum packing);
(4) The SMT process is resistant to multiple reflow soldering and can be reworked multiple times.
(5) The thickness of ordinary plate nickel is generally 120-200u “, and the thickness of gold is 1-5u”; The general thickness of the nickel plated wire is 10u “or more, and the nickel thickness is 150u” or more.
HASL (Hot Air Solder Level)
The HASL process, commonly known as tin spraying or hot air leveling, involves immersing a PCB in molten solder and then blowing off excess solder on the surface and holes through strong hot air to obtain a bright coating. One method is to use lead-tin alloy, with a lead sprayed tin furnace temperature of around 240 degrees Celsius. The other method is to use pure tin, which is prohibited in many European countries due to the significant harm of lead to human health. Therefore, it is now popular to use pure tin or lead-free spray tin (LFHASL). The lead-free furnace has a temperature of up to 300 degrees Celsius, coupled with high temperature and high corrosion in the operating environment, which poses great harm to PCBs. Moreover, the surface smoothness is far inferior to that of chemical treatment. Advantages: good soldering performance, good reliability. Disadvantages: poor leveling and plug hole problems, high requirements for green oil, plate and lamination bonding force, and hidden dangers of plate bending and warping. The method to avoid this is to use high Tg plate material and PP, Only the cost of sheet metal increases by 100 yuan/m2 (calculated based on double-sided panels).
The most widely used surface treatment is HASL (Hot Air Solder Leveling). The production process involves immersing the PCB in molten solder and then using a hot air knife to remove excess parts, leaving the solder layer as thin as possible. This is usually the cheapest to complete and a great choice for general boards. One disadvantage of HASL is that even after the hot air knife has removed as much excess as possible, the meniscus of the solder still causes the edges of the solder pad to become slightly rounded. This may lead to inaccurate placement of components and visual issues with reference markings.
ENIG vs HASL, which one you prefer to choose?
Opcba.com provides customers with professional and efficient PCB customization and PCB assembly services. Please contact us to inquire about your questions.
Similar Posts
Leave a Reply | ESSENTIALAI-STEM |
DEV Community
timtsoitt
timtsoitt
Posted on • Originally published at Medium on
Firewalls cannot save you from DDoS attacks!
You might argue that my headline is incorrect as WAFs can provide some level of DDoS protection. The reason I write this headline is that there are many people somehow treat firewall as panacea.
What is DDOS?
To start with, you have to understand there are two types of DDoS attack, they are volumetric DDoS attacks and non-volumetric DDoS attacks.
Non-volumetric DDoS attacks
If someone says firewall can help to protect you from DDoS attacks, they are actaully referring to non-volumetric DDoS attacks. Bascailly Attackers will try to send out a specifically crafted packets, causing your applications fail to respond to legitmative requests, or even crashing your applications.
One famous attack is called low & slow attack. When the server respond to the requests from the DDoS attack, attackers will manipulate the connection by send out response in a possible slowest rate, slightly under connection timeout to avoid connection reset. Since there is a connection limit, when these manupulated connection occupy all the available connections, legitmative request can neven establish connection to the server.
These kinds of non-volumetric DDoS attacks usually come with signitures, such as having the same source ip, same payload. Whenever Web Application Firewall (WAF) identify the signitures, it can block malicious requests from reaching your server.
Volumetric DDoS attacks
As the name implies, volumetric means the attacker is trying to send overwhelming traffic to your server. The objective of this attack is to exhaust your network bandwidth. There is no way to stop volumetric DDoS attacks. The golden rule is you have more available bandwidth than the bandwidth that attackers are capable to consume.
In reality, you won't have such amount of bandwidth available becuase you have to pay for it. While a big cooperation maybe owning 10Gb bandwidth, nowadays biggest DDoS attacks is talking about terabit level.
Think of a trillion of people (DDoS attacks) are surrounding your house (Server). Although they don’t have the key to enter your house (Firewall blocks the connections), your family members (Normal users) are also in trouble to enter your house because the road is super crowded now (Bandwidth exhausted). You can’t force these people to leave because the road is not owned by you. (Bandwidth is owned by ISP and you just pay for the right of using the bandwidth)
Where is the myth coming from?
To answer this question, I think of several possible reasons.
Firewall this word is too overloaded
There are many type of firewalls, it can be hardware firewalls, host firewalls (Windows Defender, iptables, ufw).
People sometimes interchange the word of WAF and firewall. However to laymans, most probably firewall means Windows Defender to them. It is common that the knowledge they preceived eventually becomes Windows Defender can mitigate DDoS attacks. It is a bit funny, the sad truth is that I have heard of similar statements multiple times in the past.
Use of inaccurate word
Use of Word should be accurate. However it does not always apply to real world conversation. To people who are familar with DDoS attacks, they often will use the word mitigate, i.e to mitigate DDoS attacks.
I have heard of many alternative words when people are talking about mitigating DDoS attacks, such as stop, prevent. These alternative words are really confusing (and also incorrect). It is not surprising that when people often say/hear stop DDoS attacks, they will really believe DDoS attacks can be stopped.
And now the statement becomes Windows Defender can stop DDoS attacks...
In practical there is no way to stop DDoS attacks, not to mention prevent DDoS attacks. Instead, DDOS protection focuses on minimizing the impact of DDoS attacks.
How to mitigate DDoS attacks?
Short version
Cloudflare.
Long version
There is a term called Script Kiddle. It refers to some amateur hackers using existing softwares to hack people for fun. There are lots of hacking tools off the shelf to initiate DDoS attacks. If you are suffering from volumetric ddos attacks, the truth is it might be just a young kid running hacking tools behind.
Initiating DDoS attacks is such easy and buying bandwidth is costly. Paying for companies (such as Cloudflare) who are specilaized in DDoS protection is a much more viable and cheaper choice. Moreover, these kind of DDoS protection ofter embedded with WAF capability. By subscribing to DDoS protection service, you have protection from both non-volumetric and volumetric DDoS attacks.
Conclusion
Please use these statements from now on.
WAFs can be used to mitigate non-volumetric DDoS attacks.
and
Contact DDoS protection service providers if you need to mitigate DDoS attacks.
Readings
Introduction of DDoS
Record high of DDOS
Top comments (3)
Collapse
dasanasak profile image
Dosa Nasyak
Cloudflare is not the best option for anti-ddos. They have a good CDN, but it is better to look for protection elsewhere.
Collapse
nikmikhailov_ profile image
Nik Mikhailov
What will definitely protect you is a good protection provider. Spend your money on some G-core or AWS and "sleep well".
Collapse
honorbertt profile image
Ho Norbert
I agree, I use Gcore, I am very pleased. Excellent service and good customer care. | ESSENTIALAI-STEM |
CORDIS - Forschungsergebnisse der EU
CORDIS
Challenges and Advancements in Virtual Elements
Periodic Reporting for period 4 - CAVE (Challenges and Advancements in Virtual Elements)
Berichtszeitraum: 2021-01-01 bis 2021-06-30
The CAVE project is collocated in the area of computational/applied mathematics with a strong connection with engineering. A mathematical model is a description of some phenomena of interest (in turn associated to some application such as weather forecast, design of an aircraft, etc..) in terms of mathematical functions and "equations". The majority of models cannot be solved by pen and paper, and thus in order to be useful need to be discretized (approximated by a numerical method and translated into a form that is edible for a computer) and solved computationally. Mathematics has a key role in designing the numerical method and guaranteeing theoretically its effectiveness. Since the majority of problems are set in some space domain (such as a piece of a vessel if one is studying blood flow, or a building if one is investigating earthquake effects, etc..) a key step in essentially all methods is some kind of discretization (decomposition) of such domain (called mesh).
The project CAVE is focused on developing an innovative numerical method for the discretization of the above models, the Virtual Element Method, and thus carrying an impact on the related applications. The novel side with respect to the pre-existing technology is related to many aspects, the first one being a much larger freedom in building the mesh, as the scheme can use any general polyhedral decomposition of the domain. Other aspects are, for instance, the capability to realize exactly certain physical conditions of the solution (such as being incompressible, or needing a higher regularity). The project has a wide theoretical foundation to be explored, in addition to practical computations and applications (such as in structural mechanics and electro-cardiology). The final goal, in a wide sense, is to develop, analyze and deliver a new method that, in many problems/situations, can yield much better (more accurate, more efficient,..) results with respect to the existing ones.
The project CAVE was successful in its main objectives, by actually developing novel discretization approaches for a wide range of problems, going from solid and fluid mechanics to electro-magnetism, that offer novel advantages with respect to existing competitors. Such developments also include (and where boosted by) a full theoretical background, plus implementation of computer codes and numerical benchmark testing. Furthermore, the Virtual Element Method enjoyed a strong growth in terms of attention and community size, both in the mathematical and in the engineering areas. As expected at the start of the action, it is still too early for embedding into the industry.
I here describe briefly the major aspects developed during the project, together with my team. We built a three-dimensional code of the scheme, since (being the Virtual Element very recent) previous developed codes where all in two dimensions. We tackled for the first time complex problems in solid mechanics, that is problems in which some elastic body undergoes a very large deformation due to large forces (or other conditions) applied; the results show an improved robustness of the new approach with respect to the main existing technology for this kind of problems. We developed in practice and analyzed theoretically a version of the scheme that, by using high order polynomials, can yield very accurate results for problems related to diffusion of substances in some porous media. The scheme can also automatically adapt the mesh and the local polynomial degree, yielding an improved efficiency. We developed in practice and analyzed theoretically the VE method for problems in electro-magnetism, starting from the development of the discrete spaces needed for the numerical discretization, then tackling first magneto-statics and then the full time-dependent Maxwell equations. We developed the method for problems in fluid dynamics, in such a way that the incompressibility constraint (present in many fluids) is exactly represented at the numerical level, thus yielding a more faithful approximation of certain properties of the solution. We also explored in deep the discrete structure behind such important constraint and tackled model applicative problems such as that of a leaflet immersed in a fluid or the displacement of miscible fluids in porous media. Finally, we extended the methodology to the case of an exact curved geometry representation, so that the domain of interest does not need to be approximated by a facet-like description. Such exploration included also interesting applications in solid mechanics, in collaboration with engineers, such as contact problems and statistical homogenization of fiber-reinforced composites. The results above are published in open access on (often top level) international journals with peer review, and disseminated worldwide through talks at international congresses and seminars in external departments. Shareware codes (and introductory slides) are available at the group webpage and more are available by emailing directly the group members.
The expectations are to develop the Virtual Element Method as an innovative numerical construction for the discretization of models of interest, carrying an impact on the related applications. The scheme will allow to use any general polyhedral decomposition of the domain (a very important asset that yields a wide field of advantages), the capability to realize exactly certain physical conditions of the solution (such as being incompressible, or needing a higher regularity) and a potentially improved robustness to mesh distortions. The final goal, in a wide sense, is to develop, analyze and deliver a new method that, in many problems/situations, can yield much better (more accurate, more efficient,..) results with respect to the existing ones.
Sample polyhedral mesh | ESSENTIALAI-STEM |
Chaeron of Megalopolis
Chaeron of Megalopolis was the man who, shortly before the birth of Alexander, 356 BC, was sent by Philip to consult the Delphic oracle about the snake which he had seen with Olympias in her chamber and the peculiar dream he had had in which supposedly "a thunderbolt fell into her womb [and]..much fire sprung up". (Plutarch. Alex. 2,3.)
He may be the same person as the Chaeron who, in the speech attributed by some to Demosthenes, is mentioned as having been made tyrant of Pellene by Alexander (comp. Fabric. Bibl. Grace, b. ii. ch. 26), whom Athenaeus (xi. p. 509) describes as having been a pupil both of Plato and Xenocrates. He is said to have conducted himself very tyrannically at Pellene, banishing the chief men of the state, and giving their property and wives to their slaves. Athenaeus speaks of his cruelty and oppression as the natural effect of Plato's principles in the "Republic" and the Laws. | WIKI |
Gülhan Şen
Gülhan Şen (born July 16, 1978) is a -Bulgarian-Turkish television presenter, producer and speaker.
Biography
Gülhan Şen was born in Shumen, Bulgaria and completed primary school there. In 1985, her name changed to Galina Hristova Mihaylova due to a compulsory name change law, and a compulsory immigration law applied to Turks brought her to Turkey in 1989.
Şen graduated from Muhsin Adil Binal Secondary School and Kabataş High School in Turkey, and studied radio and television at Istanbul University Communication Faculty. In London, Şen took courses on "Television News and Programs Preparation" at Reuters News Agency.
Career
Şen worked at HBB, BRT, Star TV and CNN Türk. After directing Türk Sinemasi 2003 ("Turkish Cinema 2003") and Sis Bulutunun Ardında: Alzheimer ("Fog Clouds: Alzheimer"), she carried on her career by preparing, presenting and directing for the TV 8 Zamanın Ruhu: Zeitgeist ("Spirit of Time: Zeitgeist") programme. On 3 October 2007, her new programme Gülhan'ın Galaksi Rehberi ("Gülhan's Guide to the Galaxy"), a travel show primarily about travel abroad, began on TV 8.
Productions
* Stardust (Star TV, 2002)
* Eğitim ve Kariyer ("Education and Career", CNN Türk, 2003)
* Zamanın Ruhu: Zeitgeist ("When Spirit: Zeitgeist", TV8, 2004–2007)
* Bayanlar Baylar ("Ladies and Gentlemen ", TV8, 2006)
* Gülhan'ın Galaksi Rehberi ("Gülhan's Guide to the Galaxy", TV8, later TRT Haber, 2007–)
* Pür Dikkat (TV8, 2009)
* Kanalizasyon (2009) – Presenter
* İşler Güçler (2012) – Deniz | WIKI |
Ernestina
Ernestina may refer to:
People
* Ernestina Cravello (1880–1942), Italian-American anarcha-feminist
* Clodoaldo de Oliveira, a Brazilian footballer
* Ernestina Edem Appiah, a Ghanaian social entrepreneur
* Ernestina Herrera de Noble (1925–2017), Argentine publisher and executive
* Ernestina A. López (1879–1965), Argentine educator and women's rights activist
* Ernestina "Titina" Silá (1943-1973) Bissau-Guinean revolutionary
Places
* Ernestina, Rio Grande do Sul, a municipality in Brazil
* Santa Ernestina, a municipality in Brazil
* Ernestina, Queensland, a former rural locality in Queensland, Australia, now amalgamated into the locality of Longreach
Other
* Effie M. Morrissey, a schooner now known as Ernestina | WIKI |
Talk:Electronic Instrument System
Untitled
I have taken this content, with only formatting changes, from the following source:. This is the Transportation Safety Board of Canada, and its license states that the information is free to be copied and modified for non-commercial use. I assume that would include publishing on Wikipedia. I shall have to leave it to someone with the expertise to do this to decide and add the necessary attribution in the document if this is what's required. The license info is available here.
There is a corresponding image that shows an annotated view of the MD-11 cockpit that I would have included, but Wikimedia Commons does not allow "for noncommercial use only" licenses. I don't know if this image could be added or referenced by some other means. Here's a link to the relevant image--Tim.spears 23:15, 9 July 2007 (UTC)
Format
This thing is a monster.. But I will try formating it the best I can is there anyone who actually knows about this stuff that could possibly research quickly what all the abbreviations stand for if anyone looks here... — Preceding unsigned comment added by K.Hollingsworth486 (talk • contribs) 20:11, 8 August 2012 (UTC)
* In its unreferenced state, I'd recommend redirecting this page to Electronic flight instrument system. Any thoughts? Ryan Vesey 20:18, 8 August 2012 (UTC)
possible copyright issue
Based on the comment above on sourcing, this is potentially a copyright violation. The original page is gone but the Wayback Machine has a copy here. The notice on acceptable use of the content is gone but the Wayback Machine has it archived too. As noted above, the material cannot be reproduced for commercial use, and as such, it is not compatible with the licensing on Wikipedia. -- Whpq (talk) 21:07, 8 August 2012 (UTC)
* I'm going to speed this up then and redirect it. I'll ask an admin for revdeletion. Ryan Vesey 21:10, 8 August 2012 (UTC)
* The problem is, the wayback machine will always have that copy that is a copyvio. Even if I speedy delete the article, it will exist there. I'm not completely sure what the right answer is, but I need to first see if the original is a true wholesale infrigement, or just a paraphrasing before I know if it needs revdel. Will look into that now. Dennis Brown - 2¢ © Join WER 21:16, 8 August 2012 (UTC)
* I would say that the simplest solution would be to delete the article. A redirect, if warranted, can then be created after article deletion. I looked at the history and it was copied at article creation and appears to have been that way in all iterations. -- Whpq (talk) 21:20, 8 August 2012 (UTC)
* What do you mean the wayback machine will always have a copy that is copyvio? Ryan Vesey 21:22, 8 August 2012 (UTC)
* The wayback machine will always have that cached copy, there is no way for us to change the wayback machine, not our website. They have copies of all sites, for many many dates. That is what they do, take snapshots of current states of website, and archive them forever. I did revdel here, which was a very ugly but easy way to deal with the licensing issue, and it can be undone if needed. Making a redirect was the best solution. Dennis Brown - 2¢ © Join WER 21:28, 8 August 2012 (UTC) | WIKI |
Talk:Rhea Chakraborty
Rhea Chakraborty tops the list of Times 50 Most Desirable Women of 2020
Please add Rhea Chakraborty tops the list of Times 50 Most Desirable Women of 2020
Extended-confirmed-protected edit request on 3 October 2021
Change the name of Rhea's character in movie Chehre from "Aana" to "Anna". <IP_ADDRESS> (talk) 14:34, 3 October 2021 (UTC)
* ✅ Thanks for pointing that out! Eevee01(talk) 15:02, 3 October 2021 (UTC) | WIKI |
Hain Q4 Earnings Outshine Estimates - Analyst Blog
Strong sales performance led The Hain Celestial Group, Inc . ( HAIN ) to come up with better-than-expected fourth-quarter fiscal 2013 results. The company's adjusted quarterly earnings of 65 cents a share surpassed the Zacks Consensus Estimate of 62 cents and surged 38.3% year over year. On a reported basis, earnings increased 6% to 53 cents.
Management stated that a healthy industry trend, consumer demand and new products facilitated the company to come up with highest quarterly sales. The top line jumped 32.1% to $463.5 million and surpassed the Zacks Consensus Estimate of $452 million.
Net sales in the United States increased 17.6% year over year to $285.2 million during the quarter, while net sales in the United Kingdom more than doubled to $121.1 million. Operations in Canada and Europe, witnessed a 10.8% increase in net sales to $57.1 million.
The company registered increased consumption in core categories with robust contribution from Earth's Best, MaraNatha, Spectrum, The Greek Gods, Jason, Danival, Alba Botanica and Linda McCartney. Hain Celestial also experienced solid sales across recently acquired brands including Hartley's, BluePrint, Sun-Pat and Ella's Kitchen.
Adjusted gross profit surged 33.9% year over year to $125.1 million during the quarter, whereas adjusted gross margin expanded 40 basis points to 27%, reflecting increased sales and improved product mix. Adjusted operating income jumped 37.2% to $49.7 million in the quarter, while adjusted operating margin expanded approximately 40 basis points to 10.7%.
Other Financial Details
This Zacks Rank #3 (Hold) company ended the quarter with cash and cash equivalents of $41.3 million, total long-term debt of $665.9 million and shareholders' equity of $1,201.6 million, reflecting a debt-to-capitalization of 35.7%. Cash flow from operating activities for the trailing 12 months was $121 million and capital expenditures were $72.9 million, resulting in free cash flow of $48.1 million.
Outlook
We believe that the company will sustain the strong momentum across entire business segments as it remains well positioned to capitalize on the growing global demand for organic products.
Alongside, Hain Celestial anticipates sales in the range of $2,025 million to $2,050 million in fiscal 2014, reflecting a year-over-year increase of 17%. Earnings are projected in the range of $2.95 to $3.05 per share, up 16% to 20% year over year.
Other Stocks to Consider
Until any further upward revision in the Zacks Rank of Hain Celestial, other stocks that look promising in the food industry include Pinnacle Foods Inc . ( PF ) that carries a Zacks Rank #1 (Strong Buy). The Chefs' Warehouse, Inc . ( CHEF ) and Kraft Foods Group, Inc . ( KRFT ), both carrying a Zacks Rank #2 (Buy) are also worth considering.
CHEFS WAREHOUSE (CHEF): Free Stock Analysis Report
HAIN CELESTIAL (HAIN): Free Stock Analysis Report
KRAFT FOODS GRP (KRFT): Free Stock Analysis Report
PINNACLE FOODS (PF): Free Stock Analysis Report
To read this article on Zacks.com click here.
Zacks Investment Research
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
How to Deal with Turbulence Anxiety: Effective Strategies
Written by:
published on:
Updated on:
Contents:
Note: Your support drives Find-A-Therapist. We earn a commission if you purchase services through our ads.
Looking for a therapist?
Dealing with turbulence anxiety is a common challenge for many air travelers. Turbulence, the often unexpected bumps and jolts experienced during flight, can trigger anxiety even in seasoned passengers.
The fear stems from a lack of control and the unpredictability of these aerial conditions. While turbulence is a normal and typically harmless part of flying, the associated anxiety can significantly impact a passenger’s comfort and overall travel experience.
Experts suggest several strategies to cope with this anxiety. One key approach is understanding that turbulence is a regular occurrence and that aircraft are designed to withstand it.
In addition, passengers are encouraged to become familiar with the safety features of the aircraft and listen carefully to the pre-flight safety demonstration. Deep breathing exercises, staying hydrated, and avoiding caffeine and alcohol can also help manage physiological responses to anxiety.
For those whose anxiety persists despite these measures, it may be beneficial to consult with a mental health professional who specializes in the fear of flying.
They can provide personalized techniques and potentially recommend therapeutic interventions that can reduce the intensity of turbulence anxiety over time.
Engaging with support groups or educational resources on air travel can further demystify the experience and help passengers gain confidence in their ability to manage their apprehension.
Explore emotional well-being with BetterHelp – your partner in affordable online therapy. With 30,000+ licensed therapists and plans starting from only $65 per week, BetterHelp makes self-care accessible to all. Complete the questionnaire to match with the right therapist.
Note: We collaborate with top-tier mental health companies and receive advertising fees from purchases through the BetterHelp links.
Understanding Turbulence
How to deal with turbulence
To effectively manage turbulence anxiety, one must first comprehend the mechanics of air turbulence and distinguish between reality and common misconceptions.
Causes of Turbulence
Turbulence is primarily caused by the natural phenomenon of air movement within the Earth’s atmosphere. It can occur when wind sweeps across irregular ground surfaces or obstacles, creating swirling eddies.
Variations in air temperature, which affect air density, can also lead to turbulence. This is particularly prevalent near the equator where the sun heats the Earth’s surface intensely.
At high altitudes, the jet stream, a fast-flowing river of air, can result in choppy conditions for aircraft due to its significant wind speeds and the shifting zones of different temperatures and pressures it creates.
Myths Versus Facts
MythFact
Turbulence can cause an aircraft to crash.Modern aircraft are designed to withstand even severe turbulence, and pilots are trained to navigate through it safely.
Turbulence is completely unpredictable.While turbulence can be unexpected, meteorologists and pilots use technology to forecast areas of potential turbulence, including monitoring the jet stream and storm patterns.
Severity Levels
Turbulence intensity can range from mild to severe and is classified as follows:
LevelDescription
Light TurbulenceCauses slight, rapid, and somewhat rhythmic bumpiness without significant changes in altitude or attitude.
Moderate TurbulenceResults in rapid bumps or jolts, with some difficulty in walking or holding onto objects. Unsecured objects may be displaced.
Severe TurbulenceCauses large, abrupt changes in altitude or attitude, with considerable strain against seat belts and difficulty in controlling the aircraft.
While turbulence is influenced by a myriad of factors, including the Earth’s rotation which affects linear speed and centrifugal force, and mixing of air currents of varying temperatures and speeds, it remains a normal and navigable part of flying.
Physiological Response to Turbulence
Turbulence anxiety
When experiencing turbulence, the body may exhibit signs of stress as part of the physiological response to what it perceives as a threat.
This section will delve into the biological mechanisms underpinning such reactions and ways to manage these involuntary responses.
Understanding Fear and Anxiety
Fear and anxiety are natural responses to perceived threats.
During turbulence, an individual’s sympathetic nervous system activates, releasing stress hormones, such as adrenaline, that prepare the body to either fight or flee where alertness increases, heart rate accelerates, and muscles tense.
This “alarm” response heightens one’s senses and readies the body for action.
Managing Panic and Stress Reactions
To manage panic and stress reactions, it’s essential to engage the parasympathetic nervous system, the body’s natural counterbalance to stress.
This can be achieved through deep, rhythmic breathing which helps to reduce the stress response and elicit a state of calm.
Evidence of individuals managing stress by controlling their response to challenging situations hints at the applicability of such techniques in managing distress during turbulence.
Additionally, focused distraction such as listening to music or practicing mindfulness can divert attention away from anxiety.
By recognizing and understanding these physiological signs of anxiety and nervousness, individuals can employ techniques to manage their response, ensuring that the distress experienced is addressed in a confident and proactive manner.
Practical Tips to Handle Turbulence
How to stay calm during turbulence
Dealing with turbulence anxiety effectively involves a combination of controlled breathing, mental distraction strategies, and cognitive behavioral techniques.
These methods can significantly help fearful fliers manage their stress responses during turbulent flights.
Breathing Techniques
One of the first steps in controlling turbulence anxiety is to practice deep breathing. Inhale slowly through the nose, allowing the stomach to expand, and then exhale slowly through the mouth.
This can decrease the physiological symptoms of anxiety.
• Inhale: Slowly count to five while breathing in.
• Hold: Hold the breath for a count of three.
• Exhale: Breathe out slowly to the count of five.
Distraction and Focus Strategies
Redirect attention by solving a puzzle, reading, or engaging in a conversation. These activities require focus and can provide a helpful distraction from the anxiety caused by turbulence.
PuzzlesReadingConversation
Crosswords, Sudoku, or a game on a device.A book or magazine that requires concentration.Discuss an interesting topic with a seatmate or flight attendant.
Cognitive Behavioral Approaches
For frequent fliers or those with severe turbulence anxiety, working with a therapist using exposure therapy can be useful.
It involves gradual exposure to the sensation of turbulence in a controlled environment, reducing fear over time.
Guided ImageryVirtual Reality Simulations
Therapist helps visualize a flight with turbulence while practicing relaxation techniques.Some therapists offer virtual reality sessions to mimic the experience of turbulence.
Common Concerns Addressed
Fear of turbulence
When discussing turbulence anxiety, it’s crucial for passengers to understand the realities of flight turbulence.
The subsequent subsections provide clear facts on potential injuries, reporting practices, and strategies to manage fear.
Risks of Injuries
Severe turbulence can lead to injuries if passengers are not securely fastened in their seats with their seatbelts. However, incidents where a plane falls drastically are extremely rare.
The Federal Aviation Administration (FAA) mandates that all passengers comply with the seatbelt sign to mitigate this danger.
Despite sensationalized media narratives the likelihood of needing medical attention due to in-flight injuries is comparatively low.
Incidence and Reporting
Instances of severe turbulence are meticulously reported by airlines and monitored by aviation authorities.
Contrary to some exaggerated media reports that may create a distorted image of the dangers of flying, airlines have strict protocols for reporting any turbulence incidents.
This helps ensure transparency and collects data to continually improve passenger safety.
Mitigating Fear During Flight
Passengers can take steps to mitigate fear during flights experiencing turbulence. One method is to understand that pilots are trained to handle various turbulence levels and prioritize safety over speed or convenience.
While stories of a plane needing to make an emergency landing due to turbulence might be alarming, these are precautionary measures rather than indicators of impending danger.
Passengers can also distract themselves with in-flight entertainment or relaxation techniques to reduce anxiety.
Preparing for Your Flight
How to overcome fear of turbulence
To ensure a comfortable journey and manage anxiety, key aspects such as seat selection, gathering pre-flight information, and creating a personal coping strategy are essential.
Choosing the Right Seat
Selecting the right seat on an aircraft can significantly affect one’s experience, especially when concerned about turbulence.
Seats over the wings generally experience less motion during turbulence, potentially offering a smoother flight.
Flight experts often recommend aisle seats for easy access, which can help reduce feelings of confinement that may exacerbate anxiety.
Pre-Flight Research
Staying informed about the flight and potential weather conditions can help prepare for the possibility of turbulence.
One might check aviation news for updates on the route or consult the International Air Transport Association (IATA) to understand airline safety measures.
Creating a Personal Coping Plan
Developing a personal plan to cope with turbulence can provide a sense of control and alleviate anxiety.
Such a plan may involve activities to divert attention, like reading or listening to music, and using deep-breathing techniques when the seat belt sign illuminates.
Understanding that modern aircraft are designed to withstand storm instability also helps passengers maintain their composure during flights.
Frequently Asked Questions
Frequently Asked Questions
What are the best strategies for managing anxiety during flight turbulence?
One of the best strategies is to familiarize oneself with the normalcy of turbulence; understanding that it is a common part of flying can alleviate fear.
Breathing exercises and listening to calming music can also help maintain a sense of control during bumpy conditions.
During what times of the year is flight turbulence most common?
Flight turbulence is most likely to occur during the late spring and summer months due to the occurrence of thunderstorms and convective currents. However, jet streams can cause turbulence during the winter months as well.
How can passengers transform their experience of turbulence into a more enjoyable one?
Passengers can reframe their experience by viewing turbulence as a normal occurrence akin to potholes on the road.
Using the time to immerse in an engaging activity like reading or watching a movie can also distract from the turbulence.
What methods are effective in reducing nausea and sickness due to turbulence?
To reduce nausea, passengers can focus on steady, deep breaths and avoid reading or looking downGinger, whether in the form of candies, tea, or supplements, is known to be an effective natural remedy for motion sickness.
What safety measures do airplanes have in place to handle severe turbulence?
Airplanes are equipped with advanced technology to detect and avoid severe weather and turbulence, and pilots are trained extensively to navigate turbulent conditions.
Aircraft design also ensures planes can withstand with much greater stresses than those encountered during routine turbulence.
What techniques can help overcome a general fear of flying?
Techniques like Cognitive Behavioral Therapy (CBT) are often recommended to address the underlying thoughts contributing to a fear of flying.
Classes offered by airlines and sessions with professional therapists specializing in phobias can empower passengers to confront and overcome their fears.
Additional Resources
Prioritizing our mental well-being is paramount in today’s fast-paced world. The digital age has redefined therapy and psychiatric care, making support more accessible than ever. To guide you towards a healthier state of mind, we’ve partnered with pioneering names in mental health.
Note: We collaborate with top-tier mental health companies and we earn a commission if you purchase services through our ads.
Online Therapy
Discover a path to emotional well-being with BetterHelp – your partner in convenient and affordable online therapy. With a vast network of 30,000+ licensed therapists, they’re committed to helping you find the one to support your needs. Take advantage of their Free Online Assessment, and connect with a therapist who truly understands you. Begin your journey today.
Relationship Counceling
Whether you’re facing communication challenges, trust issues, or simply seeking to strengthen your connection, ReGain’s experienced therapists are here to guide you and your partner toward a healthier, happier connection from the comfort of your own space. Get started.
Therapist Directory
Discover the perfect therapist who aligns with your goals and preferences, allowing you to take charge of your mental health. Whether you’re searching for a specialist based on your unique needs, experience level, insurance coverage, budget, or location, our user-friendly platform has you covered. Search here.
About the author
Eliana Galindo
Eliana is a dedicated psychologist from Colombia who has gained extensive experience and made significant contributions in child development, clinical psychology, and rehabilitation psychology. Her work as a rehabilitation psychologist with disabled children has been transformative and compassionate. In the child development field, she creates nurturing environments through assessments, interventions, and collaboration with families. In clinical psychology, she supports individuals overcoming mental health challenges with empathy and evidence-based approaches. Inspired by her experiences, Eliana is motivated to write about mental health, aiming to raise awareness and advocate for a compassionate and inclusive approach to well-being.
You might also be interested in
Disclaimers
In some articles, we include products we think are useful for our readers. When you buy through these links on our site, we may earn an affiliate commission at no cost to you.
Information on our website is for educational and informational purposes only. You should not rely on this information as a substitute, nor does it replace professional medical advice, diagnosis, or treatment.
If you have any concerns or questions about your health, you should always consult with a mental healthcare professional.
Online Therapy, Your Way
Discover the ease of starting therapy with BetterHelp. Complete the assessment and connect with a licensed professional therapist online.
Note: We earn a commission if you purchase services through our ads. | ESSENTIALAI-STEM |
Series Mania
Series Mania (Festival Séries Mania) is an international festival dedicated to television series, held annually in Lille, France. It is the largest TV series event in Europe and an important premiere platform. Series Mania comprises an institute of the same name, a forum for industry professionals, and a one-day summit Little Dialogues.
Profile
The festival was established in 2010 by Laurence Herszberg. Initially it was hosted at the Forum des Images in Paris and started off with 250 industry attendees. In 2016, the government announced a competition between host cities for the best project of the festival's organization, which was won by the city of Lille. It bought the Séries Mania trademark from the city of Paris and has hosted the event since 2018. Still, the Centre National du Cinéma et de l'Image Animée in Paris remains the festival's important venue.
The festival's sections are International Competition, French Competition, International Panorama Competition, Short Forms Competition, Midnight Comedies Competition, and Out of Competition Special Screenings. Within the sections, awards are given for Best Actor, Best Actress, Audience Award, etc.
In 2013, the Series Mania Forum was founded. Directed by Francesco Capurro, the Forum is an important industry event that hosts conferences, panel discussions, showcases, and Co-Pro Pitching Sessions competition. The winner and the runner-up in Co-Pro Pitching competition receive a €50,000 development prize.
Along with the main program and the Forum, Series Mania leads multiple cultural initiatives and events. The Little Dialogues is a one-day summit for industry professionals established to promote international cooperation. Launched in 2023, SERIESMAKERS initiative co-founded with Germany's Beta Group is purposed to aid projects in development with cash prize and the help of renowned consultants.
Series Mania Institute, the education and training division, was established in 2021. It became the first institution in Europe that is completely focused on training professionals in TV series. The institute offers short-term courses as well as two-year educational programs. The institute also runs a workshop in Rio de Janeiro in partnership with several Brazilian and French institutions. In 2018, the Series Mania Writers Campus was established, a week-long writing workshop for TV series writers.
By 2023, Series Mania has developed a reputation as an important global event that secures world premieres for future international hits. Such major market players as Netflix, HBO, Amazon Studios, Apple TV+, Paramount, and Disney, present their projects in Lille.
In 2023, SM's director general Herszberg announced a collaboration between Series Mania Institute and Taiwan Creative Content Agency: a workshop on international serial co-productions that will start in Lille and finish in Taiwan. Also that year the former president of the festival Rodolphe Belmer (2018–2023) stepped down and was replaced by Anne Bouverot.
2018
The 2018 edition was the first one located in Lille. Running from April 27 to May 5, the festival offered its audience 77 series, more than 1000 screenings and a wide range of special programs.
In the International Competition, the Grand Prix was awarded to On the Spectrum by Dana Idisis and Yuval Shafferman; Jury's Special Prize was given to Il Miracolo by Niccolò Ammaniti. Best Actress — Anna Mikhalkova (for An Ordinary Woman), Best Actor – Tommaso Ragno (Il Miracolo). The Marvelous Mrs. Maisel won the Audience Award. In the French Competition, the Best Series award went to Ad Vitam by Thomas Cailley and Sebastien Mounier, Anne Charrier was chosen the Best Actress for Maman a tort. Bryan Marciano (for Vingt-cinq) and Roschdy Zem (Aux Animaux la guerre) shared the Best Actor award. Kiri won in the International Panorama.
2019
The 10th anniversary edition went on March 22–30. The attendance reached 72,000. That year, Uma Thurman, Freddie Highmore, Charlie Brooker, and Marti Noxon gave masterclasses at the festival, while Eric Rochant, Hugo Blick and Dominik Moll participated in public talks. List of the premieres included Chambers, The Red Line, and many more.
The Jury Grand Prix went to The Virtues by Shane Meadows and Jack Thorne, the Special Jury Prize went to Nir Bergman and Ram Nehari's series Just for Today. Audience Award went to Mytho by Anne Berest and Fabrice Gobert, Best Actress — Marina Hands (for Mytho), Best Actor — Stephen Graham (The Virtues). In the French Competition, Apnea by Gaia Guasti, Aurélien Molas, and Julien Trousselier won the Best Series award. Carole Weyers was chosen the Best Actress (for Super Jimmy), Best Actor — Grégory Montel (for Family Shake). In the International Panorama the Best Series award went to Exit, a Norwegian drama by Petter Testmann-Koch and Øystein Karlsen.
The economic benefits of this year's edition estimated €5,273,063.
2020
The edition was canceled due to the COVID-19 pandemic. The Forum was moved online and took place from March 25 to April 7. It attracted 1,500 professionals, featuring a 54 series Buyers Showcase. However, as one of the first European digital experiences, it had its weaknesses: some projects (almost the entire French section) were not available online.
2021
The 11th edition took place from August 26 to September 2, 2021. The line-up included more than 50 series with 25 world premieres. The jury of the International Competition was headed by Hagai Levi. At the Forum, 2,500 professionals from 66 countries participated, 15 projects were selected for co-founding. The attendance exceeded 54,000.
2022
The 12th edition took place March 18–25, it attracted more than 70,000 visitors and 3300 professionals. The line-up featured 58 series from 21 countries.
The International Competition Jury consisted of Christian Berkel, Cécile de France, Shira Haas, Berkun Oya, and Yseult. Michael Hirst, Mathieu Kassovitz, Nathalie Baye, and Isabelle Nanty were Guests of Honor.
The Grand Prix in the International Competition was awarded to Le Monde De Demain. Sunshine Eyes took the Special Jury Prize, Swedish The Dark Heart won in the International Panorama. In the French Panorama, Chair Tendre won the Best Series Award. Ines Ouchaaou, Charlie Loiselie and Assa Sylla shared the Best Actress award for their performance in Reuss. Axel Granberger became the Best Actor (for Les Papillons Noirs).
330 projects from 56 countries applied for the Forum's Co-Pro Pitching Sessions.
2023
The 13th edition took place on March 17–24 and screened 54 unreleased series, hosted 32 world and 10 international premieres. For the first time, projects from Greece and Iran joined the line-up. 3,800 accredited visitors attended the edition, while the audience exceeded 85,000.
The Grand Prix was given to Navid Javidi's The Actor.
The 13th edition was seriously impacted by the all-country wave of protests against Emmanuel Macron's controversial pension reform. On March 21, protestors tried to storm the red carpet and were confronted by anti-riot police.
2024
The 14th edition took pace from March 15–22 and featured a line-up of 52 shows and 26 world premieres. More than 400 applications were received for the Co-Pro Pitching Sessions and 4400 industry professionals were accredited, while the attendance estimated 98,000. Among the big premieres, the festival hosted Netflix's 3 Body Problem.
The International Competition jury of Bérénice Bejo, Charlotte Brändström, Malick Bauer and Sofiane Zermani, headed by Zal Batmanglij, gave the Grand Prix to Yan England's Rematch. In the International Panorama, Jakob Rørvik's Dates in Real Life won the Best Series award. | WIKI |
Exxon will not say if it is seeking waiver from Russia sanctions
HOUSTON (Reuters) - Exxon Mobil Corp (XOM.N) on Wednesday declined to comment on a media report that it is seeking permission from the U.S. government to drill in several areas of the Black Sea banned by U.S. sanctions on Russia. The Wall Street Journal reported that Exxon had in recent months applied to the U.S. Treasury Department for a waiver to drill with Russian oil producer Rosneft (ROSN.MM). Any such request is likely to draw attention because Exxon’s former chief executive, Rex Tillerson, is now U.S. secretary of state. Exxon spokesman Alan Jeffers said the company does not comment on ongoing discussions with regulators. But he pointed out that it has in the past been granted permission from Treasury to keep intact Exxon’s joint venture with Rosneft, despite the sanctions. During at least three occasions in 2015 and 2016, Exxon was granted licenses allowing “limited administrative actions” in Russia, according to annual shareholder disclosures. The United States and European Union imposed economic sanctions on Russia over its annexation of the Crimea region in 2014 and role in the conflict in eastern Ukraine. Texas-based Exxon, the world’s largest publicly traded oil producer, wound down drilling in Russia’s Arctic in 2014 after those sanctions were imposed. Exxon was allowed to finish some drilling projects as the sanctions took effect. Exxon and Rosneft in 2012 had unveiled an offshore exploration partnership with plans to invest as much as $500 billion in developing Russia’s vast energy reserves in the Arctic and Black seas. Any request from Exxon to expand its business in Russia is bound to draw scrutiny from U.S. lawmakers investigating possible ties between some campaign aides of U.S. President Donald Trump and Moscow. Some Republicans in Congress, as well as some European allies, are also anxious about any sign that the Trump administration might ease some of the sanctions imposed on Russia. Tillerson was confirmed by the U.S. Senate as Secretary of State in February, and has promised to recuse himself from matters related to Exxon for a year. Reporting by Ernest Scheyder in Houston and Arathy S Nair in Bengaluru; Editing by Tiffany Wu | NEWS-MULTISOURCE |
Chinese Medicinal Formulas/Prescriptions for Resuscitation
Types of Formulas
* ../Prescriptions for Inducing Resuscitation with Cold Herbs/
* ../Warm-natured Prescriptions for Inducing Resuscitation/ | WIKI |
Godzilla, Mothra and King Ghidorah: Giant Monsters All-Out Attack
Godzilla, Mothra and King Ghidorah: Giant Monsters All-Out Attack is a 2001 film about three ancient guardian beasts who awaken to protect Japan against Godzilla.
* Directed by Shusuke Kaneko. Written by Masahiro Yokotani.
Who will be the last monster standing? (taglines)
Dialogue
* Yuri: You don't sound interested.
* Kadokura: ...Godzilla is passé.
* General Tachibana: Monsters resembling Godzilla have been seen in the United States...
* Soldier one: Wasn't that Godzilla?
* Soldier two: The Americans said it was Godzilla, but all the Japanese scientists denied it.
Taglines
* Who will be the last monster standing?
* Battle On Fire!
Cast
* Chiharu Niiyama — Yuri Tachibana
* Ryudo Uzaki — Admiral Taizo Tachibana
* Masahiro Kobayashi — Teruaki Takeda
* Shirō Sano — Haruki Kadokura
* Kaho Minami — Emori Kumi
* Shinya Ōwada — Lt. General Mikumo
* Kunio Murai — Masato Hinogaki
* Hiroyuki Watanabe — Yutaka Hirose | WIKI |
Tutorial
Convert Sandboxes into Devboxes
Convert a Sandbox into a Devbox
CodeSandbox provides two different sandboxing environments you can use to quickly experiment with code, learn, prototype a project and share it with others: Sandboxes and Devboxes.
Devboxes are part of our evolved CodeSandbox experience, so we now provide a way to easily convert existing browser sandboxes into this new experience.
Why convert into a Devbox?
Sandboxes and Devboxes are valuable tools for web development projects, but they have critical differences regarding their capabilities and limitations.
Sandboxes run directly within the user's web browser. Because they rely on browser features to provide environments for running code, they are lightweight and easy to use. Still, they do not provide the same level of scalability and isolation as virtualized environments since they rely heavily on the browser.
In contrast, Devboxes use VMs to provide an isolated and secure environment for running code. These VMs are lightweight and optimized for running web applications, and they provide a more consistent and predictable environment for running code than Sandboxes.
As a result, Devboxes get rid of several limitations of Sandboxes, while offering additional benefits when managing and scaling infrastructure. Namely, Devboxes can be easily scaled up or down to accommodate project needs, offering more resource allocation and management flexibility.
Additionally, Devboxes are collaborative by default, allowing for easier collaboration among team members, as developers can easily share their code and collaborate in real time. This sets CodeSandbox apart from other cloud development tools.
Feature comparison
Besides the benefits presented above, there are some other noteworthy features that are only available in Devboxes:
Convert a Sandbox to a Devbox
You can convert most Sandboxes into a Devbox by clicking the "Convert to Devbox" button at the top right of the Sandbox editor.
Convert Sandbox to Devbox | ESSENTIALAI-STEM |
Best practices for examples and CI
question
#1
I would like to include some worked examples in a package (distinct from unit tests).
1. Where should they go? A subdirectory in docs (will that interfere with Documenter.jl?) or in tests?
2. Is there a framework for running them within CI? For now, I just want to run each example on Travis in a fresh Julia process, and check that it completes without an error. Later on it would be nice to check the results.
3. Is there a way I can splice a file into documentation generated with Documenter.jl as Julia source code, ie between ```s?
#2
It seems that #3 has an open issue already:
#3
You can use separate groups. See Turing.jl’s test setup:
Make the example in its own module and then add that module to the module list for Documenter?
#4
For my projects I decided to just use Jupyter notebooks. It is easier for the user to play with them right away, specially if you provide a dummy function to start Jupyter in the examples folder:
I keep updating them as the project evolves. The major downside of writing separate Jupyter notebooks is that they aren’t synced with the docs. If you update them in the repository, they will be always ahead of the latest tagged version.
#5
Also, you can use NBInclude.jl to run Jupyter notebooks on Travis, and make sure that the examples aren’t broken.
#6
In Query I have an examples folder, and run them as part of my tests. I’m not super happy with that because it really slows down the build, but at least I know when something breaks.
#7
Thanks for sharing this @cstjean, can be quite useful!
#8
I have somewhat of a hack at Augmentor.jl to convert plain examples/*.jl scripts into nice looking documentation pages as well as jupyter notebooks. Its more of a curiosity than a clean solution but it does its job quite nicely
example input script: https://github.com/Evizero/Augmentor.jl/blob/master/examples/mnist_tensorflow.jl
output doc page: https://evizero.github.io/Augmentor.jl/generated/mnist_tensorflow/
output notebook: https://nbviewer.jupyter.org/github/Evizero/Augmentor.jl/blob/gh-pages/generated/mnist_tensorflow.ipynb
#9
With a bit of rejiggering, you can test doctests as part of Pkg.test. You just have to move the code for building your documentation inside your testing file (set strict = TRUE and also some messing around with file paths). I do this for all of my packages, and try to have as many tests in the form as doctests as possible.
#10
Thanks! Can you link an example of testing standalone examples? I looked at some of your packages and saw how you build the docs in runtests.jl, but found no example testing.
#11
While I got many helpful answers for questions 2 and 3, no one said anything about 1, so I guess there is no standard location for examples. I will just use examples/.
#12
So for example NumberedLines has no proper tests, only doctests. Nevertheless coverage is 96%. https://bramtayl.github.io/NumberedLines.jl/stable/
#13
Maybe there should be a standard? I remember a time when we didn’t have a real standard for the src and test folders, now there is. Maybe a similar standardization for the examples would be good?
#14
As far as I can tell, examples/ seems like an unspoken standard | ESSENTIALAI-STEM |
PEOPLE v VELING PEOPLE v HILL
Docket Nos. 93321, 93406.
Argued January 13, 1993
(Calendar Nos. 5-6).
Decided July 13, 1993.
Benjamin T. Veling, aged fifteen, was charged as an adult in the Oakland Circuit Court, pursuant to MCL 600.606; MSA 27A.606, the automatic waiver statute, with assault with intent to commit murder, and subsequently was convicted by a jury of the lesser included offense of assault with intent to do great bodily harm less than murder. The court, Alice L. Gilbert, J., on its own initiative, remanded the case to the probate court for sentencing. The Court of Appeals, Shepherd, P.J., and Michael J. Kelly and Jansen, JJ., vacated the order and remanded the case to the circuit court (Docket No. 146386). The defendant appeals.
William D. Hill, aged sixteen, was charged in the Jackson Circuit Court as an adult, pursuant to the automatic waiver statute, with assault with intent to commit murder, carrying a concealed weapon, carrying a concealed weapon with unlawful intent, three counts of possession of a firearm during the commission of a felony, and possession of cocaine. The court, Gordon W. Britten, J., granted the defendant’s motion to quash all but the assault charge on the ground that the court lacked jurisdiction over the other charges. The Court of Appeals, Doctoroff, P.J., and Marilyn J. Kelly and Jansen, JJ., denied leave to appeal (Docket No. 147853). The people seek interlocutory leave to appeal.
In an opinion by Justice Brickley, joined by Chief Justice Cavanagh, and Justices Boyle, Riley, Griffin, and Mallett, the Supreme Court held:
Circuit courts have jurisdiction to sentence juveniles charged with enumerated offenses, but convicted of nonenumerated lesser included offenses, and to try and sentence juveniles charged with both enumerated and nonenumerated offenses arising out of the same criminal transaction.
1. The automatic waiver statute, MCL 600.606; MSA 27A.606, provides circuit courts with jurisdiction to hear and determine certain enumerated offenses committed by juveniles, aged fifteen and less than seventeen, without first obtaining waiver from the probate court. The Code of Criminal Procedure is silent concerning the proper procedure following a conviction for a lesser included offense or for juveniles charged with nonenumerated offenses arising out of the same transaction as an enumerated offense. However, a construction of that silence requiring remand of these cases to the probate court for disposition is untenable.
2. Where a circuit court acquires jurisdiction of a defendant because of a felony charge, its jurisdiction is not lost because of a subsequent conviction of a lesser included misdemeanor. It would be absurd to force a court to try a case on the merits only to determine at the outcome whether it had jurisdiction to try the case in the first place. Providing circuit courts with jurisdiction to convict a juvenile of nonenumerated offenses arising out of charged enumerated offenses and of same transaction offenses even though the circuit court had original jurisdiction over only some of the offenses, provides the greatest flexibility in dealing with juvenile offenders.
3. Evidence adduced at trial determines the duty to instruct regarding lesser included offenses. If the evidence presented would support a conviction of a lesser included offense, it is error requiring reversal to refuse to give a requested instruction. Moreover, if the lesser offense is one that is necessarily included in the charged offense, the evidence always supports the lesser offense if it supports the greater.
4. To avoid double jeopardy, all charges against a defendant that arise out of a single criminal act, occurrence, episode, or transaction must be brought in one prosecution. Logic suggests that the Legislature did not intend to create inconsistency between the automatic waiver statute and double jeopardy protection. Rather, because the Legislature intended to treat juvenile offenders who engage in serious criminal activity more harshly and more like adults, it is to be assumed that it intended to treat juveniles like adults for all crimes arising out of enumerated criminal activity.
5. In Hill, the order to quash the nonenumerated counts must be vacated and the case remanded to the circuit court for trial of all charges.
6. In Veling, the order to remand to the probate court for disposition must be vacated and the court ordered to conduct a hearing to determine if the best interests of the defendant and the public would be served by remanding the case to the probate court for disposition or by sentencing him as an adult.
Hill, order vacated.
Veling, order vacated.
Justice Levin, concurring in part and dissenting in part, stated that the circuit court in Hill lacked jurisdiction to convict the defendant of the lesser included offense. Jurisdiction over juveniles, superior to that of any other court, is expressly and exclusively vested in the juvenile division of the probate court by MCL 712A.2; MSA 27.3178(598.2), subject to exceptions enumerated in MCL 600.606; MSA 27A.606, granting the circuit court jurisdiction to determine violations of certain offenses committed by juveniles. Once a juvenile is charged with an enumerated felony, the probate court’s jurisdiction is not automatically waived for all other felonies under a theory of pendent or ancillary jurisdiction in the circuit court, and the prosecutor must initiate probate court waiver proceedings in order to charge a juvenile defendant with non-enumerated felonies in the circuit court.
People v Deans, 192 Mich App 327; 480 NW2d 334 (1991), overruled in part.
People v Spearman, 195 Mich App 434; 491 NW2d 606 (1992), overruled in part.
Frank J. Kelley, Attorney General, Thomas L. Casey, Solicitor General, Richard Thompson, Prosecuting Attorney, Michael J. Modelski, Chief, Appellate Division, and Thomas S. Richards, Assistant Prosecuting Attorney, for the people in Veling.
Frank J. Kelley, Attorney General, Thomas L. Casey, Solicitor General, Joe Filip, Prosecuting Attorney, and Jerrold Schrotenboer, Chief, Appellate Division, for the people in Hill.
William E. Ziem for defendant Veling.
Mazur, Matyjaszek & Brandt, P.C. (by Alfred P. Brandt), for defendant Hill.
Brickley, J.
In 1988, the Michigan Legislature passed a package of laws that modified the manner in which courts treat the jurisdiction, adjudication, and treatment or punishment of juvenile offenders. Among the many changes was an amendment of the Revised Judicature Act giving the state’s circuit courts automatic jurisdiction to hear certain offenses committed by juveniles aged fifteen or sixteen. This amendment allows prosecutors to proceed automatically in circuit court against juvenile offenders charged with certain enumerated offenses without first having to obtain a waiver from the probate court. The amendment, in effect, divests the juvenile court of jurisdiction over certain juvenile offenders and vests that jurisdiction in the circuit courts. See People v Brooks, 184 Mich App 793; 459 NW2d 313 (1990).
In these cases of first impression, we are asked whether the automatic waiver statute allows a circuit court to retain jurisdiction to sentence a juvenile offender who, although charged with an enumerated offense, is convicted of a nonenumerated lesser included offense. Additionally, we are asked whether the statute confers jurisdiction on the circuit courts to try juvenile offenders for nonenumerated offenses arising out of the same criminal transaction as the enumerated offense in the same trial.
Our task is not made easier by the lack of clear legislative history available. All that can be reasonably gleaned from the statute itself is the notion that the Legislature must have intended to treat juvenile offenders who engage in serious criminal activity more harshly by providing adult penalties for certain crimes. For the reasons that follow, we hold that the circuit courts have jurisdiction to sentence juveniles charged with enumerated offenses but convicted of nonenumerated lesser included offenses and to try and sentence juveniles charged with both enumerated and non-enumerated offenses arising out of the same criminal transaction._
Pursuant to the automatic waiver statute, defendant was tried as an adult in circuit court, although at the time of the alleged offense he was only fifteen years old. At trial, defendant was found guilty of the lesser included offense of assault with intent to do great bodily harm less than murder.
After trial, defendant moved to remand his case to the probate court for disposition on the ground that his conviction for the lesser included offense divested the circuit court of its jurisdiction. Because assault with intent to do great bodily harm less than murder is not an offense enumerated in the automatic waiver statute, defendant contended, the circuit court had no jurisdiction to sentence him for that offense. The prosecutor countered that jurisdiction was not lost as a result of a conviction of a lesser included offense because the circuit judge had authority under the Criminal Procedure Code to conduct a hearing to determine whether defendant should be sentenced as an adult or juvenile._
Without agreeing with either party, the circuit judge, on her own initiative, remanded the case to the probate court for sentencing. Without citing any part of the statute, the circuit judge believed the automatic waiver statute gave her discretion to remand the case without fulfilling the hearing requirement. The Court of Appeals vacated the circuit court’s order and remanded this case to that court for further proceedings consistent with People v Deans, 192 Mich App 327; 480 NW2d 334 (1991). On August 7, 1992, this Court granted defendant’s application for leave to appeal. 440 Mich 889.
B. PEOPLE v HILL
As a result of events that allegedly occurred on October 15, 1991, defendant William Depree Hill was charged by a seven-count information with assault with intent to commit murder (count i), carrying a concealed weapon, carrying a concealed weapon with unlawful intent, three counts of possession of a firearm during the commission of a felony, and possession of cocaine (counts n to vii). At the time of these alleged crimes, defendant was sixteen years old.
The Jackson County prosecutor elected to charge defendant under Michigan’s automatic waiver statute. At the preliminary examination on October 24, 1991, defendant was bound over on all charges. Afterward, defendant filed a motion to dismiss counts n to vii on the ground that the circuit court lacked subject matter jurisdiction to try him. The basis for the motion was the argument that only count i allowed the defendant to be tried as an adult under the automatic waiver statute.
On December 17, 1991, the circuit judge granted defendant’s motion and quashed that part of the information charging him with counts n to vii on the ground that, of the crimes charged, the automatic waiver statute only applied to count i and so the court lacked jurisdiction over counts ii to vii. Furthermore, the court noted that the prosecutor’s proper course of action would have been to utilize the automatic waiver statute for count i and seek a traditional waiver for counts n to vii. Finally, the circuit judge adjourned the proceedings to allow the prosecutor to seek an interlocutory appeal.
The prosecutor sought the Court of Appeals review, but, relying on People v Deans, supra, the Court denied leave to appeal. On August 7, 1992, however, this Court granted the prosecutor’s motion for interlocutory leave to appeal and the case was considered with that of defendant Veling. 440 Mich 889.
II
Before the enactment of the automatic waiver statute, the juvenile division of the probate court had "[exclusive original jurisdiction superior to and regardless of the jurisdiction of any other court in proceedings concerning a child under 17 years of age . . . .” MCL 712A.2(a); MSA 27.3178(598.2)(a). In 1988, however, along with the creation of the automatic waiver statute, this section of the Revised Judicature Act was amended so that the probate court no longer had exclusive jurisdiction over all juveniles. Rather, "[t]he juvenile division of the probate court shall have jurisdiction over a child 15 years of age or older who is charged with a violation of [certain enumerated offenses], if the prosecuting attorney files a petition in juvenile court instead of authorizing a complaint and warrant.” MCL 712A.2(a)(l); MSA 27.3178(598.2)(a)(l) (emphasis added). The prosecuting attorney may authorize the filing of a complaint and warrant against that juvenile if he has "reason to believe” that the juvenile has committed certain enumerated offenses. MCL 764.1f; MSA 28.860(6). In essence, then, the 1988 changes divested the probate court of its exclusive jurisdiction over juveniles and vested in the circuit courts personal jurisdiction over those juveniles charged with enumerated life offenses. Assuming the prosecutor authorizes a complaint and warrant in the circuit court, the circuit court has personal jurisdiction over juveniles charged with enumerated life offenses.
Once personal jurisdiction is established, the magistrate must have probable cause to believe, as part of the preliminary examination, that the juvenile committed the charged enumerated offense. See MCL 766.14(2); MSA 28.932(2). If this belief is not sustained by probable cause, the magistrate must transfer the case back to the probate court, and the circuit court loses jurisdiction over the juvenile. Id. If probable cause is established, the circuit court has both personal jurisdiction over the juvenile and, of course, subject matter jurisdiction over the alleged enumerated offense.
III
As noted above, the Code of Criminal Procedure is very specific; if at the preliminary examination the magistrate finds that an enumerated offense has not been committed, the magistrate must send the case back to the probate court. The code is noticeably silent, however, concerning the proper procedure following a conviction for a lesser included offense or the procedure to be used for juveniles charged with nonenumerated offenses arising out of the same transaction as the enumerated offense. Defendants Veling and Hill would have us construe this silence as a requirement to remand these cases to the probate court for disposition. For the reasons that follow, we find such a statutory construction to be untenable.
A
In the exercise of circuit court jurisdiction over adult offenders, there is a presumption against divesting a court of its jurisdiction once it has properly attached, and any doubt is resolved in favor of retaining jurisdiction. In People v Schoeneth, 44 Mich 489; 7 NW 70 (1880), this Court established the longstanding rule that where the circuit court acquires jurisdiction over a defendant because of a felony charge, that jurisdiction is not lost because of a subsequent conviction of a lesser included misdemeanor. The Court reasoned that it would be absurd to force the court to go to trial on the merits of the charge only to determine when the verdict was rendered whether the court had jurisdiction to try the offense in the first place. Id. at 491. This rule and rationale is not only the law in Michigan, but in many other states as well.
B
Similarly, Michigan courts extend circuit court jurisdiction to all same transaction offenses an adult is alleged to have committed, even though the circuit court had original jurisdiction over only some of the offenses. For example, where an adult is charged with a felony and a misdemeanor, the circuit court has jurisdiction to dispose of the entire case, even though a circuit court has no jurisdiction over misdemeanor charges alone. The defendant in People v Loukas, 104 Mich App 204; 304 NW2d 532 (1981), was initially charged in circuit court with a felony, resisting arrest, and a misdemeanor, reckless driving (later changed to careless driving). The defendant pleaded nolo contendere to both charges, and the case proceeded to sentencing. At sentencing, the defendant argued that the circuit court could not sentence him for the misdemeanor conviction because it lacked jurisdiction to accept a plea that joined a felony count and a misdemeanor count. Id. at 206. The defendant asserted that only the district court had jurisdiction to hear misdemeanor cases. Id. at 206-207. However, the Court of Appeals held that in light of the fact the misdemeanor charge arose out of the same transaction as the felony charge, it was properly joined with the felony charge in circuit court. Id. at 207. In support of its conclusion, the Court noted that there was nothing in the statutes conferring jurisdiction on the circuit and district courts that prohibited such joining. Id.
The defendant in People v Shackelford, 146 Mich App 330; 379 NW2d 487 (1985), was tried in the circuit court for a misdemeanor charge of possession of marijuana. Jurisdiction was conferred on the circuit court because the defendant initially was charged as a second offender, a felony. After trial, however, the prosecutor moved to dismiss the second-offender charge. With only the misdemeanor conviction remaining, the defendant argued that the circuit court had no jurisdiction to pass sentence. Id. at 332-333. The Court of Appeals rejected this argument, however, on the ground that to the extent both charges were properly brought, the circuit court had jurisdiction to try both counts because they arose out of a single transaction. Id. at 333.
Finally, People v Carey, 110 Mich App 187; 312 NW2d 205 (1981), involved a defendant charged with crimes that allegedly occurred both within and outside the Detroit city limits. The defendant was tried in the Detroit Recorder’s Court for all charges, but was found guilty only of rape, the charge that allegedly occurred outside the city limits. The defendant argued that the Detroit Recorder’s Court had no jurisdiction to try him for the rape charge, because he was acquitted of the crimes that allegedly occurred within Detroit. Id. at 190. The Court rejected this argument, however, as did the Loukas and Shackelford Courts, on the ground that the Detroit Recorder’s Court had jurisdiction over all charges arising out of the same transaction. Id. As long as the court had jurisdiction to hear at least one of the charges, it could hear all the charges. The fact that the defendant was subsequently acquitted of the charges that originally conferred jurisdiction did not divest the court of its jurisdiction. Id. The court had proper jurisdiction to convict and sentence defendant on the rape charge.
C
While common law is the primary source of the duty to instruct regarding lesser included offenses, there is a statute that implicitly requires such instructions be given. Section 32 of the Code of Criminal Procedure provides:
Except as provided in subsection (2), upon an indictment for an offense, consisting of different degrees, as prescribed in this chapter, the jury, or the judge in a trial without a jury, may find the accused not guilty of the offense in the degree charged in the indictment and may fínd the accused person guilty of a degree of that offense inferior to that charged in the indictment, or of an attempt to commit that offense. [MCL 768.32(1); MSA 28.1055(1). Emphasis added.]
If the factfinder in a criminal case must be allowed to convict a defendant of a lesser included offense, it stands to reason the factfinder must be made aware of what lesser included offenses exist.
Michigan jurisprudence has established that the evidence adduced at trial determines the trial judge’s duty to instruct regarding lesser included offenses. People v Phillips, 385 Mich 30; 187 NW2d 211 (1971). If evidence has been presented that would support a conviction of a lesser included offense, it is error requiring reversal for the judge to refuse to give a requested instruction for that offense. Id. at 36. Moreover, if the lesser offense is one that is necessarily included in the charged offense, the evidence always supports the lesser offense if it supports the greater. People v Ora Jones, 395 Mich 379, 390; 236 NW2d 461 (1975).
Michigan’s statutory and interpretive case law concerning lesser included offenses require that instruction regarding such offenses be given in cases like those before us. We assume that the Legislature was aware of these mandates when enacting the automatic waiver statute and simple logic suggests that it did not intend to create an anomaly between the automatic waiver statute and jury instruction mandates.
D
With respect to constitutional mandates, this Court, in People v White, 390 Mich 245; 212 NW2d 222 (1973), held that all charges against a defendant that arise out of a single criminal act, occurrence, episode, or transaction must be brought in one prosecution. This requirement, the Court held, provided "the only meaningful approach to the constitutional protection against being placed twice in jeopardy” where the crimes were committed in a continuous time sequence and displayed a single intent and goal. Id. at 257-258.
Similarly, other states allow their adult trial courts to automatically hear nonenumerated offenses arising from the same transaction as the enumerated offense in order to avoid double jeopardy. For example, in Worthy v State, 253 Ga 661; 324 SE2d 431 (1985), the Georgia Supreme Court held that the trial court had jurisdiction to try a juvenile defendant for a charged theft when, in the same indictment, there had already been an automatic waiver to that court for a charged murder. The court found that the trial court’s jurisdiction necessarily extended to related lesser crimes arising out of the same transaction because
[t]o rule otherwise would be to bisect criminal conduct artificially and require the state to follow two procedures with no substantive meaning other than to satisfy procedural requirements, with the end result that the case involving the lesser crime would be instituted in juvenile court and transferred to the superior court, and the juvenile would still be tried for the lesser crime along with the crime giving the [trial] court concurrent jurisdiction. There is no loss of substantive protection of the juvenile, and the public’s rights should not be impeded by meaningless procedural steps which delay the judicial process and conceivably could lead to the frustration of justice under the rigorous requirements of the double jeopardy clause. [Id. at 662. Citation omitted.]
In other words, to guard against double jeopardy, the supreme court allowed the trial court to hear all charges arising out of the same criminal transaction. In doing so, the court was willing to forego the artificial procedural requirements that otherwise would have required the defendant to be tried separately on the capital and lesser offenses._
In the Hill case, double jeopardy considerations arguably would prohibit the prosecutor from trying the defendant as an adult in circuit court for the enumerated offense and also trying him as a juvenile in probate court for the nonenumerated offenses. As a result, if he cannot obtain a waiver for the nonenumerated offenses, the prosecutor must choose between trying him for the enumerated offense or for the nonenumerated offenses. Again, simple logic suggests that the Legislature did not intend to create an anomaly between the automatic waiver statute and the constitutional prohibition against double jeopardy. Where the intent of the Legislature is to treat juvenile offenders engaging in serious criminal activity more. harshly and more like adults, we assume the Legislature intended to treat juveniles like adults for all crimes arising out of enumerated criminal activity.
E
Giving the circuit court jurisdiction to hear both enumerated and nonenumerated offenses avoids an anomalous result that would work to a juvenile defendant’s disadvantage. As the prosecutor in defendant Hill’s case pointed out, under the automatic waiver statute, upon a guilty plea or conviction, the circuit judge has the option of sentencing the juvenile or remanding the case to the probate court for disposition. Under traditional waiver hearing procedures, however, once a juvenile is tried as an adult, he must be sentenced as an adult — the circuit judge has no discretion in this respect. As a result, a juvenile defendant is likely to receive a tougher sentence where the prosecutor uses the automatic waiver statute for an enumerated offense and the traditional waiver system for nonenumerated offenses. If a circuit judge must sentence a juvenile, for example, as an adult for felony-firearm (a nonenumerated offense involving a two-year mandatory prison term), he is more likely to sentence the juvenile as an adult for the underlying felony, for example, assault with intent to commit murder (an enumerated offense). If, however, the judge had sentencing discretion with respect to both the assault and the felony-firearm convictions, which he would have under the automatic waiver statute, there is at least the chance that the judge would remand both convictions to a probate judge for disposition. Allowing sentencing discretion for more serious charges but not less serious charges produces inconsistent results and would be disadvantageous to a juvenile defendant. On the other hand, giving a circuit judge sentencing discretion for both types of offenses under the automatic waiver statute provides the greatest flexibility in dealing with juvenile offenders.
IV
On the basis of this analysis, we are convinced that the Legislature did not intend by its silence in the automatic waiver statute to require the bifurcation of lesser included and same transaction offenses. We find that the Legislature intended juveniles automatically waived to be treated consistently with the parallel scheme presently in effect for adults. We are not alone in our conclusion and find satisfaction in knowing that many states treat juveniles in a similar manner._
V
Our conclusions in these cases implicate the Court of Appeals decision in People v Deans, supra. The Deans Court considered the issues raised by both defendants here. It held that the circuit court did not have jurisdiction to try a defendant for nonenumerated offenses arising out of the same transaction as the enumerated offense. 192 Mich App 330. The Court reasoned that the statute was clear and unambiguous; the enumeration of nine felonies implied the exclusion of all others. Id. Citing the Schoeneth rule quoted above, however, the Court held that the circuit court retained jurisdiction to sentence a defendant convicted of a lesser included offense, even though the court had original jurisdiction over only the enumerated offense charged.
While we agree with the second conclusion of the Deans Court, we cannot agree with its first. The conclusion regarding the same transaction offenses completely ignores the parallel treatment of adult offenders in circuit court and the policy support for retaining circuit court jurisdiction over juvenile offenders. To the extent the Deans decision and its progeny contradict the decisions we make, they must be overruled. That portion of the Deans opinion relating to the lesser included offense issue is entirely consistent with the decisions we make, and, thus, need not be disturbed.
VI
For the reasons set forth above, we conclude that the circuit courts have jurisdiction to sentence juveniles charged with enumerated offenses, but convicted of nonenumerated lesser included offenses, and to try and sentence juveniles charged with both enumerated and nonenumerated offenses arising out of the same criminal transaction. To the extent People v Deans and People v Spearman, 195 Mich App 434; 491 NW2d 606 (1992) are inconsistent with these conclusions, they are overruled. In Hill, the order to quash counts n to vn of the information should be vacated and the case remanded to the circuit court for trial of all charges. In Veling, the circuit judge’s remand order to the probate court for disposition should be vacated and the judge ordered to conduct a hearing, pursuant to MCL 769.1(3); MSA 28.1072(3), to determine if the best interests of defendant Veling and the public would be served by remanding the case to the probate court for disposition or by sentencing him as an adult.
Cavanagh, C.J., and Boyle, Riley, Griffin, and Mallett, JJ., concurred with Brickley, J.
Levin, J.
I concur in People v Veling and dissent in People v Hill for the reasons stated by the Court of Appeals in People v Deans, 192 Mich App 327; 480 NW2d 334 (1991), where the defendant, a juvenile, was charged with assault with intent to murder and other offenses, including possession of cocaine and felony-firearm.
The defendant in Deans had been automatically waived to the circuit court on assault with intent to murder. The Court of Appeals held that the circuit court did. not have jurisdiction to try the possession of cocaine and felony-firearm charges. The gist of its reasoning and holding is stated in the syllabus prepared by the reporter of decisions:
The circuit court did not have jurisdiction to try the defendant on the charges of cocaine possession and felony-firearm, and those convictions must be vacated. Jurisdiction over juveniles, superior to that of any other court, is expressly and exclusively vested in the juvenile division of the probate court by MCL 712A.2; MSA 27.3178(598.2), subject to exceptions enumerated in MCL 600.606; MSA 27A.606, granting the circuit court jurisdiction to determine violations of certain offenses committed by juveniles. Cocaine possession and felony-firearm are not among the enumerated exceptions. Once a juvénile is charged with an enumerated felony, the probate court’s jurisdiction is not automatically waived for all other felonies under a theory of pendent or ancillary jurisdiction in the circuit court, and the prosecutor must initiate probate court waiver proceedings in order to charge a juvenile defendant with nonenumerated felonies in the circuit court. [Id., pp 327-328.]
The reasoning and holding in Deans on the issues presented in Veling parallels the reasoning and holding of the majority in Veling.
Section 606 of the Revised Judicature Act provides in full:
The circuit court shall have jurisdiction to hear and determine a violation of section 83, 89, 91, 316, 317, 520b, or 529 of the Michigan penal code, Act No. 328 of the Public Acts of 1931, being sections 750.83, 750.89, 750.91, 750.316, 750.317, 750.520b, and 750.529 of the Michigan Compiled Laws, or section 7401(2)(a)(i) or 7403(2)(a)(i) of the public health code, Act No. 368 of the Public Acts of 1978, being sections 333.7401 and 333.7403 of the Michigan Compiled Laws, if committed by a juvenile 15 years of age or older and less than 17 years of age. [MCL 600.606; MSA 27A.606.]
In other words, a prosecuting attorney can proceed directly in the circuit court without having to request a waiver hearing against a juvenile aged fifteen or sixteen charged with committing the following crimes:
• Assault with intent to murder (MCL 750.83; MSA 28.278).
• Assault with intent to commit armed robbery (MCL 750.89; MSA 28.284).
• Attempted murder (MCL 750.91; MSA 28.286).
• First-degree murder (MCL 750.316; MSA 28.548).
• Second-degree murder (MCL 750.317; MSA 28.549).
• First-degree criminal sexual conduct (MCL 750.520b; MSA 28.788[2]).
. Armed robbery (MCL 750.529; MSA 28.797).
. Delivery of a controlled substance (MCL 333.7401; MSA 14.15[7401]).
• Possession of a controlled substance (MCL 333.7403; MSA 14.15[7403j).
Before the enactment of the automatic waiver statute, a juvenile could only be tried in circuit court if the prosecutor sought and received a waiver from the probate court. Michigan law provides:
If a child who has attained the age of 15 years is accused of an act which, if committed by an adult, would be a felony, the judge of probate of the county where the offense is alleged to have been committed may waive jurisdiction pursuant to this section upon motion of the prosecuting attorney. After waiver, it shall be lawful to try the child in the court having general criminal jurisdiction of the offense. [MCL 712A.4(1); MSA 27.3178(598.4X1).]
With the advent of the automatic waiver statute, this provision is no longer the exclusive means by which a prosecutor can try a juvenile in adult circuit court.
MCL 750.83; MSA 28.278. As stated in n 1, this offense is one of those specifically enumerated in the automatic waiver statute.
It is interesting to note that defendant does not contest the validity of his conviction for the nonenumerated offense, but only the court’s authority to sentence him.
MCL 769.1(3); MSA 28.1072(3) requires the circuit court to conduct a hearing to determine if the best interests of the juvenile and the public would be served by placing the offender in a juvenile facility or an adult corrections facility. The provision establishes certain criteria for the circuit judge in making this determination. Such criteria are essentially the same as those used by a probate judge in determining whether to waive jurisdiction of a juvenile to circuit court in a traditional waiver hearing. See MCL 712A.4(4); MSA 27.3178(598.4X4).
MCL 750.83; MSA 28.278.
MCL 750.227; MSA 28.424.
MCL 750.226; MSA 28.423.
MCL 750.227b; MSA 28.424(2).
MCL 333.7403(2)(a)(v); MSA 14.15(7403)(2)(a)(v).
MCL 766.14(2); MSA 28.932(2) provides:
If at the conclusion of the preliminary examination of a juvenile the magistrate finds that a violation of [certain enu-, merated offenses], did not occur or that there is not probable cause to believe that the juvenile committed the violation, but that there is probable cause to believe that some other offense occurred and that the juvenile committed that other offense, the magistrate shall transfer the case to the juvenile division of the probate court of the county where the offense is alleged to have been committed.
There is, however, no prohibition against the prosecutor seeking a traditional waiver on the charges the magistrate removed from circuit court. See MCL 766.14(2); MSA 28.932(2).
See Paley v Coca-Cola, 389 Mich 583; 209 NW2d 232 (1973). Moreover, any legislative intent to divest jurisdiction once it has properly attached must be clearly and unambiguously stated. Leo v Atlas Industries, Inc, 370 Mich 400; 121 NW2d 926 (1963).
See, e.g., Jimenez v Commonwealth, 10 Va App 277; 392 SE2d 827 (1990), rev’d on other grounds 241 Va 244; 402 SE2d 678 (1991); Broughton v Commonwealth, 596 SW2d 22 (Ky App, 1979); State v Shults, 169 Mont 33; 544 P2d 817 (1976) (all courts holding that where a defendant is charged with a felony giving the trial court jurisdiction, a subsequent lesser included misdemeanor conviction does not divest the trial court of jurisdiction). See also Zimmerman v Miller, 206 Mich 599, 604-605; 173 NW 364 (1919), in which this Court held that a circuit court retains jurisdiction in a civil case even when the verdict is below the jurisdictional requirement.
It is a general rule of construction that "lawmakers are presumed to know of and legislate in harmony with existing laws.” People v Harrison, 194 Mich 363, 369; 160 NW 623 (1916).
See, e.g., Tolbert v State, 598 So 2d 1011 (Ala Crim App, 1991) (where an adult court had jurisdiction to try a juvenile defendant charged with felony murder, the court had jurisdiction, on the basis of a waiver hearing, to try theft charges because items taken from the victim were taken in the same factual and criminal transaction as the felony murder); Taylor v State, 194 Ga App 871; 392 SE2d 57 (1990) (the appellate court applied the Worthy rule that concurrent jurisdiction of trial courts over capital felonies committed by juveniles necessarily extends to related lesser crimes that are part of the same criminal transaction). See also State v Johnson, 121 Wis 2d 237; 358 NW2d 824 (1984) (where charges not included in a waiver hearing were not "wholly unrelated” to the transaction considered at the waiver proceeding, the trial court had jurisdiction to try a juvenile on all counts).
Double jeopardy is only one of several difficulties associated with requiring two trials for enumerated and nonenumerated offenses. As noted by the New Jersey Superior Court
[t]o require treatment of the same criminal episode partially in Juvenile Court and partially in adult court would serve no beneficial purposes believed to be derived from the creation of a .system of juvenile courts. To permit fragmentation of the criminal transaction invites many possible problems, such as in sentencing, or with collateral estoppel, double jeopardy and merger. Fragmentation is also wasteful of prosecutorial, defense and judicial resources. [In re RLP, 159 NJ Super 267, 272; 387 A2d 1223 (1978).]
See also State v Garcia, 93 NM 51, 53-54; 596 P2d 264 (1979), in which the New Mexico Supreme Court used the same rationale to hold that if a juvenile court finds at a traditional waiver hearing that a juvenile defendant should be prosecuted as an adult, the adult court obtains jurisdiction over the juvenile’s entire case.
See n 5 for a discussion of the postconviction hearing required for juveniles brought before a circuit court via the automatic waiver statute.
The postconviction sentencing hearing does not apply to jurisdiction of minors that is waived to circuit court under the traditional procedures. People v Cosby, 189 Mich App 461; 473 NW2d 746 (1991). Moreover, the court rules detailing the hearing process do not apply to jurisdiction of minors that is waived under the traditional procedures. See MCR 6.901(B).
Note, however, it is equally likely that the circuit court should have jurisdiction over both enumerated and nonenumerated offenses because the juvenile should be treated like an adult for all purposes. In the context of a traditional waiver hearing, the Pennsylvania Supreme Court, in Commonwealth v Romeri, 504 Pa 124; 470 A2d 498 (1983), cert den 466 US 942 (1984), held that circuit court jurisdiction extends to lesser charges arising out of the same "criminal episode” because
it is unrealistic to believe that a youthful offender who the court determines cannot profit from the care, guidance and control aspects of a juvenile proceeding on the murder charge . . . would be amenable to such care, guidance and control on the non-murder charges arising from the same criminal transaction. [Id. at 138.]
Where automatic waiver statutes are involved, there is a presumption in many states against subsequently divesting a court of its jurisdiction once it has properly attached. Williams v State, 459 So 2d 777, 779 (Miss, 1984) (the court reasoned that "[i]t would be a mockery of the law and justice to hold that when a juvenile is indicted for murder . . . the circuit court must proceed with a trial on the murder charge, or lose jurisdiction, if a plea or conviction for a lesser-included offense occurs”). See also Walker v State, 309 Ark 23, 29-30; 827 SW2d 637 (1992) (the court rejected the argument that prosecutorial overcharging would result from maintaining circuit court jurisdiction over juvenile convictions of nonenumerated lesser included offenses; the court reasoned that ethical rules and punishment for their violation were sufficient deterrent for prosecutors); Snodgrass v State, 273 Ind 148, 152; 405 NE2d 641 (1980) (the court rejected an argument for divesting jurisdiction because "considerations for both judicial resources and double jeopardy proscriptions dictate that a court should have jurisdiction to impose sentence upon a verdict of guilty, as to any necessarily lesser-included offense or any lesser degree of the offense for which the defendant was lawfully charged and tried”). And see Marine v State, 607 A2d 1185 (Del, 1992); Lucas v United States, 522 A2d 876 (DC App, 1987); People v Martin, 43 Colo App 44; 602 P2d 873 (1979) (each court holding that once a defendant is charged with an enumerated offense and adult court jurisdiction attaches, jurisdiction is not lost simply because the juvenile defendant is convicted of a lesser included offense).
Similarly, once an adult court has obtained jurisdiction over a juvenile defendant by means of a traditional waiver hearing, it has been held that court retains jurisdiction to sentence the defendant when there has been a plea of guilty or conviction of a lesser included offense, even if that offense was not considered at the waiver hearing. People v Jimmie Smith, 35 Mich App 597; 192 NW2d 666 (1971) (the Court affirmed the defendant’s conviction of unarmed robbery, even though the waiver hearing referred only to armed robbery). See also Iglesias v State, 599 So 2d 248 (Fla App, 1992); State v Hamilton, 285 SC 133; 328 SE2d 633 (1985); Dicus v Second Judicial Dist Court, 97 Nev 273; 625 P2d 1175 (1981); Gray v State, 6 Md App 677; 253 A2d 395 (1969) (all these courts holding that when an adult court acquires jurisdiction in prosecution of an offense from a juvenile court, the adult court maintains jurisdiction to convict the defendant of the charged crime and any lesser included offenses).
On its own initiative, and citing only Deans, supra, another panel of the Court of Appeals, in People v Spearman, 195 Mich App 434; 491 NW2d 606 (1992), reversed a felony-firearm conviction on the grounds that the automatic waiver statute did not automatically give the court jurisdiction over nonenumerated offenses arising out of the same criminal transaction.
Indeed, it is clear that the Court of Appeals has not been unanimous on this issue. Over seven months before the Deans decision was announced, a different panel of the Court of Appeals implied in dicta that the automatic waiver statute applied to all crimes arising out of the same criminal transaction as the enumerated offense. See People v McCoy, 189 Mich App 201, 202, n 1; 471 NW2d 648 (1991).
In vacating this order, we note that the Oakland County circuit judge had no authority to remand this case to the probate court without conducting the postconviction sentencing hearing, unless that hearing was waived by the prosecutor and the defendant. See MCL 769.1(4); MSA 28.1072(4).
| CASELAW |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.