Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Polish Expedition to Kiev Polish Expedition to Kiev (Wyprawa kijowska) may refer to one of the following events: * Boleslaw I's intervention in the Kievan succession crisis, 1018, a Polish intervention into who would be ruler of Kiev and the state of Kievan Rus' * Kiev offensive (1920), an attempt by Poland, led by Józef Piłsudski, to seize central and eastern Ukraine from Soviet control
WIKI
As a rule, sources of contemporary air are places with plentiful vegetation – natural oases of unpolluted air. But how do you obtain the identical clean and contemporary indoor air within the rooms where your mother and father or youngsters reside? Where can you discover clear air? Fresh air is important for living things on Earth, as it’s involved in all vital processes. The apparent recommendations are aeration and clean residence maintenance. Also, make it a rule to embellish your own home with dwelling crops, secondly, do wet cleaning more usually, and thirdly, purchase an air air purifier and an ozonizer on your residence. Only these two units can help you actually cope with dust, gases, and other household air pollution in your apartment or house. For folks of absolutely any age, oxygen is the driving drive behind all processes in and around the human body. But there are categories of people who find themselves especially in dire want of a sufficient amount of unpolluted fresh air. These are youngsters, pregnant girls, and the . In the case of expectant mothers and infants, clean air is needed for correct metabolism, fast assimilation of nutritional vitamins and minerals, and, as a result, for the harmonious improvement of the fetus, the expansion of the kid, and the formation of immunity. Seniors want a clean environment like nobody else In older people, all processes in the physique slow down, some features of internal organs are misplaced. The aged undergo from chronic and age-related illnesses, while the load on the immune system increases. People of mature age need oxygen to increase the body’s resistance and regenerate aging cells. Unlike young moms, who regularly and often go exterior, have the opportunity to walk for hours in nearby parks or exit of town, it is virtually unimaginable for aged folks residing in massive cities to do this. As it’s commonly recognized, in old age, it’s bodily tough (and in circumstances of disability or problems with movement, it is utterly impossible) to go away the apartment on their own. Descending and ascending stairs or in an elevator, worry of dropping consciousness while shifting along the street, the inability to journey lengthy distances, make strolling within the fresh air for the elderly a dangerous journey, as an alternative of a pleasing wellness rest. The elderly often mention they’ve to stay indoors for weeks and restrict themselves only to airing the rooms using the window. However, exhaust gases, smoke from industrial production and family chemicals make the air flow hazardous. Due to the dearth of unpolluted air and motion in the fashionable world, individuals are growing older earlier than they did simply half a century ago. Fresh air and clear air are not the same For residents of enormous cities, the event is not straightforward – to go out for a stroll within the contemporary air, however to search out an ecologically clear corner of nature with an abundance of greenery for walks, removed from the roadway, factories, or cleansing constructions. And if it is still attainable to ensure the circulation of air within the room with the assistance of air flow or air-con, then breathing pure oxygen in urban high-rise buildings may be very problematic. What can we are saying about long walks within the fresh air for our aged or seriously ill relatives, for whom pure oxygen is vital? Clean air supplies a surge of power. Oxygen is important for all dwelling issues, regardless of age, to find a way to ensure the process of changing vitamins that enter the physique into power. It is very essential for the physique of the aged to produce energy at the cellular level in sufficient portions. Stimulation of the mind. Twenty % of all the air inhaled by a person is spent on guaranteeing the traditional functioning of the mind since oxygen is a essential issue for regular mind exercise. Clean air not solely improves psychological exercise but additionally improves the temper, memory, and common vitality of an elderly individual. Restoration and renewal of cells throughout the physique. Clean air helps to speed up metabolism; regenerate damaged cells; assimilate vitamins; rejuvenate tissues and decelerate the growing older processes. As you realize, for proper respiratory, an individual needs oxygen, and we exhale carbon dioxide, methane, aldehydes, ammonia, and so on. In addition, the air within the house is polluted by toxic gases that emit inside gadgets and finishing materials, mud, and so forth. If the condo is supplied with home windows that are not meant to open, then there is simply no place for fresh air to return from. Gradually, the focus of oxygen within the ambient air decreases, whereas the concentration of carbon dioxide and other substances dangerous to humans, on the contrary, will increase. If there isn’t any access to contemporary air, then we discover ourselves in the “atmospheric swamp”, we breathe “waste” air. Remember, as they say about stale food: “Someone has already eaten it.” The identical could be stated in regards to the air in a room with double-glazed home windows: “someone was already breathing it”. Of course, inhalation of such a dubious cocktail of dangerous gases negatively affects the well-being and well being of everybody who is compelled to breathe stale air on every day basis. Children particularly undergo from poor air quality, since their development, the formation of immunity, and, ultimately, health instantly is dependent upon the focus of oxygen within the air and on its purity. If you keep in an unventilated room for a really lengthy time, then blood circulation is disturbed, headache, dizziness, drowsiness, lethargy, fatigue, irritation appear. Ultimately, the constant inhalation of soiled, not recent air results in a lower in immunity, particularly in youngsters. Children typically start to get sick, continual ailments seem, for example, all kinds of allergic reactions. This is why it’s so important to frequently ventilate the room. Fresh air strengthens the immune system, ensures the healthy improvement of your baby, and retains you healthy. By airing the room accurately and in a timely manner, we enhance our well-being and improve our efficiency. Therefore, by providing your aged and young relatives with sufficient air high quality, you increase their probabilities of changing into a long-liver! So how do you correctly ventilate the premises? Your need for clean air every day is obvious. Regardless of the time of yr and climate circumstances. It is very important to ventilate the room when the child is sick and can’t go for a stroll. Various micro organism and infectious microbes accumulate in the air, which must be disposed of. Now, this can be carried out utilizing Air purifier for bacteria and viruses and an ozonizer. Through air flow is carried out each two hours for at least ten minutes. It is important to open all of the home windows wide open and create a draft once in a while. Make certain that the temperature in the room does not drop too much. The Ecoquest air air purifier technology unit will supply the required quantity of recent, clear air, having deprived it of mud and gaseous substances. How do I take away viruses and micro organism from the air? A way to complete this task is by getting an ozonizer. An ozone blaster is able to cleansing the air from unpleasant odors, dust mites, pollen, mold. It disinfects, deodorizes and kills viruses. It also removes mustiness. The bactericidal impact of ozonation is immense. Various medical services utilize this technique in their cleaning routines. Ozonation just isn’t only strictly about disinfection although. In addition, ozone is capable of increasing blood oxygen ranges. The tissues and mind work better if environment friendly oxygen levels are supplied to them. Why do babies and kids absolutely need contemporary clean air? When airing in the winter, the baby should be lined with a blanket, and his head should be wrapped in a scarf or a hat. Warm things can be removed from the kid only when the contemporary air warms up. The crib should not be close to a window or in a draft, because the child can be blown out, and he will get sick. Do not let your child out of sight whereas the window is open. Remove from the open window all furniture with which the kid can climb onto the windowsill. Of course, it’s fairly difficult to comply with these rules. Therefore, in case you have the chance to install a household ventilator in your apartment, you then and your baby will breathe fresh and clear air 24 hours a day with out a lot problem. The Ecoquest technology unit won’t solely provide the required amount of contemporary, oxygenated air but also clean it from odors, dust, harmful impurities, bacteria, and allergens. One of them could be making an attempt to safeguard the inside ambiance of your own house and nursery particularly by establishing an air air purifier. The machine with a quantity of filtering limitations eliminates the tracks of viruses, bacteria, odors, and mud in the air of your baby’s room, leaving the air crisp, clean, and pollutant-free. If you’re contemplating an air purifier and an ozonizer, but can not decide on a specific model, contact us, we’ll help you, we’ll advise you on any issue. Questions?
ESSENTIALAI-STEM
Anxiety Disorders By Ofer Zur, Ph.D.   It is difficult to estimate the prevalence of anxiety, but no one doubts that it is not only highly prevalent, but it is also on the increase. As so often happens in our field, whenever concern about a disorder increases, there is an increasing emphasis on pharmacological and behavioral treatments which target the most overt and distressing symptoms. Urgency about a disorder, however, is seldom a justification for not examining its complexity and for merely or exclusively treating its most overtly manifesting symptoms. A variety of psychodynamic and holistic techniques, including short-term psychodynamic treatments, massage, exercise, and having pets, have been shown to be effective. Psychotherapists with a thorough knowledge of anxiety’s etiology as well as several different tools, in addition to knowledge of medications and behavioral techniques, will be able to successfully treat a diverse clientele suffering from anxiety.   • A sizable majority of anxious people somaticize their anxiety and seek medical treatment rather than psychotherapy, which suggests a need to educate physicians and a significant new source for referrals. • Understanding that anxiety is one of the most common PTSD symptoms can inform practitioners’ choices of treatment. • By a 2:1 ratio, women suffer anxiety more than men. • Estimates of people who seek medical rather than psychological help for anxiety range from 30% to 70% of anxious people. • Worldwide, the lifetime prevalence estimates of anxiety among developed countries range from 13.6% to 28.8%. • Over half the college students in 2015 who visited college counseling centers were there for anxiety. • The existential or developmental roots of anxiety are often overlooked. • Rather than seeing anxiety as having either a genetic/biological basis or a psychosocial/attachment basis, growing consensus sees it as often a combination, which requires a more complex psychotherapeutic treatment.   Sign up for topical updates and invitations to participate with Dr. Zur
ESSENTIALAI-STEM
Public Official A charts Rod Blagojevich’s spectacular fall from grace Remember Rod Blagojevich? My memory of the former Illinois Governor is the coverage of his case from The Daily Show as Jon Stewart made a long-running gag of exaggerating his name. In 2008, Governor Blagojevich was arrested and charged with corruption after a long-running investigation, and was eventually impeached and removed from office. A new podcast from WBEZ Chicago, Public Official A, delves into the events that led to Blagojevich’s removal from office, and why his name has been in the news lately. In the introduction, journalist Dave McKinney describes the show as “this is our podcast about the bringing down of a charismatic and non-conformist politician by a federal investigation,” and if you aren’t up to speed on Illinois politics or can’t quite remember who Blagojevich is, the show is a deep dive into his rise to power that eventually brought brought him to the governor’s office in 2003 — and subsequent fall when authorities hauled him in after their investigation. If McKinney’s introduction sounds familiar, it’s because the series draws some parallels with another ongoing federal investigation — that of the Special Counsel investigation led by Robert Mueller into whether or not President Donald Trump colluded with Russia to get to the White House. Trump is also the reason why Blagojevich’s name has reentered the public conversation once again — he mentioned that he was considering a pardon for the former governor last May. The two also have a history — Blagojevich appeared on Trump’s TV show, The Apprentice. You can listen to Public Official A on WBEZ Chicago, Apple Podcasts, NPR, Pocket Casts, and Stitcher. McKinney told The Verge that he covered Blagojevich “from the beginning,” as a long-time statehouse reporter in Chicago. He had covered the politician a bit while he was a legislator, and more closely during his gubernatorial campaign and subsequent legal issues. He’s served about half of his 14-year prison sentence. Blagojevich’s name is back in the news, in part because his wife, Patti Blagojevich, has spent the better part of the last year has undertaken a media campaign to try and drum up support for her husband. She’s made appearances on Fox News and The Washington Examiner, hoping to build an awareness for the case, nearly a decade after he was sent to prison. That campaign mirrors the media blitz that Blagojevich went on before he went to trial — appearing on The Daily Show, but also Rachel Maddow, The Today Show, and the Late Night with David Letterman and Donald Trump’s The Apprentice, while Patti appeared on the reality show I’m a Celebrity…Get Me out of Here, which critics said was an attempt to say potential jurors in a case. Public Official A came about following Trump’s comments back in May aboard Air Force One, telling New York Times reporter Maggie Haberman that he felt his sentence was “really unfair.” McKinney says that he’s not a fan of 10-year retrospectives, but noted that Trump’s foray into the story has made it worth reexamining. “It caught everybody in Chicago a little bit off guard,” McKinney explained, “because after years and years of trying to get the court system to set aside the verdict and sentence, Patti Blagojevich found a new friend in President Trump. It was a story that had currency again.” And while he’s not a huge fan of retrospective shows, McKinney says that looking back does bring some new perspectives. McKinney noted that this story was well suited for a podcast, given the outlandish character of its subject, but also because it allowed them to speak with people directly involved in the story. A big component of the series is a series of interviews with Patti Blagojevich, who they interviewed at length for the series, while other figures involved with the investigation spoke about their work publicly for the first time. The show is also part of a growing trend of podcast shows, such as Slow Burn and Constitutional, which have cast historical events alongside the ongoing political drama. Public Official A draws some similar parallels, and McKinney muses that at one point, Blagojevich had been considered one of the Democratic Party’s rising stars. “It’s a cliché, there’s a whole Shakespearian element here,” McKinney said, noting that Blagojevich went from the Governor’s mansion to performing singing Elvis Presley songs with a Fabio lookalike for a block party. “What a spectacular fall from grace.”
NEWS-MULTISOURCE
Talk:Choral symphony Link from articles Be sure to add links from other articles, not to other articles. Articles should have appropriate places where they link to this current choral symphony article. I have taken a few minutes to add some links. — Andy W. (talk/contrb.) 22:16, 13 May 2008 (UTC) * Thanks. Have already done so with some and will continue to do so. Jonyungk (talk) 23:22, 13 May 2008 (UTC) What about Mendelssohn? I don't know the piece well enough to contribute authoritatively, but wouldn't Mendelssohn's second symphony preclude Mahler's eighth as one that uses chorus and soloists through much of the work? I'll grant that it doesn't use vocal forces the entire work as in the Mahler, but it's more than what Beethoven did in the nineth. PatrickWaters (talk) 21:32, 16 May 2008 (UTC) * Good question. I don't know the work well, either, so scanned the article and found it said the work consisted of three orchestral movements followed by nine vocal ones. This plus the description Mendelssohn gives of the work as "A Symphony-Cantata on Words of the Holy Bible, for Soloists, Chorus and Orchestra" would make me think he might be following the Beethovenian model, since the choral movement in the Beethoven Ninth would correspond to the "Cantata" (?) in the Mendelssohn Second. Anyone else, please feel free to participate. Jonyungk (talk) 00:07, 17 May 2008 (UTC) Clarification needed The phrase "...a departure from the Germanic tradition of the time..." is used in the last para of "Music and words as equals". I (and other readers) do not know what that tradition is - can this be rewritten so that it explains how Sea Symphony was a departure from whatever the German tradition is? hamiltonstone (talk) 11:56, 25 May 2009 (UTC) * I looked in the Cox article cited to find this phrase and could not find it, so I removed it. Thanks for pointing this out. Jonyungk (talk) 16:40, 25 May 2009 (UTC) More queries and suggestions * Currently, the last part of the section "Words determining symphonic form" states: * "More recently, Philip Glass based the philosophical and musical structure for his Seventh Symphony on the Wirrarika sacred trinity.[17] Writing about the work’s respective movement headings and their relation to the overall structure of the symphony, Glass says: 'The Corn' represents a direct link between Mother Earth and the well-being of human beings.... 'The Sacred Root' is found in the high deserts of north and central Mexico, and is understood to be the doorway to the world of the Spirit. 'The Blue Deer' is considered the holder of the Book of Knowledge. Any man or woman who aspires to be a 'Person of Knowledge' will, through arduous training and effort, have to encounter the Blue Deer....[17]" * Having read over this a couple of times, I don't see the link between Glass's explanation and the idea that the words determine symphonic form. Glass appears not to be discussing words, but a structural, philosophical concept. If anything, this is an example of a programmatic intention determining the compositional form. If that is true, it belongs as an example in a later section. Views? * I think you're right. I moved the Glass quote to that section. Jonyungk (talk) 03:04, 26 May 2009 (UTC) * The preceding para (beginning "In his review of Krzystof Penderecki's Seventh Symphony,...") seems to face almost the opposite problem: this appears to be an example very similar to the analysis of Adams' Harmonium. As such, it may be more appropriate to help illustrate "Musical treatment of text". I have to say, though, that I did not find Zychowicz's quote a model of clarity in helping expound the point being made in the WP article. I would be sympathetic to its omission, or to a simpler paraphrase of the point or points he is making. * It's omitted. Jonyungk (talk) 03:04, 26 May 2009 (UTC) * Under the heading "Symphonic versus programmatic", the sentence "More recent efforts have concentrated on expanding the number of movements while having sung texts throughout the work, paying less attention to symphonic form and more to programmic intent", without a reference would represent original research. Can someone find a citation that says that an increasingly programmatic intent is a feature of recent compositions? * Not sure how the following sentence is meant to support the contention of the "Symphonic versus programmatic" section: "Penderecki's Eighth Symphony, subtitled "Songs of Transience," follows a similar pattern to Rachmaninoff's The Bells in tracing "Mankind's journey through life, as reflected in the decay and rebirth of the natural world."[31] Completed and premiered in 12 brief movements in 2005, the symphony was revised, with three movements added, in 2008.[32]" The same is true of the last sentence in the section: "Mythodea, by Vangelis written initially in seven movements in 1993,[34] was expanded to 10 movements eight years later; the text, in Greek, was one of the composer's own devising.[35]". The thing they appear to have in common, is the addition of momvements at a later date. I wasn't sure how either of these was making a relevant point, even though there are hints of interesting insights here. Is it possible to tie this in more clearly, but without conducting original research? * They also have in common that they're not especially symphonic pieces. One is a song cycle and the other is ... whatever it is, but they're really symphonies in name only. Jonyungk (talk) 03:04, 26 May 2009 (UTC) * I think your changing the section title may have solved the problem nicely. Jonyungk (talk) 17:38, 26 May 2009 (UTC) * The following sentence need a citation: "Both the Faust and Dante symphonies were conceived as purely instrumental works and only later became choral symphonies." * Done. Jonyungk (talk) 17:38, 26 May 2009 (UTC) * A little further on: I have no idea what an "optimistic peroration" is, I'm afraid - can this be explained? * Changed this to "orchestral peoration." This was actually Shulstad's choice of words, so I may have to go through that section again to make sure all quote marks that should be there are in place. Jonyungk (talk) 17:38, 26 May 2009 (UTC) * I have tinkered with the Bantock section. I'd like to consider whether the following can be dropped altogether, since I think the material about Atalanta demonstrates the point, re a choral symphony being constructed out of voices alone, very well: * "Bantock wrote his other two choral symphonies for smaller forces and used those forces in a less experimental manner than in Atalanta. Even so, he still asks for a 12–part choir for Vanity, a seven–movement work which, again, lasts just over half an hour. Antcliffe calls Vanity "a retrograde step" in many respects from Atalanta. Nevertheless, McVeagh writes, "Much of the writing is broad and bold.... When he brings the whole chorus to a climax, in a sequence of crunching chords spread over the choir's full compass, the grand sweep is overwhelming.... Much of the music's effect comes from [a] contrast of line and mass, light and shade. Often the same phrase passes through the chorus, like a wave." Pageant is a smaller-scaled work than its two precedecessors and is written in eight movements. "In this parts are provided for Children's voices," Antcliffe writes, "but otherwise there is no experimentation with vocal timbre." " * Actually, decided to be bold - as I have been elsewhere - and take this out, keeping it pasted here for the record, in case anyone wants to put it back. * No problem. If anyone says anything about it in the future, at least the material is here. Jonyungk (talk) 17:38, 26 May 2009 (UTC) * Can I get some clarification on the standard for use of italics in the titles of works? I have done work on consistency, but i am not familiar with the conventions in this area. For example, all symphonic titles that are numbers, eg "Eighth Symphony" are not italicised, but in general sub-titles, such as Atalanta, are italicised. But what about Harris's (or Williamson's) "Symphony for Voices"? Is there a guide anyone can offer? hamiltonstone (talk) 06:21, 26 May 2009 (UTC) * Actually, Atalanta isn't a subtitle but the actual title of the work. I have un-italicized any subtitles or movement titles for consistency; "Symphony for Voices" is likewise unitalicized, as are all symphonic titles with numbers. Subtitles for these works are placed in quote marks. Jonyungk (talk) 17:38, 26 May 2009 (UTC) * "The direct antecedent for the choral symphony is Ludwig van Beethoven's Ninth Symphony. The Beethoven Ninth incorporates part of the Ode an die Freude ("Ode to Joy"), a poem by Friedrich Schiller, with text sung by soloists and a chorus in the last movement. It is the first example of a major composer using the human voice on the same level with instruments in a symphony." Unclear. Are there or aren't there any earlier examples by minor composers? Or is this unknown? Neither this article nor the linked list says anything further I can see. Peter jackson (talk) 11:05, 24 June 2009 (UTC) * This point has been addressed in a note appended to the section you quoted, citing the New Grove. Jonyungk (talk) 20:46, 24 June 2009 (UTC) * Good, & thanks for letting me know on my talk page, though it wasn't necessary, as I'd have looked back here (I use my contriburions log as a sort of short-term watchlist). Peter jackson (talk) 08:43, 25 June 2009 (UTC) coining an English term According to the article, The term "choral symphony" in this context was coined by Hector Berlioz... Since Berlioz was French, and wrote in French, this statement is highly unlikely. What (French) term did Berlioz actually use, and when was this term first brought into English as "choral symphony"? --EncycloPetey (talk) 17:01, 19 June 2010 (UTC) * Good question. Berlioz's original French term (translated by Holoman in the cited source as "choral symphony") is "Symphonie avec Choeurs" (the original French text from 1838 is easily found on the internet). When exactly the English term first came into use is more difficult (the OED and New Grove are no help at all in this regard), as is the question of whether the English actually derives from Berlioz. At the moment, we have only Holoman's word for it. He is certainly a very respectable authority and should be good enough for the purposes of this article, though no scholar is infallible.—Jerome Kohl (talk) 21:17, 19 June 2010 (UTC) * The French translates as "symphony with chorus", which does not indicate that Berlioz considered this anything but a symphony with a chorus. Of more interest in the source page you linked is the passage: * Enfin, après une assez longue indécision, je m’arrêtai à l’idée d’une symphonie avec chœurs, solos de chant et récitatif choral, dont le drame de Shakespeare, Roméo et Juliette, serait le sujet sublime et toujours nouveau. J’écrivis en prose tout le texte destiné au chant entre les morceaux de musique instrumentale; Émile Deschamps, avec sa charmante obligeance ordinaire et sa facilité extraordinaire, le mit en vers, et je commençai. * Which is not from the original preface but from Extraits des Mémoires. There, it sounds as if he considers this something new. --EncycloPetey (talk) 23:39, 19 June 2010 (UTC) * In Holoman's version, the phrase indeed "translates as" "choral symphony", which of course proves nothing. I do not particularly care to argue about whether a "choral symphony" is different from or the same as a "symphony with chorus". I do agree with you that the assertion that Berlioz's preface is the direct source of the phrase in English is at least suspect, but Holoman appears to say that it is. Let us continue searching for evidence that proves him wrong.—Jerome Kohl (talk) 04:33, 20 June 2010 (UTC) More pedagogical first picture I think it would be nice if the picture in the top right spot more immediatley illustrated what the article is about. The main idea is an orchestra and a choir performing together. --Ettrig (talk) 12:23, 1 January 2012 (UTC) Reger Reger's Der 100. Psalm, a setting of Psalm 100 in four movements which follow classical models (second slow, third Scherzo), has been called a choral symphony, but I would not now how to integrate it best. --Gerda Arendt (talk) 06:50, 10 May 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 external links on Choral symphony. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20070930030119/http://www.kennedy-center.org/calendar/index.cfm?fuseaction=composition&composition_id=2851 to http://www.kennedy-center.org/calendar/index.cfm?fuseaction=composition&composition_id=2851 * Added archive https://web.archive.org/web/20070930030119/http://www.kennedy-center.org/calendar/index.cfm?fuseaction=composition&composition_id=2851 to http://www.kennedy-center.org/calendar/index.cfm?fuseaction=composition&composition_id=2851 Cheers.— InternetArchiveBot (Report bug) 02:11, 20 May 2017 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 external links on Choral symphony. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20070611120123/http://www.philipglass.com/music/recordings/symphony_5.php to http://www.philipglass.com/music/recordings/symphony_5.php * Added archive https://web.archive.org/web/20070611120123/http://www.philipglass.com/music/recordings/symphony_5.php to http://www.philipglass.com/music/recordings/symphony_5.php Cheers.— InternetArchiveBot (Report bug) 06:23, 24 September 2017 (UTC) Removed link to ledorgroup in the music and words as equals section Hello fellow Wikipedians - I have removed a reference link to the ledorgroup.com since it has been identified as a possible source of spam. (see the reference for Robert Strassburg in the article -in the section music and words as equals section). I apologize for referencing such a poor quality site and hope that this corrects the problem. Thanks for your consideration.<IP_ADDRESS> (talk) 23:57, 18 June 2018 (UTC)PS
WIKI
Glasgow Perthshire Charitable Society Glasgow Perthshire Charitable Society is a charity registered in Scotland. The Society The Glasgow Perthshire Charitable Society was founded in 1835, and is one of the oldest charities in Scotland still in existence. Today it is generally referred to as "The Glasgow Perthshire". The Society is based in Glasgow, though its directors and members reside in various parts of Scotland. Charity Registration The Society is registered with the Office of the Scottish Charity Regulator (OSCR) with Registered Charity No. SC009576. The Society's entry on the OSCR web site contains basic information and financial details of the Society. The Society has been a registered charity since 7th May 1895 (although it was founded sixty years earlier in 1835). Mission and Remit Today the Society primarily provides bursaries to students from the county of Perthshire attending one of Glasgow's universities or colleges. Historically, the Society provided grants and pensions to senior citizens and others from Perthshire who lived in Glasgow and met the appropriate criteria. Board of directors The Society is run by the Board of Directors, chaired by the Preses (an old Scots word meaning Presiding Officer - for example see Preses o the Scots Pairlament), and comprising a Treasurer, Secretary, and ordinary board members who take on duties such as Bursary Coordinator and Grants Coordinator. The Board run the Society in their spare time and receive no remuneration for their work. History The Society was formed in 1835 originally to provide assistance to those whose had moved to Glasgow from Perthshire seeking employment, and had fallen on hard times. The Society has frequently been mentioned in the press over the years, with some examples provided on the Society's web site. In 1985, a celebration of the 150th anniversary of the Society was hosted by the City Council in Glasgow City Chambers, attended by members, directors, grantees, pensioners, bursars, members of the City Council, and the Lord Lieutenant of Perth and Kinross. Web Site The Society web site contains up to date information about the Society, including the current Board of Directors, bursaries, and grants. The Society's web site is currently maintained by one of the directors, Alastair F. Brown, and is hosted on BrownNet.
WIKI
Category:Reader's Digest Articles related to Reader's Digest; its parent company, the Reader's Digest Association; and products published by Reader's Digest and its subsidiaries. __NOGALLERY__
WIKI
David Richmond (American football) Anthony David Richmond (born April 1, 1987) is a former American football wide receiver. He was signed by the Cincinnati Bengals as an undrafted free agent in 2009. He played college football at San Jose State. Early years Richmond attended Garden Grove High school in Garden Grove, California, where he was a standout basketball player. During his senior year, he averaged 20.9 ppg and earned MVP honors in the 2005 Orange County All-star game. Junior college After enrolling at Santa Ana College, Richmond took up football. He caught one pass in the only game he played in 2005. As a sophomore, Richmond developed into one of the top junior college receivers in America. He had 54 receptions for 842 yards and nine touchdowns. Rivals.com ranked him as the No. 53 junior college recruit in the class of 2007. He chose San Jose State over Idaho, BYU, Iowa State, Oregon and Wyoming. San Jose State In his first year at San Jose State, Richmond caught 55 passes for 852 yards and three touchdowns. He had three 100-yard games, including a 180-yard performance against Utah State in which he caught 10 passes and two touchdowns. As a senior, Richmond had 72 receptions for 832 yards and seven touchdowns to earn second-team All-WAC honors. He was the only San Jose State receiver with more than 25 receptions on the season, and his seven receiving touchdowns accounted for 58 percent of the Spartans production. After the 2008 season, Richmond was selected to play in the 2009 Texas vs The Nation All-Star Classic, where he had three receptions for 37 yards for the Texas team. Professional career Richmond was invited to the 2009 NFL Combine. After going undrafted in the 2009 NFL Draft, Richmond signed with the Cincinnati Bengals. He, along with fellow rookie Marlon Lucky, was waived on August 22. .
WIKI
Auto Rates Are a Campaign Issue Again as Insurers Prepare to Leave Four years ago, James E. McGreevey nearly won the governorship of New Jersey with a campaign that harnessed voter anger over high automobile insurance rates. This time, the rate debate has been muted at best -- in part because Mr. McGreevey has chosen to make his Republican opponent, Bret D. Schundler, the main issue, and in part because the Sept. 11 attacks have voters worrying about larger questions of safety and survival. Yet in a state with some of the highest auto insurance premiums in the country, the issue is never far in the background. And the problems have loomed even larger this year as several big insurers announced they would stop doing business in the state.
NEWS-MULTISOURCE
Luxor001 Luxor001 - 1 year ago 94 AngularJS Question Should i use private properties $$state in $q for my needs? Using angular $q, i'm questioning myself if i should use $$state private properties to inspect the state of a promise (to check if it's pending, or completed). Assuming a situation like this: var promise = undefined; $scope.click = function(){ if(promise != null && promise.$$state.status === 0) return; promise = doAsyncAnimation().then(function(){ console.log('hey, i'm done!'); }); } It is considered a bad practise? It would do exactly what i need, and i don't like use a separate boolean variable to do job. How much eligible would it be? Answer Source $$ name prefix designates a private property/service which is used internally and may be changed without notice. From the manual: Angular Prefixes $ and $$: To prevent accidental name collisions with your code, Angular prefixes names of public objects with $ and names of private objects with $$. Please do not use the $ or $$ prefix in your code It is unlikely that $q will introduce breaking changes towards $$state. However, its usage indicates that promises are not used properly. In this case it is simply $scope.click = function(){ if (promise) return; promise = doAsyncAnimation().then(function(){ console.log('hey, i\'m done!'); }) .finally(function () { promise = null; }); }
ESSENTIALAI-STEM
Hope Radiation Cancer Center 2900 Hwy 77, Lynn Haven, FL 32444    Phone: 850-481-1687   Fax: 850-481-0761 Treatment Information for Cancer Radiation therapy, sometimes called radiotherapy, is the use of various forms of radiation to safely and effectively treat cancer and other diseases. Doctors use radiation therapy to try to cure cancer, to control the growth of the cancer or to relieve symptoms, such as pain. Radiation therapy works by damaging the DNA within cancer cells and destroying the ability of the cancer cells to reproduce. When these damaged cells die, the body naturally eliminates them. Normal cells are also affected by radiation, but they are able to repair themselves in a way that cancer cells cannot. While you undergo radiation therapy, a team of highly trained medical professionals will be working together to make sure you receive the best care possible. A radiation oncologist, a doctor who specializes in using radiation to treat cancer, leads this team.  
ESSENTIALAI-STEM
User:Vikithakar About Me This is Vivek Thakar and I am a Mechatronics Student at GCET. vikithakar is the nick name I use online. I Like Open Source, Linux and it's Philosophy. I have also created few Blogs and website. Please take a look at them.
WIKI
KANGEN CYOU landscape Claim: #1 "Kangen water" is a special water made on machines of a certain Japanese MLM brand only. Answer: In Japan, "Kangen waters" are certain naturally occurring mildly alkaline spring waters used traditionally to treat certain stomach ailments like acid reflux for over 500 years. In Chemistry, alkalis are known as "reduced" compounds and the Japanese chemistry term for reduction process is "Kangen". So the Japanese chemical description for "reduced" water, "alkaline" water, "deoxidised" water etc. is "Kangen" water. The MLM brand is suppressing this well known fact and misleading consumers that in Japanese language "Kangen" means "return to origin", whereas the other meaning of "Kangen" is actually a Japanese accounting term meaning to "return the original (principal) amount". As detailed later in this page, the rapid production of so-called "Kangen water" by the MLM brand machine is achieved by their using chemical adulterants and the produced liquid (which does not qualify to be drinkable water as prescribed under law both in India and also Japan) is poisonous and may be harmful if ingested in the quantities they suggest without a doctor's prescription. Reference: Physico-Chemical, Biological and Therapeutic Characteristics of Electrolyzed Reduced Alkaline Water (ERAW) - Water 2013, 5(4), 2094-2115; https://doi.org/10.3390/w5042094 Claim: #2 Branded "Kangen water" is fit for drinking and should be consumed in large quantity to prevent or cure diabetes, cancer, obesity etc. Answer: The "Kangen water" device manufacturer claims (albeit incorrectly) that "Kangen Water® pH 8.5-9.5 This type of water is perfect for drinking..". Firstly, as any qualified chemist will tell you, any liquid with ph between 8.5-9.5 does not qualify to be described as "water". Secondly, as the laws of both India and Japan prescribe, only water of pH between 6.5-8.5 (pH 5.6 to 8.6 in Japan) without relaxation qualifies to be drinkable water. Thus the branded MLM Kangen water which is outside pH 6.5-8.5 range must ordinarily be presumed to be unsafe and harmful for consumption and unfit for drinking. Thirdly, because the MLM marketers know very well that the high pH liquid output of their machine is illegal for drinking water in India (as well as Japan), they have now begin claiming their imported machines are "medical devices" approved by the Japanese Government. Whereas the said approvals are strictly given on the specific conditions like (i) usage will be on a doctor's prescription, (ii) no other medications will be taken simultaneously, (iii) patients with underlying medical conditions like 'Anaciditas' etc. should never be given such high pH waters. Accordingly, as a responsible water ionizer machine provider, we urge Indian consumers to seek qualified medical advice before consuming any liquids with excessively high pH being promoted as "cure-alls" by unscrupuous MLM marketers of so-called "Kangen water" machines. Claim: #3 Branded "Kangen water" is micro-clustered and thereby the smaller molecules being more easily absorbed promote better hydration. Claim: #4 "Kangen" water ionizer machine, being patented, is better than other branded water ionizer machines Answer: #3 There is none, or hardly any, verifiable scientific evidence for the existence of the alleged micro-clusters of water. Firstly, a detailed and reputed Japanese scientific study (titled as "Studies on the Physicochemical Properties and Existence of Water Products (as Drinks) Advertised as Having Smaller Cluster Sizes of H2O Molecules than Those of Regular Water" link) has clearly debunked the existence of these alleged micro-clusters in drinking water H2O along with the claimed benefits of better hydration. Secondly, the Kangen machine brand website never itself claims that their water ionizer machines produce "micro-clustered" water. Thirdly, it is the unscrupulous MLM marketers and independent sales agents (who are under stress to achieve sales targets and increase their commission ranking) of the devices who promote the fantastic myths of micro-clustered waters and hexagonal structured waters to sell their machines to gullible consumers with simple chemistry parlour trick demonstrations - like tea "making" without boiling / color change to wash cherry tomatoes etc. Whereas, the claimed beneficial aspects of alkaline drinking water are attributed to the directly measurable properties like ORP and free dissolved molecular Hydrogen concentration which are produced by superior quality 3rd generation ionisers like ION Life devices. In actuality, it is the free molecular hydrogen H2, which being the smallest molecule possible, is able to permeate everywhere in the body and create wellness. Reference: Effects of alkaline-electrolyzed and hydrogen-rich water, in a high-fat-diet nonalcoholic fatty liver disease mouse model - World J Gastroenterol. 2018 Dec 7; 24(45): 5095–5108; https://www.wjgnet.com/1007-9327/full/v24/i45/5095.htm Answer: #4 Considering that the phenomenon and process for water ionisation by electrolysis has been known and researched for over 300 years, it can be safely said that the basic process cannot be patented today and all the claimed patents are meaningless and obtained solely for marketing purposes to deceive gullible consumers. A typical patent used to promote the MLM brand is their "patent" obtained by the inventor of MLM for their "distributor management plan" or the "8-point business plan" or MLM marketing scheme with "8 point Commission structure paying 8 points within 8 levels" etc. link, link which causes their Kangen machines to be vastly over-priced due to patented front-loading MLM commission structures. You can edit this page in a web browser or use a text editor. Get help.
ESSENTIALAI-STEM
Atomoxetine Addiction and Abuse Atomoxetine, which is also sold under the brand name of Strattera, is a norepinephrine reuptake inhibitor. It has been approved for treating attention deficit hyperactivity disorder (ADHD). In most cases, the medication is used as one part of a complete treatment plan, which usually includes social, psychological and other treatments. Doctors and experts claim the medication helps individuals who take it maintain concentration, pay attention, stop fidgeting and remain focused. It is believed it works by restoring the balance of specific neurotransmitters in the brain. Atomoxetine Addiction And Abuse It is essential for those who are prescribed atomoxetine to read the entire medication guide given at the pharmacy before taking the medication. It can be taken with or without food and typically is taken one to two times per day. The initial dose is usually taken when a person wakes up in the morning, and if a second dose has been prescribed, it will be taken in the late afternoon or early evening. If the medication is taken too late, it may result in issues sleeping or insomnia. When taking the pills, it is necessary to swallow the capsules whole. Never chew, open or crush the capsule prior to taking it. To get the most benefits from this medication, a person needs to take it as prescribed by their doctor, and they need to take it at the same time each day. While most sources claim that the risk of addiction when taking atomoxetine is low, it is important to understand there is the possibility of misuse with all drugs, regardless of what they are used for. Just like with other medications that are used for the treatment of ADHD, atomoxetine comes with unique risks and side effects, with misuse potential being one of them. Because the medication affects the brain, behavior and mood, it also changes the way the brain communicates. As a result, it can cause the brain to make the person taking the medication to continue seeking it. This is what often leads to misuse and in the future — addiction. If someone begins misusing atomoxetine, they may experience an array of side effects. Some of the most common include: • Agitation • Aggression • Insomnia • Anxiety • Restlessness • Irritability • Mania • Panic attacks One of the most troubling side effects of misuse of this medication is that it can increase suicidal thoughts and the risk of suicide. Atomoxetine Addiction And Abuse While the misuse of this medication is low, if a person does become addicted, the risk of recurrence of use after recovery is high. As a result, it is imperative to seek aftercare when recovering from this medication. A strong, quality aftercare program is essential when fighting against recurrence of use. If you or someone you love is in this situation, then contact our team at The Recovery Village. We are a team of professionals who understand addiction, drug misuse, and other related issues. We can help you or your loved one find a life that is substance free.
ESSENTIALAI-STEM
14 votes 1answer 353 views What is the real default CellEvaluationFunction? The default CellEvaluationFunction is Identity but one can quickly see that this is handled specially as an equivalent function, ... 4 votes 2answers 186 views How to fold output cells by default? In Mathematica the default behavior of output cells is to pop up after the kernel has processed the input cells and got a result. I know I could add ; in the end of ... 1 vote 3answers 199 views Defining a polygon by clicking on an image [duplicate] Imagine I have some image, $I$, and I'd like to define a polygon by sequentially clicking on the image to define vertices $(v_1, ...) \in V$, where vertices $v_i$ and $v_j$ share an edge if $j = ... 10 votes 1answer 146 views Functions returns Command Completion Output Is there a function that returns the output as if you invoked Command Completion. To help clarify I am looking for a function that returns the Cell Data as if you invoked ... 1 vote 0answers 31 views Symbol created in unevaluated second argument of If [duplicate] Apologies for the long question title, but I couldn't come up with something shorter to describe the following. Starting with a clean session, there are no symbols in, let's say, ... 3 votes 3answers 277 views Temporarily redirect the output of Print[ ] to a second file I have started using Mathematica to automate file backup operations. The logistics I need make Mathematica a good choice. I am testing and developing the Notebook manually, and ... 2 votes 1answer 108 views Can I apply a ColorFunction to FaceGrids, or otherwise have FaceGrids with varying color? I want to make a 3d plot with FaceGrids with a certain color scheme. Specifically, I'd like them to be one color below a diagonal line, and a different color above ... 1 vote 1answer 264 views Initialization Cells in CDF I am wanting to run about 15 pages of initialization cells in a CDF, but can't seem to do so. I have set the InitializationCellEvaluation to True and InitializationCellWarning to False, but it doesn't ... 2 votes 0answers 48 views How to ensure that command line variables are secure for MathKernel scripts? Suppose I write a Mathematica script, called test.m, like the following: Print["Hello, World!"]; test = ToExpression[$CommandLine[[-1]]]; Print["I'm alive!"]; ... 1 vote 2answers 201 views URLFetch functionality for a Persian website I want to fetch the content of a Persian website. I tried URLFetch["http://www.tsetmc.com/"] Why is Mathematica unable to recode the characters in the results ... 0 votes 1answer 560 views PDF of binomial distribution and mixed binomial distribution I want to plot the PDF of binomial distributed function and a mixed binomial distributed function, therefore I entered for the binomial distribution function the following: ... 8 votes 1answer 496 views Problems with “Test Connectivity” and the Pacletserver I know there has been a similar questions to this already but the solution did not work for me so here again: I have internet connection and I can execute such commands like: ... 1 vote 2answers 307 views Placing a zero at coordinate center when plotting with Ticks -> None I'd like to plot a certain function where only its qualitative progession shall be emphasized. Thus, using the Ticks->None option seems to be appropriate. ... 1 vote 1answer 70 views How can I get a horizontally centered input window? This example displays a input window at a position of 675 from the left. ... 10 votes 4answers 230 views Is it possible to separately call the default value of a variable which isn't at the end of the sequence? After reading this post I recalled an old question I once met. We know that we can set default values for variables of a function: ... 21 votes 2answers 659 views Is there any way to define pure functions with optional arguments? For example consider the following function: Function[{u,v},u^2+v^4] Is there anyway to define default values for the variables ... -4 votes 1answer 2k views Determine the 2D-Fourier transform of an Image I am new to Mathematica and using Version 8.0. I want to calculate the 2D-Fourier Transform of a digital image and see its Magnitude and Phase Spectrum, and reconstruct it. 2 votes 2answers 155 views Compile error from If but not from Piecewise Consider this: point={1.,2.}; f1 = Compile[{{t, _Real}}, Evaluate[Block[{a, b}, {a, b} = point; If[t > 0., a*b*Sin[t], 0.]]]]; f1[2.] ... 1 vote 1answer 172 views How can I eliminate $x_1$ from my two ODEs? How can I get Mathematica to eliminate $x_1$ in the equations in the first box to achieve the equation in the second box? My code: ... 2 votes 1answer 738 views DSolve doesn't find a solution I have this partial differential equation (G and M are constants): and a solution is: Mathematica doesn't find any solutions. My code for DSolve is: ... 7 votes 2answers 277 views Adding a constant vector to a vector differential equation seems to break NDSolve. Why? I'm trying to solve a differential equation that's phrased in terms of matrices and vectors. My minimum working example is this: ... 2 votes 3answers 1k views How to color a contour plot over a subset of colors displayed in the bar legend This seems real easy but I can't find the answer. I have a few contour plots that I am combining and want to use only one bar legend that captures all the values. Given that I know the range of ... 4 votes 2answers 237 views Filling a plotted line both below and above the line I'm relatively new to Mathematica. I tried looking for a solution online but couldn't find anything. I want to fill a plotted line both above the line (one color) and below (another color). For ... 2 votes 1answer 72 views How to toggle visibility of all the evaluatable cells (but not their output)? I know that I can select individual evaluatable cells and disable their Open property (through Cell > Cell Properties), but ... 3 votes 2answers 192 views Implementation of a recurrence relation for the polynomials appearing in the large order asymptotics of the Bessel functions I would like to implement the recurrence relation for the polynomials $U_n(x)$ appearing in the large order asymptotics of the Bessel functions. The recurrence in question is ... 9 votes 1answer 209 views How secure is J/Link? Are there security concerns with using J/Link? If so, is there any way to encrypt the data passed between Mathematica and Java? If Mathematica and the JVM are running on the same machine, is there any ... 5 votes 1answer 119 views ArrayPlot: space between displayed data and frame When I execute the lines ... 9 votes 1answer 230 views Pure function with attributes of arbitrary number of arguments: Is it possible? Mathematica allows to define pure function, like Function[{a, b},Length[Unevaluated@a]{b}][1+2,2+3] (* ==> {0} *) Pure functions in Mathematica can take an ... 15 votes 3answers 306 views How to make Joined skip missing data points I have a set of data taken on sequential days, but some points are missing. I'd like to make a joined date list plot, where the points are not joined across the missing point.The following example ... 1 vote 1answer 128 views Simple rule appears not to work I have the following simple code ... 4 votes 2answers 195 views Correlation with missing data I have two lists, age and score, that I want to find correlation on for 50 people. For some people, the score is blank. Example data: ... 3 votes 1answer 329 views Using Thread or MapThread over multi-level, ragged lists [duplicate] This may be a rather strange question. I will try to create a sort of minimal working example. Suppose that I have two lists, list1 and ... 9 votes 2answers 187 views Why does Sort fail in this simple example? I'm sure I'll be embarrassed by the answer, but I don't understand why I get the following result: list = {{9, "b"}, {4, "a"}, {7, "k4"}, {6, "k3"}, {5, "w"}} ... 1 vote 1answer 175 views 3 votes 1answer 185 views Depth from Graphics3D Consider this simple 3D rendering with some geometric primitives: ... 7 votes 2answers 295 views Why LibraryLink function crashes at a second time? I'm trying link one of Lapack's function to Mathematica through LibraryLink, and the Library function works great at the first execution but crashes at the second time. Here is the code (modified ... 3 votes 1answer 98 views PrincipalValue option of Convolve not working in 9.0.1? The PrincipalValue option of Convolve is used in this question to define the Hilbert transform. However, in Mathematica 9.0.1, ... 13 votes 4answers 459 views Button evaluation inside DynamicModule Someone know why this Button works when clicked: ... 2 votes 0answers 104 views “LinkOpen::linke : specified file is not a mathlink executable” The following code runs fine if I run it interactively: ... 7 votes 4answers 188 views Strange behaviour when line-wrapping text in a Pane I noticed some strange behaviour of Pane. In the result from the following code, the line wrapping is not consistent: why do the first and last line contain four ... 12 votes 2answers 290 views Why do NumberForm and Round apparently use different tie-breaking methods? When rounding numbers (for example, rounding a real number to the nearest integer), the "round to nearest" rule is usually used. For example, 1.4 is rounded down to 1 and 1.6 is rounded up to 2. ... 9 votes 1answer 1k views How do I flatten transparency on a graphics, for conversion to eps or similar? I've got a graphic that I'd like to save as an eps file. Trouble is, the graphic has some transparency to it. Since the eps format doesn't handle transparency, I want to flatten the transparency out, ... 1 vote 0answers 693 views How to Output Chi-Squared Statistics when using NonLinearModelFit I am using NonLinearModelFit for some curve fitting and I was wondering if NLM is able to output chi-squared/leastsquared statistics from the best-fit parameters and confidence intervals. From my ... 5 votes 2answers 139 views How to resolve a Unix symlink? Does Mathematica have any function to resolve a Unix symlink (recursively, if necessary) to its real path? 1 vote 1answer 67 views List-manipulation Interpolation For example, I have the following list: AA={{0, 20000.}, {26.6, 19950.}, {53.2, 19950.}, {79.8, 19950.}, {97.1198, 18644.1}, {102.681, 16452.3}} Another ... 4 votes 2answers 135 views Equivalent of __FILE__? Many languages define a special identifier whose value is the path to the source file currently being processed. (For example, in C, this is done through the ... 0 votes 1answer 115 views Question with ParametricNDSolveValue When solving the following system: ... 2 votes 0answers 65 views How to create a ListPlot containing two lists? [duplicate] I'm trying to plot a set of points where one list corresponds to the X values another list corresponds to the Y values. I have ... 5 votes 2answers 255 views Building conditional lists with Manipulate I'm trying to select elements of a list that satisfy some criteria using Manipulate[]. Given 2 lists: ... 1 vote 1answer 115 views Exporting a histogram to PDF in without rasterising it How can I export a histogram without rasterising it? The labels and axes seem unaffected, but the bars themselves are pixelated when I zoom into them in a PDF viewer. For example, if I run ... 15 30 50 per page
ESSENTIALAI-STEM
1920 Bowling Green Normals football team The 1920 Bowling Green Normals football team was an American football team that represented Bowling Green State Normal School (later Bowling Green State University) as an independent during the 1920 college football season. In its second season of intercollegiate football, Bowling Green compiled a 1–4 record and was outscored by a total of 138 to 41. Walter Jean was the coach, and Charles Clucas was the team captain.
WIKI
trough Etymology From, from , , from , from , , from , enlargement of. See also 🇨🇬, 🇨🇬, 🇨🇬, 🇨🇬, 🇨🇬; also 🇨🇬, 🇨🇬. More at. Pronunciation Noun * 1) A long, narrow container, open on top, for feeding or watering animals. * One of Hank's chores was to slop the pigs' trough each morning and evening. * 1) Any similarly shaped container. * 2) A rectangular container used for washing or rinsing clothes. * Ernest threw his paint brushes into a kind of trough he had fashioned from sheet metal that he kept in the sink. * 1) A short, narrow canal designed to hold water until it drains or evaporates. * There was a small trough that the sump pump emptied into; it was filled with mosquito larvae. * 1) An undivided metal urinal (plumbing fixture) * 2) A gutter under the eaves of a building; an eaves trough. * The troughs were filled with leaves and needed clearing. * 1) A channel for conveying water or other farm liquids (such as milk) from place to place by gravity; any ‘U’ or ‘V’ cross-sectioned irrigation channel. * 2) A long, narrow depression between waves or ridges; the low portion of a wave cycle. * The buoy bobbed between the crests and troughs of the waves moving across the bay. * The neurologist pointed to a troubling trough in the pattern of his brain-waves. * The buoy bobbed between the crests and troughs of the waves moving across the bay. * The neurologist pointed to a troubling trough in the pattern of his brain-waves. * 1) A low turning point or a local minimum of a business cycle. * 2) A linear atmospheric depression associated with a weather front. * 1) A linear atmospheric depression associated with a weather front. Synonyms * (container for feeding animals) Translations * Albanian: , * Arabic: فِنْطَاس * Armenian:, կերակրատաշտ, * Basque: ganbela * Belarusian: кары́та * Bulgarian: * Catalan:, obi * Chickasaw: piini' * Chinese: * Mandarin:, 料槽, * Chuvash: такана * Crimean Tatar: oluq * Czech: koryto, * Danish: trug * Dutch: * Esperanto: trogo * Finnish: * French: (for food), (for drinking) * Galician: barcal, manxadoiro, pexegueira, presel, (for food),, (for drinking), , * German:, , * Alemannic German: Barme * Greek: * Ancient: φάτνη * Hebrew: (shòket) * Hungarian: * Ingrian: allas * Irish: trach * Italian: , * Japanese: かいばおけ * Korean: 구유 * Latvian: * Macedonian: ко́рито * Maori:, hake * Mongolian: * Norwegian: * Bokmål: trau * Nynorsk: trau * Old English: trog * Oromo: bidiruu * Persian: * Polish: , * Portuguese:, comedouro, * Romanian:, , vălău * Russian:, , * Scottish Gaelic: amar * Serbo-Croatian:, корито, * Sicilian: abbiviraturi, , * Slovak:, žľab, hrant * Slovene: * Sorbian: * Lower Sorbian: kóryto * Upper Sorbian: korto * Spanish: comedero (for food), (for drinking) * Swedish:, , matho, vattenho * Turkish: * Ukrainian: * Vietnamese:, máng ăn * Bulgarian: * Chickasaw: piini' * Danish: kar, trug * Finnish: * Galician:, , * German: * Greek: * Hebrew: * Hungarian: * Ingrian: allas * Italian:, , * Latin: linter * Macedonian: ко́рито * Norwegian:, trau * Polish: , * Portuguese: * Russian:, , * Scottish Gaelic: amar * Serbo-Croatian: * * Sicilian:, vacila, , * Sorbian: * Lower Sorbian: kóryto * Swedish: * Danish: * Galician: suarego * German: , * Italian: canale di scolo * Norwegian: * Polish: * Russian: , * Serbo-Croatian: * Sicilian: canali, canaluni, lavanaru * Spanish: * Swedish: * Danish: * Finnish: * French: * Galician: canlón * German: * Hebrew: * Italian: , * Latvian: rene, tekne, notekrene * Norwegian: takrenne * Polish: * Portuguese: * Russian: * Serbo-Croatian: * Sicilian: canala, canalata * Spanish: * Swedish: * Bulgarian: * Catalan: * Danish: bølgedal * Finnish: , * French: * Galician: * German: * Italian: , * Latvian: dziļvaga, ieplaka * Macedonian: па́дина * Maori: ngao, awaawa * Norwegian: bølgedal * Polish: * Portuguese: * Russian: , * Serbo-Croatian: * Sicilian: vaḍḍuni, fossu * Slovak:, údolie, úval, úžľabina * Spanish: * Swedish: vågdal * Tagalog: lambak * Catalan: tàlveg * Chinese: * Mandarin: * Danish: lavtryksudløber, trug * Finnish: matalapaineen alue * French: * German: , * Italian: superficie di attraversamento * Norwegian: lavtrykksrenne * Polish: , * Portuguese: * Russian: * Spanish: * Swedish: * Dutch: * Georgian: Verb * 1) To eat in a vulgar style, as if from a trough. * He troughed his way through three meat pies.
WIKI
Fred Wheldon George Frederick Wheldon (1 November 1869 – 13 January 1924) was an English sportsman. In football, he was an inside-forward with good footwork and an eye for goal who played for England and several Football League clubs, in particular for Small Heath and Aston Villa. In cricket, he was a right-handed batsman and occasional wicket-keeper, who played county cricket for Worcestershire in their early seasons in the first-class game. After retiring from sport, he became a publican in Worcester, where he died at the age of 54. Personal life George Frederick Wheldon was born on 1 November 1869 in Langley Green, which was then in Worcestershire. He was the youngest of ten children of Eliza and Joseph Wheldon, who worked his way up to become manager of Albright and Wilson's phosphorus works at Langley Green, and attended Chance's infant school and Langley St Michael's school. Commonly known as Fred or Freddie, he completed a seven-year engineering apprenticeship at Albright and Wilson's, and was working as a steam engine fitter before becoming a full-time professional footballer. He was twice married and had at least five children. He went into the licensed trade while still a footballer, and continued after his retirement from the game. During the First World War, he was employed in munitions work. He died at home, the Farriers Arms pub in Worcester, on 13 January 1924 at the age of 54. Club career Wheldon played football for Oldbury-based club Rood End White Star, and by 1887 was representing his hometown club, Langley Green Victoria. A trial with West Bromwich Albion the following year came to nothing, but his performance in a January 1890 friendly match against an Aston Villa reserve team featuring Villa's new Scottish signings caused the Birmingham Daily Mail Football Notes column to suggest that if Villa were able to train him for six months he "would probably astonish some of the slow and not over-sure forwards at present identified with their first team", and five more like him would save them the bother of going to Scotland for reinforcements at all. Small Heath Despite a mutual admiration between club and player, Wheldon did not join the 1888–89 Football League runners-up but instead signed for another Birmingham-based club, Small Heath of the Football Alliance. It was later reported that a business relationship between Small Heath chairman Walter W. Hart and Albright and Wilson's enabled Hart to influence Wheldon's father favourably towards his club. Signed initially on amateur forms, he made his debut on 15 February 1890, scored twice in a 6–2 defeat of Darwen, and gave Football Notes no reason to moderate their view of him as "a young player who one day will be one of the forwards of whom the district is most proud", "a born footballer [who] cannot fail to come on apace". He played once more for the first team in what remained of that season, and then turned professional. He was ever-present during the 1890–91 season, with eight goals from the 22 Alliance matches and a hat-trick against Hednesford Town in the FA Cup. Again ever-present for Small Heath in the final season of the Alliance, his 21 goals from 22 matches helped the team finish third. The club's application for election to the Football League First Division when it was expanded to 16 clubs was unsuccessful, but it was among 12 clubs, mostly from the Alliance, elected to the newly formed Second Division. Wheldon's and Small Heath's first Football League goal opened the scoring in a 5–1 win against Burslem Port Vale, and he went on to score 25 goals from the 22 matches, finishing the season as top scorer in the division. The team finished top of the table, a point ahead of Sheffield United, but promotion was not automatic even for champions; they had to play a test match at a neutral venue against the First Division's bottom club, Newton Heath. Wheldon scored the equaliser and "all but scored a second" in a 1–1 draw at Stoke's Victoria Ground; in the replay, Frank Mobley put Small Heath 1–0 up and Wheldon hit a post before Newton Heath won 5–2. Wheldon's 22 league goals helped Small Heath finish as runners-up to Liverpool in 1893–94. The test match, again at Stoke, was level at 1–1 against Darwen until late goals from Billy Walton and Wheldon secured the victory and with it promotion. In October 1894, Small Heath played West Bromwich Albion in a benefit match for Wheldon; his left-wing partner, Tommy Hands, and a triallist goalkeeper were both injured during the game, and only 2000 supporters were present. A few days later, he scored with the first penalty kick awarded to Small Heath, at home to local rivals Aston Villa, one of 11 First Division goals he scored that season. He missed a fixture for the first and what would remain only time in a six-year professional career with Small Heath, on 11 February 1895, when his sister died on the morning of a match. Having finished 12th of 16 in 1894–95, they came 15th in 1895–96 and faced the top two Second Division teams home and away in a test match mini-league. Defeats to Manchester City and Liverpool and a draw with the latter confirmed Small Heath's relegation, but in the final match, they beat Manchester City 8–0 with hat-tricks from Wheldon and Jack Jones. It was his final contribution to a tally of 113 goals from 175 matches. He refused to re-sign for Small Heath on his current terms, and the directors of what would be a Second Division club did not feel able to increase his wages. Aston Villa On 4 June 1896, Wheldon signed for League champions Aston Villa, reportedly the only club to meet Small Heath's valuation. The fee was initially undisclosed at the buyers' request, but was confirmed by Small Heath's chairman at the club's annual general meeting as £100 up front, £250 from the takings at a match to be played between the two clubs, and half of any excess taken over that figure. The £350 was believed to be a transfer record, and Wheldon would receive wages "considerably in advance" of the £150 a year he earned at Small Heath. In his first season at Villa Park, Wheldon's 22 goals (18 in the First Division, 4 in the FA Cup) not only made him the team's top scorer but helped them achieve the League and Cup double. Villa beat Everton 3–2 in the 1897 FA Cup Final at the Crystal Palace, and Wheldon made the score 2–2 before Jimmy Crabtree secured a 3–2 victory. He himself kept a notebook detailing his appearances and goals, in which he recorded two goals in that final. According to the English National Football Archive (ENFA), reports of the goalscorers did vary: "Wheldon's goal is also credited to Cowan and Campbell, and Crabtree's to Wheldon or Devey." His 1897–98 season opened with two successive hat-tricks, against Sheffield Wednesday and West Bromwich Albion. He finished as the league's top scorer with 21 goals. Wheldon, a professional cricketer with Worcestershire during the summer months, failed to report for training ahead of the 1898–99 football season. When contacted by the secretary-manager George Ramsay, he requested an extension to the end of August so that he could complete his cricket season, but was granted leave only until 20 August. He did not return, and then took part in Worcestershire's match against Surrey Second XI beginning on the 23rd, so Villa's committee suspended him sine die and requested an explanation. He expressed regret for his absence, but told them that he thought playing cricket was an adequate alternative to pre-season football training. The committee suspended him for two weeks dating from 22 August, the first training day after his leave expired, so he missed only one competitive match. He contributed 27 goals over the next two seasons to help Villa win back-to-back league titles – making three in four seasons – in 1898–99 and 1899–1900, taking his totals to 68 goals from 123 First Division matches. West Bromwich Albion At the end of that season, Wheldon asked Villa's permission to take a public house, the Railway Tavern at Langley Green. On principle, Aston Villa opposed any involvement by their players in the licensed trade. The club wanted to retain his services, and had offered him another year's contract on the same terms as before, but he was determined to take the pub, so he was made available for transfer, the likely purchaser being another First Division club, West Bromwich Albion. The Sports Argus wrote that the directors were correct to stick to their principles, and that "Wheldon is not the great player he once was, but he is still a useful one, and would do the Albion front line a great deal of good." In mid-June, it was reported that Villa were asking for a £300 fee, while Albion were only willing to pay £100. The deal was done a couple of weeks later, at a fee of £100, and he became the first to play professionally for all three major Birmingham-area clubs. He was appointed captain, but two months into the season, the team were struggling and he himself had not scored, so he gave up the captaincy at his own request. His form improved when the lively James Stevenson came in from Preston North End at centre forward, but apart from a 7–2 win against Bolton Wanderers, neither his nor the team's goalscoring did, and Albion were relegated at the end of the season. He was initially placed on the retained list, but did not re-sign, and in July was listed as available for transfer. Later career He then joined Southern League side Queens Park Rangers for £400 in 1901 and then moved to his third club in as many years, as one of manager Bob Blyth's reinforcements at 1901–02 Southern League title-holders Portsmouth. Over the next two seasons he made 63 appearances in all competitions, and then signed as club captain of Worcester City, where he played out the rest of his career, scoring at least 39 goals in the Birmingham and District League. He retired from football, aged 37, in January 1907. "One of the select few who have won fame both at cricket and football. At one period of his long and brilliant career, Fred Wheldon's services would have been accepted by any club in the country. When at his best, he was undoubtedly the finest inside left forward England possessed. His command of the ball, his adaptability to prevailing conditions, combined with his dodging, his swerving, and his deadly shooting, made him a great player in the highest company. Brilliant with head and foot alike, he has always been an ornament to the game." International career Wheldon was first selected for the Football League XI in the 1893–94 season, while still a Second Division player with Small Heath. In February 1894, he scored twice in a 4–2 win against the Irish League representative team in Belfast, and in April, England's goal in a 1–1 draw with the Scottish Football League XI at Goodison Park came from a passing move involving Wheldon, Jack Devey and goalscorer Fred Spiksley. Wheldon won four England caps whilst at Villa, scoring six goals. He won his first England cap against Ireland at Trent Bridge, Nottingham on 20 February 1897. Wheldon netted a debut hat-trick as England cruised to a 6–0 victory. Some reports however, say Wheldon's free kick took a deflection off teammate Ernest Needham for 2-0 and also a James Barron own goal made it 4–0. He then played in two further internationals, against Ireland in Belfast, England winning 3–2, and then scored twice in a 3–0 victory against Wales in Wrexham. His last cap came against Scotland at Celtic Park, in which Steve Bloomer became England's record scorer. Wheldon scored after only 3 minutes, Bloomer then scored the other two to break the record set by Tinsley Lindley, as England won 3–1. Honours Small Heath * Football League Second Division: 1892–93 Aston Villa * Football League First Division: 1896–97, 1898–99, 1899–1900 * FA Cup: 1896–97 * Sheriff of London Charity Shield (shared): 1899 Individual * Football League First Division top scorer: 1897–98 * Football League Second Division top scorer: 1892–93 Cricket career Wheldon played cricket for Langley Green and, having impressed with both bat and ball playing against them in 1892, moved on to Dudley of the Birmingham League. He turned out for Worcestershire Club and Ground in June 1893, and became an increasingly regular selection for the full county side, contributing to the three consecutive outright Minor Counties titles that preceded their admission to the County Championship. Wheldon played in Worcestershire's maiden first-class game, against Yorkshire in May 1899. He made a useful 49 not out in the first innings, and held two catches in Yorkshire's second. Wheldon played in 14 matches in total that season, scoring 541 runs at an average of 33.81 including three half-centuries. The following season Wheldon had a rather thinner year, averaging under 20 despite making exactly 100 against Hampshire and in the process sharing in a sixth-wicket stand of 186 with William Lowe. 1901 was worse still, as he did not pass 51 in 26 innings, and 1902 was little better, but he returned to form at last in 1903 with 969 runs – the most of his career – including 112 against Somerset. He also collected his only first-class stumping that year, against Yorkshire: Thomas Straw had been due to keep wicket, but was delayed in arriving at the ground, so Wheldon replaced him both in the team and behind the stumps. Wheldon passed 900 runs again in 1904; he also collected 40 catches, by far the most in a season in his career, and scored a century before lunch on the second day of the match against Leicestershire. Thereafter his form fell away rapidly, and in 1905 he recorded a disastrous aggregate of 237 runs in 18 innings, dropping out of the team in late July. He did return for 1906, but again his form was poor and though he made an unbeaten 89 batting at number nine against Warwickshire (out of 633; again Wheldon kept wicket) his next highest score was 31 and he played no more first-class cricket after the end of the season. He did appear in the Minor Counties Championship for Worcestershire Second XI in 1907 and for Carmarthenshire in 1910. Wheldon's grandson John Spilsbury played a single first-class match for Worcestershire in 1952.
WIKI
Talk:Jason Marquis/GA1 GA Review The edit link for this section can be used to add comments to the review.'' After reading through the article, I'm going to have to fail this. There's good progress, but a lot more work needs to be done yet. Here's what needs fixing: * The lead needs to be expanded (two paragraphs would be ideal). * All quotes need to be cited. * I'm seeing other sentences that should have citations as well that don't, as for which, I'd use the mentality of 'if you're not sure, cite it'. * The minor league section is unreferenced, and given the time he spent there, should be expanded. * The Atlanta Braves section is unreferenced. * There's little on his personal life. A section with a few sentences would be nice. * References need to be properly formatted; nearly half are bare links. After all this is fixed up, then certainly it can be re-nominated. There's a significant enough amount that I'm not putting it on hold though. Wizardman 15:25, 22 May 2009 (UTC) * Tx. I made a stab at a start, but clearly there is a lot more to do.--Ethelh (talk) 04:36, 28 May 2009 (UTC)
WIKI
Glencore wins transfer pricing court battle with Australian tax office MELBOURNE (Reuters) - Miner and trader Glencore (GLEN.L) has won a dispute with Australia’s tax office after a court ruled it had paid the correct amount of tax on purchases of copper concentrate from a mine that it owns in New South Wales state. Australia’s tax commissioner alleged that Glencore’s Swiss head office had failed to pay market rates for the copper it bought from its CSA mine in 2007, 2008 and 2009, and raised its assessment of tax owed by A$92.6 million ($62.5 million). However, the Federal Court of Australia found that Glencore had established that the price it paid for the copper concentrate was “within an arm’s length range”, according to a judgment on Tuesday. The long-running court case began after Glencore appealed the result of the tax office’s audit in 2011-2013. “Glencore welcomes the Federal Court decision in the matter relating to the pricing of copper concentrate sales by our CSA Mine between 2007 and 2009,” the company said in a statement to Reuters.   Global tax authorities have in recent years cracked down on so-called “transfer pricing” when multinationals sell to their parent or subsidiaries abroad at lower prices, potentially avoiding taxes if they lead to the declaration of lower earnings or even losses. The Australian Taxation Office said it would consider the decision and whether to appeal. “The most significant issue in multinational taxation is ensuring that the Australian arms of companies have arm’s length dealings with offshore related parties,” Deputy Commissioner Jeremy Geale said. “Transfer pricing rules ensure these transactions are priced fairly and that multinational companies do not underpay tax in Australia,” he said in a statement to Reuters. Glencore is still facing a $680 million tax demand from British authorities linked to transfer pricing that it said in February it would “vigorously contest”. The world’s biggest listed miner BHP (BHP.AX) (BHPB.L) late last year signed an agreement with the Australian Taxation Office to settle a transfer pricing dispute regarding its marketing operations in Singapore. Reporting by Melanie Burton; Editing by Richard Pullin and Muralikumar Anantharaman
NEWS-MULTISOURCE
Wikipedia talk:Articles for deletion/CustomerVision * I have updated my original entry for CustomerVision. Please review and consider the hopefully much improved version. I am trying to quickly learn how to craft an article that meets the community standards and I would appreciate a chance to get this right. I have tried to use other entries in the same "List of wiki software products" as a guide. Also CustomerVision is both the company name and the name of the software and I've tried to focus the article on the nature of the software. bkeairns * Feel free the add this comment to the AfD page itself. &Euml;vilphoenix Burn! 04:04, 16 December 2005 (UTC)
WIKI
Bear of the Day: Southern Copper (SCCO) - Bear of the Day Global markets are once again reeling thanks to a number of political issues. Emerging markets are under pressure thanks to a variety of protests, while developed markets in Europe are facing uncertainty thanks to more debt concerns. This trend has led to devastating consequences for a variety of commodity producers, as the dollar has strengthened against a number of global currencies. Plus, many key markets such as China could see reduced demand levels in the months ahead, further adding to commodity producers' woes. In particular, gold and silver miners have seen weakness in this environment, falling by well over 45%, as represented by the Gold Mining ETF ( GDX ) , since the start of 2013. Yet, while many investors have been laser-focused on the precious metal market, there has also been significant weakness in the base metal world as well. Companies in this space have been hit hard by the same issues of a strong dollar and sluggish international demand, and could thus be ones to avoid as well. One firm in particular that could struggle in this environment is Southern Copper ( SCCO ) . Southern Copper in Focus SCCO is a major U.S.-based producer of copper in key Latin American countries, but especially in Peru and Mexico. The firm mines over one billion pounds of copper -for the last full year-while it smelts and refines a similar amount as well. The company saw soaring stock prices for much of 2012, although the firm did see extreme price volatility. However, the stock has since cratered in 2013, falling by about 30% in the first half of the year. This slump has been largely due to two key factors; the weak outlook for copper, and the low earnings growth projections for the firm by analysts. In fact, current projections are looking for a year-over-year earnings contraction of 20% for the full year period, with similar double digit contractions for the current quarter and next quarter periods too. Analysts have also taken down their estimates of the company in recent weeks, as not a single estimate has gone higher in the past 90 days. The current year earnings consensus is now just $2.04/share, a far cry from the $2.63/share that analysts were expecting 90 days ago. Thanks to this trend, SCCO has earned itself a Zacks Rank #5 (Strong Sell), suggesting that it will underperform in the near term. And with the sluggish outlook for copper for the rest of 2013, it seems like it will be difficult for SCCO to break out of its slump and push higher, especially considering the falling earnings expectations. Better Plays? It is hard to find a good play in the Zacks Industry of Mining non-Ferrous metals , as the industry currently has a rank of 247 out of 261. In fact, in our five mining industries, there are only two #1 Ranked stocks; Brigus Gold ( BRD ) and Impala ( IMPUY ) . Both of these are in struggling industries, but they have proven to be best-in-class thanks to improving earnings estimates. Plus, both have seen their ranks surge from holds (or worse) up to strong buy territory, suggesting either of these names might be better picks than the struggling SCCO at this time. Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days . Click to get this free report >> BRIGUS GOLD CP (BRD): Free Stock Analysis Report MKT VEC-GOLD MI (GDX): ETF Research Reports IMPALA ADR (IMPUY): Get Free Report SOUTHERN COPPER (SCCO): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Page:Chats on old prints (IA chatsonoldprints00haydiala).pdf/418 that theirs was washed elsewhere. Alois Senefelder used as ink his composition of soap, lamp-black, and wax to write upon a piece of this soft stone the items of this historic bundle of linen his mother was sending to be washed. The result was the discovery of lithography. At first he corroded the surface of the stone with aquafortis and found that the black composition resisted the acid and left the writing standing in relief and capable of being printed from. But later he found that a simpler process would arrive at the same result. He wetted the stone with water after writing upon it with his black, greasy composition, the surface of the stone being exceedingly porous drank up the water, but the writing was left untouched. On passing a roller charged with printing-ink over this he found that the ink only adhered to the parts written upon. This rudimentary principle of the natural antipathy of grease to water was the foundation of lithography. Its earliest use in 1796 was in printing pieces of music, and it was not very long before transfer paper was used to enable a design to be drawn in the usual manner and transferred to the stone, obviating the unpleasant necessity of drawing in reverse. The year 1798 is the date when Senefelder had brought it to practical perfection and discovered the best means of printing from lithographic stones. Patents were taken out in Vienna, Paris, and London. The art at his commencement was known by the name of polyautography. It found ready favour with artists who saw its possibilities in reproducing their own work without the interposition of an interpreter
WIKI
King Arthur: Driving Quests on Software Project Data King Arthur, or simply Arthur, is an open source tool designed to schedule Perceval executions at scale through distributed Redis queues. It also provides support to store the data obtained to an ElasticSearch database, thus giving the possibility to connect the results with analysis and/or visualizations tools, such as the Bitergia analytics dashboards.   Executing Perceval through Arthur arthur-4icon The figure above highlights the overall view of Arthur. At its heart there are two components: the server and one or more instances of workers, in charge of running Perceval executions, which are defined as a list of tasks. The server waits for HTTP requests, which allow to add, delete or list tasks using REST API commands (i.e., add, remove, tasks). The listing below depicts how to send commands to the Arthur server. # Adding tasks $ curl -H "Content-Type: application/json" --data @to_add.json http://127.0.0.1:8080/add # Removing tasks $ curl -H "Content-Type: application/json" --data @to_remove.json http://127.0.0.1:8080/remove # Listing tasks $ curl http://127.0.0.1:8080/tasks As can be seen, adding and removing tasks requires specific parameters, sent as JSON data within the request. Adding a task needs a JSON object that contains a task id (useful for deleting and listing operations), the parameters needed to execute a Perceval backend, plus other optional parameters to control the scheduling (i.e., delayed start, maximum number of retries upon failures) and archive the fetched data. Conversely, in order to remove a task, the JSON object must contain the identifier of that given task. The listing below shows two examples of JSON objects to include and delete Perceval tasks. The former allows to extract commit data from the Perceval repository, while the latter removes the task perceval.git from Arthur. # Adding task { "task_id": "perceval.git", "backend": "git", "backend_args": { "gitpath": "/tmp/git/perceval.git/", "uri": "https://github.com/chaoss-grimoirelab/perceval.git", "from_date": "2015-03-01" }, "archive": {}, "category": "commit", "scheduler": { "delay": 10, "max_retries": 5 } } # Removing task {"task_id": "perceval.git"} After receiving a task, the server initializes a job with the task parameters, thus enabling a link between the job and the task, and sends the job to the scheduler. The scheduler manages two (in-memory) queues handling first-time jobs and already finished jobs that will be rescheduled. The former are Perceval executions that perform the initial gathering from a data source, while the latter are executions launched in incremental mode (e.g., from a given date, which is by default the date when the previous execution ended). In case of execution failures, the job is rescheduled as many times as defined in the scheduling parameters of the task. Workers grant Arthur with scalability support. They listen to the queues, pick up jobs and run Perceval backends. Once the latter have finished, workers notify the scheduler with the result of the execution, and in case of success, they send the JSON documents to the server storage queue. Such documents are consumed by writers, which make possible to live-stream data or serialize it to database management systems. In the current implementation, Arthur stores the JSON documents to an ElasticSearch database. Enhancing Arthur with Graal Recently, Arthur has been extended to handle Graal tasks, which extract source code information by leveraging on existing code analysis tool. Similarly to Perceval tasks, adding and deleting Graal tasks is achieved by sending JSON objects to Arthur. The listing below shows two examples of JSON objects to include and delete a Graal task. As can be seen, adding a task to analyze the code complexity of a repository consists of sending an add command to the Arthur server with a JSON object including a task id (cocom_graal), the parameters needed to execute an instance of the CoCom backend, such as its category (i.e., code_complexity), the URI of the target repository and the local path where it will be mirrored (i.e., uri and git_path), plus the scheduler settings. Deleting the cocom_graal task requires less effort, it suffices to send a remove command to the Arthur server that includes a JSON object with the target task. # Adding task { "task_id": "cocom_graal", "backend": "cocom", "backend_args": { "gitpath": "/tmp/git/perceval.git/", "uri": "https://github.com/chaoss-grimoirelab/perceval.git" }, "archive": {}, "category": "code_complexity", "scheduler": { "delay": 10, "max_retries": 5 } } # Removing task {"task_id": "cocom_graal"} Try it out and Join the gang! King Arthur is 100% open source, part of the GrimoireLab tools, used to fetch software project data. Feel free to try it, fork it, submit issues, pull requests and ideas! If you are attending CHAOSSCon or OSSNA, come to visit us in Vancouver to get more details. goodbye Leave a Reply Up ↑ %d bloggers like this:
ESSENTIALAI-STEM
Washington D.C., The White House The White House has been the official residence of every President of the United States with the exception of George Washington. The White House is located on a site near the Mall chosen in 1790 by President George Washington and Pierre l'Enfant, the architect who created the master plan for the new capital. Construction started in 1792 and in 1800 by the Irish architect James Hoban (1758-1831), when the building was almost completed, president John Adams moved in. Ever since, each President of the United States has lived in the White House. After the invasion of British troops in 1814 several buildings were destroyed also the White House. President Madison decides to re-construct the White House, of which only the outer walls were still standing. The building was originally named the 'President's Palace', but in 1901 president Theodore Roosevelt made ‘White House’ as the official name. Thomas Jefferson was the first president to allow public tours of the White House in 1805. Since September 11, 2001 they have been suspended but US residents can arrange group tours of 10 or more people through their member of Congress.
FINEWEB-EDU
Draghi's dovish talk steers his successor toward a new era of stimulus Investors in Europe are likely to receive more clues this week on who will replace Mario Draghi, just days after the European Central Bank (ECB) president signaled that more accommodative policy could be on the way. Amid a slowdown in the euro zone economy, Draghi's dovish tone and prospects for further monetary stimulus, there are questions about the path the next president might take. However, the decision on who will be the next ECB chief is tightly linked with a few other important calls in Europe. European leaders gathering in Brussels Thursday will have their second round of talks on who should lead the European Commission — the EU's executive arm. Once that's achieved, the route for choosing the next Draghi will be opened. "We are still waiting for the Commission (decision)," a European official with knowledge of the discussions, who did not want to be named due to their sensitivity, told CNBC Wednesday over the phone. The 28 EU heads of state are at an impasse over the Commission presidency. However, European Council President Donald Tusk, who chairs the European summits in Brussels, said Wednesday that despite different viewpoints, there's "a common will to finalize this process soon." Chancellor Angela Merkel of Germany said this should happen before July 2. EU leaders must also agree on a new foreign policy chief, a new president of the European Parliament and president of the European Council. With all these decisions, due to happen before October at the latest, they will seek a balance between nationality, gender and political affiliation. The same European official, who's close to the central bank's discussions, told CNBC that a Finnish candidate might have "good chances if Germany and France block one another." Finland announced Wednesday that it had put forward two names to lead the ECB: Erkki Liikanen and Olli Rehn, the former and current chief of the Finnish central bank, respectively. But there are other names floating around in the corridors of Brussels: Benoit Coeure, the French economist who currently serves as a member of the executive board at the ECB; Francois Villeroy de Galhau, who is France's current central bank governor, and Jens Weidmann, the current Bundesbank governor. All of them, apart from Liikanen, are members of the ECB's Governing Council — the group of policymakers that brings together the 19 central bank governors plus the six members of its executive board. The European official told CNBC that members of the Governing Council have a better chance of replacing Draghi. The transition would be "easier," he said. "Villeroy de Galhau, Rehn and in particular Coeure would largely continue on Draghi's path. Weidmann may be a bit different," Florian Hense, a euro zone economist at Berenberg bank, told CNBC via email Wednesday. "While the (ECB) president matters in crisis times, we should not overestimate his power: After all, the Governing Council takes the decisions, not the president. What is more, the Governing Council does not look to turn from a bunch of largely dovish Draghies into one of hawkish Weidmanns all of sudden, if Weidmann would become president," he added. In his latest remarks, Draghi said that if inflation does not pick soon, "additional stimulus will be required." He also said that the bank is not short of policy instruments to work with. In this context, the bank's vice president, Luis de Guindos, told CNBC that there is a "wide range" of ways the ECB could prop up inflation, including by embarking on a new round of quantitative easing. "By undertaking the contingency planning now, Draghi may leave his successor somewhat handcuffed to whatever the Governing Council agrees upon – an agreement he can steer over the next couple of months," Hense told CNBC. "Any successor reluctant to provide further stimulus would then struggle not to do so if push comes to shove and the Governing Council has made up his mind to step it up," he added. Carsten Brzeski, chief economist at ING Germany, also told CNBC via email that "with (the) latest events any successor has actually been tied to the Draghi chains. At least in the first months, it will be hard to break with the Draghi legacy." "Any more hawkish ECB president will now have a harder time as he/she will be tested against Draghi's recent dovishness," Brzeski added.
NEWS-MULTISOURCE
Letters to Cleo Letters to Cleo is an American alternative rock band originating from Boston, Massachusetts, best known for the 1994 single, "Here & Now", from their full-length debut album, Aurora Gory Alice. The band's members are Kay Hanley, Greg McKenna, Michael Eisenstein, Stacy Jones, Scott Riebling, and later, Tom Polce and Joe Klompus. The group disbanded in 2000 but reunited for a small tour in 2008. In 2016, the band reunited, and on October 14, 2016, released an EP, titled Back to Nebraska. Band history Guitarist Greg McKenna and singer Kay Hanley formed the band Letters to Cleo in 1990. The band was initially called Rebecca Lulu, with Tad Bouve on guitar and Ted Garland on drums with several musicians filling in on bass. In its early phase, the band enlisted various guest players, including a brief period with Abe Laboriel, Jr. as drummer in 1993. The band released a 45 single of "Here & Now" with Rimshak featuring Abe Laboriel on drums with Brian Karp on bass. The band's definitive lineup of Hanley, McKenna, Michael Eisenstein on guitar, Stacy Jones on drums, and Scott Riebling on bass, was established in 1994. The band changed its name to Letters to Cleo in 1990. The name "Letters to Cleo" is a reference to Hanley's childhood pen pal. They spent their summers together in Canada, and they wrote each other letters to keep in touch over a ten-year period. At some point Cleo moved without giving Hanley her new mailing address, and Hanley's letters to Cleo were returned to sender. Hanley rediscovered a box of these letters during the band-naming process, and the band adopted the name. Hanley called it "the least crappy of all the names" they came up with at the time. Letters to Cleo played gigs in several Boston clubs, including T.T. the Bear's Place and The Rathskellar. The band could not seem to find success and was close to breaking up when it recorded their first full-length album, Aurora Gory Alice; Hanley had already started another band on the side at the time. The album was released on CherryDisc Records, a Boston-based independent record label, in 1993. The album received extensive airplay around New England. In 1994, the Billboard published a review of the album and the next day the band played a much-hyped show at South by Southwest in Austin, which made several recording labels very interested in signing the band. Letters to Cleo decided to sign a record deal with Giant Records, a Warner Brothers subsidiary, in 1994, and it re-released Aurora Gory Alice worldwide in 1995. Soon after signing the deal, their new record label was asked to compile a soundtrack for "Melrose Place", and the record label decided to put "Here & Now" on it. "Here & Now" was an instant hit, and the song reached number 10 on the Billboard Modern Rock Singles chart. On August 1, 1995, Letters to Cleo released a follow-up album, Wholesale Meats and Fish. Its release was followed by extensive tours with Our Lady Peace, Sponge, Ned's Atomic Dustbin, and others. The single "Awake" achieved moderate rotation on alternative radio. The band also recorded a cover of The Cars song "Dangerous Type" for the major motion picture The Craft. In 1997, Stacy Jones left the band to join Veruca Salt and was replaced by Tom Polce. That same year, the band released their third album Go!. After a short tour, Polce left the band and was replaced by drummer Jason Sutter. In late 1997, Letters to Cleo parted ways with their record label Giant/Revolution. 1998 saw the release of some early demos and B-sides in the form of the Sister album released originally by Wicked Disc. Letters to Cleo appeared in the 1999 film 10 Things I Hate about You as a favorite band of the character portrayed by Julia Stiles. They contributed four songs to the soundtrack for the film, which included a Cheap Trick cover ("I Want You to Want Me"), and a Nick Lowe & Ian Gomm cover ("Cruel to Be Kind"). Also included were two original tracks, "Come On", and the beginning of "Co-Pilot" (which can be heard at the end of the scene of their performance at a local club). Whereas the covers appeared on the film's soundtrack, "Come On" was released as an MP3 download on the band's website. "Co-Pilot" was also not on the film's soundtrack, but it appeared on Letters To Cleo's album Go!. In the closing credits, they were mistakenly credited as Letter to Cleo. During that same year, the band opened for Cheap Trick at The Paradise Club in Boston. The band then recorded 15 new original songs for the Kids' WB cartoon, Generation O!, which aired from 2000 to 2001. The band played its final show on May 4, 2000, a benefit for their friend and longtime local supporter, Mikey D. They announced their disbandment the following month. In 2008 they went on a reunion tour and again in 2016. Reunion In December 2007, an impromptu reunion occurred when four of the original band members appeared at a benefit for longtime supporter Jeanne Connolly, at TT the Bear's Place in Cambridge, Massachusetts. The members reunited officially for a series of shows a year later in Los Angeles, Boston and New York City. More dates followed in 2009 with shows in New Orleans, Dallas, Houston, and Austin. Bassist Scott Reibling did not participate in these shows but gave his blessing. Longtime friend of the band Joe Klompus replaced Reibling. As of July 2009, the band members returned to their own projects. In the Parks and Recreation Season 4 episode entitled "The Comeback Kid", the character Ben Wyatt is seen wearing a Letters to Cleo shirt (show star Amy Poehler attended Boston College during the band's early years). This resulted in Letters to Cleo being a trending topic on Twitter. The band reunited to play a fictional concert on the sixth season finale of Parks and Recreation. In February 2016, Letters to Cleo was back together and recording new music. The band's Facebook and Twitter feeds have been active with status updates, pictures and videos of ongoing recording. Letters to Cleo appeared as the musical guest at Geek Bowl XII, the twelfth annual event of its kind put on by Geeks Who Drink Pub Quizzes. The event took place in the band's hometown of Boston on Saturday, February 17, 2018. The band released their holiday EP Ok Christmas November 2019. As of 2022, LTC has been playing reunion shows periodically in the Northeast and California. The lineup includes both Stacy Jones and Tom Polce alternating playing drums show to show along with Kay Hanley, Michael Eisenstein, Greg McKenna, and Joe Klompus. In 2023, band members Kay Hanley and Tom Polce wrote ten original songs for "Subspace Rhapsody," the musical-themed ninth episode of the second season of Star Trek: Strange New Worlds. Solo careers Most of the band members also have solo careers. Most notable is Kay Hanley's career, which produced the albums Cherry Marmalade in 2002, The Babydoll EP in 2004, and Weaponize in 2008. She provided singing vocals for Rachael Leigh Cook in the 2001 film Josie and the Pussycats. In 2003, Hanley collaborated with Sega and musician Jun Senoue for the song "Follow Me" in the video game Sonic Heroes. Hanley has also been involved with Disney on several children's projects, including the Disney Channel's My Friends Tigger & Pooh, as well as writing all original songs for Disney Junior's hit series, Doc McStuffins. Michael Eisenstein has been doing session work and touring work for many artists including Our Lady Peace and Lisa Loeb. He is a producer and engineer. Hanley and Eisenstein married in the late '90s and have two children, Zoe Mabel and Henry Aaron (named for legendary baseball Hall Of Famer). They split up in 2010. Drummer Stacy Jones went on to form American Hi-Fi with fellow Boston musicians Drew Parsons, Jamie Arentzen and Brian Nolan. In addition to being the musical director and drummer for Miley Cyrus, Jones is also the musical director for Life of Dillon. Previous gigs also include playing drums for Matchbox Twenty, Madonna, Dia Frampton, Veruca Salt, Avril Lavigne, Ariana Grande, Joan Jett, Against Me!, The Jonas Brothers, The Flaming Lips, Lily Allen, Billy Ray Cyrus, Sheryl Crow, Cobra Starship, Aimee Mann, The Cab, Hey Monday, Butch Walker, and more. Scott Riebling went into the production side of music. He has produced work for The Von Bondies, Cobra Starship and Fall Out Boy. Riebling resides in Massachusetts. His brother Eric Riebling plays bass in Pittsburgh band The Affordable Floors. He co-owns a pizza chain (Stoked Pizza) located in the Boston area. Co-founding member Greg McKenna is playing live with his new band, City Rivals. McKenna resides in Dorchester, Massachusetts. Tom Polce played with several prominent Boston-based bands and is a producer and engineer. He lives in California. Band members * Current members * Kay Hanley – lead vocals, rhythm guitar (1990–2000, 2008–2009, 2014, 2016–present) * Greg McKenna – lead guitar, backing vocals (1990–2000, 2008–2009, 2014, 2016–present) * Michael Eisenstein – rhythm guitar, keyboards, backing vocals (1992–2000, 2008–2009, 2014, 2016–present) * Joe Klompus – bass, backing vocals (2008–2009, 2016–present) * Stacy Jones – drums, percussion (1994–1997, 2008–2009, 2014, 2016–present) * Former members * Tom Polce – drums (1997) * Jason Sutter – drums (1997–2000) * Scott Riebling – bass, backing vocals (1994–2000) * Abe Laboriel Jr. - drums (1992–1993) * Brian Karp - bass (1991–1993) * Peter Whitehead - drums (1988-1991) In popular culture On the television show Parks and Recreation, Ben Wyatt (Adam Scott) wears a Letters to Cleo shirt on multiple occasions while he is between jobs. Letters to Cleo also makes an appearance on the show, playing during the Pawnee/Eagleton Unity Concert in the last episode of Season 6. Hanley said that the show's head writer, Mike Schur, is from Boston and let the band know it would be funny for the character to wear the shirt on the show.
WIKI
ReWalk Robotics shows off a soft exosuit designed to bring mobility to stroke patients – TechCrunch ReWalk has been talking up its upcoming “soft exoskeleton” since January. The Boston-based company finally took the system out for a spin in the daylight, showing what it’s capable of at a robotics event held on the MIT campus this weekend. The version on display is still a prototype, but all of the functionality is in place, using a motorized pulley system to bring mobility to legs impacted by stroke. The device, now known as the Restore soft-suit, relies on a motor built into a waistband that controls a pair of cables that operate similarly to bicycle brakes, lifting a footplate in the shoe and moving the whole leg in the process. The unaffected leg, meanwhile, has sensors that measure the wearer’s gait while walking, syncing up the two legs’ movement. An able-bodied representative from Harvard was on-hand at the event, demonstrating how the system automatically adjusts when walking at different speeds. Rewalk’s soft exoskeleton is designed to give stroke patients more mobility. A sensor on one leg measures the walker’s gait. The other leg uses a system similar to bicycle brake cables to move the other foot. The device can barvard’s Wyss Institute developed as part of a DARPA project. #tech #tcrobotics #robotics #darpa A post shared by TechCrunch (@techcrunch) on Jul 18, 2017 at 3:02pm PDT Harvard is behind the Restore’s design, with the school’s Wyss Institute for Biologically Inspired Engineering developed the underlying technology here. The prototype on display this week, however, is the result of a partnership between ReWalk and the Institute, which is designed to commercialize technologies created at the school by teaming with companies that know how to navigate product launches, sales and regulatory bodies like the FCC. ReWalk CEO Larry Jasinski tells TechCrunch that while industry-funded research isn’t entirely uncommon in the academic world, Harvard has been seeking more impactful ways to bring the benefits of their research to a real-world setting. “They were willing to structure something in a way that could work for both parties,” he explains. “I think that’s because, while this is technically at Harvard, but it’s at the Wyss Institute. They’re trying to develop the institute as something that has more of an application mindset. We are a bit of an experiment, as part of their attempted business model.” As part of the deal, ReWalk, best known for its robotic exosuit designed for people with spinal injuries, helps fund Harvard’s research. Once completed, the company pays to license the patents indefinitely for its products, and Harvard also gets a percentage of sales of the product if/when it finally comes to market. How long that takes depends on a number of factors like FCC approval. Jasinski expects the final version of Restore — which will look a lot cleaner than the Borg-like device on display — will be available in the U.S. before the end of next year. Restore is one of many projects the lab is looking into using the same underlying technology. There could also be implications for MS, ALS and Parkinson’s patients. The Wyss team also displayed a version of the technology at TC Sessions: Robotics this week designed to help soldiers carry additional payloads of 15  to 20 percent.
NEWS-MULTISOURCE
Diets For Allergies And The Immune System Immunity Allergy Diet We offer a Nutritional Therapy Service specialising in supporting allergies and immune system issues with a scientific approach to diet throughout Oxfordshire. Low Immunity Ouch The immune system is a fantastic thing. We walk into a lamppost, split our forehead and within seconds we have white blood cells rushing to the site to menace and kill any germs that might want to take advantage. We’ll look like a hopeless case but we’ll be a well and fit helpless case. Our white blood cells manage to do this by producing protein antibody’s called immunoglobulins, the ones used to rescue our face are known as IgM immunoglobulins. There are others too IgG, igA and IgE among them, which help to fight off parasites, toxins, bacteria and viruses. When our immune system isn’t functioning properly and immunoglobulin levels drop we become susceptible to these invaders. Immunity From Lampposts The immune system can be affected by factors such as long term stress, self-induced toxins such as medication and smoking, and a poor diet. The immune system also weakens with age so we owe it to ourselves to ensure that we exercise regularly, avoid smoking and alcohol and eat a diet rich in nutrients as we get older. There have been many studies on specific nutrients such as Vitamin D, Vitamin A and selenium and their isolated effects on immunity. And, without a doubt, they all have a beneficial affect. However they don’t work in isolation, they need to be present in a diet rich in vegetables, whole grains and decent protein. Without the correct nutrients in place no part of our body works effectively and we need our first line of defence to be working 100% so that the lamppost inducing bruise and cut remain just as a mildly embarrassing inflammation and nothing worse. Autoimmunity Mistaken Identity Sometimes, unfortunately, our antibodies mistake our own tissues as invaders and start to attack our normal physiology. This can be the case with Hashimoto’s or Grave’s disease when the thyroid gland comes under attack, or Addison’s Disease when the pancreas is the target. It’s not always clear why the immune system begins to work incorrectly but there are studies which link autoimmune issues with an originating viral attack, one which was never suitably dealt with in the first instance. For example the Epstein Barr Virus can remain in our systems for a long time and is linked with Chronic Fatigue Syndrome / Myalgic Encephalomyelitis (CFS / ME). Addison’s disease too is thought to sometimes originate from a fungal infection. Consequently a nutritional approach to autoimmune conditions may start with an anti-microbial program to try and eliminate any viruses, bacteria or pathogens. This could contain supplements such as oregano or cinnamon bark and laboratory tests which may pinpoint an originating invader. The liver would need additional nutritional support as this process is gone through to help it metabolise the (hopefully) dying contagion. Some autoimmune conditions such as CFS/ME come with a heightened response to any dietary change so improvement may need to be incremental and slow. Exclusion Diets Another possible cause of some autoimmune issues such as Rheumatoid Arthritis (RA) are lectins, a protein found in some plants such as wheat, potatoes or beans. Most of us are fine with lectins and cope with them fine, however some micro-organisms such as influenza can make us susceptible and trigger a cascade of responses resulting in auto-immunity. For some RA sufferers trying a wheat-free diet may bring relief and exclusion diets may also help other auto-immune conditions. However professional advice should be sought to manage the exclusion and re-introduction process to ensure that vital nutrition isn’t omitted in the process. Allergies There are so many allergies that for any given molecule presumably, someone, somewhere has an allergy to it. We can sometimes outgrow allergies and sometimes not (as the condition Eosinophilic Esophagitis EoE would show). We can have allergies to whole groups of items such as the Rosaceae family of fruits which includes strawberries, apricots, peach, pear and plums or we can be allergic to just one member. What’s Your Poison? We can sometimes think we’re allergic to a particular food item such as milk when actually we’re only allergic to one part of it such as the casein protein. The allergen doesn’t even have to be food, just something small enough to be inhaled or absorbed such as animal dander, mould spores, medication or chemicals in toiletries. Nutritional therapy can’t always help to resolve an allergy but it can help the immune system to cope with the reaction. This often means supporting the gut, an integral part of the immune system where much of the immunoglobulin IgA is synthesised. A diet rich in anti-inflammatory foods can also help to calm down skin reactions. Support can also be provided in looking for alternatives to the allergenic food so that vital nutrients don’t get excluded from the diet. When An Allergy Isn't An Allergy Sometimes a histamine reaction may also mimic an allergic reaction (rash, wheezing for example) and the nutritional protocol would look to support the gut to reduce histamine production and to minimise histamine rich foods. Similarly many food intolerances start with poor gut health, in these situation the food itself isn’t necessarily the culprit, just a signifier of the underlying problem. Many situations such as stress, anti-biotics or poor diet can cause the body to negatively react to certain foods. Within a few weeks I really noticed a difference, I’m sleeping better than I have in a long time. Saffron took the time to understand my lifestyle and habits and then made recommendations and adjustments that were easy to build into my everyday life. Dawn Lillington Let's have a chat over a cup of coffee and see what This Life Nutrition can do for you...
ESSENTIALAI-STEM
Technology How To Add Up Columns Or Rows Of Numbers In Open Office Calc how-to-add-up-columns-or-rows-of-numbers-in-open-office-calc Using the AutoSum Function Adding up columns or rows of numbers in Open Office Calc can be a time-consuming task if done manually. However, the software offers several built-in functions that can simplify this process. One of the easiest and most efficient ways to add up numbers in Calc is by using the AutoSum function. The AutoSum function in Calc automatically calculates the sum of a selected range of cells, saving you the trouble of manually typing out the formula. Here’s how to use the AutoSum function: 1. Select the cell where you want the sum to appear. 2. Click on the AutoSum button AutoSum button in the toolbar, or use the shortcut Ctrl + Shift + A. 3. Calc will automatically detect the range of cells above or to the left of the selected cell that contain numeric values. 4. Press Enter to apply the sum. The AutoSum function is especially handy when working with long columns or rows of numbers. It quickly calculates the sum and updates the result whenever you add or remove values from the range. This saves you time and ensures accurate calculations without the worry of missing or incorrect formulae. If you want to add up a specific range of cells, rather than the automatic range detected by AutoSum, you can choose your desired range by selecting the cells manually while the AutoSum function prompt is active. Additionally, if you want to include non-adjacent columns or rows in the sum, you can hold the Ctrl key while selecting the columns or rows. Calc will automatically adjust the formula to include the selected cells in the sum. The AutoSum function in Open Office Calc is a useful tool that simplifies the process of adding up columns or rows of numbers. By utilizing this function, you can save time and avoid potential errors when performing calculations in your spreadsheets. Next, we will explore another method of adding up columns or rows manually in Open Office Calc. Manually Adding up Columns or Rows While the AutoSum function is a convenient way to quickly add up columns or rows in Open Office Calc, there may be instances where you prefer to perform the calculations manually. In such cases, you can follow these steps to manually add up columns or rows: 1. Select the cell where you want the sum to appear. 2. Type the equals sign (=) to start a formula. 3. Click on the first cell in the column or row that you want to add up. 4. Enter the plus sign (+). 5. Continue clicking on the cells in the column or row until you’ve selected all the values you want to add. 6. Press Enter to calculate the sum. By manually inputting the formula, you have complete control over which cells are included in the sum calculation. This method is useful when you need to exclude certain values or include non-adjacent cells in the sum. When manually adding up columns or rows, it’s essential to pay attention to any changes or updates in your spreadsheet. If you add or remove values from the selected range, you need to update the formula manually to ensure accurate calculations. Using this method allows for flexibility and customization in your calculations. You can combine different arithmetic operations, such as subtracting or dividing, along with the addition of values. However, it’s important to be cautious when manually adding up columns or rows, as human errors can occur. Double-check your selected cells and the formula for any mistakes before calculating the sum. While the AutoSum function is often more efficient for adding up columns or rows, knowing how to manually add up values can be beneficial, especially for specific scenarios or when a high level of precision is required. Next, we will explore another built-in function in Open Office Calc that can be used to add up columns or rows of numbers. Using the SUM Function In addition to the AutoSum function and manual addition, Open Office Calc provides the versatile SUM function for adding up columns or rows of numbers. The SUM function allows you to calculate the sum of a specified range of cells with more flexibility and precision. To use the SUM function in Calc, follow these steps: 1. Select the cell where you want the sum to appear. 2. Type the equals sign (=) to start a formula. 3. Enter “SUM(” in the formula bar. 4. Select the range of cells you want to add up. 5. Closing the formula with a parenthesis “)”. 6. Press Enter to calculate the sum. The SUM function allows you to add up a specific range of cells, giving you more control over the calculation than the AutoSum function. You can select non-adjacent cells or exclude certain values from the sum by manually specifying the range. For example, if you want to add up cells A1 to A5 and C1 to C5, you can use the SUM function as follows: “=SUM(A1:A5, C1:C5)”. In addition to selecting individual cells or ranges, you can also use SUM to add up multiple ranges by separating them with commas. For example, “=SUM(A1:A5, C1:C5, E1:E5)”. Moreover, you can use the SUM function to add up values from multiple sheets within the same workbook. Simply specify the sheet name followed by an exclamation mark before the cell range. For example, to add up cells A1 to A5 from Sheet2, the formula would be “=SUM(Sheet2!A1:A5)”. The SUM function in Open Office Calc is a powerful tool that offers flexibility and control over adding up columns or rows. It allows you to easily manipulate the ranges, include or exclude specific values, and perform calculations across different sheets. By utilizing the SUM function, you can efficiently and accurately add up numbers in your spreadsheets. Next, we will explore another built-in function in Open Office Calc called SUBTOTAL, which can be used for adding up columns or rows while ignoring hidden cells or filtering. Using the SUBTOTAL Function In Open Office Calc, the SUBTOTAL function offers a useful way to add up columns or rows of numbers while taking into account hidden cells or filtered data. This function allows you to perform calculations that exclude rows or columns that are filtered out or hidden. Here’s how to use the SUBTOTAL function in Calc: 1. Select the cell where you want the sum to appear. 2. Type the equals sign (=) to start a formula. 3. Enter “SUBTOTAL(” in the formula bar. 4. Choose the desired function number: • 1 – Calculates the sum including hidden rows or columns • 101 – Calculates the sum excluding hidden rows or columns 5. Select the range of cells you want to add up. 6. Closing the formula with a parenthesis “)”. 7. Press Enter to calculate the sum. The SUBTOTAL function can be particularly useful when you have filtered data or hidden rows or columns in your spreadsheet. The function number you choose will determine whether the calculation includes or excludes the hidden or filtered cells. For example, if you have filtered data and want to calculate the sum of a column while excluding the hidden rows, you would use the formula “=SUBTOTAL(101, A1:A10)”. This will give you the sum of values in column A, considering only the visible cells. By using the SUBTOTAL function, you can easily handle calculations that take into account hidden or filtered data in your spreadsheet. This allows for more accurate sums, especially when working with large data sets that may involve filtering or hiding certain rows or columns. Next, let’s explore another function called SUMPRODUCT, which can be helpful for adding up columns or rows while performing calculations based on specific criteria. Using the SUMPRODUCT Function In Open Office Calc, the SUMPRODUCT function offers a powerful way to add up columns or rows of numbers while performing calculations based on specific criteria. This function allows you to multiply corresponding values from multiple ranges and then sum up the results. To use the SUMPRODUCT function in Calc: 1. Select the cell where you want the sum to appear. 2. Type the equals sign (=) to start a formula. 3. Enter “SUMPRODUCT(” in the formula bar. 4. Specify the ranges or arrays you want to multiply and add up. 5. Closing the formula with a parenthesis “)”. 6. Press Enter to calculate the sum. The SUMPRODUCT function in Calc allows you to add up columns or rows while applying specific criteria or conditions. You can multiply corresponding values from different ranges and then sum up the results in a single cell. For example, let’s say you have two columns, A and B, and you want to add up the product of their values only if the value in column B is greater than 10. You can use the formula “=SUMPRODUCT(A1:A10 * (B1:B10 > 10))”. This will multiply the corresponding values in columns A and B and then sum them up if the condition (B > 10) is met. By using the SUMPRODUCT function, you can perform customized calculations while adding up columns or rows. This function enables you to apply specific conditions and criteria, giving you more control over the calculations and results. The SUMPRODUCT function can be particularly useful when you need to perform complex calculations based on specific conditions. It allows you to aggregate data in a flexible and efficient manner, ensuring accurate sum calculations. Next, let’s explore another method in Calc that simplifies the process of adding up columns or rows by using the Function Wizard. Using the Function Wizard to Add up Columns or Rows In Open Office Calc, the Function Wizard provides a user-friendly interface that simplifies the process of adding up columns or rows of numbers. This tool guides you through the selection of the appropriate function, range, and criteria, making it easier to perform calculations accurately. To use the Function Wizard in Calc: 1. Select the cell where you want the sum to appear. 2. Click on the Function Wizard button Function Wizard button in the toolbar, or use the shortcut Ctrl + F2. 3. The Function Wizard dialog box will appear on the right side of the screen. 4. Select the desired function category from the list, such as Sum or Math. 5. Choose the specific function that fits your calculation requirements, for example, SUM. 6. Select the range of cells you want to add up. 7. Specify any additional criteria or conditions if needed. 8. Click OK to apply the function and calculate the sum. The Function Wizard offers a wide range of built-in functions to choose from, providing flexibility and functionality for various calculations. It assists you in selecting the appropriate function, choosing the correct range, and incorporating criteria to meet your specific needs. With the Function Wizard, you can easily add up columns or rows of numbers while performing additional calculations or applying specific conditions. It streamlines the process and reduces the chances of errors, ensuring accurate and efficient calculations. Utilizing the Function Wizard can be particularly beneficial when working with complex data sets that require specific calculations or conditions. It saves you time and effort by automatically guiding you through the steps necessary to add up columns or rows accurately. Next, we will explore some helpful tips and tricks that can enhance your efficiency when adding up numbers in Open Office Calc. Tips and Tricks for Efficiently Adding up Numbers in Open Office Calc Adding up numbers in Open Office Calc can be made even easier and more efficient with a few handy tips and tricks. These techniques will help you save time and improve accuracy when performing calculations in your spreadsheets. 1. Use absolute references: When adding up columns or rows that need to remain constant when copying the formula to other cells, use absolute references. To do this, add a dollar sign ($) before the column letter and row number of the cell reference. For example, $A$1 will remain fixed when copying the formula. 2. Utilize keyboard shortcuts: Take advantage of keyboard shortcuts to speed up your calculation process. For instance, use Ctrl + D to copy the formula down a column or Ctrl + R to copy the formula across a row. 3. Exclude error values: If you want to exclude cells with error values from the sum, you can use the SUMIF function. Specify the error value as the criteria to exclude those cells from the calculation. 4. Use named ranges: Assign names to specific ranges of cells to make your formulas more readable and manageable. This can be especially helpful when working with large datasets. 5. Take advantage of range selection: When selecting a range, you can hold the Shift key and use the arrow keys to quickly expand or contract the range. This makes it easy to adjust the range without manually selecting each cell. 6. Utilize the status bar: The status bar at the bottom of the Calc window provides helpful information about selected cells, including the sum. Simply highlight the range, and the sum will appear in the status bar. 7. Sort your data: Before adding up columns or rows, consider sorting the data to group similar values together. This can make it easier to identify patterns and ensure accurate calculations. 8. Use autofilter: Applying autofilter allows you to filter out specific values or criteria and then calculate the sum of the visible cells only. This can be helpful when working with large datasets that require selective calculations. By implementing these tips and tricks, you can streamline your workflow and perform calculations more efficiently in Open Office Calc. These techniques will enhance your productivity and accuracy when adding up columns or rows of numbers in your spreadsheets.
ESSENTIALAI-STEM
File Handling Real Application in C# By  Today ,i am going to make a Real Application in File Handling Using C#.You can use this Application to anywhere in your projects.All Real Time Application are made on the behalf  of this small Application. File Handling Application are mostly used in Software ,website and Automation etc. You can download full Application from bottom and Run  this on your system using Visual studio . This Application includes following features which is given below: • How to Find Logical Drives in Your System and Find Total and free space in selected Drive using C# • How to Create New Directory in your System Drive using C#. • How to Create Sub Directory in your system drives in Directory using C#. • How to Show Directory's File Details using C# language. • How to Copy Directory From One Drive To Another Drive Using C#. • How to Write contents in File using C#. • How to Read File from system using C#. • How to Find (Search)  text data from File using C#. • How to Append Contents to the Existing File using C#. • How to Rename File Name in your system using C#. • How to Replace Old Value to New Value from your Existing file  using C#. Full Application screenshot is given below: see it: There are some steps please follow one by one to understand the whole File Handling concepts. Step :1 First open your visual studio -->open Windows Forms Application -->drag and drop controls to the form as given below: Step :2 Now Double click on Show Your system Drive Details  Button  , comboBox  and Write the following code which is given below: using System; using System.IO; using System.Windows.Forms; namespace File_Handling_Application { public partial class Form1 : Form { public Form1() { InitializeComponent(); } private void button1_Click(object sender, EventArgs e) { try { int i; String[] strd = Directory.GetLogicalDrives(); for (i = 0; i < strd.Length; i++) { comboBox1.Items.Add(strd[i]); } } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void comboBox1_SelectedIndexChanged(object sender, EventArgs e) { try { String val = comboBox1.SelectedItem.ToString(); System.IO.DriveInfo dinfo = new System.IO.DriveInfo(val); textBox1.Text = "your selected drive is:" + val + "\n Total Size of Drive is:" + dinfo.TotalSize + "\n Available Free space in Drive:" + dinfo.AvailableFreeSpace; } catch (Exception ram) { MessageBox.Show(ram.Message); } } } } Step :3 Now Run the Program(press F5) ,click on Button and select drive from comboBox. output: Step :4 Now Drag and drop controls as given below: see it: Step :5 Now double click on Buttons and write the following codes which is given below: private void button2_Click(object sender, EventArgs e) { try { if (!Directory.Exists(textBox2.Text)) { Directory.CreateDirectory(textBox2.Text); MessageBox.Show("Directory created"); } else { MessageBox.Show("Please Enter correct directory path and File name"); } } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void button3_Click(object sender, EventArgs e) { try { String path = textBox2.Text; System.IO.DirectoryInfo sudir = new DirectoryInfo(textBox2.Text); String subname = textBox3.Text; sudir.CreateSubdirectory(subname); MessageBox.Show("SubDirectory has successfully created"); } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void button4_Click(object sender, EventArgs e) { try { String path = textBox2.Text; DirectoryInfo dinfo = new DirectoryInfo(path); if (dinfo.Exists) { DirectoryInfo[] subdir = dinfo.GetDirectories(); foreach (DirectoryInfo s in subdir) { comboBox2.Items.Add(s); } FileInfo[] finfo = dinfo.GetFiles("*"); foreach (FileInfo f in finfo) { comboBox2.Items.Add(f); } } else { MessageBox.Show("Directory does not Exist,Please enter valid directory path and name"); } } catch (Exception ram) { MessageBox.Show(ram.Message); } } Step :6 Now Run the program and create Directory,Sub directory and show Directory and files one by one. See your drive, Directory is created or not. Output: Step :7 Now Again drag and drop controls as shown below: Step :7 Now Double click on Copy directory Button and write the following codes. see it: private void button5_Click(object sender, EventArgs e) { try { DirectoryInfo srcdir = new DirectoryInfo(textBox4.Text); DirectoryInfo destdir = new DirectoryInfo(textBox5.Text); CopyDirectory(srcdir, destdir); } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void CopyDirectory(DirectoryInfo srcdir, DirectoryInfo destdir) { try { if (!destdir.Exists) { destdir.Create(); FileInfo[] finfo = srcdir.GetFiles(); foreach (FileInfo f in finfo) { f.CopyTo(Path.Combine(destdir.FullName, f.Name)); } DirectoryInfo[] dinfo = srcdir.GetDirectories(); foreach (DirectoryInfo d in dinfo) { String dest = Path.Combine(destdir.FullName, d.Name); CopyDirectory(d, new DirectoryInfo(dest)); } MessageBox.Show("Directory has Copied successfully to another Drive"); } else { MessageBox.Show("Please enter valid path and File name"); } } catch (Exception ram) { MessageBox.Show(ram.Message); } } Step :8 Now Run the Program (press F5) Step :9 Now drag and drop controls on the Form as shown below: see it: Step :10 Now Double Click on Write,Read,Find and Append Button and Write the following code:- private void button6_Click(object sender, EventArgs e) { try { FileStream fs = new FileStream(textBox6.Text, FileMode.Open, FileAccess.Read); StreamReader sr = new StreamReader(fs); String str = sr.ReadToEnd(); int i = (str.IndexOf(textBox9.Text, 0)); if (i > -1) { MessageBox.Show("This word is exist in the file"); } else { MessageBox.Show("This word is not exist in the file try another words"); } } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void button7_Click(object sender, EventArgs e) { try { FileStream fs = new FileStream(textBox6.Text, FileMode.Open, FileAccess.Read); StreamReader sr = new StreamReader(fs); textBox8.Text = sr.ReadToEnd(); fs.Close(); } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void button8_Click(object sender, EventArgs e) { try { FileStream fs = new FileStream(textBox6.Text, FileMode.Create, FileAccess.Write); StreamWriter sw = new StreamWriter(fs); sw.WriteLine(textBox7.Text); sw.Flush(); fs.Close(); MessageBox.Show("Content is written in file successfully"); } catch (Exception ram) { MessageBox.Show(ram.Message); } } private void button9_Click(object sender, EventArgs e) { try { String str = textBox6.Text; StreamWriter sw = File.AppendText(str); sw.WriteLine(textBox10.Text); sw.Close(); MessageBox.Show("File contents appended successfully"); } catch (Exception ram) { MessageBox.Show(ram.Message); } } Step :11 Now Run the Program(press F5) and Fill the required field which is as shown below: Output: Step :12  Now Again drag and drop controls on the Form as given below: see it: Step :12 Now double click on Rename ,Replace Button and write the following codes which is given below: private void button10_Click(object sender, EventArgs e) { String src = textBox6.Text; String dest = textBox11.Text; try { FileInfo srcfile = new FileInfo(src); if (srcfile.Exists) { srcfile.MoveTo(dest); MessageBox.Show("File is Renamed successfully"); } else { MessageBox.Show("Entere correct File Name and Path again"); } } catch(Exception ram) { MessageBox.Show(ram.Message); } } private void button11_Click(object sender, EventArgs e) { String text = File.ReadAllText(textBox6.Text); String Value = text.Replace(textBox12.Text, textBox13.Text); File.WriteAllText(textBox6.Text, Value); MessageBox.Show("successfully Replaced"); } Step :13  Now Run the program (press F5) and fill the required field as shown below: see it: Note :-  I have built this Application,you can download whole Application with codes.You can understand this Whole application when you will run this application on your system. For more 1. Collections in c# 2. Generic Collection in C# 3. File and File Info Class I Hope  this is helpful for You. Download whole Attached Application                   Download 3 comments: 1. good ..and how to connect default sql server in visual studio 2010 in win forms applications... ReplyDelete 2. @ SATHISH follow this link:http://www.msdotnet.co.in/2013/04/how-to-solve-problem-to-add-sql.html ReplyDelete Replies 1. @Ramashanker excellent articles. Thanks for all the efforts mate. I need a treeview in master page and want to retain its expanded state if any node is clicked or any postback from the content page. Can you please help me out in this? Delete Powered by Blogger.
ESSENTIALAI-STEM
16 Is there a way to see how many of the questions I voted to close have actually been closed - and further on how many of the closed ones have later been deleted? I've tried those two queries, but both return 0 as a result (but I've voted to close quite a lot and there are actually closed ones... ) select count(Posts.Id) from Posts inner join Votes on Posts.Id = Votes.PostId where Votes.UserId = '3993662' and Votes.VoteTypeId = 6 and Posts.ClosedDate is not null; select count(PostFeedback.Id) from PostFeedback inner join Votes on PostFeedback.PostId = Votes.PostId where Votes.UserId = '3993662' and Votes.VoteTypeId = 6; 1 Answer 1 13 You can only partially get that data if the question was actually closed because at that moment the posthistory table stores a row with posthistorytypeid = 10 and records in the text column the voters. The content is a JSON structure. See for the explanation of the JSON my MSE answer. The following query shows the questions that have been closed by you successfully and the current state of the question. select ph.postid as [Post Link] , ph.creationdate [was closed at] , case when p.closeddate is null then 'now open' else 'still closed' end [current state] from posthistory ph left outer join posts p on p.id = ph.postid where posthistorytypeid = 10 and text like '%"Id":' + cast(##userid:int## as nvarchar) + ',%' order by ph.creationdate You can't query for questions you cast a close vote on but didn't make it to get the question actually closed. That data is not in the public schema. 6 • You could instead infer from the close votes casted from your profile stackoverflow.com/users/current?tab=votes&sort=closure – Braiam Mar 17, 2017 at 10:56 • @Teemu you sure you are looking at the closure tab? – Braiam Mar 17, 2017 at 13:25 • @Braiam Hmm... actually no. You're right, the own deleted answers are listed in the deletion tab. – Teemu Mar 17, 2017 at 15:02 • @Braiam any way to filter the list of your profile to get directly the list of questions that didn't get closed? – Cœur Mar 18, 2017 at 4:05 • 1 @Cœur nope, you'll need to write a userscript to scrape your profile/actions/votes page – rene Mar 18, 2017 at 6:14 • @Cœur it says so in the very same title. Look for [on hold] [closed] – Braiam Mar 18, 2017 at 13:46 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
ESSENTIALAI-STEM
David Schenk Jacobus David Schenk Jacobus (January 20, 1862 – February 11, 1955) was an American mechanical engineer, head of the Engineering Department of Babcock & Wilcox, inventor and educator, who served as president of the American Society of Mechanical Engineers in the year 1916–17. Biography Jacobus was born in Ridgefield, New Jersey as son of Nicholas Jacobus and Sarah Catharine Jacobus. His father worked at the family business, D. Jacobus & Son, manufacturers, of New York City. After private school and Stevens high school, he attended the Stevens Institute of Technology, where he graduated in 1884. After graduation Jacobus made his career in industry, working his way up to head of the Engineering Department of Babcock & Wilcox. At the Stevens Institute of Technology he became a trustee and special lecturer in experimental engineering. Jacobus was awarded an honorary degree of Doctor of Engineering (Dr.Eng.) by the Stevens Institute of Technology in 1906. He was president of the ASRE American Society of Refrigerating Engineers in 1907–07, now part of the ASHRAE, and served member of its first board of directors. He also served as president of the American Society of Mechanical Engineers in the year 1916–17, and was elected Honorary Member of the ASME in 1934. Selected publications * D.S. Jacobus. Latest developments in compressed air-motors for tramways. New York, 1890. Patents, a selection * D.S. Jacobus Patent US1320059 - Furnace-wall, 1919. * D.S. Jacobus Patent US1341213 - Steam-boiler economizer and method of operating same, 1920. * D.S. Jacobus Patent US1365321 - Underfeed-stoker boiler, 1921. * D.S. Jacobus Patent US2047633 - Pressure vessel and method of making the same, 1936. * D.S. Jacobus Patent US2209974 - Fluid heat exchange apparatus, 1940.
WIKI
Shigashi Shigashi (志賀氏) (-d.1587) was a Japanese noble lady and Japanese warrior from the Sengoku period. Shigashi means the lady from Shiga clan and her real name is unknown. She was the wife of Bekki Shigetsura (戸次鎮連) the retainer of Ōtomo clan, the nephew and the son-in-law of famed samurai Bekki Akitsura a.k.a. Tachibana Dōsetsu. She is best known for her role during conflicts between the Shimazu clan and the Ōtomo clan in Kyushu. Biography Shigashi was the daughter of the Ōtomo retainer Shiga Chikamori(志賀親守). Her husband, Shigetsura was the Bekki clan head after his father-in-low Bekki Akitsura once retired. Later, Akitsura inherited the headship of Tachibana clan as Tachibana Dōsetsu. Shigashi was the sister of Shiga Chikatsugu, a retainer of the Otomo clan. When the army of Shimazu clan approached Ōtomo land during the Kyushu campaign, Shigetsura and some retainers betrayed Ōtomo clan and draw the enemy into their castles. Ōtomo clan ran into difficulty because the enemy's base suddenly appeared in own land. Unlike her husband, Shigashi and her son, Bekki Munetsune(戸次統常) was still loyal to Ōtomo clan. Shigashi was said to be skilled military commander and dispatched troops to the betrayed retainer's castles and defeated them. One night, she encouraged her son to clear Bekki's name with defeating Shimazu army. She has another two young siblings sleeping by the side of her. She stabbed them to death with her short katana, because she had a fear that Munetsune will worry about his family during the battle. Then she suddenly departed for the Shimazu base. After killing many soldiers, she fired the castle and committed suicide. Touched by his mother's bravely, Munetsune fought valiantly and killed by Shimazu defending Tsuruga Castle (鶴賀城) during the Battle of Hetsugigawa at the age 22.
WIKI
The Effectiveness of Sedentary Behaviour Interventions for Reducing Body Mass Index in Children and Adolescents: Systematic Review and Meta-analysis Liane Azevedo, Jonathan Ling, Istvan Soos, Shannon Robalino, Louisa Ells Research output: Contribution to journalArticlepeer-review 230 Downloads (Pure) Abstract Intervention studies have been undertaken to reduce sedentary behaviour (SB) and thereby potentially ameliorate unhealthy weight gain in children and adolescents. We synthesised evidence and quantified the effects of SB interventions (single or multiple components) on body mass index (BMI) or BMI z‐score in this population. Publications up to March 2015 were located through electronic searches. Inclusion criteria were interventions targeting SB in children that had a control group and objective measures of weight and height. Mean change in BMI or BMI z‐score from baseline to post‐intervention were quantified for intervention and control groups and meta‐analyzed using a random effects model. The pooled mean reduction in BMI and BMI z‐score was significant but very small (standardized mean difference = −0.060, 95% confidence interval: −0.098 to −0.022). However, the pooled estimate was substantially greater for an overweight or obese population (standardized mean difference = −0.255, 95% confidence interval: −0.400 to −0.109). Multicomponent interventions (SB and other behaviours) delivered to children from 5 to 12 years old in a non‐educational setting appear to favour BMI reduction. In summary, SB interventions are associated with very small improvement in BMI in mixed‐weight populations. However, SB interventions should be part of multicomponent interventions for treating obese children. Original languageEnglish Pages (from-to)- JournalObesity Reviews DOIs Publication statusPublished - 21 Apr 2016 Fingerprint Dive into the research topics of 'The Effectiveness of Sedentary Behaviour Interventions for Reducing Body Mass Index in Children and Adolescents: Systematic Review and Meta-analysis'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
CoTURN configuration# Install and setup coTURN as TURN server# It is recommended to install the latest coTURN version; at the very minimum coTURN 4.5.0.8 should be used. In previous versions there is a bug that causes the IPv6 UDP sockets created by coTURN not to be freed. Due to this the turn process ends not being able to open new ports and thus not being able to serve new connections. Moreover, when that happens, even if there are no connections a high CPU load will be caused by the turn process. Therefore, if you can not install coTURN 4.5.0.8 or a later version you should restart the turn process periodically to work around that issue. 1. Download and install# 2. Make coturn run as daemon on startup# • On Debian and Ubuntu you just need to enable the deployed sysvinit service by adjusting the related environment variable: sudo sed -i '/TURNSERVER_ENABLED/c\TURNSERVER_ENABLED=1' /etc/default/coturn • Since Debian Buster and Ubuntu disco the package ships a systemd unit, which does not use /etc/default/coturn but is enabled automatically on installation. To check whether a systemd unit is available: ls -l /lib/systemd/system/coturn.service • If you installed coTURN manually, you may want to create a sysvinit service or systemd unit, or use another method to run the following during boot: /path/to/turnserver -c /path/to/turnserver.conf -o • -o starts the server in daemon mode, -c defines the path to the config file. • There is also an official example available at https://github.com/coturn/coturn/blob/master/examples/etc/coturn.service Running coTURN on privileged ports# On some GNU/Linux distributions (for example, Ubuntu Focal and later) when coTURN is installed from the official package the coturn service is executed as an unprivileged user like turnserver. Due to this by default coTURN can not use privileged ports, like port 443. Depending on the system configuration Linux kernel capabilities could be used to overcome this limitation. Capabilities can be associated with executable files using setcap, so you could allow the /usr/bin/turnserver executable to bind sockets to privileged ports with: setcap cap_net_bind_service=+ep /usr/bin/turnserver Alternatively, if the system configuration does not allow to set the capability, or if the coturn process needs to access files only readable by root like an SSL certificate for TLS connections, you could configure the coturn service to be executed by root instead of the unprivileged user by executing: systemctl edit coturn and then setting the following configuration, which will override the default one: [Service] User=root Group=root 3. Configure turnserver.conf for usage with Nextcloud Talk# • Next you need to adjust the coTURN configuration file to work with Nextcloud Talk. • Choose the listening port (default is 3478) and an authentication secret, where a random hex is recommended openssl rand -hex 32 • Then uncomment/edit the following settings accordingly: listening-port=<yourChosenPortNumber> fingerprint lt-cred-mech # Only on coTURN below v4.5.0.8! use-auth-secret static-auth-secret=<yourChosen/GeneratedSecret> realm=your.domain.org total-quota=0 bps-capacity=0 stale-nonce no-loopback-peers # Only on coTURN below v4.5.1.0! no-multicast-peers • Support for TLS connections to the TURN server has been added in Talk 11. In some cases clients can be behind very restrictive firewalls that only allow TLS connections; in those cases the clients would be able to connect with other clients or the High Performance Backend only through a TURN server and a TLS connection. However, please note that TLS connections do not provide any additional security, as media streams are always end-to-end (When the High Performance Backend is used the High Performance Backend is one of the ends; in that case the media streams are not end-to-end encrypted between the participants but only between participants and the High Performance Backend) encrypted in WebRTC; enabling TLS is just a matter of providing the maximum compatibility. Also note that even with TURN over TLS a client may not be able to connect with the TURN server if the firewall performs deep packet inspection and drops packets to port 443 that are not really HTTPS packets. This would be a corner case, though, as given that the connection is encrypted in order to inspect the packets that means that the firewall acts as a man-in-the-middle and the connection is not actually encrypted end-to-end. There is nothing that can be done in that case, but it should be rather uncommon. In order to use TLS connections to the TURN server the TURN server requires an SSL certificate and, therefore, a domain. The path to the certificate file must be set in the cert parameter, and the private key file must be set in the pkey file. Besides that in Talk settings you must set the TURN server scheme as turns: or turn: and turns:. Note that, even if TLS provides the maximum compatibility, using a domain can cause problems with Firefox on a very specific scenario: currently Firefox does not perform DNS requests through HTTP tunnels, so even if the WebRTC connection would work through the TURN server the TURN server may not be reachable. • The recommended listening port is port 443, even if only turn: but not turns: is used. In some cases firewalls restrict connections only to port 443, but they do not actually check whether the connection is a TLS connection or not. Nevertheless, as mentioned above using both turn: and turns: is recommended for maximum compatibility. • The total-quota parameter limits the number of allowed simultaneous connections to the TURN server. Along with max-bps and bps-capacity it can be used to limit the effects of a DoS attack against the TURN server. The value of 0 shown above means unlimited; if a connection limit is desired it should be adjusted depending on your specific setup. Please note that the number of allowed simultaneous connections limited by total-quota are not only fully established connections, but also the connections being tested during the negotiation phase used to establish the actual connection. During the negotiation phase each peer generates several candidates (an IP address and port) that can be used to establish a connection with that peer. Then the peers try to establish a connection between them with different candidate combinations until a valid one is found. If there is a TURN server, then the client will connect to the TURN server too, and it will generate additional candidates with the IP address of the TURN server (the so-called "relay" candidates). Each of those relay candidates will try to connect to the candidates of the other peer, and each of those connection attempts allocates a slot in the available quota of the TURN server. If there are no more available slots "Allocation Quota Reached" message is written to coTURN logs. In most cases the candidates that will be generated, and thus the connections to the TURN server during the negotiation phase, can not be known beforehand. When Janus is used the number of candidate combinations is reduced, as the Janus candidates can be known, but the number of relay candidates that will be generated by the client may still be unknown. For example, it seems that browsers generate one relay candidate for each host candidate. Host candidates are those with the IP address known to the client, so typically there will be one for each network device in the system; in the case of Firefox host candidates are also generated for the IP addresses of local bridge network devices. You should take all that into account if you intend to set a specific value to the total-quota parameter, but for maximum availability an unlimited quota is recommended. • If your TURN server is running not behind a NAT, but with direct www connection and static public IP, than you can limit the IPs it listens at and answers with, by setting those as listening-ip and relay-ip. On larger deployments it is recommended to run your TURN server on a dedicated machine that is directly accessible from the internet. • The following settings can be used to adjust the logging behaviour. On SBCs with SDcards you may want to adjust this, as by default coTURN logs very verbose. The config file explains everything very well: no-stdout-log log-file=... syslog simple-log • sudo systemctl restart coturn or corresponding restart method Disabling UDP or TCP protocols# Unless you have some special need, you should always enable both UDP and TCP protocols in your TURN server, as that provides the maximum compatibility. However, if you must limit the connections from clients to the TURN server through UDP or TCP protocols you can do that by enabling one the following settings, depending on the case: no-udp no-tcp Please note that those settings only limit the protocols from the client to the TURN server. The relayed protocol from the TURN server to the other end (Janus if the High Performance Backend is being used, another client or TURN server if it is not) must be UDP; coTURN provides the setting no-udp-relay to disable the UDP protocol for the relayed connection, but enabling it would cause the TURN server to be unusable in a WebRTC context. Also keep in mind that disabling the UDP protocol from clients to the TURN server with no-udp in practice disables STUN on that server, as neither Janus nor the clients currently support STUN over TCP. TURN server and internal networks# If your TURN server has access to an internal network you should prevent access to the local/internal IPs from the TURN server, except those that are actually needed (like the High Performance Backend if you are using it) by setting the denied-peer-ip and allowed-peer-ip parameters. For example: allowed-peer-ip={IP_ADDRESS_OF_THE_HIGH_PERFORMANCE_BACKEND} denied-peer-ip=0.0.0.0-0.255.255.255 denied-peer-ip=10.0.0.0-10.255.255.255 denied-peer-ip=100.64.0.0-100.127.255.255 denied-peer-ip=127.0.0.0-127.255.255.255 denied-peer-ip=169.254.0.0-169.254.255.255 denied-peer-ip=172.16.0.0-172.31.255.255 denied-peer-ip=192.0.0.0-192.0.0.255 denied-peer-ip=192.0.2.0-192.0.2.255 denied-peer-ip=192.88.99.0-192.88.99.255 denied-peer-ip=192.168.0.0-192.168.255.255 denied-peer-ip=198.18.0.0-198.19.255.255 denied-peer-ip=198.51.100.0-198.51.100.255 denied-peer-ip=203.0.113.0-203.0.113.255 denied-peer-ip=240.0.0.0-255.255.255.255 Otherwise, a malicious user could access services in that internal network through your TURN server. Alternatively you could of course prevent access to that internal network from the TURN server by means of a firewall. Continue with the integration into Nextcloud Talk# Now you can go back to the TURN overview page.
ESSENTIALAI-STEM
Talk:Alpha Magnetic Spectrometer Possible Copyvio This content appears to be coppied from http://cyclo.mit.edu/~bmonreal/whatisams.html but the site is down so I can't check the copyright info. Here is Google's cache if anyone is interested in investigating. --Apyule 09:42, 18 October 2006 (UTC) * Here is the archive.org cache too. --Apyule 09:51, 18 October 2006 (UTC) Information on mountpoint and other technical data of AMS-02 http://ams-02project.jsc.nasa.gov/Documents/SDP/Section%205-4.pdf --TheDJ (talk • contribs) 15:25, 2 December 2007 (UTC) * I just added a note that a lot of this text is taken from the NASA page. That needs to be stated! 018 (talk) 00:42, 26 April 2010 (UTC) Ultrahigh energy cosmic rays I removed a reference to AMS detecting ultrahigh energy cosmic rays, which it cannot (its acceptance is far too small by factors of millions or more). The original comment was most likely talking about high-energy gamma rays (1-300 GeV for AMS). UHECRs are particles with energies of EeV or more, and are impossible to detect directly due to their low flux (1/square km/century and lower). —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:36, 19 November 2008 (UTC) Edit of error I found an error stating that the flight was indeed a go. I changed the wording to indicate it may noy happen. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:23, 3 July 2008 (UTC) How it works Nice to have details about what it does, but it would be nice also to know how it works. Thanks. Hektor (talk) 07:57, 12 August 2009 (UTC) * We're working on it! Watch this space... Aldebaran66 (talk) 07:06, 7 October 2009 (UTC) Image of prelaunch processing of AMS-01. Thought this might come in handy. Colds7ream (talk) 18:09, 21 September 2009 (UTC) Scientific goals too confident? AMS will provide a definitive answer on the existence of this extraordinary matter. -- Isn't this a little bit too confident? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:13, 9 October 2009 (UTC) * The claim from the NASA fact sheet has been toned down. How they can be sure of a definitive answer if nothing is detected by this experiment? "Absence of proof" is not necessarily "proof of absence". Aldebaran66 (talk) 18:31, 9 October 2009 (UTC) New schedule & magnet? I see we are now rescheduled for launch in November (with luck), with the permanent magnet. I am refraining from editing out the obsolete and now incorrect bits, because I think other editors have worked on this material and are better qualified, but I thought this might be a good moment to open a discussion of plans for updating and improving the article. I also would be happy to see more detailed information on how the AMS works, and what it can do. Cheers, Wwheaton (talk) 22:04, 26 April 2010 (UTC) Yes, I agree. The wording reads like puffery. They've spend $1.5 Billion on this project and the cryogenic system that was supposed to be critical for mission success has been removed. Extended mission section I'm not really sure what to do with the "Extended mission" section. It's obviously out of date, so I've at least marked it as such, for what little good that does. I considered removing it completely, but I wanted to start this talk page discussion first. Thoughts? — V = IR (Talk&thinsp;•&thinsp;Contribs) 01:47, 2 May 2011 (UTC) AMS-02 ready for the ISS....just a thought that I have had about this great experiment! Hello people. I am not a man of physics(but a bit into it!), but it keeps me interested to think about new projects and scientific things of the new century! so please, keep me informed about the docking of the AMS-02 to the ISS. My thought: Is it really pre-tested for safety of the ISS, how such a big magnetic-field of the AMS-02 reacts to our earths-magnetic-field ? -> how big is the magnetic-field, which already is generated by the ISS without the AMS-02??? I follow the last 2 years, whats going on, with catastrophy's -volcanoEruption 2 big earthquakes....and maybe everytime around this catastrophic happenings I realize, that at CERN, the superfluidhelium-cooling is on, and test are done..probably the whole system of cern, put the full power into the test-tube-magnet-fields. did we cause eventually some irreparable changes in earth-tektonic-magnetic behaviour. Or was the quake of Japan just normal, or maybe because of the big sun-flares last summer. -> its just a thought...but I think it could be elementary...chaos-theory should be in point of view, too. maybe my thought is stupid, but i am just curious about -answers... magnetism, gravitation, rotation even the ecliptic structure of our milky way, maybe could be harmed. At least I wanna say, that the ISS is the most wonderful thing the humankind generated! I wanna have this station for long time running....I am thinking, that there should be 2 smaller stations more(like appartments for the geo-nauts!) out there rounding earth in orbit...-as long, as all the satellites which are already curving there allow this... And maybe there comes a time, when we can put up a small Armada of orbital-gliders, settled with LaserBeam-cannons, to protect all build up there, and maybe more on ground earth-in fact some Asteroid moves into earth-collision-way. kind to get information about all tests. AMS 1 was there with the same magnet. hopefully this magnet damages nothing on the ISS. (Stefan_Ulrich) —Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:04, 5 May 2011 (UTC) What results Can we have something about the data recording, analysis and reporting ? What publications or posters so far ? When are various results expected ? - Rod57 (talk) 04:20, 29 January 2012 (UTC) * Paper due March 2013. - Rod57 (talk) 04:52, 19 February 2013 (UTC) The paper is out. PRL 110, 141102 (2013). Summary at APS. Cesiumfrog (talk) 22:26, 3 April 2013 (UTC) Wouldn't it make sense to say what the results in that last paragraph are,and what they mean? Who won??? S — Preceding unsigned comment added by <IP_ADDRESS> (talk) 02:47, 10 November 2014 (UTC) Contradiction The last two paragraphs of the AMS-02 section give conflicting reasons for the choice of the permanent magnet. Was the heat anomaly the prime factor, the extended lifetime, or both? » Swpbτ • ¢ 20:00, 25 July 2012 (UTC) Megabits per second http://www.ams02.org/2011/06/happily-collecting-data-from-the-cern-pocc/ claims 10 MBit/s. We claim 2 MBit/s. --Ysangkok (talk) 17:14, 1 June 2013 (UTC) Year of first proposal. I've just found a document on the NTRS dated June 27, 1978 discussing the possibility of putting a Magnetic Spectrometer on a space shuttle. It might be worth incorporating this information into the main article. The document is entitled Experiment Definition and Integration Study for the Accommodation of Magnetic Spectrometer Payload on Spacelab/Shuttle Missions, Final Report and can be accessed directly |here Graham1973 (talk) 01:01, 23 January 2014 (UTC) Data rate? In the Specifications section, it says both "Data rate to ground: 2 Mbit/s (typical, average)" and "This data is filtered and compressed to about 300 kbit/s for download to the operation center POCC at CERN." Which is it, 2 or 0.3 Mbit/s? DKMell (talk) 18:37, 30 April 2024 (UTC) External links modified Hello fellow Wikipedians, I have just modified 5 external links on Alpha Magnetic Spectrometer. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Corrected formatting/usage for http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=space&id=news%2Fasd%2F2010%2F04%2F22%2F07.xml * Added archive https://web.archive.org/web/20081019025713/http://blogs.orlandosentinel.com/news_space_thewritestuff/2008/10/bush-signs-nasa.html to http://blogs.orlandosentinel.com/news_space_thewritestuff/2008/10/bush-signs-nasa.html * Added archive https://web.archive.org/web/20090816041406/http://www.nasa.gov/mission_pages/station/science/experiments/AMS-02.html to http://www.nasa.gov/mission_pages/station/science/experiments/AMS-02.html * Added archive https://web.archive.org/web/20130407040617/http://press.web.cern.ch/backgrounders/first-result-ams-experiment to http://press.web.cern.ch/backgrounders/first-result-ams-experiment * Added archive https://web.archive.org/web/20090816041406/http://www.nasa.gov/mission_pages/station/science/experiments/AMS-02.html to http://www.nasa.gov/mission_pages/station/science/experiments/AMS-02.html Cheers.— InternetArchiveBot (Report bug) 19:22, 2 July 2017 (UTC) External links modified Hello fellow Wikipedians, I have just modified 2 external links on Alpha Magnetic Spectrometer. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20100527142718/http://science.house.gov/press/PRArticle.aspx?NewsID=2309 to http://science.house.gov/press/PRArticle.aspx?NewsID=2309 * Added archive https://web.archive.org/web/20100209032914/http://cyclo.mit.edu/~bmonreal/frames.det.html to http://cyclo.mit.edu/~bmonreal/frames.det.html Cheers.— InternetArchiveBot (Report bug) 07:48, 8 November 2017 (UTC)
WIKI
Peds Card Set Information Author: ch.tyrrell ID: 177949 Filename: Peds Updated: 2012-10-15 22:42:54 Tags: Peds CF Folders: Description: Peds CF Show Answers: Home > Flashcards > Print Preview The flashcards below were created by user ch.tyrrell on FreezingBlue Flashcards. What would you like to do? 1. What are the regulatory functions of the cystic fibrosis transmembrane conductance regulator (CFTR)? • 1. ion transport  (chloride, bicarbonate, sodium) • 2. pulmonary inflammation • 3. bacterial adherence • 4. mucus rheology 2. What secondary messerger is the CFTR affected by? cAMP 3. CFTR allows ions to follow what type of gradient? electrochemical 4. What occurs in a Class I CFTR defect? protein not synthesized 5. What occurs in a Class II CFTR defect? • 1. immature CFTR synthesized • 2. most common mutation - ΔF508 6. What occurs in a Class III CFTR defect? • 1. CFTR synthesized and placed in membrane • 2. secondary messenger activation and regulation dysfunctional • 3. most common mutation - G551D 7. What occurs in a Class IV CFTR defect? • 1. CFTR synthesized and placed in membrane • 2. chloride ion flow reduced 8. What occurs in a Class V CFTR defect? CFTR synthesis and processing is partially defective 9. What occurs in a Class VI CFTR defect? • 1. CFTR synthesized and place in membrane • 2. other ion flow reduced 10. What evidence of CFTR dysfunction is required for CF diagnosis?  • 1. Two or more mutations in CFTR • 2. Two or more sweat chloride tests over 60 mmol/L • 3. Abnormal nasal potential difference 11. How is prenatal testing done for CF diagnosis? • 1. parents carry CF trait • 2. echogenic bowel detected on fetal ultrasound 12. In which states are newborns screened for CF and which mutations are screened? • Screened in all 50 states • Screened for the 23 most common mutations 13. What is the sweat chloride test for CF diagnosis? pilocarpine induced sweating 14. What defines an abnormal result in the sweat chloride test (mmol/L)? Abnormal = >60 mmol/L 15. What defines an intermediate result of the sweat chloride test (mmol/L)? • < 6 months of age:  30-59 mmol/L • > 6 months of age:  40-59 mmol/L 16. What is a normal value of the sweat chloride test for CF diagnosis? • < 6 months of age: < 30 mmol/L • > 6 months of age: < 40 mmol/L 17. What is the next step of CF diagnosis after a sweat choride test returns with intermediate results?   DNA testing 18. What does > 2 CFTR mutations indicate? confirmed CF diagnosis 19. What does < 1 CFTR mutation indicate in the sweat test? Questionable CF 20. What must occur if a questionable CF diagnosis occurs? • 1. repeat sweat test or  • 2. expand DNA testing 21. What occurs if a repeat sweat test is > 60 mmol/L? What occurs if a repeat sweat test is < 60 mmol/L? • > 60 mmol/L: confirmed CF • < 60 mmol/L: follow clinically 22. What occurs if an expanded DNA test reveals > 2 CFTR or < 1 CFTR mutation? • > 2 CFTR mutations: confirmed CF • < 1 CFTR mutation: follow clinically 23. What is the gastrointestinal presentation of CF? • 1. meconium ileus • 2. failure to thrive • 3. steatorrhea • 4. edema • 5. hypoproteinemia • 6. anemia • 7. electrolyte variability 24. What are the pancreatic manifestations of CF? • 1. pancreatic insufficiency • 2. CF-related diabetes 25. How many patients will experience pancreatic insufficiency? 85% 26. What happens to pancreatic function with age? Pancreated functions decrease with age 27. Which classes of CF are correlated with genotype? • Class I • Class II 28. When does duct obstruction begin as a pancreatic insufficiency in CF? May begin in 2nd trimester 29. What level of the fecal elastase testing indicates insufficiency? Less than 200 mcg/gram 30. What are the general principles associated with pancreatic enzyme replacement therapy (PERT)? • 1. enzymes: lipase, protease, amylase • 2. dosed based on lipase units per weight or fat intake • 3. coating dissolves in alkaline environments 31. What is the weight-based dosing of PERT? • < 4yo: 1000 units of lipase per kg per meal • > 4yo: 500 units of lipase per kg per meal • maximum of 2500 units of lipase per kg per meal • doses given with fatty snacks 32. What is the fat-based dosing for PERT? • 1. 2000 units of lipase per 120mL of feedings • 2. maximum of 2500 units of lipase per kg per feeding • 3. maximum daily dose of 10,000 unis of lipase per kig 33. What vitamin replacement is necessary for PERT? • Start with diagnosis • Fat-soluble vitamin replacement: • Vitamin A • Vitamin D • Vitamin E • Vitamin K 34. What are the risk factors for CF-related diabetes? • advanced age • female • pancreatic insufficiency                                                                                                                            ΔF508 mutation 35. What are the intestinal manifestations of CF? • 1. GERD • 2. Meconium ileus • 3. Distal intestinal obstruction syndrome (DIOS) • 4. Constipation • 5. Intussusception • 6. Small bowel bacterial overgrowth • 7. Rectal prolapse 36. Discuss the pertinant information associated with GERD and CF. • 6-8 times more prevalent in CF patients • Reflux episodes higher than control populations • Esophageal acid exposure higher than controls • -decreased LES tone • -increased intra-abdominal pressure • -hyperinflated lungs • -chest physiotherapy 37. What are the available treatments for GERD associated with CF? • 1. Chest physiotherapy • 2. Proton Pump Inhibitors 38. When should chest physiotherapy for GERD be administered? perform prior to meals 39. What is the dosing of PPI's for the treatment of GERD? • 0.2 - 2 mg/kg/day • 1-2 times daily 40. How often does meconium ileus occur in CF patients? 10% of CF presentations 41. What are the 2 types of classification of meconium ileus? • 1. simple • 2. complex (40%) 42. What are some common problems associated with complex meconium ileus? • 1. perforation • 2. atresia • 3. meconium peritonitis 43. How is meconium ileus diagnosed? confirmed with contrast enema 44. What is DIOS? • 1. common if patient has histor of meconium ileus • 2. no relationships with mutations • 3. acute blockage of the ileum 45. How are complete acute blockages of the ileum (DIOS) cleared? 1. Surgery (complete) 46. How are partial acute blockages of the ileum (DIOS) cleared? • 1. Rehydration • 2. Osmotic laxatives (polyethylene glycol, gastrografin, electrolye solution) 47. What are the GI classifications of CF? • 1. pancreatic manifestations • 2. intestinal manifestations • 3. hepatobiliary 48. What hepatobiliary complications are associated with CF? • 1. biliary cirrhosis • 2. liver disease • 3. neonatal cholestasis 49. What disease does biliary cirrhosis lead to and how is it treated? • Leads to liver disease • Treatment:  Ursodiol 30 mg/kg/day divided twice daily 50. How is liver disease recognized? slight elevations in alkaline phosphatase 51. How is neonatal cholestasis recognized? • 1. history of meconium ileus • 2. prolonged parenteral nutrition • 3. increased risk of liver ccirrhosis • 4. treatment:  ursodiol 30 mg/kg/day divided 2-3 times daily 52. What are the pulmonary presentations of CF? • 1. recurrent cough • 2. persistent cough • 3. prolonged wheezing • 4. recurrent bronchiolitis • 5. produtive cough 53. Discuss reactive airway disease. • 1. Directly related to lunch disease severity • 2. Treatment: bronchodilators • 3. worsening lunch disease: reduction in smooth muscle support system; collapsing muscle worsens obstruction 54. Discuss Chronic pulmonary issues associated with CF. • 1. Chronic airway obstruction  • 2. Bacterial colonization of clogged airways • 3. Chronic medictions What would you like to do? Home > Flashcards > Print Preview
ESSENTIALAI-STEM
Ethiopia’s state-of-the-art commodity exchange - High-tech, low impact ON THE walls of the Ethiopia Commodity Exchange (ECX) in Addis Ababa, the capital, hang glossy black-and-white photographs of provincial market towns and rustic life. For the merchants and brokers striding across its high-tech trading floor they serve as a reminder that the ECX, sub-Saharan Africa’s most modern commodity exchange outside Johannesburg, exists for a simple, practical purpose: to transform Ethiopian agriculture. It has some way to go. By connecting smallholder farmers to global markets, the exchange, launched with a fanfare in 2008, was supposed to help reduce hunger. The hope was it would reduce price volatility and incentivise farmers to plant crops. But staple foods such as haricot beans today account for less than 10% of its trade. Its annual turnover—worth about $1bn—is dominated instead by two export crops, coffee and sesame seeds. In 2015, despite a dire drought, Ethiopia did avoid famine, but the ECX played little role: its maize and wheat contracts had lapsed by then because of concerns that exports would jeopardise domestic food supplies. Cutting out middlemen seems not to have done much for smallholders: studies suggest that the share of international prices received by coffee farmers has barely budged over the past decade. Exporters complain about government price-meddling. Upgrade your inbox and get our Daily Dispatch and Editor's Picks. The ECX’s founder, Eleni Gabre-Madhin, who left the exchange in 2012, worries that momentum has been lost. The exchange remains restricted to simple spot-trading. Futures contracts, which help traders manage price fluctuations, were supposed to be introduced within five years, but are still some way off. In July 2015 the ECX did, however, introduce electronic transactions, now used for almost all trades. Bespoke software is built in-house by Ethiopian engineers. Payments the day after purchase are guaranteed. The ECX can also boast never to have seen a default, in a country known for suicides by indebted farmers whose buyers have welshed. Ethiopia has shown that it is possible for an exchange to prompt the physical infrastructure of commodities markets: the ECX oversaw a burst in warehouse construction. Fledgling exchanges dotted around Africa often visit Addis Ababa to study the ECX. But experts doubt it is a helpful model. The government made it viable by mandating that almost all trade in coffee and some other commodities go through the exchange. This might not be possible elsewhere. A monopoly imposed by fiat makes it more like a state marketing board than an exchange, says Thomas Jayne, an economist at Michigan State University. Another model might be the Agricultural Commodity Exchange for Africa in Malawi, which was set up privately in 2006 at the request of an association of smallholder farmers. But its volumes remain low. And its concentration on staple foods such as maize and soya leaves it vulnerable to the sort of government interventions that can sink exchanges. Trading in staples tends to be politically sensitive in times of food scarcity. Setting up national exchanges may be the wrong approach. The Johannesburg Stock Exchange plans to introduce a regional contract for Zambian white maize later this year. For lucrative export crops like coffee, well-established offshore exchanges may make more sense than starting from scratch at home. Better a functioning exchange somewhere else than a disappointing one on the doorstep.
NEWS-MULTISOURCE
Amaro Sibilla Amaro Sibilla is an Italian liqueur in the Amaro category. It is produced by the Varnelli S.p.A., a distillery in Pievebovigliana, in the Province of Macerata from the Marche region of central north eastern Italy. It was created in 1868 by the herbalist Girolamo Varnelli. According to his recipe, the ingredients are an infusion of herbs and roots from Monti Sibillini made on wood fire, pure honey from Monti Sibillini, and alcohol. These ingredients, once blended, have to be decanted and aged for several months. Nowadays, it is still produced in the same way. During the 19th century, it had success as an anti-malarial drug because it is rich in Gentian and Cinchona Calisaya. It was awarded first in Rome in 1902.
WIKI
Cinnamon Lakeside Colombo Cinnamon Lakeside Colombo, trading as Trans Asia Hotels PLC, is a five-star luxury hotel located in Colombo, Sri Lanka. The hotel is listed on the Colombo Stock Exchange and John Keells Holdings owns a stake of 92% of the company's shares, 48% directly and 43% through its subsidiary Asian Hotels and Properties PLC. Cinnamon Lakeside Colombo has 346 rooms including 20 suites. History The company was incorporated in 1981 as a public limited company. The hotel commenced its operations in 1985 and was originally known as the Ramada Renaissance Hotel. In 1995 the name was changed to Trans Asia Hotel. In 2003, John Keells Holdings acquired a controlling stake of the company and in 2009, the hotel is rebranded as Cinnamon Lakeside Colombo. During the Commonwealth Heads of Government Meeting 2013, some of the heads of State stayed at the hotel with no public access during this period. In 2019, the hotel was ranked 11th of the top 25 properties in Sri Lanka in Tripadvisor's Travellers' Choice Awards. The company is managed as a chain hotel of Cinnamon Hotels & Resorts brand and is a subsidiary of Asian Hotels and Properties PLC while John Keells Holdings is the ultimate parent company. COVID-19 pandemic In January 2021, Cinnamon Hotels & Resorts announced the appointment of Kamal Munasinghe as the General Manager of Cinnamon Grand Colombo and Cinnamon Lakeside Colombo. On March 7, 2021, the health authorities have permitted to resume operations during the COVID-19 pandemic, earlier a few staff members have contracted the virus while off duty. The company launched "Flavours by Cinnamon", an online food ordering platform in April 2021. The Cinnamon Hotels launched the "Meals that Heal" program, a food donation initiative with the help of the Sri Lanka Police. Under this program, the company will distribute 2,000 food packs daily for 14 days to the community the company operates. Amenities The hotel has 346 rooms with 20 suites and eight restaurants: Royal Thai, Long Feng, the Library, ColomBar, Goodies, Pool Bar, and The Lounge. The hotel also houses the largest swimming pool in Colombo, tennis and squash courts and a gymnasium. In 2012, the hotel launched the 8° on the lake, a floating event venue on the Beira Lake. The venue could accommodate 100 guests at a time.
WIKI
Cited 0 times in 65 0 한국인의 임파종에 관한 임상적 병리조직학적 및 조직화학적 연구 Other Titles  Clinical, histopathological and histochemical studies on maligant lymphomas among Koreans  Issue Date 1973 Description 의학과/석사 Abstract [한글] [영문] The malignant lymphoma is a malignant proliferation of the rerticuloendothelial and lymphoid elememts that are in lymphnodes and other lymphoid tissues of spleen, tonsil, small intestine, etc. The clinical picture of this malignant disorder is sometimes so variable, and causes of lymphnode enlargement are so many that the lymphoma has been taken a much importance both clinically and pathologically. Many authors have reported and discussed about the so-called pseudolymphomatous lymphadenitis (Saltstein, 1958 ; Canale and Smith, 1967 ; Hartsick, 1968 ; Rosai and Dorfman, 1969), viral lymphnodes (Evans, 1944 ; Motulsky et al., 1952 ; Stansfeld, 1961) which resemble the malignant lymphomas, early Hodgkin's disease, mild inflammatory reactions and reticular hyperplasias may be defficult or impossible to distinguish from one another (Wills, 1967) in spite of diligent research of pathologists in that field. The classification of the lymphomas has undergone a series of changes over the yearsm and now the one porposed by Rappaport et al. (1956) is widely used as the classification of Lukes et al. (1966) for Hodgkin's disease. There are several reports on lymphomas among Koreans based on clinical aspects but there is very little reports on lymphomas based on pathological aspects, especially the ones which are classified by the Rappaport et al. ?? and Lukes et al. The present study is an attempt to investigate mainly histopathological characteristicsm such as classification of malignant lymphoams, relationship berween histological type of lymphoma, sex, age and location, and to research differential criteria to distinguish the benign lesions from lymphoma of lymphnodes by way of special stainings. Materials and Methods The meterials used in this study consist of 286 cases of malignant lymphoma for 12 years and 8 months from January, 1960 to August, 1972, and 37 cases of benign lesions of the lymphnode. All specimens were fixed in 10% neutral formalin, paraffin embedded blocks were out in 5 micron thickness, and sections were stained by hematoxylin-eosin method, and according to the classification of Rappaport et al. (1956) and Lukes et al. (1966), histopathological studied were done on all cases of lymphoma. In addition, methl-green phronin and Gomori's silver impregnation and 81 cases of lymphoma of lymphnodes to observe the number of plasms cells and the amount end distributed pattern of reticulin fibers in them. For all cases of malignant lymphoma whose clinical records were available, sex, age, chief complaints, durations of disease and hematologic data were reviewed. Results and Summary Clinical and histopathological studies were made on 286 cases of lymphoma, and histochemical studies were performed on 113 cases of excided lymphnodes (benign lesions ; 37, malignant lymphomas ; 81), that were submitted to the Department of Pathology, Yonsei University College of Medicine,during the period of 12 years and 8 months from january, 1960 to August, 1972. 1. The histological types in order of frequency were as follows : reticulum cell sarcoma (53.9%), lymphocytic lymphoma(20.3%), lymphoma, mixed cell type (13.6%), Hodgkin's desease (10.1%) and undertermined (2.1%). 2. The histological types of Hodgkin's disease in order of frequency were as follows : reticular (48.3%), mixed cellularity (27.6%), lymphocytic and / or histiocytic (13.8%) diffuse fibroses (6.9%) and nodular sclerosis (3.4%(. 3. Among 286 cases, 195 cases (68.2%) were male and 91 cases (31.8%) were female.The average age was 37.1 year-old (male : 33.9 years, female 44.9 years). 4. Clicical symptoms in order of frequency were as follows : enlargment of thelymphnode or palpable mass (75.2%), local pain (34.3%), gastrointestinal symptoms(21.2%) and ENT symptoms (14.6%). The duration of chief complaints was mostly within 6 months (78.2%). 5. The locations of malignant lymphomas were as follows : nodal, 143 cases (50.5%) and extranodal, 124 cases (43.4%). Among the nodal group, cervical area was the most common (81.1%), and the nextm axillary (21.7%) and inguinal (10.3%). Among the extra-nodal group, nasopharynx was the most common (27.4%), and the next, tonsil (25.8%) and small intestine(16.9%). 6. Hodgkin's disease showed somewhat bimodal curve in age distributon, was more common in male than other types of lymphoma, and involed gastrointestinal tract most commonly when extranodal in its origin. 7. Except cases of Hodhin's disease, the more the number of Plasma cells in lymphnodes, the more likely the lesion was benign but this was not absolute criterion in deciding the nature of lesions. 8. The amount and distribution pattern of reticulin fibers in lymphnodes gave a considerable aid in some cases to distinguish between benign and malignant but there did not have a great significance in deciding the nature of lesions. In conclusion based on these findings, it can be stated that reticulum cell sarcomas are more common and Hodgkin's disease are less common than western countries. The existing number of plasma cells and the amount and distribution of reticulin fibers could be considerable aid in deciding the nature of lesions of lymphnodes, but could not be the decisive factor. URI http://ir.ymlib.yonsei.ac.kr/handle/22282913/116388 Appears in Collections: 2. 학위논문 > 1. College of Medicine (의과대학) > 석사 사서에게 알리기   feedback Fulltext 교내이용자 서비스로 제공됩니다. Export RIS (EndNote) XLS (Excel) XML qrcode Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Browse
ESSENTIALAI-STEM
He had created all that was in nature and those creations could be admired, but never to be worshipped as gods. Because there was so much work to be done to survive, and the work was divided equally, there was more of a sense of teamwork than one gender dominating the other. The ice age ended around 10, B. Mesopotamia had very little building materials, so they reverted to using mud mesopotamia writing assignment format their main source of construction. The city-states categorized their people into three social levels; the nobles, commoners, and slaves. He was most famous for building the Temple in Jerusalem, which was viewed symbolically as the as the center of their religion. This led to the weakening of the Persian Empire. They had a spiritual belief that the gods were living realities who affected all areas of life. There were walls surrounding and protecting their city-states. Some specific areas that might be examined: The family was very much patriarchal and the husband-father was considered to be the master of his household and all that lived in it. The shift from hunting and gathering to a system of agriculture was the biggest change during this time. Strict and harsh punishment followed to those who disobeyed the Code of Hammurabi. They believed in holy men as their leaders, and called them prophets. Many of the Hebrew beliefs and accounts are derived from their history and traditions which were written in the Hebrew Bible, which Christians refer to as the Old Testament. How to cite this page Choose cite format: Judaism had three important dynamics to it: Several years later Cyrus gained control over the Lydian kingdom. Slaves belonged to those in the palace, who were used in construction and domestic labor. Their various developments and innovations came together to create so much of what the Western civilization is composed of. Along with education, religion was very important to the Sumerians, as they had structured their city-states after a divine model and order. They both had strong attributes and weak ones. Later Mesopotamian civilizations such as the Assyrians and the Babylonians used Sumerian writing. This first essay is very extensive and informative. They were mainly nomadic people that had organized themselves into tribes. That is why there is so much more information to refer to in these times than that of the Paleolithic Age. This literature includes mythology of the Mesopotamian gods, tales of their heroes, poetry, and songs. They were servants to the king that held honored responsibilities in society. As a leader, he took interest in state affairs, encouraged trade, and was responsible for the building of temples, walls of protection, and irrigation canals. He was responsible for increasing the trading opportunities for the Israelites and for broadening the political and military forces. It went from small, simple cultures that were centered on survival, to the development of civilizations. In accordance to the Hebrew tradition there was a drought in Palestine which resulted in the migration to Egypt. The Mesopotamian people produced pottery, wooden textiles, and metal work as well. Saul was the first king of the Israelites, who was able to achieve success with the battle between themselves and the Philistines. Each culture, each idea, each influence all plays into expansion and growth. This observation has caused speculation that the cave paintings were not only a part of their culture, but perhaps even some sort of religious ritual. In fact, some still exist in certain areas of the world, such as France. Marriages were normally arranged by the parents, since marriage occurred at such a young age for the majority of people.Egypt and Mesopotamia - Assignment Example. On In Assignment Sample. 1. Compare and contrast the society and culture of the prehistoric hunter-gatherers to either the Egyptian or the Mesopotamian civilizations. What were the major factors that caused the changes in the way societies functioned? the development of writing, and new forms of. Mesopotamia projects and writing assignments. Read it. Looking Back - Mesopotamia Part 2 - ANGELICSCALLIWAGS This assignment is an essay. The wordcount is limited to words. The word count does not include the. Ancient Egyptian Review in a Bingo Game Format See more. Hands-on activities we used for our third grade world history unit. Cuneiform is one of the world's earliest systems of writing. Invented by the Sumerians, cuneiform used shapes similar to wedges etched into clay tablets to convey messages. The Mesopotamians often. Mesopotamia Writing Assignment Plan and Organize min. Revise and Edit 5 min Reed you writings and luk fur errors Remember, good writing means What do you already know? The Impact of Geography Background: Throughout history, the land has shaped the lives of people living on it. Oldest Writing, Ancient Mesopotamia [School History online Find this Pin and more on Teaching Tools by Jordon Hofman. a funny poem about how writing was invented thousands of years ago in ancient Sumer (Mesopotamia / Iraq). Home Page \ Assignment Sample \ Egypt and Mesopotamia. Egypt and Mesopotamia Essay. A. Pages Words This is just a sample. We will write a custom essay sample on Egypt and Mesopotamia specifically for you for only $ $/page. astronomy, literature and writing also evolved extensively for the people of Mesopotamia. Because.Download
FINEWEB-EDU
Successfully reported this slideshow. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Webdriver.io 1,297 views Published on Automated browser testing with webdriver.io Published in: Technology • Be the first to comment • Be the first to like this Webdriver.io 1. 1. webdriver.io 2. 2. whoami Giovanni Lela CTO @ linkme srl Main background Node.js backend developer 3. 3. What I needed - Test as the user would do - 100% dumb blackbox tests of the web interface - basically user stories acceptance - As easy to use as it gets 4. 4. Secondary objectives Have an easy to learn language so that QA and non hardcore javascript people can use it Do more than just browser automation - also prepare the database, trigger websocket events, prompt for passwords Can run tests on multiple OS/Browser versions and combinations Compatible with mocha / chai Compatible with existing automation scripts (grunt, gulp, whatever) 5. 5. Enter webdriver.io var assert = require('assert'); //OR chai or whatever describe('webdriver.io page', function() { it('should have the right title', function () { browser.url('http://webdriver.io'); var title = browser.getTitle(); assert.equal(title, 'WebdriverIO - Selenium 2.0 javascript bindings for nodejs'); }); }); 1- javascript - node.js 2- mocha 3- a browser object - where does it come from? 4- synchronous code 6. 6. Is this what i need? Testing like a user Yes, it just automates an actual browser with selenium (we’ll get to it) ● we emulate user interaction on the browser and then read the result strait out of the dom ● it as an actual browser not the damn phantomjs (which can still be used) ○ Flexbox compatibility ○ Some configuration / installation issues 7. 7. Ease of use 1- javascript synchronous commands - ok cool no need for performance here 2- lots of selector strategies : ● Css query selector style - browser.click('h2.subheading a'); ● Visible text matching - browser.click('*=I’M A LINK!') ● XPath :/ ● Mobile selectors - yes you heard right 8. 8. Ease of use - wdio test runner npm i -g wdio selenium-standalone ● wdio config sets up thw whole thing for you letting you choose: ○ local test / cloud test (saucelabs, browserstack) ○ test runner (mocha / jasmine / cucumber) - also installas the connector for you ○ test reporter ○ .. and so on ● selenium standalone install and selenium standalone start ● write your tests ● wdio <config file> 9. 9. You can also use it as standalone var webdriverio = require('webdriverio'); var options = {..}; webdriverio .remote(options) .init() .url('http://www.google.com') .getTitle().then(function(title) { console.log('Title was: ' + title); }) .end(); It also has plugins for grunt / gulp 10. 10. Custom commands Unfortunately we cannot add async commands directly in the test but we can define custom commands. browser.addCommand('getOneTimePassword', function async(){ return new Promise((resolve, reject)=>{ rl.question('Your one time password?', (test) => { resolve(test) rl.close() }) }) }) --- const myPass = browser.getOneTimePassword() browser.setValue('input[name="otp"]', stuff) 11. 11. how does this work? ● The testing script ● The selenium webdriver server ● The browser The communication to web driver follows the webdriver protocol https://w3c.github.io/webdriver/webdriver-spec.html test script webdriver browser / mobile app 12. 12. selenium WebDriver protocol POST /wd/hub/session/e1252817-b577-4f21-8041-570fbc727f62/url HTTP/1.1 Connection: keep-alive [...] host: 127.0.0.1:4444 {"url":"http://webdriver.io"} HTTP/1.1 200 OK Date: Sun, 29 May 2016 21:19:53 GMT Content-Type: application/json; charset=utf-8 {"state":"success","sessionId":"e1252817-b577-4f21-8041-570fbc727f62","hCode":836948231,"value": null,"class":"org.openqa.selenium.remote.Response","status":0} 13. 13. Cool stuff I did not know about CSS regression settings ● Define areas within your application that should always look the same ● Use WebdriverIO and WebdriverCSS to write some E2E tests and take screenshots of these areas ● Continue working on your application or website ● After a while rerun the tests ● If desired areas differ from previous taken screenshots an image diff gets generated and you get notified in your tests 14. 14. CSS Regression testing client .init() .url('http://example.com') .webdrivercss('startpage',[ { name: 'header', elem: '#header' }, { name: 'hero', elem: '//*[@id="hero"]/div[2]' } ], function(err, res) { assert.ifError(err); assert.ok(res.header[0].isWithinMisMatchTolerance); assert.ok(res.hero[0].isWithinMisMatchTolerance); }) .end(); 15. 15. Other cool stuff ● Page object support ● Sauce labs support ● Mobile / Appium support var selector = 'new UiSelector().text("Cancel")).className("android.widget.Button")'; browser.click(selector); client.rotate(114, 198, 5, 3, 220, 2); 16. 16. Uncool things I did not know about ● Keeping selenium and the chrome driver up to date is not funny, also you will need java to run it ● Not all browsers are created equal, so are their drivers ● Webdriver css is not compatibile with recent releases of webdriver.io ● For single page application you end up writing a lot of stuff like this browser.waitForExist('div.btn-primary-color-full.btn-large') browser.click ('div.btn-primary-color-full.btn-large') 17. 17. Next steps ● Wait for webdriver css to get on par with the current wdio release ● Selenium ide - translate from selenese <table> <tr><td>open</td><td></td><td>/download/</td></tr> <tr><td>assertTitle</td><td></td><td>Downloads</td></tr> <tr><td>verifyText</td><td>//h2</td><td>Downloads</td></tr> </table> ×
ESSENTIALAI-STEM
Enhanced Partnership with Pakistan Act of 2009/Title II {{SECTION|SEC. 201.|SEC. 201}}. PURPOSES OF ASSISTANCE. * The purposes of assistance under this title are— * (1) to support Pakistan’s paramount national security need to fight and win the ongoing counterinsurgency within its borders in accordance with its national security interests; * (2) to work with the Government of Pakistan to improve Pakistan’s border security and control and help prevent any Pakistani territory from being used as a base or conduit for terrorist attacks in Pakistan, or elsewhere; * (3) to work in close cooperation with the Government of Pakistan to coordinate action against extremist and terrorist targets; and * (4) to help strengthen the institutions of democratic governance and promote control of military institutions by a democratically elected civilian government. {{SECTION|SEC. 202.|SEC. 202}}. AUTHORIZATION OF ASSISTANCE. * (a) International Military Education and Training.— * (1) IN GENERAL.— * There are authorized to be appropriated such sums as may be necessary for each of the fiscal years 2010 through 2014 for assistance under chapter 5 of part II of the Foreign Assistance Act of 1961 (22 U.S.C. 2347 et seq.; relating to international military education and training) for Pakistan, including expanded international military education and training (commonly known as “E–IMET”). * (2) USE OF FUNDS.— * It is the sense of Congress that a substantial amount of funds made available to carry out this subsection for a fiscal year should be used to pay for courses of study and training in counterinsurgency and civil-military relations. * (b) Foreign Military Financing Program.— * (1) IN GENERAL.— * There are authorized to be appropriated such sums as may be necessary for each of the fiscal years 2010 through 2014 for grant assistance under section 23 of the Arms Export Control Act (22 U.S.C. 2763; relating to the Foreign Military Financing program) for the purchase of defense articles, defense services, and military education and training for Pakistan. * (2) USE OF FUNDS.— * (A) IN GENERAL.— * A significant portion of the amount made available to carry out this subsection for a fiscal year shall be for the purchase of defense articles, defense services, and military education and training for activities relating to counterinsurgency and counterterrorism operations in Pakistan. * (B) SENSE OF CONGRESS.— * It is the sense of Congress that a significant majority of funds made available to carry out this subsection for a fiscal year should be used for the purpose described in subparagraph (A). * (3) ADDITIONAL AUTHORITY.— * Except as provided in sections 3 and 102 of the Arms Export Control Act, the second section 620J of the Foreign Assistance Act of 1961 (as added by Public Law 110-161), and any provision of an Act making appropriations for the Department of State, foreign operations, and related programs that restricts assistance to the government of any country whose duly elected head of government is deposed by military coup or decree, and except as otherwise provided in this title, amounts authorized to be made available to carry out paragraph (2) for fiscal years 2010 and 2011 are authorized to be made available notwithstanding any other provision of law. * (4) DEFINITIONS.— * In this section, the terms “defense articles”, “defense services”, and “military education and training” have the meaning given such terms in section 644 of the Foreign Assistance Act of 1961 (22 U.S.C. 2403). * (c) Sense of Congress.— * It is the sense of Congress that the United States should facilitate Pakistan’s establishment of a program to provide reconstruction assistance, including through Pakistan’s military as appropriate, in areas damaged by combat operations. * (d) Exchange Program between military and civilian personnel of Pakistan and certain other countries.— * (1) IN GENERAL.— * The Secretary of State is authorized to establish an exchange program between— * (A) military and civilian personnel of Pakistan; and * (B)(i) military and civilian personnel of countries determined by the Secretary of State to be in the process of consolidating and strengthening a democratic form of government; or * (ii) military and civilian personnel of North Atlantic Treaty Organization member countries, * in order to foster greater mutual respect for and understanding of the principle of civilian rule of the military. * (2) ELEMENTS OF PROGRAM.— * The program authorized under paragraph (1) may include conferences, seminars, exchanges, and other events, distribution of publications and reimbursements of expenses of foreign military personnel participating in the program, including transportation, translation and administrative expenses. * (3) ROLE OF NONGOVERNMENTAL ORGANIZATIONS.— * Amounts authorized to be appropriated to carry out this section for a fiscal year are authorized to be made available for nongovernmental organizations to facilitate the implementation of the program authorized under paragraph (1). * (4) AUTHORIZATION OF APPROPRIATIONS.— * There are authorized to be appropriated such sums as may be necessary for each of the fiscal years 2010 through 2014 to carry out the program established by this subsection. {{SECTION|SEC. 203.|SEC. 203}}. LIMITATIONS ON CERTAIN ASSISTANCE. * (a) Limitation on Security-Related Assistance.— * For fiscal years 2011 through 2014, no security-related assistance may be provided to Pakistan in a fiscal year until the Secretary of State, under the direction of the President, makes the certification required under subsection (c) for such fiscal year. * (b) Limitation on Arms Transfers.— * For fiscal years 2012 through 2014, no letter of offer to sell major defense equipment to Pakistan may be issued pursuant to the Arms Export Control Act (22 U.S.C. 2751 et seq.) and no license to export major defense equipment to Pakistan may be issued pursuant to such Act in a fiscal year until the Secretary of State, under the direction of the President, makes the certification required under subsection (c) for such fiscal year. * (c) Certification.— * The certification required by this subsection is a certification by the Secretary of State, under the direction of the President, to the appropriate congressional committees that— * (1) the Government of Pakistan is continuing to cooperate with the United States in efforts to dismantle supplier networks relating to the acquisition of nuclear weapons-related materials, such as providing relevant information from or direct access to Pakistani nationals associated with such networks; * (2) the Government of Pakistan during the preceding fiscal year has demonstrated a sustained commitment to and is making significant efforts towards combating terrorist groups, consistent with the purposes of assistance described in section 201, including taking into account the extent to which the Government of Pakistan has made progress on matters such as— * (A) ceasing support, including by any elements within the Pakistan military or its intelligence agency, to extremist and terrorist groups, particularly to any group that has conducted attacks against United States or coalition forces in Afghanistan, or against the territory or people of neighboring countries; * (B) preventing al Qaeda, the Taliban and associated terrorist groups, such as Lashkar-e-Taiba and Jaish-e-Mohammed, from operating in the territory of Pakistan, including carrying out cross-border attacks into neighboring countries, closing terrorist camps in the FATA, dismantling terrorist bases of operations in other parts of the country, including Quetta and Muridke, and taking action when provided with intelligence about high-level terrorist targets; and * (C) strengthening counterterrorism and anti-money laundering laws; and * (3) the security forces of Pakistan are not materially and substantially subverting the political or judicial processes of Pakistan. * (d) Certain Payments.— * (1) IN GENERAL.— * Subject to paragraph (2), none of the funds appropriated for security-related assistance for fiscal years 2010 through 2014, or any amounts appropriated to the Pakistan Counterinsurgency Capability Fund established under the Supplemental Appropriations Act, 2009 (Public Law 111-32), may be obligated or expended to make payments relating to— * (A) the Letter of Offer and Acceptance PK–D–YAD signed between the Governments of the United States of America and Pakistan on September 30, 2006; * (B) the Letter of Offer and Acceptance PK–D–NAP signed between the Governments of the United States of America and Pakistan on September 30, 2006; and * (C) the Letter of Offer and Acceptance PK–D–SAF signed between the Governments of the United States of America and Pakistan on September 30, 2006. * (2) EXCEPTION.— * Funds appropriated for security-related assistance for fiscal years 2010 through 2014 may be used for construction and related activities carried out pursuant to the Letters of Offer and Acceptance described in paragraph (1). * (e) Waiver.— * (1) IN GENERAL.— * The Secretary of State, under the direction of the President, may waive the limitations contained in subsections (a), (b), and (d) for a fiscal year if the Secretary of State determines that is important to the national security interests of the United States to do so. * (2) PRIOR NOTICE OF WAIVER.— * The Secretary of State, under the direction of the President, may not exercise the authority of paragraph (1) until 7 days after the Secretary of State provides to the appropriate congressional committees a written notice of the intent to issue to waiver and the reasons therefor. The notice may be submitted in classified or unclassified form, as necessary. * (f) Appropriate Congressional Committees Defined.— * In this section, the term “appropriate congressional committees” means— * (1) the Committee on Foreign Affairs, the Committee on Armed Services, the Committee on Oversight and Government Reform, and the Permanent Select Committee on Intelligence of the House of Representatives; and * (2) the Committee on Foreign Relations, the Committee on Armed Services, and the Select Committee on Intelligence of the Senate. {{SECTION|SEC. 204.|SEC. 204}}. PAKISTAN COUNTERINSURGENCY CAPABILITY FUND. * (a) For Fiscal Year 2010.— * (1) IN GENERAL.— * For fiscal year 2010, the Department of State’s Pakistan Counterinsurgency Capability Fund established under the Supplemental Appropriations Act, 2009 (Public Law 111-32), hereinafter in this section referred to as the “Fund”, shall consist of the following: * (A) Amounts appropriated to carry out this subsection (which may not include any amounts appropriated to carry out title I of this Act). * (B) Amounts otherwise available to the Secretary of State to carry out this subsection. * (2) PURPOSES OF FUND.— * Amounts in the Fund made available to carry out this subsection for any fiscal year are authorized to be used by the Secretary of State, with the concurrence of the Secretary of Defense, to build and maintain the counterinsurgency capability of Pakistan under the same terms and conditions (except as otherwise provided in this subsection) that are applicable to amounts made available under the Fund for fiscal year 2009. * (3) TRANSFER AUTHORITY.— * (A) IN GENERAL.— * The Secretary of State is authorized to transfer amounts in the Fund made available to carry out this subsection for any fiscal year to the Department of Defense’s Pakistan Counterinsurgency Capability Fund established under the Supplemental Appropriations Act, 2009 (Public Law 111-32) and such amounts may be transferred back to the Fund if the Secretary of Defense, with the concurrence of the Secretary of State, determines that such amounts are not needed for the purposes for which initially transferred. * (B) TREATMENT OF TRANSFERRED FUNDS.— * Subject to subsections (d) and (e) of section 203, transfers from the Fund under the authority of subparagraph (A) shall be merged with and be available for the same purposes and for the same time period as amounts in the Department of Defense’s Pakistan Counterinsurgency Fund. * (C) RELATION TO OTHER AUTHORITIES.— * The authority to provide assistance under this subsection is in addition to any other authority to provide assistance to foreign countries. * (D) NOTIFICATION.— * The Secretary of State shall, not less than 15 days prior to making transfers from the Fund under subparagraph (A), notify the appropriate congressional committees in writing of the details of any such transfer. * (b) Submission of Notifications.— * Any notification required by this section may be submitted in classified or unclassified form, as necessary. * (c) Appropriate Congressional Committees Defined.— * In this section, the term “appropriate congressional committees” means— * (1) the Committee on Appropriations, the Committee on Armed Services, and the Committee on Foreign Affairs of the House of Representatives; and * (2) the Committee on Appropriations, the Committee on Armed Services, and the Committee on Foreign Relations of the Senate. {{SECTION|SEC. 205.|SEC. 205}}. REQUIREMENTS FOR CIVILIAN CONTROL OF CERTAIN ASSISTANCE. * (a) Requirements.— * (1) IN GENERAL.— * For fiscal years 2010 through 2014, any direct cash security-related assistance or non-assistance payments by the United States to the Government of Pakistan may only be provided or made to civilian authorities of a civilian government of Pakistan. * (2) DOCUMENTATION.— * For fiscal years 2010 through 2014, the Secretary of State, in coordination with the Secretary of Defense, shall ensure that civilian authorities of a civilian government of Pakistan have received a copy of final documentation provided to the United States related to non-assistance payments provided or made to the Government of Pakistan. * (b) Waiver.— * (1) SECURITY-RELATED ASSISTANCE.— * The Secretary of State, in consultation with the Secretary of Defense, may waive the requirements of subsection (a) with respect to security-related assistance described in subsection (a) funded from accounts within budget function 150 (International Affairs) if the Secretary of State certifies to the appropriate congressional committees that the waiver is important to the national security interest of the United States. * (2) NON-ASSISTANCE PAYMENTS.— * The Secretary of Defense, in consultation with the Secretary of State, may waive the requirements of subsection (a) with respect to non-assistance payments described in subsection (a) funded from accounts within budget function 050 (National Defense) if the Secretary of Defense certifies to the appropriate congressional committees that the waiver is important to the national security interest of the United States. * (c) Application to certain activities.— * Nothing in this section shall apply with respect to— * (1) any activities subject to reporting requirements under title V of the National Security Act of 1947 (50 U.S.C. 413 et seq.); * (2) any assistance to promote democratic elections or public participation in democratic processes; * (3) any assistance or payments if the Secretary of State determines and certifies to the appropriate congressional committees that subsequent to the termination of assistance or payments a democratically elected government has taken office; * (4) any assistance or payments made pursuant to section 1208 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (Public Law 108-375; 118 Stat. 2086), as amended; * (5) any payments made pursuant to the Acquisition and Cross-Servicing Agreement between the Department of Defense of the United States of America and the Ministry of Defense of the Islamic Republic of Pakistan; and * (6) any assistance or payments made pursuant to section 943 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009 (Public Law 110-417; 122 Stat. 4578). * (d) Definitions.— * In this section— * (1) the term “appropriate congressional committees” means the Committees on Appropriations, Armed Services, and Foreign Affairs of the House of Representatives and the Committees on Appropriations, Armed Services, and Foreign Relations of the Senate; and * (2) the term “civilian government of Pakistan” does not include any government of Pakistan whose duly elected head of government is deposed by military coup or decree.
WIKI
Verbesina Verbesina, many species of which have crownbeard as part of their common names, is a genus of flowering plants, in the family Asteraceae. It is a large genus of about 350 species. All the species bear white or yellow flowers similar to small sunflowers. The name Verbesina very likely refers to the similarity of the foliage to that of the (unrelated) Verbena. Verbesina species are used as food plants by the larvae of some Lepidoptera species. These include Schinia bina, which has been recorded from V. encelioides, and Schinia siren which feeds exclusively on that species. Pollen grains from eight of the nine species of Verbesina found in Brazil have been characterized as oblate-spheroidal, medium-sized, isopolar monads. They are 3-colplorate with a subtriangular amb, a small polar area, a long colpus, a lalongate endoaperture, a caveate exine and an echinate sexine. Selected species * Verbesina alternifolia * Verbesina auriculigera * Verbesina barclayae * Verbesina brachypoda * Verbesina chapmanii * Verbesina dissita * Verbesina ecuatoriana * Verbesina encelioides * Verbesina gigantea * Verbesina glabrata * Verbesina grisebachii * Verbesina guatemalensis * Verbesina harlingii * Verbesina hastata * Verbesina helianthoides * Verbesina howardiana * Verbesina kingii * Verbesina latisquama * Verbesina mameana * Verbesina minuticeps * Verbesina occidentalis * Verbesina pentantha * Verbesina persicifolia * Verbesina petrobioides * Verbesina pseudoclausseni * Verbesina pustulata * Verbesina rivetii * Verbesina rupestris * Verbesina saloyensis * Verbesina squarrosa * Verbesina subcordata * Verbesina villonacoensis * Verbesina virginica
WIKI
National Society for Human Rights The National Society for Human Rights (NSHR) is a Saudi Arabian human rights organisation closely associated with and funded by the Saudi government. It was established on 10 March 2004 ; two years after the Human Rights First Society applied unsuccessfully for a licence. , the President of the NSHR was Mufleh bin Rabayan al-Qahtani. History In March 2004, several citizens of the Kingdom of Saudi Arabia established the National Society for Human RightsThe Embassy of Saudi Arabia in Washington, D.C. described the NSHR as the "first independent human rights organization in Saudi Arabia". Human Rights First Society was created two years earlier, in 2002, and denied a licence to exist formally. Work The National Society for Human Rights (NSHR) implements the international human rights charters signed by Saudi Arabia, and it also includes a special panel to monitor violations of women's rights. According to its resolution, the Society seeks to protect human rights and preserve human dignity as ordered by Allah, Most Powerful, in the Qur’an: "And indeed We have honoured the Children of Adam". It seeks to support the rights of citizens, to monitor and pursue their rights as established and recognized by Islamic Sharia law and applicable regulations, and seeks to protect citizens from possible violations, abuses, and breaches of those rights. It also seeks to contribute to international efforts and worldwide cooperation aimed at preserving human rights. The main office is in Riyadh, but it also has four other branches in Saudi Arabia, located in Jeddah, Makkah, Jizan, and East Province, and it is working to open a fifth branch in Aljouf. The Society initially consisted of 41 founding members, six of whom are women. NHSR issues periodic reports on the progress of human rights in Saudi Arabia, including a monthly bulletin called Hogog ("Rights"). The Society's income is generated from publications, bulletins, and revenue generated from symposia and fairs. Moreover, revenues are generated from property investments. In addition, the Society accepts gifts, testaments, Awqaf (endowments), grants, and other resources that do not contradict with the objectives of the Society. Support for Saudi government The August 2018 diplomatic dispute with Canada started when Canadian Minister of Foreign Affairs Chrystia Freeland's called on 2 August 2018 in a tweet for Saudi human rights activists Samar Badawi and Raif Badawi to be released from prison. The Saudi government responded with punitive actions against Canada. NSHR stated its support for the Saudi governmental response. The head of the NHSR, Mufleh bin Rabayan al-Qahtani, stated to the Saudi Press Agency that the tweet transgressed international norms and Saudi sovereignty.
WIKI
1934 in Norwegian music The following is a list of notable events and releases of the year 1934 in Norwegian music. Deaths * November * 21 – Mon Schjelderup, composer and pianist (born 1870). Births * January * 24 – Egil «Bop» Johansen, jazz drummer, teacher, composer (died 1998). * December * 5 – Kåre Grøttum, jazz pianist, composer, music arranger, and program presenter in NRK. * Unknown date * Siss Hartmann, singer (died 2011)
WIKI
Wikipedia:Articles for deletion/Imagineer (Japanese company) The result was delete. It seems that WP:LISTED would require that sourced be produced so they can be weighed. Without those sources, there is broad consensus to delete. Drmies (talk) 03:30, 22 April 2017 (UTC) Imagineer (Japanese company) * – ( View AfD View log Stats ) Contested WP: PROD. No justification provided by the contesting editor (indeed, his posts at my personal talk page and Wikipedia talk:WikiProject Anime and manga heavily imply that he is contesting all of my PRODs indiscriminately). The only cited source, GameFAQs, is unreliable due to its use of user-submitted content (see WP:WikiProject Video games/Sources). The article on Japanese Wikipedia has slightly better sourcing, but not enough that importing them would bring this article up to WP: NCOMPANY standards. Researching the subject is difficult due to the existence of at least one unrelated company with the same name, but my admittedly limited checks have turned up no useful sources for the article. Martin IIIa (talk) 14:47, 13 April 2017 (UTC) * Delete. This is a Proposed deletion. The deletion should stand. It appears justified. No signs of being notable such as good sources, etc. I did do a Google search of "imagineer JASDAQ". Knox490 (talk) 04:45, 14 April 2017 (UTC) * Note: This debate has been included in the list of Video games-related deletion discussions. Martin IIIa (talk) 13:01, 14 April 2017 (UTC) * Note: This debate has been included in the list of Companies-related deletion discussions. Martin IIIa (talk) 13:06, 14 April 2017 (UTC) * Keep - Publicly traded company with a market capitalization of over US$90M. Keeping per WP:LISTED, the Nikkei has several (paywalled and Japanese) articles on the company at http://www.nikkei.com/nkd/company/news/?scode=4644&ba=9&DisplayType=1 - hahnch e n 10:36, 15 April 2017 (UTC) * Delete. We have no sources to write this article, so it's impossible to do justice to the topic and fulfill WP:V simultaneously. Also note that the linked publicly traded corp notability guidelines say that stock market listing itself isn't automatic notability, as we need the source material. Additionally, I wouldn't call the jpwp article's sources any better. Of the three links, two are primary sources and one is another jpwp article. I didn't get any hits in EBSCOhost outside of Disney, though Factiva is worth a try if someone has access. They tend to have more business-related publications. czar 05:09, 19 April 2017 (UTC) * Note: This debate has been included in the list of Japan-related deletion discussions. • Gene93k (talk) 06:29, 19 April 2017 (UTC)
WIKI
Spain to push EU leaders for better counter-terrorism coordination MADRID (Reuters) - Spain will ask the leaders of France, Italy and Germany to discuss cross-border counter-terrorism at a summit in Paris on Monday, Prime Minister Mariano Rajoy said on Friday after dual attacks in Catalonia. Rajoy praised the police response despite mounting questions over poor communication between different investigators and an informal tip-off from Belgium which failed to prevent Spain’s deadliest attacks in over a decade. He told a news conference he wanted European Union partners to “analyze the current cooperation mechanisms ... and look at options to boost them and improve them.” A van plowed into a crowd in Barcelona last week, killing 13 people. Two others were killed during the driver’s getaway and in a separate car and knife attack in the Catalan coastal resort of Cambrils. The assaults have drawn scrutiny over how intelligence is shared within Europe as well as within Spain, where regional police operate alongside national forces. Belgium gave police in Catalonia, a region in northeastern Spain, a tip-off in 2016 about one of the suspects, Abdelbaki Es Satty, in the cell behind the attacks. But the warning was made through unofficial channels. Catalan police records turned up nothing linking Es Satty, a Moroccan-born imam who was living in the small Catalan town of Ripoll, to Islamist militancy at the time. Authorities are also investigating possible French links to the cell as some of the attackers visited Paris in the run-up to the assaults. Of the 12 suspects linked to the attacks, six were shot dead by police and two died in an explosion before the van rampage. Two are in custody on charges of murder and membership of a terrorist organization, and two have been freed on certain conditions. Rajoy sought to play down the rift between his government and separatist leaders in Catalonia who plan an independence referendum on Oct. 1. that Madrid says would be illegal. “In the fight against terrorism, we are stronger if we set aside our differences ... Political unity is fundamental,” Rajoy said. Carles Puigdemont, the Catalonian leader, said in an interview published on Friday that the Spanish government had deliberately underfunded the region’s police force. “We asked them not to play politics with security ... Unfortunately, the Spanish government had other priorities,” Puigdemont told the Financial Times. Spain’s King Felipe and politicians from both Madrid and Catalonia plan to attend a demonstration in Barcelona on Saturday. Residents and local officials in Cambrils, the scene of the second attack last week, were due to march on Friday under the slogan “We are all Cambrils.” Additional reporting by Inmaculada Sanz; Editing by Angus Berwick and Robin Pomeroy
NEWS-MULTISOURCE
Terminal Footprint, Selected Container Ports Terminal Footprint Selected Container Ports The optimal shape of a container terminal is a rectangle that allows sufficient berthing space and a corresponding yard footprint. However, due to physical and site constraints, such an ideal footprint is rarely found, particularly in older terminals. The outcome is a variety of container terminal footprints that are relatively rectangular if the site allows, but each terminal has faced specific constraints in its development. The following footprint development strategies are noted: • Reconversion. A container terminal can be created by reconverting existing port facilities that have been abandoned or are seen as less profitable. This tends to be a common and low-cost option for existing ports, but the challenge is an effective reconversion. For instance, the Port Elizabeth complex (New York) is among the oldest container terminal facilities and began operation in the 1960s. The terminals were built over reconverted break-bulk and warehousing facilities that were gradually torn down as container traffic grew. For this complex, the port did not expand its total footprint but reconverted towards containerization by removing marginalized port activities. In the 1990s, an on-dock rail facility was added between the APM and Maher terminals, which reduced the yard footprint but allowed better hinterland access. The case of Montreal underlines unique reconversion challenges as the container terminal facilities were forced to expand laterally due to the limited availability of adjacent real estate. This led to terminal footprints that were narrow and elongated. • Adaptation. A new terminal footprint can be adapted to mitigate the physical, technical, or real estate limitations of a site, leading to unique footprints. In the late 1980s and 1990s, two major container terminals were added to the port of Antwerp at a downstream location of the Scheldt River (Europa Terminal and Noordzee Terminal). These facilities were constrained by the available real estate footprint and the inability to expand into the Scheldt River through land reclamation. In the early 2000s, the port of Shanghai was expanding rapidly with new facilities downstream along the Yangtze River. For the Mingdong complex, shallow depths along the river banks and siltation made dredging costs prohibitive. To the container yard facilities were added a series of jetties and piers separating the berth areas to the yards, allowing use of the complex as a container port. The drawbacks of this adaptive footprint are longer pier-to-yard movements. • Land reclamation. The construction of new terminal facilities through the creation of an entirely new footprint, which allows for mitigating technical limitations such as depth and the lack of real estate. These facilities tend to be rectangular and closer to optimal design but require substantial engineering and capital investments. They are common on mega port development projects where a suitable and available land footprint does not exist. In the late 1990s and early 2000s, Singapore and Busan engaged in massive land reclamation projects to expand their transshipment facilities in new areas. The Pasir Panjang (Singapore) and Newport (Busan) terminals were designed to mainly serve the function of transshipment, implying that they are more rectangularly shaped, which allows for more berth space as containers tend to spend less time in the yard.
ESSENTIALAI-STEM
How to Connect Alexa to Wi-Fi Without the App [Updated] Key Takeaway • Amazon recently updated their Alexa and Echo systems to only be able to connect to Wi-Fi with the app. Some users might still be able to use the old method but for most, an app is now seemingly necessary. Amazon’s Alexa, a voice-controlled virtual assistant capable of fulfilling many commands, has become integral to many households. While traditionally, the Alexa app has been the primary method for setting up and managing Alexa-enabled devices, many wonder how you can connect it without it. This article provides a step-by-step guide on how to achieve this. Alexa Orange Ring Light Alexa Orange Ring Light Why Does Alexa Need Wi-Fi? It’s essential to know that Alexa requires a Wi-Fi connection to function optimally. When you ask Alexa a question or give a command, it sends an audio recording to Amazon’s servers via the internet (for which it uses Wi-Fi), processes it, and then sends back the response. Connecting Alexa to Wi-Fi There are two ways you can connect your Alexa to Wi-Fi. One of them involves using Amazon’s app for controlling and configuring Echo devices, and the other method omits the usage of their app. However, certain users have reported that they can no longer configure their Alexa without using Amazon’s app. So, we will take a look at both methods. How to Connect Alexa to Wi-Fi Without Using the App There are various reasons for wanting to set up Alexa without the app. Perhaps you don’t have access to a smartphone, or maybe you prefer using a computer. Regardless, here are the steps for connecting Alexa to Wi-Fi without using the app. Be wary that this method is outdated and might not work correctly, if not entirely. If that is the case, then move on to our section explaining how to connect Alexa to Wi-Fi with the app. Users have reported the Amazon Alexa site being changed since launch. So, if this method doesn’t work out for you, skip to the next one. 1. Open a browser on your device and head over to Alexa.Amazon.com. Amazon Alexa Login Page Amazon Alexa Login Page 2. Log in using your Amazon account credentials. If you do not have an Amazon account, you can easily create one at the bottom of the page. 3. After logging in, click on “Settings“. This option will be available in the left-hand sidebar. 4. Click on “Set up a new device.” Alexa Setup A New Device Alexa Setup A New Device 5. Here, you can select the Alexa device you want to set up on your Wi-Fi network.  6. Choose the device you own and press on “Continue.” Setup Alexa Device Setup Alexa Device 7. Now, you must plug your Alexa device into a power source to turn it on. 8. After turning it on, please wait for the right light to turn orange. The orange light means it is ready to connect to the internet. Alexa Orange Ring Light Alexa Orange Ring Light 9. Now, you must connect your system to the Wi-Fi with the SSID being Amazon-XXX without closing your browser. When connecting to the “Amazon-XXX” Wi-Fi, it’s the setup mode for Alexa devices. It acts as a bridge between the device and your browser or app, allowing you to provide your actual Wi-Fi credentials for Alexa to use. 10. After connecting to Amazon Wi-Fi, open your browser again and click on “Continue.” Now, you will be able to see “Your computer is connected” to your Alexa device. 11. Now, select the Wi-Fi network you want your Alexa to be connected to. 12. Enter your Wi-Fi password so that Alexa can connect to it and click “Connect.”  13. Finally, your Alexa will soon be connected to the Wi-Fi network. Wait for a few minutes, and then test the connection by asking Alexa a question. After these steps, your Alexa device will have internet access and be able to solve all of your queries. How to Connect Alexa to Wi-Fi with the App As we mentioned earlier, most people won’t be able to connect their Alexa to Wi-Fi without an app as Amazon has removed this functionality recently. Therefore, all you have to do is download Alexa’s app and start configuring. Here are the steps to accomplish this task: 1. Download and install the Amazon Alexa app on your smartphone. Play Store App Store. 2. Open the Amazon Alexa app and tap on “Devices,” you will see this option in the bottom-right corner of your screen. 3. Now, tap on the + in the top-right corner and select “Add Device.” Add a device 4. Select “Amazon Echo” from the list that pops up, then select your specific Echo device from the next list.  You might be asked for location and Bluetooth permissions, so allow those. 5. Next, it will show you a screen asking if your Echo device is turned on and in pairing mode—pulsing with an orange light. After you’ve turned it on, select Yes if it’s showing the orange light or No if it’s not. If you select No, it will show you on-screen instructions to pair it, otherwise it will start searching for Echo devices nearby if you select Yes. 6. After the searching is complete, select your Echo device from the list. 7. Next, choose your Wi-Fi network from the list of available networks, enter the Wi-Fi details and wait for it to connect. 8. Congratulations! Your Amazon Echo device is now connected to Wi-Fi. Continue with the on-screen instructions and start using Alexa when setup is finished.  If you’re having issues connecting your Alexa to Wi-Fi because the light isn’t turning orange, check out our detailed guide on how to troubleshoot Alexa flashing yellow and green. Conclusion Connecting Alexa to Wi-Fi is no biggie. You can accomplish this with or without the app, ensuring your Alexa device is ready to respond to your commands, play music, provide weather updates, and more without needing a mobile application. We can only hope Amazon will make this process a little more seamless in the future, to the extent that users can connect their Alexa to the Wi-Fi directly without needing an external device. FAQs What if I have multiple Alexa devices? Do I need to set up each one individually? Yes, each Alexa device needs to be set up individually to ensure it connects to your Wi-Fi network and operates correctly. Is it necessary to have an Amazon account to set up Alexa with the app? Yes, you need to sign in with your Amazon account credentials to access the settings and set up your Alexa device through the app. Can I set up Alexa with a mobile hotspot? Yes, you can use a mobile hotspot to set up Alexa. Ensure your hotspot has a stable internet connection and follow the same steps for connecting to a WiFi network. ABOUT THE AUTHOR Kamil Anwar Kamil is a certified MCITP, CCNA (W), CCNA (S) and a former British Computer Society Member with over 9 years of experience Configuring, Deploying and Managing Switches, Firewalls and Domain Controllers also an old-school still active on FreeNode.
ESSENTIALAI-STEM
File:LaRouche accounts.png Summary Chart of editing by selected accounts. Edits per ten-minute increments. Not corrected for Daylight Savings, so approximately half of the entries are off by one hour.
WIKI
Magic Circus Show The Magic Circus Show was an entertainment show organised by the European Broadcasting Union (EBU) and host broadcaster Radio Télévision Suisse (RTS), which aired in 2010, 2011 and 2012. Children aged between seven and fourteen representing eight countries within the EBU membership area, performed a variety of circus acts at the Geneva Christmas Circus (Cirque de Noël Genève). The main show was also accompanied by the Magic Circus Show Orchestra. The programme was recorded at the end of November each year in the tent of Circus Pajazzo in Chêne-Bougeries, a town just outside Geneva in Switzerland. Background The idea to make a magic circus show, where circus acts are performed by children, belonged to the Swiss national television and radio company RTS and Damien Ottet, who was the executive producer of 7 Street Productions and the director of children's programs for RTS. They presented the idea of holding a contest at the Eurovision TV congress, and the European Broadcasting Union responded to their proposal. The event was officially launched by the EBU on 5 October 2010 at MIPCOM in Cannes, France. Editions The Magic Circus Show was a gala show and was recorded in advance and broadcast in the participating countries during the Christmas season. The first edition was held on 26 November 2010 with six countries participating: Belgium, the Netherlands, Portugal, Russia, France and the hosts Switzerland. The second edition took place on 26 November 2011 and Ukraine participated for the first time, making seven countries in total. The last edition took place on 17 November 2012 and nine countries participated: Bulgaria, Armenia and Ireland joined the show, however Ukraine did not return. Participation Listed are all the countries that have ever taken part alongside the year in which they made their debut: Broadcast The following broadcasters participated at least once: * (ARMTV) * (VRT) * (BNT) * (France 3) * (RTÉ) * (TROS) * (RTP) * (RTR) * (RTS) * (NTU) The broadcasting rights for the inaugural show in 2010 were acquired by Belarus (BTRC), Italy (RAI), Slovenia (RTVSLO), TV5 Québec Canada and international francophone network, TV5Monde.
WIKI
Magical Drop III Magical Drop III (マジカルドロップ 3) is a 1997 puzzle video game developed and published by Data East for the Neo Geo arcade and home platforms. It was later ported to Sega Saturn, PlayStation, Neo Geo Pocket Color, Game Boy Color, Windows, and Zeebo. It is the third entry in the Magical Drop series. In the game, the player takes control of one of several characters, battling against computer-controlled opponents. Gameplay is similar to previous entries albeit with further additions; the objective is to clear the screen of constantly advancing colored 'drops' via a character placed at the bottom of the playfield, which can grab drops and make them disappear by putting drops as a column of three or more of the same color. The player can also participate in a board-style adventure mode, while two players can play against each other in a competitive versus mode. Magical Drop III was produced by Naomi Susa, with Shungo Katagiri acting as the game's planner, while the soundtrack was scored by Gamadelic. It proved popular among players, with the Saturn and PlayStation versions selling over 10,392 and 8,286 copies in their first week on the Japanese market respectively, garnering favorable reception from critics and retrospective reviewers. The game has since been re-released through download services for various consoles and on compilations. It was followed by Magical Drop F: Daibōken Mo Rakujyanai! (1999). Gameplay Like its predecessors, Magical Drop III is a puzzle game where the player takes control of one of several characters named after a tarot card, battling against computer-controlled opponents. Gameplay is similar to Magical Drop (1995) and Magical Drop II (1996), albeit with further additions; the objective is to clear the screen from a stack of constantly advancing colored 'drops' that descend from the top of the playfield. Drops can be picked up and dropped by the player's character, which is placed at the bottom of the screen, and they disappear when three or more of the same color are put together on a single column. Chains are formed either when a single drop caused a chain reaction or when more than one group of drops are cleared in quick succession. Forming chains cause the opponent's stack to descend faster. One notable gameplay addition is the introduction of a third button, which allows players to add rows to their field at any time. It is also possible to grab normal and special pieces at the same time. Two players can also participate in a competitive versus mode (one may be a computer opponent), featuring attack patterns that sends lines to the opponent in non-even rows that vary by character. An adventure mode called "Magical Journey" is also introduced, which is a board game that challenges players to reach Empress before computer-controlled rivals by participating in minigames. The game is over once a player is defeated when the stack of drops hits the bottom. Characters The original cast from Magical Drop and Magical Drop II returns. In addition, the game adds representatives for the remaining tarot major arcana cards, as well as introducing a "daughter" Strength character that more closely resembles the traditional depiction of Strength. * Fool * Magician * High Priestess * Chariot * Devil * Star * World * Justice * Father Strength * Empress * Black Pierrot * Emperor * Hierophant * Lovers * Daughter Strength * Death * Temperance * Sun * Judgement * Hermit * Moon * Hanged Man * Tower * Wheel of Fortune Development Magical Drop III was developed by Data East, which had previously worked on Magical Drop II (1996) for Neo Geo. It was produced by Naomi Susa, with Shungo Katagiri acting as the game's planner. M. Saki, as well as two staffer under the pseudonyms "Tac.H" and "Poconyan", served as the game's programmers. Hiroshi Hachiya, Hitomi Hashimoto, Itokku Seta, Kumiko Oka, N. Ishizuka, Rie Sakurai, Seigo Nishiwaki, Shōji Takeuchi, Tomoyuki Arakawa, and Yoshinari Kaiho were responsible for the artwork. The soundtrack was scored by Gamadelic members Hiroaki "Maro" Yoshida, Masaaki "Koremasa" Iwasaki, Shinichi "Sin" Yamazaki, and Tatsuya "nmRtk" Kiuchi. The development team recounted the project's creation and history in interviews. Release Magical Drop III was first released for the Neo Geo arcade system (MVS) in Japan by Data East on February 25, 1997, and later in North America by SNK on March. There are differences between the original Japanese version and English release, such as the removal of Japanese voice acting and rival opponents in adventure mode, among other changes. On March 21, an album containing music from the game was co-published in Japan by Scitron and Pony Canyon. It was also published in Japan for the Neo Geo home system (AES) on April 25. On June 20, the game was first ported to the Sega Saturn under the subtitle Toretate Zoukangou!. A North American localization under the title Magical Drop was showcased at E3 1997 and planned to be released by Koei, but it never released. The Saturn version version changes the speed and various other aspects of gameplay. On October 30, the game was then ported to PlayStation under the subtitle Yokubari Tokudaigou!, which allows the player to choose between the Saturn's re-balanced version and a version more faithful to the original arcade iteration. In 1998, the Saturn version was re-released as part of the "Sakatore" budget line. A second PlayStation version titled Magical Drop III + Wonderful was first released in Japan on February 25, 1999, featuring the re-balanced gameplay from Yokubari Tokudaigou! and includes a port of Magical Drop Plus 1!. The game was also ported by Sakata SAS to Neo Geo Pocket Color as Magical Drop Pocket, first being released in Japan by Data East on June 24, then by SNK in North America on December 5 and later in Europe on March 4, 2000. On July 23, Magical Drop III + Wonderful was released in PAL regions by Swing! Entertainment as simply Magical Drop III. The game was ported by Conspiracy Entertainment to Game Boy Color as simply Magical Drop as well, first released in Europe by Swing! Entertainment on August 25 and later in North America by Classified Games on October 18. The GBC version does not include a CPU mode, and thus players only gain access to the full character roster by playing two-player mode. On December 22, a Microsoft Windows port based on Toretate Zoukangou! was released only in Japan by MediaKite Distribution. In 2001, Magical Drop III + Wonderful was re-released by Taito as a budget title. Magical Drop III has since been re-released through various digital distribution platforms, such as the subscription service GameTap. In 2009, the first PlayStation version (Yokubari Tokudaigou!) was re-released on PlayStation Network in Japan. In 2010, it was included as part of Data East Arcade Classics for Wii. On April 22, the game was ported by Onan Games to Zeebo and distributed in Brazil by G-Mode. The game was also re-released for the Wii's Virtual Console first in Japan on July 6, then in North America on December 27, and later in Europe on January 14, 2011. In 2018, Hamster Corporation re-released the game for Nintendo Switch, PlayStation 4, and Xbox One as part of their ACA Neo Geo series. It was re-released on the AntStream service as well. Reception In Japan, Game Machine listed Magical Drop III on their April 1, 1997 issue as being the third most-popular arcade game for the previous two weeks. The game garnered favorable reception from critics. Readers of the Japanese Sega Saturn Magazine voted to give the game a 9.0414 out of 10 score, ranking among Sega Saturn games at the number 68 spot in a 2000 public poll. According to Famitsu, the Saturn and PlayStation versions sold over 10,392 and 8,286 copies in their first week on the Japanese market respectively. GamePro's Johnny Ballgame and Major Mike stated "it's just as addictive as Magical Drop II". Saturn Fan's five critics found the game highly addictive, regarding it as the most strategic entry in the series. Player One's Christophe Delpierre and François Daniel commented that "Magical Drop 3 offers a great alternative for Puzzle Bobble fans." AllGame's Kyle Knight labelled it as one of the best puzzle games on Neo Geo, praising the upgraded audiovisual presentation, new characters, addictive gameplay, and responsive controls. Reviewing the Game Boy Color version, Germam publication Fun Color noted its overall simplicity and wrote that "Magical Drop is a cool alternative to the usual Tetris stuff." Jeuxvideo.com's Lucas also reviewed the GBC version, commending the colorful visuals, endearing characters, controls, and music. big.N's Florian Seidel reviewed the GBC port as well, commending the game's idea and Game Boy Printer support, but criticized the lack of additional modes. Video Games' Christian Daxer reviewed the Wonderful re-release on PlayStation, recommending Magical Drop III over Magical Drop Plus 1!, citing its story and two-player versus modes. An editor for Video Games agreed with Seidel when reviewing the GBC conversion, noting that there are only two game modes, but ultimately found it to be a "good average" title. IGN's Craig Harris also reviewed the GBC port, highlighting its versus mode when using a link cable, but compared its graphical presentation unfavorably to the Neo Geo Pocket Color version. Harris wrote "Tetris it isn't, but Magical Drop has its own merits as a puzzle game that makes it fun to play." The Italian edition of GamesMaster reviewed both the NGPC and GBC versions, finding them to be "bizarre" but fun and enjoyable titles. Fun Generation's Simon Krätschmer gave the Wonderful re-release on PlayStation an overall average outlook. Reviewing the Wonderful re-release on PlayStation, MAN!AC's Ulrich Steppberger felt that the gameplay of Magical Drop III was chaotic, while finding Magical Drop Plus 1! graphically outdated but commended its inclusion. Mega Fun's Henry Ernst analyzed the Game Boy Color port, concluding "All in all an average title with good, GBC-typical graphics. Fans of this game genre should definitely get their money's worth and be busy for a while due to the enormous potential for addiction." Pocket Magazine's Benoît B. echoed similar thoughts as Seidel and Video Games regarding the lack of additional game modes when comparing the NGPC version with the GBC port. Benoît also found the story mode incomplete and the music "tiresome". In contrasts to other reviewers, Jay Semerad of AllGame gave the GBC conversion a positive outlook, highlighting its visuals, frantic two-player mode, and replay value. Retrospective coverage Retrospective commentary for Magical Drop III has been equally favorable. Reviewing the re-release on the Wii's Virtual Console, Nintendo Life's Corbie Dillard lauded its single-player and multiplayer component, refined gameplay, visuals, soundtrack, and game modes. In a retrospective outlook of the NGPC port, Hardcore Gamer's Steve Hannley regarded it as a faithful conversion, highlighting the game's speed and framerate, but saw its condensed playfield, English translation, and lack of additional modes as negative points. Reviewing the Arcade Archives re-release on Nintendo Switch, Nintendo World Report's Donald Theriault commended its easy-to-learn gameplay, various game modes, and control options, but criticized its frustrating board mode and forgettable music. Dave Frear of Nintendo Life disagreed with Theriault when analyzing the ACA re-release on Switch, giving it a highly positive outlook.
WIKI
What are YOUR long term holds? And is a large percentage of it tech- why or why not? Thanks to everyone who answered my question last night on what you personally do when long term positions go up. The responses got me curious on what stocks you all like or would like to hold for years Also, do you hold tech stocks and believe the rapid growth of technology will continue to dominate markets? Or do you think it is a valuation bubble/progress will slow? Here are a few of my picks: - DIS: Worth 250B, but own (or partly own) ESPN, Hulu, Marvel, LucasFilms, ABC, 20th Century, list goes on. Disney+ growing in popularity as well, and Disney parks will be packed/are already packed as people worry less about COVID relative to before. - AMZN: Maybe on a dip. Besides their massive eCommerce empire, AWS cloud storage makes the most of their revenue and continues to revolutionize the cloud (used by many companies from Tesla, Snapchat, Volkswagen, etc.). - CRM: There is currently a shortage of SalesForce devs because the demand has been growing for them. Like the above stocks, used by many major companies (AWS, Spotify, Toyota, AMEX). - CRSP: Riskier play, but gene editing would be a massive breakthrough and they are and have been the leaders for a while.
NEWS-MULTISOURCE
GPR52 Probable G-protein coupled receptor 52 is a protein that in humans is encoded by the GPR52 gene. Members of the G protein-coupled receptor (GPR) family play important roles in signal transduction from the external environment to the inside of the cell.[supplied by OMIM] Cannabidiol, CBD, and O-1918 are Inverse agonist at GPR52
WIKI
Joseph Brown Joseph Brown may refer to: Arts and entertainment * Victor Millan (Joseph Brown, 1920–2009), actor and theater professor known as * Joe Brown (sculptor) (Joseph Brown, 1909–1985), American sculptor * Joseph Epes Brown (1920–2000), author of the book The Sacred Pipe * Joe E. Brown (Joseph Evans Brown, 1891–1973), American actor * Joseph Brown (Coronation Street), a fictional character from the British soap opera Government and politics * Joseph Brown (Missouri politician) (1823–1899), mayor of Alton and St. Louis, Missouri * Joseph R. Brown (1805–1870), U.S. politician and Minnesota pioneer * Joseph E. Brown (1821–1894), U.S. Senator and Governor of Georgia * Joseph Tilley Brown (1844–1925), member of the Australian Parliament, 1906–1910 * Joseph Edgar Brown (1880–1939), U.S. Representative from Tennessee * Joseph Mackey Brown (1851–1932), Governor of Georgia * Joseph O. Brown (1848–1903), mayor of Pittsburgh * Joseph Stanley Brown (1858–1941), private secretary to U.S. President James A. Garfield * Joseph A. Brown (1903–1963), Michigan state senator * Joseph D. Brown (born 1970), United States Attorney in Texas * Joseph N. Brown (1849–1922), member of the Mississippi Senate Other people * Joseph Brown (shipbuilder), builder of the USS Tuscumbia * Joseph Brown (coach), Eastern Illinois University coach * Joseph C. Brown (died 1849), surveyor of the Louisiana Purchase * Joseph Brown (astronomer) (1733–1785), United States industrialist and astronomer * Joseph W. Brown (1793–1880), U.S. Army general and co-founder of the town of Tecumseh, Michigan * Joseph Brown (cricketer) (1872–1915), English cricketer * Joseph Brown (bishop) (1796–1880), Roman Catholic bishop in Wales * Joseph Brown (engraver) (1809–1887), English engraver * Joseph Brown (barrister) (1809–1902), English barrister * Joseph "Black Joe" Brown (1750–1834), American Revolutionary War veteran
WIKI
1997 Speedway Grand Prix of Sweden The 1997 Speedway Grand Prix of Sweden was the second race of the 1997 Speedway Grand Prix season. It took place on 14 June in the Motorstadium in Linköping, Sweden It was the third Swedish SGP and was won by Polish rider Tomasz Gollob. It was the second win of his career. Starting positions draw The Speedway Grand Prix Commission nominated Jason Crump from Australia as Wild Card.
WIKI
0 I have a React Native application running on my iPhone and I would like to change the app configuration (targeting another environment) when a specific configuration profile is installed. How can I read/access an iOS configuration profile from a React Native application? 1 Answer 1 0 You can make simple custom module to get that value from iOS native side. Here is the custom module named RNConfig RNConfig.h #import <Foundation/Foundation.h> #import "React/RCTBridgeModule.h" @interface RNConfig : NSObject<RCTBridgeModule> @end RNConfig.m #import "RNConfig.h" @implementation RNConfig RCT_EXPORT_MODULE(); - (NSDictionary *)constantsToExport { NSString* platform_name = [[[NSBundle mainBundle] infoDictionary] valueForKey:@"PlatformName"]; return @{ @"PlatformName": platform_name }; } @end With React Native you can use that module by following code snippets. const { RNConfig } = require('NativeModules'); let platformName = RNConfig.PlatformName; This module could be used when you have multiple targets on iOS side. So On React Native side, you have many config values according to every targets. config/index.js import { targetA } from './targetA'; import { targetB } from './targetB'; const variables = { targetA, targetB }; const { RNConfig } = require('NativeModules'); export default variables[RNConfig.PlatformName]; If your iOS target name is targetA or targetB then you can use the specific configuration setting on React Native side by getting iOS platform name like above. Anyway, you can get any types of configuration values on iOS side by changing the RNConfig.m file. 10 • Thank you for your answer! Do you know a documentation page where I can find all the available keys I can get the value from the RNConfig.m file? Or are they coming from the custom profile? – ZedTuX Oct 16, 2018 at 7:01 • It is the dictionary from the Info.plist file. developer.apple.com/documentation/foundation/nsbundle/… – awmidas Oct 23, 2018 at 5:28 • Okay so your solution is not about to access a phone profile, right? Or did I misunderstood it? – ZedTuX Oct 23, 2018 at 6:46 • It can be used when you want to use the different environment for every Targets on iOS app. With above method you can access the Info.plist file for each target. so if you make the different Info.plist file for each target(it is possible and you should do that if you have many targets) and you can access each info file with above method. – awmidas Oct 23, 2018 at 8:04 • Thank you for your comments. I'm talking about iOS Configuration Profiles (like it is described in this article : howtogeek.com/253325/…) – ZedTuX Oct 23, 2018 at 8:10 Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Step 1: Download the Functionbeat packageedit The Functionbeat package contains the command line tools, configuration file, and binary code required to run Functionbeat in your serverless environment. To download and extract the package, use the commands that work with your system. linux: curl -L -O https://artifacts.elastic.co/downloads/beats/functionbeat/functionbeat-7.1.1-linux-x86_64.tar.gz tar xzvf functionbeat-7.1.1-linux-x86_64.tar.gz mac: curl -L -O https://artifacts.elastic.co/downloads/beats/functionbeat/functionbeat-7.1.1-darwin-x86_64.tar.gz tar xzvf functionbeat-7.1.1-darwin-x86_64.tar.gz win: 1. Download the Functionbeat Windows zip file from the downloads page. 2. Extract the contents of the zip file.
ESSENTIALAI-STEM
Page:The School and Society.djvu/17 three lectures presented in the following pages were delivered before an audience of parents and others interested in the University Elementary School, in the month of April of the year. Mr. Dewey revised them in part from a stenographic report, and unimportant changes and the slight adaptations necessary for the press have been made in his absence. The lectures retain therefore the unstudied character as well as the power of the spoken word. As they imply more or less familiarity with the work of the Elementary School, Mr. Dewey's supplementary statement of this has been added.
WIKI
Kuhikugu Kuhikugu is an archaeological site located in Brazil, at the headwaters of the Xingu River, in the Amazon Rainforest. The area around Kuhikugu is located in part of the Xingu National Park today. Kuhikugu was first uncovered by anthropologist Michael Heckenberger, working alongside the local Kuikuro people, who are the likely descendants of the original inhabitants of Kuhikugu. Archaeological complex and history In the broad sense, the name refers to an archaeological complex including twenty towns and villages, spread out over an area of around 7700 sqmi, where close to 50,000 people may have once lived. Kuhikugu was likely inhabited from a period of time around 1,500 years ago to a time as recently as 400 years ago, when the people living there were likely killed by diseases brought over by Europeans. Although Europeans likely did not spread it to the inhabitants of Kuhikugu directly, they did directly spread diseases to trade partners from other areas. By the time Europeans did make it to this area, the civilization was already crumbling. Early conquistadors that explored this area likely saw the last moments of these towns, and their records provide insight to what these locations would have looked like. And when Europeans returned some time later the towns and villages were already consumed by the rainforest. The indigenous people now lived in tribes away from the ruins, and the memory of that civilization was remembered through oral tradition. What sets the people that would have inhabited Kuhikugu apart from other South American civilizations are their horizontal monuments. Unlike Aztec and Maya peoples who built pyramids, these people built long monuments on the ground for their gods. Presumably this is because it would be impossible to maintain a large pyramid in a rainforest, and it would be dwarfed by the surrounding trees. The engineering was sophisticated enough for bridges that crossed large sections of river and moats for defensive purposes. Furthermore, the black earth surrounding the area indicates large scale agricultural activity Settlement X11 Strictly speaking, Kuhikugu is settlement X11 of this complex, located near Porto dos Meinacos on the eastern shore of Lake Kuhikugu (now Lagoa Dourada) at -12.55833°N, -53.11111°W. There, as well as at other former settlements of the Kuhikugu complex, satellite imagery reveals that even today the forest differs from surrounding pristine areas, and ground-based exploration reveals this to be an effect of the anthrosol (cf. terra preta), known to the Kuikuro as egepe. Directly to the north of the X11 site there is a Kuikuro village, the small size of which provides an interesting comparison to the large area of egepe which indicates the prehistoric settlement. Large defensive ditches and palisades were built around some of the communities at Kuhikugu. Large plazas also exist at some of the towns throughout the region, some around 490 ft across. Many of the communities at Kuhikugu were linked, with roads which bridged some rivers along their paths, and with canoe canals running alongside some of the roads. Sites X35 and X34 are significant communities connected by two of these roads. Site X11 has a total of 4 suburbs that connect via river or road, all of which appear to have constant relation to one another. Fields of mandioca (cassava) may have existed around the communities at Kuhikugu, suggesting that the people there were farmers. Dams and ponds which appear to have been constructed in the area also suggest that the inhabitants of Kuhikugu may have been involved with fish farming, which is still practised by some of their modern-day Kuikuro descendants. The Lost City of Z There is a possibility that legends regarding Kuhikugu may have convinced the British explorer Lieutenant Colonel Percy Fawcett to go on his expedition for "City Z". Fawcett claimed to have discovered a large number of pottery shards in the Amazon while doing field work, and the Kuhikugu sites could have potentially had a large amount of pottery on the surface. There are over 20 sites that Kuhikugu encompasses, each of which could have supported over 5,000 people, and the sophisticated city planning and remaining structures could have been what Fawcett was looking for. Sites all follow a similar layout, meaning any of the sites could have influenced Fawcett to search for the Lost City of 'Z'.
WIKI
FIS Freestyle Ski and Snowboarding World Championships 2023 The 2023 FIS Freestyle Ski and Snowboarding World Championships were held in Bakuriani, Georgia from 19 February to 4 March 2023. This marked the first ever snow sports World Championships to be contested in Georgia. A total of 30 medal events were on the program, with 16 being contested in the freestyle and freeski disciplines and 14 in snowboarding. Host selection In April 2017, the Georgian Ski Federation officially submitted a bid to host the event. In May 2018 at the annual FIS congress in Greece, Bakuriani was selected unanimously as the official host city for the event. Bakuriani was the only candidate to host the event. Schedule 30 events are held.
WIKI
Maximilienne Maximilienne (1884-1978) was a French stage and film actress. She appeared frequently in films, generally in supporting roles. Later in her career she played the domineering comic foil to the comedian Fernand Raynaud. Selected filmography * The Adventures of Robert Macaire (1925) * To the Polls, Citizens (1932) * Our Lord's Vineyard (1932) * Étienne (1933) * Bastille Day (1933) * The Surprises of Divorce (1933) * Court Waltzes (1933) * 600,000 Francs a Month (1933) * The Concierge's Daughters (1934) * Liliom (1934) * Chourinette (1934) * Tartarin of Tarascon (1934) * Maria Chapdelaine (1934) * Lovers and Thieves (1935) * Disk 413 (1936) * The Secrets of the Red Sea (1937) * My Aunts and I (1937) * The Man from Nowhere (1937) * Prison sans barreaux (1938) * My Priest Among the Rich (1938) * Clodoche (1938) * The Baker's Wife (1938) * Shop Girls of Paris (1943) * Picpus (1943) * The Ménard Collection (1944) * Rooster Heart (1946) * Song of the Clouds (1946) * Monsieur Vincent (1947) * Clochemerle (1948) * The Cupboard Was Bare (1948) * Blonde (1950) * The Treasure of Cantenac (1950) * Monsieur Octave (1951) * Music in the Head (1951) * Adhémar (1951) * Pardon My French (1951) * Dans la vie tout s'arrange (1952) * The Congress of Mother-in-Laws (1954) * The Enigma of the Folies-Bergere (1959)
WIKI
Rhona Brankin Rhona Brankin (born 19 January 1950) is a former Scottish Labour-Co-operative politician who served as the Member of the Scottish Parliament (MSP) for the Midlothian constituency. She was first elected in 1999 and was re-elected in 2003 and 2007. She was one of six female Labour MSPs to stand down in 2011. Background Brankin is a graduate of the University of Aberdeen and before entering the Scottish Parliament she was a teacher and a lecturer on special educational needs. She was former Chair of the Scottish Labour Party. She is married with two grown-up daughters. In early 2000, Brankin was diagnosed with breast cancer. She had a mastectomy at St. John's Hospital in Livingston, which successfully removed the cancer. Scottish Parliament Brankin was Deputy Minister for Culture and Sport in the Scottish Executive from 1999 to 2000 and Deputy Minister for Environment and Rural Development from 2000 to 2001. In October 2004 she was appointed Deputy Minister for Health and Community care, returning to the Environment and Rural Development portfolio in June 2005. In January 2007 she was promoted to Minister for Communities after the resignation of Malcolm Chisholm. Following Labour's defeat at the hands of the SNP at the May 2007 election, Brankin became shadow Minister for Education and Lifelong Learning. She was convener of the Public Petitions Committee from June 2010. Prior to the 2011 elections, Brankin announced her decision not to stand for re-election, retiring from Holyrood after 12 years. The Midlothian constituency underwent boundary changes, and the two new constituencies created, Midlothian North and Musselburgh, and Midlothian South, Tweeddale and Lauderdale, were won by the SNP.
WIKI
Rather Than Fear Inflation, Trade These Two ETFs Inflation will continue to threaten anxiety for investors, but that fear can be assuaged with a pair of leveraged exchange traded funds (ETFs) from Direxion Investments. If yields rise in concert with inflation, traders can use the Direxion Daily 20+ Yr Trsy Bear 3X ETF (TMV) to play a drop in bond prices. TMV seeks daily investment results equal to 300% of the inverse of the daily performance of the ICE U.S. Treasury 20+ Year Bond Index. “This ETF offers 3x short leveraged exposure to the broad-based NYSE 20 Year Plus Treasury Bond Index, making it a powerful tool for investors with a bearish short-term outlook for U.S. 30 year treasuries,” an ETF Database analysis details. “An investment in leveraged debt can be a very risky one, as there are numerous factors that can converge to drastically change the returns of these products.” As such, novice investors might want to stay away. However, for the seasoned investor, TMV could serve as an ideal inflation hedge should rates rise and push bond prices lower. “Investing in leveraged bond ETFs requires a careful understand of the specific economy, in this case the US, and what kind of policies and regulations are currently in place and are set to be enforced in the future,” the analysis added further. “TMV can be a powerful tool for sophisticated investors, but should be avoided by those with a low risk tolerance or a buy-and-hold strategy.” A Play on Cooling Inflation If inflation ends up not being as high as market analysts forecast, there's another way to play the move: the Direxion Daily 20+ Year Treasury Bull 3X Shares (TMF). TMF seeks daily investment results of 300% of the daily performance of the ICE U.S. Treasury 20+ Year Bond Index. The fund has been on the move higher as inflation fears start to dissipate. As such, TMF has risen 21.5% over the last few months as economic data might be signaling to the Federal Reserve that the economy isn't overheating. "A recent run-up in consumer prices cooled slightly in August, signaling that although inflation is higher than normal, the White House and Federal Reserve may be beginning to see the slowdown in price gains they have been hoping for," a New York Times article said. "Policymakers have consistently argued that a surprisingly strong burst of inflation this year has been tied to pandemic-related quirks and should prove temporary, and most economists agree that prices will climb more slowly as businesses adjust and supply chains return to normal," the article added. "The major question hanging over the economy’s future has been how much and how quickly the jump will fade."For more news, information, and strategy, visit the Leveraged & Inverse Channel. Read more on ETFtrends.com. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Signs Of Stress And Anxiety Affecting Mental Health You are stressed out, this might be caused by some factors but you might ignore. This article on site VKool will help you identify signs of stress and anxiety affecting mental health so that you can treat them while balancing your mind and body health effectively. Signs Of Stress And Anxiety Affecting Your Mental Health I. What Is Stress? signs of stress Stress is the reaction of body to harmful situations whether they are perceived or real. When you feel stressed or threatened, the chemical reaction will occur in your body that makes you act to prevent mental injury. This reaction is known as a stress response. During the stress response, the heart begins racing, the breathing quickens, the muscles tighten, and the pressure rises. Stress occurs and affects people in different levels, depending on the ability of their stress repair and treatments. In other words, some people can handle stress better than others. But not all stressors are bad. In low levels, this can help you accomplish tasks as well as stop you from getting hurt. Physically, the human body is designed to handle small stress. However, we aren’t equipped to solve chronic and long-term stress without illness consequences. II. Symptoms & Signs Of Stress signs of stress There are a lot of physical and emotional disorders that can link to stress such as depression, heart attacks, anxiety, stroke, immune system disturbances and hypertension. These symptoms increase the susceptibility to infections and a host of viral diseases and conditions ranging from common cold to herpes, AIDS, cancers, autoimmune diseases and so on. In addition, stress can directly affect the skin and cause skin conditions such as rashes, atopic dermatitis, hives, the gastrointestinal system and contribute to degenerative neurological disorders and insomnia. In fact, it is hard to think of diseases and conditions in which stress can’t play an important role or the body parts that are not affected. This list will grow undoubtedly as extensive ramifications of anxiety and stress are being appreciated increasingly. 50 common signs of stress: 1. Jaw clenching and pain, frequent headaches 2. Grinding teeth 3. Stammering or stuttering 4. Trembling of hands and lips 5. Muscle spasms, neck ache and back pain 6. Faintness, dizziness and light headedness 7. Buzzing or popping sounds and ringing 8. Excessive sweating and frequent blushing 9. Sweaty or cold hands and feet 10. Swallowing problems and dry mouth 11. Infections, frequent colds and herpes sores 12. Goose bumps, rashes, hives and itching 13. Unexplained/frequent allergy attacks 14. Nausea, heartburn and stomach pain 15. Flatulence and excess belching 16. Loss of control, constipation and diarrhea 17. Frequent sighing and difficulty breathing 18. Sudden attacks of threatening panic 19. Rapid pulse, chest pain and palpitations 20. Frequent urination 21. Worry, excess anxiety, nervousness and guilt 22. Diminished sexual performance or desire 23. Hostility, increased anger and frustration 24. Depression, frequent/wild mood swings 25. Decreased or increased appetite 26. Disturbing dreams, insomnia and nightmares 27. Racing thoughts and difficulty concentrating 28. Trouble in learning new information 29. Confusion, forgetfulness and disorganization 30. Difficulty in making decisions 31. Overwhelmed and feeling overloaded 32. Suicidal thoughts and frequent crying spells 33. Feelings of worthlessness or loneliness 34. Little interest in punctuality and appearance 35. Feet tapping, nervous habits and fidgeting 36. Irritability, edginess and increased frustration 37. Overreaction to petty annoyances 38. Compulsive or obsessive behavior 39. Increased numbers of minor accidents 40. Reduced work productivity or efficiency 41. Excuses or lies to cover up poor work 42. Mumbled or rapid speech 43. Excessive suspiciousness or defensiveness 44. Problems in sharing and communication 45. Social isolation and withdrawal 46. Weakness, fatigue and constant tiredness 47. Frequent consumption of over-the-counter drugs 48. Weight loss or gain without diet 49. Alcohol, drug use and increased smoking 50. Impulse buying and excessive gambling III. Consequences Of Long-Term Stress When it comes to signs of stress, small doses of stress now and then isn’t something concerned about. Chronic and ongoing stress, however, can exacerbate or cause many serious health conditions and diseases. Here are ways in which some key body systems react: 1. Nervous System signs of stress When stressed, psychologically or physically your body suddenly changes its energy resources to fight off the perceived threat. In what is considered as the fight response, sympathetic nervous system signals adrenal glands in order to release cortisol and adrenaline. These hormones allow the heart to beat faster, raise the blood pressure, shift digestive process and increase glucose levels in bloodstreams. When the crisis passes, the body systems return to normal. 2. Musculoskeletal System signs of stress Under stress, the body muscles tense up. Muscle contraction for extended periods may trigger tension, migraines, frequent headaches and musculoskeletal conditions. 3. Respiratory System signs of stress Stress can make people breathe harder and rapid breathing, hyperventilation and panic attacks in some people. 4. Cardiovascular System signs of stress Acute stress may be momentary like being stuck in traffic that can cause an increase in the heart rate and stronger contractions of heart muscles, heart dilate; and increased amount of blood pumped to body parts. Repeated episodes of stress may cause inflammation in coronary arteries, and lead to heart attack. 5. Endocrine System signs of stress Adrenal glands When your body is stressed, your brain sends signals from hypothalamus that cause adrenal cortex for producing cortisol and adrenal medulla for producing epinephrine, called the “stress hormones”. Liver When the epinephrine and cortisol levels are released, your liver will produce more glucose that gives you more energy for fighting in an emergency. 6. Gastrointestinal System signs of stress Esophagus Stress can prompt people to eat much less and much more than you often do. If people eat different foods or increase their use of alcohol or tobacco, they may experience heartburn or acid reflux. Stomach The stomach will react with nausea and pain. You can vomit if your stress is severe. Bowels Stress may affect digestive system and nutrients the intestines absorb. Stress also affects how quick foods move through the body. You can find that you have either constipation or diarrhea. 7. Reproductive System signs of stress In men, large amounts of cortisol that are produced under chronic stress can affect normal functioning of reproductive system. Severe stress can impair sperm production, testosterone and cause impotence. In women, chronic stress may cause irregular or absent menstrual cycles or more painful periods. Moreover, stress can reduce sexual desire. IV. Treatments For Stress Believe or not believe, stress is a part of our lives. What matters is how we handle stress. A good thing we can do to stop stress overload and our health responses that come with this is to know signs of stress. If you are feeling overwhelmed by stress, come meet your doctor. Many signs of stress may also be symptoms of other health conditions. Doctors can evaluate your stress symptoms as well as rule out other problems. If your stress is to blame, Doctor can recommend a counselor or therapist to help you handle your stress. 1. Remember 4 As: Avoid + Alter + Adapt + Accept signs of stress • Avoid unnecessary stress. Learn to eliminate daily stressors. Say no with negative thoughts and get clear about your situation to act right. • Alter the situation. Don’t hurt yourself if you can’t avoid stress. Instead of that, alter your situation to be more positive and happier. • Adapt to the stressor. Yes! You can do that. You can improve your own situation by a lot of positive habits, healthy lifestyle, then stress is no problem. • Accept things that you cannot change. Instead of getting more stressed and anxious, you should change your mind to accept the truth. This is the way you can feel peaceful and more comfortable. 2. Have Relaxation Time signs of stress Relaxation techniques and exercises deep breathing, yoga and meditation, can activate a state of restfulness and your body’s relaxation response that are opposite to the stress response. 3. Exercise Regularly signs of stress Besides, you can focus on physical activity to reduce and prevent negative effects of stress. As you know, nothing can beat aerobic exercise for eliminating tension and pent-up stress. 4. Eat A Healthy Diet signs of stress The well-nourished body is better prepared to handle stress. Start a day with your healthy breakfast, reduce sugar and caffeine and intake, and cut down on nicotine and alcohol. 5. Have Good Sleep signs of stress Being tired can make your stress worse by making you think irrationally. Keep you cool by have good night’s sleep. Bottom line: Hope that this article of signs of stress and anxiety affecting mental health could help you understand your stress and deal with it fast. For any comment about the writing, please drop it at the bottom of the page. Thanks for reading! Want More Content Like This In Your Inbox? Join The Discussion JOIN THE CONVERSATION Comments JOIN THE CONVERSATION
ESSENTIALAI-STEM
User:Ernestia M. Fraser/sandbox ERNESTIA FRASER (born July 1986) is an author, screenwriter, poet, and educator, who was born and raised in Nassau, Bahamas. She has received a double B.A. in English and Communication at Messiah College, and also an M.F.A. in Creative Writing: Screenwriting at Chatham University. She has received a number of international literary awards and honors in both poetry and screenwriting. In 2011, her thesis screenplay, Inside the Fallen Moon, won 1st prize in the Hollywood Black Film Festival International Storyteller Competition. Shortly after, she attended the Writer’s Institute for Diversity in Los Angeles facilitated by Harrison Reiner, a CBS Television Story Analyst. In 2012, her literary memoir, Carnival of Love: A Tale of a Bahamian Family, was accepted for publication by Caribbean Studies Press. To date, Fraser’s poetry has appeared in both Caribbean and international journals, such as St. Somewhere, Tongues of the Ocean, The Caribbean Writer, Quiddity, Emerge Literary Journal, Blackberry, POUI: Cave Hill Journal and the Caribbean Quarterly. Her poem, “The Way We Dance” won The Caribbean Writer’s 2014 “Daily News Prize.” After spending a number of years teaching at Bahamian high schools and colleges, she developed a keen interest in expanding learning opportunities throughout the nation and wider Caribbean. Through the creation of innovative ventures like The Tutoring Station and MasterWriting242, Fraser hopes to make a lasting impact in the field of education, inspiring more academic achievement and personal growth. Fraser is presently living in the Bahamas, working as a writing instructor at The Tutoring Station. Published works Literary memoir, Carnival of Love: A Tale of a Bahamian Family, Caribbean Studies (C)2013; Self-published/rights retained 2019.
WIKI
Talk:Melilla Islam Christianity discrepancy In the Christianity and Islam section of the Demographics area, the former says that Roman Catholicism is the largest religion in Melilla at 65%, while the latter says that half the population of Melilla are Muslim. Obviously, both cannot be correct. <IP_ADDRESS> (talk) 19:38, 17 February 2024 (UTC) * agreed <IP_ADDRESS> (talk) 18:18, 29 March 2024 (UTC) WP:NOTDICT & WP:UE We must have the actual romanizations of foreign text like Arabic. We do not need every variant IPA transcription in the lead sentence, especially when it runs to fill an entire line. It's questionable that /ə/ needs a separate version, since it's just informal/unstressed handling of the short /ɛ/ sound, and there's already a (mishandled) #Name section. That's where a laundry list of IPA forms should be dumped if we're even including them instead of (more correctly/helpfully) providing links to the Wiktionary entries. — Llywelyn II 16:53, 6 April 2024 (UTC) Oh, and the unsourced "Spanish pronunciation" is/was wrong per the Wiktionary entry and our article on the Spanish double L. The editor who added it provided a historic pronunciation, but not a local or standard one. Ditto the mistranscription of the Punic characters on the coinage, presumably owing to Lara Peinado. Ditto misattributing the Latin to Ptolemy and Pliny instead of just Pliny. &c. &c. &c. — Llywelyn II 17:48, 6 April 2024 (UTC) Berber script unneeded? The article on Tarifit language says it's typically written in a modified Latin script, not with the Berber alphabet. Is that mistaken? or should both appear? — Llywelyn II 16:59, 6 April 2024 (UTC)
WIKI
ia64/xen-unstable changeset 15429:7825043607bc tools: Adjust tools' path calculation. I'm suggesting this change to make another tiny step towards the ability to run the tools e.g. out of the build tree (so that multiple different Xen versions can co-exist without the requirement to re-install the respective version with each boot). Signed-off-by: Jan Beulich <jbeulich@novell.com> author kfraser@localhost.localdomain date Wed Jun 20 17:07:15 2007 +0100 (2007-06-20) parents f50f0ec7dd2c children 296fd2598e00 files tools/misc/xen-python-path tools/python/xen/util/auxbin.py line diff 1.1 --- a/tools/misc/xen-python-path Wed Jun 20 17:05:48 2007 +0100 1.2 +++ b/tools/misc/xen-python-path Wed Jun 20 17:07:15 2007 +0100 1.3 @@ -28,8 +28,13 @@ import os 1.4 import os.path 1.5 import sys 1.6 1.7 -for p in ['python%s' % sys.version[:3], 'python']: 1.8 - for l in ['/usr/lib64', '/usr/lib']: 1.9 +usr = os.path.dirname(os.path.dirname(sys.argv[0])) 1.10 +list = [ os.path.join(usr,'lib64') ] 1.11 +list += [ os.path.join(usr,'lib') ] 1.12 +list += ['/usr/lib64', '/usr/lib'] 1.13 + 1.14 +for l in list: 1.15 + for p in ['python%s' % sys.version[:3], 'python']: 1.16 for k in ['', 'site-packages/']: 1.17 d = os.path.join(l, p, k) 1.18 if os.path.exists(os.path.join(d, AUXBIN)): 2.1 --- a/tools/python/xen/util/auxbin.py Wed Jun 20 17:05:48 2007 +0100 2.2 +++ b/tools/python/xen/util/auxbin.py Wed Jun 20 17:07:15 2007 +0100 2.3 @@ -27,6 +27,7 @@ LIB_64_ARCHS = [ 'x86_64', 's390x', 'spa 2.4 2.5 import os 2.6 import os.path 2.7 +import sys 2.8 2.9 2.10 def execute(exe, args = None): 2.11 @@ -47,6 +48,14 @@ def path(): 2.12 2.13 def libpath(): 2.14 machine = os.uname()[4] 2.15 + if sys.argv[0] != '-c': 2.16 + prefix = os.path.dirname(os.path.dirname(sys.argv[0])) 2.17 + path = os.path.join(prefix, os.path.basename(LIB_64)) 2.18 + if machine in LIB_64_ARCHS and os.path.exists(path): 2.19 + return path 2.20 + path = os.path.join(prefix, os.path.basename(LIB_32)) 2.21 + if os.path.exists(path): 2.22 + return path 2.23 if machine in LIB_64_ARCHS and os.path.exists(LIB_64): 2.24 return LIB_64 2.25 else:
ESSENTIALAI-STEM
User:Vtog Just here to expand Wikipedia. Also, greatest threat ever: "I'm Going to Print out Wikipedia and whack you with it!"
WIKI
Shark Attack (disambiguation) A shark attack is a biting incident involving a shark. Shark Attack (or SharkBite) may also refer to: Lists of shark attacks * International Shark Attack File, a global database of shark attacks * Shark attacks in South Australia * Lists of fatal shark attacks Films * Jersey Shore: Shark Attack (2012 film), a SyFy telemovie monster film * Malibu Shark Attack (2009 film), a SyFy telemovie monster film in the Maneater film series produced by RHI Entertainment * Spring Break: Shark Attack (2005 film), a CBS telefilm monster movie * Shark Attack (film), a 1999 monster film telemovie produced by Nu Image Films * Shark Attack 2, a 2000 direct-to-video monster film produced by Nu Image Films * Shark Attack 3: Megalodon, a 2002 direct-to-video monster film produced by Nu Image Films * 2-Headed Shark Attack, a 2012 SyFy telefilm monster movie produced by The Asylum * 3-Headed Shark Attack, a 2015 SyFy telefilm monster movie produced by The Asylum * 5-Headed Shark Attack, a 2017 SyFy telefilm monster movie produced by The Asylum Music * "Shark Attack", a 2013 song by Grouplove from Spreading Rumours. * "Shark Attack", a song by Math the Band. Other * SharkBite, a brand of push-to-pull compression fittings in plumbing
WIKI
fastq2fasta by sed • A+ 所属分类:Script I've been having fun with sed this morning. I'm testing using Illumina data as input to Newbler, just to see how it works. As the data is paired-end, it requires some pre-processing following the guidelines for Sanger reads in the manual for gsAssembler (A.K.A newbler). Yesterday I did this using the method proposed in the manual with a final cleanup using sed so the procedure was fastq-->fasta-->perl script to make .acc file --> use fnafile to produce fasta file --> final tidy using sed. That was all messy and horribly slow. So today I decided to do all of those steps using sed. Here's the end result: 1) Convert fastq2fasta using sed sed '/^@/!d;s//>/;N' asp5_leaf_read1.fq > asp5_leaf_read1.fna sed '/^@/!d;s//>/;N' asp5_leaf_read2.fq > asp5_leaf_read2.fna 2) Format fasta header so newbler can match the pairs up sed -e 's/>\(.*\)#0\/\(.*\)/>\1 template=\1 dir=\2 library=asp5/' -e 's/dir=1/dir=f/' asp5_leaf_read1.fna > asp5_leaf_read1_newbler.fna sed -e 's/>\(.*\)#0\/\(.*\)/>\1 template=\1 dir=\2 library=asp5/' -e 's/dir=2/dir=r/' asp5_leaf_read2.fna > asp5_leaf_read1_newbler.fna 3) Produce qual files with read names matching the fasta files sed '/^+/!d;s//>/;N' asp5_leaf_read1.fq | sed 's/>\(.*\)#0\/\(.*\)/>\1/' > asp5_leaf_read1_newbler.qual sed '/^+/!d;s//>/;N' asp5_leaf_read2.fq | sed 's/>\(.*\)#0\/\(.*\)/>\1/' > asp5_leaf_read2_newbler.qual Those qual values will then need rescaling to phred33 .... still to do. Steps 1 and 2 can also be piped if you don't want to keep the unmodified .fna files (but I did - for testing Inchworm). I also need to check whether to reverse compliment the reads for either paired-end or mate-pair data. Those steps took about 15 mins to complete. The attempt yesterday took over six hours. Thank you sed! ybzhao 发表评论 :?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: 目前评论:2   其中:访客  2   博主  0 • Dan B Dan B 0 I was hoping for a Unix command, so I would avoid having to go through a perl script; I suppose I could do a ‘tr’. What about the first two questions? • ybzhao ybzhao 1 @Dan B hi, ‘asp5′ and ‘leaf’ is just a filename without special means. As for the first question, I did not understand it well. I am sorry.
ESSENTIALAI-STEM
Talk:List of NATO reporting names for surface-to-air missiles SA-5 Names The article mentions the name Volga. However the article on the S-200 missile gives the names Angara/Vega/Dubna but not Volga. It would be good if the correct names could be sorted out and listed in both articles. It also mentions that the SA-5 designation was first applied to an anti-ballistic missile RZ-25/5V11 Dal with Nato reporting name "Griffon" but that this missile project was a failure and cancelled. Maybe this should be included in the list.<IP_ADDRESS> (talk) 14:11, 15 August 2017 (UTC) SA-21 "Growler" I'm having a hard time finding any kind of source saying there's a "Growler" missile reporting name. It seems like this is some Wiki invention and not a real thing at all. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 11:30, 16 July 2022 (UTC)
WIKI
General Windows 7 Settings That Will Help You Understand Your Computer File System Better There are some general Windows 7 Folder options that will help you better understand what's going on with your PC's file system. These options are not new, but just a little difficult to find if you're an inexperienced user. Under any open Windows Explorer Window, select the "Organize" Menu, select "Folder and Search Options". Go to the "View" tab, in here you'll be presented with three default options that really hinder your ability to troubleshoot a computer. The first one is "Don't Show hidden files, folders, or drives". These are hidden for a reason but if you accept this and don't go immediately to delete this files when you see them, you'll discover where Windows stores many of the settings and files your programs use. It's best to "Show hidden files, folders and drives" if you are cleaning up a computer or looking to backup settings and other files. Another option I like to uncheck is "Hide protected operating system files (Recommended)" This really helps you to be familiar with the files that are supposed to be on a properly working system drive. There are situation where you are dealing with spyware or other programs that require you to be able to see files at this level. These first two options are probably more of a preference and a minor aid in troubleshooting. The last option you should always have unchecked is "Hide extension for known file types". It is so rediculous to allow Windows to determine what extensions to show and which ones to hide. This promotes a lot of ignorance on the part of the end user. Often times they are unaware that files still have a three letter extension as a result. The only way to learn what types of files are opened by which types of programs is to better understand the creator types that are out there, and then being able to associate those files with a particular program you have on your computer that will open them.
ESSENTIALAI-STEM
Ultraviolet Photoluminescence of Carbon Nanospheres and its Surface Plasmon-Induced Enhancement. Gan Z, Pan P, Chen Z, Meng M, Xu H, Yu Z, Chang C, Tao Y Small 14 (16) e1704239 [2018-04-00; online 2018-03-25] Ultraviolet (UV) light can be used in versatile applications ranging from photoelectronic devices to biomedical imaging. In the development of new UV light sources, in this study, stable UV emission at ≈350 nm is unprecedentedly obtained from carbon nanospheres (CNSs). The origin of the UV fluorescence is comprehensively investigated via various characterization methods, including Raman and Fourier transform infrared analyses, with comparison to the visible emission of carbon nanodots. Based on the density functional calculations, the UV fluorescence is assigned to the carbon nanostructures bonded to bridging O atoms and dangling -OH groups. Moreover, a twofold enhancement in the UV emission is acquired for Au-carbon core-shell nanospheres (Au-CNSs). This remarkable modification of the UV emission is primarily ascribed to charge transfer between the CNSs and the Au surface. Affiliated researcher PubMed 29575595 DOI 10.1002/smll.201704239 Crossref 10.1002/smll.201704239 Publications 7.1.2
ESSENTIALAI-STEM
His research questioned the Indian version of events and despite his scholarly reputation many of his works were banned in India Alastair Lamb, who has died aged 93, was a diplomatic historian whose work on the history and genesis of the dispute between India and Pakistan over Kashmir challenged the conventional narrative. Lamb was among the first academics to examine the British archives on Kashmir, and was widely respected for his meticulous research, attention to detail and generosity to other scholars. Some felt, however, that his work was marred by an anti-Indian bias; indeed, much of it was banned in India and he himself was convinced that in the 1960s the government of India had been instrumental in denying him a more prestigious academic post than the ones he achieved. The background to Lamb’s researches on Kashmir was the desire of Maharaja Hari Singh (Hindu ruler of Jammu and Kashmir at the time of Partition) for independence for his Muslim-majority state. In August 1947 he proposed “standstill agreements” with both India and Pakistan, hoping to buy time by maintaining the administrative relationship that had existed with the British. Pakistan accepted the agreement. India declined, stating that Kashmir should send representatives to Delhi to negotiate; no representative was sent. But according to Indian accounts, the “standstill” with Pakistan was breached on October 22 by a massive intrusion into Kashmir by tribal Pathans, assisted by Pakistani soldiers in civilian clothes, who carried out massacres and plunder. With his forces unable to cope, on October 25 the Maharaja fled Srinagar and requested military assistance from India. India agreed on condition that the Maharaja signed an Instrument of Accession (IoA), which, according to the Indian version, he did on October 26. Indian forces rushed into Kashmir the following day. The resulting Indo-Pakistani War of 1947-8 ended with a UN-mediated ceasefire along what is now known as the Line of Control. In his studies of the period, Crisis in Kashmir: 1947-1966 (1966), Kashmir: A Disputed Legacy, 1846-1990 (1991), Birth of a Tragedy, Kashmir 1947 (1994) and Incomplete Partition: The Genesis of the Kashmir Dispute 1947-1948 (2002), Lamb showed that the Maharaja could not in fact have signed the IoA on October 26, as he was then on the run, travelling by road to Jammu (a distance of more than 350 km). There was also no evidence of contact between him and Indian emissaries on that day. The earliest he could have signed was on the afternoon of October 27 – after Indian troops had already assumed control of Srinagar. Lamb also questioned the justification given for the Indian military intervention. The reality, Lamb wrote, was that a serious but indigenous revolt had broken out in the Poonch area of Kashmir, to which the Maharaja had responded with a massacre in Jammu in which at least 200,000 Muslims were killed. It was this that had stirred the Pathan tribals to cross the border. Lamb supported charges by Pakistan that Lord Mountbatten, the last Viceroy of British India and briefly the first Governor-General of independent India, had conspired to award to India certain Muslim majority areas in the Punjab, originally scheduled to go to Pakistan under a blueprint prepared by the previous Viceroy, Lord Wavell, so as to give India access to Kashmir. Mountbatten, he claimed, had a pro-India bias and was guilty of prevarication, if not outright lying by claiming he had had nothing to do with the final award. Lamb’s arguments bolstered Pakistan’s claims that the accession was “fraudulent”, that the Maharaja acted under “duress”, and that he had no right to accede to India at a time when a standstill agreement with Pakistan was in force. New Delhi, Lamb concluded, “had no valid legal ground or moral justification for accession” in Kashmir. Many historians accepted Lamb’s finding that the Maharaja probably signed after Indian troops had landed in Srinagar. But Srinath Raghavan, a senior fellow at the Carnegie Endowment for International Peace, felt that in Birth of a Tragedy, Lamb had “overreached” himself by claiming that the Maharaja might not have signed the IoA at all, overlooking letters in which the Maharaja indicated that he had. Meanwhile, the BBC journalist Andrew Whitehead, author of A Mission in Kashmir, in which he described a notorious massacre by Pathan tribesmen in the town of Baramulla, suggested Lamb had diminished his own authority with the claim that “whatever happened in Baramula [sic] … is as nothing when compared to what has happened to Kashmiri men, women and children at Indian hands since 1989.” Alastair Lamb was born on January 9 1930 into a diplomatic family in Harbin, China, the only child of Lionel (later Sir Lionel) Lamb and his Australian-born wife Jean, née MacDonald. His father, a Sinologist who would end his career as Ambassador to Switzerland, was then serving in the British consular service in China where he and his wife were interned by the Japanese from December 1941 to August 1942. Luckily they had managed to get their son away to Britain to stay with his paternal grandfather, Sir Harry Lamb, also a diplomat, in Sidmouth. From Harrow, Alastair went up to King’s College, Cambridge, where he took a degree in History, followed by a doctorate on the British Indian border between the era of Warren Hastings and the 1904 Younghusband expedition to Tibet. This was published in 1960 as Britain and Chinese Central Asia: The Road to Lhasa 1761 to 1905 (revised and republished in 1986 as British India and Tibet: 1766-1910). In 1959 Lamb moved to Malaya, where for nine years he was a reader of history at the University of Malaya and where a side interest in archaeology led him to investigate Hindu and Buddhist sites in Kedah and southern Thailand. This was followed by three years as a senior fellow in the department of history at the Australian National University and four as professor of history at the University of Ghana. During the 1970s he spent some time working in the office of the Pakistan leader Zulfikar Ali Bhutto; during the 1980s he was a reader of history at Hatfield Polytechnic. As well as his books on Kashmir, Lamb was known for his studies of the China-India border issues, sparked by the Sino-Indian war of 1962. His The China-India Border (1964) was expanded in 1966 into a two-volume work entitled The McMahon Line. This referred to the boundary between Tibet and British India agreed at Simla in 1913-14 between the British and the Tibetans. The line mainly followed the Himalayan watershed, with the exception of the Tawang Tract which, according to topography and Buddhist culture, should have been on the Tibetan side, but for strategic and security reasons ended up on the Indian side. By the time of Independence, however, the British had not pushed their administration up to the McMahon line and Tawang was still under Tibetan control. China had never recognised the Simla agreement and argued that the Tibetans had no authority to sign it as Tibet was part of China, a claim it pursued by invading Tibet in 1950. Though Lamb never supported China’s claim to Tibet, in his study of the background to the Sino-Indian War of 1962, he controversially portrayed India as the main aggressor, arguing that the deterioration in relations began in February 1951 with India’s “unilateral annexation” of the Tawang Tract – leading to charges of pro-China bias, one critic accusing him of an “outright partisan attempt at demolishing the Indian case and thereby lending countenance to, and buttressing, the Chinese claims.” Lamb was a Fellow of the Society of Antiquaries of London and of the Royal Asiatic Society. His other books were Asian Frontiers (1968), The Sino-Indian Border in Ladakh (1977), and Tibet, China & India 1914-1950 (1989). As a result of his research on Tibet, he and his wife were invited, with relatives of British officials and travellers who had visited Tibet before 1950, to an audience with the Dalai Lama at Rhodes House, Oxford, in 2008. In 2016 Lamb was delighted when two of his books were translated into Chinese Mandarin. In 1954 he married Venice Havinden, daughter of the graphic designer Ashley Havinden. She survives him with their two sons and a daughter. Alastair Lamb, born January 9 1930, died March 15 2023 Note: The above article was originally published by The Telegraph on April 06, 2023.
FINEWEB-EDU
top of page Dr. Andrew Huberman’s Insights on Sun Exposure and Overall Well-being In recent years, Dr. Andrew Huberman, a neuroscientist and professor at Stanford University, has gained significant attention for his research and insights into human health and behavior. One of his most popularized ideas is the importance of morning sun exposure for mental and physical well-being. This article delves into Dr. Huberman’s background and the growing influence of his work, particularly regarding the benefits of early sunlight exposure. Background of Dr. Andrew Huberman Dr. Andrew Huberman has made a name for himself in the world of neuroscience and psychology. With a focus on brain development, brain plasticity, and neural regeneration and repair, his work spans a wide range of topics. He is widely recognized for his ability to translate complex scientific concepts into actionable, everyday health advice. The Importance of Morning Sun Exposure One of Dr. Huberman’s key recommendations for improving mental health and regulating sleep patterns is exposure to natural sunlight within the first hour of waking up. He explains that this practice can profoundly impact our circadian rhythms, which are the natural processes that regulate our sleep-wake cycle. Scientific Basis The recommendation is grounded in science: natural light, particularly in the morning, has a higher concentration of blue light, which is crucial for setting our internal clocks. This exposure helps regulate the production of melatonin, the hormone that influences when we feel ready to sleep. Benefits Highlighted by Dr. Huberman Improved Sleep Quality: Regular morning sunlight exposure can help normalize sleep patterns, leading to better sleep quality. Mood Enhancement: Sunlight triggers the release of serotonin, a neurotransmitter that boosts mood and helps alleviate depression. Better Focus and Alertness: Exposure to natural light in the morning enhances cognitive function and alertness throughout the day. Long-Term Health Benefits: Consistent regulation of the circadian rhythm can have long-termbenefits, including reduced risk of certain chronic diseases. Popularity and Impact Dr. Huberman’s ideas have been popularized through various channels, including his podcast, “The Huberman Lab,” social media, and appearances on other prominent platforms. His ability to explain the neuroscience behind everyday habits in an accessible way has resonated with a broad audience. Broader Influence Beyond sun exposure, Dr. Huberman advocates for a holistic approach to health, emphasizing the importance of exercise, nutrition, and mindfulness. His approach aligns with a growing public interest in natural and scientifically-backed health strategies. Dr. Andrew Huberman’s emphasis on the benefits of morning sun exposure is a reflection of his broader mission to bring neuroscience into the realm of daily life. His research and recommendations offer a blend of scientific rigor and practical advice, making him a respected and increasingly popular figure in the field of health and wellness. As more people seek ways to improve their health naturally and effectively, the insights of Dr. Huberman are likely to continue gaining traction and influencing daily routines worldwide. bottom of page
ESSENTIALAI-STEM
2TB Youview? I've been looking for a current Youview model work a 2TB hard drive, but it seems there isn't one? There was the Humax DTR-T1010 2TB back in 2014 but weirdly Humax hasn't brought anything out since the DTR-T2000 1TB and focus looks have to switched to Freeview Play and the Humax FVP-5000T. I'm not all that keen on the interface of Freeview Play and have owned the T2000 a few years ago which was a good experience. Any advice would be most welcome :) Comments • RoyRoy Posts: 14,544Member ✭✭✭ edited 1 July 2018, 5:42AM Indeed, there isn’t one. But if you buy any Humax YouView box with a lesser capacity drive, and a compatible 2TB drive in addition, the chances are very good that you will be able to simply swap out the original drive for the 2TB one, and the box will partition the drive to YouView spec and give you the whole 2TB overall. According to what I can see on Amazon, it costs little more to buy the highest spec YouView box, the 1TB BT DTR-T4000, plus a 2TB drive to swap in, than it does to buy a 1TB DTR-T2000.  “Where’s ‘Jump to Time’ then? And all that other OldGen good stuff we were promised back, including the proper ‘Hide Channels’ and so on?” (Excerpt from ‘One Billboard Outside YouView Towers’, not coming soon to a box near you) • Chris TownsonChris Townson Posts: 10Member Thanks for the reply. Good news that's it's so easy to replace with a higher capacity hard drive, but I assume that would invalidate the warranty? The last time I was in the market for a humax (I've had a few over the years) Humax Direct exclusively sold higher capacity variants of some models. • RoyRoy Posts: 14,544Member ✭✭✭ Yes, it would invalidate the warranty. You could always buy a secondhand box without one, though. “Where’s ‘Jump to Time’ then? And all that other OldGen good stuff we were promised back, including the proper ‘Hide Channels’ and so on?” (Excerpt from ‘One Billboard Outside YouView Towers’, not coming soon to a box near you) • LukеLukе Posts: 20Member Do the DTR-T4000s have a warranty?  The DTR-T4000 isn't a retail model.  Aren't the 'new' DTR-T4000 boxes unused and unwanted boxes sourced via BT customers who did not want them? • VisionmanVisionman Posts: 9,089Member ✭✭✭ T4000s aren't sold retail so no, you wouldn't get a warranty. • redchizredchiz Posts: 4,737Member ✭✭✭ PVRs were never and are not intended to act as long-term archives. There are even rules governing this, although more breached than observed. So get your stuff online and if you must keep it do in the cloud, it's the future. ;) • RoyRoy Posts: 14,544Member ✭✭✭ Visionman said: T4000s aren't sold retail so no, you wouldn't get a warranty. Not true. You won’t get a BT or Humax warranty, but the third party seller on Amazon stands behind them. “Where’s ‘Jump to Time’ then? And all that other OldGen good stuff we were promised back, including the proper ‘Hide Channels’ and so on?” (Excerpt from ‘One Billboard Outside YouView Towers’, not coming soon to a box near you) • RoyRoy Posts: 14,544Member ✭✭✭ redchiz said: PVRs were never and are not intended to act as long-term archives. There are even rules governing this, although more breached than observed. So get your stuff online and if you must keep it do in the cloud, it's the future. ;) Thanks @redchiz. My wife would like to keep the Poldark episode shown last night on BBC1 HD for posterity, not just on our YouView box. Can you tell her how she should go about this, as per your advice above? Taking care, or course, not to break any rules there may be around such activities. “Where’s ‘Jump to Time’ then? And all that other OldGen good stuff we were promised back, including the proper ‘Hide Channels’ and so on?” (Excerpt from ‘One Billboard Outside YouView Towers’, not coming soon to a box near you) • I put a small SSD into one of my T4000s to see if it makes any difference to the box. It certainly makes the interface snappier. Sacrificed space for speed as I am rigorous deleter of stuff I have watched (and possibly expect the drive to fail eventually). The process is extremely easy on the BT boxes and the box reformats the drive automatically. However I haven’t been able to successfully reformat the 1TB drive I took out. The old BT vision boxes used to do a low level disk lock so they couldn’t be used in another device. Not sure if the YV boxes do something similar.  • Chris TownsonChris Townson Posts: 10Member Interesting stuff guys. Learning lots here. I'm  tempted to get a second hand BT box and stick a 2TB drive in there. The intention isn't to archive as such, but we often record things we wish to watch together, but with busy lives months can go by before we have chance to work through a series. By which time a lot more recording has taken place. Oh well, only 30 years until retirement :P • VisionmanVisionman Posts: 9,089Member ✭✭✭ Without talking about anyones situation in particular, heres the problem with 1 or 2TB drives, which is also true. 1, If a user fills a 1 or 2TB drive up with recordings, try watching them all, which isn't possible with further recordings constantly being added (or even if they aren't). 2, PVRs were never meant or intended to be long term storage devices. And - 3, One day the box will end its life-span and the loss of such a large amount of recordings would no doubt be extremely annoying and frustrating.   • RoyRoy Posts: 14,544Member ✭✭✭ One solution would be to get two 1TB boxes, which in case of failure would mean the loss of only(!) 1TB of recordings instead of two. However, you can’t set different codes for YouView remotes, so both boxes, if together, would respond to one remote; the workaround is to keep a black cloth handy, and drape it over the magic eye of the box you don’t want to respond. It is also possible, by downloading the BT TV App as well as the YouView App on your mobile or tablet, to overcome the YouView app issue that you can’t have two copies of it, or control two boxes from the one App. Just pair one App with one box, and the other App with the other box. You don’t need to actually have BT TV to use their App for this; it works perfectly well without. “Where’s ‘Jump to Time’ then? And all that other OldGen good stuff we were promised back, including the proper ‘Hide Channels’ and so on?” (Excerpt from ‘One Billboard Outside YouView Towers’, not coming soon to a box near you) Sign In or Register to comment.
ESSENTIALAI-STEM
Article Content Cold Snap Cold Snap Slip sliding away. . . that’s not what you want to do, especially during the cold weather months when roadways, sidewalks, steps and other outside areas can be covered with ice, “black ice” and other slippery elements. In fact, you may have to be even more vigilant when navigating during the fall and winter, since slip and trip accidents increase during the autumn and winter seasons. Why? There’s less daylight; leaves fall onto paths, making them wet and slippery; and cold weather leaves ice and snow buildup on paths and roads. The truth is that those cold snaps can lead to cold snaps—fractures resulting from slips or falls. And, incidentally, slips, trips and falls account for 15 percent of all accidental deaths each year, the second-leading cause behind motor vehicles. They also make up 25 percent of all reported injury claims per fiscal year, leading to 95 million lost work days each year—and cost nearly $80 billion annually. Some of the causes of falling include the loss of footing, loss of traction, changes in reflexes, vision problems, changes in bodily muscle and fat and other variables. Of course, ice-covered walkways, steps and other areas can directly contribute to loss of footing and loss of traction, leading to a fall. That’s why it’s smart to keep pathways clear—whether outside or inside—such as clearing sidewalks of snow and ice and making them navigable, or even removing obstacles such as cords, cables, throw rugs and more in the home that may cause a fall. You’ll also want to ensure proper lighting so that you can see and avoid possible triggers for tripping or falling. Additionally, balance exercises can help build stability to lessen chances of a fall After a slip or fall, anyone can be susceptible to a bone fracture. However, for those with thinning bones or osteoporosis, whether known or unknown to them—that’s right; some don’t know they have thinning bones or osteoporosis until a fracture is their first “symptom”—it can set them on a slippery slope to major health setbacks or even death. And lest you think thinning bones is an “old woman” health problem, just know that after the age of 30 for men and women alike, the rate at which your bone tissue dissolves and is absorbed by the body slowly increases, while the rate of bone building decreases—leaving you with a small amount of bone loss each year after age 30. It can begin as early as age 25 for women, however. Unfortunately, children and teens could be well on their way to unhealthy bones, too, since nearly nine out of 10 teen girls and seven out of 10 teen boys don’t get enough calcium in their diet, while three out of four teens don’t get enough vitamin D—two essential nutrients for healthy bone building. In fact, calcium requires adequate vitamin D to be absorbed properly. And slipping and falling with thinning bones or osteoporosis can be disastrous. The National Institutes of Health (NIH) says that falling is the cause of the fracture in nine out of 10 older Americans with a broken hip, and of all broken hips, more than 90 percent are associated with osteoporosis. Hip fractures make the elderly five to 20 percent more likely to die in the first year after this injury compared to other elderly individuals who hadn't experienced hip fractures.    Some ways to strengthen bones include getting enough calcium and vitamin D in your diet or through supplementation to keep your bones strong. Exercising regularly, particularly weight-bearing exercise (such as hiking, jogging, tennis, climbing stairs or dancing), and resistance exercises (such as free weights and weight machines at gyms or health clubs), is essential, too. Be on guard this season. Don’t let cold snaps lead to bone snaps or worse.   This information is intended for educational and informational purposes only. It should not be used in place of an individual consultation or examination or replace the advice of your health care professional and should not be relied upon to determine diagnosis or course of treatment. TVC Liquid Vitamin Code Raw D3 - The hottest nutrient under the sun fucoTHIN Lovely Legs   Vitamin Code - Don't settle for anything less  
ESSENTIALAI-STEM
Fidel Castro based his government on Communism A communist dictatorship a Communist Dictatorship Just took the test and the guy above me is mega wrong B) a communist dictatorship Fidel Castro led a revolution in Cuba in 1959 and created a government based on a communist dictatorship. The Cuban Revolution was an armed struggle for power in Cuba between the 26th of July Movement led by Fidel Castro against the authoritarian regime of Fulgencio Batista. The revolution began on July 26, 1953 and episodically continued until the victory of the rebels on January 1, 1959, replacing the state structure with a socialist republic. Subsequently, in 1965, the 26th of July Movement was finally renamed the Communist Party of Cuba. The revolution had strong domestic and international consequences, in particular, relations with the United States worsened greatly. Immediately after the revolution, the Castro government took measures to strengthen the state and nationalization, also began the period of participation of Cuban troops in foreign conflicts, such as the Civil War in Angola and the Sandinista Revolution in Nicaragua. The answer is B I just took the test The correct answer is - C. socialist ideals. In the year of 1959, Fidel Castor led a revolution in Cuba against the militaristic leader of the country that was set up by the United States few years earlier, and won. Castro managed to get hold onto the government and became the leader of Cuba. His ideals were much different than those of his predecessors, and Castro was a big fan of the socialist ideology, so he implemented it in Cuba. Because of this he quickly got support by the Soviet Union, China, North Korea, Yugoslavia, and became very friendly with them. The situation in Cuba was the thing of nightmares for the United States. Not just that they lost their political and economic influence on the nearby island nation, but it became an ally with its biggest enemy, the Soviet Union. In fact, Cuba was extremely important during the Cold War because it served as a military base of the Soviet Union, and the United States were held in constant fear of attack.
FINEWEB-EDU
Create your Node.js Application In this step, you will create a very simple Node.js application that can be deployed to the Cloud. You will use an application generator to quickly scaffold out the application from a terminal. Tip: If you have already completed the Node.js tutorial, you can skip ahead to Create the Website. Install the Express Generator Express is a very popular framework for building and running Node.js applications. You can scaffold (create) a new Express application using the Express Generator tool. The Express Generator is shipped as an NPM module and installed by using the NPM command line tool npm. $ npm install -g express-generator The -g switch installs the Express Generator globally on your machine so you can run it from anywhere. Scaffold a New Application We can now scaffold a new Express application called myExpressApp by running: $ express myExpressApp --view pug --git The --view pug --git parameters tell the generator to use the pug template engine (formerly known as jade) and to create a .gitignore file. To install all of the application's dependencies, go to the new folder and run npm install. $ cd myExpressApp $ npm install Run the Application Last, let's ensure that the application runs. From the terminal, start the application using the npm start command and then browse to http://localhost:3000. $ npm start You should see something like this: Running Express Application I created the Node.js application
ESSENTIALAI-STEM
Talk:SHANK1 Wiki Education assignment: Biochemistry I — Assignment last updated by Valentino813 (talk) 06:12, 13 April 2023 (UTC)
WIKI
alessandro alessandro - 9 months ago 63 Linux Question linux image from clipboard I'd like to access the graphics in the linux clipboard, to save it as a file. I'm doing this in a Python/Tkinter program, so I asked about it (http://stackoverflow.com/questions/6817600/save-the-image-in-the-clipboatd-in-python-tkinter) but internally (in python) there's no hope. Instead, I can accept to use an external utility to do it - yet I cannot find one. Do you know of any terminal-based utility able to take the clipboard content and save it as an image file? Answer I couldn't find any tool to do it, so I wrote this small Python script. It requires pygtk. #!/usr/bin/python """ Save image from clipboard to file """ import sys import glob from optparse import OptionParser def def_file(): """ Return default file name """ files = glob.glob("img???.png") if len(files) < 1: return 'img001.png' maxf = 0 for f in files: try: n = int(f[3:6]) maxf = max(n, maxf) except ValueError: pass return 'img{:03d}.png'.format(maxf+1) usage = """%prog [option] [filename] Save image from clipboard to file in PNG format.""" op = OptionParser(usage=usage) op.add_option("-o", "--open", action="store_true", dest="open", default=False, help="Open saved file with default program (using xdg-open)") (options, args) = op.parse_args() if len(args) > 1: parser.error("Only one argument expected") sys.exit(1) elif len(args) == 1: fname = args[0] else: fname = def_file() import gtk clipboard = gtk.clipboard_get() image = clipboard.wait_for_image() if image is not None: image.save(fname, "png") print "PNG image saved to file", fname if options.open: import subprocess subprocess.call(["xdg-open", fname]) else: print "No image in clipboard found"
ESSENTIALAI-STEM
Texas governor and health officials address public regarding Ebola case Texas Governor Rick Perry met with public health officials Wednesday in a press conference concerning a case of Ebola, the first case diagnosed on US soil. Accompanied by those officials, he assured Texas citizens that steps were being taken to protect the public's safety. Perry specifically said, "There are few places in the world better equipped to meet the challenge that is posed in this case." The governor also stated, "Today, we learned that some school aged children have been identified as having had contact with the patient." He went on to say, "This case is serious. Rest assured that our system is working as well as it should." Dr. David Lakey, Commissioner of the state's public health agency said in a recorded video statement, "This event right now is going to be contained. ... the patient here in Dallas, he's getting tremendous care in a very good medical facility." The man's condition on Wednesday was listed as serious. The patient is a man who recently returned to the US after visiting Liberia. A doctor with the hospital, Texas Health Presbyterian in Dallas, told media the man's initial complaints were, "...very nondescript." Reportedly, the man had sought treatment at that facility last week, but was sent home. When the man returned to the hospital on Sunday, his condition was properly diagnosed and he was admitted.
NEWS-MULTISOURCE
Page:Herringshaw's National Library of American Biography.pdf/255 HERRINGSHAWS LIBRARY OP AMERICAN BIOGRAPHY. Bausman, Benjamin, clergyman, author, was born Jan. 28, 1824, in Lancaster, Pa. He is the author of Wayside Gleanings in Europe; and Bible Characters. Bauvais, A., governor, statesman. 'In 182930 he was acting governor of Louisiana. Baxendale, Mrs. Esther Minerva, educator, was born Nov. 4, 1846, in Brockton, Mass. She taught in the schools of Massachusetts for seven years; ajid is an lecturer, author, extensive traveler and lecturer. She is the author of Yours With All My Heart. Baxley, Isaac Rieman, author, poet, was born in 1850 in Baltimore, Md. He is the author of The Temple of Alanthur, with Other Poems; The Prophet and Other Poems; Songs of the Spirit; and Beyond the Bank of Mist. Baxter, Algernon Sidney, soldier, broker, was bom Nov. 14, 1819, at Rockingham, Vt. At Shiloh he carried to General Wallace that celebrated despatch which caused so much controversy. He was the last survivor of those oflScers who served on General Grant's staff in the successful battles of Fort Donelson and Shiloh. He died April 29, 1897, in New York City. Baxter, Charles, soldier, was born in 1813 in New York City. He participated in the Mexican war; and attained the rank of lieutenant-colonel. He died Sept. 13, 1847, from wounds received at Chapultepec. Baxter, De Witt Clinton, soldier, was born in Massachusetts. He served from Massachusetts in the civil war; and in 1865 was brevetted brigadier-general of volunteers. He died May 9, 1881, in Pennsylvania. Baxter, EUsha, legislator, jurist, governor, was bom Sept. 1, 1827, in Rutherford county, N.C. He was a member of the state legislature in 1854-58. In 1864 he was chief justice of the supreme court of Arkansas; and in 1874-75 he was governor of Arkansas. He died June 2, 1899, in Batesville, Ark. Baxter, G. W., territorial governor. In 1886-88 he was territorial governor of Wyoming. Baxter, George A., educator, college president, author, was bom July 22, 1771, in Rockingham county, Va. In 1829 he became president of Washington college; and iji 1835 was chosen president of the Hampden Sidney college. He was the author of Abolition of Slavery; Parity; and the Scriptural Order of Christian Ministry. He died April 14, 1841, in Virginia. Baxter, Henry, soldier, diplomat, was born Sept. 8, 1821, in Sidney Plaine, N.Y. During the civil war he was made lieutenant-colonel of the seventh Michigan infantry; and in 1865 he was brevetted major-general. In 1866 he was appointed minister resident to Honduras. He died Dec. 30, 1873, in Jonesville, Mich. Baxter, Horace Henry, railroad builder, was born Jan. 18, 1818, in Saxton's River, Vt. He built the Cleveland, Norwalk and Toledo railroad. At the outbreak of the civil 267 war he attended the peace congress as a delegate from Vermont; and when that meeting failed of its object he became adjutant-general of Vermont. Pie died Feb. 17, 1884, in New York City. Baxter, J. H., surgeon-general. He was surgeon-general of the United States army; and attained the rank of brigadier-general. Baxter, James Phinney, merchant, artist, author and philanthropist, was bom March 23, 1831, in Gorham, Maine. He is well known as the Poet of Maine. He built and presented to the city of Portland its magnificent public library building, the most beautiful structure in the city. He has served as mayor of Portland; and has been foremost in the development of that city and its institutions. His principal works are George Cleeve of Casco Bay, 1630-67; Sir Ferdinando Gorges and His Province of Maine; Idyls of the Year, a collection of verse; The Trelawney Papers; The Pioneers of New France in New England; and other works. Baxter, Jere, lawyer, publisher, railroad president, statesman, was born on Feb. 11, 1852, in Nashville, Tenn. He was educated at the Montgomery Bell academy of Nash- Tenn. He studied law and became the publisher of the Legal Reporter, which was later bound in nine volumes as Baxter's Reports. In 1882 he became president of the Memphis and Charleston railroad; built the Tennessee central railway, of which he was president. He built the town of Sheffield, Ala.; and organized the South Pittsburg town company. In 1889 he was a candidate for governor of the state of Tennessee. He died in 1904 in Nashville, Tenn. Baxter, John, lawyer, jurist, congressman, was bom March 5, 1819, in Rutherford county, N.C. In 1842 he was elected a representative to the state legislature; and was a presidential elector in 1844 and 1848. He was again in the state legislature in 1846, and 1852-57; and was speaker of the house in 1852. In 1857 he removed to Knoxville,Tenn. and in 1870 was a member of the state constitutional convention. In 1877-86 he was United States circuit judge for the sixth judicial circuit of Tennessee. He died April 10, 1886, in Hot Springs, Ark. Baxter, Katharine Schuyler, author, was born Feb. 22, 1845, in Oswego, N.Y. She is a great-granddaughter of late Major-General Philip Schuyler of the revolutionary army. She is the author of In Bamboo Lands; God-Child of Washington; and other works. ville, A Baxter, Luther lator, jurist, L., soldier, lawyer, legis8, 1833, in Corn- was born June He received a thorough education; and pursued a partial collegiate course at Norwich university of Vermont. Since 1857 wall, Vt. he has been a resident of Minnesota. He served over two years in the civil war, first as major of the fourth regiment Minnesota volunteer infantry, and afterwards as major and lieutenant-colonel in the first Minnesota heavy artillery. In 1864-65 he served
WIKI
%0 Journal Article %T Preposition of a Key Parameter to Estimate the Compressive Strength of the Sand stabilized with cement-zeolite and Reinforced by Polypropylene Fibers %J AUT Journal of Civil Engineering %I Amirkabir University of Technology %Z 2588-2899 %A EsfandyariPour, Abozar %A Lajevardi, Seyed Hamid %A MolaAbasi, Hossein %D 2023 %\ 06/01/2023 %V 7 %N 2 %P 1-1 %! Preposition of a Key Parameter to Estimate the Compressive Strength of the Sand stabilized with cement-zeolite and Reinforced by Polypropylene Fibers %K Stabilization %K zeolite %K Cement %K Fiber %K Compressive Strength %R 10.22060/ajce.2024.18576.5685 %X Nowadays, partial cement replacement with natural pozzolans like zeolite and use of reinforcing agents such as fibers have been extensively used in the field of soil stabilization. In the current paper, the effects of incorporation of polypropylene fibers and zeolite in a typical cemented sand have been examined. A set of unconfined compression strength (UCS) tests considering three distinct porosities (related to Dr = 35, 50, 70 and 85% sand), four cement contents (2, 4, 6, 8 and 10%), six different percentages of cement replacement with zeolite (0, 10, 30, 50, 70 and 90%) and the fiber content (0.5% by weight of cement in the mixture) has been performed. Then, the amounts of improved unconfined compressive strength (UCS) of the specimens as the result of zeolite and cement chemical properties have been estimated. Results indicate that the optimum amount of cement replacement by zeolite is 30%. Studies on zeolite-cement-sand mixtures reinforced by fibers have also shown that UCS improves in case cement content (C) and porosity (η) go up. Parameter (SiO2+Al2O3) which are active particles (AP) participate in the chemical reaction introduced and UCS-AP diagrams have been drawn. Afterwards, UCS has been plotted against η/AP which is considered as a controlling parameter of UCS. This experimental research and the parameter η^(-1.79) 〖AP〗^1.43 will introduce an acceptable description of mechanical properties. Finally, the effect of reinforcing agent in the mixture has been thoroughly studied through SEM analysis. %U https://ajce.aut.ac.ir/article_5448_ef33370822b1f5d5d522493fcd2b1af8.pdf
ESSENTIALAI-STEM
Tony Robbins shares a 2-step strategy for feeling more in control of your life Each year Tony Robbins, best-selling author and speaker, takes on seven high-profile clients, which include tennis champion Serena Williams and award-winning actor Hugh Jackman. To get his one-on-one training, it costs $1 million and there is a five-year wait list, he recently revealed while speaking at a three-day training event in Florida. While most professionals don't have the money for that kind of training, he doesn't keep his strategies secret. At the Florida event, part of which streamed on Facebook, Robbins shared one of his top tips for reducing fear and stress. The strategy is called priming, or conditioning yourself to react to events in a certain way. "If you're going to get the results that you deserve and that you want, you want to prime yourself for success," he said. "You need a daily practice, a daily practice that's going to put you in the best state possible regularly. To help prime yourself for feeling strong, Robbins recommends two steps: 1. Set aside 10 minutes each morning for reflection and mindful breathing, a process he told CNBC Make It helps him stay focused and motivated every day. During this time, spend the first three minutes thinking about three things you're grateful for. Spend the next three minutes feeling at peace and thinking of people you care about. And lastly, spend three minutes envisioning three things you want to accomplish. 2. Make time to read a physical book, or listen to an audiobook that helps you overcome. If you don't have time to sit down a read a book, listen to an inspiring audiobook while you commute, do household tasks or exercise, Robbins said at the event. "Prime yourself for courage," he stated, "rather than hoping you show up that way, based on the triggers of your environment." With practice, these two steps will help you achieve your goals, he added. "The most important muscles that change your life are those mental, emotional spiritual muscles," Robbins said. "If we develop them more, we're going to experience more."
NEWS-MULTISOURCE
Multi-User Mode To allow a Nix store to be shared safely among multiple users, it is important that users cannot meaningfully influence the execution of derivation builds such that they could inject malicious code into them without changing their (either input- or output- addressed) hash. If they could do so, they could install a Trojan horse in some package and compromise the accounts of other users. To prevent this, the Nix store and database are owned by some privileged user (usually root) and builders are executed under unprivileged system user accounts (usually named nixbld1, nixbld2, etc.). When an unprivileged user runs a Nix command, actions that operate on the Nix store (such as builds) are forwarded to a Nix daemon running under the owner of the Nix store/database that performs the operation. The buried lede in the above sentence is that currently, even in multi-user mode using a daemon, if executing as the user that owns the store, Lix directly manipulates the store unless --store daemon is specified. We intend to change this in the future. The Lix team considers the goal of the sandbox to be primarily for preventing reproducibility mistakes, and does not consider multi-user mode to be a strong security boundary between users. Do not evaluate or build untrusted, potentially-malicious, Nix language code on machines that you care deeply about maintaining user isolation on. Although we would consider any sandbox escapes to be serious security bugs and we intend to fix them, we are not confident enough in the daemon's security to call the daemon a security boundary. Trust model There are two categories of users of the Lix daemon: trusted users and untrusted users. The Lix daemon only allows connections from users that are either trusted users, or are specified in, or are members of groups specified in, allowed-users in nix.conf. Trusted users are users and users of groups specified in trusted-users in nix.conf. All users of the Lix daemon may do the following to bring things into the Nix store: • Users may load derivations and output-addressed files into the store with nix-store --add or through Nix language code. • Users may locally build derivations, either of the output-addressed or input-addressed variety, creating output paths. Note that fixed-output derivations only consider name and hash, so it is possible to write a fixed-output derivation for something important with a bogus hash and have it resolve to something else already built in the store. On systems with sandbox enabled (default on Linux; not yet on macOS), derivations are either: • Input-addressed, so they are run in the sandbox with no network access, with the following exceptions: • The (poorly named, since it is not just about chroot) property __noChroot is set on the derivation and sandbox is set to relaxed. • On macOS, the derivation property __darwinAllowLocalNetworking allows network access to localhost from input-addressed derivations regardless of the sandbox setting value. This property exists with such semantics because macOS has no network namespace equivalent to isolate individual processes' localhost networking. • Output-addressed, so they are run with network access but their result must match an expected hash. Trusted users may set any setting, including sandbox = false, so the sandbox state can be different at runtime from what is described in nix.conf for builds invoked with such settings. • Users may copy appropriately-signed derivation outputs into the store. By default, any paths copied into a store (such as by substitution) must have signatures from trusted-public-keys unless they are output-addressed. Unsigned paths may be copied into a store if require-sigs is disabled in the daemon's configuration (not default), or if the client is a trusted user and passed --no-check-sigs to nix copy. • Users may request that the daemon substitutes appropriately-signed derivation outputs from a binary cache in the daemon's substituters list. Untrusted clients may also specify additional values for substituters (via e.g. --extra-substituters on a Nix command) that are listed in trusted-substituters. A client could in principle substitute such paths itself then copy them to the daemon (see clause above) if they are appropriately signed but are not from a trusted substituter, however this is not implemented in the current Lix client to our knowledge, at the time of writing. This probably means that trusted-substituters is a redundant setting except insofar as such substitution would have to be done on the client rather than as root on the daemon; and it is highly defensible to not allow random usage of our HTTP client running as root. The Lix daemon as a security non-boundary The Lix team and wider community does not consider the Lix daemon to be a security boundary against malicious Nix language code. Although we do our best to make it secure, we do not recommend sharing a Lix daemon with potentially malicious users. That means that public continuous integration (CI) builds of untrusted Nix code should not share builders with CI that writes into a cache used by trusted infrastructure. For example, hydra.nixos.org, which is the builder for cache.nixos.org, does not execute untrusted Nix language code; a separate system, ofborg is used for CI of nixpkgs pull requests. The build output of pull request CI is never pushed to cache.nixos.org, and those systems are considered entirely untrusted. This is because, among other things, the Lix sandbox is more susceptible to kernel exploits than Docker, which, unlike Lix, blocks nested user namespaces via seccomp in its default policy, and there have been many kernel bugs only exposed to unprivileged users via user namespaces allowing otherwise-root-only system calls. In general, the Lix sandbox is set up to be relatively unrestricted while maintaining its goals of building useful, reproducible software; security is not its primary goal. The Lix sandbox is a custom non-rootless Linux container implementation that has not been audited to nearly the same degree as Docker and similar systems. Also, the Lix daemon is a complex and historied C++ executable running as root with very little privilege separation. All of this means that a security hole in the Lix daemon gives immediate root access. Systems like Docker (especially non-rootless Docker) should themselves probably not be used in a multi-tenant manner with mutually distrusting tenants, but the Lix daemon especially should not be used as such as of this writing. The primary purpose of the sandbox is to strongly encourage packages to be reproducible, a goal which it is generally quite successful at. Trusted users Trusted users are permitted to set any setting and bypass security restrictions on the daemon. They are currently in widespread use for a couple of reasons such as remote builds (which we intend to fix). Trusted users are effectively root on Nix daemons running as root (the default configuration) for at least the following reasons, and should be thus thought of as equivalent to passwordless sudo. This is not a comprehensive list. • They may copy an unsigned malicious built output into the store for systemd or anything else that will run as root, then when the system is upgraded, that path will be used from the local store rather than substituted. • They may set the following settings that are commands the daemon will run as root: • build-hook • diff-hook • pre-build-hook • post-build-hook • They may set build-users-group. In particular, they may set it to empty string, which runs builds as root with respect to the rest of the system (!!). We, too, think that is absurd and intend to not accept such a configuration. It is then simply an exercise to the reader to find a daemon that does SCM_CREDENTIALS over a unix(7) socket and lets you run commands as root, and mount it into the sandbox with extra-sandbox-paths. At the very least, the Lix daemon itself (since root is a trusted user by default) and probably systemd qualify for this. • They may set the builders list, which will have ssh run as root. We aren't sure if there is a way to abuse this for command execution but it's plausible. Note that setting accept-flake-config allows arbitrary Nix flakes to set Nix settings in the nixConfig stanza. Do not set this setting or pass --accept-flake-config while executing untrusted Nix language code as a trusted user for the reasons above! Build users The build users are the special UIDs under which builds are performed. A build user is selected for a build by looking in the group specified by build-users-group, by default, nixbld, then a member of that group not currently executing a build is selected for the build. The build users should not be members of any other group. There can never be more concurrent builds than the number of build users, unless using auto-allocate-uids (tracking issue). If, for some reason, you need to create such users manually, the following command will create 10 build users on Linux: $ groupadd -r nixbld $ for n in $(seq 1 10); do useradd -c "Nix build user $n" \ -d /var/empty -g nixbld -G nixbld -M -N -r -s "$(which nologin)" \ nixbld$n; done Running the daemon The Nix daemon can be started manually as follows (as root): # nix-daemon In standard installations of Lix, the daemon is started by a systemd unit (Linux) or launchd service (macOS).
ESSENTIALAI-STEM
Milk light therapy, also known as photorejuvenation or IPL therapy, is a popular skin treatment technique that uses specific wavelengths of light to improve various skin conditions. This technique is named "milk light" due to the gentle nature of the light used during the treatment, which is as mild as moonlight filtered through milk. Below, we detail the benefits of milk light for the skin and potential considerations. Benefits of Milk Light for the Skin 1. Improvement in Skin Tone Uniformity: Milk light effectively reduces hyperpigmentation caused by sun exposure, aging, or post-inflammatory changes, leading to more even skin tone. 2. Stimulation of Collagen Production: Milk light therapy can stimulate the production of deep-layer collagen in the skin, helping to reduce fine lines and wrinkles, and enhancing skin elasticity and firmness. 3. Acne Treatment and Inflammation Reduction: By inhibiting the growth of acne-causing bacteria and reducing skin inflammation, milk light helps control acne outbreaks and alleviates the redness associated with acne. 4. Pore Reduction: Milk light can also help reduce pore size, improving the overall delicacy and smoothness of the skin. Considerations and Risks 1. Skin Sensitivity: Although milk light therapy is generally considered gentle and safe, some individuals may experience sensitivity to the light or equipment used during the treatment. 2. Pigmentation Changes: In rare cases, temporary hyperpigmentation or hypopigmentation may occur in the treated areas. 3. Choose Reputable Clinics: When undergoing milk light therapy, it is important to choose a certified medical institution and an experienced practitioner to ensure the safety and effectiveness of the treatment. Conclusion Milk light therapy offers an effective option for those looking to improve their skin condition. However, given individual differences and potential risks, it is advisable to consult with a dermatologist or skincare expert before undergoing such treatments, and to choose a reputable professional facility for the procedure. Please use this information as a reference and make informed skincare and treatment decisions based on your personal circumstances.
ESSENTIALAI-STEM
Plutarch's "Parallel Lives," written at the beginning of the second century A. D., form a brilliant social history of the ancient world. They were originally presented in a series of books that gave an account of one Greek and one Roman life, followed by a comparison of the two: Theseus and Romulus, Alcibiades and Coriolanus, Demosthenes and Cicero, Demetrius and Antony. Plutarch was interested in the personalities of his subjects and on the way their characters molded their actions, leading them to tragedy or victory. He was a moralist of the highest order. "It was for the sake of others that I first commenced writing biographies," he says, "but I find myself proceeding and attaching myself to it for my own; the virtues of these great men serving me as a sort of looking-glass, in which I may see how to adjust and adorn my own life." Plutarch was a man of immense erudition who had traveled widely throughout the Roman Empire, and the Lives are richly anecdotal and full of detail. They were the principal source of Shakespeare's Roman plays. Did you find this review helpful?
FINEWEB-EDU
Wikipedia:Articles for deletion/Marshall Islands national football team (2nd nomination) The result was speedy delete and SALT. Ad Orientem (talk) 17:46, 26 April 2017 (UTC) Marshall Islands national football team AfDs for this article: * – ( View AfD View log Stats ) Speedy deletion per WP:G4 was declined on the grounds that it's been eight years since the last AfD, which fair enough. The underlying notability concerns remain the same though. There's nothing here that confirms that the team even exists, let alone meets WP:GNG. Sir Sputnik (talk) 01:12, 26 April 2017 (UTC) * Note: This discussion has been included in WikiProject Football's list of association football-related deletions. Sir Sputnik (talk) 01:13, 26 April 2017 (UTC) * Note: This debate has been included in the list of Oceania-related deletion discussions. CAPTAIN RAJU (✉) 01:55, 26 April 2017 (UTC) * Note: This debate has been included in the list of Sports-related deletion discussions. CAPTAIN RAJU (✉) 01:56, 26 April 2017 (UTC) * Speedy delete and salt. This has been deleted six times now and still there is nothing hinting this is anything other than a hoax. Last time it was deleted under G11, but it might as well qualify for G3. Why G4 was declined forcing this through AFD again is beyond me as it is very obvious it's merely delaying the obvious action.Tvx1 02:10, 26 April 2017 (UTC) * Speedy Delete per WP:CSD as virtually identical to iteration deleted as result of prior AFD. The single source offers no significant (barely detectable) coverage. At any rate delete per not notable, whether we establish hoax or not. Dloh cierekim 03:26, 26 April 2017 (UTC) * Speedy delete and salt deleted six times and created again. Someone has a lot of passion to do this... Cheers, Friy Man talk 05:46, 26 April 2017 (UTC) * Delete and SALT, non-notable. GiantSnowman 07:06, 26 April 2017 (UTC) * Wait a minute before to say "Majuro delenda est"I'm the author of the last incarnation of this article. Sorry, but I didn't know anything about this discussion or that this article was deleted six time. For the firts I want to say that I didn't write this article for to produce an hoax or a fakenews. I traslated this article from a foreign wikipedia article and I made this operation quoting the source of the original article, while I was looking for other sources on the net, but you started the speedy delete before I could finish my research. So I don't know if you have already found it but, for example, there is an article from an encyclopedia: The Complete Guide National Symbols and Emblems by James Minahan that says only that exists a football team in Marshall Islands. I wouldn't have created this article if I was not sure about existence of this team. Maybe with a in-depth research it's possible to find something else.FootKalos1597 (talk) 07:10, 26 April 2017 (UTC) * Thanks, but that's really not in-depth coverage sufficient to over-turn the prior AfD. Might I suggest finding coverage, citing/drafting the article at home, and when it looks acceptable submitting at Articles_for_Creation. Dloh cierekim 13:15, 26 April 2017 (UTC) * Comment Well-intentioned editors accidently recreating this w/o knowing what they are walking into argues for WP:SALT Dloh cierekim
WIKI
MORE Ask a Stoner: What is hash, exactly? Dear Stoner: I keep seeing all these different "concentrates" in dispensaries, but I've yet to try any. I know this sounds dumb, but what is hash, exactly? Ivana Tryit Dear Ivana: What is hash? Awesomeness concentrated. Next time you get a good look at a bud, check out the white-to-amber crystals coating the flower itself. Those are called trichomes, and they contain most of the THC and other cannabinoids that get you buzzed. Separating those glands (aka kief) from the plant material and condensing them is how you make hash — which is much more potent by weight than cannabis flowers. There are a few good ways to make hash. Probably the oldest method is to rub the buds in your hands to collect the kief and oils until they are thick enough to scrape off, collect and press into dark balls. Finger hash like this goes back thousands of years to India but is still really common around the world, especially in the Caribbean. Dry-sieve hash is another ancient method: Dried plants are banged over screens, dropping kief to a collection tray below; it's then pressed either by hand or with a mechanical press. The two most common types of hash you'll see around Colorado today are made with more modern techniques. Icewater hash (or bubble hash) involves stirring cannabis into a bucket of extremely cold water to freeze and break off the trichome glands from the plant material. The weed/water mix is then poured through a series of three to five increasingly fine nylon mesh screens. The first bag collects all of the waste plant material, while the others collect the wet, mud-like trichomes. Once dried, this hash can get up into the 70 to 80 percent-THC range. The other most common hash these days is extracted from the plant using chemicals. While they won't dissolve in water, THC glands are soluble in chemicals like butane and rubbing alcohol. For butane extractions, herb is crammed into a long metal or glass cylinder that's open on both ends, and liquid butane is sprayed down the tube and through a filter at the bottom opening. THC is dissolved into the butane, which is collected, then carefully heated and left in a vacuum chamber to evaporate the solvent. What is left is mega-potent THC wax (also called BHO or budder) that occasionally clocks in at 90 percent THC or higher.
ESSENTIALAI-STEM
https://insu.hal.science/insu-03209961Parrot, MichelMichelParrotLPCE - Laboratoire de physique et chimie de l'environnement - INSU - CNRS - Institut national des sciences de l'Univers - UO - Université d'Orléans - CNRS - Centre National de la Recherche ScientifiqueObservations of power line harmonic radiation by the low-altitude AUREOL 3 satelliteHAL CCSD1994[SDU] Sciences of the Universe [physics]POTHIER, Nathalie2021-04-27 15:44:322023-05-01 03:49:192021-04-27 15:44:34enJournal articleshttps://insu.hal.science/insu-03209961/document10.1029/93JA02544application/pdf1During the past decade, most scientific satellites have been dedicated to the study of the auroral zones, but low-altitude satellites also allow the study of the anthropogenic effects in the mid-latitude regions. AUREOL 3 was such a low-altitude polar-orbiting satellite, with an apogee and perigee of 2000 and 400 km, respectively, which observed power line harmonic radiation (PLHR). The wave experiment named ARCAD 3 provided the waveforms of five components of the electromagnetic field (three magnetic and two electric) in a frequency range between 0 and 1.5 kHz. The telemetry was recorded at different stations. During the lifetime of the mission, 940 records, each lasting approximately 12 rain, were processed in order to obtain spectrograms of the waveforms. On these spectrograms, five events with magnetospheric lines have been detected, which in all cases are separated by 50 Hz (with an accuracy of 176); such lines are not at exact harmonics of the 50-Hz power system, but drift in frequency with time. The drift, which is between 1 and 8 Hz/s, is not constant during an event. A common property of these five events is that they were recorded during periods of very low magnetic activity and were observed mainly in the night sector. Comparison of the characteristics of these PLHR with existing theories concerning the general problem of VLF triggered emissions and sideband stability of whistler mode waves, shows that the drift in frequency is not due to a Doppler effect, but most probably to a non linear interaction between electrons and coherent waves, occurring in the topside ionosphere.
ESSENTIALAI-STEM
Why Trump’s Russian server connection is less suspicious than it sounds What if a major presidential candidate were in secret communication with Russia, through a secret internet channel kept hidden from the rest of the web? That’s the scenario laid out last night in a Slate report by Franklin Foer. Drawing on DNS (or domain name system) records, the report lays out months of communications between a mail server owned by the Trump Organization and another owned by Russia’s Alfa Bank. We don’t know what data passed between the servers, but given Trump’s extensive financial ties to Russia, that communication struck Foer as suspicious, potentially even evidence of coordination between Trump and a foreign power. Not everyone is convinced. Hours after the Slate piece arrived, The New York Times followed up with a report that the FBI had investigated the server and come away with no evidence tying Trump to Russia’s efforts to influence the election. At the same time, doubts have surfaced about many of the technical details of the piece, raising serious questions about the exposé. The researchers consulted by Foer are among the most respected analysts in their field, and it’s clear something unusual is happening between the servers — but whether that means anything for Trump’s relationship with Russia is far less clear. I can definitely understand why my fellow nerds are excited about this Trump DNS traffic but there are just so so many possible explanations The biggest problem is the nature of the data the story is based on. The core of the story is a set of DNS records first published in part on October 5th, showing ongoing queries between the two servers. DNS works as a kind of phone book for the internet, connecting URLs (like theverge.com) to IP addresses (like 151.101.193.52) — the same system that was attacked earlier this month, bringing down a number of basic internet functions. Observers saw consistent queries from the Alfabank’s server to mail1.trump-email.com, like spotting them looking up his address in the phonebook again and again over a long period of time. Typically, those queries are made before a more tangible data connection, like looking up a website’s IP address before you load it or looking up an email server’s IP address before you download recent messages. DNS records are often collected by outside parties, but they can’t show what happened once the connection was made. All we know is that someone in Russia kept looking up Trump’s server. As a result, many researchers consider those records an incomplete data set that’s easy to misinterpret. “DNS without context is playing with matches,” says security researcher Jonathan Zdziarski. “It might be spot on. But it's like trying to guess someone's motives by looking at individual words in a search history.” The server traffic is irregular, to be sure, but it’s less clear what conclusions to draw from that, if any. “When you have only a few details, the nefarious ones loom large in your imagination,” says Errata Security’s Robert David Graham. “But for people like me who've setup and managed lots of DNS and email servers, the more likely explanation is incompetence and legacy systems.” Other parts of the story are less convincing on closer inspection. For Foer, the connection between the servers is particularly ominous because of its exclusivity. When researchers sent queries to the server, it replied with error messages, and a full 87 percent of the DNS lookups on the server came from two specific Alfa Bank servers. The result, for Foer, is a computer set up to communicate with only a small number of other addresses, “a digital hotline connecting the two entities, shutting out the rest of the world.” But that hotline isn’t quite as exclusive as it looks. A server replying to a ping with an error message isn’t unusual: one researcher even demonstrated a similar reaction from Slate.com. Having such a majority of DNS queries come from a single source is more unusual, but there are lots of explanations that don’t involve espionage. Foer notes a number of queries from a medical clinic in Michigan, and researchers at Dyn have found plenty of other lookups that didn’t come from either source. “It seems to be a stretch to then say this is evidence of a secretive relationship between Trump and a Russian bank,” said Dyn’s Doug Madory. If this was meant to be a hotline between two parties, it’s hard to say how those other parties fit in. More importantly, there’s no evidence that either Trump or Alfa Bank took any concrete steps to conceal their identity. There are plenty of ways to stay anonymous on the internet, whether through fake names, third-party hosts, or circumvention networks like Tor — but neither party attempted anything like that. Trump’s supposedly secret channel to Russia was publicly available at mail1.trump-email.com, which would have been easy to change to something less conspicuous. Alfa’s server was also publicly identifying itself when it made the queries, which would have been easy to avoid if secrecy were important. Even the existence of DNS records is a kind of tell. All our evidence of the connection between the two servers comes from repeated public queries made over the course of months — but if this was really a secret hotline, why make those queries at all? If the servers were only meant to talk to each other, why not connect directly, storing the IP-domain link locally and skipping public domain registration entirely? Failing that, why not use a shared email account or any of dozens of private messaging services that leave less of a metadata trail? There are plenty of hard problems in building untraceable chat systems, but avoiding incriminating DNS records isn’t one of them. So if the Trump server wasn’t part of a secret hotline, what was it doing? The most popular answer is some combination of marketing and spam. Registration records show the Trump server is administered by a company called Cendyn, which Trump hired for “interactive marketing services” back in 2007. When Slate contacted the Michigan health clinic, which had queried the same Trump server, they put it down to “a small number of incoming spam marketing emails,” sent by Cendyn on behalf of Trump hotels. That’s the same explanation Alfabank’s representatives offered Foer, saying the leading theory was that the servers “may have been responding with common DNS lookups to spam sent to it by a marketing server.” It’s unusual to respond to a spam email with a DNS lookup, but it can be useful for checking the general location of the server and ensuring it exists. If Alfabank’s servers had a particularly aggressive or buggy anti-spam system, it would be easy to account for 87 percent of the lookups for that particular address — and there’s reason to believe that they did. On Twitter, a consultant named Naadir Jeewa tracked down Alfabank’s email scanning system, which turns out to have a history of unusual DNS activity. What looked like discreet hotline calls could well have been an automated email scanner responding to every marketing email by running to the phone book to check the address. Alfa Bank, like most banks probably have an email scanner that attempt a reverse connection, just to check that the email server is real. That would also explain the irregular pattern of the emails, one of the key points of mystery in the Slate piece. The simplest explanation for most unusual internet traffic is either a malware infection or some automated system gone haywire, but the pattern of the queries was too unpredictable for that. As Foer notes, they came erratically, speeding up as the campaign intensified and always beginning during working hours on Eastern Time. That would seem to indicate a human being at the end of the line, as opposed to the scrupulous regularity of a bot. But if the trigger for the lookups is an email marketing campaign, the timing makes perfect sense. The sender was human, scheduling emails according to the working hours of Trump’s New York headquarters, and the DNS lookup was an automated response to that human query. It’s still difficult to be sure exactly what happened. The DNS records still haven’t been published in full, so no one has seen them aside from Foer and a few other journalists and technical advisors. There may well be more incriminating evidence in those records, or technical evidence too intricate to detail in the article. But for now, the simplest explanation is that the traffic came from email marketing rather than sub rosa communications. We simply don’t have reason to believe anything more sinister is going on. In the long list of Trump scandals, this one doesn’t rank particularly high.
NEWS-MULTISOURCE
A little while ago, we looked at Azure Resource Manager (ARM) and how important it is for managing “version 2” of Azure. If you don’t know what ARM is, read that article first. Paul Schnackenburg Paul Schnackenburg works part time as an IT teacher as well as running his own business in Australia. He has MCSE, MCT, MCTS and MCITP certifications. Follow his blog TellITasITis. What’s been lacking in Azure up until now has been a comprehensive framework for IT to be able to add governance to the business’s cloud deployments, compounding the shadow IT problem. In early October, 2015, Azure added Azure Resource Manager Policies to control what can be deployed to Azure and by whom, and where it can be hosted. Marrying ARM, policies, and RBAC ^ Policies use a default allow system, meaning that if you haven’t explicitly denied something it’ll be permitted. This is in contrast to Azure Roles-Based Access Control (RBAC), which uses default deny. A policy can be scoped to a whole subscription, a Resource Group (RG), or an individual resource in an RG, which is exactly the same as RBAC permission scopes. To give an analogy, you can set NTFS permissions on the root of a drive. Doing so will apply to all folders on that drive (unless you exempt them). Alternatively, you can set the permissions on a folder, which will apply to all the files (objects) in that folder. Or you could assign permission to an individual file. And, just like in the NTFS example, in most cases you’ll probably set some overall policies for the entire subscription and then set some policies on RGs; however, you’ll rarely set policies on individual objects. Policies are defined in Java Script Object Notation (JSON) just like ARM templates. First, you define one or more conditions, and you can use Not, And (expressed as allOf), or Or (anyOf) to combine these conditions. The conditions can be defined with Equals, Like, Contains, In, and ContainsKey. Fields to build your conditions with are Name, Kind, Type, Location, Tags, Tags.*. The effect field can be set to either Deny or Audit; the latter isn’t mentioned in the official documentation—only in an Azure Con 2015 September presentation. Here’s an example of how you can limit deployments to Australia only: ARM policies are initially aimed at the following governance scenarios: requiring that a cost center tag is attached to any new deployments, limiting deployments to specific regions, limiting what resources can be deployed, and enforcing a naming convention. No GUI at this time ^ Like so many new features in Azure, this one comes with two ways to interact with it: using the API or using PowerShell. Since I’m allergic to REST APIs, I’ll show you how to create a policy using PowerShell. Start by downloading the latest version of Azure PowerShell. I used the latest 1.0 preview. Log in to your subscription with Add-AzureAccount. If you have several subscriptions, use Set-AzureSubscription –SubscriptionID <GUID> to set the correct one. The cmdlets are -AzureRmPolicyDefinition with the New, Get, Set, and Remove verbs and are applied with the ‑AzureRMPolicyAssignment cmdlet. First, we create a policy definition with: Creating an ARM policy definition Creating an ARM policy definition Unlike what the official documentation says, I then had to run the following to capture the new policy in a variable: Then, we apply our new policy to a subscription (in my case, you could apply this to a particular RG or resource) with: Applying a policy to a subscription Applying a policy to a subscription That’s all there is to it. This is a simple policy that gives the expected “forbidden” result when I try to create a VM in the East US region. Attempting deployment of a VM in East US fails Attempting deployment of a VM in East US fails Conclusion ^ ARM policies are certainly the next logical step in Azure governance, and they cover the most logical restrictions most businesses will want to implement. But, as with most things in Azure, I really miss a GUI to create them. If I want to limit what types of resources people can create, it would be preferable to pick them from a list in a GUI instead of having to add them in text in PowerShell. Just like with ARM templates, I suspect that support for ARM policies will be added to Visual Studio, and that’s where you can build with a more visual approach. Win the monthly 4sysops member prize for IT pros Share 0 Related Posts 11 Comments 1. Aivendil 2 years ago Hello! I appreciate your articles about Microsoft Azure Cloud. I have a question I am struggling to find the answer for and hope that you can help or at least guide me. I am helping to build an Azure environment and the client wants to have several separate VNETs in one region. They have ExpressRoute connection to their onpremise network. What they want is to have: - two VNETs connected to the ExpressRoute directly - same two VNETS connected to each other (I know that they can communicate with each other as long as they are linked to the same ExpressRoute circuit, but how would the traffic flow? Will it be counted as ER traffic or shall it flow through Azure backbone as if I had a VNET-to-VNET connection?) - two other VNETs should only be connected to the first ones and not to the ER circuit itslef This raises a problem, because I cannot create a VNET-to-VNET connection on the same Virtual Network Gateway that I use for ExpressRoute. So the questions are: - Can I have more than one Virtual Network Gateway for one VNET? (PowerShell commands I use throw an error that I can't but I was not able to find this limitation anywhere) - Is the traffic between two VNETs connected to the same ExpressRoute circuit counted as VNET-to-VNET or as an ER traffic? - How this is usually done? I can't believe that I am the first person trying to have several VNETs only some of which are linked to ExpressRoute circuit, but all of which are connected between each other! Still I cannot find any guidelines on how to build this! Can you help me with any of these questions or at least suggest where to dig? 0 2. Author Paul Schnackenburg 2 years ago Hi Aivendil, Thanks for your questions, sorry about the delay in answering (holidays and all that). I don't think I can answer all of these. My favourite place to find the details on this sort of stuff in Azure documentation. There are a couple of places I would suggest: http://blogs.technet.com/b/cloudpfe/archive/2014/07/18/microsoft-azure-connecting-multiple-vnet-39-s-to-a-vnet.aspx You could also ask on that blog - perhaps they'd know more. According to this page, https://azure.microsoft.com/en-gb/documentation/articles/expressroute-faqs/, the following applies: You can link up to 10 virtual networks to an ExpressRoute circuit. You can authorize up to 10 other Azure subscriptions to use a single ExpressRoute circuit. This limit can be increased by enabling the ExpressRoute premium feature. Virtual machines deployed in virtual networks connected to the same ExpressRoute circuit can communicate with each other. None of that really answers your questions though. I suspect that you should be able to build a vnet.xml (can be exported from the Azure console) file with all the right configurations and then import that. Have you tried that? Hope that helps a little bit 🙂 0 3. Rustem Gumbeev 2 years ago Thanks! Will try searching that blog for useful info. As for manually edditing the xml file - I thought that this was only possible in the Classic model. Can I do that in ARM? 0 • Author Paul Schnackenburg 2 years ago Hi again, You are right - it's no longer possible to edit the network configuration file using Resource Manager. I had it in my mind that you still could but no go. I learn something new every day - thanks 🙂 0 4. Rustem Gumbeev 2 years ago Just to confirm - Aivendil is me. I registered on 4sysops to make followup easier and also since I found a lot of interesting stuff here and decided to visit it more often:) 0 5. Techie 3 months ago Thanks nice article i was wondering why this cmdlet does not work -Scope "/subscriptions/$($Sub.Subscription.SubscriptionId)/resourceGroups/$($rg.ResourceId))" i want to apply policy to entire subscription, help is much appreciated,   0 6. Author Paul Schnackenburg 3 months ago Hi Techie, I'm not sure why that doesn't work (and there's not enough context in your question to figure out why). I did find the following two articles that might shed some light on your dilemma, neither of them have your syntax. https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-manager-policy-create-assign and https://msftplayground.com/2016/11/define-azure-resource-manager-policies/ Hope that helps, Paul Schnackenburg 0 7. Techie 3 months ago Thank you paul, yes that is correct i had followed marcel blog to apply that policy, I had created a VMsize limitation policy, $PolicyAssignmentName = “VMLimitLocationsTest” $RG = Get-AzureRmResourceGroup -Name “AzureResourcePolicyTest” $Scope = “/subscriptions/$($Sub.Subscription.SubscriptionId)/resourceGroups/$($RG.ResourceGroupName)” while running above it gives me error. then i followed your article and defined scope in the powershell cmdlet itself " -Scope  /subscription/XXXX/ it was run successfully,  but i wanted to know whether my syntax is correct for the first scope , just new to powershell variables "$($Sub.Subscription.SubscriptionId)" not sure if this is correct. Thank you again for your time Thanks for 0 8. Author Paul Schnackenburg 3 months ago Hi again Techie, I'm not actually sure if that syntax is correct, although it looks right to me. Does it work, as in can a test user create a VM in a location you're not allowing or not? Otherwise perhaps someone else in the 4sysops forums can chime in about the syntax of the variable? /Paul Schnackenburg 0 9. Techie 3 months ago Thank you Paul for your help, i will check and confirm, I have implemented the policy and its working,  A standard error shows to user " The template deployment failed with error: 'The resource with id: '/subscriptions/XXX/resourceGroups/AzurePolicyTest/providers/Microsoft.Compute/virtualMachines/enforcemn' was disallowed by policy with message: 'The resource action 'Microsoft.Compute/virtualMachines/write' is disallowed by one or more policies. Policy identifier(s): '[{"policyDefinitionId":"/subscriptions/XX/providers/Microsoft.Authorization/policyDefinitions/enforcementtwo/","policyDefinitionName":"nforcementtwo","policyDefinitionEffect":"deny","policyAssignmentId":"/subscriptions/XXX" I would want to know if this error message can be turned to a standard message like " Pls contact your  IT " 0 10. Author Paul Schnackenburg 3 months ago Hi again Techie, No, as far as I know (and I had a look online, including at MS's documentation) there's no way to customize the error messages. I get the feeling that ARM policies are a little bit of a side project at MS which is a shame. I think they're absolutely critical, at least for enterprise environments where governance is key. Thanks for sharing your adventures in ARM policies with us. /Paul 0 Leave a reply Your email address will not be published. Required fields are marked * * CONTACT US Please ask IT administration questions in the forum. Any other messages are welcome. Sending © 4sysops 2006 - 2017 Log in with your credentials or     Forgot your details? Create Account
ESSENTIALAI-STEM
Kadant Inc (KAI) Q1 2025 Earnings Call Highlights: Navigating Tariff Challenges and Aftermarket ... Revenue: Declined 4% compared to the same period last year. Aftermarket Parts Revenue: Made up 75% of Q1 revenue, up 5% to a record $179 million. Gross Margin: 46.1%, up 150 basis points from 44.6% in Q1 '24. Adjusted EBITDA: $47.9 million, down 8% from $52.2 million in Q1 '24. Free Cash Flow: Increased 15% to $19 million compared to $16.6 million in Q1 '24. SG&A Expenses: Increased to 29.8% of revenue from 28.2% in Q1 '24. GAAP EPS: Decreased 3% to $2.04. Adjusted EPS: Decreased 12% to $2.10. Flow Control Segment Revenue: Increased 7% to $92 million. Industrial Processing Segment Revenue: Declined 15% compared to Q1 '24. Material Handling Segment Revenue: $57 million, up slightly compared to the prior year period. Net Debt: Decreased $10 million to $183 million at the end of Q1 '25. Leverage Ratio: Decreased to 0.95 from 0.99 at the end of '24. Tariff Impact Estimate: Incremental material costs of approximately $5 million to $6 million or $0.32 to $0.39 per share. Revised Full Year 2025 Revenue Guidance: $1.02 billion to $1.04 billion. Revised Full Year 2025 Adjusted EPS Guidance: $9.05 to $9.25. Warning! GuruFocus has detected 5 Warning Sign with TKR. Release Date: April 30, 2025 For the complete transcript of the earnings call, please refer to the full earnings call transcript. Kadant Inc (NYSE:KAI) reported strong demand for aftermarket parts, which represented 75% of Q1 revenue and was up 5% to a record $179 million. The flow control segment experienced solid demand, with bookings up 6% and revenue increasing by 7% compared to Q1 of last year. Gross margin improved to 46.1%, the highest since 2017, driven by a higher percentage of aftermarket parts. Free cash flow increased by 15% to $19 million in Q1 2025 compared to the same period last year. Kadant Inc (NYSE:KAI) maintains a healthy balance sheet with a leverage ratio of 0.95 and significant borrowing capacity available under its credit facility. Revenue in Q1 2025 declined by 4% compared to the same period last year due to weaker capital shipments in the industrial processing segment. Adjusted EBITDA decreased by 8% to $47.9 million, with a decline in the adjusted EBITDA margin by 100 basis points compared to the previous year. The industrial processing segment saw a 15% decline in revenue due to a significant drop in capital shipments. The company revised its full-year 2025 guidance downward, expecting lower revenue and adjusted EPS due to tariff impacts and delays in capital orders. Tariffs have introduced significant uncertainty, impacting customer decision-making and delaying capital equipment orders. Q: Can you provide insights into the current state of your order book and any potential risks of further deferrals into 2026? A: Jeffrey Powell, President and CEO, explained that while there is a pause due to tariff uncertainties, the discussion and activity levels remain strong. Projects are being delayed rather than canceled, and there is an expectation that investments will resume as equipment ages and requires replacement. The company is in discussions for several projects, indicating potential future growth. Q: How are tariffs impacting your capital projects, and do you expect these projects to move forward once there's clarity on tariffs? A: Jeffrey Powell noted that while tariffs have created uncertainty, leading to project delays, cancellations are rare. The company is well-positioned globally to adapt to changes in trade dynamics. Most projects are expected to proceed once there is more clarity on tariffs. Q: What is the expected impact of tariffs on your financials, and how are you mitigating these costs? A: Michael McKenney, CFO, stated that the estimated incremental material costs due to tariffs are $5 million to $6 million, impacting EPS by $0.32 to $0.39. The company is implementing mitigation strategies, including surcharges and alternative sourcing, to offset these costs over time. Q: How do you anticipate the mix of parts versus capital sales to evolve throughout the year? A: Michael McKenney indicated that parts and consumables are expected to make up 69% of revenue for the year, with a slight decrease in the second half as capital sales are anticipated to increase. The company expects continued strength in parts and consumables due to the aging installed base. Q: What are the implications of the current tariff environment on your operations in China and the US? A: Jeffrey Powell highlighted that tariffs have impacted both imports from China and exports to China. The company is working to realign its supply chain and mitigate these impacts. Despite the challenges, Kadant's global presence allows it to adapt to shifting trade dynamics. For the complete transcript of the earnings call, please refer to the full earnings call transcript. This article first appeared on GuruFocus.
NEWS-MULTISOURCE
Talk:Li Bai/Archive 1 Spelling I've changed all the references to "Li Po"; I'd prefer "Li Bai", but we need to be consistent. --Markalexander100 03:54, 22 Feb 2004 (UTC) * Actually, I prefer "Li Bo". Spencer195 08:40, 18 Mar 2004 (UTC) * Better than Li Po. :) Markalexander100 08:51, 18 Mar 2004 (UTC) * The narrator of the movie at the China pavilion at Epcot seems to be saying "Li Bao." &#9829; «Charles A. L.» 19:34, May 4, 2004 (UTC) * You probably heard Li Bai. That's what I've always heard in Taiwan as well. --Menchi 20:10, 4 May 2004 (UTC) i strongly propose a name change of this article to "Li Bai". Wade-Giles was previously used because the Chinese lacked a unified system of transliterate their language to English. But with the establishment of pinyin, the problem has been solved and we should stick to that. Objections anyone? --Plastictv 20:00, 31 Mar 2005 (UTC) this is a no-brainer, I moved the page. LG-&#29356;&#22812;&#21449; 00:37, Apr 1, 2005 (UTC) * Thank you :) --Plastictv 06:02, 2 Apr 2005 (UTC) * I believe that "Po" is pinyin and simply a variant pronunciation. "Pai" would be the Wade-Giles version. I've (1) added 'Li Po' to the top as this is the name the poet is traditionally known by in English; (2) added an explanation of why Li Po is no longer used -- and this is not simply a matter of Wade Giles. If you would check a few sources, you would find that bó is a 读音 reading of 白; (3) removed the Simplified Chinese/Traditional Chinese character pairs since the two are identical here anyway. The result, I hope, is to clean up the clutter at the head of the article and to reassure people who are used to Li Po that they are not somehow politically incorrect and explain why his name has been changed. Bathrobe 02:26, 6 May 2005 (UTC) * PLEAESPLEASE leave 'Li Po' in a highly visible place. I don't know any-thing about Chinese, but I know I love (the English translations of) Li Po's poetry. I want to be able to find him without puzzling through some text. I think it should just be Li Bai. You could mention that he's also known as li po, or li bo, but li bai is more used.- An outsider. Li Bai is the official Chinese pinyin version--let's not change a person's official transliteration of their names just because of a popularized misspelling. I have actually not EVER heard in Mandarin his name pronounced "Li Po"; it's definitely Li Bai. * I believe that the reconstructed "classical" pronunciation is "Bok", hence the confusion. We should probably keep both. --Quadalpha (talk) 19:31, 23 March 2009 (UTC) * Although an English speaker would probably pronounce "bok" as rhyming with "rock", and that is roughly in accord with the reconstructed pronunciation (which is usually rendered as some variation of *bak), that's not really an explanation of the so-called classical pronunciation of (pinyin) bó, which is actually IPA pɔ, I think. At any rate it is misleading to suggest that the bó reading is somehow indicative of the character's original reading. I advocate removing that parenthetical comment from the Name Variants section. BrianTung (talk) 00:37, 19 February 2010 (UTC) The character 白 is generally rendered in Hanyu Pinyin as bái; however, in the case of 李白, because it is a proper noun with a traditional pronunciation, Lǐ Bó is also considered proper, and preferred by some. In fact, bó is the literary pronunciation (see Wiktionary article on character 白. Dcattell (talk) 17:34, 23 July 2009 (UTC) I think that one of the values of an encyclopedia, especially as a reference in regards to reading various English language material employing diverse transliterations from the Chinese is as a supplemental way to determine if the different texts refer to the same person, or, more generally, the same Chinese characters. Comprehensive reference material such as this is not necessarily all that easy to come across, and I think herein lies a key part of the value of this article. Taking note of the "Middle Chinese" section, below, I have added Stimson's reconstruction of the poet's name. I think this adds valuable historical context, especially in terms of explaining the present diversity of spellings. Also of note is that the reconstructed personal name, Bhæk, is in the level tone: this is important in regards to Classical Chinese verse both for scansion of formal tonal variations as well as in the use of tones to determine whether or not words rhyme with each other (or, more generally if words were considered as rimes in Tang times). Dcattell (talk) 17:19, 20 July 2010 (UTC) Mercury & homeland I also toned down the mercury poisoning theory less forceful- I think it's one theory rather than generally accepted. Similarly with his birthplace- as far as I know, it's most likely that he was somewhere further west than modern Sichuan. Markalexander100 03:54, 22 Feb 2004 (UTC) Influence Firstly, Avoid_weasel_terms. Saying he was influential just repeats the intro. Markalexander100 08:30, 18 Mar 2004 (UTC) Question: Why are the Chinese characters in bold? I haven't seen many other pages that practice this, and, frankly, it makes the characters slightly (not badly, but still) difficult to read. --Golbez 06:43, 12 Apr 2004 (UTC) * Yeah, it's difficult to read. Changed. --Menchi 06:57, 12 Apr 2004 (UTC) The Influence section is completely Eurocentric. TheEvilPanda 14:50, 19 September 2007 (UTC) Wade-Giles i'm very inclined to entirely remove the table of different versions of Li Bai's name on the right. However, i'm kept from doing so because many Western audiences are more familiar with his Wade-Giles name "Li Po" or "Li Pai" rather than his pinyin name. Suggestions anyone? --Plastictv 06:29, 2 Apr 2005 (UTC) * I think you're going too far. Pretty much every page about a historical Chinese figure has a section called "Names" listing the many ways to transliterate the name of that person. It can't be helped. There's no real reason to remove it though, it doesn't do any harm to have all the other names listed for posterity. Wikipedia doesn't charge by the page. --Carl 03:16, 3 Apr 2005 (UTC) * You definitely should not remove that information. Wikipedia articles on Chinese figure provide all major transliterations of names. &mdash;Lowellian (reply) 19:37, 4 October 2005 (UTC) Alcoholic A link has rfecently been added to alcoholics. Other than his alcohol-related death, is there any reason to consider Li Po an alcoholic? Kdammers 01:22, 11 January 2006 (UTC) * None whatsoever. Mark1 11:31, 11 January 2006 (UTC) There are a large number of sources which highlight his alcoholism, and that he drunk himself to death. See: Ou Yangxiu 歐陽修(1007-1072), Song Qi宋祁 (998-1061) “Li Bai zhuan 李白傳,” Xin tang shu 新唐書, Taibei: Taiwan, Zhonghua shu ju, 1965, chapter (juan卷) 202: 5761. Liu Xu 劉昫 (887-946). “Li Bai zhuan 李白傳.” Jiu tang shu 舊唐書. Taibei: Zhonghua shuju, 1965. chapter (juan 卷) 190:5054 —Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:38, 12 January 2009 (UTC) Middle Chinese It is my tentative suggestion that Li Bai (and all the Tang and Song Chinese figures) should also include the Middle Chinese of at least their accepted popular name. A good system to follow (if it is not plagarism) would be Hugh M. Stimson's transcriptions in his 1976 Tang Poetic Vocablary. This system renders Li Bai as Lǐ Bhæk. DMC 02:12, 16 February 2006 (UTC) It's hard to be accurate on those though. AQu01rius (User | Talk | Websites) 22:25, 8 October 2006 (UTC) martial artist? I read from somewhere that he traveled around with a sword on his hip (and that he can do a sword dancing or something) and wine on one hand. Not to mention a tv series and novel showing him like a kungfu master :\ * Not really. He described in a poem how he was dedicated to fencing when he was 15, and killed several people. That doesn't make him a martial artist. AQu01rius (User | Talk | Websites) 22:22, 8 October 2006 (UTC) etymology the intro should only pertain to a summarization of this figure. A separate section should be added for the etymology of his name. <IP_ADDRESS> 01:21, 3 December 2006 (UTC) Texts I added some links to poems with English translation available online. I know Wikipedia isn't a link repository, but surely it's useful to be able to read a selection of his poems. Kaicarver 14:35, 30 January 2007 (UTC) "Ling" Po? Is his name ever mistranslated in the west as "Ling" Po? I just saw an old Harold Lloyd movie called The Cat's-Paw which makes frequent references to a "Ling Po" which I believe is a corruption of Li Po, but am not sure.--Silverscreen 16:04, 19 February 2007 (UTC) Translators? I haven't been able to find the source of the translation in this article. Is it original work by one of the article's editors?Easchiff 06:05, 22 March 2007 (UTC) Alternative Translation I've added an alternative translation of one of Li Po's poems. source: http://www.poetrystore.com/lipo.html Intranetusa 02:47, 2 July 2007 (UTC) * It's a good translation. However, this translation, and also the one that was already in the article, both need references (in the main article - not the discussion page) that indicate who the translator is, where the translation was published, etc.; this is a Wikipedia policy (see WP:Citing Sources). If you can find this information (the web-reference you give doesn't have it either), please just delete the unreferenced one that's been in the article so far.Easchiff 21:18, 2 July 2007 (UTC) * OK; the translation you used is Arthur Waley's. I've added the reference to the article, deleted the unsourced translation, and uploaded Waley's translations for three of Li Bai's poems with the same title "Drinking Alone by Moonlight" to Wikisource.Easchiff 20:32, 3 July 2007 (UTC) The Epcot pavilion sentence Can someone please fix the sentence? It can't possibly be Li Bai himself. Xiner (talk) 02:03, 27 August 2007 (UTC) Source Needed/ POV "As a result, his poems flow spontaneously and effortlessly, like the river running to the ocean – it is simply unstoppable." --- this line should not exist in this article unless it is from a notable critic. I will change it for the moment being until the author has a chance to cite the source. THanks Mrathel 13:55, 19 October 2007 (UTC) Also, these sentences will be removed: his poems, Li Bai tried to avoid the use of obscure words and historical references. Unlike other ancient Chinese poets such as Du Fu, Li Bai had no need to prove himself to the public; instead, he could afford to concentrate on communicating his genuine feelings to the readers. His ability to create extraordinary out of ordinary was an unusual gift among his contemporaries, and was most likely the reason why he was considered the "Poem-God 1. Why does Du Fu feel the need to prove himself to the public, and can you give evidence that shows that Li Bai had no need to do so. Maybe there is a good explanation for this, but I fail to see it, and if it exists, it needs to be referenced. 2. "communicating his genuine feelings to the readers." how can the editor know which feelings of Li Bai's were genuine and which were not. 3. "his ability to create the extraordinary out of the ordinary was an unusual gift among his contemporaries," -- Can you expand on exactly how his contemporaries lacked the gift of extraordinaryating? -- I will give some time for a reply then I will remove the text and replace it with less POV material. Mrathel (talk) 13:44, 28 May 2008 (UTC) Li Bai, or Bai Li? Chinese names are written family name first, then given name; in the west these are usually inverted to the conventional order given name, then family name. From this article, it is impossible to tell which name is his family name, or whether the western version of his name is inverted or not. Geoffrey.landis (talk) 17:54, 12 September 2008 (UTC) Please study some Chinese--if you don't know that this is one of the most famous poets in Chinese history, then you wouldn't need to ask what his last name is. It's obvious. LI is his surname. Thank you for bringing up a non-issue. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:40, 7 October 2008 (UTC) Tai Bo Tai Bo should redirect to Tae Bo not here. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:20, 22 November 2008 (UTC) Most well-known poems It is certainly NOT Drinking Alone by Moonlight (月下獨酌). From my personal education experience, I had never came across this piece of work. The most famous poem is most definitely 靜夜思 (uncertain of the correctness on the last character). I have no English translation of the poem title, but it would be much appreciated if someone could provide an official English transliteration. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:45, 4 January 2009 (UTC) 靜夜思 Reflections on a Quiet Night. BOTH are among his most famous works, as are many of those included in the Collection of Three Hundred Tang Poems. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:31, 12 January 2009 (UTC) Height? My world literature textbook says that he was "over eight feet tall." I don't know if this is true, so please remove it from the article if it is not. --Cerebellum (talk) 00:40, 6 January 2009 (UTC) * That's the first I've ever heard of this, and I've been reading a lot about Tang poets lately. It's certainly not mentioned by any of the translators of his works. I'm dubious, to be frank. —Quasirandom (talk) 21:49, 7 January 2009 (UTC) * I haven't found mention of this anywhere else on the Internet, and I assume that a fact like that would be pretty common knowledge. Plus, our own List of tallest people has only 7 individuals ever who were over 8 feet tall, and you haven't heard anything about it, so I'm definitely calling shenanigans on this. I've reverted. --Cerebellum (talk) 15:53, 8 January 2009 (UTC) * The Chinese measurement "chi" (sorry don't have Chinese input on this computer) is not the same as the measurement of 1 feet. In Romance of Three Kingdom the GuanYu is described as nine chi (see http://en.wikipedia.org/wiki/Guan_Yu) and he's not unusually tall. In this case the source probably meant 8 chi, not 8 feet. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 02:12, 6 March 2009 (UTC) Yeo Ok I have just started a little entry on Yeo Ok (麗玉)(여옥). We don't have much information on her but there is a mention of Li Po using her story: Gonghuin (箜篌引). Does anyone know about this and have more information in general? Best wishes (Msrasnw (talk) 09:55, 28 February 2009 (UTC)) * More likely Li He (aka Li Ho) than Li Bo (aka Li Po). Dcattell (talk) 10:01, 4 January 2011 (UTC) Chinese media fabrication Huanqiu Sibuo printed article with a fake Seoul University Professor from a history department who is making claims that a Chinese historical figure/poet, was actually a Korean. First of all, there's no professor named Kim Byung Duk at SNU, and second of all, there is no history department at Seoul University. Article from: http://world.huanqiu.com/roll/2010-05/815820.html —Preceding unsigned comment added by KoreanSentry (talk • contribs) 16:42, 14 May 2010 (UTC) How to incorporate this? use of personae in poems I think this is important to incorporate about the Chinese poetry tradition of sponteniously creating poems about NOW and the conflation of the narrator of the poem with the poet and Li Bai's more frequent use than some of his contemporaries of using a personea "I" within his poems; but I am at a loss as to how to get all of that in this article. Help? Source at googlebooks. Active Banana (talk) 20:47, 28 May 2010 (UTC) A better older version somewhere? Once upon a time, someone ranked this article as B-class. Considering where it started today, and adding the references that I have so far, I would only give this a Start rating. Was there some actual B class version that existed before or was this miserably misrated? Active Banana (talk) 21:21, 28 May 2010 (UTC) biography I have divided his biography into sections, which I think will be helpful, although the content needs plenty of help. Dcattell (talk) 17:34, 18 September 2010 (UTC) Li Bai vs Li Bo If you guys insist to add Li Bo in pinyin, please note that Bo is not modern standard Mandarin Chinese pronunciation, it IS Obsolete. One can still hear this in nowadays Beijing opera.--刻意(Kèyì) 00:32, 24 October 2011 (UTC) * Good point. "Bo" for "白" is dialectic/historical. Certainly, this is an important fact, one which should not be ignored, and indeed should be mentioned. How to make more clear in this article? And, in this regard, information on Beijing opera would be helpful, especially with citations.... Dcattell (talk) 05:33, 24 October 2011 (UTC)
WIKI
Pedro LÓPEZ-MUÑOZ, Debtor. United Surety & Indemnity Company, Appellant, v. Pedro López-Muñoz, Appellee. BAP NO. PR 16-011 Bankruptcy Case No. 13-08171-EAG United States Bankruptcy Appellate Panel of the First Circuit. July 28, 2016 Héctor Saldaña Egozcue, Esq., Carlos Lugo Fiol, Esq., and Jose A. Sánchez Giro-na, Esq. on brief for Appellant. Carmen Conde Torres, Esq. and Luisa S. Valle Castro, Esq., on brief for Appel-lee. Before Bailey, Finkle, and Fagone, United States Bankruptcy Appellate Panel Judges. Finkle, U.S. Bankruptcy Appellate Panel Judge. United Surety & Indemnity Company (“USIC”) appeals from the bankruptcy court’s January 15, 2016 order denying its motion to appoint a chapter 11 trustee under § 1104. For the reasons set forth below, we AFFIRM the ruling of the bankruptcy court. BACKGROUND I. Pre-Bankruptcy Events Over 30 years ago, Pedro López-Muñoz (the “Debtor”) and his now ex-spouse incorporated Western Petroleum Enterprises Inc. (“Western Petroleum”), to engage in the sale and distribution of petroleum products and derivatives. The Debtor owns 50% of the shares of this corporation. Western Petroleum obtained surety bonds from USIC to guarantee its obligations to its creditors. As a condition of issuing the bonds, Western Petroleum executed an indemnity agreement which the Debtor signed both as “principal and indemnitor.” USIC’s proof of claim filed in the Debtor’s bankruptcy case arises out of this indemnity. In 1999, the Debtor incorporated Hi Speed Gas Corp. (“Hi Speed”), of which he is the sole shareholder. Hi Speed owns a gas station located in Hormigueros, Puerto Rico (“Hi Speed Station”). In 2001, the Debtor acquired, in his personal capacity, a gas station located in Balboa Ward, May-agüez (“Debtor’s Station”). Apparently, hard times befell Western Petroleum and in 2013 it was not able to pay its debts and ceased operations. The Debtor and his ex-spouse had also provided personal guarantees in excess of $10 million to most of Western Petroleum’s creditors, and one such creditor commenced aggressive collection actions in the courts of Puerto Rico against Western Petroleum and the Debtor. On April 1, 2013, the trust denominated La Familia Trust (“Familia Trust” or “trust”) was created by one of the Debtor’s sons. We highlight here those provisions of the trust pertinent to this matter and USIC’s motion. The “Constitution of Trust” recites its purpose is to “maintain adequate living standards” for the Debtor and his children. It names the Debtor as its beneficiary and his children as substitute beneficiaries upon the Debtor’s death. The trustee is the Debtor’s current spouse. The Debtor has the power to designate any successor trustee at any time. He has the exclusive right of use of all trust properties. Lastly, the trustee is required to follow any instructions from the Debtor regarding distributions of trust income and assets, and no person other than the Debt- or can obligate the trustee to make distributions from the trust. On April 8, 2013, Hi Speed executed a 20-year lease with Puma Energy Caribe LLC (“Puma”) for the operation of the Hi Speed Station. The lease provided for an initial monthly rental payment to Hi Speed of $32,000 and an advance payment of $125,000 to Hi Speed. The advance payment was to be repaid to Puma through monthly rent reductions of $500 during the lease term. On the same day, the Debtor executed a 20-year term lease with Puma for the operation of the Debtor’s Station, with an initial monthly rental payment to the Debtor of $18,000 and the same advance payment of $125,000. Similarly, the advance payment was to be repaid to Puma through a $500 monthly rent reduction during the lease term. Under both lease agreements, Puma assumed all costs related to the operation of the gas stations, including utilities and insurance. The leases are triple net leases whereby Puma is responsible for the repair and maintenance of the gas stations, for obtaining all licenses necessary for their operation, and for the payment of real and personal property taxes. In short, the rents received by Hi Speed and the Debtor under these leases are free and clear of any expenses relating to the day-to-day operations of the gas stations and the maintenance of the land and buildings on which the stations are located. On April 11, 2013, the Debtor sold his interest in the Debtor’s Station to Hi Speed. According to the terms of the sale, Hi Speed paid $5,000 to the Debtor and assumed the mortgage obligation against the Debtor’s Station owed to Banco Popular de Puerto Rico (“BPPR”). Hi Speed also agreed to pay the Debtor a monthly salary of $5,000 and monthly rent of $10,000 for office space it used in another building owned by the Debtor personally. On the same date, the Debtor donated his shares in Hi Speed to the Familia Trust. Adding to the Debtor’s personal financial woes, on May 17, 2013, BPPR garnished slightly more than $182,000 from the Debtor’s personal bank account which, at the time, included the $125,000 advance payment under the lease of the Debtor’s Station. II. Bankruptcy Proceedings On October 1, 2013, the Debtor filed a chapter 11 petition, schedules, and a statement of financial affairs. On his schedules the Debtor listed his 50% interest in Western Petroleum valued at zero and his 50% interest in another corporation valued at $500,000. He did not list any interests in any trusts. In his statement of financial affairs he disclosed the pre-petition transfers of the Debtor’s Station to Hi Speed and his Hi Speed shares to the Familia Trust, but indicated that the transfers took place in March 2013, rather than April 2013. He disclosed the $5,000 payment he received for the transfer of the Debtor’s Station and indicated he received “no value” for the transfer of the Hi Speed shares. He did not mention the lease agreements with Puma for the operation of the two gas stations. The U.S. Trustee conducted a § 341 meeting of creditors (“Creditors’ Meeting”) which USIC attended. At that meeting the U.S. Trustee questioned the Debt- or about his pre-petition transfers to Hi Speed and the Familia Trust, and he answered those questions. In response to a question about the trust the Debtor stated that his children were the beneficiaries. As to his shares in Hi Speed, he valued them as “worthless,” explaining that he transferred them to the trust “[t]o. protect [his] sons.” Subsequently, in April 2014, the Debtor filed his first disclosure statement and plan of reorganization. In the disclosure statement, he referenced the transfer of his interest in Hi Speed to the Familia Trust on April 1, 2013, and the sale of the Debt- or’s Station to Hi Speed on April 11, 2013. The purpose of these transactions, he stated, was “to preserve the property due to Debtor’s difficulties to maintain the mortgage payments up to date.... ” This initial disclosure statement did not discuss the Puma leases. Later that month, USIC conducted a deposition of the Debtor. USIC asserts it was not until it confronted the Debtor at the deposition with evidence it had gathered as a result of its own investigation, that the Debtor acknowledged the existence of the Puma leases as well as being, the sole beneficiary of the Familia Trust. After some delays in the proceedings, USIC filed an objection to the disclosure statement and also requested the appointment of a chapter 11 trustee pursuant to § 1104(a)(1) and (2). Among other things, USIC maintained that there was cause to appoint a trustee, citing to the Debtor’s pre-petition transfers of his assets to related parties in order to defraud his creditors and the Debtor’s alleged failure to make “crucial” disclosures about such transfers, such as the Puma leases and his sole interest in the trust. In fact, USIC asserted, the Debtor gave inaccurate dates for such transfers to mislead his creditors. USIC also maintained that the Debtor had a conflict of interest because the estate has a cause of action against Hi Speed under § 548 for the avoidance and recovery of funds it received by virtue of the fraudulent transfers. It argued that the following transactions occurring within the six month period before the petition date were fraudulent: (1) the transfer of the Debtor’s Station to his solely owned corporation Hi Speed, (2) the “donation” of his shares in Hi Speed to the Familia Trust, of which he was the sole beneficiary, (3) the execution of the two operating lease agreements with Puma, and (4) the payment by Hi Speed to the Debtor of a monthly salary of $5,000 and monthly rent of $10,000. Weighing in on the matter, the U.S. Trustee filed his Position as to Motion to Appoint a Chapter 11 Trustee, in which he stated that the facts submitted by USIC in its motion warranted the appointment of a trustee under § 1104(a)(1) and (2), or alternatively, conversion of the case to chapter 7. The U.S. Trustee, however, did not join in the motion for appointment of a chapter 11 trustee or file a motion to convert the case to chapter 7. To respond to these challenges to his reorganization efforts, the Debtor executed a deed of rescission on August 29, 2014, transferring the Debtor’s Station from Hi Speed back to himself. The shares in Hi Speed were also transferred from the Fa-milia Trust back to the Debtor. On that same date, the Debtor filed a motion seeking to amend his schedules and statement of financial affairs to reflect such rescis-sions and include these assets in his bankruptcy estate, and to include the Puma lease and associated income it generates along with the expenses associated with the administration of the lease. He also filed an amended disclosure statement and an amended plan to, among other things, correspond with the return of those assets to the Debtor and reflect the lease income and lease administration expenses. In the amended disclosure statement and amended Schedule B (personal property), the Debtor ascribed no value to the Hi Speed shares and the Puma lease and attached audited financial statements for Hi Speed as of June 30, 2013, indicating a negative book value of $452,000, and for the Debt- or’s Station as of December 31, 2012, indicating a negative book value of $923,000. Additionally, the Debtor filed an opposition to USIC’s request for the appointment of a chapter 11 trustee. His primary contention was that cause did not exist for such appointment because: (1) he fully disclosed the transfers of his assets from the outset of his case, (2) the transfers were made for the benefit of all creditors in order to protect the income derived from the Puma leases from the aggressive collection efforts of just one creditor, an entirely valid reason for such transfers, and (3) he never intended to defraud or deceive his creditors. He disclosed that “out of an abundance of caution and to avoid’ any additional allegations of bad faith or wrongdoing by USIC,” he had rescinded these transfers. The Debtor further maintained that appointment of a trustee was not in the best interest of creditors as it would greatly increase administrative expenses and only delay his reorganization to the detriment of his creditors. USIC filed a reply to the Debtor’s opposition, citing Martin v. Bajgar, 104 F.3d 495 (1st Cir.1997), for the proposition that the Debtor’s re-transfer of fraudulently transferred assets after the petition date did not cure the fraudulent transfers. It further argued that the Debtor’s failure to collect from Hi Speed the monies it received from the Puma lease of the Debtor’s Station prior to the rescission of the transfer constituted “gross mismanagement.” Finally, it reiterated that the appointment of a trastee was in the best interests of creditors because a trustee would likely sell both gas stations and pursue the turnover of monies paid to Hi Speed under the Puma lease. For these reasons, it posited, the benefits to the estate of having a trustee appointed outweighed any detriment alleged by the Debtor. On July 14 and 15, 2015, the bankruptcy court held an evidentiary hearing on USIC’s request for appointment of a chapter 11 trustee and the Debtor’s amended disclosure statement. As USIC bore the burden to establish that grounds existed under § 1104(a)(1) and (2) for the appointment of a trustee, it is significant to note that because it had failed to list its expert witness, certified public accountant Rafael Pérez Villarini (“CPA Villarini”), on the parties’ joint pre-trial report, USIC was limited to presenting this expert witness for rebuttal purposes only. In the end this proved to be a hurdle that USIC did not adequately overcome. In defending against the appointment of a trustee, the Debtor testified, as did his accountant Doris Barroso (“CPA Barroso”) who appeared as an expert witness, both as a certified public accountant and a certified forensic accountant. The parties also submitted numerous exhibits and post-trial memoranda. III. The Bankruptcy Court’s Opinion and Order On January 15, 2016, the bankruptcy court entered an Opinion and Order (the “Order”) denying USIC’s request for the appointment of a chapter 11 trustee. See In re López Muñoz, 544 B.R. 266 (Bankr.D.P.R.2016). A. Findings of Fact In the Order, the bankruptcy court issued detailed findings of fact regarding the Debtor’s transfers of assets and USIC’s allegations of the Debtor’s pre-petition fraudulent transactions and post-petition fraud. The bankruptcy court based its factual findings on the joint pretrial report filed by the parties, the testimony of the witnesses at the evidentiary hearing, and the exhibits entered into evidence at that hearing. Each of the bankruptcy court’s factual findings is supported by a reference to either the hearing transcripts, the joint exhibits, or the joint pretrial report. Many of the undisputed factual findings regarding the Debtor’s pre-petition transactions and post-petition disclosures are set forth in the background section above. Other findings of the bankruptcy court recited in the Order that are relevant to this appeal are summarized below. 1. Facts related to pre-petition allegations of fraud In connection with the general agreement of indemnity, USIC was provided information about the Debtor’s financial condition, including a 2010 financial statement (“Initial 2010 Financial Statement”). The financial statement listed the purchase price paid by Hi Speed for its gas station as approximately $2,200,000, the value of the Debtor’s shares in Hi Speed at $3,000,000 based on a 2002 appraisal, and the value of the Debtor’s Station at $1,400,000, also based on a 2002 appraisal. The bankruptcy court afforded “little or no weight” to these values because the Initial 2010 Financial Statement was not prepared by a certified public accountant and was not even a compilation, the lowest level of financial statement a certified public accountant can provide for a client. Further, the bankruptcy court specifically found that the value of assets in 2002 was not necessarily representative of their value eight years later in 2010, and even less so in 2013 when the transfers occurred! The 2013 financial statement of Hi Speed disclosed the existence of the Puma leases and the two advance lease payments of $125,000, and reflected a book value for Hi Speed of negative $452,000. The 2012 financial statement for the Debtor’s Station reflected a book value of negative $923,000. 2. Facts related to post-petition allegations of fraud After his bankruptcy filing, the Debtor received from Hi Speed a monthly salary of $6,000 and rent of $10,000 for office space leased by Hi Speed from the Debtor. Hi Speed paid its own operating expenses for the administration of the lease of the Hi Speed Station to Puma. After the reversal of the asset transfers on August 29, 2014, the monthly rent Hi Speed paid the Debtor was reduced to $5,000 to take into account that it was thereafter administering only one of the Puma leases. As to disclosures about his assets, the Debtor had listed the pre-petition transfers to Hi Speed and the Familia Trust in the statement of financial affairs, but reflected the transfers as taking place in March, 2013 rather than the actual transfer date of April 11, 2013, shortly after the execution of the Puma leases, At the evi-dentiary hearing, the Debtor explained he had made an “honest mistake” about the date. At his deposition taken by USIC in April, 2014, he produced all requested documents “except a document sustaining the transfer of shares to the Trust.” During the Creditors’ Meeting, at which USIG’s attorney was present, the Debtor answered numerous questions of the U.S. Trustee about the pre-petition transfers. He incorrectly stated that his four adult children were the beneficiaries of the Fa-milia Trust. At the evidentiary hearing, however, he agreed that he was the sole beneficiary of the trust and explained that he misspoke for two reasons. First he was answering the question from memory and did not have the trust document before him. Second, he thought of his children as the true trust beneficiaries because the “law of life” dictates that he will pass away before his children do and they will inherit all of the trust assets. As to the value of the Hi Speed shares transferred to the trust, at the Creditors’ Meeting he explained the shares were worthless and that the reason he transferred them was to protect his children. This statement of value was consistent with the valuation listed on the statement of financial affairs. At the evidentiary hearing, the Debtor testified that he relied on an amended financial statement for the year 2010 (dated July 31, 2013) in order to provide the value of the shares of Hi Speed in the statement of financial affairs and at the Creditors’ Meeting. The disclosure of expenses by the Debt- or on Schedule J included the Debtor’s own expenses incurred for the administration of the Puma lease for the Debtor’s Station, not those for the actual operation of the gas station assumed by Puma under the lease. On a monthly basis, the Debtor charges Hi Speed for the cost of administering its lease, and for its use of electricity, water, and telephone for 1,000 square feet of office space the Debtor rents to Hi Speed in the office building he owns. The Debtor also collects from Hi Speed property taxes (CRIM), “patentes” (licenses), and the costs of repair and maintenance for this space, and charges Hi Speed for services provided by an accountant who also works for the Debtor and another of his corporations. Regarding the allegations of diversion of funds, after the August 29, 2014 rescission of the asset transfers, the Debtor himself commenced making all mortgage payments to BPPR and paid the operating expenses of administering the lease which were previously paid by Hi Speed. Hi Speed did not refund any money it received under the Puma lease, but there were no surplus funds owed by Hi Speed to the estate for the pre-rescession period. All such funds Hi Speed received were used to pay the BPPR mortgage on the Debtor’s Station, the costs of administering the Puma lease, the office rent, and the Debtor’s salary. CPA Barroso found no indicia of fraud based on her conclusion that the Debtor did not divert any funds, did not conceal assets or omit information from his creditors, and did not falsify any documents. She did not prepare a fraud analysis of the Debtor’s financial transactions or operations because it was unnecessary as she found no indicia of fraud. Finally, she determined there was no material effect on the bankruptcy estate from the asset transfers because all funds were received by the estate and paid to the Debtor’s secured creditors. USIC’s witness CPA Villarini was unable to rebut CPA Barroso’s conclusion that no monetary loss was sustained by the estate as a result of the asset transfers. B. The Bankruptcy Court’s Ruling After issuing its findings of fact, the bankruptcy court ruled that: Article 1249 of the Puerto Rico Civil Code creates a presumption that the asset transfer was done in fraud of creditors. P.R. Laws Ann. tit. 31, § 3498. But, the debtor rebutted that presumption at, the evidentiary hearing with the testimony of CPA Barroso that the transfer of assets had “no material effect” upon the estate. CPA Barroso was a credible and convincing witness and was qualified to testify as an expert in accounting and, in particular, as a certified financial forensic accountant. Her duties in this case included the review of the monthly operating reports, assistance in the preparation of the payment plan, reconciliation of claims submitted to the court with the accounting records, preparation of the liquidation analysis, assistance in the preparation of the financial projections, and analysis of information regarding the cash inflows and outflows of the debtor and Hi Speed. The Court also took into account its observations over many years in other cases in which CPA Barroso has been employed as a bankruptcy professional in according considerable weight to her testimony. And, when USIC called CPA Pérez Villarini as an expert witness to rebut CPA Barroso’s testimony and asked him whether he agreed •with her statement that there was no “monetary loss to the estate as a result of both the transfers that Mr. Lopez performed in regarding the shares of Hi Speed and la familia trust,” CPA Pérez Villarini answered “I can’t — I can’t,” and added “I have no basis to — to reach a conclusion in that.” USIC also argues that the debtor’s estate has a cause of action for the turnover of $119,500, plus interest, against Hi Speed due to the rescission of the asset transfers. But, CPA Barroso’s testimony that the asset transfers had no material effect upon the estate remains in the court’s view uncontested. Thus, USIC did not meet its burden of proof that such cause of action exists. The court is, likewise, not persuaded by the several other grounds raised by USIC. They either were not material to the section 1104 analysis or do not rise to the level of misconduct requiring the appointment of a chapter 11 trustee. And, in many instances, the debtor was able to provide an acceptable explanation for his actions. For example, the debtor was able to show that he relied on an amended financial statement for the year 2010 when he indicated that the Hi Speed shares had no value. 544 B.R. at 276-77 (citations to the hearing transcript omitted). Having concluded that “USIC did not meet its burden of proof,” the bankruptcy court denied its request for appointment of a chapter 11 trustee. Id. at 277. IY. Subsequent Events After determining that USIC had failed to timely file an objection to the Debtor’s amended disclosure statement, the bankruptcy court entered an order approving it and scheduling a confirmation hearing on the Debtor’s amended plan of reorganization for April 20, 2016. In response USIC filed a motion with the bankruptcy court seeking to stay the bankruptcy court proceedings pending the resolution of this appeal. That motion was denied and USIC filed an emergency motion with the Panel seeking to suspend the proceedings in the bankruptcy court, including the scheduled confirmation hearing, pending the resolution of this appeal. On April 15, 2016, the Panel entered an order granting the stay motion in part, concluding that a suspension of the confirmation proceedings was warranted but not suspension of all proceedings in the bankruptcy case. JURISDICTION The Panel has jurisdiction to hear appeals from final judgments, orders and decrees of the bankruptcy court. See 28 U.S.C. § 158(a)(1). A bankruptcy court’s order denying the appointment of a chapter 11 trustee is a final, appealable order. See Comm. of Dalkon Shield Claimants v. A.H. Robins Co., Inc., 828 F.2d 239, 241 (4th Cir.1987) (determining that an order denying creditors’ committee’s request for appointment of a chapter 11 trustee was “immediately reviewable as a final decision”); see also Anderson v. Real Estate Partners, Inc. (In re Real Estate Partners, Inc.), No. 07-1440 ODW, 2009 WL 3246619, at *1 (C.D.Cal. Oct. 5, 2009) (“Pursuant to 28 U.S.C. § 158(a), the [court] may review any final judgment, order, or decree of a bankruptcy court, including an order denying the appointment of a Chapter 11 trustee.”); Official Comm. of Asbestos Claimants v. G-I Holdings, Inc. (In re G-I Holdings, Inc.), 295 B.R. 502, 504 (D.N.J.2003), aff'd, 385 F.3d 313 (3d Cir.2004) (holding that order denying appointment of a bankruptcy trustee is a final order and, therefore, the court had jurisdiction under 28 U.S.C. § 158(a)). Accordingly, the Panel has jurisdiction to hear this appeal. STANDARD OF REVIEW The Panel reviews a bankruptcy court’s findings of fact for clear error and its conclusions of law de novo. See Lessard v. Wilton-Lyndeborough Coop. Sch. Dist., 592 F.3d 267, 269 (1st Cir.2010). Thus, the bankruptcy court’s factual findings regarding the appointment of a trustee are reviewed under a clearly erroneous standard. See Tradex Corp. v. Morse, 339 B.R. 823, 832 (D.Mass.2006). The bankruptcy court has discretion, however, in determining whether the evidence is sufficient to establish “cause” for the appointment of a trustee or such appointment is in the interests of creditors and the estate under § 1104(a). See id. “A discretionary decision of the bankruptcy court is overturned only when there has been abuse of that discretion.” Id. at 824 (citation omitted). “ Apart from an error of law, an abuse of discretion occurs when the ... court considers improper criteria, ignores criteria that deserve significant weight, or gauges only the appropriate criteria but makes a clear error of judgment in assaying them.’” Wiscovitch-Rentas v. Villa Blanca VB Plaza LLC (In re PMC Mktg. Corp.), 543 B.R. 345, 354-55 (1st Cir. BAP 2016) (quoting Rosario-Urdaz v. Rivera-Hernandez, 350 F.3d 219, 221 (1st Cir. 2003) (citation omitted)). DISCUSSION I. The Statutory Basis for Appointment of a Chapter 11 Trustee Section 1104(a) provides, in relevant part, as follows: (a) At any time after the commencement of the case but before confirmation of a plan, on request of a party in interest or the United States trustee, and after notice and a hearing, the court shall order the appointment of a trustee- (1) for cause, including fraud, dishonesty, incompetence, or gross mismanagement of the affairs of the debtor by current management, either before or after the commencement of the case, or similar cause ...; or (2) if such appointment is in the interests of creditors, any equity security holders, and other interests of the estate .... 11 U.S.C. § 1104(a). “[T]he two different bases for appointing a trustee are disjunctive; a court must find either fraud, incompetence and the like or that such appointment is in the interests of the creditors and estate.” Petit v. New Eng. Mortg. Servs., Inc., 182 B.R. 64, 69 (D.Me. 1995) (citation omitted). “The appointment of a chapter 11 trustee is considered to be an ‘extraordinary’ act since, in the usual case, the debtor remains a debtor-in-possession throughout reorganization.” Id. at 68 (citation omitted). “The presumption in chapter 11 cases is that ‘current manage-, ment is generally best suited to orchestrate the process of rehabilitation for the benefit of creditors and other interests of the estate.’ ” Id. (citation omitted). “Nevertheless, in the appropriate case, the appointment of a trustee is a power which is critical for the court to exercise in order to preserve the integrity of the bankruptcy process and to insure that the interests of creditors are served.” In re Nartron Corp., 330 B.R. 573, 591-92 (Bankr.W.D.Mich.2005); see also Tradex Corp., 339 B.R. at 823. The moving party has the burden of proving grounds that justify the appointment of a chapter 11 trustee and, in doing so, must overcome a strong presumption that the debtor is to remain in possession. In re LHC, LLC, 497 B.R. 281, 291 (Bankr.N.D.Ill.2013). The First Circuit has not determined the appropriate burden of proof for the appointment of a trustee pursuant to § 1104, and courts are split as to the applicable standard. Some courts have held that a movant must establish cause by clear and convincing evidence. See, e.g., 7 Collier on Bankruptcy, at ¶ 1104.02[4(b) ]; Adams v. Marwil (In re Bayou Group, LLC), 564 F.3d 541, 546 (2d Cir.2009); In re G-I Holdings, Inc., 385 F.3d at 317-18 (explaining that heavy “presumption” against appointment of a trustee refers to a heavy burden of persuasion by clear and convincing evidence that the party moving for appointment must bear). Others hold that a preponderance of the evidence standard is more appropriate. See Tradex Corp., 339 B.R. at 832; In re Costa Bonita Beach Resort, 479 B.R. 14, 44 (Bankr.D.P.R.2012). Here, although the bankruptcy court stated it “agree[d] with the majority view that a debtor’s presumptive right to maintain possession over the reorganizing business is an important interest justifying the heightened burden of clear and convincing evidence,” it concluded “the debate [wa]s immaterial” in this case because the appointment of a trustee was not warranted “under either standard.” In re López Muñoz, 544 B.R. at 275. USIC urges us to adopt a preponderance of the evidence standard, but we need not adopt a particular standard for our review as we find no abuse of discretion in the court’s ruling that USIC failed to meet .its burden under any applicable burden of proof standard. II. Applying the Standard A.. Cause Under § 1104(a)(1) Section 1104(a)(1) does not define cause. Instead, it references a non-exhaustive list of grounds that may each establish cause to appoint a trustee: fraud, dishonesty, incompetence, or gross mismanagement of the affairs of the debtor by current management. The inquiry into whether cause exists for the appointment of a chapter 11 trustee is not limited to the enumerated list but extends to “similar cause.” See 11 U.S.C. § 1104(a)(1). In determining whether a particular set of circumstances establishes cause under this prong of § 1104(a), courts have considered a variety of factors, including: (1) Materiality of the misconduct; (2) Evenhandedness or lack of such in dealings with insiders or affiliated entities vis-a-vis other creditors or customers; (3) The existence of pre-petition voidable preferences or fraudulent transfers; (4) Unwillingness or inability of management to pursue estate causes of action; (5) Conflicts of interest on the part of management interfering with its ability to fulfill fiduciary duties owed to the debtor; [and] (6) Self-dealings by management or waste or squandering of corporate assets. In re Sundale, Ltd., 400 B.R. 890, 900 (Bankr.S.D.Fla.2009) (quoting In re Intercat, Inc., 247 B.R. 911, 921 (Bankr.S.D.Ga. 2000)); see also In re Veblen West Dairy LLP, 434 B.R. 550, 553 (Bankr.D.S.D.2010) (considering similar factors for a § 1104(a)(1) analysis); In re Nartron Corp., 330 B.R. at 592 (same). In considering these factors, “the level of the acts constituting cause, the conduct, failure to act, or gross mismanagement, or the like, must ‘[rise] to a level sufficient to warrant the appointment of a trustee.’” In re Sundale, Ltd., 400 B.R. at 900 (quoting Comm. of Dalkon Shield Claimants, 828 F.2d at 242). While any one factor may not warrant appointment of a trustee, the court must consider “the cumulative or collective impact of the alleged problems or issues in making its decision.” Id. (citing In re Cardinal Indus., Inc., 109 B.R. 755 (Bankr.S.D.Ohio 1990)). “That is, the court must determine whether the totality of the circumstances warrant appointment of a trustee.” Id. (citing In re Sharon Steel Corp., 871 F.2d 1217, 1228 (3d Cir.1989)). Thus, appointment of a trustee is a fact-intensive determination and must be made on a case-by-case basis. In re LHC, LLC, 497 B.R. at 291 (citation omitted). While appointment of a trustee is mandatory if cause is found, a bankruptcy court has wide discretion to determine whether specific conduct sufficiently establishes such cause. See Spenlinhauer v. Harrington (In re Spenlinhauer), No. 15-14223-GAO, 2016 WL 526200, at *1 (D.Mass. Feb. 9, 2016) (citing Tradex Corp., 339 B.R. at 828-29). The crux of USIC’s position is that cause for the appointment of a trustee under this prong of § 1104(a) has been demonstrated by the Debtor’s pre-petition transfers of assets and repeated post-petition misrepresentations and omissions of material information, all of which evidences a fraudulent scheme designed to prevent the Debtor’s creditors from reaching the valuable Puma lease proceeds. It contends these transfers are presumed to be fraudulent, citing to Article 1249 of the Puerto Rico Civil Code, see P.R. Laws Ann. tit. 31, § 3498, and that the bankruptcy court’s determination that the Debtor rebutted that presumption is clearly erroneous. It also argues that a trustee is warranted because the Debtor’s false representations and failure to make crucial disclosures in his schedules, statement of financial affairs, and at the Creditors’ Meeting not only underscores his dishonesty but itself constitutes post-petition fraud. We must determine whether the bankruptcy court abused its discretion in concluding there was insufficient evidence to establish cause for the appointment of a trustee. Section 1104(a)(1) does not define fraud nor is the term defined elsewhere in the Bankruptcy Code. There is a dearth of cases in which courts have found that fraud on the part of the debtor-in-possession justified the appointment of a trustee. See In re LHC, LLC, 497 B.R. at 305 (citing In re F.A. Potts & Co., 20 B.R. 3, 5 (Bankr.E.D.Pa.1981)). Some courts have defined fraud under § 1104(a)(1) by reference to state common law fraud. See id. (citation omitted); see also In re Paolino, 53 B.R. 399, 401-02 (Bankr.E.D.Pa.1985) (citation omitted); In re F.A. Potts & Co., 20 B.R. at 5. In the context of a determination of “actual fraud” under § 523(a)(2)(A), the First Circuit has referenced the common law definition applied to this term See Sauer Inc. v. Lawson (In re Lawson), 791 F.3d 214 (1st Cir.2015) (holding that “actual fraud” under that provision includes fraud effectuated by means other than by fraudulent misrepresentation). And more recently, the Supreme Court concluded that for purposes of determining the nondischargeability of debt under this Code section, “actual fraud” includes fraudulent transfers. See Husky Int’l Elecs., Inc. v. Ritz, - U.S. -, 136 S.Ct. 1581, 194 L.Ed.2d 655 (2016) (resolving a case law split and determining that “actual fraud” for purposes of § 523(a)(2)(A) applies to fraudulent conveyance schemes despite the absence of a false representation). As a practical matter, most courts consider the totality of the circumstances to ascertain whether there is sufficient evidence to find that the debt- or intended to defraud creditors, and whether the debtor’s actions as a whole rise to the level of fraud, dishonesty, or gross mismanagement justifying a trustee’s appointment. In the first instance the bankruptcy court adopted USIC’s contention that under P.R. Laws Ann. tit. 31, § 3498, there was a presumption that the Debtor’s pre-petition transfers of his assets were undertaken to defraud his creditors. But, the court expressly found that the Debtor had rebutted the presumption, finding credible the testimony of the Debtor in explaining the reasons for the transfers. The court also accepted CPA Barroso’s testimony rebutting the allegations asserted by USIC and her expert opinion that the transfers of assets had “no material effect” upon the bankruptcy estate, all funds having been received by the estate and paid to the Debtor’s secured creditors. In re López Muñoz, 544 B.R. at 276. While the bankruptcy court offered no explanation for its reference to the Puerto Rican contract rescission provision to define “fraud” under § 1104(a)(1), USIC does not challenge its application by the court. Indeed, it is USIC that argued in its post-trial brief that this Puerto Rican statute was controlling and rendered the pre-petition transfers of the Debtor’s assets presumptively fraudulent. And the bankruptcy court adopted USIC’s argument. Thus there is no reason to reverse the court on this basis. Still, we are compelled to observe that, to the extent the bankruptcy court relied exclusively on this Puerto Rican statute for its analysis, such reliance would be misplaced. Such a constrained definition of fraud is at odds with the broader scope of § 1104(a)(1), as USIC correctly argued in its motion for the appointment of a trustee and now argues on appeal. Nonetheless, we conclude the court’s application of this statute to find the transfers presumptively fraudulent, thereby shifting to the Debtor the burden to rebut the presumption and prove that no fraud had in fact occurred, did not prejudice USI'C. To the contrary, the use of such presumption was favorable to USIC in the presentation of its case (at least initially). Where USIC finds fault is in the bankruptcy court’s determination that the Debtor rebutted the presumption. Focusing in this appeal on the broader meaning of “fraud” encompassed by § 1104(a)(1), USIC contends that the facts in this case reveal indicia of fraud that establish the Debtor’s fraudulent intent, citing Marrama v. Citizens Bank of Mass. (In re Marrama), 445 F.3d 518, 522 (1st Cir.2006), and Cox v. Villani (In re Villani), 478 B.R. 51, 60 (1st Cir. BAP 2012) (applying the standard set forth in Marra-ma). We find those arguments unavailing. In Marrama, a case involving a proceeding under § 727 to deny the debtor a discharge, the First Circuit observed that a debtor rarely leaves direct evidence of fraudulent intent and, therefore, intent to defraud a creditor can be proved by circumstantial evidence. In re Marrama, 445 F.3d at 522. The First Circuit turned to the Supreme Court’s guidance that courts should consider the following “objective indicia” when weighing evidence of fraudulent intent: (1) insider relationships between the parties; (2) the retention of possession, benefit or use of the property in question; (3) the lack or inadequacy of consideration for the transfer; (4) the financial condition of the [debtor] both before and after the transaction at issue; (5) the existence or cumulative effect of the pattern or series of transactions or course of conduct after the incurring of the debt, onset of financial difficulties, or pendency or threat of suits by creditors; (6) the general chronology of the events and transactions under inquiry; and (7) an attempt by the debtor to keep the transfer a secret. Id. (quoting Groman v. Watman (In re Watman), 301 F.3d 3, 8 (1st Cir.2002)). In the present case, USIC maintains that most of the objective indicia of fraudulent intent set forth in Marrama are present. It highlights the following events in support of its position: (1) the Debtor transferred assets he wholly owned to Hi Speed and to the Familia Trust, of which he was the sole beneficiary, and, thus his (alleged) “scheme” was based on insider relationships between the parties; (2) as the sole beneficiary of the trust, the Debt- or had exclusive right to use and control the two gas stations and the lease proceeds; (3) the Debtor received no consideration when he “donated” the Hi Speed shares to the trust; (4) the Debtor admitted he donated his Hi Speed shares to the trust while in financial distress and facing pressure from an aggressive creditor seeking to reach the assets in issue; (5) all of these transactions took place fewer than six months before the Debtor’s bankruptcy filing; and (6) the Debtor attempted (allegedly) to keep the valuable Puma leases a secret from his creditors. Although the bankruptcy court did not specifically discuss the badges of fraudulent intent set forth in Marrama, we are satisfied from our review of the record, including the trial transcript, that the bankruptcy court fully considered all the evidence adduced at the two-day hearing and the totality of the circumstances in reaching its factual findings and its legal conclusions. Its decision contains more than fourteen pages of factual findings, each supported by a reference to the hearing transcript, the record, or both. We find no abuse of discretion in the bankruptcy court’s determination that USIC failed to refute the Debtor’s evidence that he did not intend to defraud his creditors and the estate suffered no loss as a result of the pre-petition transfers. Similarly, we find no reversible error in the bankruptcy court’s acceptance of the Debtor’s explanations as credible and reasonable, finding that the Debtor did not conceal information and any incorrect information provided by the Debtor was unintentional and not done with the intent to deceive or mislead his creditors. To make such findings, the bankruptcy court took into account the largely unre-butted testimony of CPA Barroso and her expert opinions based on her review of the Debtor’s schedules and statement of financial affairs, disclosure statements, financial statements of both the Debtor and Hi Speed, which included the Puma leases, and her analysis of the recent cash flows from the operations of the two gas stations. She testified that the Debtor did not falsify or conceal material financial information and disclosed the pre-petition transactions on the statement of financial affairs, properly omitting them from the bankruptcy asset schedules because he did not own them on the petition filing date. She noted that the Debtor’s amended Schedule A (real property) did not list the Puma lease for the Debtor’s Station because that schedule relates only to owned real estate, not the value of leases, and amended Schedule G (executory contracts and leases) included the Puma lease. Based on her review, she unequivocally testified that the Debtor had not diverted any assets to the detriment to the estate and all rental income from the Puma leases was traceable and used to maintain the Debtor’s business operations. She also confirmed, as the Debtor testified, that prior to the bankruptcy filing he had been unable to maintain his operations and pay his creditors. Additionally, the court found credible the Debtor’s explanations that his pre-petition actions were taken to protect the rents from the Puma leases and the gas stations for the benefit of all creditors in the face of aggressive collection actions by one creditor for a debt relating to the failed operations of Western Petroleum. It accepted as uncontroverted and corroborated by CPA Barroso, the Debtor’s testimony that after the transfer of the Debt- or’s Station to Hi Speed, Hi Speed’s monthly payments to him for rent and salary were used to pay his creditors and living expenses. Although it presses its arguments vigorously, USIC simply presented no evidence to support its claims that those payments were excessive or unnecessary. Unfortunately for USIC, vehemence is no substitute for evidence. The court declined to make the inferences USIC argued should be made because of what it maintained was deliberate concealment of material information and misleading information by the Debtor from the outset of the case. The testimony of the Debtor and CPA Barroso adequately support the bankruptcy court’s contrary findings and conclusions that USIC failed to prove its contentions. Again the court found reasonable the Debtor’s explanation for the incorrect listing of the dates of the transfers in the statement of financial affairs as an unintentional mistake which he corrected in the disclosure statement. It also accepted as credible the Debtor’s testimony that in completing his schedules and statement of financial affairs and discussing the value of Hi Speed at the Creditors’ Meeting he had relied on an amended 2010 financial statement showing a negative value for Hi Speed. And the Debtor emphasized that immediately after he rescinded the transfers, he amended his schedules and the disclosure statement to include the Debtor’s Station, the Puma lease, the Hi Speed shares, the rental income from the Debtor’s Station, and the operating expenses associated with the administration of the Puma and Hi Speed leases, and attached copies of the rescission deed and the Puma leases as exhibits to the latter. USIC did not submit evidence that would cause us to conclude that the court’s credibility assessments and factual findings were clearly erroneous. Finally, USIC takes issue with the bankruptcy court’s reliance on CPA Barroso’s expert opinion that the transfers had no material effect upon the bankruptcy estate as the basis for denying the appointment of a trustee. According to USIC, the loss of value to the estate is not a prerequisite to finding cause for the appointment of a trustee where there is fraud and dishonesty by a debtor-in-possession. While an argument could be made that an action to recover a fraudulent transfer may be defeated where there is proof that the bankruptcy estate was not actually diminished by the transfer, this is not determinative for the § 1104(a)(1) analysis (or for that matter the considerations under § 1104(a)(2)). See, e.g,, Grayson Consulting, Inc. v. Wachovia Securities, LLC (In re Derivium Capital, LLC), 716 F.3d 355 (4th Cir.2013). Here the bankruptcy court’s discussion of the lack of a monetary loss to the estate as a result of such transfers was by no means the sole factor it considered. Nor can its finding of lack of intent by the Debtor to conceal such transfers or to defraud or deceive his creditors be overlooked. There is no clear error in the court’s adoption of CPA Barroso’s expert opinion that there was no monetary loss to the estate and no assets transferred outside the reach of creditors because the rents were used to pay the mortgages against the two gas stations. USIC submitted no testimony or rebuttal evidence to persuade the court to reject her testimony or her conclusions as an experienced certified public and forensic accountant. After carefully reviewing the evidence, or lack thereof, we find no clear error by the bankruptcy court and no abuse of discretion in its determination that cause to appoint a chapter 11 trustee under § 1104(a)(1) was lacking. B. Interest of Creditors and the Estate Under § 1104(a)(2). Our review must now shift to the second prong of § 1104(a) for divesting a debtor-in-possession of control of the case. A bankruptcy court may appoint a trustee if it finds such appointment to be in the interests of the creditors and other interests of the estate. See 11 U.S.C. § 1104(a)(2); see also In re Sundale, Ltd., 400 B.R. at 901 (“Unlike § 1104(a)(1), § 1104(a)(2) does not require a finding of fault; the court may appoint a trustee even if no ‘cause’ exists.”) (citation omitted) (internal quotation omitted). A court’s review under § 1104(a)(2) is materially different from that under the first subsection of 1104(a). Petit, 182 B.R. at 69. Its standards for the appointment of a trustee are more flexible than those under subsection (a)(1). In re LHC, LLC, 497 B.R. at 293; Tradex, 339 B.R. at 829. This application “entails the exercise of a spectrum of discretionary powers and equitable considerations.” Petit, 182 B.R. at 69 (citation omitted) (internal quotation omitted). “[Cjourts must determine on a case-by-case- basis whether the circumstances of each bankruptcy requires the appointment of a trustee under subsection (a)(2).” Id. (citation omitted). The considerations require a balancing of competing interests. “Determining whether appointment of a trustee is in the interests of the various constituencies of the estate is fact-specific and requires the court to balance the benefits of such an appointment against its anticipated costs.” In re LHC, LLC, 497 B.R. at 293 (citation omitted). Some factors to be considered are: (1) the trustworthiness of the debtor, (2) the past and present performance of the debtor and the prospects for rehabilitation, (3) the confidence level of creditors and the business community in the debtor, and (4) whether the benefits of appointing a trustee outweigh the associated costs. Id. (citation omitted); Taub v. Taub (In re Taub), 427 B.R. 208, 227 (Bankr.E.D.N.Y.2010). In many instances the bankruptcy court’s considerations relating to cause under § 1104(a)(1) and the best interests of the creditors under § 1104(a)(2) are “intertwined and dependent upon the same facts.” In re Grasso, 490 B.R. 500, 506 (Bankr.E.D.Pa. 2013). Circumstances in which courts have appointed trustees under § 1104(a)(2), as well as under (a)(1), in the absence of fraud or dishonesty are when the debtor-in-possession suffers from conflicts of interest which impact its ability to fulfill its fiduciary duties. See In re Taub, 427 B.R. at 227 (citing In re Ridgemour Meyer Props., LLC, 413 B.R. 101, 113 (Bankr.S.D.N.Y.2008)). USIC argues that a conflict of interest exists in this case justifying the appointment of a trustee in the best interest of creditors. To support its argument it asserts that the Debtor, as the sole owner of Hi Speed, has failed to fulfill its fiduciary duties by not pursuing Hi Speed after the rescission of the transfers for the turnover of $119,500, plus interest, which it was obligated to remit to the estate under P.R. Laws Ann. tit. 31, § 3496. It calculates this sum based on Hi Speed’s receipt of monthly rent of $17,500 from Puma during the pre-rescission period, less the monthly mortgage payments of $10,000 to BPPR, leaving a monthly surplus of $7,500. USIC .acknowledges Hi Speed would be entitled to a $5,000 credit for the purchase price paid for the Debtor’s Station, thereby resulting in a net amount due the estate of $119,500. This challenge fails because there is no clear error in the bankruptcy court’s finding that there was no such potential cause of action against Hi Speed. It concluded that “CPA Barroso’s testimony that the asset transfers had no material effect upon the estate remains in the court’s view uncontested,” and “USIC did not meet its burden of proof that such cause of action exists.” CPA Barroso testified unambiguously that in fact there was no “monthly surplus of $7,500” because Hi Speed expended all of the monthly rental income from Puma to meet its monthly business expenses consisting of the BPPR mortgage, the cost incurred for the administration of the Puma lease, and the payments to the Debtor for the rental of the office space and his salary. USIC did not offer any evidence to contradict this testimony. And although it vigorously argued that these expenses, other than the mortgage expense, were inflated, fabricated, or completely unnecessary, it failed to submit any evidence to support its assertions. Lastly, the bankruptcy court did not abuse its discretion in concluding that USIC’s other arguments were insufficient to meet its burden of proof for the appointment of a trustee. Once again, USIC failed to offer sufficient evidence to establish that the costs of a trustee outweighed the benefits to be gained by the estate. And despite its arguments to the court in its opening statement at the evidentiary hearing, USIC never delivered the evidence to demonstrate that the value of the assets if sold by a trustee would generate funds sufficient to pay the secured creditors in full and leave a balance for other creditors. Nor did it offer evidence that the Debtor’s rehabilitation prospects were in jeopardy, or that the business community and the other creditors lacked confidence in the Debtor and his ability to reorganize his financial affairs to fairly address their claims. See In re LHC, LLC, 497 B.R. at 293. Thus, the bankruptcy court did not abuse its discretion in determining that USIC did not meet its burden of demonstrating that the appointment of a trustee was in the best interests of creditors and the estate. CONCLUSION In view of the evidence submitted at the two-day hearing and the detailed findings of fact and conclusions of law adequately supported by the record, USIC has not persuaded- us that the bankruptcy court committed reversible error or abused its discretion in determining that the appointment of a trustee was not warranted under § 1104(a)(1) or § 1104(a)(2). Consequently, we AFFIRM. . Unless expressly stated otherwise, all references to "Bankruptcy Code” or to specific statutory sections shall be to the Bankruptcy Reform Act of 1978, as amended, 11 U.S.C. §§ 101, etseq. . Due to prolonged discovery disputes between the parties and multiple continuances, the evidentiary hearing did not take place until almost a year after USIC filed its request for a chapter 11 trustee. . USIC intended to present CPA Villarini as an expert witness in its case in chief, but at a prior hearing the bankruptcy court ordered that USIC was precluded from presenting this expert witness in its case in chief because of such omission. Thus, at the evidentiary hearing, CPA Villarini could only testify as a rebuttal witness. . USIC first referenced this Puerto Rican statute in its post-trial memorandum and relied on it exclusively for the proposition that the pre-petition assets transfers were presumptively fraudulent. . This section, entitled "Contracts presumed in fraud of creditors,” provides: Contracts by virtue of which the debtor alienates property, for [inadequate] consideration, are presumed to be executed in fraud of creditors. Alienations for valuable considerations, made by persons against whom a condemnatory judgment, in any [court], has been previously rendered, or a writ [for] seizure of property has been issued, shall also be presumed fraudulent. P.R. Laws Ann. tit. 31, § 3498. This section appears under the part of the Puerto Rico Civil Code that addresses Rescission of Contracts, and establishes that contracts executed in fraud of creditors may be rescinded. The first part of § 3498 addresses transfers for little or no consideration; those based on "duty, moral obligation, affection [or] generosity.” Santiago v. Sepulveda Figueras (In re Sepulveda Figueras), 193 B.R. 118, 120 n. 1 (Bankr.D.P.R.1996) (citation omitted) (internal quotations omitted). The second part of § 3498 addresses transfers for consideration. The second part provides that transfers for "valuable consideration” are presumed in fraud of creditors if: (1) a condemnatory judgment has been rendered against the transferor or a writ of attachment has been issued against his property; (2) the transferor sells his property to another who is cognizant of the judgment or of the attachment; and (3) a creditor is prejudiced by the conveyance and has no other legal remedy to obtain reparation for the injury. The two presumptions established by this section "do not exhaust the possible cases of fraud.” Fed. Deposit Ins. Corp. v. Martinez Almodovar, 671 F.Supp. 851, 879 (D.P.R. 1987). "The trier of the fact exercising judgment free of the legal presumptions should weigh the most obvious signs of fraud, such as the haste with which the alienation is effected, the insolvency of the debtor, the relations of family, intimacy or confidence with the acquirer, the state of the business affairs of the transferor and judicial claims pending against him.” Id. (citing De Jesús v. Carrero, 112 D.P.R. 631, 636-37 (1982)); see also Union de Periodistas, Artes Graficas y Ramas Anexas v. Irving Paper Ltd. (In re El Mundo Corp.), 208 B.R. 781, 783 (D.P.R.1997). . Nor are we suggesting it needed to specifically address each of these badges of fraud. USIC offers no case law establishing that a bankruptcy court must specifically address each of the indicia of fraud set forth in Marra-ma when determining whether there is sufficient evidence to support a finding of cause under § 1104(a)(1). . Although USIC did not assert in its motion for the appointment of a trustee that the Debt- or’s estate has a colorable claim against Hi Speed for monies it collected sifter the pre-petition transfers of the Debtor’s Station, it asserted the argument at the evidentiary hearing and in its post-trial memorandum of law.
CASELAW