Document
stringlengths 87
1.67M
| Source
stringclasses 5
values |
|---|---|
Page:United States Statutes at Large Volume 22.djvu/1063
Preamble. Nov. 30, 1882. Day of thanks- giving. Day of National Prayer. Dee& of NO. 5. BY '�. PRSIDqT OF THE UI3:g,, STATES OF ,MI'-TCA. A PROCLAMATION. In conformity with a custom the annual observance of which is justly held in houor by this people, I, Chester A. Arthur, President of the United States, do hereby set apart Thursday, the 30th day of lifoveto. ber next as a day of public Thanksgiving. The blessings demanding our gratitude are numerous and varied. For the peace and amity which subsist between this Republic and all the nations of the world; for the freedom from internal discord and violence; for the increasing friendship between the difibront sections of the land; for liberty, justice and constitutional government; for the devotion of the people to our free institutions and their cheerful obedi- ence to mild laws; for the constantly increasing strength 9f the Re- public while extending its privileges to fellow men who come to us; for the improved means of internal communication, and the increased facilities of intercourse with other Nations; for the general prevailing health of the year; for the prosperity of all our industries, the liberal return for the mechanic's toil affording a market for the abundant har- vests of the husbandman; for the preservation of the national faith and credit; for wise and generous provision to effect the intellectual and moral education of our youth; for the influence upon the conscience of a restraining and transforming religion; and for the joys of home; for these, and for many other blessings, we should give thank& Wherefore, I do recommend that the day above designated be ob- served throughout the country as a Day of National Thanksgiving and .Prayer, and thaC the people, ceasing from their daily labors and meet- mg m accordanc with their several forms of wornhip, draw near to the .throne of Almighty God, offering to Him praise and gratitude gor the muffold goodness which He has vouehsafed to us, and praying that lia blessings and li mercies may continue. And I do further recommend that the day thus appointed be made a special occasion for deeds of kindness and charity to the suffering and the needy, b that all who dwell within the land may rejoice and be glad in this season of National aanksgiving. In witness whereof I have hereunto set my hand and caused the seal of the United States to be affLxed. Done at the city of Washington this twenty-fifth day of Oe_, in the year or our Lord one thousandaghlt hundred and eighty- [SL.J _two, and of the 'Independence of [Ynited States the one By the President:
|
WIKI
|
剑桥雅思16Test4Part4听力原文与答案 The extinction of the Dodo bird
剑桥雅思16 Test4 Part4雅思听力原文
One of the most famous cases of extinction is that of a bird known as the dodo. In fact there’s even a saying in English, ‘as dead as the dodo’, used to refer to something which no longer exists. But for many centuries the dodo was alive and well, although it could only be found in one place, the island of Mauritius in the Indian Ocean. It was a very large bird, about one metre tall, and over the centuries it had lost the ability to fly. but it survived happily under the trees that covered the island.
Then in the year 1507 the first Portuguese ships stopped at the island. The sailors were carrying spices (Q31) back to Europe, and found the island a convenient stopping place where they could stock up with food and water for the rest of the voyage, but they didn’t settle on Mauritius. However, in 1638 the Dutch arrived and set up a colony (Q32) there. These first human inhabitants of the island found the dodo birds a convenient source of meat, although not everyone liked the taste.
It’s hard to get an accurate description of what the dodo actually looked like. We do have some written records from sailors, and a few pictures, but we don’t know how reliable these are. The best-known picture is a Dutch painting in which the bird appears to be extremely fat (Q33), but this may not be accurate – an Indian painting done at the same time shows a much thinner bird.
Although attempts were made to preserve the bodies of some of the birds, no complete specimen survives. In the early 17th century four dried parts of a bird were known to exist – of these, three have disappeared, so only one example of soft tissue from the dodo survives, a dodo head (Q34). Bones have also been found, but there’s only one complete skeleton in existence.
This single dodo skeleton has recently been the subject of scientific research which suggests that many of the earlier beliefs about dodos may have been incorrect. For example, early accounts of the birds mention how slow and clumsy it was, but scientists now believe the bird’s strong knee joints would have made it capable of movement (Q35) which was not slow, but actually quite fast. In fact, one 17th century sailor wrote that he found the birds hard to catch. It’s true that the dodo’s small wings wouldn’t have allowed it to leave the ground, but the scientists suggest that these were probably employed for balance (Q36) while going over uneven ground. Another group of scientists carried out analysis of the dodo’s skull. They found that the reports of the lack of intelligence of the dodo were not borne out by their research, which suggested the bird’s brain (Q37) was not small, but average in size. In fact, in relation to its body size, it was similar to that of the pigeon, which is known to be a highly intelligent bird. The researchers also found that the structure of the bird’s skull suggested that one sense which was particularly well-developed was that of smell (Q38). So the dodo may also have been particularly good at locating ripe fruit and other food in the island’s thick vegetation.
So it looks as if the dodo was better able to survive and defend itself than was originally believed. Yet less than 200 years after Europeans first arrived on the island, they had become extinct. So what was the reason for this? For a long time, it was believed that the dodos were hunted to extinction, but scientists now believe the situation was more complicated than this. Another factor may have been the new species brought to the island by the sailors. These included dogs, which would have been a threat to the dodos, and also monkeys, which ate the fruit that was the main part of the dodos’ diet. These were brought to the island deliberately, but the ships also brought another type of creature – rats (Q39), which came to land from the ships and rapidly overran the island. These upset the ecology of the island, not just the dodos but other species too. However, they were a particular danger to the dodos because they consumed their eggs, and since each dodo only laid one at a time, this probably had a devastating effect on populations.
However, we now think that probably the main cause of the birds’ extinction was not the introduction of non-native species, but the introduction of agriculture. This meant that the forest (Q40) that had once covered all the island, and that had provided a perfect home for the dodo, was cut down so that crops such as sugar could be grown. So although the dodo had survived for thousands of years, suddenly it was gone.
剑桥雅思16 Test4 Part4雅思听力答案
|
FINEWEB-EDU
|
Cron is a job scheduler that allows users to run commands periodically.
learn more… | top users | synonyms (1)
3
votes
3answers
8k views
executing a sh script from the cron
I have a test.sh script #!/bin/sh php /home/v/file.php sh /root/x/some.sh when I execute the file as root from command line it works. sh /home/v/test.sh when I set it to crontab -e (is the root ...
1
vote
3answers
375 views
Cron with a 12-hour issue?
I have a cron job that's managed through plesk. I'm being told that it's being executed twice in a day, once at 5AM and once at 5PM, based on the email that's being received. Here's the cron line: ...
1
vote
2answers
872 views
using cron to run script
Hey guys, im trying to run a script using cron, im using a crontab created by the user ashtanga, in the crontab i have */5 * * * * /home/custom-django-projects/SiteMonitor/sender.py in top of the ...
3
votes
2answers
2k views
Add a one-off scheduled task through a shell script?
I'd like to execute a task at a given time, once. I know I can just use crontab -e to add it there, but I'd like to do that through a shellscript. crontab -e gives me some temporary file to edit ...
14
votes
3answers
13k views
Does RHEL execute all cronjob files under /etc/cron.d/*?
This is a RedHat Enterprise Linux 5 system (RHEL). We manage this system using Cfengine. We have several cronjobs which are running twice as often as usual. I checked the cronjobs under /etc/cron.d/ ...
2
votes
4answers
2k views
Anacron job complains “Gtk-WARNING **: cannot open display”
I'm trying to make a simple weekly Anacron job that backs up my computer if I click yes on the dialog. The script I wrote works fine if run manually, but when Anacron runs it, nothing happens and I ...
4
votes
1answer
88 views
When I schedule a command with 'at', can I change where the output is mailed to?
When I schedule a job/command with at to be executed in the future, the standard output and error of the command is "mailed" to the user that did the scheduling. So after my job runs, I get a message ...
7
votes
3answers
9k views
/etc/cron.daily/foo : Send email to a particular user instead of root?
I'm running CentOS 5.5. We have several cronjobs stored in /etc/cron.daily/ . We would like the email for some of these cronjobs to go to a particular email address, while the rest of the emails in ...
3
votes
2answers
436 views
I need help with a cronjob to watch for runaway processes and kill them
I have an interesting situation, I have a runaway ruby process - I know exactly how I trigger it. Point is, it got me thinking about runaway processes (CPU usage or memory usage). How would one ...
3
votes
1answer
3k views
How to have cron run a python script as root?
How can I get cron to run a python script as root? Here is my crontab file: 0 * * * * ./twitter/twitter.py Am I doing something wrong?
2
votes
1answer
186 views
Stop cron script from destroying my mirrorlist with invalid data
I have to following cron script that runs daily. As you should be able to see from the code, it outputs the results from reflector to /etc/pacman.d/mirrorlist. $ cat /etc/cron.daily/update-mirrorlist ...
3
votes
5answers
1k views
how to ensure a program is always running but without root access?
Currently I need to have a program running all the time, but when the server is rebooted I need to manually run the program. And sometimes I'm not available when that happens. I can't use a normal ...
2
votes
1answer
291 views
How does fcron knows whether the job was run?
I recently migrated from vixie-cron to fcron on my laptop. I have a question: how does fcron knows if a particular job was run in given period of time? As a file can change during running, what ...
10
votes
5answers
6k views
Run a script via cron every other week
I've done quite a bit of research in how to do this, and I see there's no direct way in cron to run a job, say, every other Thursday. Right now, I'm leaning toward making a script that will just run ...
2
votes
3answers
453 views
Weekly cron job to save list of installed packages
I am having trouble figuring out how to set up my first cron job. I simply want to run this command once every week: dpkg -l > ~/Dropbox/installed_packages My /etc/crontab file contains the line ...
40
votes
8answers
74k views
Where are cron errors logged?
If I setup cron jobs incorrectly they appear to silently fail. Where should I look for an error log to understand what went wrong?
|
ESSENTIALAI-STEM
|
' '
Deutsch | English
Forschungsdatenbank PMU-SQQUID
Herniation pits and cystic-appearing lesions at the anterior femoral neck: an anatomical study by MSCT and A mu CT
Panzer, S; Esch, U; Abdulazim, AN; Augat, P
SKELETAL RADIOL. 2010; 39(7): 645-654.
Originalarbeiten (Zeitschrift)
PMU-Autor/inn/en
Augat Peter
Panzer Stephanie
Abstract
Osteoporosis is characterized by a reduction of bone mass and changes in bone micro-architecture. The resulting reduction in bone strength leads to the well recognized increase in the risk of fracture, particularly at the radius, hip, and spine. The treatment of osteoporotic fractures is challenged by the reduced mechanical capacity of osteoporotic bone, reflected in reduced holding power and increased fragility. The aim of successful fracture treatment in individuals with osteoporosis is early fixation of the fracture with immediate and almost unrestricted weight-bearing capacity. The key factor for effective fracture treatment is strict adherence to the basic principles of stable fracture fixation: reposition, compression, long, wide supports, as well as additive techniques such as angular stability and bone augmentation. Modern osteosynthesis implants effectively support the application of these principles. Modifications in implant design and techniques enable the surgeon to apply and combine the essential components of the basic principles for the treatment of mechanically impaired bone. The key components employed in modern implants include integrated compression techniques, multidirectional angular stability, expandable support surfaces, as well as multiple augmentation options. However, despite modern implant technology, osteoporotic bone fractures remain a significant challenge for the orthopaedic surgeon and require meticulous planning and implementation of the basic principles.
Useful keywords (using NLM MeSH Indexing)
Aged
Aged, 80 and over
Bone Cysts/diagnostic imaging*
Diagnosis, Differential
Female
Femur Neck/diagnostic imaging*
Hernia, Inguinal/diagnostic imaging*
Humans
Male
Tomography, X-Ray Computed/methods*
Find related publications in this database (Keywords)
Spiral computed tomography
Bone cysts
Ganglion cyst
Femur neck
Hip joint
|
ESSENTIALAI-STEM
|
Talk:movie
I have got some stupid question: Is this word (movie) popular only in American-English? Because I have got British English Spell Checker and it doesn't accept such word. Is 'movie' unpopular in British English?
* Movie is valid in British English (as a loan from American I think), but film is often used instead. Conrad.Irwin 00:27, 29 June 2008 (UTC)
* "Film" is the universally recognized term. A few years ago, Wikipedia's editors voted to standardize the labelling of articles about movies, films, or motion pictures and changed them all to use the term "film." It was a good idea. -- WikiPedant 04:07, 29 June 2008 (UTC)
|
WIKI
|
King Cross Leopolis
King Cross Leopolis is a shopping mall located in Lviv, Ukraine that opened on March 26, 2010. It has a total area of 116546 sqm and is the largest mall in western Ukraine.
Description
The first phase of the mall opened in 2008. It consisted solely of the Praktiker store, which occupied 8,174 sqm. In 2016, the store closed and in 2016 an EpiCentre K store opened in its place.
The second phase, opened in 2010, consists of the shopping mall itself. It consists 50000 sqm of total area on two levels; including an Auchan hypermarket with an area of 13000 sqm, and over 100 commercial stores: boutiques, household stores, cafes, restaurants, a large Planeta Kino multiplex, bowling alley, ice rink, recreation complex, overground and underground parking lot are also included in the mall.
A third phase of the mall is planned to be constructed in the future. It will include an additional 20000 sqm of lease area; this will include 130 commercial stores. Additionally, the parking area will be increased by 600 parking spaces.
|
WIKI
|
Climbin' the Walls
Climbin' the Walls is the debut studio album by American heavy metal band Wrathchild America, released in 1989 by Atlantic Records. Although the album was recorded in May 1988, its release was delayed for a whole year, due to both label and legal issues that resulted in the band changing their name from Wrathchild to Wrathchild America, in order to avoid confusion with the British band with the same name.
Climbin' the Walls was moderately successful, becoming the band's only album to chart on the Billboard 200, where it peaked at number 190. A music video for the song "Climbin' the Walls" was released to promote the album.
Reception
Climbin' the Walls received generally positive reviews. Eduardo Rivadavia from AllMusic only gave the album a score of two stars out of five but noted the "speedy, muscular riffs, complex time changes, and superb drumming."
Personnel
* Brad Divens – lead vocals, 4, 5, and 12 string bass
* Jay Abbene – guitar, backing vocals
* Terry Carter – 6 and 12 string guitars, vocals
* Shannon Larkin – drums, vocals
|
WIKI
|
User:Mojtababannaga/sandbox
Ducab (Dubai Cable Company) is a regional manufacturer based in Dubai, UAE and manufactures electrical cables and wires, and Aluminum and copper rods and wires. The Group is Jointly owned by the Investment Corporation of Dubai (ICD) and Senaat (General Holding Corporation, Abu Dhabi), Ducab operates five manufacturing facilities in the UAE, that include Ducab Jebel Ali, Ducab Mussafah 1 Factory, Ducab Mussafah 2 Factory, Copper Rod and Aluminum rods factories under the brand (DMB - Ducab Metals Business), and Ducab High Voltage (HV) Cable Systems Factory. It also acquired its first overseas plant, AEI Cables UK, earlier in 2014.
|
WIKI
|
Talk:Amy Elizabeth Thorpe
Starting out
This is my first attempt at an article, so please forgive my awkardness!..... Amy Elizabeth Thorpe, aka CYNTHIA, is not very famous but she should be and it is only because of the secret nature of her work that she is relatively unknown. Almost no women are credited with any major role in World War two but Amy Elizabeth Thorpe helped crack the ENIGMA codes used by the Germans and funneled vital information she collected secretly to Churchill and Roosevelt which was used to win (or at least more quickly end) the war. Her importance to the story of the war is IMO at least as great as conventional figures such as Patton, Montgomery, "Wild" Bill Donovan, Doolittle, Nimitz, etc... and I hope others will add to the few sources I have on hand to expand knowledge about this great almost-unknown lady in history.Leidseplein (talk) 02:13, 29 August 2010 (UTC)
Today I added brief sections for Early Life, World War II and Legacy and Death. I also added more specific and general references and further reading. I am also adding links from other Wikipedia articles.Leidseplein (talk) 16:16, 29 August 2010 (UTC)
Substantiate or delete this article
It is disconcerting to see a cock-and-bull story such as William Stevenson's about "Cynthia" (Amy Elizabeth Thorpe) and her supposed theft of Enigma secrets through an amorous aide of Polish Foreign Minister Józef Beck (in Stevenson's A Man Called Intrepid, 1976) once more being offered to the public as bona-fide history, over a quarter-century after historian Richard Woytak demonstrated its falsehood—and that of other fabrications presented by F.W. Winterbotham, Anthony Cave Brown and F.H. Hinsley—in his introduction to Marian Rejewski's "Remarks on Appendix 1 to British Intelligence in the Second World War by F.H. Hinsley," published in Cryptologia, vol. 6, no. 1 (January 1982).
Historical fiction such as this should not be presented as fact in an encyclopedia. Unless verification can be provided for other of the vague, unsubstantiated assertions that are made in this article and in Stevenson's discredited book, on which this article is largely based, the "Amy Elizabeth Thorpe" article should be deleted in its entirety. Nihil novi (talk) 19:59, 29 August 2010 (UTC)
* It is not historical fiction, it might be wrong but was also meant to be true.Slatersteven (talk) 20:42, 29 August 2010 (UTC
* The matter of the Polish Enigma secrets is of course just one small part of Thorpe's work, and if it is a matter in controversry why not mention it as such? At best this is a case of whether you wish to believe an historian like Richard Woytak or an eyewitness like William Stephenson. In any event, Thorpe's work outside of the Polish Enigma matter is documented in several other works. Leidseplein (talk) 04:20, 30 August 2010 (UTC)
* Just what is it that Stephenson witnessed? Thorpe's trysts with an alleged, unnamed aide to the Polish Foreign Minister? And this aide had detailed technical information that was available in Poland only to a handful of persons with need to know?
* We know how the British and French got the Polish-reconstructed German Enigma machine, along with Polish-developed techniques of decrypting Engima-enciphered messages — officially, in July 1939, on the eve of World War II, from the Polish Cipher Bureau. We know this from Polish, French and British intelligence sources. This information is available in Wikipedia articles on the Enigma machine, cryptanalysis of the Enigma, and Ultra.
* There is no controversy about the allegation that Thorpe obtained the secrets of Enigma decryption for the Allies of World War II. She didn't. Until Rejewski turned up living, memory intact, after World War II, opportunistic writers in English-speaking countries thought that they had impunity to sell, to a gullible public, tall tales about a Jewish worker at an Enigma factory, Polish troops ambushing Enigma transports, and a promiscuous American woman. Nihil novi (talk) 05:37, 30 August 2010 (UTC)
* Stephenson witnessed the results of Thorpe's work, which was early help on Enigma. Stephenson already had an Engima machine and there were at least two others besides his available to Allied sources before any Polish contact of any kind. Thorpe, according to Stephenson, obtained operational information about how it was used from her time in Poland - rotor settings and other details. In any event, since any words that imply less than heroic status for Polish behavior seems to be so personally distressing, would you be placated if the article were changed to state something along the lines of "William Stephenson, head of BSC, gives credit to Thorpe for early help with Enigma obtained while her husband was a Diplomat in Warsaw, while Polish sources deny her role" ?????? Leidseplein (talk) 14:15, 30 August 2010 (UTC)
* I spent about an hour today trying to confirm or deny the story of Thorpe and the Polish love affair, or lack thereof, but there is just not much written that doesn't ultimately trace back to one or two sources. I therefore removed the reference to Beck and the possibility Thorpe seduced Enigma information from his assistant. I added in later references to Thorpe's work obtaining Vichy and Italian codes. I hope this ends this dispute but if not let's discuss.Leidseplein (talk) 21:09, 30 August 2010 (UTC)
* Let me guess. The "one or two sources" on Thorpe's "Polish love affair" — would that be Stevenson's A Man Called Intrepid?
* Anyone could openly purchase a commercial Enigma machine; the Polish Cipher Bureau bought one before 1932. Its possession was useless for purposes of breaking German military Enigma ciphers — which is what the whole business was about. If Stevenson claims that Stephenson "already had an Enigma machine" of the military type, with commutator, prior to Polish-British contacts, then he is lying. No one apart from the Germans and the Poles had a German military Enigma before the tripartite Polish-French-British Warsaw conference in July 1939.
* Stevenson is useless as a source on Enigma decryption. What he has to say about it and Thorpe's alleged contribution to Enigma decryption is rubbish. Nihil novi (talk) 05:57, 31 August 2010 (UTC)
Other sources (its up to you to use them)
http://books.google.co.uk/books?id=Za4kd9murKcC&pg=PA69&dq=Amy+Elizabeth+Thorpe&hl=en&ei=dsZ6TNORM8mD4AbEsNHPBg&sa=X&oi=book_result&ct=result&resnum=2&ved=0CC0Q6AEwAQ#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false http://books.google.co.uk/books?id=6BP6Bph006YC&pg=PA52&dq=Amy+Elizabeth+Thorpe&hl=en&ei=sMZ6TPP1HsPI4Ab27q3dBg&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDMQ6AEwAg#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false http://books.google.co.uk/books?id=7wHWT3WT_rYC&pg=PA23&dq=Amy+Elizabeth+Thorpe&hl=en&ei=y8Z6TL7XNtCI4AbglYXKBg&sa=X&oi=book_result&ct=result&resnum=5&ved=0CD4Q6AEwBA#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false http://books.google.co.uk/books?id=sDVUcuAUCUwC&pg=PA36&dq=Amy+Elizabeth+Thorpe&hl=en&ei=Usd6TL6YIciR4AbHjuyyBg&sa=X&oi=book_result&ct=result&resnum=8&ved=0CE4Q6AEwBw#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false These may not substantiate all of the article, but they do go some way to disprove that this is all fantasy.Slatersteven (talk) 20:48, 29 August 2010 (UTC)
* If these four "sources" are equally spurious as Stephenson's A Man Called Intrepid — "perhaps the most detailed information about Thorpe widely available as told by her spymaster, William Stephenson" — then the credibility of this article does not appear to be stellar. Nihil novi (talk) 08:22, 30 August 2010 (UTC)
* The custom is to provide sources, other than Wikipedia itself, which tend to illustrate one's point. If you have sources indicating the 8 or so sources discussed in these Thorpe pages are all wrong, please provide them so we can consider them. Also, A Man Called Intrepid was written by William Stevenson, not William Stephenson.Leidseplein (talk) 14:22, 30 August 2010 (UTC)
* The Wikipedia articles noted in the previous section of this page provide exhaustive documentation on the Polish origins of Enigma decryption and on subsequent British wartime exploitation of the Polish achievements. Feel free to look up the documentation for yourself. Nihil novi (talk) 06:02, 31 August 2010 (UTC)
The two points marked DUBIOUS-DISCUSS
Someone tagged two sentences in the article with dubious-discuss, but then offered no discussion. I hope that these will be brought up with published sources that tend to illustrate why they might be dubious...Leidseplein (talk) 00:52, 11 September 2010 (UTC
* Please read the previous talk-page sections.
* Please control your obvious POV to defend Polish "honour" at all costs and your wish that your interpretation of history, narrowly documented, become accepted by everyone. Is there any reason to think than an obscure article (quoting Polish sources with a well-known agenda to overemphasize the Polish role in Engima and de-emphasize Allied successes or Polish weakness) is more pesuasive than the first hand accounts of the head of the BSC and BSC staff? Perhaps a compromise sentence could be added, "The Polish POV, as stated by Rejewski, is that Rejewski is entirely responsible for breaking the Engima and that Thorpe had nothing to do with it." Would this satisfy you? Leidseplein (talk) 00:44, 12 September 2010 (UTC)
* Also the following, by Richard Woytak:
"In 1976, another British best-seller, A Man Called Intrepid by the Canadian William Stevenson, put up further candidates for Enigma laurels. Stevenson went one better than Cave Brown['s best-selling Bodyguard of Lies, 1975] by adding another Polish mathematician [to Marian Rejewski and Henryk Zygalski, who had been mentioned by Cave Brown]. Stevenson came up with 'Jerzy Rozycki, Henryk Zygalski, and Mademoiselle Marian Rejewski' — thereby managing, with masterful economy of expression, to get wrong both Rejewski's sex and marital status. Then, apparently still having sex very much on his mind, Stevenson went on to an exciting story about a spy codenamed CYNTHIA, the 'Minneapolis-born daughter of a U.S. Marine Corps major and Cora Wells, whose father was a Minnesota state senator.' CYNTHIA, who was 'married to a British diplomat, Arthur Pack, who had been transferred to Warsaw... formed a series of liaisons with top-ranking members of Poland's Foreign Service.' Polish Foreign Minister Jozef Beck 'was on good terms with Nazis in Berlin. [So were several thousand other people — which generates tremendous story-telling potential — R.A.W.] Beck's confidential aide was one of CYNTHIA's lovers.'
In conversations with me, Rejewski, in Warsaw, and Colonel Stefan Mayer, the prewar chief of Polish military counter-intelligence, in London, have denied that there is any truth [to Stevenson's account of how Britain learned the secrets of military-Enigma decryption — in reality, British and French intelligence, at Warsaw in July 1939,
* The role of Thorpe takes place BEFORE July 1939 and before Polish cooperation with the Allies. Just so you're feelings aren't hurt, no one is claiming she cracked Engima, rather Thorpe obtained early information from Beck's office (along with other British spies in Warsaw) that contributed to the Engima effort. Leidseplein (talk)
received from the Polish Cipher Bureau, at the behest of the Polish General Staff, the Bureau's reconstruction of the German military Enigma and the Enigma-cipher-breaking techniques and technology that had been developed, since December 1932, by Rejewski and his colleagues at the Polish Cipher Bureau]. [Richard Woytak, prefatory note to Marian Rejewski, 'Remarks on Appendix 1 to British Intelligence in the Second World War by F.H. Hinsley,' Cryptologia, vol. 6, no. 1 (January 1982), pp. 75–76.]"
* Nihil novi (talk) 07:02, 11 September 2010 (UTC)
* Do you understand that the article is not suggesting Amy Thorpe take credit for breaking Enigma? It merely mentions her early help in the area. Your goal of protecting precious Poland's role in all this is in tact, but do you accept that Rejewski et al. would have no idea what Thorpe collected in Warsaw, because it was secret from them, while Stephenson would? Is your agenda to redeem Poland's role in the war so intense that you can not accept others besides Poles contributed to cracking Enigma?
* Leidseplein (talk) 01:03, 12 September 2010 (UTC)
* I've added in a sentence that shows the Polish view which denies a role for Thorpe in Engima. Of course the Poles had no knowledge of Thorpe's presence in Warsaw, nor of her secret role, nor of her work before Rejewski et al. decide to officially help the Allies in July 1939, but the Polish POV is important to note, even if it might be wrong.
* Leidseplein (talk) 01:44, 12 September 2010 (UTC)
* And just what exactly, pray tell, was the nature of the "early assistance" that Ms. Thorpe — Mrs. Arthur Pack — provided, apart from alleged amatory ministrations to cohorts of diplomats and officials on both sides of the Atlantic Ocean?
* She found out through Beck's aid that the Poles had keys to some Germany army cryptograms; she copied items from Beck's safe that told the details about how and where the German's used Enigma...and she did this IN 1938, a year before what you are so pointedly arguing is the first source of Enigma information from Poland to the Allies - through Rejewski etc, when in fact Thorpe provides early information (non-cryptographic) which re-affirms other alerts Britain received to Rejewski's work...Leidseplein (talk) 03:01, 12 September 2010 (UTC)
* We know pretty exactly what Marian Rejewski and his colleagues, and Dilly Knox and Alan Turing and their colleagues, did with Enigma, from documentation that began to be released before William Stevenson wrote his thriller about William Stephenson and the seductive Ms. Thorpe, but we know nothing about what she is actually supposed to have done with Enigma.
* I have seen no credible documentation of any contribution that she may have made to Enigma decryption.
* If no more information can be produced about Ms. Thorpe's "assistance" to Enigma decryption, I propose that all vague mention of that assistance be expunged from Wikipedia. Her amatory contributions to the Allied cause should suffice to secure her name in prewar and wartime history. Nihil novi (talk) 02:30, 12 September 2010 (UTC)
* PS: Please do not interpolate your comments within the body of mine, as you have done above. It is rude and confusing. Nihil novi (talk) 02:32, 12 September 2010 (UTC)
* Absent any Wikipedia rule, I will try to avoid doing so in your case in the future. Lengthy one-sided-POV diatribes like you quoted are often responded to on a point-by-point basis WITHIN the body so that the points and contrary sources can be compared more easily.Leidseplein (talk) 02:58, 12 September 2010 (UTC)
* According to William Stephenson, Thorpe in 1938 was working on the Engima problem (BEFORE Rejewski etc... finally decided on the eve of war to help the Allies). "Poland's Secret Service was preparing for a war its politicians felt they could avoid...[Stephenson] was looking for details of the Enigma coding machine... and knew Beck was friendly with the Nazis". Thorpe persuaded Beck's aid to first discuss and later allow to copy documents from Beck's safe. [Stephenson already knew] "that Rejewski etc... had been working on the Enigma" and that Thorpe's information "reinforced earlier information" and sometimes "duplicated details from other sources," but "Stephenson always felt she [Thorpe] had contributed a great deal to the vital statistics that were required" by later code breakers at Bletchley. (Quotes from Stevenson's A Man Called Intrepid, pp 342-343.)
* In other words, there is no dispute in any account that Rejewski et al. had early success against Engima. As Poland's politicians felt they could avoid war on their own, the Poles did not decide to share Enigma information until a few weeks before Poland was invaded, while Thorpe was working on details of the Enigma from Polish government sources IN 1938, without the knowledge of Rejewski. Thorpe it seems provided early details about where and in what services Enigma was used, while Rejewski etc... broke the code.
* The only conflict here is created by the "historian" Richard Woytak who, in a now familiar way, is unable to see the NON CONFLICTING stories of Thorpe/Stephenson and Rejewski.Leidseplein (talk) 02:37, 12 September 2010 (UTC)
* PS, I think you are personally obsessed with not only arguing Poles are underappreciated in the Engima story, but also making sure the world accepts the sources you like and rejects the sources you don't. I'm happy to include Rejewski's story, but also Stephenson's - who knew not only of Rejewski's role but of the roles played in secret by others Rejweski was blind to at the time. Stephenson knows and acknowledges Rejewski's role, Rejewski's story (especially as retold by Woytak) does not acknowledge simulataneous work on Enigma by British intelligence trough people including Thorpe, because he had no way to know about them in his lifetime.Leidseplein (talk) 02:51, 12 September 2010 (UTC)
* After further review of the sources, there is NO CONFLICT between the story as given by early Polish expert Rejewski etc... and the account of BSC head Stephenson about the role of CYNTHIA (Amy Thorpe.) Thorpe provided NO cryptographical help but obtained items from Beck on how Enigma was used and she especially helped bring Rejewski's work to the attention of the British. Ironically in the face of all the Polish fanantics determined to salvage a critical role for Poland in winning the war, perhaps Thorpe's most practical point was when she in 1938 told Stephenson that Rejewski was able to decode some German keys. Rejewski of course had no knowledge of Thorpe's work, but Stephenson knew of Rejewski's work and correctly credits early decrypt work to Rejewski, nevertheless Stephenson felt Thorpe's work was imperative to the Allied effort at Bletchley Park. THE ONLY CONFLICT in sources is generated falsely by (Polish) historian Richard Woytak who misquotes Stevenson's writing on CYNTHIA as claiming she alone got the early details about Enigma from Poland. Woytak is apparently motivated by the now well documented Polish sensitivity to their role in the war in general and Enigma in particular, when in fact Stephenson says (in no conflict with Rejewski) that Thorpe basically highlighted Enigma's role, that Polish engineers had some Enigma keys solved, and provided some details about how/where it was used.Leidseplein (talk) 03:41, 12 September 2010 (UTC)
* User:Leidseplein|Leidseplein]] (talk) 03:41, 12 September 2010 (UTC)
* "Lengthy one-sided-POV diatribe," indeed!
* How do you know that:
* "Poland's Secret Service was preparing for a war its politicians felt they could avoid"?
* Quoted from sourced material. Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* How DO YOU think Rejewski et al. could possibly know about Thorpe's work in Poland in the 1930s?
* "Beck was friendly with the Nazis"? He wasn't; and even had he been, then so what?
* Quoted from sourced material, even your cherished Polish apologist Woytak admits they were friendly, the "so what" is because this point helps explain why Poles had knowledge of Enigma.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* "Thorpe persuaded Beck's aid [sic!] to first discuss and later allow to copy documents from Beck's safe"? What was this aide's name? If still alive, he needs to be prosecuted for treason — and for stupidity. Can you imagine William Friedman sharing details of his Purple-breaking operation with U.S. Secretary of State Cordell Hull?
* The aid's name is unmentioned, perhaps precisely because of the fanatical views of those who would want him prosecuted and the fanatical views of those whose point in life is to eliminate any evidence that anything but Polish efforts solved Enigma.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* "[Thorpe] had contributed [...] vital statistics that were required"? Something like 36–24–36, I presume.
* If you have a contrary source on this point, provide it and we can probably include it. If you simply DON'T LIKE what Thorpe did and dearly wish only Poles were to get credit for breaking Enigma, while simultaneously deserve no blame for what happened to Poland during and after the war, then PROVIDE SOURCES.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* "the Poles did not decide to share Enigma information "until a few weeks before Poland was invaded" (your emphasis) "as Poland's politicians felt they could avoid war on their own"? The Poles, for security reasons, did not even share "Enigma information" with their ally, Gustave Bertrand, who in 1932 had supplied them with French intelligence material that had been crucial to reconstructing Enigma.
* Your point here is to argue and defend the behavior of Poland, which is not the point of an article on Amy Thorpe.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* "Thorpe it seems provided early details about where and in what services Enigma was used"? Do you have Public Record Office or other unimpeachable documentation on this?
* There are numerous sources quoted here in this article, in further reading and on the internet with a simple google search, as you say above "feel free" too look them up, scary as they are for you to accept.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* "Stephenson knows... Rejewski's role [while] Rejewski had no way to know about [Thorpe's role] in his lifetime" (your emphasis)? On the contrary, Rejewski was reading the fictions by Stevenson (1976), Anthony Cave Brown (1975) and others as they appeared, published to enrich their authors and to satisfy the curiosity of the gullible. And the omniscient Stephenson was evidently privy to Rejewski's role in such detail that he even "knew" that Rejewski (who was a married man) was a single female ("Mademoiselle Rejewski")! Nihil novi (talk) 04:32, 12 September 2010 (UTC)
* The Polish part of Thorpe's work and the Enigma machine is a tiny part of Stevenson's book - it is hardly an effort to take credit for Enigma decoding since it is such a small part of the story. If the head of BSC Stephenson is not a trusted source and Stevenson's book is to satisfy the guillable, then barely-noticed "works" like a note to an article in an obscure magazine like Cryptologia is obviously nothing more than the ongoing Polish dribble which desperately seeks to take all the credit for Enigma into Polish brains, yet likewise blames Britain and America for both allowing the war and for allowing Poland to live under Communism for 50 years.... your raison d'etre is to defend Poland, great, but Polish sources which only expand the role of Poles and diminish the roles of everyone else are laughable propaganda.Leidseplein (talk) 05:05, 12 September 2010 (UTC)
* Thorpe's work in Poland and on the Enigma machine takes up all of about 4 pages in Stevenson's 500 page book on Stephenson. Stephenson provides Thorpe's role here. Woytak's overly hostile attempt to diminish all but Polish Enigma efforts is also noted. As both sides of this minor point are given I think this is a suitable compromise and we can leave it at that.Leidseplein (talk) 05:22, 12 September 2010 (UTC)
Don't forget that during 50 years non-Polish authors diminished Polish Enigma efforts.Xx236 (talk) 08:18, 13 September 2010 (UTC)
* This kind of opinion-paranoia, which is shown in agonizing detail on this discussion page and is overly-sensitive to Poland's role in the war, may or may not be justified, but let's not be Nazis (irony intended) about it and quash dozens of sources because they don't credit Poland and Poles as much as we'd like - let Wikipedia readers see the sources and decide for themselves. Leidseplein (talk) 00:42, 15 September 2010 (UTC)
* Cryptologia is not so obscure. It was Marian Rejewski's remarks on F.H. Hinsley's grotesque account of the origins of Enigma decryption in an appendix to volume I of Hinsley's official history of British Intelligence in the Second World War — Rejewski's remarks published at Richard Woytak's initiative in Cryptologia — that forced Hinsley to include a more accurate account in a subsequent volume of his history.
* Hinsley makes no mention of Thorpe. Nor does any credible historian of World War II or of cryptology. Nihil novi (talk) 06:19, 12 September 2010 (UTC)
* Too bad for William Stevenson that he demonstrated his unreliability by writing tommyrot about Enigma. Nihil novi (talk) 07:01, 12 September 2010 (UTC)
* Yeah, Stevenson is so unreliable in writing about Enigma that he introduced to the world Jerzy Różycki's work on the subject, previously unmentioned in major works. I wonder how Stephenson knew about Rozycki and you can accept that but can't accept that Stephenson knew about Allied spies in Warsaw who were obviously UNKNOWN to Rejewski, etc..??? Leidseplein (talk) 16:31, 12 September 2010 (UTC)
* Stevenson may, if nothing else, have read David Kahn's December 1974 New York Times review of F.W. Winterbotham's The Ultra Secret, in which Kahn gave the names of the three Polish mathematicians who worked at breaking Enigma, including Jerzy Różycki. Stevenson's mention of Różycki bespeaks no special knowledge on Stephenson's part, but rather the ignorance, a year earlier, of his fellow myth-maker, Anthony Cave Brown, in Bodyguard of Lies (1975). Nihil novi (talk) 10:31, 13 September 2010 (UTC)
* The Polish POV is included in the article, dubious as it is. You continue to tag as dubious cited sources you don't like, when it is in no way dubious that this is what Stephenson said and thought. If his thoughts are dubious, that is not your function as an editor to mark or decide - you are here merely to report other cited sources, not offer your own analysis of the sources, especially those that don't mention Poles adequately enough for you.Leidseplein (talk) 16:31, 12 September 2010 (UTC)
* If you continue to insist that only sources you like be included, obscure and agenda-motivated though they are, then let us ask an administrator to weigh the evidence on each side. Leidseplein (talk) 16:31, 12 September 2010 (UTC)
* There seems to be a dispute between editor Nihil novi and Leidseplein. I have asked for a third opinion as a prelude to arbitration and administrator action. To summarize the dispute, Leidseplein is for the inclusion of sources that indicate a role for Thorpe in 1938 discovering how Enigma was used by the Poles, such as:
http://books.google.com/books?id=EHtrn0Pzpz8C&pg=PA77&lpg=PA77&dq=amy+elizabeth+thorpe+enigma&source=bl&ots=KBEHGPvxrd&sig=SLY9ZXHwH3GOkFX7xXaupZDyuwY&hl=en&ei=qUWMTN3QGIGdlgew0qhg&sa=X&oi=book_result&ct=result&resnum=9&ved=0CD4Q6AEwCA#v=onepage&q=amy%20elizabeth%20thorpe%20enigma&f=false
* and also Leidseplein supports inclusion of the source which proposes all the Allied information about the Polish Enigma came in 1939 from Polish sources such as
* [Richard Woytak, prefatory note to Marian Rejewski, "Remarks on Appendix 1 to British Intelligence in the Second World War by F.H. Hinsley," Cryptologia, vol. 6, no. 1 (January 1982), pp. 75–76.]}}
* so, It seems to me the dispute is whether to include both sources as Leidseplein proposes OR whether to exclude sources that propose a role for Thorpe in Enigma. I will await third party input.
Leidseplein (talk) 17:40, 12 September 2010 (UTC)
* I have been asked to comment but it should be n oted I have been invilved before. Having said that we inclvude both stories but make shure we attribute them. Such as "stevens claised in his book...Ect".Slatersteven (talk) 17:54, 12 September 2010 (UTC)
* I have edited the article to show that Stephenson says in Stevenson's book that Thorpe worked in 1938 to give information about Enigma to the Allies. Later in the article a sentence explains that Polish sources deny a role for Thorpe. Leidseplein (talk) 18:20, 12 September 2010 (UTC)
* Its not only POlish soiurces that dispute hber role, other (non Polish) sources do as well.Slatersteven (talk) 18:33, 12 September 2010 (UTC)
Leidseplein, why do you repeatedly delete the 2 "dubious–discuss" templates from the article, while the discussion remains underway? Nihil novi (talk) 21:02, 12 September 2010 (UTC)
You have given us a link, just above, to Mark Lloyd, The Guinness Book of Espionage pp. 77–78. All that he has to say on the present subject is: "... it was not until she went to Poland that she became a secret agent in earnest. Now working for MI6 she gained the confidence of a young aide to the Foreign Secretary, Colonel Beck. From him she gleaned considerable intelligence, some of which led directly to Britain gaining possession of the top secret German Enigma cipher machine." All weasel words ("a young aide to the Foreign Secretary... considerable intelligence, some of which led to... gaining possession of the... German Enigma cipher machine") and no substance.
Can't you do better than that? What about a juicy, substantive quote from Stevenson / Stephenson? Nihil novi (talk) 21:02, 12 September 2010 (UTC)
* Sorry but we do not evaluate sources in this way.Slatersteven (talk) 21:08, 12 September 2010 (UTC)
* I am satisfied that the article as it now stands is accurate and fair - it represents the views of both those who do and do not agree that Thorpe was a spy in Warsaw in 1938 and obtained information for the Allies about Enigma at this time, but I will address some points recently made to me:
* It is suggested that other non-Polish historians dispute Thorpe's role in Warsaw. Where are the non-Polish sources that dispute Thorpe's role as spy in 1938 Warsaw? The only source I've found or seen mentioned is Polish, namely, Richard Woytek's introduction to an article in the cryptography magazine Cryptologia. In any event, Woytek is trying to generate a controversy when there is none...from Rejeweski's point of view (Which Woytek relies upon), the Allies learned about Polish Enigma work in 1939 a few weeks before the war, because that's when Rejewski decided to share his work. From the head of BSC's point of view (William Stephenson), he had spies in Warsaw at least as early as 1938, one of them being Amy Thorpe, who gave initial information about Polish Enigma work, not including cryptography. Rejewski and probably no Polish source knew about Allied spies in Warsaw at the time, so naturally they believed themselves to be the first and only source about Polish Enigma work and sought to take the entire credit for themselves, which those who seek to promote Poland's role in Enigma and the war in general continue to seek to this day. However, Stephenson not only credits Rejewski with his initial cryptography work on Enigma but points out that he had other non-Polish sources in Warsaw (like Thorpe) which gave him the heads up of Rejewski's work even before Rejewski decided to share it on the eve of war.
* As to why I remove the dubious-discuss tags, the reason is that I feel they are used incorrectly. It is NOT dubious to say that Stephenson gave credit to Amy Thorpe for early information about Enigma, he undeniably does along with other sources. It is not a correct use of the dubious tag IMO simply because one editor disagrees with the point Stephenson is making about Thorpe, the correct use of the dubious tag in this case would be if the editor disputes Stephenson said this about Thorpe. They are being tagged as dubious because Nihil Novi doesn't agree with what the source says about the subject, which does not make it dubious that the source (Stephenson) actually said it. The article makes clear that "Stephenson thought..." (or similar words) which would only be dubious if you have sources that say Stephenson DID NOT think or say this about Thorpe. You are arguing the underlying truth or untruth of what Stephenson thought - which is not the point - the point is Stephenson thought it and published his opinion as such (about Thorpe). If you are disputing that Stephenson said or thought this about Thorpe, that would be fine and we could discuss it, but there is no doubt that Stephenson, among at least another dozen sources, said and thought what is stated in the article - his own view of Thorpe's work.
* As to the Guiness Book of Spies link, and the yet-again pedantic request for sources that go unchecked or unread by the agenda-driven-pro-Polish-editor, it is again NOT DUBIOUS that the head of BSC gave credit to Thorpe as mentioned in the article, he did. If you don't agree with him, that's fine, but other sources - here they are AGAIN, most mentioned previously on this page or article and easily available on Google, also tend to confirm William Stephenson's words:
"It has long been suspected that Cynthia made the connection that brought the Enigma cypher machine to Britain from Poland." Page 71. http://books.google.co.uk/books?id=Za4kd9murKcC&pg=PA69&dq=Amy+Elizabeth+Thorpe&hl=en&ei=dsZ6TNORM8mD4AbEsNHPBg&sa=X&oi=book_result&ct=result&resnum=2&ved=0CC0Q6AEwAQ#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false
* Tom E. Mahl, Espionage's Most Wanted: The Top 10 Books of Malicious Moles, Blown Covers... Evidently a superficial popularizer. (Why don't you identify the authors and their books?) Nihil novi (talk) 06:37, 13 September 2010 (UTC)
"Pack began an affair with a Polish diplomat, Edward Kulikowski...." http://books.google.co.uk/books?id=6BP6Bph006YC&pg=PA52&dq=Amy+Elizabeth+Thorpe&hl=en&ei=sMZ6TPP1HsPI4Ab27q3dBg&sa=X&oi=book_result&ct=result&resnum=3&ved=0CDMQ6AEwAg#v=onepage&q=Amy%20Elizabeth%20Thorpe&f=false
* Simone Payment, American Women Spies of World War II, pp. 52–66 (some of the pages are not available at this on-line site). This is evidently copied from Stephenson; but where Payment got the name "Edward Kulikowski" from, I don't know. Nihil novi (talk) 06:37, 13 September 2010 (UTC)
* EXACTLY you don't know where Payment discovered this information - our role here is NOT to provide original research or discount a published source because YOU haven't heard a piece of information before. Our role is to report the original research of others, whether we agree with it or not and whether we know where THEY got their research. You, shocking though it may be, are NOT aware of every source on this subject and in any event your role on Wikipedia is merely to report what other published sources say, not carry on your obsession with getting the world to honor Poland's role in Enigma, defend Polish behaviour in the War, etc... Leidseplein (talk) 01:25, 15 September 2010 (UTC)
"In Warsaw [...] many of them men she was involved with held important posts; one of them included the personal aide to the foreign minister, Józef Beck." http://ww2db.com/person_bio.php?person_id=405
* C. Peter Chen, "Amy Thorpe," on a site called "World War II Database": a 1-page summary of the Thorpe story in Stevenson's book. Again, hardly an independent authority on Thorpe. Nihil novi (talk) 06:49, 13 September 2010 (UTC)
"From him Pack learned Polish experts were working on overcoming the threat posed by Germany's Enigma enciphering machine" http://www.historynet.com/amy-elizabeth-thorpe-wwiis-mata-hari.htm
* "Amy Elizabeth Thorpe: WWII's Mata Hari" (3 pages on "HistoryNet.com") is largely, again, an extract from Stevenson but makes some departures, as when it states: "The extent of her contribution to the 'Ultra secret' that gave the Allies a crucial edge over the Nazis remains a matter of conjecture. [My emphasis.] In fact, however, Britain would owe its ability to decode so much of Germany's World War II radio traffic to the efforts of the Poles, who had cooperated with the French in working out the Enigma system."
* Another departure: "The literary consensus is that Cynthia's amorous success contributed to British victories in the Mediterranean. The lady herself, who described her relationship with [Admiral Alberto] Lais as 'sentimental and even sensual rather than sexual,' said she received the ship sabotage information directly from the admiral and access to the sensitive [code] books from his assistant with Lais' full cooperation. Heirs of the admiral sued a British author in an Italian court for defamation in 1967, insisting Lais (who had died in 1951) had not betrayed military secrets, and won. In 1988, Lais' two sons protested publication of the seduction account in David Brinkley's best-selling Washington Goes to War and persuaded the Italian defense ministry to publish denial ads in three leading East Coast newspapers." Thus, this "source" on Thorpe registers doubts about some of Stevenson's stories... Nihil novi (talk) 07:21, 13 September 2010 (UTC)
"Cynthia [Thorpe's codename], you mean the one who paved the way for us to get the Enigma machine and break the Ultra code." Quoting Dwight D. Eishenhower, http://books.google.com/books?id=fkgTTVIsHuUC&pg=PA312&dq=amy+pack+enigma&hl=en&ei=U4qNTL3sHsG78gbWobXBCQ&sa=X&oi=book_result&ct=result&resnum=1&ved=0CCoQ6AEwAA# —Preceding unsigned comment added by Leidseplein (talk • contribs) 02:26, 13 September 2010 (UTC)
* Dick Puckett, Connecting the Dots: Reads like fiction — and probably is. On page 316, in the company of Allen Dulles, Dwight Eisenhower and his driver Kay Summersby, when Summersby praises General Eisenhower's contribution to victory in World War II, Thorpe mentally rehearses her own resumé as the person "who won the war." Item 3: "Slept with a Polish officer leading to the procurement of the coveted Enigma machine that allowed the breaking of the German Ultra code." Again, no details of that alleged achievement are provided. Nihil novi (talk) 08:11, 13 September 2010 (UTC)
...in other words numerous independent sources say Thorpe was a spy in Poland, had an affair with a Polish diplomat, and provided early details about Enigma to Stephenson, the head of BSC, including, most importantly, William Stephenson himself. The only source that I've seen that contradicts this is Polish - Woytak - whose life's work is to diminish any role in Enigma for any nationality unless they are Polish.
* Anyway, as I said I am happy that the article as it exists now accurately represents both sides of the dispute in Thorpe's work in Poland and I hope we can all move on to expanding Wikipedia instead of arguing over this minor detail.
Leidseplein (talk) 00:37, 13 September 2010 (UTC)
Third opinion
Question: I see that there's a third opinion pending for this page. Based on the discussion above, though, it seems you may have worked through the issue. Is that correct or is further help needed? — Hello Annyong (say whaaat?!) 01:17, 13 September 2010 (UTC)
* I am only one side of the dispute, but I think yes, it is resolved as the article currently stands. My point is that we should include both sides of a contentious point - namely whether Amy Elizabeth Thorpe Pack Brouse was a spy in Warsaw in 1938 and provided information to the Allies about Enigma during this time. AFAIK there is only one source that argues she was not a source of Enigma information and this view is included in the article (Woytek). We have not heard from the Wiki editor who has so long disputed the numerous sources I cite and wishes to rely only on the source with which s/he agrees: Woytek's contention that Thorpe had no role in Enigma information from Poland. If you have a moment, why not chime in on the issue? Leidseplein (talk) 01:39, 13 September 2010 (UTC)
* It's kinda hard to follow the whole conversation above due to lack of signing and indentation, but I'm not seeing the Woytek stuff in the article. Either way, your solution is correct: show both viewpoints with proper attribution (e.g. "Woytek wrote that blah blah blah...") and let the reader figure it out. — Hello Annyong (say whaaat?!) 03:28, 13 September 2010 (UTC)
* Even a casual reader of Leidseplein's on-line "sources," listed above, can see that they are worthless.
* The test of credibility for a Wikipedia article is not how many specious "sources" may be provided, but the extent to which the article is based on solid factual evidence.
* All the claims made above for Thorpe having somehow "procured the Enigma machine" — just what that means, and how it was done, is never stated — mirror Stevenson's / Stephenson's mystifications.
* The true version of how Britain and France obtained access to the Polish Enigma double and decryption techniques and technology, is accepted by all serious historians and cryptology experts and may be found in works by, among many others, Gustave Bertrand, Gilbert Bloch, David Kahn, I.J. Good, Władysław Kozaczuk, Marian Rejewski, Hugh Sebag-Montefiore, Alan Stripp and Gordon Welchman. Amy Elizabeth Thorpe figures in none of their accounts.
* You need only read Wikipedia's many articles on Enigma and its decryption to see that Stevenson's / Stephenson's vague tall tales are unnecessary for explaining how the British gained access to Enigma decryption.
* Inclusion of those tales in a Wikipedia article, with a straight face, ultimately will only expose Wikipedia to ridicule. Nihil novi (talk) 09:00, 13 September 2010 (UTC)
* Um, okay. Can you briefly list out the sources that you find dubious and we can discuss them? — Hello Annyong (say whaaat?!) 12:03, 13 September 2010 (UTC)
The principal source on Amy Elizabeth Thorpe and her supposed espionage work before and during World War II appears to be William Stevenson's A Man Called Intrepid (1976). Other, on-line "sources" cited by the author of the Wikipedia article to bolster his claims for her, seem to be derivative of Stevenson's book.
I have above identified and commented on on-line sources cited by our author — on Mark Lloyd; Tom E. Mahl; Simone Payment; C. Peter Chen; "Amy Elizabeth Thorpe: WWII's Mata Hari"; and Dick Puckett.
On the subject of Thorpe and Enigma, Lloyd gives only a couple of sentences, mirroring Stevenson's equally skimpy, insubstantial statements. Mahl: ditto. Payment evidently copied extensively from Stevenson, but attached a name of unknown provenance to a "Polish diplomat." Chen gives a 1-page summary of Stevenson's Thorpe story.
"Amy Elizabeth Thorpe: WWII's Mata Hari," in 3 pages, again summarizes Stevenson, but goes further to observe that "The extent of her contribution to the 'Ultra secret'... remains a matter of conjecture. In fact, however, Britain would owe its ability to [decrypt so much German] radio traffic to... the Poles..."
The "Mata Hari" article also undermines both Stevenson and another of our article's authorities, David Brinkley, when it describes actions that were successfully brought against purveyors of the story concerning Admiral Lais' alleged betrayal of Italian military secrets to Amy Thorpe.
Dick Puckett seems to be writing patent fiction, based on Stevenson's fiction.
What Stevenson himself writes about Thorpe and Enigma, and about much else, are brief vague allegations embedded within a matrix of innuendo, pontification, and generally-known background information about the period.
What unique, valuable information about Enigma did Thorpe pass on to MI6? "Stephenson always felt that she contributed a great deal to the vital statistics [huh?] that were required for a machine that later... became the first modern computer... 'Colossus'." (P. 343.) What sort of mumbo-jumbo is this? And how did Stephenson, a Canadian who only later became head of British Security Coordination in New York and was not at the time working with Thorpe, learn about Enigma? Was MI6 as careless with its vital secrets as the Polish Cipher Bureau is made out to have been?
The whole Stephenson / Stevenson story about Thorpe and Enigma simply does not hang together and has no plausibility — not least in its suggestion that an anonymous aide to the Polish Foreign Minister could possibly have known the names of "Mademoiselle Marian Rejewski" and his two mathematician colleagues at the Cipher Bureau (p. 343).
Remove the nonsense about Thorpe and Enigma, and about Thorpe and Lais — and what remains? At best, if you can believe it, a promiscuous lady safe-cracker.
I would question whether Amy Thorpe even meets Wikipedia criteria for notability — assuming, in the first place, that she actually existed and engaged in espionage.
William Boyd, in a 2006 Guardian newspaper article about a British Security Coordination history that was published in 1998, describes highlights of the BSC's wartime black propaganda operations in the United States. Boyd makes no mention at all of BSC's employee Amy Thorpe — who, according to Stephenson / Stevenson, as reported in our Wikipedia article, "would be seen as the greatest female spy in history, if her story were ever made public" (I have been unable to locate this assessment in my original 1976 edition of Stevenson's book). Nihil novi (talk) 09:15, 14 September 2010 (UTC)
* this all appears to be your opinion.Slatersteven (talk) 12:22, 14 September 2010 (UTC)
* Okay, so there are a few issues here. The first is that, yes, I think this article meets the notability criteria. You've got at least three independent reliable sources - Stevenson, Mahl and HistoryNet - for the subject. (Side note - apparently HistoryNet is considered to be a reliable source per this.)
* Just because we have sources that contradict each other does not mean that one or both are invalidated. We're not here to pass judgment on the sources (assuming they're reliable); all we can do is echo what the sources state with proper attribution and let the reader decide. So to that end, we could say "William Stevenson says that blah blah blah. According to HistoryNet, blah blah."
* With regards to the Enigma question, I think the article handles the issue fairly well. It gives one account with attribution and then shows the opposition with more attribution - but does so in an even-handed way that doesn't cause the reader to definitely pass judgment one way or the other.
* You're right that Mahl is largely speculation, so I would probably avoid using that one. I find Lloyd to be far more usable here, though, and you could probably source to Lloyd anything you got from Mahl.
* As a side note, I do find some of the sources listed to be unacceptable. The ww2db credits page (Chen?) basically says that it's just a site run by a guy. He's not really an expert in the field or anything, so I wouldn't use the site.
* So okay, where to proceed from here. If that claim about her single handedly being responsible in the lead isn't in the book, then it should be removed. (Was that text added in the reissue?) If there's still a question about sourcing, I would say post on WP:RSN and let the people there evaluate the sources. — Hello Annyong (say whaaat?!) 12:58, 14 September 2010 (UTC)
* I think the article deals with sources giving contrary information adequately. Our role is not to evaluate published sources from serious journalists and authors so much as it is to report them and let the reader decide on their own. I'm fine with the article as it stands now. Leidseplein (talk) 20:33, 14 September 2010 (UTC)
* Just FYI, The fullest easily accessible published information on Amy Elizabeth Thorpe Pack Brouse I've found is on pp 21-32 of Elizabeth McIntosh's Sisterhood of Spies (all 11 pages are available online here)
* http://books.google.com/books?id=7wHWT3WT_rYC&printsec=frontcover&dq=mcintosh+sisterhood+of+spies&hl=en&ei=5w6QTKnvHoHG8wTLnZTGDg&sa=X&oi=book_result&ct=result&resnum=1&ved=0CCgQ6AEwAA#v=snippet&q=code-room%20mata%20hari&f=false
* Leidseplein (talk) 00:18, 15 September 2010 (UTC)
* This book, Mary Lovell's Cast No Shadows devoted to Amy Elizabeth Thorpe gives the account of her work on the Polish Enigma, explains why the British were suspicous of the Poles, why the Poles were not forthcoming with Enigma to the brink of war, etc... but since I don't have the actual book and can only read very partial bits and pieces online I'm reluctant to quote it in the Wikipedia article on Thorpe.
* http://books.google.com/books?id=Ol5nAAAAMAAJ&dq=montgomery+hyde+cynthia&q=poland+enigma
* Leidseplein (talk) 00:33, 15 September 2010 (UTC)
"why the British were suspicous of the Poles" - does the book explain why the British weren't suspicious enough of the Germans, Italians, Soviets?Xx236 (talk) 13:44, 22 September 2010 (UTC)
Dubious Interwiki
de:British Security Coordination doesn't mention Thorpe.Xx236 (talk) 07:54, 13 September 2010 (UTC)
Overquoting and other issues
As of this edit, this article has far too much quoting. And to have a blockquote with multiple references in it doesn't make sense; it's a direct quote from a book and has a single source, and that's all that should be referenced. (If the book had multiple inline refs like that, then it's another story, I guess.) As such I'm going to cut down the article to avoid this. Also, referring to the source as "Stephenson / Stevenson" is dubious and overly casts the source as questionable, which is unacceptable. For example, "According to Stephenson's / Stevenson's best-selling A Man Called Intrepid," is inaccurate - Stephenson wasn't the author of the book, so referring to it as such doesn't work. — Hello Annyong (say whaaat?!) 20:50, 19 September 2010 (UTC)
* There are actually far more serious issues here than I realized. "A characteristic Stephensonian / Stevensonian suggestive stringing-together of undocumented allegations and innuendoes." is an entirely unacceptable thing to write in an encyclopedic entry, much less in a reference. The notes are not meant to be places of speculation or anything like that. Honestly I'm just going to jettison most of the text here, as it does not work at all. — Hello Annyong (say whaaat?!) 20:56, 19 September 2010 (UTC)
* You have deleted relevant documented information, while reintroducing trivia and "sources" of no value, one of which (C. Peter Chin) you previously said was "not really an expert... so I wouldn't use the site."
* Stevenson seems to imply (his style is murky) that one of Stephenson's sources concerning Enigma decryption was "Polish engineers [who] worked on the new Enigma models" — whatever "new Enigma models" might have meant. The three Polish mathematicians who broke and read Enigma from December 1932 were not "engineers". Stevenson is presumably referring to a story earlier given by F.W. Winterbotham (1974) and Anthony Cave Brown (1975) about a Pole working at an Enigma plant who provided information to British intelligence. No evidence exists that there was a Pole (or "Polish Jew") working in an Enigma factory. The only "inside" source (and quite a valuable one!) was Hans-Thilo Schmidt, an employee of the Wehrmacht Cipher Bureau, reference to whom you have deleted. Stephenson's ignorance of the true facts in this matter is suggested by William Stevenson's reference to mathematician "Mademoiselle Marian Rejewski, who was a man (and was married).
* In place of pertinent facts, you have reintroduced irrelevant references to Marlene Dietrich, Lotte Lenya, Julia Child and Virginia Hall.
* It is not clear why you deleted the quotation from T.J. Naftali, writing in Intelligence and National Security (1993).
* You reintroduced the statement that Thorpe "gathered embassy safe combinations and thus helped neutralize Axis spies and secret operations in the Americas" — supported, supposedly, by text on p. 365 of Stevenson's A Man Called Intrepid. There is no such reference to the Americas on p. 365.
* You eliminated a source that raises doubts about Thorpe having seduced Italian Admiral Alberto Lais, who, per Stevenson, was thus "persuade[d] to have the cipher and code books removed for microfilming" by Thorpe's confederates. Nihil novi (talk) 22:42, 19 September 2010 (UTC)
* I admit that I went back to a version before all of your edits, and some of the discussion here didn't make its way in. I just made the proper changes based on your writings above. I don't see why those references are "irrelevant" as you described them, though; it seems relatively okay to me. — Hello Annyong (say whaaat?!) 23:07, 19 September 2010 (UTC)
* The latest edit by HelloAnnyong fairly presents the available sources without imparting a personal POV. The role of Wikipedia in this case is very well served by allowing the casual internet user a quick review of the published accounts of Amy Elizabeth Thorpe - and makes clear that the sources are not entirely in agreement, thereby inviting a more serious reader to consult the sourced publications to make up their own mind. I note that there is an active editor here who is seeking to reject sources based only on the fact that other sources present a different view (and it seems because this editor is publicly engaged in an agenda to forward a pro-Polish view of WW2 history at the expense of all other historical literature). Leidseplein (talk) 00:14, 20 September 2010 (UTC)
* The Naftali quote, supplied as "another critic" to bolster the solo critic Woytak, is not correctly used here. Woytak is in fact the only source that arguably contradicts the previous sources. Natfali is criticizing William Stephenson generally and Stephenson's allegation of supplying British intelligence with an Enigma machine. Natfali also is talking about actual DECRYPTION, which no source on Thorpe claims she did in Poland or ever. None of this is relevant to the subject of the article, Amy Elizabeth Thorpe and in no way speaks to the subject most upsetting to Nihil Novi - the role of Thorpe in obtaining early information about Polish Enigma work in 1938 before the Poles shared their work officially in 1939. In the interest of peace and harmony, I have stopped editing this article and will let 3rd parties decide any issues I point out from now on.Leidseplein (talk) 00:28, 20 September 2010 (UTC)
Nothing would make me happier than to discover that Thorpe, directly or indirectly, made a genuine, important contribution to Enigma decryption. And I agree that readers should be able "to consult the... publications to make up their own mind." That is why I provided those few lines from Stevenson (since removed as "overquoting") that pertain to Thorpe's supposed involvement with Enigma. And there is nothing there to substantiate Stevenson's suggestion (p. 343) that Thorpe made a "contribution... to success in the search for the ULTRA secret." Historians have determined exactly what German documents Hans-Thilo Schmidt gave to French intelligence, which Gustave Bertrand passed to Poland's Cipher Bureau. Also, historians can consult, at Britain's Public Record Office, German Enigma-enciphered messages that were decrypted during World War II at Bletchley Park. Why have no comparable documents surfaced that Thorpe is alleged to have obtained from Polish Foreign Minister Józef Beck's office?
Instead of such documentation, we are given references to internet sites that, with few exceptions, merely mirror Stevenson's unsubstantiated assertions.
As to Marlene Dietrich et al.: Marcus Binney's book The Women Who Lived for Danger (2002) discusses the careers of 10 prominent female agents (including Virginia Hall) of Britain's wartime Special Operations Executive. Why does this article pass over most of them? Nihil novi (talk) 02:23, 20 September 2010 (UTC)
A masterpiece of idiocy
"her work in helping the Allies understand how the Enigma machine was used and that Polish mathematicians were breaking Enigma ciphers.[6] Enigma machines would be used throughout the coming war by the Axis Powers, whose enciphered messages would frequently be read at Britain's Bletchley Park." — It seems that the good Amy "Bond" outsmarted the bad Poles...
"Ultra" quotes Gordon Welchman: "Ultra would never have gotten off the ground if we had not learned from the Poles, in the nick of time, the details both of the German military... Enigma machine, and of the operating procedures that were in use." Why, if they knew everything from the smart Amy? Xx236 (talk) 13:48, 22 September 2010 (UTC)
Leidseplein: "the role of Thorpe in obtaining early information about Polish Enigma work in 1938" — What exactly did the British government do with the knowledge? How much money did they invest in decryption in 1938? Xx236 (talk) 14:00, 22 September 2010 (UTC)
* Stevenson's story about Amy Thorpe and Enigma is indeed a masterpiece of idiocy. Nihil novi (talk) 09:49, 25 September 2010 (UTC)
* If until 29 August 2010 there was no Wikipedia article on William Stephenson's / William Stevenson's Amy Thorpe story, there is a reason for it: There seems to be no substance to the story — certainly not to the parts involving the Enigma cipher. Nihil novi (talk) 20:59, 3 October 2010 (UTC)
Redeeming Poland's Role
Leidseplein wrote:
"Is your agenda to redeem Poland's role in the war so intense that you can not accept others besides Poles contributed to cracking Enigma?"
Just out of curiosity. What was the Poland's role in the war that Leidseplein feels should need redeeming? I hope for an answer. Thank you.--SylwiaS | talk 00:00, 28 September 2010 (UTC)
* I too await Leidseplein's response. The quotation seems to illustrate an octopus strategy — the release of turbid clouds of ink — to distract from the inanity of William Stephenson's / William Stevenson's Amy Thorpe fabrications. Nihil novi (talk) 08:06, 29 September 2010 (UTC)
Synthesis and generalization
The following discussion was moved from User talk:Nihil novi.
I have removed the paragraph you added. Although having these sources is obviously good, I am not convinced that the statement they are connected to is anything more than a overly broad generalization, and perhaps an editorialization on your part. I suggest that if these sources debunk specific stories, they be brought up in connection to those stories in the article, not as general sources in the lede. Also, bear in mind that court cases have two sides, and one side's "debunking" does not necessarily make it true. BMK (talk) 04:07, 8 March 2015 (UTC)
* No need to "bring [the sources] up in connection to th[e] stories in the article." The sources already are linked to the respective stories. In adding a second paragraph to the "Amy Elizabeth Thorpe" lead, I added NO NEW SOURCES. Nihil novi (talk) 04:15, 8 March 2015 (UTC)
* Do not revert me again. Your BOLD edit has been REVERTED and now we DISCUSS, per WP:BRD, but the article stays in the status quo ante. I've told you what I think, that your statement is overgeneralizing and a POV. Go read WP:NPOV and WP:SYNTHESIS again instead of edit warring. If none of those sources says "Most of the published stories of "Cynthia's" (Amy Elizabeth Thorpe's) exploits of seduction-and-espionage have been impeached by historians, by relatives of her deceased alleged targets of seduction and espionage, and by courts of law" then you can't say it, and it can't be in the article. BMK (talk) 04:28 March 2015 (UTC)
* If you honestly believe in the stories of "Cynthia's" espionage exploits, please cite, in "Amy Elizabeth Thorpe", full texts from published sources, rather than mere vague mentions of the exploits. Nihil novi (talk) 04:38, 8 March 2015 (UTC)
End of moved discussion
* You've been here for 8 years, you've got 35K edits, you should know how things work around here. What's in the article is sourced. If you don't like the sourcing, find better ones, but you CANNOT make a broad generalization from your own interpretation and analysis of what multiple sources say, it's forbidden by WP:SYNTHESIS. Any positive statement such as you tried to add must be accompanied by a citation from a reliable source that specifically supports that statement. If you provide three sources for a statement, all three must specifically support the statement. You cannot (and the fact that you apparently don't know this after being here for so long is disturbing), give three sources that say different things and use them to support a generalization that you made up. That's your own analysis or interpretation, and it's just plain not allowed, verboten, against the rules. If you keep trying to do that, I will continue to remove it and leave the article in the status quo ante as prescribed by WP:BRD. BMK (talk) 04:49, 8 March 2015 (UTC)
* You are also apparently unaware that moving talk page discussions from one place to another without the permission of all participants is considered to be quite rude. BMK (talk) 04:54, 8 March 2015 (UTC)
For the information of readers who would like to understand what this is all about, this is the disputed second paragraph that I had added:
Most of the published stories of "Cynthia's" (Amy Elizabeth Thorpe's) exploits of seduction-and-espionage have been impeached by historians, by relatives of her deceased alleged targets of seduction and espionage, and by courts of law
Nihil novi (talk) 05:11, 8 March 2015 (UTC)
Use Picture and refs ?
Photo -- http://www.dailymail.co.uk/news/article-3552906/
Text -- http://www.dailymail.co.uk/news/article-3674051/
Book reference -- "The Last Goodnight" by Howard Blum pub. April 2016
-- I hope someone can make use of these sources to supplement wiki listing.
.. Anne AnEyeSpy (talk) 03:18, 20 September 2017 (UTC)AnEyeSpy
Birth of first child
I think the birthyear of the first child is incorrect. 1930 makes sense. 1931 does not. jengod (talk) 19:28, 7 March 2023 (UTC)
Ra social memory complex as Thorpe aspect
Thorpe is all I have to average Ra social memory complex for my protection. The only way to convert the Orion material to Venus is with their aspects that are military prostitutes and spies. Thorpe may be the finest Maldekian-Venusian material Ra has to offer as the Orion conversion is so clean and fast. Simply, she is able to reject masculine material at the fastest possible rate and bring it to terminal velocity of consciousness. I do not average Mohammed or Allah with Ra. I put Britain and America on them. I will not incarnate in a warzone ever again. The CIA and NSA and their immune funding will know me here. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:19, 22 January 2024 (UTC)
|
WIKI
|
In Praise of an Aggressively Unfashionable Shoe
There are running shoes and hiking boots, tennis sneakers and ballet slippers. There are cleats for soccer, fins for swimming and sandals for the beach. And then there are Dansko clogs, beloved by chefs, sculptors, gardeners, masseuses, surgeons — and also by every soft-skilled woman in New York I know. I acquired my first pair of Dansko clogs for a summer waitressing job in high school. My mom drove me to a store known for its healthful, if offensively functional, footwear and — I’ll never forget it — made me pay for the manager-recommended clogs myself. “You have a job now,” she said. “Why would I buy them?” It was the first time I had ever spent money on something I didn’t want. Fifteen years later, and I’m on my sixth pair of Dansko clogs. I am almost never not wearing them. Shoes I might have once considered comfortable — sneakers, flat ankle boots — are now unendurably tight. I prefer Danskos to socks or being barefoot and sometimes even succeed in convincing myself that nobody will notice if I wear them out at night with a dress. With their swollen toe boxes and jouncy heels, they have the look of water beetles or licorice jelly beans. I’ve come to not just tolerate Dansko clogs, but actually consider them beautiful — a kind of appreciation usually reserved for natural objects like pine cones or elk antlers. Dansko clogs have a tool-like utility; if the Whole Earth Catalog were still around, surely it would stock them. I truly believe that the Museum of Modern Art should acquire a pair for its permanent collection. Sturdy and high off the ground, with great arch support and not a lot of give, they are especially popular among those who perform emotional labor such as nurses and flight attendants: work that skews disproportionately female and involves a lot of standing. It was unsurprising to see so many pairs shuffling along Fifth Avenue at January’s Women’s March on Washington in New York City, literally supporting the chanting and sign-wielding. Headquartered in Chester County, a rural and horsy part of Pennsylvania, about an hour’s drive west of Philadelphia, Dansko was founded in 1990 by Peter Kjellerup and Mandy Cabot, a pair of married ex-dressage trainers. The company is now completely employee-owned. The buildings are LEED-certified, tranquilly designed and staffed by 155 people, all wearing clogs. There are solar panels and a rooftop garden, stone-colored furniture and an expansive on-site kitchen. At the building’s main entrance, a sculpture inspired by Copenhagen’s famous “Little Mermaid” bronze statue sits in an outdoor fountain. Going there was like walking into an American’s fantasy of Scandinavia — a superlative quality-of-life index made real. Cabot and Kjellerup look like people you might see on a hiking trail or knee-deep in corral mud. They spent the first decade of their marriage running an 80-acre farm and traveling back and forth to Europe, buying and selling horses. It was on a work-related trip to Denmark one winter in the late ’80s that Cabot, at her husband’s urging, borrowed a pair of traditional wooden-soled Danish clogs, “the kind any self-respecting farmer there owns,” which have closed backs. “They were unbelievable,” Cabot recalled. Despite being loose and unlined, they allowed air to circulate, keeping her feet warm. Later on that same trip, they encountered this style of clogs, again, but with polyurethane rather than wooden soles. These, they thought, were even better: the ideal barn shoes, great for mucking about, easy to get on and off. With the proceeds from the sale of a foal, Cabot and Kjellerup bought their first order of polyurethane-bottomed clogs. They began importing them in small quantities and selling them out of the back of their station wagon at horse shows. The clogs soon gained a cult status among riders, who raved about the shoes’ comfort, warmth and support. When I told Cabot and Kjellerup that almost everyone I know in New York wears Dansko clogs, even the most stylish and constitutionally avant-garde, they didn’t seem particularly impressed, or surprised. But no fashion company has ever approached them to do a collaboration, which astonishes me. Though I’ll always be loyal to the plain black leather model, it’s undeniable that they’d look great done up in a tomato red, Supreme logo printed across the vamps. It’s almost impossible to believe Opening Ceremony hasn’t tried to release limited-edition Dansko clogs in some absurdist material like pink fur. Thank goodness they haven’t, though. Dansko clogs are bought and sold on the premise that there is no more comfortable shoe, especially for people who spend a large part of the day on their feet. That’s true. But it’s also true that they are an example of an extremely rare category of item that projects nearly nothing. At a time when every article of clothing seems to communicate information about the wearer’s class, status and personal taste, Dansko clogs are reassuringly neutral. Before taking the train back to New York, I asked Cabot and Kjellerup one final question: “Will the design ever change?” They shook their heads. “No, absolutely not,” Kjellerup said.
|
NEWS-MULTISOURCE
|
Lake Winnibigoshish
Lake Winnibigoshish is a body of water in north central Minnesota in the Chippewa National Forest. Its name comes from the Ojibwe language Wiinibiigoonzhish, a diminutive and pejorative form of Wiinibiig, meaning "filthy water" (i.e., "brackish water"). The name is related in structure to Lake Winnipeg and to the Algonquian name for Lake Winnebago, which the Ho-chunk (Winnebago) Nation was named after.
The Lake's area of 67,000 acres makes it the fourth largest in Minnesota. The headwaters of the Mississippi River begin at Lake Itasca (see Mississippi River Basin map); where it flows through Winnibigoshish, the Mississippi is at its widest - more than 11 miles.
The former Winnibigoshish Township (now unorganized), located on the north shore of Lake Winnibigoshish, in Itasca County, Minnesota, was named after this lake.
|
WIKI
|
Page:A page of American history (1905).djvu/11
Rangers, to serve as his adjutant on an expedition against the rebellious Indians of Yucatan. After the Rangers were formally disbanded (death had practically disbanded them some time before), Pinkus, wounded and sick nigh unto death, returned to Merida. There he was tenderly nursed back to life and health by the lady, a native of Merida, whom he afterward married. Afterward he went in and fought against the French by the side of Juarez. When peace was again declared he returned to Merida and started what was then the finest tailoring establishment in the province. He lived to see his sons grow up to be men of influence and respectability in the community. He died in 1904, indirectly from the wounds received in the fights with the Indians. I now give his direct, personal statement:—
"I came over as Adjutant to Col. White, commanding Southern Rangers. Our officers were Col. White, Lieutenant Colonel Linton, Captain Smith and Captain Daws. Captain Daws came over first with two hundred men and Colonel White came over some time after, but Colonel White was in full command. We were in all nine hundred and thirty-eight men and, of all these fighting men, only eleven lived to reach the United States again. Our first fight with the Indians was at Sacalum and they beat us bad, for they fought like devils, but the second time they attacked us, at nine o'clock that same night, we beat them badly. I, with a part of our force was in Tijosuco when it suffered the great siege, and there we lost a great many men and officers. In the battles of Bacalar, in the three battles of Chan Santa Cruz, at Tabi, Peto and, most of all, at Calumpich, we lost most of our men. I was wounded three times. Captain Daws was one of those who lived to return to the States. When I was in San Francisco in 1890 I saw him there. He was short and fat but a good officer and very brave."
Michael Foster, the second and last known survivor of the fighting Americans in Yucatan, was born in Philadelphia in 1823, and is now eighty-two years old. He was,
|
WIKI
|
Two-lined ground skink
The two-lined ground skink (Kaestlea bilineata) is a species of skink. It is found in the Nilgiri Hills and Travancore Hills of India.
|
WIKI
|
Bridger Antelope Trap
The Bridger Antelope Trap is an archaeological site in Uinta County, Wyoming, associated with local Indigenous hunting practices. As an important example of hunting and gathering strategies, the site provides important clues to native subsistance in the past. The Wyoming State Historic Preservation Office nominated the antelope trap for the National Register of Historic Places (NRHP). The NRHP added the site to the Register on 21 January 1971.
Archaeological investigations, conducted in the late 1960s by Dr. George Frison of the University of Wyoming, indicated that hunters likely used the trap before 1850. However, its length of service is unknown; archaeologists believe that the site is associated with Indians of the Late Prehistoric Period. The Natives' technique, when hunting antelope, was to drive a herd into the long entrance of traps similar to the Bridger Antelope Trap. The opening, made of juniper wood, led to the trap proper, located at the base of a hill. This portion of the structure was circular and also constructed of juniper wood; hunters drove the antelope around the path until exhausted, at which time they would dispatch the exhausted prey.
The Bridger Antelope Trap covers close to 26 acre. Its entrance is arc-shaped and is close to 0.25 mi in length, extending in a northeast-to-southwest direction across a smooth valley. The trap itself serves as an extension of the entrance and has a diameter of around 700 ft.
|
WIKI
|
Page:Travels & discoveries in the Levant (1865) Vol. 1.djvu/250
200 Within this outer enclosure is an inner line of wall 24 feet 2 inches on the W. side: the foundations appear to be a square within the outer square.
From Monolithos we went to Siana, along the foot of Mount Akramytis, which runs towards the sea in a S.W. direction, and of which the height, according to the Admiralty chart, is 2,706 feet. At Siana I found another castle of the Knights, and evident remains of an Hellenic city.
About ten minutes to the N.W. of the village, on the side of a hill, was a rectangular basement, composed of large marble blocks of Hellenic masonry. The longest side, running N. and S., measured 10 feet 10 inches. One of the blocks was 7 feet 8 inches by 2 feet 8 inches by 1 foot 6 niches. Near this spot I observed a piece of Hellenic wall. Nearer the village was a stone seat cut in the rock, and by the side of it two steps, originally part of the same rock, but separated from it by a chasm. On the other side of the seat is a raised platform, with a deep groove at the side. The chasm between the seat and steps seemed caused by an earthquake. The platform reminded me of the bema in the Athenian Pnyx.
On this site are remains of rock tombs which seem to have been disturbed by an earthquake. A few yards higher up the hill was a large block of stone, 5 feet 7 inches by 3 feet 4 inches. In the centre of the block was a socket, 1 foot 10 inches by 1 foot 3 inches square.
About twenty minutes to the E. of the village, on the side of the hill, exactly facing the castle, I found traces
|
WIKI
|
What is an iron fallout remover?
An iron fallout remover is a chemical which is sprayed / added to an area affected by iron fallout – typically the wheels of a vehicle affected by brake dust – which reacts with and loosens said fallout to clear the affected area of the iron-based contaminants.
The key active product is sodium thiglycolate (thioglycolic acid), which reacts with the iron to leave the affected surface clear of contaminants following the wash.
Power Maxed - Iron Off
History
Thioglycolic acid was first discovered by a scientist investigating why the protease enzyme could not break down hair, nails and skin, and was identified as a product which could actually do this.
In relation to metals, the acid was developed for its colour-changing function, in order to establish whether a batch of metal (usually aluminium or steel) was “bad,” or, in other words, contaminated with iron.
Once its iron removal properties were discovered, it became more widely used as a cleaning product.
Clay bars are the only other tool used to safely remove iron fallout from vehicle surfaces, but are far more time consuming and much less effective than a chemical cleaning process.
What does an iron fallout remover actually do?
Now for the sciency bit. For those of you who don’t have much time or interest in the in-depth science of how a fallout remover works, here’s the short version:
The thioglycolic acid reacts with iron in its current state, turning it into another state which is easier to remove.
Now for the more involved version:
Iron (II) is oxidised by the thioglycolic acid into Iron (III) and thereby is molecularly bonded to the acid ready to be rinsed off.
Iron II is missing two electrons, meaning that it is positively charged. An exothermic reaction takes place producing heat and causing the thioglycolic acid to lose some of its hydrogen atoms which are replaced by an iron atom, making the iron part of the acid compound which is then much easier to remove through rinsing.
What to look for in an Iron Fallout Remover
There are many different Iron Fallout Removers on the market, and it can be difficult to know which one to choose. The best way is to try each one, but what is the professional valeter and detailer looking for from a fallout remover?
Time to react
The quicker the product reacts, the more active product is likely to be in the ingredients. This saves time, and increases the effectiveness of the clean by ensuring that the fallout remover solution has as much active product included in its recipe as possible.
Viscosity
The thicker the solution, the longer the contact time, therefore meaning that the reaction is taking place on the desired area for longer. There is a balance, as if the product is too viscous only a fraction of the liquid will achieve surface contact, so a balance between the two provides the best results.
Why you should be careful using an iron fallout remover:
For your own protection:
As mentioned earlier, the active ingredient in an iron fallout remover was discovered first to be able to dissolve hair, nails and other body parts. Therefore, great care must be taken to protect one’s bodily parts from contact with the cleaning product.
It is also worth noting that the active product also smells quite pungent. It is highly recommended to use the product in a well-ventilated environment.
For the protection of the vehicle:
An iron fallout remover is not suitable for use on all surfaces, as it can react with iron molecules which are actually supposed to be there, such as on the brakes themselves.
Most areas of modern vehicles should be safe to clean with an iron fallout remover, but consider carefully which areas of older vehicles are safe to clean.
The chemical should not be allowed to dry out, nor should it be left for a prolonged period of time on any surface of the vehicle.
Information on the Power Maxed Iron Off Fallout Remover can be viewed here:
Power Maxed Iron Off
|
ESSENTIALAI-STEM
|
Page:The time spirit; a romantic tale (IA timespiritromant00snaiiala).pdf/89
II
An electric bell was heard to buzz.
"They are here," said Mrs. Wren in a tone with a thrill in it.
A neat parlor maid announced "Lord Wrexham, Mr. Dinneford," and two stalwart young men entered cheerily. They were hearty upstanding fellows, curiously alike in manner, appearance, dress, yet in the thousand and one subtleties of character immutably different. But this was not a moment for the fine shades. They came into the room unaffectedly, without shyness, and warmly took the hands of welcome that were offered them.
Wrexham, a subaltern of the Pinks of three years' standing, was an attractive but rather irresolute young man. He knew that he was perilously near forbidden ground. If not exactly in the toils of an infatuation, the charms of Milly were growing day by day upon an impressionable mind. Fully content as yet to live in the moment, a wiser young man might have begun to pay the future some little attention.
As for the lively, headstrong, unconventional Jack Dinneford, at present at a loose end in London, to whom Wrexham himself had been appointed as a sort of unofficial bear-leader by the express desire of Bridport House, that warrior was on a voyage of discovery. In common with half the males of his age in the metropolis he was already in the thrall of the wonderful Princess Bedalia. In the opinion of connoisseurs she was the only one of her kind; for the past two hundred nights she had played "to capacity" at the Frivolity Theater,
|
WIKI
|
Extended phenotype: changes of flea biting behavior through selection on the plague pathogen in response to environmental variation
The biting behavior of the flea affects the transmission efficiency of the plague pathogen, Yersinia pestis, between rodent hosts, providing more opportunity for the pathogen’s survival in the face of varying environmental factors.
Like 0 Comment
Read the paper
Over the last few decades, genomic sequencing of plague samples –both present-day and ancient strains recovered from skeletons– has been used to understand how plague strains are related to each other along their genealogy. These studies have produced very interesting findings like that the strain of plague that spread through Europe during the Black Death is a direct ancestor of the plague that started the Third Pandemic more than 400 years later[1], and that plague outbreaks were tied to human trade[2, 3].
But genomic sequencing, especially when combined with microbiological experiments, can also be used to understand the evolution of pathogens. Efforts to understand the evolution of Yersinia pestis have revealed how the bacterium evolved from the ancestral Yersinia pseudotuberculosis, a far less lethal pathogen causing mild diarrhea[4, 5] and how quickly it evolved during its 5000 years of existence[6].
In 2007, we proposed a project to look at the evolution of Y. pestis in a small-scale region in order to better understand how this pathogen evolves within its natural habitat over short time scales and which natural parameter affects the pathogen’s variation. We selected the Guertu region in the Tien Shan mountains in north-west China, for which we had 78 frozen isolates dating from 1967 to 2006.
A genome-wide study of Yersinia pestis in an eco-evo context
By analysing the Y. pestis genetic variation within the plague ecosystem, we saw broad genetic drifts happening, with lineages expanding and disappearing. Remarkably, we identified a single gene, the omega subunit of RNA polymerase (rpoZ), which in more than 10% of the sampled isolates contained DNA sequence variants. This was far higher than what one would expect by a random pattern of mutation, indicating the presence of a strong positive selection signal for variants of this particular gene.
Previous studies had demonstrated in other bacteria that variants of rpoZ were associated with increased biofilm formation. These biofilms play an important role in the transmission cycle of plague, affecting two of the known ways in which plague can spread from fleas to rodents (biofilm-dependent transmission and early-phase transmission[7]). We confirmed in an in vitro setting that the rpoZ variants in the local plague strains in the Guertu plague reservoir also resulted in an increased level of biofilm formation.
Next, we asked the question: which natural factor, or driver, was responsible for the different variants of rpoZ? We collected environmental data for the period covered by our genomic data, including temperature, precipitation, flea index and rodent density, in order to better understand selective dynamics of the gene mutations of Y. pestis. Crunching the numbers, we found that it was colder and drier weather (coinciding with decreasing rodent host populations) that created a selective pressure in favor of the observed rpoZ variants. However, we were at first unable to understand the evolutionary significance of the observed selective pressure. Within the collaborative team we had long discussions how understand the observed dynamics evolutionarily. Then we suddenly understood: One of us (NCS) realized – on a flight between Oslo and Beijing – that what we saw was an example of Richard Dawkins’ Extended Phenotype concept, published in his 1982 book[8]: the rpoZ variants affected the behavior of the flea vector so as to maximize the plague bacterium’s own fitness. For verifying this concept with our data, Drs. Yujun Cui and Boris V. Schmid, the two co-first authors, spent extensive time to analyze the data. They, together with Professor Kjetill Sigurd Jakobsen and the two of us interacted a lot on the analysis and the interpretation of the results – and finally were able to put together what we think is a very interesting contribution both to our understandings of the plague system as well as to evolutionary biology.
Our conclusions are based upon a time-series type of analysis that combines genetic and climatic data. Of course, we – as well as one of the reviewers of our Nature Communications submission – would have liked to confirm this extended-phenotype proposition experimentally. However, experimental work with Yersinia pestis using a living flea vector is quite understandably restricted by high level of biosafety requirements. In the field, where we could observe the in vitroincrease in biofilm formation, we had no appropriate lab-facilities to test the behavior of these plague variants in vivo. Transporting living samples of plague across China to our facilities into Beijing, a city of over 20 million people, was likewise impossible. However, we are now building the necessary lab-facilities in China’s southern Yunnan province. Hopefully in a few years we will be able to show you the experimental results building on our current publication in Nature Communications
URL for the paper: https://www.nature.com/articles/s41467-019-14099-w
This Behind the Paper post is co-authored by Nils Chr. Stenseth and Ruifu Yang with contributions from Yujun Cui, Boris V. Schmid and Kjetill Sigurd Jakobsen, all co-authors of the Nature Communication paper.
References
1. Bos KI, Schuenemann VJ, Golding GB, Burbano HA, Waglechner N, Coombes BK, McPhee JB, DeWitte SN, Meyer M, Schmedes S, Wood J, Earn DJ, Herring DA, Bauer P, Poinar HN, Krause J: A draft genome of Yersinia pestis from victims of the Black DeathNature 2011, 478(7370):506-510.
2. Morelli G, Song Y, Mazzoni CJ, Eppinger M, Roumagnac P, Wagner DM, Feldkamp M, Kusecek B, Vogler AJ, Li Y, Cui Y, Thomson NR, Jombart T, Leblois R, Lichtner P, Rahalison L, Petersen JM, Balloux F, Keim P, Wirth T, Ravel J, Yang R, Carniel E, Achtman M: Yersinia pestis genome sequencing identifies patterns of global phylogenetic diversityNat Genet 2010, 42(12):1140-1143.
3. Namouchi A, Guellil M, Kersten O, Hansch S, Ottoni C, Schmid BV, Pacciani E, Quaglia L, Vermunt M, Bauer EL, Derrick M, Jensen AO, Kacki S, Cohn SK, Jr., Stenseth NC, Bramanti B: Integrative approach using Yersinia pestis genomes to revisit the historical landscape of plague during the Medieval PeriodProc Natl Acad Sci U S A 2018, 115(50):E11790-E11797.
4. McNally A, Thomson NR, Reuter S, Wren BW: 'Add, stir and reduce': Yersinia spp. as model bacteria for pathogen evolutionNat Rev Microbiol 2016, 14(3):177-190.
5. Sun YC, Jarrett CO, Bosio CF, Hinnebusch BJ: Retracing the evolutionary path that led to flea-borne transmission of Yersinia pestis.Cell Host Microbe 2014, 15(5):578-586.
6. Cui Y, Yu C, Yan Y, Li D, Li Y, Jombart T, Weinert LA, Wang Z, Guo Z, Xu L, Zhang Y, Zheng H, Qin N, Xiao X, Wu M, Wang X, Zhou D, Qi Z, Du Z, Wu H, Yang X, Cao H, Wang H, Wang J, Yao S, Rakin A, Li Y, Falush D, Balloux F, Achtman M, Song Y, Wang J, Yang R: Historical variations in mutation rate in an epidemic pathogen, Yersinia pestisProc Natl Acad Sci U S A 2013, 110(2):577-582.
7. Bland DM, Jarrett CO, Bosio CF, Hinnebusch BJ: Infectious blood source alters early foregut infection and regurgitative transmission of Yersinia pestis by rodent fleasPLoS Pathog 2018, 14(1):e1006859.
8. Dawkins R: The extended phenotype, the long reach of the geneOxford University Press,ISBN 0-19-288051-9 1982.
Go to the profile of Nils Chr. Stenseth
Nils Chr. Stenseth
Prof., CEES, Olso
No comments yet.
|
ESSENTIALAI-STEM
|
Surface patterns of supramolecular materials
Janelle Gunther, Samuel I Stupp
Research output: Contribution to journalArticle
23 Citations (Scopus)
Abstract
We report here on the two-dimensional patterns formed by supramolecular materials deposited from solution on oxidized silicon substrates. The supramolecular materials studied are composed of mushroom-shaped nanostructures measuring 2-5 nm in cross-section and approximately 7-8 nm in height. Two different materials were studied, one containing nanostructures with a hydrophilic phenolic base surface and the other containing a hydrophobic one with trifluoromethyl groups. The substrates were exposed to solutions of these materials for a set induction time at a series of concentrations using a motorized dipping apparatus. Samples were characterized by contact-angle measurements and tapping-mode atomic force microscopy. We observed distinct patterns as a function of concentration in phenolic supramolecular materials that interact favorably with the oxidized silicon surface. At low concentrations (0.01 wt %), the nanostructures form islands with uniform size of approximately 0.02 μm, which have the height of a single nanostructure (7.2 nm). As concentration increases, a string-like morphology with uniform width is observed first, followed by a percolating texture. At yet higher concentrations, the film transforms to a honeycomb morphology, but its height still remains equal to that of a single nanostructure. When interactions between the nanostructure and the surface are not favorable (i.e., between trifluoromethyl end groups and oxidized silicon), uniform height patterns are not observed. The distinct geometries are possibly the result of strong material-substrate interactions balanced by a repulsive force that could have electrostatic origin. The extremely uniform thickness of the two-dimensional patterns may originate in the hydrophobic and hydrophilic nature of opposite poles of the nanostructures, thus suppressing vertical growth of the film.
Original languageEnglish
Pages (from-to)6530-6539
Number of pages10
JournalLangmuir
Volume17
Issue number21
DOIs
Publication statusPublished - Oct 16 2001
ASJC Scopus subject areas
• Physical and Theoretical Chemistry
• Colloid and Surface Chemistry
Fingerprint Dive into the research topics of 'Surface patterns of supramolecular materials'. Together they form a unique fingerprint.
• Cite this
|
ESSENTIALAI-STEM
|
Snoring Keeping You Up? These Tips Can Help!
TIP! One simple way to reduce snoring is to watch your sleeping position. People snore more often when they sleep face-up, as gravity forces the head downward, which will cause their throat to constrict.
If you are a snorer, you’re in good company. Women suffer snoring problems at a rate of about 25% while the rate for men exceeds 40%. The older people get, the more frequently they snore. If you are interested in reducing how often you snore, or helping a family member who has this condition, this article might just help.
TIP! One way to cut down on snoring is to stay in a healthy weight range. Although excess weight does not directly correlate with snoring, excess neck fat does put more pressure on airways, which could result in snoring.
You can eliminate snoring by making funny faces–specifically faces that resemble a fish breathing while he swims. Making these faces is a real help, as silly as it sounds, because they exercise and strengthen important muscles in your face and throat. To make a fish face, close your mouth and pull in your cheeks. Try moving your lips like a fish. You want to do this a couple of times each day.
TIP! You can eliminate snoring by making funny faces–specifically faces that resemble a fish breathing while he swims. Making these faces is a real help, as silly as it sounds, because they exercise and strengthen important muscles in your face and throat.
If you want to stop snoring, upgrade to a pillow that is a bit firmer. A soft pillow allows your head to fall into a position which causes your throat to collapse. Narrow air passages contribute to increased snoring because air flow is reduced. A pillow that is firmer can help with keeping your airway open.
TIP! One of the best ways to reduce snoring is by ensuring that your nasal passages are kept open. The cause of your snoring may be due to a stuffed up nasal passageway.
If you want to decrease your snoring, you will need to quit smoking. If quitting doesn’t work, ensure that you don’t smoke within two hours of your bedtime. The passages through which air flows in your body will narrow when your smoke, due to swelling in your throat. This inflammation and narrowing leads to snoring; therefore, not smoking should relieve some of the swelling.
TIP! Do not take illicit drugs. They can cause you to snore, let alone the other health hazards they create.
If you snore often, drinking alcohol may make it worse. On top of this, you should stay away from antihistamines, sleeping pills and any type of tranquilizer right before you go to bed. The reason this happens is because these tend to relax your muscles, limiting your air passage in your throat, and therefore increasing snoring.
TIP! Prop your head up when sleeping, to minimize snoring. Make sure your head gets adequate support by lying on a firm, thick pillow.
To prevent snoring, sleep on your side. Sleeping on your back will help you sleep without snoring. On the other hand, sleeping on your stomach causes neck stress. Sleep on your side for the most benefits.
TIP! Your odds of snoring go up considerably if you have allergies or similar issues that cause nasal congestion. Congestion constricts your nasal passage and airway, leading to air blockage and snoring.
Snoring can be reduced by eating smaller meals in the evening. Eating too much food, especially right before sleeping, causes the stomach to become full. This can force the diaphragm upwards, and the resulting pressure can decrease or block air passage. Constricted air flow and a throat that is narrow are among the primary reasons for snoring.
Dairy Products
TIP! Get plenty of quality physical activity to minimize snoring. You may reduce your risk of snoring by regulating your breathing patterns with exercise.
Even though you may not be lactose intolerant, dairy products happen to be a very common cause for snoring. Dairy products promote the formation of mucus and phlegm that contribute to narrowing of the air passages in the nose and throat. If you usually have warm milk at bedtime, try hot mint or cinnamon tea, instead! That will help you relax and open your airways!
TIP! Reduce or eliminate your alcohol consumption, if you are bothered by snoring. Avoid antihistamines, tranquilizers and other sleeping pills at bedtime.
Snoring can be a real problem for you, and for anyone that shares your bed. It is also, on some occasions, medically dangerous. If you or your loved one are people who suffer from this condition, it is probably best to learn everything you are able to about it. Apply what you’ve learned from this article to finally enjoy a quiet, peaceful night of sleep.
3 years ago
|
ESSENTIALAI-STEM
|
Launceston (disambiguation)
There is more than one place called Launceston.
Australia
* Launceston - a city in Tasmania.
United Kingdom
* Launceston (Cornwall) - a town in England
|
WIKI
|
Page:Burton Stevenson--The marathon mystery.djvu/236
210 on the couch, engaged in rolling cigarettes with remarkable skill and celerity, and had quite a pile on the tabouret beside her. I sat and watched the supple fingers and the red, red lips, and the dark face, changing with every wave of feeling.
“There,” she said, at last, in that queer, chipped soft Creole which defies transcription, and she pushed away papers and tobacco. “That will do for this evening. Take one, chè.”
I took one and lighted it. I knew that the term of endearment had no meaning.
“My friend,” she said suddenly, turning to me with intent gaze, “do you know where doudoux has gone?”
“No,” I answered, “he did not tell me. He said only that his business was calling him away.”
“Business! Ohé! And you believe that?”
“Why shouldn’t I believe it, Cecily?”
“If it were merely business, he could have taken me along. Tambou! I would have hidden in some little, little corner! I would not have been in the way.”
She flung her cigarette from her with a swift fury, not looking to see where it struck. I got up and stamped it out. She burst into sudden laughter as she watched me—the mirth of the careless South at the careful North.
“All the same,” she said, with conviction, “he is growing weary of me; I annoy him; I can see it. It was, of course, inevitable. Soon he will be sending me away. Ohé!” and she stretched her arms above her head with that gesture I had seen before. “Ah
|
WIKI
|
Talk:Order of Saint Joachim
What on earth
The people of this Order expect to be taken seriously, but, for heaven's sake, what for? They do charitable stuff, but they should just change this into a charitable foundation instead of going under the guise of an actual Order. Apparently they take membership from whoever can pay the annual thirty bucks, which is silly.J.J. Bustamante 10:46, 9 May 2007 (UTC)
Never mind the charade
* I do not mind their "sillyness". If calling yourself an order of knighthood adds more fun and stability to a charitable organisation then why not? Why should only princes of countries that were abolished decades ago be the founders of orders of knighthood? In the middle ages any knight or group of reputable people could do so! William the Marshall for example.
The obvious smokescreens in this article, that I started but that has since been extended by what seems to have been a Knight of Saint Joachim called "Montfort" (he used the frase "we were etc," thus betraying himself),are the following:
* The order was extinct for a long time. With what right was it rekindled?
* Who is Helmut von Braundle-Falkensee? Is there a family of that name? What right did he have to reinstitute this order?
If the answer on the last question is "none", then the order is indeed "self styled". But never mind, I wish them good luck and many happy chapters.
Robert Prummel 01:53, 19 June 2007 (UTC)
A slight edit
* I have inserted quotation marks around the title of Levett Hanson, as he was never actually knighted in England. A native of Yorkshire, and classmate of Admiral Nelson's at Paston School in Norfolk, Hanson moved to Europe, where he shuttled between various royal courts. The designation of 'Sir,' implying knighthood, seems to be merely honorific. MarmadukePercy (talk) 19:24, 16 February 2008 (UTC)
* A slight correction on my earlier post. Levett Hanson was apparently accorded the honor of a knighthood of a foreign court, and such was recorded in the annals of the College of Arms. I have appended a footnote to the original source.MarmadukePercy (talk) 17:18, 5 April 2008 (UTC)
Count Theo Branislav-Bey P.Hd (Oslo & Prague) and the Order of St Joachim
During December last year I contacted the Grand Prior of the Order of St Joachim who replied postively. I sent off my cheque, the whole of my C.V. and later a 10,000 word essay on Count Theo Branislav-Bey that I had taken a considerable amount to research and my Wife typed out for me, and sent it directly to the 'Grand Master' and waited and waited and waited.
Eventually I sent an email inquiring on the progress of my application. Within two days I received an email back informing me I was not successful - thereafter being 'totally blanked' on each of my several emails sent.
My point here is not to moan or be bewitched with 'sour grapes' - no, on the contrary - you can't win them all in life, but this fine Order has its way, its rules and its code of conduct. It has it's own history - quite interesting really, in some ways - and now, with Lord Nelson, another real life War hero (Branislav-Bey) who liberated 750 jewish Kids from the notorious childrens hospital at Aplerbec, can be added - and all authenticated in the same way.
But with all this going on a hint from one of its active and full members would indicate that caution and a common sense approach really must apply. His question was a simpe one 'how many members does the Order have' - his answer was blanked. Another (marked up as anonymous) asked why the Orders site has so many advertisements attached to it - some apparently with lewd or unsuitable contents -again it was blanked. Yet another member - a man of the cloth - asked ' what next for the order' and again the same thing happened - blanked
Mmmmm - We live and learn!!
Mike Sales —Preceding unsigned comment added by Mike Sales (talk • contribs) 00:00, 16 July 2008 (UTC)
Other Orders
Interestingly a couple of the Order of St Joachim's leading members have researched and listed for their colleagues the names of other Orders. It is quite a list and worthy of consideration - even if simply for the insight...however alongside that same list must be read the observations made by the International Commission for Nobility & Royalty The two are not complimentary but both well worth the look for comparison
Mike SalesMike Sales (talk) 23:27, 23 July 2008 (UTC)
Please provide info on the "International Commision" you cite. Calypso Joe (talk) 22:30, 16 December 2008 (UTC)
About this order
Hello, cuz. Yep, had the same problem. Lifes a bitch, innit? Sat in the dunny all night just thinking about it-who is this Helmut von Falkoncee bloke, anyway? Another bloody wingeing pom or simply changed his name by deed poll years ago for the price of a cold tinny. And who the christ is Branislav-Bey. A dog might be born in a stable, but you can't necessarily call it an 'orse, can ya? Both tarred with the same brush, I suppose, and all in the name of charity. Possums arse, really, innit. Regards from down under. TS
Who was Helmut von Falkensee? He is not in any list of German or Austrian nobility. And what about gap in order history between 1850 and 1929? And what was reorganization in 1929 and 1948? Too many questions, too few answers. --Yopie 11:18, 30 October 2008 (UTC)
* The most striking point, however, is that after telling the order's story up to ca.1800. Article give no further history at all and no explanation how the Grand Master Helmut von Bräundle-Falkensee (whose family was never in the Genealogisches Handbuch des Adels, at least not before 1991)is supposed to be linked to the earlier ones. He was Grand Master of bogus Order of Saint-Andrew, too.
One can cite from Poetical Works By Thomas Moore (see : Title, insignia etc....been authorised by British court, but since then, this sanction of the order had been withdrawn.
So, for me this looks, that there was original Order, but this order disappear in 19. century. And "von Falkensee" reorganisation was probably "recreation" without direct connection to original order. --Yopie 13:52, 4 November 2008 (UTC)
Nationmaster
Yopie, Nationmaster is just an older reprint of Wikipedia. Not valid for an article to reference itself as a source. As a courtesy, I moved your Sainty reference down to the sentence about Sainty, where it belongs. ***You're Welcome!***Vote Obama Today!*** Calypso Joe (talk) 15:15, 4 November 2008 (UTC)
* Hm, but about other sources and qustions? What about "von Falkensee"? And what about gap between cca 1850 and 1948? --Yopie 16:13, 4 November 2008 (UTC)
Not the issue - your fake reference is. I never raised the issue. Your speculation onf 1850 to 1948 is Original Research. Very naughty of you. Calypso Joe (talk) 18:49, 4 November 2008 (UTC)
* I must oppose your answer. It´s not speculation, it´s the gap. "von Falkensee" was bogus "count" and the gap is and was The Gap. Your are without arguments, references etc. --Yopie 00:20, 5 November 2008 (UTC)
We are not arguing about the same thing. Your topic continues to drift. My argument was about NationMaster. Calypso Joe (talk) 15:55, 5 November 2008 (UTC)
No doubt this is a fake order
The modern "Order of Saint Joachim" is a "self-styled". I doubt any genuine historians consider it a "Confraternal Order of Chivalry". The introduction and article should distinguish between the real historical order and the modern fake. One of the best sources confirming the identity of real and fake orders is the "International Commission on Orders of Chivalry".Royalcourtier (talk) 07:42, 18 December 2014 (UTC)
External links modified
Hello fellow Wikipedians,
I have just added archive links to 1 one external link on Order of Saint Joachim. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes:
* Added archive https://web.archive.org/20080413111744/http://www.loge-carl-zum-felsen.de:80/entstehung.html to http://www.loge-carl-zum-felsen.de/entstehung.html
Cheers.—cyberbot II Talk to my owner :Online 10:14, 20 January 2016 (UTC)
|
WIKI
|
Page:Encyclopædia Britannica, Ninth Edition, v. 3.djvu/256
240 first printing-press was introduced in 1811, and the first sugar-mill in 1823. In 1858 railway communication was established to Joazeiro. BAHRDT,, a German theologian, distinguished for his extreme rationalism and his erratic life, was born in 1741 at Bischofswerda, of which place his father, afterwards professor of theology at Leipsic, was for some time pastor. He was educated chiefly at the celebrated school of Pforta, and afterwards entered the university of Leipsic, where he studied theology, and at first attached himself to the strongly orthodox party headed by Crusius. After graduation he Lectured for a time as adjunct to his father, and then with the rank of catechist proceeded to Leipsic, where he became exceedingly popular as a preacher, and was appointed extraordinary professor of Biblical philology. During this period of his life he published a popular book of devotions, called the Christian in Solitude. In 1768 the notorious irregularity of his conduct necessitated his resignation and his departure from Leipsic. By some influence he obtained a professorship of Biblical antiquities in the philosophical faculty of the new university of Erfurt, and having procured a theological degree from Erlangen, he again began to read theological lectures. His orthodoxy had by this time completely vanished ; he was an avowed rationalist of the extreme school, and with great diligence and ability sought to popularise the principles of his creed. At the same time his bitter and quarrelsome disposition embroiled him with his colleagues, and in 1771 he left Erfurt, but obtained another professor ship at Giessen. Here also the bold expression of his opinions cut short his tenure of office; in 1775 he resigned and became director of Von Salis's educational establishment, the philanthropin at Marschlins, a post he held for only one year. For a brief period he acted as general superintendent at Dürkheim, and then endeavoured, but unsucessfully, to set up an educational institution at Heidesheim. He had now become most obnoxious to the German Government, who prohibited him from lecturing or publishing any work on theology, or from holding any professorial office. In 1779 he took refuge in Halle, where he resided for ten years, lecturing in the forenoon on moral philosophy, and officiating in the afternoon as landlord of a public-house which he had opened at the gate of the town, and which was largely patronised by the students. In 1789 he was arrested, partly on account of a pasquinade he had written upon the Prussian religious edict, and was condemned to two years' imprisonment. The period of his confinement, reduced by the king to one year, was employed by Bahrdt in writing memorials of his life and opinions. After his release he continued his former course of life, and died after a severe illness, 23d April 1792. His numerous works, including a translation of the New Testament, are comparatively worthless, and are written in an offensive tone. He has been well called by Herzog a caricature of the rationalism of the 18th century. BAHREIN, the principal island of a cluster in the Persian Gulf, in an indentation of the Arabian coast. It is about 70 miles long and nearly 25 broad, and is very flat and low except towards the east, where a range of hills attain an elevation of 800 or 900 feet. The climate is mild, but humid, and rather unhealthy. The soil is for the most part fertile, and produces rice, pot herbs, and fruits, of which the citrons are especially good. Water is abundant, but frequently brackish. Fish of all kinds abound off the coast, and are very cheap in the markets. The inhabitants are a mixed race of Arab, Qrnanite, and Persian blood, slender and small in their physical appearance; they possess great activity and intelligence, and are known in all the ports of the Persian Gulf for their commercial and industrial ability. The traffic in the island itself is great and various, the harbour of Manama, which admits vessels of 200 tons, being largely frequented by ships from Persia, Sindh, India, &c. This town, which has in some respects supplanted the older and more inland Ruffin, is well built, and contains about 25,000 inhabitants ; and there are besides about 15 villages in the island. There is a city of almost equal extent in the neighbouring and smaller island of Mohanek, but the trade is not so great. Bahrein has from a remote period been famous for its pearl fishery, which produces the finest pearls in the world. The Portuguese obtained possession of the islands in 1507, but were driven from their settlements in that quarter by Shah Abbas in 1622. The islands afterwards became an object of contention between the Persians and Arabs, and at last the Arabian tribe of the Athubis made themselves masters of them in 1784. Since then they have been for some time subject more or less to the Wahabees, whose interference has greatly damaged the commerce of the ports, and led to extensive emigration of the inhabitants. (See Palgrave, in J. Roy. Geo. Soc., vol. xxxiv.) BAIÆ, an ancient town of Campania, Italy, situated between the promontory of Misenum and Puteoli, on the Sinus Baianus, and famous for its warm springs and baths, which served the wealthier Romans for the purposes both of health and pleasure. The variety of these baths, the mild ness of the climate, and the beauty of the landscape, captivated the minds of the opulent nobles. The habitations at first were small and modest ; but increasing luxury added palace to palace, and enterprising architects, supported by boundless wealth, laid the foundations of new erections in the sea. From being a place of occasional resort for a season, Baiae grew up into a city, and the confluence of wealthy inhabitants rendered it as much a miracle of art as it had before been of nature, though it never attained the rank of a municipium, but continued to be dependent on Cumse. C. Marius, Lucullus, Pompey, and Julius Caesar are among the most remarkable of those who gave é to Baice during the republic ; and at a later period it was a favourite resort of Nero, Caligula, Hadrian, and Severus. It flourished till the days of Theodoric the Goth ; but its destruction followed quickly upon the irruption of the northern conquerors. When the guardian hand of man was withdrawn, the sea reclaimed its old domain ; moles and buttresses were washed away ; and promontories, with the proud towers that once crowned their brows, were under mined and tumbled into the deep. Innumerable ruins, heaps of marble, mosaics, and other relics of the past, attest the ancient splendour of the city. The most remark able are the so-called temples of Mercury, Venus, and Diana, and various buildings which, rightly or wrongly, have been assigned to the more famous of those who are known to have had villas in the town. The Castello di Baja was built in the 16th century by Pietro di Toledo. Long. 14 3 E., lat. 40 50 N. BAIBURT, a town of Asiatic Turkey, in the pashalic of Erzerourn, and 65 miles W.N.W. from that city. According to Neumann it was an Armenian fortress in the 1st century, and it is identified by Ritter with the Baiberdon fortified by Justinian. It was afterwards one of the strong holds of the Genoese, when prosecuting their trade with India. Remains of their fortifications still exist, but in a very dilapidated state, the Russians having blown up the defences in 1829. (See view in Yule s Marco Polo, vol. i.) Population of town about 6000. BAÏF,, poet of the French Renaissance and member of the Pleiad, was the natural son of Lazare de Baif and an Italian girl. He was born in 1532 at Venice, where his father was residing as French ambassador. Thanks, perhaps, to the surroundings of his childhood, he
|
WIKI
|
4.16. Appendix: Configuration files for Red Hat Gluster Storage Deployment
Filename: glusterfs-config.yaml
# Copyright 2015 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# glusterfs-config.yaml
#
# The Gluster FS deployment consists of a primary pool and a secondary pool
# of resources, each on a separate zone.
#
imports:
- path: gluster_instance.jinja
- path: path_utils.jinja
resources:
- name: gluster_instance
type: gluster_instance.jinja
properties:
namePrefix: rhgs
numPrimaryReplicas: 10
primaryZone: us-central1-a
secondaryZone: us-central1-b
numSecondaryReplicas: 10
backupZone: europe-west1-b
sourceImage: global/images/rhgs-image01
dataSourceImage: global/images/rhgs-data-image01
machineType: n1-highmem-4
network: default
bootDiskType: pd-standard
dataDiskType: pd-standard
dataDiskSizeGb: 10230
Filename: gluster_instance.jinja
# Copyright 2015 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# GlusterFs configuration variables
#
# Required Cloud resource input parameters:
# * numPrimaryReplicas - number of instances to create in the primary zone
# * numSecondaryReplicas - number of instances to create in the secondary zone
# * namePrefix - hostname prefix
# The instance number (0 based) will be appended ("-n<#><#>")
# * primaryZone - Compute Engine zone for the instance (short name)
# * secondaryZone - Compute Engine zone for the instance (short name)
# * network - Compute Engine network for the instance (full URI)
# * image - Compute Engine image for the instance (full URI)
# * machineType - Compute Engine machine type for the instance (full URI)
# * bootDiskType - Compute Engine boot disk type for the instance (full URI)
# * dataDiskType: Compute Engine data disk type for the instance (full URI)
# * dataDiskSizeGb: Data disk size in Gigabytes
{% import 'path_utils.jinja' as path_utils with context %}
# Grab the config properties
{% set numPrimaryReplicas = properties["numPrimaryReplicas"] + 1%}
{% set numSecondaryReplicas = properties["numSecondaryReplicas"] + 1 %}
{% set image = properties["image"] %}
# Macros and variables dealing with naming
{% set prefix = properties["namePrefix"] %}
{% macro hostname(prefix, id) -%}
{{ "%s-n%02d"|format(prefix, id) }}
{%- endmacro %}
{% macro diskname(prefix, id) -%}
{{ "%s-data-disk-n%02d"|format(prefix, id) }}
{%- endmacro %}
# Expand resource input parameters into full URLs
{% set network = path_utils.networkPath(properties["network"]) %}
{% set primaryZone = properties["primaryZone"] %}
{% set bootDiskType = path_utils.diskTypePath(
primaryZone, properties["bootDiskType"]) %}
{% set dataDiskType = path_utils.diskTypePath(
primaryZone, properties["dataDiskType"]) %}
{% set machineType = path_utils.machineTypePath(
primaryZone, properties["machineType"]) %}
resources:
# Add clone instances in the local Zone
{% for n_suffix in range(1, numPrimaryReplicas) %}
{% set namePrefix = prefix + '-primary' %}
- type: compute.v1.disk
name: {{ diskname(namePrefix, n_suffix) }}
properties:
zone: {{ primaryZone }}
type: {{ dataDiskType }}
sizeGb: {{ properties["dataDiskSizeGb"] }}
sourceImage: {{ properties["dataSourceImage"] }}
- type: compute.v1.instance
name: {{ hostname(namePrefix, n_suffix) }}
properties:
zone: {{ primaryZone }}
machineType: {{ machineType }}
disks:
# Request boot disk creation (mark for autodelete)
- deviceName: boot
type: PERSISTENT
boot: true
autoDelete: true
initializeParams:
sourceImage: {{ properties["sourceImage"] }}
diskType: {{ bootDiskType }}
diskSizeGb: 10
# Attach the existing data disk (mark for autodelete)
- deviceName: {{ diskname(namePrefix, n_suffix) }}
source: $(ref.{{ diskname(namePrefix, n_suffix) }}.selfLink)
autoDelete: true
type: PERSISTENT
networkInterfaces:
- network: {{ network }}
accessConfigs:
- name: External NAT
type: ONE_TO_ONE_NAT
tags:
items:
- "glusterfs-deployed-from-google-developer-console"
{% endfor %}
# Setup in-region replicas
{% set network = path_utils.networkPath(properties["network"]) %}
{% set secondaryZone = properties["secondaryZone"] %}
{% set bootDiskType = path_utils.diskTypePath(
secondaryZone, properties["bootDiskType"]) %}
{% set dataDiskType = path_utils.diskTypePath(
secondaryZone, properties["dataDiskType"]) %}
{% set machineType = path_utils.machineTypePath(
secondaryZone, properties["machineType"]) %}
{% for n_suffix in range(1, numPrimaryReplicas) %}
{% set namePrefix = prefix + '-secondary' %}
- type: compute.v1.disk
name: {{ diskname(namePrefix, n_suffix) }}
properties:
zone: {{ secondaryZone }}
type: {{ dataDiskType }}
sizeGb: {{ properties["dataDiskSizeGb"] }}
sourceImage: {{ properties["dataSourceImage"] }}
- type: compute.v1.instance
name: {{ hostname(namePrefix, n_suffix) }}
properties:
zone: {{ secondaryZone }}
machineType: {{ machineType }}
disks:
# Request boot disk creation (mark for autodelete)
- deviceName: boot
type: PERSISTENT
boot: true
autoDelete: true
initializeParams:
sourceImage: {{ properties["sourceImage"] }}
diskType: {{ bootDiskType }}
diskSizeGb: 10
# Attach the existing data disk (mark for autodelete)
- deviceName: {{ diskname(namePrefix, n_suffix) }}
source: $(ref.{{ diskname(namePrefix, n_suffix) }}.selfLink)
autoDelete: true
type: PERSISTENT
networkInterfaces:
- network: {{ network }}
accessConfigs:
- name: External NAT
type: ONE_TO_ONE_NAT
tags:
items:
- "glusterfs-deployed-from-google-developer-console"
{% endfor %}
# Add clone instances in the remote Zone
{% set backupZone = properties["backupZone"] %}
{% set bootDiskType = path_utils.diskTypePath(
backupZone, properties["bootDiskType"]) %}
{% set dataDiskType = path_utils.diskTypePath(
backupZone, properties["dataDiskType"]) %}
{% set machineType = path_utils.machineTypePath(
backupZone, properties["machineType"]) %}
{% for n_suffix in range(1, numSecondaryReplicas) %}
{% set namePrefix = prefix + '-backup' %}
- type: compute.v1.disk
name: {{ diskname(namePrefix, n_suffix) }}
properties:
zone: {{ backupZone }}
type: {{ dataDiskType }}
sizeGb: {{ properties["dataDiskSizeGb"] }}
# sourceImage: {{ properties["dataSourceImage"] }}
- type: compute.v1.instance
name: {{ hostname(namePrefix, n_suffix) }}
properties:
zone: {{ backupZone }}
machineType: {{ machineType }}
disks:
# Request boot disk creation (mark for autodelete)
- deviceName: boot
type: PERSISTENT
boot: true
autoDelete: true
initializeParams:
sourceImage: {{ properties["sourceImage"] }}
diskType: {{ bootDiskType }}
diskSizeGb: 10
# Attach the existing data disk (mark for autodelete)
- deviceName: {{ diskname(namePrefix, n_suffix) }}
source: $(ref.{{ diskname(namePrefix, n_suffix) }}.selfLink)
autoDelete: true
type: PERSISTENT
networkInterfaces:
- network: {{ network }}
accessConfigs:
- name: External NAT
type: ONE_TO_ONE_NAT
tags:
items:
- "glusterfs-deployed-from-google-developer-console"
{% endfor %}
Filename: path_utils.jinja
# Copyright 2015 Google Inc. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# path_utils.jinja
#
# Jinja macros for expanding short resource names into full paths
# Must have reference to the global env object, so when including this file,
# use the jinja import "with context" option.
{% macro projectPrefix() -%}
{{ "https://www.googleapis.com/compute/v1/projects/%s"|format(env["project"]) }}
{%- endmacro %}
{% macro imagePath(image) -%}
{% if image.startswith("https://") -%}
{{ image }}
{% elif image.startswith("debian-") -%}
{{ "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/" + image }}
{% elif image.startswith("windows-") -%}
{{ "https://www.googleapis.com/compute/v1/projects/windows-cloud/global/images/" + image }}
{% endif -%}
{%- endmacro %}
{% macro machineTypePath(zone, machineType) -%}
{% if machineType.startswith("https://") -%}
{{ machineType }}
{% else -%}
{{ "%s/zones/%s/machineTypes/%s"|format(projectPrefix(), zone, machineType) }}
{% endif -%}
{%- endmacro %}
{% macro networkPath(network) -%}
{% if network.startswith("https://") -%}
{{ network }}
{% else -%}
{{ "%s/global/networks/%s"|format(projectPrefix(), network) }}
{% endif -%}
{%- endmacro %}
{% macro diskTypePath(zone, diskType) -%}
{% if diskType.startswith("https://") -%}
{{ diskType }}
{% else -%}
{{ "%s/zones/%s/diskTypes/%s"|format(projectPrefix(), zone, diskType) }}
{% endif -%}
{%- endmacro %}
|
ESSENTIALAI-STEM
|
Page:Notes and Queries - Series 10 - Volume 7.djvu/107
10 s. VIL FEB. 2, 1907.] NOTES AND QUERIES.
83
"Mr. Walpole and I have frequently wondered you should never mention a certain imitation of Spenser published last year by a namesake of yours with which we are all enraptured and enmarvailed."
105-66. The institution of the order of the Garter, a dramatic poem.
The last two poems are by Gilbert West ('D.N.B.'). Walpole says that his mother was by her first marriage Lady Langham, and by her second marriage the wife of West, a clergyman. She was the eldest sister of Richard, Lord Cobham, who was so offended by her marrying a parson that he settled his estate on the issue of his second sister, afterwards Countess Temple.
166-85. Epistle to Viscount Cornbury. By R. Nugent, afterwards Earl Nugent ('D.N.B.'). 185-98. An epistle. 198-205. An epistle to a lady.
Walpole says that Aurelia was
" Mrs. A. Pitt, sister maid of honour to Quee
" Mrs. A. Pitt, sister of the great Lord Chatham, aid of honour to Queen Caroline, and privy purse to Augusta, Princess of Wales. Died in 1781."
She was very clever, but eccentric, and swore a great deal. " Gentle Anna " was " Lady Albemarle, Lady Anna Lenox." The " peerless dame " was the Duchess of Norfolk, Mary Blount. " Altho' in - combine " was the " Countess of Cardigan, afterwards Duchess of Montagu."
205-7. An epistle to Mr. Pope. 207-10. Epistle to Pollio [Lord Chesterfield] from the Hills of Howth.
S 's shape and R 's face refer to Lady Fanny Shirley and Sarah Cadogan, Duchess of Richmond. " To mock the works of Kent " alludes to the designer of modern gardening. " Poor with all a H t's store," i.e., Sir Gilbert Heathcote ('D.N.B.').
210-12. An ode to Wm. Pultney, Esq. Published anonymously in 1739.
The opening stanza, " Remote from liberty and truth," &c., referring to Nugent's educa- tion as a Roman Catholic, and part of the seventh, " Though Cato liv'd though Tully spoke," are proverbial. Gray (' Letters',' i. 184) says, " Mr. Nugent sure did not write his own ode," and he was suspected of paying Mallet to write it. Walpole's comment on the last stanza, which relates to Pulteney and concludes with " shall tell the patriot's name," is, " Both the poet and the patriot turned courtiers."
213-15. Ode to Lord Lonsdale.
215-19. Three odes.
220-28. Ode to mankind address'd to the Prince, with introduction to the Prince.
228-30. Verses to Camilla.
230-33. To Clarissa.
This piece is stated in Gent. Mag., 1780
3. 122, to be " a disgrace to this collection " ; it was, however, retained in the 1782 edition,
234. An inscription on the tomb to his father and ancestors. 234-9. Epigrams.
All the above are by Nugent.
240-50. The danger of writing verse, by William Whitehead, esq. ('D.N.B.').
' A very good thing " (Shenstone, ' Letters,' p. 15).
251-3. To the honourable [Charles Townshend r
ane of his friends at Cambridge].
253-7. To Mr. Garrick.
257-8. Nature to Dr. Hoadly, on his comedy of ' The Suspicious Husband.'
259-60. The youth and the philosopher, a fable.
261-3. An ode to a gentleman, on his pitching a tent in his garden.
263-5. On a message card in verse, sent by a lady.
265-6. The je ne ncai quoy, a song. Also printed in The Museum, i. 131.
The above are also by Whitehead. Gray (' Letters,' i. 184) says :
"I like Mr. Whitehead's little poems, I mean the ode on a tent, the verses to Garrick, and par- ticularly those to Charles Townshend, better than anything I had seen before of him."
266-9. Ode on a distant prospect of Eton college,, by Mr. Gray ('D.N.B.').
270-72. Ode [on the spring].
272-4. Ode on the death of a favourite cat (Horace Walpole's) drowned in a tub of gold fishes. The last two are also by Gray. These pieces were given to Dodsley by Walpole.
274-9. Monody on the death of Queen Caroline, by Richard West, esq. ('D.N.B.'), son to the chancellor of Ireland.
It was included in the collection at Walpole's request. Gray (' Letters,' ed. Tovey, i. 173) says this piece, " in spite of the subject," is excellent. Some of the lines in it con- tained the germs of Gray's own poetry.
280-86. A pipe of tobacco in imitation of six several authors : I. Gibber. II. Ambrose Philips. III. Thomson. IV. Young. V. Pope. VI. Swift. By Isaac Hawkins Browne, but the sugges- tion of the poem was made by (Chancellor) John Hoadly, and No. II. was written by him (Gent. Mag., 1776, p. 165).
287-9. Ode to the hon. C. Y. [Charles Yorkel.
289-91. From C*elia to Chloe.
291-3. On a fit of the gout.
293. Horace, ode xiv. book i., imitated in 1746. The last four are also by Browne.
294-300. The female right to literature, in a letter to a young lady from Florence [Miss Pratt, after- wards Lady Camden]. By Thomas Seward, Canon of LichfieloM' D.N.B.').
300. On Shakespear's monument at Stratford upon Avon.
301. Song.
302. Chiswick. The "potent lord" was Richard Boyle, Earl of Burlington.
|
WIKI
|
Badal Patralekh
Badal Patralekh is an Indian politician from the Congress. He is the current Minister for Agriculture in the Government of Jharkhand.
He is the current MLA of the Jarmundi constituency, representing Congress party.
|
WIKI
|
Lupa Island (Hungary)
Lupa Island (Lupa-sziget) is an island on the Danube in Hungary. It is located on the Szentendre branch of the Danube, to the west of the much larger Szentendre Island and 14 km to the north of the capital Budapest. It forms part of the town of Budakalász, in Szentendre District of Pest County.
The island is inhabited, and there a number of houses on it. It is only accessible by boat.
|
WIKI
|
Kåre Bryn
Kåre Bryn (born 12 March 1944) is a Norwegian diplomat.
He was born in Smøla, and is a siv.øk. by education. He started working for the Norwegian Ministry of Foreign Affairs in 1969, and was promoted to deputy under-secretary of state in 1989. He remained here until 1999, when he became Norwegian ambassador to the European Free Trade Association and the World Trade Organization. From 2003 to 2005 he served as the Norwegian ambassador to the Netherlands. He then became secretary-general of the European Free Trade Association. Before retiring, he served one last year as senior adviser in the Ministry of Foreign Affairs from 2012 to 2013.
In 1999 he was decorated as a Commander of the Royal Norwegian Order of St. Olav.
|
WIKI
|
Talk:Non-pharmacological intervention
Hypertension section
your section may be better moved into the Hypertension article, with reference to Non-pharmaceutical intervention. If someone add her/his support for this move and do lead it, it's all fine :). We can then add into NPI a one-liner reference here about hypertension being mainly countered by NPI. Yug (talk) 09:43, 18 May 2021 (UTC)
Merge somehow??
As someone who has worked in the field of epidemiology, I'm not sure I understand the distinction made in the header: (cf Wikipedia talk:WikiProject Medicine/Archive 144) <IP_ADDRESS> (talk) 10:53, 17 August 2021 (UTC)
* Pinging doesn't work if you don't sign your comment with the same edit. Anyway, pinging . TompaDompa (talk) 22:57, 17 August 2021 (UTC)
* AFAICT we've decided to have one article about all NPIs, and a separate article about NPIs that are relevant for COVID-19. WhatamIdoing (talk) 01:24, 18 August 2021 (UTC)
* Ah yes, thank you WhatamIdoing. Doh! I can sort of see that now after scolling through Non-pharmaceutical intervention (epidemiology). Maybe renaming the dab parenthesis on that page could provide a quick fix there at least? <IP_ADDRESS> (talk) 08:42, 18 August 2021 (UTC)
* That might help. Expanding this article to have a satisfactory overview would also help. WhatamIdoing (talk) 15:33, 18 August 2021 (UTC)
* Hum, WhatamIdoing (and TompaDompa), providing a satisfactory overview that's appropriately sourced doesn't seem to me (at least) an altogether straightforward task. My impression is that the NPI term is largely deployed as a self-explanatory catch-all label/descriptor that can conveniently encompass any non-drug-based intervention (irrespective of effectiveness), ranging from aromatherapy or sensory gardens through engineering tweaks (eg for prevention of work-related back pain) to legislative change (eg smoking bans). In fact, while the Dictionary of Epidemiology often refers to "non-pharmacological interventions" it seems to feel that the term is too self-explanatory to merit a separate definition or explanation . Since I'm not familiar with any suitable sourcing specifically focused on NPI as a separate concept, I've taken a rapid look at GoogleBooks where a couple of candidates popped up: ISBN<PHONE_NUMBER>719 appears to present the viewpoint (i.e. pov) of a single author; ISBN<PHONE_NUMBER>021 focuses on particular methodological aspects of the evaluation of non-pharmacological treatments. <IP_ADDRESS> (talk) 18:11, 19 August 2021 (UTC)
Candidate redirects
, @TompaDompa : In addition to Non-phar a macological intervention [oops!] (possibly also Nonpharamacological intervention etc[??]), I feel Non-pharmacological treatment could potentially be an appropriate and useful redirect here. (I don't think ip contributors are able to add redirects :) <IP_ADDRESS> (talk) 13:59, 20 August 2021 (UTC) <IP_ADDRESS> (talk) 21:19, 22 August 2021 (UTC)
* Non-pharmacological intervention already redirects here. I created the redirect non-pharmacological treatment. TompaDompa (talk) 14:52, 23 August 2021 (UTC)
* Ah, thank you TompaDompa (I see now I made a silly "ama" typo, which I then rapidly copied and pasted). Another related question (also ) regards the page name (currently "Non-pharmaceutical...") Outside literature related to the COVID-19 pandemic, "Non-pharmacological intervention" is the generally received term (see GoogleScholar: versus ). So I think the appropriate name for the present page could be Non-pharmacological intervention, whereas Non-pharmaceutical intervention (epidemiology) might conceivably[?] be renamed something like Non-pharmaceutical intervention (COVID-19 epidemic). Any thoughts? <IP_ADDRESS> (talk) 18:12, 23 August 2021 (UTC)
* I have no firm opinions on "pharmaceutical" vs. "pharmacological". I don't think it would be appropriate to rename the other article to be solely about the COVID-19 pandemic; the main topic is improving health by means other than medications, and preventing the spread of infectious diseases is a sub-topic of that, and combatting the COVID-19 pandemic is a sub-topic of that. The reason we have two articles in the first place is that this topic has received widespread attention in the context of the COVID-19 pandemic for the last year and a half or so, even though that context is really only a sub-topic of a sub-topic, and the article was originally created and later expanded reflecting that widespread attention of combatting the COVID-19 pandemic. I then split the article in order not to have the main topic be buried by a bunch of text about the sub-topic. TompaDompa (talk) 05:17, 24 August 2021 (UTC)
|
WIKI
|
Talk:Battle of Hastings/Archive 2
Why did William Win the Battle of Hastings?
The battle of Hastings was fought by William the Duke of Normandy, and Harold Godwinson. It was a one day battle on the 14th December 1066. The battle was fought at Senlac Hill. I will write about why William had a tactical advantage over Harold so why I think William won the battle. I think that William won the Battle of Hastings because he could give out orders while Harold couldn’t, because Harold was fighting in the front line with the rest of his army, but William was charging around on horseback and could give orders to his men. William being friends with the pope, got people to join his army because he said that the pope was backing William in his decision to fight against Harold, so that the battle was a holy battle and would guarantee them a place in heaven. William had a stronger army than Harold’s when the battle started because Harold’s army had just marched down from York, but Williams’s army had only marched from Dover. William had more areas of his army than Harold’s, William had men on horseback but Harold’s army didn’t. William had approximately 5,000 infantry and 3,000 Calvary and archers. Harold’s army was around the same size as he had approximately 2,500 Housecarl (his paid army) and 6,000 Fyrd (people who came from nearby towns and villages to support his king). Williams’s tactic was for his army to go up to Harold’s shield wall, and try to weaken it. After a while some of Williams’s army retreated back and the part of Harold’s army that were fighting them charged after them leaving a gap in Harold’s shield wall. Harold could not repair this part of the wall as he was fighting in the front line. William who was riding on horseback noticed, and managed to get a part of his army to surround the part of Harold’s army that had broken off. And Williams’s army killed all of Harold’s army that broke off. William got his army repeat this tactic until most of Harold’s army were dead. After that both army’s had a rest. Then Williams’s army fired arrows at Harold’s army. These arrows would fly into Harold’s army and injure the warriors. At one stage Harold himself got an arrow in his eye. It is clear that compared to the other reasons, the reason that Harold’s army had marched approximately 250 miles from York to Senlac hill, was the main reason for Williams’s victory. This meant that Harold’s army would have been very tired. JakeAWGriffin (talk) 20:03, 11 December 2011 (UTC)
* Jake, are you clear that this isn't a forum to discuss the battle? If you have some sourced material you want to add or want others to comment on, that's great, but it isn't really appropriate to post your own ideas here. Dougweller (talk) 22:09, 11 December 2011 (UTC)
Edit request on 30 December 2011
pennance -> penance : misspelling
<IP_ADDRESS> (talk) 21:01, 30 December 2011 (UTC)
* Done. Thanks for pointing that out. Nev1 (talk) 21:06, 30 December 2011 (UTC)
The Battle Of Hastings
It occourd around 1066 to 1070. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:50, 20 January 2012 (UTC)
William actually landed at Pevensey on 28th October — Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:34, 26 January 2012 (UTC)
Claiming "crusade" mentality
"Many had also come because they considered it a holy crusade, due to the Pope's decision to bless the invasion."
While it is true that the pope did openly support William over Harold, the name "crusade" should rightly only be used after the First Crusade. The papal standard that William bore is not the same religious force as the "milites Christi" that fought in the Middle East.
Lifthrasir1 21:52 Oct. 14 2006
Non breaking Space
Measurement units should have non breaking space between number and measurement unit to prevent breaking between lines. Please discuss here before changing this in the article. mdkarazim (talk) 01:53, 8 September 2012 (UTC)
What's wrong with you?
Why have you got rid of all the other people who took part in the battle along with the Normans (Poitevins, Manceaux, Bretons, French...etc). Is English butthurt the reason? In any case, this is pathetic. — Preceding unsigned comment added by LeHappiste (talk • contribs) 20:13, 6 March 2013 (UTC)
* Hardly constructive. Why don't you help and edit the article? You'll need sources, see WP:VERIFY and WP:RS. Dougweller (talk) 22:03, 6 March 2013 (UTC)
Suggestions
See diff Ealdgyth - Talk 20:29, 12 July 2013 (UTC)
The organization of the "background" doesn't make sense in a way. Consider current organization:
1 Background 1.1 Succession crisis in England 1.2 Tostig's invasion 2 Harold's preparations and the English army
It's odd in that subsection "Tostig's invasion" has linked "main article" being Battle of Stamford Bridge, while subsection ends with mention of the battle of Fulford, and the subsection does not discuss the Battle of Stamford Bridge at all. The Battle of Stamford Bridge is mentioned in the next major section "Harold's preparations...".
I saw mention of the FAC and call for comments at a user Talk page. Hope this helps. Good luck with the FAC! -- do ncr am 21:29, 23 July 2013 (UTC)
* Duh! Thanks, Fixed. It's a remnant of the earlier organization of the article... Ealdgyth - Talk 21:33, 23 July 2013 (UTC)
What do archers do?
Do they "shoot" or "fire"? I am not used to this period. --John (talk) 21:40, 24 July 2013 (UTC)
* Either is fine. Ealdgyth - Talk 21:46, 24 July 2013 (UTC)
* Thanks, I had a wobbly moment there where both looked wrong. --John (talk) 21:54, 24 July 2013 (UTC)
Fyrd and housecarls
WP:ITALIC says we should italicise "words-as-words" and also foreign words used in English. I am not convinced that italicising fyrd and housecarl is the best. What do others think? --John (talk) 11:34, 25 July 2013 (UTC)
* Fyrd for sure - it is pretty much italicized in all the sources I've consulted. Housecarls is also often italicized (see Huscroft's Norman Conquest) but not as often as fyrd. Douglas puts fyrd in quotes but doesn't do that for housecarls, for example. Both of these words go out of use after the Conquest. Housecarl could also be put as huscarl - which is a Danish loan-word that came in with Cnut. Ealdgyth - Talk 12:50, 25 July 2013 (UTC)
* I support italicising fyrd consistently (which it is) and not housecarl (at the moment it is inconsistently formatted). --John (talk) 13:11, 25 July 2013 (UTC)
* Both terms are in most of the larger English dictionaries so perhaps not quite foreign words as such. However whereas Housecarl has some equivalent terms household troops or praetorian guard, to mention two, would be used these days. Whereas there is no real alternative to fyrd - "It was a local militia in the Anglo-Saxon shire, in which all freemen had to serve, the noblemen had an obligation to provide men, for the king, based on their landholding" hardly rolls off the tongue. As with Ealdgyth my sources are somewhat ambiguous. I would suggest that you put either of the terms in italics the first time you use it only, more for clarity than MoS. Wilfridselsey (talk) 13:32, 25 July 2013 (UTC)
A possibility
One archer on the side of the Normans was granted title, lands, and a coat of arms for his service in the battle of hastings. A description of the coat of arms follows:
Coat of Arms: First found in Devonshire England where they were seated from very early times and were granted lands for their distinguished assistance at the Battle of Hastings in 1066 A.D.
The colors: Gules on argent, or red on silver, the tinctures mean warrior, military strength and magnanimity for red and peace and sincerity for white.
The shield: The two arrowheads on the field can also be spearheads and were referred to as ‘pheons’ and on a coat of arms meant dexterity and nimble wit, and readiness for battle, repetition of the image meaning that this virtue was of a higher order than normal. The unicorn on the shield proper was one of the highest military awards, meaning extreme courage, virtue and strength. The two red lines or ‘chevrons’ occupying the position of the ordinaries represent some act of faithful service, the repetition once again meaning to a higher degree than normal. The number of chevrons also identifies military rank.
The Crest: The helmet displayed is a closed or tilting helmet and was used for burgher arms (coats of arms of non-noble commoners). The torse, on a wreath of the colors of Argent and Gules… the wreath that sits on the top of the helm holds the crest. The crest depicts a hand holding an arrow facing left or sinister. Crests were the personal symbol a person would use and would say the most about them as an individual. In this case, the arrow is probably how the person won the coat of arms.
The Motto: Displayed above the crest indicating Scottish descent, the motto Projeci is Latin for the personal past tense form of project, so it translates to “I shot” or “I threw.”
This crest was awarded after the battle of Hastings in which the English King Harold was hit in the eye by an arrow, turning the tide of the battle. Archers painted their arrows for identification, so it would not have been difficult to identify the archer who slew the enemy king.
The family name on the coat of arms is Mayne. Though it is not proof of the deed, the coat of arms presented to a commoner after the battle suggests that the archer did something impressive with an arrow during the battle, and I propose that the recipient of this coat of arms was the archer who shot King Harold in the eye. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:31, 6 August 2013 (UTC)
* Um. No. See Coat of Arms. The granting of coats of arms to people doesn't actually happen until wayyy after this battle. This is a great example of a story made up after the fact to give a family greater antiquity. Ealdgyth - Talk 21:42, 6 August 2013 (UTC)
* You are correct, only the land was granted after the Battle of Hastings. The coat of arms came later. http://www.houseofnames.com/mayne-coat-of-arms (please refer to a good latin-english dictionary to translate 'projeci')
* No, that's not a reliable source. I checked Origins of Some Anglo-Norman Families by Loyd - no such family is mentioned. No company that sells "Family coats of arms" is at all reliable - there is no such thing as a "family coat of arms" - coats of arms are for individuals, and individuals only. Ealdgyth - Talk 23:37, 6 August 2013 (UTC)
* Again you are correct; Loyd makes no mention of the name Mayne in his book which contains every family name from England during that time, all 315 families that made up that country. Or perhaps Loyd only discusses some families which may be why he included the word some in his title, though this is merely speculation on my part. Other sources seem to back up what I put forth above regarding the family, however I am now finished with this discussion as it has degraded to the point where we find it now. ("no such family is mentioned" implying what, exactly? That there never was a family named Mayne in England because they were not included in the one book in which you looked?) I presented this as a possibility to consider, not a definitive proof as that is impossible due to lack of documentation during that era. That said, a commoner of the name Mayne was indeed granted lands in Devon for their service to the Normans during the Battle of Hastings. (I'll leave this as an assertion, disprove it if you can. Not that I couldn't cite my sources, but that I feel that the act of performing real research on the matter would prove educational.) Why they were granted this is not clear, neither is the abundance of arrows associated with so many variants of the name such as Maynes, Main, Mains, Maine, Maines, etc. nor is the prevalence of the motto Projeci which is only poorly translated to I have thrown away and is more accurately the personal past tense of project as in I have projected or I have thrown or I have shot but the context of the arrows that accompany the motto imply the latter is the better translation. Further, never once did I claim that the coat of arms applied to an entire family, that was the wording of the one site that had a picture of the coat of arms I described. I concede that it is entirely possible that the coat of arms I mentioned had nothing to do with the Mayne who served in the Battle of Hastings. However I still contend that it is entirely possible that the lands were granted for the reason I gave above. The truth of the matter has been lost in time. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:48, 7 August 2013 (UTC)
I looked up my family name(s), long story, and was aghast at the idea that anyone would take this site as reliable in any way shape or form -- Guerillero | My Talk 00:06, 7 August 2013 (UTC)
* The fact that my last name (even with various spellings) turned up nothing is pretty good evidence that it's highly reliable. *cough* Then again, the highest we've ever achieved is probably garcon de pisse or something like that. Drmies (talk) 00:12, 7 August 2013 (UTC)
* Hello <IP_ADDRESS> . You may find the following pages useful in improving your research to determine who shot King Harold: WP:OR, WP:RS, and WP:Evidence, You may also find some useful information to help you in Source criticism and various links provided in the disambiguation page at Burden of Proof. Finally, House of Names is clearly not a reliable source, and it should not be used to back up any firm claims on wikipedia, let alone the "possibilities" you are trying to highlight. To put it bluntly: if House of Names is a reliable source for surname origins, then I'm the Queen of Sheba! DDStretch (talk) 08:15, 8 August 2013 (UTC)
Commanders in infobox
Several sources place Leofwine and Gyrth in positions of subordinate command, consistent with their positions as Earls. Perhaps they should be included in the infobox given that it lists subsidiary commanders for the Norman side. Agricolae (talk) 01:00, 27 August 2013 (UTC)
Edit request on 30 September 2013
Hi,
It's not Alan Fergant (in the section commanders and leaders) but Alan the Red (https://en.wikipedia.org/wiki/Alan_Rufus) who was a companion of William the Conqueror. It could be great if you have time to edit it. Thank you !
Sincerely,
David
Utliak (talk) 03:13, 30 September 2013 (UTC)
* ✅ Thank you for bringing this up. -- Neil N talk to me 02:51, 7 October 2013 (UTC)
Time of year
Dear Ealdgyth,
I was suprised that my contrubution of earlier this evening (19:44, 14 October 2013) was reverted. Manly because I did not understand why you felt it was neccasary. You state as the reason: "not in the source that is given - presumably the source did the corrections". What do you mean?
I dont know the source “Lawson Battle of Hastings pp. 212–213”, but do you mean that it does not mention the (modern) day of the year at which moment these times of sunrise and sunset occur? Why should that be a problem? There are other sourches and other ways for calculating the corresponding modern date. (See also: https://en.wikipedia.org/wiki/New_Style)
And, unfortunatly, you do need extra sources like this as the other source metioned in that section doen’t metion the times of the sunrise & -fall “Marren 1066 p. 114”.
Furthermore, elswere in that book (page 9) “Marren” is inaccurate. He states that 14 October compares to the modern 25 October, a diverence of 11 days. Marren probably got confussed by the 1752 addoption of the Gregorian calender in England. At that time the difference with the Julian calender was indeed 11 days. In 1066 however it was still “only” 6 days.
As it is often forgotten that historic dates fell on diverent days of the year than we associate with that given modern date I think it is importent to mention this shift. This is more so as this article mentions the time of the sunrise and sunset. On any modern 14 October (as today) the sunset in Battle is at ca. 17:07 (UTC), but in 1066 it was at ca. 16:54.
I hope to here form you.
Best wishes, Vlaascho (talk) 22:47, 14 October 2013 (UTC)
* Lawson is the source for the sunset/dusk/dark times, and no, he doesn't mention anything at all about the New Style/Old Style shift in dates. Thus, you cannot include the information you are giving here as that would be original research. Marren p. 114 is not a source for that sentence - it is a source for the preceding sentence. The source for the sunrise times is Gravett p. 59. THere is no use of Marren p. 9 at all in the article - so whether he's right or wrong on that information is immaterial. To mention the date shift you need a reliable secondary source that mentions it - you can't just shoehorn it into a sentence that is sourced to something that does NOT mention the shift. Nor can you change sourced information without changing the source. QUite honestly, since Gravett is a quite competant medieval historian, I'm sure he adjusted for the time/date shift - as we can assume Lawson did, since he's also a reliable historian. Ealdgyth - Talk 01:07, 15 October 2013 (UTC)
* Dear Ealdgyth,
* Thanks for you promt response, unfortunatly I didn't have much time during the week to respond.
* Yes, the two historians use the correct daylighttimes but apparently don't mention how these times can occur on a 14 October. But, not including correct information just bcause it's not in one of the best (secondary) sources is strange and including this information doesn't make it automaticaly Original Research.
* The date shift is a given fact when reading on any date before 1582 but usually not metioned. Off course, this level of detail isn't always neccecary for most readers would know that the calender used was different then. On wikipedia however there are many more "uninformed" readers who don't know this. Therefore I think it is even more importend to mention this information on this page (and on other pages, like Agincourt) as the day is widely remembered each year.
* At the moment I dont know of a published source that has a paragraph stating the correct date shift of the battle (since, as mentioned earlier, Marren has got it wrong). But their are other easy and available ways to calculate any corresponding date in a different calendar with publications like:
* https://commons.wikimedia.org/wiki/File:Table_of_equivalent_dates_in_the_Julian_and_Gregorian_calendars.JPG
* https://en.wikipedia.org/wiki/Conversion_between_Julian_and_Gregorian_calendars
* http://www.ortelius.de/kalender/form_en2.php
* http://www.fourmilab.ch/documents/calendar/
* So, there might be no paragraph to quote yet, but the information given is easy to verify. As a result of this, I would like to include the information again, with clear reference to publications to verify it.
* The paragraph that mentions the sunset is i.m.o. the most logical place to include the information. I can follow your point of not including this information in the sentence that depends on a specific source. So I'll try to find a beter way to insert the information.
* I hope you agree. Vlaascho (talk) 18:52, 18 October 2013 (UTC)
* Honestly - two of those references are utterly unreliable - you can't use Wikipedia or Commons to reference stuff. It isn't odd that we don't point out things that secondary sources don't point out... that's how Wikipedia works. We report what secondary sources say about the subject. Adding stuff that doesn't specifically discuss the subject of the article is OR in Wikipedia's terms. Ealdgyth - Talk 20:54, 18 October 2013 (UTC)
A few quibbles
* "This was the name favoured by Edward Freeman, a Victorian historian who wrote one of the definitive accounts of the battle."
I feel that "one of the definitive" is a bit of a contradiction in terms. Probably "one of the more complete/accomplished accounts" would be a better way to allude to its scholarly merit.
* "fitzOsbern" and other such prefixed names
Is it a stylistic option not to capitalize the 'f' like on the article page for this person? Dracontes (talk) 18:55, 9 December 2013 (UTC)
* "fitzOsbern" is a perfectly fine choice - it's actually more usual to see this in the scholarly literature. On the other matter, Freeman's account is still used as the basis of a lot of scholarship even now. But I'm not that bothered by using another word instead, except I do not think "accomplished" is quite the same meaning as "definitive". Ealdgyth - Talk 19:10, 9 December 2013 (UTC)
* There can clearly be many definitions of anything, so there's nothing wrong with "one of the definitive accounts". I'd probably be inclined to shorten and simplify it by saying "a definitive account" though. Eric Corbett 19:14, 9 December 2013 (UTC)
Semi-protected edit request on 14 August 2014
I notice in the commanders section of this article, you missed Robert de Beaumont, who commanded the right wing of infantry on the field of battle!
'one of the Proven Companions of William the Conqueror at the Battle of Hastings in 1066, and was leader of the infantry on the right wing of the Norman army' -> sourced from a wiki article on Robert de Beaumont.
I don't know whether or not you want to add this in somehow, but it would help make this interesting article a little bit more accurate!! Thanks! P.S Great job on this article :)
EditorofEngland (talk) 12:39, 14 August 2014 (UTC)
If think this is incorrect, please request this in the form "Please replace XXX with YYY" or "Please add ZZZ between PPP and QQQ". Please also cite reliable sources to back up your request, noting that Wikipedia is NOT a reliable source. - Arjayay (talk) 16:16, 14 August 2014 (UTC)
* Beaumont commanded a "troop" which was on the right wing, according to William of Poitiers. This is not the same thing as what his article says - which is unsourced. The three wing commanders were Alan, William fitzOsbern, and Eustace, which is sourced here. It's highly unlikely that Beaumont actually commanded more than his personal troops - as it was his first battle. Vaughn's description of Beaumont's role in the battle is that he was young, newly knighted, and that he commanded some troops on the right wing - does not specify what type of troops or how big. We only list the wing commanders in the infobox, not sub-commanders. Ealdgyth - Talk 13:20, 14 August 2014 (UTC)
* Red information icon with gradient background.svg Not done: for the reasons explained above.
Semi-protected edit request on 9 November 2014
There's an error in the translation of the Latin text in the tapestry image: it should be "King Harold was killed," not "King Harold is killed."
"King Harold was killed": Harold Rex Interfectus Est
"King Harold is killed": Harold Rex Interficitur — Preceding unsigned comment added by <IP_ADDRESS> (talk)
* Yes check.svg Done Stickee (talk) 04:49, 10 November 2014 (UTC)
Background and location
This subsection strikes me as a bit of a mishmash, a heap of information that's not very well ordered. The first paragraph starts by talking about timing, then mentions something William de Jumieges wrote about the night before (what's the point of this?), then it goes on to describe the battlefield itself (wouldn't it be better to break into a new paragraph here?), which leads into a discussion of the battle's name (while the progression is logical, it still feels odd). Then the second paragraph breaks off by going back to timing in its first sentence, before heading into an entirely different direction with the routes followed by the two armies to Hastings.
While translating the article into French, I decided to rearrange this passage in a manner that seemed more logical to me (first chronology, then geography, to put it roughly). Maybe the same could be done here, unless I'm the only one who feels that way. Ælfgar (talk) 16:42, 24 December 2013 (UTC)
I feel like it is significant enough to mention that the English troops present at Hastings rode to the battle field yet dismounted before engaging in battle in the introductory paragraph. — Preceding unsigned comment added by Politic Revolutionnaire (talk • contribs) 21:36, 17 November 2015 (UTC)
Semi-protected edit request on 14 December 2015
uhhh baby baby ohh yeh people
<IP_ADDRESS> (talk) 19:07, 14 December 2015 (UTC)
* Red question icon with gradient background.svg Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format. /wia 🎄 /tlk 19:14, 14 December 2015 (UTC)
March 2016
This information: "The field south of the Battle Abbey has been historically considered the actual location where the Anglo-Saxon army formed its defense shield to stop the Norman advance. At the end of 2013 British Channel 4's Time Team performed archeological survey and excavated the field. No human remains or any remnants of an axe, sword, arrow or armour from the conflict have ever been found in the area, even though some 10,000 men are believed to have died there. Channel 4 suggested that possibly the actual location of the battle is not south of the Abbey, but about 200 meters east." is being edit-warred in. A "Time Team" TV investigation is not needing this much undue weight placed on it in an article on the whole battle. I note that English Heritage has not changed their opinion, nor have any historians changed theirs. This information really doesn't belong in the article and has been repeatedly added ... while being reverted by other editors. There are a number of problems with this content besides the WP:UNDUE problem of a fringe theory. At least the sentence "No human remains or any remnants of an axe, sword, arrow or armour from the conflict have ever been found in the area, even though some 10,000 men are believed to have died there" is almost an exact word-for-word copy from [http://www.telegraph.co.uk/history/10486441/Battle-of-Hastings-fought-at-site-of-mini-roundabout.html "However, no human remains or artefacts from the conflict have ever been found in the area, even though some 10,000 men are believed to have died there." which is in this article]. And that article basically goes on to point out that this "theory" is not supported by anyone else, including English Heritage. See this from English Heritage. Basically, this is a fringe theory and has no place in the article .. or in Wikipedia. Ealdgyth - Talk 00:38, 29 March 2016 (UTC)
* Ealdgyth, thank you for clarifications, good objectivity. Wiley Sage (talk) 01:10, 29 March 2016 (UTC)
September/October 2016
* This page does need to conform to WP:NPOV. While Lawson may believe that he "and other modern historians" agree on the site of Caldbec Hill, this is not uncontentious. You can't prove a contentious point from a single citation. English Heritage - which is a reputable authority - would disagree and point us at many conflicting sources that support the traditional Senlac site. Wikipedia should document both. While I agree that Time Team isn't "a historian", English Heritage's Roy Porter, who wrote the article I referenced, most certainly is: he views the LiDAR investigation and landscape analysis as being strongly supportive of the "traditional" battlefield location.
* You can't go about claiming things are 'fringe theories' simply because your favourite historians disagree.
* The Parson's Cat (talk) 16:56, 30 September 2016 (UTC)
* This statement (which was just editwarred back in) "The traditional site of the Battle of Hastings is Senlac Hill, the of the present-day remains of Battle Abbey... "makes no sense. Also - see above - the information is way undue. And breaks the whole flow of the article - you're inserting information about a 2014 investigation (by a TV show, not an archaelogist or historian, no less) into the description of the actual preparations for the battle. Also - the reference being used is stated as having a date of 2 December 2016 - that's patently not possible (as it's 30 September 2016). There have been many investigations of the battlefield, and I'm sure some archaelogical investigations - but none of those merit mention in the article on the battle itself. There have been many possible sitings of the battlefield but most historians (which ... Lawson says in the source given for the statement "most historians" which keeps getting tagged without actually having the source being consulted, near as I can tell) concur with location. It's a fringe theory when no other historians take it up. Ealdgyth - Talk 17:05, 30 September 2016 (UTC)
* Further ... the statement "The traditional site of the Battle of Hastings is Senlac Hill, the of the present-day remains of Battle Abbey, and William the Conqueror is said to have directed that the abbey's high altar be placed on the exact spot where Harold died; the battle is said to have been fought on the land to the south and west of the abbey." is sourced to this page from English Heritage but no where on that page is any mention made of Senlac Hill. Nor does the source say anything about the battle being fought to the south and west of the abbey. The information fails to be verified by the source given. Ealdgyth - Talk 17:11, 30 September 2016 (UTC)
* Apologies for the missing word 'site', now added. Can I suggest you read the sources again, please? You'll see a map of the battlefield which shows the space to the south and west of the abbey. The source I indicated very definitely contains the essential claims that I re-stated.
* The only part that isn't in the article is the naming of the site as Senlac Hill. Senlac Hill exists today in Battle, and if you look on any map, Google identifies its two halves: Lower Lake and Upper Lake. Lawson would agree with this terminology: he believes (or believed?) that the Saxon army assembled on Caldbec Hill and the Norman Army assembled on Senlac Hill.
* Could you name the modern historians that Lawson cites, please?
* It's certainly not true to say that no modern historians disagree with Lawson: I quoted English Heritage's Roy Porter who takes a measured and sceptical view of Time Team's contribution. Note that I inserted information from English Heritage and Roy Porter, not from Time Team. I am very sure that we could find other historians who take this view. I would suggest that rather than books, articles in peer-reviewed academic journals would be the gold standard here. Perhaps you have expertise to identify these?
* I'm sure that the flow of the article could be better - please do improve. But the traditional site of the Battle of Hastings does need to be mentioned and given due weight. That's not to say that Lawson's wrong: it's just that Wikipedia needs to give all credible positions due weight, not make judgements.
* The Parson's Cat (talk) 17:49, 30 September 2016 (UTC)
* Senlac is mentioned. And we don't need to go into great details about which hill is which - this is an overview article. If someone wants all the indepth details - the place for them to go is to the various books that are used as sources. We locate the battle site as between Caldbec Hill to the north and Telham Hill - (in the background and location section) and then describe the naming of it as Senlac in that section. That's where the due weight is. The fact of the abbey's high altar being located on the site of Harold's death is dealt with later in the article - repeating it is not needed elsewhere. Lawson doesn't cite other historians - he says what the traditional view is ... and then goes on to refute with his own view. When a historian says "The usual view" or "The mainstream view" ... that is enough to state that "most historians" (this is also borne out by the fact that none of the sources I just went back and checked differ on the location of the battle being at the site of the Abbey. As for there being no bodies or other artifacts found at the site - we mention in this article that the site had some extensive work done on it to build the abbey - the top of at least one hill was leveled off. (There is also mention of a possible skeleton related to the battlefield later in the article in the explanatory footnotes.) Ealdgyth - Talk 18:05, 30 September 2016 (UTC)
* Exactly what does Lawson say, please? I can easily access peer-reviewed journals, I don't have ready access to Lawson's book. "Historians" is not a well-defined term: it can mean highly-respected academics who publish in peer-reviewed papers, or it can mean populist history authors who sometimes have a strong academic pedigree but not always. Lawson may be referring to them. Could you clarify this, please? Lawson must himself have given some references?
* I would disagree with your analysis of the article as it stands: reading the original you would not realise that the site Lawson's modern historians are claiming differs significantly from the traditional battlefield site. Calddec Hill and Senlac Hill are a mile apart. This is something important, and the readers do need to know this. They shouldn't be told that there is a consensus that the Saxon army formed up and fought on Caldbec Hill, when there is an I porta t - and dare I say more orthodox - view that the Saxon army formed up on the traditional site. Do you understand where I am coming from here, please?
* Other than this, are you now happy that my edits stands? I believe I've responded adequately, but what do you think
* The Parson's Cat (talk) 18:35, 30 September 2016 (UTC)
* No, I'm not happy with your additions. Your text still duplicates texts elsewhere to little need. I'm not about to type out what Lawson says because it covers two pages - it's properly summarized here. If I typed all that in here, it'd be a copyright violation. But it's not just Lawson - Peter Rex in 1066 says "Duke William, early on the morning of Saturday 14 October, had moved up to the crest of Telham Hill, some 200 feet above sea level, from which he was able to observe English movements on Calbec..." (p. 61). Frank McLynn in 1066 says "At first light the Norman advance guard on Telham Hill saw the Anglo-Saxon standards on Caldbec Hill" (and he never once mentions Senlac in the book, as it's not in the index). Peter Merren in 1066 says "The Battle of Hastings was fought on a saddle of land formed by Caldbec Hill in the north and Telham Hill in the south" (p. 101). David Howarth in 1066 says "The apple tree where Harold's army met was on Caldboc Hill" (p 169) and describes the place of the battle as between Caldboc Hill and Telham hill. Howarth describes the valley between the two hills as "Santlache" and says that's the basis for the corruption by the NOrmans in to Senlac. Matthew Bennett in Campaigns of the Norman Conquest says that the English formed up on Caldebec Hill (p. 39). Gravett in Hastings 1066 has the English forming up on Caldebec Hill and the Normans arriving at Telham about 6am on the 14th. (p. 59) He does mention Senlac - but as the marshy area between the two hills, not as a hill itself. It's clear that the battle was fought between the two hills, given all of these sources. Even English Heritage avoids mentioning Senlac in their pages. We go by what the sources state - and your source doesn't mention Senlac itself (nor on the map) so it can't be used for what you're trying to make it say. Ealdgyth - Talk 19:14, 30 September 2016 (UTC)
* Again, can you respond to what I've actually asked, please? Who does Lawson say claim the battle took place on Caldbec Hill rather than the site of Battle Abbey? Are these academic historians or are they popular history writers? That should not require you to reproduce two pages. If you can't do this, you need to back down.
* There is a difference between the place an army met - which was traditionally Caldbec Hill - and the place it formed up to fight. The sources you have may well make that distinction: from what you have written, it is not clear.
* The Parson's Cat (talk) 19:33, 30 September 2016 (UTC)
* One - you don't need to ping me each and every time. Since I did the majority of the work on this article, I have it watchlisted. Again - Lawson says "The traditional view" is that the battle took place between Caldebec and Telham with the English line on Caldebec. He disagrees to some degree. One reason for simply stating that the battle took place between the two hills is that this is what the sources agree on. Then you get into many different ideas about what happened when - all of which are subjects for scholarly monographs but are too much detail for an encyclopedia article. Scholarly monographs go into great detail - this isn't a monograph. We need to cover the information, based on sources such as the above, so that the average reader can understand what's going on. The article currently states "The battle took place 7 miles (11 km) north of Hastings at the present-day town of Battle,[78] between two hills – Caldbec Hill to the north and Telham Hill to the south." - does that disagree with anything you're saying? Again - overview. We don't need to wade into the scholarly debate about whether or not this tiny detail is correct. Your information about Harold's death site being the high altar site is already in the article. The information about Time Team is undue weight as no other such survey is discussed in the article - those sorts of surveys are the basis for the secondary historians we are basing the article on. Most of the above writers are historians - Howarth and Rex are the closest to "popular" historians. Several of them are military historians, and two of the works are from Osprey, quite a well respected military history publisher. And again - your source does not say anything about Senlac, so until I see a source that does say something you're trying to insert - I can't see inserting it. Ealdgyth - Talk 19:53, 30 September 2016 (UTC)
* You shouldn't be deleting other editors' referenced work just because you feel a sense of ownership of the article. It's not up to you what gets inserted. Please see WP:OWNERSHIP.
* You're very fixated on the lack of a reference to Senlac Hill, and haven't seemed to grasp that the point I am making is that many historians - and as yet, you've not identified someone you regard as an academic historian - would disagree with the article's current claim, which is that the Saxon line was on Caldbec Hill. Traditionally, the Saxon line was believed to have been formed at the site of Battle Abbey which is very definitely not at Caldbec Hill. This is not a minor issue: it's significant.
* The naming of the Battle Abbey site as Senlac Hill is a minor point, and would not normally be contentious: the Senlac Hill article on Wikipedia does discuss this, though perhaps needs merging into here. However, if your after a strong reference, you can easily find one at
* The Parson's Cat (talk) 20:18, 30 September 2016 (UTC)
* The references did not back up the information cited to them. It's perfectly acceptable to delete information that is not referenced in the reference given. That's not referenced information. And the edit being discussed didn't just mention Senlac Hill - it added information that is elsewhere in the article and information about a survey. If you want to propose specific information about Senlac Hill backed by a reference or so - that's one thing. But an edit has to be taken as a whole - not just one piece of the information. The new reference is not really ideal - it is not exactly high quality. I did check biographies of William and Harold - neither Douglas nor Bates discuss the location of the actual fighting in their biographies of William. Walker does a bit but his biography isn't what you'd call academic. Rex also has a biography of Harold, where he puts Harold on Caldebec Hill. Several of the authors above mention that Harold moved down into the valley and then moved back... Huscroft in The Norman Conquest names no names but says that Harold drew up his battle lines on a hill. Ealdgyth - Talk 20:41, 30 September 2016 (UTC)
* The references do back up the information I inserted in the article. I suggest you read them again.
* I disagree with your view of the article, and I think you're treating the article in contravention of WP:OWNERSHIP.
* I feel that the source I've given is strong enough to show that Battle Abbey's site is known as Senlac Hill. This shouldn't be contentious. It's just the present-day name of a hill in Battle.
* It's not for individual users like yourself to decide how Wikipedia works: you need to refer to Wikipedia policies and guidelines. Can you do this here?
* The Parson's Cat (talk) 20:54, 30 September 2016 (UTC)
* The Parson's Cat (talk) 20:54, 30 September 2016 (UTC)
* It is not just Ealdgyth who disagrees with your approach, but other editors such as hchc2009 and myself. Discussion of a TV programme has no place in this article. Time Team was conducted by first rate archaeologists who boasted that they followed up their programmes with peer reviewed articles. If they thought on reflection that their investigation produced significant discoveries, then there will be an article, but judging by Roy Porter's comments, it does not seem likely that their discoveries were important enough to require amendment of the Wiki article. Dudley Miles (talk) 21:49, 30 September 2016 (UTC)
* Can you please look at the edit made: the key point - supported by a reference - which was that the traditional site of the Saxon line was not Caldbec Hill but Battle Abbey. This was not referenced to Time Team: it was referenced to English Heritage, in an article that did not mention Time Team.
* What do you think of this? The current article makes a clear claim suggestion that there is a full consensus that the Saxon army formed up on Caldbec Hill. I feel that the article needs to reflect the fact that there is a significant body of thought that disagrees.
* I have referred this discussion to Wikipedia's Dispute Resolution process. I plan to take a back seat now and see what the wider community thinks.
* The Parson's Cat (talk) 22:32, 30 September 2016 (UTC)
* can I draw your attention to WP:CANVAS please. I see that you've discussed this on your talk pages. Wikipedia has a suggested way of asking other editors to get involved in a more neutral way. The Parson's Cat (talk) 22:40, 30 September 2016 (UTC)
William II of Normandy (was Semi-protected edit request on 22 April 2015)
From the first line, please change "Duke William II of Normandy" to "Duke William I of Normandy" because the William of Normandy that fought at the battle of Hastings was the first William of Normandy thus styled as William I of Normandy. William II was his son.
Jebbens (talk) 21:33, 22 April 2015 (UTC)
* No. William the Conqueror is the second William who was Duke of Normandy, so he's correctly styled "Duke William II of Normandy". See William Longsword. William Longsword was William the Conqueror's great-great-grandfather. Ealdgyth - Talk 21:43, 22 April 2015 (UTC)
* It doesn't appear so simple. Our article William the Conqueror currently lists him as William I in bold, and William II only secondarily. In the infobox, it lists his successor as William II (of England). --A D Monroe III (talk) 22:24, 22 April 2015 (UTC)
* That is, while the "of England" or "of Normandy" can make the I vs. II "correct", it's confusing to a casual reader, and may deserve some clarification. --A D Monroe III (talk) 22:29, 22 April 2015 (UTC)
This seems rather cumbersome in an article about a battle, rather than the individual, especially as, if you click the link William II of Normandy it takes you direct to William the Conqueror which explains he "had been Duke of Normandy since 1035 under the style William II" We either need a proposed re-wording, or to accept the status quo. - Arjayay (talk) 17:29, 23 April 2015 (UTC)
* What are you suggesting? that it is phrased "Duke William II of Normandy (later to become King William 1 of England)"
* I appreciate that this is an old discussion, but it's worth noting that this one is slightly more complex than it appears. If the relevant Wikipedia articles are correct, during his lifetime, William Longsword and his predecessor Rollo were referred to as the Counts of Rouen, not Dukes of Normandy.. William Longsword's son Richard I of Normandy was the first person recorded as a "Duke". Some non-contemporary sources have referred to all the counts and dukes as "dukes", and it may well be that there was no real change in status, just a change in the terminology used.
* I would agree that referring to William the Conqueror as "Duke William II of Normandy'" is confusing. However, there is another option: he was also known (unambigously) as "William the Bastard". I propose changing the opening sentence:
* The Battle of Hastings was fought on 14 October 1066 between the Norman-French army of Duke William II of Normandy and an English army under the Anglo-Saxon King Harold Godwinson, beginning the Norman conquest of England.
* to
* The Battle of Hastings was fought on 14 October 1066 between the Norman-French army of William the Bastard, Duke of of Normandy, and an English army under the Anglo-Saxon king Harold Godwinson, beginning the Norman conquest of England.
* Any objections?
* The Parson's Cat (talk) 18:04, 5 October 2016 (UTC)
* Yes, I object. There really isn't much evidence that William was really known as William the Bastard by any Norman source during his lifetime. I'd be fine with "William, the Duke of Normandy" which avoids the whole numbering issue. But William the Bastard was clearly a name used as a pejorative by his enemies and not one he'd embrace. Ealdgyth - Talk 18:28, 5 October 2016 (UTC)
* Done. Now says "William, Duke of Normandy". The Parson's Cat (talk) 20:14, 5 October 2016 (UTC)
* Reinstated as "William, the Duke of Normandy" - I think there's consensus here, judging by the lack of further comments.
* The Parson's Cat (talk) 10:09, 8 October 2016 (UTC)
Site: Battle Abbey versus Caldbec Hill (October 2016)
* The current article seems to state that there is agreement among modern historians that the Battle of Hastings took place on Caldbec Hill, with a (referenced) assertion from an author.
* The traditional academic consensus is that the Battle of Hastings was fought on the site of Battle Abbey, which is not Caldbec Hill. This is sourced to numerous near-contemporary documents including the Anglo-Saxon Chronicle. The following sources support this:
* Many writers seem to agree that the likely place Harold's army met and camped overnight was Caldbec Hill. Recently, Grehan, Mace and Lawson (possibly others?) have conjectured that Harold's army took up its defensive position at Caldbec Hill too, rather than at the traditional site. There are already references in the article in support of this hypothesis.
* There seems to be little modern easy-to-find academic literature on the topic: apart from popular history books, the only thing I can find is a Ph.D. thesis from Canada. This is an interesting read, and says that from a geographic perspective, both the Battle Abbey site and the Caldbec Hill site are geographic possibilities. (Two other proposed sites - including Crowhurst - are dismissed outright.)
* There are two incidental details that may well not need to appear in the article: the site of Battle Abbey is today called Senlac Hill, but if its Wikipedia article is correct, that name may not be contemporary. Also, a widely-reported "new site" from a popular archaelogical TV programme was actually part of the traditional site, not a new site at all. However, neither of these points is at all key to the argument.
* In light of all this, I would suggest amending the article from:
* Most recent historians conclude that Harold's forces deployed in a small, dense formation around the top of Caldbec Hill, with their flanks protected by woods and a stream and marshy ground in front of them. Lawson points out the possibility that the English line was a bit longer and extended enough to anchor on one of the streams nearby. The English formed a shield wall, with the front ranks holding their shields close together or even overlapping to provide protection from attack.
* to
* There is a consensus that Harold's forces deployed in a small, dense formation at the top of a steep slope. Traditionally, historians have identified this as the present-day site of Battle Abbey, but some recent writers have suggested that it was Caldbec Hill, with the English flanks protected by woods and a stream and marshy ground in front of them. The English formed a shield wall, with the front ranks holding their shields close together or even overlapping to provide protection from attack.
* What do people feel about this? At the moment, we seem to be giving WP:UNDUE weight to the Caldbec Hill hypothesis at the expense of the traditional Battle Abbey site.
The Parson's Cat (talk) 17:39, 5 October 2016 (UTC)
* Perhaps "Harold's forces deployed in a small, dense formation at the top of steep slope, with their flanks protected by woods and marshy ground in front of them. The line may have extended far enough to be anchored on a nearby stream. The English formed a shield wall, with the front ranks holding their shields close together or even overlapping to provide protection from attack. The exact hill that the English fought on is unclear with older sources stating the site of the abbey, but some newer sources suggesting it was Caldbec Hill. "
* Ealdgyth - Talk 18:24, 5 October 2016 (UTC)
* I prefer a slight variation: "Harold's forces deployed in a small, dense formation at the top of steep slope, with their flanks protected by woods and marshy ground in front of them. The line may have extended far enough to be anchored on a nearby stream. The English formed a shield wall, with the front ranks holding their shields close together or even overlapping to provide protection from attack. The exact hill that the English fought on is disputed with traditional sources stating the site of the later abbey, but some newer sources suggesting it was Caldbec Hill. " It's very close, so I'll start making this changes do we can continue discussion if needed.
* The Parson's Cat (talk) 20:18, 5 October 2016 (UTC)
* Let others weigh in. There isn't any great hurry... you can allow others to have time to see things. And I dislike the "traditional" wording - it implies too much. Older/newer is much less tinged with other meanings - that's a clear dichotomy without weighing in on which might be correct. Ealdgyth - Talk 20:31, 5 October 2016 (UTC)
* Please let others weigh in before adding information. Not even three hours after your first edit and you're already putting it in. I prefer to see others views on this, given the discussions before. As a gesture of good faith towards others, it would be nice if the edit was self-reverted. Ealdgyth - Talk 20:33, 5 October 2016 (UTC)
* The Parson's Cat, any reason to prefer "disputed" over "unclear" in your choice of wording? That seems to be the only difference. Mike Christie (talk - contribs - library) 09:03, 6 October 2016 (UTC)
* I agree with Ealdgyth that "traditional" is not right, and "older" is better as more neutral. I think the choice between "unclear" and "disputed" is marginal, and I would prefer "uncertain" to either. Dudley Miles (talk) 10:03, 6 October 2016 (UTC)
* I missed that part; read it too fast. I agree "older" is more neutral. I like "uncertain". Mike Christie (talk - contribs - library) 11:52, 6 October 2016 (UTC)
* Apologies for the delay: I'm travelling at the moment, and don't have regular internet access.
* The reason I prefer "traditional" is that "older versus newer" creates a sense that there was an old way of thinking about things, but we now know better. It's actually the case that many (nearly all?) present-day academic historians still regard Battle Abbey as the battlefield site, so it's not really and "old versus new" thing. (We want to avoid editorial bias, obviously!) I don't think that holders of either viewpoint would object to the label "traditional".
* Similarly, the reason I prefer "disputed" is that I don't think there is any evidence that there is a consensus that the site is "unclear". A good example of this is Marc Morris's review of John Grehan and Martin Mace's The Battle of Hastings 1066: The Uncomfortable Truth, which you can find here, and it's easy to find other examples - English Heritage also seems pretty confident here. This doesn't look to me like "uncertainty", but rather a disagreement or dispute. Can anyone think of a better way of capturing this?
* Hope that helps. It might be a few days before I can check in again, but I'd rather people went ahead than hung around waiting for me.
* I wonder whether there might be a consensus that Ealdgyth's new text is at least a reasonable starting point? We could keep discussing the precise wording here?
* The Parson's Cat (talk) 18:05, 7 October 2016 (UTC)
* As the comments here have dried up, I'm going to implement a change which I think reflects a consensus:
* Harold's forces deployed in a small, dense formation at the top of steep slope, with their flanks protected by woods and marshy ground in front of them. The line may have extended far enough to be anchored on a nearby stream. The English formed a shield wall, with the front ranks holding their shields close together or even overlapping to provide protection from attack. Sources differ on the exact site that the English fought on: some sources state the site of the abbey, but some newer sources suggest it was Caldbec Hill.
* I hope this is a reasonable reflection of consensus.
* The Parson's Cat (talk) 17:19, 12 October 2016 (UTC)
Stamford or Stamford Bridge?
At present, the article has a couple of references to Harold leaving "Stamford". I'm about to amend this to "Stamford Bridge" as this is the name of the village. (There is a Stamford in England, but it's nowhere near Stamford Bridge.)
In support of this, please see::
* Stamford
* Stamford Bridge
I hope this won't be contentious, but if so, please discuss below.
The Parson's Cat (talk) 16:53, 13 October 2016 (UTC)
* We could probably go with just "leave the battlefield" or "leave the north" as a variation. As an aside - the article on the village is totally unsourced ... so it's not much use in determining if there was an actual village there at the time of the battle. Ealdgyth - Talk 18:41, 13 October 2016 (UTC)
* I misread the surrounding text before I made my edit, so that might not quite work - apologies. It was actually "The deaths of ... at Stamford Bridge". This could be re-worded as "the battle". I have no objections - please all edit until perfect. The Parson's Cat (talk) 20:15, 13 October 2016 (UTC)
Location map for Infobox
I'm about to add a map showing the location of the battle within East Sussex to the infobox. Please feel to improve and/or discuss below.
The Parson's Cat (talk) 20:15, 13 October 2016 (UTC)
Lead image ...
I greatly prefer File:Harold dead bayeux tapestry.png as the lead image - it's shows up the details much better in the infobox, rather than the image that has been twice placed in the infobox. Rather than just doing the edit again, let's discuss per the WP:BRD cycle. Given the small size imposed on images that are in the infobox, it's usually better to use images that show details better. The image of the Norman knights is very very small and loses all detail. Also, showing the climax of the battle (Harold's death) strikes me as a much better idea than generic knights. Ealdgyth - Talk 14:39, 14 October 2016 (UTC)
* Fully agree, the previous image should be restored. Cheers, Ian Rose (talk) 15:01, 14 October 2016 (UTC)
* Anyone else (such as the person who changed the picture twice) want to weigh in? Ealdgyth - Talk 12:10, 15 October 2016 (UTC)
* Agree - should be changed back. Hchc2009 (talk) 13:19, 15 October 2016 (UTC)
|
WIKI
|
Talk:Ena, Gujarat
Verifying Ena
* I removed the previously cited population of 1,000 because the IBNLive article gave a figure of 5,000.
* I couldn't find references for the latitude and longitude but it looks about right relative to Bardoli. (compare map at Wikimapia)
* I couldn't find references for the codes, but it looks like the telephone prefix is a Surat prefix and the vehicle code corresponds to Bardoli.
--Shunpiker 20:03, 18 February 2007 (UTC)
|
WIKI
|
Cisco Blogs
Share
tweet
What provisioning the Cloud infrastructure and cooking have in common…
- November 2, 2011 - 1 Comment
What provisioning the Cloud infrastructure and cooking have in common…
I like to cook. Sometimes, I’ll grab whatever ingredients I have on hand, put them in a Dutch oven, throw in a few spices, and make a delicious casserole that can never be repeated. At other times, I’ll follow a recipe to the letter, measure and weigh everything that goes in, and produce a great meal that I can repeat consistently each time.
When provisioning servers and blades for a Cloud infrastructure, the same 2 choices exist: follow your instinct and build a working (but not repeatable) system, or follow a recipe that will ensure that systems are built in an exacting fashion, every time. Without a doubt, the latter method is the only way to proceed.
Enter the Cisco Tidal Server Provisioner (an OEM from www.linmin.com) , an integral component of Cisco Intelligent Automation for Cloud and Cisco Intelligent Automation for Compute. TSP lets you easily create “recipes” that can be easily deployed onto physical systems and virtual machines with repeatability and quality, every time. These recipes can range from simple, e.g., install a hypervisor or an operating system, to very complex: install an operating system, then install applications, run startup scripts, configure the system, access remote data, register services, etc.
Once you have a recipe (we call it a Provisioning Template), you can apply it to any number of physical systems or virtual machines without having to change the recipe. Some data centers use virtualization for sand box development and prototyping, and use physical servers and blades for production. Some data centers do the opposite: prototype on physical systems, then run the production environment in a virtualized environment. And of course, some shops are “all physical” or “all virtual”. Being able to deploy a recipe-based payload consistently on both physical and virtual systems provides the ultimate flexibility. Yes, once you’ve created a virtual machine, you’ll likely use VMware vSphere services to deploy, clone and move VMs, but as long as you’re using TSP to create that “first VM”, you have the assurance that you have a known-good, repeatable way of generating the golden image. When time comes to update the golden image, don’t touch the VM: instead, change the recipe, provision a new VM, and proceed from there.
While small shops use TSP “standalone” with the browser-based GUI, any sizable data center will want to use orchestration (the Cisco Tidal Enterprise Orchestrator) driven by a catalog-based self-service portal (the Cisco Cloud Portal). Together, these three components comprise Cisco Intelligent Automation for Cloud, and fully automate the processes from end-user resource requests to bare metal provisioning and bare metal imaging.
Provisioning vs. Imaging:
Bare Metal Provisioning is the automated equivalent of having someone go from system to system, insert an operating system or hypervisor DVD, answer questions and wait for the process to complete. TSP’s Bare Metal Provisioning performs these same functions, except they’re done remotely over the network, and they’re done unattended. This is called automated server provisioning.
Bare Metal Imaging, on the other hand, is a full system backup: master boot record, partition layout, partition contents, applications, settings, data, in short, every single bit of a local disk. After a backup is made, you can restore that disk image to the same system for disaster recovery purposes (rolling the system back in time to a known-good state) or to other identical systems to “clone” the original system.
Whether you need to do an initial data center roll out of “static” systems (i.e., install Windows or Linux on physical servers or blades once, and keep that OS on the system forever), or have a “dynamic” data center where payloads get changed on a frequent basis, the Tidal Server Provisioner and Cisco Intelligent Automation empowers you to deploy high quality systems quickly and consistently.
Now back to the kitchen and my cookbooks…
Tags:
In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.
1 Comments
1. So using your analogy, Bare Metal Provisioning is equivalent to delivering hot pizza to order, while Bare Metal Imaging is more like selling frozen pizza for reheating at home? :-)
Share
tweet
|
ESSENTIALAI-STEM
|
Missing Bucks County men: Suspect arrested in theft of missing man's car
(CNN)Pennsylvania authorities on Wednesday arrested a man whose parents own the sprawling property at the center of a major missing persons investigation. Cosmo Dinardo, 20, is accused of stealing and then attempting to sell a 1996 Nissan Maxima owned by Thomas Meo, one of the men who went missing last week, Bucks County district attorney Matthew Weintraub said on Wednesday afternoon. Meo, 21, was reported missing on July 8, and a day later, Dinardo attempted to sell Meo's vehicle to a friend for $500, Weintraub said. Meo is one of four men between 19 and 22 years old who went missing over several days last week within miles of each other. They have not been found, and foul play is suspected in their disappearances. Local and state police and the FBI have embarked on an "all hands on deck" search for the men that, as of Wednesday morning, remained "wide open," Weintraub said. The investigation has centered on the sprawling farmland property in Solebury Township owned by Antonio and Sandra Dinardo, Cosmo Dinardo's parents. The arrest on Wednesday comes on the fourth day of an intensive search of that property. Weintraub said Wednesday afternoon that he was "encouraged" that there would be some finality in the case. "The search at the scene up the road is really intensifying," Weintraub said. "We are going to find something for sure, I have no doubt of that." Missing men vexes investigators Jimi Patrick, 19, of Newtown Township was last seen at 6 p.m. July 5 and was reported missing the next day after he had no contact with friends or family and didn't show up to work, police said. Dean Finocchiaro, 19, of Middletown Township was last seen at about 6:30 p.m. Friday evening, police said. Mark Sturgis, 22, of Pennsburg and Meo, of Plumstead Township were last seen together Friday night near the Doylestown area in Bucks County, CNN affiliate KYW-TV reported. Sturgis' father said the two were friends. Amid a search for the men, investigators have focused on the Dinardo property in Solebury Township. Weintraub said Wednesday that investigators had not found human remains on the property, but he said they had recovered important pieces of evidence about the missing men at that site and at other locations. "We here are utilizing every resource at our disposal to try to find these four missing men and to solve this case," Weintraub said. "This is just really, really rough on everybody involved because of the heat, the magnitude, the scope and the stakes are incredibly high -- life and death." Overhead images from KYW show large makeshift tents set up across the property as investigative teams dug for evidence using large machinery. "We're going to continue in the direction that we're going," Weintraub said. "We're going to keep digging and searching that property until we are satisfied that they are not there." Son arrested Meo's vehicle was found at a property owned by the Dinardo family, according to a criminal affidavit. It was still registered to Meo and had not been legally exchanged. The keys and title to the vehicle were folded up and hanging on the wall inside the garage of the property, the affidavit states. In addition, Meo is a diabetic, yet his diabetic life-saving kit was still in the vehicle, Weintraub said. Dinardo was charged with one count each of theft and of receiving stolen property, according to the criminal complaint. He was arraigned on the charges in Bucks County on Wednesday afternoon, and bail was set at $5 million dollars cash after Weintraub argued he was a flight risk. He was also arrested Monday on a charge of possession of a firearm, an offense dating back to February. That charge does not relate or pertain to this case, Weintraub said. Dinardo was released Tuesday evening after his father paid 10% of his $1 million bail in cash, according to Weintraub. Dinardo allegedly possessed a 20-gauge shotgun, according to a court documents, even though he was prohibited from possessing a firearm because he was known to be suffering from mental illness and had been involuntarily committed to a mental institution for inpatient care. A judge dismissed the charge in May, according to court documents. The Bucks County district attorney's office authorized police to reinstate and refile charges in the case in June, leading to Monday's arrest. CNN's Anne Woolsey, Madison Park and Lauren del Valle contributed to this report.
|
NEWS-MULTISOURCE
|
Question: Using sum with order by clause in SQL Server
Question
Using sum with order by clause in SQL Server
Answers 2
Added at 2016-12-31 12:12
Tags
Question
I want to see data as per trainer who worked for the maximum hours for previous 3 months (i.e 90 days). I created a stored procedure to view the sum of hours in the previous 3 months, now I just want to add group by clause (group by trainer)
Here is my stored procedure, please do suggest me the changes what I need to do
begin
declare @h int
declare @m int
declare @tm int
declare @min int
declare @count int
declare @d varchar(30)
declare @dt datetime
declare @d1 varchar(30)
declare @dt2 datetime
declare @dt1 datetime
set @dt = (select convert(datetime, (dateadd(day, -90, getdate())), 105))
set @d = (select convert(varchar, @dt, 105))
set @dt1 = (select convert(datetime, getdate(), 105))
set @d1 = (select convert(varchar, @dt1, 105))
set @dt2 = (select convert(datetime, @d1, 105))
set @h = (SELECT SUM(DATEPART(hh, (convert(datetime, hrs, 1))))
FROM sonvininsert
WHERE date BETWEEN convert(datetime, @d, 105) AND convert(datetime, @d1, 105)
AND instructore = 'primary'
AND status = '0'
GROUP BY trainer)
set @tm = (SELECT SUM(DATEPART(mi, (convert(datetime, hrs, 1))))
FROM sonvininsert
WHERE date BETWEEN convert(datetime, @d, 105) AND convert(datetime, @d1, 105)
AND instructore = 'primary'
AND status = '0'
GROUP BY trainer)
set @m = @tm / 60
set @min = @tm % 60
set @h = @h + @m
select @h as hour
end
The following error occurs:
Msg 512, Level 16, State 1, Line 25
Subquery returned more than 1 value. This is not permitted when the subquery follows =, !=, <, <= , >, >= or when the subquery is used as an expression.
Msg 512, Level 16, State 1, Line 30
Subquery returned more than 1 value. This is not permitted when the subquery follows =, !=, <, <= , >, >= or when the subquery is used as an expression.
I want my query to be like
group by trainer
order by trainer desc
Answers to
Using sum with order by clause in SQL Server
nr: #1 dodano: 2016-12-31 12:12
..group by trainer in the sub-query is the reason for error. The sub-query will find the sum for each trainer but you are assigning to variable.
Here is one way to do this for all trainers
;WITH cte
AS (SELECT trainer,
Sum(Datepart(hh, ( CONVERT(DATETIME, hrs, 1) ))) AS H,
Sum(Datepart(mi, ( CONVERT(DATETIME, hrs, 1) ))) AS tm
FROM sonvininsert
WHERE date BETWEEN CONVERT(DATETIME, @d, 105) AND CONVERT(DATETIME, @d1, 105)
AND instructore = 'primary'
AND status = '0'
GROUP BY trainer)
SELECT trainer,
m = tm / 60,
[min] = tm % 60,
[hour] = h + m
FROM cte
ORDER BY trainer desc
nr: #2 dodano: 2016-12-31 12:12
Try something like.....
begin
declare @h int ,@m int ,@tm int , @min int , @count int ,@d varchar(30)
,@dt datetime , @d1 varchar(30) , @dt2 datetime , @dt1 datetime
select @dt = convert(datetime,(dateadd(day,-90,getdate())),105)
select @d = convert(varchar,@dt,105)
select @dt1 = convert(datetime,getdate(),105)
select @d1 = convert(varchar,@dt1,105)
select @dt2 = convert(datetime,@d1,105)
select trainer
, sum(DATEPART(hh,(convert(datetime,hrs,1))))
+ sum(DATEPART(mi,(convert(datetime,hrs,1)))) / 60 AS [Hour]
FROM sonvininsert
where date between convert(datetime,@d,105)
and convert(datetime,@d1,105)
and instructore='primary'
and status='0'
group by trainer
end
Source Show
◀ Wstecz
|
ESSENTIALAI-STEM
|
User:HeroNumberZero/sandbox
My Sandbox
Source: Department Of Public Relations, Madhya Pradesh
New
Angry Prash is a Indian YouTuber, animator, streamer, comedian and rapper.
Total numbers of active, recovered and deceased cases
Note: This is a Stacked Area chart. View the height of each section separately. Recovered + Active + Death = Total cases.
Sources:
|
WIKI
|
loading
Simply and easy to make
Step 1: Materials
Electronic part from a old powerbanck,plexy,soldering materials,hot glue,transparent scotch,new slim battery
Step 2: Assembly
Open the old Pb and take only the electronic circuit,change battery(same type on volts) 2200 mA or above
fix all parts on the plexiglas with hot glue and cover with transparent scotch.
use the old cable to charge battery from a USB.this project is for many and différents usage like bluetooth boombox,smartphones,camping lamp(with mini usb led light in my other instructables)....
thank you to watch....
WARNING!!!!<br>That is a lithium ion battery right? BE VERY CAREFUL!!! If that punctures it burns over 1,000 degrees Fahrenheit or over 500 degrees Celsius (not exact conversions but they still get the point across and are true). That means even bending it too much can start the chemical reaction that makes it burn! I do not recommend leaving the battery unprotected like that.
I am on the app so I can not edit my comment but also be very careful about over charging it and over draining it. Both can damage the battery. I currently can not remember off the top of my head exactly happens when you do either. Can someone else please remind me and enlighten the rest?
<p>The circuit board from the powerbank SHOULD prevent over/under charge condition.</p><p>As long as the li-po cell is of equal or greater capacity than the li-ion cylinder cell it is replacing, the only noticeable difference should be form factor, and a SLIGHT increase in time to "full" when charging(because the li-po likely has a slightly higher capacity)</p><p>The plexiglass should limit bending enough to prevent that danger, but it is still at risk for puncture. That being said, so are all the batteries from my old phones. Reasonable caution when handling and storing should mitigate any major risk.</p>
<p>the two batteries(old and new)are lithium-ion.the dimensions are différents. </p><p>the electronic circuit inside is for this type of battery(charge and discharge).</p><p>this powerbanck work every days without problems(build ending Agust 2015).</p><p>Scotch and plexyglass (i think....) protect sufficiently the battery(no kid here)...</p><p>thank you for the comment.... :)</p><p><br></p>
About This Instructable
801views
16favorites
License:
More by alby21europa:GPStrackerPowerbank Nautilus Lamp Mac Gyver BigLedLamp
Add instructable to:
|
ESSENTIALAI-STEM
|
Raghu Raghu - 7 months ago 37
SQL Question
SQL Joins 3 tables ---data not pulled from inner table
I have this SQL Query that pulls data from 3 tables. I am unable to get any columns from table3. What might be the issue?
SELECT table1.col1 COUNTRY,
table2_alias1.col3 STATE,
table2.GEOG_LOCATION,
table2.GEOG_LOCATION_pRE,
table2.T2col4,
table2.T2col5,
TABLE3_ALIAS1.ZIP,
TABLE3_ALIAS1.T3col2,
TABLE3_ALIAS1.T3col3,
TABLE3_ALIAS1.T3col4
FROM table1,
table2 table2_alias1,
table2,
(SELECT *
FROM table3
WHERE ( col5 = 'XXX'
OR col5 = 'YYY' )
AND col6 = 'ZZZ')TABLE3_ALIAS1
WHERE table1.col3 = 'AAA'
AND table1.col1 = table2_alias1.STATE
AND table2_alias1.STATE = table2.col7(+)
AND table2.STATE = TABLE3_ALIAS1.col6(+)
ORDER BY
2,
4,
10,
9
SAMPLE OUTPUT(HIGHLIGHTING THE MOST IMP DATA AS MEANINGFUL COL NAMES)
COUNTRY|STATE| GEOG_LOCATION | T2COL2 | T2col3 | t2col4 | zip | T3col2 |T3col4
USA CA LosAngls LosAngls-1 0 y 90001
USA CA SanFrans SanFrans-4 0 y 94101
USA CA Freemont Freemont-A 0 n 94538
Only the first 5 columns have data and the columns INCLUDING zip(that come from table3) and beyond do not contain any data when the query is run
RDBMS
TABLE1 TABLE2 TABLE3
T1_COL1 GEOG_LOCATION T3_COL1
GEOG_LOCATION T2_COL2 T3_COL2
T1_COL3 GEOG_LOCATION_pRE GEOG_LOCATION
T1_COL4 T2_COL4 T3_COL4
T1_COL5 T2_COL5 T3_COL5
T1_COL6 T2_COL6 T3_COL6
T1_COL7 T2_COL7 T3_COL7
T1_COL8 T2_COL8 T3_COL8
T1_COL9 T2_COL9 T3_COL9
T1_COL10 T3_COL10
The three tables are linked by the column startihg with HHH. They share then same data. The column starting with FFF(3rd one in table 2) has a recursive relation with the 1st column of table2(HHH_col1).
Answer
Try running the nested query on it's own:
SELECT *
FROM table3
WHERE ( col5 = 'XXX'
OR col5 = 'YYY' )
AND col6 = 'ZZZ'
Do you get data back?
Also, might be worth prefixing the column names in the query above with the table name, just to be safe.
Then, try joining it to table2:
SELECT *
FROM table3, table2
WHERE ( col5 = 'XXX'
OR col5 = 'YYY' )
AND col6 = 'ZZZ'
AND table2.col3 = table3.col6(+)
... and so on, rebuilding your query one step at a time, until the data is missing. Then you know which step is the culprit...
|
ESSENTIALAI-STEM
|
In our blog posts Reducing Infrustration and Immutable Demo Nodes, we talk about our approach to immutable infrastructure and the benefits we have seen from employing this approach. In this article, we explore a practical project example so you can get up and running with immutable infrastructure in less than an hour!
Overview
Ansible is incredibly powerful and features a whole lot of tools for manipulating AWS (Amazon Web Services) infrastructure.
We're going to start with the simplest project that we can; let's assume you have an application that you want to deploy onto immutable EC2 nodes. Your app could be anything - PHP, Python, Ruby, NodeJS - it doesn't matter!
We are going to work through an example, step-by-step, to show you how it could be done in a simple way in Ansible.
Order of events
Here's what we're aiming for. It's a simple method for immutable infrastructure which is based on adding nodes to the load balancer, then destroying all the old nodes.
workflow.png
1. Tag any running instances of your project (if there are any) with oldMyApp=True
2. Provision new instance(s)
3. Add new instance(s) to the load balancer
4. Destroy the nodes you tagged with "oldMyApp=True"
This has the following advantages:
1. If it fails at any point, the load balancer keeps running with its existing nodes - no downtime!
2. ...and any nodes that's didn't provision correctly will automatically be removed on the next run
3. It's super simple!
Step 1: Setting up AWS
Before we get started, we are going to do a few setup tasks to get our infrastructure ready.
Step 2: Create a directory for your Ansible playbook
Pretty much any structure will work. Let's go with:
/ansible - our playbook
/yourapp - your application
Step 3: Dynamic inventory
We use dynamic inventory so that Ansible can work out what nodes we have in AWS. So, in directory /ansible/inventory, put the ec2.ini and ec2.py files from the dynamic inventory.
Create /ansible/ansible.cfg for configuring Ansible to use the dynamic inventory. We suggest:
[defaults]
ansible_managed = Ansible managed: {file} modified on %Y-%m-%d %H:%M:%S by {uid} on {host}
hostfile = inventory/ec2.py
remote_user = ubuntu
[ssh_connection]
pipelining = True
ssh_args = -o ControlMaster=auto -o ControlPersist=30m -o StrictHostKeyChecking=no
control_path = /tmp/ansible-ssh-%%h-%%p-%%r
Step 4: Amazon access key and secret key
Also create /inventory/aws_keys. This is a file that will simply include your security information so that Ansible can communicate with Amazon Web Services.
This file should contain information like the following. Your specific values will vary. Amazon's documentation tells you how to get these values.
export AWS_ACCESS_KEY_ID='HJFLKJ32T32TGEKJG3'
export AWS_SECRET_ACCESS_KEY='HJFLKJ32T32TGEKJG3HJFLKJ32T32TGEKJG3'
export EC2_REGION='us-east-1'
Also, export the .pem from AWS and put it in /ansible/myapp.pem - follow Amazon's documentation on EC2 keypairs. This key will be used by Ansible to set your SSH credentials so that it can talk to AWS.
Step 5: any specific roles your playbook may need
We will have a directory /ansible/roles. These are the roles that install your application. This is out of scope of this article as it will depend on your application.
Step 6: create playbook to tag the old nodes
Create /ansible/tag-old-nodes.yaml
---
- hosts: all
gather_facts: false
sudo: no
tasks:
- name: Get instance ec2 facts
action: ec2_facts
register: ec2_facts
- name: Add a tag "oldMyApp" to all existing nodes, so we can filter them out later
local_action: ec2_tag resource={{ec2_facts.ansible_facts.ansible_ec2_instance_id}} region='us-east-1' state=present
args:
tags:
oldMyApp: true
All this does is, using the dynamic inventory, goes through the existing nodes and adds the tag "oldMyApp" (set this tag to something more relevant to your app).
Step 7: add playbook to stand up nodes
Create /ansible/immutable.yaml. Read our comments carefully, please don't simply copy/paste this!
---
- hosts: localhost
connection: local
gather_facts: false
vars:
instance_type: 't2.micro'
region: 'us-east-1'
aws_zone: 'b'
tasks:
- name: Launch instance (Ubuntu 14.04 hvm)
ec2: image='ami-9eaa1cf6'
instance_type="{{ instance_type }}"
keypair='myapp'
instance_tags='{"Environment":"myapp","Class":"myapp-immutable","Name":"myapp (immutable)"}'
region='{{region}}'
aws_zone='{{ region }}{{ aws_zone }}'
group='sg_myapp'
wait=true
register: ec2_info
- add_host: hostname={{ item.public_ip }} groupname="myapp,ec2hosts"
with_items: ec2_info.instances
- name: Wait for instances to listen on port 22
wait_for:
state=started
host={{ item.public_dns_name }}
port=22
with_items: ec2_info.instances
# Run your specific roles that install and configure your application
- hosts: ec2hosts
gather_facts: true
user: ubuntu
sudo: yes
roles:
- myapp
- hosts: ec2hosts
tasks:
- name: Gather ec2 facts
ec2_facts:
- debug: var=ansible_ec2_instance_id # You can remove this if you like
- name: Add newly created instance to elb
local_action:
module: ec2_elb
region: 'us-east-1'
instance_id: "{{ ansible_ec2_instance_id }}"
ec2_elbs: "lb-myapp"
state: present
Step 8: add playbook to destroy old nodes
Create /ansible/destroy-old-nodes.yaml
---
- name: terminate old instances
hosts: all
tasks:
- action: ec2_facts
- name: terminating old instances
local_action:
module: ec2
state: 'absent'
region: 'us-east-1'
keypair: 'myapp'
instance_ids: "{{ ansible_ec2_instance_id }}"
All this does is remove any instance that has the tag "oldMyApp". This tag is actually passed in from the kick off script.
Kick off script
Create /ansible/provision.sh:
#!/bin/bash
set -u # Variables must be explicit
set -e # If any command fails, fail the whole thing
set -o pipefail
# Make sure SSH knows to use the correct pem
ssh-add myapp.pem
ssh-add -l
# Load the AWS keys
. ./inventory/aws_keys
# Tag any existing myapp instances as being old
ansible-playbook tag-old-nodes.yaml --limit tag_Environment_myapp
# Start a new instance
ansible-playbook immutable.yaml -vv
# Now terminate any instances with tag "old"
ansible-playbook destroy-old-nodes.yaml --limit tag_oldmyapp_True
Make sure provision.sh is executable (e.g. chmod u+x provision.sh). Now, all you have to do, to totally refresh your infrastructure with brand new provisioned nodes, is run:
./provision.sh
Is this a good approach?
This is a solid starting point that we use for lots of small projects. It works just great for us for these projects. With more complex projects, we use more sophisticated approaches.
Larger projects may wish for something more full-featured, for example, creating a new load balancer, running tests, before switching over Route 53.
Wrapping up
This is just one quick-and-easy way of getting started with immutable infrastructure. We hope that it's given you some confidence to start deploying immutable infrastructure of your own!
• Immutable Demo Nodes - how Radify adopted immutable infrastructure and what the benefits have been.
• Four Principles of DevOps - the principles we apply to our infrastructure and operations.
• Reducing Infrustration - we adopted an immutable infrastructure approach for our web and API nodes. We talk about what it is, why we did it, and what the costs and benefits have been.
|
ESSENTIALAI-STEM
|
Paid Notice: Deaths ROBINOWITZ, SEYMOUR
ROBINOWITZ--Seymour. A long time attorney and a former White Plains City Judge and Councilman, died on Sunday, November 5, 2006 at White Plains Hospital. He was 94. He was born on July 8, 1912 in White Plains, and graduated from White Plains High School and The Ohio State University. He received his law degree from New York University and practiced law in White Plains for 70 years. He was the founder and senior partner of the law firm Robinowitz, Cohlan, Dubow & Doherty in White Plains. He served in the United States Army Air Force in the Pacific from 1942 to 1946. From 1948 to 1956 he was the City Judge in White Plains. In 1956 as City Judge he performed the marriage ceremony for actress Marilyn Monroe and playwright Arthur Miller, which was arranged in secret, and the following Sunday appeared as the myserty guest onthe T.V. show ''What's My Line?'' As City Judge, Seymour Robinowitz was well known progressive innovations in the handling of juvenile problems, and as City Councilman he was responsible of the development of the ice skating rink at Recreation park and many other changes in the Recreation Department. He was married for fifty-five years to Shirley, who predeceased him in 1996. He is survived by two sons, Charles of Portland Oregon and David of New York City, his daughters-in-law Selene of Portland and Kyra of New York City, and four grandchildren, Scott, Mark, Michael and Larissa. He was recognized as an expert in zoning and real estate law and served for many years on the Board of Directors of Security Title and Guarantee Company. He was active in the United Jewish Appeal and was its honoree in 1959-1960. The family suggests contributions in his memory to UJA or a charity of choice. The funeral will be held at the Hebrew Institute, 20 Greenridge Avenue, White Plains, NY on November 8, 2006 at 10 A.M.
|
NEWS-MULTISOURCE
|
Anyone want a higher performance not-quite-so BigInteger
Discussion in 'Java' started by pete kirkham, Aug 11, 2003.
1. pete kirkham
pete kirkham Guest
As a result of doing a fibbonacci function example in C++, I wrote some
code for big integer addition that is 31 bit packed (not having 64bit
longs in the version of C++ I was using). The implementation of
BigInteger on Sun's and Apple's JVMs is 32 bit packed and casts to long
to allow the words to overflow, instead of using the high bit on 32bit
addition/subtraction. Basically, the 31 bit packed version does more,
less costly operations.
On Apple's 1.4.1 JVM on a G4:
For addition of small values, ~75% faster.
For addition of ~1000 digit values, ~35% faster.
For addition of ~10000 digit values, ~25% faster.
I would expect the performance gain to tail off as the number of digits
increases.
I would expect this method to be slower on an 64 bit JVM implementation,
should someone write one (it is word length dependant). Is the JVM for
the intel chip 64 bit?
Is there anyone out there who is doing addition/subtraction intensive
calculations in that range of digits on 32 bit machines that would want
to use it? If so, I'll write the other operations (subtraction will be
as good as addition; multiplication is likely to be slower by 1/32;
division I don't know without doing it as I'd play with the algorithm a
bit) and put it on sourceforge. Otherwise I'll play with a bit and
release it much later as part of (kin).
Pete
pete kirkham, Aug 11, 2003
#1
1. Advertisements
2. Chris Smith
Chris Smith Guest
pete kirkham wrote:
> I would expect this method to be slower on an 64 bit JVM implementation,
> should someone write one (it is word length dependant). Is the JVM for
> the intel chip 64 bit?
Not sure, but the JVM for DEC/Compaq/HP's Tru64 UNIX has been 64-bit for
some time, and I'm sure there are plenty of others. Not sure where the
"64-bit VMs don't exist yet" myth came from, and it may well have been
true when it became popular knowledge, but it's been false for years
now.
--
www.designacourse.com
The Easiest Way to Train Anyone... Anywhere.
Chris Smith - Lead Software Developer/Technical Trainer
MindIQ Corporation
Chris Smith, Aug 11, 2003
#2
1. Advertisements
3. Roedy Green
Roedy Green Guest
On Mon, 11 Aug 2003 21:51:28 +0100, pete kirkham
<> wrote or quoted :
> Is the JVM for
>the intel chip 64 bit?
For the AMD Opteron and Intel Itanium long would be a native 64 bit
long, but for the Pentium implementations, long arithmetic is done
with a pair of 32 bit values.
--
Canadian Mind Products, Roedy Green.
Coaching, problem solving, economical contract programming.
See http://mindprod.com/jgloss/jgloss.html for The Java Glossary.
Roedy Green, Aug 11, 2003
#3
4. pete kirkham
pete kirkham Guest
Roedy Green wrote:>
> For the AMD Opteron and Intel Itanium long would be a native 64 bit
> long, but for the Pentium implementations, long arithmetic is done
> with a pair of 32 bit values.
I was packing at 31 bits as I'd ported it from a 32bit C++, but it
occured to me today that it would be most efficient to pack at two less
than the largest integer word size supported, so that you do nearly the
fewest operations during addition, and you can still multiply half
your pack-word and stay within the pack-word size size.
Packing at 62 bits is around 40% faster on addition than packing at 32
bits on my setup (basically it's doing nearly half as many adds, and one
of the carries is native in the JVM instead of being coded outside it,
or in hardware if it's a 64bit JVM), so whether the JVM is 32 or 64 bit
doesn't matter after all.
You have 64/62 N digits instead of N digits, so multiplication is likely
to be ~7% slower (digits^2 64 bit operations, overflow not important).
Pete
pete kirkham, Aug 12, 2003
#4
5. pete kirkham <> writes:
> I was packing at 31 bits as I'd ported it from a 32bit C++, but it
> occured to me today that it would be most efficient to pack at two less
> than the largest integer word size supported, so that you do nearly the
> fewest operations during addition, and you can still multiply half
> your pack-word and stay within the pack-word size size.
I know Sun is not known to react very fast to user suggestions / bug
reports, but maybe you can managet to contact someone at Sun and push
your implementation into a future version of Java. Just an idea ...
/Thomas
Thomas Weidenfeller, Aug 13, 2003
#5
6. pete kirkham
pete kirkham Guest
Thomas Weidenfeller wrote:
> I know Sun is not known to react very fast to user suggestions / bug
> reports, but maybe you can managet to contact someone at Sun and push
> your implementation into a future version of Java. Just an idea ...
>
> /Thomas
Since I'm stuck at work at java 1.4.1 as the company can't afford to
replace the software that upgrading the OS (or even applying service
packs) would break, and at home I'm happy on Apple, what Sun might do in
the future takes a long to effect me. But I'll submit it to the process
after I've played with it a bit and got bored.
If you want to look at the skeletal implementation for additon and
multiplication, you can at http://tme.g-well.net/bignum.html.
If anyone is running a 64bit JVM, I'd be interested to see the effect.
Cheers,
Pete
pete kirkham, Aug 13, 2003
#6
1. Advertisements
Want to reply to this thread or ask your own question?
It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
1. rmcnutt
math.BigInteger Performance
rmcnutt, Feb 3, 2004, in forum: Java
Replies:
4
Views:
1,795
Juergen Kreileder
Feb 4, 2004
2. nick
Replies:
0
Views:
1,056
3. nick
Replies:
1
Views:
32,862
Eric Sosman
Oct 26, 2004
4. Replies:
5
Views:
446
5. Richard \(MrBonus\)
onBeforeUnload doesn't work quite the way I want it too
Richard \(MrBonus\), Sep 2, 2004, in forum: Javascript
Replies:
1
Views:
171
Robert
Sep 7, 2004
Loading...
Share This Page
|
ESSENTIALAI-STEM
|
8 Key Metrics Behind Home Depot Inc’s Blowout Quarterly Report
In late February, Home Depot (NYSE: HD) closed the books on a record fiscal year in which sales and earnings both trounced management's initial forecasts. The company outpaced most other major retailers while stealing more market share from rival Lowe's (NYSE: LOW) .
Here are a few metrics that describe Home Depot's stellar fourth-quarter performance.
5.8% -- Comparable-store sales
Sales growth sped up to a surprising 5.8% pace, putting the company at 5.6% gains for the year compared to the range of between 3.7% and 4.5% that they issued in early 2016. That result kept plenty of distance between Home Depot and Lowe's, which grew at 4.2% in 2016.
The company achieved those gains through a healthy mix of increased customer traffic and higher average spending. Home Depot handled 2.8% more transactions in the quarter as customers shelled out 2.9% more on each trip.
11.6% -- Growth in high-value transactions
Home Depot enjoyed an almost 12% spike in transactions that totaled $900 or more, demonstrating that its aggressive push into the professional side of the industry is bearing fruit.
Pro sales grew faster than the company average in categories like fencing, flooring, electrical wiring, and industrial lighting.
19% -- E-commerce sales gains
The company made major progress in bulking up its digital infrastructure this quarter by launching a redesigned website and rolling out functionality for buy-online, ship-from-store options.
Aggressive moves like these are helping Home Depot stay relevant as consumers embrace e-commerce for a wider range of products. Its 19% digital sales spike pushed e-commerce to just under 6% of the business, yet nearly half of all orders still include a physical trip to a Home Depot location.
$2 billion -- New debt
Home Depot took out $2 billion of new loans to push its total long-term debt burden up above $22 billion. It was an easy decision for the management team, though, given the historically low interest rates and its declining debt burden as a percentage of earnings. Interest payments are still below 1% of sales, after all.
Home Depot plans to continue dipping into credit markets to fund its share repurchase program, where appropriate, leaving operating earnings available for dividend payments and investment back into the business.
14.2% -- Operating margin
Operating profitability jumped from 13.3% of sales to over 14%, while Lowe's figure stayed in single-digit territory.
LOW Operating Margin (TTM) data by YCharts .
Executives are aiming to get that figure up to 14.5% by 2018 from 13.3% in 2015, and they appear on track to hit that aggressive goal a full year ahead of schedule.
31.4% -- Return on invested capital
Home Depot's return on invested capital (ROIC) rose by more than 3 percentage points in 2016, to pass 31%. More than any other single number, this figure shows off management's impressive efficiency , and ranks the company near the top among all blue chip stocks.
$9.8 billion -- Cash flow
Home Depot generated just under $10 billion of cash from operations last year, up 4% over the prior year. That left plenty of funds to pay for almost $2 billion of capital investments and $3.4 billion of dividends. The company plans to cross $11 billion of operating cash flow in 2017.
55% -- New dividend payout
For the last few years, Home Depot has targeted delivering 50% of earnings to shareholders in dividend payments. That payout ratio makes it more generous than Lowe's, which aims to return 35% of profits to its shareholders while it prioritizes more aggressively expanding its store base. Home Depot widened that gap this quarter, pushing its planned payout to 55% while announcing its biggest dividend increase since 2013 .
Overall, the fourth quarter and 2016 results put Home Depot ahead of its long-term operating and financial goals. It should pass $100 billion of annual sales sometime in the next year as the housing market continues to improve. Meanwhile, it should produce nearly $15 billion of operating profit in 2017 and generate an almost 35% return on invested capital.
10 stocks we like better than Home Depot
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has tripled the market.*
David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Home Depot wasn't one of them! That's right -- they think these 10 stocks are even better buys.
Click here to learn about these picks!
*Stock Advisor returns as of February 6, 2017
Demitrios Kalogeropoulos owns shares of Home Depot. The Motley Fool recommends Home Depot. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
gmoTree – Get and Modify oTree Data
R-CMD-check
gmoTree is an R package developed for importing, merging, and efficiently managing data obtained from running oTree experiments. It’s particularly valuable when dealing with complex experimental designs that span multiple sessions and generate a large number of files that need to be integrated.
gmoTree is not an official package of the oTree team, but it was created to complement the open-source platform.
About this version
This is the beta version of the gmoTree package!
This package has been thoroughly tested, but since it is still in beta, it’s recommended to double-check the results when importing data. For example: Verify if the number of cases matches the numbers reported by the lab and ensure that the time results are reasonable. Please let me know if you encounter any errors or have suggestions for improvement.
The final package might differ from this package, so please keep track of the changes.
Installation
To install this package, use the following command:
devtools::install_github("ZauchnerP/gmoTree")
List of all functions
See the page Introduction to gmoTree for a more detailed overview of the functions. Or see the website of gmoTree for more information on the package in general.
Importing data
import_otree()
Imports your oTree data and combines them in a list of data frames.
Cleaning up data
messy_chat()
Checks for a messy Chats data frame and combines variables that refer to the same concept.
messy_chat()
Checks for a messy Time data frame and combines variables that refer to the same concept.
delete_duplicate()
Deletes duplicate rows from all data frames in the oTree list.
Dealing with dropouts and deleting cases
show_dropouts()
Shows participant codes of people who did not finish at (a) certain app(s) or page(s).
delete_dropouts()
Deletes the data of participants who did not finish at (a) certain app(s) or page(s). This function deletes the participants’ data from all data frames in the oTree list. Caution: It does not delete the cases from the original CSV and Excel files!
delete_cases()
Deletes the data of specified participants from all data frames in the oTree list. Caution: This function does not delete the data from the original CSV and Excel files!
delete_sessions()
Deletes the data of specified sessions from all data frames in the oTree list. Caution: This function does not delete the data from the original CSV and Excel files!
Deleting sensitive information
delete_plabels()
Deletes the variable participant.label from every app because it might contain identifiable information on the participants, such as their MTurk ID. Caution: This function does not delete the variable from the original CSV and Excel files!
Making IDs
make_ids()
Makes participant, group, and session IDs that are the same across all apps.
Calculating the time
apptime()
Calculates the time spent on a specific app.
extime()
Calculates the time spent on the experiment.
pagesec()
Calculates the time spent on each page.
Transferring variables between the apps
assignv()
Copies a variable from the all_apps_wide data frame to the data frames of all other apps.
assignv_to_aaw()
Copies a variable from one of your data frames to the all_apps_wide data frame.
Before running the experiment
show_constant()
Shows constant variables.
|
ESSENTIALAI-STEM
|
Page:The collected works of Henrik Ibsen (Volume 4).djvu/256
throve, as many a cultivated patch
* bore witness, bravely clad in waving gold.
* At church he kept his right hand in his pocket,-
* but sure I am at home his fingers nine
* toiled every bit as hard as others' ten.-
* One spring the torrent washed it all away.
* Their lives were spared. Ruined and stripped of all,
* he set to work to make another clearing;
* and, ere the autumn, smoke again arose
* from a new, better-sheltered, mountain farm-house.
* Sheltered? From torrent-not from avalanche;
* two years, and all beneath the snow lay buried.
* But still the avalanche could not daunt his spirit.
* He dug, and raked, and carted-cleared the ground-
* and the next winter, ere the snow-blasts came,
* a third time was his little homestead reared.
* Three sons he had, three bright and stirring boys;
* they must to school, and school was far away;-
* and they must clamber where the hill-track failed,
* by narrow ledges through the headlong scaur.
* What did he do? The eldest had to manage
* as best he might, and, where the path was worst,
* his father cast a rope round him to stay him;-
* the others on his back and arms he bore.
* Thus he toiled, year by year, till they were men.
* Now might he well have looked for some return.
* In the New World, three prosperous gentlemen
* their school-going and their father have forgotten.
* He was short-sighted. Out beyond the circle
* of those most near to him he nothing saw.
|
WIKI
|
Talk:Abdullah Tal
Untitled
This is most of what I have found. I am very concious that all the sources are unsympathetic to his cause.Padres Hana (talk) 00:19, 27 June 2009 (UTC)
I am pretty certain that Abdullah el Tell is dead. Padres Hana (talk) 22:10, 8 September 2009 (UTC)
Jewish Quarter
The article quotes him saying to Russnak "If I had know you were so few we would have come after you with sticks, not guns.", with the citation Collins/Lapierre, p. 498, adding "Dov Joseph, p. 174. Though he starts the quote "You dogs..." ". The relevant passage there is "When the Legion troops" saw only forty soldiers and a pitiful collection of weapons, one of them exclaimed, “You dogs! If we had known this, we would have marched in with sticks in our hands!” which though with the same idea doesn't ascribe it to anyone specific, and not necessarily El Tell. Mcljlm (talk) 01:27, 30 July 2022 (UTC)
Name
Though the article is entitled Abdullah Tal he is referred to in the first line as Abdullah El Tell and afterwards only as El Tell. That doesn't seem logical. Mcljlm (talk) 01:34, 30 July 2022 (UTC)
Requested move 22 December 2022
The result of the move request was: no consensus. Extraordinary Writ (talk) 06:10, 6 January 2023 (UTC)
Abdullah Tal → Abdullah El Tell – While the article has the title Abdullah Tal, all references to this Jordanian military commander in the article refer to Abdullah El Tell (including the info box). Chewings72 (talk) 06:14, 22 December 2022 (UTC) — Relisting. echidnaLives - talk - edits 04:11, 30 December 2022 (UTC)
* Oppose. In this case, the problem is not the title but the article body; the article used "Tal" until a user indiscriminately replaced all instances of the string "tal" with "El Tell" in 2020. It's hard to determine exactly what the WP:COMMONNAME is for this figure – Ngrams seems to prefer "Abdullah Tal", whereas Google Scholar suggests either "Abdullah al-Tal" or "Abdullah al-Tall" – but I don't see a strong case for "El Tell". My inclination is to retain the current title unless we hear otherwise from someone well versed in the area. ModernDayTrilobite (talk • contribs) 15:40, 29 December 2022 (UTC)
* Al-Tal is the most common usage in sources, for Wasfi Tal, the most prominent member of that family. I chose Tal for brevity, and dropped the redundant Al-. Makeandtoss (talk) 18:36, 29 December 2022 (UTC)
* Makes sense to me! In that case, Tal is likely the best choice for here too. ModernDayTrilobite (talk • contribs) 20:16, 29 December 2022 (UTC)
* Relisting comment: To form a clearer consensus echidnaLives - talk - edits 04:11, 30 December 2022 (UTC)
Correct?
Presently, the aticle states:
"He had four brothers. Ahmad Youssef Al Tal, Wasfi Tal, Said Tal & Hasan Tal"
Is this correct? If Wasfi Tal was his brother, then (presumably) Mustafa Wahbi Tal was his father -but I don't get this to fit. Wasfi Tal was supposed to be the eldest son, but Abdullah Tal was older. User:Makeandtoss; do you know? Huldra (talk) 23:29, 4 January 2023 (UTC)
|
WIKI
|
User:Trintxerpe~enwiki
You can find me here at the Basque Wikipedia and here at the Spanish Wikipedia.
Political beliefs
|
WIKI
|
ClickCease
React Native chatbot app created with OpenAI
How to build a React Native chatbot app with OpenAI and Amity Social Cloud — Part 2
Mark Worachote
Mark Worachote
Solutions Engineer
Android
iOS
Sep 8, 2023
Welcome to the highly-anticipated second part of our chatbot creation journey! In Part 1, we established the core of our project, integrating Amity Chat and OpenAI’s language model into a TypeScript Node.js backend.
Now In this Part 2 step-by-step guide, we will walk you through setting up your Expo React-Native development environment, integrate with Amity React Native Chat UI Kit for faster development and out-of-the-box User Interface and Functionalities. We are ready to offer a dynamic, engaging, and responsive chatbot app thanks to the advantages of React Native.
Without further ado, let’s jump into the tutorial!
Step 1: Set Up Your React Native Development Environment
1. Install Node.js and npm: If you haven’t already, grab Node.js and npm from their official sources and follow the installation instructions for your operating system.
2. Get Expo CLI: Expo is your trusty sidekick for React Native development. Open your terminal and run this command to install Expo globally:
3. Create a New React Native Project: It’s time to birth your project! Run the following command, replacing “YourProjectName” with your desired project name:
4. Follow the prompts, and when asked, choose the “blank (TypeScript)” template. Easy, right?
5. Navigate to Your Project: Use cd YourProjectName in your terminal to navigate to your newly created project directory or you can open the project in your IDE e.g. VSCode and open a terminal there.
Step 2: Setting up Amity React Native Chat UIKit
Now, let’s infuse the Amity React Native Chat UI Kit into your project for some chatbot magic.
1. Clone UI Kit: In your project directory, run the following command in the terminal to clone the Amity UI Kit:
2. Navigate to the UI Kit Folder: Type the command below in the terminal to move into the UI Kit directory:
3. Install necessary libraries within the UI Kit: Type the command below in the terminal to install libraries.
4. Build the UI Kit Package: Type the command below to build.
Now you will see a new <span id="greylight" class="greylight">.tgz</span> file generated from this command.
Step 3: Link UI Kit to your React Native Project
Now we’re going to link our built UI Kit to the main Expo React Native Project.
1. Go to your project’s root directory and copy a generated <span id="greylight" class="greylight">.tgz</span> file to your application folder where you need to use the UI Kit.
2. In your terminal, cd back to your main project’s main directory and run the following commands line by line.
Congratulations! You’ve successfully linked the UI Kit to your main project.
Step 4: Setting up for iOS
To make the UI Kit fully operational on iOS, a few configuration and installation steps are required. Here’s what you need to do:
1. Add Required Permissions: Open your <span id="greylight" class="greylight">info.plist</span> file located at <span id="greylight" class="greylight">{ProjectRootDirectory}/ios/{YourAppName}/Info.plist</span> and insert the following permissions:
Step 5: Setting up for Android
1. This step is a breeze! All you have to do is sync your project’s Gradle files, and you’re ready to roll.
Step 6: Integrate Amity React Native Chat UIKit
Now, it’s showtime! Open your <span id="greylight" class="greylight">App.tsx</span> file in your project, and drop in the following code. Don't forget to customize <span id="greylight" class="greylight">apiKey</span>, <span id="greylight" class="greylight">apiRegion</span>, <span id="greylight" class="greylight">userId</span>, and <span id="greylight" class="greylight">displayName</span> ,<span id="greylight" class="greylight">apiEndpoint</span> with your specific values. Make sure that it’s the same API Key and Server Region as the one you’ve built on Part 1 of this tutorial and ensure that userId is different from the chatbot.
With this, you’re all set! Run your React Native app and watch the Chat UI Kit spring to life.
Step 7: Start the conversation with the Chatbot
Once you’ve launched the UI Kit, you will see an enriched UI provided by Amity. Now it’s time to create a conversation with the chatbot. Don’t forget to keep running our server in localhost and ngrok as mentioned in Part 1 of this tutorial.
1. Click on create conversation icon at the top right corner of the screen.
2. Select the Chatbot user ( In this case my Chatbot display name is Top )
3. Now the UI Kit will navigate you to the chat room with your Chatbot, now go ahead, ask it a question!
4. Boom! The chatbot responds to you, and the conversation begins!
Conclusion
In this extensive journey of constructing a React Native Chatbot App, we’ve explored the horizons of technology to achieve something truly exceptional. Part 2 of our expedition has illuminated the user-friendly nature of Amity React Native Chat UI Kit.
Amity React Native Chat UI Kit has consistently demonstrated its elegance and ease of integration throughout this journey. Seamlessly fitting into your React Native project, it provides a pre-built user interface and functions that effortlessly transform your app into a compelling chatbot hub. What used to be complex tasks, such as creating the chat list or conversation interface, have been dramatically simplified to a straightforward process.
As we set out to establish a discussion with our chatbot, the UI Kit proved to be a reliable guide. We were engaged in a chatroom, communicating with our digital buddy, with just a few clicks. The chatbot’s prompt responses added a magical element for the user.
With the tremendous capabilities of OpenAI’s superior AI engine and the variety of the Amity-powered React Native UI Kit, you have the ability to create chat experiences that will fascinate your consumers. The horizon of chatbot creation has never been more tempting, inviting you to continue on this adventure of creativity and limitless possibilities!
If you want to know more about Amity’s features, feel free to explore more on our website. And if you’re certain that a ready-made solution is more suitable for your business vision and goal, begin your journey by contacting us!
|
ESSENTIALAI-STEM
|
Home > wii u error code 118-0516
How to fix Wii U Error Code 118-0516?
Published on April 11th, 2022
The Wii U error code 118-0516 is caused by a problem with the Wii U's system software. This error code can be caused by a number of things, but the most common cause is a corrupt or damaged system file. This can happen if the Wii U is not properly shut down, or if a software update is interrupted.
If you see this error code, it is important to try and restart the Wii U. If the problem persists, you may need to try and reinstall the system software. This can be done by using the Wii U's built-in system update feature, or by downloading the software from Nintendo's website.
Other common searches for this error include:
• splatoon error code 118-0516
• error code 118 0516
• wii u error code 118 0516
• wii u error code 118-0516
• error code 118-0516
1. Restart the game
1. Open the Wii U GamePad and select the Home Menu.
2. Select the Settings option.
3. Select the System option.
4. Select the Restart System option.
5. Press the A Button to select.
6. Press the Down Button to select option.
7. Press the Left Button to select the OK button.
8. Press the Right Button to confirm.
2. Delete the game data and start the game again
1. First, press the Home button on the Wii U gamepad to go to the Home screen.
2. Select the Wii U Menu icon on the screen.
3. Select the System Settings icon.
4. Select the Data Management icon.
5. Select the Delete Game Data icon.
6. Select the Yes, Delete All Data option.
7. Select the OK button to confirm the deletion.
8. After the data has been deleted, restart the Wii U game console.
If you didn't find success with an option above, then try:
1. Power off the Wii U and restart it.
2. Format the Wii U's system memory and start the game again.
3. Contact Nintendo customer support.
|
ESSENTIALAI-STEM
|
Augustus: First Emperor of Rome
Posted on 13th May 2021
With Cicero, Cassius, Brutus, Mark Antony and Cleopatra all dead the 33 year old Octavian was now the single most powerful man in the known world. No individual it seemed was in a position to challenge his authority only the Senate now stood in the way on his path to supreme power.
Although he was no warrior and doubt had been cast on his physical courage, it being said that he had never personally shed the blood of another not a recommendation for a Roman man of noble blood, he was nonetheless utterly ruthless and in the knowledge that there were always others who would do the killing for him he was to prove a difficult man to oppose.
Octavian did not return to Rome until August 29 BC, a full year after his great victory in Egypt and to a rapturous reception. He had avenged Caesar, defeated the witch Cleopatra brought the years of Civil War to an end. All the people now wanted, was peace and prosperity, and he appeared to be the only man who could both provide and guarantee it.
Praised in the Senate he was reappointed Consul without opposition as was to be every year until 23 BC, when it ceased to be required.
Lauded by the nobility and popular with the people Octavian could have been forgiven a little hubris but he had learned the lessons of his great-uncle Julius Caesar, whose name he now proudly bore. He too had been popular only to be laid-low by a handful of treacherous Senators who believed he was a tyrant they were the very same people he thought were his friends and whose loyalty could be taken for granted.
Unlike Caesar then, Octavian while never loosening his grip on power would be seen to rule by consent.
In 27 BC, Octavian announced to the Senate that he intended to relinquish power. He told them: "The fact that it is in my power to rule over you for life is evident, but I am mild by nature and have no desire to dominate. The power I have now I lie down. Allow me to live out my life in peace."
It was good politics, for he knew there were those in the Senate who wished to seize power for themselves but that the majority fearful of the civil war that would likely result from any power vacuum would oppose his resignation. He was right, and they begged him to remain and even agreed to increase his powers and appoint him Dictator for the next ten years.
He was now effectively sole ruler and de facto Emperor, though he refused to be referred to as such during his lifetime preferring the title Princeps Civitas or Principal Citizen.
On 16 January 27 BC, he was awarded the title Augustus or Illustrious One and a month of the year was renamed in his honour. To consolidate his power he now created his own private army, one that owed loyalty only to him - the Praetorian Guard. But he remained careful throughout to ensure that the power he secured was voluntarily conferred upon him by the Senate and people of Rome and even after he had been appointed Dictator he modestly maintained that he would only govern the provinces while the Senate ruled in Rome. Yet even though, his creation of the Praetorian Guard said otherwise his public persona remained one of a man for whom power was a burden that brought with it a weight of responsibility which he did not seek for its own sake.
In the winter of 39 BC, Octavian was introduced to the 20 year old Livia Drusila, a slim, diminutive young woman who did not possess the fully-rounded figure that was considered attractive in Roman society but was nonetheless very pretty. She had been married since the age of 15 and was already the mother to a son, Tiberius, and was pregnant with her second child, the future Germanicus.
For most of her life her family had been on the wrong side of history, both her father Marcus Claudianus, and her husband Tiberius Claudius Nero had supported Pompey in his conflict with Julius Caesar and later fought in the army of Cassius and Brutus.
Following the defeat and death of Pompey her father had committed suicide, but her husband had returned to Rome and requested clemency which had been granted.
Livia, with her noble bearing, was a resourceful woman who was not in the least cowed by her diminished position as the daughter and wife of traitors. She had her name, beauty, and wits, and was more than willing and capable of using all of them to get what she wanted and secure the future for herself and her children. Octavian, who was not known to be either an emotional or a sentimental man seems to have been smitten with Livia from the first time he met her.
At a time when marriage among the Roman elite was just another means by which to acquire wealth, status, and power there appears to have been little political advantage in Octavian marrying Livia but he was nonetheless determined to do so. He ordered her inconvenient husband to divorce her which given his parlous state and the likelihood of death should refuse he agreed to.
On 14 January 38 BC, Octavian divorced his own wife Julia Scribonia who he complained nagged him on the same day that she gave birth to their daughter Julia. Three days later he married Livia. They were to remain married for the next 51 years and go on to form one of the most remarkable working partnerships in history.
The recently acclaimed Augustus was determined to remake Rome in his own image and he and his own family would set the standard by which the rest of Rome would be judged; and so wishing to be seen as a man of simple taste and little pretension he resided at a modest villa on the Palatine Hill and rarely entertained. The historian Suetonius wrote that: "As a rule he preferred the food of the common people. He ate the coarser kind of bread, white bait, hand-pressed cheese, and green figs. He rarely drank and slept on a camp bed.”
The image of the simple man merely doing his duty was one he was careful to cultivate throughout his life even if it was perhaps not entirely true. He may never have appeared in public garishly dressed but he was nonetheless notoriously vain. No statue or bust of him appeared throughout his life that did not portray him in the full-vigour of youth, and that despite being physically unimpressive this provided him with an almost divine-like status. He was also careful to appear graceful at all times, moving slowly, and rarely raising his voice. Suetonius described him thus: "He had clear bright eyes, his teeth were small, few and decayed, his hair yellowish and curly, and people did not realise how small a man he was."
It was also said that he could bear neither the extremes of heat nor of cold and that his body would become covered in spots and blemishes as a result. He was also terrified of thunder and lightning and would choose to hide in a sealed room during a storm of any ferocity.
He also rarely missed the opportunity to take the moral high-ground. He publicly praised the fidelity of Roman womanhood, condemned adultery, passed laws in favour of marriage and made divorce more difficult. In all this he had a willing accomplice in his wife Livia.
She too disavowed the wearing of jewellery, dressed modestly and busied herself with the running of her household like all good Roman women should. It was even said that she made the Emperor's clothes for him. But she also carried out official duties on his behalf, greeting foreign emissaries addressing women's meetings, and taking an active role in the affairs of the Vestal Virgins. She very soon became the model of the Roman Matriarch. But all was not as it seemed.
The pasty-faced, short, and pitifully thin Emperor had taken to rouging his cheeks, wearing built-up sandals and extra layers of clothing to give him more bulk. He was also a serial philanderer who enjoyed nothing more than to humiliate Senators by forcing their wives and daughters to sleep with him, though his friends were to say that this he did merely for reasons of state and to discover the secrets of his enemies.
Despite his many adulteries Augustus's marriage to Livia remained strong and it was said that he was in awe of his Empress. Once asked how she managed to control such a powerful man she replied: "I remain chaste, do whatever he asks of me, and turn a blind eye to his many passions."
At no time during their long life together did Augustus ever contemplate divorcing his wife despite her failure to provide him with a son and heir. Indeed, so close were they that they were to become effective co-rulers.
Livia conversed with foreign dignitaries often making decisions on her husband's behalf and besides administering to religious affairs she also ran Rome during the Emperor's many absences from the city - she had the free use of the Imperial Seal. Only in military matters was she excluded from the decision making process. But she was more than the devoted help-mate of her husband however, she also had ambitions of her own.
Augustus had no direct heir and Livia was beyond child-bearing age even so she was determined that one of her sons, either Drusus or Tiberius, should succeed him. But Augustus had already alighted upon his nephew Marcellus. When this seemingly healthy and robust young man inexplicably died, apparently of food poisoning, Augustus was distraught. But his death did not move Livia's sons up the pecking order. Instead Augustus looked to the sons of his daughter, Julia.
Julia had been married to Augustus's oldest friend and right-hand-man, Marcus Vipsanius Agrippa. The marriage had been a controversial one for not only was Agrippa twenty five years Julia's senior but he was also of low-birth. However, another childhood friend, Macaenas had told him: "You have made him so great that he must either be your son-in-law or be slain."
Augustus had chosen the former option and it was to prove a happy union with Julia having four children by Agrippa - Lucius, Gaius, Postumus, and a daughter, Agrippina. All three of the boys would be next in the line of succession before either of Livia's children could even be considered. When Agrippa died suddenly and unexpectedly in 12 BC, Augustus adopted the two oldest boys and began grooming them for power. Livia, in the meantime, petitioned Augustus for the recently widowed Julia to be married to her son Tiberius, her other son Drusus had since died.
Augustus was reluctant to consent to this not so much because he objected to Tiberius marrying into the Imperial Family he just didn't like him. Though he had proved himself hard-working, a good soldier and a capable administrator he was also an ill-tempered and melancholic man whose brooding presence Augustus found depressing and objectionable.
But Livia remained insistent and for the sake of marital harmony if nothing else he reluctantly yielded to her demands. Tiberius was equally reluctant to divorce his own wife Vipsania Agrippina with whom he was very much in love, and had to be made to do so.
In no time at all Tiberius and Julia came to loathe one another. His sexual proclivities already went some way beyond the parameters of the marriage bed and he never forgave Julia for being the person responsible for him having to divorce the only woman he ever loved. She never forgave him for his lack of sexual interest in her and the marriage suffered accordingly. Julia was also no friend of Livia's. She thought her overbearing, condescending and manipulative while Livia saw her as an impediment to her ambitions.
In 2 BC, Julia became embroiled in a sexual scandal that brought shame upon the Imperial Family when it was revealed, though by who exactly remains a mystery that she had been sleeping around, not just with Senators and prominent Roman citizens, but with slaves and even gladiators. That she had in fact been behaving like a common whore.
Augustus was furious beyond reason, for years he had promoted family values, he had passed laws designed to improve Roman morals and had carefully cultivated both his and his own family's image. Now he had been betrayed by his own daughter - Julia was arrested on charges of adultery and treason.
Despite the promptings of Livia, Augustus was disinclined to order the execution of his own daughter. Instead he banished her and it was to be a harsh banishment.
She was exiled to the Island of Pandeteria which was little more than a mile in circumference. She was denied wine and any male companionship but at least she wouldn’t be alone. Her mother, Scribonia, was exiled along with her for having given birth to such a whore. Five years later she was permitted to return to Italy but barred from ever leaving the region of Reggio di Calabria. She never saw Rome or her father again and was later starved to death on the orders of Tiberius after he became Emperor.
Not long after Julia's banishment her two young sons Gaius and Lucius both died in mysterious circumstances, the former in a boating accident, the latter of food poisoning. This just left Postumus as Augustus's heir apparent, and he was neither popular nor respected. As the third son little had been expected of him other than perhaps a career in the army and the prerequisite that he, behave responsibly - he had delivered on neither.
He was arrogant, rude, often drunk and whoring his way around the city he offended almost everyone he encountered. Nonetheless, following the premature death of his older brothers Augustus had nowhere else to turn. In 4 AD, he adopted him as his son and legitimate heir.
Also, at the insistence of Livia, should anything happen to Postumus, he adopted Tiberius.
In AD 9, Postumus was accused of trying to rape his niece Livilla. Given his reputation it was an accusation easy to believe, and certainly Augustus did. As a result, Postumus was banished to the tiny Island of Planasia where he was kept under constant guard.
During the long reign of Augustus Rome experienced unparalleled prosperity and the borders of its Empire expanded massively; modern day Spain, Portugal, Bavaria, Switzerland, Austria, Hungary, Croatia, Serbia, Slovenia, Albania and north Africa were all absorbed into the Empire. Trade links were established, the taxes rolled in, and commerce boomed. But the Pax Romana that had been created was about to be challenged in the most brutal and savage way and for the first time the Rome of Augustus would be made to question its own vulnerability.
In the late Autumn of 4 AD, the Governor of Germania, Publius Quintilius Varus marched his entire army, three legions, a cavalry detachment, and 6 cohorts of auxilaries more than 20,000 men, into the Teutoburg Forest and straight into a trap set for it by Arminius, the Chief of the Cherusci Tribe.
In the dark, fearful forest shrouded in mist and in a torrential downpour the Roman Army was wiped out and Varus forced to commit suicide. When the news reached Rome it wasn't at first believed but as the facts were confirmed it had a traumatising effect as the people struggled to come to grips with the thought of a professional Roman army being destroyed by heathen savages. The city went into deep mourning.
But one was more traumatised than Augustus himself: "He was so greatly affected that for several months he cut neither his beard nor is hair, and sometimes he would dash his head against a door, crying Quintilius Varus, where are my Eagles!"
Augustus sent Tiberius to shore up the western border and later dispatched Germanicus, the son of Mark Antony's daughter Antonia on a punitive mission to teach the German tribes a lesson and recover the Eagles. He did both but from that moment on the Roman Empire's northern border never stretched beyond the eastern bank of the Rhine.
The last years of Augustus's life were spent as a man haunted by the events of his past. Saddened by the death and banishments of so many of his oldest friends and family he could find little peace and wandered the corridors of the Imperial Palace at night unable to sleep. As an old man he also had to endure the many ailments that come with advanced age. He was hard of hearing, walked with a stoop and suffered terribly from the cold. Indeed, his fingers were often so numb that he was incapable of writing, and it was said that in, “winter he wore no fewer than four tunics and a heavy woollen gown over his undershirt."
He also turned a deaf ear to the rumours sweeping the Imperial Court that Livia had been in some way responsible for the ill-fortune that had beset his family in the latter years of his reign; for gossip was rife that she displayed an unhealthy interest in poison and was determined that her son Tiberius would succeed to the Imperial Throne and no one else.
On 19 August AD 14, aged 78, Augustus, Rome's first Emperor died. His last words: "I found Rome of clay and leave her too you of marble. If I have played my part well then applaud my exit from the stage."
Following Augustus's death the Senate summoned Tiberius and offered him the Imperial Throne as Augustus's adopted son and nominated heir. Initially, he refused it much like the young Octavian had done so many decades before. But just like Octavian it was merely a ploy to force the Senate to yield even further powers. Three days after accepting the Senate's renewed offer and becoming Emperor he had the exiled Postumus murdered.
In his Will, Augustus had Livia adopted into the Julian Clan, left her one-third of his personal fortune and provided her with the honorific title of Augusta. This guaranteed her patrician status for the rest of her life and made her untouchable. Tiberius was also to make any criticism of his mother a treasonable offence punishable by death.
Despite her own advanced old age Livia remained determined to rule alongside her son as she had her husband, and for a few years this seemed to work quite well, but the always brooding and ill-tempered Tiberius soon began to tire of his mother's constant meddling. Whenever they disagreed on an issue she would be quick to reproach him with “were it not for me you would never have been Emperor." Their mutual loathing for one another merely increased over the years. When the Senate proposed a motion to formally make Livia - Mater Patriae, or Mother of the Nation - Tiberius vetoed it.
In AD 26, Tiberius retired to the Island of Capri. It was suggested at the time that it was to get away from his domineering mother but it was in truth so that he could indulge his increasingly perverted sexual cravings away from the public gaze.
In his absence effective power in Rome fell to the Commander of the Praetorian Guard Lucius Aelius Sejanus, and Livia's influence as a result waned.
In AD 29, aged 86, Livia Augusta, Empress of Rome died. Alongside her husband Augustus she had dominated Roman life for more than 60 tears and tears were wept openly on the streets at her passing, shops were closed, even Rome's bawdier entertainments were put on hold as the entire city mourned the loss of its Queen and Empress but not so her son who refused to return to Rome for her funeral.
His mother's body was preserved for a number of days in the expectation that he would at some time arrive to pay his last respects but he never did. In the end her body had to be buried because of the dire state of the corpse.
Thirteen years later her nephew, the Emperor Claudius, had her declared a God in a formal ceremony, a last tribute that had been denied to her by her own son.
Tagged as: Ancient & Medieval
Share this post:
|
FINEWEB-EDU
|
Otto Aust
Otto Torsten Johan Aust (25 July 1892 – 12 October 1943) was a Swedish sailor. He was a crew member of the boat Kerstin that won the bronze medal in the 6 m class at the 1912 Summer Olympics.
|
WIKI
|
A poem that asks our most present questions: What comes next? Who knows what?
Poem: Lion
Having met lions only from a distance in zoos, I did not consider that in the wild they can carry the scent of the dead prey they have recently consumed, and thereby stink. Poems can give us new information. The idea that something haunting and dangerous strolls through the camp at night, though, feels like recent days — tented up against the virus, we sleep our fitful sleeps. Patricia Kirkpatrick’s splendid new book, “Blood Moon,” carries us away to so many places and helps us “see farther” indeed, even asking our most present questions. What comes next? Who knows what? Selected by Naomi Shihab Nye
|
NEWS-MULTISOURCE
|
Talk:DBi
Reference for formulat
I don't think dBi = 10log [9.9 * (D/λ) 2] is valid - is this for a parabolic antenna only? A reference would be good. Should this not be D/λ squared? --Wtshymanski 22:52, 7 April 2007 (UTC)
I cannot find the formula in books
I suggest removing the whole formula and perhaps adding a table of common antenna gains in dBi. Or we could leave all that to the antenna article. <IP_ADDRESS> 13:28, 25 April 2007 (UTC)
|
WIKI
|
Yarim
Yarim (يريم) is a town in Ibb Governorate of Yemen. Located in the highlands, Yarim is approximately halfway between Sanaa, Yemen's capital, and Taizz. The ruins of Zafar, an ancient Himyarite site, are 10 kilometers southeast of the town.
Geography
The town of Yarim lies in the heart of the Yemen Highlands, on an upland plateau dominated by the massif of nearby Mount Sumarah, which rises to about 10,000 feet above sea level.
Climate
Yarim has a cool semi-arid climate (Köppen climate classification: BSk)
History
In antiquity, the Yarim area was the core of the Himyarite Kingdom, which ruled over much of Southern Arabia from about 115 BC to about AD 575. The Himyarite capital of Zafar was located about 9 miles south of Yarim.
The Swedish explorer and naturalist Peter Forsskål (1732–1763) died in Yarim, where he went to collect botanical and zoological specimens.
Yarim was captured by the Houthis in October 2014 as part of the Houthi insurgency in Yemen. It was subsequently targeted by Operation Decisive Storm.
|
WIKI
|
Fortitudo Pallacanestro Bologna in international competitions
Fortitudo Pallacanestro Bologna history and statistics in FIBA Europe and Euroleague Basketball (company) competitions.
Record
Fortitudo Pallacanestro Bologna has overall from 1976-77 (first participation) to 2008-09 (last participation): 173 wins against 111 defeats plus 2 draws in 286 games for all the European club competitions.
* EuroLeague: 133–86 (219).
* EuroCup Basketball: 6–10 (16).
* FIBA Korać Cup: 34–15 plus 2 draws (51).
|
WIKI
|
Page:Gaskell - North and South, vol. I, 1855.djvu/90
last day came; the house was full of packing-cases, which were being carted off at the front door, to the nearest railway station. Even the pretty lawn at the side of the house, was made unsightly and untidy by the straw that had been wafted upon it through the open door and windows. The rooms had a strange echoing sound in them,—and the light came harshly and strongly in through the
|
WIKI
|
White House rejects request for documents on Trump-Putin meetings
White House counsel Pat Cipollone sent a letter to top House Democrats on Thursday rejecting their request for documents related to President Trump's conversations with Russian President Vladimir Putin, Politico reports. Details: Addressing the chairs of the House Intelligence, Oversight and Foreign Affairs committees, Cipollone argued: “The committees’ letters cite no legal authority for the proposition that another branch of the government can force the president to disclose diplomatic communications with foreign leaders or that supports forcing disclosure of the confidential internal deliberations of the president’s national security advisors." Cipollone continued: Why it matters: The Washington Post reported earlier this year that Trump has repeatedly sought to conceal the details of his face-to-face conversations with Putin from senior officials in his own administration, even going as far as to confiscate notes from his own interpreter. In the context of the investigation into the Trump campaign's ties to the Russian government, Democrats have said they find this behavior alarming. The big picture: The White House has now rejected oversight requests from congressional Democrats at least three times. Cipollone sent a similar letter earlier this month refusing to turn over documents related to White House security clearances.
|
NEWS-MULTISOURCE
|
After protesters find Cruz at D.C. restaurant, O'Rourke calls it 'not right'
Democratic Rep. Beto O'Rourke defended the right of Sen. Ted Cruz, his opponent in the Texas Senate race, to eat in peace after protesters bragged about chasing the Republican out of a Washington restaurant Monday night. "Not right that Senator Cruz and his wife Heidi were surrounded and forced to leave a restaurant last night because of protesters. The Cruz family should be treated with respect," the Texas congressman tweeted Tuesday morning. According to video posted online, protesters targeted Cruz and his wife for complaints about the confirmation process for Supreme Court nominee Brett Kavanaugh, who has been accused of sexual assault in high school and college. Protesters chanted "We believe survivors!" and one called out, "Beto is way hotter than you, dude." Cruz left the restaurant, muttering "God bless you" to the protesters. Cruz has called the allegations against Kavanaugh "serious" and called for a hearing for Christine Blasey Ford, the woman who said Kavanaugh groped her when they were in high school. Cruz expressed his support for Kavanaugh earlier this summer, and the protesters on Monday demanded he explain his current position on the nominee. Cruz does not appear to have commented publicly on the incident. Cruz isn't the first prominent Republican to be chased from a restaurant. White House press secretary Sarah Huckabee Sanders was asked to leave a Virginia restaurant this summer, and Department of Homeland Security Secretary Kirstjen Nielsen was cornered and heckled at a Mexican restaurant in June for her role in executing President Donald Trump's zero-tolerance immigration policy.
|
NEWS-MULTISOURCE
|
Chojnica, Choszczno County
Chojnica is a settlement in the West Pomeranian Voivodeship, Poland, located within the Gmina Bierzwnik, Kamień County.
|
WIKI
|
Talk:McColo
Company info
Anybody know who owns McColo? Or who was/is behind it? And where are these guys located? And where was the ISP located? —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 18:41, 27 November 2008
* The person itself was Russian man Nikolay. He is famous for being killed in a car crash accident by his friend carder Jax in a street race in Moscow. Jax was the driver and he was drunk. He tried to chase Cayenne in his BMW 760. Here you can see related discussions in Russian http://forum.searchengines.ru/showthread.php?t=163356&page=3, http://www.bmwclub.ru/vb/showthread.php?t=150083, http://community.livejournal.com/ru_auto/7816235.html?thread=180090155#t180090155, http://crutop.nu/Vbulletin/showthread.php?t=73915 (tread is deleted), the car before crach http://www.bmwclub.ru/vb/showthread.php?t=149165 —Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:34, 14 February 2011 (UTC)
* Its office appears to be located in Newark, Delaware, while the data center appears to be located in Market Post Tower, in San Jose, California. The Delaware address (found in whois and company mailing address) does not appear to be an "office", but rather a house (maybe a home-office?). --Voidvector (talk) 08:24, 1 March 2009 (UTC)
|
WIKI
|
Recasting Women: Essays in Colonial History
Recasting Women: Essays in Colonial History is a 1989 book, edited by Kumkum Sangari and Sudesh Vaid, published by Kali for Women in India and by the Rutgers University Press in the United States. The anthology attempts to explore the inter-relation of patriarchies with political economy, law, religion and culture and to suggest a different history of 'reform' movements, and of class and gender relations. This books is considered to be a landmark contribution by Indian feminist movement.
Formulating gender history
Any discussion on rewriting history from perspective of feminists would recognize that history writing is not innocent and transparent practice. It is a situated practice, which is mediated by historians. The social location of the historian (caste, gender, class), his/ her theoretical location and the present context which determines what is considered historical enough to be written. Doing feminist history is not a matter of choice.
According to Joan Scott, the history of women can be studied through three genres of history:
1. History of Inclusion- when the nature of history itself was not questioned. Women were added as women worthies. The early attempts of feminist history writing implied including the women worthies i.e. the women warriors or poets were highlighted to prove that if given space, women could act like men. History was unearthed to make women visible.
2. History of Contribution- In this genre, emphasis was on the fact that women were not only present in history but also participated in determining the course of history. For example, women's contribution to revolutions or nationalist movements.
3. History of Oppression- It was argued that the image of ‘ideal’ woman reinstated women's oppression. Women were recognized as a separate category of analysis in history. Although it created essentialized ahistorical category of women, it is contribution in establishing the fact that women had history.
Key arguments
The book Recasting Women, in using gender as category of analysis in their study of Colonial India, reworked our notions of social reform. The authors used women's question as entry point to recast our understanding of social reform in colonial India. Thus, the book foregrounds a different kind of gender history. The authors have shown through their studies how the middle class, who spearheaded the social reform movement, was gendered. They have also argued how the public and private sphere was redrawn. Thus they have made clear distinction between gender as category of description and category of analysis. By doing so, they recognized women as a separate category of analysis in history.
As the editors clearly state in their introduction, the book was the outcome of the need to understand the historical processes which reconstitute patriarchy in colonial India, which also bears significance for the present for two reasons:
1. In the two decades preceding the book, post-colonial hope of improving status of women was shattered.
2. The nationalist model of reform and development lost legitimacy.
Thus studying the politics of social change became the subject of feminist inquiry. The authors clearly distinguish between doing women's history and feminist historiography in early India. The latter, they argue, recognizes that every aspect of social reality is gendered.
The book identifies the differences within patriarchies according to class i.e. defining gender was crucial to the formation of classes and dominant ideologies. The process of social restructuring was simultaneous with the process of reconstituting patriarchies. The land resettlements of colonial era gave more power to the landholding groups and pushed the tenants and agricultural labor to further poverty. This had implications for women of both classes, which explains their active participation in peasant struggles in later years. Land ownership and control over means of production remained in hands of men. Moreover, the codification customs into colonial law gave legal sanction to patriarchal practices on marriage, succession and adoption.
The authors argue that the middle class reforms for women were crucial for their cultural nationalism and related to their self-definition of class. It is also about redefining the public and the private sphere. For them, the private was the indigenous alternative to western materialism.
Another significant contribution made in this book is arguing how the new ideal woman was defined in opposition to women from lower class. Thus which women had more access to the public sphere and how, got redrawn for women of both classes.
The authors also assert that both tradition and modernity carry patriarchal ideologies. Therefore, they make argument in favor of understanding them with their complexities, beyond the binary opposition mode.
In the essays that follow, the first one by Uma Chakravarti is about challenging the notion of glorious status of Indian women in ancient India, as constructed by nationalist histories of colonial times. She argues that even if it was to be accepted, it was true only for Aryan women not Vedic dasis. In her essay she looks at how traditions are invented. For the nineteenth century nationalists, the focus was only on upper caste Hindu women in defining the ideal womanhood.
Recasting in colonial period was also influenced by articulations of nationalism i.e. defining what is nation and claiming power. The pre-independent Indian nationalism demanded participation of women in political sphere. By the late nineteenth century, cultural nationalism was articulated. The idea of nation was determined on basis of cultural superiority, on the basis of which the claim for self-rule was made. In this period, because culture is considered superior, there was opposition to social reforms, unlike in the previous century when women's issues were central to social reforms. As if the women's question did not exist. This is what Partha Chatterjee calls in his essay, the nationalist resolution of women's question.
However, as the authors themselves admit in the introduction, the limitation of the book lies in its lack of representativeness. The essays are confined to the dominant Hindu community, mostly from North India and mainly about middle classes. Despite its limitation, the book is held by common concern for changing position of women both in its material specificity and in the inverse representations within discourses which legitimize their social status. Thus it is useful for further studies on reconstitution of patriarchies.
Reviews
David Kopf has reviewed this book in The Journal of Interdisciplinary History. In his review, he observes:
"'Methodologically, Recasting Women breaks new ground in the historiography of the nineteenth-century renaissance in Bengal because it substitutes colonial discourse for empirical history... The radical point of departure for the feminists in the volume is their contention that the common theme of female emancipation during the renaissance is false. Unlike an earlier generation of Indian feminists who applauded the last century's efforts to abolish sati, child marriage, and Kulin polygamy at the same time it encouraged widow remarriage and higher education for women, today's radical feminists accuse the British of lacking compassion for women and the Bengalis for being hypocritical patriarchs.'"
|
WIKI
|
Loading...
Chart Component
CraftMyPDF is a powerful PDF and image generation API that offers a seamless experience through its user-friendly drag and drop template editor. With CraftMyPDF, users can effortlessly create visually stunning documents and graphics without the need for complex coding or design skills.
One of the standout features of CraftMyPDF is its chart component, which supports a wide range of chart types. Users can easily incorporate dynamic charts into their PDFs and images, enhancing the visual representation of data and insights.
The supported chart types include
• Line charts
• Area charts
• Bar charts
• Pie charts
• Donut charts
• ApexCharts
CraftMyPDF leverages the powerful ApexCharts library, ensuring high-quality and flexible chart rendering. Whether you need to create professional reports, visually appealing infographics, or data-driven presentations, CraftMyPDF empowers you to effortlessly generate stunning PDFs and images, complete with captivating charts, all within a user-friendly and intuitive interface.
To create a Chart component, simply drag it and drop it to the desired location where you want it to appear.
The mostly used properties in the chart components are:
• Categories - The x values on a chart(Line/Area/Bar) or labels on slices(Pie chart/Donut)
• Data - The data points
Extracting data from JSON as a one-dimensional array
The properties Categories and Data only support one-dimensional arrays. In order to extract data from your JSON, you need to use the expression function asArray.
The following is a JSON data with order information in the orders array
{
"orders": [
{
"month": "Jan",
"order": 100
},
{
"month": "Feb",
"order": 200
},
{
"month": "Mar",
"order": 300
}
]
}
The following example demonstrates how to extract the order from an orders array using the "asArray" expression.
{{asArray('order', data.orders)}}
The extracted orders in one-dimensional array
[100,200,300]
The following is an expression to extract all the values from the field month as one dimensional array
{{asArray('month', data.orders)}}
The extracted months
["Jan", "Feb", "Mar"]
Using ApexCharts
One standout feature of CraftMyPDF is its chart component, which seamlessly integrates with ApexCharts.
While CraftMyPDF offers a selection of standard charts, it also allows users to create custom charts using the powerful capabilities of ApexCharts. This flexibility empowers users to visualize data in unique and personalized ways, enhancing the impact of their generated PDFs and images. With CraftMyPDF and ApexCharts, the possibilities for stunning visual representations are endless.
To use ApexCharts, simply select Apex for the Chart Type
The property Options is the ApexCharts options, which can be found on ApexCharts Official docs
Example
To illustrate how to use ApexCharts options, the following is an example of changing the color of the bars if the value is less than 150 using ApexCharts.
The following is the sample data in the Data tab
{
"orders": [
{
"x": "Jan",
"y": 100
},
{
"x": "Feb",
"y": 200
},
{
"x": "Mar",
"y": 300
}
]
}
The following is the ApexCharts Options
{
series: [
{
name: "Yearly Profit",
data: {{JSON.stringify(data.orders)}},
},
],
chart: {
type: "bar",
height: "100%",
width: "100%",
zoom: {
enabled: false,
},
animations: { enabled: false },
toolbar: { show: false },
},
plotOptions: {
bar: {
horizontal: false
},
},
colors: [
function ({ value, seriesIndex, w }) {
if (value < 150) {
return "#FF0000";
} else {
return "#02DFDE";
}
},
],
};
Let's go through the options and understand what each of them does:
1. series: It represents an array of series objects that contain the data to be plotted on the chart. In this case, there is only one series object defined with the name "Yearly Profit" and its data is obtained from data.orders using JSON.stringify().
2. chart: It defines the configuration options related to the chart itself. Here are the properties used:
• type: Specifies the type of chart to be rendered. In this case, it is set to "bar" to create a bar chart.
• height: Sets the height of the chart. It is set to "100%" which means the chart will occupy the full height of its container.
• width: Sets the width of the chart. It is set to "100%" to occupy the full width of its container.
• zoom: Allows zooming and panning interactions with the chart. It is set to enabled: false to disable these interactions.
• animations: Controls the animations of the chart. Here, it is set to enabled: false to disable animations.
• toolbar: Displays or hides the chart's toolbar. In this case, it is set to show: false to hide the toolbar.
3. plotOptions: It contains options that are specific to each series type. Here, under the bar property, the horizontal option is set to false, indicating that the bars should be vertical (the default behavior).
4. colors: It allows you to customize the colors of the chart elements based on certain conditions. It is defined as an array of functions that determine the color for each data point. In this case, if the value of a data point is less than 150, it will be assigned the color #FF0000 (red), otherwise it will be assigned the color #02DFDE (a shade of cyan).
These options provide the necessary configurations to create a bar chart using ApexCharts, with specific settings for the series, chart, plot options, and colors.
Please note that the animation and toolbar are both turned off.
|
ESSENTIALAI-STEM
|
Template talk:Six vilayets
Why Armenian flag? Administration for Western Armenia(Provisional government) —Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:34, 4 November 2009 (UTC) Subdivisions of Turkey--<IP_ADDRESS> (talk) 12:59, 5 November 2009 (UTC)
* http://en.wikipedia.org/wiki/Flag_of_Armenia —Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:29, 4 November 2009 (UTC)
* Category:Armenia subdivision templates|Regions?
* Category:Armenia subdivision templates? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:55, 5 November 2009 (UTC)
* Administrative divisions of Armenia--<IP_ADDRESS> (talk) 12:58, 5 November 2009 (UTC)
|
WIKI
|
Best answer: Does AutoCAD do 3D printing?
Can you 3D model with AutoCAD?
The tools for working in 3D in AutoCAD are located on the 3D modeling workspace. So AutoCAD comes with multiple workspaces. You’ve got drafting and annotation, which is what you see initially out of the box. And those are the tools for working in 2-D.
Can AutoCAD make STL files?
dwg file and open in AutoCAD to create . stl files. Alternatively, download the . stl Exporter from Autodesk Labs and follow the steps below.
Is AutoCAD free software?
The AutoCAD by Autodesk is software to help users craft 3D objects with their computers. The actual price of a single AutoCAD license is $1,575 per year. But you can get the software free and legal. Introducing AutoCAD student version.
Does AutoCAD 2022 have 3D?
Several types of 3D modeling are available in AutoCAD. Each of these 3D modeling technologies offer a different set of capabilities. Wireframe modeling is useful for initial design iterations and as reference geometry, serving as a 3D framework for subsequent modeling or modification.
Can AutoCAD lt 2022 do 3D?
3D models can be opened in AutoCAD LT. However, 3D view and navigation tools are not available.
How do I convert DWG to STL?
First save in dwg file and open in AutoCAD to create STL files.
1. Go to 3D view.
2. Go to File menu , select Export CAD format.
3. A dialog box opens.
4. Select Option.
5. Scroll down the dropdown menu (3D view only) and select 3D polymesh.
6. Select “AutoCAD 2004 DWG” in Save as type.
7. Next, open the saved file AUTO CAD.
IT IS INTERESTING: Frequent question: How do I open tool sets in AutoCAD?
What is difference between Autodesk and AutoCAD?
Autodesk is the company that develops Autocad, Autocad Civil 3D and so many others. Autocad is used most for doing 2D drawings, detailing and recently for 3D modeling. Autocad Civil 3D is most for civil purposes.
Is AutoCAD hard to learn?
Yes, there are many things to learn. But using AutoCAD is not difficult. The key is you need to learn one step at a time. Learn to walk before you learn to run.
Who uses AutoCAD?
AutoCAD is used in industry, by architects, project managers, engineers, graphic designers, city planners and other professionals. It was supported by 750 training centers worldwide in 1994.
Special Project
|
ESSENTIALAI-STEM
|
Why I'm convinced a financial adviser can improve my marriage
My husband and I have different financial priorities, and that often makes discussing money difficult.When a friend mentioned that working with a financial adviser was the best thing she's done for her marriage, I was intrigued.Talking to my friend helped me realize that a financial planner can help us find middle ground and work toward shared financial goals.Are you and your spouse interested in working with a financial adviser? SmartAsset's free tool can help you find a qualified professional in your area »My husband and I often joke that the only interests we have in common are each other and our kids. We are the epitome of "opposites attract" — clashing in how we communicate, how we express ourselves, the hobbies we enjoy, and how we see the world.For the most part, this makes us a good team. We learn from each other, make each other stronger, and offer our kids a well-rounded and balanced approach to life. But when it comes to finances, our differences mean we are rarely on the same page.For my husband, nothing is more important than security and stability, while I embody a sense of adventure, craving new experiences and frequently planning trips to new places.My husband is very disciplined in how he spends his money and can easily turn down expensive social functions, while I struggle with saying no due to cost.This, of course, translates into arguments over what to prioritize in our budget. Saving is the most important to him, and while I agree we need some savings, I see little value in leaving piles of money untouched when there is so much of the world to see.Why we're interested in working with a financial adviserAs with most things in a lifelong partnership, my husband and I have had to learn to compromise and find a middle ground when it comes to how we handle our finances. Yet, our conversations around money are still often fraught with tension.While discussing this with one of my friends recently, she mentioned that working with a financial adviser is the best thing she's done for her marriage. I have never worked with a financial adviser before, but after hearing her experience, I can't get the idea out of my head.My friend and her partner also struggle with saving, and she said that working with someone outside their relationship helped them see their spending habits more clearly, allowing them to work as a team and hold each other accountable to the goals they set together.Think a financial planner could help your marriage? Use SmartAsset's free tool to find a qualified professional »Up until my friend confided in me, I didn't know anyone who had worked with a financial adviser. It seemed like the kind of thing wealthier, older people did as they approached retirement or needed help with estate planning.I never really considered it an option for myself, nor did I think about how working with a financial adviser could potentially improve my marriage. But the more I think about it, it's not hard to see why my friend's experience has been positive.Conversations about money could benefit from an outside perspectiveMoney is typically a contentious topic among couples, and for good reason. Managing expenses while also trying to save for retirement and college in a culture obsessed with consumption can feel overwhelming. And while people often regard financial conversations as dry and boring, the topic of money is actually rife with emotions of pride, fear, love, and shame.The different ways my husband and I spend money illustrate our different values, and more than that, also reflect what we were taught about money growing up and how our parents talked about finances with us. In short, money is a loaded topic that isn't just about financial priorities, but also who we are as people.A conversation about money is rarely just about money, and an outside professional could help us focus on our shared financial goals and less on all the ways we're different.After 16 years together, we're ready to evolve our approach to moneyMy husband and I met in high school. We were kids without a clue about where we would go to college, much less how we would save for retirement. We've been together now for 16 years. We grew up together, went to college together, started careers together, bought a house, and are now raising two kids.We have never handled our finances independently; they've always been intertwined. And since we got married relatively young without steady jobs at the time, we didn't discuss topics like how much of our budget we would spend on groceries or what kind of savings accounts we would have for retirement. In fact, we didn't discuss budgets at all. As with everything else in our lives together, we learned along the way.Now that we're in our 30s with established careers and a lot more knowledge and experience than we had at the altar in our early 20s, it's clear we could have benefitted from discussing financial goals earlier. We've managed, and done well for ourselves in our eight years of marriage, but definitely have room to grow.Our finances, and lives, need a little bit of both of us — the steady hand that keeps us on track and the free spirit who keeps life fun and interesting.The idea of working with an outside third party who can help my husband and me honor our differences while working toward financial goals together is intriguing. It could be just what we need. That is, if I can convince him a financial adviser is worth paying for.Think you could benefit from meeting with a financial planner? Use SmartAsset's free tool to find a qualified professional near you »More financial planner coverageHere's exactly how to tell if you need a financial adviser, a robot, or nobody at all5 times you should consider meeting with a financial plannerPeople with a financial adviser say they aren't just better with money — they're happier with life overallHere's how much a financial advisor costs
Disclosure: This post is brought to you by the Personal Finance Insider team. We occasionally highlight financial products and services that can help you make smarter decisions with your money. We do not give investment advice or encourage you to adopt a certain investment strategy. What you decide to do with your money is up to you. If you take action based on one of our recommendations, we get a small share of the revenue from our commerce partners. This does not influence whether we feature a financial product or service. We operate independently from our advertising sales team.
|
NEWS-MULTISOURCE
|
List of football clubs in Taiwan
This is the list of football clubs (teams) in Taiwan.
Taiwan Football Premier League (2022)
* AC Taipei
* Hang Yuen
* Leopard Cat
* Ming Chuan University
* Taichung Futuro
* Tainan City FC
* Taiwan Power Company F.C.
Taiwan Second Division Football League (2022)
* FC Base Athletic
* Flight Skywalkers
* Inter Taoyuan
* Kaohsiung F.C.
* Land Home NTUS F.C.
* MARS
* PlayOne
* Saturday Football International
Extinct Clubs
* CPC Corporation F.C
* Royal Blues F
* Flying Camel
* Taipei City Bank F.C.
First division
* Nanhua University football team
* National Cheng Kung University football team
* Ming Chuan University football team
* Pingtung University of Education football team
* Taipei Physical Education College football team
* National Taiwan University football team
* National Taipei University of Technology football team
* Taiwan Physical Education college football team
* Royal Blues FC football team
Second division
Blia FC football team
* Kun Shan University football team
* National Cheng Kung University football team
* National Chiao Tung University football team
* National Taiwan University football team
* National Tsing Hua University football team
Senior high school teams
The following teams have participated in Highschool Football League.
* Chung Shan Industrial and Commercial School
* Kaohsiung County Lu Chu Senior High School
* Kaohsiung Municipal Chung Cheng Industrial Vocational High School
* Kaohsiung Municipal Ruei Siang Senior High School
* Ming Dao High School
* National Hsin Feng Senior High School
* National Hualien Senior High School
* National Hualien Vocational High School of Agriculture
* National Pei Men Senior High School football team
* National Pingtung Senior High School
* National San Chung Senior High School football team
* National Shiou Shuei Industrial Vocational High School
* National Yilan Senior High School football team
* Neng Ren Vocational High School
* Taipei High School
* Taichung Municipal Hui Wen High School
* Taipei County Ching Shui Senior High School
* Taipei Municipal Daan Vocational High School
Share Fun Junior Soccer Club, Tainan City
Northern Taiwan
Triangle Football Club, based in Taipei
http://www.soccerkid.url.tw Dream football club 夢幻國際足球隊 新竹
* Keelung Milvus Football Club (基隆黑鳶足球俱樂部), based in Keelung
* Taipei Red Lions F.C. (台北红獅足球隊) based in Taipei
* Taipei Football Club. based in Taipei
* Taipei City F.C. (台北市足球隊), based in Taipei
* Dong Hu Football Club (東湖足球會), based in Neihu, Taipei
* Eagle Club (老鷹足球會), based in Taipei
* Futbol Club de Movimiento Agresivo (MAFC) (好動足球俱樂部), based in Taipei
* Nei-Hu Fire Football Club (內湖火焰隊), based in Neihu, Taipei
* No Limit Soccer Team (無限足球隊), based in Taipei
* Shih-Chi Soccer Club (汐止足球俱樂部), based in Xizhi District, New Taipei
* Southeast Wind F.C. (東南風足球俱樂部), based in Tucheng District, New Taipei
* Taiwan Celts G.A.A. Club, based in Taipei
* Shongshan F.C., based in Taipei
* Da'an F.C. based in Taipei
* Mighty Shane F.C., based in Taipei
* Rogue F.C., now becomes Royal Blues F.C., based in Taipei
* Celts F.C., based in Taipei
* Riverside Magpies F.C., based in Taipei
* Master Football Academy / 明星足球; football for children to adults, based in Taipei
* Ontap Badgers, based in Taipei
* Saturday Football International (SFI) - 週六足球俱樂部; Football Club & Academy Program, based in Taipei
* Inter Taipei F.C., Football Club & Academy Program, based in Taipei
Central Taiwan
* Tiger Green Soccer Team (虎青足球隊), based in Yunlin
* Hikari FC, based in Taichung
* Taichung City Football Club, (TCFC) based in Taichung
* Taichung Compass Football Club, based in Taichung
* Jhubei Football Club, based in Hsinchu
* Tubbies football club, based in Taichung
Southern Taiwan
* Kaohsiung 100 Pacers FC, based in Kaohsiung
* Kaohsiung Massive Football Club, based in Kaohsiung
* Tainan Phoenix(台南鳳凰足球會), based in Tainan
* Thunderbird F.C., based in Kaohsiung
* Share Fun Bilingual Academy, Tainan City, Share Fun Royal King Soccer Club
* Share Fun Kindergarten, Tainan City, Share Fun Kingdom Football Team
|
WIKI
|
Isabel Franco
Isabel Franco may refer to:
* Isabel Franco Sánchez, Spanish journalist and politician
* Isabel Franco Carmona, Spanish Podemos politician
|
WIKI
|
VBA - working with data videos | Excel VBA Part 56.2 - Get Data from SQL Server with ADO Recordsets
Posted by Andrew Gould on 24 June 2019
This video shows you how to extract data from a SQL Server database using the ActiveX Data Objects (ADO) library for VBA and the Microsoft OLE DB Driver for SQL Server. You'll learn how to write a connection string to connect to a SQL Server databse and how to use a recordset to retrieve data. You'll learn how to populate the recordset using SQL Server tables, views, stored procedures and select statements and how to write the data you've retrieved into an Excel Worksheet.
This video has the following accompanying files:
File name Type Description
01 Create Movies Database 2016.sql SQL query
02 Create Oscar Winners View.sql SQL query
03 Create Oscar Winners Procedure.sql SQL query
Get Data from SQL Server with ADO Recordsets.xlsm Excel workbook with macros
Click to download a zipped copy of the above files.
Making a video bigger
You can increase the size of your video to make it fill the screen like this:
View full screen
Play your video (the icons shown won't appear until you do), then click on the full screen icon which appears as shown at its bottom right-hand corner.
When you've finished viewing a video in full screen mode, just press the Esc key to return to normal view.
Improving the quality of a video
To improve the quality of a video, first click on the Settings icon:
Settings icon
Make sure you're playing your video so that the icons shown appear, then click on this gear icon at the bottom right-hand corner.
Choose to change the video quality:
Video quality
Click on Quality as shown to bring up the submenu.
The higher the number you choose, the better will be your video quality (but the slower the connection speed):
Connection speed
Don't choose the HD option unless you have a fast enough connection speed to support it!
Is your Wise Owl speaking too slowly (or too quickly)? You can also use the Settings menu above to change your playback speed.
This page has 3 threads Add post
10 Oct 20 at 16:18
Hi Andrew,
Awesome video and thank you.
I think there are some bugs with the CopyFromRecordset property when using MySQL drivers.
To be more specific, when I use this property then some of the fetched data come in a truncated version, say instead of Consumer Staples it is fetched as Consumer.
Having searched the web I found a property of the Recordset object as per below:
rs.CursorLocation = adUseClient
Indeed this addition provides me with a solution, but I quite do not get the reason why even when I read info in the link below. May I kindly ask you to elaborate on what this property does and its current value "adUseClient"?
https://www.w3schools.com/asp/prop_rs_cursorlocation.asp
Thank you
12 Oct 20 at 07:26
Hi! There's a pretty good description of some of the implications of using server-side or client-side cursors here https://stackoverflow.com/questions/56037800/difference-between-ado-client-side-vs-server-side-cursor-when-the-sql-server-dat
I don't know MySQL well enough to explain why you see the results you do but I hope the link above gives you a little more information.
01 Nov 19 at 22:40
Hello Andrew, for some reason my code didn't work so I had to record it step by step. Here how it looks
Sub CostDataSQL()
Dim i As Long
Application.CutCopyMode = False
Test.Range("C2").CurrentRegion.Clear
With ActiveWorkbook.Connections("DATABASE").OLEDBConnection
.BackgroundQuery = False
.CommandType = xlCmdSql
.connection = _
"OLEDB;Provider=SQLOLEDB.1;Password=XXX;Persist Security Info=True;User ID=XXX;Data Source=MYSERVER;Use Procedure for Prepare=1;Auto Translate=True;Packet Size=4096;Use Encryption for Data=False;Tag with column collation when possible=False;Initial Catalog=DATABASE"
.CommandText = Array( _
"SELECT * FROM REPORT.dbo.PROJECTS as w WHERE w.""Project Number"" " & _
"like '" & Lists.Range("C4").Value & "%' or w.""Project Number"" like '" & Lists.Range("C3").Value & "%' or w.""Project Number"" not like '" & Lists.Range("C9").Value & "%'" _
)
.RefreshOnFileOpen = False
.SavePassword = True
.SourceConnectionFile = ""
.SourceDataFile = ""
.ServerCredentialsMethod = xlCredentialsMethodIntegrated
.AlwaysUseConnectionFile = False
End With
With ActiveWorkbook.Connections("DATABASE")
.Name = "DATABASE"
.Description = ""
End With
Application.CutCopyMode = False
With Test.ListObjects.Add(SourceType:=4, Source:=ActiveWorkbook. _
Connections("DATABASE"), Destination:=Test.Range("$C$1")).TableObject
.RowNumbers = False
.PreserveFormatting = True
.RefreshStyle = 1
.AdjustColumnWidth = True
.ListObject.DisplayName = "Table_DATABASE_Query"
.Refresh
End With
End Sub
My questions would be:
1. Not sure what the difference is between OLEDB and ADODB, does it matter?
2. I have a VERY long SQL statement, so I tried to break it in lines and it didn't work (I have more than 25 lines). Is there a way for me to break it by variables? I tried it by looking at these websites, but it doesn't work for me
https://stackoverflow.com/questions/...-continuations
https://www.anysitesolutions.com/vba...continuations/
Thank you so much.
05 Nov 19 at 07:11
Hi Albert,
In VBA, ADODB is an object library which allows you to write code to connect to a database using several types of connection, of which OLEDB is one. The code shown in the video uses the ADODB library to create a Connection object which establishes an OLEDB connection to a SQL Server database. The technique you've used along with the macro recorder is quite different (I'm guessing you used Data > Get Data > From SQL Server Database from the Excel ribbon) and doesn't use the ADODB library at all. It's up to you which technique you prefer!
The solutions shown in the links you provided are good so I'm not sure why your code still isn't working. If your query is still too long you could try the technique shown in this video https://www.wiseowl.co.uk/vba-macros/videos/vba-ado-net-recordsets/ado-execute-sql-query-file/ which stores the query in a separate text file and has VBA read it.
I hope that helps!
30 Oct 19 at 22:02
Hello Andrew, I have an issue with my code, I'm trying to follow your code suggestion I appreciate if you can please help me. I'm getting Run-Time error '-2147217900 (80040e14)'
[Microsoft] [ODBC SQL Server Driver] [SQL Server] An expression of non-boolean type specified in a context where a condition is expected near "number".
Ideally, my SQL contains SELECT within SELECT statement, i.e. several databases joined with "LEFT Outer join" with input parameters "WHERE project number is like 'P-10500%' or 'P-10600%'
But I tried to construct a code so that at least it can read the database. In Connection string should I put Schema name or I need to list database names if it is more than one database? How can I construct a VBA code for it?
Here's my start code:
Sub GetDataFromSQLServer()
Dim ws As Worksheet
Dim f As ADODB.Field
Dim i As Integer
Dim myservername As String
Dim mydatabase As String
Dim myuserid As String
Dim mypasswd As String
Dim cn As ADODB.connection
Dim rs As ADODB.Recordset
Set cn = New ADODB.connection
cn.ConnectionString = " Provider=MSDASQL.1;Persist Security Info=True;DRIVER=SQL Server; DATABASE: REPORT;SERVER=MYSERVER;UID=ALBERTAN;PWD=PW;APP=Microsoft Office 2016;WSID=XXX"
cn.Open
Set rs = New ADODB.Recordset
rs.ActiveConnection = cn
rs.Source = "SELECT * FROM (SELECT * FROM REPORT 2 as a Left Outer Join Report 3 as b on a.costcode = b.costcode w WHERE w.Job Number like 'p-10500%' OR ‘P-10600%’”
rs.CursorType = adOpenForwardOnly
rs.LockType = adLockReadOnly
rs.Open
Set ws = Worksheets.Add
ws.Select
For Each f In ResultSet.Fields
i = i + 1
ws.Cells(1, i).Value = f.Name
Next f
Range("A2").CopyFromRecordset ResultSet
Range("A1").CurrentRegion.WrapText = False
Range("A1").CurrentRegion.EntireColumn.AutoFit
rs.Close
cn.Close
End Sub
01 Nov 19 at 13:58
Hi Albert, I believe the problem is in the WHERE clause. Yours looks like this:
WHERE project number is like 'P-10500%' or 'P-10600%'
But it should look like this
WHERE [project number] like 'P-10500%' or [project number] like 'P-10600%'
When a column name contains a space it needs to be enclosed in square brackets.
When using a logical operator like AND or OR, you need to include a full logical test on each side of the operator.
I hope that helps!
|
ESSENTIALAI-STEM
|
@article{10.1167/iovs.05-1343, author = {Werdich, Xiang Q. and Penn, John S.}, title = "{Specific Involvement of Src Family Kinase Activation in the Pathogenesis of Retinal Neovascularization}", journal = {Investigative Ophthalmology & Visual Science}, volume = {47}, number = {11}, pages = {5047-5056}, year = {2006}, month = {11}, abstract = "{ purpose. Src family kinases (SFKs) are membrane-attached nonreceptor protein tyrosine kinases that link a variety of extracellular cues to intracellular signal pathways. The purpose of this study was to characterize the roles of SFKs in vascular endothelial growth factor (VEGF)–mediated retinal angiogenesis. methods. Primary rat retinal glial Müller cells and bovine and human retinal microvascular endothelial cells (RMECs) were used in the in vitro studies. A rat model of retinopathy of prematurity (ROP) was used in the in vivo studies. results. In vitro, SFKs were essential for hypoxia-induced VEGF expression in Müller cells and for VEGF signaling in RMECs. However, neither process required significant further phosphorylation of the SFK activation loop Tyr416. In vivo, in a rat model of ROP, a pronounced increase of retinal SFK Tyr416 phosphorylation was observed that was specifically associated with pathologic angiogenesis. These retinas also expressed significantly higher levels of VEGF than did those in healthy controls. Immunohistochemical analysis indicated that Müller cells were the major source of the elevated level of phospho-SFK Tyr416. Intravitreous injection of a selective SFK inhibitor, PP2, significantly reduced retinal VEGF and retinopathy in the ROP model, indicating that SFKs acted as important regulators in abnormal retinal angiogenesis. conclusions. Together, these data suggest that SFK activation through a Tyr416-dependent mechanism may be an important factor in the pathogenesis of retinal neovascularization. }", issn = {1552-5783}, doi = {10.1167/iovs.05-1343}, url = {https://doi.org/10.1167/iovs.05-1343}, eprint = {https://iovs.arvojournals.org/arvo/content\_public/journal/iovs/932936/z7g01106005047.pdf}, }
|
ESSENTIALAI-STEM
|
healthise food allergies sleep impact
There are a lot of symptoms one can have with food allergies. The symptoms are going to vary depending on the person as well as the severity of the food allergies reaction that you have. This being said one of the less common reactions is a migraine. This usually happens as a result of the other symptoms you have related to the allergic reaction. Before I explain this further we should look at what a food allergy is.
A food allergy is a reaction to a certain food you have ingested that has upset the balance of your immune system. The immune system is your body’s protection. This means that when you introduce a foreign property that the body doesn’t recognize your immune system is going to attack it. As the immune system attacks the foreign agent, in this case a protein or antibody found in the food your other systems are going to react. When your body reacts to the chemicals released to fight the antibodies you will experience localized reactions. These reactions or symptoms of food allergies are usually hives, swelling, breathing issues, anaphylactic shock, fever, dizziness, and food allergies migraine.
This is usually related to the insomnia (sleeplessness), migraine, fever, dizziness, and breathing issues you are experiencing. You see migraines occur because of pressure in the head and around the eyes. The pressure builds up until you have light sensitivity, dizziness, pain on either side of your head, and various other symptoms. Migraines are caused by lack of sleep, allergies, and other issues like tumors or blood clots. If you are experiencing food allergies migraine headaches it is usually due to the symptoms brought on by the food allergy as mentioned. This means that the dizziness, shortness of breath, and therefore lack of oxygen is going to cause a pressure build up to occur. You will also find that with food allergies there are some individuals who develop runny noses and coughing. The runny noses and coughing can exacerbate the food allergies migraine headache leaving you feeling extremely poor.
There are a few things you can do about this when you are at home. You can immediately take pain reliever to lower down all of the allergy symptoms (take doctor’s advice before taking any medication), which will help the headache or you can take an antihistamine for the food allergies and the food allergies migraine headache. This will relieve the allergy symptoms of the coughing and runny or stuffy nose. Overall you should always seek medical attention if you have a food reaction.
Similar Studies
|
ESSENTIALAI-STEM
|
clear all // Ordered Data --------------------------------- cd "~/Dropbox/essex/2015-16/gv903/lab17/" dir use "terrismaoz05.dta" list in 1/6 des sum sum mediate sum medintrus sum minreg302 sum caprat sum ally1 sum lagprmed sum cumversatil keep if mediate!=. & minreg302!=. & /// caprat!=. & ally1!=. & /// lagprmed!=. & cumversatil!=. tab medintrus logit mediate minreg302 caprat ally1 lagprmed cumversatil outreg ologit medintrus minreg302 caprat ally1 lagprmed cumversatil outreg, merge logit mediate minreg302 caprat ally1 lagprmed cumversatil margins, atmeans at(cumversatil=(200 400 600 800)) ologit medintrus minreg302 caprat ally1 lagprmed cumversatil margins, atmeans at(cumversatil=(200 400 600 800)) marginsplot margins, atmeans at(cumversatil=(200 400 600 800) ally1=0) marginsplot margins, atmeans at(cumversatil=(200 400 600 800) ally1=1) marginsplot logit mediate minreg302 caprat ally1 lagprmed cumversatil predict logit_hat ologit medintrus minreg302 caprat ally1 lagprmed cumversatil predict ologit_hat1 ologit_hat2 ologit_hat3 // Count Data ------------------------------------ clear all use http://www.ats.ucla.edu/stat/stata/dae/nb_data.dta list in 1/6 des tab prog hist daysabs, width(1) tab gender tab gender, nol replace gender=gender-1 label define label_gender 0 "female" 1 "male" label values gender label_gender tab gender poisson daysabs math poisson daysabs math gender poisson daysabs math gender prog gen prog2=0 if prog!=. replace prog2=1 if prog==2 gen prog3=0 if prog!=. replace prog3=1 if prog==3 poisson daysabs math gender prog2 prog3 poisson daysabs math gender i.prog nbreg daysabs math gender prog2 prog3 margins, atmeans at(gender=0 prog2=0 prog3=0) margins, atmeans at(gender=1 prog2=0 prog3=0) nbreg daysabs math i.gender prog2 prog3 margins gender, atmeans at( prog2=0 prog3=0) nbreg daysabs math gender i.prog margins prog, atmeans at( gender=1)
|
ESSENTIALAI-STEM
|
Wikipedia:WikiProject Military history/News/March 2020/Project news
Welcome to the third Bugle for 2020!
As the regular article news section notes, an unusually low number of articles were promoted to featured status in February. The number of new A-class articles was about average, however. There are quite a few active nominations for featured and A-class status, so extra reviewers would be very helpful.
Our project backlog drive March Madness 2020 is about halfway through and is making significant inroads. Over 850 pages have been tagged for Milhist, more than 310 Milhistbot-assessed articles have been checked, and task forces have been added to more than 1,100 articles. We've also made a significant dent on the Good Article reviewing front. Great work so far, keep on going!
Finally, we'd like to wish all our readers the very best in light of the 2019–20 coronavirus pandemic.
Your editors, Ian Rose (talk) and Nick-D (talk)
* The A-Class cross has been awarded to:
* Parsecboy for Liberté-class battleship, Francesco Caracciolo-class battleship, French battleship Bouvet, SMS Gneisenau, and List of pre-dreadnought battleships of the Royal Navy.
* The second month of the 2020 Military History Article Writing Contest attracted nine participants. First place was taken by with a 79 points from seven articles to take the WikiChevrons, followed by with 34 points to receive the Writer's Barnstar. Also scoring were Djmaschek, Gog the Mild, Kges1901, Peacemaker67, Robinvp11, Sturmvogel 66 and Zawed. Congratulations and thanks to all participants. You can self-assess up to C-class for the contest, but B-class assessments need to be done by another editor. This is best organised by posting at WP:MHAR. Make sure to add your entries for the March contest as soon as they are promoted, this allows the coords to check them progressively.
|
WIKI
|
How to Validate Password Strength using PHP
0
In this tutorial we will discuss how to Validate Password Strength using PHP
When the user enters their account password, it is advisable to validate the input field. Password strength validation is very helpful to check that the password is strong. The strong password makes the user account safe and helps to avoid account hacking.
Using Regex, you can smoothly validate the password strength using PHP. In the tutorial, we will explain you how to validate password strength and validate a safe password in PHP using Regex.
The given code validates the password using preg_match() function in PHP code with Regular Expression, to check that it is strong and difficult to guessing.
• Password which user enter must be at least 8 characters in length.
• Password which user enter must include at least one upper case letter.
• Password which user enter must include at least one number.
• Password which user enter must include at least one special character.
// Given password
$password = 'user-input-pass';
// Validate password strength
$uppercase = preg_match('@[A-Z]@', $password);
$lowercase = preg_match('@[a-z]@', $password);
$number = preg_match('@[0-9]@', $password);
$specialChars = preg_match('@[^\w]@', $password);
if(!$uppercase || !$lowercase || !$number || !$specialChars || strlen($password) < 8) {
echo 'Password should be at least 8 characters in length and should include at least one upper case letter, one number, and one special character.';
}else{
echo 'Strong password.';
}
Also read: How to Extract data Between HTML Tags in PHP
Like it? Share with your friends!
0
Developer
0 Comments
|
ESSENTIALAI-STEM
|
Der Alex Der Alex - 1 month ago 34
TypeScript Question
Typescript 2.0.3 with @types definitions, Webpack, Foundation, jQuery is not defined
I'm trying to build an application with TypeScript 2.0.3 with @types definitions and want to use foundation-sites and bundle everything with webpack.
As soon as I try to import foundation, I get the console error message that jQuery is not defined.
When I don't import foundation, jQuery works fine!
If anyone could explain, what I'm doing wrong and how to load e.g. Foundation Tooltip from a .ts file, that would be really awesome.
You can check out the complete source here: https://github.com/Der-Alex/typescript-foundation-webpack
What I am doing is kind of basic:
I've got an ./app folder. Inside there is an app.ts, main.scss and index.html.
I installed the following npm packages:
...
"dependencies": {
"@types/foundation-sites": "^6.1.28",
"@types/jquery": "^2.0.33",
"css-loader": "^0.25.0",
"foundation-sites": "^6.2.3",
"jquery": "^2.1.0",
"node-sass": "^3.10.1",
"sass-loader": "^4.0.2",
"style-loader": "^0.13.1",
"ts-loader": "^0.9.1",
"typescript": "^2.0.3",
"webpack": "^1.13.2"
},
"devDependencies": {
"webpack-dev-server": "^1.16.2"
}
My webpack.config.js:
module.exports = {
entry: './app/app.ts',
output: {
filename: './app/bundle.js'
},
resolve: {
extensions: ['', '.ts', '.js']
},
module: {
loaders: [
{
test: /\.ts$/, loader: 'ts-loader'
},
{
test: /\.scss/, loaders: ['style', 'css', 'sass']
}
]
}
};
my ./app/app.ts:
import './main.scss';
import * as $ from 'jquery';
import 'foundation-sites';
$(() => {
$(document).foundation();
});
There are no transpile / compile errors. When I run webpack-dev-server and check the result in the browser, the styles are loaded but I get this error message 'jQuery is not defined'. The browser understands $ but for example not $(...).on(...);
So what am I doing wrong?
Answer
I think in this case problem is caused by the fact that if jQuery is imported using webpack (CommonJS style by default) it doesn't create global jQuery variable that foundation-sites is relying on. You could try to expose it in your code and see if it fixes the problem:
import * as $ from 'jquery'; window.jQuery = $; import 'foundation-sites';
|
ESSENTIALAI-STEM
|
Generalized vs set median strings for histogram-based distances: algorithms and classification results in the image domain - Archive ouverte HAL Access content directly
Conference Papers Year : 2007
Generalized vs set median strings for histogram-based distances: algorithms and classification results in the image domain
Abstract
We compare different statistical characterizations of a set of strings, for three different histogram-based distances. Given a distance, a set of strings may be characterized by its generalized median, i.e., the string ---over the set of all possible strings--- that minimizes the sum of distances to every string of the set, or by its set median, i.e., the string of the set that minimizes the sum of distances to every other string of the set. For the first two histogram-based distances, we show that the generalized median string can be computed efficiently; for the third one, which biased histograms with individual substitution costs, we conjecture that this is a NP-hard problem, and we introduce two different heuristic algorithms for approximating it. We experimentally compare the relevance of the three histogram-based distances, and the different statistical characterizations of sets of strings, for classifying images that are represented by strings.
Fichier principal
Vignette du fichier
Liris-2728.pdf (188.18 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...
Dates and versions
hal-01501826 , version 1 (04-04-2017)
Identifiers
• HAL Id : hal-01501826 , version 1
Cite
Christine Solnon, Jean-Michel Jolion. Generalized vs set median strings for histogram-based distances: algorithms and classification results in the image domain. Graph based Representation for Pattern Recognition (GbR'07), Jun 2007, Alicante, Spain. pp.404-414. ⟨hal-01501826⟩
92 View
96 Download
Share
Gmail Facebook Twitter LinkedIn More
|
ESSENTIALAI-STEM
|
Jim Simmons (American football)
James Ellington "Jenks" Simmons (April 3, 1903 – January 16, 1977) was an American football back who played two seasons in the National Football League (NFL) with the Cleveland Bulldogs and Providence Steam Roller. He played college football at Southwestern Oklahoma State University and attended Sentinel High School in Sentinel, Oklahoma.
College career
Simmons participated in football, basketball, track and baseball for the Southwestern Oklahoma State Bulldogs. He made a half-court shot at the buzzer to beat rival Phillips for the conference title in basketball. He was inducted into the Southwestern Oklahoma State Athletic Hall of Fame in 1963.
Professional career
Simmons played in twelve games, starting six, for the NFL's Cleveland Bulldogs in 1927. He played in eight games, starting four, for the Providence Steam Roller of the NFL during the 1928 season.
Coaching career
Simmons coached basketball at Northeastern State University for seven years. He later coached basketball at El Reno High School, winning the state championship in 1932, 1933, 1946, 1949 and 1953. His 1933 and 1949 teams were undefeated.
|
WIKI
|
Page:02.BCOT.KD.HistoricalBooks.A.vol.2.EarlyProphets.djvu/335
in the war-chariots. The suffix refers to סוּס, which is used collectively. The mighty ones on horses are not, however, merely the Canaanitish princes, such as Sisera, as Ewald maintains, but the warriors generally who hunted away upon their war-chariots.
Verse 23
The enemy, or at all events Sisera, might have been destroyed in his flight by the inhabitants of Meroz; but they did not come to the help of the Israelites, and brought down the curse of God upon themselves in consequence. That this is the thought of Jdg 5:23 is evident from the context, and more especially from the blessing pronounced upon Jael in Jdg 5:24. The situation of Meroz, which is not mentioned again, cannot be determined with certainty Wilson and v. Raumer imagine that it may be Kefr Musr on the south of Tabor, the situation of which at all events is more suitable than Marussus, which was an hour and a half to the north of Beisan, and which Rabbi Schwarz supposed to be Meroz (see V. de Velde, Mem. p. 334). The curse upon the inhabitants of this place is described as a word or command of the angel of the Lord, inasmuch as it was the angel of the Lord who fought for Israel at Megiddo, as the revealer of the invisible God, and smote the Canaanites. Deborah heard from him the words of the curse upon the inhabitants of Meroz, because they did not come to help Jehovah when He was fighting with and for the Israelites. “Among the heroes,” or mighty men, i.e., associating with the warriors of Israel.
Verse 24
Jael behaved altogether differently, although she was not an Israelite, but a woman of the tribe of the Kenites, which was only allied with Israel (see Jdg 4:11, Jdg 4:17.). For her heroic deed she was to be blessed before women (מן as in Gen 3:14, literally removed away from women). The “women in the tent” are dwellers in tents, or shepherdesses. This heroic act is poetically commemorated in the strophe which follows in Jdg 5:25-27.
Verses 25-27
Jdg 5:25-27 25 He asked water, she gave him milk; She handed him cream in the dish of nobles. 26 She stretched out her hand to the plug, And her right hand to the workmen's hammer, And hammered Sisera, broke his head, And dashed in pieces and pierced his temples. 27 Between her feet he bowed, he fell, he lay down: Between her feet he bowed, he fell: Where he bowed, there he fell down dead. Assuming that the fact itself is well known, Deborah does not think it necessary to mention Sisera's name in Jdg 5:25. חמאה,
|
WIKI
|
Please support this site by disabling or whitelisting the Adblock for "justintools.com". I've spent over 10 trillion microseconds (and counting), on this project. This site is my passion, and I regularly adding new tools/apps. Users experience is very important, that's why I use non-intrusive ads. Any feedback is appreciated. Thank you. Justin XoXo :)
Share on FB Twitter Whatsapp linkedIn Tumblr Reddit Pin Print email
DATA-STORAGE Units Conversion
nanobytes to yottabits
1 Nanobytes
= 8.0E-33 Yottabits
swap
Embed this to your website/blog
Category: data storage
Conversion: Nanobytes to Yottabits
The base unit for data storage is bytes (Non-SI/Derived Unit)
[Nanobytes] symbol/abbrevation: (nB)
[Yottabits] symbol/abbrevation: (Ybit)
How to convert Nanobytes to Yottabits (nB to Ybit)?
1 nB = 8.0E-33 Ybit.
1 x 8.0E-33 Ybit = 8.0E-33 Yottabits.
Always check the results; rounding errors may occur.
Definition:
In relation to the base unit of [data storage] => (bytes), 1 Nanobytes (nB) is equal to 1.0E-9 bytes, while 1 Yottabits (Ybit) = 1.25E+23 bytes.
1 Nanobytes to common data-storage units
1 nB = 1.0E-9 bytes (B)
1 nB = 1.0E-12 kilobytes (KB)
1 nB = 1.0E-15 megabytes (MB)
1 nB = 1.0E-18 gigabytes (GB)
1 nB = 1.0E-21 terabytes (TB)
1 nB = 8.0E-9 bits (bit)
1 nB = 8.0E-12 kilobits (kbit)
1 nB = 8.0E-15 megabits (Mbit)
1 nB = 8.0E-18 gigabits (Gbit)
1 nB = 8.0E-21 terabits (Tbit)
Nanobytesto Yottabits (table conversion)
1 nB = 8.0E-33 Ybit
2 nB = 1.6E-32 Ybit
3 nB = 2.4E-32 Ybit
4 nB = 3.2E-32 Ybit
5 nB = 4.0E-32 Ybit
6 nB = 4.8E-32 Ybit
7 nB = 5.6E-32 Ybit
8 nB = 6.4E-32 Ybit
9 nB = 7.2E-32 Ybit
10 nB = 8.0E-32 Ybit
20 nB = 1.6E-31 Ybit
30 nB = 2.4E-31 Ybit
40 nB = 3.2E-31 Ybit
50 nB = 4.0E-31 Ybit
60 nB = 4.8E-31 Ybit
70 nB = 5.6E-31 Ybit
80 nB = 6.4E-31 Ybit
90 nB = 7.2E-31 Ybit
100 nB = 8.0E-31 Ybit
200 nB = 1.6E-30 Ybit
300 nB = 2.4E-30 Ybit
400 nB = 3.2E-30 Ybit
500 nB = 4.0E-30 Ybit
600 nB = 4.8E-30 Ybit
700 nB = 5.6E-30 Ybit
800 nB = 6.4E-30 Ybit
900 nB = 7.2E-30 Ybit
1000 nB = 8.0E-30 Ybit
2000 nB = 1.6E-29 Ybit
4000 nB = 3.2E-29 Ybit
5000 nB = 4.0E-29 Ybit
7500 nB = 6.0E-29 Ybit
10000 nB = 8.0E-29 Ybit
25000 nB = 2.0E-28 Ybit
50000 nB = 4.0E-28 Ybit
100000 nB = 8.0E-28 Ybit
1000000 nB = 8.0E-27 Ybit
1000000000 nB = 8.0E-24 Ybit
(Nanobytes) to (Yottabits) conversions
Nanobytes to random (data-storage units)
Random [data-storage unit] conversions
|
ESSENTIALAI-STEM
|
The Elephant could perform a number of useful military functions (clearing obstacles, fording rivers and battering down the walls of strongpoints) but it was its prowess and the phycological impact of these massive animals that saw them favoured as beasts of war. In Ancient India the army was divided into four types; Infantry, Cavalry, Chariots and Elephants. As I mentioned in my post about the Chariots these had once been the prestige weapon of war but had started to be replaced by the Elephant as the dominant wing of most armies. Magadha (mid-4th century BCE - 321 BCE) had about 3,000 elephants while the Mauryan and Gupta empires with figures of anything up to 9,000 animals in its command. King Poros, at the Battle of Hydaspes (326 BCE) faced Alexander with a mere 200 Elephants but this still sounds like a terrifying sight. It's possible that facing these animals, and knowing that larger armies lay ahead, was partly responsible for the army eventually refusing to continue with Alexanders invasion of India.
The Arthashastra of Kautilya (c. 4th century BCE), gives a lot of information on different kinds of elephants, their training, and their conduct in war. Their main use in battle was their ability to crush enemy foot soldiers, scare away horses, and trample chariots. The psychological impact of these creatures cannot be underestimated, however, their practical success has been hotly debated for centuries. Wounded or dying elephants could as easily trample their own troops as enemies. And an elephant running amok is as uncontrollable as it is unpredictable. Royal elephants were specially trained and prized for control but if the beast decided to run away it's riders - including any commanders - would be carried away with them, come what may. Despite these risks, the Elephant was still a prized weapon of war and at the Hydaspes, King Poros fought bravely from the back of his mount, even after the defeat of his army was inevitable.
Elephants could be provided with armour but by the 4th Century BC they were often covered in massive rugs called hatthatthara which would provide quite effective protection from arrows. As Poros would find, these were less effective against 18 foot Sarisa pikes and well-disciplined troops. From about this period the Mauryan kingdoms used three riders, all archers, with two shooting.
With the Elephants finished I have completed everything I had planned for this army, so I guess a picture of the whole lot is in order? Here's my Army of Poros at the Hydaspes. They don't currently have anyone to fight as I haven't started collecting the figures I need for the corresponding Macedonian army... maybe something to consider for Challenge XI ?!?
It seems a shame to put these away in a drawer so I think I'll buy myself a small display case and get these fella's out where I can enjoy them.
|
FINEWEB-EDU
|
Distributing SQL Views to Remote SalesLogix Databases
There have been a couple occurrences where a client has required SQL views be used within their SalesLogix system to retrieve complex data queries. Normally this is fairly straight forward for a network only SalesLogix implementation, however in some cases these clients have also had remote databases that also need these views. How can these be distributed?
If you have worked with SalesLogix and creating remote databases, you will know that SalesLogix does not create SQL views as part of the standard database creation. If you have implemented SQL views in your database that the remotes must also use, you are tasked with creating these views.
Now there are several ways of handling this, you could simply create a script that you run on the SalesLogix remote system when attaching the database, however you need to remember to do this each time a new SalesLogix remote database is created. Also running the scripts is often problematic, in that you don’t have access to the system to run the scripts yourself, or because of the type of SQL on the remote computer you do not have access to tools to run scripts. While there is ISQL, you sill need to perform manual steps after every database installations.
Here is one approach we had taken in the past, while it probably could be improved upon, it should give some ideas about how you can automate distribution of SQL views.
This approach utilizes standard SalesLogix scripts to check for the existence of the required views, and if not found, creates them automatically.
First, on the OnOpen event of the form that utilizes the views we add a method, “FXCheckViews” to check on the existence of the views. While you could place this in several places, including the System Logon event, putting it on the OnOpen event only causes the script to be run if the user goes to the screen that needs the views.
Sub MainAXFormOpen(Sender, ID)
FXCheckViews
application.BasicFunctions.ProcessWindowMessages
‘Other code goes here
End Sub
The FXCheckViews routine is defined as follows:
Sub FXCheckViews
dim objrs
Set objrs = GetNewRecordset()
objrs.Open “select id from sysobjects where name = ‘FXLastActivity’ and type=’V'”
if(objrs.eof or objrs.bof) then ExecuteNativeSQL(“CREATE view sysdba.FXLastActivity as select convert(varchar(10),max(startdate),101) activitydate, contactid from activity with(NOLOCK) group by contactid”)
Set objrs = nothing
End Sub
The FXCheckViews uses a couple of custom routines, “GetNewRecordSet” and “ExecuteNativeSQL”. I will discuss those below. The routine will check to see if the view exists in the SQL system catalog. If it does not exist then it runs a T-SQL create view command to insert the view into the database.
“GetNewRecordSet” returns a RecordSet object and is defined as:
Function GetNewRecordset()
Set GetNewRecordset = CreateObject(“ADODB.Recordset”)
Set GetNewRecordset.ActiveConnection = GetNativeConnection()
GetNewRecordset.CursorLocation = 3 ‘adUseClient
GetNewRecordset.CursorType = 3 ‘adOpenStatic
GetNewRecordset.LockType = 3 ‘adLockOptimistic
End Function
Notice the custom call to “GetNativeConnection”, this is another custom routine I will discuss in a little bit. Also, notice that the RecordSet’s properties are set using the numeric value rather than the VB Constant. (This is important as on Vista or server 2008 systems the constants are no longer inherently supported).
Now if you refer back to the FXCheckViews routine you will see it uses “ExecuteNativeSQL”. This function executes a SQL statement against the database using a native SQL connection (bypassing the SalesLogix OLEDB Provider). This is because the SalesLogix OLEDB Provider does play nice with database alteration commands like CREATES, DROPS, ALTER, etc. So to get around this restriction we use a native SQL connection. Here is the sample “ExecuteNativeSQL”, which accepts an input of the SQL statement to be executed:
Function ExecuteNativeSQL(ByVal SQL)
Dim objConn
Dim lRecs
On Error Resume Next
lRecs = -1
Set objConn = GetNativeConnection
objConn.Execute SQL, lRecs, 128 ‘adExecuteNoRecords
If Err.Number <> 0 Then RaiseError “executing SQL statement”
On Error Goto 0
Set objConn = Nothing
ExecuteNativeSQL = lRecs
End Function
Again, notice this function uses the “GetNativeConnection” routine. Lets take a look at this, as this is key to getting around the SalesLogix OLEDB Provider.
Function GetNativeConnection()
Dim objRS
Dim connstring
Dim cn
Set objRS = Application.GetNewConnection.Execute(“slx_getNativeConnInfo()”)
connstring = objRS.Fields(0).Value & “;Password=” & SLXPW
objRS.Close
Set objRS = Nothing
Set cn = CreateObject(“ADODB.Connection”)
With cn
.ConnectionString = connstring
.Open
End With
If Err.Number <> 0 Then RaiseError “opening ADO connection object”
On Error Goto 0
Set GetNativeConnection = cn
Set cn = nothing
End Function
Now within this function we can see it is creating a RecordSet that is populated with a SalesLogix built-in procedure, “slx_getNativeConnInfo()“. This procedure returns the underlying native SQL connection string that is used by the SalesLogix OLEDB provider. As described in this post, the underlying connection string has the password parameter omitted from the returned string. To get around that we append the provided connection string with the password, which is stored in a constant, “SLXPW”:
Const SLXPW = “mypassword”
So there it is. One approach to automatically distributing SQL views out to SalesLogix remote databases. This approach does have a couple disadvantages:
• You need to store the SQL password in the script.
• You must hard-code the T-SQL create view statement in your code.
Aside from these issues, it is a pretty slick way of getting views out to users. This could be made more elegant with more time. Hopefully it might spur some more ideas.
ABOUT THE AUTHOR
Kris Halsrud
Kris Halsrud is a Senior Analyst / Developer for Customer FX Corporation.
1 Comment
Submit a Comment
Your email address will not be published.
Subscribe To Our Newsletter
Join our mailing list to receive the latest Infor CRM (Saleslogix) and Creatio (bpm'online) news and product updates!
You have Successfully Subscribed!
|
ESSENTIALAI-STEM
|
Reconstruction talk:Proto-Japonic/uya
Probably not Proto-Japonic
I suspect that this is limited to Proto-Ryukyuan, and represents a Ryukyuan innovation from Japonic /ore/, which appears in the oldest texts as a second-person pronoun (unlike modern usage as a first-person pronoun). Various dialects to the southwest of the main Japanese islands, and dialects of Ryukyuan as well, demonstrate a shift from /r/ before front vowels in "mainstream" Japanese to /j/ instead, such as standard Japanese /ware/ reflecting as /wai/ in certain other dialects. See also Proto-Japonic /ware/ and Proto-Ryukyuan /waja/. There are suggestions of an even older similar /r/ → /j/ mechanism at work in this broader language family, as we see in Vovin's hypothesis about Proto-Japonic wasay. ‑‑ Eiríkr Útlendi │Tala við mig 23:53, 12 September 2022 (UTC)
|
WIKI
|
Wikipedia:Reference desk/Archives/Humanities/2012 October 17
= October 17 =
Out of state discrimination laws in the US (part 2)
Looking at the previous thread on the subject, I want to ask a couple more general question. There are many companies that are incorporated in one state but have employees physically located in another. Have there been any cases in which a person (successfully or otherwise) sued their employer for violations of labor or other laws in the state of incorporation, rather than the state the employee is physically located in? Is there a general legal principle on how such cases are decided? Thanks. Someguy1221 (talk) 00:23, 17 October 2012 (UTC)
* To a certain extent there might be jurisdiction shopping involved. What will really matter is the specific act. If something happened in your home state that was a local issue, the local law will apply. It would only be if there were some sort of higher level corporate malfeasance, say (in my imagination as a layman) a policy decision from the home office not to address a manager transferred from another office with a known problem, that there might be a case under that state's jurisdiction. Your lawyer would have to argue that before a judge to keep him from dismissing it as having no standing (law) in that court. It will really depend on the specifics and, since it will be a civil case, whom you are suing for what. The defendants are also likely to argue to the presiding judge that the case should be handled locally, assuming allowing it to proceed elsewhere isn't to their advantage. μηδείς (talk) 00:40, 17 October 2012 (UTC)
* The US Constitution makes the federal courts available to people who are suing residents of other states, and obviously all state courts are open to their residents who wish to sue others who are present in those courts' jurisdictions. I don't expect that a court in the company's home state would listen to a suit regarding actions in another state, but the availability of both federal and state courts (and the consequent jurisdiction shopping that Medeis mentions) is the general legal principle. Nyttend (talk) 00:46, 17 October 2012 (UTC)
* According to Federal jurisdiction (United States), Federal courts can take cases under state laws if the parties are residents of different states and the question involves damages meeting a certain threshold, currently $75,000 according to federal law. μηδείς (talk) 00:55, 17 October 2012 (UTC)
* Oh, yes, I forgot about there being a minimum amount in question; you can't take your out-of-state company to federal court just because it negligently caused you to lose $5 somehow. Nyttend (talk) 02:11, 17 October 2012 (UTC)
* A Federal court sitting in diversity jurisdiction will apply the substantive laws of the state in which the court sits. That in turn means they'll look to the state's choice of law provisions to see which state's laws apply. I think most state courts will also entertain suits from a non resident against a resident business, with some possible caveats. It varies quite a bit, but that's not uncommon at all.Shadowjams (talk) 17:59, 17 October 2012 (UTC)
People who look extremely similar
Which people look extremely similar? And please limit it to famous/notable people in the same field (politics, et cetera).
I know of William McKinley and Mark Hanna and of Elizabeth Warren and Michele Alliot-Marie. Futurist110 (talk) 02:25, 17 October 2012 (UTC)
* There are some ideas at Look-alike. -- Jack of Oz [Talk] 03:20, 17 October 2012 (UTC)
* Do a Google search for the phrase "Separated at birth" and you'll get a shit load of websites dedicated to this subject. Two that I can think of that oddly look alike from American football is Indianapolis Colts center Jeff Saturday and former New York Giants center Shaun O'Hara. That the two snapped footballs to the Manning Brothers for several years has been brought up, given their similar appearance. SeeJeff Saturday andShaun O'Hara.google search turns up a few notable sports journalists who have noted the striking similarity in appearance, including Adam Schefter and the Bleacher Report. -- Jayron 32 03:26, 17 October 2012 (UTC)
They say that the Mwanza Flat Headed Agama and Spiderman were separated at birth. Sources = -- Jethro B 03:55, 17 October 2012 (UTC)
Geena Davis and Tanya Memme come to mind. (For more than one reason.) Mark Twain and Kurt Vonnegut. Karl Malden and Richard Herd. There was a short book series a few decades back with lookalikes, some of them whimsical, for example Mick Jagger and Don Knotts' character "Mr. Limpit". One of my early efforts here was to try to create a page called "Separated at Birth", but it was shot down as original research. I bet it could be done now, with strict sourcing. ←Baseball Bugs What's up, Doc?carrots→ 04:04, 17 October 2012 (UTC)
* In the news here in the UK: Gary McKinnon and Benedict Cumberbatch - several celebrities have been joking about the resemblance on Twitter in the past 24 hours. (Obviously they are in different lines of work, but Cumberbatch is famous for portraying social misfit and investigative geniusSherlock Holmes, and recently also portrayed maverick statistical expert Christopher Tietjens in Parade's End.)AlexTiefling (talk) 09:53, 17 October 2012 (UTC)
* I hear Benedict Cumberbatch looks an aweful lot likeCummerbund. μηδείς (talk) 18:16, 17 October 2012 (UTC)
* Kofi Annan tells a good story about how he was on holiday once in an isolated location, where he thought he would be away from the public eye. But an autograph hunter came up to him and said "I really admire your work, Mr Freeman." Not wanting to spoil the guy's day, Annan signed the autograph "Morgan Freeman". --Viennese Waltz 10:15, 17 October 2012 (UTC)
* Another one. At a White House reception in honour of Duke Ellington's 70th birthday on 29 April 1969, Richard Nixon mistook Cab Callowayfor Ellington and warmly congratulated him on his 'birthday'. Not sure what Cab said in return. Maybe he sang "Minnie the Moocher" in Mood Indigo. -- Jack of Oz [Talk] 12:09, 17 October 2012 (UTC)
* Tina Fey did a near perfect impersonation of Sarah Palin (you might say one is in entertainment and the other in politics, but those fields seems to overlap considerably, at least in this case). StuRat (talk) 19:24, 17 October 2012 (UTC)
* Jeremy London and Jason London are two actors who look eerily alike. And for the longest time I thought Jonathan Togo from CSI Miami and Eric Szmanda from CSI: Crime Scene Investigation were the same person. Angr (talk) 21:15, 17 October 2012 (UTC)
* It gets eerier: Jeremy and Jason were born on exactly the same day, and not only that, in exactly the same place. Incredible! Another feather in the cap for numerology and astrology. (Cough) -- Jack of Oz [Talk] 21:44, 17 October 2012 (UTC)
* Totally Looks Like has a lot of these, though they're not all celebrities (or even humans) there. Another pair of actors I thought were the same person for a long time were Neil Patrick Harris and Christopher Masterson. Angr(talk) 22:13, 17 October 2012 (UTC)
* The girl from CSI (er, not the main one) looks a lot like Kelly Clarkson. Adam Bishop (talk) 00:17, 18 October 2012 (UTC)
* I had never heard of Kelly Clarkson, but having now seen a picture of her, I wonder if by "the girl from CSI (er, not the main one)" you meanAnna Belknap from CSI: NY. Angr (talk) 00:22, 18 October 2012 (UTC)
* Me and Brad Pitt, common mistake. Shadowjams (talk) 09:36, 18 October 2012 (UTC)
* Really ? And which part of his body does your face resemble ? :-) StuRat (talk) 14:06, 25 October 2012 (UTC)
Is Paul Ryan a member of The Atlas Society?
Paul Ryan has made at least one speech at The Atlas Society where he spoke about his love for her philosophy. Is he a member of the society? Is he a former member? <IP_ADDRESS> (talk) 04:27, 17 October 2012 (UTC)
* It seems unlikely, not that Ryan would be intellectually sympathetic to the society, but that he could have been a member without it being made public. Being an Objectivist does not play well with the American voting public: liberals dislike the reverse communism, and conservatives dislike the atheism. Ryan is smart enough a politician to avoid formal ties with such a group, and the election is close enough that President Obama or his allies would have made this known if it were the case. --BDD (talk) 15:14, 17 October 2012 (UTC)
* this talks about that speech, but doesn't answer your question. I am amused to note that Ryan called Rand's works "required reading in my office for all my interns and my staff", which I would call a well-deserved punishment. Wnt (talk) 17:34, 17 October 2012 (UTC)
* Actually, just googling will give you a few very useful pieces (I like the top 3) on the relationship between Ryan and Rand's philosophy. While his admiration for that philosophy has been consistent, so have been his attempts to distance himself from it in certain ways. So again, I think it's very unlikely he's a member of the society. By the way, at least one of those results describes the society as a think tank, so its membership may be more professional researchers rather than anyone who adheres to Objectivism. --BDD (talk) 18:04, 17 October 2012 (UTC)
* It's all rather obvious, isn't it? Rand Paul, Ayn Rand, Anne Rice, Ian Rankin, Paul Ryan, Ron Paul, RuPaul, Pope John Paul II ? It doesn't take rocket science to figure out what's going on here. Wake up and vote before it's too late, people!μηδείς (talk) 19:49, 17 October 2012 (UTC)
* "Mitt Romney and Paul Ryan" is an anagram for "My ultimate Ayn Rand porn." Coincidence? <IP_ADDRESS> (talk) 19:10, 19 October 2012 (UTC)
* Paul Ryan is the vampire love child of Pope John Paul II and RuPaul?
* Yes, well, here's the proof. μηδείς (talk) 02:45, 21 October 2012 (UTC)
Global companies
Why is it that large global companies such as CocaCola have significantly different product ranges worldwide and they don't share their products? For example, Coca Cola USA has products CocaCola UK don't produce and they don't share it with them. Clover345 (talk) 10:39, 17 October 2012 (UTC)
* Coca cola products are often directed at American consumers' unique eating habits. ' Ankh '. Morpork 11:22, 17 October 2012 (UTC)
* The primary consideration when deciding what products to sell where is what products you think people want to buy where. Tastes vary from country to country (based largely on what people are used to, I think). --Tango (talk) 11:26, 17 October 2012 (UTC)
* But with CocaCola products, surely this is not really a significant point of consideration as most of their products are sweet fizzy drinks?Clover345 (talk) 11:30, 17 October 2012 (UTC)
* If Americans don't particularly want to buy the kinds of sweet fizzy drinks that Italians like, what would it benefit Coca Cola to sell the same sorts of drinks in both places? -- Jayron 32 11:44, 17 October 2012 (UTC)
* Some products are specifically targeted at a particular market such as its tea and coffee products. In Japan, Coca Cola have focused on the tea market and their Marocha Green Tea is a highly popular product. Another example of regional focus would be Kvass sold primarily in Russia. Also, the branding of the products varies according to the regional differences. While fruit juices in the US and Europe are sold under the Minute Maid and Disney juices brand names, similar products are sold as Qoo in Asia, Kapo in Latin America and Bibo in Africa. Also, Coca Cola have also purchased companies that operate on a national scale. e.g Kola Inglesa dominates the Peruvian market because that is where it was originally produced. ' Ankh '. Morpork 11:57, 17 October 2012 (UTC)
* I've never seen Disney branded fruit juices in Europe. Astronaut (talk) 12:48, 17 October 2012 (UTC)
* I think the products were eventually discontinued. I was citing it as Winnie The Pooh Roo Juice was an obvious example of targeted branding.' Ankh '. Morpork 13:22, 17 October 2012 (UTC)
* Even Coca Cola itself is made differently in different countries. I live in the UK and enjoy Diet Coke, but the variety they sell in Europe is far too sacharriny for my tastebuds. --Dweller (talk) 12:59, 17 October 2012 (UTC)
* To answer the general Q, let's list reasons to sell the same product under the same brand worldwide:
* A) Less expensive to only design, produce, and market a single product. How much this is a factor will vary by product. For something with minimal development costs, like soft drinks, it's not much of a factor. For something with huge development costs, like commercial aircraft, having a significantly different model for sale in each nation would be impractical.
* B) Provides more flexibility. If demand is higher than production in one nation, it's then easy to bring in product from other nations with overcapacity.
* Now let's list reasons to have different products:
* 1) They may have acquired local companies, which already have a customer base for their product. Continuing to sell that product may also generate less resentment, than, say, if you fire everyone and then try to sell your own imported product there, instead. The local government may also have laws to prevent this type of thing.
* 2) As mentioned previously, different tastes exist in different places. In addition, there may be cultural or religious taboos, like not eating pork in certain places.
* 3) There can also be differences in infrastructure. A different type of car is appropriate for a place where gasoline/petrol is cheap, distances are long, and highways are straight and level, than a place with high fuel prices, and narrow, twisting, hilly roads.
* 4) Local laws may require a different product. For example, labeling requirements and safety regulations may vary. It is sometimes possible to make a single product for the most stringent requirements, but not always, as laws may be incompatible, or such a product may be too expensive to compete in nations lacking the strict laws.
* 5) Language differences also require different labeling, product names, etc. StuRat (talk) 18:57, 17 October 2012 (UTC)
Is longevity hereditary?
I ask this because my grandfather (1845 – 1940) lived up to 95 while my father (1895 – 1955) died at 60. Is longevity hereditary?Iowafromiowa (talk) 11:34, 17 October 2012 (UTC)
* Well, before you answer the question, you'd need a sample size greater than one! google search turns up some promising leads for study. -- Jayron 32 11:42, 17 October 2012 (UTC)
* The first serious-looking article that I found says; "While most studies confirm the prior belief on the existence of an intergenerational correlation in mortality, they do not have the required data to quantify the relationship in a statistically reliable way, let alone study how this relationship changes with the father’s age at death." The Hebrew University of JerusalemLONGEVITY ACROSS GENERATIONS ''. Alansplodge (talk) 12:07, 17 October 2012 (UTC)
* The reason of death is also relevant. If one died in an accident you can stop thinking about genetics. Groupask (talk) 12:50, 17 October 2012 (UTC)
* Statistically, over a large sample maybe not. Risk aversion, impulsiveness, etc. could all have a hereditary component. -- Q Chris(talk) 14:02, 17 October 2012 (UTC)
* You also need to live long enough to get hit by the car. Changing the probability of dying by one cause changes the probabilities of dying by every other cause because it changes the amount of time you are exposed to that risk. --Tango (talk) 11:24, 18 October 2012 (UTC)
* Yes, there is definitely a hereditary component to longevity - plenty of studies have shown that. However, there are so many other factors and also so much randomness that it's pretty meaningless to try and apply it to individuals. On average, people with long-lived parents will live longer, but you need a very large number of people before the other factors start to average out. --Tango (talk) 11:22, 18 October 2012 (UTC)
* But one thing that's definitely applicable to individuals is parenthood (or lack thereof). If your parents didn't have any children, then neither will you. You can bet your (haunted) house on it. :) -- Jack of Oz [Talk] 17:46, 18 October 2012 (UTC)
* Are you sure Jack? I got banned from a "freethinking" website where the moderator claimed that according to natural selection every individual must be happy according to evolution. I told him that according to evolution, the only thing one's ancestors must have been is parents. I was called a collectivist because of that argument. μηδείς (talk) 02:42, 21 October 2012 (UTC)
* Freethinking indeed: the moderator clearly did not feel bound by such things as conventional meanings of words. —Tamfang (talk) 22:09, 21 October 2012 (UTC)
* Indeed. I don't know what "according to natural selection every individual must be happy according to evolution" means. But I'm afraid to ask for clarification. -- Jack of Oz [Talk] 07:57, 22 October 2012 (UTC)
* What age did your grandmother reach? --NellieBlyMobile (talk) 16:55, 22 October 2012 (UTC)
Web-site answering questions
Which web-sites out there do answer questions? I'm not searching for a user to user site, but more of a traditional kind like in the past, with "Dear reader, ..." . I want something with high standards in writing. Groupask (talk) 12:38, 17 October 2012 (UTC)
* Then why ask here ;) ? But seriously, what type of questions do you have in mind? That might help us direct somewhere suitable to your needs. Mingmingla (talk) 14:36, 17 October 2012 (UTC)
* It sounds like you want something like Dear Abby. The reality is, there are far more people with questions than those willing to give researched, high quality, well written answers, for free. So, if you want answers for free, you'll have to post at a site like this, and take your chances on the responses you get. Yes, many may have poor grammar and spelling, or be off-topic, or jokes, but, with any luck, there will be good answers mixed in, too. StuRat (talk) 18:44, 17 October 2012 (UTC)
* Yes, but also with serious questions. I don't necessarily want my questions answered, just interesting questions about science, history, humanities. The straight dope is an option. Groupask (talk) 19:09, 17 October 2012 (UTC)
* I suspect that you'd find, with a site like that, that most questions remain unanswered. However, you can read through answers to other question. HowStuffWorks is a good one. StuRat (talk) 19:13, 17 October 2012 (UTC)
* I would definitely recommend The Straight Dope and the Straight Dope Message Boards http://boards.straightdope.com/sdmb/. SDMB has been around much longer than Wikipedia (I was active there in the 1990s) and though it has been a few years since I was active, IIRC it has a culture of being fairly well researched and thoughtful. Other sites like "Yahoo Answers" and "Wiki Answers" are a total crapshoot. -- Jayron 32 19:16, 17 October 2012 (UTC)
* Google answers used to be really good, because the askers would pay so the answerers tried to come up with the best answer - thorough and exactly what was asked for. It got closed down but if you are simply looking to read interesting questions and answers the archive is still readable.http://answers.google.com/answers/ --<IP_ADDRESS> (talk) 21:31, 17 October 2012 (UTC)
* Try physics forums. manya (talk) 06:47, 18 October 2012 (UTC)
* Stackexchange. <IP_ADDRESS> (talk) 12:54, 18 October 2012 (UTC)
* For questions on Internet rumors, there's Snopes.com. StuRat (talk) 02:59, 19 October 2012 (UTC)
Married young in Victorian England?
I'm doing a little research into my great-grandparents. They are both listed in the census taken on 2 April 1911, with their ages and children (one of whom is my late grandmother). The funny thing is, when I try to find their date of marriage the obvious record suggests a marriage when my great-grandmother was only 15 years old. Would such a thing have been possible in 1890's England (maybe if she was pregnant)? Of course, maybe I have the wrong marriage record or maybe there are errors in the way in which their names are recorded, or in the 1911 census data, but I am intrigued by the possibility of marriage at such a young age in Victorian society or possible reactions of parents to an impending child being born out of wedlock. Astronaut (talk) 12:45, 17 October 2012 (UTC)
* Is her birthdate known from records other than the census? My experience is more with the US than the UK or Commonwealth census, but census takers often carelessly put down an age that was a few years off, or the person reporting their age would sometimes make themselves younger for vanity, or older to avoid revealing that they had a child at an extremely young age, or the censustaker got their info from a neighbor who was guessing about details. I've seen cases where a woman married very young, but the first known child came years later, and have speculated that she might have married due to a young pregnancy but the first baby was a miscarriage or stillbirth. Many records were just sloppy. Edison (talk) 14:41, 17 October 2012 (UTC)
* The Criminal Law Amendment Act 1885 had raised the age of consent to 16 - so it would have been illegal to marry a 15-year-old in the 1890s.
* However, I have recently been doing quite a lot of research on these censuses, and I'm familiar with their quirks. Unlike prior censuses, to which Edison's remarks about the enumerators would apply, the 1911 census was filled in by householders wherever possible. This reflects the vastly increased levels of literacy that had been achieved by that date. Consequently, if the census sheet is signed by the head of the household (rather than just with an X), the ages given may be taken as the ages that that person believed the members of the household truly were.
* The census was taken on 2 April 1911. So make sure, in your calculations, that you allow for your great-grandmother's birthday to be as early as 3 April. Conversely, allow for the marriage to be as late as possible in the quarter it's reported for. (Obviously, if you order the certificate from the GRO (£9.25), you'll get the exact date, as well as her alleged age at the time.) If her name is sufficiently distinctive, you may be able to get hold of her birth certificate, or a baptism record, which will give you a precise indication of when she was born. The marriage certificate will also mention her father's name and occupation, which is a great help in finding births, baptisms, and censuses taken during the subject's childhood.
* If you want, I could try researching your question directly, if we are able to arrange a way of passing personal information.AlexTiefling (talk) 15:01, 17 October 2012 (UTC)
* Currently, people in England and Scotland need to be at least 16 to marry with parental consent, 18 without. I could not find any information on England (though edit-conflicting Alex, above, did), but apparently in Scotland, men age 14 and girls age 12 could marry without parental consent until 1929. And young couples used to flee to Gretna Green to take advantage of these lax laws. So marrying at 15 does not seem to be implausible for the UK. See Marriage in Scotland. --Stephan Schulz (talk) 15:03, 17 October 2012 (UTC)
* Our article about the 1885 Act strongly implies (see 'Repeal') that it applied to the entire United Kingdom, not just to England and Wales (as Hardwicke's Act of 1753 had done). In any case, the principal reason for elopement to Gretna Green was to escape the Hardwicke Act's requirement for parental consent for under-21s. I don't believe that the contracting of marriages which would be illegal in England and Wales on account of the bride's age was a major motivator for the Gretna Green Dash; nor do I think that such would have been legal by the 1890s. The 'any witness' form of marriage allowed in Scotland would not have circumvented the law on the age of consent. AlexTiefling (talk) 15:24, 17 October 2012 (UTC)
* Hmm. Our article Marriage_in_Scotland says However in Scotland it was possible for boys to get married at 14 years and girls at 12 years without parental consent [...] In 1856 Scottish law was changed to require 21 days' residence for marriage, and since 1929 both parties have had to be at least 16 years old (though there is still no parental consent needed). Looking over the 1885 Act, it talks about "unlawfully and carnally know"ing girls under the age of 14 and 17. As far as I can tell, this does not affect lawful marriages. The age of consent is not necessarily the same (or lower) than the age of marriage. Indeed, apparently one of the points brought against the 1885 act was a possible conflict with lower legal ages for marriage. --Stephan Schulz (talk) 16:17, 17 October 2012 (UTC)
* It's somewhat ironic that Google presents me with a dating ad sporting an Asian women that looks borderline legal under the 1885 act on the page that has the text: . --Stephan Schulz (talk) 16:24, 17 October 2012 (UTC)
* Depending on what were you searching for, Google spots your intentions, and show ads that you would like to see. I won't ask what it is.<IP_ADDRESS> (talk) 22:23, 17 October 2012 (UTC)
There are several references on the net to the 1763 Marriage Act in England, in which " minimum age of marriage was fixed at 16. Prior to this date, the church accepted the marriage of girls aged 12 or more and boys aged 14 or more. In addition, a dispensation on licence could be obtained from a bishop which allowed marriage at a younger age." Alansplodge (talk) 17:02, 17 October 2012 (UTC)
How did Google get bigger than Stanford (moneywise) when Stanford owned the Page Rank patent?
The Page Rank algorithm was assigned to Stanford. Before Page and Google et al were big and had money and an army of lawyers, how did they get Stanford to give them such a favorable exclusive rights license that would allow them to reach financial escape velocity when, at that early moment, with the patent assigned to them, Stanford had all the cards? Benevolence? Where can I read (if it's available) how the license deal was negotiated? Peter Michner (talk) 16:27, 17 October 2012 (UTC)
* Page Rank is only a very small part of Google, and search engines used to come and go every few months. Nobody could foresee the success of Google, and a more restrictive license may well have stopped Google cold, leaving Stanford with no money at all. Moreover, Page and Brin, as the actual inventors, were in a much better position than anybody else to evaluate (and utilize) the patent. --Stephan Schulz (talk) 16:54, 17 October 2012 (UTC)
* It's also important to remember that Google's search engine function is something of a loss leader; its main job is to get your eyes on its ads. Search alone doesn't make any money for Google; that the search directs viewers to target ads does make money. Google has also branched out considerably into many tech fields entirely unrelated to search engines at all. It is a multi-service company with its fingers in many pies. The search engine gave it the initial leg up, but where Google has flourish where others have failed is largely Google's ability to grow outside of the search engine market. Google's story is basically one of leverage, using its search engine technology to build itself into a business based on actual money making ventures (i.e. all the non-search stuff they do). -- Jayron 32 17:41, 17 October 2012 (UTC)
* It's tough to make predictions, especially about the future. With hindsight, PageRank is clearly a winning idea and Google's founders have turned out to be the kind of people who can transition successfully from academia to a profitable business. Technology-heavy universities like Stanford, MIT, and Cambridge are always spawning startups like Google, with staff and students and IP that came from the university. So they have an office of IP licencing, who frankly guess how much to charge, or what proportion of the stock of a new company they can ask for. I defy anyone to sit in an office all day and read scientific papers and patents and really have a confident idea of how much that invention is, or could reasonably be, worth, and so how much to charge for it. For a startup, usually all they can ask for is stock (because the company has no cash), and owning stock means they don't end up looking super-stupid in the off-chance a company soars (that they only made $336M is because they didn't hold on to the stock for longer). 99%+ of technology startups crater, and the very few people who seem to have a knack at distinguishing which won't are almost always living on a yacht somewhere. Remember also that angel investors and VCs are very thorough about finding details of what they're buying into and how it could possibly be encumbered - they'd run a mile from a Google which only had say a 3 year licence on patents on its core technology. Stanford, being experienced at this kind of thing, knows they can't write terms that would drive off such investors, as they'd just strangle the startup at birth and kill their own chance seeing returns from it. -- Finlay McWalterჷTalk17:15, 17 October 2012 (UTC)
Perverted Justice (moved from Science Refdesk)
[moved from ] - Wnt (talk) 16:46, 17 October 2012 (UTC)
I was reading the wikipedia perverted justice article and Im confused as to how they convicted these people if the decoy was actually over 18? It even says in the article
"The father of a man arrested in a July 2006 sting by Perverted-Justice has appeared before a Georgia Superior Court judge to seek an arrest warrant for Von Erck, alleging that Von Erck solicited the commission of a felony from the man.[77][78] The judge found that probable cause existed to believe Von Erck impersonated a girl and solicited the man with the intent for him to commit a felony, but declined to issue the warrant because when the act occurred, there was no actual girl and thus no crime occurred.[77] The act of soliciting a felony is itself a felony.[78] Attorney Gary Gerrard filed an appeal with the Georgia Court of Appeals, alleging that under Georgia law, solicitation is a felony whether or not a crime occurred.[79] That appeal was ultimately rejected.[80]"
Something dosent add up.--Wrk678 (talk) 10:17, 17 October 2012 (UTC)
* The law is often explicitly written so that such stings can result in convictions. It sounds like that wasn't the case in Georgia, but it may well be the case in other states. There may be a specific offence of attempting to sollicit that says it is the age the offender thinks the person is rather than their actual age. Or it may just be a matter of how attempted offences are defined in that jurisdiction. --Tango (talk) 11:32, 17 October 2012 (UTC)
* The legal term is Entrapment, and "sting" operations get very dicey when it comes to entrapment. -- Jayron 32 17:37, 17 October 2012 (UTC)
* I would like to point out, however, that Entrapment explicitly applies to law enforcement officers (in the United States). And in fact, the third sentence of our article on entrapment reads "However, there is no entrapment where a person is ready and willing to break the law and the government agents merely provide what appears to be a favorable opportunity for the person to commit the crime," which is usually how law enforcement skirts around these issue with Perveted Justice. Come on sinebot, where were you. Livewireo (talk) 19:23, 17 October 2012 (UTC)
* It is dicey, which is to say that it isn't always clear cut. First of all, courts have generally recognized that unsworn citizens, when working at the explicit aid of law enforcement, are considered to have been "deputized" and are effectively law enforcement themselves. That is, law enforcement departments can't summarily get around restrictions placed on their operation by outsourcing questionable activities to non-law enforcement personnel. If someone is performing an investigation in cooperation with, or at the behest of, law enforcement, they are held to the same standards as the sworn officers. Secondly, entrapment is fuzzy around the edges, and this is one of those edges. There is no bright line between "gives someone the idea to commit a crime" and "provides a favorable opportunity to commit the crime". -- Jayron 32 19:04, 17 October 2012 (UTC)
I believe that the guy who was trying to get Von Erck arrested in the quoted section above was convicted, so how is that possible if a judge says "there was no actual girl and thus no crime occurred." ?--Wrk678 (talk) 20:49, 17 October 2012 (UTC)
Female head of state and head of government
Was the period when Margaret Thatcher was Prime Minister of the UK and Elizabeth II was Queen the first time in history that a country in which the head of state and the head of government were two different people had women in both those roles? Has it happened since? Please note I'm not asking about the situation where the head of state and head of government are the same person, only the situation where they are two different people.Angr (talk) 21:01, 17 October 2012 (UTC)
* Queen Elizabeth is the monarch of several of the members of the Commonwealth of Nations, some of whom who have had female heads of government during her reign (Indira Ghandi, for example). Does that count? <IP_ADDRESS> (talk) 21:12, 17 October 2012 (UTC)
* In theory, yes, but not for that example, since India was a republic with a president while Indira Gandhi was PM. (To be precise, India had a series of male presidents and acting presidents during Indira Gandhi's PM-ship.) But her article led me to Sirimavo Bandaranaike, who was PM of Ceylon while Elizabeth was its monarch, and who was also the world's first female head of government, so there can't have been another occurrence before her. So now only the second part of my question remains: has it happened again since Thatcher/Elizabeth? Iceland has had a female president and a female PM, but not at the same time. Angr (talk) 21:26, 17 October 2012 (UTC)
* There's a discussion further up this page about a related topic ("Four top dogs..."). The short answer to your last question is "yes". Finlandhad a female president and PM simultaneously not long ago, too. AlexTiefling (talk) 21:23, 17 October 2012 (UTC)
* x2 Queen Elizabeth has never been the Head of State of India. That role has been taken by the President of India since 1950. See List of Presidents of India. None were women during Indira Gandhi's administration. As far as answering the question, the OP could cross reference List of elected or appointed female heads of government with List of elected or appointed female heads of state and known Female hereditary monarchs, which are fairly easy to keep track of. The answer is that the pairing that predates Thatcher & Elizabeth II was in 1960, with Sirimavo Bandaranaike as Prime Minister of Ceylon and Elizabeth II who was Queen of Ceylon at the time. -- Jayron 32 21:24, 17 October 2012 (UTC)
* In fact, I see Finland had the situation twice. So we have Elizabeth/Bandaranaike in Ceylon (as was), Elizabeth/Thatcher in the UK, and Halonen/Jäätteenmäki and later Halonen/Kiviniemi in Finland. Any others? Angr (talk) 21:32, 17 October 2012 (UTC)
* Just found Margrethe II/Thorning-Schmidt in Denmark, which is in effect right now. Angr (talk) 21:39, 17 October 2012 (UTC)
* As is Elizabeth II and two of her realms: Jamaica (Portia Simpson-Miller) and Australia (Julia Gillard) currently. -- Jayron 32 21:47, 17 October 2012 (UTC)
* (ec x 2) It has certainly happened since.
* Chandrika Kumaratunga became Prime Minister of Sri Lanka in August 1994. In November she was elected President, and she appointed her motherSirimavo Bandaranaike as Prime Minister. This was Bandaranaike’s third time as PM; she had become the world’s first female head of government in 1960 (when Sri Lanka was Ceylon and still a Commonwealth Realm), following the assassination of her Prime Minister husband. A real family affair.
* a number of Commonwealth countries have had female governors-general and female prime ministers, although not all at the same time. As discussed here recently (see "The 4 top dogs are ladies"), in 2005-06 New Zealand had females simultaneously as Queen, Governor-General, Prime Minister and Speaker of Parliament; and since very recently Australia has had the same. -- Jack of Oz [Talk] 21:37, 17 October 2012 (UTC)
* And someone redlinked by the rather female-sounding (and delightfully multicultural) name of Lucinda da Costa Gomez-Matheeuws was apparently very briefly PM of the Netherlands Antilles while the monarch was Juliana. Angr (talk) 21:42, 17 October 2012 (UTC)
* Elizabeth/Kim Campbell would qualify, as well. <IP_ADDRESS> (talk) 21:56, 17 October 2012 (UTC)
* So it seems it's not that uncommon anymore. But were the two occasions in Finland the only time both women were elected to their positions, rather than the head of state being a monarch or (if you want to consider governors-general heads of state) being appointed? Angr (talk) 21:52, 17 October 2012 (UTC)
* No, see above. The third term of Sirimavo Bandaranaike as Prime Minister of Sri Lanka was during the presidency of her daughter Chandrika Kumaratunga. -- Jayron 32 01:57, 18 October 2012 (UTC)
* Margrethe II of Denmark was "sort of elected" as future head of state in the Danish constitutional and electoral age referendum, 1953 where female monarchs became possible. She was 13 at the time but a lot more popular than her uncle Knud, Hereditary Prince of Denmark who was heir presumptive. Without the constitutional change, Knud and his son (who was also 13 in 1953) would have become successive kings since 1972. The unpopularity of both of them was a significant cause for holding the referendum and getting it passed. Margrethe II has been a popular head of state since 1972. Helle Thorning-Schmidt became prime minister in 2011. PrimeHunter (talk) 01:47, 18 October 2012 (UTC)
Duke of Rothesay, Earl of Carrick, Baron of Renfrew, Lord of the Isles and Prince and Great Steward of Scotland
If the eldest child of Prince William and Duchess Kate is a girl, will the Scottish titles of the heir apparent be held in abeyance until such a time as there is a male heir apparent to the throne, perhaps a generation later? <IP_ADDRESS> (talk) 22:05, 17 October 2012 (UTC)
* Firstly, those titles are those of the Duke of Cambridge's father, so they're not going to be bestowed on anyone else for a bit. Secondly, the situation changes depending on whether a new Act of Succession is passed. As CHOGM recently approved such a move in principle, it's highly likely. This is therefore the assumption under which I'm answering this question. (If there's no new Act of Succession by the time the Duke of Cambridge is King, the short answer to your question is "yes".)
* As with the very similar recent question about the Duchy of Cornwall, the answer has to be: the Act of Parliament and Letters Patent enabling the change to the law of succession will spell this out, because the government and the Crown employ people who know this stuff much better than we do. I am, however, reminded that the Electress Sophia petitioned Queen Anne to be created Princess of Wales in her own right, and was refused. No matter how strong the presumption, the heir presumptive does not get the titles of the heir apparent. However, I think it highly likely that the succession to all the royal titles will be strictly equalised in the event of any new Act of Succession. The dissolution of the Union might occur before that, though, in which case the Scottish titles, dignities and privileges of the monarch and their heirs will be up for negotiation anyway.AlexTiefling (talk) 22:15, 17 October 2012 (UTC)
* It'll be a LONG time before that becomes an issue, and indeed, 2011 proposals to change the rules of royal succession in the Commonwealth realms has not passed yet, so no, they would not. As of right now, if the eldest child of the Duke and Duchess of Cambridge is a girl, she'll just be an (untitled) princess, and when and if William becomes king, she'll just be the heir presumptive, presuming no changes to the law and no sons are born to William. When and if William becomes King, if at that time his eldest daughter is heir apparent, because of the proposed changes actually passing, according to Duke_of_Rothesay, the title just won't exist during that time period. It is simply conferred automatically on the eldest son of the reigning monarch. If there is no son, the title has no holder. Presumably, the lesser included titles follow the same rules. -- Jayron 32 22:20, 17 October 2012 (UTC)
* Yes, William can reasonably expect to become monarch about 30 years from now. His as yet unborn eldest child, in about 65 years. That's a long time for gossip mags to be twitteringly and gushingly grooming them for greatness (while relatively ignoring the actual heir, Charles, Prince of Wales), -- Jack of Oz [Talk] 23:04, 17 October 2012 (UTC)
* Although if he lives as long as his grandmother, it'll be nearly 40 years before William acceeds. Alansplodge (talk) 00:39, 18 October 2012 (UTC)
* "He" being Charles and "his grandmother" being Queen Elizabeth The Queen Mother. Just clarifying. -- Jack of Oz [Talk] 02:57, 18 October 2012 (UTC)
* Exactly - it made sense to me anyway ;-) Alansplodge (talk) 10:24, 18 October 2012 (UTC)
* Sense, yes. Just that it could easily have been read as entirely about William, the grandmother being a reference to the current Queen, who's 86 and going strong. Until you do the maths, and realise that doesn't work, so the first part must have been about Charles and his grandmother, not William and his. -- Jack of Oz [Talk] 11:04, 18 October 2012 (UTC)
* Not one of my most lucid posts; thanks for disentangling it. Alansplodge (talk) 12:19, 18 October 2012 (UTC)
"When and if William becomes King, if at that time his eldest daughter is heir apparent, because of the proposed changes actually passing, according to Duke_of_Rothesay, the title just won't exist during that time period. It is simply conferred automatically on the eldest son of the reigning monarch. If there is no son, the title has no holder." However, having a daughter first does not prevent a person from having a son afterwards. William's heir apparent could be his daughter, but he could also have a son. I don't think the title passes to "the eldest son who is also heir apparent". It's much more likely that it passes simply to the eldest son. Therefore, the title could be conferred automatically on the eldest son who is not the heir apparent, which leads to a number of issues. Surtsicna (talk) 13:32, 19 October 2012 (UTC)
* Or Parliament could just change the rules to suit. Alansplodge (talk) 15:52, 19 October 2012 (UTC)
* Out of general curiosity, what's taking so long to pass the changes as proposed by the CHOGM. I realize we're talking about a dozen or so countries, but you'd think they want to make the change before William has a kid. Hot Stop (Edits) 04:46, 21 October 2012 (UTC)
* What's the rush? Her Maj is still alive and kicking. William's pater is still next in line, and he's a bloke. And after him, there's another bloke waiting before we need worry about any girlies coming to the throne.--Dweller (talk) 04:51, 21 October 2012 (UTC)
* Well, there's the argument that it wouldn't be proper if the succession law changes changed somebody's actual status. Changing the potential order of yet unborn children is one thing, but to make an actual living person (e.g. Prince Carl Philip of Sweden) lose his position in line to his elder sister isn't cool. To avoid things like that, Norway had to add an extra rule about people being born between 1971 and 1990 (see Line of succession to the Norwegian throne.) So, there isn't much rush, but it would be easier for everybody if things were done decently soon, in case the duchess first bears a daugher and then a son. /Coffeeshivers (talk) 22:15, 21 October 2012 (UTC)
|
WIKI
|
ExtremeWireless (Aerohive)
Captive Web Portal suddently not loading accross multiple APs.
w1f1n00b's profile image
w1f1n00b posted 01-27-2021 17:59
When connecting to my open ssid the cwp will not load. tried all the normal tricks. If I manually type in the local IP for the portal 198.***etc. the portal loads and I can accept it. Any ideas why this is happening all of the sudden? A complete update to the AP did not resolve the issue.
Also I found this KB article - https://extremeportal.force.com/ExtrArticleDetail?an=000091612&q=captive%20web%20portal
and I’m not understanding why this internal IP would need to be resolvable by DNS. What would happen if a publid DNS is used such as googles 8.8.8.8?
w1f1n00b's profile image
w1f1n00b
It was DNS… It’s always DNS :-)
If anyone can point me to any documentation regarding the technical details of the CWP process and why DNS is required please send them my way.
Sam Pirok's profile image
Sam Pirok
I’m not finding anything but I have put in a request to get something written up, I’ll pass that on as soon as we have it.
Ash Finch's profile image
Ash Finch
Bit late to the party, but I had a bit of a look at this a couple of months ago. Not 100% got my head around it, so some of the below may be incorrect but hopefully some of it may make sense :smile:
So first a bit of a history lesson, in older firmwares the CWP address used to be 1.1.x.x. This used to be fine until Cloudflare came along and started using 1.1.1.1 I believe :) But as this became unavailable it got switched to 198.18.x.x in later firmwares- important to note this is not a typo and is meant to be 198., not 192.! Still a private IP though, that when combined with a DNS entry allows the client/AP to resolve to the Captive portal (as we can’t directly hook the client due to it being HTTPS rather than http).
Why the IPs and where do they come from? Well, easiest if you go into one of your APs CLI and run the below:
First of all “show interface”. In the list you’ll see all of your SSIDs twice, one for WiFi0 and another for WiFi1 on a specific interface. Find the SSID that has the captive web portal. Lets say for example it was on WiFi0.6 and WiFi1.6.
Next command is to run “show ip route” and you’ll get something like the below
0.0.0.0 192.168.1.254 0.0.0.0 UG 0 0 0 mgt0
127.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 lo
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 mgt0
198.18.12.0 0.0.0.0 255.255.254.0 U 0 0 0 wifi0.6
198.18.44.0 0.0.0.0 255.255.254.0 U 0 0 0 wifi1.6
Our two CWP interfaces have got assigned an IP, which is what the DNS record will need to be (if you have more than one SSID with a CWP you’ll see more of course).
As far as I’m aware the DNS record should only be needed if you’re using HTTPS on captive portals.
|
ESSENTIALAI-STEM
|
Looping over selected items
Suppose you wanted to loop through a list of strings and print all the strings that are more than 3 characters long. You could do it like this:
values = ['a', 'bcd', 'efgh', 'pqrst', 'yz']
def longer_than_3(s):
return len(s) > 3
for v in values:
if longer_than_3(v):
print(v)
do_other_stuff()
The longer_than_3 function returns true if the string is longer than 3 characters, or false otherwise. If it is true, we print the string, and maybe do some other stuff. If it is false, we skip the entire body of the loop.
This code is fine as it is, but we could improve it slightly using the filter function.
Using filter
The filter function accepts a function object, and a sequence of values. It applies the function to each value in the sequence, and lets those values for which the function return true.
So how do we use filter in a loop? Well, much the same as reversed or any of the other loop functions, like this:
values = ['a', 'bcd', 'efgh', 'pqrst', 'yz']
def longer_than_3(s):
return len(s) > 3
for v in filter(longer_than_3, values):
print(v)
do_other_stuff()
The advantage of using filter
Clearly, our code is now one line shorter. But the real advantage, as ever, is that it makes the intent of the code clearer.
The filter function makes it totally clear that the filtering applies to the whole loop. It brings the filter functionality out of the body of the loop and places it directly in for statement itself.
On the other hand, the if statement (in the original code at the start of the article) is a little more ambiguous. You need to inspect the loop before deciding that the condition affects the entire loop body, rather than just part of it. This isn’t too hard with a simple two line loop body, but it is less obvious in complex code.
Using a lambda function
In this case, the function we are using is only a single line of code, so we can use a lambda function instead of a function declaration. This definition creates an unnamed lambda function equivalent to longer_than_3:
lambda x: len(x) > 3
Here is how we use it in the code (notice that the longer_than_3 function is no longer required):
values = ['a', 'bcd', 'efgh', 'pqrst', 'yz']
for v in filter(lambda x: len(x) > 3, values):
print(v)
do_other_stuff()
In summary, if you are writing a loop that only processes certain elements within the sequence, consider using a filter function in the for loop, rather than an if statement in the body of the loop, to make the intent of the code clear.
If the selection criterion is a simple, one line function, consider using a lambda function for code brevity and readability.
|
ESSENTIALAI-STEM
|
Lionel Terray
Lionel Terray (25 July 1921 – 19 September 1965) was a French climber who made many first ascents, including on the 1955 French Makalu expedition in the Himalaya (with Jean Couzy on 15 May 1955) and Cerro Fitz Roy in the Patagonian Andes (with Guido Magnone in 1952).
A climbing guide and ski instructor, Terray was active in mountain combat against Germany during World War II. After the war, he became well known as one of the best Chamonix climbers and guides, noted for his speedy ascents of some of the most notorious climbs in the French, Italian, and Swiss Alps: the Walker Spur of the Grandes Jorasses, the south face of the Aiguille Noire de Peuterey, the north-east face of Piz Badile, and the north face of the Eiger. Terray, frequently with climbing partner Louis Lachenal, broke previous climbing speed records.
Terray was a member of Maurice Herzog's 1950 expedition to the Nepalese Himalayan peak, Annapurna, the highest peak climbed at the time, and the first 8000-meter peak climbed (although British climbers George Mallory, Andrew Irvine, George Finch, Geoffrey Bruce, Henry Morshead, Teddy Norton and Howard Somervell had reached higher altitudes on Mount Everest during the 1920s). Terray did not reach the summit of Annapurna, but together with the Sherpa Adjiba he aided summiteers Maurice Herzog and Louis Lachenal down from the mountain. Both Herzog and Lachenal experienced extreme frostbite and subsequently underwent amputations. Despite these events, the French team returned to Paris to huge public acclaim, and Herzog's expedition book Annapurna became an international bestseller.
Terray made the second ascent of the North Face of the Eiger in 1947, with Louis Lachenal. He was also one of the main participants in the great attempt to rescue four climbers trapped on the north face of the Eiger in 1957. This mission forms the subject of Jack Olsen's 1962 book, The Climb Up To Hell, in which Terray's skill and bravery receive special mention.
In the late 1950s and early 1960s, Terray made a number of first ascents in Peru, including the highest unclimbed peak in the central Andes at the time, 20981 ft Huantsan. He also made first ascents of lower but more difficult peaks, including Willka Wiqi, Soray, Tawllirahu, and Chakrarahu/Chacraraju, possibly the hardest peak in the Peruvian Andes and considered unclimbable at the time. One of Terray's finest achievements was the first ascent of 25295 ft Jannu in Nepal in 1962. He also climbed the Nilgiris near Annapurna, and led the successful 1964 first ascent of 12240 ft Mount Huntington, in the Alaska Range, by the northwest ridge.
Terray organised a rescue attempt of two climbers stranded on Mont Blanc in December 1956. For this he was expelled from the Chamonix Guide's Association, which had refused to participate in the rescue from the start on the grounds that the risk to the rescuers would be too great. Due to the fact that no other guides would accompany him, Terray set out a small team of amateurs. They were turned back on 1 January 1957 either by poor weather or on the understanding that a helicopter would attempt a rescue the following day. Terray was highly critical of the Chamonix Guide Association's inaction when the alarm had first been raised.
Terray was fatally injured from a fall while climbing in the Vercors, south of Grenoble, on 19 September 1965, several years after the publication of his climbing memoir, Conquistadors of the Useless. There were rumors that Terray was functionally illiterate and the book was ghost-written; however in a Foreword written by author and climber David Roberts to an English edition, he confirms he found the original manuscript written in Terray's hand which is word for word what was published, dispelling any notion that Terray did not write the book entirely himself.
His grave is situated in Chamonix, France. A traffic circle is named for him in Chamonix, WSW of town.
Principal expeditions
Principal expeditions:
* 1942 - First ascent of the west side of Aiguille Purtcheller.
* 1944 - First to the east-northeast spur of the Pain de Sucre. The first on the north face of the fr:Aiguille des Pélerins and the north of the Peuterey lap with Maurice Herzog.
* 1946 - Spur north of the Droites, with Louis Lachenal, in eight hours. And the north face of Grandes Jorasses.
* 1947 - Third ascent of the north face of Aiguille Verte. The second to climb the northern face of the Eiger with Lachenal.
* 1950 - Lionel Terray on the expedition to Annapurna, the first 8000+m mountain successfully climbed. Terray did not summit but played a rescue role.
* 1952 - First ascent of Fitz Roy (3,405m) in Patagonia. Climb to Aconcagua (6,960m).
* 1954 - Reconnoiter of Makalu in Tibet. First ascents of subsidiary summits Kangchungtse and Chomo Lonzo (7,804m).
* 1955 - Expedition to Makalu, first summit (8,485m), with Jean Couzy.
* 1956 - In Peru, Nevado Chacraraju (6,110m); and Taulliraju (5,830m).
* 1959 - Expedition to Jannu, 7,710 m, stopping at 7,400 m. In 1962, under Terray's direction, success.
* 1962 - First ascent of 25295 ft Jannu in Nepal.
* 1964 - In the Alaskan range, first ascent of Mount Huntington (3,731m).
|
WIKI
|
Wikipedia:Miscellany for deletion/User:Rampyrobo
The result of the debate was Deleted by Moreschi. Syn ergy 20:45, 2 September 2008 (UTC)
User:Rampyrobo
Apparent sock account of used to host and edit an article on a college team that has been deleted multiple times. Its equivalent at User:Steverhodes7 was deleted under WP:CSD, but since neither version is particularly spammy, I'm bringing this one here for discussion in the hope of getting a binding consensus from the community. jonny - m t 10:09, 22 August 2008 (UTC)
* It would be nice if someone could encourage the user to work towards a mainspace article. Why not leave him a message? Perhaps blank the page to get his attention. Is it possible that this is a potential contributor and not just someone attempting to use wikipedia as a webhost? --SmokeyJoe (talk) 12:55, 24 August 2008 (UTC)
* It's already been deleted from the main namespace and from the original user's userpage, each of which was accompanied by a discussion on User talk:Steverhodes7. I'm applying WP:AGF by allowing the user to explain why they feel this article should be kept, but the fact that they resorted to using a second account to host the article after multiple deletions under the first and are now using to remove the MfD tags rather than participate in the discussion (despite multiple invitations to do so) strongly suggests that the user simply wants the article to stay up wherever they can keep it. -- jonny - em tee 05:40, 27 August 2008 (UTC)
If you are interested in using the wiki technology for a collaborative effort on something else, even if it is just a single page, there are many sites that provide wiki hosting (free or for money). You can also install wiki software on your server. See the Wiki Science wikibook for information on doing this. Scratchpad Wiki Labs also allows personal wikis. See also Alternative outlets.
* Give the user this advice (from WP:NOT):
* Delete as per nom. Note that any user may request a copy for their own purposes, or if they want to use it for article building. --SmokeyJoe (talk) 08:04, 27 August 2008 (UTC)
* Delete - Doesn't seem to have any potential to become an article. --Tikiwont (talk) 08:50, 28 August 2008 (UTC)
I don't see why everyone is so against this page and why it is such an issue. The team play in the premier university league with a lot of funding, about half of the team are paid to play .ie semi-pro. and i dont believe it is an irrelevant subject.--<IP_ADDRESS> (talk) 13:47, 28 August 2008 (UTC)
* It's a problem to have and keep pseudo articles in userspace where they can exist without meeting normal standards. Either, you should seek to move this to mainspace, or its purpose should be in supoort of building related mainspace stuff. The fact that a google search on "UWE Mens 1st XI" leads to this userpage is a problem per se. It is like you are maintaining your own personal wikipedia article on something. This is not OK. You are not allowed to own articles. Userspace is not for articles. If you want to keep it for help in building another article or articles, you should find out how to ask webcrawlers to not index your workspace. What do you want to do? --SmokeyJoe (talk) 05:36, 29 August 2008 (UTC)
I have tried to move it to mainspace but everyone says it is not relevant, which i really dont agree with as it is a very high standard of hockey, the english nations 3rd most popular team sport. Will you give it authentication to be put on a mainspace..or can i use the wikipedia software on another site as I have spent a long time making the page. Thanks --<IP_ADDRESS> (talk) 12:19, 30 August 2008 (UTC)
Oh, and for reference, the image teamwest0003.jpg which was deleted was my own image from my own camera, so how could I put it up so i dont have licencing issues?--<IP_ADDRESS> (talk) 18:17, 30 August 2008 (UTC)
|
WIKI
|
Memo Pad
Memo Pad column; American Express Business Travel says domestic airfare negotiated for corporations hit six-year low in 2005 due to simplified fares and competition; average rose 3 percent in fourth quarter compared with fourth quarter of 2004; is expected to continue to rise throughout year; American Express Global Travel Services survey shows 53 percent of chief financial officers at midsize companies fear increased profit erosion from excessive travel and procurement expenses; may result in stricter supervision of corporate travel policies; Airports Council International reports increase of 6 percent, to 4 billion passengers over 2004; international flights increased 8 percent, to 1.6 billion; five busiest airports were Hartsfield-Jackson Atlanta , Chicago O'Hare, Heathrow in London, Haneda in Tokyo and Los Angeles Intl Airport; Virgin Atlantic has been adding more seats to New York-London route over past year; will begin fourth daily flight between Kennedy Intl and Heathrow; JetBlue will introduce two new routes between Kennedy Intl and Pittsburgh Intl and between Kennedy and Jacksonville Intl in Florida (M)
|
NEWS-MULTISOURCE
|
First Unitarian Church (Stoneham, Massachusetts)
The First Unitarian Church is a historic former church building in Stoneham, Massachusetts. One of Stoneham's more stylish Gothic Revival buildings, the Stick style wood structure was built in 1869 for a Unitarian congregation that was organized in 1858. The building was listed on the National Register of Historic Places in 1984, and included in the Central Square Historic District in 1990. It presently houses the local Community Access Television organization.
Description and history
The First Unitarian Church building is set at the northeast corner of Common and Central Streets on the north side of downtown Stoneham. Across Central Street stand two other churches. This one is a single-story wood-frame structure, its exterior finished in wooden clapboards. The building originally had a number of architecturally significant Stick style features, but many of these have been lost recently. The gable end facing Central Street, and the gabled hood sheltering the entrance, both had stick style diagonal and vertical boardwork. The tower originally sported an elaborate open belfry, with an octagonal steeple above. Four sides of the steeple had dormers in which there were clock faces.
The Unitarian congregation in Stoneham was organized in 1858, and this church was built for it in 1869. The congregation occupied this building until it disbanded in 1995. The building is now used by Stoneham TV, a local Community Access Television station.
|
WIKI
|
Friend: The Great Legacy
Friend: The Great Legacy (lit. Friend 2) is a 2013 South Korean neo-noir action film about three generations of gangsters, starring Yu Oh-seong, Joo Jin-mo, and Kim Woo-bin. It is the sequel to the 2001 box-office hit Friend, also directed by Kwak Kyung-taek. Friend: The Great Legacy was released in theaters on 14 November 2013.
Plot
Friend: The Great Legacy begins 17 years after where the previous film left off. Lee Joon-seok, who claimed responsibility for ordering his friend Dong-soo's murder (despite having nothing to do with it), has spent a lot of time behind bars and now he is released to a world that is as unfamiliar to him as the criminal organization he used to lead. With his subordinate Eun-ki now practically parading as the boss, Joon-seok, a leader by nature, secretly embarks on a mission to subvert his current position. He invites Choi Sung-hoon, whom he'd met in prison, and Sung-hoon's gang to join in his plan. Sung-hoon is the twenty-something son of one of Joon-seok's female friends in high school who now works as a bar hostess, and he had been serving a one-year sentence for beating his mother's abusive husband. Having developed a respect for the charismatic Joon-seok in prison, Sung-hoon willingly takes his side. But when he discovers the truth behind his background, this creates great tension between the two. Interspersed are scenes of Joon-seok's own father, Lee Chul-joo as a gangster who founded the criminal organization in 1963 Busan.
The scene ends of flashback 17 years ago of Joon-Seok in a car after leaving Dong-Su behind, it shows Joon-Seok was remorsed of him not being able to protect his childhood friend.
Cast
* Yoo Oh-sung as Lee Joon-suk
* Joo Jin-mo as Lee Chul-joo
* Kim Woo-bin as Choi Sung-hoon
* Jang Young-nam as Hye-ji, Sung-hoon's mother
* Jung Ho-bin as Eun-ki
* Gi Joo-bong as Hyung-doo
* Ji Seung-hyun as young Hyung-doo
* Lee Chul-min as Wig
* Lee Jun-hyeok as Jjam-bo
* Sun Ho-jin as Song Ki-ho
* Jung Soo-gyo as Hae-young
* Bae Sung-jong as Yong-baek
* Kang Han-na as Ah-ram
* Ahn Jung-bin as Gook-do
* Go Geon-han as Kim-min
* Lee Sang-hoon as Choo Jeop-yi
* Won Woong-jae as Yoo shik-yi
* Song Ji-ho as Jae-chil
* Shin Joon-bum as Bulging head
* Park Sung-hyun as young Sang-gon
* Yoon Jin-ha as Bug-eye
* Choi Jung-hyun as Sang-min
* Jang Dong-gun as Dong-soo (cameo)
Box office
Despite the "Restricted" rating it received from the Korea Media Rating Board, Friend: The Great Legacy opened strongly at the box office on 14 November 2013. It attracted 1.06 million admissions over its opening weekend, topping the local box office chart against competitors such as Hollywood blockbuster Thor: The Dark World and Korean film The Five. It went on to sell 2,969,874 tickets during its run, with total earnings of.
|
WIKI
|
User:Shadowstar1/sandbox
This is the first assignment of ITM 301. The first task is to make own wiki page The second task is to take a screenshot of ch 7-2
|
WIKI
|
Bald Head (disambiguation)
Bald Head is headland on the south side of Trinity Peninsula on the Antarctic Peninsula in Antarctica.
Bald Head or Baldhead may also refer to:
Place
* Bald Head River (Newfoundland)
* Baldhead River (Ontario)
* Bald Head, Maine, a village
* Bald Head Island, North Carolina, a village in North Carolina
* Bald Head Light, a lighthouse in North Carolina
* Yokun Ridge or Baldhead, a ridge in Massachusetts
* Mount Baldhead, a peak in Saugatuck, Michigan
Other
* Baldness, the loss of hair
* "Bald Head", song by Professor Longhair
|
WIKI
|
Alexander Scrogie
Alexander Scrogie (1565–1659) was a Scottish clergyman in the Church of Scotland who was minister of St Machar's Cathedral in Aberdeen and was an anti-Covenanting figure in Scotland during the English Civil War. He served as Rector of Aberdeen University.
Life
He was born in northern Scotland in 1565. He was educated at King's College, Aberdeen graduating MA around 1580. He then became a "regent", lecturing at Marischal College, Aberdeen.
He became an assistant minister at Skene, Aberdeenshire in 1603 and was formally ordained there in 1605. In that year he attended the unlawful General Assembly in Aberdeen, chaired by Rev David Rait.
In January 1606 he translated to Drumoak parish south-west of Aberdeen. In March 1608, the General Assembly ordered him to reside in the parish (as he was not) and in March 1609, they charged him with non-residence. He answered that his family lived there every day but he only lived there at weekends due to his commitments at Marischal College (which continued). He was ordered to quit his college role at Lammastide. In 1621, he translated to St Machar's Cathedral in place of David Rait.
In 1627, King's College awarded him a Doctor of Divinity. He joined with others of equal status to oppose the National Covenant in the early 1630s. He was elected Rector of King's College in 1636. In 1638, he was officially rebuked for celebrating communion on Christmas Day (as the General Assembly had banned this). On 15 July 1639, his house was seized by soldiers of William Keith, Earl Marischal's Regiment, in his capture of Aberdeen.
In August 1640, he was deposed as minister due to his continuing opposition to the Covenant, but in July 1641, made apology and made full recantation to his presbytery in May 1642, and was reinstated in full. He stepped down from St Machar's in 1640 but did not fully retire until 1655 and died in Rathven manse (the home of his son William) on the north coast in 1659.
Family
He married Jean Ross daughter of Rev. James Ross, second charge at Aberdeen. They had several children:
* William Scrogie, Bishop of Argyll from 1666 to 1675
* Alexander Scrogie (1615–1661), minister of St Machar's
* James Scrogie
* Patrick (F), married William Douglas of Forgue
* Marjorie, married Alexander Innes of Mortlach
|
WIKI
|
Talk:Projective cone
Apex vs Top
Some point I'd like to discuss here :
I don't agree with apex. Not only is that completely new to me, apex seems to be more a specific point on top of a three dimensional object, something sharp. Top is more conventional? Evilbu 16:17, 14 February 2006 (UTC)
* Sorry, my fault. I suppose that "top" is OK, although it seems just as strange. (Since the lines continue beyond it, R is never the "top" of the object!) Jorge Stolfi 23:45, 14 February 2006 (UTC)
Singularities
I'm very new to wikipedia, so my first paragraph can be improper yes. However, then where should my remark about the singularities be? Evilbu 16:17, 14 February 2006 (UTC)
* That remark could be added after the current last paragraph. However, note that the article must make some sense to the reader who gets here directly. So, if that remark refers to some complicated application of the concept, that cannot be explained in a sentence or two, perhaps it you should put the remark in the page of that application, not here. Jorge Stolfi 23:58, 14 February 2006 (UTC)
Notation for spaces
Why did you remove the \pi_{r} It is a notation we use at university. Why is R better? It is not that important however. Evilbu 16:17, 14 February 2006 (UTC)
* For one thing, one should use the simplest notation that is sufficient for the purpose at hand. Moreover, that kind of notation (where the subscript indicates the dimension) is inappropriate because, to most readers, it means the element of index r in a collection called π. In particular, it also implies that πr = πs whenever r = s. That obviously is not the intended meaning. Jorge Stolfi 23:58, 14 February 2006 (UTC)
When R is empty
When R is empty, I think the best thing is not to define a cone. Conventions might differ but that is what I saw. Evilbu 16:17, 14 February 2006 (UTC)
Ordinary cone
Your remark about where the name cone comes from is good, but shouldn't you add that you a working in three d? Evilbu 16:17, 14 February 2006 (UTC)
* That does not seem necessary, since the dimension of X has to be at least three for R and S to be disjoint, and higher dimensions do not hurt --- the cones will all be projectively equivalent. Jorge Stolfi 23:58, 14 February 2006 (UTC)
|
WIKI
|
3. Object-oriented programming
What is Object-oriented programming?
• A flexible, powerful paradigm where classes represent and define concepts, while objects are instances of classes.
• The attributes are the characteristics associated to a type.
• For example, a file has many attributes such as its:
• Name
• Size
• Date
• Permission, etc.
• The methods are the functions associated to a type.
Classes and Objects in Python
Almost everything in Python is an object.
>>> type(0)
<class 'int'>
>>> type('hello')
<class 'str'>
Our Apple class:
>>> class Apple:
... color = ""
... flavor = ""
...
>>> type(jonagold)
<class '__main__.Apple'>
>>> jonagold = Apple()
>>> jonagold.color = "red"
>>> jonagold.flavor = "sweet"
>>> print(jonagold.color)
red
>>> print(jonagold.flavor)
sweet
Instance Methods
Example 1: A boring method that does the same for all piglets:-)
>>> class Piglet:
... def speak(self):
... print("oink oink")
...
>>> hamelt1 = Piglet()
>>> hamelt1.speak()
oink oink
>>> hamelt2 = Piglet()
>>> hamelt2.speak()
oink oink
• self represents the current instance of the class.
Example 2: A little more fun class where Pigs can even speak:-)
>>> class Piglet:
... name = "Piglet" # Instance Variable
... def speak(self):
... print("Oink! I'm {}! Oink!".format(self.name))
...
>>> hamlet = Piglet()
>>> hamlet.name = "Hamlet"
>>> hamlet.speak()
Oink! I'm Hamlet! Oink!
• Variables that have different values for different instance of the same class are called instance variables. Just like the name variable in the above example.
Constructors and Other Special Methods
The constructor of a class is the method that's called when you call the name of the class. It's always named init.
>>> class Apple:
... def __init__(self, color, flavor):
... self.color = color
... self.flavor = flavor
...
>>> jonagold = Apple("red", "sweet")
>>> print(jonagold.color)
red
Inheritance - (is-a relationship)
# Base class that has all the properties
class Fruit:
def __init__(self, color, flavor):
self.color = color
self.flavor = flavor
class Apple(Fruit): # Apple class is inheriting the properties of Fruit class
pass
class Grape(Fruit): # Grape class is also inheriting the properties of Fruit class
pass
apple1 = Apple("green", "tart")
print(apple1.color) # green
grape1 = Grape("purple", "sweet")
print(grape1.color) # purple
• Apple is a Fruit.
• Grape is a Fruit.
class Animal:
sound = ""
def __init__(self, name):
self.name = name
def speak(self):
print(f"{self.sound} I'm {self.name}! {self.sound}")
class Piglet(Animal):
sound = "Oink!"
hamlet = Piglet("Hamlet")
hamlet.speak() # Oink! I'm Hamlet! Oink!
class Cow(Animal):
sound = "Moooo"
milky = Cow("Milky White")
milky.speak() # Moooo I'm Milky White! Moooo
Composition (Has-a Relationship)
Composition is a concept that models a has a relationship. It enables creating complex types by combining objects of other types. This means that a class Composite can contain an object of another class Component.
You can have a situation where two different classes are related, but there is no inheritance going on. This is referred to as composition -- where one class makes use of code contained in another class.
• Dog -> bark + eat
• CleanBot -> Move + Clean
• SuperBot -> Move + Clean + Bark + Play Games
Modules
Used to organize functions, classes, and other data together in a structured way.
For example, random, datatime
Small Project Idea:
Create a program that has an employee class, so your manager can keep track of all the assigned project with its status (done, pending, ongoing). Save the work in a CSV format.
• First name, Last Name, Email
• Group that the Project has been assigned to.
• Project Status
|
ESSENTIALAI-STEM
|
User:Dojo Mud
Welcome to my page. Edit whatever but don't delete.
If you are ever left in the dust just get up and shake it all off.
Recent Talk Edits: Nintendo Google
Interests
* Computer
* TV
* Video Games
* Football
Sandbox!
|
WIKI
|
Talk:Area 51 (1995 video game)
Name
Since there are now two games called Area 51 (the recent console game and this one, both being totally different games), maybe this article should be moved to Area 51 (arcade game)? Any thoughts? MrLeo 17:22, 13 April 2006 (UTC)
* ...maybe this article should be moved to Area 51 (arcade game)?
* Done! Chipmunk01 18:42, 28 May 2006 (UTC)
Kronn HUNTER Mode
I Figured that at least the Kronn hunter mode would be on here. I don't have an account so if you want to post it and don't know how, well here I am. At the beginning of the game, ONLY shoot the first three STAAR team members you see. If you did this right you'll enter Kronn Hunter mode.
In this mode, you are a mercenary from the Kronn hierarchy sent to sterilize Area 51 of the Kronn rebels. You will notice that the grenades, bullets, shotgun shells, and machine gun bullets have all taken on a Kronn form. You will also gain 20,000 extra points whenever your score is tallied, and you can shoot STAAR team members with impunity.
http://cheats.ign.com/ob2/068/008/008413.html
Thats to back my statement up. I don't see Kronn hunter mode as a cheat but more of a different way to play. Its the only preferred way My Fellow droogs and I play. Oh the great summers we had switching off between Area 51 and Marvel Vs. Capcom 2 in the Saraha Arcade in Las Vegas —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 03:49, 30 April 2007 (UTC).
Re-release in Arcade
Albeit it's a separate game, but is there any reason to add mention to the "Area 51-Maximum Force" cabinet that was also released later in this article? Or quite possibly a parent link to an article relating to that? <IP_ADDRESS> (talk) 01:34, 22 September 2009 (UTC)
Development Cost Unrealistic
"cost of developing Area 51 was $2,500" this is absurdly low and most likely not correct. Does anyone have the correct value (and reference)? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 16:13, 10 August 2017 (UTC)
"released by Atari" is wrong
At the date of release the Atari arcade branch was already sold to Time Warner. <IP_ADDRESS> (talk) 11:13, 25 April 2020 (UTC)
|
WIKI
|
Italy risks diverging from EU budget recommendations - Dombrovskis
ROME, Jan 30 (Reuters) - Italy still risks diverging significantly from the budget recommendations made by the European Union for this year, European Commission Vice President Valdis Dombrovskis said on Thursday. Last autumn Brussels said Italy’s 2020 budget risked breaking EU budget rules, but in the end did not ask for changes. Dombrovskis added that Italy, which proportionally has the second biggest debt pile of the euro zone, had not reduced its debt fast enough. He encouraged the coalition government to cut labour taxes, tackle tax evasion and deal with vulnerabilities in financial sector. (Reporting by Giuseppe Fonte, writing by Giulio Segreti, editing by Gavin Jones)
|
NEWS-MULTISOURCE
|
Wikipedia:Templates for deletion/Log/2007 March 31
Template:Infobox Doctor Who season episode list
* The following discussion is an archived debate of the proposed deletion of the template below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the template's talk page or in a deletion review). No further edits should be made to this page.
The result of the debate was delete. WoohookittyWoohoo! 06:59, 10 April 2007 (UTC)
This template contains information which is contained within List of Doctor Who serials, the information is crammed into an infobox, increasing the height by about 50%. Losing the template would be of little consequence to pages as it's only recently been added, with little discussion I may add. The template screws up page formatting (at least on 1024 and 800 resolutions) pushing the image down and requires it to be moved, which goes against the purpose of the Doctor Who style guide. Matthew 19:00, 31 March 2007 (UTC)
* Delete per nom. - Peregrine Fisher 19:06, 31 March 2007 (UTC)
* Delete: there is a category at the bottom of every page with the same info. Laïka 19:07, 31 March 2007 (UTC)
* Delete per nomination. --khaosworks (talk • contribs) 19:09, 31 March 2007 (UTC)
* Keep: same layout on simpsons, family guy, lost etc... no reason to delete. Jonesy702 19:35, 31 March 2007 (UTC)
* Comment well if there is a broad concensus in the Doctor Who editor community that this is desired, then I can see no reason why it cannot stay per User:Jonesy702. However, I agree with Matthew that it screws up layout of many of the Doctor Who pages, for something that isn't really necessary. The fact that I have not seen much of a "concensus"-building proces before this was added makes me lean towards Delete --TheDJ (talk • contribs • WikiProject Television) 19:56, 31 March 2007 (UTC)
* Delete per nomination --Quadratus 20:46, 31 March 2007 (UTC)
* Comment I am not fond of it either, I think it doesn't look too nice. But it could prove useful. I'm leaning towards a Delete but I am not 100% sure. --GracieLizzie 21:20, 31 March 2007 (UTC)
Template:Classical work infobox
* The following discussion is an archived debate of the proposed deletion of the template below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the template's talk page or in a deletion review). No further edits should be made to this page.
The result of the debate was Delete. young american (ahoy hoy) 18:11, 10 April 2007 (UTC)
Currently there are 0 links to this template. The template's talk page indicates that its use was deprecated by consensus long ago – it was deemed impractical and unsuited to its task; the whole infobox concept doesn't really work for the articles in question. – Turangalila (talk) 15:05, 31 March 2007 (UTC)
I agree completely. See Template talk:Classical work infobox for the earlier discussion of these issues. Opus33 15:41, 31 March 2007 (UTC)
* But why classical music pieces don't need infoboxes? Wooyi 16:33, 31 March 2007 (UTC)
* The answer to Wooyi is that classical pieces are too varied. The kind of information you might want to summarize about a Bruckner symphony is totally different from about a Palestrina motet, or an opera by John Adams. The desired information just isn't consistent enough to be able to summarize it in an infobox. —Wahoofive (talk) 17:12, 31 March 2007 (UTC)
There ought to be no objections to the deletion of this, but for the record I wholly support it as well. EldKatt (Talk) 11:55, 7 April 2007 (UTC)
Template:CommunismOpenTask
* The following discussion is an archived debate of the proposed deletion of the template below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the template's talk page or in a deletion review). No further edits should be made to this page.
The result of the debate was Delete ^ demon [omg plz] 04:56, 10 April 2007 (UTC)
This template does not aid navigation and is actually confusing. Its content is a short table that lists communist "leaders", "countries", and "creators". However, I cannot understand why Trotsky is mentioned as a "leader" of the USSR, while Lenin is not, or why Marx is affiliated with the PRC and Engels with the USSR. The template is currently unused in any of the 6 articles it links and, in any case, its content is better covered by Communism sidebar. I am skipping the customary step of requesting clarification from the template's creator as s(he) has been inactive for two months although I have, of course, placed a notice on her/his talk page. – Black Falcon 02:48, 31 March 2007 (UTC)
* Delete - this template is rather confusing, and possibly misleading. Grace notes T § 05:16, 31 March 2007 (UTC)
* Delete - POV, not representative of article content. –Pomte 07:16, 31 March 2007 (UTC)
* comment It's doubtful that any association between cells in the same row is intended. Looks like a wikiproject open tasks template, intended for use on userpages, not intended for article space navigation purposes. --Random832 06:19, 7 April 2007 (UTC)
* That makes sense. The one place where the template is transcluded is on the creator's user page. However, I still don't see why it's necessary to create a template for this instead of a simple wikitable. If the consensus is to delete the template, would the closing admin please copy-paste the table to User:Kubanik's user page as a courtesy (in case s/he becomes active again and wishes to use the table)? Thank you, Black Falcon 06:29, 7 April 2007 (UTC)
|
WIKI
|
2021 I.ČLTK Prague Open – Women's doubles
The women's doubles of the 2021 I.ČLTK Prague Open tournament was played on clay in Prague, Czech Republic.
Nicoleta Dascălu and Raluca Șerban were the defending champions, but chose not to participate.
Anna Bondár and Kimberley Zimmermann won the title, defeating Xenia Knoll and Elena-Gabriela Ruse in the final, 7–6(7–5), 6–2.
Seeds
• # Xenia Knoll / 🇷🇴 Elena-Gabriela Ruse (final)
• # 🇭🇺 Anna Bondár / 🇧🇪 Kimberley Zimmermann (champions)
• # 🇨🇿 Anastasia Dețiuc / 🇨🇿 Johana Marková (semifinals)
• # 🇩🇪 Tayisiya Morderger / 🇩🇪 Yana Morderger (quarterfinals)
|
WIKI
|
The Unauthorized Beverly Hills, 90210 Story
The Unauthorized Beverly Hills, 90210 Story is a 2015 made-for-television movie based on the 1990s television drama Beverly Hills, 90210, directed by Vanessa Parise and produced by Peter M. Green. It was written by Jeffrey Roda. The film follows the creation of the show through its first four seasons, dealing with the relationships between the actors, between the producers Darren Star and Aaron Spelling and the media and fan attention the show brought.
Cast
* Dan Castellaneta as Aaron Spelling
* Samantha Munro as Shannen Doherty
* Abbie Cobb as Jennie Garth
* Max Lloyd-Jones as Jason Priestley
* David Lennon as Ian Ziering
* Michele Goyns as Gabrielle Carteris
* Jesy McKinney as Luke Perry
* Ross Linton as Brian Austin Green
* Abby Ross as Tori Spelling
* Lini Evans as Candy Spelling
* Adam Korson as Darren Star
* Alyssa Lynch as Tiffani-Amber Thiessen (Cameo)
Broadcast
The film premiered on October 3, 2015, on Lifetime and M3.
|
WIKI
|
Snapchat’s automated ad sales have arrived, and real ad dollars are likely coming next
Snapchat is now using software algorithms to sell some of its ad inventory. The company rolled out its ads API this weekend, which allows third parties to sell Snapchat’s ad inventory using automated bidding algorithms. Essentially, the technology will let Snapchat fill more ad inventory more quickly than selling it via a sales team, which is one of the reasons Facebook and Twitter and Instagram all offer similar APIs. The company has been thinking about an API, an application programming interface, since the beginning of the year, and announced back in June that it was planning to launch one sometime this fall. And now here it is. Expect Snapchat’s business to grow quickly as a result. The company is already on pace to meet its $350 million revenue target for 2016, and numerous people close to the company believe it could be a $1 billion revenue business by 2017. Automating its ad sales, and offering more granular targeting so that advertisers can reach the people they want to reach, should provide a big boost as the company looks toward an IPO. This article originally appeared on Recode.net.
|
NEWS-MULTISOURCE
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.