Document
stringlengths
87
1.67M
Source
stringclasses
5 values
SHARE Cord blood bank is an approach to use the umbilical cord blood for the use in future. In the earlier time, after the birth of the baby, placenta and umbilical cord were discarded. Later on, it was found that umbilical cord plays major role in the formation of blood forming stem cells as a donor of bone marrow. Due to this reason umbilical cord blood has now started to be collected and stored. Many of the public and private companies have begun the services of baby cord blood banking. The cord blood storage is advertised as biological insurance. It is the insurance for the baby that needs stem cell transplantation. Mostly parents give high preference to financial investment as compared to fact that cord blood banking. They consider the cord blood bank as costly and also there is no guarantee about the investment. Cord blood banks are of two types -public or private. In the private cord blood banking the organization stores the cord blood for which there are fixed charges. Blood is taken from a healthy child and stored to transfer to any of the family member or child if they happen to need that in the future. It acts like an insurance cover. Public cord blood banks are run by government. It does not charge any fees for the collection and storage of cord blood. The core blood is kept in storage by maintaining the standards recognized at national level. Parents are thus highly motivated to donate the blood to public banks. After the donation the parents are told about any of the defect found in the blood. Cord blood stem cell collection is a necessary act, but not routine in delivery rooms. Expectant parents are recommended to plan for cord blood donation early since nearly fifty percent of the vaginal child deliveries take place before the scheduled date. Therefore, expectant parents must plan and contact an umbilical cord blood bank for storing the miraculous stem cells. Bone marrow transplants have been successful in a number of diseases but rare availability of stem cells leave patients looking for the cells for a prolonged period of time. Today most of the parents opt for cord blood preservation, because whenever the need arises, the patient does not have to wait for a matching donor. This is truer for the patients who belong to an ethic minority group. These days, cord blood cell industry is booming with huge developments of public and private banks. Families, who have not stored their own babies’ stem cells in a private cord blood bank, still are likely to find a genetically matched stem cell sample from a public cord blood bank. Besides, research has proved that umbilical cord stem cells are more versatile compared to the ones extracted from bone marrow. The pregnancy tips alone are not sufficient for the well being of the child. But through stem cell banking you can protect your child from future ailments. For further information visit us-: http://www.cordlifeindia.com/ CordLife is today the largest network of private cord blood banks,Pregnancy Tips Cord Blood Storage, Stem Cell Banking, Pre-born educationUmbilical Cord Banking of Australasia. Find More Cord Blood Articles
ESSENTIALAI-STEM
Template:Service award progress/compose/doc To be used in Service award progress. Generates one-half of the second part of the message. Usage where is either or. Examples
WIKI
List of highways numbered 569 The following highways are numbered 569: Ireland * IRL_R569.svg R569 road (Ireland) South Africa * SA_road_R569.svg R569 (South Africa)
WIKI
local stdnse = require "stdnse" local shortport = require "shortport" local comm = require "comm" local string = require "string" local table = require "table" description = [[ OpenWebNet is a communications protocol developed by Bticino since 2000. Retrieves device identifying information and number of connected devices. References: * https://www.myopen-legrandgroup.com/solution-gallery/openwebnet/ * http://www.pimyhome.org/wiki/index.php/OWN_OpenWebNet_Language_Reference ]] --- -- @usage -- nmap --script openwebnet-discovery -- -- @output -- | openwebnet-discover: -- | IP Address: 192.168.200.35 -- | Net Mask: 255.255.255.0 -- | MAC Address: 00:03:50:01:d3:11 -- | Device Type: F453AV -- | Firmware Version: 3.0.14 -- | Uptime: 12d9h42m1s -- | Date and Time: 4-07-2017T19:17:27 -- | Kernel Version: 2.3.8 -- | Distribution Version: 3.0.1 -- | Lighting: 115 -- | Automation: 15 -- |_ Burglar Alarm: 12 -- -- @xmloutput -- 192.168.200.35 -- 255.255.255.0 -- 00:03:50:01:d3:11 -- F453AV -- 3.0.14 -- 12d9h42m1s -- 4-07-2017T19:17:27 -- 2.3.8 -- 3.0.1 -- 115 -- 15 -- 12 author = "Rewanth Cool" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service(20000, "openwebnet") local device = { [2] = "MHServer", [4] = "MH200", [6] = "F452", [7] = "F452V", [11] = "MHServer2", [12] = "F453AV", [13] = "H4684", [15] = "F427 (Gateway Open-KNX)", [16] = "F453", [23] = "H4684", [27] = "L4686SDK", [44] = "MH200N", [51] = "F454", [200] = "F454 (new?)" } local who = { [0] = "Scenarios", [1] = "Lighting", [2] = "Automation", [3] = "Power Management", [4] = "Heating", [5] = "Burglar Alarm", [6] = "Door Entry System", [7] = "Multimedia", [9] = "Auxiliary", [13] = "Device Communication", [14] = "Light+shutters actuators lock", [15] = "CEN", [16] = "Sound System", [17] = "Scenario Programming", [18] = "Energy Management", [24] = "Lighting Management", [25] = "CEN plus", [1000] = "Diagnostic", [1001] = "Automation Diagnostic", [1004] = "Heating Diagnostic", [1008] = "Door Entry System Diagnostic", [1013] = "Device Diagnostic" } local device_dimension = { ["Time"] = "0", ["Date"] = "1", ["IP Address"] = "10", ["Net Mask"] = "11", ["MAC Address"] = "12", ["Device Type"] = "15", ["Firmware Version"] = "16", ["Hardware Version"] = "17", ["Uptime"] = "19", ["Micro Version"] = "20", ["Date and Time"] = "22", ["Kernel Version"] = "23", ["Distribution Version"] = "24", ["Gateway IP address"] = "50", ["DNS IP address 1"] = "51", ["DNS IP address 2"] = "52" } local ACK = "*#*1##" local NACK = "*#*0##" -- Initiates a socket connection -- Returns the socket and error message local function get_socket(host, port, request) local sd, response, early_resp = comm.opencon(host, port, request, {recv_before=true, request_timeout=10000}) if sd == nil then stdnse.debug("Socket connection error.") return nil, response end if not response then stdnse.debug("Poor internet connection or no response.") return nil, response end if response == NACK then stdnse.debug("Received a negative ACK as response.") return nil, response end return sd, nil end local function get_response(sd, request) local res = {} local status, data sd:send(request) repeat status, data = sd:receive_buf("##", true) if status == nil then stdnse.debug("Error: " .. data) if data == "TIMEOUT" then -- Avoids false results by capturing NACK after TIMEOUT occured. status, data = sd:receive_buf("##", true) break else -- Captures other kind of errors like EOF sd:close() return res end end if status and data ~= ACK then table.insert(res, data) end if data == ACK then break end -- If response is NACK, it means the request method is not supported if data == NACK then res = nil break end until not status return res end local function format_dimensions(res) if res["Date and Time"] then local params = { "hour", "min", "sec", "msec", "dayOfWeek", "day", "month", "year" } local values = {} for counter, val in ipairs(stdnse.strsplit("%.%s*", res["Date and Time"])) do values[ params[counter] ] = val end res["Date and Time"] = stdnse.format_timestamp(values) end if res["Device Type"] then res["Device Type"] = device[ tonumber( res["Device Type"] ) ] end if res["MAC Address"] then res["MAC Address"] = string.gsub(res["MAC Address"], "(%d+)(%.?)", function(num, separator) if separator == "." then return string.format("%02x:", num) else return string.format("%02x", num) end end ) end if res["Uptime"] then local t = {} local units = { "d", "h", "m", "s" } for counter, v in ipairs(stdnse.strsplit("%.%s*", res["Uptime"])) do table.insert(t, v .. units[counter]) end res["Uptime"] = table.concat(t, "") end return res end action = function(host, port) local output = stdnse.output_table() local sd, err = get_socket(host, port, nil) -- Socket connection creation failed if sd == nil then return err end -- Fetching list of dimensions of a device for _, device in ipairs({"IP Address", "Net Mask", "MAC Address", "Device Type", "Firmware Version", "Uptime", "Date and Time", "Kernel Version", "Distribution Version"}) do local head = "*#13**" local tail = "##" stdnse.debug("Fetching " .. device) local res = get_response(sd, head .. device_dimension[device] .. tail) -- Extracts substring from the result -- Ex: -- Request - *#13**16## -- Response - *#13**16*3*0*14## -- Trimmed Output - 3*0*14 if res and next(res) then local regex = string.gsub(head, "*", "%%*") .. device_dimension[device] .. "%*" .."(.+)" .. tail local tempRes = string.match(res[1], regex) if tempRes then output[device] = string.gsub(tempRes, "*", ".") end end end -- Format the output based on dimension output = format_dimensions(output) -- Fetching list of each device for i = 1, 6 do stdnse.debug("Fetching the list of " .. who[i] .. " devices.") local res = get_response(sd, "*#" .. i .. "*0##") if res and #res > 0 then output[who[i]] = #res end end if #output > 0 then return output else return nil end end
ESSENTIALAI-STEM
Essential Questions Critical Analysis Europeans even knew about the Americas, Native American tribes were the first inhabitants. These first inhabitants were a people group united by kinship and called Pale-Indians and they settled in the Americas between twelve and fifteen thousand years ago. Large mammals and an abundance of plants drew hunter- gatherers to the Americas, which provided the sustenance necessary for survival. Agriculture takes hold in a portion of the Americas between 1000 to 1200 AD, but spreads further and more extensively by 500 AD. Agriculture in the Americas was much different than in Europe and other countries. In the Americas, crops such as corn, beans, and squash were grown and there were no animals involved. Early fifteenth century, Europe was a patchwork of small kingdoms and principalities, and Europe began to expand Into Muslim country and acquired a desire to trade goods with Asia, so they went about exploration of other than previous forms and ended up In America, without knowing It. Soon after Columbus arrived, Spanish explorers took an interest and also began to Lonnie, and proceeded to slaughter large numbers of Indians in get rich quick attempt. Also missionaries took an interest in converting the Indians to Christianity, which resulted in blended versions of Catholicism that exist today. Conquistadors, Spanish colonists under a man named Cortez, conquered the Aztec and began Indian labor system. Because of the scarcity of laborers in the Americas, Portuguese and Spanish colonists looked to Africa for black slaves. Spanish colonization and exploitation of Indians resulted in the Pueblo revolt against the Spanish. Europe soon followed their explorer Columbus to the Americas, bringing diseases and sickly pigs, this event Is now called the Great Dying. The Indians began to resist the power of the Spanish and soon coexisted with them, adopting their cultures and learning the Spanish language. Coming to America: Portrait of Colonial Life The New World, the Americas, became a magnet for all ethnic groups. People had such a desire to go to the Americas that they would indenture themselves so that they could pay for their passage to the Americas. Voyages to the New World were ungenerous and many died on the voyage, while the youngest and healthiest were sold on shipboard. In New England, family relationships were of a great deal of importance. A marriage ceremony was created by the Puritans who also established obligations that were to be fulfilled by the male and female In each relationship. Divorce also became a right If a spouse broke the rules. The head of the house was to have moral order and correctional order and emotional stability. Men were expected to work in the fields and women joined them during harvest time, but made soaps,
FINEWEB-EDU
LKrigSetup: Create or update the LatticeKrig model object (LKinfo) for... Description Usage Arguments Details Value Author(s) Examples View source: R/LKrigSetup.R Description This function combines some input arguments with defaults for other to create a list describing the LatticeKrig spatial model. Usage 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 LKrigSetup( x = NULL, nlevel = NULL, alpha = NA, nu = NULL, a.wght = NA, normalize = TRUE, lambda = NA, sigma = NA, rho = NA, rho.object = NULL, latticeInfo = NULL, basisInfo =NULL, LKGeometry = "LKRectangle", distance.type = "Euclidean", BasisFunction = "WendlandFunction", overlap = 2.5, V = NULL, BasisType = "Radial", fixedFunction = "LKrigDefaultFixedFunction", fixedFunctionArgs = list(m = 2), max.points = NULL, mean.neighbor = 50, choleskyMemory = NULL, verbose = FALSE, noCheck = FALSE, returnCall = FALSE, dense=FALSE, ...) LatticeKrigEasyDefaults(argList, nlevel, x) LKinfoUpdate(LKinfo, ... ) Arguments argList Argument supplied to the top level LatticeKrig function. alpha A vector of length nlevel with the relative variances for the different multiresolution levels. a.wght In most cases, a vector of length nlevel that are the neighboring weights in the spatial autoregession. The setup function will check that the value is in a valid range for a geometry. The details of how this is connected to the covariance function varies based on the geometry. However, qualitatively this is related to a range parameter. For the LKRectangle geometry and a stationary model, at level k the center point has weight 1 with the 4 nearest neighbors given weight -1/a.wght[k]. In this case a.wght must be greater than 4 for the fields to be stationary and following Lindgren and Rue the range parameter is approximately 1/sqrt(a.wght-4) basisInfo A list with extra components the object used to describe the multiresolution basis. Usually this will not be needed for standard models. BasisType A character string indicating the type of basis function. Currently this is either "Radial" or "Tensor". choleskyMemory A list that will be used in the spam call to do the Cholesky decomposition. See the memory argument in chol.spam. dense If FALSE sparse linear algebra is used for the computations. If TRUE the matrices are made "dense" (zeroes are filled in) and the ordinary Lapack functions are used for the linear algebra. This option is primarily for testing and timing sparse verses standard algorithms. distance.type A text string indicate type distance to use between spatial locations when evaluating the basis functions. Default is "Euclidean". Other choices when locations are in degrees longitude and latitude are "Chordal" and "GreatCircle". The default radius is in miles (3963.34) but can be reset using the "Radius" attribute to the text string. e.g. dtype<- "Chordal"; attr( dtype, which="Radius") <- 6371 will set radius to kilometers. fixedFunction A text string that is the name of the function used to find the fixed part of the spatial model based on the locations. The default is a linear (m=2) polynomial in the spatial coordinates. fixedFunctionArgs A list containing arguments to supply when evaluating the fixed function. lambda The "noise to signal ratio" or also known as the smoothing parameter it is the parameter lambda = sigma^2/rho. If specified then sigma and rho typically are estimated in LKrig by maximum likelihood. If lambda is not specified then it is set as lambda = sigma^2/ rho. Note that to evaluate the spatial process model, e.g. using the function LKrig.cov, a value of lambda is not needed and this argument can default to NA. latticeInfo Part or all of the object used to describe the Markov random field lattice. In the standard cases this list is created in the setup function and need not be specified. See LKrigSetupLattice for details. Note that the contents of this list is concatenated to any additional components supplied by LKrigSetupLattice. LKGeometry A text string that gives the names of the model geometry. The default is "LKrectangle" assuming the spatial domain is a rectangle. Other common choices are "LKInterval" (1 d problem ) and "LKBox" (3 d problem) LKinfo A list that has class "LKinfo". mean.neighbor The average number of nonzero points when each basis function is evaluated at a set of points points in the spatial domain. max.points This is a parameter for the nearest neighbor distance function that sets the maximum array size for the nonzero distances among points. e.g. with 100 points each with 20 nonzero neighbors max.points needs to be 2000 = 100*20. Specifically if the total number of nonzero values when each basis function is evaluated at all the spatial locations. The easier way to specify space is by using the mean.neighbor argument. nlevel Number of levels in multiresolution. Note that each subsequent level increases the number of basis functions within the spatial domain size by a factor of roughly 4. noCheck If FALSE do not make any checks on the consistency of the different parts of the final LKinfo object. e.q. values of a.wght within the range of a stationary Markov random field. normalize If TRUE the basis functions will be normalized to give a marginal variance of one for each level of multiresolution. (Normalizing by levels makes it easier to interpret the alpha weights.) nu A smoothness parameter that controls relative sizes of alpha. Currently this parameter only makes sense for the 2D rectangular domain (LKRectangle) overlap Controls the overlap among the radial basis functions and should be in units of the lattice spacing. For the rectangular case the default of 2.5 means that the support of the Wenland basis function will overlap 2.5 lattice units in each direction. See LKrig.basis for how overlap adjusts scaling in the basis function formula. rho A scalar, the sill or marginal variance of the process. BasisFunction Text string giving the 1-d form for basis function. rho.object A prediction object to specify part of the marginal variance for the process. Specifically the form is VAR(g(x1))= rho*h(x1) Calling predict(rho.object,x1) should return a vector with the values of h at the (arbitrary) spatial locations in x1. If omitted assumed to be the constant one – the usual case. returnCall If TRUE the call to LKrigSetup is also included as part of the LKinfo object. sigma The measurement error standard deviation. Also called the nugget variance in geostatistics. V See entry in LKrig. verbose If TRUE print out intermediate information. x Spatial locations that define the spatial domain for prediction. This is only used to determine ranges of the grid for the basis functions so, for example, for a rectangular domain only two points are required that bound the rest of the data locations. E.g. x= rbind( c( 0,0), c(1,1)) will set the domain to be the unit square. ... Specific arguments that will be included in the setupArgs list and also passed to LKrigSetupLattice. For LKinfoUpdate these specify the components of LKinfo to update. Details Many of the functions within LKrigSetup are overloaded to adapt to the LKGeometry class. This makes it easy to add new geometries or other models to the LatticeKrig framework. The required components of this object (see below) outline how the latticeKrig model is structured and what should be common features independent of the geometry. The key components are latticeInfo that contains the information used to generate the spatial autoregressive matrix on the lattice (see LKrigSAR) and the lattice centers (see LKrigCenters). The component basisInfo used to generate the radial basis function (see LKrig.basis) The function LKrigEasyDefaults is used in the top level function LattticeKrig to make the logic of different default choices more readable and reduces the clutter in this function. Its main purpose is to find a reasonable choice for NC when this is not specified. The function LKinfoUpdate is more of a utility used for clarity that allows one to update the LKinfo object with particular components without having to recreate the entire object. This function is used in the MLE search when just values of alpha or a.wght are being varied. Value An object with class "LKinfo" and also the additional class given by LKGeometry. The required components are: nlevel Number of levels alpha alpha parameters as a list that has nlevel components and possibly some attributes. a.wght a.wght parameters as a list that has nlevel components and possibly some attributes. nu nu parameter normalize A logical indicating whether to normalize. lambda Value of lambda. sigma Value of sigma. rho Value for rho. rho.object Value for rho.object. latticeInfo A list with specific multiresolution lattice information setupArgs All arguments passed in the call and any in in ... basisInfo A list with basis information. call The actual call used to create this object. Author(s) Doug Nychka Examples 1 2 3 4 5 6 7 8 9 10 data(ozone2) # find the ranges of the data, this is the same as passing the entire set of observation # locations and is more compact x<-apply( ozone2$lon.lat, 2,"range") LKinfo<- LKrigSetup( x, NC=10, nlevel=2, alpha=c(1,.5), a.wght=c(5,5)) print( LKinfo) LKinfo2<- LKinfoUpdate( LKinfo, a.wght=c(4.1,4.1), NC=12) LKinfo3<- LKrigSetup( x, NC=12, nlevel=2, alpha=c(1,.5), a.wght=c(4.1,4.1)) LatticeKrig documentation built on May 29, 2017, 7:03 p.m. Search within the LatticeKrig package Search all R packages, documentation and source code
ESSENTIALAI-STEM
Info Call to External Storage API Description List of all external storage API calls. Insecure storage of sensitive information by setting insecure permissions or storing data without encryption might expose this information to an attacker. Recommendation This entry is informative, no recommendations applicable. Technical details Method org.apache.cordova.CordovaResourceApi.mapUriToFile() calling method java.io.File.<init>() public java.io.File mapUriToFile(android.net.Uri p10) { java.io.File v3_0 = 0; this.assertBackgroundThread(); switch (org.apache.cordova.CordovaResourceApi.getUriType(p10)) { case 0: v3_0 = new java.io.File(p10.getPath()); case 1: default: break; case 2: android.database.Cursor v7 = this.contentResolver.query(p10, org.apache.cordova.CordovaResourceApi.LOCAL_FILE_PROJECTION, 0, 0, 0); if (v7 == null) { } else { try { int v6 = v7.getColumnIndex(org.apache.cordova.CordovaResourceApi.LOCAL_FILE_PROJECTION[0]); } catch (int v0_4) { v7.close(); throw v0_4; } if ((v6 != -1) && (v7.getCount() > 0)) { v7.moveToFirst(); String v8 = v7.getString(v6); if (v8 != null) { v3_0 = new java.io.File(v8); v7.close(); } } v7.close(); } break; } return v3_0; } Method org.apache.cordova.CordovaResourceApi.openOutputStream() calling method java.io.File.<init>() public java.io.OutputStream openOutputStream(android.net.Uri p7, boolean p8) { java.io.FileOutputStream v3_0; this.assertBackgroundThread(); switch (org.apache.cordova.CordovaResourceApi.getUriType(p7)) { case 0: java.io.File v1_1 = new java.io.File(p7.getPath()); java.io.File v2 = v1_1.getParentFile(); if (v2 != null) { v2.mkdirs(); } v3_0 = new java.io.FileOutputStream(v1_1, p8); break; case 1: default: throw new java.io.FileNotFoundException(new StringBuilder().append("URI not supported by CordovaResourceApi: ").append(p7).toString()); break; case 2: case 3: java.io.FileOutputStream v3_6; if (!p8) { v3_6 = "w"; } else { v3_6 = "wa"; } v3_0 = this.contentResolver.openAssetFileDescriptor(p7, v3_6).createOutputStream(); break; } return v3_0; } Method org.apache.cordova.CordovaResourceApi.remapPath() calling method java.io.File.<init>() public String remapPath(String p2) { return this.remapUri(android.net.Uri.fromFile(new java.io.File(p2))).getPath(); } Method org.apache.cordova.CordovaResourceApi.openForRead() calling method java.io.FileInputStream.<init>() public org.apache.cordova.CordovaResourceApi$OpenForReadResult openForRead(android.net.Uri p23, boolean p24) { if (!p24) { this = this.assertBackgroundThread(); } org.apache.cordova.CordovaResourceApi$OpenForReadResult v2_2; switch (org.apache.cordova.CordovaResourceApi.getUriType(p23)) { case 0: java.io.InputStream v4_2 = new java.io.FileInputStream(p23.getPath()); v2_2 = new org.apache.cordova.CordovaResourceApi$OpenForReadResult(p23, v4_2, this.getMimeTypeFromPath(p23.getPath()), v4_2.getChannel().size(), 0); return v2_2; case 1: String v9 = p23.getPath().substring(15); int v6 = -1; try { android.content.res.AssetFileDescriptor v8_2 = this.assetManager.openFd(v9); java.io.InputStream v4_0 = v8_2.createInputStream(); int v6_3 = v8_2.getLength(); } catch (java.io.FileNotFoundException v18) { v4_0 = this.assetManager.open(v9); } v2_2 = new org.apache.cordova.CordovaResourceApi$OpenForReadResult(p23, v4_0, this.getMimeTypeFromPath(v9), v6_3, v8_2); return v2_2; case 2: case 3: String v5_3 = this.contentResolver.getType(p23); android.content.res.AssetFileDescriptor v8_1 = this.contentResolver.openAssetFileDescriptor(p23, "r"); v2_2 = new org.apache.cordova.CordovaResourceApi$OpenForReadResult(p23, v8_1.createInputStream(), v5_3, v8_1.getLength(), v8_1); return v2_2; case 4: org.apache.cordova.CordovaResourceApi$OpenForReadResult v21 = this.readDataUri(p23); if (v21 == null) { } else { v2_2 = v21; return v2_2; } case 5: case 6: java.net.HttpURLConnection v17_1 = ((java.net.HttpURLConnection) new java.net.URL(p23.toString()).openConnection()); v17_1.setDoInput(1); String v5_2 = v17_1.getHeaderField("Content-Type"); if (v5_2 != null) { v5_2 = v5_2.split(";")[0]; } v2_2 = new org.apache.cordova.CordovaResourceApi$OpenForReadResult(p23, v17_1.getInputStream(), v5_2, ((long) v17_1.getContentLength()), 0); return v2_2; case 7: org.apache.cordova.CordovaPlugin v19 = this.pluginManager.getPlugin(p23.getHost()); if (v19 != null) { v2_2 = v19.handleOpenForRead(p23); return v2_2; } else { throw new java.io.FileNotFoundException(new StringBuilder().append("Invalid plugin ID in URI: ").append(p23).toString()); } } throw new java.io.FileNotFoundException(new StringBuilder().append("URI not supported by CordovaResourceApi: ").append(p23).toString()); } Method org.apache.cordova.CordovaResourceApi.openOutputStream() calling method java.io.FileOutputStream.<init>() public java.io.OutputStream openOutputStream(android.net.Uri p7, boolean p8) { java.io.FileOutputStream v3_0; this.assertBackgroundThread(); switch (org.apache.cordova.CordovaResourceApi.getUriType(p7)) { case 0: java.io.File v1_1 = new java.io.File(p7.getPath()); java.io.File v2 = v1_1.getParentFile(); if (v2 != null) { v2.mkdirs(); } v3_0 = new java.io.FileOutputStream(v1_1, p8); break; case 1: default: throw new java.io.FileNotFoundException(new StringBuilder().append("URI not supported by CordovaResourceApi: ").append(p7).toString()); break; case 2: case 3: java.io.FileOutputStream v3_6; if (!p8) { v3_6 = "w"; } else { v3_6 = "wa"; } v3_0 = this.contentResolver.openAssetFileDescriptor(p7, v3_6).createOutputStream(); break; } return v3_0; }
ESSENTIALAI-STEM
User:Ocularchivist/OLES2129/tutorialsix https://en.wikipedia.org/w/index.php?title=Bryan_Ferry&editintro=Template%3ABLP_editintro#Roxy_Music_%281970–1983%29 Roxy Music (1970–1983): smoothed prose in first paragraph.
WIKI
User:AP1787 Articles I've written or improved greatly * National Audiovisual Conservation Center (formerly Mount Pony Federal Reserve Bunker) * Jumbo Tsuruta * Hamilton Watch Company * Schick test * Background noise A rather terrible article that was not very good when I worte it, but it was made better by other people. * Diphenylchlorarsine * Leipzig Zoological Garden * Uzzen-sherah * Indiana Harbor * False anemone * David Brearley * George M. Chilcott * Franklin Square (PATCO station) * Frank Simmons (Stargate) * City Hall (PATCO station) * Ori ship * SS A. J. Cermak * SS George E. Badger * SS Abraham Clark * SS Amerigo Vespucci * SS Annie Oakley * SS Clara Barton * SS Geronimo * SS Gouverneur Morris * SS Timothy Pickering * SS David E. Hughes * SS Meriwether Lewis * SS Montfort Stokes * SS Charles Bulfinch * SS Pierre L'Enfant * SS U.S.O. * SS Uriah M. Rose * SS Zachary Taylor * SS Benjamin Harrison * SS Amelia Earhart * SS Harriet Tubman * SS Russell A. Alger * SS Robert M. T. Hunter * Man-of-war fish * SS Richard K. Call * Nike Missile SitePH-32 * Stargate Wikiproject recent changes not really an article, but a lot of work none the less. * SS Samarkand * White gaura Useful links User:Dragons flight/Category tracker/Summary Temp /template sandbox /Joint sessions sandbox /Wilkes fund controversy /Evacuation of Charleston /SS Gunston Hall
WIKI
Draft:Adam Rose (The Price is Right contestant) Adam Rose is a gameshow contestant who won $1,000,000 on The Price is Right. His winnings are $1,153,908.
WIKI
User:Barkochbar My User Name Simon bar Kokhba was the leader of a Jewish revolt against the Romans. After costing the romans dearly he was finally defeated at Betar in 135 CE (AD). The reason my e-name is Barkochbar is: * 1) I use it on some places where you can't have spaces in your name. * 2) The name is pronounced in Hebrew as Baar koch baar ie. Barkochbar This page has been vandalised 2 times :)
WIKI
User:Theaphillips/Truly Devious/Rsintchak Peer Review General info (Theaphillips) * Whose work are you reviewing? * Link to draft you're reviewing:User:Theaphillips/Truly Devious * Link to the current version of the article (if it exists):User:Theaphillips/Truly Devious Lead * Lead gives good information on what novel is. Would reccomend more sourcing even though its basic information and a secondary source. Good first sentence clearly states what article is. Very concise lead that is elaborated on in Plot section. Content * Mostly based off plot section * Unfamiliar with topic, but appears plot is well covered without spoiling book * Address equity gap as the author is a woman so brings more publicity and content to women writers * Need to cite more * Content all seems relevant to novel * Perhpas could extrapolate away from specific novel to get more content Tone and Balance * The content added is neutral, does not spoil plot and is broad * Appears to be balance, covers plot of book so should be good to not be biased. Maybe avoid delving too deep in just one character or part of book * Did not feel this was attempting to persuade me but instead just inform Sources and References * Needs secondary sourcing, lots of primary sources used * Sources need to be more informative * Link 2 does not work * Should aim for many more quality sources to cite more often and with various sourcing diversity Organization * Content is easy to follow and read * Appears free of spelling errors and grammar seems acceptable * Sections are easy to follow, I would reccomend more sections, perhaps a characters section for more content Images and Media * No images present * Maybe lay out images of the books cover? For New Articles Only * Not supported by 2-3 independent secondary sources * Not exaustive list of sources, need more to make content balanced and reliable * Could talk about themes, art, and criticisms as subheadings seen in other articles * Does not link to other articles Overall impressions Overall, I feel I was able to get a good understanding of the article, given the content. I have a general understanding of the chronological plot, some characters involved, and the setting, Ellingham Academy in Vermont. Though short in this version of the article, it was very concise, and I felt this was a good representation of the book. I learned it has numerous awards and is part of a series of books. To improve this article, it needs much more sourcing, especially secondary sources to have a credible bibliography. Some images and a characters section could also be useful to a reader for organization purposes. I would say the main thing would be supplementing sourcing and length of article.
WIKI
Macedonia (region) Macedonia is a geographical and historical region of the Balkan Peninsula in Southeast Europe. Its boundaries have changed considerably over time; however, it came to be defined as the modern geographical region by the mid 19th century. Nowadays the region is considered to include parts of six Balkan countries: Greece, North Macedonia, Bulgaria, Albania, Serbia, and Kosovo. It covers approximately 67,000 square kilometres (25,869 sq mi) and has a population of 4.76 million. Its oldest known settlements date back approximately to 7,000 BC. From the middle of the 4th century BC, the Kingdom of Macedon became the dominant power on the Balkan Peninsula; since then Macedonia has had a diverse history. Quotes * The Balkan Wars had revealed both the strengths and the limits of Balkan nationalism. Its strength lay in its ferocity. Its weakness was its disunity. The violence of the fighting much impressed the young Trotsky, who witnessed it as a correspondent for the newspaper Kievskaia mysl. Even the peace that followed the Balkan Wars was cruel, in a novel manner that would become a recurrent feature of the twentieth century. It no longer sufficed, in the eyes of nationalists, to acquire foreign territory. Now it was peoples as well as borders that had to move. Sometimes these movements were spontaneous. Muslims fled in the direction of Salonika as the Greeks, Serbs and Bulgarians advanced in 1912; Bulgarians fled Macedonia to escape from invading Greek troops in 1913; Greeks chose to leave the Macedonian districts ceded to Bulgaria and Serbia by the Treaty of Bucharest. * Niall Ferguson, The War of the World: Twentieth-Century Conflict and the Descent of the West (2006), p. 76 * Sometimes populations were deliberately expelled, as the Greeks were from Western Thrace in 1913 and from parts of Eastern Thrace and Anatolia in 1914. In the wake of the Turkish defeat, there was an agreed population exchange: 48,570 Turks moved one way and 46,764 Bulgarians the other across the new Turkish-Bulgarian border. Such exchanges were designed to transform regions of ethnically mixed settlement into the homogeneous societies that so appealed to the nationalist imagination. The effects on some regions were dramatic. Between 1912 and 1915, the Greek population of (Greek) Macedonia increased by around a third; the Muslim and Bulgarian population declined by 26 and 13 per cent respectively. The Greek population of Western Thrace fell by 80 per cent; the Muslim population of Eastern Thrace rose by a third. The implications were distinctly ominous for the many multi-ethnic communities elsewhere in Europe. * Niall Ferguson, The War of the World: Twentieth-Century Conflict and the Descent of the West (2006), p. 76-77 * It was the Byzantine Empire, which was to realize Alexander's idea - Macedonian Panhellenism -in face of an Asia in revolt, and realize it for the Greeks. * René Grousset, A. Patterson, "The Sum of History", p. 159. * That much I can say, without endless talking and without becoming tiresome, that she [Eusebia] is of a family line that is pure Greek, from the purest of Greeks, and her city is the metropolis of Macedonia. * Julian the Apostate, "Praise For The Empress Eusebia", p. 147
WIKI
Vol. Advanced Theory Chapter Physics in Industrial Instrumentation Conservation Laws The Law of Mass Conservation states that matter can neither be created nor destroyed. The Law of Energy Conservation states that energy can neither be created nor destroyed. However, both mass and energy may change forms, and even change into one another in the case of nuclear phenomena. Conversion of mass into energy, or of energy into mass, is quantitatively described by Albert Einstein’s famous equation: \[E = mc^2\] Where, \(E\) = Energy (joules) \(m\) = Mass (kilograms) \(c\) = Speed of light (approximately \(3 \times 10^8\) meters per second) Conservation laws find practical context in many areas of science and life, but in the realm of process control we have the principles of mass balance and energy balance which are direct expressions of these Laws. “Mass balance” refers to the fact that the sum total of mass entering a process must equal the sum total of mass exiting the process, provided the process is in a steady-state condition (all variables remaining constant over time). To give a simple example of this, the mass flow rate of fluid entering a pipe must be equal to the mass flow rate of fluid exiting the pipe, provided the pipe is neither accumulating nor releasing mass within its internal volume. “Energy balance” is a parallel concept, stating that the sum total of energy entering a process must equal the sum total of energy exiting a process, provided a steady-state condition (no energy being stored or released from storage within the process).
ESSENTIALAI-STEM
George Ryley Scott George Ryley Scott (6 October 1886 – 1955) was a prolific British author of books about sexual intercourse, active from the late 1920s to the 1950s. He also wrote on the subjects of poultry, health, corporal punishment, and writing itself. His 1936 book, History of Prostitution from Antiquity to the Present Day, which has been much reprinted, was the first work of its kind to promote a tolerationist, rather than abolitionist perspective. Works * The Rhode Island Red : its history, breeding, management, exhibition, and judging (?, 2nd ed. 1919) * Modern poultry-keeping (1925; 3rd ed. 1948) * Such Outlaws as Jesse James (1943, Second Impression 1945) * The truth about poultry (1927) * The truth about birth control: a guide for medical, legal & sociological students (1928) * Sex and its mysteries (1929, revised edition 1948) * Ten Ladies of Joy (1929) – profiles of Queen Elizabeth, La Reine Margot, Ninon de Lenclos, Nell Gwyn, Catherine the Great, Madame du Barry, Lady Halton, Madame de Staël, George Sand, and Lady Blessington. * Poultry Trade Secrets (1929; 2nd ed., 1939; 3rd ed.: Secrets of successful poultry-keeping (1948) * Marriage in the Melting Pot (1930) * Modern birth control methods : how to avoid pregnancy : an examination of the technique, indications for, and comparative efficacy of, birth control methods : with an appendix on the facilitation of conception (1933) * The new art of love: a practical guide for the married and those about to marry (1934) * The art of faking exhibition poultry : an examination of the faker's methods and processes; with some observations on their detection (1934) * Facts and fallacies of practical birth control : including an examination of the "natural method" of contraception, of the Gräfenberg ring, and of sterilization (1935) * A History of Prostitution from Antiquity to the Present Day (1936; revised edition 1968: Ladies of Vice: a history of prostitution from antiquity to the present day) * The Common Sense of Nudism: Including a Survey of Sun-Bathing and "Light Treatments" (1936) * Male methods of birth control : their technique and reliability; a practical handbook for men (1937) * The sex life of man and woman : a practical contribution to the solution of the problems, difficulties and dangers connected with sex, love and marriage as they affect every man and woman (1937) * The History Of Corporal Punishment: A Survey Of Flagellation In Its Historical Anthropological And Sociological Aspects (1938) * The story of baths and bathing (1939) * Encyclopaedia of Sex (1939) * The History Of Torture Throughout the Ages (1940; reprinted as A History of Torture) * Sex problems and dangers in war-time : a book of practical advice for men and women on the fighting home fronts (1940) * Phallic Worship: A History of Sex & Sexual Rites (Privately printed, 1941; 1st ed., 1966) * Produce your own eggs now, or, How to keep chickens in war-time (1941) * Successful writing: a guide to authors of non-fiction books and articles (1943) * Far Eastern Sex Life: An Anthropological, Ethnological and Sociological Study of the Oriental Peoples (1943) * Secrets of keeping healthy and living long : a practical guide (1944) * Venereal Disease: Its Prevention and Conquest (1944) * "Into whose hands" : an examination of obscene libel in its legal, sociological and literary aspects (1945) * Female methods of birth control : their technique & reliability. A practical handbook for women (1946) * Your sex questions answered : answers to three hundred questions on sex, marriage, and birth control (1947) * Sex Problems and Dangers (1948) * The History of Capital Punishment (1950) * Swan's Anglo-American dictionary (Swan publishers, 1950) * The quest for youth : a study of all available methods of rejuvenation and of retaining physical and mental vigor in old age (1953) * Far Eastern sex life: an anthropological, ethnological, and sociological study of the love relations, marriage rites, and home life of the Oriental peoples (1943) * Curious Customs Of Sex And Marriage (1953) * Flogging: Yes or No? (1953) * The History Of Cockfighting (1957) * Sex in married life : a practical handbook for men and women (1965) * Rabbit Keeping (1979)
WIKI
The sinking of the Titanic is one of the worst disasters marked in history. In mid-1912, on the dreadful night of April 14-15, off the waters of the North Atlantic, the British steamship Titanic was wrecked. Out of the 2,208 people on board, only 704 people managed to survive that night. There is no doubt that the huge ship sank due to a collision with an iceberg. However, the main question that rises is why didn’t she change course to avoid the catastrophe? The number of theories on this topic is constantly growing. Recently, a new suggestion was made by climatologist Mila Zinkova. After examining the stories of survivors after the crash, she announced that the cause of the crash could be due to a natural phenomenon known as the aurora borealis appeared in the sky. Wreck of the Titanic Though at that time the shipping company “White Star Line” assured that the 269 meters long ship was unsinkable. On April 14, 1912, at 23 hours 40 minutes, for unknown reasons, he lost his course and sank. While more than 1,500 people died, the rest of the people were rescued by the steamer Carpathia, which sailed for the distress signal. All the survivors confirmed the same thing; that the ship collided with a huge iceberg. However, they had no idea why she went off course. Reasons for the sinking of the Titanic: Scientists regularly try to unravel the mystery on the cause of the Titanic. In the course of scientific work, a variety of hypotheses are put forward. Fire in the bunker Ray Boston, who had studied the sinking of “Titanic” for more than two decades, believed that the fire on board was the cause of the tragedy. According to him, a fire broke out in the bunker even before the ship sailed. The fire was not put off because the management believed that it would not cause much damage to the vessel. However, due to the high possibility of a powerful explosion, the captain could hardly slow down. Therefore, even after discovering an iceberg, it is difficult for the captain to turn in another direction. As a result, the ship crashed into the iceberg at high speed. Unfortunately, Ray Boston has no convincing evidence, despite his theory sounds reasonable. Lawrence Beesley, a writer who survived the shipwreck, said that the northern lights could be seen in the sky that night. This is the name of the atmospheric phenomenon that occurs when the electrons ejected by the Sun interact with the magnetic field of our planet. According to him, the Northern Lights were also seen by at least three surviving passengers on the Titanic. The aurora borealis could have been triggered by a strong solar flare that caused a strong burst of electromagnetic radiation that made the compass fluctuate and alter. The ship could well turn in the wrong direction and eventually collide with the iceberg. What makes this theory relatively plausible is the fact that the technical equipment was really working very badly that night. The sinking Titanic sent SOS signals using Morse code to nearby ships, however, none of them captured them, except for the Carpathia ship. According to the conspiracy theory, it was not the Titanic that actually sank in 1912, but the ship Olympic, a ship that looked similar to it. On September 20, 1911, historical documents showed that she collided with one of the cruisers of the British Navy. Both ships were seriously damaged, but the insurance company did not consider the damage to the Olympic as significant. The ship’s owners decided to deliberately send it to an area with a lot of ice blocks to make the damage more serious. The Olympic was moving very quickly and the collision resulted in the death of thousands of people. This theory at first seemed very plausible but later on it was proven wrong. The fact is that after the discovery of the remains of the sunken ship, there was no mention of the name “Titanic” on it. However, later on the shipwreck was found building number “Titanic” – 401. And “Olympic” had number 400.
FINEWEB-EDU
Tualet pissing Improbable! tualet pissing think, that Hot vs Cold The Rx family of reactive libraries distinguishes two broad categories of reactive ardelyx fda hot and cold. This distinction mainly has to do with how the reactive stream reacts to subscribers: A Cold sequence starts anew for each Subscriber, including at the source of data. Suggest Edit to "Introduction to Bayer trade Programming" 4. Reactor Core Features The Reactor project main artifact is reactor-core, a medline library that focuses on the Reactive Streams specification and targets Java 8. Flux, an Asynchronous Sequence tualet pissing 0-N Items The following image shows how a Flux transforms items: A Flux is a standard Publisher that represents an asynchronous sequence of 0 to N emitted items, optionally terminated by either tualet pissing completion signal or an error. Mono, an Asynchronous 0-1 Result The following image shows how a Mono transforms an item: A Mono is a specialized Publisher that emits at most one item via the onNext signal then terminates with an onComplete signal (successful Mono, with or without value), or only emits a single onError signal (failed Mono). Simple Ways to Create a Flux or Mono and Subscribe to It The easiest way to get started with Flux and Mono is to use one of the numerous factory methods found in their respective classes. The preceding code produces the following output: 1 2 3 Error: java. The preceding code produces the following output: 1 2 3 4 Done The last signature of the subscribe method includes a Consumer. That variant requires you to do something with the Subscription (perform a request(long) on it or cancel() it). Otherwise the Flux hangs. An Alternative to Tualet pissing BaseSubscriber There is an additional subscribe method that is more generic and takes a full-blown Subscriber rather than composing one tualet pissing of lambdas. Instances of BaseSubscriber (or subclasses of it) are single-use, meaning that a BaseSubscriber cancels its subscription to the first Publisher if it is subscribed to a second Publisher. That is because using an instance twice would violate the Reactive Streams rule that tualet pissing onNext method of a Tualet pissing must not be called in parallel. It also has additional hooks: hookOnComplete, hookOnError, hookOnCancel, and hookFinally (which is always called when the sequence terminates, with the type of termination passed in as a SignalType parameter) You almost certainly want to tualet pissing the hookOnError, hookOnCancel, and hookOnComplete methods. You may also want to implement the hookFinally method. SampleSubscriber tualet pissing the absolute minimum implementation of a Subscriber that performs bounded requests. On Backpressure and Ways to Reshape Requests When implementing backpressure in Reactor, the way consumer pressure is propagated back to the source is by sending a request success the upstream operator. Programmatically creating a sequence In this section, we introduce tualet pissing creation of a Flux or a Mono by programmatically defining its associated events (onNext, onError, and onComplete). Asynchronous and Multi-threaded: create create is a more advanced form of programmatic creation of a Flux which is suitable for multiple emissions per round, even tualet pissing multiple threads. If you block within the create lambda, you expose yourself to deadlocks and similar side effects. Additionally, since create can bridge asynchronous APIs and manages backpressure, you can refine how to behave backpressure-wise, by indicating an OverflowStrategy: IGNORE to Completely ignore downstream backpressure requests. DROP to drop the incoming signal if the downstream is tualet pissing ready to receive it. LATEST to let downstream only get the latest signals from tualet pissing. Mono also has a create generator. It will drop all signals after the first one. Asynchronous but single-threaded: push push is tualet pissing middle ground between generate jenni johnson create which is suitable for processing events from a single producer. M I T 4. The Schedulers class has static methods that tualet pissing access to the following execution contexts: No execution context (Schedulers. With that knowledge, we can have a closer look at the publishOn and subscribeOn operators: 4. The publishOn Method publishOn applies in the same way as any other operator, in the middle of the subscriber chain. Changes the Thread from which the whole chain of operators tualet pissing Picks one thread from the Scheduler Only the earliest subscribeOn call in the chain is actually taken into account. If not defined, tualet pissing throws an UnsupportedOperationException. You can further detect and triage it with the Exceptions. The following example tualet pissing how to do so: Flux. Error Handling Operators You may tualet pissing familiar with several ways of dealing with exceptions in a try-catch block. Most notably, these include the following: Catch and return a static default value. Catch and execute an alternative path with a fallback method. Catch and dynamically compute a fallback value. Catch, wrap to a BusinessException, and re-throw. Catch, log an error-specific message, and re-throw. Retrying There is another operator of interest with regards to error handling, and you might be tempted to use it in the case described in the tualet pissing section. Tualet pissing following example shows how to do sl: Flux. If the companion Flux emits a value, a retry happens. The core-provided Retry helpers, RetrySpec and RetryBackoffSpec, both allow advanced customizations like: setting the filter(Predicate) for the exceptions that can trigger a retry modifying such a previously set filter through modifyErrorFilter(Function) triggering a side effect like logging around dna structure retry trigger (ie for backoff before and after the delay), provided the tualet pissing is validated (doBeforeRetry() and doAfterRetry() are additive) triggering an asynchronous Mono around the tualet pissing trigger, which allows to add asynchronous behavior on top of the base delay but thus further delay the trigger (doBeforeRetryAsync and doAfterRetryAsync are additive) customizing the exception in case the maximum number of attempts has been reached, through onRetryExhaustedThrow(BiFunction). Handling Exceptions in Operators or Functions In general, all operators can themselves contain code that potentially trigger an exception or calls to a user-defined callback that can similarly fail, so they all contain some form of error handling. Internally, there are also cases where an unchecked exception still cannot be tualet pissing (most notably during the subscribe and request phases), due to concurrency races that could lead to double onError or tualet pissing conditions. These cases can still be managed to some extent by using customizable baqsimi. Tualet pissing have several options, though: Catch the exception and recover from it. The sequence continues normally. Catch the exception, wrap it into an unchecked tualet pissing, and then throw it (interrupting the sequence). The following example shows how to do so: converted. Safely Produce lesbian for sex Multiple Threads by Using Sinks. Many Default flavors of Sinks exposed by reactor-core ensure that multi-threaded usage is detected and cannot lead to spec violations or undefined behavior from the perspective of downstream subscribers. Overview of Available Sinks Sinks. Many caches emitted elements and replays them to late subscribers. Further... Comments: 25.12.2019 in 13:26 Kagasida: I apologise, but, in my opinion, you commit an error. Let's discuss. 28.12.2019 in 17:25 Malasida: Prompt, where I can read about it? 28.12.2019 in 23:25 Mesar: It is a pity, that now I can not express - I am late for a meeting. But I will return - I will necessarily write that I think.    
ESSENTIALAI-STEM
Johnny Manziel Barred From Canadian Football League Quarterback Johnny Manziel’s brief foray into the Canadian Football League ended abruptly on Wednesday when the league instructed the Montreal Alouettes to terminate Manziel’s contract for an undisclosed violation of terms and then barred any of the league’s other teams from signing the former Heisman Trophy winner. The Alouettes released a statement explaining that it was following orders from the C.F.L. to cut Manziel, 26, “after it was found that he had contravened the agreement which made him eligible to play in the league.” “We are disappointed by this turn of events,” the Alouettes’ general manager, Kavis Reed, said in a statement. “Johnny was provided a great deal of support by our organization, in collaboration with the C.F.L., but he has been unable to abide by the terms of his agreement. We worked with the league and presented alternatives to Johnny, who was unwilling to proceed.” Reed told reporters in Montreal that the Alouettes had cut Manziel only because of the C.F.L. order. “No sir,” Reed said. “Mr. Manziel’s performance on the field showed that he had a very good upside. But Mr. Manziel violated the terms, and we all understood those terms and we have to be compliant with them.” Before he entered into negotiations with the Hamilton Tiger Cats last March, Manziel had to agree to several strict provisions in his contract, presumably because he had a history of substance abuse and arrests, including one related to accusations that he had struck a former girlfriend. But the specifics terms of the deal were not disclosed, and the league refused to make them public on Wednesday. “Mr. Manziel has been informed he must continue to meet a number of conditions in order to remain eligible,” the C.F.L. said in a statement last year. “These conditions, while extensive and exacting, remain confidential.” Manziel won the Heisman Trophy in 2012 after a dazzling season for Texas A&M. He was drafted by the Cleveland Browns with the 22nd overall pick in 2014 and started just eight games in two years with them. He was released in March 2016, after revelations of charges that he had struck and threatened the former girlfriend. Manziel and prosecutors came to a dismissal agreement, and he was required to seek counseling. Manziel wrote on his Twitter account that he hoped to play in the United States again. That could mean in one of two new development leagues. The Alliance of American Football began play this month. Another league, a revival of the XFL, is scheduled to begin play next February. “I look forward to exploring new options within the United States,” Manziel wrote. FREE AGENCY FOR FOLES Nick Foles rejuvenated his career in Philadelphia. Now he wants to turn his success into an N.F.L. starting job — and the Eagles intend to give him that chance. General Manager Howie Roseman told reporters on Wednesday that the team would not use the franchise tag on Foles, making him a free agent. Foles led the Eagles into the playoffs the last two seasons after their starting quarterback, Carson Wentz, was injured, and he was named the most valuable player of the Super Bowl last year when the Eagles won the title. But the Eagles were clear that Wentz, the No. 2 overall draft pick in 2016, was their established starter. “It’s hard when you have someone who is incredibly valuable to your organization, the most important position in sports,” Roseman said during the N.F.L.’s annual scouting combine in Indianapolis. “But at the same time, he deserves an opportunity to lead a team.” (AP)
NEWS-MULTISOURCE
Talk:Short Sperrin/Archive 1 Gyron engine(s) in SA/4 2nd prototype The image clearly shows just one Gyron fitted. Was the second one ever fitted? If so when? TraceyR 13:35, 1 January 2007 (UTC) * problem solved. The single Gyron was fitted to the first prototype and tested first; later the 2nd Gyron was fitted. TraceyR 20:50, 6 January 2007 (UTC) Designation sequence Surely the Sherpa should be in there - between the Sperrin and the Seamew perhaps? TraceyR 16:37, 8 January 2007 (UTC) * I've added it, though never certain where to put them if there isn't an obvious type numbering sequence in which case I tend to default to first flight. Now the Sherpa's there where does the Short SB.1 go? GraemeLeggett 17:25, 8 January 2007 (UTC) * The Sherpa was developed from the SB.1. I received the following information from Aviation Collectables, written by Rod Smith (who is, I think, Commissioning Editor at Airframer,com), but, since I'm not sure of the copyright status, I'm reluctant to place it on the main Sherpa page. I'll try to contact him and get his permission to quote from the Sherpa datasheet. * "Fortunately, very little damage had been done to the glider and, noting the comments of the pilot, it was decided to re-build the aircraft, but powered by a pair of Blackburn Engines-manufactured 3,53 lbs thrust Turbomeca Palas axial-flow turbojets. The re-designed fuselage was made in three sections, the nose of glassfibre, the centre section of light alloy and the rear fuselage of spruce and plywood. At a length of 31'10 1/2", it was almost 2' longer than the SBI and had a small fixed tricycle undercarriage. The two engines were fitted on a false deck above the centre section with intake air fed in through a NACA-type intake positioned behind the small cockpit canopy. Two fuel tanks, each holding 25 gallons, were placed under the engines and gave a flying endurance of about 45 minutes. Designated the Short SB4 and with the registration G-14-1, the silver and black aircraft was taken byroad to RAF Aldergrove from where, on 4 October 1953, Tom Brooke-Smith took it on its successful maiden flight." TraceyR 23:12, 8 January 2007 (UTC) Graeme, You are correct: the Seamew's first flight was August 1953, the Sherpa in October of the same year, so on that basis the Sherpa follows the Seamew. I don't think that the designation sequence necessessarly follows the date of first flight, but with little else to go on it is at least verifiable! By the same token, the SB.1 preceded the SA/4 Sperrin by 27 days! By the way, the Shorts Quarterly Review from that Autumn refers to the flight of 3 new prototypes in one year (the SB/5 also flew for the first time in 1953) as being "some justification for a certain feeling of achievement"! Specifications seem wrong The history seems to be contradictory. It states that the Sperrin requirements were less technically challenging than the V-bomber ones, but describes them as being exactly the same except for weight. Something appears amiss. Maury 14:49, 14 January 2007 (UTC) * The Sperrin specification was drawn up first hence the earlier spec number, B.14/46, B.35/46 being later in sequence, the second two figures denoting the year of issue - in this case 1946 * B.35/46 required a swept wing and much greater height over the target, 55,000 feet, plus a higher speed of at least 550 knots. This would put the aircraft into the realms of compressibility and so a more advanced (transonic) wing design than the one acceptable for the (subsonic) B.14/46 would be needed. In 1946 no-one had as yet broken the sound barrier, Chuck Yeager only doing so a year later in 1947. So the B.35/46 designs were seen as very risky aerodynamically and B.14/46 (the Sperrin) was used as insurance against B.35/46 encountering delays, as the Sperrin had a more aerodynamically-simpler straight wing. Two years later Vickers proposed a more advanced design than the Sperrin with better performance, but not quite as risky or with quite the performance of B.35/46, but able to enter service sooner, and this was accepted and a specification - B.9/48 - drawn up around it. This became the Valiant. * Hence the Sperrin was ordered first, then the B.35/46 (Vulcan and Victor), followed two years later by the B.9/48, the Valiant. The Sperrin was cancelled, the Valiant - as promised by Vickers - entered service first, followed some time later by IIRC, the Vulcan, and then Victor. * BTW, at 55,000 feet the speed of sound is approximately 573 knots, so B.35/46 was calling for a speed performance very near to Mach 1 at a time before the 'sound barrier' had itself been broken. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:41, 13 March 2018 (UTC) Barnes & James reference: ISBN The ISBN of Barnes' and James' "Shorts Aircraft since 1900", published in 1989 by Putnam Aeronautical Books with "new material (C) from Derek James 1989" has the ISBN 0-85177-819-6, which differs from that currently contained in the reference. I think that the ISBN should be consistent. Any objections? BTW the "British Library Cataloguing in Publication Data" includes the reference 629.133'34. Reply I asssume this coment is from TraceyR but nonetheless, the ISBN should be the accurate one in the source and since it does change according to editions and publisher, use the one that is given in your book. An American version, for example may be the exact same book but will not be obtainable from the the publisher via a different ISBN. As for the code: "629.133'34" this is part of the CIP (Catologuing in Progress or Publication) information for libraries as to placement of the book in their collection. It is a Dewey Decimal number that identifies it (this is from memory now, so beware, I may make a mistake) as 6- Applied Science 2- Engineering 9- Other branches of engineering 1- Aviation 3- by type (and the numbers after the "stroke" are there for larger libraires in order to more precisely locate the book). This number is then followed usually by the authors last name so it could typically be seen the spine of a book as a label indicating "629.133 Bar" and would then be arranged with other books on the same topic or on related topics. After all that, don't cite or quote the Dewey number. Bzuk 12:36 31 January 2007 (UTC). Short Brothers and Harland Short Brothers and Harland should be abbeviated "Shorts" in the title, not 'short' that implies small. Also, the bits presently under Vickers Valiant on the Sperrin and Sherpa, should be transferred to this entry. Ian Strachan Ian Strachan 21:49, 29 April 2007 (UTC) * In referencing a number of sources, there is a preponderance of "Short" rather than "Shorts" although this latter name was obviously used. It appears to be similar to the conumdrum of "Glosters" and "Gloster." For a check on the proper usage, look up "Short Sunderland" in comparison with "Shorts Sunderland" or "Short Stirling", etc. As to the connection to the other V-bomber programmes, there can be mention of the Sperrin being superceeded by other designs, but this article should continue to be about the Sperrin. IMHO Bzuk 22:22, 29 April 2007 (UTC). * When referring to the company it's Shorts (plural), as there were two brothers. When referring to a product of the company then its Short. Also Sperrin doesn't need to be in quotes as it's the proper name of the aircraft. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:41, 4 September 2009 (UTC) * I would endorse the previous comment, based on the aircraft names given in Barnes & James (Putnam 1989) which can be considered definitive. Throughout the history of Shorts there is one exception, the Shorts 330 family, which are referred to as the Shorts 330 (sometimes 3-30), the Shorts Sherpa and Shorts 360 (or 3-60). Scanning through Barnes & James I haven't found a reason given for this change of naming convention. For the Tucano the company reverted to the traditional form. --TraceyR (talk) 07:35, 5 September 2009 (UTC) Concrete A myth has grown up about these so-called concrete shapes. There is no real hard-evidence that they ever existed in the form alluded to here. And I worked on Blue Danube casing design and manufacture in the early 1950's. What I recollect, and is backed up by documents in the National Archives, is that 1:24 scale ballistic drop test models (that I worked on) for Canberra drop tests, and full-scale models for Python-Lincoln drop tests at Woomera had a moveable steel cylindrical weight filled with concrete ballast. Movable in order to adjust centre of gravity. Drawings of these appear in the PRO at ES1/44. By the time the Sperrin became available in April 1953 for drop tests from RAF Woodbridge, the bomb design was pretty well finalised, with the first delivery to RAF Wittering in November 1953. While it's true that the RAF did not possess any test aircraft that could carry Blue Danube to the height and speed achieved by the V-bombers, and the Sperrin came closest, the earlier development done using the Python-Lincoln achieved 34,800 feet and 275 kts, and that was probably sufficient given the time contraints. The drop tests were not solely concerned with ballistic properties, but also with stability at release, unexpected requirement for forced ejection from the bomb bay, the mechanical complexity of the flip-out tail under release conditions (and the tails breaking off), non-functioning of the barometric sensors at transonic speeds, and numerous other radar fuzing related issues. A "concrete shape" could do nothing to address those issues. <IP_ADDRESS> (talk) 14:01, 28 June 2009 (UTC) History is confusing The first para talks about B.14 but then proceeds immediately into B.35. The second para then talks about B.35, clearly outlining something that's identical to the first para. I suspect the first is supposed to be different than it currently is? Maury Markowitz (talk) 11:45, 4 December 2013 (UTC) * Yes, looking back at the article state in 2009 its significantly different. An edit in 2011 resequenced the paragraps. I shall have to see if I can't get hold of Buttler's Secret Projects book which will have the sequence of decisions and the specs. GraemeLeggett (talk) 12:23, 4 December 2013 (UTC)
WIKI
Page:The Art of Preserving Health - A Poem in Four Books.djvu/22 14 Unless with exercise and manly toil You brace your nerves, and spur the lagging blood. The fat'ning clime let all the sons of ease Avoid; if indolence would wish to live. Go, yawn and loiter out the long slow year In fairer skies. If droughty regions parch The skin and lungs, and bake the thick'ning blood; Deep in the waving forest chuse your seat, Where fuming trees refresh the thirsty air; And wake the fountains from their secret beds, And into lakes dilate the running stream. Here spread your gardens wide; and let the cool, The moist relaxing vegetable store Prevail in each repast: Your food supplied By bleeding life, be gently wasted down, By soft decoction and a mellowing heat, To liquid balm; or, if the solid mass You chuse, tormented in the boiling wave; Rh
WIKI
Page:United States Statutes at Large Volume 117.djvu/2870 PUBLIC LAW 108–189—DEC. 19, 2003 117 STAT. 2851 ‘‘(2) PRESERVATION OF OTHER REMEDIES.—The remedy and rights provided under this section are in addition to and do not preclude any remedy for wrongful conversion otherwise available under law to the person claiming relief under this section, including any consequential or punitive damages. ‘‘SEC. 307. ENFORCEMENT OF STORAGE LIENS. 50 USC app. 537. ‘‘(a) LIENS.— ‘‘(1) LIMITATION ON FORECLOSURE OR ENFORCEMENT.—A person holding a lien on the property or effects of a servicemember may not, during any period of military service of the servicemember and for 90 days thereafter, foreclose or enforce any lien on such property or effects without a court order granted before foreclosure or enforcement. ‘‘(2) LIEN DEFINED.—For the purposes of paragraph (1), the term ‘lien’ includes a lien for storage, repair, or cleaning of the property or effects of a servicemember or a lien on such property or effects for any other reason. ‘‘(b) STAY OF PROCEEDINGS.—In a proceeding to foreclose or enforce a lien subject to this section, the court may on its own motion, and shall if requested by a servicemember whose ability to comply with the obligation resulting in the proceeding is materially affected by military service— ‘‘(1) stay the proceeding for a period of time as justice and equity require; or ‘‘(2) adjust the obligation to preserve the interests of all parties. The provisions of this subsection do not affect the scope of section 303. ‘‘(c) PENALTIES.— ‘‘(1) MISDEMEANOR.—A person who knowingly takes an action contrary to this section, or attempts to do so, shall be fined as provided in title 18, United States Code, or imprisoned for not more than one year, or both. ‘‘(2) PRESERVATION OF OTHER REMEDIES.—The remedy and rights provided under this section are in addition to and do not preclude any remedy for wrongful conversion otherwise available under law to the person claiming relief under this section, including any consequential or punitive damages. ‘‘SEC. 308. EXTENSION OF PROTECTIONS TO DEPENDENTS. 50 USC app. 538. ‘‘Upon application to a court, a dependent of a servicemember is entitled to the protections of this title if the dependent’s ability to comply with a lease, contract, bailment, or other obligation is materially affected by reason of the servicemember’s military service. ‘‘TITLE IV—LIFE INSURANCE ‘‘SEC. 401. DEFINITIONS. 50 USC app. 541. ‘‘For the purposes of this title: ‘‘(1) POLICY.—The term ‘policy’ means any individual contract for whole, endowment, universal, or term life insurance (other than group term life insurance coverage), including any benefit in the nature of such insurance arising out of membership in any fraternal or beneficial association which— ‘‘(A) provides that the insurer may not— VerDate 11-MAY-2000 13:59 Aug 30, 2004 Jkt 019194 PO 00000 Frm 00787 Fmt 6580 Sfmt 6581 D:\STATUTES\2003\19194PT3.001 APPS10 PsN: 19194PT3 �
WIKI
Display Event Log What is the best way to show the event log in a readable form in a daily report? I have users that want to see what tags were written to and by whom. Is there a way to do this? Thanks Not sure what daily report you are using, but creating a table / dataset is fairly easy. Then you could use that dataset in the Reporting Module to make the report. Create a Custom Property with the type Dataset. Then select Functions as the Property Binding. Select the security → audit log and profile name, etc… The nice part about this way is you can set the filters to text fields / dropdown menus with ease. Or you can use SQL Query to get the information. (I did not change the default values.) SELECT EVENT_TIMESTAMP, ACTOR, ACTION, ACTION_TARGET, ACTION_VALUE, ACTOR_HOST, ORIGINATING_CONTEXT FROM AUDIT_EVENTS WHERE event_timestamp >= '{Root Container.Options.StartDate.date}' AND event_timestamp <= '{Root Container.Options.EndDate.date}' ORDER BY event_timestamp DESC Hope this helps. Chris That was pretty much what I was looking for! Thanks Chris.
ESSENTIALAI-STEM
Archive for November 4th, 2019 Audio Device Posted by 4 November, 2019 (0) Comment An audio device is any device that is used for voice, audio or sound-related functions such as volume and tone controls. An audio device can be an input device where it is used to record voice and music into the computer. Or can be an output device like speakers, music players and microphones. To effectively input and output sounds from a computer, one needs a computer audio device which also provides an audio element for application of multimedia like editing of videos and playing games.  An audio device driver enables the audio hardware devices to interact effectively with the computer. AudioDevice Incorrect and loose installation of this device leads to an ‘audio device error’ message which is displayed on the screen. Categories : Technology Tags :   Cordless Phone Frequencies Posted by 4 November, 2019 (0) Comment The cordless telephone is a telephone that you can carry with you as you move around. The difference between the cordless telephone and the mobile phone is that the cordless telephone is connected to the base station via a fixed telephone line just like the ordinary corded telephone. The cordless telephone is comprised of a wireless handset that uses radio waves to communicate and it requires a base station for its operation. Unlike the corded telephone that uses AC electricity the cordless uses batteries for its power. CordlessPhoneFrequencies The cordless telephone operates on Cordless Phone Frequencies. The range of the frequency of the cordless handset and headset will depend on the available frequency and it will affect the call functionality and the quality of the signal. Categories : Technology Tags :  
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Martin Šonka The result was keep. (non-admin closure) Tim Song (talk) 01:00, 15 February 2010 (UTC) Martin Šonka * – ( View AfD View log • ) Non-notable air fighter pilot. Red Bull Air Race article says that there is not yet 2010 season for it, so there is no reason for Martin Sonka to become the rookie for 2010. JL 09 q?c 16:00, 1 February 2010 (UTC) Please add new comments below this notice. Thanks, NW ( Talk ) 23:48, 8 February 2010 (UTC) * Keep This article is not great at the moment, but Martin Sonka seems notable and limited references have been added to the article.-- blue 520 08:09, 2 February 2010 (UTC) * Keep His engagement in the race attracted the attention of the Czech media: Czech aeroclub, Czech Television, Sport.cz etc. He will compete in the Red Bull Air Race only in March of this year, but we should keep this article now, he is a representant of the Czech Republic in aerobatics. --Vejvančický (talk) 11:16, 3 February 2010 (UTC) * Note: This debate has been included in the list of Czech Republic-related deletion discussions. —Vejvančický (talk) 11:38, 3 February 2010 (UTC) * Relisted to generate a more thorough discussion so consensus may be reached. * Keep Participation in two World Aerobatic Championships (which is now sourced to WP:RS) appears to meet the "Have participated in a major international amateur or professional competition" criteria from Notability (sports)
WIKI
Negotiate better by sharing a family style meal Need help closing a complicated business deal? Try sharing a meal. But not just the meal — the actual plate. While many of us try to bond or broker trust with others over a shared meal, we may be limiting the gesture's utility by ordering and being served our own individual dinners. New research from the University of Chicago Booth School of Business found that our eating style has an influence on cooperation, and that "family-style" dining, in which diners divvy up portions from shared dishes, promotes better collaboration and faster-deal making. Because this form of dining requires participants to coordinate their physical actions and consider the other person's needs while collecting their own food, it ends up extending that same cooperation into business negotiations, making people behave less competitively toward each other than they do when eating the same food from separate plates. "American business people sometimes complain about having to waste time over business meals. I can understand that. You spend all that time at work already, it seems like extra steps and people want to just cut to the chase," Ayelet Fishbach, co-author of the research and a professor of behavioral science at the University of Chicago, tells CNBC Make It. "But this research reminds people that they might not realize all they get out of eating with other people. It can facilitate your ability to work together on problems." While the kind of meal you share may seem trivial compared to the terms of the business agreement. Fishbach and her fellow researcher Kaitlin Woolley found it can have a big impact on the length of the negotiation period and a company's bottom line. The researchers paired strangers off in one of the study's experiments and gave half of the groups a shared bowl of chips and salsa while the rest ate from their own individual bowls before beginning a simulated labor negotiation. One person in each pair played the role of management while the other acted as a union representative. Their goal was to set a new wage and end a strike costly to both sides. The teams who shared a bowl of chips and salsa reached a deal in nine rounds, on average, while those who had their own dishes took four rounds longer. If each round represented a day of negotiating, the teams who didn't share food would have cost the company an extra $1.5 million in losses. "It makes sense to use this strategy to facilitate thinking about the other side's perspective to better understand and work with them," says Fischbach, who also adds that sharing plates will be most beneficial to those in ongoing relationships with their negotiation counterparts. (Those engaging in a one-time transactional-type deal, like a car purchase, needn't bother.) What surprised Fishbach and Woolley about these results was that eating together from shared plates made people more cooperative without affecting how one person felt about the other. "Usually when people are eating the same food, it signals I am like you. It makes people feel closer to each other. We thought food makes friends, but we didn't find that. Sharing plates didn't make people feel any closer," says Fishbach. Not all communal meals are equal, though. There is a "Goldilocks amount" (too much, too little, just right) that leads to the best negotiation results. When communal dishes are extremely large or constantly refilled, say at a buffet, the need to consider another person's hunger or divvy food evenly goes away, meaning so does the cooperation. The same affect happens when a clear portion is divided, such as eating a single slice of cake. Conversely, very small portions that will not feed all people present satisfactorily can also backfire by increasing competitiveness. "You need to make sure that the kind of meal you share requires you to see how much people want to eat and watch how others respond to your movements," says Fishbach. "If you don't need to look at their plates, you won't need to cooperate."
NEWS-MULTISOURCE
Page:EB1911 - Volume 28.djvu/687 Rh Wilhelm I. (Leipzig, 1897; 5th ed. 1905). In English have appeared William of Germany, by Archibald Forbes (1888), a translation of Edouard Simon’s The Emperor William and his Reign (2 vols., 1886). See also Sybel’s Founding of the German Empire (Eng. trans., New York, 1890–1891). WILLIAM II. [] (1859– &emsp;&emsp; ), king of Prussia and German emperor, was born on the 27th of January 1859 at Berlin, being the eldest child of Prince Frederick of Prussia, afterwards crown prince and second German emperor, and of Victoria, princess royal of Great Britain and Ireland. On his tenth birthday he was appointed second lieutenant in the First Regiment of the Guards. From September 1874 to January 1877 he attended the gymnasium at Cassel; he studied for two years at Bonn, and was then for some time chiefly occupied with his military duties. In 1885 he was appointed colonel of the Hussars of the Guard. He was much influenced by the military atmosphere in which his life was spent, and was more in sympathy with the strongly monarchical feelings of the emperor William and Bismarck than with the more liberal views of his own parents, but until the illness of his father in 1887 he took no part in political life. The death of his grandfather was quickly followed by that of his father, and on the 15th of June he became ninth king of Prussia and third German emperor. The chief events of his reign up to 1910 are narrated under : History, but here it is necessary to dwell rather on the personality of the emperor himself. His first act was an address to the army and navy, while that to his people followed after three days. Throughout his reign, indeed, he repeatedly stated that the army was the true basis of his throne: “The soldier and the army, not parliamentary majorities, have welded together the German Empire. My confidence is placed on the army.” From the first he showed his intention to be his own chancellor, and it was this which brought about the quarrel with Bismarck, who could not endure to be less than all-powerful. The dismissal and disgrace of the great statesman first revealed the resolution of the new ruler; but, as regards foreign affairs, the apprehensions felt at his accession were not fulfilled. While he maintained and confirmed the alliance with Austria and Italy, in obedience to the last injunctions of his grandfather, he repeatedly attempted to establish more cordial relations with Russia. His overtures, indeed, were scarcely received with corresponding cordiality. The intimacy of Russia with France increased, and more than a year passed before the Russian emperor appeared on a short visit to Berlin. In 1890 the emperor again went to Russia, and the last meeting between him and Alexander III. took place at Kiel in the autumn of 1891, but was marked by considerable coolness. By his visit to Copenhagen, as in his treatment of the duke of Cumberland and in his frequent overtures to France, the emperor showed the strong desire, by the exercise of his own great personal charm and ability, to heal the wounds left by the events of a generation before. In the autumn of 1888 he visited not only the courts of the confederate princes, but those of Austria and Italy. While at Rome he went to the Vatican and had a private conversation with Pope Leo XIII., and this visit was repeated in 1895 and again in 1903. In 1889 the marriage of his sister, the Princess Sophie, to the duke of Sparta, took him to Athens; and thence he sailed to Constantinople. It was the first time that one of the great rulers of Christendom had been the guest of the sultan. A more active interest was now taken by Germany in the affairs of the Levant, and the emperor showed that he would not be content to follow the secure and ascertained roads along which Bismarck had so long guided the country. It was not enough that Berlin had become the centre of the European system. The emperor was the apostle of a new Germany, which claimed that her voice should be heard in all political affairs, in whatever quarter of the globe they might rise. Once again, in 1898, he went to Constantinople. It was the time when the Armenian massacres had made the name of Abd-ul Hamid notorious, and the very striking friendliness shown towards him scarcely seemed consistent with the frequent claims made by the emperor to be the leader of Christendom; but any scruples were doubtless outweighed by the great impulse he was able to give to German influence in the East. From Constantinople he passed on to Palestine. He was present at the consecration of the German Protestant church of the Redeemer. By the favour of the sultan he was able to present to the German Catholics a plot of ground, the Dormition de la Sainte Vierge, very near to the Holy Places. The motive of his frequent travels, which gained for him the nickname of Der Reise-Kaiser, was not solely political, but a keen interest in men and things. His love of the sea was shown in an annual voyage to Norway, and in repeated visits to the Cowes regatta. He was a keen yachtsman and fond of all sorts of sport, and, though deprived of the use of his left arm through an accident when he was a child, he became an excellent shot and rider. At the time of his accession there was a strong manifestation of anti-British feeling in Berlin, and there seemed reason to suppose that the party from which it proceeded had the patronage of the emperor. Any temporary misunderstanding was removed, however, by his visit to England in 1889. For the next six years he was every year the guest of Queen Victoria, and during the period that Caprivi held office the political relations between Germany and Great Britain were very close. While the emperor’s visits were largely prompted by personal reasons, they had an important political effect; and in 1890, when he was entertained at the Mansion House in London and visited Lord Salisbury at Hatfield, the basis for an entente cordiale seemed to be under discussion. But after 1895 the growth of the colonial spirit in Germany and the strong commercial rivalry with Great Britain, which was creating in Germany a feeling that a navy must be built adequate to protect German interests, made the situation as regards England more difficult. And an unexpected incident occurred at the end of that year, which brought to a head all the latent feelings of suspicion and jealousy in both countries. On the occasion of the Jameson Raid he despatched to the president of the Transvaal a telegram, in which he congratulated him that “without appealing to the help of friendly powers,” he had succeeded in restoring peace and preserving the independence of his country. It was very difficult to regard this merely as an impulsive act of generous sympathy with a weak state unjustly attacked, and though warmly approved in Germany, it caused a long alienation from Great Britain. The emperor did not again visit England till the beginning of 1901, when he attended the deathbed and funeral of Queen Victoria. On this occasion he placed himself in strong opposition to the feelings of the large majority of his countrymen by conferring on Lord Roberts the Order of the Black Eagle, the most highly prized of Prussian decorations. He had already refused to receive the ex-president of the Transvaal on his visit to Europe. Meanwhile, with the other great branch of the English-speaking people in the United States, it was the emperor’s policy to cultivate more cordial relations. In 1902, on the occasion of the launching of a yacht built for him in America, he sent his brother Prince Henry to the United States as his representative. The occasion was rendered of international importance by his official attitude and by his gifts to the American people, which included a statue of Frederick the Great. The emperor also initiated in 1906 the exchange of professors between German and American universities. As regards home policy, the most important work to which the emperor turned his attention was the increase of the German naval forces. From the moment of his accession he constantly showed the keenest interest in naval affairs, and the numerous changes made, in the organization were due to his personal initiative. It was in January 1895, at an evening reception to members of the Reichstag, that he publicly put himself at the head of the movement for making Germany a sea power. In all the subsequent discussions on the naval bills his influence was decisively used to overcome the resistance of the Reichstag. “Our future,” he declared, “is on the water,” and in speeches in all parts of the country he combated the indifference of
WIKI
Bitcoin price falls by more than $3,000, dropping through $13,000 mark Bitcoin and several other major cryptocurrencies plunged Thursday evening New York time as the end of an exponential year of growth neared. The slashing decline triggered temporary, built-in trading halts in the bitcoin futures traded on the CME and Cboe. Bitcoin plunged more than 20 percent to a low of $12,504 according to CoinDesk, down more than $3,000 from $15,820 less than 12 hours ago. The digital currency recovered slightly to $13,545, as of 4:09 a.m., ET, but was still down almost 13 percent for the session. Source: CoinDesk CoinDesk's bitcoin price index tracks the price of bitcoin on Bitstamp, Coinbase, itBit and Bitfinex. Despite the sharp drop, the decline took bitcoin only to roughly two-week lows. The digital currency is still up more than 1,300 percent this year. It was not immediately clear what caused the digital currency's sudden dive. "The vast majority of long term holders of bitcoin are still way in the money and have shown no sign of cashing out," Michael Jackson, partner at venture capital firm Mangrove Capital Partners, said in an emailed comment Friday. "We see the exit of short term speculators and we have seen it before. The fundamentals are still in place and there is no reason why the bitcoin ecosystem should not continue to develop." However, the declines followed a volatile few days for cryptocurrencies. The bitcoin offshoot, bitcoin cash, soared to record highs above $4,000 Wednesday, as crypto-marketplace Coinbase made a rocky attempt to make it possible for people to buy and sell the digital currency. However, bitcoin and bitcoin cash fell Thursday, and losses accelerated in the evening. Bitcoin cash dropped almost 32 percent to $2,462 as of 4:09 a.m., ET, according to CoinMarketCap. Another digital currency, ethereum, fell 24.3 percent to $655, while litecoin fell 27 percent to $241, the website showed. The digital currencies are among the five largest by market capitalization on CoinMarketCap and have soared dramatically this year to record highs. Even with Thursday's declines, bitcoin cash is up more than 600 percent since it split from the original bitcoin on Aug. 1. Ethereum is up more than 9,000 percent this year, and litecoin is up more than 6,500 percent, according to CoinMarketCap. Each of those digital currencies aims to improve on some aspect of bitcoin, such as transaction speed or ease of integration with applications. Ripple, or XRP, was the only major cryptocurrency trading higher on Friday. Ripple topped the psychologically key $1 level earlier Thursday, and its gains accelerated throughout the session to a record high of $1.38, according to CoinMarketCap. As of 4:09 a.m. ET, ripple was trading at $1.10 with a market value of $42 billion, the third-largest just behind bitcoin and ethereum, according to CoinMarketCap. Ripple is up a staggering 19,500 percent this year, the website's data showed. Ripple is officially the name of a startup using blockchain technology to develop a payments network for banks, digital asset exchanges and other financial institutions. XRP is the digital coin that network participants use for transactions. Cryptocurrencies such as bitcoin are notoriously volatile. But so far, they have also proven quite resilient. Bitcoin has bounced back from several declines of more than 20 percent this year to reach new record highs.
NEWS-MULTISOURCE
Description SearchCellEditor에서 searchLength와 searchDelay조건이 만족하면 발생한다. 또는 Ctrl+Enter키 또는 Enter키를 입력시 발생한다. Syntax function onEditSearch(id, index, text) Arguments id Type: GridBase GridBase 컨트롤 index Type: CellIndex 변경된 CellIndex text Type: * 셀이 입력된 값 Return None. Examples var CustomerNames = ["ALFKI", "ANATR", "ANTON", "AROUT", "BERGS", "BLAUS", "BLONP", "BOLID", "BONAP"]; gridView.onEditSearch = function (grid, index, text) { console.log("onEditSearch:" + index.itemIndex + "," + index.column + ", " + text); var items = CustomerNames.filter(function (str) { return str.indexOf(text) == 0; }); console.log(items); gridView.fillEditSearchItems(index.column, text, items); }; /* ajax를 이용해서 처리하는 경우. */ gridView.onEditSearch = function (grid, index, text) { if (index.column == "colName") { var data = {"serachKey":text}, $.ajax({ url : "/searchUrl", type:"post", data:data, success:function(data, textStatus) { var labels = []; var values = []; if (data && data.resultList) { for (var i = 0, size = data.resultList.length; i < size; i++) { labels.push(data.resultList[i].codeName); values.push(data.resultList[i].code); } } grid.fillEditSearchItems(index.column, text, values, labels); } }); } }
ESSENTIALAI-STEM
wiki:DailyReminderScriptForTracScript Version 5 (modified by Ryan J Ollos, 9 years ago) (diff) Fixed links to related tickets. A daily reminder script for Trac, sends HTML mail for each not closed ticket owner Notice: This plugin is unmaintained and available for adoption. Description This is a script for sending daily reminder emails of tickets owned (like one's notice scripts, or todo scripts). The script searches the ticket status, and if one's status is not closed, it collects by owner and sends each of them a html mail. This is a ptyhon script The underlying database connection relies on python's db capabilities, so probably you will have to install the appropriate db connector module(s) for your db. (MySQL: mysql-python, PostgreSQL: psycopg2, SQLite: sqlite2 or sqlite3) - and of course you'll need python 2.6 as well... It is tested on Trac 0.11 with PostgreSQL 3.10 on a Gentoo box. (I didn't test it on other platforms, but it isn't used to be very hard to adopt this tiny script to suit your needs... - like me: I have copied TicketReminder script, and just customized it ;) ) I know it could be written more efficient, and a nicer code. For now it is enough :) Feel free to adopt it to your needs, please test it, use it! See also: TracReminderScript, TicketRemindScript Bugs/Feature Requests Existing bugs and feature requests for DailyReminderScriptForTracScript are here. If you have any issues, create a new ticket. Download Download the zipped source from [download:dailyreminderscriptfortracscript here]. Source You can check out DailyReminderScriptForTracScript from here using Subversion, or browse the source with Trac. Example One should put in a cronjob, ie: /etc/cron.d/trac_remind.cron 0 0 * * mon-fri root /path/to/this/script/trac_reminder_report.py (don't forget to put a MAILTO=your.address@… into the cron file, the script prints out the recipients names where the mails had been sent) Recent Changes 8683 by rjollos on 2010-09-08 08:04:47 Importing attachment from project's wiki page. 7854 by ethanole on 2010-04-16 15:17:46 New hack DailyReminderScriptForTracScript, created by ethanole (more) Author/Contributors Author: ethanole Maintainer: ethanole Contributors:
ESSENTIALAI-STEM
How Does Fixed Wireless Work? Understanding Point-to-Point and Point-to-Multipoint Connections How Does Fixed Wireless Work? Understanding Point-to-Point and Point-to-Multipoint Connections Point-to-point (PTP) and point-to-multipoint (PTMP) connections are staples of fixed wireless networks and broader telecommunications architecture. PTP is the simplest form of network architecture. It enables the connection of two locations using a wireless radio link. The most obvious examples of a PTP connection are fixed wireless connections or two-way radios. In contrast, PTMP communication systems distribute a radio signal from one location to several others. This technology enables television and radio networks to broadcasts their content. The two methods of connectivity have distinct attributes and subsequent advantages and disadvantages. Point-to-Point ConnectionA point-to-multipoint connection in Atlanta, GA As outlined previously, PTP connection links two locations. This association begins with a single transmitter which communicates with to a single dedicated receiver, meaning the entire channel capacity is reserved for the the two connected devices. This type of configuration facilitates a wireless data transfer at speeds ranging from 100Mbps to 10Gbps. Depending on line of sight between the two devices, PTP radios can communicate over a range of more than 20 miles and operate on both unlicensed and licensed radio frequencies. If a network solely consists of point-to-point connections, the data packet will have to travel through a number of intermediate devices. The distance that the data packet travels will affect the quality of connection, so it’s important to find the smallest distance or shortest path between the transmitter and the receiver. Fixed wireless utilizes PTP connections between two fixed locations to provide end-users with a high-speed  and uninterrupted broadband connection. This dedicated link provides customers with a secure link and a cost effective way to transmit data. In addition, the connection can be set up and installed with ease. A point-to-point connection works best when only one location relies heavily on significant data transmission. Fixed wireless tower in Atlanta, GAPoint-to-Multipoint Connection A multipoint connection involves the link from a single transmitter being shared between multiple receivers. It’s important to note that in a PTMP connection, receivers do not communicate with each other but instead all have a single connection with the main base or access point. Point-to-multipoint connections are common for wireless internet service providers. ISPs place a radio transmitter on top of a tall building or hilltop with a clear line of sight to multiple receiving radios. PTMP networks operates in both unlicensed and licensed frequencies bands with speeds of up to 1 Gbps. This type of connection is ideal when distributing less data to more recipients. The Key Differences There are several major differences between point-to-point and point-to-multipoint connections: 1. PTP involves a single dedicated link. PTMP involves the sharing of a single link with two or more devices. 2. In a PTP connection, the entire channel capacity is used by only the two devices in the connection. PTMP connections involve the sharing of a connection with multiple devices. 3. In a PTP connection, there can only be a single transmitter and receiver. In a PTMP link, although there can only be a single transmitter, there can be multiple receivers. Point-to-point and point-to-multipoint architecture contribute to the ever-improving technological capabilities of wireless infrastructure. The most effective fixed wireless providers recognize the benefits of PTP and PTMP and integrate the two as part of a diverse and comprehensive network. As wireless technology continues to progress, there is little doubt that the importance of fixed wireless and this adaptable technology will continue to grow. One Ring Networks provides customized fixed wireless solutions to suit companies of all sizes. Contact us for information at 404-303-9900 or [email protected] CONTACT US Sam Mountstephens Tags: Fixed Wireless You also might be interested in Why Upload Speeds Matter Upload speeds represent the amount of data sent from your device to the internet in a given... An In-Depth Comparison of Satellite v. Fixed Wireless Internet Although, often perceived as similar Internet solutions, fixed wireless and satellite... LEAVE A REPLY Subscribe to Email Updates What We Do Customer Testimonial "Very reliable Internet service with very responsive customer service. One Ring served us when no one else could. We have recommended them to many others" - Carey Dula, MI-BOX Moving and Mobile Storage
ESSENTIALAI-STEM
Talk:Special administrative regions of China/Archive 1 Disambiguation * Note: This article was previously titled Special Administrative Region. Some of the discussions below predate the creations of special administrative region (disambiguation) (talk) and special administrative region (Republic of China) (talk). Freedom of Movement? One thing this article does not discuss is the freedom of movement of Chinese citizens and SAR citizens. Can mainland Chinese live in Hong Kong and vice versa? The article makes the SARs sound like de facto independent countries only vaguely referring to 'immigration' policies. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:49, 20 April 2009 (UTC) cat dependent territory an SAR is not a dependent territory. InstandNood, you gave up that argument at HK and Macau, why are you trying to make it here? SchmuckyTheCat 02:11, 15 Mar 2005 (UTC) Special administrative districts of the ROC On this map (published in 1964) "Hainan Special Administrative District" is used instead of "Special Administrative Region". &mdash; Instantnood 16:00, May 17, 2005 (UTC) * This is certainly not the first time inconsistent translations have given us problems... -- ran (talk) 16:54, May 17, 2005 (UTC) * Eh very true.. headache.. &mdash; Instantnood 18:14, May 17, 2005 (UTC) ''The content on the special administrative regions of the ROC had been split to special administrative region (Republic of China). &mdash; Instantnood 17:34, 27 December 2005 (UTC) ROC I fail to see why the ROC infobox should be on this page, it's entirely historical. But, since it is, I moved it mid-point in the section because it doubles up horizontally instead of vertically at my (current) viewing resolution (1280 on firefox, I'm sure it's still broken at 1680). Is there a way to force two right justified templates to a vertical layout? SchmuckyTheCat 20:44, 4 August 2005 (UTC) ''The content on the special administrative regions of the ROC had been split to special administrative region (Republic of China). &mdash; Instantnood 17:34, 27 December 2005 (UTC) Capitalisation There is currently a debate over whether the title of this article has to be capitalised, i.e. s pecial a dministrative r egion or S pecial A dministrative R egion. Relevant sources: , relevant previous/ongoing discussions [1] [2] [3]. &mdash; Instantnood 17:34, 27 December 2005 (UTC) * This has now been listed on HK wikipedians' notice board. enochlau (talk) 04:28, 5 January 2006 (UTC) Aceh and East Timor The article needs either (1) to be rewritten to use the term as a generic and include reference to the Special Administrative Region of Aceh and other proposed SARs in Indonesia such as the fomrer province of East Timor and the Province of Papua or (2) to be moved to Special Administrative Region (China) with a separate article on Special Administrative Region (Indonesia). I'd argue for option (1) to avoid the mess that exists around Federal district and National Capital Territory. Alan 15:50, 5 December 2005 (UTC) * Hmm.. sometimes the most well-known and common usage is kept under a title as it is, with the disambiguation page under the title [ [subject matter (disambiguation)]]. As for special administrative region I'd say it's most commonly associated with Hong Kong and Macau, as reflected by the links to the article and Google test. Of course you may say it's systemic bias, but then as for the time being I'd prefer keeping this article at where it is, with the rest at special administrative region (disambiguation) . This can be changed at anytime by community consensus. &mdash; Instantnood 17:56, 27 December 2005 (UTC) ''The content on the special administrative regions of other sovereign states had been split to special administrative region (disambiguation) (talk). &mdash; Instantnood 19:01, 22 April 2006 (UTC) Administrative division There's currently a debate on whether the special administrative regions of the PRC are administrative divisions, at talk:list of China administrative divisions by population. &mdash; Instantnood 18:59, 22 April 2006 (UTC) * That isn't a debate, that is you being obstinate and denying reality to everyone else involved. That you disagree doesn't mean concensus isn't clear. SchmuckyTheCat 22:30, 27 April 2006 (UTC) * If that were the reality, please justify it be presenting the necessary evidence over there. Thanks in advance. &mdash; Instantnood 22:39, 27 April 2006 (UTC) * I did, and so did Ran. The question presented to you to define what HK is, if not an administrative division, has been left unanswered five times. SchmuckyTheCat 22:41, 27 April 2006 (UTC) * As explained, I speak only from facts and evidence, not speculations. I posess no evidence to answer the question, neither do you or user:Ran. &mdash; Instantnood 22:45, 27 April 2006 (UTC) * I also would like to see the evidence, that Instandnood asks for. IMO it should be presented here and not in a divisions by population page. Tobias Conradi (Talk) 21:43, 1 May 2006 (UTC) * What evidence, then, Tobias? The category being removed here already contains a subcategory for the two SARs. This article describes the situation of the two SARs. In the context of the PRC and the categorization scheme here, "administrative division" is a generic all-encompassing term for all the PRC divisions: regions, prefectures, municipalities, provinces, districts, SARs, etc. Instantnood wants to claim that Hong Kong is something "other" than an administrative division, which, because the term used here is all-encompassing, essentially puts it outside the PRC organizational structure entirely. SchmuckyTheCat 21:59, 1 May 2006 (UTC) * Some user wanted to divide all country subdivisions worldwide into political division and administrative divisions. E.g. he marked the US states as PD. But hmm, since the thing is call administrative region, it looks as if it were an administrative division. Tobias Conradi (Talk) 22:23, 1 May 2006 (UTC) * Yah, I am somewhat aware of WAS and his silly "must put everything into binary organization buckets" campaigns. This, afaik, isn't related to that. SchmuckyTheCat 00:13, 2 May 2006 (UTC) * (response to user:SchmuckyTheCat comment at 21:59, May 1) " In the context of the PRC and the categorization scheme here, "administrative division" is a generic all-encompassing term for all the PRC divisions: regions, prefectures, municipalities, provinces, districts, SARs, etc. ", " because the term used here is all-encompassing, essentially puts it outside the PRC organizational structure entirely. " - In the 1982 Constitution of the PRC, shěng, zhíxiáshì and zìzhìqū are actually explicitly stated to be administrative divisions ("中华人民共和国的行政区域划分如下: ..") Nowhere in the Constitution, the two basic laws and any other law had special administrative region, or the existing special administrative regions, been explicitly stated to be administrative divisions in the same manner. &mdash; Instantnood 20:00, 5 May 2006 (UTC) Inst, do you mean HK and Macao are seperate countries (e.g. they still have their own ISO 3166-1 codes, as have Isle of Man, Guernsey, Jersey since some days) and therefore should not be regarded as part of the PRC-gov/admin system? Maybe it's like a continuum, departments of France have very little rights, US states more, and the PRC-SARs even more. And the EU members again more, within the EU. Possibly only few people would regard Germany as administrative division of the EU. But that depends on the definition of these divisions. All UN members are kind of divisions. They have very much rights, but the UN has the "right" to intervene - or at least thinks so. Tobias Conradi (Talk) 11:20, 2 May 2006 (UTC) * The discussion here deals with legal and constitutional designations. The 1982 Constitution of the PRC explicitly states something are administrative divisions, but special administrative regions are not stated to be. Please refer to talk:list of China administrative divisions by population for more details. &mdash; Instantnood 20:00, 5 May 2006 (UTC) * so the disagreement stem from the two views: A.D. seen as legal term, or A.D. seen more as generic. Tobias Conradi (Talk) 22:00, 5 May 2006 (UTC) * Legally and constitutionally speaking, there's no evidence stating they are. Seen as a generic term, justification has yet to be presented. User:SchmuckyTheCat has simply claimed they are. &mdash; Instantnood 05:30, 6 May 2006 (UTC) * only by semantics can you make either statement. It's an entirely silly argument. SchmuckyTheCat 17:41, 6 May 2006 (UTC) PRC's offer to Taiwan I have modified this section a bit, would someone please check it for NPOV and accuracy? Preferably someone more knowledgeable in the study of political science and law. Also, I have reviewed previous edits, and I found it rather funny that someone wrote that Taiwan would lose its multi-party governments and that a Taiwanese Communist party would be formed. From what I know, if Taiwan becomes an SAR the government system and parties will not be (or should not be) interfered by the PRC. Hong Kong has its own democratic system and retained the whole government structure in 1997, I doubt that the PRC would revoke these privileges from Taiwan, especially if Taiwan's freedom rating is ranked higher than the one of the United States, and that Taiwanese citizens are extremely sensitive to human rights issues. What a riot that would be if the PRC started to interfere with how Taiwan's politics should work, and I doubt that the PRC would succeed in doing so. If the PRC does decide to do this, it would be imminent that Taiwan will start trying to be independent again, as the main reason that Taiwan would be convinced to reunite peacefully with the PRC would be that it increases economic trade and allows economic influence sharing (although not economic SYSTEM sharing, that would be still distinct and controlled by the individual regions of administration) and not that it allows the PRC to give Taiwan any better ways of governing, since it is very obvious that every region that has been governed a certain way cannot change in a blink of an eye. Although I do see possible PRC power swallowing, or even vice versa. What I can see is that in the case of reunification, Taiwan will guard most of its freedoms because the PRC wouldn't dare try to revoke them in an attempt to avoid civil unrest or another independence attempt. If the PRC was so oppressive they would have already used other measures of unifying Taiwan. Sooner or later these SARs won't be needed anymore, because of power swallowing. Lets all hope all administrations move their governments towards the correct direction. Dooga Talk 06:38, 9 June 2007 (UTC) One thing that seems to be missing from this section is any explanation for why Taiwan doesn't want to accept China's offer. The wording "However, the government of the Republic of China (ROC) that is governing Taiwan refuses to accept the offer." seems to suggest that Taiwan is just being stubborn. I'll try to think of better wording, but as for the reasons that Taiwanese refuse to surrender their sovereignty to China, I can think of many reasons I wouldn't do so, but I don't have any thing I can cite to say what reasons the Taiwanese have. Readin 05:32, 28 October 2007 (UTC) * Taiwan is not a sovereign nation, just because she controls her territory within her own boundaries does not make her a sovereign nation. The question is no sovereign, but administration and jurisdiction within a sovereign country called China, which is disputed at this moment. The reference provided in the article does not state clearly how foreign diplomacy would be handled for the proposed Taiwan SAR. Foreign relations seem left out of the proposal. However, it does say the proposed Taiwan SAR would "retain" legislative powers, and one of the powers of the current Taiwan legislature is to make laws about relationships with other countries. On the other hand, it says Taiwan would need to send reprentatives to Beijing to discuss "national" affairs. Does anyone know of any sources that address how Taiwan would handle foreign affairs if it accepted the SAR proposal? Readin 05:55, 28 October 2007 (UTC) * To Dooga: This discussion section isn't to discuss the feasibility or viability of such measures, this isn't a forum. Please talk about this in place more fitting than Wikipedia discussions. Thank you. Typographical error? re: this part: The PRC has offered Taiwan a similar status to that of an SAR if it accepts mainland rule; however the Republic of China government refuses to accept the offer, and most polls indicate that only around 10 per cent of the Taiwanese electorate support it. Should this not be: The PRC has offered Taiwan a similar status to that of an SAR if it accepts mainland rule; however the Taiwan government refuses to accept the offer, and most polls indicate that only around 10 per cent of the Taiwanese electorate support it. Otherwise it does not make sense? —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 11:40, September 7, 2005 (UTC) * Should be ROC government, and electorate of the ROC. &mdash; Instantnood 17:34, 27 December 2005 (UTC) Yes it should be RoC, which still claims legitimacy of rule over Mainland China, along with Mongolia and a few other pieces <IP_ADDRESS> (talk) 05:53, 8 April 2009 (UTC)Rak Freedom of Movement? One thing this article does not discuss is the freedom of movement of Chinese citizens and SAR citizens. Can mainland Chinese live in Hong Kong and vice versa? The article makes the SARs sound like de facto independent countries only vaguely referring to 'immigration' policies. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:49, 20 April 2009 (UTC) Capitalisation (reprise) I believe the name of this article should be Special administrative region of the People's Republic of China or (perhaps) Special administrative regions of the People's Republic of China. I believe this on the following grounds: 1) Usual English usage is not to capitalise the first letters of common nouns. A common noun is defined as any noun other than the name of something that has a unique identity. As there are at least two special administrative regions (Macau and Hong Kong) and others have been at least discussed, it follows that the subject of this article is a common noun. Essentially the article is about a concept, not about a particular SAR. 2) Article 31 of the constitution of the Peoples Republic of China clearly agrees with me. As you can see here it says: * The state may establish special administrative regions when necessary. The systems to be instituted in special administrative regions shall be prescribed by law enacted by the National People's Congress in the light of the specific conditions. 3) Likewise the DECISION OF THE NATIONAL PEOPLE'S CONGRESS ON THE BASIC LAW OF THE HONG KONG SPECIAL ADMINISTRATIVE REGION OF THE PEOPLE'S REPUBLIC OF CHINA agrees with me in quoting that clause of the constitution with exactly the same capitalisation. Please don't be distracted by the capitalisation of the name Hong Kong Special Administrative Region of the People's Republic of China or for short Hong Kong Special Administrative Region. Because there is only one of them, this is a proper noun and the different capitalisation in that case is correct. I attempted to move the article, but was reverted by User:HongQiGong who requested I discuss the change first. So here it is. -- Starbois (talk) 17:20, 8 December 2009 (UTC) * The term "special administrative region" may be a common noun, but what about "Special Administrative Region of the People's Republic of China"? Is that not a proper noun? Like for example: Vice President of the People's Republic of China, Vice Premier of the State Council of the People's Republic of China, Chief Executive of Hong Kong, etc. * Here is the relevant bit of what WP has to say about proper nouns: * Proper nouns (also called proper names) are nouns representing unique entities (such as London, Jupiter or Johnny), as distinguished from common nouns which describe a class of entities (such as city, planet or person). Proper nouns are not normally preceded by an article or other limiting modifier (such as any or some), and are used to denote a particular person, place, or thing without regard to any descriptive meaning the word or phrase may have. * In English and most other languages that use the Latin alphabet, proper nouns are usually capitalized. ... The convention of capitalizing all nouns was previously used in English, but ended circa 1800. * As far as the examples you quote are concerned, I guess it depends whether you are actually using the name to refer to a specific individual holding the post, in which case caps are fine, or are referring in a more general way to the post itself, in which case they are not. * To quote some examples that is perhaps a little closer to special administrative regions, I'd point out the capitalisation in the following article titles: * Autonomous regions of the People's Republic of China * Autonomous prefectures of China * which follows my suggestion. -- Starbois (talk) 18:36, 8 December 2009 (UTC) Excessive links This page has a lot of links for the definition of general terms for features of a country. Do we really need a link for the standard definition of autonomy, government, postal system, legal system, and the like? They'd be useful if the links were to pages about how these features exist are are implemented in sar's, but the general definition just adds clutter to the article. I'd edit them out myself, but I'm not sure there isn't a good reason for them (I'm don't do wiki's that much). Dstarfire (talk) 18:29, 23 June 2013 (UTC) "not part of Mainland China" This is a rather bold statement that is provided, so far as I can tell, without sourcing. Can someone please supply a source that the SARs are not to be considered part of the People's Republic of China? A region can be autonomous and still be part of the country. --Golbez (talk) 14:47, 17 May 2013 (UTC) * No doubt those SARs are part of PRC. Wonder where does this claim come from. SilAshkenazi (talk) 06:40, 24 June 2013 (UTC) * Since 1 July 1997 mainland China ≠ PRC. GotR Talk 06:59, 24 June 2013 (UTC) * OK, I'll grant that. But are they part of the PRC? Because the article waffles on that, simply saying they fall under the 'sovereignty' of it. --Golbez (talk) 13:13, 24 June 2013 (UTC) * Yes, and the lede of the PRC article confirms it. GotR Talk 16:35, 24 June 2013 (UTC) Tibet and Xinjian Are there claim Special administrative region status for Tibet and Xinjian? --Kaiyr (talk) 14:04, 24 December 2013 (UTC) Wikipedia is not a crystal ball. See WP:NOTCRYSTALBALL. Speculation has no place here. Also have a look at WP:SPS which is part of WP:RS. Blogs are not reliable sources.Rincewind42 (talk) 15:28, 30 December 2013 (UTC) Wolong I'm wondering that if Wolong is one of the three S.A.Rs as it's a completely different region. It is ruled by forestry department and it has no independent government or colony issues. I think that it should not be classified with Hong Kong and Macau. -- unsigned comment by Tom1581 * It is officially known as the (Wenchuan) Wolong Special Administrative Region, as pointed out by sources. It is different from Hong Kong and Macau in that it is not provincial level and it does not follow the "One country, two systems" principle. However, it is still a SAR within the PRC, which needs to be mentioned in this article. --Cartakes (talk) 14:26, 22 July 2015 (UTC) No lease of Macau Macau was never on a lease to Portugal, unlike most of Hong Kong (the New Territories) was to the UK, although the PRC didn't recognise any 'unfair and unequal treaties' signed before 1949. In 1976, Portugal redefined Macau as a Chinese territory under Portuguese administration, having earlier offered it back to China two years earlier.Quiensabe 23:22, 8 November 2007 (UTC) * Portugal paid land rent to Qing dynasty for Macau for a very long period of time... Read up on history section of Macau. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:27, 12 July 2011 (UTC) * Portugal first bribed Ming Dynasty officers then paid land rent to Ming. Afterwards, Qing signed a treaty with Portugal which agrees Portugal may "occupy forever" on the land. This is a vague term, one may say it's rent one may say it's not.Xxjkingdom (talk) 07:44, 8 September 2015 (UTC) Call for Protection * Stop adding Wolong to this page. Wolong and administrative units of her status (if there is any) should start its own page. The structure and status of Wolong is entirely different from Hong Kong and Macau. The later ones are autonomous/dependent territories with their own currencies, limited diplomatic status, flags, etc. It is possibly a vandalism as one wiki user alone is using wikipedia as a way to advertise his not widely acceptable belief. In order to stop this vandalism, I request a full protection to the site.Xxjkingdom (talk) 09:59, 4 September 2015 (UTC) * Padlock-dash2.svg Not done: requests for increases to the page protection level should be made at Requests for page protection. &mdash; Martin (MSGJ · talk) 10:54, 4 September 2015 (UTC) * In fact, User:Xxjkingdom is the one who is trying to vandal the page. He claimed in the article that the PRC established several "Special Administrative Region" in Mainland China, which is definitely not the case. There are in fact three SARs in total within PRC, Hong Kong, Macau and Wolong SAR, with only one SAR (i.e. Wolong) within Mainland China. --Cartakes (talk) 17:11, 4 September 2015 (UTC) Xxjkingdom: There are already sources provided above to state that Wolong is a SAR. And please also stop claiming that the PRC established several SARs in Mainland China in the article. Have you noticed that you are in fact contradicting with yourself by saying Wolong is not a SAR and Wolong is one of the SARs in Mainland China at the same time. Clearly, you are the one who is messing things up. If you have dispute, discuss properly in the talk page instead of edit warring. Thanks. --Cartakes (talk) 01:39, 7 September 2015 (UTC) Cartakes: I have not mentioned that PRC established several SARs in Mainland China in my latest edit. You are right in this case. You should stop messing up Wolong with Hong Kong and Macau as well. My latest edit has already show a portion to introduce Wolong and Sinuiju for reader's reference. Stop reverting my edit.Xxjkingdom (talk) 01:48, 7 September 2015 (UTC) * I did not mess up Wolong with Hong Kong and Macau or changed the scope of this article. Before my edits to this article this article is already about the "Special Administrative Regions of the People's Republic of China" (which is and was the bold text in the first sentence of the article). I merely added Wolong, another SAR of the PRC into the article. I already mentioned in the article that Wolong had a different nature than the Hong Kong and Macau, so I did not mess them up. There are simply two types of SARs within PRC, both types should be listed. In total there are three SARs in PRC. However, you added the SAR of North Korea to the article which essentially changed the scope of this article. So you are the one who is trying to change the scope of the article without any discussion. Furthermore, you have already violated the 3RR policy of Wikipedia by reverting 4 times of this article today. --Cartakes (talk) 02:03, 7 September 2015 (UTC) * Please stop claiming SARs as provincial level administrative unit. SARs are neither province nor provincial level. None of the provinces share similarity in the level of autonomy and status as the SARs. For example, can any provincial level administrative unit in any country of the world has their own Olympic team and can participate in numerous International Organization as an individual member? "Provincial Level" is not an official term and could not be found in either the Chinese Constitution or the HK and Macau Basic Laws. Thus, it is more appropriate to treat SARs as special cases, special cases directly responsible to the Central Government, as stated on the Chinese Constitution Article 31, or simply change the term "provincial-level" to "First-level" to avoid further confusion. It is like Guam neither a state nor state-level and Gibraltar neither a kingdom nor kingdom-level.Xxjkingdom (talk) 02:08, 8 September 2015 (UTC) * You, please stop claiming that SARS are not provincial level units. I am telling you that I am 100% sure you are wrong about this. Provincial-level division does not simply mean provinces. Provinces, as well as autonomous regions (e.g. Xinjiang and Tibet AR), state-controlled cities (e.g. Beijing) and SARs (HK and Macau) are all provincial-level divisions. Assuming you can understand Chinese, please look at the following page: 中华人民共和国行政区划, which says: * 目前中国有34个省级行政区,包括23个省、5个自治区、4个直辖市、2个特别行政区. * English translation: * Currently China has 34 provincial-level divisions, including 23 provinces, 5 Autonomous Regions, 4 state-controlled cities and 2 Special Autonomous Regions. * Since Wikipedia is based on reliable sources, we are going to write articles based on sources, not assertions. If you want more sources, I can add more. But again I am telling you now I am 100% sure you are wrong about this. --Cartakes (talk) 02:44, 8 September 2015 (UTC) * First of all, that is just a website, not back up by Constitution or Treaty. If you would like to prove your word, you are welcomed to show us the Constitution and Treaty that could back up your claim. Second, you cannot rely solely on the Communist government's word when interpreting affairs that have international background, because they could be bias and Communist-centric. For example, you cannot claim Taiwan is a province as if what the Communist has claimed, because they would ignore the de jure and de facto existence of the Nationalist. Also, you cannot claim Diaoyu Island is a Chinese territory simply based on the Communist advocation, because they would ignore the de jure and de facto existence of Japan. The Chinese Communist government claims Hong Kong Pan-democracy camp are "Anti China Anti Hong Kong's gang" and "traitors to Han Chinese", yet it does not meet a neutral standard to adopt the communist claim, as they receive wide support from Hong Kong citizens, and are patriotic in their ways. For Hong Kong and Macau affairs, they are backed up by international treaties including the Sino-British and Sino-Portuguese Joint Declarations. SARs establishment is based on Joint Declarations, Chinese Constitution, and the Basic Laws together. While none of these documents claims that SARs are provincial level, and no joint agreement was established since then, simply relying on source from the Communist that published after the establishment of the above documents, and ignore the de facto and de jure situation in Hong Kong and Macau, as well as the opinions from the international (for example, the U.S.-Hong Kong Policy Act treated HK with a status higher than ordinary provinces) is unfair and not politically neutral. It is because Communist government is not the sole party to the affair. Therefore, source from the Communist point can only show the view of the communist government towards Hong Kong and Macau, something closer to Taiwan Province, People's Republic of China than an objective point of view, but ignore the de jure international background and the de facto different nature and status of the SARs, when compared with province. Meanwhile, my suggestion of replacing the term "provincial-level" with "first level", does not only politically neutral, it also totally fits the Chinese Communist's claim of "一级地方行政区域" (First level administrative region). Therefore, there is no point to blame the term "First Level" as it is by now a fair and accurate term to all parties. It is suggested that "First Level" is a better term to use.Xxjkingdom (talk) 07:03, 8 September 2015 (UTC) * First, you must note that according to RS, Wikipedia is based on reliable secondary sources, not primary sources. The source given above is a government website, which at least shows that PRC does consider that the SARs as provincial level divisions. On the other hand, the book "Microregionalism and Governance in East Asia" by Katsuhiro Sasuga (Page 44) clearly states that the two SARs are provincial-level (it says "The country is divided into four kinds of provincial-level administrative regions (22 provinces; 5 autonomous regions; 4 municipalities; and 2 special administrative regions, excluding Taiwan)". This is an example of reliable secondary source (there are many more such sources), which is what Wikipedia is based on. On contrast, Constitution and Treaty are primary sources, which are used in Wikipedia only in certain cases. In the cases there are sources conflicts, such as the case of Taiwan, we handle them according to the instruction of WP:RS (that is why we say PRC claimed Taiwan as a province in Wikipedia). Second, "provincial-level" is consistent with other terms such as "Prefectural level" and "County level", which are all used in relevant articles to denote the level of administrative divisions within China. Don't push the term "First-level" when terms such as "Second-level" and "Third-level" are not found. As mentioned earlier, "provincial-level" does not simply mean provinces, but at the same level as provinces. Actually your logic is very flawed: if SARs like Hong Kong are first-level divisions just like other provinces as shown in Template:Province-level divisions of China, then it means SARs are in fact in the same level as these provinces (no matter how autonomous they are), so SARs are provincial-level too. This contradicts with your claim that SARs are not provincial-level. Third, you may be WP:Bold to change articles contents such as Administrative divisions of China, but when your edits got reverted, please follow the WP:BRD cycle to properly discuss the situation instead of edit wars. Thanks. --Cartakes (talk) 13:35, 8 September 2015 (UTC) * First of all, keep calm. This is a discussion, not a conflict. You last point may apply to you and me, which forms a good point. For your first point, as I have mentioned above, your source reflects only the view of the communist government and pro-communist scholars. Because the term "provincial level" is not written on the three legal pillars of the SARs: the international declarations, Chinese constitution, and the SARs' Basic Laws. It is necessary to respect views from different perspectives in this case, because "provincial level" is just the view and judgement of one of the several parties involved in this matter. Second, "first level" is different from "provincial level". "First level" highlights the common ground of the provinces, autonomous regions, municipalities, and SARs. The common ground is that they are the first tier administrative units, directly under the central government, as stated in the Chinese Constitution Article 30 for provinces, autonomous regions, and municipalities and Basic Laws Article 12 for the SARs. Meanwhile, "provincial level" does not focus on the common ground, but treat others as if they are "something like a province". For we know, province has particular characteristics, with being the first tier administrative units only one of the characteristics. Other implications including being a region as normal administrative unit, a region without limited independent foreign affairs, without the right to exercise a high degree of autonomy and enjoy executive, legislative and independent judicial power, etc. This is not what the SARs are, de jure and de facto. It is subjective to call all sovereign states "Empire level" simply because there are sovereign states like the British Empire are empire. Wouldn't it be an insult to the republics and other forms of sovereign states? We cannot name China an "Empire-level" unit. I guess we all agree with this. A more fair term should be drawn from the common ground of all the sovereign states to name the level. For your other point that without second level, there could not be a term first level, in my humble opinion, it is unnecessary to have second or third level to have a first level when it comes to this case, because it is a technical term, and a technical term reflects the legal basis, the factual situation, as well as accepted by all parties. Even if you insist, it is still better to change sub-provincial to second level (and etc.) than to change first level to a controversial "provincial level" term, which remains a biased term only reflecting the view of the communist government, and ignores the perspective of the people. Xxjkingdom (talk) 01:00, 10 September 2015 (UTC) * OK, I can understand what you say, and your recent change in Hong Kong works fine for me so I won't revert it either. However, I think you have misunderstood the WP:RS policy. Wikipedia is based on reliable secondary sources, not primary sources. Documents such as international declarations, Chinese constitution and the SARs' Basic Laws are all primary sources. You label the source given above (the book "Microregionalism and Governance in East Asia" by Katsuhiro Sasuga (Page 44)) as "pro-communist scholar", which is definitely not the case. If this source is in fact "pro-communist", then it should say something like "PRC has 23 provinces" instead of "PRC has 22 provinces", as the source does not count Taiwan as a province of PRC, so it is not pro-communist. Since Wikipedia is based on reliable secondary sources like this one, it is enough to include "provincial-level" with this source. If you want to consider it biased or controversial, you need to find another reliable source which says the opposite (i.e. not provincial-level). Such a source is not yet provided by now. By the way, even if the Chinese constitution explicitly says SARs are provincial-level, you will still label the constitutions as reflecting only the view of the communist government according to your logic, so it won't work either. As for "first level", even though it works in principle (especially when it is consistent with other terms), but since the change of term(s) will involve a lot of relevant WP articles, I highly recommend to archive a consensus by the community before making such changes, such as in Wikipedia talk:WikiProject China. Thanks for your understanding. --Cartakes (talk) 03:17, 10 September 2015 (UTC) Requested move 25 October 2015 The result of the move request was: Page moved per consensus. Philg88 ♦talk 07:11, 1 November 2015 (UTC) Special administrative region → Special administrative regions of China – See discussion on talk page. Consensus appears to be in support of rename and merge of Special administrative region (Republic of China) into new page. Nick Mitchell 98 (talk) 02:47, 25 October 2015 (UTC) Page move proposal I propose renaming this article to Special administrative regions of China. My reasoning for this is: 1. Some other nations have their own 'special administrative regions' (one inspired by the Chinese SARs exists in North Korea and is the primary basis for this side of the argument) or may use similar terminology to refer to select administrative divisions. 2. The proposed name is consistent with the article names for other Chinese administrative divisions (i.e. Administrative divisions of China, Provinces of China, Autonomous regions of China, etc.). Pluralisation of the article name is also highly important as there is definitely more than one SAR in China and it keeps consistency with the other articles. I personally believe the current article name is too general, and the proposed name is not only keeps consistency with other similar articles, it also removed any possible confusion with any other regions referred to by a similar name. Nick Mitchell 98 (talk) 12:29, 15 September 2015 (UTC) * I am fine with this proposal. However, I am wondering if the SARs in Special administrative region (Republic of China) should be included in Special administrative regions of China too? Thanks! --Cartakes (talk) 15:46, 15 September 2015 (UTC) * I personally see no reason to not include SARs from the ROC on the mainland under a "History" subheading similar to the Provinces of China article. This has the added bonus of also reducing clutter between similarly named articles. Nick Mitchell 98 (talk) 21:05, 27 September 2015 (UTC) Are there other regions named in "Special administrative regions"? It is better NOT to move this moment. It is better get clear of common terminology. &mdash; HenryLi (Talk) * Minor Oppose Going by WP:Common Name I think that it should stay as is for now. The other two uses of the phrase are both defunct and minor whereas the "one china, two systems" arrangement is significant. One sees frequently "SAR" after "Hong Kong" and "Macau". I also note the discussion above about whether SARs exist in Mainland China. (Another question for another time: Why not merge One country, two systems into this article, or this into that? They seem to be on same topic, just using different verbiage.)--Iloilo Wanderer (talk) 04:11, 30 September 2015 (UTC) * Support rename and some merging. There is no WP:COMMONNAME problem; it still contains "Special administrative region"; the "of China" is a natural disambiguation and a consistency tweak. It does make sense to cover the historical RoC SARs in the same article, and I also agree that at least aspects of One country, two systems can be merged here. There might be is an argument for a separate article on that as a political policy issue, but the way the articles are presently written, at least the majority some of the material overlaps, and they can be safely merged. Encyclopedically, the SARs are of more importance and notability that the policy processes by which they're administered, so the relevant OCTS material should merge into Special administrative regions of China and only be summarized at the other article, per WP:SUMMARY . Finally, Special administrative region can safely redirect here, since all we'll need at that point is a one-item disambiguation hatnote, per WP:TWODAB: .  — SMcCandlish ☺ ☏ ¢ ≽ʌⱷ҅ᴥⱷʌ≼  01:17, 6 October 2015 (UTC) Revised: The OCTS article seems more stand-alone now as a constitutional law article than before.  — SMcCandlish ☺ ☏ ¢ ≽ʌⱷ҅ᴥⱷʌ≼  03:27, 14 October 2015 (UTC) * Support for the reasons of clarity and consistency, as described by the nominator. ╠╣uw [ talk ] 09:40, 7 October 2015 (UTC) * Support - (uninvolved editor) The proposed renaming is perfectly natural and makes the topic clearer. The merging of the SAR (ROC) article as the "history" of the concept is also reasonable. However, the idea of merging of One country, two systems goes a bit too far, and should not be done as part of this RfC. - Kautilya3 (talk) 09:10, 9 October 2015 (UTC) * Support renaming and merging with Special administrative region (Republic of China), but not with One country, two systems. --Cartakes (talk) 17:19, 14 October 2015 (UTC) * Oppose a move or a merge. The historical ROC and current PRC SARs having nothing in common except a name and that they were or are in China so there is no reason for a merge. The primary topic of "Special administrative region" is this article so there is no need for a move. North Korea's Sinuiji SAR is a minor case and, as User:SMcCandlish notes above, can be dealt with with a hatnote. — AjaxSmack 03:30, 26 October 2015 (UTC) Wolong There is no doubt that the Wolong SAR is not a SAR established according to Article 31 of the Constitution, but the article already mentions that only HK and Macau are established according to the said Article of the Constitution. For Wolong, we simply need to make it clear in the article that it is a different type of SARs from Hong Kong and Macau, but it still need to be mentioned in the article, which lists ALL SARs in the History of China, which includes ROC SARs such as Chahar SAR (in the "History" section) too. --Cartakes (talk) 15:03, 28 December 2015 (UTC) A Commons file used on this page has been nominated for speedy deletion The following Wikimedia Commons file used on this page has been nominated for speedy deletion: You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 17:25, 9 August 2018 (UTC) * Emblem of People’s Militia.svg
WIKI
Page:Lorentz Grav1900.djvu/12 Instead of introducing two pairs of vectors ($$\mathfrak{d,\ H}$$) and ($$\mathfrak{d',H'}$$), both of which come into play in the electromagnetic actions, as well as in the phenomenon of gravitation, we might have assumed one pair for the electromagnetic field and one for universal attraction. For these latter vectors, say $$\mathfrak{d,\ H}$$, we should then have established the equations (I), $$\varrho$$ being the density of ponderable matter, and for the force acting on unit mass, we should have put $-\eta\left\{ 4\pi V^{2}\mathfrak{d}+\mathfrak{\left[v.\ H\right]}\right\}$, where $$\eta$$ is a certain positive coefficient. § 8. Every theory of gravitation has to deal with the problem of the influence, exerted on this force by the motion of the heavenly bodies. The solution is easily deduced from our equations; it takes the same form as the corresponding solution for the electromagnetic actions between charged particles. I shall only treat the case of a body A, revolving around a central body M, this latter having a given constant velocity p. Let r be the line MA, taken in the direction from M towards A, x, y, z the relative coordinates of A with respect to M, w the velocity of A's motion relatively to M, $$\vartheta$$ the angle between w and p, finally $$p_{r}$$ the component of p in the direction of r. Then, besides the attraction which would exist if the bodies were both at rest, A will be subject to the following actions. 1st. A force in the direction of r. 2nd. A force whose components are
WIKI
Johann Berthelsen Johann Henrik Carl Berthelsen (July 25, 1883 – April 3, 1972) was an American Impressionist painter, as well as having a career as a professional singer and voice teacher. Essentially self-taught as an artist, he is best known for his poetic paintings of New York City, often in snow. Background Johann Henrik Carl Berthelsen was born in Copenhagen, Denmark. He was the seventh of seven sons born to Conrad and Dorothea Karen Berthelsen. His father was a tenor with the Royal Opera and his mother was a nurse. Following the divorce of the parents, in 1890 his mother brought the children to America, joining her sister in Manistee, Michigan. Soon they settled in Manitowoc, Wisconsin. Johann developed an early interest in singing, acting, drawing, and painting. He dropped out of school after the fifth grade and worked in various jobs. He moved to Chicago at age eighteen, planning to pursue a career in theater. An old friend who was studying voice at the Chicago Musical College encouraged him to pursue singing. Upon auditioning at the school, Berthelsen was offered a full scholarship. While a student there he won two gold medals. Career Following his graduation in 1905, he toured the United States and Canada, performing in operas, Gilbert & Sullivan operettas, and concerts until 1910, when he began teaching voice at the Chicago Musical College. In his spare time he pursued painting, with encouragement and some instruction from the Norwegian-American Impressionist painter Svend Svendsen. In 1913, Berthelsen moved to Indianapolis to become the head of the voice department at Indianapolis Conservatory of Music. He formed a lifelong friendship with painter Wayman Adams, who was the same age and had studied with William Merritt Chase and Robert Henri. Adams would paint many portraits of Berthelsen, including a life-sized image of his friend about to go on stage for a concert. Adams is credited by some as having provided painting instruction to Berthelsen, and they may have had a double wedding in 1918. In 1920, Adams (who was married to a fellow artist) and Berthelsen decided to move to New York City to further their careers. Berthelsen opened a private school of voice in the Rodin Studios building. According to the Berthelsen Conservancy, one of his pupils was a singer, dancer and entertainer named Helenya Kaschewski, whom he married on March 15, 1928. They had three children—a daughter, Karen, and two sons, John and Lee. He continued to pursue art, and in 1925 he was elected to the American Watercolor Society. He also mastered the pastel medium during the 1920s. With the Great Depression and stock market crash of 1929 Berthelsen lost his voice students, and the family had to sell many of their possessions and move to an ever-smaller series of apartments. A fellow artist suggested painting in oils, which he began to do, and he had gradually increasing success in selling his canvases. In the mid-1930s he was also involved in several New Deal art projects. He joined the Salmagundi Club in 1935 and remained a member until his death. In 1942 the family moved to rural New Milford, Connecticut, where Berthelsen painted many views of the surroundings. But his most popular canvases represented New York City scenes. They were collected by prominent figures including William Randolph Hearst, Richard E. Berlin, Frank Sinatra, Ethel Merman, and Dinah Shore. Today paintings by Berthelsen may be found at the Hirshorn Museum and Sculpture Garden, Sheldon Swope Art Museum, the Butler Institute of American Art, and several other public collections. In 1950 the family moved back to New York City, in part because of the high demand for his work and easy access to galleries. He exhibited his work at the Barbizon-Plaza Galleries, the Allan Rich Gallery, and the Jean Bohne Gallery, among others. He continued to paint well into his eighties. In 1971 he was hit by a car, which led to a decline in health and ultimately his death the following year. Awards * Albert Erskine Prize for Pastel Art Institute of Chicago (1928) * Holcombe Prize in Indianapolis (1946) Public collections * Hickory Museum, Hickory, North Carolina * Indiana State Museum, Indianapolis * Indiana University, The Daily Family Memorial Collection of Paintings, Bloomington, Indiana * Museum of Texas Tech University, Lubbock, Texas * Sheldon Swope Art Museum, Terre Haute, Indiana * Wake Forest University, Winston-Salem, North Carolina Related reading * Leland G. Howard (1988), Johann Berthelsen: An American Master Painter, ex. cat., Sheldon Swope Art Museum
WIKI
Talk:Orbital (band)/Archive 1 I get the impression from the article that they're done recording/touring; is this true? Ground 00:36, 2 Dec 2004 (UTC) * Yeah, thier very last show and last of their material was Glastonbury 2004. Ferretgames 02:21, 1 Feb 2005 (UTC) * Yes, they're done touring; no, Glasto was NOT their last show. Wasn't even their last show in the UK, not even counting the Peel Sessions - T In The Park was some time later, they'd done Oxegen before then but after Glasto, and they did a show in Japan after T. --Kiand 10:58, 26 May 2005 (UTC)
WIKI
User:Ifeoluwaogundijo Name::: OGUNDIJO IFEOLUWA OLALUWA INFO::::::HE WAS GIVEN BIRTH TO IN THE YEAR 1993:: OTHER INFO:: HE IS A SONG WRITTER,AN ARTIST WHO HAS TWO TRACKS TO HIS NAME,HE STARTED MUSIC AT A VERY TENDER AGE::::HE IS KNOW FOR IS PARTY ROCK SONGS AND SOO ON
WIKI
Louis Coues Page Louis Coues Page (1869 – 1956) was a publisher in Boston, Massachusetts. Born in Zurich to American parents, he attended Harvard College and worked for Boston publishers Estes & Lauriat, 1891–1892. In 1896 he bought the Joseph Knight Company and renamed it L.C. Page & Company; around 1914 it became The Page Company. It issued works of "art, travel, music, belles lettres" and fiction for adults and children. It operated from offices on Beacon Street in Beacon Hill. Authors published by the firm included Bliss Carman, Julia Caroline Dorr, Lucy Maud Montgomery, and Eleanor H. Porter. In 1914 the Page Company acquired Dana Estes & Co. Around the 1910s Louis and his brother George A. Page were co-owners of the Boston Braves baseball team. Page married Kate Stearns in 1895. Farrar, Straus & Cudahy acquired L.C. Page & Co. in 1957; the imprint continued until 1980.
WIKI
January 04, 2018 Reduce Image Size With Python And Tinypng Whenever I want to upload images with my articles, I make sure they are of the right size first and then I have to check the file sizes and if they are too big, I will have to compress them. For this compression, I use Tinypng. They compress your images to a small size all the while keeping the image looking the same. I've tried some other services as well, but TinyPNG is definitely the best as their compression ratio is quite impressive. In this article I'll show you how I'm planning to automate the image compression process using TinyPNG's developer API. And of-course we are going to using python. Setting up First of all, you need to have a developer key to connect to TinyPNG and use their services. So, go to Developer's API and enter your name and email. TinyPNG API registration Once you've registered, you'll get a mail from TinyPNG with a link and once you click on that, you'll go to your developers page which also has your API key and your usage information. Do keep it mind that for the free account, you can only compress 500 images per month. For someone like me, that's a number I won't really be reaching in a month anytime soon. But if do, you should probably check out their paid plans. Developers API key page PS: That's not my real key :D Get started Once you've the developer key, you can start compressing images using their service. The full documentation for Python is here. You start by installing Tinify, which is TinyPNG's library for compression. pip install --upgrade tinify Then we can start using tinify in code by importing it and setting the API key from your developer's page. If you've to send your requests over a proxy, you can set that as well. tinify.proxy = "http://user:pass@192.168.0.1:8080" Then, you can start compressing your image files. You can upload either PNG or JPEG files and tinify will compress it for you. For the purpose of this article, I'm going to use the following delorean.jpeg image. Delorean uncompressed And I'll compress this to delorean-compressed.jpeg. For that we'll use the following code: source = "delorean.jpeg" destination = "delorean-compressed.jpeg" original = tinify.from_file(source) original.to_file(destination) And that gives me this file: Delorean compressed If they both look the same, then that is the magic of TinyPNG's compression algorithm. It looks pretty much identical but it did compress it. To verify that, let's print the file sizes. import os.path as path original_size = path.getsize(source) compressed_size = path.getsize(destination) print(original_size/1024, compressed_size/1024) And this prints, 29.0029296875 25.3466796875 1.144249662878058 The file was original 29 KB and now after compression it is 25.3 KB which is a fairly good compression for such a small file. If the original file was bigger, you will be able to see an even tighter compression. And since this is the free version, there's a limit on the number of requests we can make. We can keep track of that with a built-in variable compression_count. You can print that after every requests to make sure you don't go over that. compressions_this_month = tinify.compression_count print(compressions_this_month) You can also compress images from their URL's and store it locally. You will just do: original = tinify.from_url("https://raw.githubusercontent.com/durgaswaroop/delorean/master/delorean.jpeg") And then you can store the compressed file locally just like before. Apart from just compressing the images, you can also resize them with TinyPNG's API. We'll cover that in the tomorrow's article here. So, That is all for this article. For more programming articles, checkout Freblogg, Freblogg/Python Some articles on automation: Web Scraping For Beginners with Python My semi automated workflow for blogging Publish articles to Blogger automatically Publish articles to Medium automatically This is the 13th article as part of my twitter challenge #30DaysOfBlogging. Seventeen more articles on various topics, including but not limited to, Java, Git, Vim, Software Development, Python, to come. If you are interested in this, make sure to follow me on Twitter @durgaswaroop. While you're at it, Go ahead and subscribe here on medium and my other blog as well. If you are interested in contributing to any open source projects and haven't found the right project or if you were unsure on how to begin, I would like to suggest my own project, Delorean which is a Distributed Version control system, built from scratch in scala. You can contribute not only in the form of code, but also with usage documentation and also by identifying any bugs in its functionality. Thanks for reading. See you again in the next article. 0 comments: Post a comment Please Enter your comment here......
ESSENTIALAI-STEM
Talk:1922 Dixie Classic Untitled I'm well versed in football history, especially that of its rules, and I don't think there was any time that attempting to return a ball the opponent put behind your goal line resulted in a safety rather than a touchback. Someone needs to check whether the returner was ruled to have put the ball into his own end zone.<IP_ADDRESS> (talk) 00:24, 2 May 2010 (UTC) Improper Citation Sources- Unclear what sources for this article are. The citations may be legit, but they only show an author of the source, rather than the source itself. Jrussellsimmons (talk) 14:36, 21 November 2022 (UTC)
WIKI
Gardeo Isaacs Gardeo Isaacs (born 27 December 1998) is a South African sprinter. He became South African national champion in 2019 over 400 metres. Early life From Parow, Cape Town he attended Stellenbosch University where he studied Management Accounting. Career He won the South African 400m national title in April 2019 in Germiston in a time of 45.39 seconds. He won the 400m at the South African Varsity Athletics meet in 2019, running a time of 45.70 seconds. Later that year, he went on to win the bronze medal in 45.89 seconds for South Africa at the 2019 Summer Universiade in Naples, Italy. He ran as part of the South African 4x400m relay team at the 2019 IAAF World Championships in Doha having also ran as a part of the team at the 2019 IAAF World Relays in Japan. He ran for South Africa at the 2022 African Championships in Athletics in Mauritius. He came third in the 400 metres at the South African Championships in Potchefstroom in 2023, in a new personal best time of 45.15 seconds. In Pretoria, in March 2024, he ran a personal best 31.91 for the 300 metres. He ran as part of the South African 4x400m relay team which qualified for the 2024 Paris Olympics at the 2024 World Relays Championships in Nassau, Bahamas. In June 2024, he was selected for the South African team for the 2024 Paris Olympics.
WIKI
Top 6 Ways to Fix Incompatible Drivers Error for Memory Integrity in Windows 11 Microsoft has improved the default Windows Defender by leaps and bounds with Windows 10 update. It’s the default and preferred choice for many to keep their computer virus-free. The system has a ‘Memory Integrity’ security feature to protect critical processes and attacks at the kernel levels. However, the function seems to be disabled for many due to incompatible drivers. If you are one of the affected ones, read the troubleshooting steps to fix the problem. Memory integrity prevents attacks from inserting malicious code into high-security processes. Once you resolve incompatibilities with drivers, the system will enable the function for your PC. 1. Enable Memory Integrity via Group Policy Editor Group Policy Editor menu is available only to Windows 11 Pro users. You can use it to enable Memory integrity on your PC. Follow the steps below. Step 1: Press the Windows key and search for Group Policy Editor. Step 2: Head to Computer Configuration > Administrative Templates. Step 3: Select the System folder. Step 4: Open ‘Device Guard’. Step 5: Select ‘Turn On Virtualization Based Security’. Step 6: Select the radio button beside ‘Enabled’ and hit Apply. Select Ok, and you are good to go. Restart your PC. 2. Enable Optional Features on Windows 11 If ‘Virtual Machine Platform’ and ‘Windows Hypervisor Platform’ features are disabled on your PC, it may affect the memory integrity feature. Follow the steps below. Step 1: Press Windows + I keys to open the Windows Settings menu. Step 2: Select ‘Apps’ from the left sidebar. Step 3: Open ‘Optional features’. Step 4: Scroll down to more Windows features. Step 5: Enable Virtual Machine Platform and Windows Hypervisor Platform options and hit OK. Once Windows applys the changes, reboot the PC and enable Memory integrity from the Windows Security menu. 3. Perform a Clean Boot If the memory integrity function is still not enabled on your computer, it’s time to perform a clean boot. Here, you basically turn off all services except the essential Microsoft services. It’s quite easy and straightforward to boot your PC into a clean state. Step 1: Press Windows + R keys to open the Run menu. Step 2: Type msconfig and hit OK. Step 3: Select ‘Selective startup’ and click ‘Load system services’. Step 4: Move to the Services tab and select ‘Hide all Microsoft services’. Click ‘Disable all’. Step 5: Click Appy and select Ok. Restart your PC and head to Windows Security to enable Memory Integrity function. 4. Update Incompatible Drivers You can update outdated drivers on your computer and enable memory integrity without any problem. You need to use the Device Manager menu to make changes. Step 1: Right-click on Windows key and open the Device Manager menu. Step 2: Select ‘View’ in the menu bar. Step 3: Select ‘Show hidden devices’. Step 4: Check for yellow exclamation marks beside outdated drivers from the list. Step 5: Right-click on such drivers and select ‘Update drivers’ from the context menu. Step 6: Follow on-screen instructions to complete the update process. For more details, read our dedicated post to update drivers on Windows. 5. Use Security Processor Troubleshooting You can run security processor troubleshooting and reset TPM (Trusted Platform Module) to fix issues like memory integrity greyed out. Step 1: Press the Windows key and search for Windows Security. Step 2: Hit Enter to open the app. Step 3: Select ‘Device security’ from the left sidebar. Step 4: Open Security processor details. Step 5: Select ‘Security processor troubleshooting’. Step 6: Click ‘Clear TPM’ and restart the PC. 6. Update Windows 11 An outdated Windows 11 build can lead to issues like incompatible drivers errors for memory integrity. Microsoft frequently releases new updates to add features, install the latest drivers, and fix bugs. Step 1: Open the Windows Settings menu. Step 2: Select Windows Update from the left sidebar. Step 3: Download and install the pending Windows update on your PC. If you face issues with installing the latest Windows update, read our troubleshooting guide to fix the problem. Secure Your Windows PC We don’t recommend using your Windows PC with the memory integrity option disabled. Which trick worked for you? Share your findings in the comments below. Photo of author Parth Shah Parth previously worked at EOTO.tech covering tech news. He is currently freelancing at WindowsPrime, Android Police, and GuidingTech writing about apps comparisons, tutorials, software tips and tricks, and diving deep into iOS, Android, macOS, and Windows platforms. Leave a Comment
ESSENTIALAI-STEM
Call it by its name: anti-Semitism President Donald Trump has finally learned how to call anti-Semitism by its name. Asked on Tuesday about a wave of bomb threats against Jewish community centers — 69 of which have occurred in the first weeks of 2017 — and the desecration of a Jewish cemetery in St. Louis on Monday night, Trump finally acknowledged these as specifically anti-Semitic threats targeting specifically Jewish institutions, and decried them as such. “Anti-Semitism is horrible and it’s going to stop,” President Trump tells NBC News’ @craigmelvin https://t.co/8yDFDz1R0J NOW: Trump: "The antisemitic threats targeting our Jewish communities and our Jewish Community Centers are horrible, and are painful." It was a fairly rote condemnation of an attack on a minority group, the sort of thing that presidents do all the time. But despite his claim that he denounces anti-Semitism “whenever I get a chance,” until this point, Trump simply hasn’t. On Holocaust Remembrance Day, January 27, the White House put out a statement that commemorated “the victims, survivors, and heroes” in a vague and undifferentiated way, but didn’t specifically mention the 6 million Jews killed. Then the White House made matters much worse by defending the decision on the grounds that Jews weren’t the only ones who suffered, which critics called tantamount to Holocaust denial. Making matters worse, the White House reportedly vetoed, on dubious grounds, sending out a State Department statement that did mention Jews specifically. Then, last week, when Trump was asked at a joint press conference with Israeli Prime Minister Benjamin Netanyahu if his rhetoric contributed to a rise in anti-Semitism, he bragged about his Electoral College victory instead. The next day, a reporter for a Trump-friendly Orthodox Jewish weekly asked about the bomb threats. Trump didn’t answer the question, but he lashed out at the reporter, telling him to “sit down” and calling his question “very insulting.” Trump actually calling anti-Semitism by its name is a welcome change of pace. But this isn’t something the president can just say once and point to every time he’s asked about anti-Semitism in future. President Trump had better learn this statement by heart, because it’s going to be imperative on him to say these words, or something like them, relentlessly and zealously. Hostility toward Jews is growing — both among “anti-globalist” ideologues and among young people who simply think that anti-Semitism is funny. Both of those groups believe that, on some level, President Trump is on their side. If they’re wrong, it’s on him to say so. President Trump and his administration don’t actually need it explained to them why it’s important to call specific phenomena by their names. They care about that a great deal — maybe even too much — when it comes to the term “radical Islamic terrorism” (or extremism). Funny how you HAVE TO call it "radical Islamic terrorism", but with Antisemitism, you can't even mention the Jewish community. https://t.co/UH2pP2jqbU President Trump’s commitment to using those three words is so total that at times, on the campaign trail, he implied it would be the most important thing the US could do in war on terror. It’s so total that his administration is weighing renaming and reorienting a federal anti-extremism initiative to stop monitoring right-wing extremism and focus exclusively on radicalization of Muslims in the US. Any argument that can be made for the importance of calling it “radical Islamic extremism” — that it’s important to be specific in naming the enemy; that the public should recognize when hatred is grounded in an ideology — applies to “anti-Semitism.” Meanwhile, the problems with caring so much about “radical Islamic extremism” — that it plays into the hands of Islamophobes who believe Islam is inherently radical, and that it’s a strategic blunder when dealing with the Muslim world — don’t apply to “anti-Semitism,” which is a term for an animus rather than a belief system. Trump’s default response, asked about prejudices against disfavored groups in America — African Americans, Muslims, immigrants, Jews — is to generically condemn “prejudice” or “hate.” That makes it easy for anyone listening to assume he’s not talking about them. The problem is very few people think of themselves as hateful, and fewer still think of their hatred as a problem that needs to be overcome. Call generically for everyone to overcome prejudice, and you open the doorway for people prejudiced against Jews to conclude that it’s really the Jews’ job to get rid of their prejudice against you. In some respects, this same argument applies to any prejudice — racism, white supremacism, Islamophobia. But there’s something distinct about the way anti-Semitism has manifested itself in the Trump era. The other prejudices have long bubbled under the surface of American life, and are now foaming into the open; anti-Semitism, on the other hand, has become more prevalent and popular than it was before. Anti-Semitism isn’t tied to government policy, or to the kind of entrenched economic and social discrimination that continues to shape black and Latino life. Jews are fairly well-integrated into the American elite. But that makes the resurgence in anti-Semitic sentiment, while not more imminently dangerous or powerful, more striking because of its novelty. The old-school populism that many Trump followers gravitated toward isn’t inherently anti-Semitic — although some other influences on Trump’s movement are, such as the “anti-globalist” conspiracies of Alex Jones and the “alt-right” philosophy of Richard Spencer. The gateway to anti-Semitism in the Trump era, though, is more than any particular ideology. It’s the idea that Jews, and sensitivity toward anti-Semitic persecution, exist to be mocked. The Trump supporters who respond to Jewish journalists by Photoshopping their faces onto lampshades or sending photos of gas chambers are often young trolls who haven’t read the Protocols of the Elders of Zion. They see their acts as blows against “political correctness” and victories for lulz. Somewhere down the line, recognition of historical atrocities became seen as some kind of pansy liberal piety. The culture of lulz that gave rise to online alt-right meme culture, in which it’s funny to break any taboo because it will offend other people, sees “don’t make jokes about genocide because genocide is bad” as just another taboo. And this culture sees the descendants of that genocide as just more people who, if you successfully offend, you win. President Trump sees himself as an anti-PC truth teller, as do many of his closest advisers and allies. The people who turned Pepe the frog into a white supremacist meme see themselves the same way. And while President Trump and company may not believe that they and the Pepe brigade are engaged in the same project, the Pepe brigade most certainly does. If President Trump and company see a distinction there, they are obligated to voice that distinction — to actively kick people out of the tent. This isn’t because they have some abstract obligation to “refudiate” (in the immortal words of Sarah Palin) acts being committed by anyone who shares a label with them. This isn’t about communicating to the general public that they are not on the same team as the extremists. It’s about communicating to the extremists, who do believe that Trump and advisers like Steve Bannon are on their team, that this is not in fact the case. President Trump gets deeply uncomfortable when asked to do things that people who support him may not like. Instead of saying “I disavow David Duke,” he treated it as an intransitive verb — “I disavow” — rather than singling anyone out. But the reason he’s uncomfortable is exactly the reason it is necessary. These people believe he is on their side. If he doesn’t agree, then he needs to say so, because they certainly won’t believe anyone else.
NEWS-MULTISOURCE
Alnylam stock drops 2.6% premarket on preliminary results for rare disease therapy Alnylam Pharmaceuticals Inc. shares dropped 2.6% in Thursday premarket trade after the company released early results from a phase 3 trial for its givosiran therapy, which is intended for a family of rare diseases called acute hepatic porphyrias. Alnylam described the results as positive, as the therapy showed statistically significant reductions in levels of a type of acid in urine, "a surrogate biomarker that is reasonably likely to predict clinical benefit." Alynlam plans to file for approval with the Food and Drug Administration at or around the end of the year, with the goal of potentially getting a faster approval of givosiran. However, the analysis that Alnylam released on Thursday was based on 43 patients with acute hepatic porphyrias, and 22% of those on the therapy -- or five of 23 individuals -- had serious side effects. One patient stopped taking the drug because the individual had a large increase in certain liver enzymes. (Ten percent of those on the placebo, or two of 20 individuals, also had serious side effects.) The safety results were "imperfect," Stifel analyst Paul Matteis said, noting the serious imbalance between side effects on the drug and those seen on the placebo. Still, "given the severe nature of the disease (and the substantial efficacy profile of givosiran), we're fine with this profile, pending of course that additional disclosed details don't unveil a major surprise of clear [serious adverse event] pattern," Matteis said, reiterating his buy rating for the company. "Given the orphan nature of the indication, the unmet need, and the ~70% drug-placebo delta in attack frequency, we think the bar for safety is low." Alnylam also said it will keep dosing patients in the phase 3 trial, called Envision, which has enrolled 94 patients total, and it expects to report full study results for the primary endpoint in early 2019. Company shares have dropped nearly 5% over the last three months, compared with a 7.6% rise in the S&P 500 and a 9.4% rise in the Dow Jones Industrial Average .
NEWS-MULTISOURCE
On-line Opinion Magazine…OK, it's a blog Random header image... Refresh for more! Who Thought This Was A Good Idea? Did you know that there is a key shortcut that turns your screen upside down if you are using Windows XP? I didn’t know that until Ringo decided to flop down on my keyboard and invoked the magic three-key combination. Oh BTW, re-booting doesn’t clear the problem and your mouse and arrow keys work in reverse. To make matters worse, there was a Windows update, and I was wondering if that was the problem, until I developed the skills to Google upside down and backwards to find a group talking about this “kewl feature” of this bloated mess. I’m not advertising the keystrokes, but they are quite easily produced by even a kitten flopping on your keyboard. Oh, I have finally stabilized on whynow at dumka dot com as the e-mail address. 21 comments 1 Michael { 11.14.07 at 4:47 pm } Obviously, this was a product of the “computing in space” drive. That, or else someone at Micro$uck was guilty of CUI–coding under the influence. 2 Bryan { 11.14.07 at 5:40 pm } I assume it’s a geek “joke” that was missed by the QA team. 3 Steve Bates { 11.14.07 at 5:57 pm } It’s not necessarily a joke. I’d be willing to bet there are also keystroke combinations for rotating 90 degrees either way as well. That could be useful if you have a display that can be physically set up in portrait or landscape orientation, and you need to switch to portrait. 4 Scorpio { 11.14.07 at 6:43 pm } A friend of mine mailed me a PDF and half was upside down. I use Linux. I ended up picking up my (light, flat) screen and turning it upside down to check it out. Ah well. 5 Fallenmonk { 11.14.07 at 6:48 pm } It is not a joke. There are certain situations where monitors have to mounted in positions other than how they were designed to be mounted. I just finished an implementation were we had to mount them upside down from the ceiling. This was in the call center for a major PC manufacturer in Texas that shall remain nameless. Anyway, this call center was to be a showcase for showing clients the commitment to customer service so all these big flat screen displays were very important and they needed to be “upside right”… a term my daughter coined when she was a wee one. Steve is right in that you can cause the display to rotate 90 degrees left or right as well and you can make them present a mirror image so that they can be reflected to the user in a mirror and still be correct. Ain’t technology fascinatin’. 6 hipparchia { 11.14.07 at 8:17 pm } how much do i have to pay you to get that keystroke sequence? 7 Bryan { 11.14.07 at 9:24 pm } I didn’t want to do this but neither the HP, nor the MS help explains this. While depressing CTRL+ALT you can use the Arrow keys to change the screen orientation. Apparently they assume that programs will do this and there is no need to mention it. It will only work with recent video cards. If I hadn’t figured it out I was about to build a stand to hang this LCD upside down, Scorpio, but in Adobe Reader 8 you can rotate a page from the View menu. The portrait monitors usually have an identified utility do this, although the last one I used did it automatically when you rotated the screen. I don’t like surprises when I’m trying to work. 8 Steve Bates { 11.14.07 at 9:42 pm } Heh. I was off discovering how to do this while you explained it, Bryan. I finally found it in an Intel utility for their graphics chip, though apparently the keystroke sequences are pretty common among vendors. For the Intel chip, you can uncheck a box to rid yourself of surprises of this particular kind. Should hipparchia be told that if one uses the full width of one’s widescreen display for desktop shortcuts, cycling through the portrait modes have an interesting and unpleasant effect on shortcut locations when one gets back around to “normal” orientation? Or shall we let her find out for herself? Ringo must be getting really long, or really adept, to be able to press Ctrl, Alt and an arrow key simultaneously. 9 hipparchia { 11.14.07 at 10:35 pm } widescreen sux. two monitors, now, that rocks. 10 Bryan { 11.14.07 at 10:44 pm } It only takes 5 inches to cover all three keys on the bottom row right-hand side. A kitten could do it. 11 Bryan { 11.15.07 at 12:15 am } Steve, thanks for the tip on the Intel card. The problem is blocked since the cats can’t be. It’s just another layer of complexity, Hipparchia. 12 Steve Bates { 11.15.07 at 1:45 pm } (Sigh. Correction: “… cycling… HAS an interesting and unpleasant effect…”) Bryan, you’re right. I use both sets of Ctrl and Alt keys all the time, but when I merely look at the keyboard, I tend to forget about the right-hand set. A kitten could indeed do it; indeed, some kitten probably has. hipparchia, why not… after all, we have two eyes; why not use two monitors, and focus one eye on each monitor. :p Bryan, you mean your cats don’t have control panels and settable options? 🙂 13 Bryan { 11.15.07 at 3:28 pm } I’m still searching, but there are a lot of forums to read with people asking, but no one offering solutions. 14 hipparchia { 11.15.07 at 6:25 pm } we have two eyes; why not use two monitors, and focus one eye on each monitor. that’s how i do it. i thought everybody did. you mean they don’t? as for the kittens, they’re still happy with the dvd eject keys. 15 Steve Bates { 11.15.07 at 9:48 pm } Considering the quality of movies today, the kittens probably think of those buttons (as I do) as dvd Reject keys. hipparchia, does that mean you are wide-eyed, or wild-eyed? 16 hipparchia { 11.15.07 at 10:08 pm } wild-eyed, of course. you had to be told this? mostly i use the dvd player to listen to music, or watch the occasional travel video, not having a very high opinion of the movies of today. 17 hipparchia { 11.15.07 at 10:09 pm } oops. insert an imaginary /b after wild. 18 Steve Bates { 11.16.07 at 7:16 am } “Imaginary”? Either I have a powerful imagination, or Bryan closed the tag for you. 🙂 Ever since audio CDs got rootkits, I’ve stopped inserting media discs of any sort in my computer’s drive. Yeah, I know, they fixed that one. And there will never, ever be another incident like that. Right? 19 hipparchia { 11.16.07 at 9:41 pm } 🙂 the last few years, i’ve mostly gone to free concerts by local or regional indie musicians, and bought their CDs from them. i have no idea if this lessens my chance of having malware attack me, or increases it. 20 Bryan { 11.16.07 at 10:08 pm } I would think that there is a good deal more quality control from indies than from the major labels, because most of them are burning the disks in their own machines that are on a stand-alone machine or having them copied on a small order basis by a dedicated CD copier. They can’t afford to have problems, and need a decent level of skill to do it themselves. As they get better they will buy a CD printer, to make their efforts more professional because small batch CD printing costs an arm and leg at most shops. The software is available and semi-reasonably priced. 21 hipparchia { 11.17.07 at 12:57 am } i’ve never found anything to complain about, quality-wise, and as far as i can tell, none of them has ever caused any problems for my computer. then again, i don’t buy a lot of music, so it’s possible that i’ve just been lucky so far. either way, i refuse to worry about it. if i find something i like, i just buy it and play it. if my computer crashes, it’ll slow down my opinion-spouting a bit, but not by much.
ESSENTIALAI-STEM
Pneumatic artificial muscles Pneumatic artificial muscles (PAMs) are contractile or extensional devices operated by pressurized air filling a pneumatic bladder. In an approximation of human muscles, PAMs are usually grouped in pairs: one agonist and one antagonist. PAMs were first developed (under the name of McKibben Artificial Muscles) in the 1950s for use in artificial limbs. The Bridgestone rubber company (Japan) commercialized the idea in the 1980s under the name of Rubbertuators. The retraction strength of the PAM is limited by the sum total strength of individual fibers in the woven shell. The exertion distance is limited by the tightness of the weave; a very loose weave allows greater bulging, which further twists individual fibers in the weave. One example of a complex configuration of air muscles is the Shadow Dexterous Hand developed by the Shadow Robot Company, which also sells a range of muscles for integration into other projects/systems. Advantages PAMs are very lightweight because their main element is a thin membrane. This allows them to be directly connected to the structure they power, which is an advantage when considering the replacement of a defective muscle. If a defective muscle has to be substituted, its location will always be known and its substitution becomes easier. This is an important characteristic, since the membrane is connected to rigid endpoints, which introduces tension concentrations and therefore possible membrane ruptures. Another advantage of PAMs is their inherent compliant behavior: when a force is exerted on the PAM, it "gives in", without increasing the force in the actuation. This is an important feature when the PAM is used as an actuator in a robot that interacts with a human, or when delicate operations have to be carried out. In PAMs the force is not only dependent on pressure but also on their state of inflation. This is one of the major advantages; the mathematical model that supports the PAMs functionality is a non-linear system, which makes them much easier than conventional pneumatic cylinder actuators to control precisely. The relationship between force and extension in PAMs mirrors what is seen in the length-tension relationship in biological muscle systems. The compressibility of the gas is also an advantage since it adds compliance. As with other pneumatic systems PAM actuators usually need electric valves and a compressed air generator. The loose-weave nature of the outer fiber shell also enables PAMs to be flexible and to mimic biological systems. If the surface fibers are very badly damaged and become unevenly distributed leaving a gap, the internal bladder may inflate through the gap and rupture. As with all pneumatic systems it is important that they are not operated when damaged. Hydraulic operation Although the technology is primarily pneumatically (gas) operated, there is nothing that prevents the technology from also being hydraulically (liquid) operated. Using an incompressible fluid increases system rigidity and reduces compliant behavior. In 2017, such a device was presented by Bridgestone and the Tokyo Institute of Technology, with a claimed strength-to-weight ratio five to ten times higher than for conventional electric motors and hydraulic cylinders.
WIKI
Elastic scattering of electrons by water: An ab initio study - Publikacja - MOST Wiedzy Wyszukiwarka Elastic scattering of electrons by water: An ab initio study Abstrakt In this work we devise a theoretical and computational method to compute the elastic scattering of electrons from a non-spherical potential, such as in the case of molecules and molecular aggregates. Its main feature is represented by the ability of calculating accurate wave functions for continuum states of polycentric systems via the solution of the Lippmann-Schwinger equation, including both the correlation effects and multi-scattering interference terms, typically neglected in widely used approaches, such as the Mott theory. Within this framework, we calculate the purely elastic scattering matrix elements. As a test case, we apply our scheme to the modelling of electron-water elastic scattering. The Dirac-Hartree-Fock self-consistent field method is used to determine the non-spherical molecular potential projected on a functional space spanned by Gaussian basis set. By adding a number of multi-centric radially-arranged s-type Gaussian functions, whose exponents are system-dependent and optimized to reproduce the properties of the continuum electron wave function in different energy regions, we are able to achieve unprecedented access to the description of the low energy range of the spectrum (0.001 < E < 10 eV) up to keV, finding a good agreement with experimental data and previous theoretical results. To show the potential of our approach, we also compute the total elastic scattering cross section of electrons impinging on clusters of water molecules and zundel cation. Our method can be extended to deal with inelastic scattering events and heavy-charged particles. Cytowania • 1 CrossRef • 0 Web of Science • 1 Scopus Autorzy (4) Słowa kluczowe Informacje szczegółowe Kategoria: Publikacja w czasopiśmie Typ: artykuły w czasopismach Opublikowano w: Frontiers in Materials nr 10, strony 1 - 11, ISSN: 2296-8016 Język: angielski Rok wydania: 2023 Opis bibliograficzny: Triggiani F., Morresi T., Taioli S., Simonucci S.: Elastic scattering of electrons by water: An ab initio study// Frontiers in Materials -,iss. 10 (2023), s.01-11 DOI: Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.3389/fmats.2023.1145261 Źródła finansowania: • This action has received funding from the European Union under grant agreement no. 101046651. Weryfikacja: Politechnika Gdańska wyświetlono 54 razy Publikacje, które mogą cię zainteresować Meta Tagi
ESSENTIALAI-STEM
How to Reset Windows 10 Administrator Password If Forgot? Posted by on . When it comes to the remembering password and codes, it becomes difficult for any one single person to keep track of it. Since there are so many information and files that are there in the system, it becomes imperative to secure all files so that there are no third party interventions. And these are the situations where the forgotten password scenario comes into being. It is quite common that these passwords will be lost track of and it will be difficult to regain access. If so, it will be very frustrating to attempt booting your Windows 10 computer only to discover that you've been locked out of it by a password you can't remember. This problem is very common because PC owners tend to set complicated admin passwords to prevent other users from guessing their input details. Three scenarios you may forgot your Windows 10 Password easily. 1) If you set a complex password you're not likely to remember, you will definitely forget it, and especially if you didn't write it down somewhere. 2) What's more, another category of PC users quickly set their passwords without giving a second thought to what they are using to lock their Windows system. In such cases, an individual will end up forgetting the password instantly, thus locking their windows PC in the process. 3) If you don't frequently use your Windows 10 for some reasons, you're likely to forget your password since you don't use it every other day. Whatever it is, the 3 scenarios above are likely to keep you out from accessing your computer, at least temporarily. Part 1: Reset Lost Windows 10 administrator Password with Reset Disk There are a lot of people don't  realize the importance of password reset disk features in Windows 10 or they don't bother to create a password reset disk. If you forgot your Windows 10 password and have a crated reset disk in your hand, resetting password becomes very easy. Step 1: First access to your Windows 10 login screen. Step 2: Simply type your a wrong password and Reset your password will pop up. Step 3: Then insert your USB flash drive password reset disk to your computer then click the link. Step 4: The wizard will guide you to reset your password. You can also create a new password for your local user account. Note: We highly recommend that you make a password reset disk when you crate a password for your computer. Just in case you forget. This method only works with a local admin account, if you have no reset disk tool, then you see the second solution blow. Part 2: Reset Windows 10 Login Password without Reset Disk - Recovery Tool It is encouraging that Windows helps us create a password reset disk in case we forgot the login password. But a lot of times you have trouble remembering the password and didn't have a USB reset disk that created previously, what should you do? In fact. You still have the chance to immediately and easily reset your forgotten Windows 10 password without reset disk. Just try iSeePassword Windows Recovery program. Which can be installed inside of the Windows virtual space without access to your computer, it will read the Windows  underlying data and iSO files and can be opened in DOS mode without password, it provides  users with a visual operating interface, that's very easy to use. With iSeePassword Recovery tool you can directly burn ISO files to USB drive/DVD/CD in Windows 10/8/7, then reset your password without disk, and create a new administrator account easily. To reset Windows 10 password, you will need: 1) A USB drive or black DVD or CD. 2) An accessible Windows computer or borrow from friend's. 3) iSeePassword Windows Password Recovery program, you can directly download it below.   1Download and Install Windows Password Recovery on a Normal Computer The first and the foremost step are to download and install the Windows recovery tool on a accessible computer. You can see the main windows below. What is required now is a USB flash drive or DVD so that can create a bootable reset disk. This tutorial takes USB drive as an example. use windows password recovery to reset your windows 10 password 2 Insert the USB drive to Accessible Computer, then Create a Bootable Password Reset Disk Run the program and then make sure to select on the USB option device. After the selection, click on the 'Burn USB' option and then begin the burning process. When finish the process, just eject the USB drive. create a bootable USB or DVD disk 3Insert the USB to the Password-locked Computer and Boot Computer from USB Drive This step you need to insert your USB drive to your locked Windows 10 computer and go to the reboot option. Reboot your computer and type F12, F2 or other certain keyboard to enter into BIOS settings. Different brands have different methods to enter the BIOS settings. Then choose the booting option from USB or CD/DVD. Boot Computer from USB Drive 4Start to Reset Your Windows 10 Password. You need to changed the boot order to USB drive then restart your computer, this time, the iSeePassword Windows Password recovery program will be opened during the booting. In this step, the program will detect all the account you set in the computer, here it can reset admin, users, local, Guest and homeGoup users password. You just select the target users that you want to reset, then click the "Reset Password" to begin. You can also click "Add User" button to create a new account for your computer. After resetting the password, the password of target user will be blank, then you need to click on the "Reboot" option and then restart the computer . Now, the computer will be started without prompting password. reset your windows 10 Doen! As you can see, the process of recovering your Windows 10 password is much the same as it has been in Windows 7 and above. Thus with the help of program you can reset lost password without having to use a disk. But the most important thing is that you actually follow the instructions properly so that each of the steps and the guidelines are correctly pointed up. The current version of iSeePassword is compatible with all Windows system including Windows XP, Vista, Windows 7, 8, 8.1and Windows 10, both 32-bit and 64-bit systems. Our team tested iSeePassword Professional Edition on our Windows 10 machine with a local account and we can confirm that it works fine as advertised, it's that simple and safe!   Related Articles & Tips EDITORS' PICK WINDOWS TIPS
ESSENTIALAI-STEM
Ai Shōka is a cover album by Japanese singer Keiko Masuda. Released through Warner Music Japan on December 10, 2014, the album features covers of songs that begin with. It includes two new songs: "Ai Shōka" and "Itoshi Terutte Itte", as well as a new recording of Masuda's 1981 hit song "Suzume". Track listing All songs arranged by Akira Masubachi.
WIKI
Reference : Intravalley Spin-Flip Relaxation Dynamics in Single-Layer WS2 Scientific journals : Article Physical, chemical, mathematical & earth Sciences : Physics http://hdl.handle.net/10993/38243 Intravalley Spin-Flip Relaxation Dynamics in Single-Layer WS2 - Wang, Zilong [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Molina-Sanchez, Alejandro [Univ Valencia, Inst Mat Sci ICMUV, Catedrat Beltran 2, E-46980 Valencia, Spain.] Altmann, Patrick [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Sangalli, Davide [CNR, ISM, Div Ultrafast Proc Mat FLASHit, Area Ric Roma 1, Monterotondo, Italy.] De Fazio, Domenico [Univ Cambridge, Cambridge Graphene Ctr, 9 JJ Thomson Ave, Cambridge CB3 0FA, England.] Soavi, Giancarlo [Univ Cambridge, Cambridge Graphene Ctr, 9 JJ Thomson Ave, Cambridge CB3 0FA, England.] Sassi, Ugo [Univ Cambridge, Cambridge Graphene Ctr, 9 JJ Thomson Ave, Cambridge CB3 0FA, England.] Bottegoni, Federico [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Ciccacci, Franco [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Finazzi, Marco [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Wirtz, Ludger mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Physics and Materials Science Research Unit] Ferrari, Andrea C. [Univ Cambridge, Cambridge Graphene Ctr, 9 JJ Thomson Ave, Cambridge CB3 0FA, England.] Marini, Andrea [CNR, ISM, Div Ultrafast Proc Mat FLASHit, Area Ric Roma 1, Monterotondo, Italy] Cerullo, Giulio [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Dal Conte, Stefano [Politecn Milan, Dept Phys, Piazza Leonardo Vinci 32, I-20133 Milan, Italy.] Nov-2018 NANO LETTERS Amer Chemical Soc 18 11 6882-6891 Yes International 1530-6984 Washington [en] Transition metal dichalcogenides ; transient absorption spectroscopy ; spin and valley dynamics ; layered materials ; optoelectronics [en] In monolayer (1L) transition metal dichalcogenides (TMDs) the valence and conduction bands are spin-split because of the strong spin-orbit interaction. In tungsten-based TMDs the spin-ordering of the conduction band is such that the so-called dark excitons, consisting of electrons and holes with opposite spin orientation, have lower energy than A excitons. The transition from bright to dark excitons involves the scattering of electrons from the upper to the lower conduction band at the K point of the Brillouin zone, with detrimental effects for the optoelectronic response of 1L-TMDs, since this reduces their light emission efficiency. Here, we exploit the valley selective optical selection rules and use two-color helicity-resolved pump-probe spectroscopy to directly measure the intravalley spin-flip relaxation dynamics in 1L-WS2. This occurs on a sub-ps time scale, and it is significantly dependent on temperature, indicative of phonon-assisted relaxation. Time-dependent ab initio calculations show that intravalley spin-flip scattering occurs on significantly longer time scales only at the K point, while the occupation of states away from the minimum of the conduction band significantly reduces the scattering time. Our results shed light on the scattering processes determining the light emission efficiency in optoelectronic and photonic devices based on 1L-TMDs. Fonds National de la Recherche - FnR ; Juan de la Cierva Program ; Early Postdoc Mobility program of the Swiss National Science Foundation ; EU Graphene Flagship ; ERC grant Hetero2D ; EPSRC ; EU project MaX Materials design at the eXascale [H2020-EINFRA-2015-1] ; Nano science Foundries and Fine Analysis-Europe H2020-INFRAIA-2014-2015 Researchers ; Professionals ; Students http://hdl.handle.net/10993/38243 10.1021/acs.nanolett.8b02774 FnR ; FNR7731521 > Alejandro Molina-Sánchez > FAST-2DMAT > Modelling of carrier dynamics and ultra-fast spectroscopy in two-dimensional materials > 01/12/2014 > 31/03/2017 > 2014; FNR7490149 > Ludger Wirtz > NANOTMD > 20 Electric transport and superconductivity in TransitionMetal Dichalcogenides nanolayers > 01/02/2014 > 31/01/2019 > 2013 File(s) associated to this reference Fulltext file(s): FileCommentaryVersionSizeAccess Limited access ZWang2018a.pdfPublisher postprint3.15 MBRequest a copy Bookmark and Share SFX Query All documents in ORBilu are protected by a user license.    
ESSENTIALAI-STEM
User:Soph1202 About me In the mist of Covid19 pandemic I decided to delve into the world of Wikipedia to spend my over excessive free time and hola found an entirely new world here, with lots of work to improve it. I always have a deep interest in reading and writing, so life on Wikipedia is ideal for a book-worm like me. There is another reason why I am here, which goes a bit deeper. I belong to the Millennial generation, growing up with modern stuff like pop, rock music, tv shows and all you can think of in this modern society. However, my life took a sharp turn after a broken friendship and my soul was awaken to the reality of the world we were living now. On the path of getting back on my feet, I slowly reassessed certain aspects in my life and found the roots of negative influence on my mental and physical life. They are modern notions and modern life which constantly put one at odds with nature and tradition. As a way to find peace and go back to my original true self, I took an endeavor in the forgotten world, human history with ancient traditions. As I learned about what our ancestors had created and the foundations in human ancient civilization that they laid out either in art, music, literature, etc..., I found the true values of a human and the purpose of life. At the depth of their works laid a solid framework for human moral values. When you look at a man's work whether it is a ballet performance, a piece of music, a novel or a painting, you are actually seeing right into his soul. One's work reflected one's moral values, spiritual beliefs and personal views of life. And we have inherited from our ancestors the most exquisitely beautiful works and I am on the path to claim my rightful heritage. Hobby Listening to classical music, enjoying ballet shows and delving deep in East and West history and culture. Classical music: Beethoven, Mozart, Chopin, etc... Pages I edited Louis XIV of France History of ballet
WIKI
XHCPAK-FM XHCPAK-FM is a Mexican radio station owned by the Instituto Campechano and located in Campeche, Campeche, Mexico. History The Instituto Campechano received a permit to build a new AM radio station, which began test transmissions on 1580 kHz in 1997. In 1998, the station moved to its final dial position of 810 kHz and took the call sign XEIC-AM. In 2013, Cofetel authorized XEIC-AM to move to the FM band as XHIC-FM 92.5, a 25,000-watt station. The FM station launched in 2015, but the IC failed to make a necessary legal filing. The 2014 Ley Federal de Telecomunicaciones y Radiodifusión required all noncommercial radio stations, which held permits, to apply to have them switched to concessions, but no such filing was ever made, and as a result, the station lost legal authority to operate. To rectify this omission, a new station application was necessary; this was made on April 20, 2018, and the Federal Telecommunications Institute authorized a concession for XHCPAK-FM on 105.1 MHz, a Class A station with 3,000 watts, on April 1, 2020. Test broadcasts began in January 2022.
WIKI
William Romney Sir William Romney (died 25 April 1611) was an English merchant. He was governor of the East India Company and took part in other ventures to develop English interests in overseas trade. Life Romney, the only son of William Romney of Tetbury, Gloucestershire, and his wife Margaret, was a member of the Haberdashers' Company, and one of the original promoters of the East India Company. For some time governor of the Merchant Adventurers' Company, he went to the Netherlands as one of the commissioners for that society in June 1598 to obtain a staple for their wool, cloth, and kerseys. On 22 September 1599 he subscribed £200 in the intended voyage to the East Indies, and on 24 September was made one of the treasurers for the voyage. An incorporator and one of the first directors of the East India Company, he was elected deputy-governor on 9 January 1601, and governor in 1606. In November 1601 he urged the company to send an expedition to discover the Northwest Passage, either in conjunction with the Muscovy Company or alone. When the latter company consented to join in the enterprise (22 December 1601), he became treasurer for the voyage. He later joined in sending out Henry Hudson to discover a Northwest Passage in April 1610. On 18 December 1602 Romney was elected alderman of Portsoken ward, and in 1603 one of the sheriffs of the City of London. On 26 July 1603, he was knighted at Whitehall. After the end of the Anglo-Spanish War, there was an initiative to revive the Spanish Company; on 14 May 1604 he was elected as one of the company's assistants, and in August was one of those who attended the peace treaty negotiations with Spanish delegates. He sat on committees which established details of the trade. Following the discovery of the Gunpowder Plot in November 1605, Romney was asked to make searches in London by the Lord Chief Justice for Lady Gray, who had been Robert Catesby's landlady. When in 1607 the Colony of Virginia was established, Romney was appointed as one of the councillors who adjudged affairs concerning the colony. On 28 February 1610, he was a signatory to the appointment of the first Governor of Virginia, Thomas West, 3rd Baron De La Warr. He died on 25 April 1611. By his will, dated 18 April 1611, he gave liberally to the hospitals, £20 to forty poor scholars in Cambridge, and £50 to the Haberdashers' Company to be lent to a young freeman gratis for two years. Romney married Rebecca, daughter of Robert Taylor, a haberdasher and alderman of the City of London; they had five sons and two daughters.
WIKI
Project General Profile Paste Download (5.05 KB) Statistics | Branch: | Revision: root / drupal7 / sites / all / modules / webform_validation / README.md @ 76bdcd04 1 ## Description 2 3 This module adds an extra tab to each webform node, allowing you to specify 4 validation rules for your webform components. You can create one or more of 5 the predefined validation rules, and select which webform component(s) should 6 be validated against those. By using the hooks provided by this module, you 7 can also define your own validation rules in your own modules. 8 9 The following validation rules are currently included: 10 11 - Numeric values (optionally specify min and / or max value) 12 - Minimum length 13 - Maximum length 14 - Minimum number of words 15 - Maximum number of words 16 - Equal values on multiple fields 17 - Unique values on multiple fields 18 - Specific value 19 - Require at least one of two fields 20 - Require at least one of several fields 21 - Minimum number of selections required 22 - Maximum number of selections allowed 23 - Exact number of selections required 24 - Plain text (disallow tags) 25 - Regular expression 26 - Must be empty (Anti-Spam: Hide with CSS) 27 - Words blacklist 28 - Must match a username 29 30 ## Installation 31 32 1. Place the module folder in your sites/all/modules folder 33 2. Make sure you have the webform module enabled 34 3. Activate the module via admin/build/modules 35 36 ## Usage 37 38 Once you have installed the module, an extra tab will appear on the node's 39 webform management pages (tab "Edit" in Webform 2.x, tab "Webform" in Webform 40 3.x). This extra tab is labeled "Webform validation". Upon selecting this 41 tab, you can choose to add one of the available validation rules to your 42 webform. Make sure you have added the webform components you wish to validate 43 before adding the validation rule. After clicking the link to add the desired 44 validation rule, you can specify the following details for your rule: 45 46 - an administrative name to describe the validation rule 47 - one or more webform components that should be validated against this rule 48 (depending on the chosen rule, you will have to select a specific number of 49 components for the validation rule to work properly). 50 51 Depending on the chosen rule, more form fields will be available on the rules 52 form: 53 54 - optionally an extra setting to further configure the rule 55 - optionally a custom error message textfield 56 57 Once you have configured your desired validation rules for the selected 58 webform components, every time a user fills in the webform, the validation 59 will be triggered for the selected components, and show the user a standard 60 form error message when entered data doesn't pass the validation rule you 61 have set up. 62 63 ## Adding custom validation rules 64 65 The following steps will let you add custom validators through your module: 66 67 1. Implement hook hook_webform_validation_validators(). This hook 68 implementation should return an array of validator key => options array 69 entries. See function webform_validation_webform_validation_validators() in 70 webform_validation.validators.inc for a live example. The options array can 71 contain the following configuration keys: 72 * name (required): name of the validator. 73 * component types (required): defines which component types can be 74 validated by this validator. Specify 'all' to allow all types. 75 * custom_error (optional): define whether a user can specify a custom 76 error message upon creating the validation rule. 77 * custom_data (optional): define whether custom data can be added to the 78 validation rule. 79 * min_components (optional): define the minimum number of components to be 80 selected for creating a validation rule. 81 * max_components (optional): define the maximum number of components to be 82 selected for creating a validation rule. 83 * description (optional): provide a descriptive explanation about the 84 validator. 85 2. Implement hook hook_webform_validation_validate($validator_name, $items, 86 $components, $rule). This hook gets passed 4 parameters, which will allow you 87 to react to your custom validator (or any other validator for that matter). 88 See function webform_validation_webform_validation_validate() in 89 webform_validation.validators.inc for a live example. Explanation about these 90 parameters: 91 * $validator_name: this is the validator name (i.e. array key as entered 92 in hook_webform_validation_validators). 93 * $items: array containing user submitted entries to be validated. 94 * $components: this array contains the definitions of the webform 95 components in your form. 96 * $rule: this array contains the details of your validation rule. 97 98 ## Additional hooks 99 100 The hook hook_webform_validation($type, $op, $data) can be used to react on 101 various webform_validation based actions. 102 103 * $type - possible values: 'rule' 104 * $op - possible values: 'add', 'edit', 'delete' 105 * $data - array with rule data in case of $op add/edit, rule id in case of 106 $op delete. 107 108 The hook hook_webform_validator_alter(&$validators) can be used to alter the 109 array of validators that is being generated by 110 hook_webform_validation_validators(). 111 112 * $validators - array of validators as supplied by modules implementing 113 hook_webform_validation_validators(). 114 115 ## Author 116 117 Sven Decabooter (https://www.drupal.org/user/35369) 118 119 The author can be contacted for paid customizations of this module as well as 120 Drupal consulting and development.
ESSENTIALAI-STEM
Queries one or more NAT bandwidth packages in a region. This API can be called only if you purchased a NAT bandwidth package before January 26, 2018. If your account does not have a NAT bandwidth package purchased before January 26, 2018, you can associate an Elastic IP Address (EIP). For more information, see AssociateEipAddress. Make the API call You can use OpenAPI Explorer to make API calls, search for API calls, perform debugging, and generate SDK example code. Request parameters Parameter Type Required? Example value Description Action String Yes DescribeBandwidthPackages The name of this action. Value: DescribeBandwidthPackages RegionId String Yes cn-hangzhou The ID of the region to which the NAT Gateway belongs. To query the region ID, call DescribeRegions. BandwidthPackageId String No bwp-bp1xea10o8qxwdfs**** The ID of the NAT bandwidth package. NatGatewayId String No ngw-bp1uewa15k4iydfre**** The ID of the NAT Gateway. PageNumber Integer No 10 The page number. Default value: 1 PageSize Integer No 10 The number of entries per page in the case of a paged query result. Maximum value: 50. Default value: 10 Response parameters Parameter Type Example value Description  BandwidthPackages A list of NAT bandwidth packages. BandwidthPackage The details of the NAT bandwidth package. Bandwidth String 5 The bandwidth value of the NAT bandwidth package. Value range: 5 to 5000. Unit: Mbit/s BandwidthPackageId String bwp-xxoo123sfwr**** The ID of the NAT bandwidth package. BusinessStatus String Normal The status of the NAT bandwidth package. • Normal: The NAT bandwidth package is normal. • FinancialLocked: The NAT bandwidth package is locked because of an overdue bill. • SecurityLocked: The NAT bandwidth package is locked due to security reasons. CreationTime String 2017-06-08T12:20:55 The time when the NAT bandwidth package was created. This parameter uses the ISO 8601 format and the output is UTC+8. Format: YYYY-MM-DDThh:mmZ. Description String test123 The description of the NAT bandwidth package. The description is 2 to 256 characters in length. The description is displayed in the console. If this parameter is not specified, it is null. The default value is null. The description cannot start with http:// or https://. ISP String BGP The service provider type. Currently, only BGP is supported. InstanceChargeType String PostPaid The billing method of the NAT bandwidth package. Currently, only PostPaid (pay-as-you-go) is supported. InternetChargeType String PayByBandwidth The billing method of the Internet traffic. • PayByTraffic: billed according to the traffic consumed. IpCount String 1 The number of public IP addresses in the NAT bandwidth package. Value range: 1 to 50 Name String abc The name of the NAT bandwidth package. NatGatewayId String ngw-xxoo123ggtf**** The ID of the NAT Gateway. PublicIpAddresses A list of IP addresses in the NAT bandwidth package. PublicIpAddresse The details of the IP address in the NAT bandwidth package. AllocationId String eip-2zeerraiwb7ujdeds**** The ID of the IP address. IpAddress String 116.xx.xx.28 The IP address. UsingStatus String Available The status of the IP address. RegionId String cn-hangzhou The ID of the region to which the NAT bandwidth package belongs. Status String Available The status of the NAT bandwidth package. ZoneId String cn-shanghai-a The zone to which the NAT bandwidth package belongs. TotalCount Integer 10 The total number of entries. PageNumber Integer 10 The current page number. PageSize Integer 10 The number of entries per page. RequestId String 4EC47282-1B74-4534-BD0E-403F3EE64CAF" The ID of the request. Examples Request example https://vpc.aliyuncs.com/?Action=DescribeBandwidthPackages &RegionId=cn-hangzhou &<CommonParameters> Response example XML format <DescribeBandwidthPackagesResponse> <PageNumber>1</PageNumber> <TotalCount>1</TotalCount> <BandwidthPackages> <BandwidthPackage> <Description></Description> <IpCount>2</IpCount> <ISP>BGP</ISP> <ZoneId>cn-hangzhou-b</ZoneId> <InternetChargeType>PayByTraffic</InternetChargeType> <NatGatewayId>ngw-bp1uewa15k4iyaszaasza****</NatGatewayId> <Name></Name> <CreationTime>2018-03-06T07:33:51Z</CreationTime> <Status>Available</Status> <BandwidthPackageId>bwp-bp1xea10o8qxwaswq****</BandwidthPackageId> <BusinessStatus>Normal</BusinessStatus> <RegionId>cn-hangzhou</RegionId> <InstanceChargeType>PostPaid</InstanceChargeType> <PublicIpAddresses> <PublicIpAddresse> <IpAddress>118.31.xx.xx</IpAddress> <AllocationId>nateip-bp1jb1uijvm9oaqaqaqaq****</AllocationId> <UsingStatus>Idle</UsingStatus> </PublicIpAddresse> <PublicIpAddresse> <IpAddress>118.31.xx.xx</IpAddress> <AllocationId>nateip-bp1dt4hpe8847aceb****</AllocationId> <UsingStatus>UsedBySnatTable</UsingStatus> </PublicIpAddresse> </PublicIpAddresses> <Bandwidth>5</Bandwidth> </BandwidthPackage> </BandwidthPackages> <PageSize>10</PageSize> <RequestId>8909013D-4A64-41A6-93E6-E3FD08A3EAFE</RequestId> </DescribeBandwidthPackagesResponse> JSON format { "PageNumber":1, "TotalCount":1, "BandwidthPackages":{ "BandwidthPackage":[ { "Description":"", "IpCount":"2", "ISP":"BGP", "ZoneId":"cn-hangzhou-b", "InternetChargeType":"PayByTraffic", "NatGatewayId":"ngw-bp1uewa15k4iyaszaasza****", "Name":"", "CreationTime":"2018-03-06T07:33:51Z", "Status":"Available", "BandwidthPackageId":"bwp-bp1xea10o8qxwaswq****", "BusinessStatus":"Normal", "RegionId":"cn-hangzhou", "InstanceChargeType":"PostPaid", "PublicIpAddresses":{ "PublicIpAddresse":[ { "IpAddress":"118.31.xx.xx", "AllocationId":"nateip-bp1jb1uijvm9oaqaqaqaq****", "UsingStatus":"Idle" }, { "IpAddress":"118.31.xx.xx", "AllocationId":"nateip-bp1dt4hpe8847aceb****", "UsingStatus":"UsedBySnatTable" } ] }, "Bandwidth":"5" } ] }, "PageSize":10, "RequestId":"8909013D-4A64-41A6-93E6-E3FD08A3EAFE" } Errors HTTP status code Error code Error message Error message 404 InvalidRegionId.NotFound The specified RegionId does not exist in our records. The specified region ID does not exist. For a list of error codes, visit the API Error Center.
ESSENTIALAI-STEM
Datasheet::MakeRangeString   Description Construct range string of worksheet or matrix by the specified range from parameters Syntax string MakeRangeString( LPCSTR lpcstrColName1, LPCSTR lpcstrColName2 = NULL, int iBeginRow = -1, int iEndRow = -1 ) Parameters lpcstrColName1 [input] the name of the column from lpcstrColName2 [input] the name of the column to iBeginRow [input] the index of selected row from, 0 offset iEndRow [input] the index of selected row to, -1 means the last row Return The range string Examples EX1 int Datasheet_MakeRangeString_Ex1() { Worksheet wks = Project.ActiveLayer(); if(wks) { string strRange = wks.MakeRangeString("A"); // this range string is selected whole column A out_str(strRange); strRange = wks.MakeRangeString("A", "B", 0, 12); out_str(strRange); } return 0; } Remark See Also Header to Included origin.h
ESSENTIALAI-STEM
in The Fascinating World of Helicopters: From Design to Flight The Fascinating World of Helicopters: From Design to Flight Helicopters, those magnificent machines that defy gravity, have captured our imaginations since their inception. They are marvels of engineering, capable of hovering, flying backwards, and even performing acrobatic maneuvers. But have you ever wondered how these incredible machines actually work? The Science Behind Helicopter Flight The key to helicopter flight lies in the rotor system. Unlike airplanes that rely on fixed wings, helicopters use rotating blades, or rotors, to generate lift. The rotors are angled, creating a difference in air pressure above and below them. This pressure difference generates a force called lift, which pushes the helicopter upwards. How Rotors Create Lift Imagine a spinning propeller. As the propeller spins, the air behind it is pushed downwards, creating a downward force. The helicopter rotor works in a similar way. The angled blades create a downward force on the air, which, according to Newton's third law of motion, generates an equal and opposite upward force on the rotor, lifting the helicopter. Types of Helicopter Rotors There are different types of rotor systems used in helicopters, each with its own advantages and disadvantages. 1. Single Main Rotor This is the most common type of rotor system. It uses a single large rotor located on top of the helicopter. The main rotor provides lift and control, while a smaller tail rotor counteracts the torque generated by the main rotor, preventing the helicopter from spinning. 2. Tandem Rotor Tandem rotor helicopters have two main rotors mounted one behind the other. This configuration provides increased lift and stability, making them suitable for heavy lifting and long-range flights. 3. Coaxial Rotor Coaxial rotor helicopters have two main rotors mounted on the same shaft, rotating in opposite directions. This design eliminates the need for a tail rotor and provides excellent maneuverability. The Future of Helicopter Technology Helicopter technology continues to evolve, with advancements in materials, engines, and automation. The future of helicopters holds exciting possibilities, including: • Electric Helicopters: Electric motors are becoming more powerful and efficient, making electric helicopters a viable option for short-range flights. • Autonomous Helicopters: Advancements in artificial intelligence and autonomous flight technology are paving the way for self-flying helicopters. • Hybrid Helicopters: Combining electric motors with traditional engines can improve fuel efficiency and reduce emissions. Conclusion Helicopters are fascinating machines that embody the ingenuity of human engineering. From their basic principles of flight to their ever-evolving technology, helicopters continue to amaze us with their capabilities. As technology advances, we can expect to see even more incredible developments in the world of helicopters, pushing the boundaries of flight and innovation.
ESSENTIALAI-STEM
150 Million Reasons … A Rainy-day Topic About Why Microsoft Software Needs To Be Upgraded. Blog / 150 Million Reasons … A Rainy-day Topic About Why Microsoft Software Needs To Be Upgraded. It’s summertime in Alberta and that means the rains have started. I’m most likely not the only person who spent Canada Day indoors watching the downpour. With summer comes time for an article or two about WHY. The recent announcement that Microsoft are retiring Windows 7 and a host of server operating systems and applications, have spawned more than one WHY question. Many users are suspicious of software vendor motives, preferring to think it’s just an excuse for a cash grab. However, over the years, I’ve been involved in more than one software development project, and so I can offer a glimpse into why software needs to be updated, what’s involved – and why it periodically needs to be replaced with a whole new system. The short answer can be summed up in three words: Compatibility – Security – Features. But that hardly does justice to understanding the true “why” behind the constant cycle of upgrades. Let me put a programmer’s perspective on this, to help you understand the complexity of software development. Software is usually written in a pseudo-English language that forms the instructions to make a computer “do something”; the Software Development Language (SDL). Of course, the CPU doesn’t respond to English, so the code is compiled into digital machine instructions by the SDL that the CPU understands. Many of you will remember writing simple programs in “BASIC”, as part of a Physics school course. If you look at the written code, it looks more like poetry than a storybook: Lots of short and repeatable lines with odd-looking punctuation. You’ll also remember that one comma or letter out of place would cause the program to be unpredictable or precipitate it to fail completely. A very general way of determining the overall complexity of a software program is to count the number of lines of code. Software engineers will warn that counting code lines as a measure of software complexity can be misleading, but it will serve our purposes. Our BASIC programs from school had a couple-of-dozen code lines; at most – fifty. MS-DOS (Disk Operating System) version 1.25 was Microsoft’s first computer operating system released in 1983, and it had just under 14,000 lines of code. By conservative estimates, Windows 7 has 50 million code lines. It takes a small army of software engineers, design specialists, and testers to maintain this code. With this much code, there are bound to be mistakes; perhaps many thousands, that we call bugs. Some bugs are apparent in that the program doesn’t perform as the user intended. Other bugs are hidden and may affect the way information is processed and stored. Hidden bugs are what hackers exploit to gain illegal access to your computer and cause a Cyber Security Breach. In addition to bugs, programmers often take intentional shortcuts to make processing an instruction faster or easier. It’s a constant trade-off between speed, reliability, and security. Still more problems arise when 3rd party code – called software libraries – are embedded in a larger application. A typical example is a print driver. Rather than Microsoft writing the instructions to send a document from Windows to a printer, the printer manufacturer provides the software code library that specifically interfaces with the new printer and its features. But it can introduce its own bugs. And then there are advancements in hardware. Chip manufacturers strive to change the way CPU’s process instructions in search of greater speed. They add capabilities and processing cores. This means that software programmers must adapt to new code instructions and ways of designing their software, if they want to take advantage of the speed and capability of a new computer. This can lead to a complete re-design of the software. So far, we’ve focused on the Windows operating system. Of course, a popular application like Office has its own code base, estimated to be about the same number of lines as the Windows operating system. Windows 10 is estimated to have about 65 million lines; add another 60+ million for Office, and then throw in another 10 or 15 million for some other applications (Adobe Acrobat, Google Chrome, and Trend Micro Anti-Virus for example), and you quickly get to 150 million-plus lines of code making up the software on your computer. It’s a minor miracle most software works as well as it does. Software development is a constant tension between eliminating bugs to improve reliability and preventing Cyber Security breaches – and adding new features to take advantage of the hardware improvements and user demands. Once released to the public, software engineers keep their code up-to-date by releasing patches, which are segments of code with new lines to address a bug or add a feature. However, patches often involve compromises – fixes on top of fixes. Microsoft release software patches for the operating systems and applications, about once a month. Sometimes, you have to start over with a completely new code design that is optimized for new hardware. That’s when you see a new version – I.E.: Windows 10, Server 2016, or Office 2019. Microsoft are well-paid for their software and services; as their deep pockets and global reach will attest to. But it’s not an easy task and considering the incredible strides in computing technology within the last decade alone, I don’t begrudge them a few of my dollars for their efforts. However, I do get upset with yet-another-round of Windows Updates that take over my computer with increasing regularity! In the coming months, we’ll have much more information about the best way to prepare for the Windows 7 retirement and upgrade to Windows 10. We’ll also have some advice on the other Microsoft server-software retirees. Should you have questions, please contact me or your TRINUS Account Manager for some stress-free software upgrade help. And, as I write this, it hasn’t rained (yet)…   Thanks! Dave White TRINUS stress-free IT dwhite@trinustech.com trinustech.com /Partners /Systems /Certifications TRINUS is proud to partner with Industry Leaders for both hardware and software who reflect our values of reliability, professionalism and Client-focused service.
ESSENTIALAI-STEM
Dental Health Article by Dr Emma - "Super Saliva" Dental Health Dr. Emma Saliva's got a bad name. In fact, it's got a lot of bad names: spit, gob, dribble, drool, slobber. The average person doesn't appreciate how amazing and useful it is though. Saliva really is super, for lots of reasons.  Saliva is essential for eating. Have you ever tried to eat a dry Weet-Bix? Once that first burst of saliva is used up, it's nearly impossible to continue chewing the flakey, dry mess that's left behind. You need the lubrication of saliva to help move the food around your mouth, and to stop food from cutting and scraping the inside of your mouth. Saliva also contains enzymes. These are chemicals which help to start breaking down the food and begin the digestion process. If you're one of the many people who fears public speaking, you'll have noticed that talking with a dry mouth can be difficult. It's saliva's lubrication quality that comes into play again here. It prevents your tongue from sticking to your teeth and the roof of your mouth, making speech possible. Saliva also has antibacterial qualities. It can kill off microscopic foreign invaders with its own biological weapons - lysozyme and immunoglobulin. A kid in primary school once told me you should spit on a cut to help disinfect it. I'm certain that dribbling on wounds is not common practice in hospital emergency rooms, but the basis of the theory makes some sort of sense.  Finally, the minerals contained in your saliva help to re-harden your teeth after you eat. Every time you eat or drink anything with sugar in it, the bacteria in plaque turn the sugar into acid, which starts dissolving your enamel. A plentiful flow of good quality saliva bathes your teeth in minerals, which are absorbed by your teeth to reverse the damage. So what happens if you have little or no saliva? Radiotherapy to the head/neck, dehydration, and a lot of medications can affect salivary flow. If you look at the great things saliva does, you can guess what problems a dry mouth might cause: difficulty eating and tasting food, oral discomfort including burning sensations, delicate oral tissues which are easily damaged, speech problems, higher plaque levels, increased risk of oral infections, and an increased risk of tooth decay. Take a moment today to appreciate your saliva - it's amazing! Dr Emma Exclusive offer for Dr Emma's readers: Become a HIF member like Dr Emma and we'll reward you with a $50 gift. Simply join online or over the phone by calling 1300 13 40 60 and mention this promo-code: DREMMA50   (conditions apply) Need dental insurance? We've got you covered - view our dental benefits here. Important: This article is general advice only. For further advice or information on this topic, please consult your health professional.   Category:Dental Health Add a Comment 1. Enter your comments   Your details Approval
ESSENTIALAI-STEM
Sarah Stillman Sarah Stillman is an American professor, staff writer at The New Yorker magazine, and Pulitzer Prize-winning journalist focusing on immigration policy, the criminal justice system, and the impacts of climate change on workers. Stillman won a National Magazine Award in 2012 for her reporting from Iraq and Afghanistan and again in 2019 for her article in The New Yorker on deportation as a death sentence. She won a 2012 George Polk Award for her reporting on the high-risk use of young people as confidential informants in the war on drugs, and a second Polk Award in 2021 for coverage of migrant workers and climate change. She also won the 2012 Hillman Prize. In 2016, she was named a MacArthur Fellow. She won a 2024 Pulitzer Prize for Explanatory Reporting for her coverage inThe New Yorker about troubling injustices in felony murder prosecutions in the U.S. Her investigative reporting has shed light on profiteering in key areas of U.S. life, particularly prisons and jails; immigration detention facilities; disaster recovery programs; and U.S. war zone contracting. She has written in-depth stories on the return of debtors’ prisons, the police use and abuse of civil asset forfeiture, family separations at the U.S.-Mexico border, and more. She runs the Yale Investigative Reporting Lab, a collaborative public-interest journalism project that seeks to deepen coverage of criminal justice, climate change, migration, and mental health. Stillman also teaches narrative non-fiction at Yale University’s English Department. In 2016, Stillman became founding director of the Global Migration Program at Columbia University Graduate School of Journalism, where she taught a course on “Gender and Migration” and mentored post-graduate fellows on a range of refugee-related reporting projects. The rights to a number of her articles in The New Yorker have been sold to Hollywood filmmakers and studios, including her story on confidential informants, which was acquired in 2014 by Paramount Pictures and Oscar-winning writer/producer William Monahan. Stillman was elected in 2020 to the American Academy of Arts and Sciences, which includes “world leaders in the arts and sciences, business, philanthropy, and public affairs … who promote nonpartisan recommendations that advance the public good.” Education Stillman graduated from Georgetown Day School in Washington, D.C., and graduated summa cum laude with exceptional distinction from Yale University in 2006. While in college, she founded and edited an interdisciplinary feminist journal, Manifesta, and co-directed the Student Legal Action Movement, a group devoted to reforming the American prison system. At Yale, Stillman taught poetry and writing at to inmates at the men’s maximum-security prison in Cheshire, CT. Stillman was a Marshall Scholar at Oxford University. In 2009, she was embedded with the 116th Military Police Company. She was a visiting scholar at New York University and has taught at Columbia University and at Yale University. She is also a staff writer for The New Yorker. Awards In 2005, Stillman was awarded the Elie Wiesel Prize in Ethics. She was the recipient of the inaugural Reporting Award from the Arthur L. Carter Journalism Institute at New York University in 2010. Stillman won the 2012 National Magazine Award for Public Interest for her reporting for The New Yorker from Iraq and Afghanistan on labor abuses and human trafficking on United States military bases. She won a second National Magazine Award for Public Interest in 2021 for her article in The New Yorker on the deaths of immigrants deported by the U.S. She is also the recipient of the Overseas Press Club's Joe and Laurie Dine Award for international human-rights reporting, the Hillman Prize for Magazine Journalism, and the Michael Kelly Award. Stillman won the 2013 Front Page Award from the Newswomen’s Club of New York for in-depth reporting on police who seize citizens’ assets without trial in a process called civil forfeiture. She also won the Molly National Journalism Prize in 2013. Stillman received the New America Award from the Society of Professional Journalists for her reporting in 2015 on the lucrative migrant-extortion industry in the U.S. border region. “Stillman took great risks to accompany migrants along the dangerous 3,000-mile trail from Central America through Mexico to the United States,” the award citation stated. In 2016, the John D. and Catherine T. MacArthur Foundation awarded Stillman a MacArthur fellowship. She reported and voiced “The Essential Workers of the Climate Crisis” for WNYC Studios, which won the national Edward R. Murrow Award for best radio news documentary in 2022. In 2020, her essay “Like a Monarch” appeared in All We Can Save, a collection of essays and poetry that highlights a wide range of women's voices in the environmental movement. Stillman’s work also appears in The Best American Magazine Writing 2012 and The Best American Magazine Writing 2017. In 2024, as a staff writer of The New Yorker, she won a Pulitzer Prize for Explanatory Reporting for her coverage of troubling injustices in felony murder prosecutions in the U.S.
WIKI
Page:A History of Indian Philosophy Vol 1.djvu/153 v] Theo-ry o.f Good and Evil 137 destroy hindrances wherever they are met with and obtain all- penetrating insight that enables them to become conscious of the absolute oneness (samalli) of the universe (sarvaloka) and to see innumerable Buddhas and Bodhisattvas." There is a difference between the perfuming which is not in unison with such ness, as in the case of sravakas (theravadin monks), pratyekabuddhas and the novice bodhisattvas, who only continue their religious discipline but do not attain to the state of non-particularization in unison with the essence of suchness. But those bodhisattvas whose perfuming is already in unison with suchness attain to the state of non-particularization and allow themselves to be influenced only by the power of the dharma. The incessant perfuming of the defiled dharma (ignorance from all eternity) works on, but when one attains to Buddhahood one at once puts an end to it. The perfuming of the pure dharma (i.e. suchness) however works on to eternity without any interrup- tion. For this suchness or thatness is the effulgence of great wisdom, the universal illumination of the dharmadhatu (universe), the true and adequate knowledge, the mind pure and clean in its own nature, the eternal, the blessed, the self-regulating and the pure, the tranquil, the inimitable and the free, and this is called the tathagatagarbha or the dharmakaya. I t may be objected that since thatness or suchness has been described as being without characteristics, it is now a contradiction to speak of it as embracing all merits, but it is held, that in spite of its embracing all merits, it is free in its nature from all forms of distinction, because all objects in the world are of one and the same taste; and being of one reality they have nothing to do with the modes of par- ticularization or of dualistic character. "Though all things in their (metaphysical) origin come from the soul alone and in truth are free from particularization, yet on account of non-enlightenment there originates a subjective mind (ii/ayavijiiiilla) that becomes conscious of an external world." This is called ignorance or avidya. Nevertheless the pure essence of the mind is perfectly pure and there is no awakening of ignorance in it. Hence we assign to suchness this quality, the effulgence of great wisdom. It is called universal illumination, because there is nothing for it to illumine. This perfuming of suchness therefore continues for ever, though the stage of the perfuming of avidya comes to an end with the Buddhas when they attain to nirva1)a. All Buddhas while at
WIKI
{"metadata":{"image":[],"title":"","description":""},"api":{"url":"","auth":"required","settings":"","results":{"codes":[]},"params":[]},"next":{"description":"","pages":[]},"title":"List of available Google Cloud Platform instances","type":"basic","slug":"list-of-available-google-cloud-platform-instances","excerpt":"","body":"The list below shows available Google Cloud Platform instances that you can choose and specify as a value for the `sbg:GoogleInstanceType` hint. \n\nSee the [Google Cloud Platform page on instance types](https://cloud.google.com/compute/vm-instance-pricing#n1_predefined) for details on pricing.\n\nPersistent disk storage can be set to anything between 2GB and 4 TB. Learn more from our [Persistent Disk Customization Documentation](doc:set-computation-instances#section-set-attached-storage-size).\n\n| Name | Cores | RAM [GB] | Auto-scheduling * |\n|----------------|-------|----------|-------------------|\n| n1-standard-1 | 1 | 3.75 | Yes |\n| n1-standard-2 | 2 | 7.5 | Yes |\n| n1-standard-4 | 4 | 15.0 | Yes |\n| n1-standard-8 | 8 | 30.0 | Yes |\n| n1-standard-16 | 16 | 60.0 | Yes |\n| n1-standard-32 | 32 | 120.0 | Yes |\n| n1-standard-64 | 64 | 240.0 | Yes |\n| n1-standard-96 | 96 | 360.0 | No |\n| n1-highcpu-2 | 2 | 1.8 | Yes |\n| n1-highcpu-4 | 4 | 3.6 | Yes |\n| n1-highcpu-8 | 8 | 7.2 | Yes |\n| n1-highcpu-16 | 16 | 14.4 | Yes |\n| n1-highcpu-32 | 32 | 28.8 | Yes |\n| n1-highcpu-64 | 64 | 57.6 | Yes |\n| n1-highcpu-96 | 96 | 86.4 | No |\n| n1-highmem-2 | 2 | 13.0 | Yes |\n| n1-highmem-4 | 4 | 26.0 | Yes |\n| n1-highmem-8 | 8 | 52.0 | Yes |\n| n1-highmem-16 | 16 | 104.0 | Yes |\n| n1-highmem-32 | 32 | 208.0 | Yes |\n| n1-highmem-64 | 64 | 416.0 | Yes |\n| n1-highmem-96 | 96 | 624.0 | No |\n\n\\* Instances labelled with **Yes** in the auto-scheduling column are the instances that are selected for task execution automatically based on the defined CPU and memory requirements. To be able to use instances that are not available for automatic scheduling, you must set the instance type explicitly using the `sbg:GoogleInstanceType` [hint](doc:list-of-execution-hints).\n\nWe last updated the list on Fri, 16 Oct 2020 12:27:09 GMT","updates":[],"order":5,"isReference":false,"hidden":false,"sync_unique":"","link_url":"","link_external":false,"_id":"5f8980a810f3470050a22217","createdAt":"2020-10-16T11:14:48.553Z","user":"5767bc73bb15f40e00a28777","category":{"sync":{"isSync":false,"url":""},"pages":[],"title":"Task Execution","slug":"task-execution","order":17,"from_sync":false,"reference":false,"_id":"5eb0172be179b70073dc936e","createdAt":"2020-05-04T13:22:51.351Z","version":"5773dcfc255e820e00e1cd50","project":"5773dcfc255e820e00e1cd4d","__v":0},"version":{"version":"1.0","version_clean":"1.0.0","codename":"","is_stable":true,"is_beta":false,"is_hidden":false,"is_deprecated":false,"categories":["5773dcfc255e820e00e1cd51","5773df36904b0c0e00ef05ff","577baf92451b1e0e006075ac","577bb183b7ee4a0e007c4e8d","577ce77a1cf3cb0e0048e5ea","577d11865fd4de0e00cc3dab","578e62792c3c790e00937597","578f4fd98335ca0e006d5c84","578f5e5c3d04570e00976ebb","57bc35f7531e000e0075d118","57f801b3760f3a1700219ebb","5804d55d1642890f00803623","581c8d55c0dc651900aa9350","589dcf8ba8c63b3b00c3704f","594cebadd8a2f7001b0b53b2","59a562f46a5d8c00238e309a","5a2aa096e25025003c582b58","5a2e79566c771d003ca0acd4","5a3a5166142db90026f24007","5a3a52b5bcc254001c4bf152","5a3a574a2be213002675c6d2","5a3a66bb2be213002675cb73","5a3a6e4854faf60030b63159","5c8a68278e883901341de571","5cb9971e57bf020024523c7b","5cbf1683e2a36d01d5012ecd","5dc15666a4f788004c5fd7d7","5eaff69e844d67003642a020","5eb00899b36ba5002d35b0c1","5eb0172be179b70073dc936e","5eb01b42b36ba5002d35ebba","5eb01f202654a20136813093","5eb918ef149186021c9a76c8","5f0839d3f4b24e005ebbbc29","5f893e508c9862002d0614a9","6024033e2b2f6f004dfe994c","60a7a12f9a06c70052b7c4db","60a7ab97266a4700161507c4","60b0c84babba720010a8b0b5"],"_id":"5773dcfc255e820e00e1cd50","__v":39,"createdAt":"2016-06-29T14:36:44.812Z","releaseDate":"2016-06-29T14:36:44.812Z","project":"5773dcfc255e820e00e1cd4d"},"project":"5773dcfc255e820e00e1cd4d","__v":0,"parentDoc":null} List of available Google Cloud Platform instances The list below shows available Google Cloud Platform instances that you can choose and specify as a value for the `sbg:GoogleInstanceType` hint. See the [Google Cloud Platform page on instance types](https://cloud.google.com/compute/vm-instance-pricing#n1_predefined) for details on pricing. Persistent disk storage can be set to anything between 2GB and 4 TB. Learn more from our [Persistent Disk Customization Documentation](doc:set-computation-instances#section-set-attached-storage-size). | Name | Cores | RAM [GB] | Auto-scheduling * | |----------------|-------|----------|-------------------| | n1-standard-1 | 1 | 3.75 | Yes | | n1-standard-2 | 2 | 7.5 | Yes | | n1-standard-4 | 4 | 15.0 | Yes | | n1-standard-8 | 8 | 30.0 | Yes | | n1-standard-16 | 16 | 60.0 | Yes | | n1-standard-32 | 32 | 120.0 | Yes | | n1-standard-64 | 64 | 240.0 | Yes | | n1-standard-96 | 96 | 360.0 | No | | n1-highcpu-2 | 2 | 1.8 | Yes | | n1-highcpu-4 | 4 | 3.6 | Yes | | n1-highcpu-8 | 8 | 7.2 | Yes | | n1-highcpu-16 | 16 | 14.4 | Yes | | n1-highcpu-32 | 32 | 28.8 | Yes | | n1-highcpu-64 | 64 | 57.6 | Yes | | n1-highcpu-96 | 96 | 86.4 | No | | n1-highmem-2 | 2 | 13.0 | Yes | | n1-highmem-4 | 4 | 26.0 | Yes | | n1-highmem-8 | 8 | 52.0 | Yes | | n1-highmem-16 | 16 | 104.0 | Yes | | n1-highmem-32 | 32 | 208.0 | Yes | | n1-highmem-64 | 64 | 416.0 | Yes | | n1-highmem-96 | 96 | 624.0 | No | \* Instances labelled with **Yes** in the auto-scheduling column are the instances that are selected for task execution automatically based on the defined CPU and memory requirements. To be able to use instances that are not available for automatic scheduling, you must set the instance type explicitly using the `sbg:GoogleInstanceType` [hint](doc:list-of-execution-hints). We last updated the list on Fri, 16 Oct 2020 12:27:09 GMT
ESSENTIALAI-STEM
User:Tediustortoise/sandbox CAP 413 The Civil Aviation Publication (CAP) 413 is a freely available Radiotelephony Telephony Manual written and updated by the UK Civil Aviation Authority (CAA). The aim of the publication is, "To provide pilots, Air Traffic Services personnel and aerodrome drivers with a compendium of clear, concise, standard phraseology and associated guidance for radiotelephony communication in United Kingdom airspace." All users of radiotelephony, with regards to Aviation, are expected to comply with the phraseology described in the manual.
WIKI
Maxilla (arthropod mouthpart) In arthropods, the maxillae (singular maxilla) are paired structures present on the head as mouthparts in members of the clade Mandibulata, used for tasting and manipulating food. Embryologically, the maxillae are derived from the 4th and 5th segment of the head and the maxillary palps; segmented appendages extending from the base of the maxilla represent the former leg of those respective segments. In most cases, two pairs of maxillae are present and in different arthropod groups the two pairs of maxillae have been variously modified. In crustaceans, the first pair are called maxillulae (singular maxillula). Modified coxae at the base of the pedipalps in spiders are also called "maxillae", although they are not homologous with mandibulate maxillae. Millipedes In millipedes, the second maxillae have been lost, reducing the mouthparts to only the first maxillae which have fused together to form a gnathochilarium, acting as a lower lip to the buccal cavity and the mandibles which have been enlarged and specialized greatly, used for chewing food. The gnathochilarium is richly infused with chemosensory and tactile receptors along its edge. A pair of maxillary glands, also called nephridial organs, involved in osmoregulation and excreting nitrogenous waste open up to the gnathochilarium and wastes are passed entirely through the digestive tract before being evacuated. The nephridial organs are thought to be derived from similar organs in annelids, although reduced in number since the open circulatory system of arthropods lessens the demand on separate excretory organs. The reason for their anterior location is probably because these organs must be developed early on in the embryo and millipedes and other arthropods develop mainly by proliferation of cells at the posterior of the embryo. Centipedes In centipedes, both pairs of maxillae are developed. The first maxillae are situated ventrally to the mandibles and obscure them from view. This pair consists of a basal plate formed from the fused coxae of each leg plus ventral sternite from this segment and is hence called a coxosternite and two pairs of conically jointed appendages called telopodites and coxal projections. The second maxillae, which partly cover the first maxillae, consist of only a telopodite and a coxosternite. The telopodite is recognizably leglike in structure and consists of three segments plus an apical claw. The second maxillae also have a metameric pore, which is the opening of the maxillary gland and maxillary nephridium homologous to those of millipedes. Crustaceans In crustaceans, the two pairs of maxillae are called maxillulae (1st pair) and maxillae (2nd pair). They serve to transport food to the mandibles but also frequently help in the filtration process and additionally they may sometimes play a role in cleaning and grooming. These structures show an incredible diversity throughout crustaceans but generally are very much flattened and leaf-like. The two pairs are normally positioned very close together and their apical parts generally are in direct contact with the mandible. Hexapoda The generalized condition in hexapods is for the first pair of maxillae to consist of a basal triangular sclerite called the cardo and a large central sclerite called the stipes from which arise three processes: the lacinia, the galea and the maxillary palp. The lacinia is often strongly sclerotized and toothed. It functions to cut and manipulate food in the mouth. The galea is a broad, scoop-like, lobe structure, which assists the maxillary palps in sampling items before ingestion. The maxillary palp is serially homologous to the walking leg while the cardo and stipes are regarded by most to be serially homologous to the first leg segment, the coxa. The labium is immediately posterior to the first maxillae and is formed from the fusion of the second maxillae, although in lower orders including the Archaeognatha (bristletails) and Thysanura (silverfish) the two maxillae are not completely fused. It consists of a basal submentum, which connects with the prementum through a narrow sclerite, the mentum. The labium forms the lower portion of the buccal cavity in insects. The prementum has a pair of labial palps laterally, and two broad soft lobes called the paraglossae medially. These paraglossae have two small slender lobes called glossae at their base. Specializations In many hexapods, the mouthparts have been modified for different functions and the maxillae and labium can change in structure greatly. In bees, the maxillae and labium have been modified and fused to form a nectar-sucking proboscis. In the order Hemiptera, the true bugs, plant hoppers, etc., the mouthparts have been modified to form a beak for piercing. The labium forms a sheath around a set of stylets that consist of an outer pair of mandibles and an inner pair of maxillae. In lapping flies, a proboscis is formed from mostly the labium specialized for lapping up liquids. The labial palps form a labella which have sclerotized bands for directing liquid to a hypopharangeal stylet, through which the fly can imbibe liquids. In lepidopterans, the fluid-sucking proboscis is formed entirely from the galea of the maxillae although labial palps are also present. In Odonata nymphs, the labium forms a mask-like extensible structure, which is used for reaching out and grasping prey.
WIKI
Page:Armatafragment00ersk.djvu/307 ¬tical one we had just come from, and sweating again like a bull, with my arms pinioned down as before, in a vain and fruitless approach to my handkerchief, I saw — may I never see an English play or opera if I deceive the reader in any thing — I saw the same individual men and women I had just before seen, and at the same inaccessible distances, unless it had pleased Heaven, for the punishment of a vain curiosity* or rather as a reward for my perseverance, to convert me into a salamander for the night. There is always, however, something to be learned, and even to be enjoyed, in this proba- tionary world from every occurrence, however painful. Seeing my friend and his sister ob- viously delighted, whilst I was literally dying, I could not help raising my mind to the con- templation of higher objects, reconciling to myself that the planets nearest the sun, and even the sun himself, might be inhabited by beings in other respects like ourselves, but with organs suited to their atmospheres, or perhaps to none at all, either of which would in a mo- ment ¬
WIKI
Wikipedia:Articles for deletion/Personal (album) The result was keep. Consensus is currently to keep, although sourcing can be improved (✉→BWilkins←✎) 15:10, 15 November 2012 (UTC) Personal (album) * – ( View AfD View log Stats ) I didn't find coverage of this album that would satisfy WP:NALBUMS or WP:GNG. Till 08:56, 7 November 2012 (UTC) * Note: This debate has been included in the list of Albums and songs-related deletion discussions. • Gene93k (talk) 01:17, 8 November 2012 (UTC) * Keep made billboard r&b #29, billboard hot 200, spawned three hits, on MJ's label, produced by teddy riley - let's presume this has been written about. <IP_ADDRESS> (talk) 04:39, 10 November 2012 (UTC) * "Let's presume this has been written about" — we don't presume here on Wikipedia. Please read WP:N. Till 06:06, 10 November 2012 (UTC) * Yes we do. I just did. <IP_ADDRESS> (talk) 12:32, 10 November 2012 (UTC) * Did you even bother to read what I just linked you? "If no reliable third-party sources can be found on a topic, then it should not have a separate article." Till 09:17, 11 November 2012 (UTC) * yes, & i presume such sources can be found. from WP:N: A topic is ... presumed notable if it meets [ WP:MUSIC ] . a specific criteria from wp:music - A[n] ... ensemble ... may be notable if it ... has had a single or album on any country's national music chart. <IP_ADDRESS> (talk) 21:20, 11 November 2012 (UTC) * You are reading it wrong. It doesn't say that we presume a topic has sources if it meets a SNG, it says a topic is presumed (meaning assumed) to be notable if it meets the SNG. Till 02:10, 12 November 2012 (UTC) * I am not reading it wrong at all. <IP_ADDRESS> (talk) 04:24, 13 November 2012 (UTC) * Keep. It's typically hard to find sources on albums that were released such a while ago. A quick search came up with an AllMusic review, which also gives information about it's release date, duration, credits, etc. The album has also charted, which shows some sort of notability. Lastly, it was also released by the record label of Michael Jackson. Article is in bad shape, but could be improved. If it can't be improved enough, a simple redirect to the article's page would do. Statυs ( talk ) 09:34, 11 November 2012 (UTC) * Well, I'd say I expanded the article quite a bit. Statυs ( talk ) 13:16, 11 November 2012 (UTC) * Indeed you have. & let's note the allmusic review and billboard entries constitute multiple WP:RS. <IP_ADDRESS> (talk) 21:20, 11 November 2012 (UTC) * The Billboard entries don't count for anything. Listings are not coverage. And the Allmusic review barely counts, considering how it really isn't significant coverage as is required by the notability standards. Silver seren C 08:39, 12 November 2012 (UTC) * The official record of placing on a national chart is of course significant coverage. <IP_ADDRESS> (talk) 04:24, 13 November 2012 (UTC) * Comment. I logged on today to check if this discussion had any new comments to it. I was, quite frankly, shocked to see it closed by Status' good friend with the rationale "The article meets both GNG and NALBUMS". This was completely out of line. Firstly, if you are going to opine to this discussion then do not close it. I hope that you should know that it's against policy to share your opinion on this article's notability and also close the discussion. Secondly, my concerns are entirely in good faith because I was unable to find WP:SIGCOV. The better option would be to let the Afd run its course. I will be notifying administration of this. Till 22:54, 11 November 2012 (UTC) * keep enough unrelated sources available to prove notability. The Banner talk 01:17, 12 November 2012 (UTC) * "Unrelated sources" is not enough. They must be secondary, reliable sources with significant coverage. Till 01:29, 12 November 2012 (UTC) * I'm pretty sure the user meant to say reliable sources. Statυs ( talk ) 02:17, 12 November 2012 (UTC) * 'Unrelated and 'reliable' are two completely different terms. And how would you know unless you're a mind-reader. Till 03:20, 12 November 2012 (UTC) * No, he was right. I ment to say unrelated and reliable sources. Sorry, mate, I really think we should keep this article (although I had never heard of the band before) The Banner talk 08:36, 12 November 2012 (UTC) Or are you part of the UDFW: The United Deletionist Front of Wikipedia? * Show me the sources, because as far as I can tell, they're not there. You do know what a reliable source is, correct? And what significant coverage is? Silver seren C 08:41, 12 November 2012 (UTC) * Comment. The article has been bloated with lots of irrelevant information to make it look larger than necessary. Till 01:29, 12 November 2012 (UTC) * I've removed the WP:CHARTTRAJ violation. Till 01:40, 12 November 2012 (UTC) * ...And you keep going on about things. Jut an FYI, this is actually the first time I've ever written a commercial performance section from scratch, so I didn't know that you weren't supposed to do a play by play. Assume good faith next time. Statυs ( talk ) 02:17, 12 November 2012 (UTC) * I'm not going on about things I'm just saying that I removed some information. You're supposed to know Wikipedia's policies before making edits. Till 02:46, 12 November 2012 (UTC) * Except only 2 of them are anything close to reliable, secondary coverage. So how does this meet notability standards in the slightest? Silver seren C 08:36, 12 November 2012 (UTC) * Where are the sources? I'm looking through the reference list here and i'm seeing practically nothing. All of the Billboard stuff is just listings, so doesn't count toward notability at all. And practically all of the Allmusic sources are just song listings. The only barely useful one is the one on the album, where it has an extremely short review. Other than that, the only actual good source is this and that's it. This is not even close to meet WP:N. If this is all we got and there's nothing else that can be found, then this shouldn't be a separate article. Silver seren C 08:35, 12 November 2012 (UTC) * I completely agree with you. Which is why it's at Afd in the first place. The article looks like it meets the requirements, but that's because it's been bloated with information that doesn't really count towards notability. Till 08:38, 12 November 2012 (UTC) * It's a rather nice cover-up job, actually. The bloating with Billboard listings was a good touch. I almost thought they were reviews (and thus reliable sources) for a moment. But, alas, no. Silver seren C 08:42, 12 November 2012 (UTC) * "Bloating", "cover-up job" Are you serious? A brief history of it's charting process IS relevant to an album article, which this is, you know? There are several, several, third-party, reliable sources in the article. I haven't even look into finding much sources, just a few things I found with ease. I don't have a much particular interest in the subject, as I'd only just heard of them now and only listened to them when I was doing the sample to upload to the article. I guess you should really start assuming good faith to a user who is just trying to save an article for deletion. I thought the amount of information in the article was enough for a keep (which it is), but if you'll be happy with me expanding the article like it was some Grammy-Award winning album with seven hit singles, I'll do so. Statυs ( talk ) 17:42, 12 November 2012 (UTC) * I would actually appreciate more sources, yes. This is a nice source that I didn't notice. However, that and the Vibe one only add up to two. This doesn't add much at all, because it is 3 sentences or so that is just mentioning how it charted, that's all. It's not much better than the charts themselves. This barely adds anything, unless you think a two sentence review is significant coverage. This is a single sentence. It is pretty much useless for anything regarding notability. That means there's only 2 actually good sources. We need more than that to meet notability standards. Silver seren C 19:38, 12 November 2012 (UTC) * I don't accept that count, but regardless, please look up "multiple". <IP_ADDRESS> (talk) 04:30, 13 November 2012 (UTC) * The amount of information in the article is not germane to the notability of the article and has no impact on a keep result. You can expand the article all you want, but that's not going to affect its coverage by third-party, reliable sources. Till 23:12, 12 November 2012 (UTC) * Keep. First, my assessment of the article's 22 references (as of this post): * -12 are Billboard, 10 of which are chart listings, and another has only a passing mention. As an aside, the first paragraph of the "Reception" section reads too much like a play-by-play for my tastes. Also, most of the "key" chart positions cited from Billboard magazine can be substituted with a single online source. * - 5 are Allmusic, 3 of which are directory/album listings, and another is a single-sentence mention. There's also a brief album review. * - 2 are links to MTV's video database. * - 1 is The Daily Cougar, a student newspaper. * - 1 is a Jacksons Number Ones book which has only a passing mention of the album. * With that in mind, and the need for "significant" (that is, in depth) coverage in order to satisfy WP:NALBUMS, the concerns regarding the quality (not the quantity) of sources are legitimate. The best of the dozen Billboard sources and the Vibe review are helpful, and additional album reviews exist in newspapers such as the Chicago Sun-Times, Dayton Daily News, and Chattanooga Times Free Press (180-250 words each). I have incorporated these into the article. That's good enough, in my view, for this album to meet WP:GNG and WP:NALBUMS. Gongshow Talk 05:37, 13 November 2012 (UTC) * Thank you for adding in those reviews! I hadn't come across them! As for the "play by play", it was much longer before, and I just keep the most important ones there. Such as when it debuted, when it exited, and maybe a few other notable positions. Statυs ( talk ) 05:49, 13 November 2012 (UTC) * Yeah, I noticed the section as currently written is improved and shorter than the original version. Whether it possibly needs more tweaking is an editing choice and not too relevant in terms of establishing the album's notability; I decided to weigh in just because it came to mind and was mentioned earlier in the discussion. What's more important, for the purposes of this AfD, is identifying significant coverage for the album in multiple independent reliable sources, and I think that's been achieved. Gongshow Talk 06:24, 15 November 2012 (UTC) * Keep: Based on charting on multiple charts and sufficient sourcing.--Milowent • hasspoken 13:46, 15 November 2012 (UTC) * Note: It should be noted that two users have attempted closing this AfD, and the nominator reverted both of them. Without notifying them as well. <font face="Arial" size="2em"> Statυs ( talk ) 14:58, 15 November 2012 (UTC) * I agree. This is borderline ridiculous by now. I will ask an admin to close this discussion. — <font color="#333333">ΛΧΣ <font color="#336699">21™ 15:00, 15 November 2012 (UTC)
WIKI
Amanda Platell Amanda Jane Platell (born 12 November 1957) is an Australian journalist. Between 1999 and 2001 she was the press secretary to William Hague, the then leader of the British Conservative Party. She is currently based in the UK. Personal life Platell was born in Perth, Western Australia. Her father was a journalist working for The West Australian newspaper and her mother was a secretary. Platell graduated with an Honours Degree in Politics and Philosophy from the University of Western Australia. Her first job was in 1978 when she joined the Perth Daily News. She has lamented that for medical reasons she has been unable to have children. Early British career After a backpacking tour of the world with her then fiancé John Chenery, she arrived in London in 1985. Aiming to earn enough money to return home she worked as a freelancer for publications including The Observer and the Sunday Express. After being part of the start-up team of Today, she then joined Robert Maxwell's short-lived London Daily News, before returning under Today editor David Montgomery in 1987 as deputy editor. In 1993 she was appointed managing editor of the Mirror Group, and then moved in the same year to The Independent, initially as marketing director and then managing director. In 1996 she joined the Sunday Mirror as acting editor, where she was the superior of Labour party's later director of communications, Alastair Campbell. In 1998 she was appointed acting editor of the Sunday Express, a position she was sacked from by Rosie Boycott following the publication of details of Peter Mandelson's gay relationship with his Brazilian partner. In 1999, Platell published a novel Scandal, about women in the newspaper industry. "Two editors, one paper, may the best woman win" was how the cover summarised the plot. It was from 1999 to 2001 that Platell moved into politics to become the Conservative Party's head of media, during which she supported William Hague, advising him to just "be yourself" as it was at these times he was his strongest. In her role, Platell made an important contribution to Hague's reversion from a modernising agenda to a 'core vote' strategy pursued during the 1999 European Elections, in which the Conservatives gained the most votes, as well as the 2001 General Election campaign. Hague, however, only managed to make a net gain of 1 seat in 2001, forcing his resignation shortly after the General Election. Later media career Since 2002, Platell has contributed as a freelancer to the Daily Mail. On 21 November 2011, at the Leveson Inquiry into the culture, practice and ethics of the British press, Hugh Grant accused Platell of a "hatchet job" on his recent fatherhood following an article she wrote for the Daily Mail. She has written articles calling for greater restrictions on Internet pornography. Platell regularly reviewed the Sunday newspapers on The Andrew Marr Show. In 2020 the Daily Mail paid damages of £25,000 to the Cambridge academic Professor Priyamvada Gopal and agreed to pay her legal costs after Platell libellously claimed, citing fake tweets, that she was "attempting to incite an aggressive and potentially violent race war". Television * Unspin: Amanda Platell's Secret Video Diary – Channel 4 (2001) * Morgan & Platell – Channel 4 (2004–2005) * Prime Ministers Spouses – Channel 4 (2005) * Crisis Command: Could You Run The Country? – BBC Two (2004) * Bee in Your Bonnet – BBC Two (2004) * How Euro Are You? – BBC Two (2005) * Richard & Judy – Channel 4 (2001–07), regular commentator * The Daily Politics – BBC Two * Question Time – BBC One (1993, 2001, 2003, 2004, 2006, 2007, 2008, 2010, 2013 and 2014), panellist * The Apprentice: You're Fired! – BBC Two (2008, 2009, 2010), guest panellist * The Andrew Marr Show – BBC One (2005–), regular newspaper reviewer * The Alan Titchmarsh Show – ITV (2007–), occasional discussion contributor * This Morning – ITV (2009–), occasional newspaper reviewer * Dan Wootton Tonight – GB News (2021–), weekly panellist * Press Preview – Sky News (2023–), weekly panellist
WIKI
British and Irish political relations during the Irish Rebellions of the nineteenth and twentieth centuries Nathalie du Rivage, class of 2010 During the summer of 2009, I traveled to Ireland and England to research British and Irish political relations during the Irish Rebellions of the nineteenth and twentieth centuries. These uprisings, by small groups of nationalists, sought to establish a free Irish Republic independent of Britain. The British, who feared creating martyrs out of the nationalist leaders, put the rebellions of the nineteenth century down quietly. Few were punished and prison terms and executions were limited only to the top leaders. The leniency shown by the British insured that the rebels did not gather any momentum for the nationalist movement, as most Irishmen favored Home Rule for Ireland rather than outright independence. However, the Easter Rising of 1916 elicited a much different response from the British. Sixteen leaders were executed, thousands were arrested and deported without trial and all of Ireland was placed under military law. My research seeks to go beyond traditional British and Irish narratives of these rebellions and understand the roles transnationalism and racism played in the change in Britain’s political response to the Irish Rebellion at the beginning of the twentieth century. I began my research trip at Kilmainham Goal a beautiful Victorian prison, which gained fame for the Irish political prisoners that were held there. It was there, in the Stone Breakers Yard, that fifteen of the sixteen rebels of the Easter Rising were executed. The tour guide told us of Joseph M. Plunkett, one of the rebels, and Grace Gifford. Their story was critical in fostering sympathy for the rebels. Joseph and Grace were engaged to be married on Easter Sunday. However, they had to postpone the marriage because of the rebellion. Joseph was arrested and he did everything he could to be able to marry Grace. Finally, they were granted permission. The couple was married in the chapel of the prison, and they were allowed ten supervised minutes together, the prison guard with watch in hand. Then Grace was asked to leave and Joseph was executed the next morning. In the also gift shop I purchased a book Last Words, which is a compilation of letters from the rebel final days. I was able to see original copies of some of these documents later in my trip. The first archive I visited was the Archive of the Archdiocese of Dublin. Here I was able to access the papers of Cardinal Cullen. The Cardinal was instrumental in convincing the British not to martyr the rebels of the 1867 rebellion. Unfortunately, the archive had recently moved to a new building and was in the process of reorganizing. They misplaced the box of documents pertaining to Irish Fienans, a blanket term that was applied to all Irishmen in favor of an independent Ireland. I was able however to find some pertinent documents in a miscellaneous box. My second archive was the Special Collections of Trinity College. This collection contained the papers and correspondence of John Dillon an Irish nationalist and Member of Parliament who gave a number of impassioned speeches in the House of Commons condemning the British response to the Easter Rising. The final stop in Ireland was the National Library. In the main collection, I accessed the digital archive of The Irish Times looking at the changing popular opinion of the rebellion from the first incident to the results of the British reaction. I was surprised at the lack of coverage of the executions of the prisoners. Later in my trip, I learned that the British were censoring The Irish Times. I also was able to access the special collections of the National Library. There I looked at the papers and correspondence of the key players of the Irish rebellion of 1916, including a transcription of Jack Plunkett, the brother of Joseph M. Plunkett, recollections of the events of the rising. I then traveled to England where the majority of my three-day stay was spent in the Special Collections of Oxford University. The H.H. Asquith Papers contained a large collection of documents regarding the British political and military response to the Easter Rising. This was probably the most interesting and pertinent to my research. The role of the Irish collaboration with the Germans was discussed in many of the documents and the underlying racism that influenced British policy was also apparent in many of these documents. In addition to providing me with ample primary source material for my thesis, the trip also exposed me to the many challenges and rewards of archival research. From the deciphering handwriting that was more akin to hieroglyphs than English to the reading of the last words of a doomed rebel to his beloved, this fellowship was an invaluable opportunity that I would recommend to any aspiring historian.
FINEWEB-EDU
User:Renameduser024/sandbox Mrfrobinson (talk) 20:52, 23 March 2014 (UTC) 13:23, 25 March 2014 (UTC)
WIKI
Triangle Tech Triangle Tech is a for-profit system of technical schools with multiple locations in Pennsylvania. It offers 16-month programs for an Associate in Specialized Technology Degree in various technologies. Triangle Tech was founded in Pittsburgh in 1944 and now has six locations across Pennsylvania, including Pittsburgh, Greensburg, DuBois, Sunbury, Chambersburg, and Bethlehem. The school is licensed by the State Board of Private Licensed Schools and the Pennsylvania Department of Education and is accredited by the Accrediting Commission of Career Schools and Colleges.
WIKI
Thread:User talk:CodeCat/Etymology-only languages in the new etymology templates/reply (4) I know why. I'm asking how we should fix this.
WIKI
THE HUMANE SOCIETY OF the UNITED STATES, et al., Plaintiffs, v. DEPARTMENT OF COMMERCE, et al., Defendants. Civil Action No. 05-1392 (ESH). United States District Court, District of Columbia. May 26, 2006. James Roe Barrett, Sara Keyna Orr, David John Hayes, Latham & Watkins, Washington, DC, for Plaintiffs. Kristen Byrnes Floom, U.S. Department of Justice, Washington, DC, for Defendants. MEMORANDUM OPINION HUVELLE, District Judge. Plaintiffs The Humane Society of the United States, Will Anderson and Sharon Young have sued Carlos M. Gutierrez, Secretary of the United States Department of Commerce; Conrad C. Lautenbacher, Administrator of the National Oceanic and Atmospheric Administration; William T. Hogarth, Assistant Administrator of the National Marine Fisheries Service; and the National Marine Fisheries Service, claiming violations of the National Environmental Policy Act (“NEPA”), 42 U.S.C. § 4321 et seq.; the Endangered Species Act (“ESA”), 16 U.S.C. § 1531 et seq.; the Marine Mammal Protection Act (“MMPA”), 16 U.S.C. § 1374 et seq.; and the Administrative Procedures Act (“APA”), 5 U.S.C. § 701 et seq. They challenge the issuance and amendment of various permits that authorize research on threatened and endangered populations of Steller sea lions. Pending before the Court are plaintiffs’ Motion for Summary Judgment and defendants’ Cross-Motion for Summary Judgment. For the reasons discussed below, the Court grants plaintiffs’ motion with respect to their NEPA claims. BACKGROUND Following a dramatic decline in the Alaskan population of Steller sea lions over thirty years, they were first classified as threatened in 1990. See Listing of Steller Sea Lions as Threatened Under the Endangered Species Act, 55 Fed.Reg. 49,204, 49,208 (Nov. 26, 1990) (final rule) (noting that the number of Steller sea lions living from Kenai Peninsula to Kiska Island, Alaska declined by 82 percent between 1960 and 1989). (See also AR 259 at 338 (“Th[e] species has experienced a marked decline from an estimated 240,000-300,000 individuals in the 1960s ... to an estimated 116,000 individluals in 1989. Population numbers in the United States have declined by about 75% over the past 20 years ... with most of the decline occurring in the western stock.”).) In the wake of this classification, two distinct populations of Steller sea lions were identified in their range along the North Pacific Rim: an eastern stock, including all animals distributed from central California northward to Cape Suckling, Alaska, and a western stock, including all animals distributed from Cape Suckling to Hokkaido, Japan. See Change in Listing Status of Steller Sea Lions Under the Endangered Species Act, 62 Fed.Reg. 24,345, 24,346 (May 5, 1997); Listing of Steller Sea Lions as Threatened Under the Endangered Species Act, 55 Fed.Reg. 29,793, 29,795 (Jul. 20, 1990) (proposed rule). In 1997, after determining that the subsequent two decades would be crucial to the western population’s survival, the Department of Commerce’s National Marine Fisheries Service (“NMFS”) reclassified the western stock as endangered, maintaining the eastern stock’s threatened classification. 62; Fed. Reg. at 24,346-347 (noting that one model “predicted a 100 percent probability of extinction [for the western population segment] within 100 years from the 1985-94 trend data, and a 65 percent probability of extinction within 100 years if the 1989-94 trend continue[d]”). While researchers began investigating the decline of the Steller sea lion with its identification in the 1980s, funding for such research remained modest for more than a decáde. See 62 Fed.Reg. at 24,346 (discussing research); 55 Fed.Reg. at 29,795 (same). (Answer ¶ 59 (“NOAA ... research funding during the 1990s was less than $1 million.”).) This changed with the passage of the Consolidated Appropriations Act of 2001, which declared that “the western population of Steller sea lions ha[d] substantially declined over the last 25 years” and thus “scientists should closely research and analyze all possible factors relating to such decline....” Pub.L. No. 106-554, § 209(a)(l)-(2), 114 Stat. 2763, 2763A-176 (2000). In furtherance of this research, Congress appropriated more than $40 million for studies regarding “available prey species ... [,] predation by other marine mammals ... [,] interactions between fisheries and Steller sea lions ... [,] regime shift, climate change, and other impacts associated with changing environmental conditions in the North Pacific and Bering Sea ... [,] juvenile and pup survival rates ... [,] nutritional stress” and other potential factors contributing to the sea lions’ decline. Id. §§ 206, 209, 114 Stat. at 2763A-176; see also Steller Sea Lion Research Initiative (SSLRI), 66 Fed.Reg. 15,-842 (Mar. 21, 2001) (notice of availability of funds). This amount was augmented by an almost identical sum the following year. (See AR 406 at 7-8, 53 (summarizing the various federal appropriations for Steller sea lion research).) The resulting research fund was the largest ever dedicated to a single species. (Compl. ¶ 59; Answer ¶ 59.) After receiving numerous applications for permits and permit amendments authorizing research relating to the threatened and endangered Steller sea lion populations, NMFS opened an investigation into the potential effects of the proposed studies on the environment in 2002. (See AR 406 at 11.) In a June 2002 Environmental Assessment (“EA”) and Finding of No Significant Impact (“FONSI”), the agency-concluded that authorization of the requested studies through 2004, with certain mitigating measures, would not significantly affect the human environment. (Id. at 12-13.) A November 2002 Biological Opinion (“BO”) determined that the permits were “not likely to jeopardize the continued existence of the endangered western population of Steller sea lions or the threatened eastern population of Stel-ler sea lions.” (AR 389 at 73 (Nov. 12, 2002 BO).) Based on these findings, NMFS issued research permits and permit amendments allowing the “harassment” of sea lion populations through aerial and boat-based surveys; ground counts; scat, blood and biopsy collection; capture and restraint; tagging and branding; tooth extraction; attachment of scientific instruments; and other research activities. (See AR 406 at 79-83; AR 389 at 10-31.) The permits also authorized stated amounts of “incidental mortality.” (Id.) On April 4, 2005, NMFS published notice that eight individuals or institutions had submitted applications for five-year permits or three-year permit extensions authorizing further research of a similar character. (See AR 395 at 1 (Marine Mammals, 70 FedReg. 17,072 (Apr. 4, 2005)).) In the same notice, the agency indicated that a related draft EA, which concluded that an Environmental Impact Statement (“EIS”) need not be prepared as the proposed research would not have a significant effect on the human environment, was also available for review and comment. (See AR 395 at 3; AR 406.) The “scope” of the draft assessment included six environmental impact issues: (1) Is NMFS able to coordinate research under the various permits and ensure that activities are not unnecessarily duplicative and do not result in significant adverse impacts on threatened and endangered Steller sea lions? (2) Is NMFS able to adequately monitor the effects of the overall research program on Steller sea lions? (3) Can NMFS coordinate and synthesize the data generated by this research program in a way that is useful or meaningful for conservation of Steller sea lions? (AR 395 at 3.) Pursuant to federal regulations, NMFS was required to submit the permit applications for review by an independent federal agency, the Marine Mammal Commission (“MMC”), which had been established to provide oversight of the government’s marine mammal conservation policies and programs. See 16 U.S.C. § 1401; 50 C.F.R. § 216.33(d)(2) (providing that permit applications must be forwarded to the MMC “for comment” and “[i]f no comments are received within 45 days ... the Office Director will consider the Commission to have no objection to issuing a permit”). On May 19, 2005, the MMC submitted a five-page set of “preliminary comments” in response to the agency’s request that it “expedite ... review of the[] permit applications because of a pressing need to issue the permits.” (Barrett Decl. Ex. 1 at 1.) While noting its “expectation]” that the agency would “defer final action on the applications” until it had had an opportunity to “complete [a] full review of the[ ] applications ... in consultation with the Committee of Scientific Advisors as required under the Marine Mammal Protection Act,” the MMC recommended that NMFS reconsider its finding and either offer additional explanation for its conclusion that the research would not have a significant impact on the environment, reduce the scope of the approved research projects, or prepare an EIS. (Id. at 5.) This recommendation, the MMC indicated, was essentially identical to that it had made following a review of the agency’s 2002 EA and related permit applications. (Id.) On May 24, 2005, prior to the MMC’s completion of its final comments on the action, NMFS issued its Final EA, a FONSI declaring that “preparation of an Environmental Impact Statement ... [was] not required by ... the National Environmental Policy Act[,]” and a BO (the “2005 BO”) concluding that “the research program, as proposed, [was] not likely to jeopardize the continued existence of the endangered western population of Steller sea lions or the threatened eastern population of Steller sea lions.” (AR 404 at 1 (FONSI); AR 406(EA); AR 407 at 69(BO).) Soon thereafter, the agency issued the requested permits and amendments, authorizing the repeated taking of more than 200,000 sea lions in the course of annual vessel and aerial surveys; the taking of more than 140,000 sea lions during ground-based research; an annual incidental mortality of up to 60 sea lions, including up to 20 from the endangered western stock; the annual capture or restraint of more than 3,000 sea lions; the branding of more than 2,900 sea lions; the annual attachment of scientific instruments to more than 700 sea lions; and various other research activities. (See Answer ¶ 69 (indicating that the agency issued the first of the permits on May 27, 2005); AR 113 at 1 (June 16, 2005 Federal Register notice of permit and permit amendment issuance); AR 406 App. E (activity tables for proposed action); Defs.’ Opp’n at 7-8 (“In 2005, NMFS increased the maximum number of animals that could be studied during this research to 527,690 western and eastern sea lions, an increase of approximately 59 percent.”).) The action increased the number of issued permits, extended the duration of the permitted research, authorized new research methods, and raised both the number of annual takes and their frequency. (AR 406 at 27-30, 43.) The permits did not, however, authorize the intentional killing of any Steller sea lions as part of any scientific study. (See id. 53,103-119.) Following the conclusion of the agency’s inquiry into the ecological impacts of the various permit applications, Assistant Administrator for Fisheries William T. Hogarth met with representatives of The Humane Society in order to discuss the Society’s objections to the agency’s issuance of the permits. (See Barrett Decl. Ex. 3 (Hogarth letter); AR 402 (Society’s May 17, 2005 letter to Hogarth).) In a June 27, 2005 letter to the Society’s counsel, Hogarth stated that NMFS “sharefd] [the Society’s] concerns over the scope of the research on Steller sea lions” and indicated that the agency had accordingly “decided to prepare an environmental impact statement ... on the effects of scientific research on this species.” (Barrett Decl. Ex. 3.) This decision was announced publicly on December 28, 2005, when NMFS published notice of its “intent to prepare an Environmental Impact Statement ... to analyze the environmental impacts of administering grants and issuing permits associated with research on endangered and threatened Steller sea lions (Eumetopias jubatus) and depleted northern fur seals (Callorhinus ursinus)." Notice of Intent to Prepare an Environmental Impact Statement on Impacts of Research on Steller Sea Lions and Northern Fur Seals Throughout Their Range in the United States, 70 Fed.Reg. 76,780 (Dec. 28, 2005). “Based on comments received on Environmental Assessments prepared in 2002 and 2005 for permitting research on Steller sea lions,” the agency identified the following six issues for public comment and later consideration in its EIS: the “Hypes of research methods and protocols permitted!;]” the “[l]evel of research effort” required for management and conservation, and potential means of limiting takes; the “[c]oordination of research” among various individuals and institutions; the “[e]ffects of research” on animal populations; the “[qualification of researchers” operating under permits; and possible “[c]riteria for allowing modifications or amendments to existing grants and permits!,] for denying permit amendments!,] and for suspending or revoking permits.” Id. at 76,781-82. On July 12, 2005, and prior to the agency’s Federal Register notice announcing its intent to prepare an EIS, plaintiffs filed suit alleging that defendants had violated NEPA by declining to prepare an EIS and by relying on an EA that failed to satisfy the statute’s requirements; that their 2005 BO contravened the ESA by failing to properly evaluate the direct, indirect and cumulative impacts on Steller sea lions from the research activities authorized by the permits; and that they had violated the MMPA by failing to follow regulations requiring that they not issue permits until the MMC had completed its comments and by authorizing incidental mortalities that would exceed the Steller sea lion’s Potential Biological Removal level (“PBR level”). Defendants respond by arguing that the agency’s EA, FONSI and 2005 BO constitute a thorough analysis of the environmental factors; that the permits, which do not authorize a level of mortality sufficient ■to significantly impair the recovery of the western stock, were issued only after NMFS had the benefit of the MMC’s comments; and, in any event, that the plaintiffs’ challenge to the 2005 BO is now moot since a revised BO (the “2006 BO”) was issued on March 3, 2006. ANALYSIS I. Standard of Review Under the judicial review provisions of the APA, an administrative action may be set aside only where it is “arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.” See 5 U.S.C. § 706(2)(A)-(D); Marsh v. Oregon Natural Res. Council, 490 U.S. 360, 375, 109 S.Ct. 1851, 104 L.Ed.2d 377 (1989). The question is therefore one of reasonableness — “this court will not second guess an agency decision or question whether the decision made was the best one.” C & W Fish Co., Inc. v. Fox, Jr., 931 F.2d 1556, 1565 (D.C.Cir.1991). While agency actions are presumed valid and granted substantial deference, especially in cases involving a scientific determination within an agency’s area of expertise, see Baltimore Gas & Elec. Co. v. NRDC, 462 U.S. 87, 103, 103 S.Ct. 2246, 76 L.Ed.2d 437 (1983), they are not spared a “thorough, probing, in-depth review.” Citizens to Preserve Overton Park v. Volpe, 401 U.S. 402, 415, 91 S.Ct. 814, 28 L.Ed.2d 136 (1971); see also Marsh, 490 U.S. at 378, 109 S.Ct. 1851 (A court’s review of administrative action “must be searching and careful,” though “the ultimate standard of review is a narrow one.”) (internal quotations omitted). Agencies must consider the relevant information and provide a satisfactory explanation for their actions, including a “rational connection between the facts found and the choice made.” Burlington Truck Lines v. United States, 371 U.S. 156, 168, 83 S.Ct. 239, 9 L.Ed.2d 207 (1962). When reviewing an agency’s explanation, courts must “ ‘consider whether the decision was based on a consideration of the relevant factors and whether there has been a clear error of judgment.’” Motor Vehicle Mfrs. Ass’n v. State Farm Mut. Auto. Ins. Co., 468 U.S. 29, 48, 103 S.Ct. 2856, 77 L.Ed.2d 443 (1983) (quoting Bowman Transp., Inc. v. Arkansas-Best Freight Sys., Inc., 419 U.S. 281, 285, 95 S.Ct. 438, 42 L.Ed.2d 447 (1974)). Normally, an agency [action] would be arbitrary and capricious if the agency has relied on factors which Congress has not intended it to consider, entirely failed to consider an important aspect of the problem, offered an explanation for its decision that runs counter to the evidence before the agency, or is so implausible that it could not be ascribed to a difference in view or the product of agency expertise. Id. When an agency has proceeded in such a manner, the resulting action must be abandoned, for courts “may not supply a reasoned basis for the agency’s action that the agency itself has not given.” SEC v. Chenery Corp., 332 U.S. 194, 196, 67 S.Ct. 1575, 91 L.Ed. 1995 (1947). II. NEPA Under NEPA, an agency proposing a “major Federal action[ ] significantly affecting the quality of the human environment” is required to prepare an EIS giving thorough consideration to, among other things, the ecological impacts of the action and any available alternatives to the proposal. 42 U.S.C. § 4332(2)(C);. “ ‘If any “significant” environmental impacts might result from the proposed agency action then an EIS must be prepared before agency action is taken.’ ” Grand Canyon Trust v. F.A.A., 290 F.3d 339, 340 (D.C.Cir.2002) (quoting Sierra Club v. Peterson, 717 F.2d 1409, 1415 (D.C.Cir.1983) (emphasis in original)). As defined by regulations issued by the Council on Environmental Quality, significance is a function of both the “context” and “intensity” of the proposed action. 40 C.F.ib § 1508.27. In considering the context of an action, an agency is to address its impact upon “society as a whole (human, national), the affected region, the affected interests, and the locality.” Id. § 1508.27(a). The. question of an action’s “intensity” is a more complex inquiry, turning on such factors as potential “[i]mpacts that may be both beneficial and adverse[;]” the “degree to which the proposed action affects public health or safety[;]” any “[u]nique characteristics of the geographic area” in which the action is to be taken; the “degree to which the effects on the quality of the human environment are likely to be highly, controversia^;]” the “degree to which the possible effects. on the human environment are highly uncertain or involve unique or unknown risks[;]” the “degree to which the action may adversely affect an endangered or threatened species[;]” the “degree to which the action may establish a precedent for future actions with significant effects or represents a decision in principle about a future consideration[;]” and “[w]hether the action is related to other actions with individually insignificant but cumulatively significant impacts.” Id. at 1508.27(b); see also Pub. Citizen v. Dep’t of Transp., 316 F.3d 1002, 1023 (9th Cir.2003) (“The presence of one or more of these factors should result in an agency decision to prepare an EIS.”). As the ecological significance of administrative actions are often less than self-evident, agencies may begin their evaluation of a proposed action by preparing an EA — “a concise public document ... that serves to ... [b]riefly provide sufficient evidence and analysis for determining whether to prepare an environmental impact statement or a‘finding of no significant impact.” 40 C.F.R. § 1508.9(a)(1). If the agency concludes, on the basis of its assessment, that the action is not one “significantly affecting the quality of the human environment,” it may prepare a FON-SI and thereby avoid preparation of an EIS. Id. §§ 1501.4(e), 1508.13. The standard for evaluating such a finding is well established in this Circuit: First, the agency must have accurately identified the relevant environmental concern. Second, once the agency has identified the problem, it must have taken a “hard look” at the problem in preparing the EA. Third, if a finding of no significant impact is made, the agency must be able to make a convincing case for its finding. Last, if the agency does find an impact of true significance, preparation of an EIS can be avoided only if the agency finds that changes or safeguards in the project sufficiently reduce the impact to a minimum. Sierra Club v. Dep’t of Transportation, 753 F.2d 120, 127 (D.C.Cir.1985). Plaintiffs argue that the issuance of the research permits was an action from which “ ‘significant’ environmental impacts might result,” Sierra Club, 717 F.2d at 1415, thus requiring the preparation of an EIS. A number of arguments are made in support of this contention: (1) the agency has conceded the need to prepare an EIS; (2) the permitted research will result in mortality levels exceeding the western stock’s PBR level, making the agency’s approval of the permits a significant action; and (3) the effects of the permitted research are highly controversial, highly uncertain, and cumulatively significant, again making the agency’s approval of the permits a significant action. (Pis.’ Mem. at 14-24.) The Court will now address each of these claims. A. NMFS’s Admission of the Need for an EIS Plaintiffs’ argument that NMFS has conceded the need for an EIS cannot be addressed without first resolving another question: whether Assistant Administrator Hogarth’s June 27, 2005 letter to the Society and the agency’s later announcement of an EIS may be considered in reviewing the agency’s authorization of the contested permits. 1. Supplementation of the Administrative Record “It is well settled that judicial review of agency action is normally confined to the full administrative record before the agency at the time the decision was made.” Envtl. Def. Fund, Inc. v. Costle, 657 F.2d 275, 284 (D.C.Cir.1981). “[T]he focal point for judicial review should be the administrative record already in existence, not some new record made initially in the reviewing court.” Camp v. Pitts, 411 U.S. 138, 142, 93 S.Ct. 1241, 36 L.Ed.2d 106 (1973). The D.C. Circuit, however, has recognized a number of exceptions to this rule, indicating that additional evidence may be considered where “the agency failed to consider factors which are relevant to its final decision[,]” the “agency considered evidence which it failed to include in the reeord[,]” “evidence arising after the agency action shows whether the decision was correct or not” or “in eases arising under the National Environmental Policy Act[.]” Esch v. Yeutter, 876 F.2d 976, 991 (D.C.Cir.1989); see also Izaak Walton League of Am. v. Marsh, 655 F.2d 346, 369 n. 56 (D.C.Cir.1981) (“Allegations that an impact statement fails to consider serious environmental consequences or realistic alternatives raise issues sufficiently important to warrant introduction of new evidence in the District Court.”); Suffolk County v. Sec‘y of Interior, 562 F.2d 1368, 1384-85 (2d Cir.1977) (“[Ajllegations that an EIS has neglected to mention a serious environmental consequence, failed adequately to discuss some reasonable alternative, or otherwise swept ‘stubborn problems or serious criticism ... under the rug’ ... raise issues sufficiently important to permit the introduction of new evidence in the district court ... in suits attacking [a FONSI].”). As defendants emphasize, this is not a case where extra-record evidence is appropriately considered as proof of an environmental factor inappropriately excluded from consideration by the assessing agency. (See Defs.’ Opp’n to Pis.’ Mot. to Supplement at 2-8, 5 (citing cases); see also id. at 5-6 (“[A]n admission by itself is not a recognized exception to the rule limiting review to the record unless it also transmits or documents a discrete environmental factor that NMFS must consider under federal law but did not consider previously in the record.”).) This argument, however, does not resolve the matter for, as explained herein, Assistant Administrator Hogarth’s- letter and the subsequent Federal Register notice outlining the scope of NMFS’s pending EIS have a direct bearing on the correctness of the agency’s decision, speaking to both the degree to which the effects of the research were “likely to be highly controversial” and the degree to which they were “likely to be highly uncertain.” See 40 C.F.R. § 1508.27(b) (outlining “significance” factors). The Court will therefore permit the record to be supplemented as the documents are directly relevant to a determination of whether an EIS is required in this case. 2. The Announcement of the Pending EIS In announcing the availability of its 2005 EA for review and comment, NMFS characterized the draft as addressing “six environmental impact issues” relating to the issuance of the permits — among them, the coordination of research activities, monitoring of the research’s effects, and the resulting impact on Steller sea lion populations. In his June 27, 2005 letter, Assistant Administrator Hogarth responded to The Humane Society’s questions regarding the agency’s decision not to prepare an EIS by stating that the agency “share[d] [the Society’s] concerns over the scope .of the research on Steller sea lions” and would therefore “prepare an environmental impact statement ... on the effects of scientific research on this species.” (See Barrett Decl. Ex. 3 (Hogarth letter); AR 402 (Society’s May 17, 2005 letter to Hogarth).) Hogarth’s letter was followed by a December 28, 2005 Federal Register notice stating , that NMFS would prepare an EIS “analyzing] the environmental impacts of administering grants and issuing permits associated with research on endangered -and threatened Steller sea lions” and identifying six issues for public comment — among them, the coordination of research activities, monitoring of the research’s effects, and the resulting impact on Steller sea lion populations. As evidenced by the timing and substance of these documents, defendants’ attempt to characterize the Assistant Administrator’s letter and the agency’s subsequent notice as an unremarkable announcement of a broadened, programmatic review is belied by the record. (See Defs.’ Opp’n at 21-22; Defs.’ Rep. at 16-17.) Defendants’ acknowledgment that the agency remained concerned with the “scope” of Steller sea lion research and its “effects” on the species contradicts the FONSI issued over Hogarth’s signature less than a month earlier, indicates a continuing lack of confidence in the agency’s prior determination regarding the significance of the permitted activities, and evidences the “highly uncertain” and “controversial” nature of the studies’ effects on endangered and threatened populations. See 40 C.F.R. § 1508.27(b). Similarly, the agency’s December 28, 2005 announcement, which raises concerns that are substantially the same as those stated in the April 4, 2005 Federal Register notice outlining the scope of the Service’s draft assessment (compare note 7 with note 8), reflects a recognition that the issues ostensibly resolved in NMFS’s Final EA still remain to be studied. While defendants reiterate that the pending EIS pertains not only to the contested permits but rather the “entire program of both administrating congressional sea lion research grants and issuing related research permits” (Defs.’ Rep. at 17), this does not demonstrate its irrelevance here. In determining whether the issuance of the contested permits and permit amendments would significantly affect the environment, NMFS was required to consider the cumulative impacts of the action — “the impact on the environment which results from the incremental impact of the action when added to other past, present, and reasonably foreseeable future actions regardless of what agency (Federal or non-Federal) or person undertakes such other actions.” 40 C.F.R. § 1508.7; see also id. § 1508.27(b)(7). Thus, the question before the agency in evaluating the significance of the proposed research was considerably broader than defendants’ argument suggests, for Hogarth’s letter and the agency’s subsequent announcement of its intent to prepare an EIS clearly suggest the need to complete an EIS prior to the issuance of the contested permits. B. PER Level With the passage of the MMPA, Congress declared that “species and population stocks of marine mammals ... should not be permitted to diminish beyond the point at which they cease to be a significant functioning element in the ecosystem of which they are a part[.]” 16 U.S.C. § 1361(1). The Act accordingly provides, “consistent with this major objective,” that marine mammal populations “should not be permitted to diminish below their optimum sustainable population” — “the number of animals which will result in the maximum productivity of the population or the species, keeping in mind the carrying capacity of the habitat and the health of the ecosystem of which they form a constituent element.” Id. §§ 1361(1), 1362(9). Among the statute’s mechanisms for achieving this end is a requirement that the Secretary of Commerce prepare an annual or triennial stock assessment for each species that, among other things, describes the range of the stock; estimates the stock’s minimum population and present productivity rates; estimates the amount of mortality and serious injury suffered by the stock as a result of human activity; discusses the impact of the stock’s interaction with commercial fisheries; and categorizes the stock as either likely or unlikely to be reduced below its optimum sustainable population level by human-caused mortality and serious injury. Id. § 1386(a)(l)-(5). As a means of measuring the impact of human activity, each assessment must also estimate the PBR level for the relevant stock — “the maximum number of animals, not including natural mortalities, that may be removed from a marine mammal stock while allowing that stock to reach or maintain its optimum sustainable population.” Id. §§ 1362(20); 1386(a)(6). According to plaintiffs, the PBR level established for the western stock of Steller sea lions by NMFS is “an undeniable litmus test” for judging the significance of the agency’s action, and this test was unreasonably ignored in the EA. (Pis.’ Mem. at 21.) The most recent assessment of the western stock, plaintiffs note, established a PBR level of 208. (Pis.’ Mem. at 19 (citing AR 401 at 4 (Society comments).)) Because an estimated 171 western sea lions are killed each year as a result of native subsistence harvests and more than 29 perish annually as an incident to commercial fishing (see AR 401 at 4), plaintiffs contend that the potential annual research-related mortality of 20 western sea lions clearly exceeds the stock’s PBR level and therefore involves a significant adverse impact requiring the preparation of an EIS. (Pis.’ Mem. at 19 (citing Answer ¶74 (“Federal defendants admit that the annual mortality resulting from research activities may, in combination with other human-caused sources of mortality, exceed the PBR for the species, but deny that the impact to the species is per se significant and potentially irreversible.”).)) While defendants debate the relevance of the western stock’s PBR level and the accuracy of plaintiffs’ calculations (see Defs.’ Opp’n at 23-26; Defs.’ Rep. at 12, 20-21), the merits of their arguments are irrelevant, for the issue is not addressed in the agency’s EA. See W. Res., Inc. v. FERC, 9 F.3d 1568, 1576 (D.C.Cir.1993) (“[A] reviewing court ‘must judge the propriety of [the agency’s] action solely by the grounds invoked by the agency.’ ”) (quoting Chenery Corp., 332 U.S. at 194, 67 S.Ct. 1575). Though the comments of The Humane Society stressed the significance of authorizing further research with a potential for incidental mortalities that would meet or exceed the PBR level of the western population (see AR 401 at 4), NMFS failed to address this important issue in the Final EA. In the absence of such analysis, one cannot conclude that the agency took the requisite “hard look” at the mortality issue. See Sierra Club, 753 F.2d at 127; U.S. Satellite Broad. Co., Inc. v. FCC, 740 F.2d 1177, 1188 (D.C.Cir. 1984) (noting an agency’s obligation to “re-spondí] in a reasoned manner to significant comments received” during the rule-making process). The agency’s failure is compounded by the EA’s omission of an alternate metric by which to evaluate the significance of the incidental mortalities authorized under the various research permits. While separate sections of the document quantify the mortalities stemming from individual human activities, the assessment fails to provide a meaningful context for the figures, relying instead upon conclusory assertions of insignificant impact. (See, e.g., AR 406 at 58 (“While there was a low number of Steller sea lion mortalities incidental to the research over the past two years, the total number was within that authorized by the permits and would not have a population level impact. Further, there was no evidence of an accelerated population decline as a result of research activities.”); id. at 59 (“The proposed action is not expected to have a significant adverse impact on endangered or threatened species of marine mammal populations. The adverse effects of the proposed permits would be limited to effects on individual marine mammals.”).) In short, NMFS has not made a “convincing case” that the fatalities that may result from the expanded research program are unlikely to have a significant environmental effect. See Sierra Club, 753 F.2d at 127; see also Citizens Exposing Truth About Casinos v. Norton, 2004 U.S. Dist. Lexis 27498, *23 (D.D.C.2004) (“The Court ... finds most troubling ... the absence of any convincing explanation or ‘evidence and analysis’ for why the[] [catalogued] impacts are not to be regarded as significant.”). C. Controversial Effects Among the factors an agency must consider in determining whether a proposed action is likely to have a significant impact is “[t]he degree to which the effects on the quality of the human environment are likely to be highly controversial.” 40 C.F.R. § 1508.27(b)(4). “‘The term “controversial” refers to cases where a substantial dispute exists as to the size, nature, or effect of the major federal action rather than to the existence of opposition to a use.’ ” Town of Cave Creek, Ariz. v. FAA, 325 F.3d 320, 331 (D.C.Cir.2003) (quoting Found, for N. Am. Wild Sheep v. U.S. Dep’t of Agric., 681 F.2d 1172, 1182 (9th Cir.1982)) (emphasis removed). Defendants reject plaintiffs’ allegations of controversy, arguing that they have demonstrated nothing more than “opposition” or public criticism. (Defs.’ Opp’n at 29.) In doing so, however, defendants mischaracterize the record. In its preliminary comments to the agency, the MMC indicated that it “remain[ed] concerned” — nearly three years after challenging the impact of the permits authorized in 2002 — “that the cumulative effects of the proposed research, in combination with other factors that are affecting the western population of Steller sea lions, could have significant adverse impacts on the population.” (Barrett Decl. Ex. 1 at 5.) Similarly, The Humane Society’s May 4, 2005 comments challenged as “unsupported” the draft assessment’s finding that the proposed research would not have adverse affects and argued that the permits should not be issued prior to the preparation of an EIS “fully evaluat[ing] the individual and cumulative impacts of the proposed research and weighing] its contribution to cumulative-effects on the stocks from combined mortality and serious injury resulting from fisheries-related mortality and native harvest.” (AR 401 at 3, 25.) This is not the “heekl[ing]” defendants describe. (See Defs.’ Opp’n at 28 (citing N.C. v. FAA 957 F.2d 1125, 1133-34 (4th Cir.1992) (“This circuit long ago rejected ‘the suggestion that “controversial” must necessarily be equated with opposition.’ Otherwise ... [t]he outcome would be governed by a ‘heckler’s veto.’ ”) (internal citations omitted)).) Moreover, in stating that the agency “share[d] [the Society’s] concerns over the scope of the research on Steller sea lions” and would therefore “prepare an environmental impact statement ... on the effects of scientific research on this species” (Barrett Decl. Ex. 3), Assistant Administrator Hogarth’s June 27, 2005 letter itself evidences an appreciation of the degree of controversy surrounding the impact of the research on Steller sea lions. See Friends of the Earth, Inc. v. United States Army Corps of Engineers, 109 F.Supp.2d 30, 43 (D.D.C.2000) (concluding that an EIS must be prepared where the controversial nature of the proposed project’s impact was apparent in comments from other agencies, the public, and defendant’s own leadership). The highly controversial nature of the permits’ effects is, in short, readily apparent from the record. What does not appear is a “hard look” from the agency. In a rather flippant summation of the issue, the EA declares that “[tjhere is no significant controversy regarding the effects of the proposed action on the human environment!,]” explaining that while “NMFS received comments from the public in opposition to the issuance of the proposed permits, the activities are similar to research conducted over the past two years during which time NMFS did not receive objections and there was no evidence of adverse population level impacts.” (AR 406 at 58.) This language is entirely at odds with the EA’s prior acknowledgment of a “substantive disagreement over the likely effects of ... certain ... research activities” and “controversy over the adequacy of NMFS [sic] finding of no significant impact in issuance of the previous Steller sea lion research permits.” (See id. at 17.) No attempt is made to reconcile these statements. Moreover, as earlier discussed, the EA ignores the western population’s PBR level, a central aspect of the debate. In light of this controversy, the agency has not “made a convincing case” that the impact of the authorized research will be insignificant. See Cabinet Mountains Wilderness v. Peterson, 685 F.2d 678, 682 (D.C.Cir. 1982). D. Uncertain Effects and Unknown Risks In determining the significance of a proposed action, an agency is also required to consider “[t]he degree to which the possible effects on the human environment are highly uncertain or involve unique or unknown risks.” 40 C.F.R. § 1508.27(b)(5). Based on the record, there can be no doubt that NMFS authorized research where the effects were both uncertain and unknown. The EA, in fact, is replete with references to the uncertainty inherent in the program, recognizing that “[t]here have been no studies dedicated to documenting and assessing the effects of research on Steller sea lion stocks or populations” and that “[t]he cumulative effects of various research activities on Steller sea lions, including the possibility of cumulative effects that may not become evident for some time, are uncertain.” (AR 406 at 120.) Given the EA’s candid recognition of these uncertainties, defendants’ contention that the agency took a “hard look” at the issue by considering available studies and adopting various measures to mitigate the research’s impact must be rejected. See Nat’l Parks & Conservation Assoc. v. Babbitt, 241 F.3d 722, 733 (9th Cir.2001) (“[T]he Parks Service’s repeated generic statement that the effects are unknown does not constitute the requisite ‘hard look’ mandated by the statute if preparation of an EIS is to be avoided.”). (See Defs.’ Opp’n at 26, 29-30; Defs.’ Rep. at 18.) In its concluding statement of findings, NMFS declares that: The effects of the proposed action are not highly uncertain nor do they involve unique or unknown risks. While there was a low number of Steller sea lion mortalities incidental to the research over the past two years, the total number was within that authorized by the permits and would not have a population level impact. Further, there is no evidence of an accelerated population decline as a result of research activities. (Id. at 58.) This is a non sequitur, not reasoned analysis. In reaching this conclusion, the agency contradicts the EA’s numerous citations to the action’s uncertain effects and unknown risks; ignores numerous statements regarding the possibility of unobserved injuries and mortalities; offers no analysis regarding to the possibility of population-level impacts from an expanded research program; and makes no mention of the ameliorative measures relied upon here by- defendants. Accordingly, in terms of the research’s uncertain effects, the agency’s case for insignificance is far from convincing. See State of Idaho, 35 F.3d at 596 (“Without the requisite hard look, we cannot determine whether [defendant] ‘made a convincing case that the impact was insignificant[.]’ ”). E. Cumulatively Significant Impacts The last of the factors relied upon by plaintiffs is cumulative significance— “[w]hether the action is related to other actions with individually insignificant but cumulatively significant impacts.” 40 C.F.R. § 1508.27(b)(7) (“Significance exists if it is reasonable to anticipate a cumulatively significant impact on the environment. Significance cannot be avoided by terming an action temporary or by breaking it down into small component parts.”); see also id. § 1508.7 (“ ‘Cumulative impact’ is the impact on the environment which results from the .incremental impact of the action when added to other , past, present, and reasonably foreseeable future actions regardless of what agency (Federal or non-Federal). or person undertakes such other .actions.”). Plaintiffs contend that the cumulatively significant impact of the permitted research is evident, again, in its potential for incidental mortalities exceeding the western stock’s PBR level and that the agency failed in its analysis of the issue by resting on “several pages of con-clusory remarks and summaries 'of future actions.” (Pis.’ Mem. at 24.) According to defendants, plaintiffs’ have not met their burden of identifying potentially-significant cumulative impacts that the agency did not include in its discussion. (Defs.’ Opp’n at 30.) As in Friends of the Earth, “it is apparent that, while the [agency] dedicated nine or ten pages [of its assessment] ... to cumulative impacts, the discussion provides no analysis” of the actions’ combined effects. See 109 F.Supp.2d at 42 (“All three EAs merely recite the history of development along the Mississippi coast and then conclude that the cumulative direct impacts ‘have been minimal.’ There is no actual analysis, only that conclusory statement.”) (internal citation omitted); see also Defenders of Wildlife v. Babbitt, 130 F.Supp.2d 121, 138 (D.D.C.2001) (remanding an EIS “[b]ecause the discussion of cumulative impacts consists only of ‘con-clusory remarks [and] statements that do not equip a decisionmaker to make an informed decision about alternative courses of action, or a court to review the Secretary’s reasoning’ ”) (quoting Natural Res. Def. Council, Inc. v. Hodel, 865 F.2d 288, 298 (D.C.Cir.1988)). While offering a “brief summary of the past, present, and future human-related activities affecting the marine mammals, particularly the Stel-ler sea lion, within the action area” (AR 406 at 51-59), those activities are not analyzed in combination. See Grand Canyon Trust, 290 F.3d at 345 (“[A] meaningful cumulative impact analysis must identify ... the overall impact that can be expected if the individual impacts are allowed to accumulate.”); Defenders of Wildlife, 130 F.Supp.2d at 138 (“While the section is entitled ‘cumulative impacts,’ there is no discussion of the incremental impact of this effect ‘when added to other past, present, and reasonably foreseeable future actions regardless of what agency (Federal or non-Federal) or person undertakes such other actions.’ ”) (quoting 40 C.F.R. § 1508.7). Once again, NMFS’s ultimate finding on the issue is revealing: There are no individually insignificant but cumulatively significant impacts of the proposed action. While there are a low number of Steller sea lion mortalities incidental to the research, the total number was within that authorized by the permits. Further, there is no evidence of an accelerated population decline as a result of research activities. In addition, all permits would contain mitigation measures, including a requirement for the researchers to develop a research monitoring plan. (Id. at 59.) Though the agency’s preceding summary describes three categories of human activity that result in sea lion mortality-subsistence harvests, commercial fishing, and scientific research — its finding of “no ... cumulatively significant impacts” is made without reference to non-research-related deaths. Moreover, in focusing on the impacts of previously-authorized research activities, the agency leaves unanswered the question of whether those actions would have a cumulatively significant impact on the environment when combined with the “incremental impact” of the expanded research program. See 40 C.F.R. § 1508.7; id. § 1508.27(b)(7). As NMFS did not fulfill its obligation to thoroughly consider the combined effects of human activity on the environment, it is not relevant whether plaintiffs have identified potential impacts that should have been included. See City of Carmel-by-the-Sea v. U.S. Dep’t of Transp., 123 F.3d 1142, 1161 (9th Cir.1997) (rejecting defendants’ contention that plaintiff had not met its burden of identifying an action the contested EIS “fail[ed] to consider” as the agency had “failed first” in failing to sufficiently detail the cumulative effects of existing projects). F. Conclusion In its haste, NMFS neglected to take a “hard look” at the relevant environmental issues and thereby failed to make a “convincing case” that the authorized research will not have a significant impact on the environment. See Sierra Club, 717 F.2d at 1413. The agency’s failure is not surprising on this record. Since NMFS has decided, after the fact, to prepare an EIS that will address Steller sea lion research, and in light of the relationship between potential research-related deaths and the western stock’s PBR level, the substantial controversy regarding the research’s effects, the unknown risks and uncertain effects stemming from the approved activities, and the possibility of a cumulatively significant impact on the environment, the Court concludes that “ ‘significant’ environmental impacts might result” from the issuance of the contested permits. See id. at 1415. As an EIS was therefore required “before the action [was] taken[,]” see id., the Court will vacate the contested permits and remand the case to NMFS for preparation of, an EIS. III. ESA Under Section 7(a)(2) of the Endangered Species Act, all federal agencies are required “to insure that any action authorized, funded, or carried out by such agency is not likely to jeopardize the continued existence of any endangered species or threatened species or result in the destruction or adverse modification of [any critical] habitat of such species[.]” 16 U.S.C. § 1536(a)(2). When an agency determines that its proposed action “may affect listed species or critical habitat[,]” it must engage in formal consultation with the federal resource agency responsible for the species at issue, which in the case of the Steller sea lion is NMFS. See 50 C.F.R. § 402.14(a). Consultation concludes with the issuance of a BO “detailing how the agency action affects the species or its critical habitat” and indicating whether the proposed action is likely to jeopardize the species’ continued existence. 16 U.S.C. § 1536(b)(3)(A). WTien a jeopardy determination is reached, the BO may indicate any “reasonable and prudent” alternatives to the action under review. Id.; 50 C.F.R. § 402.14(h)(3). When it is determined that the action and “any resultant incidental take” of the species will not jeopardize the species, NMFS must provide a statement specifying “reasonable and prudent measures ... necessary or appropriate to minimize such impact.” 16 U.S.C. § 1536(b)(4); see also id. § 1532(19) (“The term ‘take’ means to harass, harm, pursue, hunt, shoot, wound, kill, trap, capture, or collect, or to attempt to engage in any such conduct.”). After the initiation of a required consultation, Section 7(d) of the Act prohibits “any irreversible or irretrievable commitment of resources with respect to the agency action which has the effect of foreclosing the formulation or implementation of any reasonable and prudent alternative measures which would not violate [Section 7(a)(2) ].” Id. § 1536(d). On May 24, 2005, NMFS’s Office of Protected Resources issued a BO concluding that “the research program, as proposed, [was] not likely to jeopardize the continued existence of the endangered western population of Steller sea lions or the threatened eastern population of Steller sea lions.” (AR 407 at 1.) Though research permits were issued shortly thereafter, NMFS subsequently concluded that it was appropriate to “revisit” the opinion in order to “remedy any internal inconsistencies in the effects analysis of the biological opinion,” to “clarify the basis for its determination that the permitted activities would not reasonably be expected to appreciably reduce the species’ likelihood of surviving and recovering in the wild[,]” and to “reconsider the cumulative effects of future state, tribal, local or private actions that are reasonably certain to occur in the action area.” (Defs.’ Opp’n Ex. 5 at 2 (Declaration of James H. Lecky, Director of the Office of Protected Resources).) The agency’s revised BO was issued on March 3, 2006, nearly eight months after this suit was initiated. (See Defs.’ Rep. Ex. 6 (Revised BO).) Once again, the 2006 BO concluded that the research program was unlikely to jeopardize the existence of either Steller sea lion population. (Id. at 59.) Plaintiffs challenge the sufficiency of the agency’s 2005 BO, asserting that it fails to consider both the effects of the proposed action in light of the environmental baseline and the cumulative impact of human activity on the species. (See Pis.’ Mem. at 28-36.) In response to defendants’ contention that their challenge has been mooted by the 2006 BO (Defs.’ Rep., at 4), plaintiffs argue that the 2006 BO cannot serve as legal justification for the agency’s issuance of the contested permits, which were premised on the finding of the 2005 BO. (Pis.’ Surrep. at 5.) To hold otherwise, plaintiffs contend, would endorse a practice by which agencies evade judicial review through a “cycle” of inadequate but “short-lived” BOs. (Pis.’ Rep. at 28.) Plaintiffs’ concerns are legitimate. In the present case, NMFS authorized extensive research involving endangered and threatened populations of Steller sea lions on the basis of a BO it later characterized as both opaque and internally inconsistent. (See Defs.’ Opp’n Ex. 5 at 2.) The agency’s decision to “revisit” the opinion following the issuance of the permits is difficult to reconcile with its obligation “to insure that [the] action ... [was] not likely to jeopardize the continued existence of any endangered species or threatened species.... ” See 16 U.S.C. § 1536(a)(2). As a result of the Court’s decision to vacate the contested permits, however, there is no reason to resolve the issue of whether the issuance of the 2006 BO mooted plaintiffs’ arguments related to the defects in the 2005 BO. Even if NMFS determines, upon completing an EIS, that it is appropriate to reissue the permits in their present form, that action will not be premised on the 2005 BO challenged in plaintiffs’ complaint. Accordingly, there is no reason to resolve plaintiffs’ ESA claims. IV. MMPA Plaintiffs also contend that NMFS violated the MMPA by completing its environmental evaluation and issuing the contested permits without allowing the MMC to provide final comments on the action, and by failing to analyze the permit applications in light of both the Steller sea lions’ PBR levels and the availability of less invasive research methods. (Pis.’ Mem. at 37-38.) Since NMFS will have to prepare an EIS, it will have opportunity to consider, among other things, the MMC’s comments, the populations’ PBR levels, and available alternatives to the proposed research activities, and therefore, there is also no need to decide plaintiffs’ MMPA claims. CONCLUSION For the foregoing reasons, the Court will grant plaintiffs’ Motion for Summary Judgment on the basis that defendants have failed to comply with NEPA by not preparing an EIS, vacate the contested permits and remand the case to the agency for preparation of an EIS. ORDER For the reasons stated in the accompanying Memorandum Opinion, it is hereby ORDERED that plaintiffs’ Motion for Summary Judgment [# 11] is GRANTED and judgment is entered for plaintiffs on their NEPA claim insofar as NMFS has violated the APA by acting arbitrarily and capriciously and contrary to law by failing to prepare an EIS prior to its issuance of the contested permits and permit amendments; it is FURTHER ORDERED that defendants’ Cross-Motion for Summary Judgment [# 14] is DENIED; it is FURTHER ORDERED that this matter is remanded to NMFS for preparation of an EIS; it is FURTHER ORDERED that the con-, tested permits and permit amendments be vacated; it is FURTHER ORDERED that plaintiffs’ Motion to Supplement the Administrative Record [# 20] is GRANTED. SO ORDERED. . Permits are required for invasive research on Steller sea lion populations under the MMPA and ESA. In 1972, the MMPA established a moratorium on the "tak[ing]” of marine mammals — a term broadly defined as including "harass[ing], hunting], captur[ing], or kill[ing], or attempt[ing] to harass, hunt, capture, or kill any marine mammal.” 16 U.S.C. §§ 1362(13), 1371(a); see also id. § 1362(18)(A) (defining "harassment” as "any act of pursuit, torment, or annoyance which ... has the potential to injure a marine mammal or marine mammal stock in the wild” or "has the potential to disturb a marine mammal or marine mammal stock in the wild by causing disruption of behavioral patterns, including, but not limited to, migration, breathing, nursing, breeding, feeding, or sheltering"). The Act, however, provides for the issuance of permits authorizing the taking of marine mammals "for scientific research purposes” when an applicant demonstrates "that the taking is required to further a bona fide scientific purpose[.]” Id. § 1374(c)(3)(A)-(B); see also id. § 1362(22) (defining "bona fide research” as that with results that "likely would be accepted for publication in a referred scientific journal;” that "are likely to contribute to the basic knowledge of marine mammal biology or ecology;” or that "are likely to identify, evaluate, or resolve conservation problems”). If the targeted stock is depleted, the Secretary must also determine "that the results of such research will directly benefit that species or stock, or that such research fulfills a critically important research need.” Id. Similarly, the ESA bars the "tak[ingj” of listed species, but provides for the issuance of permits authorizing takes "for scientific purposes or to enhance the propagation or survival of the affected species.” Id. §§ 1538(a)(1), 1539(a)(1)(A); see abo id. § 1532(19) ("The term ‘take’ means to harass, harm, pursue, hunt, shoot, wound, kill, trap, capture, or collect, or to attempt to engage in any such conduct.”). . The permits were later extended through December 31, 2005, by a "minor amendment” not subject to environmental review. (See AR 406 at 23.) . NMFS later prepared a June 2003 Supplemental EA addressing the potential effects of two proposed amendments to permits held by Dr. Glenn VanBlaricom and the Alaska SeaL-ife Center. (See AR 390 at 3 (June 2003 Supplemental EA).) The agency determined that the activities authorized under the amended permits would not have a significant effect on the human environment and issued the amendments. (See AR 406 at 12 (2005 EA).) . The MMC provided NMFS with final comments affirming its preliminary recommendation on June 10, 2005. (Barrett Deck Ex. 2.) . The newly-authorized activities included the surgical implantation of transmitters, an activity the EA characterized as having "an inherent risk of serious injury and mortality in the short term and an unknown risk of long-term effects on fitness and survival.” (AR 406 at 43.) . In their opposition, defendants also challenged plaintiffs’ standing, contending that the allegations of injury made in their complaint were insufficient and plaintiffs had otherwise "failed to provide affidavits or other evidence demonstrating that they have suffered actual injury.” (Defs.' Opp'n at 17-18.) Plaintiffs, however, have since supplied declarations documenting their injuries — Anderson as an observer of the species with plans to travel to Washington and Oregon before the end of the year, and Young as an active Stel-ler sea lion observer and advocate. (Pis.' Rep. Exs. 1 and 2.) Defendants have correctly omitted any further argument regarding standing from their reply. See Communities for a Great Northwest, Ltd. v. Clinton, 112 F.Supp.2d 29, 33 (D.D.C.2000) ("The trial court may allow plaintiffs the opportunity to supply by affidavits further particularized allegations of fact in support of standing[.]”). . The issues were identified as (1) the agency’s ability "to coordinate research under the various permits and ensure that activities are not unnecessarily duplicative and do not result in significant adverse impacts on threatened and endangered Steller sea lions[;3" (2) the agency’s ability to "adequately monitor the effects of the overall research program on Steller sea lions[;]” (3) the agency’s ability to "coordinate and synthesize the data generated by this research program in a way that is useful or meaningful for conservation of Stel-ler sea lions[;]” (4) whether the various research proposals were "consistent with permit issuance criteria under the MMPA and ESA, such as whether all of the projects are likely to contribute to conservation of Steller sea lions[;]'.' (5) whether the level of incidental mortality authorized under the permits "represent[ed] a significant adverse impact on Steller sea lions[;]” and (6) “the potential effects of various research activities, either individually or cumulatively, on Steller sea lions as a species[.]” (AR 395 at 3.) . The issues identified for public comment were: (1) the varieties of "research methods and protocols” to be authorized; (2) the appropriate "DQevel of research effort” and the available means of establishing limits, including the sufficiency of "current methods to assess and document numbers of different 'takes' " resulting from permitted conduct; (3) the "[coordination of research!,]” including possible mechanisms for ensuring cooperation among researchers in order to reduce the adverse impact on the species as well as methods allowing the compilation of information from different sources; (4) the "[e]ffects” of the various authorized research methods on the populations; (5) the "[Qualification of researchers” operating under permits; and (5) any possible ‘‘[c]riteria for allowing modifications or amendments to existing grants and permits[,] for denying permit amendments!,] and for suspending or revoking permits.” 70 Fed.Reg. at 76,781-82. . Moreover, in comparing the agency’s 2002 and 2005 assessments, it is evident that discussions of the populations’ PBR levels were removed without explanation from otherwise identical sections of the latter document. For instance, in its discussion the impacts of commercial fishing on Steller sea lion populations, the 2002 EA states: Commercial fisheries can directly affect Steller sea lions by capturing, injuring, or killing them incidental to fishing operations. Estimates of rates of entanglement through the early 1980s suggest that mor-talities from entanglement were a contributing factor in the decline of Steller sea lions in the Bering Sea, Aleutian Islands, and Gulf of Alaska. The relative impact of mortalities to marine mammals occurring incidental to commercial fisheries is estimated under the MMPA by comparing minimum annual mortality rate [sic] to a Potential Biological Removal (PBR) level. Recent estimates of the numbers of sea lions killed incidental to commercial fisheries is low (28.3/year for the western stock and 16/year for the eastern stock). The estimate of incidental takes in the eastern stock is considered negligible being significantly less than 10% of the PBR for that stock (PBR = 1,395 animals) and is not considered to have a significant effect on Steller sea lion population dynamics. The relative impact of Steller sea lion incidental mortality in commercial fisheries in the western population is approximately equal to 10% of PBR for that population and may increase as the western population declines, even if the rate of incidental takes remains constant. (AR 384 at 40.) In NMFS’s 2005 assessment, all references to the populations’ PBR levels were deleted: Commercial fisheries can directly affect Steller sea lions by capturing, injuring, or killing them incidental to fishing operations. Estimates of rates of entanglement through the early 1980’s suggest that mor-talities from entanglement were a contributing factor in the decline of Steller sea lions in the Bering Sea, Aleutian Islands, and Gulf of Alaska. However, recent estimates of the numbers of sea lions killed incidental to commercial fisheries is low (28.3/year for the western stock and 16/year for the eastern stock) and is not considered to have a significant effect on Steller sea lion population dynamics. However, the relative impact of incidental mortality fisheries may increase as the population declines, even if the rate of incidental takes remains constant. (AR 406 at 52.) . In their reply, defendants contend that the record reflects sufficient consideration of the western stock's PBR level since "the agency specifically addressed PBR in its 2003 supplemental EA” and "[a] review of the 2002 EA reflects that the mitigation measure for accidental mortality ... was derived based on the PBR of the western stock.” (Defs.' Rep. at 10.) Defendants also note that "the 2005 EA incorporates by reference the 2000 and 2001 annual stock assessment reports for Steller sea lions, which discuss the methodology used to determine PBR and set forth the PBR levels for the western and eastern stocks.” (Id. (offering no citations to the EA).) While NMFS was not precluded from incorporating relevant analysis from its previous evaluations, see Sierra Club, 753 F.2d at 127 (affirming a finding of no significant impact based in large part on the agency’s prior EIS), it did not do so here. As shown in note 9, supra, the agency excised the prior discussion of the populations' PBR levels from its EA, relying instead on conclusoiy declarations of insignificance. Thus, defendants' attempt to incorporate a prior PBR analysis into the contested EA and FONSI cannot succeed. . While the MMC’s preliminary comments were not included in the Administrative Record, defendants acknowledge that they should have been. (See Defs.’ Opp’n to Pis.’ Mot. to Supp. at 6.) Plaintiffs’ Motion to Supplement the Administrative Record will therefore be granted with respect to these comments. See Esch, 876 F.2d at 991 (supplementation appropriate where the agency "considered evidence which it failed to include in the record”). . See also AR 406 at 18 (noting that “there has been insufficient information collected since the 2002 EA to resolve all the information gaps identified in [its effects] analysis”); id. at 41 ("There have been no studies dedicated to documenting and assessing the effects of research on Steller sea lions or other marine mammals at a population level, nor on the synergistic or cumulative effects of various research activities and other human-related impacts on individual marine mammals or populations.”); id. at 42 ("[A] lack of observable or otherwise detectable response to a research activity should not, in the absence of supporting documentation, be taken as a lack of effect.”); id. ("The number of observed and reported mortalities may or may not represent the number of actual mor-talities.”); id. at 43 ("There is an increased risk of serious injury or mortality associated with some of the proposed research activities that are part of the Proposed Action.... For example, the proposed surgical implantation of transmitters has ... an unknown risk of long-term effects on fitness and survival.”); id. at 44 ("There is insufficient information to assess the likely duration or extent of ultimate impacts of the Proposed Action relative to the No Action” though “it is reasonable to assume ultimate effects of the Proposed Action would continue further' in time than those of the No Action because the activities themselves would occur over a longer period.”)'; id. at 52 (“The effects of research on the Steller sea lion population are uncertain, but some research techniques and activities are known to adversely affect individual animals[.]”); id. at 52-53 ("It is not kno.wn whether research activities themselves have had a significant adverse .impact on the Stel-ler sea lion population, or if the disturbance and incidental mortality associated with research activities have been a factor in the decline.”); id. at 54 ("Given the number of permits and associated takes, repeated disturbance of individual sea lions must occur. It is difficult to assess the effects of such repeated, and potentially chronic distur- - bance."). ; Given the Court’s conclusion that an EIS is required, it need not resolve the many arguments that plaintiffs raise regarding the sufficiency of defendants’ EA. It nonetheless bears noting that plaintiffs' contention that defendants failed to give adequate consideration to potential alternatives to the proposed research appears to provide further justification for a remand. (See Pis.' Mem. at 25-26.) Although the portion of the EA regarding the "Proposed Action” and its alternatives describes five possibilities, only two — the "Proposed Action” and "No Action alternative”-— were worthy of "detailed study” according to the agency. (AR 406 at 30.) The EA states that the possibility of a temporary moratorium on all Steller sea lion research was "not considered further because it would not allow collection of information on population distribution and abundance trends (such as that from aerial surveys) or vital rates” — information important to the monitoring of the species. (Id. at 31.) The option of authorizing only nonintrusive research was similarly summarily rejected on the grounds that “permit holders and applicants ... indicated it is important for them to conduct the intrusive activities to obtain information on the physiology, foraging behavior, health and reproductive status of individual sea lions.” (Id. at 32.) Finally, the option of limiting most intrusive research to eastern Steller sea lions and surrogate species "was not considered further because various permit holders and applicants ... indicated it is either not logistically feasible for them to conduct their activities with species or populations other than those they have requested” or "because the nature of the population decline ma[de] it important to conduct their investigations in the population experiencing the decline.” (Id. at 33.) Such a discussion of alternatives cannot satisfy the requirements of NEPA'. In evaluating the environmental consequences of a proposed project, federal agencies are required to "study [and] develop ... appropriate alternatives to recommended courses of action.” 42 U.S.C. § 4332(2)(E); see also 40 C.F.R. § 1508.9(b). An agency’s consideration of alternatives “must be more than a pro format] ritual. Considering environmental costs means seriously considering alternative actions to avoid them.” Southern Utah Wilderness Alliance v. Norton, 237 F.Supp.2d 48, 52 (D.D.C.2002). Serious consideration of alternatives was not undertaken here; rather defendants deferred to the views of permit holders, ignoring comments that challenged the sufficiency of the draft EA’s alternatives section and indicated that one of the rejected options was both reasonable and less invasive. (See AR 406 at 31-3-3; AR 401 at 7-8 (Society's May 4, 2005 comments).) See Oceana, Inc. v. Evans, 384 F.Supp.2d 203, 241 (D.D.C.2005) ("[A]gencies have a duty to consider 'significant and viable alternátives1' identified through public comments.”) (citation omitted). As in Southern Utah Wilderness Alliance, the agency here failed in its duty to "study, develop, and describe appropriate alternatives to recommended course[] of action”-by relying wholly on the "self-serving statements of the project applicants.” 237 F.Supp.2d at 53; see also 42 U.S.C. § 4332(2)(E); Idaho v. ICC, 35 F.3d 585, 596 (D.C.Cir.1994) (agency may not defer to the judgment of other agencies and the licensee in evaluating environmental impact of an application to engage in salvage activities); Illinois Commerce Comm’n v. ICC, 848 F.2d 1246, 1258 (D.C.Cir.1988) (An agency "may not delegate to parties ... its own responsibility to independently investigate and assess the environmental impact of the proposal before it.”). The deficiencies of the EA's alternatives discussion must be remedied in the agency’s EIS.
CASELAW
Cricket-Warner cleared for second test, De Kock to contest charge March 7, 2018 / 11:52 AM / Updated 10 hours ago Cricket-Warner cleared for second test, De Kock to contest charge Reuters Staff 3 Min Read PORT ELIZABETH, March 7 (Reuters) - Australian opening batsman David Warner has been cleared to play in the second test against South Africa after accepting an International Cricket Council (ICC) charge of bringing the game into disrepute. However, South African wicketkeeper Quinton de Kock, who was involved in an ugly verbal spat with Warner, will challenge his lesser level one charge and has a hearing scheduled for Wednesday, Cricket South Africa has said. The ICC stopped just short of banning Warner for the match that starts in Port Elizabeth on Friday. The vice-captain will be fined 75 percent of his match fee and handed three demerit points, Cricket Australia said on Wednesday. Should a player receive four or more demerit points within a two-year period, these are converted into suspension points. A suspension point amounts to a ban from one test or two ODIs, or two T20s, whichever come first. The incident between Warner and De Kock has sparked a war of words between the two camps, with each blaming the other for overstepping the boundaries of what is acceptable on-field banter. CCTV footage from the players’ tunnel on day four of the test in Durban showed Warner and De Kock involved in a fiery exchange as players climbed the stairwell to their dressing rooms during the tea break. Warner had to be restrained by team mates during the fracas. Another video from just before the incident surfaced on Wednesday showing Warner repeatedly calling De Kock a “sook”, which is Australian slang for somebody that is perceived to be soft. De Kock faces a level one charge that brings with it a maximum penalty of a fine and demerit points, but his participation in the second test is not in danger. Warner is not the only Australian player to be punished by the ICC following what was a tempestuous 118-run victory in Durban. Spinner Nathan Lyon was fined 15 percent of his match fee for breaching the ICC’s code of conduct as he intentionally dropped the ball onto a sprawled AB de Villiers after the South African batsman had been run-out in his country’s second innings. (Reporting by Nick Said Editing by Christian Radnedge)
NEWS-MULTISOURCE
Page:Dwellings of working-people in London.djvu/39 To the Right Honourable Richard Assheton Cross, M.P., Secretary of State for the Home Department. , the dwellings of the poorer classes in various parts of the metropolis are in such a condition, from age, defects of construction, and mis-use, as to be deeply injurious to the physical and moral welfare of the inhabitants, and to the well-being of the community at large. That so long as unsuitable and unhealthy houses are allowed to stand near the great centres of employment, such houses, owing to their position and comparative cheapness, will always attract occupants, and all efforts to improve the condition of the London poor may thus be permanently frustrated. That the power entrusted to local authorities to condemn houses as unfit for human habitation is insufficient to bring about the requisite
WIKI
Harriet Tubman is undoubtedly one of the most significant Black leaders in the slave era. She is credited for playing a huge role in leading slaves from the South up North through the Underground Railroad. Famously likened to the biblical “Moses” who led the people of Israel from captivity in Egypt, Tubman was an essential figure in leading African slaves to freedom. But what many people, including some students of African history, do not know is that Harriet Tubman did much more beyond her role as a conductor for the Underground Railroad. Some critics believe that there is a conscious ploy to protect the shameless disservice by authorities. They claim that the authorities are suppressing information about her role in the Union Army during the Civil War of 1861. After the role in the Underground Railroad, Harriet Tubman joined the Union Army during the Civil War. She led a successful Brazen Civil War Raid termed the Combahee Ferry Raid. Tubman was a soldier and spy for the Union Army during the war. She is also the first woman to lead an armed military operation in the United States. The military operation Tubman led is known as the Combahee Ferry Raid. It resulted in the freedom of more than 700 slaves, possible through a partnership between Harriet Tubman and Colonel James Montgomery. Col. Montgomery was an abolitionist who commanded a Black regiment known as the Second South Carolina Volunteers. As a spy for the army, Tubman gathered intelligence that some slaves were being ferried across the Combahee River by wealthy rice plantation owners. She was bent on rescuing the slaves before they got to the plantations. Montgomery was willing to commit 300 men for the operation; so, Tubman and eight scouts mapped the area and sent words to the slaves to prepare for a rescue mission. “She was fearless, and she was courageous,” said Kate Clifford Larson, renowned historian and author of the book – Bound for the Promised Land: Harriet Tubman, Portrait of an American Hero. “She had a sensibility. She could get black people to trust her and the Union officers knew that the local people did not trust them.” The raid was carried out on the night of June 1, 1863. Tubman and Montgomery led two gunboats, the Sentinel and Harriet A. Weed, from a federal ship named John Adams. As explained in a book by Catherine Clinton titled Harriet Tubman: The Road to Freedom, Tubman, who was illiterate, couldn’t write down any intelligence she gathered. Instead, she committed everything to memory, guiding the ships towards strategic points near the shore where fleeing slaves were waiting. “They needed to take gunboats up the river,” said Clinton. “They could have been blown up if they hadn’t had her intelligence.” Around 2:30 a.m. on June 2, the John Adams and the Harriet A. Weed split up along the river to conduct different raids. Tubman led 150 men on the John Adams toward the fugitives who opened fire on the soldiers and the slaves. One girl was reportedly killed. As the escapees ran to the shore, Black troops in rowboats transported them to the ships, to calm the slaves. Tubman, who didn’t speak the region’s Gullah dialect, reportedly went on deck and sang a popular song from the abolitionist movement that calmed the group down. More than 700 escaped slavery and made it onto the gunboats. It is surprising that despite the Tubman’s role in this famous raid and in the army, which also included the recruitment of at least 100 freedmen into the Union Army through her help, she did not receive any compensation or medal. Larson mentioned in her book that Harriet Tubman petitioned the government several times to be paid for her duties as a soldier, but was denied. Tubman was later placed on a pension at her old age, but this was because she was a widow of a Black Union soldier she married after the war, not for her role and service as a soldier. Do you think it is too late to honour Harriet Tubman as a war veteran? What are your thoughts?
FINEWEB-EDU
Preparing for the Trump era of manufacturing | TheHill “Business as usual” is obsolete among today’s manufacturers. The shifting global landscape and the rise of nationalism in the U.S. are some of the most dramatic points of the manufacturing evolution, and certainly areas gaining significant attention. Ignited by political rhetoric and President Donald Trump’s promise to revitalize the U.S. manufacturing sector, the dialog can quickly become emotional, rather than factual. In his short time as president, Trump has created a Manufacturing Jobs Initiative, pulled the U.S. out of the TPP, and proposed a steep tax on border imports. It’s evident he isn’t wasting any time when it comes to jobs and trade, and U.S. manufacturers must prepare to keep up. Keeping production plants and jobs in America is a complex mission, with many naysayers pointing out that the jobs being brought back no longer exist. Advancements in tech like cognitive technology, robotics and automation, complicate the issue. To understand some the nuances of this topic, here is a macro look at U.S. manufacturing employment from the 1970’s to now.   Where did the jobs go? U.S. manufacturing employment peaked in the late 1970s with the total industry output increasing more than 250 percent from 1980 to 2015. However, the workforce slumped by roughly 40 percent in that time. While the U.S. economy is pumping out manufactured goods in record volumes, it is achieving that feat with 7.3 million fewer factory hands than in 1979, government figures show. Advances in shop floor productivity, plant automation, use of robotics, streamlined activities, and optimized processes all contribute to today’s highly efficient model.   The gains in productivity are even more dramatic. In 1980, it took 25 jobs to generate one million dollars in manufacturing output in the U.S. Today, it takes just 6.5 jobs to generate that amount of revenue. This supports the claim that off-shoring alone can’t be blamed for loss of jobs. Those skeptical about Trump’s promise to bring outsourced jobs back to America point out that the types of jobs that were lost are no longer relevant. With fewer workers needed to run plants, a massive 26 percent surge in manufacturing output would be needed to re-employ seven million factory workers. Why are jobs unfilled? On the other hand, manufacturers are still struggling to fill the vacancies left by retiring baby boomers. It’s estimated that in the next decade, there will be nearly 3.5 million manufacturing jobs — two million of which are expected to go unfilled. Without skilled personnel in place, manufacturers will be hard-pressed to keep up with market demands. Some say that misconceptions about manufacturing are keeping applicants away. A recent poll conducted by the Foundation of Fabricators & Manufacturers Association reported that 52 percent of all teenagers have no interest in a manufacturing career and a study conducted by Deloitte and National Association of Manufacturers (NAM) found that only 37 percent of adult respondents would encourage their children to pursue a manufacturing career. The resulting contradiction is troublesome. On one hand, President TrumpDonald John TrumpTrump pushes back on recent polling data, says internal numbers are 'strongest we've had so far' Illinois state lawmaker apologizes for photos depicting mock assassination of Trump Scaramucci assembling team of former Cabinet members to speak out against Trump MORE is promising to bring manufacturing jobs back. On the other hand, the existing jobs in manufacturing can’t be filled. Forecasting the future As the international political climate quickly evolves, the U.S. outlook for manufacturing is also in the throes of political scrutiny and upheaval. Creating American jobs and keeping U.S. plants on U.S. soil are topics generating headlines and debate. This points to one certainty: disruptive change has become the new normal for manufacturing. So what can manufacturers do to drive progress for their business, while mitigating risk during a time of high uncertainty? Educate, re-skill and hire right. Manufacturing automation is about to rapidly accelerate and companies need to re-skill their workforce to adapt to this irreversible trend. Manufacturers need to recruit and retain top talent, and should rely on talent software to help guide hiring decisions. Software like Infor Talent Science helps hiring managers make the best decisions based on the needs of the company and demands of the job. Invest in technology that gives a clear competitive advantage To compete in today’s global economy, manufacturers must take advantage of a smart supply network and integrated connection of vendors, suppliers, partners and contractors. Cloud solutions make that visibility practical and easy to manage. Portals, collaboration tools, and mobile connectivity help keep extended teams in constant communication. Use predictive analytics Big data and predictive analytics allow manufacturers to anticipate changes on the horizon and maintain a proactive stance. Manufacturers can anticipate customer needs and be prepared with the right resources on hand.   Seize the opportunities A highly flexible organization can benefit from the constant waves of change, as it pivots to seize new opportunities. However, as market pressures mount and the competitive landscape escalates, the real test of a manufacturer’s fortitude is the ability to evolve business in a way that supersedes the competition and anticipates future market demands while maintaining stability and integrity along the way. Mark Humphlett is the senior director of industry and product marketing for Infor. He has over 16 years of experience in technology and more than 25 years in the manufacturing and distribution industry, Humphlett joined the Infor team in 2006. He previously led supply chain solutions marketing and served as a principal business consultant leading presales, solution design, and implementations for several software solutions.  The views expressed by contributors are their own and not the views of The Hill. View the discussion thread. Contributor's Signup The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Wikipedia:Today's featured article/May 29, 2018 The snoring rail (Aramidopsis plateni) is a large flightless rail. The only species of its genus, it is endemic to Indonesia, and is found in dense vegetation in wet areas of Sulawesi and nearby Buton. The rail has grey underparts, a white chin, brown wings and a rufous patch on the hindneck. The sexes are similar, but the female has a brighter neck patch and a differently coloured bill and iris. The typical call is the snoring ee-orrrr sound that gives the bird its common name. The snoring rail, with a retiring nature, is rarely seen in its inaccessible habitat, and little is known of its behaviour. Only the adult plumage has been described, and the breeding behaviour is unrecorded. It feeds on small crabs and probably other small prey such as lizards. Although protected under Indonesian law since 1972, the rail is evaluated as vulnerable on the International Union for Conservation of Nature's Red List; it is threatened by habitat loss, even within nature reserves, and by introduced species.
WIKI
Talk:You Didn't Have to Be So Nice/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Nominator: Reviewer: Zmbro (talk · contribs) 19:39, 25 March 2024 (UTC) Hey there old friend. This will be a quick pass, just a couple comments. – zmbro (talk) (cont) 19:46, 25 March 2024 (UTC) Comments * "Boone's initial inspiration for the song was remark he made on a date with Nurit Wilde," a remark? * Fixed typo. * Could we reword the first paragraph a bit? The song was written by Sebastian and Boone, but the first sentence implies Boone wrote the whole thing. Maybe "Steve Boone began writing "You Didn't Have to Be So Nice"..." * Sorry, which paragraph do you mean? In the lead or in the body? I changed "Written by" to "Credited to" in the first second sentence. * That's my bad I meant the first paragraph in the body. I thought the "written by" in the lead was perfectly fine. – zmbro (talk) (cont) 16:47, 4 April 2024 (UTC) * Ah, I see what you mean now. I made two adjustments to the phrasing there. How about now? Tkbrett (✉) 11:28, 6 April 2024 (UTC) * Much better. – zmbro (talk) (cont) 17:52, 7 April 2024 (UTC) * Sources are good. Was the song ever included on later compilations or anything like that? * I added mention of the more notable ones. * Copyvio detector is very good at 10.7%. I knew it wouldn't be a problem since most material here is book sources. – zmbro (talk) (cont) 17:49, 26 March 2024 (UTC) – zmbro (talk) (cont) 19:46, 25 March 2024 (UTC) * Ping – zmbro (talk) (cont) 14:20, 26 March 2024 (UTC) * In case you didn't see this. – zmbro (talk) (cont) 15:40, 29 March 2024 (UTC) * Thank you, ! I am sorry, I did see it but I was on the road; now I’m away for the Easter weekend. I only have mobile, but this review is pretty straightforward, so I will try to respond to the comments above if I have time this weekend. Thanks again! Tkbrett (✉) 22:00, 29 March 2024 (UTC) * No problem! Just wanted to make sure you got the message :-) – zmbro (talk) (cont) 22:17, 29 March 2024 (UTC) * Responses above. So sorry again for the delay,, I've been extremely busy lately. Tkbrett (✉) 01:25, 4 April 2024 (UTC) * Made a few ref adjustments and added archives. We're all set. ✅ – zmbro (talk) (cont) 17:59, 7 April 2024 (UTC)
WIKI
Poynings (disambiguation) Poynings is a village and civil parish in West Sussex, England, UK. Poynings may also refer to the following English people: * Baron Poynings, title in the Peerage of England, 1337–1489 and 1545 * Sir Adrian Poynings (c.1512–1571), military commander and administrator * Sir Edward Poynings (1459–1521) soldier, administrator, diplomat, and Lord Deputy of Ireland * Sir Robert Poynings (c.1419–1461), Yorkist in the Wars of the Roses * Poynings Heron (1548–1595), commander during the Spanish Armada * Sir Poynings More, 1st baronet (1606–1649), MP
WIKI
Detalle Publicación Population pharmacokinetics of clarithromycin in mexican hospitalized patients with respiratory disease: evidence for a reduced clearance Autores: Lemus-Castellanos, A. E.; Fernández de Trocóniz Fernández, José Ignacio; Garrido Cid, María Jesús; Granados-Soto, V.; Flores-Murrieta, F. J. Título de la revista: INTERNATIONAL JOURNAL OF PHARMACOLOGY ISSN: 1811-7775 Volumen: 13 Número: 1 Páginas: 54 - 63 Fecha de publicación: 2017 Resumen: Objective: To describe quantitatively the variability associated to the pharmacokinetic (PK) processes of clarithromycin (CLA) in Mexican hospitalized patients with respiratory infection and to determine whether the 6-beta-hydroxycortisol (6 beta-OHC)/cortisol ratio, among other factors would partially explain such variability. Materials and Methods: Fifty three patients aged >18 years with respiratory disease treated with CLA were included in the study. An average of 3 blood samples per patient were obtained at approximately the following Times After Dosing (TAD): 0.5, 1.25, 2, 3, 4, 6, 9 and 12 h. Clarithromycin was given orally or i.v., twice daily at the dose of 500 mg. Around the same times at which blood samples were collected, one urine sample was obtained for determining the 6 beta-OHC/cortisol ratio. The serum concentration vs time data of CLA were modeled using the population approach with NONMEM 7.2. Results: A one-compartment disposition model with first-order rate of absorption and concentration independent distribution and elimination provided a reasonable description of the data. Absolute bioavailability of CLA was not different from 1 (p>0.05). The population estimate of total clearance was 14.6 L h(-1), lower than that reported previously for healthy volunteers. Final population model included body weight as the unique covariate affecting the apparent volume of distribution. Conclusion: The study population showed a total clearance lower than that reported for healthy volunteers from other countries, probably due to the low activity of CYP3A determined in this population. However, the CYP3A activity level did not result as a significative covariable of the CLA total clearance. Impacto:
ESSENTIALAI-STEM
Quadratic field From Wikipedia, the free encyclopedia   (Redirected from Quadratic number field) Jump to: navigation, search In algebraic number theory, a quadratic field is an algebraic number field K of degree two over Q, the rational numbers. The map d ↦ Q(d) is a bijection from the set of all square-free integers d ≠ 0, 1 to the set of all quadratic fields. If d > 0 the corresponding quadratic field is called a real quadratic field, and for d < 0 an imaginary quadratic field or complex quadratic field, corresponding to whether it is or not a subfield of the field of the real numbers. Quadratic fields have been studied in great depth, initially as part of the theory of binary quadratic forms. There remain some unsolved problems. The class number problem is particularly important. Ring of integers[edit] Main article: Quadratic integer Discriminant[edit] For a nonzero square free integer d, the discriminant of the quadratic field K=Q(d) is d if d is congruent to 1 modulo 4, and otherwise 4d. For example, when d is −1 so that K is the field of so-called Gaussian rationals, the discriminant is −4. The reason for this distinction relates to general algebraic number theory. The ring of integers of K is spanned over the rational integers by 1 and d only in the second case, while in the first case it is spanned by 1 and  (1 + d)/2. The set of discriminants of quadratic fields is exactly the set of fundamental discriminants. Prime factorization into ideals[edit] Any prime number p gives rise to an ideal pOK in the ring of integers OK of a quadratic field K. In line with general theory of splitting of prime ideals in Galois extensions, this may be p is inert (p) is a prime ideal The quotient ring is the finite field with p2 elements: OK/pOK = Fp2 p splits (p) is a product of two distinct prime ideals of OK. The quotient ring is the product OK/pOK = Fp × Fp. p is ramified (p) is the square of a prime ideal of OK. The quotient ring contains non-zero nilpotent elements. The third case happens if and only if p divides the discriminant D. The first and second cases occur when the Kronecker symbol (D/p) equals −1 and +1, respectively. For example, if p is an odd prime not dividing D, then p splits if and only if D is congruent to a square modulo p. The first two cases are in a certain sense equally likely to occur as p runs through the primes, see Chebotarev density theorem.[1] The law of quadratic reciprocity implies that the splitting behaviour of a prime p in a quadratic field depends only on p modulo D, where D is the field discriminant. Quadratic subfields of cyclotomic fields[edit] The quadratic subfield of the prime cyclotomic field[edit] A classical example of the construction of a quadratic field is to take the unique quadratic field inside the cyclotomic field generated by a primitive p-th root of unity, with p a prime number > 2. The uniqueness is a consequence of Galois theory, there being a unique subgroup of index 2 in the Galois group over Q. As explained at Gaussian period, the discriminant of the quadratic field is p for p = 4n + 1 and −p for p = 4n + 3. This can also be predicted from enough ramification theory. In fact p is the only prime that ramifies in the cyclotomic field, so that p is the only prime that can divide the quadratic field discriminant. That rules out the 'other' discriminants −4p and 4p in the respective cases. Other cyclotomic fields[edit] If one takes the other cyclotomic fields, they have Galois groups with extra 2-torsion, and so contain at least three quadratic fields. In general a quadratic field of field discriminant D can be obtained as a subfield of a cyclotomic field of D-th roots of unity. This expresses the fact that the conductor of a quadratic field is the absolute value of its discriminant, a special case of the Führerdiskriminantenproduktformel. See also[edit] Notes[edit] 1. ^ Samuel, pp. 76–77 References[edit] External links[edit]
ESSENTIALAI-STEM
TY - JOUR A4 - Tran, Lam A4 - Quang, Dinh TI - Morphometric and meristic variability in Butis koilomatodon in estuarine and coastal areas of the Mekong Delta PY - 2020/12/31 Y2 - 2024/09/11 JF - Vietnam Journal of Agricultural Sciences JA - VJAS VL - 3 IS - 4 SE - ANIMAL SCIENCE – VETERINARY MEDICINE – AQUACULTURE DO - 10.31817/vjas.2020.3.4.04 UR - https://doi.org/10.31817/vjas.2020.3.4.04 SP - 806-816 AB - The study aimed to investigate morphometric and meristic variability in the mud sleeper Butis koilomatodon (Bleeker, 1849) in the Mekong Delta. This species is a commercial fish species with a small-size and is mainly distributed in some coastal areas from Tra Vinh to Ca Mau provinces. In the present research, the parameters of morphometry and measurement, including the head length, body depth, eye diameter, distance of the two eyes, and the interrelationships&nbsp;among the&nbsp;morphometric variables, were determined. The results revealed that the total length and weight of the fish changed by sex, season, habitat, and the interaction between the seasons and habitats. Likewise, the meristic criteria were different between males and females, and the dry and wet seasons, but not by their interactions. The growth rate of males was faster than females. The outcomes also showed that the body size of this species was larger in the dry season and the largest fish were found in Duyen Hai and Tra Vinh provinces. The Findings would be useful not only for further effects of environmental factors on morphology but also for comparisons between&nbsp; congeners Butis morphologically. ER -
ESSENTIALAI-STEM
0 I have a german / french blog. I installed the german WordPress version, so I already had de_DE.mo and de_DE.po in wp-content/languages. After I realized that the content of a comment's <time>-element wasn't translated, I googled and downloaded fr_FR.mo and fr_FR.po and put them in wp-content/languages. Now everything I tested works, except that 'at' doesn't get translated to 'à' ( I get: 3. février 2013 at 17:00). So I opened fr_FR.po to see whether there is a translation available. I found this: #. translators: 1: date, 2: time #: wp-includes/comment-template.php:1367 msgid "%1$s at %2$s" msgstr "%1$s à %2$s" Which seems alright to me. So to make sure, I replaced the existing mo file with this. Still it does not work. How do I make it translate 'at' to 'à'? I'm using WPML. 3 • How do you replaced the existing mo file? And why don't you use WPML's builtin string translation which is simpler than to dance with gettext? – Max Yudin Feb 3, 2013 at 19:05 • Because those strings don't appear within WPML. They should, I guess? I replaced it by overwriting the old file. – Mathias Feb 4, 2013 at 6:34 • I mean how do you created it. gettext or poEdit? And don't you make a muddle of .po and .mo? – Max Yudin Feb 4, 2013 at 7:51 1 Answer 1 1 No matter what languages your site are in, when using WPML you should never install a localised WordPress version, instead you should just install the default one (i.e. US English). Also make sure that you didn't change the LANG definition in your wp-config.php file, so that should read: define ('WPLANG', ''); Then you need to make sure that all the strings are in English (go to WPML->String Translation, scroll down to the bottom where you can set the language of the strings). After that rescan your theme for strings and you will be able to add translations for "at" in both German and French. Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Talk:Autokey cipher This article has no information on how the cypher was broken. &#9999; Sverdrup 02:28, 21 Nov 2004 (UTC) So if the message is incorporated in the key, why do you need to decode the cyphertext? You've already got the message. {Answer: The key+message is just a temporary copy used by the sender. The recipient doesn't have it, only the original key and the cyphertext.} {T}o answer your question: if you have cipher text that says WMPM MX XAF YHBRYOCA and you know the keyword of KILT, then you can decode the message as such: CIPHERTEXT:_WMPM MX XAF YHBRYOCA KEY:________KILT { Go across the top of the table to the key letter (K), search down to the cyphertext letter (W), then find the plain text letter at the left edge (M). After four iterations, you have: } PLAINTEXT:__MEET Now that some { = key length } of the plaintext is found, it is appended to the end of the key: CIPHERTEXT:_WMPM MX XAF YHBRYOCA KEY:________KILT ME ETA TTHEFOUN PLAINTEXT:__MEET AT THE FOUNTAIN so, the reciever of this message needs to have that original key, which a potential "eve" would not have. the reason to use this is that the methods to break the vignere cipher can't be applied beccause the key is as long as the message, so the length of the key can't be found by measuring the distance between repeated phrases. --Wakingrufus 19:38, 10 December 2005 (UTC) {edit by gatmo for additional detail - feel free to rephrase} "This text-autokey cipher was hailed as "le chiffre indéchiffrable", and was indeed undeciphered for over 200 years, until Charles Babbage discovered a means of breaking the cipher." isn't this what happened to the vigenere cipher? how was this cipher actually broken?--Wakingrufus 19:38, 10 December 2005 (UTC) I've added an example of cryptanalysis. Don't know exactly how Babbage first cracked Autokey but probably along the same lines. Frankd 12:21, 12 June 2006 (UTC) Frankd: Thanks. That example was very helpful in understanding the basic frame of mind a cryptanalyst has to be in to break a code. Self-synchronizing I am a little bit confused: is Vigenere autokey cipher self-synchronizing? --Necago 16:38, 9 June 2007 (UTC) * Yes, the Vigenere autokey cipher is a self-synchronizing stream cipher . How can we make this article less confusing? --DavidCary (talk) 15:32, 26 March 2016 (UTC) Why does the article say, "In modern cryptography, self-synchronizing stream ciphers are autokey ciphers."? Shouldn't it read, "In modern cryptography, autokey ciphers are self-synchronizing stream ciphers."? Also, in the Wikipedia article on stream ciphers, it states that self-synchronizing ciphers use several of the previous N ciphertext digits to compute the keystream. However, this article states that "An autokey cipher (also known as the autoclave cipher) is a cipher that incorporates the message (the plaintext) into the key." If an autokey cipher uses the plaintext and a self-synchronizing stream cipher uses the ciphertext, how can an autokey stream cipher be classified as a self-synchronizing steam cipher? Either the definition of self-synchronizing steam cipher needs to be changed to state that "self-synchronizing ciphers use several of the previous N ciphertext OR PLAINTEXT digits to compute the keystream" or the statement that autokey ciphers are self-synchronizing stream ciphers needs to be removed. The issue seems to be that self-synchronizing is both the name of a class of ciphers and also the description of a cipher property. Autokey ciphers have the property of being self-synchronizing (able to self-recover after getting out of sync) but don't fit the Wikipedia description of a self-synchronizing cipher because they use plaintext rather than ciphertext. Maybe the statement should read, "Like ciphertext autokey (CTAK) ciphers, autokey ciphers have the advantage that the receiver will automatically resynchronize with the key if digits are dropped or added to the message stream. * Whoops, my mistake. The discussion at "Why is Vigenère Autokey self-synchronizing?" has convinced me that the traditional Vigenere autokey cipher with an n-character primer key does not self-recover after getting out of sync -- an error during transmission changing one ciphertext character will propagate during decoding into every n-th following plaintext letter. An error inserting or deleting a character is even worse. So it is not a self-synchronizing cipher. Sorry, Necago! --DavidCary (talk) 23:17, 25 February 2021 (UTC) Brute-forcing the key For all you cryptanalysts out there, you should know that if you have computer, and your given just the ciphertext, you can brute force the key by attacking each key letter individually. So let's say I've been given a long autokey cipher. Given a keylength, or a number out of a list of keylengths to try, each letter of the key can be found by deciphering each letter of the cipher that that key decrypts. I can try the letter 'a', see how close the frequency analysis of the decrypted characters is to normal frequency analysis, try 'b', see if the frequency analysis is closer than 'a', and so on. For a computer, this takes a few seconds, and is easier than the cryptanalysis shown in the article. Hope this helps any future programmer, Jessemv (talk) 00:26, 24 November 2009 (UTC) * This is likely original research unless someone else has had this idea in the past, I think there is perhaps a more efficient and reliable solution to the method of brute forcing an Autokey Cipher. Instead of doing frequency analysis comparisons on the plaintext that a particular key character decrypts to, do the frequency analysis over all the characters that have been found using the detected key. For example, if I try for a key length of 3, and for the first character I run through A-Z and find that 'c' makes the best plaintext frequency analysis, I then repeat this to find the next character in the key, but using the 'c' character as well. Eventually I might find that 'ca' makes the best frequency analysis, and the final character 't' makes it even better. Key = 'cat' Jessemv (talk) 00:36, 25 November 2009 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 one external links on Autokey cipher. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20131202225102/http://asecuritysite.com/security/Coding/autokey?word=attackatdawn,queenly to http://asecuritysite.com/security/Coding/autokey?word=attackatdawn%2Cqueenly * Added archive https://web.archive.org/web/20131203104209/http://asecuritysite.com/security/Coding/autokey?word=meetatthefountain%2Ckilt to http://asecuritysite.com/security/Coding/autokey?word=meetatthefountain%2Ckilt Cheers.— InternetArchiveBot (Report bug) 05:49, 22 October 2016 (UTC) Example is wrong or misleading The article says that "A key-autokey cipher uses previous members of the keystream to determine the next element in the keystream" but from the example only the current byte of the autokey. Essentially it's a weak form of a book cypher where the key is (mostly) the plain text Am I misunderstanding?
WIKI
History of Kenya A part of Eastern Africa, the territory of what is known as Kenya has seen human habitation since the beginning of the Lower Paleolithic. The Bantu expansion from a West African centre of dispersal reached the area by the 1st millennium AD. With the borders of the modern state at the crossroads of the Bantu, Nilo-Saharan and Afro-Asiatic ethno-linguistic areas of Africa, Kenya is a multi-ethnic state. The Wanga Kingdom was formally established in the late 17th century. The Kingdom covered from the Jinja in Uganda to Naivasha in the East of Kenya. This is the first time the Wanga people and Luhya tribe were united and led by a centralized leader, a king, known as the Nabongo. The European and Arab presence in Mombasa dates back to the Early Modern period, but European exploration of the interior began in the 19th century. The British Empire established the East Africa Protectorate in 1895, from 1920 known as the Kenya Colony. During the wave of decolonisation in the 1960s, Kenya gained independence from the United Kingdom in 1963, had Elizabeth II as its first head of state, and Jomo Kenyatta as its Prime Minister. It became a republic in 1964, and was ruled as a de facto one-party state by the Kenya African National Union (KANU), led by Kenyatta from 1964 to 1978. Kenyatta was succeeded by Daniel arap Moi, who ruled until 2002. Moi attempted to transform the de facto one-party status of Kenya into a de jure status during the 1980s. However, with the end of the Cold War, the practices of political repression and torture that had been "overlooked" by the Western powers as necessary evils in the effort to contain communism were no longer tolerated in Kenya. Moi came under pressure, notably by US ambassador Smith Hempstone, to restore a multi-party system, which he did by 1991. Moi won elections in 1992 and 1997, which were overshadowed by politically motivated killings on both sides. During the 1990s, evidence of Moi's involvement in human rights abuses and corruption, such as the Goldenberg scandal, was uncovered. He was constitutionally barred from running in the 2002 election, which was won by Mwai Kibaki. Widely reported electoral fraud on Kibaki's side in the 2007 elections resulted in the 2007–2008 Kenyan crisis. Kibaki was succeeded by Uhuru Kenyatta in the 2013 general election. There were allegations that his rival Raila Odinga actually won the contest, however, the Supreme Court through a thorough review of evidence adduced found no malpractice during the conduct of the 2013 general election both from the IEBC and the Jubilee Party of Uhuru Kenyatta. Uhuru was re-elected in office five years later in 2017. His victory was however controversial. The supreme court had vitiated Uhuru win after Raila Odinga disputed the result through a constitutionally allowed supreme court petition. Raila Odinga would later boycott a repeat election ordered by the court, allowing Uhuru Kenyatta sail through almost unopposed with 98% of the vote. Paleolithic Fossils found in Kenya have shown that primates inhabited the area for more than 20 million years. In 1929, the first evidence of the presence of ancient early human ancestors in Kenya was discovered when Louis Leakey unearthed one million year old Acheulian handaxes at the Kariandusi Prehistoric Site in southwest Kenya. Subsequently, many species of early hominid have been discovered in Kenya. The oldest, found by Martin Pickford in the year 2000, is the six million year old Orrorin tugenensis, named after the Tugen Hills where it was unearthed. It is the second oldest fossil hominid in the world after Sahelanthropus tchadensis. In 1995 Meave Leakey named a new species of hominid Australopithecus anamensis following a series of fossil discoveries near Lake Turkana in 1965, 1987 and 1994. It is around 4.1 million years old. In 2011, 3.2 million year old stone tools were discovered at Lomekwi near Lake Turkana - these are the oldest stone tools found anywhere in the world and pre-date the emergence of Homo. One of the most famous and complete hominid skeletons ever discovered was the 1.6-million-year-old Homo erectus known as Nariokotome Boy, which was found by Kamoya Kimeu in 1984 on an excavation led by Richard Leakey. The oldest Acheulean tools ever discovered anywhere in the world are from West Turkana, and were dated in 2011 through the method of magnetostratigraphy to about 1.76 million years old. East Africa, including Kenya, is one of the earliest regions where modern humans (Homo sapiens) are believed to have lived. Evidence was found in 2018, dating to about 320,000 years ago, at the Kenyan site of Olorgesailie, of the early emergence of modern behaviors including: long-distance trade networks (involving goods such as obsidian), the use of pigments, and the possible making of projectile points. It is observed by the authors of three 2018 studies on the site, that the evidence of these behaviors is approximately contemporary to the earliest known Homo sapiens fossil remains from Africa (such as at Jebel Irhoud and Florisbad), and they suggest that complex and modern behaviors had already begun in Africa around the time of the emergence of Homo sapiens. Further evidence of modern behaviour was found in 2021 when evidence of Africa's earliest funeral was found. A 78,000 year old Middle Stone Age grave of a three-year-old child was discovered in Panga ya Saidi cave. Researchers said the child's head appeared to have been laid on a pillow. The body had been laid in a fetal position. Michael Petraglia, a professor of human evolution and prehistory at the Max Planck Institute said, “It is the oldest human burial in Africa. It tells us something about our cognition, our sociality and our behaviours and they are all very familiar to us today.” Neolithic The first inhabitants of present-day Kenya were hunter-gatherer groups, akin to the modern Khoisan speakers. The Kansyore culture, dating from the mid 5th millennium BCE to the 1st millennium BCE was one of East Africa's earliest ceramic producing group of hunter-gatherers. This culture was located at Gogo falls in Migori county near Lake Victoria. Kenya's rock art sites date between 2000BCE and 1000 CE. This tradition thrived at Mfangano Island, Chelelemuk hills, Namoratunga and Lewa Downs. The rock paintings are attributed to the Twa people, a hunter-gatherer group that was once widespread in East Africa. For the most part, these communities were assimilated into various food-producing societies that began moving into Kenya from the 3rd millennium BCE. Linguistic evidence points to a relative sequence of population movements into Kenya that begins with the entry into northern Kenya of a possibly Southern Cushitic speaking population around the 3rd millennium BCE. They were pastoralists who kept domestic stock, including cattle, sheep, goat, and donkeys. Remarkable megalithic sites from this time period include the possibly archaeoastronomical site Namoratunga on the west side of Lake Turkana. One of these megalithic sites, Lothagam North Pillar Site, is East Africa's earliest and largest monumental cemetery. At least 580 bodies are found in this well planned cemetery. By 1000 BCE and even earlier, pastoralism had spread into central Kenya and northern Tanzania. Eburran hunter gatherers, who had lived in the Ol Doinyo Eburru volcano complex near Lake Nakuru for thousands of years, start adopting livestock around this period. In present times the descendants of the Southern Cushitic speakers are located in north central Tanzania near Lake Eyasi. Their past distribution, as determined by the presence of loanwords in other languages, encompasses the known distribution of the Highland Savanna Pastoral Neolithic culture. Beginning around 700 BCE, Southern Nilotic speaking communities whose homelands lay somewhere near the common border between Sudan, Uganda, Kenya and Ethiopia moved south into the western highlands and Rift Valley region of Kenya. The arrival of the Southern Nilotes in Kenya occurred shortly before the introduction of iron to East Africa. The past distribution of the Southern Nilotic speakers, as inferred from place names, loan words and oral traditions includes the known distribution of Elmenteitan sites. Iron Age Evidence suggests that autochthonous Iron production developed in West Africa as early as 3000–2500BCE. The ancestors of Bantu speakers migrated in waves from west/central Africa to populate much of Eastern, Central and Southern Africa from the first millennium BC. They brought with them iron forging technology and novel farming techniques as they migrated and integrated with the societies they encountered. The Bantu expansion is thought to have reached western Kenya around 1000 BCE. The Urewe culture is one of Africa's oldest iron smelting centres. Dating from 550BCE to 650BCE, this culture dominated the Great Lakes region including Kenya. Sites in Kenya include Urewe, Yala and Uyoma in northern Nyanza. By the first century BC, Bantu speaking communities in the great lakes region developed iron forging techniques that enabled them to produce carbon steel. Later migrations through Tanzania led to settlement on the Kenyan coast. Archaeological findings have shown that by 100 BCE to 300 AD, Bantu speaking communities were present at the coastal areas of Misasa in Tanzania, Kwale in Kenya and Ras Hafun in Somalia. These communities also integrated and intermarried with the communities already present at the coast. Between 300 AD-1000 AD, through participation in the long existing Indian Ocean trade route, these communities established links with Arabian and Indian traders leading to the development of the Swahili culture. Historians estimate that in the 15th century, Southern Luo speakers started migrating into Western Kenya. The Luo descend from migrants closely related to other Nilotic Luo Peoples (especially the Acholi and Padhola people) who moved from South Sudan through Uganda into western Kenya in a slow and multi-generational manner between the 15th and 20th centuries. As they moved into Kenya and Tanzania, they underwent significant genetic and cultural admixture as they encountered other communities that were long established in the region. The walled settlement of Thimlich Ohinga is the largest and best preserved of 138 sites containing 521 stone structures that were built around the Lake Victoria region in Nyanza Province. Carbon dating and linguistic evidence suggest that the site is at least 550 years old. Archaeological and ethnographic analysis of the site taken with historical, linguistic and genetic evidence suggests that the populations that built, maintained and inhabited the site at various phases had significant ethnic admixture. Swahili culture and trade Swahili people inhabit the Swahili coast which is the coastal area of the Indian Ocean in Southeast Africa. It includes the coastal areas of Southern Somalia, Kenya, Tanzania and Northern Mozambique with numerous islands, cities and towns including Sofala, Kilwa, Zanzibar, Comoros, Mombasa, Gede, Malindi, Pate Island and Lamu. The Swahili coast was historically known as Azania in the Greco-Roman era and as Zanj or Zinj in Middle Eastern, Chinese and Indian literature from the 7th to the 14th century. The Periplus of the Erythrean Sea is a Graeco-Roman manuscript that was written in the first century AD. It describes the East African coast (Azania) and a long existing Indian Ocean Trade route. The East African Coast was long inhabited by hunter-gatherer and Cushitic groups since at least 3000BC. Evidence of indigenous pottery and agriculture dating as far back as this period has been found along the coast and offshore islands. International trade goods including Graeco-Roman pottery, Syrian glass vessels, Sassanian pottery from Persia and glass beads dating to 600BC have been found at the Rufiji River delta in Tanzania. Bantu Groups had migrated to the Great Lakes Region by 1000BCE. Some Bantu speakers continued to migrate further southeast towards the East African Coast. These Bantu speakers mixed with the local inhabitants they encountered at the coast. The earliest settlements in the Swahili coast to appear on the archaeological record are found at Kwale in Kenya, Misasa in Tanzania and Ras Hafun in Somalia. The Kenyan coast had hosted communities of ironworkers and communities of Eastern Bantu subsistence-farmers, hunters and fishers who supported the economy with agriculture, fishing, metal production and trade with outside areas. Between 300AD – 1000AD Azanian and Zanj settlements in the Swahili coast continued to expand with local industry and international trade flourishing. Between 500 and 800 A.D. they shifted to a sea-based trading economy and began to migrate south by ship. In the following centuries, trade in goods from the African interior, such as gold, ivory, and slaves stimulated the development of market towns such as Mogadishu, Shanga, Kilwa, and Mombasa. These communities formed the earliest city-states in the region which were collectively known to the Roman Empire as "Azania". By the 1st century CE, many of the settlements such as those in Mombasa, Malindi, and Zanzibar - began to establish trade relations with Arabs. This led ultimately to the increased economic growth of the Swahili, the introduction of Islam, Arabic influences on the Swahili Bantu language, and cultural diffusion. Islam rapidly spread across Africa between 614AD – 900AD. Starting with the first Hijrah (migration) of Prophet Muhammad's followers to Ethiopia, Islam spread across Eastern, Northern and Western Africa. The Swahili city-states became part of a larger trade network. Many historians long believed that Arab or Persian traders established the city-states, but archeological evidence has led scholars to recognize the city-states as an indigenous development which, though subjected to foreign influence due to trade, retained a Bantu cultural core. The Azanian and Zanj communities had a high degree of intercultural exchange and admixture. This fact is reflected in the language, culture and technology present at the coast. For instance, between 630AD - 890AD, Archaeological evidence indicates that crucible steel was manufactured at Galu, south of Mombasa. Metallurgical analysis of iron artefacts indicates that the techniques used by the inhabitants of the Swahili coast combined techniques used in other African sites as well as those in West and South Asian sites. The Swahili City States begin to emerge from pre-existing settlements between 1000AD and 1500AD. The earliest gravestone found at Gedi Ruins dates to the earlier part of this period. The oldest Swahili texts in existence also date to this period. They were written in old Swahili script (Swahili-Arabic alphabet) based on Arabic letters. This is the script found on the earliest gravestones. One of the most travelled people of the ancient world, Moroccan explorer Ibn Battuta, visited Mombasa on his way to Kilwa in 1331. He describes Mombasa as a large island with banana, lemon and citron trees. The local residents were Sunni Muslims who he described as “religious people, trustworthy and righteous.” He noted that their mosques were made of wood and were expertly built. Another ancient traveller, Chinese Admiral Zheng He visited Malindi in 1418. Some of his ships are reported to have sunk near Lamu Island. Recent genetic tests done on local inhabitants confirmed that some residents had Chinese ancestry. Swahili, a Bantu language with many Arabic loan words, developed as a lingua franca for trade between the different peoples. A Swahili culture developed in the towns, notably in Pate, Malindi, and Mombasa. The impact of Arabic and Persian traders and immigrants on the Swahili culture remains controversial. During the Middle Ages, the East African Swahili coast [including Zanzibar] was a wealthy and advanced region, which consisted of many autonomous merchant cities. Wealth flowed into the cities via the Africans' roles as intermediaries and facilitators of Indian, Persian, Arab, Indonesian, Malaysian, African and Chinese merchants. All of these peoples enriched the Swahili culture to some degree. The Swahili culture developed its own written language; the language incorporated elements from different civilisations, with Arabic as its strongest quality. Some Arab settlers were rich merchants who, because of their wealth, gained power—sometimes as rulers of coastal cities. Portuguese and Omani influences Portuguese explorers appeared on the East African coast at the end of the 15th century. The Portuguese did not intend to found settlements, but to establish naval bases that would give Portugal control over the Indian Ocean. After decades of small-scale conflict, Arabs from Oman defeated the Portuguese in Kenya. The Portuguese became the first Europeans to explore the region of current-day Kenya: Vasco da Gama visited Mombasa in April 1498. Da Gama's voyage successfully reached India (May 1498), and this initiated direct maritime Portuguese trade links with South Asia, thus challenging older trading networks over mixed land and sea routes, such as the spice-trade routes that utilised the Persian Gulf, Red Sea and caravans to reach the eastern Mediterranean. (The Republic of Venice had gained control over much of the trade between Europe and Asia. Especially after the Ottoman Turks captured Constantinople in 1453, Turkish control of the eastern Mediterranean inhibited the use of traditional land-routes between Europe and India. Portugal hoped to use the sea route pioneered by da Gama to bypass political, monopolistic and tariff barriers.) Portuguese rule in East Africa focused mainly on a coastal strip centred in Mombasa. The Portuguese presence in East Africa officially began after 1505, when a naval force under the command of Dom Francisco de Almeida conquered Kilwa, an island located in the south-east of present-day Tanzania. The Portuguese presence in East Africa served the purpose of controlling trade within the Indian Ocean and securing the sea routes linking Europe and Asia. Portuguese naval vessels disrupted the commerce of Portugal's enemies within the western Indian Ocean, and the Portuguese demanded high tariffs on items transported through the area, given their strategic control of ports and of shipping lanes. The construction of Fort Jesus in Mombasa in 1593 aimed to solidify Portuguese hegemony in the region. The Omani Arabs posed the most direct challenge to Portuguese influence in East Africa, besieging Portuguese fortresses. Omani forces captured Fort Jesus in 1698, only to lose it in a revolt (1728), but by 1730 the Omanis had expelled the remaining Portuguese from the coasts of present-day Kenya and Tanzania. By this time the Portuguese Empire had already lost interest in the spice-trade sea-route because of the decreasing profitability of that traffic. (Portuguese-ruled territories, ports and settlements remained active to the south, in Mozambique, until 1975.) Under Seyyid Said (ruled 1807–1856), the Omani sultan who moved his capital to Zanzibar in 1840, the Arabs set up long-distance trade-routes into the African interior. The dry reaches of the north were lightly inhabited by semi-nomadic pastoralists. In the south, pastoralists and cultivators bartered goods and competed for land as long-distance caravan routes linked them to the Kenyan coast on the east and to the kingdoms of Uganda on the west. Arab, Shirazi and coastal African cultures produced an Islamic Swahili people trading in a variety of up-country commodities, including slaves. 19th century history Omani Arab colonisation of the Kenyan and Tanzanian coasts brought the once independent city-states under closer foreign scrutiny and domination than was experienced during the Portuguese period. Like their predecessors, the Omani Arabs were primarily able only to control the coastal areas, not the interior. However, the creation of plantations, intensification of the slave trade and movement of the Omani capital to Zanzibar in 1839 by Seyyid Said had the effect of consolidating the Omani power in the region. The slave trade had begun to grow exponentially starting at the end of the 17th Century with a large slave market based at Zanzibar. When Sultan Seyyid Said moved his capital to Zanzibar, the already large clove and spice plantations continued to grow, driving demand for slaves. Slaves were sourced from the hinterland. Slave caravan routes into the interior of Kenya reached as far as the foothills of Mount Kenya, Lake Victoria and past Lake Baringo into Samburu country. Arab governance of all the major ports along the East African coast continued until British interests aimed particularly at securing their 'Indian Jewel' and creation of a system of trade among individuals began to put pressure on Omani rule. By the late 19th century, the slave trade on the open seas had been completely strangled by the British. The Omani Arabs had no interest in resisting the Royal Navy's efforts to enforce anti-slavery directives. As the Moresby Treaty demonstrated, whilst Oman sought sovereignty over its waters, Seyyid Said saw no reason to intervene in the slave trade, as the main customers for the slaves were Europeans. As Farquhar in a letter made note, only with the intervention of Said would the European Trade in slaves in the Western Indian Ocean be abolished. As the Omani presence continued in Zanzibar and Pemba until the 1964 revolution, but the official Omani Arab presence in Kenya was checked by German and British seizure of key ports and creation of crucial trade alliances with influential local leaders in the 1880s. Nevertheless, the Omani Arab legacy in East Africa is currently found through their numerous descendants found along the coast that can directly trace ancestry to Oman and are typically the wealthiest and most politically influential members of the Kenyan coastal community. The first Christian mission was founded on 25 August 1846, by Dr. Johann Ludwig Krapf, a German sponsored by the Church Missionary Society of England. He established a station among the Mijikenda at Rabai on the coast. He later translated the Bible into Swahili. Many freed slaves rescued by the British Navy are settled here. The peak of the slave plantation economy in East Africa was between 1875 – 1884. It is estimated that between 43,000 – 47,000 slaves were present on the Kenyan coast, which made up 44 percent of the local population. In 1874, Frere Town settlement in Mombasa was established. This was another settlement for freed slaves rescued by the British Navy. Despite pressure from the British to stop the East African slave trade, it continued to persist into the early 20th century. By 1850 European explorers had begun mapping the interior. Three developments encouraged European interest in East Africa in the first half of the 19th century. First, was the emergence of the island of Zanzibar, located off the east coast of Africa. Zanzibar became a base from which trade and exploration of the African mainland could be mounted. By 1840, to protect the interests of the various nationals doing business in Zanzibar, consul offices had been opened by the British, French, Germans and Americans. In 1859, the tonnage of foreign shipping calling at Zanzibar had reached 19,000 tons. By 1879, the tonnage of this shipping had reached 89,000 tons. The second development spurring European interest in Africa was the growing European demand for products of Africa including ivory and cloves. Thirdly, British interest in East Africa was first stimulated by their desire to abolish the slave trade. Later in the century, British interest in East Africa would be stimulated by German competition. East Africa Protectorate In 1895 the British government took over and claimed the interior as far west as Lake Naivasha; it set up the East Africa Protectorate. The border was extended to Uganda in 1902, and in 1920 the enlarged protectorate, except for the original coastal strip, which remained a protectorate, became a crown colony. With the beginning of colonial rule in 1895, the Rift Valley and the surrounding Highlands became reserved for whites. In the 1920s Indians objected to the reservation of the Highlands for Europeans, especially British war veterans. The whites engaged in large-scale coffee farming dependent on mostly Kikuyu labour. Bitterness grew between the Indians and the Europeans. This area's fertile land has always made it the site of migration and conflict. There were no significant mineral resources—none of the gold or diamonds that attracted so many to South Africa. Imperial Germany set up a protectorate over the Sultan of Zanzibar's coastal possessions in 1885, followed by the arrival of Sir William Mackinnon's British East Africa Company (BEAC) in 1888, after the company had received a royal charter and concessionary rights to the Kenya coast from the Sultan of Zanzibar for a 50-year period. Incipient imperial rivalry was forestalled when Germany handed its coastal holdings to Britain in 1890, in exchange for German control over the coast of Tanganyika. The colonial takeover met occasionally with some strong local resistance: Waiyaki Wa Hinga, a Kikuyu chief who ruled Dagoretti who had signed a treaty with Frederick Lugard of the BEAC, having been subject to considerable harassment, burnt down Lugard's fort in 1890. Waiyaki was abducted two years later by the British and killed. Following severe financial difficulties of the British East Africa Company, the British government on 1 July 1895 established direct rule through the East African Protectorate, subsequently opening (1902) the fertile highlands to white settlers. A key to the development of Kenya's interior was the construction, started in 1895, of a railway from Mombasa to Kisumu, on Lake Victoria, completed in 1901. This was to be the first piece of the Uganda Railway. The British government had decided, primarily for strategic reasons, to build a railway linking Mombasa with the British protectorate of Uganda. A major feat of engineering, the "Uganda railway" (that is the railway inside Kenya leading to Uganda) was completed in 1903 and was a decisive event in modernising the area. As governor of Kenya, Sir Percy Girouard was instrumental in initiating railway extension policy that led to construction of the Nairobi-Thika and Konza-Magadi railways. Some 32,000 workers were imported from British India to do the manual labour. Many stayed, as did most of the Indian traders and small businessmen who saw opportunity in the opening up of the interior of Kenya. Rapid economic development was seen as necessary to make the railway pay, and since the African population was accustomed to subsistence rather than export agriculture, the government decided to encourage European settlement in the fertile highlands, which had small African populations. The railway opened up the interior, not only to the European farmers, missionaries and administrators, but also to systematic government programmes to attack slavery, witchcraft, disease and famine. The Africans saw witchcraft as a powerful influence on their lives and frequently took violent action against suspected witches. To control this, the British colonial administration passed laws, beginning in 1909, which made the practice of witchcraft illegal. These laws gave the local population a legal, nonviolent way to stem the activities of witches. By the time the railway was built, military resistance by the African population to the original British takeover had petered out. However new grievances were being generated by the process of European settlement. Governor Percy Girouard is associated with the debacle of the Second Maasai Agreement of 1911, which led to their forceful removal from the fertile Laikipia plateau to semi-arid Ngong. To make way for the Europeans (largely Britons and whites from South Africa), the Maasai were restricted to the southern Loieta plains in 1913. The Kikuyu claimed some of the land reserved for Europeans and continued to feel that they had been deprived of their inheritance. In the initial stage of colonial rule, the administration relied on traditional communicators, usually chiefs. When colonial rule was established and efficiency was sought, partly because of settler pressure, newly educated younger men were associated with old chiefs in local Native Councils. In building the railway the British had to confront strong local opposition, especially from Koitalel Arap Samoei, a diviner and Nandi leader who prophesied that a black snake would tear through Nandi land spitting fire, which was seen later as the railway line. For ten years he fought against the builders of the railway line and train. The settlers were partly allowed in 1907 a voice in government through the legislative council, a European organisation to which some were appointed and others elected. But since most of the powers remained in the hands of the Governor, the settlers started lobbying to transform Kenya in a Crown Colony, which meant more powers for the settlers. They obtained this goal in 1920, making the Council more representative of European settlers; but Africans were excluded from direct political participation until 1944, when the first of them was admitted in the council. First World War Kenya became a military base for the British in the First World War (1914–1918), as efforts to subdue the German colony to the south were frustrated. At the outbreak of war in August 1914, the governors of British East Africa (as the Protectorate was generally known) and German East Africa agreed a truce in an attempt to keep the young colonies out of direct hostilities. However Lt Col Paul von Lettow-Vorbeck took command of the German military forces, determined to tie down as many British resources as possible. Completely cut off from Germany, von Lettow conducted an effective guerilla warfare campaign, living off the land, capturing British supplies, and remaining undefeated. He eventually surrendered in Zambia eleven days after the Armistice was signed in 1918. To chase von Lettow the British deployed Indian Army troops from India and then needed large numbers of porters to overcome the formidable logistics of transporting supplies far into the interior by foot. The Carrier Corps was formed and ultimately mobilised over 400,000 Africans, contributing to their long-term politicisation. Kenya Colony An early anti-colonial movement opposed to British rule known as Mumboism took root in South Nyanza in the early 20th century. Colonial authorities classified it as a millennialist cult. It has since been recognised as an anti-colonial movement. In 1913, Onyango Dunde of central Kavirondo proclaimed to have been sent by the serpent god of Lake Victoria, Mumbo to spread his teachings. The colonial government recognised this movement as a threat to their authority because of the Mumbo creed. Mumbo pledged to drive out the colonialists and their supporters and condemned their religion. Violent resistance against the British had proven to be futile as the Africans were outmatched technologically. This movement therefore focused on anticipating the end of colonialism, rather than actively inducing it. Mumboism spread amongst Luo people and Kisii people. The Colonial authorities suppressed the movement by deporting and imprisoning adherents in the 1920s and 1930s. It was officially banned in 1954 following the Mau Mau rebellion. The first stirrings of modern African political organisation in Kenya Colony sought to protest pro-settler policies, increased taxes on Africans and the despised kipande (Identifying metal band worn around the neck). Before the war, African political focus was diffuse. But after the war, problems caused by new taxes and reduced wages and new settlers threatening African land led to new movements. The experiences gained by Africans in the war coupled with the creation of the white-settler-dominated Kenya Crown Colony, gave rise to considerable political activity. Ishmael Ithongo called the first mass meeting in May 1921 to protest African wage reductions. Harry Thuku formed the Young Kikuyu Association (YKA) and started a publication called Tangazo which criticised the colonial administration and missions. The YKA gave a sense of nationalism to many Kikuyu and advocated civil disobedience. The YKA gave way to the Kikuyu Association (KA) which was the officially recognised tribal body with Harry Thuku as its secretary. Through the KA, Thuku advocated for African suffrage. Deeming it unwise to base a nationalist movement around one tribe, Thuku renamed his organisation the East African Association and strived for multi-ethnic membership by including the local Indian community and reaching out to other tribes. The colonial government accused Thuku of sedition, arrested him and detained him until 1930. In Kavirondo (later Nyanza province), a strike at a mission school, organised by Daudi Basudde, raised concerns about the damaging implications on African land ownership by switching from the East African Protectorate to the Kenyan Colony. A series of meetings dubbed ‘Piny Owacho’ (Voice of the People) culminated in a large mass meeting held in December 1921 advocating for individual title deeds, getting rid of the kipande system and a fairer tax system. Archdeacon W. E. Owen, an Anglican missionary and prominent advocate for African affairs, formalised and canalised this movement as the president of the Kavirondo Taxpayers Welfare Association. Bound by the same concerns, James Beauttah initiated an alliance between the Kikuyu and Luo communities. In the mid-1920s, the Kikuyu Central Association (KCA) was formed. Led by Joseph Keng’ethe and Jesse Kariuki, it picked up from Harry Thuku's East African Association except that it represented the Kikuyu almost exclusively. Johnstone Kenyatta was the secretary and editor of the associations’ publication Mugwithania (The unifier). The KCA focused on unifying the Kikuyu into one geographic polity, but its project was undermined by controversies over ritual tribute, land allocation and the ban on female circumcision. They also fought for the release of Harry Thuku from detention. Upon Thuku's release, he was elected president of the KCA. The government banned the KCA after World War II began when Jesse Kariuki compared the compulsory relocation of Kikuyus who lived near white owned land to Nazi policies on compulsory relocation of people. Most political activity between the wars was local, and this succeeded most among the Luo of Kenya, where progressive young leaders became senior chiefs. By the later 1930s government began to intrude on ordinary Africans through marketing controls, stricter educational supervision and land changes. Traditional chiefs became irrelevant and younger men became communicators by training in the missionary churches and civil service. Pressure on ordinary Kenyans by governments in a hurry to modernise in the 1930s to 1950s enabled the mass political parties to acquire support for "centrally" focused movements, but even these often relied on local communicators. During the early part of the 20th century, the interior central highlands were settled by British and other European farmers, who became wealthy farming coffee and tea. By the 1930s, approximately 15,000 white settlers lived in the area and gained a political voice because of their contribution to the market economy. The area was already home to over a million members of the Kikuyu tribe, most of whom had no land claims in European terms, and lived as itinerant farmers. To protect their interests, the settlers banned the growing of coffee, introduced a hut tax and the landless were granted less and less land in exchange for their labour. A massive exodus to the cities ensued as their ability to provide a living from the land dwindled. Representation Kenya became a focus of resettlement of young, upper class British officers after the war, giving a strong aristocratic tone to the white settlers. If they had £1,000 in assets they could get a free 1000 acre; the goal of the government was to speed up modernisation and economic growth. They set up coffee plantations, which required expensive machinery, a stable labour force, and four years to start growing crops. The veterans did escape democracy and taxation in Britain, but they failed in their efforts to gain control of the colony. The upper class bias in migration policy meant that whites would always be a small minority. Many of them left after independence. Power remained concentrated in the governor's hands; weak legislative and executive councils made up of official appointees were created in 1906. The European settlers were allowed to elect representatives to the Legislative Council in 1920, when the colony was established. The white settlers, 30,000 strong, sought "responsible government," in which they would have a voice. They opposed similar demands by the far more numerous Indian community. The European settlers gained representation for themselves and minimised representation on the Legislative Council for Indians and Arabs. The government appointed a European to represent African interests on the council. In the "Devonshire declaration" of 1923 the Colonial Office declared that the interests of the Africans (comprising over 95% of the population) must be paramount—achieving that goal took four decades. Historian Charles Mowat explained the issues: * [The Colonial Office in London ruled that] native interests should come first; but this proved difficult to apply [in Kenya] ... where some 10,000 white settlers, many of them ex-officers of the war, insisted that their interests came before those of the three million natives and 23,000 Indians in the colony, and demanded 'responsible government', provided that they alone bore the responsibility. After three years of bitter dispute, provoked not by the natives but by the Indians, vigorously backed by the Government of India, the Colonial Office gave judgment: the interest of the natives was 'paramount', and responsible government out of the question, but no drastic change was contemplated – thus in effect preserving the ascendancy of the settlers. Second World War In the Second World War (1939–1945) Kenya became an important British military base for successful campaigns against Italy in the Italian Somaliland and Ethiopia. The war brought money and an opportunity for military service for 98,000 men, called "askaris". The war stimulated African nationalism. After the war, African ex-servicemen sought to maintain the socioeconomic gains they had accrued through service in the King's African Rifles (KAR). Looking for middle class employment and social privileges, they challenged existing relationships within the colonial state. For the most part, veterans did not participate in national politics, believing that their aspirations could best be achieved within the confines of colonial society. The social and economic connotations of KAR service, combined with the massive wartime expansion of Kenyan defence forces, created a new class of modernised Africans with distinctive characteristics and interests. These socioeconomic perceptions proved powerful after the war. Rural trends British officials sought to modernise Kikuyu farming in the Murang'a District 1920–1945. Relying on concepts of trusteeship and scientific management, they imposed a number of changes in crop production and agrarian techniques, claiming to promote conservation and "betterment" of farming in the colonial tribal reserves. While criticised as backward by British officials and white settlers, African farming proved resilient and Kikuyu farmers engaged in widespread resistance to the colonial state's agrarian reforms. Modernisation was accelerated by the Second World War. Among the Luo the larger agricultural production unit was the patriarch's extended family, mainly divided into a special assignment team led by the patriarch, and the teams of his wives, who, together with their children, worked their own lots on a regular basis. This stage of development was no longer strictly traditional, but still largely self-sufficient with little contact with the broader market. Pressures of overpopulation and the prospects of cash crops, already in evidence by 1945, made this subsistence economic system increasingly obsolete and accelerated a movement to commercial agriculture and emigration to cities. The Limitation of Action Act in 1968 sought to modernise traditional land ownership and use; the act has produced unintended consequences, with new conflicts raised over land ownership and social status. As Kenya modernized after the war, the role of the British religious missions changed their roles, despite the efforts of the leadership of the Church Missionary Society to maintain the traditional religious focus. However the social and educational needs were increasingly obvious, and the threat of the Mau Mau uprisings pushed the missions to emphasize medical, humanitarian and especially educational programs. Fundraising efforts in Britain increasingly stressed the non-religious components. Furthermore, the imminent transfer of control to the local population became a high priority. Kenya African Union As a reaction to their exclusion from political representation, the Kikuyu people, the most subject to pressure by the settlers, founded in 1921 Kenya's first African political protest movement, the Young Kikuyu Association, led by Harry Thuku. After the Young Kikuyu Association was banned by the government, it was replaced by the Kikuyu Central Association in 1924. In 1944 Thuku founded and was the first chairman of the multi-tribal Kenya African Study Union (KASU), which in 1946 became the Kenya African Union (KAU). It was an African nationalist organization that demanded access to white-owned land. KAU acted as a constituency association for the first black member of Kenya's legislative council, Eliud Mathu, who had been nominated in 1944 by the governor after consulting élite African opinion. The KAU remained dominated by the Kikuyu ethnic group. However, the leadership of KAU was multitribal. Wycliff Awori was the first vice president followed by Tom Mbotela. In 1947 Jomo Kenyatta, former president of the moderate Kikuyu Central Association, became president of the more aggressive KAU to demand a greater political voice for Africans. In an effort to gain nationwide support of KAU, Jomo Kenyatta visited Kisumu in 1952. His effort to build up support for KAU in Nyanza inspired Oginga Odinga, the Ker (chief) of the Luo Union (an organisation that represented members of the Luo community in East Africa) to join KAU and delve into politics. In response to the rising pressures, the British Colonial Office broadened the membership of the Legislative Council and increased its role. By 1952 a multiracial pattern of quotas allowed for 14 European, 1 Arab, and 6 Asian elected members, together with an additional 6 Africans and 1 Arab member chosen by the governor. The council of ministers became the principal instrument of government in 1954. In 1952, Princess Elizabeth and her husband Prince Philip were on holiday at the Treetops Hotel in Kenya when her father, King George VI, died in his sleep. Elizabeth cut short her trip and returned home immediately to assume the throne. She was crowned Queen Elizabeth II at Westminster Abbey in 1953 and as British hunter and conservationist Jim Corbett (who accompanied the royal couple) put it, she went up a tree in Africa a princess and came down a queen. Mau-Mau Uprising A key watershed came from 1952 to 1956, during the Mau Mau Uprising, an armed local movement directed principally against the colonial government and the European settlers. It was the largest and most successful such movement in British Africa. Members of the forty group, World War II(WW2) veterans, including Stanley Mathenge, Bildad Kaggia and Fred Kubai became core leaders in the rebellion. Their experiences during the WW2 awakened their political consciousness, giving them determination and confidence to change the system. Key leaders of KAU known as the Kapenguria six were arrested on the 21st of October. They include Jomo Kenyatta, Paul Ngei, Kungu Karumba, Bildad Kaggia, Fred Kubai and Achieng Oneko. Kenyatta denied he was a leader of the Mau Mau but was convicted at trial and was sent to prison in 1953, gaining his freedom in 1961. An intense propaganda campaign by the colonial government effectively discouraged other Kenyan communities, settlers and the international community from sympathising with the movement by emphasising on real and perceived acts of barbarism perpetrated by the Mau Mau. Although a much smaller number of Europeans died compared to Africans during the uprising, each individual European loss of life was publicised in disturbing detail, emphasising elements of betrayal and bestiality. As a result, the protest was supported almost exclusively by the Kikuyu, despite issues of land rights and anti-European, anti-Western appeals designed to attract other groups. The Mau Mau movement was also a bitter internal struggle among the Kikuyu. Harry Thuku said in 1952, "To-day we, the Kikuyu, stand ashamed and looked upon as hopeless people in the eyes of other races and before the Government. Why? Because of the crimes perpetrated by Mau Mau and because the Kikuyu have made themselves Mau Mau." That said, other Kenyans directly or indirectly supported the movement. Notably, Pio Gama Pinto, a Kenyan of Goan descent, facilitated the provision of firearms to forest fighters. He was arrested in 1954 and detained until 1959. Another notable example was the pioneering lawyer Argwings Kodhek, the first East African to obtain a law degree. He became known as the Mau Mau lawyer as he would successfully defend Africans accused of Mau Mau crimes pro bono. 12,000 militants were killed during the suppression of the rebellion, and the British colonial authorities also implemented policies involving the incarceration of over 150,000 suspected Mau Mau members and sympathizers (mostly from the Kikuyu people) into concentration camps. In these camps, the colonial authorities also used various forms of torture to attempt information from the detainees. In 2011, after decades of waiting, thousands of secret documents from the British Foreign Office were declassified. They show that the Mau Mau rebels were systematically tortured and subjected to the most brutal practices, men were castrated and sand introduced into their anus, women were raped after introducing boiling water into their vaginas. The Foreign Office archives also reveal that this was not the initiative of soldiers or colonial administrators but a policy orchestrated from London. The Mau Mau uprising set in play a series of events that expedited the road to Kenya's Independence. A Royal Commission on Land and Population condemned the reservation of land on a racial basis. To support its military campaign of counter-insurgency the colonial government embarked on agrarian reforms that stripped white settlers of many of their former protections; for example, Africans were for the first time allowed to grow coffee, the major cash crop. Thuku was one of the first Kikuyu to win a coffee licence, and in 1959 he became the first African board member of the Kenya Planters Coffee Union. The East African Salaries Commission put forth a recommendation – 'equal pay for equal work' – that was immediately accepted. Racist policies in public places and hotels were eased. John David Drummond, 17th Earl of Perth and Minister of State for Colonial affairs stated: "The effort required to suppress Mau Mau destroyed any settlers illusions that they could go it alone; the British Government was not prepared for the shedding of [more] blood in order to preserve colonial rule." Trade Unionism and the struggle for independence The pioneers of the trade union movement were Makhan Singh, Fred Kubai and Bildad Kaggia. In 1935, Makhan Singh started the Labour trade union of Kenya. In the 1940s, Fred Kubai started the Transport and Allied Workers Union and Bildad Kaggia founded the Clerks and Commercial Workers Union. In 1949, Makhan Singh and Fred Kubai started the East Africa Trade Union Congress. They organised strikes including the railway workers strike in 1939 and the protest against granting of a Royal Charter to Nairobi in 1950. These pioneering trade union leaders were imprisoned during the crackdown on Mau Mau. Following this crackdown, all national African political activity was banned. This ban was in place even when the first African members of the legislative council (MLCs) were elected. To manage and control African political activity, the colonial government permitted district parties starting in 1955. This effectively prevented African unity by encouraging ethnic affiliation. Trade unions led by younger Africans filled the vacuum created by the crackdown as the only organisations that could mobilise the masses when political parties were banned. The Kenya Federation of Registered Trade Unions (KFRTU) was started by Aggrey Minya in 1952 but was largely ineffective. Tom Mboya was one of the young leaders who stepped into the limelight. His intelligence, discipline, oratory and organisational skills set him apart. After the colonial government declared a state of emergency on account of Mau Mau, at age 22, Mboya became the Director of Information of KAU. After KAU was banned, Mboya used the KFRTU to represent African political issues as its Secretary General at 26 years of age. The KFRTU was backed by the western leaning International Confederation of Free Trade Unions (ICFTU). Tom Mboya then started the Kenya Federation of Labour (KFL) in place of KFRTU, which quickly became the most active political body in Kenya, representing all the trade unions. Mboya's successes in trade unionism earned him respect and admiration. Mboya established international connections, particularly with labour leaders in the United States of America through the ICFTU. He used these connections and his international renown to counter moves by the colonial government. Several trade union leaders who were actively involved in the independence struggle through KFL would go on to join active politics becoming members of parliament and cabinet ministers. These include Arthur Aggrey Ochwada, Dennis Akumu, Clement Lubembe and Ochola Ogaye Mak'Anyengo. The trade union movement would later become a major battlefront in the proxy Cold War that would engulf Kenyan politics in the 1960s. Constitutional Debates and the Path to Independence After the suppression of the Mau Mau rising, the British provided for the election of the six African members to the Legislative Council (MLC) under a weighted franchise based on education. Mboya successfully stood for office in the first election for African MLCs in 1957, beating the previously nominated incumbent, Argwings Kodhek. Daniel Arap Moi was the only previously nominated African MLC who kept his seat. Oginga Odinga was also elected and shortly afterwards nominated as the first chairman of the African elected members. Mboya's party, the Nairobi People's Convention Party (NPCP), was inspired by Kwame Nkurumah's People's Convention Party. It became the most organised and effective political party in the country. The NPCP was used to effectively mobilise the masses in Nairobi in the struggle for greater African representation on the council. The new colonial constitution of 1958 increased African representation, but African nationalists began to demand a democratic franchise on the principle of "one man, one vote." However, Europeans and Asians, because of their minority position, feared the effects of universal suffrage. In June 1958, Oginga Odinga called for the release of Jomo Kenyatta. This call built momentum and was taken up by the NPCP. Agitation for African suffrage and self-rule picked up in pace. One major hindrance to self-rule was the lack of African human capital. Poor education, economic development and a lack of African technocrats were a real problem. This inspired Tom Mboya to begin a programme conceptualised by a close confidante Dr. Blasio Vincent Oriedo, funded by Americans, of sending talented youth to the United States for higher education. There was no university in Kenya at the time, but colonial officials opposed the programme anyway. The next year Senator John F. Kennedy helped fund the programme, hence its popular name – The Kennedy Airlift. This scholarship program trained some 70% of the top leaders of the new nation, including the first African woman to win the Nobel Peace Prize, environmentalist Wangari Maathai and Barack Obama's father, Barack Obama Sr. At a conference held in 1960 in London, agreement was reached between the African members and the British settlers of the New Kenya Group, led by Michael Blundell. However many whites rejected the New Kenya Group and condemned the London agreement, because it moved away from racial quotas and toward independence. Following the agreement a new African party, the Kenya African National Union (KANU), with the slogan "Uhuru," or "Freedom," was formed under the leadership of Kikuyu leader James S. Gichuru and labour leader Tom Mboya. KANU was formed in May 1960 when the Kenya African Union (KAU) merged with the Kenya Independence Movement (KIM) and Nairobi People's Convention Party (NPCP). Mboya was a major figure from 1951 until his death in 1969. He was praised as nonethnic or antitribal, and attacked as an instrument of Western capitalism. Mboya as General Secretary of the Kenya Federation of Labour and a leader in the Kenya African National Union before and after independence skilfully managed the tribal factor in Kenyan economic and political life to succeed as a Luo in a predominantly Kikuyu movement. A split in KANU produced the breakaway rival party, the Kenya African Democratic Union (KADU), led by Ronald Ngala and Masinde Muliro. In the elections of February 1961, KANU won 19 of the 33 African seats while KADU won 11 (twenty seats were reserved by quota for Europeans, Asians and Arabs). Kenyatta was finally released in August and became president of KANU in October. Independence In 1962, a KANU-KADU coalition government, including both Kenyatta and Ngala, was formed. The 1962 constitution established a bicameral legislature consisting of a 117-member House of Representatives and a 41-member Senate. The country was divided into 7 semi-autonomous regions, each with its own regional assembly. The quota principle of reserved seats for non-Africans was abandoned, and open elections were held in May 1963. KADU gained control of the assemblies in the Rift Valley, Coast and Western regions. KANU won majorities in the Senate and House of Representatives, and in the assemblies in the Central, Eastern and Nyanza regions. Kenya now achieved internal self-government with Jomo Kenyatta as its first president. The British and KANU agreed, over KADU protests, to constitutional changes in October 1963 strengthening the central government thus ensuring that Kenya would be a de facto single-party state. Kenya attained independence on 12 December 1963 as the Commonwealth realm of Kenya and was declared a republic on 12 December 1964 with Jomo Kenyatta as Head of State. In 1964 constitutional changes further centralised the government and various state organs were formed. One of the key state organs was the Central Bank of Kenya which was established in 1966. The British government bought out the white settlers and they mostly left Kenya. The Indian minority dominated retail business in the cities and most towns, but was deeply distrusted by the Africans. As a result, 120,000 of the 176,000 Indians kept their old British passports rather than become citizens of an independent Kenya; large numbers left Kenya, most of them headed to Britain. Kenyatta tenure (1963–1978) Once in power, Kenyatta swerved from radical nationalism to conservative bourgeois politics. The plantations formerly owned by white settlers were broken up and given to farmers, with the Kikuyu the favoured recipients, along with their allies the Embu and the Meru. By 1978, most of the country's wealth and power was in the hands of the organisation which grouped these three tribes: the Kikuyu-Embu-Meru Association (GEMA), together comprising 30% of the population. At the same time the Kikuyu, with Kenyatta's support, spread beyond their traditional territorial homelands and repossessed lands "stolen by the whites" – even when these had previously belonged to other groups. The other groups, a 70% majority, were outraged, setting up long-term ethnic animosities. The minority party, the Kenya African Democratic Union (KADU), representing a coalition of small tribes that had feared dominance by larger ones, dissolved itself voluntarily in 1964 and former members joined KANU. KANU was the only party 1964–66 when a faction broke away as the Kenya People's Union (KPU). It was led by Jaramogi Oginga Odinga, a former vice-president and Luo elder. KPU advocated a more "scientific" route to socialism—criticising the slow progress in land redistribution and employment opportunities—as well as a realignment of foreign policy in favour of the Soviet Union. On 25 February 1965, Pio Gama Pinto, a Kenyan of Goan descent and freedom fighter who was detained during the colonial period was assassinated in what is recognised as Kenya's first political assassination. He was also Oginga Odinga's chief tactician and link to the eastern bloc. His death dealt a severe blow to the Oginga Odinga's organisational efforts. The government used a variety of political and economic measures to harass the KPU and its prospective and actual members. KPU branches were unable to register, KPU meetings were prevented and civil servants and politicians suffered severe economic and political consequences for joining the KPU. A security Act was passed in Parliament in July 1966 and granted the government powers to carry out detention without trial, which was used against KPU members. In a series of dawn raids in August 1966, several KPU party members were arrested and detained without trial. They included Ochola Mak'Anyengo (the secretary general of the Kenya Petroleum Oil Workers Union), Oluande Koduol (Oginga Odinga's private secretary) and Peter Ooko (the general secretary of the East African Common Services Civil Servants Union). In June 1969, Tom Mboya, a Luo member of the government considered a potential successor to Kenyatta, was assassinated. Hostility between Kikuyu and Luo was heightened, and after riots broke out in Luo country the KPU was banned. The specific riots that led to the banning of the KPU resulted in the incident referred to as the Kisumu massacre. Kenya thereby became a one-party state under KANU. Ignoring his suppression of the opposition and continued factionalism within KANU the imposition of one-party rule allowed Mzee ("Old Man") Kenyatta, who had led the country since independence, to claim he had achieved "political stability." Underlying social tensions were evident, however. Kenya's very rapid population growth and considerable rural to urban migration were in larger part responsible for high unemployment and disorder in the cities. There also was much resentment by blacks at the privileged economic position held by Asians and Europeans in the country. At Kenyatta's death (22 August 1978), Vice-president Daniel arap Moi became interim President. On 14 October, Moi formally became president after he was elected head of KANU and designated its sole nominee. In June 1982, the National Assembly amended the constitution, making Kenya officially a one-party state. On 1 August members of the Kenyan Air Force launched an attempted coup, which was quickly suppressed by Loyalist forces led by the Army, the General Service Unit (GSU) – paramilitary wing of the police – and later the regular police, but not without civilian casualties. Foreign policies Independent Kenya, although officially non-aligned, adopted a pro-Western stance. Kenya worked unsuccessfully for East African union; the proposal to unite Kenya, Tanzania and Uganda did not win approval. However, the three nations did form a loose East African Community (EAC) in 1967, that maintained the customs union and some common services that they had shared under British rule. The EAC collapsed in 1977 and was officially dissolved in 1984. Kenya's relations with Somalia deteriorated over the problem of Somalis in the North Eastern Province who tried to secede and were supported by Somalia. In 1968, however, Kenya and Somalia agreed to restore normal relations, and the Somali rebellion effectively ended. Moi regime (1978–2002) Kenyatta died in 1978 and was succeeded by Daniel Arap Moi (b. 1924, d. 2020) who ruled as President 1978–2002. Moi, a member of the Kalenjin ethnic group, quickly consolidated his position and governed in an authoritarian and corrupt manner. By 1986, Moi had concentrated all the power – and most of its attendant economic benefits – into the hands of his Kalenjin tribe and of a handful of allies from minority groups. On 1 August 1982, lower-level air force personnel, led by Senior Private Grade-I Hezekiah Ochuka and backed by university students, attempted a coup d'état to oust Moi. The putsch was quickly suppressed by forces commanded by Army Commander Mahamoud Mohamed, a veteran Somali military official. In the coup's aftermath, some of Nairobi's poor Kenyans attacked and looted stores owned by Asians. Robert Ouko, the senior Luo in Moi's cabinet, was appointed to expose corruption at high levels, but was murdered a few months later. Moi's closest associate was implicated in Ouko's murder; Moi dismissed him but not before his remaining Luo support had evaporated. Germany recalled its ambassador to protest the "increasing brutality" of the regime and foreign donors pressed Moi to allow other parties, which was done in December 1991 through a constitutional amendment. On the heels of the Garissa massacre of 1980, Kenyan troops committed the Wagalla massacre in 1984 against thousands of civilians in the North Eastern Province. An official probe into the atrocities was later ordered in 2011. Multi-party politics After local and foreign pressure, in December 1991, parliament repealed the one-party section of the constitution. The first multiparty elections were held in 1992. The Forum for the Restoration of Democracy (FORD) emerged as the leading opposition to KANU, and dozens of leading KANU figures switched parties. But FORD, led by Oginga Odinga (1911–1994), a Luo, and Kenneth Matiba, a Kikuyu, split into two ethnically based factions. In the first open presidential elections in a quarter century, in December 1992, Moi won with 37% of the vote, Matiba received 26%, Mwai Kibaki (of the mostly Kikuyu Democratic Party) 19%, and Odinga 18%. In the Assembly, KANU won 97 of the 188 seats at stake. Moi's government in 1993 agreed to economic reforms long urged by the World Bank and the International Monetary Fund, which restored enough aid for Kenya to service its $7.5 billion foreign debt. Obstructing the press both before and after the 1992 elections, Moi continually maintained that multiparty politics would only promote tribal conflict. His own regime depended upon exploitation of inter-group hatreds. Under Moi, the apparatus of clientage and control was underpinned by the system of powerful provincial commissioners, each with a bureaucratic hierarchy based on chiefs (and their police) that was more powerful than the elected members of parliament. Elected local councils lost most of their power, and the provincial bosses were answerable only to the central government, which in turn was dominated by the president. The emergence of mass opposition in 1990–91 and demands for constitutional reform were met by rallies against pluralism. The regime leaned on the support of the Kalenjin and incited the Maasai against the Kikuyu. Government politicians denounced the Kikuyu as traitors, obstructed their registration as voters and threatened them with dispossession. In 1993 and after, mass evictions of Kikuyu took place, often with the direct involvement of army, police and game rangers. Armed clashes and many casualties, including deaths, resulted. Further liberalisation in November 1997 allowed the expansion of political parties from 11 to 26. President Moi won re-election as president in the December 1997 elections, and his KANU Party narrowly retained its parliamentary majority. Moi ruled using a strategic mixture of ethnic favouritism, state repression and marginalisation of opposition forces. He utilised detention and torture, looted public finances and appropriated land and other property. Moi sponsored irregular army units that attacked the Luo, Luhya and Kikuyu communities, and he denied his responsibility by attributing the violence to ethnic clashes arising from land dispute. Beginning in 1998, Moi engaged in a carefully calculated strategy to manage the presidential succession in his and his party's favour. Faced with the challenge of a new, multiethnic political coalition, Moi shifted the axis of the 2002 electoral contest from ethnicity to the politics of generational conflict. The strategy backfired, ripping his party wide open and resulting in the humiliating defeat of its candidate, Kenyatta's son, in the December 2002 general elections. 2002 elections Constitutionally barred from running in the December 2002 presidential elections, Moi unsuccessfully promoted Uhuru Kenyatta, the son of Kenya's first President, as his successor. A rainbow coalition of opposition parties routed the ruling KANU party, and its leader, Moi's former vice-president Mwai Kibaki, was elected president by a large majority. On 27 December 2002, by 62% the voters overwhelmingly elected members of the National Rainbow Coalition (NaRC) to parliament and NaRC candidate Mwai Kibaki (b. 1931) to the presidency. Voters rejected the Kenya African National Union's (KANU) presidential candidate, Uhuru Kenyatta, the handpicked candidate of outgoing president Moi. International and local observers reported the 2002 elections to be generally more fair and less violent than those of both 1992 and 1997. His strong showing allowed Kibaki to choose a cabinet, to seek international support and to balance power within the NaRC. Economic trends Kenya witnessed a spectacular economic recovery, helped by a favourable international environment. The annual rate of growth improved from −1.6% in 2002 to 2.6% by 2004, 3.4% in 2005, and 5.5% in 2007. However, social inequalities also increased; the economic benefits went disproportionately to the already well-off (especially to the Kikuyu); corruption reached new depths, matching some of the excesses of the Moi years. Social conditions deteriorated for ordinary Kenyans, who faced a growing wave of routine crime in urban areas; pitched battles between ethnic groups fighting for land; and a feud between the police and the Mungiki sect, which left over 120 people dead in May–November 2007 alone. 2007 elections and ethnic violence Once regarded as the world's "most optimistic," Kibaki's regime quickly lost much of its power because it became too closely linked with the discredited Moi forces. The continuity between Kibaki and Moi set the stage for the self-destruction of Kibaki's National Rainbow Coalition, which was dominated by Kikuyus. The western Luo and Kalenjin groups, demanding greater autonomy, backed Raila Amolo Odinga (1945– ) and his Orange Democratic Movement (ODM). In the December 2007 elections, Odinga, the candidate of the ODM, attacked the failures of the Kibaki regime. The ODM charged the Kikuyu with having grabbed everything and all the other tribes having lost; that Kibaki had betrayed his promises for change; that crime and violence were out of control, and that economic growth was not bringing any benefits to the ordinary citizen. In the December 2007 elections the ODM won majority seats in Parliament, but the presidential elections votes were marred by claims of rigging by both sides. It may never be clear who won the elections, but it was roughly 50:50 before the rigging started. "Majimboism" was a philosophy that emerged in the 1950s, meaning federalism or regionalism in Swahili, and it was intended to protect local rights, especially regarding land ownership. Today "majimboism" is code for certain areas of the country to be reserved for specific ethnic groups, fuelling the kind of ethnic cleansing that has swept the country since the election. Majimboism has always had a strong following in the Rift Valley, the epicenter of the recent violence, where many locals have long believed that their land was stolen by outsiders. The December 2007 election was in part a referendum on majimboism. It pitted today's majimboists, represented by Odinga, who campaigned for regionalism, against Kibaki, who stood for the status quo of a highly centralised government that has delivered considerable economic growth but has repeatedly displayed the problems of too much power concentrated in too few hands – corruption, aloofness, favouritism and its flip side, marginalisation. In the town of Londiani in the Rift Valley, Kikuyu traders settled decades ago. In February 2008, hundreds of Kalenjin raiders poured down from the nearby scruffy hills and burned a Kikuyu school. Three hundred thousand members of the Kikuyu community were displaced from Rift Valley province. Kikuyus quickly took revenge, organising into gangs armed with iron bars and table legs and hunting down Luos and Kalenjins in Kikuyu-dominated areas like Nakuru. "We are achieving our own perverse version of majimboism," wrote one of Kenya's leading columnists, Macharia Gaitho. The Luo population of the southwest had enjoyed an advantageous position during the late colonial and early independence periods of the 1950s, 1960s and early 1970s, particularly in terms of the prominence of its modern elite compared to those of other groups. However the Luo lost prominence due to the success of Kikuyu and related groups (Embu and Meru) in gaining and exercising political power during the Jomo Kenyatta era (1963–1978). While measurements of poverty and health by the early 2000s showed the Luo disadvantaged relative to other Kenyans, the growing presence of non-Luo in the professions reflected a dilution of Luo professionals due to the arrival of others rather than an absolute decline in the Luo numbers. Demographic trends Between 1980 and 2000 total fecundity in Kenya fell by about 40%, from some eight births per woman to around five. During the same period, fertility in Uganda declined by less than 10%. The difference was due primarily to greater contraceptive use in Kenya, though in Uganda there was also a reduction in pathological sterility. The Demographic and Health Surveys carried out every five years show that women in Kenya wanted fewer children than those in Uganda and that in Uganda there was also a greater unmet need for contraception. These differences may be attributed, in part at least, to the divergent paths of economic development followed by the two countries since independence and to the Kenya government's active promotion of family planning, which the Uganda government did not promote until 1995. Presidency of Uhuru Kenyatta (2013-2022) The 3rd President of Kenya Mwai Kibaki ruled since 2002 until 2013. After his tenure Kenya held its first general elections after the new constitution had been passed in 2010. Uhuru Kenyatta (son of the first president Jomo Kenyatta) won in a disputed election result, leading to a petition by the opposition leader, Raila Odinga. The supreme court upheld the election results and President Kenyatta began his term with William Ruto as the deputy president. Despite the outcome of this ruling, the Supreme Court and the head of the Supreme Court were seen as powerful institutions that could carry out their role of checking the powers of the president. In 2017, Uhuru Kenyatta won a second term in office in another disputed election. Following the defeat, Raila Odinga again petitioned the results in the Supreme Court, accusing the electoral commission of mismanagement of the elections and Uhuru Kenyatta and his party of rigging. The Supreme Court overturned the election results in what became a landmark ruling in Africa and one of the very few in the world in which the results of a presidential elections were annulled. This ruling solidified the position of the Supreme Court as an independent body. Consequently, Kenya had a second round of elections for the presidential position, in which Uhuru emerged the winner after Raila refused to participate, citing irregularities. The historical handshake in March 2018 between president Uhuru Kenyatta and his long-time opponent Raila Odinga meant reconciliation followed by economic growth and increased stability. Presidency of William Ruto (2022-) In August 2022, Deputy President William Ruto narrowly won the presidential election. He took 50.5% of the vote. His main rival, Raila Odinga, got 48.8% of the vote. According to the Afrobarometer survey 67.9% of Kenyan citizens participated in the last election( 2022) and 17.6% did not vote in the presidential election. On 13 September 2022, William Ruto was sworn in as Kenya's fifth president. History * Branch, Daniel, and Nicholas Cheeseman. "The politics of control in Kenya: Understanding the bureaucratic-executive state, 1952–78." Review of African Political Economy 33.107 (2006): 11-31. [Branch, Daniel, and Nicholas Cheeseman. "The politics of control in Kenya: Understanding the bureaucratic-executive state, 1952–78." Review of African Political Economy 33.107 (2006): 11-31. online] * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Compares Kenya, Uganda and Tanzania. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations. * Argues that the chiefs' tyranny in early colonial Kenya had its roots in the British administrative style since the Government needed strong-handed local leaders to enforce its unpopular laws and regulations.
WIKI
-- Samsung Says Speculation It Will Buy Nokia Is Groundless Samsung Electronics Co., the world’s largest mobile-phone maker, said market speculation that it is interested in acquiring competitor Nokia Oyj (NOK1V) is groundless. Samsung, based in Suwon, South Korea , made the comment today in an e-mailed statement. Shares of Espoo, Finland-based Nokia fell 0.7 percent to 2.35 euros at 11:27 a.m. Helsinki time, after jumping 6 percent on June 8 amid speculation Samsung is preparing an offer. Nokia, struggling to recover lost market share, has declined 46 percent in the past year as consumers snapped up Apple Inc. (AAPL) iPhones and Samsung smartphones running on Google Inc.’s Android software. Samsung overtook Nokia in the first quarter as the world’s largest handset maker, according to Gartner Inc. Samsung also denied it’s interested in Nokia a year ago, responding to reports that it was getting ready to make a bid. To contact the reporters on this story: Saeromi Shin in Seoul at sshin15@bloomberg.net To contact the editor responsible for this story: Kenneth Wong at kwong11@bloomberg.net
NEWS-MULTISOURCE
Drake Primary School and Little Pirates Child Care Martin Luther King, Jr. (January 15, 1929 – April 4, 1968) was an American pastor, activist, humanitarian, and leader in the African-American Civil Rights Movement. He is best known for improving civil rights by using nonviolent civil disobedience, based on his Christian beliefs. Because he was both a Ph.D. and a pastor, King is sometimes called The Reverend Doctor Martin Luther King Jr. (abbreviated the Rev. Dr. King), or just Dr. King. He is also known by his initials, MLK. King worked hard to make people understand that not only blacks but that all races should always be treated equally to white people. He gave speeches to encourage African Americans to protest without using violence. Led by Dr. King and others, many African Americans used nonviolent, peaceful strategies to fight for their civil rights. These strategies included sit-ins, boycotts, and protest marches. Often they were attacked by white police officers or people who did not want African Americans to have more rights. However, no matter how badly they were attacked, Dr. King and his followers never fought back. King also helped to organize the 1963 March on Washington, where he delivered his "I Have a Dream" speech. The next year, he won the Nobel Peace Prize. King fought for equal rights from the start of the Montgomery Bus Boycott in 1955 until he was murdered by James Earl Ray in April 1968.
FINEWEB-EDU
Wikipedia:Articles for deletion/Agilis Software The result of the debate was delete. Mailer Diablo 01:49, 15 May 2006 (UTC) Agilis Software Delete. Not particularly notable by WP:SOFTWARE or WP:CORP. Article was prod'ed; notice removed with no changes. discospinster 20:41, 9 May 2006 (UTC) * Delete - advertisement. - Richardcavell 23:11, 9 May 2006 (UTC) * Delete: spam --Chaser 02:34, 10 May 2006 (UTC) * Delete as advert. Stifle (talk) 15:10, 10 May 2006 (UTC)
WIKI
App server, Web server: What's the difference? How do Web and application servers fit into the enterprise? August 23, 2002 Q: What is the difference between an application server and a Web server? A: A Web server exclusively handles HTTP requests, whereas an application server serves business logic to application programs through any number of protocols. Let's examine each in more detail. The Web server A Web server handles the HTTP protocol. When the Web server receives an HTTP request, it responds with an HTTP response, such as sending back an HTML page. To process a request, a Web server may respond with a static HTML page or image, send a redirect, or delegate the dynamic response generation to some other program such as CGI scripts, JSPs (JavaServer Pages), servlets, ASPs (Active Server Pages), server-side JavaScripts, or some other server-side technology. Whatever their purpose, such server-side programs generate a response, most often in HTML, for viewing in a Web browser. Understand that a Web server's delegation model is fairly simple. When a request comes into the Web server, the Web server simply passes the request to the program best able to handle it. The Web server doesn't provide any functionality beyond simply providing an environment in which the server-side program can execute and pass back the generated responses. The server-side program usually provides for itself such functions as transaction processing, database connectivity, and messaging. While a Web server may not itself support transactions or database connection pooling, it may employ various strategies for fault tolerance and scalability such as load balancing, caching, and clustering—features oftentimes erroneously assigned as features reserved only for application servers. The application server As for the application server, according to our definition, an application server exposes business logic to client applications through various protocols, possibly including HTTP. While a Web server mainly deals with sending HTML for display in a Web browser, an application server provides access to business logic for use by client application programs. The application program can use this logic just as it would call a method on an object (or a function in the procedural world). Such application server clients can include GUIs (graphical user interface) running on a PC, a Web server, or even other application servers. The information traveling back and forth between an application server and its client is not restricted to simple display markup. Instead, the information is program logic. Since the logic takes the form of data and method calls and not static HTML, the client can employ the exposed business logic however it wants. In most cases, the server exposes this business logic through a component API, such as the EJB (Enterprise JavaBean) component model found on J2EE (Java 2 Platform, Enterprise Edition) application servers. Moreover, the application server manages its own resources. Such gate-keeping duties include security, transaction processing, resource pooling, and messaging. Like a Web server, an application server may also employ various scalability and fault-tolerance techniques. An example As an example, consider an online store that provides real-time pricing and availability information. Most likely, the site will provide a form with which you can choose a product. When you submit your query, the site performs a lookup and returns the results embedded within an HTML page. The site may implement this functionality in numerous ways. I'll show you one scenario that doesn't use an application server and another that does. Seeing how these scenarios differ will help you to see the application server's function. Scenario 1: Web server without an application server In the first scenario, a Web server alone provides the online store's functionality. The Web server takes your request, then passes it to a server-side program able to handle the request. The server-side program looks up the pricing information from a database or a flat file. Once retrieved, the server-side program uses the information to formulate the HTML response, then the Web server sends it back to your Web browser. To summarize, a Web server simply processes HTTP requests by responding with HTML pages. Scenario 2: Web server with an application server Scenario 2 resembles Scenario 1 in that the Web server still delegates the response generation to a script. However, you can now put the business logic for the pricing lookup onto an application server. With that change, instead of the script knowing how to look up the data and formulate a response, the script can simply call the application server's lookup service. The script can then use the service's result when the script generates its HTML response. In this scenario, the application server serves the business logic for looking up a product's pricing information. That functionality doesn't say anything about display or how the client must use the information. Instead, the client and application server send data back and forth. When a client calls the application server's lookup service, the service simply looks up the information and returns it to the client. By separating the pricing logic from the HTML response-generating code, the pricing logic becomes far more reusable between applications. A second client, such as a cash register, could also call the same service as a clerk checks out a customer. In contrast, in Scenario 1 the pricing lookup service is not reusable because the information is embedded within the HTML page. To summarize, in Scenario 2's model, the Web server handles HTTP requests by replying with an HTML page while the application server serves application logic by processing pricing and availability requests. Caveats Recently, XML Web services have blurred the line between application servers and Web servers. By passing an XML payload to a Web server, the Web server can now process the data and respond much as application servers have in the past. Additionally, most application servers also contain a Web server, meaning you can consider a Web server a subset of an application server. While application servers contain Web server functionality, developers rarely deploy application servers in that capacity. Instead, when needed, they often deploy standalone Web servers in tandem with application servers. Such a separation of functionality aids performance (simple Web requests won't impact application server performance), deployment configuration (dedicated Web servers, clustering, and so on), and allows for best-of-breed product selection. Tony Sintes is an independent consultant and founder of First Class Consulting, a consulting firm that specializes in bridging disparate enterprise systems and training. Outside of First Class Consulting, Tony is an active freelance writer, as well as author of Sams Teach Yourself Object-Oriented Programming in 21 Days (Sams, 2001; ISBN: 0672321092). Learn more about this topic Related:
ESSENTIALAI-STEM
Page:Popular Science Monthly Volume 90.djvu/194 Bottles, Bottles Everywhere, But Not A ���Photos Press Illus. mtv. ��The basis of bottle glass is a siliceous sand, limestone and either sulphate or carbonate of soda. The photograph above shows the new mixture together with broken bottles being thrown into the furnace. Here it melts and forms a thick syrupy liquid which is later molded into the form of bottles ��The photograph below shows another kind of raw material used for bottle-making — "cullet." It is a by-product of the glass furnaces and it is melted with the other raw materials. A combination of "cullet," sand, soda ash and lime gives a white glass with a very slight greenish tone ��aJIP ���At left: Placing the bottles in an oven for gradual cooling. After they have been formed in the mold the bottles cool quickly on the outside while they remain at a high temperature within. To produce a clear, strong bottle a twelve-hour cooling is necessary �� �
WIKI
Ellam Unakkaga Ellam Unakkaga is a 1961 Indian Tamil-language drama film directed by Adurthi Subba Rao from a story by Aatreya. The film stars Sivaji Ganesan and Savitri. It was released on 1 July 1961, and failed commercially. Plot Anandan and Venkatachalam are friends. Venkatachalam's daughter Sarala, following an accident, loses her ability to walk. A doctor informs Venkatachalam that he treated a similarly handicapped woman, who in the process of giving birth to a child, was cured and could walk again. Inspired, Venkatachalam marries off Sarala to Anandan, deciding that if Sarala is not cured within two years, the marriage will dissolve and Anandan can marry any other woman he wants. Anandan and Sarala live a happily married life. Sarala gives birth to a child, but is not cured of her handicap. However, Anandan refuses to abandon hope. The rest of the film revolves around what happens to the many problems of the characters. Production Ellam Unakkaga was directed by Adurthi Subba Rao from a story by Aatreya. The film was produced by Saravanabhava Unity Pictures, filmed by P. Ramasamy and edited by K. Govindasamy. Shooting took place at the Adyar-based Neptune Studios, later known as Sathya Studios. Soundtrack The music was composed by K. V. Mahadevan, assisted by Pugazhendi. Release and reception Ellam Unakkaga was released on 1 July 1961. Kanthan of Kalki said the film could be seen once for Savitri. According to historian Randor Guy, the film was not a commercial success as viewers could not accept seeing Ganesan and Savitri as lovers onscreen, the duo having acted as siblings in Pasamalar earlier that year.
WIKI
Draft:Igal Stulbach Igal Stulbach (Hebrew: יגאל שטולבך; born January 3, 1949) is an Israeli photographer, a visual artist and a documentary filmmaker. Early life Stulbach was born in Kraków, Poland in 1949, to parents who survived the Holocaust. His family immigrated to Israel in 1959, and since then, he has lived in Bat Yam. Stulbach was drafted in 1967 to the IDF, and served in the navy as an electronics equipment developer and instructor. Before starting his artistic activity, Stulbach was a businessman. Art career Stulbach created a documentary film called “Group portrait - Short Monologues by Second-Generation Holocaust Survivors”. It was broadcast on Israel's Channel 10 and was screened in several cinematheques across Israel. Stulbach is known for his nocturnal photographs. Stulbach’s visual art and photography has been displayed in various galleries and exhibitions in Israel and all around the world, and has been published in magazines both in print and online. Stulbach’s artistic practice is characterized by a continuous exploration of the boundaries between still and moving images, reflecting a futuristic view on the evolution of art towards digital mediums . Awards In 2022, Stulbach won a gold medal in the Tokyo International Foto Awards, for his work “Sitting”. In 2023 Stulbach won gold in the MUSE awards (Category: Architecture Photography - Urban Exploration). Also that year, Stulbach was Highly commended in the Siena International Photo Awards Festivals * 2016 - "Group portrait" - Korea International Expat Film Festival - Seoul * 2018 - "7102" - Video art section - Artrooms Roma * 2019 - "IL19" - AVIFF – Art Film Festival Cannes France * 2019 - Deus Ex Terra - Con Temporary Art Observatorium - Lavagana, Italy * 2020 - "Night movie" - Photo Is:rael - Tel Aviv. Israel * 2020 - "Sun loop" - Mister Vorky - Ruma, Serbia * 2021 - "Walk in Carmel market" - Fixion Fest - Chile Exhibitions * 2022 - Motion blur - Praxis photo center - Minneapolis, USA * 2023 - Urban - PH21 - Budapest, Hungary * 2023 - Cityscapes - Blank wall - Athens, Greece * 2023 - Still - Art fluent - Boston, USA * 2023 - Darkness falls - The Glasgow gallery of photography - UK * 2023 - Silence - PH21 - Budapest, Hungary * 2023 - Grayscale - Decode - Tucson, USA * 2023 - Night - Blank wall - Athens, Greece * 2023 - "IL19" - Creative photo awards - Siena, Italy * 2023 - Chroma - Artly Mix - Sao Paulo, Brazil * 2023 - Mimesis - LoosenArt - Rome, Italy * 2023 - Tell me a story - Colorado photographic arts center - Denver USA * 2023 - ChrismArt - Golden duck - Budapest, Hungary * 2023 - Contemporary Venice 13th edition - Itsliquid - Venice, Italy * 2024 - Green - Midwest Center for Photography - Wichita, USA * 2024 - Black & White – Independent & Image Art space – Chongqing, China Magazines * 2022 - "Tel Aviv night" - Dodho - Spain * 2022 - "Autumn nights" - The eye of photography - France * 2023 - The psychology of night - Lightreadings - Greece * 2023 - "Autumn nights" - Dodho - Spain * 2023 - Issue14 - Al-tiba9 - Spain * 2023 - Out of the box - Lens - Israel * 2022 - "Autumn nights" - Tagree - Germany * 2024 - Interview - Itsliquid - Italy * 2024 - Red line - ProgresFestival Magazine - Italy Awards * 2022 - "Sitting" - TIFA Tokyo foto awards - Gold * 2023 - "IL19" - Creative photo awards Siena - Highly commended * 2023 - "South Tel Aviv" - MUSE - Gold
WIKI
1926–27 Dundalk F.C. season Dundalk G.N.R. made their debut in the Free State League, the top tier of Irish football, in 1926–27. They had played the previous four seasons in the Leinster Senior League. The team was managed by Joe McCleery, previously of Belfast Celtic F.C., who used his connections to Northern Irish football to ensure a supply of players for the season ahead. Home matches were played at the Dundalk Athletic Grounds (a facility near the town centre shared by several sporting codes), but on weekends when the Athletic Grounds were unavailable, matches would usually move to the Carroll's Recreation Ground. Season summary On 15 June 1926 Dundalk G.N.R. were elected to the Free State League to replace Pioneers, as the nascent League looked to spread to the provinces. As it was entering its sixth season, nine clubs had already dropped out of the Free State League, so the challenge facing the new club was great. The cost of travel was one of the biggest issues facing provincial clubs in the League, and the club had sought support from its parent company, the Great Northern Railway (Ireland), with regard to travel expenses, but were refused. Three players were retained from the Leinster Senior League squad - Joey Quinn, Paddy McMahon and Hugh Craig. The season opened with the 18-match League schedule, and on 21 August 1926 the team travelled to Cork to face fellow works-team Fordsons in the opening match of the season. The 30-strong group of players, officials and supporters who travelled were treated to a tour of the Ford factory before the game. The result was a 2–1 defeat for the new boys in a match the Cork Examiner described as being "one of the best ever seen in Ballinlough", Joey Quinn with Dundalk's first ever Free State League goal. Their first win would come at home to Jacobs on 19 September. They only managed two points away from home, including one in the first ever league match in Glenmalure Park, and finished their first league season in eighth position. The nine-match League of Ireland Shield schedule commenced after Christmas, again with a visit to Cork to play Fordsons. The team managed two home wins and a draw, finishing seventh. Old Leinster Senior League rivals, Drumcondra, defeated them in a replay in the first round of the Leinster Senior Cup; while a heavy defeat to Bohemians saw them exit the FAI Cup in the first round, with the result that a number of players were released, including Quinn. A total of 47 players lined out for the team during the season, 11 of whom appeared only once, as manager McCleery tapped into his Northern Irish connections in his attempts to build a competitive side. Only two players would be retained for the following season - Gordon McDiarmuid (who had joined early in the Shield campaign) and Fred Norwood. First-Team Squad (1926–27) Source: Note: Only players making a minimum of five appearances included League Source: Shield Source: FAI Cup Source: * First Round Leinster Senior Cup Source: * First Round * First Round Replay
WIKI
Talk:Peloneustes Peer Review continued Sorry for being late on this; will continue my review here first, but maybe we should just move over to the Paleo Peer Review? * There is some image WP:SANDWICH going on; this could be solved by using the "multiple images" template; see example in the Paleobiology section of Lythronax. * Cool, I didn't know about that parameter, I've used it on the limb girdles. I still have 3 or 4 images I'd like to try and fit into the article, so that is a useful trick. I've also moved up the Leedsichthys image. Are there any other glaring cases of sandwiching? --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * (meaning "power-loving", possibly due to its large, powerful skull) – this is important information; I don't think it is ideal to just have it within brackets. Also, it is not clear if this refers to Plesiosaurus or philarchus. * pectoral girdle – "shoulder girdle" to avoid the technical term? * distal – I see that "lower" does not work here, but this should at least be linked. Thinking about it, you can avoid it and just say "other limb bones", since you mention humeri and femora, and all other limb bones are distal to those in any case. Or another possibility: "limb bones of the paddle"? * I've changed it to "other" on first mention and linked it when talking about phalanges. Technically the propodials are also "of the paddle". --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * but a worker named in Lingard – what is Lingard, a name? * Oops... removed "in". Yes, Lingard is a name. --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * In addition to these limb girdles – "the" limb girdles? * Changed. --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * Lydekker identified NHMUK R1253 – maybe "identified this specimen" for easier reading? The reader will not remember those numbers. * After studying this new specimen, in addition to others in the Leeds Collection, – maybe "after studying this and other specimens in the Leeds Collection"? Currently it does not read as fluently as it could. * However, Peloneustes gained wider acceptance, and has been used extensively in the literature since – bit repetitive. Maybe just "Peloneustes gained wider acceptance since"? * Among these was the holotype specimen of Peloneustes philarchus, CAMSM J.46913 – maybe add "which today is the holotype specimen of Peloneustes", to make clear that the genus did not yet exist when that specimen was excavated, as we are out of chronology here. * Harry Govier Seeley described the specimen as Plesiosaurus philarchus – Maybe it would be good here to properly introduce Plesiosaurus, making clear that it is a new species of an already existing genus. All these names that start with "P." can easily be confused; during the first read, I did not even notice it was saying "Plesiosaurus" instead of the expected "Peloneustes", and was confused later. * I tried to make it clearer that Plesiosaurus had already been named, is this sufficient or should I describe it in more detail? --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * encourage by John Phillips – "encouraged"? * continued gather fossils – "to gather"? * After studying this new specimen, in addition to others in the Leeds Collection – it would be ideal to introduce the Leeds collection first. * assembling the aforementioned Leeds Collection – see above, this reference ("aforementioned") is not ideal and is usually avoided in Wikipedia articles. Would it still flow if you just swap the second and third paragraph, and place Charles William Andrews somewhere else? * Jaccard – Jaccard was not introduced, do we know his full name? * Yep, his given name's Frédéric. Implemented. --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * In 1907, Jaccard published a description of two specimens in the Musée Paléontologique de Lausanne. – Also from the Oxford Clay? Maybe add "Switzerland" to make clear we are no longer in England? * Yep, this one's also from the Oxford Clay. Added the country for the museum. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * Since the specimen Lydekker described was in some need of restoration, and missing information was filled in with data from other specimens in his publication, Jaccard found it pertinent to publish photographs of the more complete specimen in Lausanne to better illustrate the anatomy of Peloneustes.[10] – I don't really get this; he did not publish a description but just the photographs? Why are the photographs so important? * I reworded this, Jaccard did describe the specimens (albeit cursorily). My French is a little rusty, but it seems like he found the photographs important for showing Peloneustes' anatomy and thereby allowing comparisons with previous restorations. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * The second volume described the anatomy of the Peloneustes specimens – exclusively those specimens, or among others? * Swapped the order to clarify this. --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * restored – Could it be that you use this word in a different sense than you did before? Here, you mean that missing parts are supplemented? * Yes. Rephrased, hopefully this is clearer. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * Tübingen and Stuttgart, I would add "Germany" here, maybe not everybody knows these towns. * Did the "continental" museums (Germany, Switzerland) bought the specimens from Leeds, or how did they got them? * Not sure for the Swiss ones (I can't seem to find a source in Jaccard's paper), I can't seem to find any information on this in Linder's description either, although the 2011 paper makes it sound like the specimens housed in Germany were also from the Leeds Collection. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * Only the rear part of the cranium was in good condition, while the mandible was mostly undamaged. – "and" instead of "while" * Changed to "but" - "and" feels a little clunky here. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * The specimen included a mandible – specimen does not exist anymore? You are a bit inconsistent with tense when referring to specimens. * Changed to "includes" in both instances. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * There was once a tendency to name pliosaurids based on isolated fragments, creating confusion. – A bit vague, when was "once"? Before Tarlo's study? * Changed to "Many pliosaurids species had been named based on isolated fragments, creating confusion.". --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * Inaccurate descriptions of the material and paleontologists ignoring each other's work only made this confusion worse. – Did Tarlo word it like this? Then better attribute to that author. * Since the previous anatomical studies, – this does not help; what is included in the "previous studies", the 2011 paper? * The 2011 paper specifies those of Andrews and Linder, so I have likewise specified them now. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * So far for now. Sorry for the long list, but I'm already nitpicking at FAC level. It reads very nicely, I particularly like the way how you introduce things, including the context the reader needs to know, and then guide the reader through the text. --Jens Lallensack (talk) 22:34, 27 January 2021 (UTC) * I've implemented some of the above reccomendations, I'll get to the rest later on. I'm glad you found this readable, at over 70,000 bytes, this is easily the largest solo project I've tackled (in terms of paragraphs, the first section is nearly as long as the entire Tatenectes article!), and the subject is pretty complex, so readability was a major concern (I actually rewrote most of the article after my first attempt, and the first part of history got rewritten twice!). FAC level comments are fine, as I intend to eventually bring the article to FA status. As for bringing it to PALEOPR, I'm currently undecided as to whether or not I should just bring it straight to GAN after this. I look forward to further feedback! --Slate Weasel ⟨T - C - S⟩ 23:35, 27 January 2021 (UTC) * I will try to finish reviewing quickly. You should certainly go straight to GAN after this review, but that does not mean you can't list it at PALEOPR! Listing it there can only give you more attention, and, when at GAN, we can advertise little bit in your reviewing section at PALEOPR so that it will hopefully be picked up quickly at GAN. --Jens Lallensack (talk) 22:52, 28 January 2021 (UTC) * I think that I've addressed all of the above comments so far, though I feel like I've missed one of them. I also re-ordered some additional stuff (since the core of the history section comes first but was written last, the location of some links and explanations is a little weird). Can an article get multiple reviews at the same time? Either way, I'll definitely be looking for feedback post-GAN, as I'm not really sure what to do afterwards but before FAC. --Slate Weasel ⟨T - C - S⟩ 20:27, 29 January 2021 (UTC) * Of course! You can keep it listed at WP:PALEOPR while at GAN (while leaving a note there), and again leave a note when you are preparing for FAC and are looking for more comments. Or you can list it after GAN is completed, depends on you! Btw, I am ready with the review of the rest of the article already but I am not at home at the moment, will post it as soon as possible. --Jens Lallensack (talk) 20:40, 29 January 2021 (UTC) * Another of the species described by Seeley in 1869 was Pliosaurus evansi, based on specimens in Cabinet III. – I would repeat the museum here to indicate what Cabinet III means. But why is the cabinet not given for the specimens mentioned earlier? Consider removing for consistency. * Clarified museum, removed cabinet. --Slate Weasel ⟨T - C - S⟩ 16:10, 31 January 2021 (UTC) * He considered the larger specimens distinct – specimens of what, of P. evansi? * P. evansi. Clarified. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * to intraspecific variation – Maybe "variation within species" and link that to intraspecific variation, for accessibility? * I glossed instead of replacing it, as the intraspecific variability article currently redirects to "genetic variability". --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * PIN 426 had heavily suffered from pyrite damage – probably requires some explanation! * Explained (even cited it in this case, just to be safe!) --Slate Weasel ⟨T - C - S⟩ 15:55, 31 January 2021 (UTC) * pliosaurid specimen from the Lower Jurassic of Germany – Why not give the formation as you do elsewhere? Posidonia Shale I think. * (forwards and outwards) are located on the posterior half of the skull. The – "and" missing * The premaxilla bears six teeth, and the diastemata (gaps between teeth) of the upper jaw of Peloneustes are narrow, characteristic features of this pliosaurid. – I think we need something like "narrow; these are characteristic features". * including the internal nares – maybe add little explanation, e.g. "the opening of the nasal passage into the mouth"? * making it an autapomorphy – You use different wordings for the same thing, e.g.,"diagnostic". I would stick with one, and link the first to the article apomorphy. * The other characteristics aren't sufficient to distinguish Peloneustes on their own though (it's the combination of them that's unique), though, whereas the ridge on the symphysis is unique to this genus. Am I misinterpreting what "diagnostic" means? --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * No, you are of course correct, and I was just confused. Never mind. --Jens Lallensack (talk) 20:03, 30 January 2021 (UTC) * mandibular glenoid (jaw joint) – not precisely; it is only part of the jaw joint, maybe "socket of the jaw joint"? * Strangely-shaped ribs – what does this mean? Wording sounds strange. * This is how Andrews described them. I can remove it if that's preferable. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * Maybe "unusual" is a better synonym. But here again: The paper is from 1913. Would a modern researcher, more than 100 years later, who saw MUCH more plesiosaur fossils that have been discovered since, still describe it as "unusual"? I have serious doubts here. If you keep it, you would need to attribute it to Andrews, 1913, I think. --Jens Lallensack (talk) 20:08, 30 January 2021 (UTC) * I just removed it. I don't think that the pliosaurid tails and rumps of the time were very well-known. --Slate Weasel ⟨T - C - S⟩ 16:33, 31 January 2021 (UTC) * After these vertebrae are the dorsal vertebrae, – I am not a native speaker, so feel free to ignore this comment, but would "following behind these vertebrae" be better? * Changed to "following" --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * The pectoral vertebrae bear articulations for their respective ribs – I'm a bit worried because this whole paragraph is based on a 1913 paper only. No problem for the basic description, but the functional implications (although they sound logical) could be outdated. Do you know any newer sources that repeates these implications, maybe for plesiosaurs in general, that can be cited in addition here? * Is this a functional interpretation? As far as I know, it's just what a pectoral is (that's what this seems to say). --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * What I mean: "This configuration would have stiffened the tail, possibly to support the large hind limbs." and "This morphology may have been present to support a small tail fin." --Jens Lallensack (talk) 20:02, 30 January 2021 (UTC) * Hmm, plesiosaur caudal fins have been discussed quite a bit in the literature, but no mentions of Peloneustes recently. I can't find anything about the supporting sacral ribs (although strong sacral ribs are apparently also present in Kronosaurus). I'm not sure what to do in this case, maybe these functional interpretations could be attributed to Andrews? --Slate Weasel ⟨T - C - S⟩ 16:33, 31 January 2021 (UTC) * Yes, with attribution and year directly in the text, this will not be an issue (something which I would do for alk other such speculation as well before going to FAC, as mentioned earlier). If you have a recent source on the caudal fins, I would maybe cite that in addition, even if it does not mention Peloneustes specifically. --Jens Lallensack (talk) 16:39, 31 January 2021 (UTC) * I cited the Rhomaleosaurus zetlandicus paper and attributed Andrews' claims to him. Interestingly, R. zetlandicus appears to have had enlarged chevrons beneath its caudal node, and proportionately larger chevrons more posteriorly into the tail (although I think that mentioning this in relation to Peloneustes is a bit off-topic, not to mention OR). I'll try to add attribution for the other speculations as well. --Slate Weasel ⟨T - C - S⟩ 17:52, 31 January 2021 (UTC) * The main joint between the scapula and coracoid forms the glenoid (shoulder joint) – Main joint, does this mean there is a second joint? Maybe, alternatively, "The shoulder joint is formed by both the scapula and the coracoid" * Well, in plesiosaurs, the ventral process of the scapula (that big, paddle-shaped part in Peloneustes) bears a prong on its posterior end, which sometimes articulates with the coracoid further medially (like in Muraenosaurus: ). It seems unclear whether or not this articulation is actually present in Peloneustes (the accompanying illustration in Andrews (1913) doesn't show it), so I've changed it to the suggested wording. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * Peleneustes – typo? * Oops! I suppose that's inevitable when one types "Peloneustes" over a hundred times... --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * The shape of the radii and tibiae is more like those of later pliosaurids than of Peloneustes' contemporaries – again, need to check if this could be outdated; if in doubt, maybe better remove. * Couldn't find anything solid on this, so I've removed it. 17:54, 31 January 2021 (UTC) * between Pliosaurus and earlier plesiosaurs, although he found it unlikely that the former was ancestral to the latter – Pliosaurus was ancestral to earlier plesiosaurs? * Peloneustes to Pliosaurus. Clarified. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * Plesiosaurs were well-adapted to marine life. Plesiosaurs grew at – Maybe use "they" at the second instance, so that not every sentence starts with "plesiosaurs". * The labyrinth – "bony labyrinth", and link? * Aha! For whatever reason I couldn't find an article on this structure to link. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * form to that of sea turtles. This shape – Always use the same term when you mean the same think. Mathematically speaking, form is shape + size, so these are not equivalent. * late Lower Callovian to the early Upper Callovian – Substages are not capitalized per convention as they are not formally defined (i.e., needs to be "late lower Callovian"). * However, Marmornectes lacks many adaptations seen in the other, more derived pliosaurids of the Oxford Clay. – This does not tell us anything; is there any difference to Peloneustes in the context of feeding? * Removed, that paragraph was already pretty monstrous in terms of size. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * living outside of the Oxford Clay Formation, – outside of the depositional area of the formation? * Yes, clarified. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * That's everything! I think the article is more than ready for GAN. --Jens Lallensack (talk) 10:23, 30 January 2021 (UTC) * Thanks for the new comments! I've addressed most of them, the remaining ones will all require some more digging in the literature to resolve. I'll get to them soon, either later today or sometime tomorrow. --Slate Weasel ⟨T - C - S⟩ 19:53, 30 January 2021 (UTC) * I think that I've addressed all of the above points (correct me if I'm wrong). I think that I'll refrain from posting this at PALEOPR until after GAN, just so that all the feedback's in one place. After adding the size comparison, life restoration, and skeletal reconstruction from Andrews (1913), I'll nominate it for GA, which should be within the week unless something goes terribly wrong. Oh, and I also realize that I probably should make the citations more consistent too before FA, as some are still Last, First M. instead of Last, F. M. --Slate Weasel ⟨T - C - S⟩ 21:40, 31 January 2021 (UTC) Dates and context in third sentence are inconsistent The third sentence: "It was originally described as a species of Plesiosaurus by palaeontologist Harry Govier Seeley in 1896, before being given its own genus by naturalist Richard Lydekker in 1889. Should the first date be 1869? -- motorfingers : Talk 01:34, 18 January 2023 (UTC) * I've fixed the date, thanks for pointing this out! --Slate Weasel &#91;Talk - Contribs&#93; 01:47, 18 January 2023 (UTC)
WIKI
Chondrosarcoma is the most common form of bone cancer in adults. Little is known of how low-grade chondrosarcoma, which is commonly curable by surgery, transforms to an aggressive high-grade disease which spreads to other parts of the body. As with other cancers, the cause and behaviour of chondrosarcoma is driven by changes in DNA (mutations and epigenetic changes). Researchers have found DNA changes that are common to specific cancer types e.g. colorectal, breast, prostate and skin cancer, revealing how normal cells transform into cancerous ones. This has led to the introduction of biomarkers in day-to-day clinical practice that can predict which patients are suitable for new treatments, therefore improving survival. These advances have been hampered in chondrosarcoma because of its rarity. This research project, related to the PEACE (Posthumous Evaluation of Advanced Cancer Environment) Study, was made possible through the very generous act of a chondrosarcoma patient who gifted their body for research. It has provided a unique opportunity to study the DNA changes that take place in chondrosarcoma, from the time of the first surgery and diagnosis, to the formation of multiple metastatic tumours that spread throughout the body. What were the aims of this research project? This study aimed to explore for the first time, how mutations in chondrosarcoma may change over time and how this relates to disease progression and dissemination throughout the body. The team have made very exciting observations that will be published in due course and have identified potential biomarkers that can be used to make earlier diagnosis of aggressive disease, therefore facilitating early intervention, and potential recruitment to clinical trials. How could this project improve treatment options for chondrosarcoma patients? Currently clinicians cannot provide reliable information about prognosis to chondrosarcoma patients. Knowledge of the genetic changes in chondrosarcoma and how they relate to disease progression should allow patients to receive more accurate information about how their disease is likely to behave. This knowledge could eventually allow more tailor-made treatment plans for patients, and those individuals whose tumours which carry genetic changes associated with aggressive behaviour, could benefit from earlier diagnosis and earlier surgical intervention. A greater knowledge of the genetic changes in chondrosarcoma could potentially also help to identify patients suitable for clinical trials. Sponsor Our Research Into Chondrosarcoma
ESSENTIALAI-STEM
Adrenal Gland: The Master of Hormones The adrenal gland, a small but mighty organ located on top of the kidneys, plays a crucial role in regulating various physiological processes in the body. In this article, we will explore the fascinating world of the adrenal gland, its structure, function, and the hormones it produces. Join us as we unravel the secrets of this remarkable gland and understand its significance in maintaining overall health and well-being. Introduction The adrenal gland is an essential part of the endocrine system, responsible for producing and releasing hormones that control numerous bodily functions. It consists of two distinct regions: the adrenal cortex and the adrenal medulla. Each region has its own unique set of functions and hormone production. Anatomy of the Adrenal Gland The adrenal gland is composed of two main parts: • 1. Adrenal Cortex: The outer layer of the adrenal gland is known as the adrenal cortex. It produces corticosteroid hormones, including cortisol, aldosterone, and sex hormones such as estrogen and testosterone. • 2. Adrenal Medulla: The inner portion of the adrenal gland is called the adrenal medulla. It is responsible for producing and releasing adrenaline (epinephrine) and noradrenaline (norepinephrine), hormones that play a vital role in the body’s response to stress. Functions of the Adrenal Gland The adrenal gland performs several critical functions in the body: • 1. Regulation of Stress Response: The adrenal gland plays a central role in the body’s response to stress. The adrenal medulla releases adrenaline and noradrenaline, which increase heart rate, blood pressure, and energy levels, preparing the body for a fight-or-flight response. • 2. Maintenance of Mineral Balance: The adrenal cortex produces aldosterone, a hormone that regulates the balance of minerals, particularly sodium and potassium, in the body. It helps maintain blood pressure, electrolyte balance, and fluid levels. • 3. Metabolism Regulation: Cortisol, another hormone produced by the adrenal cortex, plays a crucial role in regulating metabolism. It influences glucose metabolism, fat storage, and protein breakdown, ensuring a steady supply of energy for the body. • 4. Sex Hormone Production: The adrenal cortex also produces small amounts of sex hormones, including estrogen and testosterone. Although their production is relatively low compared to the gonads, they contribute to overall hormonal balance. Disorders of the Adrenal Gland Disruptions in adrenal gland function can lead to various disorders: • 1. Adrenal Insufficiency: Also known as Addison’s disease, adrenal insufficiency occurs when the adrenal cortex fails to produce sufficient hormones. Symptoms may include fatigue, weight loss, low blood pressure, and electrolyte imbalances. • 2. Cushing’s Syndrome: This condition results from excessive production of cortisol by the adrenal glands. It can cause weight gain, high blood pressure, muscle weakness, and changes in the appearance of the face and body. • 3. Adrenal Tumors: Tumors can develop in the adrenal gland, both benign and malignant. These tumors may disrupt hormone production and lead to various symptoms depending on the specific hormones affected. Maintaining Adrenal Health To maintain optimal adrenal health, it’s essential to adopt a healthy lifestyle: • Manage Stress: Chronic stress can impact adrenal gland function. Engage in stress-reducing activities such as exercise, meditation, and adequate sleep. • Balanced Diet: Consume a well-balanced diet rich in fruits, vegetables, whole grains, and lean proteins. Limit the intake of processed foods, sugar, and caffeine. • Adequate Sleep: Get enough sleep to support adrenal gland recovery and hormone regulation. • Regular Exercise: Engage in regular physical activity to help manage stress, support metabolism, and overall well-being. Conclusion The adrenal gland, with its intricate structure and hormone production, plays a vital role in maintaining the body’s overall health and functioning. From regulating stress response to mineral balance and metabolism, the adrenal gland’s influence is far-reaching. Understanding the significance of this master gland empowers us to take better care of our adrenal health and lead healthier, more balanced lives. FAQs (Frequently Asked Questions) • 1. Where are the adrenal glands located? – The adrenal glands are located on top of the kidneys. • 2. What hormones are produced by the adrenal cortex? – The adrenal cortex produces hormones such as cortisol, aldosterone, and small amounts of sex hormones. • 3. What is the function of the adrenal medulla? – The adrenal medulla produces and releases adrenaline and noradrenaline, which play a vital role in the body’s stress response. • 4. What is adrenal insufficiency? – Adrenal insufficiency, also known as Addison’s disease, occurs when the adrenal cortex fails to produce sufficient hormones. • 5. How can I maintain adrenal health? – Managing stress, eating a balanced diet, getting adequate sleep, and engaging in regular exercise can help maintain adrenal healthMeta description: The adrenal gland, located on top of the kidneys, is responsible for producing hormones that regulate various bodily functions. Explore the structure, function, and disorders of this remarkable gland and learn how to maintain optimal adrenal health.
ESSENTIALAI-STEM
user101289 user101289 - 4 months ago 32 Javascript Question vue.js conditional rendering in tables I have a table populate by vue where I want to show rows if there's data, or a row with "no results" if there's no data. Here's a basic look at it in jsfiddle: https://jsfiddle.net/ox0ozs5g/1/. Why does the v-else row continue to show even when the v-if condition is met? Answer Unfortunetelly v-if and v-for are not working together. You could move v-if one level higher, like this: <tbody v-if="my_tasks.length"> <tr id="retriever-task-{{ index }}" v-for="(index, task) in my_tasks" > <td>{{ task.id }}</td> <td>{{ task.type }}</td> <td>{{ task.frequency }}</td> <td>{{ task.status }}</td> <td><i v-on:click="deleteTask(index, task.id)" class="fa fa-trash"></i></td> </tr> </tbody> <tbody v-else> <tr> <td colspan="6">No tasks found.</td> </tr> </tbody> Comments
ESSENTIALAI-STEM
High-efficiency photovoltaic cells with wide optical band gap polymers based on fluorinated phenylene-alkoxybenzothiadiazole Seo Jin Ko, Quoc Viet Hoang, Chang Eun Song, Mohammad Afsar Uddin, Eunhee Lim, Song Yi Park, Byoung Hoon Lee, Seyeong Song, Sang Jin Moon, Sungu Hwang, Pierre Olivier Morin, Mario Leclerc, Gregory M. Su, Michael L. Chabinyc, Han Young Woo, Won Suk Shin, Jin Young Kim Research output: Contribution to journalArticlepeer-review 69 Scopus citations Abstract A series of semi-crystalline, wide band gap (WBG) photovoltaic polymers were synthesized with varying number and topology of fluorine substituents. To decrease intramolecular charge transfer and to modulate the resulting band gap of D-A type copolymers, electron-releasing alkoxy substituents were attached to electron-deficient benzothiadiazole (A) and electron-withdrawing fluorine atoms (0-4F) were substituted onto a 1,4-bis(thiophen-2-yl)benzene unit (D). Intra- and/or interchain noncovalent Coulombic interactions were also incorporated into the polymer backbone to promote planarity and crystalline intermolecular packing. The resulting optical band gap and the valence level were tuned to 1.93-2.15 eV and -5.37 to -5.67 eV, respectively, and strong interchain organization was observed by differential scanning calorimetry, high-resolution transmission electron microscopy and grazing incidence X-ray scattering measurements. The number of fluorine atoms and their position significantly influenced the photophysical, morphological and optoelectronic properties of bulk heterojunctions (BHJs) with these polymers. BHJ photovoltaic devices showed a high power conversion efficiency (PCE) of up to 9.8% with an open-circuit voltage of 0.94-1.03 V. To our knowledge, this PCE is one of the highest values for fullerene-based single BHJ devices with WBG polymers having a band gap of over 1.90 eV. A tandem solar cell was also demonstrated successfully to show a PCE of 10.3% by combining a diketopyrrolopyrrole-based low band gap polymer. Original languageEnglish Pages (from-to)1443-1455 Number of pages13 JournalEnergy and Environmental Science Volume10 Issue number6 DOIs StatePublished - Jun 2017 Fingerprint Dive into the research topics of 'High-efficiency photovoltaic cells with wide optical band gap polymers based on fluorinated phenylene-alkoxybenzothiadiazole'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
CLIC4 Chloride intracellular channel 4, also known as CLIC4,p644H1,HuH1, is a eukaryotic gene. Chloride channels are a diverse group of proteins that regulate fundamental cellular processes including stabilization of cell membrane potential, transepithelial transport, maintenance of intracellular pH, and regulation of cell volume. Chloride intracellular channel 4 (CLIC4) protein, encoded by the clic4 gene, is a member of the p64 family; the gene is expressed in many tissues. These channels are implicated in angiogenesis, pulmonary hypertension, cancer, and cardioprotection from ischemia-reperfusion injury. They exhibit an intracellular vesicular pattern in PANC-1 cells (pancreatic cancer cells). Binding partners CLIC4 binds to dynamin I, α-tubulin, β-actin, creatine kinase and two 14-3-3 isoforms.
WIKI
Page:Arizona State Legislature v. Arizona Independent Redistricting Comm’n.pdf/10 6 electorate share lawmaking power under Arizona’s system of government.” (internal quotation marks omitted)). The initiative, housed under the article of the Arizona Consti­tution concerning the “Legislative Department” and the section defining the State’s “legislative authority,” re­serves for the people “the power to propose laws and amendments to the constitution.” Art. IV, pt. 1, §1. The Arizona Constitution further states that “[a]ny law which may be enacted by the Legislature under this Constitution may be enacted by the people under the Initiative.” Art. XXII, §14. Accordingly, “[g]eneral references to the power of the ‘legislature’ ” in the Arizona Constitution “include the people’s right (specified in Article IV, part 1) to bypass their elected representatives and make laws directly through the initiative.” Leshy xxii. Proposition 106, vesting redistricting authority in the AIRC, was adopted by citizen initiative in 2000 against a “background of recurring redistricting turmoil” in Arizona. Cain, Redistricting Commissions: A Better Political Buffer? 121 Yale L. J. 1808, 1831 (2012). Redistricting plans adopted by the Arizona Legislature sparked controversy in every redistricting cycle since the 1970’s, and several of those plans were rejected by a federal court or refused preclearance by the Department of Justice under the Voting Rights Act of 1965. See id., at 1830–1832.
WIKI
Portal:Scouting/Selected anniversaries/October 31st * 1860 – Juliette Low, American founder of the Girl Scouts, is born. * 1936 – The Boy Scouts of the Philippines is founded.
WIKI
Page:Notes and Queries - Series 11 - Volume 11.djvu/153 11 B. XL FEB. 20, 1915.] NOTES AND QUERIES. 143 Smith (John) .. 1784-91 Smith (W. H.) & Son 1905 Stevens (Timothy) 1786-1803 Stevens (W.), Jun. 1814-16 Stevens & Watkins 1807-9 Turner (James) 1801-6 Turner (Joseph) 1735 " Walker (Hookey) ' 1865 Watkins (Philip) 1809-31 Wheeler (W. H.) 1870-75 White (William) 1838 Woods (Frederick W.) 1894 In concluding, I wish to point out diffi- culties I have had to contend with. Some of the places named on imprints have not yet been located ; for instance, no one knows the situation of Pye Corner. Then the in- completeness of my knowledge hinders me from linking up some of the businesses, and the lack of dates from completing others. Again, some men of the same name may be of a different family, and have been sepa- rated where they should be joined together. Take the case of the Stevenses there are three or four of the same name. Timothy Stevens, senior, died 3 April, 1744, aged 64. A Timothy Stevens died 27 April, 1774, aged 29. Timothy Stevens, senior, was parish clerk in 1776-1816, and Timothy Stevens, junior, also held that office 1816 to 1839. Then there was a W. Stevens, junior, and Stevens & Watkins. A volume of "Six | Sermons | on some of the | Most import- ant Doctrines | of Christianity : | To which are added | Five Sermons, | on occasional Subjects j By Rev. A.Freston, A.M. Rector of Edgeworth," was printed by P. Watkins for Cadell & Davies, Strand, London, and sold by Stevens & W^atkins, Cirencester, 1809. The Chavasse succession is not quite clear ; and whether James Turner was a connexion of Joseph Turner is not known. The Smiths, are a very old Cirencester family, and Henry" Smith was related to John, and both were connected with chemistry, while Henry Smith was brother of Dr. John Smith and Messrs. Daniel & Charles Smith, chemists. Whatever deficiency this paper may have, I hope it will form the basis for further research, and result in additions and corrections being made until the list reaches completeness. In conclusion, I wish to thank most heartily my friend MR. ROLAND AUSTIN for his kind help and enthusiasm in supporting my undertaking. He has supplied much information which otherwise would have escaped nay notice. HERBERT E. NORRIS. Cirencester, THE HUNAS OF ' WIDSITH.' " in Germauia pluribus nouerat (Ecgberctus)' esse nationes, a quibus Angli uel Saxones, qui nunc Brittaniam incolunt, genus et originem duxisse uoscuntur ; uncle hactenus a uicina gente Brettonum corrupte Garmani nuncupantur. Sunt autem Fresones, Rugini, Danai, Hunni, Antiqui Saxones, Boructuari ; sunt alii perplures hisdem in partibus populi paganis ad hue ritibus seruientes ad quos aenire prsefati Christi miles disposuit." Bedse 'H.E.,' V. ix. p. 296. MR. B. W. CHAMBERS does not quote the Venerable Bede with respect to the Hunni at any point of his thesis ; neither do any of the German scholars whose multitudinous works upon ' Widsith ' are cited by him : v. pp. 4463. One result of the ignorance of Bede shown by the critics is the absence of any misgivings about the correctness of their assumption that Widsith introduced the names of non-Germanic folks and their rulers into his Catalogue of Kings. Widsith's half-line " ^Etla weold Hunum " conse- quently appears to them to be as clear in meaning as one could possibly wish. So,, too, to others do the respective meanings of Hammersmith, Inkpen, Both's-child, pennywinkle, macaroon, &c. The course of assumption is this : Widsith admitted non- Germanic names of tribes into the third section of his poem ; therefore he admitted such in the second section. The only Huns the critics knew were Mongolian ; therefore Widsith's Huns also were Mongols. That being admitted, the ruler of the Hunas of ' Widsith ' can be no other than the ruler of the Mongolian Huns, viz., Attila. But when we know what Bede has to say about the Germanic tribes of his own time, and when we find that one of those tribes was .called Hunni, we become quite unable to. admit the truth of the proposition which is- taken for granted by the German school of critics of ' Widsith.' This note is intended to make three points quite clear : (1) the assumption that Widsith introduced the names of non- Germanic kings and tribes into his Catalogue is without foundation; (2) the Hunni of Bede were the Hunas of ' Widsith ' ; and (3) the Hunas were German Huns and not Mongolian, and ^Etla was not Attila in either name or person. The Venerable Bede teaches us that in his time (A.D. 731) there were tribes in Germany whose ancestors had taken part in the conquest of Britannia. The Fresones, Bugini, Danai, Hunni, Antiqui Saxones, are respectively the Fresenacynn, the Bugas, the Suf-Denas, the Hunas* and: the Gotas of:
WIKI