Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Neurofeedback Glossary
Learn about the unique terms used in Neurofeedback
Alpha Waves
Alpha waves cycle between 8 and 12 times per second. These waves are the most predominant waves during the wakeful state. Alpha waves are associated with a relaxed, alert and unfocused state. When an individual’s alpha is within normal ranges, there is a sense of calmness and the individual tends to experience good moods. People who have an imbalance of Alpha may tend to be depressed. Some who have increased alpha in the frontal lobes tend to be disorganized and mercurial. Individuals who use Marijuana show high left frontal alpha which may explain some of the effects of cannabinoids.
Alpha can also be heightened in response to pain. Individuals who have Post Traumatic Stress Disorder experience Alpha Attenuation, this occurs when the brain tries to downshift into a more relaxed state but instead it speeds up.
Beta Waves
Beta waves oscillate between 12 and 30 times per second. They are “fast” activity and normally associated with higher cognitive processes, rational thinking, analytical problem solving, and focused concentration. They are usually seen on both sides of the brain in symmetrical distribution and are most predominant in the frontal cortex. Beta waves may be absent or reduced in areas of cortical damage. There are three different types of beta waves:
Low Beta waves (12-15 Hz) – Low Beta waves are also known as sensorimotor rhythms (SMR). They are associated with a relaxed and focused state. Decreased low beta can reflect lack of focused attention.
Mid-range Beta waves (15-24 Hz) – Mid-range Beta waves are associated with mental activity and alertness, thinking, and awareness of self and surroundings. Decreased levels are associated with attention deficits, stress disorders, chronic pain, depression, mood disorders, psychotic states, substance abuse, panic, anxiety, and fear.
High Beta waves ( 25-30 Hz) – High beta waves are associated with overall activation of mind and body function. They can induce alertness but may also produce agitation. They are often elevated in stress related disorders, some mood disorders, panic, anxiety, fear and chronic pain.
Delta Waves
Delta waves oscillate between 0.5 and 4 times per second. Delta waves are often referred to as “slow waves.” These waves are associated with a brain cell at rest.
When brain cells are resting, they are restoring their supply of neurotransmitters, repairing and strengthening pathways of memory and learning. Delta waves are the predominant waves in deep sleep.
Abnormal delta waves are seen in brain injury, coma and seizures as well as many other conditions. Too much delta can indicate a brain that is ‘asleep’.
High Beta waves ( 25-30 Hz) – High beta waves are associated with overall activation of mind and body function. They can induce alertness but may also produce agitation. They are often elevated in stress related disorders, some mood disorders, panic, anxiety, fear and chronic pain.
Theta Waves
Theta waves are between delta and alpha. These waves have a frequency of 4-8 cycles per second. Theta waves are associated with deep creativity, the AH-HA! moment, and complex, sustained inspiration. Theta is believed to reflect activity from the limbic system and hippocampal regions.
Theta is observed in anxiety, behavioral activation and behavioral inhibition. When the theta rhythm appears to function normally it mediates and/or promotes adaptive, complex behaviors such as learning and memory.
Excessive theta can also be the hallmark of attention and processing difficulties. Theta waves are also associated with pain response. Individuals who have too much theta in the front of their brains might have problems with staying focused and completing tasks.
Neurofeedback
Neurofeedback refers to the technique of using operant conditioning to modify the brain waves. By rewarding specific brain waves, the brain can be taught directly via a computer to regulate itself.
Neurofeedback is also called EEG-Biofeedback as it deals with giving the subject feedback based on the Electroencephalogram.
Neurofeedback has been in use since the 1960s. It has been applied to conditions as varied as seizure, stroke and autism. It is the only non-invasive passive technique for modifying the central nervous system.
Training Protocol
Once a Qeeg is obtained a clinician is able to create a highly individualized training protocol based off of the brain’s current activity.
The protocol acts as a set of directions for the computer to produce individualized neurofeedback training.
QEEG
Quantitative Electroencephalogram is a test that measures the amount of electrical energy an individual’s brain is producing.
The energy is measured in microvolts at the scalp surface and amplified to a computer to allow their brainwaves to be interpreted.
The individual’s brain is then compared to a normative database of brains of individuals that are the same age and sex. This method allows the clinician to see which areas of the brain are weak and which areas are strong.
Qeeg is also interchangeable with the terms Brainmap and BEAM (Brain Electrical Analysis and Mapping).
LoRETA
This is an acronym that stands for Low-Resolution Electrical Tomography. This technique uses vector weighted current density analysis to localize an area of the brain down to 2 millimeters.
LoRETA can determine areas of connectivity in the brain and allow us to determine how a brain is operating on the functional level.
Absolute Power
This reflects the amount of energy put out by the brain at each recording site within each frequency range.
Coherence
The different parts of the brain must share information in order for us to understand the complexity of the world and to make and execute decisions. Coherence is a measure of how well the brain is able to perform this inner self-talk. Excessive coherence tends to indicate two or more areas of the brain have become overly dependent on those areas and is not efficiently processing and executing information.
This tends to result in poor day-to-day performance. Deficient coherence indicates a brain unable to efficiently connect cortical areas to perform specific tasks.
Learning Disabilities may show either (or both) excessive or deficient coherence characteristics.
Neuroplasticity
The brain’s ability to alter and form neural connections over time. | ESSENTIALAI-STEM |
Talk:University of Puerto Rico, Río Piedras Campus/Archive 1
Fair use rationale for Image:Fem.jpg
Image:Fem.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in Wikipedia articles constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
If there is other other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images uploaded after 4 May, 2006, and lacking such an explanation will be deleted one week after they have been uploaded, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.BetacommandBot 07:32, 4 June 2007 (UTC)
Improving UPRRP article
I have undertaken the task of improving this article. If you have any comments, questions or suggestions regarding my edits feel free to post them below.--Madgirl 15 (talk) 05:25, 5 May 2008 (UTC)
* "Organization" needs to be expanded.
* "School and Colleges" section needs to be removed and made into an appropriate paragraph.
* "Academic Senate" needs to be included in "Organization" section.
* "Greek life" needs to be included in another section such as "Student life" and re-written.
* New sections need to be created that include but are not limited to:
* 1) Admissions
* 2) Libraries and Museum
* 3) Student Life or Student Profile (including housing, student groups/organizations, student activism)
* 4) Athletics--Madgirl 15 (talk) 07:05, 5 May 2008 (UTC)
Title of article
This article's title should be University of Puerto Rico, Río Piedras campus to reflect correct spelling of Río Piedras and Wikipedia conventions regarding capital letters.--Lawrlafo (talk) 06:30, 24 June 2009 (UTC)
Article is very outdated
This article is very, very outdated. It has not been updated to reflect recent ocurrences in the college, such as the last shutdown in early March. It also makes no mention of previous strikes, and, were it not for me, it would not mention the upcoming shutdown and indefinite strike. Also, the chancellor and dean of the college are no longer serving, and have since been replaced. Not only does this article make no mention of this, it hasn't even been updated to, at the very least, include the names of these current staff members. <IP_ADDRESS> (talk) 02:53, 22 March 2017 (UTC)
Proposed merge of UPRRP College of Business Administration into University of Puerto Rico, Río Piedras Campus
Independent notability not established in article. TJMSmith (talk) 19:25, 4 May 2020 (UTC)
I redirected the article. It can restored at anytime if sources show the subject meets notability requirements. TJMSmith (talk) 08:04, 6 March 2021 (UTC)
* Support merge, unless WP:N can be satisfied. Mercy11 (talk) 02:03, 6 May 2020 (UTC) | WIKI |
Skip to main content
Pentaho Documentation
ORC Output
Parent article
The ORC Output step serializes data from the PDI data stream into an ORC file format, and then writes it to a file. ORC is a data format for fast columnar storage. This step creates a file containing output data in the ORC format.
Fields written to the ORC output file are defined by the input fields. Fields not written to the output file are either deleted, or are written to the output file with alternate field names or default values.
AEL considerations
When using the ORC Output step with the Adaptive Execution Layer, the following factor affects performance and results:
• Spark processes null values differently than the Pentaho engine. You will need to adjust your transformation to successfully process null values according to Spark's processing rules.
General
Enter the following information in the transformation step fields:
OptionDescription
Step nameSpecifies the unique name of the ORC Output step on the canvas. You can customize the name or leave it as the default.
LocationIndicates the file system or specific cluster on which the item you want to output can be found. For the supported file system types, see Using the virtual file system browser in PDI.
Folder/File nameSpecifies the location and/or name of the file or folder to write. Click Browse to display the Open File window and navigate to the file or folder.
• When running on the Pentaho engine, the ORC files (file:///C:/orc-output-file for example) are created.
• When running on the Spark engine, a folder is created that may contain multiple ORC files.
Overwrite existing output fileSelect to overwrite an existing file that has the same file name and extension.
Options
The ORC Output step features two tabs with fields. Each tab is described below.
Fields tab
ORC Output step Fields tab
In the Fields tab, you can define fields that make up the ORC type description created by this step. The table below describes each of the options for configuring the ORC type description.
FieldDescription
ORC pathSpecify the name of the field as it will appear in the ORC data file or files.
NameSpecify the name of the PDI field.
ORC typeDefines the data type of the field.
PrecisionSpecify the total number of digits in the number (only applies to the Decimal ORC type). The default value is 20.
ScaleSpecify the number of digits after the decimal point (only applies to the Decimal ORC type). The default value is 10.
Default valueSpecify the default value of the field if it is null or empty.
NullSpecifies if the field can contain null values.
To avoid a transformation failure, make sure the Default value field contains values for all fields where Null is set to No.
You can define the fields manually, or you can provide a path to the PDI data stream and click Get Fields to populate all the fields. During the retrieval of the fields, a PDI type is converted into an appropriate ORC type, as shown in the table below. You can also change the selected ORC type by using the Type drop-down or by entering the type manually.
PDI TypeORC Type (non AEL)
InetAddressString
StringString
TimeStampTimeStamp
BinaryBinary
BigNumberDecimal
BooleanBoolean
DateDate
IntegerInteger
NumberDouble
Options tab
ORC Output step Options tab
The following options in the Options tab define how the ORC output file will be created.
FieldDescription
Compression
Specifies which codec is used to compress the ORC output file:
• None
No compression is used (default).
• Zlib
Writes the data blocks using the deflate algorithm, as specified in RFC 1951, and typically implemented using the zlib library.
• LZO
Writes the data blocks using LZO encoding, which works well for CHAR and VARCHAR columns that store very long character strings.
• Snappy
Using Google's Snappy compression library, writes the data blocks that are followed by the 4-byte, big-endian CRC32 checksum of the uncompressed data in each block.
Stripe size (MB)Defines the stripe size in megabytes. An ORC file has one or more stripes. Each stripe is composed of rows of data, an index of the data, and a footer containing metadata about the stripe’s contents. Large stripe sizes enable efficient reads from HDFS. The default is 64.See https://cwiki.apache.org/confluence/display/Hive/LanguageManual+ORC for additional information.
Compress size (KB)Defines the number of kilobytes in each compression chunk. The default is 256.
Inline IndexesIf checked, rows are indexed when written for faster filtering and random access on read.
Rows between entriesDefines the stride size or number of rows between index entries (must be greater than or equal to 1000). The stride size is the block of data that can be skipped by the ORC reader during a read operation based on the indexes. The default is 10000.
Include date in file nameAdds the system date to the filename with format (20181231 for example).
Include time in file nameAdds the system time to the filename with format HHmmss (235959 for example).
Specify date time formatSelect to specify the date time format using the dropdown list.
Important Due to licensing constraints, ORC does not ship with LZO compression libraries; these must be manually installed on each node if you want to use LZO compression.
AEL support
Depending on your setup, you can execute the ORC Output step within the Adaptive Execution Layer (AEL) using Spark as the processing engine. In AEL, the ORC Output step will automatically convert an incoming Spark SQL row to a row in the ORC output file, where the Spark types determine the ORC types that get written to the ORC file.
ORC Type DesiredSpark Type Used
BooleanBoolean
TinyIntUnsupported*
SmallIntShort
IntegerInteger
BigIntLong
BinaryBinary
FloatFloat
DoubleDouble
DecimalBigNumber
CharUnsupported*
VarCharUnsupported*
TimeStampTimeStamp
DateDate
Important* Some ORC types are not supported as there are no equivalent data types for conversion in Spark.
Metadata injection support
All fields of this step support metadata injection. You can use this step with ETL metadata injection to pass metadata to your transformation at runtime. | ESSENTIALAI-STEM |
Talk:Margaret Penny
Year of death
The article and the infobox have two different dates for her death, 1861 and 1891. I was unable to determine the correct one. Oronsay (talk) 21:58, 5 February 2020 (UTC) | WIKI |
Wikipedia:Articles for deletion/Aya (kitchens) (2nd nomination)
The result was delete. MBisanz talk 04:33, 28 December 2012 (UTC)
Aya (kitchens)
AfDs for this article:
* – ( View AfD View log Stats )
Too promotional to fix, and not notable enough to be worth fixing. Those of the refsI can find are either mere mentions of the firm, or disguised press releases. The awards are local and minor. I take note of the articles's rather frank use of the phrases "one of the companies mentioned", "one of the first" & "one of the fastest growing," The company has been added to every possible see also list in the general area of sustainable design, a sure sign of promotionalism -- I noticed this article while trying to clean up some of these lists. DGG ( talk ) 05:36, 20 December 2012 (UTC)
* Delete per nom. Yellow Pages thata-way→! And if DGG says delete its gotta be bad! . We neeed a decent notability guideline for companies. -- Alan Liefting (talk - contribs) 05:58, 20 December 2012 (UTC)
* Delete - I agree with the nomination, and the best reference I can find is a hate-site, which isn't really much for keeping an article. The article is incorrectly named, at the very least it should be AyA (kitchens), but AyA Kitchens and Baths would fit better. Lukeno94 (talk) 10:26, 20 December 2012 (UTC)
* Note: This debate has been included in the list of Business-related deletion discussions. ★☆ DUCK IS PEANUTBUTTER ☆★ 20:54, 20 December 2012 (UTC)
* Note: This debate has been included in the list of Ontario-related deletion discussions. ★☆ DUCK IS PEANUTBUTTER ☆★ 20:54, 20 December 2012 (UTC)
* Comment - just looked at the previous AfD: AyA Kitchens and Baths was speedily deleted around this time in 2008 for exactly the same sort of reasons it's at AfD here. Lukeno94 (talk) 21:38, 21 December 2012 (UTC)
| WIKI |
Section G.2. TCP Segment Header
This description is taken from pages 15 to 17 of RFC 793, Transmission Control Protocol.
TCP Header Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Acknowledgment Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data | |U|A|P|R|S|F| |
| Offset| Reserved |R|C|S|S|Y|I| Window |
| | |G|K|H|T|N|N| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum | Urgent Pointer |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| data |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Source Port: 16 bits
The source port number.
Destination Port: 16 bits
The destination port number.
Sequence Number: 32 bits
The sequence number of the first data octet (byte) in this segment
(except when SYN is present). If SYN is present the sequence
number is the initial sequence number (ISN) and the first data
octet is ISN+1.
Acknowledgment Number: 32 bits
If the ACK control bit is set, this field contains the value of
the next sequence number the sender of the segment is expecting to
receive. Once a connection is established this is always sent.
Data Offset: 4 bits
The number of 32 bit words in the TCP Header. This indicates
where the data begins. The TCP header (even one including options)
is an integral number of 32 bits long.
Reserved: 6 bits
Reserved for future use. Must be zero.
Control Bits: 6 single-bit values (from left to right):
URG: Urgent Pointer field significant
ACK: Acknowledgment field significant
PSH: Push Function
RST: Reset the connection
SYN: Synchronize sequence numbers
FIN: No more data from sender
Window: 16 bits
The number of data octets (bytes) the sender of this segment is
willing to accept.
Checksum: 16 bits
The checksum field is the 16 bit one's complement of the one's
complement sum of all 16 bit words in the header and text.
Urgent Pointer: 16 bits
This field contains the current value of the urgent pointer as a
positive offset from the sequence number in this segment. The
urgent pointer points to the sequence number of the octet
following the urgent data. This field is only be interpreted
in segments with the URG control bit set.
Options: variable
Options may occupy space at the end of the TCP header and are a multiple of 8 bits in length. | ESSENTIALAI-STEM |
Dotnet logo
.NET Tools
Essential productivity kit for .NET and game developers
.NET Tools ReSharper Platform
ReSharper IL Viewer and Low-Level C#
The C# programming language is jam-packed with so much syntactic sugar it would make your dentist mad. Its high-level features allow you to write terse expressions that typically require several lines of code in lower-level languages such as C. How do C# language designers keep packing in new language features while allowing you to target older runtimes and keeping your applications performant? Well, it’s all about Lowering.
This post will discuss “lowering” and how ReSharper can help you uncover the magic behind the curtain.
What Is Lowering?
When you write C# code, your ultimate goal is to compile the code to a runnable artifact, but it’s rarely a simple one-step process. Most modern C# codebases include high-level keywords such as foreach, var, using, async, and await. You can look at these keywords as shorthand for other basic language building blocks. For example, you could easily interpret a foreach block into a lower version of a for block.
Lowering transforms high-level language features into “simpler” techniques within the same language. While you could do this manually, many of these translations automatically happen during the build process. This process occurs before the compiler begins translating C# into the Intermediate Language (IL) used by the .NET Runtime.
Now that you have a general idea of “lowering”, let’s use ReSharper to see some of these high-level features in their lower forms.
Lowering Examples
Let’s start with the humble foreach loop, likely used by millions of developers across the .NET Landscape.
var numbers =
Enumerable.Range(1, 100);
foreach (var number in numbers)
{
Console.WriteLine(number);
}
Looking at ReSharper’s IL Viewer, we can choose between three viewing states: IL, Low-Level C#, and High-Level C#. As you can see in the following screenshot, .NET lowered the foreach implementation into a combination of while and try/catch constructs.
Lowering example in Visual Studio 2022 and ReSharper's IL Viewer showing a foreach loop low-level C#
Let’s also look at a simple List initialization and what ReSharper’s IL Viewer reveals.
List<int> items = new () { 1, 2, 3, 4, 5};
Console.WriteLine(string.Join(",", items));
Lowering example in Visual Studio 2022 and ReSharper's IL Viewer showing a List low-level C#
Wow! .NET has lowered our single-line initialization of a List<int> into five separate calls to Add. While the lowered version is much simpler to read and comprehend, the version on the left is much nicer to type.
Let’s try one more, and this time, let’s go wild with it!
using var httpClient = new HttpClient();
await httpClient.GetAsync("https://jetbrains.com/resharper");
Lowering example in Visual Studio 2022 and ReSharper's IL Viewer showing an httpclient with async/await in low-level C#
Those two lines of C# code use three high-level features of C#, and each gets lowered. Those features include the var keyword, async/await, and the using statement. In a top-level statement program, .NET produces a lowered output of 108 lines! While those lines of code may be difficult to read for us as humans, the compiler has an easier time taking the lowered-form output and turning it into IL.
Summary
Lowering happens to your C# code, whether you know about it or not. So while you could ignore it, using ReSharper’s IL Viewer can help you make more sense of newer C# language features. Likewise, viewing lowered versions of existing code can help you better understand it and spot potential bugs. As you saw above in the three examples, lowering can produce a wide range of outputs, so it’s fun to experiment and see what’s happening.
I recommend reading C# Lowering from community member Steven Giesel, and Lowering in the C# Compiler by Matt Warren.
If you have any fun lowering examples you’d like to share, please leave them in the comments below. As always, thanks for reading and being part of the JetBrains Community.
Image Credit: Simon Zhu (red metal tower)
image description
Discover more | ESSENTIALAI-STEM |
-- Valero Energy Reports Profit, Seeks European Refineries as Margins Widen
Valero Energy Corp. , the largest
U.S. oil refiner, reported its second consecutive quarterly
profit and said it was looking to buy European plants after
rising prices for fuels outstripped the cost of crude. Net income for the quarter was $292 million, or 51 cents a
share, compared with a year-earlier loss of $629 million, or 61
cents, San Antonio-based Valero said in a statement. Per-share
profit, excluding an insurance settlement, matched the 46-cent
average of 16 analysts’ estimates compiled by Bloomberg. Valero said the average margin, or crack spread, between
the cost of oil and the price of refined fuels widened 55
percent to $7.87 a barrel from the same period a year ago. Sales
rose 20 percent to $22.2 billion as output rose 6.8 percent. “It’s increased throughput and improved refining margins
based on an uptick in demand,” said Gianna Bern , president of
Brookshire Advisory & Research Inc. in Chicago, who rates the
stock “market weight” and owns none. “This is a heck of an
improvement over the refining environment in 2009.” Valero rose 23 cents, or 1.3 percent, to $18 at 4 p.m. in
New York Stock Exchange composite trading. The shares have nine
buy ratings, 12 holds and two sells recommendations from
analysts and have risen 7.5 percent this year. ‘Actively Looking’ The company has $2.4 billion in cash on hand to buy
refineries and it is “actively looking” at European units,
especially in the U.K., Chief Executive Officer Bill Klesse said
on an investor conference call today. Valero may also use $700
million from recent asset sales to buy in Europe. Total SA, Royal Dutch Shell Plc, Chevron Corp. and Murphy
Oil Co. are among the companies that have refineries for sale
in the U.K., according to company statements compiled by
Bloomberg. “It’s a buyers’ market,” said John R. Auers, a senior
vice president at Turner, Mason & Co in Dallas, a refiner
consulting company. “These are all decent refineries.” Valero agreed to sell two U.S. refineries this year to PBF
Energy Co. LLC, the partnership led by Petroplus Holdings AG
Chairman Thomas O’Malley and backed by private-equity firms
Blackstone Group LP and First Reserve Corp. The company also agreed to sell its 50 percent stake in a
crude-oil pipeline system yesterday to Genesis Energy LP for
$330 million. A decline in fuel inventories in the U.S. and Europe should
support margins through the end of the year, Klesse said in the
statement. Quick Rebound Higher prices for diesel and bigger discounts on the type
of crude that the company is capable of refining helped to widen
the margin, Valero said. “Valero’s ability to refine high-sulfur grades, which
historically have sold at a significant discount to light, sweet
crude, is typically an enormous advantage,” Philip Adams , a
Chicago-based analyst for Gimme Credit LLC, wrote today in a
note to clients. “Whenever the global economy recovers, Valero
should rebound quickly.” Valero should be ready to restart a refinery in Aruba in
mid-December and the company has “very little maintenance-
related downtime planned at our refineries during the fourth
quarter,” Klesse said in the statement. The company is on schedule to reduce costs by $185 million
this year and will cut another $100 million in 2011, he said. Cost ‘Wild Card’ Consumption of low-sulfur diesel during the quarter rose
8.8 percent from a year earlier to the highest level in two
years, according to the American Petroleum Institute. Valero’s 15 refineries can process more than 2.8 million
barrels a day and it owns 10 ethanol plants that can produce
72,000 barrels a day of the corn-based fuel additive. It’s the
largest of the U.S. independent refiners, which are companies
without oil or natural-gas production, and the first to report
third-quarter results. “The refining environment certainly has improved,” Bern
said. “The wild card for the other refiners becomes cost
management in this environment of relatively weak demand. We’re
nowhere near where we were in 2008.” To contact the reporter on this story:
Jim Polson in New York at
jpolson@bloomberg.net To contact the editor responsible for this story:
Susan Warren at susanwarren@bloomberg.net . | NEWS-MULTISOURCE |
Background
Achieving satisfactory results may be difficult in augmentation mammaplasty patients in the presence of breast, chest wall, or vertebral deformities. These deformities have not been classified previously, and the impact of each deformity or combination of deformities has not been defined.
Objectives
The aims of this study are to determine the complicating factors in augmentation mammaplasty, to classify these factors according to their influence on surgical outcome, and to develop an identification system for simplifying the recognition of challenging cases.
Methods
We retrospectively analyzed photographs and records of 100 consecutive patients who underwent augmentation mammaplasty. We observed suboptimal results in 18 cases. Preoperative deformities of the breast, chest wall, and vertebra were recorded in order to determine which factor or factors had complicated the surgeries. Eventually, the relationship between suboptimal surgical results and complicating factors was evaluated.
Results
We observed that some deformities alone caused suboptimal results, whereas others did not. Deformities that caused suboptimal results alone were called major complicating factors, and any others were called minor complicating factors. We observed that suboptimal results were also obtained in patients who had four minor complicating factors. Patients who had suboptimal results because of major or minor complicating factors were considered challenging cases.
Conclusions
In this study, complicating factors for augmentation mammaplasty were defined and classified as major or minor depending on their effect on the surgical outcome. We suggest an identification system that simplifies the recognition of challenging cases in breast augmentation. | ESSENTIALAI-STEM |
Davidson J. JAMES, Petitioner-Appellant, v. Harry K. SINGLETARY, Secretary, Florida. Department of Corrections, Respondent-Appellee.
No. 87-3488.
United States Court of Appeals, Eleventh Circuit.
March 30, 1992.
Rehearing and Rehearing En Banc Denied June 2, 1992.
Michael A. Mello, Vermont School of Law, South Royalton, Vt., for petitioner-appellant.
William Munsey, Asst. Atty. Gen., Tampa, Fla., for respondent-appellee.
Before TJOFLAT, Chief Judge, EDMONDSON, Circuit Judge, and CLARK, Senior Circuit Judge.
TJOFLAT, Chief Judge:
Davidson Joel James is a Florida prison inmate. He stands convicted of first degree murder, attempted first degree murder, and armed robbery. The trial court sentenced James to death for the murder and to consecutive life sentences for the other crimes. James has filed a petition for writ of habeas corpus under 28 U.S.C. § 2254 (1988), seeking the vacation of his convictions and sentences. In his habeas petition, James mounted twelve challenges against his convictions and sentences. The district court denied James relief without an evidentiary hearing. Petitioner appeals the district court’s disposition of five of his claims, two of which attack his convictions, and three of which attack his sentences only. We find that one of the attacks petitioner levels against his convictions can only be resolved by an evidentiary hearing. Accordingly, we remand the case to the district court for such a hearing. We do not reach, but retain jurisdiction over, petitioner’s sentencing claims.
I.
A.
On October 30, 1981, between 5:00 and 5:30 p.m., Felix Satey was about to close the A-l Decal Printing and Sign Company in Tampa, Florida. Satey and his wife, Dorothy, lived in the back of the building. Before Satey had locked all of the doors, two men entered the building. One of them, Larry Clark, pointed a gun at Satey. When Satey began to move away, Clark shot him once in the head and once in the right shoulder. One of the men took Sa-tey’s wallet and eighty dollars from his pocket.
Startled by the shots, Satey’s wife called out from the back of the building. Ignoring Satey’s pleas to spare his wife, both intruders proceeded to the back of the building. There, Clark shot and killed Mrs. Satey. In the meantime, Satey had managed to crawl into hiding. After a brief and unsuccessful search for Satey, both men departed, apparently out of concern that someone might have heard the gunshots. Satey then telephoned for an ambulance and called the Tampa Police Department, giving a description of his assailants. While Mrs. Satey later died from her wounds, Satey survived and testified at trial.
In a photo line-up conducted shortly after the incident, Satey identified the gunman as Larry Clark, who had done work for him at A-l some months prior to the incident. He also identified Clark’s accomplice as one Robert Gibbs, a man he had hired several days earlier to repair the roof on the A-l building and who had started work the day of the incident. According to Satey, Gibbs had left work sometime around 5:00 p.m.
Petitioner James became a suspect on November 10. That day James went to the Tampa Police Department to pick up Clark’s car. In the lobby of the police station, R.J. Reynolds, a homicide detective assigned to the Satey case, “got a funny feeling that [James] might be [the] second man” and asked James whether he would mind posing for some photographs because “he does fit the physical description [of Clark’s accomplice]....” James acceded to Reynolds’ request. According to Detective Reynolds, James was free to leave at any time during his visit to the Tampa police station and understood that these photographs would be shown to witnesses.
After Satey and an employee, Noel Snyder, had identified one of these photographs as a picture of Clark’s partner and of the roof worker, respectively, James was arrested and charged with first degree murder, attempted first degree murder, and armed robbery. James and Clark were tried in separate trials. Clark went to trial first, was found guilty on all counts and was sentenced to death.
At James’ trial, the prosecution presented several witnesses to link James to the crime. Satey identified James as Clark’s accomplice and as the man he had hired to do roofing work at A-l the day of the incident. Snyder, Satey’s employee, identified James as the roof worker. Finally, a handwriting expert testified that James had filled out the A-l employment application completed by the man known to Satey as Robert Gibbs.
James raised two compatible defenses: mistaken identity and alibi. During his cross-examination of Satey and in closing argument to the jury, James’ counsel brought out that Satey had identified another man as Clark’s accomplice in the first photo line-up after the incident and that Satey initially had described Clark’s partner as about forty pounds heavier than James. Theresa James, petitioner’s mother, testified that he had visited her in Bra-denton, Florida, during the late afternoon on the day of the offense. His common-law wife, Frances George, corroborated Ms. James’ testimony, adding that James had gone shopping with her between 5:00 and 6:30 p.m. that day after seeing his mother. James’ neighbor, Joseph Thomas, testified that James was with him at 3:00 p.m. that day. Finally, another neighbor, Maura Smith, testified that she saw James on Ms. George’s porch when she dropped Ms. George off from work between 4:30 and 4:45 that afternoon. She also testified that James and Ms. George went shopping with her later the same evening.
The jury convicted James of first degree murder, attempted murder, and armed robbery. At the conclusion of the sentencing phase, the jury recommended the death sentence by a vote of seven to five. In response to a special interrogatory, the jury determined by a vote of eleven to one that James had killed, attempted to kill, or intended to kill during the course of the offense. See Enmund, v. Florida, 458 U.S. 782, 102 S.Ct. 3368, 73 L.Ed.2d 1140 (1982). Finding no mitigating circumstances and five aggravating circumstances, the trial judge imposed the death penalty.
B.
On direct appeal, the Florida Supreme Court affirmed James’ -convictions and sentences. James v. State, 453 So.2d 786 (Fla.), cert. denied, 469 U.S. 1098, 105 S.Ct. 608, 83 L.Ed.2d 717 (1984). After the Florida governor signed a death warrant, James unsuccessfully sought state post-conviction relief. The Florida Supreme Court denied James’ petition for a writ of habeas corpus and application for stay of execution in James v. Wainwright, 484 So.2d 1235 (Fla.), cert. denied, 477 U.S. 909, 106 S.Ct. 3285, 91 L.Ed.2d 574 (1986). Two days later, James filed a petition for writ of certiorari and an application for stay of execution in the United States Supreme Court. While that petition was pending, he filed a motion in the state trial court under Fla.R.Crim.P. 3.850 to vacate his convictions and sentences. The state trial court denied relief and the Florida Supreme Court affirmed.
At this point, James entered the federal system by filing the instant petition for writ of habeas corpus in the United States District Court for the Middle District of Florida. On the same day, both the district court and the United States Supreme Court granted stays of execution. On June 12, 1986, the Florida Supreme Court issued an order explaining its decision in petitioner’s Rule 3.850 proceedings. James v. State, 489 So.2d 737 (Fla.1986). The Supreme Court dissolved its stay of execution when it denied certiorari on June 23, 1986. James v. Wainwnght, 477 U.S. 909, 106 S.Ct. 3285, 91 L.Ed.2d 574 (1986).
James’ federal habeas petition presented twelve claims for relief. On appeal, petitioner raises five claims. Two claims challenge petitioner’s convictions: (1) petitioner was incompetent to stand trial and (2) the prosecution withheld evidence in violation of Brady v. Maryland, 373 U.S. 83, 83 S.Ct. 1194, 10 L.Ed.2d 215 (1963). The remaining three claims attack petitioner’s sentences: (1) a prior conviction considered as an aggravating circumstance at sentencing was invalid, (2) petitioner’s counsel rendered ineffective assistance at sentencing, and (3) a psychologist appointed to examine petitioner provided ineffective assistance in the preparation for the sentencing phase.
After the State filed its response to James’ federal habeas petition, the district court denied petitioner relief without an evidentiary hearing on the ground that the records of the criminal and collateral proceedings in the state courts conclusively established that petitioner’s claims lacked merit. Although we agree with the district court that petitioner’s Brady claim is without merit, we find that an evidentiary hearing is necessary to resolve petitioner’s incompetency claim. If petitioner is entitled to relief on his incompetency claim, we need not, and do not now, reach the challenges he mounts against his sentences.
Part II of our opinion disposes of petitioner’s Brady claim. Part III addresses petitioner’s incompetency claim.
II.
Petitioner argues that the prosecution’s refusal to disclose the identity and criminal record of the man Satey identified as Robert Gibbs in the first photo line-up constituted a violation of Brady v. Maryland, 373 U.S. 83, 83 S.Ct. 1194, 10 L.Ed.2d 215 (1963). Petitioner is not entitled to an evidentiary hearing on this claim because he failed to preserve it for appeal.
Recovering in the intensive care unit during the early hours of the morning following the October 30 incident, Satey, without his glasses, identified two men in a photo line-up: Larry Clark and “the guy that calls himself Robert.” The line-up did not include a picture of petitioner. Later that same morning, Satey again picked Clark’s picture out of another photo line-up, which also did not include petitioner’s photograph. Finally, in a third photo line-up on November 10, Satey identified one of the pictures taken of petitioner at the Tampa Police Department earlier the same day as a picture of “the guy that was with the man with the gun.”
Satey’s initial identification of Clark’s accomplice triggered a series of pre-trial discovery attempts. On February 16, 1982, about five months prior to trial, petitioner moved for disclosure of the following information regarding the man Satey first identified as “Robert” (the “Robert” information): name, last known address, criminal record, and any information linking this man to Clark or the case against James. The judge granted the motion and, at a hearing on March 12 of the same year, the prosecutor agreed to produce the requested information. At another hearing three months later, on June 11, petitioner requested the trial judge to compel the prosecution to release the “Robert” information. The judge granted this motion as well, and the prosecutor once again agreed to comply with petitioner’s request. Finally, on July 6, one week before trial, petitioner moved for sanctions based upon the prosecution’s failure to release the “Robert” information and a tape recording containing potentially exculpatory evidence. Following the prosecutor’s explanation for not having provided petitioner with the requested tape recording, the trial judge denied the motion. At this point, the prosecutor volunteered the following justification for not having produced the “Robert” information: “I had all the detectives in the Homicide Division look at that photograph to see if they could identify the individual. They said it was a juvenile, and his records were sealed, and there was no way any of them knew who it was.” To this statement, the judge responded “All right.”
Neither at this point, nor at any other time during the hearings on any of petitioner’s motions requesting disclosure of the “Robert” information, did petitioner challenge the prosecutor’s explanation for failing to produce the requested information or claim that the prosecutor had failed to make a reasonable effort to obtain that information. Petitioner did not express dissatisfaction with the prosecutor’s response to his motion for sanctions until his brief to the Florida Supreme Court on direct appeal.
According to Florida law, the confidential records of a juvenile may only be unsealed pursuant to a court order. At any time after the prosecutor’s explanation, petitioner could have requested a court order requiring disclosure of the juvenile’s records pursuant to Fla.Stat. § 39.12 (1981). As the Florida Supreme Court pointed out in its opinion on direct appeal, petitioner never sought such a court order. James v. State, 453 So.2d 786, 790 (Fla.), cert. denied, 469 U.S. 1098, 105 S.Ct. 608, 83 L.Ed.2d 717 (1984).
Petitioner thus failed to seize multiple opportunities to obtain a court order for the “Robert” information or to challenge the prosecution’s efforts to obtain this information. Accordingly, we hold that he is now barred from complaining of the prosecution’s refusal to turn over the “Robert” information.
III.
A.
On appeal, petitioner raises a procedural and a substantive claim of incompetency to stand trial. First, petitioner argues that the state trial court violated his procedural due process rights under Pate v. Robinson, 383 U.S. 375, 86 S.Ct. 836, 15 L.Ed.2d 815 (1966), by failing to conduct a competency hearing on its own initiative. Second, he contends that his substantive due process rights were violated because he was tried while incompetent, regardless of whether or not the state trial court committed error in failing sua sponte to conduct a competency hearing. We hold that petitioner is entitled to an evidentiary hearing on his second, substantive, incompetency claim only.
This case amply illustrates the urgent need for clearly distinguishing between the two incompetency claims available to a federal habeas petitioner. Competency to stand trial did not become an issue in this case until petitioner raised a substantive incompetency claim in his motion for state post-conviction relief under Fla.R.Crim.P. 3.850. As we explain below, the Florida Supreme Court applied an incorrect legal standard in dismissing this claim. In the federal district court, petitioner again raised only a substantive claim of incompetency. Responding to the petition, the State, however, mistook this substantive incompetency claim for a Pate claim and pled procedural default. Apparently led astray by the State’s error, the district court rejected the Pate claim petitioner had never raised without ever addressing petitioner’s substantive incompetency allegations. In this court, perhaps precipitated by the district court’s misinterpretation of petitioner’s substantive incompetency claim, a Pate argument finally found its way into petitioner’s appellate brief, uneasily intermingled with the substantive incompetency claim the district court never considered.
In light of the havoc petitioner’s incompetency claims wreaked in state and federal court, we find ourselves compelled to distinguish Pate claims and substantive claims of incompetency before turning to the details of petitioner’s case.
Our discussion naturally commences with a look at the Supreme Court’s opinion in Pate v. Robinson. By the time the Court decided Pate, the substantive claim of incompetency at trial had been firmly established. See Pate, 383 U.S. at 388 n. 1, 86 S.Ct. at 843 n. 1 (Harlan, J., dissenting); Nathaniel v. Estelle, 493 F.2d 794, 796-97 (5th Cir.1974). This incompetency claim invokes the Due Process Clause of the Fourteenth Amendment, which for some time has been interpreted as prohibiting states from trying and convicting a mentally incompetent defendant. See Dusky v. United States, 362 U.S. 402, 80 S.Ct. 788, 4 L.Ed.2d 824 (1960); Pate, 383 U.S. at 384-86, 86 S.Ct. at 841-42, 15 L.Ed.2d 815; Fallada v. Dugger, 819 F.2d 1564, 1568 (11th Cir.1987).
In Pate, the Supreme Court ordered the district court to issue the writ of habeas corpus because (1) the state trial judge had denied defendant Robinson due process of law by failing sua sponte to conduct a competency hearing in the face of information raising a bona fide doubt regarding Robinson’s competency to stand trial, and (2) the passage of six years barred the state from establishing the harmlessness of the trial court’s error by proving in a nunc pro tunc hearing that Robinson had been competent to stand trial.
Robinson sought the writ following the Illinois Supreme Court’s rejection of his allegation on direct appeal that the trial judge had committed error by failing to hold a competency hearing. People v. Robinson, 22 Ill.2d 162, 174 N.E.2d 820, 823 (Ill.1961), cert. denied, 368 U.S. 857, 82 S.Ct. 97, 7 L.Ed.2d 55 (1962). Significantly, Robinson did not raise, and the Supreme Court did not consider, a substantive claim of actual incompetency. Looking solely to the facts available to the trial judge, the Court ordered the district court to issue the writ without having considered other evidence of actual incompetency. See Pate, 383 U.S. at 378-85, 86 S.Ct. at 838-42.
The Supreme Court declined to allow the state to cure the established due process defect by conducting a nunc pro tunc competency hearing in state court, which in Illinois would have been held before a jury. Pate, 383 U.S. at 387, 86 S.Ct. at 843. In rejecting this remedy, the Supreme Court pointed to the difficulties of retrospectively determining competency at the time of trial, including the passage of time (six years in Robinson’s case) and the new jury’s obvious inability to observe the defendant at the time of trial. Id.
Pate therefore put another spin on the already well-established prohibition against trying and convicting an incompetent defendant. Pate, in essence, established a rebuttable presumption of incompetency upon a showing by a habeas petitioner that the state trial court failed to hold a competency hearing on its own initiative despite information raising a bona fide doubt as to the petitioner’s competency. According to Pate, the state could rebut this presumption by proving that the petitioner in fact had been competent at the time of trial.
In short, Pate turned the tables on the state as soon as the habeas petitioner established the relevant trial error. Whereas the petitioner in a traditional, substantive, claim of incompetency was forced to establish his incompetency, it was now on the state to prove competency. Specifically, it was now on the state to take the significant threshold hurdle of demonstrating that the petitioner’s competency at the time of trial could be determined ex post facto, often years after the trial had occurred. See Zapata v. Estelle, 588 F.2d 1017, 1020-22 (5th Cir.1979).
A Pate claim of incompetency, therefore, differs from a substantive incompetency claim in the following respects. A petitioner presenting a claim under Pate must first establish that the trial court should sua sponte have held a competency hearing. Once the petitioner has established this, he or she has made out a federal constitutional violation. At this point, the state has the opportunity to establish before the federal district court the petitioner’s competency at the time of trial. In effect, the state thereby may demonstrate that the state trial court’s failure to hold a competency hearing constituted harmless error. In this harmless error inquiry, the federal district court need not decide whether or not the error influenced the determination of guilt or punishment, because a finding of incompetency by the state trial court would have precluded a determination of guilt or innocence: the defendant could not have been tried. In other words, the trial of an incompetent defendant is per se prejudicial.
By contrast, a petitioner raising a substantive claim of incompetency is entitled to no presumption of incompetency and must demonstrate his or her incompetency by a preponderance of the evidence.
In sum, there are two kinds of incompetency claims. First, a petitioner may allege that the trial court denied him or her due process by failing sua sponte to hold a competency hearing. This is a Pate claim. Second, a petitioner may allege that he or she was denied due process by being tried and convicted while incompetent. This is a substantive claim of incompetency. To put it bluntly, a Pate claim is a substantive incompetency claim with a presumption of incompetency and a resulting reversal of proof burdens on the competency issue.
B.
On appeal from a trial court's failure sua sponte to hold a competency hearing, an appellate court may consider only the information before the trial court before and during trial. See Tiller v. Esposito, 911 F.2d 575, 576 (11th Cir.1990); Demos v. Johnson, 835 F.2d 840, 843 (11th Cir.), cert. denied, 486 U.S. 1023, 108 S.Ct. 1998, 100 L.Ed.2d 229 (1988); Fallada v. Dugger, 819 F.2d 1564, 1568 (11th Cir.1987) (citing Hance v. Zant, 696 F.2d 940, 948 (11th Cir.), cert. denied, 463 U.S. 1210, 103 S.Ct. 3544, 77 L.Ed.2d 1393 (1983)). Accordingly, Pate claims can and must be raised on direct appeal. As pointed out above, petitioner did not present a Pate claim on direct appeal. Even if petitioner had exhausted state remedies by raising a Pate claim on direct appeal, we could not consider his current Pate claim because his federal habeas petition included no such claim.
C.
While petitioner failed to present a Pate claim to the federal district court, he did allege that he was denied due process because he was tried while incompetent. As discussed above, this substantive incompetency claim does not require a showing of error on the part of the trial judge, or any other state actor. According to binding precedent in our circuit, a petitioner is entitled to a hearing on his or her substantive incompetency claim upon a presentation of “clear and convincing evidence [raising] a substantial doubt” as to his or her competency to stand trial. Fallada, 819 F.2d at 1568 n. 1 (quoting Adams v. Wainwright, 764 F.2d 1356, 1360 (11th Cir.1985)). We hold that petitioner has alleged sufficient facts to require a hearing on his substantive incompetency claim.
Before explaining why petitioner’s allegations entitle him to a competency hearing, we pause to explore the absence of alleged state misconduct in claims alleging the trial of an incompetent in violation of the Due Process Clause of the Fourteenth Amendment. We indulge in this brief digression not to question the applicability of precedent but to shed light on a critical element of substantive incompetency claims.
In order to make out his substantive incompetency claim, petitioner need not, and does not, allege any error on the part of any state actor. For example, petitioner does not complain of the trial judge’s failure (1) to appoint an expert to assess petitioner’s competency to stand trial, (2) to conduct a competency hearing, either sua sponte or upon request, or (3) to declare him incompetent as a result of a competency hearing. Similarly, petitioner does not complain of defense counsel’s performance. Nowhere does petitioner assert that defense counsel failed (1) to request an expert for the purpose of assessing petitioner’s competency, (2) to request a competency hearing or otherwise to alert the trial court to the petitioner’s potential incompetency, (3) to notice indications of petitioner’s incompetency, or (4) to investigate indications of petitioner’s incompetency.
This absence of any allegation of error committed by a state actor differentiates substantive incompetency claims from other challenges deriving from a defendant’s alleged incompetency, including Pate claims and Sixth Amendment claims of ineffective assistance of counsel.
The Fourteenth Amendment prohibits states from denying defendants due process of law by trying them while incompetent. Unlike other amendments, including the First and Sixth Amendments, the Due Process Clauses of the Fifth and Fourteenth Amendments do not establish an affirmative right. Instead, they prohibit the states from engaging in certain activities, namely depriving persons of their life, liberty, or property, in a certain manner, namely without due process of law.
It has long been established that the conviction of an incompetent defendant denies him or her the due process of law guaranteed in the Fourteenth Amendment. See Pate, 383 U.S. at 378, 86 S.Ct. at 838 (citing Bishop v. United States, 350 U.S. 961, 76 S.Ct. 440, 100 L.Ed. 835 (1956) (per curiam opinion summarily vacating the judgment and remanding to the district court for a competency hearing)). A defendant’s allegation that he or she was tried and convicted while incompetent therefore claims that the state, by trying him or her for and convicting him or her of a criminal offense, has engaged in certain conduct covered by the Fourteenth Amendment, namely deprivation of life, liberty, or property, in a way prohibited by the Fourteenth Amendment, namely without due process of law. Accordingly, in Cuyler v. Sullivan, 446 U.S. 335, 100 S.Ct. 1708, 64 L.Ed.2d 333 (1980), the United States Supreme Court recognized that “a state criminal trial, a proceeding initiated and conducted by the State, is an action of the State within the meaning of the Fourteenth Amendment.” Id. at 343, 100 S.Ct. at 1715.
A substantive incompetency claim implicates the Fourteenth Amendment’s prohibition against deprivations of life, liberty, or property without due process of law by identifying a specific deprivation, While such a claim assigns responsibility for the deprivation to the state, it need not assign responsibility for the absence of due process to the state as well. To try an incompetent defendant makes for an undue process regardless whether or not any person, state actor or not, could or should have diagnosed the defendant’s incompetency. This absence of due process blossoms into a constitutional violation if it occurred during a proceeding in which the state deprived a person of life, liberty, or property. In short, a substantive incompetency claim based on the Due Process Clause of the Fourteenth Amendment requires an allegation of state action, not of state misconduct.
We now return to the case at hand. According to precedent in our circuit, a petitioner is entitled to an evidentiary hearing on a substantive incompetency claim if he or she “presents clear and convincing evidence to create a ‘real, substantial and legitimate doubt’ ” as to his or her competency. Fallada, 819 F.2d at 1568 n. 1 (quoting Adams v. Wainwright, 764 F.2d 1356, 1360 (11th Cir.1985), cert. denied, 474 U.S. 1073, 106 S.Ct. 834, 88 L.Ed.2d 805 (1986)). A defendant is considered competent to stand trial if “he has sufficient present ability to consult with his lawyer with a reasonable degree of rational understanding — and [if] he has a rational as well as factual understanding of the proceedings against him.” Dusky v. United States, 362 U.S. 402, 402, 80 S.Ct. 788, 789, 4 L.Ed.2d 824 (1960).
As mentioned above, the district judge failed to address petitioner’s substantive incompetency claim because he misinterpreted it as a Pate claim. We now proceed to examine the allegations petitioner makes in his habeas petition to determine whether or not petitioner is entitled to an evidentiary hearing on his substantive incompetency claim.
Petitioner raised an identical substantive incompetency claim in his 3.850 motion in state trial court. That court rejected his claim and the Florida Supreme Court affirmed. Their findings of fact, as well as those made by the court at the time of trial, are entitled to a presumption of correctness under 28 U.S.C. § 2254(d). Fallada, 819 F.2d at 1569 n. 3 (citing Price v. Wainwright, 759 F.2d 1549, 1552 (11th Cir.1985)). We do not, however, feel constrained by the disposition of petitioner’s substantive incompetency claim in state court. First, no state court, from the judge who presided over the proceedings in the trial court to the Florida Supreme Court in its opinion affirming the denial of petitioner’s 3.850 motion, has ever made findings of historical facts underlying a determination of competency. Indeed, no state court has found petitioner to have been competent to stand trial. Petitioner’s substantive incompetency claim in his 3.850 motion was rejected without a hearing on the basis that it failed to allege facts sufficient to warrant relief.
We find two faults with the Florida Supreme Court’s disposition of petitioner’s substantive incompetency claim. First, the court misrepresented petitioner’s allegations. Its opinion affirming the trial court’s denial of petitioner’s 3.850 motion noted that the report by Dr. Harry Krop, which petitioner’s 3.850 motion and federal habeas petition quote extensively, “falls short of stating that [petitioner] was incompetent to stand trial.” James v. State, 489 So.2d 737, 739 (Fla.1986). On the contrary, Dr. Krop’s report, as quoted in petitioner’s 3.850 motion and in his federal habeas petition, specifically concludes that
[applying the clinical features of [petitioner’s] Organic Personality Syndrome to those factors the courts request us to utilize in determining competency to stand trial, and behavioral features of Mr. James’ characterological makeup, [petitioner] would have definitely been found lacking in the following categories at the time of trial:
1). His capacity to disclose to his attorney pertinent facts surrounding the alleged offense....
2). Mr. James’ ability to relate to his attorneys....
3). Likewise, his ability to assist his attorney in planning a defense....
4). Mr. James’ capacity to realistically challenge the prosecution witnesses....
5). Similarly, his ability to testify relevantly. ...
(Emphasis supplied.) In addition to incorporating Dr. Krop’s conclusions, petitioner’s 3.850 motion and federal habeas petition explicitly allege that “he was tried while incompetent” and that his “organic mental condition rendered him unable to assist in his defense.” Considering these repeated allegations of actual incompetency, we must disagree with the Florida Supreme Court’s conclusion that petitioner merely has alleged probable, rather than actual, incompetency.
Moreover, the Florida Supreme Court applied an incorrect legal standard in affirming the trial court’s rejection of petitioner’s actual incompetency claim without an evidentiary hearing. The court apparently treated the State's response to petitioner’s 3.850 motion as a motion for summary judgment based on observations contained in the pre-trial psychological report by Dr. Gerald Mussenden. The court weighed this initial report against Dr. Krop’s report and concluded that the latter was “insufficient to contradict substantially the original psychiatric study and, even if [it] did, [was] insufficient to raise the issue of incompetence to stand trial.” James v. State, 489 So.2d at 739.
Instead of dismissing petitioner’s substantive incompetency claim for failing substantially to contradict observations contained in a psychological report, the court should have determined whether petitioner had alleged sufficient facts to warrant a competency hearing. Rather than accept Dr. Mussenden’s observations as true unless substantially contradicted, the court should have taken petitioner’s allegations as true. Petitioner would have been, and still would be, entitled to a competency hearing if his allegations, taken as true, would entitle him to relief.
We now conduct an independent review of petitioner’s allegations of actual incompetency. Based on the allegations of actual incompetency quoted above, we hold that petitioner has presented clear and convincing evidence raising a substantial doubt as to his competency to stand trial.
Accordingly, we REVERSE the district court’s denial of habeas corpus relief on petitioner’s substantive incompetency claim. We REMAND the case to the district court to conduct an evidentiary hearing on that claim, and, thereafter, to certify its findings of fact and conclusions of law to us.
IT IS SO ORDERED.
. Following his arrest, Clark had given James a notarized authorization to retrieve his automobile.
. Satey and Snyder also testified to their prior identifications of James from the photo lineups.
.Although the testimony at James’ trial established that only Clark had carried a gun, the judge instructed the jury on both premeditated murder and felony murder. The jury convicted James of first degree murder without identifying the theory or theories underlying its decision.
. Petitioner raises two other Brady claims, both meritless. First, he complains of the prosecution’s failure to provide him with a tape recording of Satey’s emergency call to the police. The prosecutor repeatedly and consistently confessed his inability to locate the tape. Petitioner offers nothing to challenge this explanation. We see no reason to question the prosecutor’s explanation, particularly because destruction of the tape by the police would have been in accordance with standard procedures. Assuming arguendo that the tape had been destroyed — a fact never established during the proceedings in trial court — the police were under no obligation to preserve the tape. Satey’s description of his assailants during this telephone call at most constituted potentially exculpatory evidence. Destruction of potentially exculpatory evidence violates Brady only if the police acted in bad faith. Arizona v. Youngblood, 488 U.S. 51, 58, 109 S.Ct. 333, 337, 102 L.Ed.2d 281 (1988) (absent a showing of bad faith, failure of police to freeze clothing of sexual assault victim to allow for later defense testing did not violate due process); California v. Trombetta, 467 U.S. 479, 488, 104 S.Ct. 2528, 2533-34, 81 L.Ed.2d 413 (1984) (failure to preserve breath sample of suspected drunk driver did not violate due process). As petitioner does not allege, and we cannot find, bad faith on the part of either the prosecution or the police, no Brady violation exists.
Petitioner also challenges the prosecution's failure to disclose that a jacket introduced into evidence as the jacket Robert Gibbs wore while repairing the roof at A-l displayed certain characteristics purported to be inconsistent with Snyder’s identification of James as the roof worker. We find no merit in this argument because the record fails to reveal the alleged inconsistency, and even if it did, defense counsel had access to the jacket and was therefore in as good a position as the prosecutor to detect any inconsistencies. Brady obviously does not impose a duty on the prosecution to try the case for the defense.
. See supra n. 4.
.Petitioner not only failed to request a court order to release the “Robert” information, he arguably also failed to obtain a ruling from the trial judge on his motion for sanctions on the ground that the prosecution had failed to turn over the "Robert” information. As mentioned above, the trial judge ruled only on the alternate ground for petitioner’s motion for sanctions. The judge's response of "All right." to the prosecutor’s representations at the very least should have prompted petitioner’s request for an explicit ruling on the “Robert” information issue.
. According to the State, petitioner defaulted on the Pate claim by not raising it on direct appeal from his convictions.
. The district court later denied petitioner’s motion to alter or amend judgment, which, inter alia, complained of this misinterpretation.
. In Bonner v. City of Prichard, 661 F.2d 1206, 1209 (11th Cir.1981) (en banc), this court adopted as binding precedent all decisions of the former Fifth Circuit handed down prior to October 1, 1981.
. Apparently, Robinson had not requested a competency hearing before a jury on a special plea of insanity, as provided by Illinois law. Pate, 383 U.S. at 384, 86 S.Ct. at 841; People v. Robinson, 22 Ill.2d 162, 174 N.E.2d 820, 823 (1961), cert. denied, 368 U.S. 857, 82 S.Ct. 97, 7 L.Ed.2d 55 (1962).
. On its face, Pate appears to hold that the trial court's failure sua sponte to hold a competency hearing raised a conclusive, rather than a rebut-table, presumption of incompetency. See Pate, 383 U.S. at 386, 86 S.Ct. at 842 ("Having determined that Robinson’s constitutional rights were abridged by his failure to receive an adequate hearing on his competence to stand trial, we direct that the writ of habeas corpus must issue and Robinson be discharged, unless the State gives him a new trial within a reasonable time.”). Although Pate remains less than unequivocal on this point, two factors strongly suggest that the Court established a rebuttable presumption upon a showing of trial court error. First, an alternative formulation of the holding compels this conclusion. See Pate, 383 U.S. at 377, 86 S.Ct. at 838 ("We have concluded that Robinson was constitutionally entitled to a hearing on the issue of his competence to stand trial. Since we do not think there could be a meaningful hearing on that issue at this late date, we direct the District Court [to issue the writ],”). Second, the Court’s consideration of ways in which the state might rectify the trial court’s error by means of a nunc pro tunc competency hearing can only be interpreted as a harmless error analysis. While the Court held that, given the facts in Pate, the state could not establish harmless error, it did not hold that Pate error could never be harmless.
.Although our precedent sheds little light on the question, it apparently also places the burden of proof in these nunc pro tunc competency hearings on the state. Cf. Zapata v. Estelle, 588 F.2d 1017, 1020-22 (5th Cir.1979) (writ must issue upon demonstration of Pate violation, i.e., the state loses, if no meaningful competency hearing is possible).
. In passing on this issue, the court may, of course, only consider the information before the state judge at trial. Tiller v. Esposito, 911 F.2d 575, 576 (11th Cir.1990); Demos v. Johnson, 835 F.2d 840, 843 (11th Cir.), cert. denied, 486 U.S. 1023, 108 S.Ct. 1998, 100 L.Ed.2d 229 (1988); Hance v. Zant, 696 F.2d 940, 948 (11th Cir.), cert. denied, 463 U.S. 1210, 103 S.Ct. 3544, 77 L.Ed.2d 1393 (1983).
. The Supreme Court in Pate only discussed the option of a competency hearing in state court. Two considerations, however, strongly favor a nunc pro tunc hearing in federal court. First, the question whether a federal constitutional violation constituted harmless error clearly is a question of federal law. As noted above, however, the nunc pro tunc hearing is nothing but a harmless error determination in disguise. Second, a state court competency hearing out of the context of a state criminal trial would make for a virtually unappealable proceeding caught in the never-never land between criminal and civil procedure. While the state trial court’s competency determination may be appealable in the state appellate courts under some more or less tortured interpretation of that state’s final judgment rule, it would face a long and winding road back into the federal court system, past creative readings of the federal habeas statute and beyond the ordinary limits of federal jurisdiction. First, an appeal from a competency determination would run smack into the federal habeas statute, which authorizes a federal habeas court to review a "judgment,” 28 U.S.C. § 2254(a) (1988), not an ancillary proceeding neither civil nor criminal in nature, conducted by a state court upon the urging of a state prosecutor attempting to fulfill the condition a federal court has placed upon that state’s authority under the Federal Constitution to incarcerate a particular individual. In an attempt to finagle the "judgment" problem, the federal court sending the case back to state court could vacate the conviction and direct that it be reinstated upon a finding of competency. Upon exhaustion of state remedies with respect to the competency finding, the federal habeas court would now review a "judgment." Assuming a fair hearing in state court, the petitioner, however, would still struggle to make out a federal constitutional claim: a simple finding of competency arguably does not constitute a federal constitutional violation. Unlike a traditional substantive claim of incompetency, which alleges the due process violation of trying and convicting an incompetent defendant, a petition complaining of a state court’s finding of competency in a nunc pro tunc hearing could allege no such due process violation. Without a federal constitutional claim, however, the federal habe-as court would lack jurisdiction to entertain the petition.
. Our circuit further distinguishes between Pate claims and substantive incompetency claims by differentiating between the threshold a petitioner must pass to prevail under either claim. Under a Pate claim, a petitioner must establish that the state trial judge ignored facts raising a "bona fide doubt” regarding the petitioner’s competency to stand trial. Fallada v. Dugger, 819 F.2d 1564, 1568 (11th Cir.1987). To receive a competency hearing pursuant to a claim of actual incompetency, a petitioner must "present! ] clear and convincing evidence [raising] a ‘real, substantial and legitimate doubt'” as to his or her competency. Fallada, 819 F.2d at 1568 n. 1 (quoting Adams v. Wainwright, 764 F.2d 1356, 1360 (11th Cir.1985), cert. denied, 474 U.S. 1073, 106 S.Ct. 834, 88 L.Ed.2d 805 (1986)).
. Our discussion of state action focuses on the Due Process Clause of the Fourteenth Amendment as the conduit between the Bill of Rights and the states.
. We interpret this language as referring to the proffer of proof a petitioner must make, rather than to the burden of proof a petitioner must meet, to receive an evidentiary hearing. It is well established that a habeas petitioner is entitled to an evidentiary hearing on a claim if he or she alleges facts that, if proved at the hearing, would entitle the petitioner to relief. See Townsend v. Sain, 372 U.S. 293, 313, 83 S.Ct. 745, 757, 9 L.Ed.2d 770 (1963); Thomas v. Zant, 697 F.2d 977, 983 (11th Cir.1983). In our interpretation, the standard adopted in this circuit for determining whether or not a petitioner is entitled to a hearing on a substantive incompetency claim merely attempts to adapt this general principle to the specific case of a substantive incompetency claim. The requirement of "clear and convincing" evidence raising a "substantial doubt” seeks to distinguish substantive incompetency claims from Pate claims, which as mentioned above, only require a showing of "bona fide doubt” as to competency at trial. Considering that we have exposed this distinction between Pate claims and substantive incompetency claims as misleading, we would do away with this circuit’s requirement of “clear and convincing” evidence raising a "substantial doubt” as to competency. Precedent, however, restricts us to pointing out that a determination whether or not a petitioner has presented "clear and convincing" evidence in his or her habeas petition would appear to require credibility assessments without the benefit of live testimony and would jar with the principle that, for the purposes of deciding on the necessity of an evidentiary hearing, the petitioner’s allegations must be accepted as true. Moreover, the requirement that the petitioner need only raise a "substantial doubt” as to his or her competency would seem to suggest that a petitioner would be entitled to a competency hearing without having to allege incompetency.
. As competency to stand trial constitutes a mixed question of law and fact, this finding would, of course, not have been entitled to a presumption of correctness.
. Admittedly, Dr. Krop’s report is not a model of clarity. In addition to the confident conclusions quoted above, the report contains far more cautious assessments of petitioner’s competency: “it [is] probable that [petitioner’s] ability to assist his attorney at the time of trial was seriously impaired by his organic disorder”; “it is probable that [petitioner’s] paranoia could have impaired his ability to assist the attorney who represented him”; "it is probable Mr. James was unable to assist in his defense as a result of his Organic Personality Syndrome.”
| CASELAW |
Young children have no discrimination, no racism, no ideas that would cause other beings to be harmed. So then why are we, as adult humans, plagued by these demons that cause us to do and say hateful things? The answer may very well start in the home and the way we live.
Harper Lee compares and contrasts different families and societies in her novel To Kill a
Mockingbird to show that people’s actions are a result of how they live. The Ewells, the
Finches and the Radleys are all similar in some ways and different in others. Because of this,
Mayella Ewell, Scout Finch and Boo Radley have grown up or will grow up to be different people. Scout has learned never to judge anybody based on their outer appearances from
Atticus. She has also started to explore becoming a lady thanks to her two mother figures,
Aunt Alexandra and Calpurnia. Mayella Ewell grew up with a family that gave all of the responsibilities to her, and was abused sexually and physically by her father. She also learned to lie and go along with what her father was saying, otherwise she would get hurt.
Boo Radley’s parents expressed that family honor was more important than their son’s education and welfare when they didn’t send him to the industrial school and stowed him under the courthouse. Though their homes were different and they learned different lessons, they all learned what they lived.
Scout lives with her father, Atticus; her brother, Jem; her African American cook,
Calpurnia; and her Aunt Alexandra. These people all influenced her as friends, mothers, and role models. Scouts mother died at a time that was far back even in Jem’s memory. Because of this, Scout spent most of her time with Atticus, Jem, and later in life, Dill, all of whom were men. She was more of a tomboy than a lady, and she did not want to become a lady. But, not all feminine influence was lost. She had Calpurnia, who helped Scout realize that being a lady
is hard work; “She [Calpurnia] seemed glad to see me when I appeared in the kitchen, and by watching her I began to think there might be some skill to being a girl,” (p. 154). Jem, who usually included Scout in his summer activities, had gone off on his own. Dill had not arrived, so Scout’s only other option was to be with Calpurnia in the kitchen. There,Scout witnessed
Calpurnia working. Scout, who had spent the previous summers with Jem and Dill, now recognizes that being a lady is not all that about gossip and dresses, petticoats and tea, and that it is hard work. In contrast, when Aunt Alexandra first appeared on the scene, she was all about gossip, dresses, petticoats and tea. The first impression that we get from her is a lady, and rightfully so. Unfortunately, Scout doesn’t want to be a lady, so Aunt Alexandra cannot influence her during the first part of her stay. But, during part two, Scout’s views on womanhood begin to change. They were majorly impacted based on Aunt Alexandra’s reaction when Tom Robinson died. We all know the horrid feeling of hearing that someone has died in a despicable way. Aunt Alexandra’s initial reaction was the same as anyones would be. The initial reaction wasn’t what impacted Scout, it was how Aunt Alexandra cleaned herself up:
"Stop that shaking," commanded Miss Maudie, and I stopped. "Get up,
Alexandra, we've left them long enough" Aunt Alexandra rose and smoothed the various whalebone ridges along her hips. She took her handkerchief from her belt and wiped her nose. She patted her hair and said, "Do I show it?" Not a sign," said Miss Maudie. (p. 317)
This is what made Alexandra so | FINEWEB-EDU |
# $Id: Makefile.linux,v 1.15 2006/06/04 05:07:46 paulus Exp $ DESTDIR = $(INSTROOT)@DESTDIR@ BINDIR = $(DESTDIR)/sbin MANDIR = $(DESTDIR)/share/man/man8 CDEF1= -DTERMIOS # Use the termios structure CDEF2= -DSIGTYPE=void # Standard definition CDEF3= -UNO_SLEEP # Use the usleep function CDEF4= -DFNDELAY=O_NDELAY # Old name value CDEFS= $(CDEF1) $(CDEF2) $(CDEF3) $(CDEF4) COPTS= -O2 -g -pipe CFLAGS= $(COPTS) $(CDEFS) INSTALL= install all: chat chat: chat.o $(CC) $(LDFLAGS) -o chat chat.o chat.o: chat.c $(CC) -c $(CFLAGS) -o chat.o chat.c install: chat mkdir -p $(BINDIR) $(MANDIR) $(INSTALL) -s -c chat $(BINDIR) $(INSTALL) -c -m 644 chat.8 $(MANDIR) clean: rm -f chat.o chat *~ | ESSENTIALAI-STEM |
Hello all,
I need to make some database... and lets say there is a student table, and the student table has many columns, a lot of columns.... they are all unique to the primary key, so dont worry about the normal forms...
what I am in a doubt is: there is some data, that could be put in another table, but it should be a one-to-one relationship!
because, one student can have only one dossier (for instance: sign_up_date, student_status, etc)
so, my question is:
- should all the data be put into one table called students?
• or should I separate the data into two tables students and student_dossier? In this case, student_dossier *table should have one primary key named student_id, just like in *students table
I am a bit confused, so I hope you could help me to understand it... Thank you very much in advance
You have to strike a balance between normalization and usability. For a student table, you should keep basic information like
Name
Address
Telephone
StudentID (which will be used as a foreign key in other tables)
Status
In one table. This is information that is used to uniquely identify a student. Academic information such as courses, grades, etc. belong in a separate table. These other tables will refer back to the student table via the StndentID.
I am aware of the need to put separate data into separate table.... like grades, etc...
but what about one to one relationship? in what instance do we use it? is it like having all the data in one table...
I am looking in Access 2007, in order to create one to one relationship, two tables need to have one and only and the same primary key, like StudentID
so I wonder, does separating data in that way only help to alleviate the burden of one table? Is that it? Is that the purpose of having two tables with the same ID field?
Is the database gonna be slow that way?
I hope you can help me understand that concept better, thanks again.
Tables do not need to be restricted to a one to one relationship. Databases would not be very useful if this was the case. For example, one student can take many courses. In that case you might have (as an example)
StudentsTable
-------------
StudentID (PK)
LastName
FirstName
.
.
.
CourseTable
-----------
CourseID (PK)
CourseName
.
.
.
StudentCourseTable
------------------
StudentID (FK)
CourseID (FK)
Grade
.
.
.
Because you need to have a primary key to uniquely ID a record in the StudentCourse table, the primary key (PK) is a compound key consisting of the StudentID and CourseID which are also foreign keys (PK) because they link back to other tables. In real life it gets much more compliciated because you would need at least two more tables for courses. The primary would detail each course but you would need another one-many because each course would be offered in multiple slots and multiple terms, and yet another to specify the prerequisites.
is my English that bad? All I was asking was: one to one relationships as opposed to all the data in one table, instead of two tables.
I think it would depend on how you would access the data under normal use. Would all your queries need to access all the data? Or might there be a subset that is accessed more frequently where having it in a separate table may marginally improve performance?
I think splitting the data into two tables is something I would only consider if the number of records and the number of fields was very large.
is my English that bad? All I was asking was: one to one relationships as opposed to all the data in one table, instead of two tables.
I suppose I could have just answered "it depends on the data" but that really wouldn't have been useful.
I see, thanks nauticalmac.... that makes sense then..... since there are many fields, and also this data in a separate table would be considered as one group... then it makes sense. Thank you. | ESSENTIALAI-STEM |
Ian Fergusson
Ian Kenneth Fergusson is a BBC Weather Presenter, Fellow of the Royal Meteorological Society and a Chartered Biologist specialising on sharks, especially species inhabiting the Mediterranean Sea.
Fergusson works for the BBC (British Broadcasting Corporation) presenting TV weather on regional TV news programme BBC Points West, BBC Local Radio and forecasting for BBC's Formula One multimedia coverage. He maintains a dedicated Twitter feed throughout each F1 race weekend, providing circuit-specific forecasts (@fergieweather). He was presenter for two BBC ONE documentaries – "Wild Weather" – in 2011 and 2013. In 2013, he was elected as a Fellow of the Royal Meteorological Society (FRMetS).
He has authored or co-authored a number of papers in marine biological science journals since 1993. Much of his research has focussed on biology of the great white shark in Mediterranean and north-eastern Atlantic waters.
A dedicated marine conservationist, Fergusson was a founding trustee, inaugural chairman and now a patron of the Shark Trust, a wildlife charity formed in 1997 and based in Plymouth, UK. Since 1994, he has served as a member of the IUCN (World Conservation Union) Shark Specialist Group, assisting with preparation of Red List status accounts. He is professionally qualified as a Chartered Biologist (CBiol) and member (MRSB) of the Royal Society of Biology.
He has worked on and appeared in various TV documentaries about sharks since the early 1990s and is credited as scientific advisor for the Emmy-awarded 1995 production Great White Shark: A Wildlife Special, co-produced by the BBC with National Geographic.
In 2007 Fergusson won a Craft Award for camerawork from the Royal Television Society in Bristol and was a nominee for the same category in 2006.
With a longstanding interest in Formula One motor-racing, he is a supporter of 2008 F1 World Champion & Mercedes driver Lewis Hamilton. A keen electric bass guitarist since age of 13, Fergusson cites his key influence as the late Chic bassist, Bernard Edwards. | WIKI |
2017 Asian Women's Junior Handball Championship
The 2017 Asian Women's Junior Handball Championship was the 14th edition of the championship organised by the Handball Association of Hong Kong China under the auspices of the Asian Handball Federation. It was held in Tsim Sha Tsui, Hong Kong from 15 to 23 July 2017. It was played in under-19 years category. It was the first time that Hong Kong staged the competition. It also acts as qualification tournament for the IHF Women's Junior World Handball Championship. Top three teams i.e. South Korea, China and Japan qualified for the 2018 Women's Junior World Handball Championship to be held in Hungary.
Participating teams
* 1) (Host)
* 2) (Defending Champion) | WIKI |
California confirms first coronavirus death, bringing US fatalities to at least 11
Local health officials in California announced Wednesday the state's first COVID-19 death, bringing U.S. fatalities to at least 11. The patient was an elderly adult with underlying health conditions, county officials said, adding that the person was the second confirmed COVID-19 case in the county and is now the first death related to the virus in the state. "We extend our deepest condolences to the loved ones of this patient," Placer County Health Officer Dr. Aimee Sisson said in a statement. "While we have expected more cases, this death is an unfortunate milestone in our efforts to fight this disease, and one that we never wanted to see." County officials said the patient was likely exposed during international travel from Feb. 11 to Feb. 21 on a Princess cruise ship that departed from San Francisco and traveled to Mexico. Placer County officials said the patient arrived at Kaiser Permanente Roseville Medical Center by ambulance on Feb. 27 and was in isolation at the hospital. As of Wednesday, there are 53 confirmed cases of COVID-19 in California, including 24 from repatriation flights. According to the Centers for Disease Control and Prevention, California has more cases of the virus than any other state. Placer County, which is in northern California near Sacramento, is monitoring ten health care workers from the hospital, the county said, and five emergency responders who were exposed prior to the patient being placed in isolation. The county said none of them are exhibiting symptoms. The county said other passengers from the cruise may have also been exposed. "While most cases of COVID-19 exhibit mild or moderate symptoms," Dr. Sisson added, "this tragic death underscores the urgent need for us to take extra steps to protect residents who are particularly vulnerable to developing more serious illness, including elderly persons and those with underlying health conditions." The news comes after Vice President Mike Pence, who is leading the U.S. response to the COVID-19 outbreak, announced the country's tenth death. CNBC has confirmed that the tenth death was in Washington state, where all of the first nine deaths occurred as well. "The state is working with federal officials to follow up on contact tracing of individuals that may have been exposed to provide treatment and protect public health," California Gov. Gavin Newsom said. "This case demonstrates the need for continued local, state and federal partnership to identify and slow the spread of this virus." Earlier Wednesday, Los Angeles-area officials announced six new COVID-19 cases in the county over the past 48 hours, prompting that southern California county to declare a local emergency to help free up federal and state funding. Officials said at the announcement that there were no community spread cases in Los Angeles county, meaning that all cases could be traced back to a known or suspected source. | NEWS-MULTISOURCE |
User:Wendelllambert/Massachusetts Ballot Questions 2024
2024 United States ballot measures
2024 United States ballot measures. (2024, March 17). Wikipedia. https://en.wikipedia.org/wiki/2024_United_States_ballot_measures
https://ballotpedia.org/Massachusetts_2024_ballot_measures
Massachusetts 2024 ballot measures. (n.d.). Ballotpedia. https://ballotpedia.org/Massachusetts_2024_ballot_measures
https://www.mass.gov/info-details/ballot-initiatives-filed-for-the-2024-biennial-statewide-election-proposed-laws-and-2026-biennial-statewide-election-proposed-constitutional-amendments
Ballot Initiatives filed for the 2024 Biennial Statewide Election (proposed laws) and 2026 Biennial Statewide Election (proposed constitutional amendments) | Mass.gov. (n.d.). Www.mass.gov. https://www.mass.gov/info-details/ballot-initiatives-filed-for-the-2024-biennial-statewide-election-proposed-laws-and-2026-biennial-statewide-election-proposed-constitutional-amendments
https://www.nbcboston.com/news/local/next-stop-for-7-possible-ballot-questions-the-massachusetts-legislature/3235723/
Lisinski • •, C. (2024, January 4). ''Next stop for 7 possible ballot questions? The Mass. Legislature''. NBC Boston. https://www.nbcboston.com/news/local/next-stop-for-7-possible-ballot-questions-the-massachusetts-legislature/3235723/
https://ballotpedia.org/History_of_Initiative_%26_Referendum_in_Massachusetts
BallotPedia. (2021). History of Initiative & Referendum in Massachusetts. Ballotpedia. https://ballotpedia.org/Hist ory_of_Initiative_%26_Referendum_in_Massachusetts
Massachusetts voters will vote on 5 ballot questions in 2024
An initiative to remove the MCAS test as requirement to graduate high school.
An initiative to raise the minimum wage for tipped workers.
An initiative to authorize the state auditor to audit the state legislature, and remove some existing regulations regarding the auditing process.
An initiative to legalize some psychedelic substances for medical and research use.
There are also 2 competing questions that relate to the classification of app based workers such as Uber drivers.
One would consider app-based drivers to be independent contractors and enacts several labor policies related to app-based companies.
The second would allow these app based workers to unionize and use collective bargaining.
| WIKI |
December 14, 2017
How Long Is a Year on Mars?
Mars takes a longer trip around the Sun than Earth does. Find out what that means for spacecraft in this 60-second video.
Transcript:
The Earth zips around the Sun at about 67,000 miles per hour, making a full revolution in about 365 days - one year on Earth. Mars is a little slower, and farther from the sun, so a full circuit takes 687 Earth days - or one Mars year.
That longer year means longer seasons too. Over extended Martian winters, the shorter days and reduced sunlight mean that solar-powered spacecraft sometimes have to carefully conserve their energy.
Timing of Mars years is also important. Every 26 months, we come closer to Mars, so it's one of the best times to send spacecraft. A shorter trip means less time and fuel spent getting there.
When the Curiosity rover got to Mars, its mission was to explore Mars for at least 687 Earth days - one Mars year. But like our other long-lasting rovers, it hit its target and kept on rolling!
Credit
NASA/JPL/Caltech
PREVIEW
You Might Also Like | ESSENTIALAI-STEM |
Singapore and the World Bank
Singapore officially joined the International Bank for Reconstruction and Development (IBRD) on August 3, 1966 after Singapore's independence from Malaysia. By 1975, Singapore received 14 total loans from the World Bank, 10 of these loans were used exclusively for infrastructure projects. Currently, Singapore is a member of World Bank Group Institutions including International Bank for Reconstruction and Development (IBRD), International Finance Corporation (IFC), Multilateral Investment Guarantee Agency (MIGA), International Development Association (IDA), and the International Centre of Settlement of Investment Disputes (ICSID).
The Port of Singapore Expansion and Improvement Project
The first infrastructure project was the expansion of the Jurong Harbour in Singapore. The objective of the project was to help establish new real estate and satellite cities surrounding the area. Estimated to cost S$14-million, the Jurong Port was completed in 1966. During this time, it was estimated that about 200-300 jobs were created. Additionally, the harbour's expansion linked Singapore to international shipping lines.
Upon completion, the Jurong Port had 5 deep-water berths, stretching a total of 9,000 feet. These deep-water berths allowed the deepest ships to dock in port to provide the city with cargo and raw materials. Additionally, the new berths helped increase port traffic significantly. The project was successful and, in 1969, the government began to draft new plans for the port.
Singapore: First Infrastructure and Urban Development Hub
In 2015, Singapore signed an agreement with the World Bank to establish the country as its first infrastructure and urban development hub. The operation will employ hundreds of new people over the next 2 years in both the World Bank and the private sector arms. The new hub will provide financing and services to developing economies with a focus on sustainable infrastructure and urban development. Projects on the public sector side will be dedicated to sustainable energy, transport, information and communications technology, public-private partnerships, trade and competitiveness, and urban development as well as the global infrastructure facility.
Singapore and Sustainability
Singapore is a member of the World Bank and it supports organizations including the Global Platform for Sustainable Cities. This organization is funded by the Global Environment Facility and it helps cities to understand how sustainable they currently are and what they can improve upon. The GPSC focuses on projects in cities such as responses to climate change as well as eco-friendly public transportation GSPC.
Singapore also works towards sustainability in the world by exchanging information with the World Bank. This information exchange happened when the World Bank and Singapore’s Infrastructure Asia signed an MoU. Infrastructure Asia works on sustainability projects such as floating solar panels.
There is also an MoU between the World Bank and Singapore’s Public Utilities Board. Singapore’s PUB is the country’s water agency and it responds to the threat of sea levels rising. The organization is committed to using water in a sustainable way and it urges people to not waste water. The PUB also works to keep water clean and avoid water pollution. Due to this partnership, the World Bank supports Singapore’s International Water Week for the years 2020, 2022, and 2024. Singapore’s International Water Week is to show how the city is managing its water supply and teach attendees how they can better manage their own water supplies.
The World Bank also partners with Singapore’s World Cities Summit. The goal of the World Cities Summit is to teach its attendees about how they can tackle sustainability issues in cities committed to eco-friendly movements. Singapore’s Centre for Liveable Cities and the Urban Redevelopment Authority help organize Singapore’s World Cities Summit. | WIKI |
Page:The Newspaper and the Historian.djvu/140
The press thus guarantees on the one hand protection to its readers from advertisers seeking to promote their own selfish ends,
and on the other hand it guarantees its advertisers a reliable circulation. It sometimes goes even farther than this and gives its
readers a guarantee that all goods advertised in its columns are what they purport to be; if they are found to be otherwise than as advertised, the newspaper will itself refund the money paid if the advertiser does not do so .8 It gives its subscribers much information in regard to domestic and foreign postal rates for newspapers, and in regard to the best ways of remitting money for subscriptions or advertising. It informs its contributors, actual or would - be, of the best way of preparing manuscript, warns them
against anonymous con
tributions, but sometimes asserts with vehemence and even asperity that “ all unsolicited manuscripts, articles, letters and
pictures sent to The Tribune are sent at the owner's risk and The Tribune company expressly repudiates any liability or responsi bility for their safe custody or return ." 9 Newspapers often state the various forms of printing and
kindred enterprises carried on in connection with the publication of a paper, including commercial printing, ruling, binding, oc casional book publishing, and job printing of every description. This information in regard to its business activities becomes, especially in the case of the paper with a necessarily small circu
lation, a guarantee of its independence in a financial way of both its circulation and its advertising. The newspaper itself thus presents on its business side a wide range of guarantees as to its credibility and reliability. Many of these guarantees may seem
to the casual reader of minor im
guaranteed only the figures of circulation contained in the report of the Association.
This Association discontinued service May 21, 1914, and its place has been taken by the Audit Bureau of Circulations. 8 The New York Tribune at the head of its editorial columns carries this
guarantee: “ You can purchase merchandise advertised in THE TRI BUNE with absolute safety - for if dissatisfaction results in any case THE TRIBUNE guarantees to pay your money back upon request. No red tape,
no quibbling. We refund promptly if the advertiser does not .” The Good Housekeeping Magazine has for some years carried a similar guarantee.
New York Tribune, Janua | WIKI |
Wikipedia:Articles for deletion/RDA International
The result was delete. -- Cirt (talk) 04:39, 1 June 2010 (UTC)
RDA International
* – ( View AfD View log • )
Fails WP:CORP. Unreferenced. While I found many sources (not behind pay walls) that mention RDA International, none of the sources directly talk about the company. Usually the subject is the advertisements created by RDA. Millbrooky (talk) 03:09, 25 May 2010 (UTC)
* Delete Non-notable advertising agency. No significant outside coverage found. --MelanieN (talk) 14:17, 25 May 2010 (UTC)
* Note: This debate has been included in the list of Advertising-related deletion discussions. -- • Gene93k (talk) 15:29, 25 May 2010 (UTC)
* Note: This debate has been included in the list of Business-related deletion discussions. -- • Gene93k (talk) 15:29, 25 May 2010 (UTC)
* Delete. Promotionally non-neutral in tone: ...specializes in focused, targeted marketing to "Passionistas", audiences who are emotionally involved in their purchase decisions. - Smerdis of Tlön - killing the human spirit since 2003! 17:20, 25 May 2010 (UTC)
| WIKI |
Eder Vilarchao
Eder Vilarchao Ruiz (born 9 February 1990) is a Spanish retired footballer who played as a midfielder.
Club career
Born in Barakaldo, Biscay, Vilarchao played youth football for local Santutxu FC and Athletic Bilbao, joining the Lezama youth system at the age of ten and remaining there for seven years. He made his senior debuts in 2009–10, going on to appear two full seasons for CD Basconia – the farm team – in Tercera División; in the 2011 summer he joined neighbouring Sestao River Club, in Segunda División B.
In January 2012, Vilarchao was linked to various clubs, including Real Sociedad, CA Osasuna, Villarreal CF and Real Valladolid. In June, he eventually signed with Real Betis, being initially assigned to the reserves.
Vilarchao made his official debut with the Andalusians' first team on 13 January 2013, coming on as a substitute for Álvaro Vadillo in the 57th minute of a 2–0 La Liga home win against Levante UD. On the 17th he was handed his first start, playing 64 minutes in a 0–2 away loss to Atlético Madrid for the campaign's Copa del Rey.
On 24 January 2013, Vilarchao suffered an ankle injury, but still renewed his contract with the club until 2016 late in the month. In January 2014, now fully recovered, he was left out of both the first and second sides, in the latter case due to his age; in April he suffered another injury, being ruled out for the remainder of the season.
Vilarchao was not included in any Betis roster for 2014–15, despite being fully fit. On 18 November 2015, aged 25, he decided to retire from football after nearly three years struggling with several injuries. | WIKI |
Home front
Home front is an English language term with analogues in other languages. It is commonly used to describe the full participation of the British public in World War I who suffered Zeppelin raids and endured food rations as part of what came to be called the "Home Front".
Civilians are traditionally uninvolved in combat, except when the hostilities happen to reach their residential areas. However, the expanded destructive capabilities of modern warfare posed an increased direct threat to civilian populations. With the rapid increase of military technology, the term "military effort" has changed to include the "home front" as a reflection of both a civilian "sector" capacity to produce arms, as well as the structural or policy changes which deal with its vulnerability to direct attack.
This continuity of "military effort" from fighting combat troops to manufacturing facilities has profound effects for the concept of "total war". By this logic, if factories and workers producing material are part of the war effort, they become legitimate targets for attack, rather than protected non-combatants. Hence, in practice, both sides in a conflict attack civilians and civilian infrastructure, with the understanding that they are legitimate and lawful targets in war. This military view of civilian targets has effects on the equity of applied legal principles on which the prosecution of crimes against humanity are based.
The concept of civilians' involvement in war also developed in connection with general development and change of the ideological attitude to the state. In feudal society and also in absolute monarchy the state was perceived as essentially belonging to the monarch and the aristocracy, ruling over a mass of passive commoners; wars were perceived as a contest between rival rulers, conducted "above the head" of the commoners, who were expected to submit to the victor. However even given this, in feudal societies the income of estates and nations, and therefore the wealth and power of monarchs and aristocrats, was proportional to the number of commoners available to work the land. By killing, terrorizing, destroying property and driving away a nobleman's serfs, a tactic known as chevauchée, an attacker could hope either to diminish the strength of an opponent or to force an opponent to give battle.
In contrast, since the French Revolution, the state was increasingly perceived as belonging to "the People", a perception shared—though in different forms—by democracy, communism and fascism. A logical conclusion was that war has become everybody's business and that also those not taken into the military must still "do their part" and "fight on the home front".
History
The importance of civilian manufacturing and support services in a nation's capacity to fight a war first became apparent during the twenty-five years of the French Revolutionary and Napoleonic wars when the United Kingdom was able to finance and, to a lesser extent, arm and supply the various coalitions which opposed France. Although Britain had a much smaller population than France, its global maritime trade and its early industrialisation meant that its economy was much larger than that of France, which allowed Britain to offset the French manpower advantage.
During the American Civil War, the capacity of Northern factories and agriculture proved as decisive in winning the war as the skills of the generals of either side.
World War I
During World War I, the British Shell Crisis of 1915 and the appointment of David Lloyd George as Minister of Munitions was a recognition that the whole economy would have to be geared for war if the Allies were to prevail on the Western Front. The United States home front during World War I saw the first ring World War II.
World War II
A factor in Allied victory in World War II was the ability of Allied nations to successfully and efficiently mobilize their civilian industries and domestic populations in order to turn out weapons and goods necessary for waging war. By contrast, mobilization of economic resources in Nazi Germany was so inefficient that some early historians of the Reich's economy concluded that the Nazi leadership must have had an intentional policy of favoring civilian over military production until late in the war. The British, by contrast, had already accomplished mobilization for total war by 1940, thereby increasing the output of weapons—especially heavy bombers—vastly. This view was for example presented quite early by John Kenneth Galbraith in Fortune magazine in 1945 "The simple fact is that Germany should have never lost the war ...". According to Adam Tooze this view was influenced by the post-war reports from Albert Speer and SS Wirtschaftsführer (economy leader) Hans Kehrl, which were not free from own interests. Tooze's alternative view is that Germany was extremely mobilising - already in 1939 there was a higher degree of mobilisation of women in Germany, for example, than Britain ever achieved during the whole war -, but the economy of Germany was simply not strong enough in comparison to the economies of the war opponents, especially with respect to the ever growing support coming from the USA. Slave labour and foreign labour in addition to women's labour could not change this. Hitler was early aware of this German weakness. He hoped, however, by a series of Blitzkriegs to change the situation early enough in favour of Germany. This failed due to military defeats in Russia and the ongoing support provided by the US to Britain.
During the Nazi invasion of the Soviet Union, Soviet soldiers and civilians moved their industries out of reach of the advancing Germans (sometimes disassembling and reassembling entire factories) and began turning out vast numbers of T-34 tanks, Il-2 attack aircraft, and other weapons. | WIKI |
Wikipedia:Articles for deletion/Sultan Bahu
The result was Speedy Keep. Could also be snow, but consensus is clearly showing that this was a very dodgy nomination at best. Non-admin closure. Luke no 94 (tell Luke off here) 11:35, 12 January 2015 (UTC)
Sultan Bahu
* – ( View AfD View log Stats )
Another Punjab-related article written in an OR manner concerning a subject of dubious notability. Article creator indefinitely blocked. Pax 02:37, 9 January 2015 (UTC)
* Note: This debate has been included in the list of People-related deletion discussions. B E C K Y S A Y L E S 06:55, 9 January 2015 (UTC)
* Note: This debate has been included in the list of Pakistan-related deletion discussions. B E C K Y S A Y L E S 06:55, 9 January 2015 (UTC)
* Note: This debate has been included in the list of Religion-related deletion discussions. B E C K Y S A Y L E S 06:55, 9 January 2015 (UTC)
* Note: This debate has been included in the list of Islam-related deletion discussions. • Gene93k (talk) 13:44, 9 January 2015 (UTC)
* Keep Appropriately described in a few reliable citations.-- Bladesmulti (talk) 06:06, 10 January 2015 (UTC)
* Keep A Sufi mystic and poet still widely revered over three centuries later. The University of California Press has published a volume of English translations of his poetry. Cullen328 Let's discuss it 03:02, 11 January 2015 (UTC)
* Keep He is widely admired sufi poet in the Punjab. He has written number of books available online for reading.----Leotassawer (talk) 08:58, 11 January 2015 (UTC)
* Keep and speedy close, erroneous nomination. The article is well sourced to reliable sources, article has been edited by 180 different editors since its creation in 2005, and its creator is not blocked . kashmiri TALK 10:09, 11 January 2015 (UTC)
| WIKI |
Getting Windows ThinPC to work EXACTLY like a ThinClient....
Discussion in 'Windows Embedded' started by danielrostron, Dec 18, 2012.
1. danielrostron
danielrostron MDL Novice
Dec 18, 2012
2
0
0
Hi all, i'm new to Windows ThinPC and have been having a tinker with it these past few days.
Ive installed it onto a test machine at work but im having a difficult time making it act in the same way as a true thin client would, i.e. when the machine is turned on it auto loads up an RDP connection and takes them to a log on screen.
Ive had a look online and can't find much about it.
I've done the simple things like create an RDP file and place it in the start up folder, delete all desktop icons bar an RDP icon, auto hide the taskbar, remove 99% of things from the Start Menu so it's blank but I was just wondering if there was an easier way to do this or if there is some in built tool i'm missing that can set it up in this way, as I'd ideally like to roll it out to a lot of machines.
Things like making it so users can't accidently minimize their RDP window aswell would be handy.
Can anyone offer any help or guidance?
Thanks.
2. sebus
sebus MDL Guru
Jul 23, 2008
5,879
1,772
180
Well, use WES7 for this with policies applied
But if you must you could make RDP client being a shell
sebus
3. danielrostron
danielrostron MDL Novice
Dec 18, 2012
2
0
0
Yeh I've got Win Thin PC installed and have got the machine auto logging on with a basic domain account. I'm trying to figure out how to get a custom RDP file to act as the shell. I've only managed to get a standard MSTSC instance to act as the shell via changing the Custom User Interface group policy.
4. sebus
sebus MDL Guru
Jul 23, 2008
5,879
1,772
180
WES7 is not ThinPC (ThinPC is based on WES7)
Just do your own template with policies (want to learn what policies, then check this or this or this or this )
| ESSENTIALAI-STEM |
Page:Popular Science Monthly Volume 80.djvu/197
Rh accomplish their main purpose without excluding air or light. Smooth glazed white tile on the walls of the well and large panes of thick glass in the hoods are designed to catch and reflect every available ray of light. There is nothing dark or dingy about such a stairway and its advantages over the foul-smelling, unsanitary halls of the average tenement are too apparent to require enumeration.
The top of each stair well is covered with a pergola like that shown in Fig. 4. The pergolas have iron framework holding glass panels over the top and glass windows part way up the sides, with numerous sections which can be opened when desired. Immediately under its roof the pergola is always open for ventilating purposes, but so that neither snow nor rain can find its way into the hall.
Another feature of the open stairs hardly less interesting than those already mentioned is their intensely practical usefulness in case of fire. It is a remarkable testimonial to their value in this respect that the city officials who pass on such matters have decided that no fire-escapes are required on tenements of the open stair type. The most practical fire proof quality of the open stairs is that they are the one means of leaving | WIKI |
Pranjani
Pranjani is a village in the municipality of Gornji Milanovac, Serbia. In 1944, Pranjani was the site of Operation Halyard.
In 2019, a small wooden guest house was transfer by truck to a new location, in the churchyard, where it is planned to be reconstructed as part of traditional folk architecture. This was a big event for the local inhabitants, especially for the youngest. During 2020, the wooden church and a small guest house were reconstructed and conserved. | WIKI |
Page:Chronicles of pharmacy (Volume 2).djvu/325
iron—were intended to suggest that gold could be formed from them, the cross or spear attached being in fact the Egyptian phallus, or organ of generative vigour. In tin and lead there are evidences of the presence of silver. Perhaps more probable is the idea that these signs were originally combinations of letters—monograms, in fact, indicating the name which the planet bore in the country where the symbol was first adopted. Thus, in the sign for Jupiter,, the Greek initial for Zeus, has been traced; in that of Venus,, we have the initial of phosphorus; , has been supposed to be, and , the first and last letters of Thouros, one of the names of Mars; while represents the first and second letters of Chronos (Saturn) welded together. But the interpretation depends largely on the period when the signs were first used. Pictures preceded alphabets; they were in fact the originals of the phonetic sounds which ultimately the letters indicated.
The mysteries which made up so large a part of the science of alchemy passed from its votaries to the practitioners of physic and pharmacy, and are hardly dead in those professions yet. Pretended solutions of gold, vaunted as universal cures, were sold under the title of solar elixirs; the popular name of nitrate of silver to this day is lunar caustic; a black oxide of iron is called Ethiops martial; a solution of sugar of lead is extract of Saturn; sulphate of copper was once known as vitriol of Venus; muriate of tin was famous for the expulsion of worms under the name of Salt of Jove; and ointment of quicksilver is still universally labelled mercurial ointment. | WIKI |
Wikipedia:Articles for deletion/Gurus trilogy
The result was delete. Already deleted, just closing. Tone 15:09, 18 August 2009 (UTC)
Gurus trilogy
* ( [ delete] ) – (View AfD) (View log)
Fails WP:BAND for notability. The only mentions in Google News are for two event listings rather than articles that establish notability. Ash (talk) 10:31, 18 August 2009 (UTC)
* Speedy delete per CSD:A7. Tagged accordingly. Stifle (talk) 11:06, 18 August 2009 (UTC)
* Delete as per nom, should it not be Speedy'd -- Phantom Steve ( Contact Me, My Contribs ) 14:04, 18 August 2009 (UTC)
| WIKI |
Talk:Mariah Carey
Reference formatting
Hello all, currently this article is at WP:FARC and needs to meet current standards to retain FA status. Right now there is an inconsistent citation format as some are from named references in the references section while others use templates in-text. Can we get a consensus as to which style should be used for this article? Because of the number of references I am leaning toward named references listed in the references section and excluding templates from the body as this will make it easier to edit prose and organize things. Heartfox (talk) 05:04, 27 May 2024 (UTC)
* Not sure which to use, but personally I'm more concerned with overall credibility of refs. Getting rid of subpar citations should be a bigger priority and I saw that was mentioned in the FAR. Has that point been resolved yet? I haven't had a chance to thoroughly examine the page for them. SNUGGUMS (talk / edits) 13:19, 27 May 2024 (UTC)
Episcopalian
If she is an active Episcopalian there would be better sourcing available than a sole concert review article. Heartfox (talk) 20:12, 11 June 2024 (UTC) | WIKI |
Max Desfor, 104, War Photographer at Midcentury, Is Dead
Max Desfor, an Associated Press photographer whose image of hundreds of Korean War refugees crawling across a damaged bridge in 1950 helped win him a Pulitzer Prize, died on Monday at his home in Silver Spring, Md. He was 104. His death was confirmed by his son, Barry. Mr. Desfor volunteered to cover the Korean War for the news service when the North invaded the South in June 1950. He parachuted into North Korea with United States troops and retreated with them after forces from the North, joined by the Chinese, pushed south. He was in a Jeep near the North Korean capital, Pyongyang, when he spotted a bridge along the Taedong River that had been bombed. Thousands of refugees were lined up on the north bank waiting their turn to cross the river. “We came across this incredible sight,” Mr. Desfor said in 1997 for an A.P. oral history. “All of these people who are literally crawling through these broken-down girders of the bridge. They were in and out of it, on top, underneath, and just barely escaping the freezing water.” “My hands got so cold I could barely trip the shutter on my camera,” he said. “I couldn’t even finish a full pack of film. It was just that cold.” The Pulitzer jury in 1951 determined that Mr. Desfor’s photos from Korea had “all the qualities which make for distinguished news photography — imagination, disregard for personal safety, perception of human interest and the ability to make the camera tell the whole story.” The Pulitzer board honored his overall coverage of the war, based on a portfolio of more than 50 photos, and cited the Taedong River bridge shot in particular. Mr. Desfor was born on Nov. 8, 1913, in the Bronx and attended Brooklyn College. He joined The A.P. in 1933 as a messenger. After teaching himself the basics of photography and moonlighting as a photographer, he began shooting occasional assignments for The A.P. He became a staff photographer in the Baltimore bureau in 1938 and moved to the Washington bureau a year later. After the war Mr. Desfor was supervising editor of Wide World Photos, the A.P. photo service, and returned to Asia in 1968 to be photo chief for the region. He retired from The A.P. in 1978, then joined U.S. News & World Report as photo director. Mr. Desfor and his wife, Clara, had a son, Barry. In January 2012, when he was 98, Mr. Desfor and his longtime companion, Shirley Belasco, surprised guests by getting married at her 90th-birthday party. They had been friends since the 1980s, when the Desfors and Ms. Belasco lived in the same Silver Spring apartment building. They became a couple a few years after Mr. Desford’s first wife died in 2004. Ms. Belasco died in 2015. During the Korean War, Mr. Desfor was walking near a field when he spotted two hands, blue from cold, sticking up in the snow. The hands, which had been bound, belonged to one of several civilians who had been taken prisoner and executed, their bodies left to be covered by snowfall. | NEWS-MULTISOURCE |
TSOM
Through-Focus Scanning Optical Microscopy (TSOM) is an imaging method that produces nanometer-scale three-dimensional measurement sensitivity using a conventional bright-field optical microscope. TSOM has been introduced and maintained by Ravikiran Attota at NIST. It was given an R&D 100 Award in 2010. In the TSOM method a target is scanned through the focus of an optical microscope, acquiring conventional optical images at different focal positions. The TSOM images are constructed using the through-focus optical images. A TSOM image is unique under given experimental conditions and is sensitive to changes in the dimensions of a target in a distinct way, which is very well applicable in nanoscale dimensional metrology. The TSOM method is alleged to have several nanometrology applications ranging from nanoparticles to through-silicon-vias (TSV).
The National Institute of Standards and Technology, USA, produced a short on the TSOM method. | WIKI |
Page:Fighting blood (IA fightingblood00witw).pdf/176
look on his face. I crowd him to the ropes, and after missing two well-meant rights, I manage to sock home a left hook to the heart which makes him gasp and dive into a clinch. "How d'ye like him, Frankie?" bellers a elephant's voice over the continual roar.
Frankie don't like me at all, and he proves it by slamming away with both hands to my mid-section till the referee breaks us. One of Frankie's seconds yells for the champ to quit slugging with me and box me instead. Frankie nods and begins dancing around me, shooting that left into my face like a piston rod. I get sick of this and rush him, but he ain't there, and I nearly sprawl on my face when I miss a right swing. The attendance laughs and this steams me up. I took six left jabs from Frankie without a return to get home one right hook. The punch hit Frankie on the side of the head and turned him completely around, making the guys which was just laughing at me go insane screaming for a knockout.
But this baby knows too much for me! He clinches till his head clears, and then the smile comes back and so does the dance, and for the rest of the round he kept away, picking my punches out of the air and cutting me to pieces with that vicious left jab. It seems I just couldn't keep my face off it! At every opportunity I ripped rights and lefts to the body, but as this guy was always going away when the wallops landed they did little more than sting him. I rushed him again just before the bell, and took a straight right on the jaw that didn't do me a bit of good.
A left I couldn't hold back hit Frankie on the nose a | WIKI |
@article {HuangPR-3, author = {Huang, Rong S. and Duan, Shiwei and Bleibel, Wasim K. and Zhang, Wei and Dolan, M. Eileen}, title = {Genes contributing to etoposide-induced cytotoxicity}, volume = {12}, number = {19 Supplement}, pages = {PR-3--PR-3}, year = {2006}, publisher = {American Association for Cancer Research}, abstract = {First AACR International Conference on Molecular Diagnostics in Cancer Therapeutic Development, Sep 12-15, 2006 PR-3 Etoposide is an important chemotherapeutic agent that is used to treat a wide spectrum of human cancers. The degree to which genetic factors contribute to susceptibility to etoposide is not fully understood. We present a comprehensive genetic method that incorporates whole genome association analysis and bioinformatics to uncover genetic variants contributing to susceptibility to etoposide-induced cytotoxicity. EBV-transformed lymphoblastoid cell lines representing 30 trios of European descent and 30 trios of Yoruban descent from the International HapMap consortium were assayed for cell growth inhibition following incubation with increasing concentrations of etoposide for 72 h. Whole genome association with one-way ANOVA test was independently performed on the 60 unrelated CEPH and Yoruban cell lines. Several pathways emerged in each population with the most significant being calcium signaling pathway in both. Two genes within the calcium signaling pathway had single nucleotide polymorphisms (SNPs) significantly associated with etoposide cytotoxicity in both populations; CACNA1C a subunit of a voltage-dependent calcium channel and HDAC9, a histone deacetylase. A total of 5 SNPs and 33 SNPs were significant after additive model linear regression analysis for CACNA1C in the CEPH and Yoruban population; 14 SNPs were significant for HDAC9 in the Yoruban population. This novel method can be used to elucidate variants contributing to chemotherapeutic response.}, issn = {1078-0432}, URL = {http://clincancerres.aacrjournals.org/content/12/19_Supplement/PR-3}, eprint = {http://clincancerres.aacrjournals.org/content/12/19_Supplement/PR-3}, journal = {Clinical Cancer Research} } | ESSENTIALAI-STEM |
Kazuhisa Inao
Kazuhisa Inao (稲尾 和久) was a Japanese professional baseball pitcher. In 1957, he won 20 consecutive games. In 1958 Japan Series, he pitched six games and won 4 consecutive games after his team lost 3 games. He even hit a home run in fifth game of Japan Series. He was the Pacific League's Most Valuable Player in 1957 and 1958. He had 42 wins in 1961. Fans called his great success "God, Buddha, Inao".
In 1964, he injured his shoulder, and in 1965 came back to full-time pitching, mainly in relief. He retired as a player in 1969, and went on to manage the Nishitetsu Lions from 1970 to 1974.
He was inducted into the Japanese Baseball Hall of Fame in 1993. His number 24 was retired by the Saitama Seibu Lions on April 30, 2012.
Career statistics
* Bolded figures are league-leading
Titles and Award
* Rookie of the Year : (1956)
* Wins Champion : 4 times (1957,1958,1961,1963)
* Winning Percentage Champion: 2 times (1957,1961)
* ERA Champion : 5 times (1956–1958,1961,1966)
* Strikeout Champion : 3 times (1958,1961,1963)
* MVP : 2 times (1957–1958)
* Best Nine : 5 times (1957–1958,1961–1963)
Record
* 42 Wins (1961) (National Record, tied)
* 20 consecutive wins (1957) (National Record)
* 78 Games Played (1961) (Pacific League Record)
* 1.06 ERA (1956) (Pacific League Record, National Rookie-Year Record)
* 404 inning Pitched (1961) (Pacific League Record)
* 11 wins in single month (Aug, 1956) (National Record)
* 4 complete game in single Japan Series (1958) (Japan Series Record, tied)
* 4 wins in single Japan Series (1958) (Japan Series Record, tied)
* 11 career wins in Japan Series (tied with Tsuneo Horiuchi) | WIKI |
Jefferson Davis was born in Kentucky but grew up in Mississippi. After graduating from West Point in 1828, he served at frontier military posts and in the Black Hawk War. He resigned from the military in 1835. For the next 10 years, he managed his brother's isolated plantation in Mississippi. In 1845, he entered the world of politics as a member of the U.S. House of Representatives. Davis's reputation as a historian rests on one work - The Rise and Fall of the Confederate Government (1878-81), an account based in large measure on his own intimate experiences. Chosen by the provisional congress as president of the Confederate States of America in 1861, Davis faced criticism throughout his… tenure. After Lee surrendered without his approval, Davis was indicted by the federal government for treason. Although he spent several years in prison, he was never brought to trial. In 1867, he was released on bond, and he retired to his estate, Beauvoir, on the Gulf of Mexico in Mississippi. There he wrote The Rise and Fall to vindicate the South in general and his presidency in particular. | FINEWEB-EDU |
Page:United States Statutes at Large Volume 110 Part 3.djvu/1051
PUBLIC LAW 104-201—SEPT. 23, 1996 110 STAT. 2781 (B) for the Air Force Reserve, $52,805,000. SEC. 2602. AUTHOMZATION AND FUNDING FOR CONSTRUCTION AND IMPROVEMENT OF NAVAL RESERVE CENTERS. (a) ARMY RESERVE CENTERS.— Using amounts appropriated under the heading "MILITARY CONSTRUCTION, NAVAL RESERVE" in the Military Construction Appropriations Act, 1995 (Public Law 103-307; 108 Stat. 1661), for the construction of a Naval Reserve Center in Seattle, Washington, the Secretary of the Army may carry out a military construction project for the construction of an Army Reserve Center at Fort Lawton, Washington, in the total amount of $5,200,000, of which $700,000 may be used for program and design activities relating to such construction. (b) NAVAL RESERVE FACILITIES. — Using amounts appropriated under the heading "MILITARY CONSTRUCTION, NAVAL RESERVE" in the Military Construction Appropriations Act, 1995 (Public Law 103-307; 108 Stat. 1661), for the construction of a Naval Reserve Center in Seattle, Washington, the Secretary of the Navy may carry out— (1) a military construction project for the construction of an addition to the Naval Reserve Center in Tacoma, Washington, in the total amount of $4,200,000; (2) unspecified minor construction at Naval Reserve facilities in the total amount of $500,000; and (3) planning and design activities with respect to improvements at Naval Reserve facilities in the total amount of $500,000. SEC. 2603. UPGRADE AIR NATIONAL GUARD FACILITIES, BANGOR INTERNATIONAL AIRPORT, MAINE. (a) PROJECT AUTHORIZED. —Using amounts appropriated pursuant to the authorization of appropriations in section 2601(3)(A) and amounts appropriated pursuant to authorizations of appropriations enacted after the date of the enactment of this Act, the Secretary of the Air Force may carry out a construction project to upgrade Air National Guard base and support facilities at Bangor International Airport, Maine. The Secretary may contract for architectural and engineering services and construction design services in connection with the construction project. (b) LIMITATION ON TOTAL COST OF PROJECT. —The total cost of the construction project authorized by subsection (a) may not exceed $13,000,000. (c) FISCAL YEAR 1997 FUNDING. —Of the amount authorized to be appropriated in section 2601(3)(A), $7,000,000 shall be available to carry out the construction project authorized by subsection (a). TITLE XXVII—EXPIRATION AND EXTENSION OF AUTHORIZATIONS Sec. 2701. Expiration of authorizations and amounts required to be specified by law. Sec. 2702. Extension of authorizations of certain fiscal year 1994 projects. Sec. 2703. Extension of authorizations of certain fiscal year 1993 projects. Sec. 2704. Extension of authorizations of certain fiscal year 1992 projects. Sec. 2705. Effective date.
� | WIKI |
Trump tweets from golf club that Mitch McConnell should “get back to work”
President Donald Trump’s allies are looking at his lack of legislative success so far, and they think they’ve found the problem: Senate Majority Leader Mitch McConnell. On Thursday afternoon, the president — who is currently staying at his golf club in Bedminster, New Jersey on what he says is “not a vacation” — tweeted that McConnell should “get back to work” at passing health care, tax, and infrastructure bills. Mitch, get back to work and put Repeal & Replace, Tax Reform & Cuts and a great Infrastructure Bill on my desk for signing. You can do it! This follows a pair of earlier tweets with an even more critical tone toward the majority leader: Senator Mitch McConnell said I had "excessive expectations," but I don't think so. After 7 years of hearing Repeal & Replace, why not done? Can you believe that Mitch McConnell, who has screamed Repeal & Replace for 7 years, couldn't get it done. Must Repeal & Replace ObamaCare! All this was spurred by a statement McConnell himself made in Kentucky Monday, in response to criticisms that his Senate hasn’t done much. “Our new president has of course not been in this line of work before, and I think had excessive expectations about how quickly things happen in the democratic process,” McConnell said. Trump does not appear to have taken this comment well, and allies of his like Fox News host Sean Hannity have attacked McConnell for it too: . @SenateMajLdr No Senator, YOU are a WEAK, SPINELESS leader who does not keep his word and you need to Retire! https://t.co/BL4uf7WLM1… The president has also repeatedly tweeted in recent weeks that the Senate should get rid of the filibuster for legislation, so they can pass any bill with a simple majority. But that’s something McConnell has said the Senate will not do because “the votes simply are not there” and “it would fundamentally change how the Senate has worked for a very long time.” The first few months of Donald Trump’s presidency and unified Republican control of Washington have been downright sleepy on the legislative front, and the main reason why is the Senate — and more specifically, the legislative filibuster. Because the GOP only controls 52 Senate seats, they cannot beat a filibuster, unless they use the special limited budget reconciliation process, or unless they win the votes of at least eight Democrats. As a consequence, major conservative bill after major conservative bill has passed the House, only to go nowhere in the Senate — hamstringing Republicans’ ambitions for sweeping legislative change. And with the failure of the health bill to even get a majority, the president’s hopes to rack up a series of major accomplishments are fading away. Now, McConnell did eliminate the filibuster for Supreme Court nominations earlier this year. But that was widely expected, and he appears to be correct that he doesn’t currently have the votes to eliminate the legislative filibuster, despite what Trump might want. The U.S. Senate should switch to 51 votes, immediately, and get Healthcare and TAX CUTS approved, fast and easy. Dems would do it, no doubt! Still, McConnell could start trying to lay the groundwork for doing so and making the case for it — and he very conspicuously isn’t. And Trump supporters are noticing. Longtime followers of Republican congressional dysfunction may be getting some déjà vu here, recalling how a small group of critics on the right forced House Speaker John Boehner from office. Yet that’s far tougher to pull off in the Senate, because there’s a difference in how party leaders in each chamber are chosen. The speaker of the House is elected by the full House of Representatives. Therefore, to win the position on the first ballot, a candidate generally needs overwhelming support from his or her own party (because the opposition party will vote against him or her). As a result, a small group of defectors from the speaker candidate’s own party could block him or her from winning a majority. The Senate Majority Leader, in contrast, is chosen in a closed-door, partisan election. Only Republicans vote in it. That means that a handful of defectors can’t humiliate McConnell in a leadership election on the floor — instead, over half of his GOP senators would have to turn against him in private. If Trump supporters really want to oust McConnell, their best chance would probably be in 2020, when he’s up for reelection in Kentucky (where Trump is very popular) and therefore could be vulnerable to a primary challenge. Though McConnell easily fended off a challenge in 2014, the president could potentially make it much harder for him next time. However, Trump does have some powerful incentives to maintain good relations with McConnell. If he hopes to get his nominees confirmed or get anything at all done legislatively, he really does need the leader. That may be one reason why he just endorsed McConnell’s preferred candidate, Luther Strange, for next week’s special election to fill Jeff Sessions’s Senate seat — leaving two other challengers trying to position themselves as the true Trump candidate in the lurch. But the president is clearly unhappy with the failure of his top legislative priority, and he wants to make his unhappiness known. | NEWS-MULTISOURCE |
jwage/purl
URL Manipulation for PHP 5.3
v0.0.7 2016-03-05 16:40 UTC
README
Purl is a simple Object Oriented URL manipulation library for PHP 5.3+
Build Status Scrutinizer Quality Score Code Coverage Latest Stable Version Total Downloads Dependency Status
Installation
The suggested installation method is via composer:
composer require jwage/purl
Using Purl
Creating Url instances is easy. You can specify the URL you want, or just use the current URL:
$url = new \Purl\Url('http://jwage.com');
$currentUrl = \Purl\Url::fromCurrent();
You can also create Url instances through the static parse method if you prefer that style:
$url = \Purl\Url::parse('http://jwage.com');
One benefit of using this method is you can chain methods together after creating the Url:
$url = \Purl\Url::parse('http://jwage.com')
->set('scheme', 'https')
->set('port', '443')
->set('user', 'jwage')
->set('pass', 'password')
->set('path', 'about/me')
->set('query', 'param1=value1¶m2=value2')
->set('fragment', 'about/me?param1=value1¶m2=value2');
echo $url->getUrl(); // https://jwage:password@jwage.com:443/about/me?param1=value1¶m2=value2#about/me?param1=value1¶m2=value2
// $url->path becomes instanceof Purl\Path
// $url->query becomes instanceof Purl\Query
// $url->fragment becomes instanceof Purl\Fragment
Path Manipulation
$url = new \Purl\Url('http://jwage.com');
// add path segments one at a time
$url->path->add('about')->add('me');
// set the path data from a string
$url->path = 'about/me/another_segment'; // $url->path becomes instanceof Purl\Path
// get the path segments
print_r($url->path->getData()); // array('about', 'me', 'another_segment')
Query Manipulation
$url = new \Purl\Url('http://jwage.com');
$url->query->set('param1', 'value1');
$url->query->set('param2', 'value2');
echo $url->query; // param1=value1¶m2=value2
echo $url; // http://jwage.com?param1=value1¶m2=value2
// set the query data from an array
$url->query->setData(array(
'param1' => 'value1',
'param2' => 'value2'
));
// set the query data from a string
$url->query = 'param1=value1¶m2=value2'; // $url->query becomes instanceof Purl\Query
print_r($url->query->getData()); //array('param1' => 'value1', 'param2' => 'value2')
Fragment Manipulation
$url = new \Purl\Url('http://jwage.com');
$url->fragment = 'about/me?param1=value1¶m2=value2'; // $url->fragment becomes instanceof Purl\Fragment
A Fragment is made of a path and a query and comes after the hashmark (#).
echo $url->fragment->path; // about/me
echo $url->fragment->query; // param1=value1¶m2=value2
echo $url; // http://jwage.com#about/me?param1=value1¶m2=value2
Domain Parts
Purl can parse a URL in to parts and its canonical form. It uses the list of domains from http://publicsuffix.org to break the domain into its public suffix, registerable domain, subdomain and canonical form.
$url = new \Purl\Url('http://about.jwage.com');
echo $url->publicSuffix; // com
echo $url->registerableDomain; // jwage.com
echo $url->subdomain; // about
echo $url->canonical; // com.jwage.about/
Staying Up To Date
The list of domains used to parse a URL into its component parts is updated from time to time. To ensure that you have the latest copy of the public suffix list, you can refresh the local copy of the list by running ./vendor/bin/pdp-psl data
Extract URLs
You can easily extract urls from a string of text using the extract method:
$string = 'some text http://google.com http://jwage.com';
$urls = \Purl\Url::extract($string);
echo $urls[0]; // http://google.com/
echo $urls[1]; // http://jwage.com/
Join URLs
You can easily join two URLs together using Purl:
$url = new \Purl\Url('http://jwage.com/about?param=value#fragment');
$url->join('http://about.me/jwage');
echo $url; // http://about.me/jwage?param=value#fragment
Or if you have another Url object already:
$url1 = new \Purl\Url('http://jwage.com/about?param=value#fragment');
$url2 = new \Purl\Url('http://about.me/jwage');
$url1->join($url2);
echo $url1; // http://about.me/jwage?param=value#fragment | ESSENTIALAI-STEM |
Health Benefits Of Chiropractic Therapy
No one wants to go through each day feeling sore and uncomfortable. Most people deal with pain throughout their bodies on a daily basis. There are many ways to deal with the pain and most rely on prescriptions and over-the-counter medicines to get through their days. However, for those that want to take a more natural approach to feeling better, they should consider chiropractic therapy. There are many great benefits of seeing a chiropractor in Seffner FL, such as the one found at www.bcachiropractic.com. Below are some of the main health benefits to consider.
Lower Blood Pressure
One key benefit of getting regular chiropractic adjustments is that it can help to lower your blood pressure. Studies have show it to be just as effective as many medications. High blood pressure is something that needs to be taken care of. Without help, it can lead to anxiety, fatigue and nausea. For those who suffer from too low of blood pressure, getting chiropractic therapy can also help to raise it.
Sciatica
A lot of people suffer from sciatic pain. It is a pain caused by pressure on the nerves at your spine. It can radiate from your lower back down through your legs and feet. While pain medicine and surgery are often used to treat sciatica, chiropractic therapy offers a non-invasive approach to relieving this type of pain. Adjustments from a reputable chiropractor can help alleviate some of the pressure on your sciatic nerve and help to reduce the pain or take it away completely.
Reduction Of Inflammation
One of the main causes of pain in your joints is from inflammation. When someone suffers from chronic inflammation, they will be at a higher risk for things like cancer, heart disease and ongoing pain symptoms. Getting regular adjustments from a trustworthy chiropractor can help to reduce the amount of inflammation you have in your body. This can help with lower back pain, joint pain and can improve muscle tension.
These are just a couple of the top health benefits you can get from getting chiropractic adjustments. The amount of total benefits you can get are many. This type of therapy is one to consider before more invasive treatments such as surgery.
You may also like | ESSENTIALAI-STEM |
Talk:Shot/reverse shot
Untitled
I'm not sure about this language.
The way I've always seen it written, the sequence you describe is: shot--point-of-view shot--reaction shot.
A reverse angle, on the other hand, is a view from a camera set up 180 degrees opposite the initial one. You might have the camera behind a man as he walks towards the exit of a tunnel, then cut to a frontal shot of him as he steps into the sunlight.
What you're describing maybe some third thing, or maybe just another way of talking.
* Well if it's inaccurate, why not change it? I just moved the material from Shot Reverse Shot; I don't necessarily vouch for it. --KQ
Yeah, my way-too-many-film-theory-classes also says that shot reverse shot is closer to what you're saying, and that the definition here is something else entirely. So I'm gonna go ahead and change it! Luvcraft 22:22, 20 Oct 2004 (UTC)
Shot-Reverse Shot
I do believe there should be a hyphen in this term... --Jeremy Butler 13:07, 15 February 2006 (UTC) | WIKI |
USS Yacona (SP-617)
The auxiliary patrol vessel USS Yacona (SP-617) was built in 1898 in Scotland as a civilian steam yacht of the same name. Later, she was renamed Amélia as a survey yacht of the King of Portugal, before reverting to Yacona in 1901. She was acquired by the U.S. Navy in September 1917 and served until 1919 as a patrol vessel in the western Atlantic. In 1921 she was transferred to the Philippines as the governmental yacht Apo, serving until 1932.
Private yacht
Yacona was built as a private yacht of that name in 1898 by John Scott and Company at their Abden Shipyard, Kinghorn, on the Firth of Forth, Scotland for Walter S Bailey of Kingston upon Hull, Yorkshire. She was a three-masted schooner-rigged steam yacht with a steel hull, measured at and 635 tons Thames Measurement. Her length overall was 188.6 ft, with a beam of 27.2 ft and depth of 13.8 ft. Her single propeller was powered by a 900 ihp triple expansion steam engine also made by Scott, at their engine works at Kirkcaldy.
Bailey was a prominent Hull shipowner, through Bailey & Leetham Ltd, and commodore of the Royal Yorkshire Yacht Club. On 18 July 1898 Scott's Yard number 102 was named Yacona and launched, as was their custom, with "steam up", departing immediately to Burntisland to prepare for sea trials. The final acceptance trials were held on 9 August 1898, when a maximum speed over the measured mile of 14 kn was achieved, though her regular service speed was 12.5 kn. She arrived in Hull the following day, after 17 hours steaming.
The yacht was not kept by Bailey for long, as he sold her in April 1899 to D. Carlos, King of Portugal for the latest of his oceanographic cruises, pursuing his interest in marine science and navigation. As with the other three yachts acquired for similar purposes in other years, the King renamed the new Royal Yacht Amélia. In 1901, when he purchased his fourth Amélia, the King sold her predecessor to British yacht broker Gustavus Pratt who reverted her to the name Yacona, and sold her the following year to Henry Clay Pierce of St. Louis, Missouri. He was the wealthy president of St. Louis-based petroleum products distributor Waters-Pierce Oil Company, an associate of Standard Oil.
World War I
The United States Navy acquired the yacht at New York City on 29 September 1917, inspecting her at Shewan Shipyard. On the same day (10 October) that that yard estimated that the alterations necessary to fit the ship out as an armed patrol vessel could be completed by 1 November, the Navy ordered her to proceed to Boston where the previous owner's own workmen could remove the pleasure craft's interior woodwork. Yacona got underway on 12 October from the Shewan yard, but grounded in the channel at New York's Hell Gate. Taken to the New York Navy Yard for minor repairs, the ship ultimately made the shift to her original destination (Boston), and fitted out at the Boston Navy Yard. Assigned the designation SP-617 and regarded as "one of the strongest and best built vessels of her size…that will make a most serviceable vessel", Yacona was commissioned on 10 December 1917.
Yacona put to sea early on 20 December 1917 and anchored off Provincetown, Massachusetts, later that day. The next day, she test-fired her main battery, firing four rounds from each 3-inch gun and 50 rounds from each Colt machine gun, and "found same to be in good working order". The converted yacht returned to the New York Navy Yard three days before Christmas, and remained there into February 1918, a period punctuated by one brief interval underway, when the ship got underway, assisted by tug USS Mariner (SP-1136), to proceed to the waters off Tompkinsville where she anchored overnight (29 to 30 January 1918).
Yacona departed the New York Navy Yard shortly before the end of the forenoon watch on 6 February 1918 in company with Mariner and the converted yacht USS Wadena (SP-158), bound for New London, Connecticut. The ships proceeded through increasingly heavy ice floes that impeded their progress the following day as they neared their destination, Yacona having to take Wadena in tow at one point when ice damage compelled Mariner—which had twice extricated Wadena from the floes—to stop to effect temporary repairs. Eventually, by maneuvering at various courses and speeds, Yacona managed to push through the ice and reach her destination, dropping anchor late in the first watch on 7 February. She got underway from New London on 22 February, then passed up Narragansett Bay, and reached the U.S. Naval Coaling Station, Melville, Rhode Island, that afternoon. Pausing briefly at Newport, the next day, she then cast off from alongside Wadena and put to sea, bound for Bermuda during the morning watch on 24 February.
Yacona, steaming in company with Wadena, Mariner, and the tug USS Lykens (SP-876), then rendezvoused with a convoy of eleven submarine chasers soon thereafter; the French tug Mohican brought up the rear. As the convoy worked its way down the eastern seaboard, however, it encountered a heavy southwesterly gale that sprang up on 26 February 1918. A half-hour before the end of the forenoon watch, heavy seas carried away part of the bulwarks on the starboard bow, and smashed in the ports on the starboard side of Yacona's deck house, flooding her pay office and radio room. Later that day, the ship developed a leak that inundated some of her bunker spaces and flooded the fireroom to a depth of one foot. Heavy seas pounded her smaller consort Mariner, too, opening her seams. After that tug’s pumps failed, rising water put out her boiler fires; powerless, she had to be abandoned, Wadena rescuing her entire crew. Yacona reduced speed in the gale, and the next day took submarine chaser USS SC-256 in tow. Yacona's quartermaster noted that during the afternoon watch on 27 February, the task of removing water from the fireroom bilges occupied all hands.
Reaching Bermuda on 1 March 1918, Yacona, whose crew discovered hundreds of pounds of water-damaged rations ranging from staples like sugar and flour to potatoes and pork sausage that had to be disposed-of as the result of the storm, remained there into April, undergoing needed voyage repairs. She sailed on the morning of 8 April 1918 to escort a convoy that consisted of two U.S. Army tugs, Cadmus and Seminole, the tanker USS Chestnut Hill (ID-2526), the destroyer tender USS Leonidas (AD-7), and submarine chasers USS SC-143, USS SC-147, USS SC-179, USS SC-227, USS SC-338, and USS SC-95. En route to the Azores, Yacona conducted gunnery and general quarters drills and made part of the passage under sail to conserve coal. She and her convoy stood in to Ponta Delgada on the morning of 22 April; the yacht moored alongside the Russian bark Montrosa. After coaling ship, Yacona headed for Bermuda on 4 May, in company with Wadena and the fuel ship USS Arethusa (AO-7), and made port at Hamilton ten days later.
Yacona made one more round-trip voyage to the Azores and back, escorting a group of six submarine chasers, the cruiser USS Salem (CL-3) and the Naval Overseas Transportation Service tanker USS John M. Connelly (ID-2703) eastbound and returning westbound in company with old consort Wadena and the tugs USS Arctic (SP-1158), USS Goliah (SP-1494), and USS Undaunted (SP-1950) on 20 June 1918. After engine repairs at the British dockyard there and having her hull painted, she departed Bermuda on 9 July in company with the minesweeper USS Comber (SP-344) and the tug USS Mojave (AT-15) and headed for New London, with U.S. Vice Consul to Switzerland Louis Lombard and his son embarked for transportation "to [the] next port…”
Yacona reached New London on the afternoon of 12 July 1918 and disembarked her passengers. She then spent the next several weeks undergoing voyage repairs, first at the New York Navy Yard, from 19 to 25 July, and then at Tietjen and Lang's Dockyard, Hoboken, New Jersey, from 25 July to 27 August. She shifted to New London (28–30 August), then sailed for Charleston, South Carolina. One day out of New London, she went to general quarters early in the mid watch on 31 August and trained her guns on a "suspicious object". The dark shape, however, quickly disappeared from sight in the thick haze and the ship's own smoke. Then, after voyage repairs at Charleston (2–6 August), she put to sea as escort for a convoy of three 110 ft submarine chasers assigned to the French Navy: USS SC-365, USS SC-366, and USS SC-367. Reaching Bermuda on 10 September, she sailed five days later for the Azores in company with cruiser USS Chicago (1885) and tugs Arctic and Goliah and a covey of submarine chasers, and arrived at her destination on 27 September. As the converted yacht prepared to sail from Ponta Delgada on 2 October, however, her port anchor fouled the mooring gear. To "expedite matters and join the convoy" then sailing for Hamilton, she slipped the anchor and 15 fathom of chain. Less thand a half-hour into the first dog watch on 9 October, while steaming in company with Chicago, Arethusa, Goliah, Arctic and Undaunted, the yacht spotted another "suspicious object" on the surface and went to general quarters. She commenced firing three minutes later but, after identifying her target as a drifting buoy, ceased fire.
Yacona arrived back at St. George's Harbour, Bermuda, on 12 October 1918; departed those waters on 5 November, bound for New York. Making the initial leg of the voyage in company with the tug Iroquois and her tow, the freighter Seguranca, the yacht arrived at the New York Navy Yard on 11 November 1918, the day that the armistice ended World War I.
Post-war service
Yacona was next attached to Division 3, Battleship Force 1, United States Atlantic Fleet, Yacona departed Boston on 10 December 1918, transited the Cape Cod Canal on 11 December, and anchored off the mouth of the York River on 13 December on account of heavy fog. The following day, she shifted her anchorage upriver and, on 15 December, briefly embarked Rear Admiral Thomas Washington, commander of the battleship division to which the ship had been attached, when he came on board from his flagship, USS Rhode Island (BB-17). After moving to Hampton Roads the day after Christmas of 1918, Yacona sailed for New York in company with converted yacht USS Aramis (SP-418). The two ships arrived off Tompkinsville on 13 January 1919. Yacona then got underway for New London two days later, arriving there on 16 January.
Placed in the Reserve Squadron, Antisubmarine Squadron in Training, in January 1919, Yacona remained at New London into June, principally in a succession of berths alongside the State Pier there. She departed New London on 13 June and arrived at the New York Navy Yard on 16 June to unload her ammunition and have her guns removed. On 26 June 1919, the converted yacht was decommissioned and placed in reserve at the New York Navy Yard. On 22 April 1920, the Navy decided to sell the vessel but, on 14 September, cancelled the sale order.
Taken out of reserve and recommissioned on 11 October 1920, Yacona remained at the navy yard into February 1921, being cleaned and painted preparatory to a voyage to the Far East. Upon completion of her overhaul, she departed New York on 1 March and proceeded to Bermuda, utilizing sails for part of the passage to conserve coal. After calling at Hamilton from 5 to 14 March, Yacona pressed on across the Atlantic, visiting Ponta Delgada from 24 to 29 March and reaching Gibraltar on 3 April. She remained at that British bastion for almost a month, weighing anchor on the 28th and heading for Malta on the next leg of her passage to the Orient. While at Malta from 3 to 8 May, Yacona full-dressed ship in honor of the anniversary of the accession of King George V to the throne of England and, along with all other ships and batteries in the harbor, fired a 21-gun national salute at noon on 6 May to celebrate the event. Yacona stood out of Grand Harbour, Valletta, on 8 May 1921, bound for Egypt.
After provisioning at Port Said on 12 May, Yacona transited the Suez Canal the next day and proceeded to Aden arriving a week later, on 20 May. There, Yacona took on fresh water and coal, and sailed during the first watch the same day. However, a board of investigation convened during the mid watch on 21 May determined that the quantity of coal she had received had proved to be of inferior quality, and she put back into Aden soon thereafter, where LT George M. Snead (SC), Yacona's supply officer went ashore to confer with representatives of Cory Brothers. A representative of Cory Brothers visited the ship shortly after LT Snead returned, remaining on board for only a quarter of an hour, long enough, apparently, to confirm the Americans' complaint. She shifted berths the following day and a tug brought two lighters alongside for the laborious and dirty task of un-coaling ship, a process that lasted from the afternoon watch on 22 May to the forenoon watch the following day – the bad coal was later taken out to sea and dumped.
Yacona resumed her eastward voyage on 23 May and arrived at Bombay, India, on 1 June. There, she coaled and once again dressed-ship, this time for the King's Birthday on 3 June. The ship departed that port the next day. After calling at Colombo, Ceylon, from 9 to 24 June and at Singapore from 3 to 7 July, where she "full-dressed ship in honor of American independence" on 4 July, Yacona stood into Manila Bay on 14 July, assisted to her berth in Cavite harbor by the tug Tamarao, her voyage from the eastern seaboard of the United States completed.
Shifting from Cavite to the Coast Guard Dock, Engineer Island, Manila, on the morning of 16 July 1921, Yacona was decommissioned on 27 July 1921 and turned over to representatives of the Insular Government of the Philippine Islands.
Philippines Government
On transfer to the Philippines as a yacht for use of the Governor-General, Yacona was renamed Apo. She was used principally for inspection voyages within the Philippines. In 1932 the yacht was returned to the United States Government and not replaced until 1936. | WIKI |
User:LiamVictor
Wikipedia did not have a page for the User:LiamVictor. This is a place holder for that page. | WIKI |
Paul Polman: Unilever CEO retires after 10 years
London (CNN Business)Unilever CEO Paul Polman is retiring at the end of the year after a decade in charge of one of the world's biggest consumer goods businesses. Polman is stepping down after losing a bruising fight with shareholders over his plan to move the Anglo-Dutch company's headquarters out of the United Kingdom. Unilever (UL) , which owns brands including Dove, Lipton and Ben & Jerry's, had argued that switching to a single head office in Amsterdam would simplify its structure and give it more flexibility to buy or sell brands. But some big investors objected and the plan was dropped. The decision to ditch the relocation was viewed as a blow to executives including Polman, who initiated the review of the company's structure last year after brushing off a takeover attempt from Kraft Heinz (KHC). Unilever touted the success the company has enjoyed under Polman's leadership, saying it had delivered total shareholder returns of 290% during his tenure as CEO. Andrew Wood, an analyst at Bernstein, said Polman deserved credit for introducing changes that made Unilever highly competitive. "Polman has been an exceptionally good CEO of Unilever," Wood wrote in a research note. "It is sometimes worthwhile taking time to remember just how poorly managed and perceived Unilever was in 2008." But the CEO had alienated some investors by focusing on sustainable living in recent years, he added. In 2016, Polman argued in an opinion piece for CNN that companies should make sustainable development part of their core mission. Polman will be succeeded by Alan Jope, the current head of the group's beauty and personal care business. Jope is a Unilever (UL) veteran, having joined its marketing department in 1985. He previously ran the company's north Asia business, and served as president of its operations in Russia, Africa and the Middle East. He also spent a decade in senior roles in the United States. Bernstein's Wood said that Jope had been considered the favorite to take over from Polman. "Jope is a high quality internal candidate who should be capable of continuing on with Polman's good work," he added. | NEWS-MULTISOURCE |
In the Revolution of 1688, also called the Glorious Revolution, William III replaced James II as King of England. William of Orange invaded England from the Netherlands and ruled along with James’ daughter, who became Mary II. Because King James was Catholic, the possible return of England to Catholic control had seemed likely; William and Mary were Protestant. Violent conflicts occurred from November 1688–February 1689, until William and Mary were finally installed as joint monarchs following several parliamentary votes against them and were pursuant to the adoption of a Bill of Rights that included some limits on royal power. In addition to making England officially a Protestant country, their ascension had immediate repercussions in Scotland and the North American colonies.
One lasting legacy, through the adoption of the Bill of Rights, was that England became a constitutional monarchy. Numerous aspects of the English Bill of Rights were incorporated into the later American version. Another more immediate result in North America was the collapse of the Dominion of New England; in the 1689 Boston Revolt, Governor Andros was removed with support from a provincial militia. In New York, the acting administrator, General Nicholson, formerly Andros’ Lieutenant Governor, was removed in Leister’s Rebellion which persisted for two years. The government of Province of Maryland, then a predominantly Catholic colony, similarly was overthrown. Overall, the chaotic situation in England proved advantageous to Americans who favored self-governance and allowed them to make inroads that influenced the independence movement in the next century. | FINEWEB-EDU |
What is Azure Site Recovery Step by Step
0
159
Azure Site Recovery is a disaster recovery service that protects on-premises VMware and Hyper-V virtual machines and physical servers. It includes a configuration server, process servers, and master target servers.
In the Azure portal, create a new Recovery Services vault. Provide a name for the vault and choose a resource group.
Configuration
Azure Site Recovery is a disaster recovery solution that lets you replicate your critical VMware and Hyper-V workloads to the cloud. It can also protect physical servers. This solution from Microsoft enables you to keep your business-critical data offsite and provides continuous replication to minimize the time to recovery for applications. To help you meet your RTO and RPO objectives, Azure Site Recovery uses a process server, master target server, and a failover policy. It also encrypts data in transit and at rest to protect your data from unauthorized access.
With Azure Site Recovery, you can implement a comprehensive business continuity and disaster recovery (BCDR) plan for your organization. It replicates virtual machines and physical servers hosted on a variety of platforms to the Azure cloud, and can also move them from one region to another. It can even replicate between a single zone in an availability zone in the same region. Its architecture is based on Azure Traffic Manager, Azure Virtual Network, and Azure Active Directory.
Backups
Azure Site Recovery is an industry-leading Disaster Recovery as a Service (DRaaS) solution that enables you to quickly recover your on-premises and cloud workloads with minimal downtime. It combines backup, replication, failover, and recovery to allow you to keep critical applications running in the event of an outage.
A key component of ASR is its backup process, which replicates data to a secondary location. You can replicate data continuously or on a schedule, depending on your needs. ASR also offers the ability to revert to previously saved backups, allowing you to restore your environment from any point in time.
When using ASR, you must ensure that your backup VMs have enough storage space for the entire duration of the restore process. In addition, you should be aware that restoring a VM takes queue time and transfer time. This is a key consideration when determining how often you need to back up your VMs. You will also need to determine your budget for ASR, including protection and compute prices for the VMs.
Replication
The replication process is the heart of the azure site recovery step by step solution. It creates a copy of your business-critical workloads and stores it offsite in an Azure backup region to protect against failure. Replication is designed to meet your RPO and RTO goals without impacting your production environment.
To configure replication, start by creating a Recovery Services vault. This vault contains the settings of how replication will occur and monitors it as it happens. You can create a vault for Hyper-V or VMware virtual machines, physical VMs, or both.
During the creation process, you can specify your replication settings, including the target Azure region and storage account. You can also use the recovery services vault to monitor replication jobs and to check that your disaster recovery environment is ready for a failover event. You can also perform a test failover to simulate the failover process without impacting your production environment. Additionally, you can monitor replication health and performance and provide regular disaster recovery training to ensure that your team is prepared for a disaster.
Failover
Azure Site Recovery (ASR) is a cloud disaster recovery solution that helps you to protect on-premises physical and virtual Windows and Linux workloads by replicating them to another location. It also allows you to test your Disaster Recovery plans without disrupting production environments. This way, you can be sure that your business can continue to operate after a disaster.
To use ASR, you need to create a Recovery Services vault, which contains the settings for replication and monitoring. Once you have created a vault, you can enable replication to create an up-to-date copy of your data in another region or availability zone.
This can be a cost-effective option for small businesses because you only pay for the resources that you use when the replication is active. It can also be integrated with other services in Azure that help you to automate your Disaster Recovery readiness plan. This includes Traffic Manager, Azure Active Directory, Virtual Network, and VPN Gateway — all of which run in high-availability environments that are patched and supported by Microsoft.
LEAVE A REPLY
Please enter your comment!
Please enter your name here | ESSENTIALAI-STEM |
Dark Alliance: Vancouver
Dark Alliance: Vancouver is a tabletop role-playing game supplement published by White Wolf Publishing in October 1993. It is part of the World of Darkness series, and is intended to be used with the games Vampire: The Masquerade and Werewolf: The Apocalypse.
Contents
Dark Alliance: Vancouver details the tribes of werewolves found in Vancouver, and their war with the local vampires. If the gamemaster desires, this sourcebook can be used as a crossover between Werewolf: The Apocalypse and Vampire: The Masquerade.
The book also covers the city of Vancouver, and includes an 11-page scenario, "War and Peace", which sets up a civil war between werewolves and vampires.
Production and release
Dark Alliance: Vancouver was designed by Nigel Findley and Geoff McMartin, with illustrations by Jeff Rebner, Dan Smith, and Joshua Gabriel Timbrook, and cover art by Tony Harris. The book was released by White Wolf Publishing in October 1993 as a 125-page softcover book, and reprinted in 1996 as part of the second volume of Rage Across the World, a line of Werewolf: The Apocalypse compilations, together with Rage Across Australia. Both the stand-alone version and the compilation have since been re-released as e-books.
Reception
Rick Swan of Dragon was not a fan of the book. Although he liked the section on the area tribes, "Too much of the book, however, looks like it was cranked out by the Department of Tourism, a dreary run-down of hotels, nightclubs, and landmarks whose descriptions rarely rise above the superficial [...] Little of this is told from a Garou’s perspective, and most of it’s available in any good reference book, so what’s the point?" Swan also wasn't sure about the cross-over aspect of the book, wondering how the referee would simultaneously handle a group of werewolves in one part of the city and a group of vampires in another part of the city. "What's Group A supposed to do while the referee is busy with Group B?" | WIKI |
Integrating with Google APIs: Tips and Tricks, Part 1
Integrating with Google APIs: Tips and Tricks, Part 1
Google has more publicly accessible APIs than probably any other software company worldwide. Here's a list of more than 250 Google APIs. We help our customers connect their B2B SaaS products with several of these, including Google Analytics, Gmail, Google Calendar, Google Sheets, Google Cloud Pub/Sub, and more.
We are visiting again with Taylor Reece, a Developer Advocate at Prismatic, to discuss some tips and tricks for developers who need to work with Google APIs. In future discussions, we'll drill down into certain APIs, but this will be an overview of the broader Google API ecosystem.
Bru: Taylor, when we talk about the Google API ecosystem, what is it?
Taylor: Google has perhaps the most complex API ecosystem of any vendor. It has hundreds of APIs, both those that connect with common end-user apps like Gmail and Google Docs as well as special use APIs (such as Google Cloud Pub/Sub) and others such as Google Cloud BigQuery. In some cases, Google has built these systems (including the APIs) from scratch. In other cases, they've bought systems from third parties and reworked the API. Google Analytics is an excellent example of a product Google bought and then substantially reworked.
Bru: Are there some common first steps for devs that need to work with Google's API ecosystem?
Taylor: The first thing you will need is a Google Cloud Platform (GCP) account. You can spin one up for free at https://cloud.google.com. The developer console available in GCP is your gateway to all of Google's APIs, OAuth, and more.
Some of Google's APIs are enabled by default for your account. For others, you may need to search for the service. For example, search for "Google Calendar API" in the developer console, and then click "Enable API."
Once your account is set up and the APIs you require are enabled, head over to the "OAuth consent" page and "Credentials" dev console pages. There, you can add test users for your app, create OAuth 2.0 credentials, service accounts, etc. – everything you need to test your integration as you build it.
Bru: How consistent is Google's approach to APIs across its ecosystem?
Taylor: As you might imagine, there is some variation between Google APIs. Some of this is due to how well an API worked or how mature it was before Google bought it. But some of the variations are because Google is so big that different development teams have different approaches. One example of how things differ across the ecosystem is the inclusion of webhooks for the various systems.
Bru: Would you expand on that? Webhooks are a pretty standard way of sending data updates. How does Google handle them?
Taylor: First, let's define a webhook. A webhook is triggered by an event, resulting in a payload being delivered to an endpoint. For example, a file in Google Drive is modified. The "file modified" event causes an HTTP payload to be sent to an endpoint that you own so you can act on the change. It's a simple way to get immediate notifications of changes.
Webhook implementation varies across Google products. Some have built-in webhook support, others rely on a function that you poll for changes, and others leverage Google Cloud Pub/Sub to notify subscribers of changes.
Need to learn more about webhooks?
Need to learn more about webhooks?
See what webhooks are, how they connect systems, and how our customers use them with Prismatic.
Read more
Bru: Would you help us understand the difference between webhooks and Pub/Sub?
Taylor: Sure. Let's look at two common Google APIs:
When you create a webhook in Google Drive, you instruct Google to notify an endpoint of your choice whenever a change occurs in Drive (maybe a file is updated, created, deleted, etc.). When you receive a notification of the change, though, the notification doesn't include the change that occurred. You then need to reach out to the Google Drive API with a request saying, "The last time I asked for a list of changes, you provided me thus-and-such change token; what changes have occurred since then?" One catch with Google Drive is that you must renew your webhook configuration weekly or daily, depending on the events you're listening for.
Google's Gmail service, on the other hand, leverages Google's Pub/Sub service, which is a full-blown messaging/queuing service. As such, it's more complicated and powerful than webhooks. It requires a publisher (in this case, Gmail), topic (where the messages are stored), and subscription (how data should get to your app). Unlike a simple webhook, Pub/Sub brokers the data instead of passing it from the app to the endpoint. And it can be set up with either a push or pull subscription. A good, detailed explanation of Pub/Sub can be found here.
And, not to confuse matters, a push-type subscription in Pub/Sub can also be a webhook for your app.
Bru. OK. So Google came up with its own message broker that serves the same purpose as webhooks and even supports webhooks in certain instances. But what does that mean in practice? Do all Google products use Pub/Sub for messaging?
Taylor: No. Gmail requires Pub/Sub, but many other Google services can be configured to send messages directly to your API. They can all use Pub/Sub as a message broker, which is handy if you need to notify multiple subscribers that a specific event occurred. Pub/Sub allows you to write a message to a Pub/Sub topic once, and it then publishes notifications to all subscribers of that topic.
Bru: Let's talk a bit about versioning APIs. What are industry best practices?
Taylor: The technology that underlies APIs is always changing. For example, API security needs are constantly under review. So, it makes sense that APIs must be upgraded and versioned (if the upgrade is substantial enough). When this happens, most vendors think about how they can make their latest version backward compatible, so it doesn't break all the apps and services connected to the prior version of the API. New versions of APIs are often not 100% backward compatible, but they usually manage to be backward compatible with the critical functionality that most developers are using.
Bru: Somehow, I'm guessing that Google does things differently.
Taylor: Yes. Google takes a different approach than most other vendors. It is common for specific versions of Google APIs to be deprecated in as little as two or three years, and sometimes even faster than that. In some cases, this makes sense – such as when a major security issue has been discovered. But in many cases, these deprecations don't seem to make sense to the broader community. And Google does not always ensure backward compatibility with new versions of APIs.
Bru: So Google isn't greatly concerned about backward compatibility with its APIs. Do you know why that is?
Taylor: Well, maintaining backward compatibility takes a truckload of development time. And Google has a lot of APIs. Given Google's absolute dominance in several markets, it's not as though devs will stop using Google APIs because the latest version broke backward compatibility. I'd say that most devs have just learned that it's something they must deal with when using Google APIs. However, our embedded iPaaS can make staying current with Google API releases much easier for your devs. We keep our API connectors up to date with the latest versions of Google APIs, so our customers don't need to.
Bru: And that brings us to the end of Part 1 of using Google APIs for integrations. Thank you, Taylor. We'll get into more Google API details in Part 2.
Schedule a demo to see how Prismatic makes it easy to use Google APIs to build integrations with your B2B SaaS product.
About Prismatic
Prismatic is the integration platform for B2B software companies. It's the quickest way to build integrations to the other apps your customers use and to add a native integration marketplace to your product. A complete embedded iPaaS solution that empowers your whole organization, Prismatic encompasses an intuitive integration designer, embedded integration marketplace, integration deployment and support, and a purpose-built cloud infrastructure. Prismatic was built in a way developers love and provides the tools to make it perfectly fit the way you build software.
Get the latest from Prismatic
Subscribe to receive updates, product news, blog posts, and more. | ESSENTIALAI-STEM |
All that you need to know about a heating mantle
A heating mantle, as the name suggests, is a piece of equipment used in chemistry & biology laboratories for heating and stirring operations. The equipment precisely fits the boiling and distillation flask with a round bottom providing consistent and controllable heating. Using a heating mantle is a relatively safe way for heating organic liquids. Organic liquids have a tendency to burst when exposed to direct heat. A mantle avoids such dangers with its enclosed heating systems.
Types of mantles
Heating mantles are either found in fabric or rigid form. Fabric mantles are flexible and can be molded to accommodate a wide range of flask sizes. When it comes to rigid mantles, they are designed to fit a particular flask size or can be simply filled with sand to accommodate varying sizes. The sand also helps in uniform heating of the liquid.
Metal-housed mantles are suited for laboratory settings including research and development labs. The metal-housed heating mantle is made to fit flasks with capacities between 50 ml to 6,000 ml. They provide high-temperature capabilities up to 450° C. Metal-housed heating mantles are available in tabletop designs and have built-in controllers.
How do mantles work?
Heating mantles produce energy by converting AC voltage. Intense energy is consumed to generate a high degree of required heat. This can result in blowing of the socket or melting of the fuse. For this reason, one should never connect the mantle directly to a wall socket, instead, a transformer can be used. Note that the mantle takes a while to heat up so you can pre-heat it if required. Remove the flask from the mantle once you turn off the heat for letting it cool down.
Safety tips while using a heating mantle
1. To be able to control the input voltage, always use a heating mantle with a variable autotransformer and do not plug it directly into a 110 V line.
2. Always stick to the recommended input voltage level by the manufacturer. Exceeding the voltage level may result in melting of the fiberglass insulation due to overheating.
3. Do not use a heating mantle for vacuum distillation of heat sensitive or unstable materials as it is difficult to control precise temperature levels.
4. If you are using an older version of a heating mantle, be aware that it might have asbestos insulation rather than fiberglass. Dispose off this insulation in the right way and replace it with fiberglass.
Also read: Benefits of a bottle-top dispenser
If you are looking for a high-quality heating mantle, we are here for you! At Science Equip, you’ll find quality laboratory equipment and consumables. We are committed to providing the best customer service and quality products at an economical price. For any assistance related to laboratory equipment, do get in touch with us.
Related aticles
Safety goggles
09
Sep
Let’s face it. Accidents can happen at any time and in any place and your eyes are priceless assets and they deserve the highest level of protection you can provide. From construction sites to laboratories, your eyes face different risks. This is where safety goggles become essential for shielding your vision and protecting it from potential harm.
Eyewash stations
06
Sep
This guide goes beyond simply recognising the presence of eyewash emergency stations. We will talk about its various types, their placement, and perfecting how to use them effectively because, in times of emergency, reading instructions is not ideal. In the end, having knowledge is powerful, and understanding how to utilise those green protectors could be crucial in safeguarding your most important asset - your eyesight. | ESSENTIALAI-STEM |
Editor-in-Chief İlkay Küçükgüzel Associate Editor Esra Tatar Online ISSN 2630-6344 Publisher Marmara University Frequency Quarterly (January-April-July-October) Abbreviation J.Res.Pharm. Former Name Marmara Pharmaceutical Journal
Marmara Pharmaceutical Journal 2012 , Vol 16 , Issue 3
Evidence based pharmacy practice
Kamile Hamzacebi2, Bülent Gümüşel1
1Hacettepe Üniversitesi, Eczacılık Fakültesi Farmakoloji Anabilim Dalı, Ankara, Türkiye
2Hacettepe Üniversitesi, Eczacılık Fakültesi, Ankara, Türkiye
DOI : 10.12991/201216394 Evidence-based pharmacy, both hospital and community pharmacists use the best available evidence when making decisions for patients. In evidence based pharmacy, pharmacist should take into account the patient's situation, the values and conditions when making decisions. Evidence is the drug for the pharmacist and pharmacists can contribute to the formation of evidence with notification of adverse effects. Increasing patient expectations, aging population, advances in medical technology have increased the importance of evidence based pharmacy today. In evidence based treatment, medical errors and health care expenditures is reduced, the scientific evidence is increased with pharmacist's contribution. Keywords : Evidence based pharmacy, pharmacist, rational use of drugs, adverse drug reaction reporting
Marmara University | ESSENTIALAI-STEM |
Get help today 888-509-8965 or sign up for 24/7 text support.
American Addiction Centers National Rehabs Directory
How Crystal Meth Affects the Brain
What is it and How is it Used?
a meth pipe on the floorCrystal meth, a form of methamphetamine that resembles glassy fragments or rocks, is a commonly abused stimulant drug. It is chemically similar to amphetamine, a drug used to treat attention-deficit hyperactivity disorder (ADHD). People abuse crystal meth for the feelings of euphoria and increased energy it produces. The initial high can be very intense but will subside quickly, which may cause people to repeatedly take the drug in a “binge and crash” pattern. In more extreme cases, users may binge on the stimulant for days, forgoing sleep and food. This is sometimes referred to as a “run.”1 These patterns of crystal meth abuse can increase the risk of experiencing severe and dangerous side effects of use.
In its various forms, methamphetamine is used in a number of ways, such as:1
• Orally (swallowing a pill).
• Intranasally (snorting the powder).
• Intravenously (dissolving the powder in water and injecting it).
Crystal meth specifically is usually heated and then smoked using a glass pipe. Occasionally people will crush the crystals to snort or inject. Common slang terms for the drug include speed, meth, ice, crank, chalk, and crystal.1
According to the 2016 National Survey on Drug Use and Health, more than 1.3 million people over the age of 18 reported using methamphetamine in the previous year, with 658,000 people reporting use in the past month.2
Neurochemistry of Meth Abuse
Methamphetamine produces its short-term effects on the central nervous system (CNS) by increasing the activity of certain neurotransmitters, such as dopamine, norepinephrine, and serotonin.3,4 These neurotransmitters are released by cells to relay information in the brain and signal specific physical and psychological functions. Information is transmitted from pre-synaptic neurons across a synapse (gap between neurons) to receptors located on post-synaptic neurons. Under normal circumstances, after a neurotransmitter has effectively communicated its message, it is either destroyed or it returns to the first neuron where it is recycled.3 When a person abuses crystal meth, this process is disrupted and large amounts of neurotransmitters are released into the synaptic space, eliciting a flood of effects, both desirable and undesirable.
a syringe extracting crystal meth from a spoonCrystal meth’s action on the brain is largely due to its effect on dopamine levels. Dopamine is often referred to as the reward chemical—it is typically released in response to natural, pleasurable activities, such as eating or having sex, and it plays a large role in the development of addiction. Drugs like crystal meth dramatically increase the release of dopamine in your brain, causing an intense rush of euphoria.1 This process reinforces crystal meth abuse, causing an individual who uses the stimulant to want to repeat the pleasurable experience.1 The high dissipates as dopamine is gradually recycled back into the neuron, resulting in the crash that is often associated with crystal meth abuse.3
Other short-term effects of meth occur because of its action on different neurotransmitters in the brain, including serotonin, which regulates mood, appetite, memory, sleep, and social behavior, and norepinephrine, which also acts as a stress hormone and regulates your fight-or-flight response.
Meth’s action on serotonin causes a variety of effects, such as decreased appetite and increased libido.4
Long-Term Effects on the Brain
person shooting crystal meth into armChronic meth abuse can lead to a number of significant structural and functional changes in the brain. If you use meth on a regular basis, you run a great risk of developing tolerance. Tolerance develops over time as your brain and body become accustomed to the presence of the drug and no longer respond to the same amount of crystal meth. Once tolerance develops, you require higher doses of crystal meth to achieve previous results. Further, chronic use can lead to physiological dependence, which means that you need meth in order to function at an optimal level. Crystal meth withdrawal symptoms are likely to emerge when a dependent person abruptly quits or reduces use. Tolerance and dependence are both signs that neuroadaptations have occurred, or changes in the brain’s functioning.5
In the acute stages of meth addiction, methamphetamine abuse causes over-stimulation of the nucleus accumbens, or “pleasure center,” so it creates new pathways and receptors. Over time, this over-stimulation damages the serotonin and dopamine receptors on midbrain neurons. This damage results in the individual requiring higher and more frequent doses of crystal meth in order to experience a high. It also results in poorer neurotransmission, or the signaling between brain cells, which can result in anxiety, depression, mood swings, and irritability.7
Research has revealed that crucial neuronal pathways that control functions, such as goal-setting, motivation, and cognition, are depressed by long-term meth abuse. Surprisingly, research notes that this depression is reversed once a person resumes using meth, which may help to explain how patterns of addiction develop.8
Animal studies have also shown that chronic meth use leads to long-term brain changes that can persist even after drug abuse has ceased.
It may be distressing to learn about the chronic effects of meth abuse, but some of them can be reversed over time as a person maintains abstinence.
Can the Consequences Be Reversed?
A number of studies have examined whether the neurological consequences of chronic meth abuse can be reversed. Some brain changes may be reversible, while others may be permanent, although more research is needed to fully evaluate these changes. Whether the damages are reversible may depend on specific factors, such as how long a person has used meth, since some effects to the nucleus accumbens (part of the striatum and the key reward center of the brain) take a longer time to develop.7
hand holding a bag of crystal meth next to other paraphernaliaStudies have shown that chronic meth users demonstrate deficits in the areas that involve dopaminergic neurons, even after they have achieved “sustained abstinence.” The areas with the most deficits mainly included working memory, but lowered capabilities were also found in the areas of executive function (which includes higher-level skills, such as decision-making) and motor function. These consequences were associated with a decreased production of dopamine. While the results of this study weren’t conclusive, the report supports the hypothesis that long-term meth abuse may lead to persistent and lasting brain changes. More research is needed to determine whether these changes can be reversed.10
A case report examined a 24-year old male who was dependent on meth for 4 years and found that he had developed visual hallucinations, anxiety, delusions, paranoia, apraxia (a disorder of learned or skilled movements resulting from brain damage or injury), and tachycardia (abnormally high resting pulse rate) due to structural cerebral alterations. These symptoms and the patient’s extensive white matter brain changes persisted for at least 7 months after the initial appointment. They didn’t follow up after the 7-month mark, so there’s no way of knowing whether the damage resolved over time or not, but this study gently implies the possibility of long-term and irreversible brain damage.11
However, a clinical review that examined numerous studies on crystal meth and long-term brain damage reports that certain neurological changes may indeed be reversible after a period of abstinence. The changes that appear to be reversible include the damage to neurotransmitter receptors, which are replaced over a period of 12–18 months after abstinence. Once these receptors are functioning normally again, symptoms related to neurotransmitter changes, such as anxiety, irritability, rage, apathy, depression, and insomnia, are also typically reversed.7 This happens as new receptors and transporters are produced, neurotransmitter levels are reestablished, and neurons grow back, a process known as neurogenesis.7
Professional detox and substance abuse treatment helps to promote abstinence and recovery, which will go a long way in preventing additional brain damage and potentially restoring brain functions.
Recovering from Addiction
Detox and addiction treatment are essential for recovering from a crystal meth addiction. However, formal detox is not a substitute for addiction treatment, but rather is the first step to recovery. Detox helps you withdraw from meth safely and comfortably by providing support, monitoring, and medical intervention, should it be needed. Although there are currently no medications approved by the Food and Drug Administration (FDA) to treat stimulant withdrawal, you may receive supportive medications to alleviate specific symptoms that can accompany withdrawal, such as insomnia or depression.13
doctor wearing a stethoscope Because severe depression and suicidal ideation can occur during crystal meth withdrawal, it is advisable to seek detox in an inpatient setting that will provide intensive monitoring and support. Inpatient programs provide you with 24/7 care and monitoring to ensure your safety during this distressing and trying time.
After detox, you should transition to an addiction treatment program to help build a solid foundation for recovery. Addiction treatment helps you address the underlying causes of your addiction and learn the skills you’ll need to stay clean and sober. You will participate in a variety of therapies, including individual and group counseling, as well as peer support groups.
Substance abuse treatment occurs in two main settings—inpatient and outpatient. Inpatient rehab requires that you reside at the facility for the duration of your treatment program. You receive around-the-clock care and are separated from your prior drug-using environment, which can help you focus solely on your recovery and avoid relapse. Outpatient treatment programs require that you commute to and from the facility for scheduled treatment sessions, ranging from a couple hours per week to several hours per day.
Regardless of the type of program you select, it’s crucial to engage in some type of rehab to help best prevent relapse and provide a solid foundation for sobriety. Once you complete your methamphetamine addiction treatment program, the work isn’t done. In order to prevent relapse and maintain abstinence in the long run, you’ll want to engage in an aftercare plan, which typically consists of varying types of ongoing support. Individual therapy, group counseling, 12-step meetings, non-12-step meetings, and sober living homes all qualify as types of aftercare.
| ESSENTIALAI-STEM |
Talk:List of rock genres
[Untitled]
I would suggest using the List of popular music genres page as a guide for restructuring this page, as well as any other genre pages that are not yet structured like it. - K1darkknight 02:49, 21 March 2007 (UTC)
is speedrock not a other rock genre?
this list is pretty good but it would be very useful if it could be more orgainized, by genre's that are related or that have influenced each other etc. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:34, 21 October 2008 (UTC)
* I concur, we could base it off the system used on the russian wikipedia. Zazaban (talk) 23:00, 21 October 2008 (UTC)
Synthpop
Is Synthpop really a style of rock? It really doesn't sound at all rock-ish... Sure, its origins are in new wave and post-punk, but that doesn't necessarily mean it's rock. So, what exactly makes it rock...? <IP_ADDRESS> (talk) 13:12, 15 March 2009 (UTC)
* Synthpop is technically a "derivative" of rock, not a subgenre.
* it's a form of new wave ,so yeah it is a form of rock music — Preceding unsigned comment added by Rockerdude101 (talk • contribs) 16:18, 6 April 2012 (UTC)
--Rockerdude101 (talk) 22:52, 6 April 2012 (UTC)
Synth-pop is more electronic music than rock. --Rivet138 (talk) 13:26, 1 February 2013 (UTC)
Criteria
Just a note to say that entries should, pretty obviously, be rock music and genres, not other forms of music, terms or national subdivisions of wider genres. Links should also not go to a band or be a redirect to an article that does not mention the genre, in these cases there is no evidence of notability.--''' SabreBD (talk ) 23:33, 5 April 2012 (UTC)
Some of the genres listed here are more national or regional variations than properly different rock genres. Brazilian Thrash may be Thrash played in Brazil, but it is still Thrash. Neue Deutsche Welle is basically New Wave in Germany. Or, why not include Anatolian rock as simply folk rock, for instance. --Rivet138 (talk) 13:27, 1 February 2013 (UTC)
Progessive bluegrass ,Alternative country and wonky pop
--Rockerdude101 (talk) 22:50, 6 April 2012 (UTC)hello ,might I say adding these said genres into the list of rock genres ,because all of which in some way have elemnts of rock music in them — Preceding unsigned comment added by Rockerdude101 (talk • contribs) 16:24, 6 April 2012 (UTC)
yes ,all of these genres do have elements of rock music in them — Preceding unsigned comment added by Manda96 (talk • contribs) 16:58, 6 April 2012 (UTC) — Manda96 (talk • contribs) has made few or no other edits outside this topic. --Rockerdude101 (talk) 22:50, 6 April 2012 (UTC)
* I already set out my position above. Some of the genres you have added are good work, they are clearly rock genres, but others are clearly not. The point of an article like this is not to add as many links as possible, but to provide a list of notable links that fit the title of the article. The use of bands is particularly problematic as these links risk becoming circular.--''' SabreBD (talk ) 08:20, 7 April 2012 (UTC)
* I added the links that liked to band because they where gen're that did not have there own sperate page ,I think I ,or someone else (I can't remember) has now taken them down ,I would maybe surggest that ,some of thegenre's that link to the same page (most of the subgenres to grindcore) ,that they have some kind of infomation of the page ,they are on the page (in the box that say's subgenres at the top in grindcore for example) ,however there is no infomation on the genre at all ,not on the page ,or on a different page ,I have aid this o nthe talk page on grindcore as well I think --Rockerdude101 (talk) 12:54, 7 April 2012 (UTC)
* I think we are in agreement, although to be honest I find this extremely difficult to read. So, to summarise, only genres that link to pages, and only redirects where the target pages have some information on a subgenre. Linking to individual bands is really not acceptable.--''' SabreBD (talk ) 15:40, 7 April 2012 (UTC)
yes, I fully agree with that --Rockerdude101 (talk) 15:03, 9 April 2012 (UTC)
Pungle
Hello, can pungle be added to the list of rock genre? It's a mix punk and jungle, it's on the page Digital hardcore too --Rockerdude101 (talk) 15:49, 12 April 2012 (UTC) — Preceding unsigned comment added by Rockerdude101 (talk • contribs) 15:44, 12 April 2012 (UTC)
* You have repeatedly added it after I removed it. Thank you for finally bringing it up here instead of continuing to edit war. I removed it because the Pungle article likely will be deleted, if not by PROD then by AfD. If it is not deleted after these processes, then feel free to add it back. For readers interested in this non-genre, see the discussion at Talk:Pungle. Cresix (talk) 16:33, 12 April 2012
It's not deleted yet though --Rockerdude101 (talk) 16:48, 12 April 2012 (UTC)
* This is an encyclopedia, not a newspaper. We don't have to rush to put something in an article. It can wait for the outcome of the deletion process, or consensus here. Otherwise, please don't edit war and continue to add it. Read WP:BRD. Cresix (talk) 16:56, 12 April 2012 (UTC)
Well there was no rush to remove it either, it could of been left there and removed after the conclusion of the pages status on getting delteted or not to be completed, also might I add in this 'edit war' you are in the wrong as much as I am--Rockerdude101 (talk) 17:23, 12 April 2012 (UTC)
* Please respect the WP:BRD process. Once article content has been challenged (as is the case here), that's standard operating procedure on Wikipedia. I don't intend to pander to your continued pushing against that procedure by repeating the same thing over and over here. So discuss to your heart's content here, but leave the item out of the article until the process finishes. Thank you. Cresix (talk) 17:32, 12 April 2012 (UTC)
I'll do that --Rockerdude101 (talk) 21:45, 12 April 2012 (UTC)
Deathcountry&Red Dirt
Does Deathcountry and Red Dirt count as a sub-genres of rock? --Rockerdude101 (talk) 15:48, 15 April 2012 (UTC)
Deathcountry, Red Dirst, Gothenburg metal, Swedecore, Ambient pop, Gothic Americana, Speedcore
I would like these genres to be added to the list, Deathcountry,Speedcore and RedDirt I'm not 100% sure on if they are but, Gothenburg metalis a rather big scene in Swedish metal, Swedecore is a genre of rock music, very much related to Gothenburg metal, Ambient pop is a Derivative form od Dream pop, as is Shoegazing, it is also on a list of hardcore punk sub-genres, so by definiion if it's a subgenre of hardcore punk it will be one of rock as well, since hardcore punk itself is a sub-genre of rock, and Gothic americana is a sub-genre of rock music --Rockerdude101 (talk) 17:25, 20 April 2012 (UTC)
* Gothenburg Metal and Swedecore are linked to redirects that go to a paragraph in an article that has one weak source. I don't consider that enough at this point. Create articles on those genres with appropriate sourcing, then add them to the list. Gothic Americana has been proposed for deletion because it has been completely unsourced for five years. Wait for the deletion process to finish; if the article survives PROD and AfD, then add it here. I'm not sure about the other genres you mention; I'll have to look into them before offering an opinion. Cresix (talk) 19:15, 20 April 2012 (UTC)
Gothenburg metal is mentioned in a documtary I've watched before called Metal Evolution(or something along those lines), I'll try and find something I can use as a source, and ok, I'm not 100% sure if they would be classed as rock music or not mabye speedcore might be classed as a Derivative form of electronic rock, I don't know --Rockerdude101 (talk) 23:12, 20 April 2012 (UTC)
* Remember, we need enough sourcing for an entire article for each genre. Cresix (talk) 00:03, 21 April 2012 (UTC)
New Romanticism, Psychedelic folk, Psychedelic soul, Psychedelic pop
New Romanticism, Psychedelic folk, Psychedelic soul and Psychedelic pop are all sub-genres of rock music, New Romanticism is a sub-genre of new wave, Psychedelic folk, Psychedelic soul and Psychedelic pop are all subgenres of Psychedelic rock, Psychedelic folk being a fusion of Psychedelic rock and folk(or folk rock), Psychedelic soul is a fusion of Psychedelic rock and soul, being very influenced by Jimi Hendrix. And finaly Psychedelic pop is a mix of Psychedelic rock and pop music, so all of the genres that have been removed resently are all sub-genres of rock. --Rockerdude101 (talk) 17:20, 7 May 2012 (UTC)
* A fusion genre and a sub-genre are not the same thing. Even if a genre borrows from another that is rock that does not make it rock. Pop constantly borrows from rock, but by definition, what is pop is not rock. Please note that psychedelic folk pre-dates psychedelic rock, but we wouldn't say that psychedelic rock is a sub-genre of folk. New Romanticism was a fashion and youth movement, synthpop was the genre, just as Mod was a movement and R&B was the major genre associated with it.-- SabreBD (talk ) 18:09, 7 May 2012 (UTC)
* Agree with SabreBd. Every "movement" that happens to involve a particular style of music is not a "genre". Cresix (talk) 18:12, 7 May 2012 (UTC)
Then by the combine logic of SabreBd we should also remove rap rock, pop rock, synthpop etc. and if you lookon the page for New Romantics it has( or at least did) have the page set up like a music page, that's why I added it Contrary to popular belief I am not a total idiot, I know the difference between a movement and a genre, however Psychedelic soul is a sub-genre of rock, it's even sometimes call 'black rock' and Psychedelic pop is to Psychedelic rock, what pop rock is to just rock, and the same with Psychedelic folk but with folk not pop, and as a side note I would say Beat music is more connected with the mod sub-culture rather than R&B I know they both where but I'd just say Beat music was more universally mod in my opinion --Rockerdude101 (talk) 14:56, 8 May 2012 (UTC)
* anyone can sit here and make up theories about music evolution all day long. Ridernyc (talk) 00:22, 9 May 2012 (UTC)
Rockerdude, no one has even hinted that you are "a total idiot." People can discuss and disagree on an issue without those kinds of personal attacks, which has been the case completely here. You need to take a few breaths and stop personalizing this issue or you will have no credibility in this discussion. Cresix (talk) 00:52, 9 May 2012 (UTC)
This page is wrong in so many ways
Is it just me or does this page looks like some 15-18 year old overly-enthusiastic person wanted to impress its readers? It's true that throughout the years, the term "genre" has been basically raped into its current ambiguous, useless definition. However, I believe it's common sense to know that cultural movements are not genres. Listen to Venom. Then listen to Iron Maiden. Then listen to Def Leppard. All three of them are part of the NWOBHM. They don't sound the same. This page is extremely stupid and full of flaws. I'll edit it when I have some free time. In what universe could something entitled "C86" be considered a genre? Pagan Metal is, for example a term that people use to describe any Folk Metal song with Black Metal vocals, even if its lyrics have nothing to do with paganism. Impressive page, but wrong. ScindoLuna (talk) 16:48, 2 October 2012 (UTC)
* I agree. This article needs a serious revision, as it mentions some genres whose existence is not even proven. I was also thinking of editing it, to make it look better and make it meet Wikipedia's standards. Anyway, thank you for your potential efforts. --Bright Darkness (talk) 21:25, 4 October 2012 (UTC)
* Some of us have chipped away at removing some of the useless cruft and non-genre entries. My basic strategy is to remove a genre that does not link to a reasonably well sourced article that identifies it as a genre. If you think there should be other criteria for removal, feel free to express them here. I also encourage you to cull through the entries for candidates for removal. Be prepared for a battle, however, from the 15-18 year olds who don't want their favorites removed. Cresix (talk) 23:50, 4 October 2012 (UTC)
* As Cresix observes, some of us spend a lot of time trying to maintain some sort of validity on this page. I don't think we have every discussed it but my strategy is much the same: if an entry does not have some reasonably sourced evidence of being a genre at the target then it tends to get removed. Generally I also remove entries that are clearly not rock music. I am very happy to have more eyes on the page, but be careful not to just delete entries you do not like being here. We could of course discuss some criteria that might help the process.-- SabreBD (talk ) 20:43, 8 February 2013 (UTC)
* I would also suggest that they be organized in categories and subcategories much like other genres lists do. ThisguyYEAH (talk) 19:43, 4 March 2013 (UTC)
* I wouldn't recommend it, given all the problems it causes at List of electronic music genres, with disagreements about which category sub-genres belong to and the issue of where hybrid genres go. That page is far more high maintenance than this one.-- SabreBD (talk ) 08:03, 5 March 2013 (UTC)
Why is Arena rock not listed here?
Seems like a straightforward answer. It was treated as a genre my the media. Walter Görlitz (talk) 19:29, 22 March 2013 (UTC) Just three examples. I'm sure if I searched further on AllMusic, Billboard, Spin or other trade magazines it would be apparent. Walter Görlitz (talk) 19:31, 22 March 2013 (UTC)
* http://www.allmusic.com/subgenre/arena-rock-ma0000012329
* http://80music.about.com/od/genresmovements/p/arenarock.htm
* https://itunes.apple.com/ca/genre/music-rock-arena-rock/id1146
* Just because the media uses the term doesn't mean it's a genre. The phrase is, like cock rock, used as a broad, ill-defined term–a blanket statement basically–that covers artists from a multitude of genres. What musical qualities makes a song or album "arena rock"? What about hearing a song on the radio makes you say, "That's an arena rock song"? Is it because the band has reached heights in their popularity that enables them to play in large venues with pyrotechnics and lighting systems? Is it because they make anthemic or grandiose music? If so, then you can't honestly call "arena rock" a genre. A performance style, maybe. A way to denote the level of success a band has attained, sure. A radio format? Why not. But I can't see any reason to call it anything but a buzzword or way for journalists to lazily refer to musicians. Would you honestly call "classic rock" a genre? Y2Kcrazyjoker4 (talk • contributions) 19:37, 22 March 2013 (UTC)
* So rock isn't a genre either because the media uses the term? Who defines genres then, you?
* Personally, I have never heard of crock rock and unless you can find a reference to support it as a genre, it should be excluded.
* It's not a buzzword, as was shown by the three references, and yes, I would call classic rock a genre, but I'm no more of a reliable source than you. Walter Görlitz (talk) 20:03, 22 March 2013 (UTC)
* I agree with Y2kcrazyjoker4. It's not a genre; it's a description of venue that can include acts as diverse as The Beatles and punk rock groups, spanning every decade since the 60s. It's so broad and inclusive that it has no meaning as a descriptor of type of music, just it's location. Even the article Arena rock doesn't describe it as a genre. List of rock genres has a long history of being loaded up with a bunch of unverifiable favorites of particular editors; we don't need another one. And by the way, please notice that "rock" is not listed as a genre in the article because every genre on the list is subsumed under "rock". Cresix (talk) 20:35, 22 March 2013 (UTC)
* Walter, you kind of just proved my point for me. Classic rock isn't a genre... it's a radio station format that plays older music. There are no distinct musical qualities by which you can categorically qualify classic rock. The same applies to "arena rock" or "cock rock", or any other journalistic phrases you want to throw out there. Y2Kcrazyjoker4 (talk • contributions) 20:41, 22 March 2013 (UTC)
* Y2kcrazyjoker4 and Cresix, sorry, do you have anything that isn't WP:OR to support your good faith statements?
* While an arena is a location, the bands you mention do not fit the stylistic format described by the sub-genre of arena rock. And while there are classic rock stations, if you say to a kid "do you want to listen to some rock music" and the kid responds in the affirmative and you trudge out Bread or any other "classic rock" they will immediately label it as such. All words get their start somewhere. Just because classic rock got its start as a radio format doesn't mean that the term doesn't define some specific elements common to a style of music. That is what genres are. The same goes for the term "arena rock". Just because no one has used your magic word (genre) or it's been expunged from the article, doesn't mean it's not a genre. Besides, you two should both be aware of this: wikipedia is not a reference.
* I could just as easily state that about 75% of the "genres" listed on this article. Walter Görlitz (talk) 21:07, 22 March 2013 (UTC)
* And for the record, Template:Rock music does list it as a genre, but it's just as good a reference as the article. Walter Görlitz (talk) 21:08, 22 March 2013 (UTC)
* Another source that calls it a genre: http://www.musicstack.com/genre/arena-rock Walter Görlitz (talk) 21:27, 22 March 2013 (UTC)
* If the term does not simply describe venue, then what exactly is the "stylistic format" that distinguishes your version of arena rock from, let's say, The Beatles, or the many other groups that perform in arenas? If some sources describe certain bands as "arena rock" and you disagree that they don't fit the "stylistic format" as you understand it, then I think your answer will take us back to personal opinion.
* The one area where I might be close to agreeing with you on is that many of the genres listed in the article should not be there. I've tried removing the most glaring ones that don't have articles describing them as genres, but I don't have the time to fight the battles with the 12-year-olds who want their favorites in the article. Cresix (talk) 23:15, 22 March 2013 (UTC)
* I'm sorry, why are you asking me to support my opinion? I'm not a RS. Find a RS that says something to support your opinion instead of trying to argue that you are right and I am wrong. I tried to offer sources, four of them, that states arena rock is a genre. It offers bands that fall into the genre as well. No arguments required other than determining if the sources are reliable or not. Walter Görlitz (talk) 23:30, 22 March 2013 (UTC)
* If you'll reread my comments, you'll see that I never asked you for a source. I just asked you to explain your comments. You stated that "the bands you mention do not fit the stylistic format described by the sub-genre of arena rock". I'm simply asking you to describe that "sytlistic format" that distinguishes some groups who have been described as "arena rock" but that you don't consider fitting that "stylistic format". Cresix (talk) 23:36, 22 March 2013 (UTC)
* I concur with Walter. This discussion needs to be rooted in basic Wikipedia policy, not in editors' opinions. The key policy here is WP:RS. If reliable sources call it a genre, then we call it a genre. Cresix, Y2Kcrazyjoker4, can you phrase your counter-argument with respect to basic policy? Bondegezou (talk) 15:03, 26 March 2013 (UTC)
* From the book This Ain't the Summer of Love: Conflict and Crossover in Heavy Metal and Punk: "Nonetheless, there seemed to be a distinctive degree of interconnection between the emergent genre of heavy metal and the emerging concert form of arena rock." Notice the very precise language used to identify the term "arena rock". From the book The Greenwood Encyclopedia of Rock History: From arenas to the underground, 1974-1980: "Similarly, rock concerts grew out of theaters and smaller arenas they played in the 1960s into large sports arenas and stadiums in the 1970s. These massive concerts came to be known as "arena rock"-an ironic development that led to a return to the one-way-street style of performance (in which the audience members were passive recipients) rather than the audience being part of the show as in the mid-1960s San Francisco festival scene..." These sources identify the term to refer to the development of popular music concert tours into larger spaces, and not to any musical division with common musical characteristics (which would define a traditional genre). Arena rock has little to do with describing the music itself and more to do with describing the artist's performance style. Y2Kcrazyjoker4 (talk • contributions) 18:37, 26 March 2013 (UTC)
* Y2k has removed the term "arena rock" and also the term "AOR" from a large number of article info boxes. We have been discussing one case at Talk:Asia_(band), but it seemed sensible to me to bring that discussion here as his/her objection is to the use of these terms as genres generally, not specifically their application to Asia.
* In that discussion, Y2k has made a similar argument to AOR as he has here to arena rock, by offering citations that describe AOR as something else (a radio format). In response to both, I would say the same thing: terms can mean more than one thing - that they are used differently in one context does not prove they are not also used as genre terms.
* Walter has provided cites for arena rock above. For AOR, I shall point out that there was a magazine called AOR, which was about a genre of music. That ran for at least 7 issues, so there's at least 7 cites for AOR as a genre.
* I'm not saying these are or are not sensible names for genres; I'm saying that reliable sources use them as names for genres, and Wikipedia must reflect that, not the opinions of individual editors. Bondegezou (talk) 08:37, 27 March 2013 (UTC)
* Fully agree. The sources provided by Y2kcrazyjoker4 are simply mentions of how they began but do not reflect current use of the terms. Walter Görlitz (talk) 15:14, 27 March 2013 (UTC)
* How does the existence of a magazine called AOR certify that AOR or arena rock are genres? Does the existence of a magazine called "top 40" mean that top 40 is now a genre? You have to come up with something better than that. Y2Kcrazyjoker4 (talk • contributions) 13:30, 5 April 2013 (UTC)
* That's not the argument, but I'd argue that Top 40 is a genre to some. Walter Görlitz (talk) 14:17, 5 April 2013 (UTC)
Disco, Funk., Soul and Hip Hop
These are all subgenres of Rock.
Rock and roll music was started by Blacks. In the 60s they took rock in a different direction than the white guitar oriented rock acts did. They combined the influence of gospel music with rock and roll to create soul, then later funk and disco, and then hip hop. These are all forms of rock just as prog and punk and metal are. In fact much of hip hop sounds closer to the origins of rock (Bo Didddley) than does prog or metal. Why woulod an act that combined clasical and rock and roll like the Moody Blues be any more viable as "rock" as an act ;like James Brown that combined rock and roll with gospel?
The Rock amd Roll Hall of Fame includes many sopul acts, several fubnk acts, a couple of disco acts and several hip hop acts with many more to come.
Why Rap Is Rock:
http://www.digitaldreamdoor.com/pages/why-rap-is-rock.html
Walter, don;t you touch my changes.
SavoyBG — Preceding unsigned comment added by SavoyBG (talk • contribs) 02:28, 22 September 2013 (UTC)
* I'll touch what I want and your research needs a reliable source. Digital dream door is not a RS: "My name is Lew and this website is my hobby. I tried to make a site that is fun, entertaining, and educational. A place you could spend an hour browsing, reading and leaving your opinion for others to learn from. If you have any suggestions for how I can improve it, email me at<EMAIL_ADDRESS>Walter Görlitz (talk) 06:26, 22 September 2013 (UTC)
* For the record, the genres you added (funk, soul music, disco and hip hop) descend from rhythm and blues not rock, which had a parallel growth. Walter Görlitz (talk) 07:04, 22 September 2013 (UTC)
* Just to endorse Walter Görlitz's points. The Rock and Roll Hall of Fame is not a reliable source for this and if we start including every genre of modern popular music then it becomes rather pointless.-- SabreBD (talk ) 08:07, 22 September 2013 (UTC)
So if the Rock And Roll Hall of Fame is not a reliable source for what genres are part of rock, what is? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:25, 23 September 2013 (UTC)
Rock is rhythm and blues. They are one and the same. Alan Freed coined the term "rock and roll" as a new name for the rhythm and blues music that he was playing. He thought it would be a better name for the music in order to make it easier to market it to white teenagers. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:30, 23 September 2013 (UTC)
* Rock is rock and comes for rockabilly. R&B is a completely other line of music. Walter Görlitz (talk) 04:08, 23 September 2013 (UTC)
Walter, you don't know what the fuck you are talking about. — Preceding unsigned comment added by SavoyBG (talk • contribs) 05:52, 23 September 2013 (UTC)
* Of course I know what I'm talking about. First, check the correct links (not the ones you keep adding) to the articles in question. They all indicate that they're related to R&B. There's no question that there is cross-polination of the two strains of music, but to state that they are rock is like saying jazz is classical music because several prominent performers used material from classical music and that Gershwin wrote music for both. Might as well say that punk is a dance music genre.
* Just find some reliable sources that say that funk, soul music, disco and hip hop are a form of rock music--not your opinion, not hall of fame entries, reliable sources--and we'll have a starting point. I'm very open to discussion. In the meantime, I've requested that the article be locked to avoid the useless edit war.
* Also, Please sign-in for all of your edits and sign your comments on talk pages. Walter Görlitz (talk) 06:04, 23 September 2013 (UTC)
Who gets to decide which sources are reliable?
I say the Rock and Roll Hall of Fame, which is voted on by the artists themselves, industry people and music critics is as reliable as you're gonna get. It's certainly WAY more reliable than Wikipedia. I could spend 24 hours a day correcting errors on Wikipedia and never finish in 100 years.
+++not your opinion+++
ANY source is going to be SOMEBODY'S opinion. — Preceding unsigned comment added by SavoyBG (talk • contribs) 18:03, 23 September 2013 (UTC)
* Please don't delete the comments (and signature) of other editors.
* If you want to know what constitutes a reliable source read WP:RS. It's not me. It's not you either (thankfully!). It's been set for a while. If you think the Rock and Roll Hall of Fame is a reliable source, and I could be wrong but as a business its job is to attract visitors, while two of us don't take it to the reliable source noticeboard and whatever is decided there I will abide by. I can't speak for SabreBD. And while you're there, add a section to see what they think about digitaldreamdoor.com and the essay on why rap is rock. Walter Görlitz (talk) 19:09, 23 September 2013 (UTC)
* On second though, I added digitaldreamdoor.com and it's on its way to being blacklisted as a source. Walter Görlitz (talk) 01:52, 24 September 2013 (UTC) | WIKI |
U.S. Says 61% of Nuclear Plants Run Severe-Accident Drills
U.S. inspectors found almost four in
10 nuclear power plants don’t conduct accident drills that
simulate a damaged reactor core, the Nuclear Regulatory
Commission said. NRC officials reviewed “severe accident mitigation
guidelines” for U.S. reactors after the partial meltdown of a
nuclear plant in Japan, the agency said today in a statement. While all reactor owners have severe-accident plans in
place, “inspectors found only 61 percent of the plants
periodically include the guidelines in their emergency drills,”
according to the statement. The plants remain safe and have
defenses to prevent damage to reactor cores after events such as
earthquakes or floods, the agency said. U.S. reactors are getting closer scrutiny from regulators
following the partial meltdown of a nuclear plant in Japan . A
magnitude-9 earthquake and tsunami on March 11 crippled Tokyo
Electric Power Co.’s Fukushima Dai-Ichi plant with fires,
explosions and radiation leaks in the worst nuclear incident
since the 1986 Chernobyl disaster. U.S. nuclear plants adopted severe-accident plans
voluntarily in the late 1990s, the agency said. The aim is to
“contain or reduce the impact of accidents that damage a
reactor core,” the NRC said. ‘Work To Do’ “All of the NRC’s efforts aim to ensure the plants never
need to use these guidelines,” Eric Leeds, the agency’s
director of reactor regulation, said in the statement. While the
NRC believes the reactors are still safe, “our inspectors found
many of the plants have work to do in either training their
staff on these procedures or ensuring the guidelines are
appropriately updated,” Leeds said. The voluntary steps are separate from mandatory NRC rules
to prevent reactor’s radioactive fuel rods from overheating,
melting and causing radiation leaks during “extreme events.” The NRC is conducting a 90-day review of U.S. reactor
safety. A report is due next month, NRC Commissioner William Ostendorff said May 25 at a hearing of the Senate Environment
and Public Works Committee. The NRC also conducted post-Fukushima checks on extreme-
event plans and released the inspection results last month. The
agency declared the plants safe, although it found some cases of
emergency equipment that wouldn’t start when tested, was being
used for other purposes or was stored in locations that could be
destroyed after a disaster. The inspection results should prompt the NRC to halt all
decisions on approving new reactors and license extensions for
existing nuclear facilities, U.S. Representative Ed Markey, a
Massachusetts Democrat, said today in an e-mail. “We must not wait until a nuclear incident in this country
to ensure that the guidelines in place to respond to an
emergency are up-to-date and consistently applied,” Markey
said. To contact the reporter on this story:
Simon Lomax in Washington at
slomax@bloomberg.net To contact the editor responsible for this story:
Larry Liebert at
lliebert@bloomberg.net | NEWS-MULTISOURCE |
Charles Caleb Ward
Charles Caleb Ward (1831-1896) was a nineteenth-century Canadian painter. Born in Saint John, New Brunswick, his loyalist grandfather had arrived from Poughkeepsie, New York and had established the merchant firm of John Ward and Sons. While he was in Liverpool, England to learn about the shipping business, Charles Caleb Ward spent time figure painting with the English artist William Henry Hunt. He lived and worked in St. George and later in Rothesay, New Brunswick. For a time he also lived in New York where he studied landscape painting with Asher B. Durand; he maintained a studio in New York from 1868 to 1872. His work "The Circus Is Coming" has been described as "evasively tantalizing to modern eyes in that it suggests a sensitive feeling for a spare rectangular sort of design wedded to an Eakins-like intensity of observation." Several of his paintings are displayed at the New Brunswick Museum in Saint John. | WIKI |
E-PolyLearning
46. The pitot static tube does not measure the __________ pressure.
a. static
b. total
c. difference in static & dynamic
d. all (a), (b) and (c)
View Answer Report Discuss 50-50!
Answer: (d).all (a), (b) and (c)
47. The fluid in which the shearing stress within it is proportional to the velocity gradient across the sheared section, is called a __________ fluid.
a. Bingham
b. Newtonion
c. perfect
d. none of these
View Answer Report Discuss 50-50!
Answer: (b).Newtonion
48. In fluid flow, cavitation is caused, if the
a. fluid velocity decreases to zero.
b. total energy decreases.
c. both (a) and (b).
d. flow pressure approaches its vapor pressure at the prevailing temperature.
View Answer Report Discuss 50-50!
Answer: (d).flow pressure approaches its vapor pressure at the prevailing temperature.
49. The ratio of the depth of flow to the hydraulic radius for the most economical trapezoidal section, in open channel flow is
a. 0.5
b. 1
c. 1.5
d. 2
View Answer Report Discuss 50-50!
Answer: (d).2
50. Which of the following denotes the effect of compressibility in fluid flow ?
a. Weber number
b. Mach number
c. Euler number
d. Reynolds number
View Answer Report Discuss 50-50!
Answer: (b).Mach number | ESSENTIALAI-STEM |
Abraham B. Baylis
Abraham Burtis Baylis Sr. (November 5, 1811 – July 15, 1882) was an American businessperson who served as president of the New York Stock Exchange during the U.S. Civil War.
Early life
Baylis was born in Queens on November 5, 1811 and spent his entire life on Long Island. He was a son of Mary (née Burtis) Baylis (1778–1861) and Thomas Balyis (1769–1821) of Springfield. Among his siblings from his parents marriage was Thomas Baylis and Mary Elizabeth Baylis. Before his parents marriage, his mother was married to William Ludlum, who died in 1802, and his father was married to Elizabeth Nostrand, who died in 1804. Both of his parents had several children from their first marriages. His paternal grandparents were Daniel Baylis and Catherine (née Ludlam) Baylis and his maternal grandparents were Abraham Burtis and Jane (née Everett) Burtis.
As a young man, he came to Brooklyn and became involved in the hardware trade. In 1839, he became a clerk in the banking house of his brother-in-law, J. B. Cochran.
Career
In 1841, Baylis became a member of the New York Stock Exchange and later served as one of the governors of the Exchange. He also served as the first president of the Stock Exchange Building Company (which owned the block in which the Exchange formerly held its sessions) and during the Civil War, he served as president of the Exchange. He was a trustee of the Union Ferry Company, the Brooklyn City Railway, the Brooklyn Trust Company, the Mechanics Bank, the Brooklyn Savings Bank and the Mechanics Insurance Company. According to his obituary in The New York Times:
"'The influence of Abram B. Baylis in the Stock Exchange was as great as that ever exercised by any other one member. Many of the measures which have brought prosperity and strength to that institution were the result of his thought and labors.'"
He was a trusted insider and close business associate of Cornelius Vanderbilt, and served as a director of the Harlem Railroad Company, the Chicago and Northwestern Railroad Company and the Wabash Railroad Company. His office was located at 44 Exchange Place. At the time of his death, he was "one of the oldest and best known men of Wall-street." He was succeeded in business by his sons under the firm name Abraham B. Baylis & Company, later known as A. B. Baylis Jr. & Co.
Baylis was active in public service in Brooklyn and regularly provided his counsel for various municipal affairs. In 1851, he served as a member of the Board of Aldermen representing the 10th Ward of the Borough. In addition, he was a member of the school board for a quarter of a century. He was a member of the original Park Commission. He also serve as a trustee of Packer Collegiate Institute, the Brooklyn Library, and a member of the Long Island Historical Society.
Personal life
In 1840, Baylis was married to Deborah McDonald (1809–1894) of Bedford, New York where Baylis had a summer home. Abraham and Deborah were the parents of two sons and two daughters, including:
* Ellen McDonald Baylis (1843–1916), who married Samuel D. Craig.
* Abraham Burtis Baylis Jr. (1845–1896), who largely became his successor. He married Agnes Harvard Marvin in 1873, a daughter of Charles R. Marvin of Brooklyn.
* Mary Baylis (1847–1916), a twin who did not marry.
* William Baylis (1847–1919), who married Adelaide Eliza Brooks.
Baylis, a member of the Second Presbyterian Church for many years, died at his residence, 76 Remsen Street in Brooklyn, on July 15, 1882. After his death, he was buried at Green-Wood Cemetery in Brooklyn. | WIKI |
Page:The Zoologist, 3rd series, vol 1 (1877).djvu/390
364 of rock cemented, as sometimes happens, into a breccia as solid as the original rock, and overgrown with grass" (Phil. Trans. 1822, pp. 171–240). The conclusion I arrived at, after studying so much of the roof of the cavern of 1858 as remained intact, was that Dr. Buckland's opinion was fully borne out by the facts; that, in short, the Oreston Caverns were Fissure Caverns, not Tunnel Caverns. The cavern of 1858 was an almost vertical fissure, extending a length of about 90 feet from N.N.E. to S.S.W. It commenced at about 8 feet below the surface of the plateau, continued thence to the base of the cliff, but how much further was not known, and its ascertained height was about 52 feel. It was 2 feet wide at top, whence it gradually widened to 10 feet at bottom. The roof, judging from that part which had not been destroyed, was a mass of limestone-breccia, made up of large angular fragments, cemented with carbonate of lime, and requiring to be blasted as much as ordinary limestone. The cavern was completely filled with deposits of various kinds. The uppermost 8 feet consisted of loose angular pieces of limestone, none of which exceeded 10 tbs. in weight, mixed with a comparatively small amount of such sand as is common in dolomitised limestone districts, but without a trace of stalagmite or fossil of any kind. The 32 feet next below were occupied with similar materials, with the addition of a considerable quantity of tough, dark, unctuous clay. Between this mass and the outer wall of the cavern was a nearly vertical plate of stalagmite, usually about 2 feet thick, and containing, at by no means wide intervals, firmly cemented masses of breccia identical in composition with the adjacent bed just mentioned. The bones the cavern yielded were all found within these 32 feet; and were met with equally in the loose and the coherent breccia, as well as in the stalagmite. A somewhat considerable number of ellipsoidal balls of clay, from 1·5 to 2·5 inches in greatest diameter, occurred in the clay of this bone-bed, but not elsewhere. Still lower was a mass of dark, tough, unctuous clay, containing a very few, small, angular stones, but otherwise perfectly homogeneous, and known to be 12 feet deep, but how much more was undetermined. The osseous remains found at Oreston prior to 1858 have been described by Sir E. Home, Mr. Clift, Dr. Buckland, Prof. Owen, Mr. Busk, and others. The animals represented were Ursus priscus, U. spelæus, Weasel (?), Wolf, Fox, Cave Hyæna, Cave Lion, Rhinoceros leptorhinus, Equus fossilis, E. plicidens, | WIKI |
Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/47747
Title: Increased locoregional blood flow in brain tumors after cervical spinal cord stimulation
Authors: Clavo, Bernardino
Robaina, Francisco
Catalá, Luis
Valcárcel, Benilde
Morera Molina, Jesús Manuel
Caramés, Miguel Á
Ruiz-Egea, Eugenio
Panero Álvarez, José Francisco
Lloret Sáez-Bravo, Marta
Hernandez, Maria A.
UNESCO Clasification: 32 Ciencias médicas
321308 Neurocirugía
Keywords: Spinal cord stimulation
Transcranial Doppler
Blood flow
Brain tumor
Issue Date: 2003
Journal: Journal of Neurosurgery
Abstract: Object: Patients with high-grade gliomas have poor prognoses following standard treatment. Generally, malignant brain tumors have a decreased blood flow that results in increased resistance to radiation and reduced delivery of chemotherapeutic agents and oxygen. The aim of the present study was to assess the effect of spinal cord stimulation (SCS) on locoregional blood flow in high-grade tumors in the brain. Methods: Fifteen patients (11 with Grade III and four with Grade IV brain tumors) had SCS devices inserted prior to scheduled radiotherapy. Both before and after SCS, the patients underwent the following procedures: 1) single-photon emission computerized tomography (SPECT) scanning; 2) middle cerebral artery (MCA) blood flow velocity measurements (centimeters/second) with the aid of transcranial Doppler (TCD) ultrasonography; and 3) common carotid artery (CCA) blood flow volume quantification (milliliters/minute) based on time-domain processing by using color Doppler ultrasonography. The indices demonstrated on SPECT scanning before SCS were significantly lower (p < 0.001) in tumor sites compared with those in peritumoral sites (32%) and healthy contralateral areas (41%). Poststimulation results revealed the following: 1) a mean increase of 15% in tumor blood flow in 75% of patients (p = 0.033), as demonstrated on SPECT scanning: 2) a mean increase of greater than 18% in systolic and diastolic blood flow velocities in both tumorous and healthy MCAs in all but one patient (p < 0.002), as exhibited on TCD ultrasonography; and 3) a mean increase of greater than 60% in blood flow volume in tumorous and healthy CCAs in all patients (p < 0.013), as revealed on color Doppler ultrasonography studies. Conclusions: Preliminary data show that SCS can modify locoregional blood flow in high-grade malignant tumors in the brain, thus indicating that SCS could be used to improve blood flow, oxygenation, and drug delivery to such tumors and could be a useful adjuvant in chemoradiotherapy.
URI: http://hdl.handle.net/10553/47747
ISSN: 0022-3085
DOI: 10.3171/jns.2003.98.6.1263
Source: Journal of Neurosurgery[ISSN 0022-3085],v. 98, p. 1263-1270 (Junio 2003)
Appears in Collections:Artículos
Show full item record
Google ScholarTM
Check
Altmetric
Share
Export metadata
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated. | ESSENTIALAI-STEM |
Module: Swagger::Bash
Defined in:
lib/swagger/builder.rb
Overview
A Bash is a 'builder' Hash that can be used to be a Dash ('defined' or 'discrete' Hash). It provides a build method that turns it into a Dash. It enforces the same rules as a Dash except for 'required' properties, which are not enforced until converting to a Dash via `build`.
Defined Under Namespace
Modules: ClassMethods
Instance Method Summary collapse
Instance Method Details
#[](key, &_block) ⇒ Object
41
42
43
44
45
46
47
48
49
# File 'lib/swagger/builder.rb', line 41
def [](key, &_block)
super(key) do |v|
if block_given?
v ||= send(:[]=, key, {})
yield v
v
end
end
end
#buildObject
52
53
54
# File 'lib/swagger/builder.rb', line 52
def build
self.class.superclass.new(to_hash)
end | ESSENTIALAI-STEM |
User:Corruptio optimi pessima
'''Corruptio optimi pessima means in Latin means "Corruption of the best is the worst of all"
What does that mean? You decide. ''' | WIKI |
Time-Shared Computer Model
Simlib to simulate a model of a time-shared computer facility considered by Adiri and Avi-Itzhak. A company has a computer system consisting of a single central processing unit (CPU) and n terminals. The operator of each terminal ‘thinks’ for an amount of time that is an exponential random variable with mean 25 seconds, and then sends to the CPU a job having service time distributed exponentially with mean 0.8 second. ………………………..
tscomp.c
/* External definitions for time-shared computer model. */
#include “simlib.h” /* Required for use of simlib.c. */
#define EVENT_ARRIVAL 1 /* Event type for arrival of job to CPU. */
#define EVENT_END_CPU_RUN 2 /* Event type for end of a CPU run. */
#define EVENT_END_SIMULATION 3 /* Event type for end of the simulation. */
#define LIST_QUEUE 1 /* List number for CPU queue. */
#define LIST_CPU 2 /* List number for CPU. */
#define SAMPST_RESPONSE_TIMES 1 /* sampst variable for response times. */
#define STREAM_THINK 1 /* Random-number stream for think times. */
#define STREAM_SERVICE 2 /* Random-number stream for service times. */
/* Declare non-simlib global variables. */
int min_terms, max_terms, incr_terms, num_terms, num_responses,
num_responses_required, term;
float mean_think, mean_service, quantum, swap;
FILE *infile, *outfile;
/* Declare non-simlib functions. */
void arrive(void);
void start_CPU_run(void);
void end_CPU_run(void);
void report(void);
int main() /* Main function. */
{
/* Open input and output files. */
infile = fopen(“tscomp.in”, “r”);
outfile = fopen(“tscomp.out”, “w”);
/* Read input parameters. */
fscanf(infile, “%d %d %d %d %f %f %f %f”,
&min_terms, &max_terms, &incr_terms, &num_responses_required,
&mean_think, &mean_service, &quantum, &swap);
/* Write report heading and input parameters. */
fprintf(outfile, “Time-shared computer model\n\n”);
fprintf(outfile, “Number of terminals%9d to%4d by %4d\n\n”,
min_terms, max_terms, incr_terms);
fprintf(outfile, “Mean think time %11.3f seconds\n\n”, mean_think);
fprintf(outfile, “Mean service time%11.3f seconds\n\n”, mean_service);
fprintf(outfile, “Quantum %11.3f seconds\n\n”, quantum);
fprintf(outfile, “Swap time %11.3f seconds\n\n”, swap);
fprintf(outfile, “Number of jobs processed%12d\n\n\n”,
num_responses_required);
fprintf(outfile, “Number of Average Average”);
fprintf(outfile, ” Utilization\n”);
fprintf(outfile, “terminals response time number in queue of CPU”);
/* Run the simulation varying the number of terminals. */
for (num_terms = min_terms; num_terms <= max_terms;
num_terms += incr_terms) {
/* Initialize simlib */
init_simlib();
/* Set maxatr = max(maximum number of attributes per record, 4) */
maxatr = 4; /* NEVER SET maxatr TO BE SMALLER THAN 4. */
/* Initialize the non-simlib statistical counter. */
num_responses = 0;
/* Schedule the first arrival to the CPU from each terminal. */
for (term = 1; term <= num_terms; ++term)
event_schedule(expon(mean_think, STREAM_THINK), EVENT_ARRIVAL);
/* Run the simulation until it terminates after an end-simulation event
(type EVENT_END_SIMULATION) occurs. */
do {
/* Determine the next event. */
timing();
/* Invoke the appropriate event function. */
switch (next_event_type) {
case EVENT_ARRIVAL:
arrive();
break;
case EVENT_END_CPU_RUN:
end_CPU_run();
break;
case EVENT_END_SIMULATION:
report();
break;
}
/* If the event just executed was not the end-simulation event (type
EVENT_END_SIMULATION), continue simulating. Otherwise, end the
simulation. */
} while (next_event_type != EVENT_END_SIMULATION);
}
fclose(infile);
fclose(outfile);
return 0;
}
void arrive(void) /* Event function for arrival of job at CPU after think
time. */
{
/* Place the arriving job at the end of the CPU queue.
Note that the following attributes are stored for each job record:
1. Time of arrival to the computer.
2. The (remaining) CPU service time required (here equal to the
total service time since the job is just arriving). */
transfer[1] = sim_time;
transfer[2] = expon(mean_service, STREAM_SERVICE);
list_file(LAST, LIST_QUEUE);
/* If the CPU is idle, start a CPU run. */
if (list_size[LIST_CPU] == 0)
start_CPU_run();
}
void start_CPU_run(void) /* Non-event function to start a CPU run of a job. */
{
float run_time;
/* Remove the first job from the queue. */
list_remove(FIRST, LIST_QUEUE);
/* Determine the CPU time for this pass, including the swap time. */
if (quantum < transfer[2])
run_time = quantum + swap;
else
run_time = transfer[2] + swap;
/* Decrement remaining CPU time by a full quantum. (If less than a full
quantum is needed, this attribute becomes negative. This indicates that
the job, after exiting the CPU for the current pass, will be done and is
to be sent back to its terminal.) */
transfer[2] -= quantum;
/* Place the job into the CPU. */
list_file(FIRST, LIST_CPU);
/* Schedule the end of the CPU run. */
event_schedule(sim_time + run_time, EVENT_END_CPU_RUN);
}
void end_CPU_run(void) /* Event function to end a CPU run of a job. */
{
/* Remove the job from the CPU. */
list_remove(FIRST, LIST_CPU);
/* Check to see whether this job requires more CPU time. */
if (transfer[2] > 0.0) {
/* This job requires more CPU time, so place it at the end of the queue
and start the first job in the queue. */
list_file(LAST, LIST_QUEUE);
start_CPU_run();
}
else {
/* This job is finished, so collect response-time statistics and send it
back to its terminal, i.e., schedule another arrival from the same
terminal. */
sampst(sim_time – transfer[1], SAMPST_RESPONSE_TIMES);
event_schedule(sim_time + expon(mean_think, STREAM_THINK),
EVENT_ARRIVAL);
/* Increment the number of completed jobs. */
++num_responses;
/* Check to see whether enough jobs are done. */
if (num_responses >= num_responses_required)
/* Enough jobs are done, so schedule the end of the simulation
immediately (forcing it to the head of the event list). */
event_schedule(sim_time, EVENT_END_SIMULATION);
else
/* Not enough jobs are done; if the queue is not empty, start
another job. */
if (list_size[LIST_QUEUE] > 0)
start_CPU_run();
}
}
void report(void) /* Report generator function. */
{
/* Get and write out estimates of desired measures of performance. */
fprintf(outfile, “\n\n%5d%16.3f%16.3f%16.3f”, num_terms,
sampst(0.0, -SAMPST_RESPONSE_TIMES), filest(LIST_QUEUE),
filest(LIST_CPU));
}
simlib.c, simlib.h, simlibdefs.h can be found here
tscomp.in – simulation input
Inputs parameter : the minimum number of terminals, the maximum number of terminals, the increment in the number of terminals, The number of responses required, mean think, mean service time, the quantum, the swap time.
tscomp.out – simulation output
Reference :
Textbook : Simulation Modeling and Analysis
Strive to be independence
April 15, 2008
Taipei City
High Speed Network Lab
Udin Harun
Advertisements
Comments are closed.
%d bloggers like this: | ESSENTIALAI-STEM |
Tips To Prevent Bad Breath
Bad breath is a common problem, but preventing it is nonetheless important. It can affect personal relationships, affect self-esteem, and cause embarrassment. Here are some ways to fix bad breath.
Brush your teeth after you eat
After eating foods that contain strong odors, such as onions or garlic, be sure to brush your teeth. These foods often linger in the mouth after eating and can contribute to bad breath. While brushing right away helps to get rid of these odors, it is still important to floss. The lingering food particles can cause plaque to build up between the teeth causing tooth decay and gum disease.
Regular flossing can help to prevent harmful bacteria from building up in the corners of the mouth and also keep your breath smelling fresh and clean. If you are not able to brush your teeth immediately after a meal, chewing sugar-free gum can also help to neutralize the odors. It is also important to brush your teeth at least twice a day.
Floss at least once a day
You should floss your teeth every day to remove food particles and plaque from between teeth that your toothbrush can’t reach. However, if you have braces, you should floss more often to clean around brackets and wires. You can also ask your dentist about special flossing tools that can help you clean hard-to-reach areas around your braces.
Brush your tongue
Pay special attention to brushing your tongue, as it can help get rid of odor-causing bacteria. You can do this by using a toothbrush or a tongue scraper. Make sure to clean the back of your tongue as well. Some mouthwashes contain ingredients that can help reduce bad breath, such as chlorine dioxide and silver citrate. These ingredients may help cure bacterial overgrowth in your mouth that causes bad odors. However, you should check with your dentist before using any over-the-counter products to make sure they won’t interfere with your medications or cause other health problems.
Clean dentures or dental appliances
If you have a removable bridge, denture, retainer, or other dental appliance, make sure you clean these devices daily as you brush your teeth. By cleaning your dental appliance each day, you will prevent food from getting caught between your appliance and your gums, which will promote better oral health.
Avoid dry mouth
A dry mouth is a lack of saliva in the mouth. Saliva plays an important role in keeping you healthy by cleaning your mouth of food particles and plaque. If you suffer from dry mouth, it is important to treat this condition because saliva helps break down food and wash away bacteria. Also, when saliva is not present, food particles remain in your mouth after eating. These leftover food particles attract bacteria and cause foul odors from your mouth. For people with dry mouths, chewing sugarless gum is an effective method to increase the production of saliva. Another method is to drink more water throughout the day to stay hydrated. Other methods for treating dry mouth include chewing on sugar-free mints or hard candy, limiting caffeine and alcohol intake, using a humidifier at night while sleeping, and avoiding tobacco.
Adjust your diet
Certain foods can cause bad breath, like onions and garlic. These foods are also good for your body and shouldn’t always be avoided, but eat them in moderation. Drink plenty of water. Water can help keep your mouth clean by flushing away bad bacteria. If you eat sugary snacks, brush your teeth soon afterward to prevent tooth decay.
Regularly get a new toothbrush
Replacing your toothbrush regularly is essential – you should be replacing it every 2-3 months. Toothbrushes should be replaced when they start looking frayed and worn. Worn-down bristles will not effectively clean your mouth – leaving bits of food behind to rot and cause bad breath. Also, bacteria can build up in a worn-out brush, which can also cause bad breath or contribute to tooth decay.
Schedule regular dental checkups
Scheduling regular dental checkups every six months is a simple way to keep your teeth and gums healthy. During your professional cleanings, your dental hygienist will clean away plaque and tartar buildup on your teeth. Regular professional cleanings will also help prevent gingivitis, tooth decay, and periodontal (gum) disease. A thorough examination of your mouth will be performed at every checkup. This will allow your dentist to check for the early signs of oral cancer, gum disease, and other serious dental health conditions.
Good oral hygiene habits are essential for a healthy mouth and for preventing bad breath. Practicing good oral hygiene habits at home is essential in keeping your breath smelling fresh and clean. By maintaining a good oral hygiene routine, you can prevent bad breath from occurring and keep your smile looking healthy and bright!
At Coeur D’Alene Family Dentistry, we strive to provide each of our patients with a positive and relaxing experience. If you’re ready to experience the best dental care, please contact us at 2201 N Government Way G, Coeur D’Alene, ID 83814. For an appointment, call (208) 664 – 9129 or email us at [email protected]
0/5 (0 Reviews) | ESSENTIALAI-STEM |
Roxane Gay: By the Book
By the Book The author, most recently, of “Difficult Women” on what moves her in literature: “Basically, I love reading things that make me feel the same way I feel when listening to Beyoncé — slayed.” What books are on your night stand now? They aren’t necessarily on my night stand, but the books I am reading or threatening to read right now are: “I’m Judging You,” by Luvvie Ajayi; “Made for Love,” by Alissa Nutting, which is out next year; “The Fireman,” by Joe Hill; “Swing Time,” by Zadie Smith; “All the Birds in the Sky,” by Charlie Jane Anders; “Black Water Rising,” by Attica Locke; “The Wangs vs. the World,” by Jade Chang; “Thrill Me,” by Benjamin Percy; and “The Sympathizer,” by Viet Thanh Nguyen. What’s the last great book you read? “Commonwealth,” by Ann Patchett. She is one of my favorite writers, and I loved the ambitious, almost too ambitious, narrative structure of the novel and these little worlds she kept building and tearing down to move the story forward. The book is also set in Los Angeles, one of my favorite cities. What’s the best classic novel you recently read for the first time? I want to say something impressive here, but I cannot remember the last time I read a classic novel, let alone one that would rate as “the best.” Oh, I suppose I’ve read “Anna Karenina” in the last decade. That was a great book — DRAMA for days. What’s your favorite book no one else has heard of? I came up in the small-press world, so a lot of my favorite books have come from micropresses — books with runs of 25 or 75, rarely more. Anyway, one of my favorite books few people have heard of is “I Am a Magical Teenage Princess,” by Luke Geddes. It’s this amazing collection of short stories that is sharp and dark and mostly about teenage girls. The highlight is the story “Betty and Veronica,” about the Archie Comics characters as lovers in a high school. I will reread that story every chance I get. It’s amazing and also so sexy. What do you like to read for solace or comfort? For inspiration? When the world is too much, I love to read thrillers and romance novels. I just want to lose myself in something either intriguing or ludicrously romantic. For inspiration, I go back to my favorite books, the ones I wish I had written. This seems sufficiently vague given that I haven’t listed any titles. My No. 1 go-to book is “The Age of Innocence,” by Edith Wharton. Which writers — novelists, playwrights, critics, journalists, poets — working today do you admire most? I love Zadie Smith; Emily Nussbaum; Marcy Dermansky; Lily Hoang; xTx, Dana Johnson; Alexander Chee; Terry McMillan; Toni Morrison; Celeste Ng; Claudia Rankine; Saeed Jones; Rickey Laurentiis; Robin Coste Lewis; Lindsay Hunter; Cynthia Bond; Elisa Gabbert; Cristina Henríquez; Jesmyn Ward; Laura Lippman; Eduardo Corral; Alissa Nutting; Meg Wolitzer; Randa Jarrar; Alicia Erian; Catherine Chung; and Vanessa Veselka, to name a few. What do you read when you’re working on a book? And what kind of reading do you avoid while writing? I read books I aspire toward in my own writing and books that capture the tenor of what I’m going for in a given project. I don’t really avoid much of anything. What moves you most in a work of literature? I love when I read something that feels like the writer has taken a blade to my chest and cut my heart out. Basically, I love reading things that make me feel the same way I feel when listening to Beyoncé — slayed. Which genres do you especially enjoy reading? And which do you avoid? I love literary fiction so long as it is not about (a) writers, (b) sad white people in sad marriages or (c) sad white writers in bad marriages. I know literary fiction tends to lack plot, but I don’t care. I also love spy thrillers, novels about drug cartels, and the like. I read a fair amount of poetry. I work pretty hard to avoid self-help books. I’m beyond the kind of redemption offered by those books. How do you like to read? Paper or electronic? One book at a time or simultaneously? Morning or night? I read both physical books and e-books with equal vigor. E-books are so great. I can have hundreds of books in the palm of my hand. That is so cool. I read multiple books at a time, and I read at all times of the day, whenever I can find a pocket of time. What’s the last book that made you laugh out loud? “China Rich Girlfriend,” by Kevin Kwan. Soapy and hilarious. The last book that made you cry? “Homegoing,” by Yaa Gyasi; and the brutality of what her characters endured made me sob. The history of this world is a bloody wound. The last book that made you furious? “Evicted,” by Matthew Desmond. My God, what that book lays bare about American poverty. It is devastating and infuriating and a necessary read. How do you organize your books? My books are organized alphabetically. I want to find what I want when I want it. What book might people be surprised to find on your shelves? The Vanessa Michael Munroe series by Taylor Stevens. They are so addictive! Also, Stevens made up a job title — informationist. I love the absurdity of it almost as much as I love Robert Langdon’s “symbology.” But seriously, the books are a fun read. What’s the best book you’ve ever received as a gift? A signed copy of Ina Garten’s “Make It Ahead” cookbook. Ina is a goddess. Who is your favorite fictional hero or heroine? Your favorite antihero or villain? I have a real soft spot for Dirk Pitt from the Clive Cussler books when he still wrote them himself. Dirk is this amazing, handsome, brash, adventurous guy who loves the ocean and cars and his sidekick Al Giordino. And he just always knows what he needs to know exactly when he knows it. He wouldn’t get kicked out of bed is all I’m saying. And in the books, he doesn’t get kicked out of bed. My favorite villain is Annie Wilkes in Stephen King’s “Misery.” She was certainly . . . committed. You have to admire that. And I also recognize that beneath her pathology, she was just lonely. I understand what loneliness can make a woman do. What kind of reader were you as a child? Which childhood books and authors stick with you most? I was a voracious reader as a child. Books were my escape and my salvation from being a nerdy little loser. The “Little House on the Prairie” books were certainly the most formative books for me. I read anything and everything I could get my hands on, and my parents did not censor my reading at all, so I also have fond memories of “The Clan of the Cave Bear” and the like. Things happened on pelts that blew my young mind. If you could require the president to read one book, what would it be? Frankly, President Obama is well read and wouldn’t have needed my advice, though, vainly, I would love if he read something I wrote. I would require the new president to read, well, any book at all, because he does not give the impression he has ever read a book. I’d offer recommendations, but anything I might suggest is well beyond his reading level. Alas. You’re organizing a literary dinner party. Which three writers, dead or alive, do you invite? Edith Wharton, Zadie Smith and Samantha Irby. Oh, what a night we would have. Disappointing, overrated, just not good: What book did you feel you were supposed to like, and didn’t? Do you remember the last book you put down without finishing? I cannot handle the “My Struggle” books by Knausgaard. I struggle with them. I struggle mightily. The last book I put down without finishing (though I do hope to get back to it someday) is “Everybody’s Fool,” by Richard Russo. I am a huge fan of Russo — “Straight Man” and “Nobody’s Fool” are two of my favorite books, but the latest one just didn’t grab me. Whom would you want to write your life story? Zadie Smith. I seem like a stalker now, but she is such a great writer. My life would be in good hands with her. What do you plan to read next? Next up: “Lazaretto,” by Diane McKinney-Whetstone, and “The Stand,” by Stephen King. | NEWS-MULTISOURCE |
User:Xpclient/Social evil
A social evil is any action or consequence that is not in the public interest or which is anti-social and works against the development of society. Social evils cause damage to the society or its citizens in physical, emotional or cultural form. Terrorism would be an example of a social evil as would be prostitution, organized crime, alcoholism , pollution, dowry in any form or corruption. | WIKI |
Nice Work
Nice Work is a 1988 novel by British author David Lodge. It is the final volume of Lodge's "Campus Trilogy", after Changing Places (1975) and Small World: An Academic Romance (1984). Nice Work won the Sunday Express Book of the Year award in 1988 and was also shortlisted for the Booker Prize.
The larger socioeconomic background to the novel was the economic policies and education cuts during the Thatcher government. Lodge was inspired, in part, by his experiences of shadowing a friend who supervised an engineering firm.
The year following its publication, the book was adapted in a four-part TV series for the BBC.
Plot summary
Set in 1986, in the fictional city of Rummidge, the book describes the relationship between Robyn Penrose, a feminist university teacher specialising in the industrial novel and women's writing and Vic Wilcox, the manager of J. Pringle & Sons Casting & General Engineering ("Pringle's"). Robyn is a temporary lecturer at Rummidge, where her boss is Professor Philip Swallow. Swallow is head of the English Department but is also Dean of Rummidge's Arts Faculty. Robyn has the temporary lectureship at Rummidge because of the time demands of Swallow's new administrative responsibilities.
As part of the "Industry Year Shadow Scheme", the university is required to send one of its faculty into a local factory. Robyn is the chosen faculty member from Rummidge and the chosen factory is Pringle's, where Robyn is to shadow Vic Wilcox and observe the inner workings of a real-life foundry, which she has never seen.
The novel also traces the separate private lives of Robyn and Vic. In the Wilcox family are Vic, his father, his wife Marjorie and his children. Separately, Robyn goes through various stages of her long-standing relationship with her boyfriend, Charles, a fellow literary scholar. Later in the novel, to Robyn's discomfort, after she has completed her time at Pringle's, the shadow scheme reverses, with Vic shadowing her during her teaching at Rummidge. The philosophical conflict between the ideologies of industry and academe come to the fore. Later, away from Vic, Professor Morris Zapp, a friend of Swallow's from the fictional American university Euphoric State (based on UC Berkeley), and a character from the earlier two novels in the Campus Trilogy, pays a brief visit to Rummidge on his way to a conference. He learns about Robyn's work for the first time and is impressed. Zapp tries to arrange for Robyn to have a job interview at Euphoric State for an open faculty position, to run interference against his ex-wife, whom Euphoric State's faculty is trying to recruit for the post. The uncertainty in Robyn's professional status comes from whether she will be able to find a permanent post anywhere, in the context of national budget reductions to the universities.
The relationship between Robyn and Vic reveals their weaknesses. Robyn's academic position is precarious because of national budget cuts to education and the universities. Vic has to deal with industrial politics at Pringle's. The plot is a pastiche of the industrial novel genre, alluding to North and South by Elizabeth Gaskell. This gentle ribbing acts to undermine the postmodern and feminist position of Robyn, who accepts the hand of fate despite ridiculing its role as the sole restorative capable (in the minds of authors of industrial novels) of elevating the female to a serious social position. Robyn acquires insight into the pragmatic ethos whose encroachment on university culture she resents and about the physical reality of factories of which her only prior knowledge was literature. In his turn, Vic learns to appreciate the symbolic or semiotic dimension of his environment and discovers a romanticism within himself that he had previously despised in his everyday life.
Adaptation
In 1989, the BBC broadcast a four-part TV miniseries based on the novel, with a screenplay by Lodge. Directed by Christopher Menaul, the series featured Haydn Gwynne as Robyn Penrose and Warren Clarke as Vic Wilcox. The University of Birmingham served as the filming location of many of the scenes from this series. The series won the 1989 Royal Television Society award for best drama series. | WIKI |
Generate a database schema with OpenJPA and Hibernate on JBoss AS 7
When you develop an application, sometimes you want to run it quickly and test it manually. Sometimes you want to execute some integration tests that require database access. In all of these cases you need a working database. Thanks to JPA providers we can generate the database schema based on the entity definitions. Let's quickly look at two of them: Hibernate and OpenJPA.
Hibernate configuration
I'm sure you have used Hibernate before. Did you know that it has a nice feature that generates the schema in the database at application startup? You can additionally place any SQL statements you want to execute after the creation of the schema into file called import.sql.
To enable the schema generation in Hibernate add the following property to persistence.xml:
<property name="hibernate.hbm2ddl.auto" value="create-drop"/>
It works perfectly in JBoss AS 7.
The value create-drop means that the database schema will be created at application deploy time and removed when you undeploy it. There are other possible values like validate, update and create.
By default, Hibernate will search for the import.sql file in the root of the classpath of the produced archive. For a WAR file, it is located at WEB-INF/classes/import.sql, but if you generate a regular JAR just place the import.sql in the root of the file.
If you want to change the location of the file use hibernate.hbm2ddl.import_files. As the property name suggests, you can specify more than one file.
Read more about the Hibernate properties you can use in the Miscellaneous Properties table located in the Hibernate documentation.
OpenJPA configuration
OpenJPA includes a similar feature. You can generate the schema by using the provided MappingTool. MappingTool allows you to run the generation even from a command line. In our case, the more interesting feature is running it at application deploy time so that we automatically get a working schema in our database.
To make it work at runtime we need to add a openjpa.jdbc.SynchronizeMappings property to persistence.xml:
<property name="openjpa.jdbc.SynchronizeMappings" value="buildSchema"/>
Additionally we need to list all the classes for which we want to generate the schema in our persistence unit so that OpenJPA knows about these classes at startup. Just use the <class/> marker, for example:
<class>pl.goldmann.as7.model.Chair</class>
In JBoss AS 7 we need to force the initialization of the OpenJPA persistence unit that generates the schema at deployment time to actually trigger the schema generation. It's very simple, just add another property:
<property name="openjpa.InitializeEagerly" value="true"/>
I'm not sure if OpenJPA has a built-in feature to execute SQL statements after schema generation like Hibernate. If you know how to do it, please speak up.
And that's it. It's a simple to implement but handy feature.
Creative Commons License | ESSENTIALAI-STEM |
What is the Micron Size of Reverse Osmosis Filter?
The pore size of a reverse osmosis filter is approximately 0.0001 micron.
Reverse osmosis is a process in which water is forced through a membrane to extract dissolved minerals and other pollutants. Reverse osmosis filters are used in many industries, including water purification, wastewater treatment, air quality control, and food processing. In this article, we explore different sizes of filter pores and how the pore size of an RO filter affects filtration.
What is the Micron Size of Reverse Osmosis Filter?
A pore size of a reverse osmosis filter is approximately 0.0001 micron. Micron sizes of reverse osmosis filters are listed on most filters and can be found on their packaging directly.
What is the Pore Size of RO Membrane ?
The membrane of the reverse osmosis filter has a pore size between 0.0001 and 0.001 micrometers, which is about 1/100 the diameter of a strand of human hair.
A membrane with a pore size of less than 0.001 micrometers is very fine and is said to be ultra- or micro-filtration (MF).
The membrane with a pore size of greater than 0.1 micrometers but not more than 1 micrometer is called microfiltration (MF).
Membrane filtration processes that remove bacteria, viruses, and other pathogens are called ultra- (UF) or microfiltration (MF). The UF process removes 99.99 percent or more of the desired water contaminants and pathogens.
The MF process removes more than 99.99 percent of the desired water contaminants and pathogens, but not all of them.
The micron size of a membrane is the space between molecules in the membrane and how much chemical it can hold and still not dissolve. For example, a 0.2-micron membrane has very small pores (and therefore will be able to remove very small particles) while an 8-micron membrane has larger pores (and therefore will be able to remove larger particles).
Best Selling Reverse Osmosis Filtration Systems
Here are some of our favorite Reverse Osmosis Filtration systems:
What does a 0.1 micron filter remove?
A 0.1-micron filter will remove 99.99% of the particles that are larger than 0.1 micron in size.
What does a 0.2 micron filter remove?
A 0.2-micron filter removes over 99.9% of bacteria, protozoa, and sediment, and dirt particles in water. A 0.2 micron portable water purifier will remove all viruses from drinking water sources such as lakes, rivers, streams or groundwater.
What does a 0.5 micron filter remove?
A 0.5-micron filter removes over 90% of bacteria and protozoa and over 70% of sediment and dirt particles in water. A 0.5-micron filter is a good choice for removing most pathogens from water, including Giardia lamblia, Cryptosporidium, Salmonella, Shigella, and E-coli bacteria; as well as active viruses such as Hepatitis A virus (HAV) and Norovirus from drinking water sources such as lakes, rivers or streams or groundwater.
What does a 1 micron filter remove?
A 1 micron filter removes over 99% of bacteria, protozoa, sediment and dirt particles in water. A 1 micron filter is the most common type of portable water purifier used for backpacking or mountaineering. A 1 micron filter will remove all viruses from drinking water sources such as lakes, rivers, streams or groundwater.
What size filter removes bacteria?
A reverse osmosis filter is typically used to remove bacteria. A pore size of a RO filter is approximately 0.0001 micron, which means that a RO filter will remove about one trillion bacteria per liter.
What is a nano filter?
A nano filter is a small filter that has a lower pore size than a standard filter. Nano filters are perfect for the most demanding applications, such as water purification and wastewater treatment. They have very low contact points, so they don’t cause any damage to the water or its environment.
What is a Micron?
A micron is a unit of length equal to one millionth of a meter (μm). It is used to measure the size of particles in fluid suspension.
Why does Micron Size Matter for Water Filters?
As the micron size of a filter gets smaller, the pore size and the flow rate of water through the filter will increase. The most common types of filters used in water purifiers are membrane, activated carbon and ceramic filters. Each type has different pore sizes and flow rates.
How many Microns Should Your Water Filter Be?
How Many Microns Should Your Water Filter Be?
How Are Filter Pore Sizes Measured?
Pore size is measured in microns. A micron is equal to one-millionth of a meter (μm). There are many ways to measure pore size; however, most manufacturers use a laser diffraction method called “grazing incidence small angle x-ray scattering” to determine pore sizes. This method measures the amount of light (or x-rays) that is scattered by a material as it passes through it.
What Is the Difference Between Micron and Millimeter Sizes?
There are 1000 microns in one millimeter, so one micron is equal to 0.001 mm. This means that when you see a filter labeled as having 0.2-micron pores, the pores are 0.002 mm (or 2/10,000 of a millimeter) in diameter. The term “absolute” pore size is used to indicate the size of the opening of the filter pore (without any filters or membranes inside). The term “effective” pore size is used to indicate the size of the opening of the filter after it has been loaded with a membrane or other material.
What Is the Difference Between Pore Sizes of Filters and Membranes?
Pore size is not the same as the size of a membrane or other filter product. For example, a 0.2 micron filter has pores that are 20 nanometers (nm) in diameter, while a 0.2 micron membrane has pores that are 200 nm in diameter. A nanometer (nm) is equal to one billionth of a meter (10 m). Nanoporous membranes have many small pores that allow for very precise filtration and separation of particles based on size; however, they can only be used for liquids and gases that do not dissolve in water. For example, if you wanted to filter out a protein that had a molecular weight of 50,000 Daltons (Da), you would need to use a nanoporous membrane with pores no larger than 1,000 Da to avoid allowing the protein through. You could not use a 0.2 micron filter because it would allow the protein through and clog the filter.
Conclusion
The micron size of a reverse osmosis filter is the space between the pores in the filter. The larger the pores are, the better it will be at removing particles from water. For example, a 0.2 micron filter is going to have very small pores (and therefore be able to remove very small particles) while an 8 micron filter has larger pores (and therefore will be able to remove larger particles).
Meet the author: Robert Johnson
Robert Johnson is a professional kiteboarder, surfer, and lifeguard. He’s been involved in many different sports and has competed at the national level in multiple disciplines. Robert has been an avid comic book reader since he was a child and is now also a video game enthusiast. “I’m a geek and a nerd who loves to read, fish, and play video games. I occasionally write.” Learn more about Robert and the rest of the team. | ESSENTIALAI-STEM |
wiki:TipAndDoc/storage/filesystem/ext4
Version 6 (modified by mitty, 9 years ago) (diff)
--
ext4lazyinit
• Ubuntu 12.04.1 x86_64で作ったext4のfeature
• sudo mkfs.ext4 /dev/md0 -m 1
• sudo tune2fs -l /dev/md0
Filesystem features: has_journal ext_attr resize_inode dir_index filetype needs_recovery extent flex_bg sparse_super large_file huge_file uninit_bg dir_nlink extra_isize
Filesystem flags: signed_directory_hash
Default mount options: user_xattr acl
• man mke2fs
-E extended-options
lazy_itable_init[= <0 to disable, 1 to enable>]
If enabled and the uninit_bg feature is enabled, the
inode table will not be fully initialized by mke2fs.
This speeds up filesystem initialization noticeably,
but it requires the kernel to finish initializing
the filesystem in the background when the filesystem
is first mounted. If the option value is omitted,
it defaults to 1 to enable lazy inode table zeroing.
lazy_journal_init[= <0 to disable, 1 to enable>]
If enabled, the journal inode will not be fully
zeroed out by mke2fs. This speeds up filesystem
initialization noticeably, but carries some small
risk if the system crashes before the journal has
been overwritten entirely one time. If the option
value is omitted, it defaults to 1 to enable lazy
journal inode zeroing.
(snip)
-O feature[,...]
uninit_bg
Create a filesystem without initializing all of the
block groups. This feature also enables checksums
and highest-inode-used statistics in each block‐
group. This feature can speed up filesystem cre‐
ation time noticeably (if lazy_itable_init is
enabled), and can also reduce e2fsck time dramati‐
cally. It is only supported by the ext4 filesystem
in recent Linux kernels.
• /etc/mke2fs.conf
[defaults]
base_features = sparse_super,filetype,resize_inode,dir_index,ext_attr
default_mntopts = acl,user_xattr
enable_periodic_fsck = 0
blocksize = 4096
inode_size = 256
inode_ratio = 16384
[fs_types]
ext3 = {
features = has_journal
}
ext4 = {
features = has_journal,extent,huge_file,flex_bg,uninit_bg,dir_nlink,extra_isize
auto_64-bit_support = 1
inode_size = 256
}
ext4dev = {
features = has_journal,extent,huge_file,flex_bg,uninit_bg,dir_nlink,extra_isize
inode_size = 256
options = test_fs=1
}
• lvm - mkfs.ext4 is taking hours to complete on 4TB raid 5 - Server Fault
Note that lazy_itable_init is turned on by default if the kernel you are running supports automatic background initialization of the inode table ( 2.6.37+ ). Without that support, enabling this option is unsafe as it leaves the inode tables uninitialized, so they may contain garbage that fsck will mistake as valid inodes under certain circumstances. Also uninit_bg is enabled by default for ext4.
Very long mount times of large ext4 filesystems - 12.04.1 LTS
• TB級のext4をマウントしようとすると、数分以上待たされる 現在は修正済 | ESSENTIALAI-STEM |
User:Mystogan S
I am passionate about making the world a better place and hope to play my part by editing articles that will educate readers and get them informed about the world we all live in. | WIKI |
Bernard Lee (activist)
Bernard Lee (October 2, 1935 – February 10, 1991) was an activist and member of the Southern Christian Leadership Conference during the Civil Rights Movement. He was a key associate of Martin Luther King Jr.
Civil Rights Movement
Lee began his civil rights career as a student at Alabama State College, from which he was expelled after leading more than half the student body in a march on the Alabama capitol. During demonstrations for equal library access in 1960, he said: "My grandfather had only a prayer to help him. I have a prayer and an education."
Bernard Lee was a courageous student activist, a founding member of the Student Nonviolent Coordinating Committee (SNCC). While attending Alabama State University (ASU), he led a sit-in at the Alabama state capitol cafeteria. He was expelled from ASU for the event after the governor threatened the university president, saying he would withhold funding from the HBCU if Lee was not expelled. So, he transferred to Morris Brown College in Atlanta, Georgia to work with the Southern Christian Leadership Conference (SCLC) and Martin Luther King Jr, where he contributed to the Poor People’s Campaign and was at King's side after his assassination. Lee later worked for the U.S. Government under President Carter and for Washington D.C. under Mayor Barry (Source NAACP 2014) (http://www.blackpast.org/aah/morris-brown-college-1885)
Lee was King's personal assistant and traveling companion for many years. He was arrested with King in 1960 and left the Student Nonviolent Coordinating Committee (SNCC) in 1961 so that he could work full-time with King and the SCLC. He participated in the 1961 Freedom Rides and helped to orchestrate the Birmingham Campaign in 1963. He went to Chicago with King in 1965. In January 1967, he was one of few in to accompany King to Jamaica while he wrote Where Do We Go From Here?
Lee was closer to King than any other member of the Civil Rights Movement, so much that by some accounts he began to identify with King completely. According to historian Taylor Branch: "Lee had already come to dress like King, walk like King, and even to imitate King's long, measured phrases."
Lee worked on the Poor People's Campaign after King's death in 1968. He also became vice president of the SCLC, which diminished in power over the following years.
Lee was directly privy to FBI targeting of King under COINTELPRO, having been present when King received a letter from the FBI urging him to commit suicide. Lee sued the Federal Bureau of Investigation (FBI) in 1977 in an effort to force the destruction of surveillance recordings of King collected during a January 5th, 1963 stay at the Willard Hotel in Washington D.C. Judge John Lewis denied Lee's request and ordered the records to be preserved by the National Archives and sealed until 2027.
Later life
Lee worked during the Carter administration as a civil rights advisor to the Environmental Protection Agency. During this time he joined with other Black members of the administration to express concern over its policies toward Africa and African Americans.
In 1985, Lee received a master's degree in Divinity from Howard University, and became the chaplain at Lorton Prison in Virginia.
In 1989, he was involved in a public dispute with Ralph Abernathy over Abernathy's book And the Walls Came Tumbling Down. Lee criticized Abernathy's book, which supported rumors about King's extramarital sex life.
Lee died of heart failure in 1991. | WIKI |
Wikipedia:Help desk/Archives/2011 December 31
= December 31 =
Confidentiality Please - Wingfield Castle
Hello, my name is (Redacted) and my Father is (Redacted)
When you type into Google the surname ' (Redacted) ', a Wikipedia page comes up titled 'Wingfield Castle' and reveals my family name and information. I am currently in my last year of University and am applying for jobs. Recently, at a job interview, the interviewer pointed this webpage out to me and how easily available it was to find and warned me for future job interviews. I do not want my potential employer to know my personal information so easily, especially of where I live (and there's a photo!) as do not want any prejudice against me. Please could you take our name, (Redacted) off the webpage so it no longer comes up in the Google search? You can still write that a barrister bought it and his family still live there today, but I would be grateful if I never have to have this problem again. It is a very difficult time to get a job!
If you wanted to update your page on Wingfield Castle then you should add in that Baron Ash owned the Castle before and he was an incredibly interesting man. If you wanted more information on him I would be happy to supply it as my Godfather was friends with him, and my Father has a great knowledge of him.
I would appreciate it if you would get back to me about this matter, and please email me on the below address. This is important to me.
Many thanks and kind regards; Happy New Year! (Redacted)
(Redacted) — Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:41, 31 December 2011 (UTC)
* Please do not post your email here. I have removed the information from Wingfield Castle as it was more like trivia and does not seem to be terribly important to the article in the first place. I have also removed your name here as this page is visible to Google as well. If you wish to completely expunge any records of your name being mentioned, you can also file a request at Requests for oversight or directly send an email to<EMAIL_ADDRESS><EMAIL_ADDRESS>to formally suppress any mentions of your name for privacy reasons.-- Obsidi ♠ n Soul 00:51, 31 December 2011 (UTC)
* I sympathise with your concern that your confidentiality was compromised, but I am rather bemused that you have sought to redress this by plastering your name, your father's name, and your email address in an entry titled "Wingfield Castle" on a page that can be seen by anybody in the world! Obsidian Soul has kindly removed them for you, but I can't work out why you did it in the first place! --ColinFine (talk) 20:25, 31 December 2011 (UTC)
Flash drive
I got my first flash drive ... and promptly screwed up. The second time I copied some files to it, I yanked it out without selecting eject. All of the files and folders are gone (no permanent loss). My question is, have I damaged the drive, or can I go ahead and transfer the files again? Clarityfiend (talk) 02:00, 31 December 2011 (UTC)
* You'll want to ask this question at WP:RDC rather than here. -- Jayron 32 02:08, 31 December 2011 (UTC)
* Oops. Thought I had! Clarityfiend (talk) 02:41, 31 December 2011 (UTC)
Can someone upload this picture for me and show me how to?
http://www.midwestsportsfans.com/wp-content/uploads/2011/12/kyle-orton-chiefs-waiver-wire-pickups.jpg
I want to update the Kyle Orton page.
The website is: http://www.midwestsportsfans.com/2011/12/fantasy-football-week-16-waiver-wire-pickups-and-advice/
Thanks!
-- Piazzajordan2 ( Talk. ) 02:33, 31 December 2011 (UTC)
* It appears that it would be a copyright violation to do that. See WP:Copyrights. Also see WP:UPI. Wtmitchell (talk) (earlier Boracay Bill) 02:38, 31 December 2011 (UTC)
* Can you find a picture that is not copyrighted? I want a picture of Kyle Orton with the Kansas City Chiefs, so I can change it on his page.
-- Piazzajordan2 ( Talk. ) 03:27, 31 December 2011 (UTC)
* Sure. Just take your camera with you the next time you go to see the Chiefs play in person. When you are there, take a picture with your camera of Orton warming up or something like that. You can then upload that picture. -- Jayron 32 03:37, 31 December 2011 (UTC)
URGENT: Book content has disappeared!
I am in the process of completing a Wikipedia Book compilation, a draft of which I was going to publish to PDF in the next few hours for a course I am teaching, but when I just entered Wikipedia and opened the Book Creator and it asked me if I wanted to continue with my book, which it showed as having 217 pages (articles), and I clicked OK, it opened showing EMPTY CONTENT. NO pages or chapters or anything else except the title and subtitle are visible. I tried opening Book Creator again, and again it showed my existing book with 217 pages, but again, once opened, it showed empty content. Where is the book I have been working to compile for the past several days??? — Preceding unsigned comment added by Dr.thomas.gardner (talk • contribs) 02:46, 31 December 2011 (UTC)
* Special:Contributions/Dr.thomas.gardner shows a book at User:Dr.thomas.gardner/Books/Science Fiction Science. Is that it? It should have a link saying "Open in Book Creator". PrimeHunter (talk) 02:57, 31 December 2011 (UTC)
To PrimeHunter: Thanks for your reply. This isn't exactly it. I'm trying to recreate it from records of Wikipedia pages I've visited since the last save. However, I'm running into a new problem: When I try to create the PDF, it hits an error at about 80% completion. — Preceding unsigned comment added by Dr.thomas.gardner (talk • contribs) 06:48, 31 December 2011 (UTC)
* PDF creation also failed for me around 80% into User:Dr.thomas.gardner/Books/Science Fiction Science. Sometimes this is caused by incompatible code in one of the pages. You could try to experiment to see if the problem is limited to one page and then omit it, but I admit this can be time consuming if the error message doesn't give a page name and you have more than 200 pages. And I don't promise it can be fixed by removing an article. PrimeHunter (talk) 02:26, 2 January 2012 (UTC)
Thanks again. One more question: Is it possible to create and save multiple books? I ask because I can split the current book into individual volumes, if Wikipedia will let me save them under different file names. — Preceding unsigned comment added by Dr.thomas.gardner (talk • contribs) 16:00, 2 January 2012 (UTC)
* Yes, you can create and save multiple books. At Special:Book you can save under a new name in the "Save and share your book" box. If you want to see your existing books and open one of them then click "User:Dr.thomas.gardner/Books/" in the box. See more about books at Help:Books. PrimeHunter (talk) 20:56, 2 January 2012 (UTC)
The statements made below are untruthful. They have been made, most likely, by Mr. Taiani's ex-wife, Elizabeth, who has tried nothing less than to ruin his reputation and career. Her father, William Abramsky, was the owner of Crossroads Wine and Spirits. Mr. Taiani resigned his position from that merchant due to conflict with his spouse/marriage and her family.
Micheal Taiani
The false statements below were made, most probably, by Mr. Taiani's ex-wife, Elizabeth H. Abramsky, who has tried nothing less than to ruin this man's reputation and career. Crossroads Wines and Spirits was owned and operated by her father, William ("Willie") Abramsky. Mr. Taiani resigned his sales position in 2001 after six years of diligent, professional service. For unknown reasons, the business closed in April, 2011. Question: How, in December 2011, could there have been a "Crossroads Management Team" in existence to make such defaming statements when the retail shop closed its doors permanently eight months prior?
This clearly explains why this author was unable to complete a Wikipedia article page about this dedicated wine professional.
http://en.wikipedia.org/wiki/User:Winesbytheglass/Ty_the_wine_guy
The article about Micheal Taiani "Ty the wine guy. He was fired from crossroads wines for is lack of knowledge of the products. He does and did NOT have a celebrity following only complaints. Nothing he stated in is article holds ANY TRUTH! You need to research a persons backround before you print articles about them. Crossroads Management Team — Preceding unsigned comment added by <IP_ADDRESS> (talk) 02:52, 31 December 2011 (UTC)
* I'm afraid I cannot find any article under that name. Could you please indicate the exact title of the article which has the problems? -- Jayron 32 02:57, 31 December 2011 (UTC)
* We are online and don't print, and I cannot find mention of this person here, so I'm unsure whether you refer to a Wikipedia article. This is a help desk for Wikipedia, a free online encyclopedia. PrimeHunter (talk) 03:17, 31 December 2011 (UTC)
* User:Winesbytheglass/Ty the wine guy looks like the page that's being reported. fredgandt 03:25, 31 December 2011 (UTC)
* Ah. That's a draft article and not currently part of the article space. I don't know that its a problem, given that it isn't currently an article. -- Jayron 32 03:29, 31 December 2011 (UTC)
* Further investigation shows what looks like sock-puppetry and prior warnings about vanity. Too tired to do more. See diff (the edits between) and the contributors to User:Winesbytheglass/Ty the wine guy. fredgandt 03:33, 31 December 2011 (UTC)
* Yeah, I saw that. I read that to mean that multiple people were working on the draft. There are no rules against that. -- Jayron 32 03:35, 31 December 2011 (UTC)
* You saw the prior accusations of socks? All the contributors have done nothing else but that draft. They use the same crayon. fredgandt
* I was not aware that I was bound to jump to the same unsubstantiated conclusions that other people have. -- Jayron 32 04:25, 31 December 2011 (UTC)
* Neither was I. fredgandt 04:56, 31 December 2011 (UTC)
* To the OP (original poster). We take notability and verifiability very seriously here, but we are but a few volunteers trying to look after an expanding 4million(ish) articles. The page that seems to be causing the offence (as you see it) is in a User-space, and so is very unlikely to be stumbled upon by any editor. If it found its way out into the Article-space, it would be rigorously challenged, allowing that only the good bits survived (if any). f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 03:47, 31 December 2011 (UTC)
* So, what I don't understand about this is: Since when is the article in user space? The original post suggests that it was in article space, and it indeed is far more likely for such articles to be created in article space. So, has it been userfied, or did the SPU create it in user space to begin with? — Sebastian 02:40, 2 January 2012 (UTC)
* To the OP (original poster): How did you find this article? Did you google for the name? — Sebastian 02:42, 2 January 2012 (UTC)
GeoHack, adding coordinates to an article
This article, to be specific.
Here's a link to it on google maps: http://maps.google.com/maps?hl=en&ll=33.34236,43.86137&spn=0.02377,0.049739&sll=33.34236,43.86137&sspn=0.02377,0.049739&vpsrc=0&t=h&z=15
Here's an Example of a very similar similar article that has the coordinates in the upper right corner of article.
Someone point me in the right direction for how to go about doing that? Earthpig (talk) 03:00, 31 December 2011 (UTC)
* Your example Camp Fallujah (a redirect to MEK Compound) adds coordinates via a parameter in Infobox military structure. Clicking the Edit tab at MEK Compound shows that it uses the parameter . Your target article Dreamland (Fallujah, Iraq) does not have an infobox but you should be able to use coord anyway. See the link for documentation. Omit before it when it's not used in an infobox with a coordinates parameter. PrimeHunter (talk) 03:10, 31 December 2011 (UTC)
* Sweet, done, thanks. Earthpig (talk) 03:24, 31 December 2011 (UTC)
* You're welcome. I see you copied "type:airport" from the other article but I'm not sure it's appropriate in either article based on the current article content. See Template:Coord. PrimeHunter (talk) 03:38, 31 December 2011 (UTC)
stack overflow at line 2946/computer registry error
I googled the above and recd. notice on your site of a detail related to the above subject matter. How do I repair a stack overflow error on line 2946? I am Paul Klearman, e-mail:, thank you. The computer system is running very slow and the "hour glass" stays on way too long. The registry programs that I have used to date have had no positive effect... — Preceding unsigned comment added by <IP_ADDRESS> (talk) 04:18, 31 December 2011 (UTC)
* I have removed your email address because publishing it on a public website is a phenomenally bad idea. As far as answering your question goes, you would have better luck getting an answer at Reference desk/Computing. -- Jayron 32 04:23, 31 December 2011 (UTC)
* (ec)I suspect, based on your question, that you found one of our over 6 million articles and thought we were affiliated in some way with that subject. Please note that you are at Wikipedia, the free online encyclopedia that anyone can edit, and this page is for asking questions related to using or contributing to Wikipedia itself. Thus, we have no special knowledge about the subject of your question. You can, however, search our vast catalogue of articles by typing a subject into the search field on the upper right side of your screen. If you cannot find what you are looking for, we have a reference desk, divided into various subject areas, where asking knowledge questions is welcome. Best of luck.:RudolfRed (talk) 04:26, 31 December 2011 (UTC)
Keyboard shortcut for inserting signature
Is there a keyboard shortcut for inserting the 4 signature tildes or a script that adds a short cut (preferably with a key combination of choice)? Searched the help desk archives but couldn't find a topic on it. -- <b style="color:#060">lTopGunl</b> (<b style="color:#000">ping</b>) 05:06, 31 December 2011 (UTC) Works in Chrome. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 05:54, 31 December 2011 (UTC)
* Ooops sry, to add . f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 05:57, 31 December 2011 (UTC)
* That key combination doesn't work in Firefox or Opera on a Mac. - Purplewowies (talk) 06:51, 31 December 2011 (UTC)
* You need to import the script written by Fred to your monobook.js or vector.js (whichever skin you use) by adding the code snippet above. Goodvac (talk) 07:03, 31 December 2011 (UTC)
* Sorry. Works in Google Chrome on Windows XP. And should work with most skins. I knew TopGun would know what to do with it, so forgot to mention what Goodvac just has. It was somewhat thrown together, but I'm sure some whizz-kid will swing by and drop some jQuery marvel on its toes, so no worries. I do find it amusing that 2 lines of jQuery is considered more efficient, even though it calls 50 lines of jQuery-library-JavaScript-functions in another script! I'll stick with JS thanks! f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 07:27, 31 December 2011 (UTC)
* Well... oops. I TOTALLY missed the part about importing the script. That's embarassing... - Purplewowies (talk) 07:45, 31 December 2011 (UTC)
* Certainly there is a key combination. Just hold down the Shift key and push the tidle key 4 times. :-) —{|Retro00064|☎talk|✍contribs|} 07:48, 31 December 2011 (UTC).
* Mine is not to reason, why? Mine is just to do, 'cause it's fun! And actually, accidental 3's and 5's can be avoided this way. Shame I'm too bloody minded to make it more universal. Sorry Mac users and anyone not using a proper browser. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 07:54, 31 December 2011 (UTC)
* I'm using FF and Linux, looks like there's nothing in for me except building my triceps with repetitive clicks or Retro00064's suggestion... something for firefox by any chance? -- <b style="color:#060">lTopGunl</b> (<b style="color:#000">ping</b>) 15:01, 31 December 2011 (UTC)
* Ok. I'll give it a go in a while. I was extremely tired/wired yesterday. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 20:02, 31 December 2011 (UTC)
* Ok. -- <b style="color:#060">lTopGunl</b> (<b style="color:#000">talk</b>) 01:22, 1 January 2012 (UTC)
* Well either I am totally missing something or it should work in any browser that can read JavaScript now. In fact, I think it should have worked in any browser before. I've changed the hotkey to (easier). The obvious ctrl+s or alt+s already have assignments. Shift+s makes a big "S" and combinations of keys get more complex than typing 4 tildes. So, it should work with any skin, on any browser, on any OS (with a Ctrl key). Let me know if I'm wrong. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 01:46, 1 January 2012 (UTC)
* Oh god! The humanity!! I just tried testing the script with IE. I am never going back there. I mean NEVER! I cannot abide incompatible soft or hardware. Chrome works. I'll stick to writing things that work and let Chrome interpret my efforts. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 02:14, 1 January 2012 (UTC)
* Great... working good. Thanks alot! Who uses IE... <b style="color:#060">lTopGunl</b> (<b style="color:#000">talk</b>) 02:33, 1 January 2012 (UTC)
* Masochists? I'm glad it works for you. Let me know if fubars occur. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 02:52, 1 January 2012 (UTC)
* Umm, me? (Most of the time anyway...) Say what you want about IE; I've had physical pain inflicted on me by Google products more than once myself... - Purplewowies (talk) 04:31, 1 January 2012 (UTC)
* Sorry Purplewowies, I can't deal with IE, but anyone is free to modify my code or supply other code that does work cross browser. I'm sure I could sleep on a bed of nails; I just really don't want to. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 04:39, 1 January 2012 (UTC)
* Eh, I'm fine with the method, myself. I just felt the need to say that I used IE. :) - Purplewowies (talk) 06:03, 1 January 2012 (UTC)
what are the struck through items in a users contributions?
I was searching through an IP's contributions looking for unreverted vandalism, when I noticed that some of the items were struck through. what are they? the edits here to the article gun are an example. thanks and a happy new year. Staticd (talk) 07:42, 31 December 2011 (UTC)
* They will be edits (and edit summaries etc) that have been removed because the content was considered inappropriate for Wikipedia. It could have been abusive or libellous, or maybe contained personally identifying details. Whatever it was, an administrator considered it best to delete it from sight. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 07:46, 31 December 2011 (UTC)
* The policies and guidelines for this feature are explained on Revision deletion. Cheers. Zzyzx11 (talk) 07:50, 31 December 2011 (UTC)
* Thank you!. very helpful.Staticd (talk) 08:34, 31 December 2011 (UTC)
* I checked the specific example on the article Gun, and can confirm that it was quite rightly redacted under criterion 2 of revision deletion. Sometimes you will also see the username/IP removed from edit histories and logs, for reasons that are also described at the link Zzyzx11 gives above. The Blade of the Northern Lights ( 話して下さい ) 07:22, 1 January 2012 (UTC)
worse than romania
Sometime in history some dick in Romania decided to outlaw contraception, resulting in a lot of children being born to an impoverished nation, who then became homeless. These dirty pathetic little rodents scurried around the streets and subways begging in desperation for everyone elses money because they never seemed to have any of their own. In 2011, it became apparent that Jimmy Wales is a romanian child. In late 2011 he came to the realization that no one gave a shit about his whinging on beside terrifyingly creepy pictures, so he got a bunch of other people to also whinge on with him. Further realizing no shat to care, he animated his massive whinge banners, further irritating everyone.
Look Jimmy, if it's a not for profit organization, fine. If you don't like advertising because Wikipedia is a special place, great. However, your huge banners of begging are precisely you advertising your sad story to try and profit from me and anyone else who will turn an ear to your dirty romanian face. Whining and irritating people won't make any of them want to give you money, don't you realize that?
Here's a link for you: http://en.wikipedia.org/wiki/Appeal_to_emotion
It probably should have instead been given this term: http://en.wikipedia.org/wiki/Pathetic_fallacy — Preceding unsigned comment added by <IP_ADDRESS> (talk)
* "If you can't say something nice, don't say nothing at all" - Thumper. Face-tongue.svg f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 08:41, 31 December 2011 (UTC)
* Let me get this straight... you're whinging about whinging in whinge banners? Here, let me patch you through. -- Obsidi ♠ n Soul 18:22, 31 December 2011 (UTC)
Tell your story
After I donated to Wikipedia there were two options, tell your story, and tell the world - I clicked the facebook link then couldn't get back to the "tell your story" link about how Wikipedia has affected my life. Where can I find that link? — Preceding unsigned comment added by Ursa major prime (talk • contribs) 08:51, 31 December 2011 (UTC)
* Perhaps not the slickest answer you'll get but; you'll find all pages you have recently visited in your browser history. In Google Chrome you can access the history by pressing . I'm not sure about other browsers, but Firefox and Safari probably use the same shortcut. f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 09:02, 31 December 2011 (UTC)
* The links are at wmf:Thank You/en. PrimeHunter (talk) 14:51, 31 December 2011 (UTC)
When editing an article with a trademarked brand?
I am wondering if I need to insert a TM. after the iPhone name when editing the review of the iPhone 4s, as it is a Trademark of Apple INC.? Thank You. — Preceding unsigned comment added by UrsulaKayVos (talk • contribs) 12:05, 31 December 2011 (UTC)
* Manual_of_Style/Trademarks should provide all the answers you need. I'm certainly no expert, so just offering the link is better than any guess I can make. good luck, and happy editing! f<i style="color:#0dd;font-size:10px;">red</i>g<i style="color:#0dd;font-size:10px;">andt</i> 12:27, 31 December 2011 (UTC)
* As fred pointed out, that page has the answer: "Do not use the ™ and ® symbols". — Edokter ( talk ) — 14:04, 31 December 2011 (UTC)
Login loop
Hi, I responded to an email from you this morning asking for additional donations. After donating (again) I decided to log in and check my status. It would not accept my login info because the password was incorrect. That doesn't make sense, I've used that same password forever. Anyway, when I asked to have the password info emailed to me, it said no email account was attached to my login ID. I can't re-register because I have an account, and I can't get a password hint because I don't have a email address as part of my account (I did, that's how you emailed me this morning), so now I'm stuck in a loop. I don't want to give up my ID because I've used that since the internet first started (that's why it only has 8 characters). Any help you can provide would be appreciated. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:24, 31 December 2011 (UTC)
* Donors can give an email address which is not registered in their account if they even have an account. wmf:Donor policy/en says among other things that it can be used for "Informing donors about upcoming fundraising and other activities of Wikimedia". Donations are made at the domain http://wikimediafoundation.org but you cannot log in there with a normal account. Is the login failing here at http://en.wikipedia.org? What is the username? PrimeHunter (talk) 17:00, 31 December 2011 (UTC)
* I'm experiencing the same issue as the OP, however minus the donations. It's been probably years since I was logged in, but my user page hasn't been clipped. I have no email address associated with my account, or so I'm told when attempting to reset my password. Perfect case of look here before you ask a new one, I should say. <IP_ADDRESS> (talk) 22:24, 2 January 2012 (UTC)
* See Help:Login for general help. We can check a few things if we get a username, but we cannot recover a password or give a new password if the account has no email address. Accounts cannot be deleted and passwords never expire. PrimeHunter (talk) 23:06, 3 January 2012 (UTC)
Retrieve article from 12/30/3011 on Ghana
I am trying to retrieve an article from Ghana that apperared on 12/30/2011. How do I do that? Frederick A. Johnson — Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:11, 31 December 2011 (UTC)
* Is this the version you want? The previous version link gives another veresion for that date. —teb728 t c 19:01, 31 December 2011 (UTC) You can get those by clicking on the "View history" tab at the top of the article. —teb728 t c 19:03, 31 December 2011 (UTC)
* Are you referring to a non-Wikipedia article published in Ghana? You can try posting a request at WikiProject Resource Exchange/Resource Request. And please provide all the relevant details of the article - title, author, date, name of publication, etc. -- Obsidi ♠ n Soul 19:10, 31 December 2011 (UTC)
It is an articel on a tribe in ghana but unfortunately i cant remember the name but was in the left column on the top of the english wikipedia on 12/30/2011. Frederick A, Johnson P.S. Sorry dont have more information. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:30, 31 December 2011 (UTC)
* The left column top item is "Today's featured article". I looked at the archive of them at Today's featured article/December 2011 and do not see any that sound like that topic. The item under that is "Did you know...". I looked at its archive at Recent_additions and see several things related to Ghana and/or various tribal peoples. Go to that page and use your browser's "search" function to look for, for example, "ghana", to see if any of them look familiar. DMacks (talk) 22:02, 31 December 2011 (UTC)
How to Delete the Clown Face in Wiki Pages....
For the last couple months there has been some idiot's face appearing at the begining of every wikipedia page. It's driving me nuts.
How do I delete this clown's face from appearing ??
Can I use some sort of app to get rid of this idiot ???? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:58, 31 December 2011 (UTC)
* If you create an account and login, you can set a preference to hide the banner. —teb728 t c 19:06, 31 December 2011 (UTC)
* If you use Firefox or Chrome, install the addon Adblock Plus (Firefox, Chrome), and block this url: meta.wikimedia.org/w/index.php?title=Special:BannerLoader*. This will block all Wikimedia banners. Goodvac (talk) 19:16, 31 December 2011 (UTC)
See also this webpage for more ideas and alternatives: https://adblockplus.org/forum/viewtopic.php?f=2&t=6347 — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:48, 31 December 2011 (UTC)
You should not be seeing Jimmy anymore. Some thank you banners from Sue for a few days, and then it's done. -Philippe (talk) 09:23, 3 January 2012 (UTC)
* Banners are down
Donations 3
I understand that wikipedia is free and you are accepting donations. Why should I donate when I can view another encyclopedia for FREE. Besides, is the owner pocketing any of the donations. If he is then the site is not FREE. Too many scams out there. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:24, 31 December 2011 (UTC)
* You can view Wikipedia for free. Or you can copy it, repost it, make money off it, use it in artwork. Unlike any other encyclopedia. We, the writers (and photographers, mapmakers, codewriters, etc.) are all the owners and we let you use our creation quite freely. Rmhermen (talk) 19:54, 31 December 2011 (UTC)
* Donating is voluntary and not required to read or edit Wikipedia. Wikipedia was founded by Jimmy Wales but he is not the owner today. Wikipedia is run by the American non-profit charitable organization Wikimedia Foundation which has a board and operates under American law. See also Wikimedia Foundation and wmf:Financial reports. I suppose any charitable organization has a risk of donations ending in the wrong place but I see no reason to special concern about Wikipedia. I'm a volunteer editor in another country and have no inside knowledge of or direct contact to the Wikimedia Foundation. PrimeHunter (talk) 19:57, 31 December 2011 (UTC)
* Contact us/Donations, which explains how funds are used. ---— Gadget850 (Ed) talk 20:12, 31 December 2011 (UTC)
* For the record, Jimmy Wales accepts no salary from the Wikimedia Foundation, and never has. -Philippe (talk) 09:21, 3 January 2012 (UTC)
templates/wiki syntax stuff
ok im lost, any1 pls help me out in this? the problem is that on Category:User pas-N, there r infinite subcats of the same, and on Template:User pas-N there is a template-looking thing i copied there from the other levels, but it -idk what it is- is not a template i can't edit it, and so cant modify that "N" do not point to pas-generic but the newly created pas-N. what it is and where can i edit it? — Preceding unsigned comment added by Aaa3-other (talk • contribs)
* I fixed the subcat issue with a null edit of Category:User pas-N. PrimeHunter (talk) 23:30, 31 December 2011 (UTC)
* thanks :) anyone else on the mysterious template?--Aaa3-other | Talk | Contribs 09:17, 2 January 2012 (UTC)
* languages does not have a parameter to change where "N" links. You would have to add a new parameter to languages or avoid using it. PrimeHunter (talk) 23:17, 3 January 2012 (UTC)
* oh thanks :) --Aaa3-other | Talk | Contribs 08:25, 4 January 2012 (UTC)
Re: Content about the now defunct company Kozmo
I have worked for Kozmo and I have never heard of Robert McNamara and he is listed as one of the co-founders of the company. Please double check your sources, as his name should not have appeared in any documents related to this company and should be removed from this article. Thenantuckets (talk) 22:55, 31 December 2011 (UTC)
* Thanks. It was vandalism and I have removed it. PrimeHunter (talk) 23:14, 31 December 2011 (UTC) | WIKI |
Lazareva Pećina
The Lazareva Pećina, which translates Lazar's Cave, is the longest explored cave in Serbia. Located in Bor municipality, near Zlot, the cave is also sometimes referred to as Zlotska Cave. According to 2012's Recent Landform Evolution: The Carpatho-Balkan-Dinaric Region, the cave is 9407 m long. The cave is situated near the entrance of the deep canyon carved into the mountains by the river Zlotska.
The cave exhibits a long history of mining, with evidence of copper metalworks in the cave dating back 5,000 years. The cave has been popular for tourism since at least the 19th century, when it was one of the three most popular caving destinations in Serbia along with Prekonoska and Petnicka. Some of the paths are luminated and tourist services offered for modern visitors. It has been protected since 1949. | WIKI |
The Superclsico final that became too big and too bad for Buenos Aires | Copa Libertadores | The Guardian
For the last five years, Copa90 have been making films about the biggest derbies in the world. Now for the biggest A film by Copa90, part of the Guardian Sport Network Last modified on Wed 19 Dec 2018 07.14 EST The two biggest football clubs in Argentina? The fiercest rivalry in South America? The best derby in the world? Every superlative was used to describe the first ever Superclsico final in the Copa Libertadores. As the eyes of the world turned towards Buenos Aires, our team of filmmakers set off to experience the final to end all finals first hand. Everyone expects controversy from this fixture, but no one could have predicted what happened between these two teams over two legs in two continents. First off, Boca's home tie at La Bombonera. After a biblical rainstorm led to a 24-hour delay, the football gods finally gave the fans the moment they had been waiting for all their lives on Sunday 11 November. The first of the two ties ended in a thrilling 2-2 draw. The away goals rule was not in play, so the tie was perfectly poised before the second leg. Time for round two at River's stadium, El Monumental. The passion in the build-up to the match was reaching unprecedented levels. Then, violence struck. An attack on the Boca team bus robbed River fans of their party. The game was delayed, then moved to the next day, then temporarily suspended. Meetings between the football authorities and the club presidents resulted in a farcical decision: the final game of 2018's Copa Libertadores de Amrica – which was named after people who fought to liberate South America from colonial rule – was to be played in Madrid, the capital of the country that once conquered large parts of the continent. So, on 9 December, 698 hours after the first leg was due to be played at La Bombonera, the final whistle was blown in the Santiago Bernabu and River Plate were the champions of South America. This momentous episode of Derby Days, which had started to feel more like Derby Weeks, had reached a conclusion. Having needed extra time to break the deadlock, River had won 3-1 . They were continental champions. How will this unique Copa Libertadores clash be remembered? Was this derby, played so far away from where the rivalry began 110 years ago, really the final to end all finals? Hopefully we will be given another Superclsico final in the future and that one will be played in the city where it belongs: Buenos Aires, where it more than just another clsico, and where the passion of the fans truly makes it feel like the best derby in the world. This derby doesn't end here. | NEWS-MULTISOURCE |
Search…
Quickstart
Estimated Time: 7 minutes
You can follow along with one of our sample apps found on GitHub.
User Authentication with Passage
1. Add a Passage Element to Your Frontend
A Passage Element provides a complete UI/UX for users to register and login with biometrics or magic links.
In your web app, add the following code wherever you want your users to register or login:
1
<passage-auth></passage-auth>
2
<script src="https://psg.so/web.js"></script>
Copied!
You can now reload your webpage to see fully functional user authentication. Before proceeding to the next step, you will need to copy the Passage App ID from your browser's JavaScript console. The Passage App ID is printed to the console after the Passage Element is loaded.
2. Authenticate Requests on Your Web Server
After your users sign in with a Passage Element, you can use a Passage backend library to authenticate their requests. The code snippets below demonstrate how to use Passage to authenticate requests:
Go
Python (Flask)
Node.js
1
import (
2
"net/http"
3
4
"github.com/passageidentity/passage-go"
5
)
6
7
func exampleHandler(w http.ResponseWriter, r *http.Request) {
8
9
// Authenticate this request using the Passage SDK:
10
psg, _ := passage.New("<PASSAGE_APP_ID>", nil)
11
_, err := psg.AuthenticateRequest(r)
12
if err != nil {
13
// 🚨 Authentication failed!
14
w.WriteHeader(http.StatusUnauthorized)
15
return
16
}
17
18
// ✅ Authentication successful. Proceed...
19
20
}
Copied!
1
from passageidentity import Passage
2
import os
3
4
PASSAGE_APP_ID = os.environ.get("PASSAGE_APP_ID")
5
6
class AuthenticationMiddleware(object):
7
def __init__(self, app):
8
self.app = app
9
10
def __call__(self, environ, start_response):
11
request = Request(environ)
12
psg = Passage(PASSAGE_APP_ID)
13
try:
14
user = psg.authenticateRequest(request)
15
except:
16
ret = Response(u'Authorization failed', mimetype='text/plain', status=401)
17
return ret(environ, start_response)
18
environ['user'] = user
19
return self.app(environ, start_response)
Copied!
1
import Passage from "@passageidentity/passage-node";
2
3
const passageConfig = {
4
appID: process.env.PASSAGE_APP_ID,
5
apiKey: process.env.PASSAGE_API_KEY,
6
};
7
8
// example of passage middleware
9
let passage = new psg(passageConfig);
10
let passageAuthMiddleware = (() => {
11
return async (req, res, next) => {
12
try {
13
let userID = await passage.authenticateRequest(req);
14
if (userID) {
15
// user authenticated
16
res.userID = userID;
17
next();
18
}
19
} catch(e) {
20
// failed to authenticate
21
// we recommend returning a 401 or other "unauthorized" behavior
22
console.log(e);
23
res.status(401).send('Could not authenticate user!');
24
}
25
}
26
})();
27
28
app.get("/authenticatedRoute", passageAuthMiddleware, async(req, res) => {
29
let userID = res.userID
30
// do authenticated things...
31
});
Copied!
3. You Just Implemented Awesome User Authentication! 🎉
What's Next?
The steps above configure Passage in test mode. Users are ephemeral and are not persisted outside of your browser. To use Passage in production, claim your Passage app with the unique link in your browser's JavaScript console. You can also create a new app in the Passage Console.
Last modified 1mo ago | ESSENTIALAI-STEM |
[Civ. No. 28731.
First Dist., Div. One.
Jan. 6, 1971.]
THE PEOPLE, Petitioner, v. THE SUPERIOR COURT OF MARIN COUNTY, Respondent; ROBERT DOYLE FULLER, Real Party in Interest.
Counsel
Thomas C. Lynch and Evelle J. Younger, Attorneys General, Deraid E. Granberg, John T. Murphy and Karl J. Uebel, Deputy Attorneys General, for Petitioner.
No appearance for Respondent.
Trumbull & Rush and John A. Trumbull for Real Party in Interest.
Opinion
SIMS, J.
The People by petition for writ of mandate (Pen. Code, § 1538.5, subd. (o)) seek appellate review of an order of the trial court which granted a motion to suppress evidence consisting of a plastic bag allegedly containing marijuana. The motion was interposed on behalf of a defendant who is accused by an information of possession of marijuana in violation of section 11530 of the Health and Safety Code, and possession of an alcoholic beverage by a minor in violation of section 25662 of the Business and Professions Code. The evidence in question was secured from the defendant when he was subjected to a strip search in connection with his being placed in custody in the county jail following his arrest for possession of alcohol by a minor, and for contributing to the delinquency of a minor (see Pen. Code, § 272).
An alternative writ of mandate has been issued commanding respondent superior court to vacate and set aside its order granting defendant’s motion, or to show cause why it has not done so. Following return to the alternative writ the matter has been reviewed on a record consisting of the petition, the return, the clerk’s transcript in respondent court, the transcript of the preliminary examination which led to the filing of the information, and a transcript of the hearing on the motion at which the defendant and the passenger in his vehicle testified.
The People urge that there was reasonable cause to arrest the defendant, and that the search was a proper incident of that arrest. The defendant, as real party in interest, has not pursued his original argument which attempted to limit the scope of the arresting officer’s activities to the issuance of a traffic citation for a mechanical violation. He concedes that on the basis of proper observations the officer could properly detain and cite the defendant for a defective license plate lamp in violation of section 24601 of the Vehicle Code, for keeping an opened beverage container in a vehicle in violation of section 23123 of that code, and for possession of an alcoholic beverage in violation of the provisions of section 23Í23.5 of the Vehicle Code (see fn. 2 above). He asserts, and it is herein concluded, that the last cited section governs the circumstances of defendant’s arrest to the exclusion of the general law governing possession of an alcoholic beverage by a minor under which he has been charged; that under the arrest provisions of the Vehicle Code he should either have been merely cited, or, in any event, should have been given an opportunity to post bail; and that the trial court was warranted in finding that there was no reasonable cause to arrest, incarcerate and search the defendant for the offense of contributing to the delinquency of his companion.
The facts as revealed by the record are as follows:
On the evening of March 30, 1970, at about 9:30 p.m. according to the arresting officer, or an hour or an hour and a half later according to the defendant, the officer observed a Triumph automobile proceeding westbound on San Marin Drive in Novato without any illumination of its license plate light (see Veh. Code, § 24701). The officer initiated a traffic stop by using his emergency equipment. The officer testified that the vehicle operated by the defendant continued its forward progress for approximately three-quarters of a mile through San Marin Drive to its intersection with Novato Boulevard, where it then turned to the right and proceeded approximately 40 feet before the driver pulled the vehicle to the curb and stopped. The defendant testified that he first noticed the red light of the police car as he was stopped for the stop sign at Novato Boulevard, and that he then promptly pulled around the corner and parked at the edge of the roadway.
The officer observed no furtive action in the car while he was following it, but as the vehicle came to a stop he saw the passenger duck down for a moment and then come up. The officer got out of the patrol car, and the defendant, who proved to be the driver of the other vehicle, alighted leaving his passenger behind, and walked toward the officer. As they met the officer noticed the odor of alcohol about the defendant’s person. The officer advised the defendant he was stopped for an equipment violation, but did not tell him that he was under arrest. At the request of the officer, the defendant who was known to the officer to be a minor, produced a driver’s license which showed him to be 20 years old. (He was born January 12, 1950.)
According to the officer, a couple of months previously he had observed the defendant kick someone in the head, and because he did not trust him, he requested the defendant to precede him on the left as he walked to the passenger side of the vehicle. The defendant testified that he remained between the two cars watching the officer as he went to the defendant’s car. There the officer observed an open can of what appeared to be Coor’s beer between the legs of the passenger, who was known to the officer as a youth in his teens. (According to the defendant the passenger was 17 years old at the time.) In the baggage compartment, directly to the rear of the seat, an unopened can of beer lay on some clothing.
The officer had broadcast that he was making a traffic stop and he awaited a backup officer. On the latter’s arrival, a minute later, he requested the passenger to alight and he announced to both the passenger and the driver that they were under arrest for possession of alcohol by minors. At the hearing on the motion to suppress the defendant and his passenger admitted that the passenger had an open can of beer in the front seat. The former contested the ability of the officer to observe it because of the nature of the construction of the car, and the latter testified that his arrest was contemporaneous with or after he left the car at the officer’s command.
The officer ordered the youths to proceed around the opposite side of the vehicle and to place their hands on top of the car. While complying, the passenger dropped a rolled-up match box cover which appeared to be what is commonly called a “crutch.” It was retrieved by the officer who noted that it had burn marks on it. He thereupon advised the passenger that he was also under arrest for an additional charge of possession of paraphernalia (see Health & Saf. Code, § 11555). A search of the defendant’s pockets and clothing produced nothing incriminating.
The defendant was informed that he was charged with possession of alcohol by a minor, and contributing to the delinquency of a minor. He and his passenger, who was charged as outlined above, were transported to the county jail by the arresting officer. The other officer, who had been searching the inside of the defendant’s car (see fn. 1 above), was left at the scene to inventory the contents of the vehicle.
The defendant was given a body search at the sheriff’s office in conformance with normal booking procedure. After taking off his shirt and shoes he unbuckled his pants and removed a cellophane bag from inside the crotch of his pants. He handed the bag, which contained a material which proved to be marijuana, to the officer and said, “You didn’t think I’d hold anything back from you.”
I
Upon observing the equipment failure the officer had the unquestioned right to stop the offending vehicle. (See People v. Villafuerte (1969) 275 Cal.App.2d 531, 534-535 [80 Cal.Rptr. 279]; People v. Brown (1969) 272 Cal.App.2d 448, 450 [77 Cal.Rptr. 438]; People v. Bordwine (1968) 268 Cal.App.2d 290, 292 [74 Cal.Rptr. 1]; People v. Cacioppo (1968) 264 Cal.App.2d 392, 396-397 [70 Cal.Rptr. 356]; People v. Shapiro (1963) 213 Cal.App.2d 618, 620 [28 Cal.Rptr. 907]; and People v. Sanson (1957) 156 Cal.App.2d 250, 253 [319 P.2d 422].)
When a person is arrested for a violation of the Vehicle Code other than a felony (Veh. Code, § 40301), he must be given a citation (§ 40500) unless appearance before a magistrate is mandatory (§ 40302), or is optional, and the officer elects to take the offender before a magistrate (§ 40303). (See Morel v. Superior Court (1970) 10 Cal.App.3d 913, 916-917 [89 Cal.Rptr. 297]; People v. Mercurio (1970) 10 Cal.App.3d 426, 430-431 [88 Cal.Rptr. 750]; People v. Weitzer (1969) 269 Cal.App.2d 274, 294 [75 Cal.Rptr. 318]; People v. Van Sanden (1968) 267 Cal.App.2d 662, 665 [73 Cal.Rptr. 359]; People v. Wohlleben (1968) 261 Cal.App.2d 461, 463-465 [67 Cal.Rptr. 826]; and People v. Shapiro (1963) 213 Cal. App.2d 618, 621 [28 Cal.Rptr. 907].)
Although a traffic violator is technically under arrest during the period immediately preceding his execution of a promise to appear, neither he nor his vehicle may be searched on that ground alone. (People v. Weitzer, supra, 269 Cal.App.2d 274, 290 and 294; and see Morel v. Superior Court, supra, 10 Cal.App.3d 913, 917; People v. Mercurio, supra, 10 Cal.App.3d 426, 429; Martinez v. Superior Court (1970) 7 Cal.App.3d 569, 577 [87 Cal.Rptr. 6]; Bergeron v. Superior Court (1969) 2 Cal.App.3d 433, 435 [82 Cal.Rptr. 711]; People v. Van Sanden, supra, 267 Cal.App.2d 662, 665; People v. Shapiro, supra, 213 Cal.App.2d 618, 621; and People v. Sanson, supra, 156 Cal.App.2d 250, 253.) The right to search must depend on other circumstances. If the offense is one where the accused is to be taken before a magistrate, because of the mandate of the Vehicle Code, or because of the exercise by the officer of an option granted by the code, there are varying precedents as to the extent to which the accused may be searched. (Cf. Morel v. Superior Court, supra, 10 Cal.App.3d 913, 917-919; People v. James (1969) 1 Cal.App.3d 645, 648 [81 Cal.Rptr. 845]; People v. Nunn (1968) 264 Cal.App.2d 919, 923-924 [70 Cal.Rptr. 869]; and People v. Reed (1962) 202 Cal.App.2d 575, 578-579 [20 Cal.Rptr. 911], with People v. Mercurio, supra, 10 Cal.App.3d 426; and People v. Dukes (1969) 1 Cal.App.3d 913, 916 [82 Cal.Rptr. 218].)
When there is a valid arrest for driving while under the influence of intoxicating liquor (Veh. Code, § 23102), or, because the driver or passenger of a vehicle is found to be under the influence of intoxicating liquor in any public place (Pen. Code, § 647, subd. (f)), an officer, as an incident to such arrest for the purpose of discovering evidence of the crime, may search the offender and the car in which he was observed. (People v. Robinson (1965) 62 Cal.2d 889, 894 [44 Cal.Rptr. 762, 402 P.2d 834]. See also, Martinez v. Superior Court, supra, 7 Cal.App.3d 569, 577; People v. Sirak (1969) 2 Cal.App.3d 608 [82 Cal.Rptr. 716]; People v. Gil (1967) 248 Cal.App.2d 189, 192 [56 Cal.Rptr. 88]; and note, People v. Villafuerte (1969) 275 Cal.App.2d 531, 536 [80 Cal.Rptr. 279] [under influence of heroin].)
In Bramlette v. Superior Court (1969) 273 Cal.App.2d 799 [78 Cal.Rptr. 532], it was held that where an officer properly stopped a panel truck for investigation, discovered the occupants were minors, and observed an opened partly empty jug of wine in the vehicle which was accessible to all of the occupants, he could reasonably assume that the offense of possession of an intoxicating liquor by a minor in violation of section 25662 of the Business and Professions Code was being committed in his presence. The arrest of the minors (see Pen. Code, § 836, subd. 3) was upheld. The prosecution was permitted to use the fruits of a subsequent search of the vehicle which revealed marijuana seeds in plain sight, and other marijuana and paraphernalia discovered in the framework and other parts of the vehicle, and contraband which was apparently discarded by the accused while they were being transported in the patrol car (273 Cal.App.2d at p. 806).
In People v. Cowman (1963) 223 Cal.App.2d 109 [35 Cal.Rptr. 528], it was found that the officers had reasonable cause to stop the defendant’s vehicle for investigation. The court noted, “. . . when the officers approached the car, after it had stopped, they observed the occupant in the rear seat drinking out of a beer bottle. It would seem that this observation would have been sufficient to justify the arrest of the driver of the vehicle and the party drinking the beer as well as a search of the vehicle. (Veh. Code, §§ 23121, 23122 and 23123.)” (223 Cal.App.2d at p. 118.) (The search was in fact justified by the defendant’s subsequent consent.)
In People v. McCullough (1963) 222 Cal.App.2d 712 [35 Cal.Rptr. 591], after finding reasonable cause to stop a vehicle proceeding into an area of potential danger, the court upheld an ensuing arrest. It observed, “Here the officers observed open beer bottles on the floor of the car in front of the driver’s seat, and some liquid spilled on the floor, and smelled the odor of alcohol. They could reasonably believe a misdemeanor was being committed in their presence. (Violation of Veh. Code, § 23121, drinking in a motor vehicle; violation of Veh. Code, § 23122, possession in a motor vehicle of alcoholic beverages in an opened container.)” (222 Cal.App.2d at p. 716.)
So here, the perception that the defendant, a minor, had been drinking justified the officer’s subsequent action in going to the vehicle to ascertain whether there was liquor in the car. In this case it is unnecessary to determine what limits there may be on a search for containers of an alcoholic beverage (cf. People v. Gil, supra, 248 Cal.App.2d 189, 192) because the opened container was in plain sight. (See Bramlette v. Superior Court, supra, 273 Cal.App.2d 799, 805-806; People v. Figueroa, supra, 268 Cal.App.2d 721, 725; People v. Cacioppo, supra; 264 Cal.App.2d 392, 395; and People v. McCullough, supra, 222 Cal.App.2d 712, 716.)
II
If the discovery of the opened container of beer warranted not only the arrest, but the jailing of the defendant, he could not complain of the subsequent body search and the seizure of the contraband. It is well established that persons about to enter jails or penal institutions may be searched for the purpose of preventing the introduction of weapons or contraband into the premises, and for the purpose of inventorying the accused’s property. (People v. Reed, supra, 202 Cal.App.2d 575, 579-580. See also People v. Mercurio, supra, 10 Cal.App.3d 426, 430; People v. Dukes, supra, 1 Cal.App.3d 913, 916; and People v. Wohlleben, supra, 261 Cal.App.2d 461, 462.) Nevertheless, the product of a search at the jail cannot be used against the accused if there was no right to take him into custody at all. (See, People v. Wohlleben, supra, 261 Cal.App.2d at p. 465.) Moreover, if the sole right to take into custody was for the purpose of taking the accused before a magistrate, or other officer authorized to admit him to bail, there is no right to conduct a body search. (See People v. Mercurio, supra, 10 Cal.App.3d 426, 431-432; and People v. Dukes, supra, 1 Cal.App.3d 913, 916. Note, Pen. Code, § 1269b, subd. (c); and Cal. Rules of Court, rule 850b, Uniform Traffic Bail Schedule.)
In People v. Dukes, supra, the court expressly noted that the offenses of a passenger drinking in a car (Veh. Code, § 23121) and a driver allowing an open container in a car (Veh. Code, § 23122), were violations of the Vehicle Code, and that upon failure of either of the accused to produce satisfactory identification “. . . the custody allowed under Vehicle Code section 40302 subdivision (a) is limited to taking the arrestee before a magistrate. If the magistrate is unavailable, the officer must take the arrestee before the clerk of the magistrate or the officer in charge of the jail so he may be admitted to bail (Veh. Code, § 40307; see People v. Weitzer, 269 Cal.App.2d 274, 291, fn. 7 [75 Cal.Rptr. 318]).” (1 Cal.App.3d at p. 916.)
The People seek to avoid the effect of the latter precedents by predicating the jailing of the defendant on his arrest for violation of the provisions of the Business and Professions Code (see fn. 2 above).
III
Section 25662 of the Business and Professions Code (see fn. 2 above) was enacted in 1953 as a continuation of a provision added to the 1935 Alcoholic Beverage Control Act in 1951 (Stats. 1951, ch. 1085, § 1, p. 2814). It was modified to its present form in 1963 (Stats. 1963, ch. 396, § 1, p. 1203). The Vehicle Code provision, section 23123.5 (see fn. 2 above), was added in 1965 (Stats. 1965, ch. 1662, § 2, p. 3772). A comparison of the two statutes reveals that the former is broader in defining the place where the offense of possession of an alcoholic beverage by a minor may be committed—“on any street or highway or in any public place or in any place open to the public” as against “in any motor vehicle.” The latter statute, however, covers not only knowledgeable possession, but also the situation when a minor knowingly transports, or has under his control, an alcoholic beverage in a motor vehicle. Both statutes exclude possession in the course of the minor’s employment (more specifically defined in the Vehicle Code section), and the Vehicle Code section appears more restrictive in that possession, transportation, or control is permitted when the . minor is accompanied by a parent or legal guardian, whereas the more general statute permits delivery by a minor pursuant to an order of his parent.
Despite the foregoing distinctions it is obvious that there is, as exists in this case, an overlap in the general situation where a minor possesses an alcoholic beverage in a motor vehicle. The legislative history of this statute indicates that it was intended to penalize the conduct prohibited by authorizing discretionary impoundment of a vehicle registered to the offender, and mandating a suspension of the offender’s driver’s license. The new statute also had the effect of reducing the maximum penalty for the particular offense from a fine of not more than $500 or imprisonment in the county jail for not more than six months or by both (Bus. & Prof. Code, § 25617), to not exceeding $50 or five days upon a first conviction (Veh. Code, §§ 40000, subd. (b) and 42001, subd. (b)). The power of the Legislature to provide different penalties for violations of the Vehicle Code and other misdemeanors has been recognized. (See Sawyer v. Barbour (1956) 142 Cal.App.2d 827, 837 [300 P.2d 187].)
The problem of overlapping provisions of the Penal Code and the Vehicle Code relating to taking of vehicles and concerning drunk driving, respectively, has been the subject of study. (See Cal. Law Revision Com., Recommendation and Study, November 1958.) With respect to the taking of an automobile the court observed in People v. Kehoe (1949) 33 Cal.2d 711 [204 P.2d 321], “Obviously the three statutes [Pen. Code, §§ 499 and 487, and Veh. Code, § 503] are part of a general legislative plan of protection and punishment conceived to prevent the taking or use of an automobile without the owners’ consent. Different punishment is fixed to correspond with the intent with which each offense is committed, but the legislation is directed against one evil. Insofar as they relate to a single act of taking an automobile without the permission of the owner, section 503 of the Vehicle Code and section 487 of the Penal Code may subject the offender to but one punishment.” (33 Cal.2d at p. 714. Cf. In re Hayes (1969) 70 Cal.2d 604, 607 [75 Cal.Rptr. 790, 451 P.2d 430].) In People v. Thomas (1962) 58 Cal.2d 121 [23 Cal.Rptr. 161, 373 P.2d 97], it was noted: “The distinction between the foregoing offenses is admittedly a subtle one, and would present a rather difficult problem if it were required that a court instruct a jury as to the distinction in a given situation. It may well be that the Legislature intended to leave the decision as to which section should be invoked in a particular case to the prosecutor.” (58 Cal.2d at p. 126.)
On the other hand, in People v. Lewis (1934) 4 Cal.App.2d Supp. 775 [37 P.2d 752], the court concluded, on the assumption that “intoxicated” as found in section 367d of the Penal Code was the equivalent of “under the influence of intoxicating liquor” as found in section 112 of the California Vehicle Act as adopted in 1923, that “certain well-established rules make it clear that section 367d of the Penal Code can no longer be regarded as in force except in regard to offenses not covered by the vehicle acts, such as the driving of a motor vehicle on private ground by one who is intoxicated.” (4 Cal.App.2d Supp. at p. 778. See also People v. Fair (1967) 254 Cal.App.2d 890, 891, fn. 1 [62 Cal.Rptr. 632].) The distinction between the overlapping of the taking statutes which involve different intents, and the overlapping of the drunk driving statutes insofar as they only differ with respect to the place the offense was committed has been noted. (See People v. Bailey (1946) 72 Cal.2d Supp. 880, 883 [165 P.2d 558].)
A series of cases dealing with overlapping general and special statutes defining crimes indicates that the rationale applied in People v. Lewis is controlling here. In re Williamson (1954) 43 Cal.2d 651 [276 P.2d 593] ruled that the express provision, formerly (deleted Stats. 1955, ch. 1062, § 1, p. 2030) contained in section 7030 of the Business and Professions Code, outlawing a conspiracy to violate the state contractor’s law controlled the general provisions against conspiracies found in section 182 of the Penal Code. The court quoted with approval from People v. Breyer (1934) 139 Cal.App. 547, at page 550 [34 P.2d 1065, 1067], as follows: “It is the general rule that where the general statute standing alone would include the same matter as the special act, and thus conflict with it, the special act will be considered as an exception to the general statute whether it was passed before or after such general enactment. Where the special statute is later it will be regarded as an exception to or qualification of the prior general one; and where the general act is later the special statute will be considered as remaining an exception to its terms unless it is repealed in general words or by necessary implication.” (139 Cal.App. at p. 550.) The principle has been applied to preclude prosecution under the provisions of the Penal Code of criminal fraud specifically proscribed by provisions of the Welfare and Institutions Code. (See People v. Gilbert (1969) 1 Cal.3d 475, 479-481 [82 Cal.Rptr. 724, 460 P.2d 580]; People v. Legerretta (1970) 8 Cal.App.3d 928, 933 [87 Cal.Rptr. 587]; and People v. Silk (1955) 138 Cal.App.2d Supp. 899, 900-902 [291 P.2d 1013]; but cf. People v. Legerretta, supra, at p. 934.) Similar results have been established in connection with criminal fraud under the Unemployment Insurance Code. (See People v. Bogart (1970) 7 Cal.App.3d 257, 266 [86 Cal.Rptr. 737]; and People v. Koch (1970) 4 Cal.App.3d 270, 275 [84 Cal.Rptr. 629]; but cf. pp. 275277.) A series of cases applied the principle to preclude prosecution under general criminal statutes for credit card offenses as the latter were proscribed by the former (see People v. Liberto (1969) 274 Cal.App.2d 460, 462-465 [79 Cal.Rptr. 306]) provisions of section 484a of the Penal Code. (See In re Williams (1969) 1 Cal.3d 168, 173 [81 Cal.Rptr. 784, 460 P.2d 984]; People v. Ali (1967) 66 Cal.2d 277, 279 [57 Cal.Rptr. 348, 424 P.2d 932]; People v. Scott (1968) 259 Cal.App.2d 589, 591-592 [66 Cal.Rptr. 432]; People v. Churchill (1967) 255 Cal.App.2d 448, 452-453 [63 Cal.Rptr. 312] [overruled on another issue People v. Bauer (1969) 1 Cal.3d 368, 378 [82 Cal.Rptr. 357, 461 P.2d 367]]; and People v. Swann (1963) 213 Cal.App.2d 447, 449-451 [28 Cal.Rptr. 830]; but cf. People v. Churchill, supra, at pp. 453-454.)
In People v. Gilbert, supra, the court expressly ruled, “This overlap of provisions carrying conflicting penalties typifies the kind of conflict which we envisioned in Williamson; it requires us to give effect to the special provision alone in the face of the dual applicability of the general provision of the Penal Code and the special provision of the Welfare and Institutions Code.” (1 Cal.3d at p. 481, fn. and citation omitted.) So here the varying penalties which have been referred to above, demonstrate that the special provisions of the Vehicle Code are to govern when the circumstances come within their purview.
It is, therefore, concluded that the defendant could not be arrested or prosecuted under the general provisions found in section 25662 of the Business and Professions Code, but that he was chargeable with a violation of section 23125.5 of the Vehicle Code. He was not only subject to the extra penalties imposed by that section, but was also entitled to the rights of a person charged under the provisions of that code as they have been expounded above.
IV
The People do not give much weight to the alleged charge of contributing to the delinquency of a minor. They acknowledge the holding in People v. Simon (1955) 45 Cal.2d 645 [290 P.2d 531] where the court ruled, “The mere fact, however, that defendant was walking on the street with a 20-year-old friend who had a bottle did not constitute reasonable cause to believe that defendant was committing or attempting to commit an offense in the officer’s presence by either aiding or abetting his friend in committing a crime or contributing to the delinquency of a minor. [Citations.]” (45 Cal.2d at p. 649.) They contend that the circumstances, as distinguished from those in Simon, were sufficient to give the officer reasonable cause to believe that the offense of contributing had been committed even though the evidence at the preliminary hearing demonstrates that the defendant could not have been successfully prosecuted for that offense. The charge was not included in the complaint, or the information, nor is there anything to show that the defendant was in fact booked in jail on that charge.
It may be assumed that the furnishing of narcotics or marijuana to a minor (see Health & Saf. Code, § § 11502, 11502.1 and 11532, and provisions of former § 11714) would necessarily encompass contributing to the delinquency of a minor. (See People v. Freytas (1958) 157 Cal.App.2d 706, 715 [321 P.2d 782].) The minor passenger’s possession of the crutch could no more implicate the defendant than could the minor’s bottle incriminate his companion in People v. Simon. Moreover, the People are precluded from relying on any such theory by the officer’s testimony that defendant’s arrest had nothing to do with narcotics.
Similarly, the furnishing of an intoxicating liquor to a minor (see, Bus. & Prof. Code, § 25658) may be deemed to be an act contributing to the delinquency of a minor. (See People v. Moore (1960) 183 Cal.App.2d 672, 676 [7 Cal.Rptr. 142]; People v. Laisne (1958) 163 Cal.App.2d 554, 556-557 [329 P.2d 725]; People v. Delbert (1953) 117 Cal.App.2d 410, 415-416 [256 P.2d 355]; and People v. Perfetti (1928) 88 Cal.App. 609, 610-615 [264 P. 318]. Cf. People v. Lamunuzzi (1926) 77 Cal.App. 301, 303-304 [246 P. 557]; and People v. Baker (1918) 38 Cal.App. 28, 32 [175 P. 88].) Nevertheless, there is nothing in the record to indicate that the defendant furnished his minor passenger with the intoxicating beverage that was found between the passenger’s legs. The trial court, in making its ruling on the record, of necessity found that the circumstances did not compel the inference that the officer had reasonable cause to arrest the defendant and keep him in custody for contributing to the delinquency of his companion. Even if this court were to find a conflicting inference reasonable, it would not disturb the implied finding of the trier of fact on evidence which permits conflicting inferences. (See Bergeron v. Superior Court, supra, 2 Cal.App.3d 433, 436.) The evidence, however, has little more dignity than that appraised in People v. Simon.
V
There are overtones of other offenses in the record (see fns. 1 and 8 above). The prosecution, however, failed to develop a case for more than offenses cognizable under the provisions of the Vehicle Code. The record must be taken as it was made by the prosecution and submitted to the trial court. As it is so found and reviewed by this court, it is concluded that the trial court properly ruled that there was no ground for the jailing and strip search of the defendant. The evidence so elicited was properly suppressed. As pointed out by the defendant, there is no reason to subject the 20-year-old defendant, because of his minority (he not having been shown to have been intoxicated or under the influence of intoxicating liquor), to greater restraint than an adult who under similar circumstances is found to possess or keep an opened container of an alcoholic beverage in a vehicle in violation of sections 23122 or 23123 of the Vehicle Code. The search is of course not justified by what it may turn up. The “overkill” must be judged in reference to the situations where no contraband is disclosed. It may well breed disrespect, rather than respect for the law.
The alternative writ is discharged and the petition for a peremptory writ of mandate is denied.
Molinari, P. J., and Elkington, J., concurred.
A petition for rehearing was denied on February 4, 1971, and the following opinion rendered:
THE COURT.
In a petition for rehearing on behalf of the People, the Attorney General seeks a modification of the opinion which will construe Business and Professions Code section 25662 and Vehicle Code section 23123.5 as coexistent so that an officer may have the option to proceed under either statute. He contends that the decision will have an adverse effect upon enforcement officers of the Department of Alcoholic Beverage Control because the course to be followed in the event of a violation of the prohibition of possession of an alcoholic beverage by a minor will vary in accordance with whether the beverage is found in or out of a vehicle.
This consequence does not necessarily ensue. Section 24209 of the Business and Professions Code authorizes an officer arresting a person for a violation of any provisions of the Alcoholic Beverage Control Act to “release such person without taking such person before a magistrate upon such person’s signing an agreement to appear. . . .” (See also Pen. Code, § 853.6.) In the case of a minor under the age of 18 years the procedure following arrest is governed by the provisions of sections 625 and 626 of the Welfare and Institutions Code which provide the alternatives of releasing the minor, releasing him upon execution of a promise to appear, or delivering the minor to the probation officer. The statute contains the following mandate: “In determining which disposition of the minor he will make, the officer shall prefer the alternative which least restricts the minor’s freedom of movement, provided such alternative is compatible with the best interests of the minor and the community.”
The alleged inconsistency in treatment is more theoretical than real.
The Attorney General also claims that there is a greater risk of harm to the public when the minor is in possession of an alcoholic beverage inside of a motor vehicle, and assumes that therefore more drastic action is indicated. Neither the sections involved nor this case deal with the situation where the minor possessor is under the influence of intoxicating liquor. (Veh. Code, § 23102; Pen. Code, § 367d; and Pen. Code, § 647, subd. (f).) The statutes noted provide adequate protection for the offender and the public when the situation discloses a violation. When as here, the sole offense is illegal possession, the potential hazard is removed by confiscation of the offending substance. Custody is only required to secure amenability to prosecution, not to mete punishment out contemporaneously with the arrest.
The People refer to section 40300 of the Vehicle Code which provides: “The provisions of this chapter shall govern all peace officers in making arrests for violations of this code without a warrant for offenses committed in their presence, but the procedure prescribed herein shall not otherwise be exclusive of any other method prescribed by law for the arrest and prosecution of a person for an offense of like grade.” The section is addressed to the manner of making arrests for violations of the Vehicle Code, and it does not, as contended by the People, throw any light on the question of whether a Vehicle Code section provides the exclusive prohibition of conduct falling within its terms.
Reconsideration is also sought of the court’s approval of the principle that there was no right to body search in connection with taking the accused before a magistrate or other officer for admission to bail. The court adheres to its position as applied to the Vehicle Code provisions involved in this case.
The sole witness at the preliminary examination was the arresting officer. The evidence which has been ordered suppressed was the only marijuana referred to or produced in connection with his direct examination. Cross-examination, however, brought out that a “back up” officer, who had responded to the arresting officer’s radio call, entered the defendant’s vehicle to search it, and according .to the belief of the arresting officer uncovered two six-packs of beer, a baggie of marijuana and a water pipe, which the arresting officer indicated he took with him as he left the scene. The prosecution did not produce the second officer, nor any of the foregoing material either at the preliminary examination or at the hearing on the motion to suppress. The arresting officer expressly testified that the defendant was not charged with any offense that had to do with narcotics before the discovery of the evidence which is the subject of these proceedings when he was searched at the jail. In support of the trial judge’s ruling it is concluded that he disregarded the hearsay evidence of probable cause to arrest for an offense upon which the prosecution did not choose to rely. No opinion is expressed as to the right of the People to use such evidence in another action, or in the pending prosecution, which was not dismissed (cf. Pen. Code, § § 1538.5, subd. (j), 1385 and 1238, subd. 7), but was continued for plea following the contemporaneous denial of defendant’s motion to dismiss under the provisions of section 995 of the Penal Code. It would appear, however, that the People by electing to secure appellate review of the order suppressing evidence, may be foreclosed from seeking to present additional evidence relating to the seizure of the evidence which was the subject of the motion. (See Pen. Code, § 1538.5, subd. (j).)
Two provisions of law, discussed below, relate to this offense. Business and Professions Code section 25662 provides: “Any person under the age of 21 years who has any alcoholic beverage in his possession on any street or highway or in any public place or in any place open to the public is guilty of a misdemeanor. This section does not apply to possession by a person under the age of 21 years making a delivery of an alcoholic beverage in pursuance of the order of his parent or in pursuance of his employment.”
Vehicle Code section 23123.5 provides: “(a) No person under the age of 21 years shall knowingly possess, transport, or have under his control in any motor vehicle any alcoholic beverage, unless such person is accompanied by a parent or legal guardian or is employed by a licensee under the Alcoholic Beverage Control Act (Division 9, commencing with Section 23000, of the Business and Professions Code), and is possessing, transporting or has such alcoholic beverage in a motor vehicle under his control during regular hours and in the course of his employment. [H] (b) If the vehicle used in any violation of subdivision (a) is registered to such person under the age of 21 years, the vehicle may be impounded at the owner’s expense for not less than one day nor more than 30 days for each violation. [11] (c) Any such person under 21 years of age found under this section shall also have his driver’s license suspended for not less than 15 days nor more than 30 days.”
Though an arresting officer reasonably fearing possible violence may search for weapons, in the case before us there is no evidence of suspected harm, and, in any event, the weapon pat-down proved fruitless. (See People v. Mercurio (1970) 10 Cal.App.3d 426, 429-430 [88 Cal.Rptr. 750]; and see People v. Dukes (1969) 1 Cal.App.3d 913, 916 [82 Cal.Rptr. 218]; People v. Weitzer (1969) 269 Cal.App.2d 274, 290-291 and 294 [75 Cal.Rptr. 318]; People v. Figueroa (1969) 268 Cal.App.2d 721, 726 [74 Cal.Rptr. 74]; and People v. Bordwine (1968) 268 Cal.App.2d 290, 292 [74 Cal.Rptr. 1].)
The foregoing makes it unnecessary to consider the right to search the car as predicated upon an alleged furtive movement. The failure to stop a car within a reasonable time after activation of the red lights of a police car and furtive conduct in reaching down below the front seat toward the floorboard may warrant an inference that the person observed is hiding something under the front seat of the automobile, and so justify a search of that area of the car where it appeared the object was hidden. (See People v. Sirak (1970) 2 Cal.App.3d 608, 612 [82 Cal.Rptr. 716]; Bergeron v. Superior Court (1969) 2 Cal.App.3d 433, 435-436 [82 Cal.Rptr. 711]; People v. Brown (1969) 272 Cal.App.2d 448, 451-452 [77 Cal.Rptr. 438]; People v. Superior Court (1969) 272 Cal.App.2d 383, 387 [77 Cal.Rptr. 438]; People v. Bordwine (1968) 268 Cal.App.2d 290, 292 [77 Cal.Rptr. 646]; People v. Gil (1967) 248 Cal.App.2d 189, 193-194 [56 Cal.Rptr. 88]; People v. Shapiro (1963) 213 Cal.App.2d 618, 621-622 [28 Cal.Rptr. 907]; and People v. Sanson (1957) 156 Cal.App.2d 250, 253-254 [319 P.2d 422].) However, the credibility of the witnesses and the weight to be given their testimony is for the trial court. (Bergeron v. Superior Court, 2 Cal.App.3d at p. 436 [82 Cal.Rptr. 711].) In support of the order it must be inferred that the trial court accepted the testimony of the driver that he stopped within a reasonable time and that there was no opportunity to observe any untoward movement in the car.
Assembly Bill No. 1450, as introduced in the 1965 regular (general) session of the Legislature, proposed the addition of section 23123.5 to the Vehicle Code. The first subdivision “(a)” read as in the enacted bill (see fn. 2 above). The second subdivision provided, “(b) Any vehicle used in violation of subdivision (a) shall be impounded at the owner’s expense for not less than 15 days nor more than 30 days.” The third subdivision provided for the mandatory suspension of the minor’s driver’s license as found in the enacted bill.
On May 25, 1965 the bill was amended in the Assembly by revising the language of subdivision “(b)” to that found in the enacted bill so that impounding was made discretionary for a period from one through 30 days, and only could apply to a vehicle registered to the minor. The Assembly amendment also included a revision of Vehicle Code section 23102 which added a similar provision authorizing impounding in the event of a conviction of a minor for driving while under the influence of intoxicating liquor. (See C.E.B. review of 1965 Legislation, pp. 269-270.)
In People v. Haeussler (1953) 41 Cal.2d 252 [260 P.2d 8], the court disapproved People v. Lewis, supra, insofar as it failed to recognize that a person may be “under the influence of intoxicating liquor” without being affected to the extent commonly associated with “intoxication” or “drunkenness.” (41 Cal.2d at pp. 262-263.)
In People v. Breyer, supra, the court in fact found that the later adoption of the general provisions of section 484 of the Penal Code repealed by implication other specific statutes dealing with obtaining property by false pretenses. Note also, People v. Kreiling (1968) 259 Cal.App.2d 699, 702-704 [66 Cal.Rptr. 582] where no basic overlapping was found.
It may be noted that the record reveals that after charging the defendant with possession of alcohol by a minor, the officer advised him of his constitutional rights, and the defendant refused to talk. The officer then talked to the passenger. On his return the defendant asked the officer what the passenger had said, and indicated that he wanted to make a statement. It was apparently thereafter that the defendant was informed that he was charged with contributing to the delinquency of a minor. The foregoing was brought out on the cross-examination of the officer at the preliminary hearing. The prosecution, however, made no attempt to develop what was said by the passenger or the defendant on the issue of probable cause at the preliminary hearing, nor was the subject of furnishing the beverage developed at the hearing on the motion to suppress when both the defendant and the passenger testified that the latter had the opened can of beer in his possession for some 10 minutes before its discovery by the officer.
| CASELAW |
[Kubernetes, Kubernetes in Production, Production Readiness Checklist, Kubernetes Best Practices]
Kubernetes in Production: Readiness Checklist and Best Practices for Resource Management
Deploying Kubernetes in production is no easy task. Kubernetes environments need to hold up on the rough seas of production from an availability, security, scalability, resilience, monitoring and resource management perspective. In this instalment of the Kubernetes Production Readiness and Best Practices Checklist series, we dive into the topic of Resource Management.
Hasham Haider
Hasham Haider
February 27, 2019
10 minute read
This is the second instalment in our blog series outlining a best practices checklist for Kubernetes in Production. In the first instalment, we looked into best practices for ensuring highly available Kubernetes deployments, both on the infrastructure as well as the application layer.
In this post, we will branch off into Production readiness best practices for resource management. But first a quick recap of what we mean by production ready Kubernetes; We defined production readiness for Kubernetes in terms of high availability, security, resource management, scalability and monitoring.
A production-ready Kubernetes deployment is one in which DevOps and Kubernetes administrators have implemented best practices for all of the above-mentioned aspects of their environment. With this checklist, DevOps and Kubernetes administrators can ensure they are following best practices and that their deployments are ready for production.
We have already covered high availability best practices for Kubernetes in production in a previous blog post. You can download the complete production readiness and best practices checklist here.
Resource Management
Kubernetes has three types of resources; CPU and memory together referred to as compute resources and ephemeral storage. DevOps can apply both soft limits (resource requests) and hard limits (resource limits) to the amount of these resources that can be consumed by containers.
That, however, is just the start. Kubernetes resources can be managed on many different levels of abstraction. Kubernetes also provides many other knobs to manage resource consumption in production. Below we go through an extensive checklist of some of these to ensure efficient resource consumption for Kubernetes workloads in production.
Configured Resource Requests and Limits for Containers?
Resource requests and limits help you manage resource consumption by individual containers. Resource requests are a soft limit on the amount of resources that can be consumed by individual containers. Limits are the maximum amount of resources that can be consumed.
Resource requests and limits can be set for CPU, memory and ephemeral storage resources. Setting resource requests and limits is a Kubernetes best practice and will help avoid containers getting throttled due to lack of resources or going berserk and hogging resources.
To check whether all containers inside a pod have resource requests and limits defined use the following command
kubectl describe pod -n <namespace_name> <pod_name>
This will display a list of all containers with the corresponding limits and requests for both CPU and memory resources.
Download the Complete Production-Readiness Checklist with Checks, Recipes and Best Practices for Availability, Resource Management, Security, Scalability and Monitoring
Download Checklist
Specified Resource Requests and Limits for Local Ephemeral Storage?
Local ephemeral storage is a new type of resource introduced in Kubernetes 1.8. Containers use ephemeral storage for local storage. If you have configured local ephemeral storage check to see that you have set requests and limits for each container for this resource type.
Here is how you can check whether requests and limits have been defined for local ephemeral storage for all containers:
kubectl describe pod -n <namespace_name> <pod_name>
Created Separate Namespaces for your Teams?
Kubernetes namespaces are virtual partitions of your Kubernetes clusters. It is recommended best practice to create separate namespaces for individual teams, projects or customers. Examples include Dev, production, frontend etc. You can also create separate namespaces based on custom application or organizational requirements. Here is how you can display a list of all namespaces:
kubectl get namespaces
Or
kubectl get namespaces --show-labels
You can also display a list of all the pods running inside a namespace with:
kubectl get pods --all-namespaces
Configured Default Resource Requests and Limits for Namespaces?
Default requests and limits specify the default values for memory and CPU resources for all containers inside a namespace. In situations where resource request and limit values are not specifically defined for a container created inside a namespace with default values, that container will automatically inherit the default values. Configuring default values on a namespace level is a best practice to ensure that all containers created inside that namespace get assigned both request and limit values.
Here is how you check whether a namespace has been assigned default resource requests and limits:
kubectl describe namespace <namespace_name>
Configured Limit Ranges for Namespaces?
Limit ranges also work on the namespace level and allow us to specify the minimum and maximum CPU and memory resources that can be consumed by individual containers inside a namespace.
Whenever a container is created inside a namespace with limit ranges, it has to have a resource request value that is equal to or higher than the minimum value we defined in the limit range. The container also has to have both CPU and memory limits that are equal to lower than the max value defined in the limit range.
Check whether limit ranges have been configured:
kubectl describe namespace <namespace_name>
Specified Resource Quotas for Namespaces?
Resource quotas also work on the namespace level and provide another layer of control over cluster resource usage.
Resource Quotas limit the total amount of CPU, memory and storage resources that can be consumed by all containers running in a namespace.
Consumption of storage resources by persistent volume claims can also be limited based on individual storage class. Kubernetes administrators can define storage classes based on quality of service levels or backup policies.
Check whether resource quotas have been configured:
kubectl describe namespace <namespace_name>
Configured Pod and API Quotas for Namespaces?
Pod quotas allow you to restrict the total number of pods that can run inside a namespace. API quotas let you set limits for other API objects like PersistentVolumeClaims, Services and ReplicaSets.
Pod and API quotas are a good way to manage resource usage on a namespace level.
To check whether quotas have been configured:
kubectl describe namespace <namespace_name>
Ensured Resource Availability for Etcd?
Typically, Etcd clusters have a pretty large resource footprint. Therefore, it is best practice to run these clusters on dedicated hardware to ensure they have access to enough resources. Resource starvation can lead to the cluster becoming unstable, which will, in turn, mean that no new pods can be scheduled.
Here is an etcd resource guide based on the number of nodes in the cluster and the clients being served. Typical etcd clusters need 2-4 CPU cores, 8GB of memory, 50 sequential IOPS and a 1 Gbe network connection to run smoothly. For larger etcd clusters, check out this handy guide.
Configured Etcd Snapshot Memory Usage?
Etcd snapshots are backups of the etcd cluster which can be used for cluster disaster recovery. The --snapshot-count flag determines the number of changes that need to happen to etcd before a snapshot is taken. Higher --snapshot-count will hold a higher number of entries until the next snapshot, which can lead to higher memory usage. The default value for --snapshot-count in etcd v3.2 is 100,000.
Make sure to configure this number based on your unique cluster requirements.
You can do this using:
etcd --snapshot-count=X
Attached Labels to Kubernetes Objects?
Labels allow Kubernetes objects to be queried and operated upon in bulk. They can also be used to identify and organize Kubernetes objects into groups. As such defining labels should figure right at the top of any Kubernetes best practices list. Here is a list of recommended Kubernetes labels that should be defined for every deployment.
Check whether pods have been labelled
kubectl get pods --show-labels
Limited the Number of Pods that can Run on a Node?
You can also control the number of pods that can be scheduled on a node using the --max-pods flag in Kubelet.
This will help avoid scenarios where rogue or misconfigured jobs create pods in such large numbers as to overwhelm system pods.
Reserved Compute Resources for System Daemons?
Another best practice is to reserve resources for system daemons that are needed by both the OS and Kubernetes itself to run. All three resource types CPU, memory and ephemeral storage resources can be reserved for system daemons. Once reserved these resources are deducted from node capacity and are exposed as node allocable resources. Below are kubelet flags that can be used to reserve resources for system daemons:
--kube-reserved: allows you to reserve resources for Kubernetes system daemons like the kubelet, container runtime and node problem detector.
--system-reserved: allows you to reserve resources for OS system daemons like sshd and udev.
Configured API Request Processing for API Server?
To manage CPU and memory consumption by the API server, make sure to configure the maximum number of requests that can be processed by the API server in parallel.
This can be done using the --max-requests-inflight and --max-mutating-requests-inflight flags.
Processing a lot of API requests in parallel can be very CPU intensive for the API server and can also lead to OOM (out of memory) events.
Configured out of Resource Handling?
Make sure you configure out of resource handling to prevent unused images and dead pods and containers taking up too much unnecessary space on the node.
Out of resource handling specifies Kubelet behaviour when the node starts to run low on resources. In such cases, the Kubelet will first try to reclaim resources by deleting dead pods (and their containers) and unused images. If it cannot reclaim sufficient resources, it will then start evicting pods.
You can influence when the Kubelet kicks into action by configuring eviction thresholds for eviction signals. Thresholds can be configured for nodefs.available, nodefs.inodesfree, imagefs.available and imagefs.inodesfree eviction signals in the pod spec.
Following are some examples:
• nodefs.available<10%
• nodefs.inodesFree<5%
• imagefs.available<15%
• imagefs.inodesFree<20%
Doing this will ensure that unused images and dead containers and pods do not take up unnecessary disk space.
You should also consider specifying a threshold for memory.available signal. This will ensure that Kubelet kicks into action when free memory on the node falls below your desired level.
Another best practice is to pass the --eviction-minimum-reclaim to Kubelet. This will ensure that the Kubelet does not pop up and down the eviction threshold by reclaiming a small amount of resources. Once an eviction threshold is triggered the Kubelet will evict pods till the minimum threshold is reached.
Using Recommended Settings for Persistent Volumes?
Persistent Volumes (PVs) represent a piece of storage in a Kubernetes cluster. PVs are similar to regular Kubernetes volumes with one difference; they have a lifecycle that is independent of any specific pod in the cluster. Kubernetes volumes, on the other hand, do not persist data across pod restarts.
Persistent Volume Claims (PVCs) are requests for storage resources by a user. PVCs consume PV resources in the same way that a pod consumes node resources.
When creating PV’s Kubernetes documentation recommends the following best practices:
• Always include Persistent Volume Claims in the config
• Never include PVs in the config
• Always create a default storage class
• Give the user the option of providing a storage class name
Enabled Log Rotation?
If you have node-level logging enabled, make sure you also enable log rotation to avoid logs consuming all available storage on the node. Enable the logrotate tool for clusters deployed by the kube-up.sh script on GCP or Docker’s log-opt for all other environments.
Prevented Kubelet from Setting or Modifying Label Keys?
If you are using labels and label selectors to target pods to specific nodes for security or regulatory purposes, make sure you also choose label keys that cannot be modified by the Kubelet. This will ensure that compromised nodes cannot use their Kubelet credentials to label their node object and schedule pods.
Make sure you use the Node authorizer, enable the NodeRestriction admission plugin and always prefix node labels with node-restriction.Kubernetes.io/ as well as add the same prefix to label selectors.
To recap here are the recommended Kubernetes best practices for resource management:
• Configure Resource Requests and Limits for Containers
• Specify Resource Requests and Limits for Local Ephemeral Storage
• Create Separate Namespaces for Teams
• Configure Default Resource Requests and Limits for Namespaces
• Configure Limit Ranges for Namespaces
• Specify Resource Quotas for Namespaces
• Configure Pod and API Quotas for Namespaces
• Ensure Resource Availability for Etcd
• Configure Etcd Snapshot Memory Usage
• Attach Labels to Kubernetes Objects
• Limit the Number of Pods that can Run on a Node
• Reserve Compute Resources for System Daemons
• Configure API Request Processing for API Server
• Configure out of Resource Handling
• Use Recommended Settings for Persistent Volumes
• Enable Log Rotation
• Prevent Kubelet from Setting or Modifying Label Keys
Download the Complete Production-Readiness Checklist with Checks, Recipes and Best Practices for Availability, Resource Management, Security, Scalability and Monitoring
Download Checklist
Hasham Haider
Author
Hasham Haider
Fan of all things cloud, containers and micro-services!
Want to Dig Deeper and Understand How Different Teams or Applications are Driving Your Costs?
Request a quick 20 minute demo to see how you can seamlessly allocate Kubernetes costs while saving up to 30% on infrastructure costs using Replex.
Schedule a Meeting | ESSENTIALAI-STEM |
Galltacht
Etymology
From.
Noun
* 1) English-speaking district in Ireland
* 2) English settlers in Ireland, Englishry
* 3) English-occupied district, the Pale | WIKI |
Talk:Holy Names Academy
Untitled
Some on has changed our website to post incorrect information. Please monitor this page more closely to insure accurate information.
* You can do this youself. Just click "watch" at the top of the page. Loren.wilton (talk) 22:25, 16 February 2008 (UTC)
School Spirit
Each class has a different color to demonstrate their spirit. Class of '12: Green Class of '11: Yellow Class of '10: Blue Class od '09: Red
The freshman are always green; the new sophomores always inherit the previous senior class's color. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:36, 8 October 2008 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 external links on Holy Names Academy. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20090326000000/http://www.ed.gov/programs/nclbbrs/list-1982.pdf to http://www.ed.gov/programs/nclbbrs/list-1982.pdf
* Added archive https://web.archive.org/web/20070819233705/http://www.journalinquirer.com/site/news.cfm?newsid=17475750&BRD=985&PAG=461&dept_id=161556&rfi=6 to http://www.journalinquirer.com/site/news.cfm?newsid=17475750&BRD=985&PAG=461&dept_id=161556&rfi=6
Cheers.— InternetArchiveBot (Report bug) 07:38, 4 April 2017 (UTC)
"International District"
It is utterly anachronistic to say that the Holy Names Academy was once in the International District, as against being in the area later known as the International District. There was no such thing as the International District when Holy Names was there: it was on the now-destroyed Jackson Hill. To say that Holy Names Academy was in the International District is like saying that Columbus may have been to Havana. - Jmabel | Talk 23:58, 17 September 2018 (UTC)
* If anyone needs context: that is with respect to this edit. - Jmabel | Talk 00:00, 18 September 2018 (UTC)
* , can you write any sort of sourced history for this school? You may have noticed I just tagged the history as unsourced as an initial step in cleaning up the massively advitorial content of this article. Almost anything would be an improvement. I can take care of the current stuff, but am not really able to find time to research history. A source for the claim of oldest in the lede would be a great start. Thanks. John from Idegon (talk) 05:56, 19 September 2018 (UTC)
* I've posted a request for help at WP:WikiProject Seattle. John from Idegon (talk) 06:08, 19 September 2018 (UTC)
* John from Idegon, I've re-written somewhat and expanded the history section and referenced the article. There's actually quite a lot of material available about it. Jmabel, I totally agree with you about the goofy anachronism and have restored your wording. Hopefully, it will stay that way. Voceditenore (talk) 15:38, 19 September 2018 (UTC)
* (via edit conflict) Oldest is doubtless correct. I just ran across this article because we recently had this photo added to Commons. I know the history to a moderate extent, but I don't have sources handy (they won't be online, there is nothing) and am about to be headed out of town for a while. I can probably work on some research starting a week or now. On this particular item, it's going to be hard to come up with something citable, because my knowledge here is a matter of synthesis, from reading a lot of history: "International District" is a modern term. Offhand, I don't think it predates the 1960s: from shortly after the regrade (c. 1908) to the 1960s, this was "Chinatown" (with Japantown to its north and curving around to its east into what is now "Little Saigon", a name of even more recent vintage). Given time, I should be easily able to find citation from the era calling this "Jackson Hill", but it's hard to prove the absence of the use of "International District". - Jmabel | Talk 15:40, 19 September 2018 (UTC)
* Thanks. - Jmabel | Talk 15:42, 19 September 2018 (UTC)
* It sounds like this is moving toward consensus. If there is something specifically needed from me, please ping me and let me know. I'm mainly on Commons, and don't maintain an en-wiki watchlist. - Jmabel | Talk 15:42, 19 September 2018 (UTC)
* Okey-Dokey. I've also put the Connected contributor template at the top of the page which might help. Best, Voceditenore (talk) 15:48, 19 September 2018 (UTC)
* I'm pretty much finished here. I can't stand doing current stuff. I'll leave that to John from Idegon. Oh, and John, I've also referenced the "oldest" claim. Voceditenore (talk) 15:54, 19 September 2018 (UTC) | WIKI |
Portal:San Francisco Bay Area/Quotes/31
San Francisco was where the social hemorrhaging was showing up. San Francisco was where the missing children were gathering and calling themselves 'hippies.' ~ Joan Didion Slouching Towards Bethlehem (1968) *more quotes about San Francisco from Wikiquote | WIKI |
BlackBerry Leap
The BlackBerry Leap is a discontinued smartphone developed by BlackBerry Limited. Announced on March 3, 2015, at the Mobile World Congress with initial availability in April 2015, the Leap was a follow-on to the affordable Z3 model with a number of upgraded features. Upgrades included LTE support, higher-resolution display and cameras, higher-performance CPU and GPU, double the internal storage capacity, and the latest version of the BlackBerry 10 operating system. Size and weight increased very slightly from the Z3 model.
Hardware
The BlackBerry Leap has a 5.0-inch IPS LCD display, dual-core 1.5 GHz Krait Qualcomm Snapdragon S4 Plus processor, 2 GB of RAM and 16 GB of internal storage that can be expanded using microSD cards up to 256 GB. The phone has a 2800 mAh Li-ion battery, 8 MP rear camera with LED flash and 2 MP front-facing camera with auto-focus. It is available in black or white colors. It features connectivity to WiFi, Bluetooth and GPS. It measures 144 mm x 72.8 mm x 9.5 mm and weighs 170 grams.
Design
According to BlackBerry product designers, key design criteria for the Leap include solid single-body construction, edge-to-edge glass, straightforward SIM/SD card exchange and ease of repairability. Special attention is paid to aesthetic details such as the texture and grip of the covering, laser-cut speaker ports, and the overall look of the white-colored model.
Sales
BlackBerry announced the global rollout of the Leap on April 15, 2015, with immediate availability via various resellers in the UK market. By April 22, 2015, customers in the French, German and US markets were able to order the Leap via either Amazon.com, BlackBerry Ltd.'s "Shop BlackBerry" website, or certain local resellers. Releases for other markets including Canada, India, United Arab Emirates and Saudi Arabia have since been made as well.
Reception
Various journalists and industry pundits handled the device and gave preliminary assessments at its initial showing at the 2015 Mobile World Congress. It received reviews praising the sleek design as well as the display, although it was criticized for "not standing out." | WIKI |
Magnetic Crack Detector
1. objective
Electroflux Magnetic Crack Detector equipment is designed for non-destructive testing of ferrous iron and steel parts. Electroflux equipment will locate cracks and other defects in parts which can be magnetized.
When properly used, Electorflux will locate such defects as fatigue cracks, heat cracks, grinding checks, forgings laps, shrinks and tears in castings, improper welds and inherent defects in metal such as seams and inclusions as well as cracks due to overstressing of parts. These defects may not be visible to the naked eye but can be located rapidly and accurately with this equipment.
2. apparatus required
3. reference
Instruction Manual of Toshniwal Instruments & Engg. Co., New Delhi.
4. procedure
4.1 For dry Method:
• 4.1.1 - When the dry method is used, select a powder with a colour that will provide good contrast to the surface to be inspected.
• 4.1.2 Surface Preparation: When using the dry method, be sure that the surface to be inspected will not prevent the particles from forming indications of defects. To ensure this, the surface must be free of any sticky or gummy substance which would cause the powder to stick and not move freely over the surface. In general parts must be thoroughly cleaned of any oil or grease and must be dry. Rust or a good coat of paint on a part will not interfere with using the dry method.
• 4.1.3 Applying Powder: Powder may be applied to the part by a number of methods. A powder bulb or hand operated squeeze type applicator may be used, or a mechanically powder blower may be used. Some times powder may be simply thrown onto large surfaces. The suitable method of applying the powder depends partly on the type of defects to be located. If very small defects are anticipated, quite a bit of care must be used in applying the powder and too thick a layer of powder must not be applied for danger of hiding defects. When fairly large or deep defects are anticipated, less care is necessary in applying the powder, as a strong leakage field will exist at the defect. The general method for applying powder is to cover the surface of the part with a fine film of powder. Since the leakage field at defects will not attract the powder at much distance, care must be taken to ensure that the powder moves over all the surface of the part. Best results are usually obtained when the continuous method is used in conjunction with the dry method. This combination is called the dry-continuous method. When using the dry-continuous method, the current remains on all the time the powder is applied. Observation of any defects must be made while the powder is applied. Usually excess powder must be carefully blown from the surface of the part to avoid obscuring any defects. For small parts, the operator himself may blow the powder away or a low pressure blast of air may be used. If too much force is used in blowing the excess powder away, any indications which are forced will also be blown away. A trained operator will be able to tell the difference between an indication formed by a defect and a false indication caused by a sharp change of section or irregularity on the surface of the part by the way in which the powder is attracted during magnetization and application of the powder. Also a trained operator can judge the depth of a crack by the manner in which the powder builds up at the defect. Surface cracks will cause a sharp line of powder, whereas subsurface defects will cause a broad band of powder. Cracks which are both open to the surface and quite deep will cause a broad and high build up of powder at the defect.
• 4.2 Dry Residual Method:
• The dry-residual method (combination of dry method and residual method) can only be used when the surface to be inspected is quite smooth, so that the particles will freely move over the surface. The dry-residual method should be used with great caution since there are few applications where it has proven satisfactory.
If necessary, clean powder from surface after inspection. Particles might damage bearings, etc. If not cleaned away.
• 4.3 Operation of Machine:
1. Connect the supply according to machine requirement
2. Connect the magnetising cables to A.C or Half Wave Direct Current as required.
3. The remote control adopted should be connected to ‘g’ socket.
4. Hold the job between magnetizing cable and press bigger switch (remote switch) to pass current. Indicator ‘f’ will glow indicating that the current is flowing through the job.
5. The current passing through the job, will be indicated by the meter ‘a’.
6. Infinite current control ‘e’ can be adjusted according to the requirement.
7. Sprinkle Iron powder or pour wet Iron fluid as the case may be on the job.
8. Check for flaws.
5. video
6. Download
Download PDF | ESSENTIALAI-STEM |
% pubman genre = article @article{item_3231616, title = {{Shifts in male reproductive tactics over the life course in a polygynandrous mammal}}, author = {Silk, Joan B. and St{\"a}dele, Veronika and Roberts, Eila K. and Vigilant, Linda and Strum, Shirley C.}, language = {eng}, issn = {0960-9822}, doi = {10.1016/j.cub.2020.02.013}, year = {2020}, date = {2020-05-05}, abstract = {{Summary In polygynous and polygynandrous species, there is often intense male-male competition over access to females, high male reproductive skew, and more male investment in mating effort than parenting effort [1]. However, the benefits derived from mating effort and parenting effort may change over the course of males{\textquoteright} lives. In many mammalian species, there is a $\cap$-shaped relationship between age, condition, and resource holding power as middle-aged males that are in prime physical condition outcompete older males [2, 3, 4, 5, 6, 7, 8] and sire more infants [9, 10, 11, 12]. Thus, males might derive more benefits from parenting effort than mating effort as they age and their competitive abilities decline [13]. Alternatively, older males may invest more effort in making themselves attractive to females as mates [14]. One way that older males might do so is by developing relationships with females and providing care for their offspring [14, 15]. Savannah baboons provide an excellent opportunity to test these hypotheses. They form stable multi-male, multi-female groups, and males compete for high ranking positions. In yellow and chacma baboons (Papio cynocephalus and P. ursinus), there is a $\cap$-shaped relationship between male age and dominance rank [12], and high rank enhances paternity success [12, 16]. Lactating female baboons form close ties ({\textquotedblleft}primary associations{\textquotedblright} hereafter) with particular males [15, 16, 17, 18, 19, 20], who support them and their infants in conflicts [15, 19] and buffer their infants from rough handling [20]. Females{\textquoteright} primary associates are often, but not always, the sires of their current infants [16, 20, 21, 22].}}, journal = {{Current Biology}}, volume = {30}, number = {9}, pages = {1716--1720}, eid = {e3}, } | ESSENTIALAI-STEM |
2024 United States presidential straw poll in Guam
The 2024 United States presidential straw poll in Guam will take place on November 5, 2024. Guam is a territory and not a state, making it ineligible to elect members of the Electoral College like other states. Instead, Guam conducts a non-binding presidential straw poll during the general election.
In the 2024 presidential election, incumbent Democratic president Joe Biden is running for reelection to a second term in a rematch against former Republican president Donald Trump.
Background
Guam has held a straw poll coinciding with every presidential election since 1980 to gauge residents' preferences and raise awareness regarding the territory's lack of federal representation.
In the 2020 presidential straw poll, Biden had defeated then-incumbent President Donald Trump with 55.38% of the popular vote. | WIKI |
unified
Project: syntax-tree/hast-util-sanitize
Package: hast-util-sanitize@4.0.0
1. Dependents: 36
2. hast utility to sanitize nodes
1. util 143
2. utility 139
3. unist 127
4. html 121
5. hast 72
6. hast-util 46
7. clean 6
8. sanitize 3
9. xss 2
hast-util-sanitize
Build Coverage Downloads Size Sponsors Backers Chat
hast utility to sanitize a tree.
Install
This package is ESM only: Node 12+ is needed to use it and it must be imported instead of required.
npm:
npm install hast-util-sanitize
Use
import {u} from 'unist-builder'
import {h} from 'hastscript'
import {sanitize} from 'hast-util-sanitize'
import {toHtml} from 'hast-util-to-html'
const tree = h('div', {onmouseover: 'alert("alpha")'}, [
h(
'a',
{href: 'jAva script:alert("bravo")', onclick: 'alert("charlie")'},
'delta'
),
u('text', '\n'),
h('script', 'alert("charlie")'),
u('text', '\n'),
h('img', {src: 'x', onerror: 'alert("delta")'}),
u('text', '\n'),
h('iframe', {src: 'javascript:alert("echo")'}),
u('text', '\n'),
h('math', h('mi', {'xlink:href': 'data:x,<script>alert("foxtrot")</script>'}))
])
const unsanitized = toHtml(tree)
const sanitized = toHtml(sanitize(tree))
console.log(unsanitized)
console.log(sanitized)
Unsanitized:
<div onmouseover="alert("alpha")"><a href="jAva script:alert("bravo")" onclick="alert("charlie")">delta</a>
<script>alert("charlie")</script>
<img src="x" onerror="alert("delta")">
<iframe src="javascript:alert("echo")"></iframe>
<math><mi xlink:href="data:x,<script>alert("foxtrot")</script>"></mi></math></div>
Sanitized:
<div><a>delta</a>
<img src="x">
</div>
API
This package exports the following identifiers: sanitize, defaultSchema. There is no default export.
sanitize(tree[, schema])
Sanitize a hast tree.
Parameters
Returns
Node — A new, sanitized tree.
Schema
Configuration. If not given, defaults to GitHub style sanitation. If any top-level key isn’t given, it defaults to GitHub’s style too.
For a thorough sample, see the code for defaultSchema.
To extend the standard schema with a few changes, clone defaultSchema like so:
import {h} from 'hastscript'
import deepmerge from 'deepmerge'
import {sanitize, defaultSchema} from 'hast-util-sanitize'
var schema = deepmerge(defaultSchema, {attributes: {'*': ['className']}})
var tree = sanitize(h('div', {className: ['foo']}), schema)
// `tree` still has `className`.
console.log(tree)
// {
// type: 'element',
// tagName: 'div',
// properties: {className: ['foo']},
// children: []
// }
attributes
Map of tag names to allowed property names (Object.<Array.<string>>).
The special '*' key defines property names allowed on all elements.
One special value, namely 'data*', can be used to allow all data properties.
attributes: {
a: ['href'],
img: ['src', 'longDesc'],
// …
'*': [
'abbr',
'accept',
'acceptCharset',
// …
'vSpace',
'width',
'itemProp'
]
}
Instead of a single string (such as type), which allows any property value of that property name, it’s also possible to provide an array (such as ['type', 'checkbox']), where the first entry is the property name, and all other entries allowed property values.
This is how the default GitHub schema allows only disabled checkbox inputs:
attributes: {
// …
input: [
['type', 'checkbox'],
['disabled', true]
]
// …
}
This also plays well with properties that accept space- or comma-separated values, such as class. Say you wanted to allow certain classes on span elements for syntax highlighting, that can be done like this:
// …
span: [
['className', 'token', 'number', 'operator']
]
// …
required
Map of tag names to required property names and their default property value (Object.<Object.<*>>). If the defined keys do not exist in an element’s properties, they are added and set to the specified value.
Note that properties are first checked based on the schema at attributes, so properties could be removed by that step and then added again through required.
required: {
input: {type: 'checkbox', disabled: true}
}
tagNames
List of allowed tag names (Array.<string>).
tagNames: [
'h1',
'h2',
'h3',
// …
'strike',
'summary',
'details'
]
protocols
Map of protocols to allow in property values (Object.<Array.<string>>).
protocols: {
href: ['http', 'https', 'mailto'],
// …
longDesc: ['http', 'https']
}
ancestors
Map of tag names to their required ancestor elements (Object.<Array.<string>>).
ancestors: {
li: ['ol', 'ul'],
// …
tr: ['table']
}
clobber
List of allowed property names which can clobber (Array.<string>).
clobber: ['name', 'id']
clobberPrefix
Prefix to use before potentially clobbering property names (string).
clobberPrefix: 'user-content-'
strip
Names of elements to strip from the tree (Array.<string>).
By default, unsafe elements are replaced by their children. Some elements, should however be entirely stripped from the tree.
strip: ['script']
allowComments
Whether to allow comments (boolean, default: false).
allowComments: true
allowDoctypes
Whether to allow doctypes (boolean, default: false).
allowDoctypes: true
Security
Improper use of hast-util-sanitize can open you up to a cross-site scripting (XSS) attack. The defaults are safe, but deviating from them is likely unsafe.
Use hast-util-sanitize after all other utilities, as other utilities are likely also unsafe.
Contribute
See contributing.md in syntax-tree/.github for ways to get started. See support.md for ways to get help.
This project has a code of conduct. By interacting with this repository, organization, or community you agree to abide by its terms.
License
MIT © Titus Wormer | ESSENTIALAI-STEM |
Tutorial - sharing a change with another repository
In TutorialFirstChange, we created a ChangeSet in the my-hello-new-output ["Repository"]. Now we want to propagate that change somewhere else.
Following good ["Mercurial"] style, let's first ["Clone"] our original ["Repository"].
$ cd ..
$ hg clone my-hello my-hello-share
We can use the tip command to find out what the ["Tip"] in each ["Repository"] is. (Remember, the ["Tip"] is the most recent ChangeSet.) We pass in the -q ("be quiet") option to keep ["Mercurial"] from printing a complete description of the ["Tip"].
$ cd my-hello-share
$ hg -q tip
1:82e55d328c8c
$ cd ../my-hello-new-output
$ hg -q tip
2:a58809af174d
As we can see, the ["Tip"] is different in each. Let's go back to my-hello-share and propagate our new ChangeSet in there. To do this, we use the pull command, which ["Pull"]s all ["ChangeSet"]s that are in the other repository, but not yet in this one, into this one.
$ cd ../my-hello-share
$ hg pull ../my-hello-new-output
pulling from ../my-hello-new-output
searching for changes
adding changesets
adding manifests
adding file changes
added 1 changesets with 1 changes to 1 files
(run 'hg update' to get a working copy)
Unlike other common ["Mercurial"] commands, pull is chatty. In this case, the ["Pull"] has succeeded.
The last line of output is important. By default, ["Mercurial"] does not update the WorkingDirectory after a ["Pull"]. This means that although the ["Repository"] now contains the ChangeSet, the file hello.c in the WorkingDirectory still has its old pre-["Pull"] contents.
We can ["Update"] this file (and any others that were changed during the ["Pull"]) by following ["Mercurial"]'s reminder:
$ hg update
1 files updated, 0 files merged, 0 files removed, 0 files unresolved
At this point, we can check and see that my-hello-share and my-hello-new-output have identical contents and revision histories.
To share a change with another person, we continue to TutorialExport. | ESSENTIALAI-STEM |
دانلود مقاله ISI انگلیسی شماره 10430
عنوان فارسی مقاله
بهینه سازی تجربی و عددی هندسه محصولات ورقه ای با استفاده از روش سطح پاسخ
کد مقاله سال انتشار مقاله انگلیسی ترجمه فارسی تعداد کلمات
10430 2007 9 صفحه PDF سفارش دهید 4905 کلمه
خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.
عنوان انگلیسی
Experimental and numerical optimisation of the sheet products geometry using response surface methodology
منبع
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Journal of Materials Processing Technology, Volume 189, Issues 1–3, 6 July 2007, Pages 441–449
کلمات کلیدی
- انواع استیل - طراحی آزمایشات - شبیه سازی - خسارت
پیش نمایش مقاله
پیش نمایش مقاله بهینه سازی تجربی و عددی هندسه محصولات ورقه ای با استفاده از روش سطح پاسخ
چکیده انگلیسی
In this paper, two types of shapes were retained in order to investigate the behaviour of automotive safety parts that are obtained by successive sequences of blanking and bending. Firstly, experiments have been conducted in press tools for a sufficient number of process parameters combinations, particularly, die radius and clearance. Design of experiments and response surface methodology (RSM) were adopted to plot results obtained using the two-specimen geometries. Secondly, numerical model based on elastic plastic theory and ductile damage has been developed for the prediction of material behaviour during forming. The numerical approach was applied to study the mechanical responses of bent parts obtained by using each specimen shapes. The same parameters used for conducting experiments were retained for numerical simulation. However, the maximum bending load obtained for the two investigated cases were treated by application of response surface method. The damage values show a clear difference between the two considered specimen shapes. Numerical bending results compared to experimental values show the reliability of the proposed model for each case. The effects of geometry parameters on the bent parts and convenience of the obtained graphics were discussed in details.
مقدمه انگلیسی
Most sheet steels commonly used in automotive and other manufacturing applications have high properties, such as ductility, resistance and Young's modulus. These materials can be bent under very severe parameters without fracture or cracking. In a pioneer works [1], it has been laid down that the final mechanical characteristics of parts do not depend only in material properties but also in the geometry retained for producing workpieces. The optimisation of forming processes aimed to the production of net-shape components and high resistant products is nowadays one of the fundamental topics on which the interest of automotive research groups is focused. Several contributions [2], [3], [4] and [5] have been conducted in order to reduce stretching and springback phenomena by combining process parameters and sometimes by the choice of materials type having good properties, whereas, works treating the effect of geometry in the final mechanical state of product remain nowadays insufficient. As a preferment procedure, response surface technique is retained in several cases for treating and then, for predicting sheet metal forming problems. It is a useful engineering method to analyse and to supervise the mechanical and geometrical behaviour of workpieces, such as bent parts. Todoroki and Ishikawa [6] have described in their works a new experimental method to optimise stacking sequence by applying a response surface method to composite cylinder products. Unfortunately, the two-dimensional plot still limited to overcome all understanding difficulties and remains far from the required fine model that can describes problems accurately. In addition, it is a consuming time to use because it is unable to present results versus more than one variable. Similarly, Chou and Hung [7] have used the response surface technique for analysing springback that they have taken as a function of both material properties and tools parameters. However, extensive works [8] has adopted the same procedure for optimisation of vehicle crashworthiness design. Several functional evaluations may be needed for solving this kind of problems. Therefore, the diversification of consumer needs lead to the changes from mass production to small quantity in which geometry is mostly different. Hence, the reduction of time for product design is crucial. The response surface technique is showed to be so reliable to solve the problem not only from a practical point of view but also by adopting a numerical simulation strategy. In the way of the response surface method application, Ohata et al. [9] have developed an optimum design system to assist the decision of material process condition for making best sheet formability for stamping. They combined finite element analysis and discretised optimisation algorithms for this purpose. The response surface method has been applied in order to attempt search the optimum conditions quickly and to help for deciding a sheet forming process. Optimisation of the process by classical methods based on empirical rule adjustments is not usually applicable to complex geometries or materials without a large database of experience. It involves changing one independent variable of the problem while all others are a fixed level [10] and [11]. This is extremely time-consuming and expensive for a large number of variables. To overcome this difficulty, factorial design of experiments and response surface methodology can be employed to optimise medium components [12], [13], [14] and [15]. In this work, comparison between experiments and simulation has been carried out for deciding suitable process parameters in bending operation. The initial shape of sheet specimens is chosen in such a manner that the bent section would be the same for the two cases and representative as soon as possible of the real geometry of safety parts. The first specimen consists in an oblong-hole at the bent section whereas the second is a full-section specimen. Experimental and numerical results are conducted for an extensive combination of die radius values and punch–blank clearance values. The maximum bending load and maximum damage were plotted by applying the response surface technique allowing a reliable prediction of parameters that avoid the appearing of fracture or cracking in bent product.
نتیجه گیری انگلیسی
In this study, a comprehensive and accurate characterisation of material behaviour is conducted by means of two-specimen designs. Response surface methodology is principally, applied in order to analyse the behaviour of the automotive safety parts. Experimental approach and numerical simulations have been conducted through the same design of experiment, with two bending variables; the die radius and the clearance. The response surface method deals with an efficient and satisfactory choice of sheet design for a best characterisation of real bent parts. The following conclusion points can be retained: 1. Numerical results and experimental tests led to similar maps of maximum bending loads with the two considered specimen design whereas, coherence between experiment and numerical prediction is better when oblong-hole geometry is used. 2. The low die radius range and negative clearance range have to be avoided to produce parts by bending processes because these intervals lead to a highest bending load and highest risk of failure. 3. It has been found that the maximum bending load is sensitive to the considered parameters; whereas damage seems to depend much less on the clearance than on the die radius. 4. Finally, it is interesting to evoke that numerical simulation coupled to ductile damage is showed to be satisfactory to predict correctly the failure regions, particularly, when oblong-hole design is retained.
خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید. | ESSENTIALAI-STEM |
That the night was calm
Snoring is a very common phenomenon and it is not surprising. However, in cases where snoring becomes the sound of every night, you need to pay attention to health.
Snoring is a phenomenon so common that it becomes a topic for jokes much more often than a reason for going to doctors. In principle, anyone can occasionally snore in a dream. But if snoring becomes a soundtrack every night, you need to pay attention to health.
From an anatomical point of view, snoring is a sound caused by obstructed passage of air through the narrowed airways of the pharynx. A survey conducted by the agency InDepth showed that 61% of residents of large cities between the ages of 30 and 60 face snoring problems. Moreover, among the age group of 51–60 years, the share of snoring people or family members was more than 80%. This is not surprising: with age, the muscles of the upper respiratory tract lose their elasticity and elasticity, which leads to snoring during sleep.
What causes snoring?
Snoring can occur under the influence of many factors of a temporary, transient nature:
Alcohol intoxication. Alcohol has a relaxing effect on the muscles of the whole body, including the larynx.
Intake of sedatives and hypnotic drugs, which also have relaxing properties.
Smoking. Cigarette smoke irritates the mucous membrane of the nasopharynx, causing swelling.
Sleep in an uncomfortable position. Most often, people who, in principle, are not prone to snoring, begin to snore if they sleep on their backs.
In these cases, after eliminating the cause, the tendency to snore very quickly passes by itself. But sometimes the basis of the appearance of snoring becomes pathological changes in the body that require serious treatment.
Pathological changes in the body that cause snoring
Obesity. Fat that accumulates in the neck and chest in a dream begins to squeeze the airways, not allowing a person to breathe freely. “In the presence of snoring and obstructive sleep apnea, a 10% reduction in body weight can improve breathing parameters by 50%. In some cases, with uncomplicated snoring, it is enough to reduce body weight by 5-7% in order to completely eliminate snoring without any other interventions ” 1 .
Infections and inflammatory diseases of the upper respiratory tract. When inflammation of the nasopharynx occurs swelling, which, as in the previous case, narrows the lumen of the respiratory tract.
Features of the structure of the nasopharynx. Sometimes the cause of snoring becomes an elongated uvula, a curved nasal septum, polyps in the nose, and other pathologies requiring surgical intervention.
Hypertension. One third of patients with arterial hypertension have snoring and respiratory arrest during sleep. 2.3 Hypertension is accompanied by stagnation in the pulmonary circulation, because of which snoring becomes permanent, and further aggravates the progression of hypertension.
Danger and harm of snoring
As we have already figured out snoring, the phenomenon is far from harmless: it aggravates the development of the pathological process and can lead to a cessation of breathing during sleep2,3, sleep apnea. In addition, snoring significantly impairs the quality of sleep in both the person who is snoring and the one who sleeps nearby. People whose homework “rolls out at night” do not get enough sleep, feel overwhelmed and irritable in the morning, have difficulty concentrating. But despite this, only 20% of people suffering from snoring, trying to somehow solve this problem, and only 2% resort to using pharmaceuticals.
Leave a Reply | ESSENTIALAI-STEM |
Handling Django Settings Files
I have seen a lot of talk over the past couple years about how to handle different settings files and databases, synced between production and development. I have happened onto a way of doing it that makes me happy, and figured I would share it with the world.
File structure
I use a file structure that looks like this:
project/
settings/
__init__.py (empty)
base.py
sqlite.py
postgres.py
The base.py contains all of the configuration options that are shared among the databases. INSTALLED_APPS, etc. All of the DATABASE settings should be specified in the more-specific files. As well as things that differ by environment, like remote servers, cache settings, cookie domains, and other things.
This allows you to run the sqlite settings file, and have it be set to localhost, or whatever your development settings are. Then in production you just run against the postgres settings.
A good example of this being used in practice is on Read the Docs.
But wait, there’s more!
manage.py for dev
./manage.py is great for development. It is the easiest way to get started, and it automatically sets up your paths and stuff. With my setup, I actually explicitly set manage.py’s settings file to the sqlite file.
This means that whenever you are using manage.py, you are in a development context. So, what do you do about production?
django-admin.py is for production
In production, you set your DJANGO_SETTINGS_MODULE to the postgres settings file. So whenever you use django-admin.py, you will be running against the production database.
I really like this scheme, because it gives you a logical distinction between production and development in your code, and in your interface on the CLI. When you are developing, you are using manage.py and editing the sqlite settings file. The reverse for production.
Table Of Contents
Related Topics
This Page | ESSENTIALAI-STEM |
lateks
Etymology
, from, a later use of.
Noun
* 1) latex: the milky sap of several trees that coagulates on exposure to air; used to make rubber.
Etymology
.
Noun
* 1) latex
* 2) latex
Noun
* 1) latex | WIKI |
Stella Araneta
María Stella Márquez de Araneta (born 17 June 1937) (née Márquez Zawadski), often styled as Madame Stella de Araneta, is a Colombian—Filipino pageant director and beauty queen. She grew up in New York City and moved back to Colombia, where she became a pageant titleholder. As Miss Colombia, she was crowned the first Miss International in 1960. She obtained her Filipino citizenship via naturalization in 1970.
Araneta was the former national director of the Miss Universe and current director for Miss International franchises in the Philippines, under the Binibining Pilipinas organization. She also has served as chairman of the Binibining Pilipinas Charities Incorporated for fifty years.
Early life
Araneta was born in Tumaco, Colombia to Arturo Eduardo Márquez Acevedo, from Tumaco and Stella Zawadski Navia, from Valle del Cauca. She moved to the United States in 1954. She is the eldest sibling of two younger sisters. At the time, she was a high school student at Marymount School of New York in Manhattan. Initially, her father, working as a civil engineer decided to take her out of the school to Colombia on a promise of temporary vacation. As a young student, Araneta classified herself as a Gringa, noting that she was completely unable to relate to the Colombian culture, including its national dance Cumbia.
After high school, Araneta enrolled in Marymount College, Tarrytown, New York to continue her major both in psychology and the French language. In 1957, she gained an honorary prize as a beauty model for Pan American Airlines, though not necessarily a pageant contest. She also represented as Miss Honduras on a local Los Angeles pageant due to its lack of national entry. During that time, she was also sent by the nuns from her school as one of the “court princesses” for the 1957 homecoming event in Loyola Marymount University as a gesture of solidarity among affiliated Catholic schools for women.
Miss Colombia
During her stay in Colombia, Araneta learned the value of social work and became acquainted with the local Roman Catholic Church there to fund charities. The first charity she helped manage was named "Banquet of the Millionaires" through the assistance of a famed Catholic priest, Father Rafael García Herreros (1909—1992). Araneta was chosen as the representative of her country in 1958 by winning three local titles, Miss Tumaco, Miss Nariño and Miss Queen of Spain. Her victory under the department state of Nariño was notable for not having sent a candidate in twelve years while her travel visa permit to stay in Colombia was limited to two months.
During her national competition, she used the Colombian national costume as a Sibundoy Indian princess, wearing a gold headband and a Ruana shawl as a veil. After winning Miss Colombia in 1959, she was personally congratulated and photographed with former Colombian president, Alberto Lleras Camargo.
During the Miss Universe 1960 competition, the swimsuit assigned to her during her national competition was a one piece blue cerulean swimsuit with golden cleavage ornamentation (the other contestants were assigned yellow and pink). Ultimately, she competed and won the title for Señorita Colombia, gaining her access to become the national Colombian representative in Miss Universe 1960 (Top 15 Placement) at 6th-Runner up, then to Miss International 1960 (Winner Placement) of which she won against Miss India, Iona Pinto of Maharashtra by a score margin of half a point (0.5).
Miss International
She became Miss Colombia in 1959 and was able to compete in the Miss Universe 1960 pageant held in Miami Beach, Florida placing as a top 15 semi-finalist, at 6th—runner up placement.
Accordingly, Colombia sent her again as a national representative through the financial patronage of Max Factor cosmetics. As part of the promotional entourage group, she was given a tour with Conrad Hilton Sr. at the new renovation of the Beverly Hilton hotel. Hilton Sr. himself, jokingly asked Araneta if she would consider marrying his firstborn son and hotel heir Conrad Hilton Jr. in case he divorces again from Patricia McClintock, which consequently occurred in 1965.
At age 23, she competed in the first Miss International pageant held in Long Beach, California in 1960, becoming the first Miss International, and also the first Latin American titleholder in that line of pageants. During the press presentation at the former Lafayette Hotel, Araneta openly declared that she preferred to wear a figure-tight swimsuit that would showcase the pageant body she worked hard to achieve rather than the loose playsuits sponsored by the pageant organizers. She won the first evening gown competition out of the three rounds (1/3) at the pageant. Her measurements for the swimsuit competition which paved for her victory was recorded at 95—62—95 at exactly 170 centimeters. Ultimately, she won the title and received the following grand total prizes:
* Cashier's check of $10,000 USD, sponsored by the Mayor and the Port of Long Beach.
* An 18K karat yellow gold floral ring valued at $3,500 USD.
* A Japanese diamond encrusted wristwatch valued at $300 USD.
* The Miss International pageant trophy, sash and crown.
Accordingly, after winning Miss International 1960, the President of Marymount College, Irish Mother Superior Brendan Mairé McQuillan PhD. sent a formal letter to Araneta requesting her to choose a different school due to her active participation in pageantry, namely the swimsuit competition, deemed still taboo at the time.
After her championship, Araneta decided to her use her fame to work and was hired as a tourist promoter for a European tour package company, as well as an endorser for the New Year’s Day 1961 Rose Bowl and 72nd Tournament of Roses parade in Pasadena, California, where she also met her future husband, Jorge León Araneta. The parade float was titled "Lovely to Look At" and featured Araneta on top of large 17-foot tall fountain with surrounding nine basins of spraying water.
During the Cold War in 1961, she became fearful for her safety and decided to ship back to New York city her most precious belongings, the grand piano of her mother, wedding dresses and wedding crown as well as her evening gown at Miss International 1960 along with its original crown and trophy for safekeeping at her sister's residence. Accordingly, the goods were heavily damaged due to the Hurricane Esther which wrecked the boat in transit.
During the 48th edition of Miss International 2008, Araneta participated as one of the designated panel of judges during the pageant competition held in Macau, China.
Miss Philippines
She married Jorge León Araneta, a prominent Filipino political figure, at the Metropolitan Cathedral of Saint Peter in Santiago de Cali, Colombia, together having five children. Their grand wedding reception was held in Hotel Alferez Real, a well-known hotel in the city which was demolished in 1972. When Araneta first arrived in Manila, she was dismayed that the country was similar to Hispanic cities and expected a more oriental culture similar to neighboring territories like British Hong Kong and Japan. She toured many parts of the Philippines, then organized by her husband through the Manila City Hall but notes that she was also dismayed at the wide practice of telephone tapping at the time, claiming that private telephone conversations between her husband would be reported in Filipino tabloids the next day.
On her 28th birthday in June 1964, she was assigned by her father-in-law Jesus Amado Araneta y Sitchon as the organizer of Binibining Pilipinas (English: Miss Philippines), which sends its winners to the Miss Universe and Miss International competitions. After the victory of Miss Philippines as the 18th Miss Universe in 1969, Araneta formally obtained her Filipino citizenship in 1970.
Araneta was a principal sponsor to the Roman Catholic wedding of Binibining Pilipinas Universe 2011, Shamcey Supsup. In 2019, after fifty years of service, Supsup succeeded Araneta as the national director of the Philippine franchise of Miss Universe.
Controversy
Araneta’s tenure as a national director is not without controversy. Former pageant candidates have been known to be disqualified at her final decision, often as a result of an immorality clause in the pageant contracts. Disqualified candidates were associated with sexualized photos during or after the pageant. Candidates also have been disqualified because of they were unable to obtain or renew a Philippine passport.
Notably, in 1982, Maria Isabel Lopez claimed that she was pressured to relinquish her title due to her having worked as a lingerie model in a Girard Peter Fashion Show which was revealed post discovery. Nevertheless, Lopez did not give up her title and went ahead to compete at the 31st Miss Universe pageant.
Disqualified candidates included Anjanette Abayari of USA (1991), Tisha Silang of Canada (1998) and Maria Venus Raj of Qatar (2010) due to issues of national citizenship. Venus Raj, who was born in Qatar, lacked the full set of Philippine citizenship documents. This preempted the intervention of the Department of Foreign Affairs to make a controversial exception to grant a Philippine passport. Accordingly, Raj competed in 2010 and placed as the 4th Runner Up in the 59th Miss Universe competition.
Former Miss International Precious Lara Quigaman (2005) claimed in an interview that she was dismissed of her tribute credentials as a winner of Miss International at the coronation night in 2009, allegedly gaining the disapproval of Araneta for starting her own separate national pageant.
Other notable issues were the refurbishment, restructuring, or total re-usage of swimsuit and pageant gowns by candidates, and the sourcing of evening and national gowns outside the Philippines. Araneta maintained that she sourced pageant gowns abroad due to the mediocrity of local designers and their previous attempts to subvert and usurp her authority when it comes to the national candidates. She did state that she would consider hiring local designers in the future if they meet her quality standards. After the controversial 2014 national costume worn by Mary Jean Lastimosa (Top 10), Filipinos were officially allowed to procure gowns and the national costume in 2015.
On 12 January 2017, Araneta expressed her disdain of Filipino designers producing pageant gowns for other countries, seemingly aiding the competition to the national representative. In 2018, at the personal request of the 64th Miss Universe, Araneta designated new crowns and diadems for its national titleholders and the runner-up finalists.
Currently, Binibining Pilipinas owns the franchise of Miss International and The Miss Globe. In addition, Araneta is the Chargé d'affaires of the Consulate of Colombia to the Philippines in Manila.
To date, Araneta has produced four Miss Universe titleholders, six Miss International winners and numerous semi-finalists placements.
Personal life
Araneta is of Spanish and Polish heritage. She has a fond novelty of collecting premium Emeralds, a gemstone highly valued in her native Colombia. She is also a known traveler, along with her husband.
Other awards
In 2013, Araneta was inducted to the Eastwood City Walk of Fame in Quezon City, Philippines. | WIKI |
Amy Spain
Amy Spain (c. 1848 – March 10, 1865) was a teenage American slave who was executed by a Confederate military court in the final days of the American Civil War. She was convicted of treason for stealing from her owner, and hanged from a sycamore tree in Darlington, South Carolina. She is believed to have been the last female slave to be executed.
Background
Spain was owned by Major Albertus C. Spain, a Mexican–American War veteran who owned a large property in Darlington, South Carolina, and had been a member of the South Carolina Secession Convention. She was about 17 years old at the time of her death, and was referred to as "mulatto", with sources noting her light skin. In early 1865, a detachment of the Union Army arrived in Darlington as part of the Carolinas Campaign.
Spain reputedly exclaimed "bless the Lord, the Yankees have come!". Many white residents (including almost all adult men) had deserted the town by that point, and the Union commander allowed slaves to take whatever belongings had been left behind. Spain and her brother Willie dragged some mahogany furniture from an abandoned warehouse, and later took "linens, sheets, pillow cases, flour, sugar, lard, and some furniture" from the home of their master.
Trial and execution
The Union Army soon moved on from Darlington, and its residents returned. A short time later Confederate troops (led by General Joseph Wheeler) re-occupied the town. Those who had stayed behind during the Union occupation reported that Spain had been the "ringleader" of the looting, and accused her specifically of guiding Union troops to places where valuables had been hidden. Spain was captured and charged with "treason and conduct unbecoming a slave" by a Confederate military tribunal; Major Spain reputedly acted as her defense counsel. She was sentenced to death, and hanged from a sycamore tree in the Darlington town square on March 10, 1865.
Aftermath
The September 30, 1865, edition of Harper's Weekly gave a somewhat embellished account of Spain's execution, proclaiming that "her name is now hallowed among the Africans". The story and its accompanying illustration were reprinted by many Northern newspapers. Harper's Weekly attributed the greater share of responsibility to Darlington's residents rather than the Confederate troops, stating that her execution "was acquiesced in and witnessed by most of the citizens of the town". In response, the Darlington New Era accused Harper's of committing "a wholesale slander upon our community", and said the town had made "every effort [...] to reverse the decision of the court".
Major Spain was interviewed by the same newspaper, and said "Amy's temper was hot, hasty, and ungovernable, yet to me, as her master, she was always dutiful up to the unfortunate time when she exhibited traits of character, adopted a line of conduct, used expressions, and committed acts which contributed to the violent termination of her existence at the early age of seventeen". | WIKI |
Monday, November 17, 2014
James Mercer Langston Hughes was an American poet, social activist, novelist, playwright, and columnist. He was one of the earliest innovators of the then-new literary art form called jazz poetry. Hughes is best known as a leader of the Harlem Renaissance. He famously wrote about the period that "the negro was in vogue", which was later paraphrased as "when Harlem was in vogue". Both of Hughes' paternal great-grandmothers were African-American and both of his paternal great-grandfathers were white slave owners of Kentucky. Hughes's maternal grandmother Mary Patterson was of African-American, French, English and Native American descent. Mary is one of the 1st women to attend Oberlin College. In 1869 the widow Mary Patterson Leary married into the elite, politically active Langston family. Her second husband was Charles Henry Langston, of African-American, Native American, and Euro-American ancestry. He and his younger brother John Mercer Langston worked for the abolitionist cause and helped lead the Ohio Anti-Slavery Society in 1858. Charles Langston later moved to Kansas, where he was active as an educator and activist for voting and rights for African Americans. Charles and Mary's daughter Caroline was the mother of Langston Hughes. Langston Hughes was raised by his maternal grandmother, Mary Patterson Langston, who instilled in her grandson a lasting sense of racial pride. While in grammar school in Lincoln, Hughes was elected class poet. During high school in Cleveland, he wrote for the school newspaper, edited the yearbook, and began to write his first short stories, poetry, and dramatic plays. Hughes worked as a busboy at the Wardman Park Hotel. There he encountered the poet Vachel Lindsay, with whom he shared some poems. Impressed with the poems, Lindsay publicized his discovery of a new black poet. By this time, Hughes's earlier work had been published in magazines and was about to be collected into his first book of poetry. The following year, Hughes enrolled in Lincoln University, a historically black university and joined the Omega Psi Phi fraternity. Hughes identified as unashamedly black at a time when blackness was démodé. He stressed the theme of "black is beautiful" as he explored the black human condition in a variety of depths/ His main concern was the uplift of his people, whose strengths, resiliency, courage, and humor he wanted to record as part of the general American experience.
Subscribe to: Post Comments (Atom)
Listen: Sprinter - True Lya LyaReplyDelete | FINEWEB-EDU |
#!/usr/bin/perl use SOAP::Lite; $wsdl = "http://togows.dbcls.jp/soap/wsdl/ddbj_blast.wsdl"; $serv = SOAP::Lite->service($wsdl); $res = <AM156909|AM156909.1 Bacteriophage RTP, complete genome. Length = 46219 Score = 34.2 bits (17), Expect = 0.71 Identities = 17/17 (100%) Strand = Plus / Plus Query: 268 aaagtgctatttactaa 284 ||||||||||||||||| Sbjct: 45910 aaagtgctatttactaa 45926 >DQ121662|DQ121662.1 Bacteriophage JK06, complete genome. Length = 46072 Score = 32.2 bits (16), Expect = 2.8 Identities = 16/16 (100%) Strand = Plus / Plus Query: 268 aaagtgctatttacta 283 |||||||||||||||| Sbjct: 31989 aaagtgctatttacta 32004 >AY129333|AY129333.1 Mycobacterium phage Che9c, complete sequence. Length = 57050 Score = 32.2 bits (16), Expect = 2.8 Identities = 16/16 (100%) Strand = Plus / Plus Query: 348 tgtggtcaagttcgac 363 |||||||||||||||| Sbjct: 19460 tgtggtcaagttcgac 19475 >AJ278322|AJ278322.2 Bacteriophage BFK20. Length = 42968 Score = 32.2 bits (16), Expect = 2.8 Identities = 16/16 (100%) Strand = Plus / Plus Query: 372 ccacgggtggcacgac 387 |||||||||||||||| Sbjct: 14361 ccacgggtggcacgac 14376 >AF058276|AF058276.1 Mycoplasma arthritidis bacteriophage MAV1 attL site. Length = 2405 Score = 32.2 bits (16), Expect = 2.8 Identities = 16/16 (100%) Strand = Plus / Plus Query: 273 gctatttactaatagt 288 |||||||||||||||| Sbjct: 1393 gctatttactaatagt 1408 Database: /db/pub/db/a/DNA.DATA/ddbjphg.seq Posted date: Aug 6, 2007 9:12 AM Number of letters in database: 24,100,081 Number of sequences in database: 3498 Lambda K H 1.37 0.711 1.31 Gapped Lambda K H 1.37 0.711 1.31 Matrix: blastn matrix:1 -3 Gap Penalties: Existence: 5, Extension: 2 Number of Sequences: 3498 Number of Hits to DB: 110,119 Number of extensions: 5353 Number of successful extensions: 87 Number of sequences better than 10.0: 5 Number of HSP's gapped: 87 Number of HSP's successfully gapped: 5 Length of query: 600 Length of database: 24,100,081 Length adjustment: 17 Effective length of query: 583 Effective length of database: 24,040,615 Effective search space: 14015678545 Effective search space used: 14015678545 X1: 11 (21.8 bits) X2: 15 (29.7 bits) X3: 25 (49.6 bits) S1: 14 (28.2 bits) S2: 16 (32.2 bits) RESULT $result = $serv->DdbjBlastExtractPosition($res); print "$result\n"; | ESSENTIALAI-STEM |
Page:The Working and Management of an English Railway.djvu/260
the arguments of the counsel employed on each side. The opposition usually proceeds from private land-owners, from Corporations and Town Councils, and from other Railway Companies who foresee competition from the new comers; but where a good case can be made out, and the Committee can be fairly satisfied that the construction of the new railway is required and will be for the advantage of the public, the powers sought for are usually granted, and the opposition is satisfied as far as may be necessary by the insertion of accommodation or protective clauses in the Bill.
The Bill having been sanctioned by Parliament, the company next proceed to purchase the land, and here they find the advantage of the powers they have obtained; for if they find a landowner unreasonable and exorbitant in his demands, they can serve "notice to treat," and claim to have the merits of the case investigated either by a sheriffs jury or by arbitrators, who will hear evidence and decide what is a fair price to be paid, which price the landowner is bound to accept. The case was widely different with the promoters of the early railways, who had to submit to the most excessive demands on the part of the landowners as the price of their consent to sell their land for the purposes of the railway, and we are told, for instance, that the land for the London and Birmingham Railway, which was liberally estimated to cost £250,000, actually cost three times that amount, or about £6,300 per mile, the most extravagant sums having to be paid for compensation, for consequential, damages for fancy prospects, and other unreasonable demands, in order to buy off the opposition of the landowners. Claims such as these are not heard of in these days, or if they were, they would at once be | WIKI |
JHeadstart 11g: Tree-Form with drag and drop functionallity
Luc Bors
0 0
Read Time:4 Minute, 7 Second
A little over two years ago I wrote a post on drag and drop in an adf tree component. That post was based on ADF only. In the following post I show that you can have JHeadstart generate a tree for you that supports drag and drop.
Not out of the box, but with use of custom templates, and some ADF knowledge.
Basic Setup.
We start with the creation of an application module based on departments and employees.
After enabling JHeadstart on the ViewController project, we edit the ServiceDefinition so it is configured to generate a Tree-Form layout by using the default JHeadstart templates.
This will create a treeForm layout with the tree on the left, and the corresponding form on the right.
Add drag and drop.
The usual way to add functionality that can not be generated by JHeadstart by default, is to implement drag and drop without using JHeadstart. In other words, as if you were just creating an application plain ADF. So, change the page source (dragSource/dropTarget) and add a managed bean with it’s corresponding class. Once you have that all up and running, create custom JHeadstart generator templates, that generate the code for you. Creating custom templates has become much easier since the arrival of JHeadstart 11g. You now only have to select the template in the Application Definition Editor:
Change its name, and you are asked if you really want to create a new template based on the default one. And of course, that is
what we want.
The drag and drop will be implemented by the code snippet below. We only need to add this code to this new template, just before the end tag of the tree component.
<af:dragSource actions = "MOVE"
dragDropEndListener="#{pageFlowScope.${JHS.current.group.name}MoveBean.dragFinished}"
discriminant="moveEmployees"/>
<af:collectionDropTarget dropListener="#{pageFlowScope.${JHS.current.group.name}MoveBean.empDropped}"
actions ="MOVE"
modelName="moveEmployees"/>
The same goes for the bean definition. Create a new template to hold the managed bean that implements the drag and drop functionality. We will do this in a template that is derived from the groupAdfConfig template. The default AdfConfig for the group will be generated with our “MoveBean” as valuable addition.
<managed-bean>
<managed-bean-name id="#NEW_ID("__")">${group.name}MoveBean</managed-bean-name>
<managed-bean-class id="#NEW_ID("__")">nl.amis.technology.view.beans.MoveBean</managed-bean-class>
<managed-bean-scope id="#NEW_ID("__")">pageFlow</managed-bean-scope>
</managed-bean>
As you can see, the managed bean class for the MoveBean is ‘nl.amis.technology.view.beans.MoveBean’. The code of this MoveBean class for drag and drop of employees is posted in the snippet below.
package nl.amis.technology.view.beans;
import java.util.Iterator;
import java.util.List;
import oracle.adf.model.BindingContext;
import oracle.adf.model.binding.DCBindingContainer;
import oracle.adf.view.rich.component.rich.data.RichTree;
import oracle.adf.view.rich.datatransfer.DataFlavor;
import oracle.adf.view.rich.datatransfer.Transferable;
import oracle.adf.view.rich.dnd.DnDAction;
import oracle.adf.view.rich.event.DropEvent;
import oracle.binding.OperationBinding;
import oracle.jbo.Row;
import oracle.jbo.domain.Number;
import oracle.jbo.uicli.binding.JUCtrlHierBinding;
import oracle.jbo.uicli.binding.JUCtrlHierNodeBinding;
import org.apache.myfaces.trinidad.model.CollectionModel;
import org.apache.myfaces.trinidad.model.RowKeySet;
public class MoveBean {
public MoveBean() {
}
public DnDAction empDropped(DropEvent dropEvent){
RichTree dropComponent = (RichTree)dropEvent.getDropComponent();
Number theNewDepartment = null;
List droppedRowKey = (List)dropEvent.getDropSite();
if (droppedRowKey== null){
return DnDAction.NONE;
}
dropComponent.setRowKey(droppedRowKey);
JUCtrlHierNodeBinding dropNode = null;
dropNode = (JUCtrlHierNodeBinding)dropComponent.getRowData();
String dropNodeStructureDefName = dropNode.getHierTypeBinding().getStructureDefName();
String empDef = "nl.amis.technology.model.vo.EmployeesView";
if(dropNodeStructureDefName.equalsIgnoreCase(empDef)){
theNewDepartment = (Number)dropNode.getParent().getRow().getAttribute("DepartmentId");
}
else{
theNewDepartment = (Number)dropNode.getRow().getAttribute("DepartmentId");
}
Transferable transferable = dropEvent.getTransferable();
DataFlavor<RowKeySet> rowKeySetFlavor = DataFlavor.getDataFlavor(RowKeySet.class, "moveEmployees");
RowKeySet rowKeySet = transferable.getData(rowKeySetFlavor);
if (rowKeySet!=null){
CollectionModel dragModel = null;
dragModel = transferable.getData(CollectionModel.class);
if (dragModel!=null){
JUCtrlHierBinding binding = null;
binding = (JUCtrlHierBinding) dragModel.getWrappedData();
Iterator rowKeySetIterator = rowKeySet.iterator();
if (binding != null){
while (rowKeySetIterator.hasNext()){
List nodePath = (List)rowKeySetIterator.next();
if(nodePath!=null){
JUCtrlHierNodeBinding node = null;
node = binding.findNodeByKeyPath(nodePath);
String structureDefName = node.getHierTypeBinding().getStructureDefName();
if (structureDefName.equalsIgnoreCase(empDef)){
Row rw = node.getRow();
rw.setAttribute("DepartmentId", theNewDepartment);
}
}
}
OperationBinding operationBinding =
(OperationBinding)getBindingContainer().getOperationBinding("Commit");
operationBinding.execute();
return DnDAction.MOVE;
}
}
}
return DnDAction.NONE;
}
public void dragFinished(DropEvent dropEvent){
System.out.println("drop finished");
}
.......
}
Generate the application again, and run it.
Here’s the result after the drag and drop.
Resources.
Luc Bors on AMIS Technology Blog: Dropping Trees.
Frank Nimphius in Chapter 14 of Oracle Fusion Developers Guide
About Post Author
Luc Bors
Luc Bors is Expertise Lead ADF and technical specialist/architect at AMIS, Nieuwegein (The Netherlands). He developed several Workshops and training on ADF and also is an ADF and JHeadstart instructor. Luc is a member of the ADF Methodology group and publishes articles on ADF in oracle technology related magazines, on the AMIS technology blog, (http://technology.amis.nl/blog).
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Next Post
Is the purpose of testing to verify that the software works or is it to try to break it?
This question is asked many often. However there is no one answer. Reading a lot of reactions – in one of the Linkedin community groups – I noticed that the answer is strongly related to the (test) experience of the responder. A number of the reactions endorse this question and […]
%d bloggers like this: | ESSENTIALAI-STEM |
User:Mchoga
Morris Choga
Morris is an everage height boy born on 18 May 1997 born in Ndanga,Masvingo province located in Zimbabwe. | WIKI |
Bob van den Bos
Roland Aaro Bob van den Bos (born 19 December 1947 in The Hague), known as Bob van den Bos, is a Dutch politician. | WIKI |
Speed up adaptation with Variational Approximation?
As usual I seem to be working with SLOW models, and this really makes debugging hard. ;-) I’ve been having trouble with some chains sticking in place at the initial conditions and never moving at all… where other chains seem to converge, etc. Part of it is probably poorly parameterized components to the model, but other issues are that it’s just a big model for a spatially variable dataset with lots of observations… lots of parameters etc.
Currently I’m doing an optimize step, then running the vb algorithm to get a sample, and then picking one of those samples as the initial location for a sampling statement. This at least seems to stop me from getting fully stuck.
It occurs to me though that the adaptation period for sampling could potentially be speeded up by using the variational approximation to inform the mass matrix. Is this something that has been tried by the stan team?
Right now, my model takes about 30 seconds to optimize (and I can use that point estimate to debug obvious problems, so that’s good), about 2 or 3 minutes to get 1000 samples from the vb algorithm (this also helps with finding obvious problems quickly), and then maybe a couple hours to give me 200 iterations of full Bayes, I have it do 150 warmups, and then pass the last 50 samples to me on 4 chains. This is annoyingly slow, and it’d be super cool to be able to get an initial mass matrix from VB and then run say 50 more warmups, and 50 real samples on 4 chains and have the whole thing take… 20 mins
Has anyone looked into the idea of using the VB approximation to short-cut some of the time it takes to estimate the warmup stuff?
You could read this question as a query about whether it would be useful to post a feature request allowing VB to be used for some kind of initial adaptation or if there’s a known reason why such a feature would be pointless.
Hi!
All of this buisness is risky… having said that, I can understand well the motivation here. What you should try to do is to scale your parameters to be centered at 0 and have standard deviation 1. Say you have the locations as data variable loc and the scales in scale, then the dummy code for your Stan model should look like
parameters {
real foo_raw;
}
transformed parameters {
real foo;
foo = loc + scale * foo_raw;
}
model {
foo ~ normal( wahtever mean, whatever scale);
}
Of course, this assumes that your parameters are all on the unconstrained scale. With this trick you implicitly give Stan the mass matrix via the scale argument. As the transformation is a linear one and fixed by the data you can still assign the priors on the actual parameter and you can ignore the warnings on the Jacobian.
Such an approach did save me a ton of time already. BUT: for the final model you should probably run once more with loca=0 and scale=1 to make sure you are not tricked into a local trap of the likelihood.
Sebastian
1 Like
It would be super cool if ADVI wasn’t extraordinary bad at estimating variances, even for simple models. Stan’s adaptation routine is based on making the variance estimation as robust as possible to ensure the highest probability of high performance in the sampling regime and the cases the only cases where there are faster alternatives are cases that should be running extremely fast to begin with.
1 Like
I was afraid you would say that ;-)
My model is a spatial model over all 2000+ public use microdata areas in the census. It uses Fourier expansion to model the spatial average and a t distributed error parameter for each microdata area. Because it’s slow, I’m debugging on a small subset of the data so I only have 3 or 4 observations per area on average, and some have no observations at all.
It is slow to fit in part because the Fourier coefficients are not necessarily uni-modal and the fourier expansion intentionally induces nonlinear relationships between all of the 2000+ dimensions
Hey but Stan does actually fit it! It’s just slow to debug and slow to gain effective sample size.
BTW I found that optimizing the model and using the optimum point as the initial point was in fact much much better than letting Stan choose random inits, or trying to init by hand. (edit: and actually as I said, starting from a random VB sample was even better, doing that I haven’t had it get fully stuck and not move at all, which it would do about 1 out of 4 chains using random or manual inits)
If you’re using t-distributed errors AND trimming the data set to test the model you may well be ending up with multi-modal posteriors in models fit to the reduced data set. With no observations and t-distributed errors your group estimates may well get stuck in the tail (or underestimate variance). I’d switch to normal errors for the time being and add t-distributed errors as a final step, or at least do t-distributed errors with a large DF parameter (20?). Any of the above could kill adaptation.
Also for debugging it shouldn’t matter much if the model is slow since you should know after 10-30 iterations if you’ve made things better or not (check stepsize). I know in some sort of problematic models stepsize will crash and then recover to a reasonable value but it’s no thtat common.
Looking at the code, it looks like I did already switch to a normal error model, original it was t with a DOF parameter somewhere above 5 with a mode around 10. Anyway even with normal errors it gets stuck with bad inits.
I’ve tried to reparameterize so that the raw parameters have sd ~ 1, but I haven’t found that to help. The stepsize crashes down and getting a couple hundred samples takes several hours. Single gradient evals take on order 0.04 seconds.
I suspect it’s the fourier expansion that makes this all really slow and have divergent transitions etc. Probably I should rethink things, huge swaths of the country have no people at all, and then there are areas where people are squished in tight, like LA, SF, Boston, NY, and soforth. Tiny adjustments to the coefficients could have no effect on the function anywhere except in a tight region around a couple of major metro-area and suddenly you need a tiny stepsize…
That makes sense. I would work out the kinks with something like that in pieces. If the stepsize is crashing there’s almost no point in running it beyond that.
PyMC3 tries to do that. We haven’t done it because ADVI hasn’t been robust enough in most of the models we have.
If we could get to the typical set quickly, then we should be able to make Stan embarassingly parallel after that.
Yeah, quite honestly VB does a terrible job on my model. Not quite sure why. It also seems to do a terrible job on my revised model using a radial basis function expansion, but that model does seem to fit a bit faster and easier than the Fourier version.
ADVI seems to work well only on problems that are on unit scale. We’re working on the adaptation, but in the current version, ADVI has difficulty getting to the right place.
So, for posterity sake, after getting things to run a little smoother using a RBF expansion for the smooth spatial function and normal errors, I then returned to t-distributed errors, and found that Stan STRONGLY wanted to have small degrees of freedom (long tails). It refused to go above the lower bound of 5 that I’d set, so I had to unconstrain the DOF parameter and re-run, where I found that it was indeed coming out around 2.3 or so. Again, chains seem to get a little stuck and convergence issues are a problem. I will continue to debug and improve things.
Are these t-distributed errors on data or parameters?
t distributed errors on the differences between observed expense data, and a predictive formula involving spatial, temporal, and family size variables.
So you have some parameters with little to no data for spatial regions (the RBF coeff’s for low pop. regions) and t-distributed errors. I can imagine that the tails on those coefficients will end up heavy enough to be a problem but I’m not sure how to get rid of them (other than the standard non-centering etc…).
p.s.- if you could share your code for the RBF sometime I’m interested in how you implemented that.
I picked a random seed, and randomly chose 50 locations, and set xc[i],yc[i] to the x,y coords of those locations, then a parameter vector Coef are the coefficients for the RBF.
for(i in 1:N){
F[i] = 0; // my problem is basically zero centered already
for(k in 1:NTerm){
F[i] = F[i] + Coef[k] * exp(-((x[i]-xc[k])/a)^2-((y[i]-yc[k])/a)^2);
}
F[i] = exp(F[i]+Err[i]);
}
As you can see I am modeling the logarithm. This quantity F is a multiplicative factor that adjusts a national average to the local conditions. a is a parameter that describes the scale of the RBF functions. Err is a parameter that has a normal prior that describes how much of an error there is between the smooth RBF prediction and the actual “average” results for that region. Later I use all of it like:
Data[i] ~ student_t(dof, MyFunction(F[Region[i]], …), errscale);
where Data is individual responses to surveys, and Region is the region the survey response comes from.
I upped my data sample to 40,000 survey responses, and this means that on average 12 or so responses per region, so it shouldn’t be the case that any regions are terribly data poor (zero or one or two observations for example)
In essence the RBF acts as a regularizer that intentionally makes nearby census regions cluster around some local average, where Err sets the scale over which they can vary from the local regional average, and the student_t allows for the fact that individual survey responses can be significantly outlying. see for example:
http://models.street-artists.org/2017/04/09/what-to-do-with-census-outliers/
Further info for posterity.
It turns out unsurprisingly that randomly selected RBF centers don’t work that well, some of them inevitably are very close to each other, and this causes numerical issues, and then other areas have basically no points, and this causes lack of control for that region. In general, the data is pretty noisy, so the RBF doesn’t really remove a lot of the variation.
What I did was plot all the region centers, and then manually selected 18 or 20 locations spread around the map. This stabilized the RBF much more and now I get inference with about 50 warmups and 120 total samples that are quite reasonable in terms of traceplots etc.
In addition I set the error term in the regression to be t distributed on the parameter, so that the regional cost multiplier is RBF(x) + t_error(dof,0,scale) with unknown dof and scale. This t distribution is much lighter tailed than on the data, with something between 10 and 20 degrees of freedom, unlike the dof for the individual data, which winds up at about 2.3
With all these put into place, I get some fairly stable inferences with no warnings about divergent transitions, and this gives a nice plot of costs as a function of space using alpha for overplotting and a variously saturated red color as expenses climb into the 1.5-3 x the national average range.
Fitting a spatial function to noisy and irregularly spaced census data using full Bayes is no easy task!
Nice! Thanks for posting back. | ESSENTIALAI-STEM |
Talk:Catherine Fulford
London wiki
Some more details here - https://london.fandom.com/wiki/Catherine_Fulford Jackiespeel (talk) 10:52, 25 July 2023 (UTC) | WIKI |
Talk:Complex regional pain syndrome
smoking study of 53 people is not indicative of anything
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 26 August 2019 and 15 November 2019. Further details are available on the course page. Student editor(s): Christina Ryder, Sp5838, MWRiggs, Mw8871.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 18:13, 16 January 2022 (UTC)
Why is it stated that type 2 is more severe than type 1?
This statement needs better verification. The user that edited that in also stated that type 2 tends to feature harder to control symptoms(what symptoms?), which the source doesn't state. The source used has another picture of the McGill Pain Scale which includes RSD/CRPS instead of just causalgia. These words are just synonyms for the most painful condition know to medicine, the only difference is that type 2 is caused by an obvious nerve injury. Second paragraph under "What is complex regional pain syndrome?" http://www.ninds.nih.gov/disorders/reflex_sympathetic_dystrophy/detail_reflex_sympathetic_dystrophy.htm (if anything is wrong about policy or format of this contribution, please tell me. I am new to editing wikipedia and am just a patient trying to advocate for my disease(RSD), and to provide factual information about CRPS type 1 and 2.) OpioidsAreGod'sGift (talk) 17:15, 8 December 2015 (UTC)
Why isn't acupuncture listed as treatment?
I'm not talking about normal acupuncture, but Chinese scalp acupuncture. It's been proven to work. Heck, the US military used it.
http://www.ncbi.nlm.nih.gov/pubmed/23113454 — Preceding unsigned comment added by <IP_ADDRESS> (talk) 04:07, 8 November 2014 (UTC)
Sympathic nervous system
There is one section that spends some time talking about the autonomic nervous system as if it's a major player, "...the autonomic (think automatic, like blood pressure regulation or breathing or sweating) nervous system can go haywire...". I don't think this is accurate and should be edited.War (talk) 07:48, 30 November 2011 (UTC)
Is
Isn't the ICD-10 code of this supposed to be G56.4 (see List_of_ICD-10_codes) rather than under "other bone disorders" as it is? Causalgia redirects to here.... not knowing much about medicine I'll leave it as it is but someone please feel free to edit or reply to this!
Edit: Forget that, shall we? Didn't read the article ;)
Nippoo 12:36, 13 December 2005 (UTC)
* Causalgia and Reflex sympathetic dystrophy are subtypes of complex regional pain syndrome. I'm going to put in a redirect here, and move most of this stuff over to a complex regional pain syndrome pageZyryab 20:15, 8 February 2006 (UTC)
Occupational therapy is also one of the main treatments —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:16, 6 February 2008 (UTC)
RSD Research
The first RSD CRPS research and clinical practice center was established by Hooshang Hooshmand; his book "Chronic Pain :RSD Prevention and Management"(1993) was the first book published dedicated to RSD exclusively. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:34, 24 July 2008 (UTC)
* Hello all I am family doc has studied Travell Myofascial issues for a while. I noticed the this article has no reference to the myofascial component to RSD. This component is misunderstood and is very treatable with myofascial therapy! Who would do add this valuable information? Ref: Travell and Simon's Myofascial Pain and Dysfunction (2nd Edition), by David G. Simons, Janet G. Travell, Lois S. Simons, Janet Travell, Hardcover, 1664 Pages, Published 1999, ISBN-10:<PHONE_NUMBER>, ISBN-13:<PHONE_NUMBER>719. Srodrigu (talk) 01:44, 17 March 2013 (UTC)
* You can add any information yourself. Be sure to include this and other literature citations in reliable journals or periodicals establishing this claim, or your edit is liable to be deleted as original research, which is not allowed. David Spector (talk) 18:59, 24 March 2013 (UTC)
some more about RSD
Reflex Sympathetic Dystrophy, RSD, is a syndrome characterized by chronic pain, tenderness, and vasomotor instability usually in a distal extremity. Lack of recognition, familiarity and a simple diagnostic test has often delayed diagnosis and proper management. There are three basic stages to RSD.1-6 The first stage usually occurs after a trauma, whether chemical, physical or mechanical. Sometimes the trauma is a minor one. Symptoms can include pain, hyperesthesia, local edema, muscle spasm, stiffness, limited mobility, vasospasms, burning pain, and hyperhydrosis. This stage is often called "sympathetic maintained pain" (SMP). The sympathetics react to the minor trauma causing what is usually a temporary vasoconstriction of the area's small vessels. This is a normal protective mechanism. For reasons poorly understood, the sympathetic reflex arc sometimes does not stop. This is an abnormal response.
In stages two and three the symptoms worsen, and dystrophic changes occur to the hair, skin, and nails. By stage three the pain is intractable, there is marked muscle atrophy, flexor tendon contractures, edema, and bone deossification (Sudeck's atrophy). By this stage the syndrome can truly be classified reflex sympathetic dystrophy syndrome (RSDS).
In the first stage, which is usually overlooked or misdiagnosed, the patient presents with chronic pain that just will not subside, with temperature changes in the hands (cold). The coldness of the extremity can easily be detected by thermography scanning. Thermography has been labeled by the Anesthesiology Department at Texas Tech University as the prime diagnostic criteria in the diagnosis of sympathetic hyperactivity in RSD and SMP.3
The pathophysiology, though poorly understood, seems to be that as trauma occurs, sympathetic afferent fibers are stimulated by local nociceptors and mechanoreceptors. A patient injured her foot, which was painful, cyanotic, cold, swollen, and hyperesthetic. Radiographs were normal, but a bone scan was positive for traumatic synovitis. A thermogram disclosed a 2o drop in temperature consistent with RSD stage one. (Fig. 1) This information is relayed to the internuncial pool at the cord level and spreads. It then stimulates efferent sympathetic stimulation causing vasospasm, myospasm, decreased thermal emission at the skin, and sometimes dystrophic changes.1-6
The thermographic findings should show a Delta T or temperature difference from right to left of at least 2oC. The criterion for nerve fiber irritation is 1oC. The normal variation from right to left in numerous studies has been shown not to exceed a few tenths of a degree. The findings are usually hypothermic and are regional. It does not follow a peripheral nerve or dermatomal pattern, but affects many surfaces of the limb. It will usually give the appearance of global nerve levels, but is actually sympathetic hyperactivity or SMP pain.
Figure 2A and 2B shows lower extremity hypothermia compatible with sympathetic hyperreflexia in a runner secondary to ankle sprain. In both cases the Delta T is greater than 3o. The possible reason for regional hypothermia and the appearance of multiple nerve level involvement is that at the spinal level one preganglionic fiber will synapse with about 100 postganglionic carrying sympathetic efferents. This will give the widespread involvement of thermal change.
If stage one, which is usually the stage in which the patient is in your office, is not recognized and then properly treated, it can and often will progress to the later severe debilitating and usually irreversible stage three RSD. By this stage, conservative care will no longer be appropriate and medical treatment such as sympathectomy and blocks are usually performed. The goal is to recognize this syndrome early on, while chiropractic treatment can have a positive effect, and while these patients are still being treated in your office. It is of utmost importance to break the sympathetic reflex via physiotherapy, exercise, manipulation, and mobilization in stage one RSD.8,9 Thermography is the diagnostic test of choice for RSD.1-9 Thermography has been demonstrated to be a highly specific and sensitive test for the diagnosis and management of RSD.2,5 Furthermore, utilizing thermography in combination with cold stress tests (autonomic challenge) has further enhanced the utility of thermography as a diagnostic aid in RSD.2,7,11,12 When a patient has chronic pain that is resistant to treatment, refer for a thermography scan to rule out RSD or SMP. If, in fact, it is afflicting the patient, you can alter your treatment approach. RSD/SMP can begin very soon after trauma. Be suspicious when the patient complains of burning, throbbing pain; coldness of extremity; hyperhydrosis; allodynia; and hyperpathia (pain and discomfort in response to just gentle touch and even moving hair follicles).
Treatment of RSD is dependent upon early recognition, and treatment is best delivered in a multidisciplinary approach utilizing physiotherapy, manipulation, exercise, and mobilization of the joint involved, as well as sympathetic blocks/injections.8,9,13 Usually a pain-management specialist such as a neurologist, physiatrist or anesthesiologist could be consulted. Since RSD can progress to stage two or three despite aggressive efforts to inhibit progression, it is best to have other medical professionals cotreating/observing the patient.
In a study by Dietz et al., on the treatment of RSD in children, published in Clinical Orthopedics and Related Research, noninvasive, nonpharmacologic management consisting of mobilization and massage was found to be effective. In another study by Duncan et al., manipulation with sympathetic blocks was also shown to be effective.8,9 In a case study published in Chiropractic Technique, a child with foot RSD secondary to ankle sprain was treated successfully by manual adjustive procedures.
It is important that the doctor of chiropractic be aware of RSD The most common symptoms are chronic pain, especially of a burning nature, allodynia hyperpathia, cold extremity, and hyperhydrosis. Thermography is considered by many in the chiropractic and medical communities to be the test of choice in early diagnosis since thermography is a window to the sympathetic nervous system. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:58, 23 October 2008 (UTC)
RSD or CRPS
these are the same disease they just keepgiving it new names Reflex Sympathetic Dystrophy and Complex Regional Pain Syndrome are the same disease affecting the sympathetic nervous system I am not a doctot but I am in a wheel chair due its way of moving to opposing joints and it is not an orthopedic disease it is neurologic and because it is different in every victim there are no longer stages. The onlything they can do for you after it goes into it's incurable stage is pain medicine or death. Both unfortunately are not fun.It is rated I believe 42 on the pain index that is the same as last stage of cancer. It was discovered during the civil war and 75% of the people that live with outragous unperdictable disease are women. They are not sure why or how it happens but most people see at least 10 doctors before they are diagnoised by then they are treated by doctors that refuse to admit they are not GOD and they don't think that a sprained ankle that has been the size of a baseball bat should see a neurologist. The saddest part about this disease is that most doctors don't have the foggest idea what they are dealing with and end up pushing their patients into the incurable disease. The Sympathic Nervous System affects every major organ of the body the largest being the skin. Unforntunately this is a first hand account, I am now in a wheel chair can;t be touched.no sex drive, it changed the acidity of my saliva and ate not only the enamel of my teeth it ate the roots and the teeth under 5 crowns. Lovely. I have aged 30 years in the last ten years and I run a fever on aspirin 2 every 4 hours because I only sweat through my head. I am always cleans except for certain areas but when I over look taking my meds I look like it is raining on my head. My doctor could not believe that my skin had lost all my pores so he got the best mosterizer that could be perscribed and did a test. it went into his skin but it just sat on the top of mine, he has known me for 26 years he said I appeared to be morfing into a reptile or alien. I laugh because I cried for the first two years and all it did was make my eyes puffy and make me hurt worse which I didn't think could happen worse pain.Oh I forgot it stops your REM rapid eye movement no more dreams.you hurt to be touched and people have no idea how a loud noise can hurt you. So I went from a very healthy middle aged woman with a grown daughter to a suicidal cripple.I wouldnt kill myself, it is selfish. My daughter would have to live with that. it is bad enough to watch me deteriate. I have come to terms with my politicaly incorrect view of my self. I figure it is karma from a past life I must have been a man, sorry, you can sit and cry or you can try to keep as much of your body healthy that you can. My body is very broken from this disease I haven't had to shave my legs since 1999 but my brain is fine.My life is painful. nothing stops the pain. I have gotten use to people bathing me. And I am better with a joy stick on my wheel chair than I ever was with pac man. At one point on my right large toe I had 8 toe nails growing one after another very odd. But this disease is odd and there is no real research being done. I live in Alaska a bad place to get sick. Drs dont seem to want to move here. we have I believe 3 neurologis but it was too late to fix me by the time they figured out what was wrong with me. I am told I am one of the rare people suffering with horible disease that I wouldn't wish on my worse enemy I am positive. oh and funny. If you know someone with this disease don't think they are drug addicts or they are crazy. there are some good websites. RSD Hope and the goverment medical site on pain. and there is one more in CA that is pretty good. If you are suffering remember what doesnt kill you makes you stronger. Also a doctor in Florida told my sister that it is a disease that doesn't kill you it just makes you want to die. 5:50am Alaska time. bed time for me. Good luck to all that have this disease. And don't listen to the people that say negative things to you and yes we are alone our friends well friend is used losely were never our friends. Be kind to yourselves become an advocate tell everyone. maybe they will find a cure. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:57, 18 March 2009 (UTC)
TITLE CHANGE
What should be done is to have a page for RSD that redirects you to the CRPS wiki page. — Preceding unsigned comment added by Hutch0024 (talk • contribs) 05:22, 15 May 2013 (UTC)
The title for this needs to be changed to RSD (Reflex Sympathetic Dystrophy). It may be officially CRPS, but it is still commonly known by doctors and patients alike as RSD.
Pearberr13 (talk) 12:55, 24 March 2009 (UTC)
* Since there are two types of CRPS, and RSD is only one of them, this does not make sense. If the article was named after one of the two types, it would unduly exclude the other from view. ` The Talking Sock talk contribs 02:28, 6 May 2009 (UTC)
* Thing is, many practitioners just use RSD, even when causalgia is the more appropriate term; to them, causalgia is a subtype of RSD, or a synonym, and CRPS might be meaningless. After all, the nomenclature was chosen fairly arbitrarily. Furthermore, since the only difference between type I and type II CRPS is nerve damage, one might easily characterize causalgia as a subtype of RSD. Not that I agree the article should be called RSD- the term should certainly redirect to CRPS as it currently does. —/M endaliv /2¢/Δ's/ 20:19, 19 September 2009 (UTC)
This is not necessary. There is currently a redirect page for RSD/CRPS. That should suffice. There is also a disambiguation page for CRPS. David Spector (talk) 19:05, 24 March 2013 (UTC)
Ketamine / NMDA overemphasized
It seems that a single author added a disproportionate amount of info about the role of NMDA in CRPS. The field of CRPS research is much broader, including the inflammatory/immune response. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:09, 26 October 2009 (UTC)
Oral ketamine is miracle for my severe CRPS pain. constant burning pain drops 3-4 levels after taking — Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:12, 14 March 2016 (UTC)
Section on Patient Experience?
It is inarguable that CRPS has a particular kind of patient experience, which is somewhat outstanding. Not to give too much voice to the rant-style comments that show up on the discussion page, but would it be completely inappropriate to include a section within the article giving some information on the experiences of patients suffering with CRPS? For instance, there are relatively few conditions which are as well documented for which patients routinely feel accused (if not persecuted) for being 'drug abusers'. There are also relatively few medical conditions for which a significant fraction of the treatment is the use of chemotherapeutic agents that are considered recreational (and exceptionally illegal) drugs by the general population. It is impossible (and false) to posit any professional disconnection of the medical practitioner from that broader society, and I suspect that most patients who are refractive to treatment by (for instance) sympathetic blocks, etc, who are on a regimen including opiates, have been urged by more than one pain specialist to consider the surgical implantation of a spinal cord stimulator, generally persistently and against vocal opposition from the patients. It seems highly relevant to include some (if small) amount of mention of such issues within the article. If nothing else, this is most certainly a component of the experience of a patient with the condition, and that information could be valuable to a support provider, such as a family member. Gaedheal (talk) 23:24, 16 November 2009 (UTC)
* IMO a "Patient Experience" section would be inappropriate in an encyclopedic entry as it is completely variable and subjective. <IP_ADDRESS> (talk) 02:06, 18 February 2010 (UTC)
I agree a patient experience section would be inappropriate in an encyclopedia, however, under treatment it might be reasonable to mention that there are lots of forums and support groups available for patients to discuss this condition? Speaking as a med student, this is valuable to patients and providers especially when purely 'medical' options are exhausted. Corduroy pillows making headlines (talk) 13:50, 14 May 2018 (UTC)
With 18 years of patient experience, both good and bad medical intervention, general ignorance, and prejudice concerning rsd/crps. I would be inclined to open a dialogue with anyone who sincerely feels that patient imput/response is integral to understanding what little knowledge we have into the pathology of this devastating disease. Sixtysgirl70 (talk) 19:12, 2 July 2018 (UTC)
Does it only occur in limbs?
This page seems to imply, but not state, that CRPS occurs only, or at least predominately, in limbs. I have severe chronic pain in my spine, and this was diagnose twice as CPRS (but many more times as a plethora of other conditions). Can CRPS occur anywhere in the body, and if so what proportion of patients present with such? I think providing such information would be very useful for patients such as myself.
You are right that CRPS is "predominantly" distal, but that's not the same as "exclusively". The trouble is, as far as I can find in the literature, proximal cases are rare, so rare that they're only mentioned as a possibility but not studied. Like you I have a spinal case (RSD) which reacts enough in the same way as the distal case to make the diagnosis convincing. However there are enough differences to make it difficult to connect to any of the common literature on RSD. For example, temperature differences and edema don't work the same, so the discussion becomes especially difficult when trying to cite helpful information. Is there anyone reading this, with sufficient background in neurology or access to more obscure legit literature, to add even a paragraph on RSD in the trunk?RichardCDunn (talk) 04:02, 28 January 2014 (UTC
In response to the question "What percentage of CRPS Patients present with trunk involvement?" CRPS does not appear to be a name that appropriately defines the disorder. Yes, it may be that most cases of this disorder are identified with patients that present with a distal limb being the problem but this may be due to the fact that many doctors don't recognize the diagnosis until or unless it presents as such. The underlying mechanisms of this disorder have been misunderstood for so many years. It was originally thought that CRPS was more of a syndrome or a conglomeration of symptoms than a definable disorder because the medical profession lacked a clear understanding of the possible original patient presentations as well as the progression or stages and how they would be defined. We are not sure how many patients,who actually have CRPS, are not given the diagnoses due to inconsistencies in the definition. How can we then possibly conclude how many present with trunk involvement?Because of this lack of knowledge, I believe it is not possible to conclude what portion of the patient population present in this manner. One of the weaknesses of our medical field is it is limited by the Western School of philosophy or education shall we say. Where the body is parted into units based on its primary function. Then doctors are educated on a particular specialty. This leaves many doctors with an incomplete understanding of the integration of these functions. Humans are not a mere sum of their individual parts. We are much more complex. When our society comes to understand this maybe our definition will become a more workable tool our doctors can use.....and the answer to your question will becoming statistically reliable.http://www.ncbi.nlm.nih.gov/pubmed/12725849#
Yes it can have a systemic part, basically any system that is controlled by nerves can be affected; heart/circulation, gastrointestinal, temperature, breathing, immune system, skin, just to name a few of the autonomic nervous systems that can be adversely affected by rsd. There is also a large emotional impact that can often get overlooked. Sixtysgirl70 (talk) 18:53, 2 July 2018 (UTC)
Reference
48 & 49 are referencing to the same document —Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:47, 12 July 2010 (UTC)
Electrodiagnostic Testing
Under the section for "Electrodiagnostic testing" I presently see the following: "EMG (Electromyography testing) should not be done for the diagnosis of CRPS I or II. It is extremely painful for patients suffering from CRPS and may even be considered unethical and cruel. This is just wrong. The EMG/NCS may be the only way to identify underlying nerve injury or alternative diagnoses"
However, when attempting to edit, all that appears is: "===Electrodiagnostic testing=== EMG (Electromyography testing) is not diagnostic for CRPS I or II, although it may be useful in the identification of any underlying nerve injury."
The first statements above ("EMG (Electromyography testing) should not be done for the diagnosis of CRPS I or II. It is extremely painful for patients suffering from CRPS and may even be considered unethical and cruel. This is just wrong") are inaccurate, charged & sensationalized, and should be removed. Many diagnostic tests involve some degree of risk or discomfort (eg. CT scans involve exposure to a significant amount of radiation, and bone scans involve even more exposure). EMG and NCS certainly involve some discomfort (needles are involved in EMG, and NCS involves shocks that are similar to a rubber bland snapping on the skin). As long as the patient is aware of the risks of the procedure, the fact that it will involve some discomfort (thorough "informed consent" is obtained) then there is nothing unethical or cruel about the procedure itself. Although allodynia is often a hallmark of CRPS, not all patients experience it, let alone to a degree where it contraindicates a 20 minute electrodiagnostic study that will yield useful information.
I have added/suggested the following:
Electromyography (EMG) and Nerve Conduction Studies (NCS) are very important ancillary tests in CRPS because they are among the most reliable methods of detecting nerve injury. They can be used as one of the primary methods of distinguishing between CRPS I & II, which differ based on whether there is evidence of actual nerve damage. EMG & NCS are also among the best tests for ruling in or out alternative diagnoses. The definition of CRPS relies on having no alternate diagnosis that can account for the patient's symptoms (ie. it is a "diagnosis of exclusion"). This is very important to emphasize, because otherwise patients can be given a wrong diagnosis of CRPS when they actually have a treatable condition that better accounts for their symptoms. An example is severe Carpal Tunnel Syndrome, which can often present very similar to CRPS, but can be corrected with surgery. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:16, 7 December 2011 (UTC)
Clarification requested
In order to be sure that the Portuguese title was translated correctly, I need to know whether complex is related to pain or to syndrome: I suppose it's a "complex syndrome", right? Thanks for any help. capmo (talk) 22:24, 26 August 2012 (UTC)
* I do not know the answer for sure, but I do not understand how the pain itself can be characterized as more or less “complex,” and the syndrome may involve the interaction of many different physiological processes, so I think that it is the syndrome that is “complex.” <IP_ADDRESS> 15:42, 15 February 2013 (UTC)
Guanethedene
The first paper saying Guanethedene was useless against RSD was published in 1993 in the US and 7 further studies confirmed this. It was not until May this year that the Royal College of Physcians published a paper saying the same thing. This is just one of many examples I could give you showing why my campaign is vital. One more is that in June last year I recieved an e-mail saying my specialist was trying to raise funds to send me to Germany for the 5 day Ketamine coma, that was 18 months after I had read that Germany had banned it due to a number of Patients not coming out of the coma and at least one death. I am working with two of the top American Sites to turn November 2013 into International RSD Awareness Month, currently only America has a National Awareness Month. Please spare 5 1/2 mins to watch this video but be aware you may find some of the images disturbing. http://www.youtube.com/watch?v=MviVcjWZDts it is vital that you watch it to the end If you are newly diagnosed I strongly suggest you do not watch it. If you live in the UK please sign http://epetitions.direct.gov.uk/petitions/31344 E-mail the link to your MP asking why since being informed on 30/10/2010 David Cameron, Nick Clegg and The DOH have refused to do anything about the situation If you live in another Country can you start your own petition and send the link to your own Politicians If you are willing to commit to spending 15mins a day for 4 weeks then 15mins a week to help spread this then please e-mail me (e-mail address removed) Kevin
I moved this from the article to the talk page. However, Kevin, the article only should have encyclopedic facts, and the talk page should only have discussions about the article. For campaigning you need to go somewhere else. Lova Falk talk 10:43, 3 November 2012 (UTC)
Vitamin C
The current version of this article says that "Daily vitamin C has been shown to reduce the chance for the occurrence of CRPS after an injury, leading to calls for greater awareness, especially in the emergency room setting. In two placebo-controlled randomized clinical trials Zollinger et al. showed that patients who took 500 mg of vitimin C daily after a wrist fracture were less likely to incur the problem." The change.org petition is evidence of calls for greater awareness, but I would like to add a citation to more WP:MEDRS. This article, for example, reviews 4 clinical trials, and originally I wanted to simply insert a <ref> citation </ref> to this study after “...has been shown to reduce the change for the occurrence of CRPS after an injury,” but then I realized that I lack the requisite scientific knowledge to determine whether the study actually supports the assertion as written. Therefore, I shall leave the citation here on the talk page and let others decide what to do with it. <IP_ADDRESS> (talk) 15:33, 15 February 2013 (UTC)
Type two is different than type one in several ways
Regardless of the following challenge on change and reversion, the very first sentence of the page needs to be fixed. It states, "Complex regional pain syndrome (CRPS), formerly reflex sympathetic dystrophy (RSD) or "causalgia",…" Thie "or" part is misleading in the extreme--it implies that RSD and causalgia are two names for the same thing. In fact, RSD is CRPS-I (CRPS type 1) but causalgia is CRPS-II. This is made clear a little bit down in the text, but let's not get off on the wrong foot.RichardCDunn (talk) 04:12, 28 January 2014 (UTC)
An earlier edit of this article has been reverted for the wrong reason. The editor Grapestomper9 noted that when a person with type2 with say a head or face injury causing the pain is faced with a new injury such as a herniated disc, the herniated disc should be dealt with either surgically or with adequate painkillers, whichever the case merits. Another editor has stated that surgery is not a good idea for people wit CRPS. Well, type 2 is different. In the above example, a tye 2 patient with head or face pain suddenly confronted with a herniated (Low Back) disc should do whatever is necessary to alleviate the pain of the new nerve injury. The edit in question would only apply to type 1 where the whoe body is at rish for becoming painful. In type one, surgery is someting to be avoided, not type 2 when it is for something other than the source of type 2 pain.<IP_ADDRESS> (talk) 08:00, 8 October 2013 (UTC) As there has been no opposition to this suggestion for reversion to the original Grapestomper addition, I think the reversion should be reverted back to the original Grapestomper edit.<IP_ADDRESS> (talk) 09:08, 25 October 2013 (UTC)
* The revert won't be happening, since this IP has been used by blocked user Dunkmack9, and Grapestomper9 is one of his socks. In fact the IP you are using has been used by Dunkmack9 in the past, so you are in fact socking right now. -- Diannaa (talk) 23:48, 25 October 2013 (UTC)
External links modified
Hello fellow Wikipedians,
I have just added archive links to 2 one external links on Complex regional pain syndrome. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes:
* Added archive https://web.archive.org/20131102013710/http://physiotherapyinfo.com/wordpress/?p=769 to http://physiotherapyinfo.com/wordpress/?p=769
* Added archive https://web.archive.org/20100323114300/http://www.bodyinmind.com.au:80/graded-motor-imagery-for-pathologic-pain/ to http://www.bodyinmind.com.au/graded-motor-imagery-for-pathologic-pain/
Cheers. —cyberbot II Talk to my owner :Online 13:00, 28 August 2015 (UTC)
Help - Reflex neurovascular dystrophy needs sources and/or to be merged
Can people who know about complex regional pain syndrome please edit reflex neurovascular dystrophy? I can't find any reliable sources via Google. Thank you. <IP_ADDRESS> (talk) 03:04, 12 September 2015 (UTC)
UK guideline - RCP
ISBN 978-1-86016-480-4 (2012). "Concise" but 84 pages. JFW | T@lk 17:32, 26 November 2015 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 3 one external links on Complex regional pain syndrome. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20150602094349/https://www.rarediseaseawareness.com/quality-of-life/paula-abdul-putting-the-spotlight-on-rare-disease to http://www.rarediseaseawareness.com/quality-of-life/paula-abdul-putting-the-spotlight-on-rare-disease
* Corrected formatting/usage for http://pain-topics.org/pdf/HowardHughesPseudoaddict.pdf
* Added archive https://web.archive.org/web/20091224202308/https://www.trendconsortium.nl:80/home-en to http://www.trendconsortium.nl/home-en
Cheers.— InternetArchiveBot (Report bug) 05:52, 29 November 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 4 external links on Complex regional pain syndrome. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20160303211527/http://healthguides.mapofmedicine.com/choices/map/complex_regional_pain_syndrome1.html to http://healthguides.mapofmedicine.com/choices/map/complex_regional_pain_syndrome1.html
* Added archive https://web.archive.org/web/20131102061837/http://www.rsdfoundation.org/en/en_clinical_practice_guidelines.html to http://www.rsdfoundation.org/en/en_clinical_practice_guidelines.html
* Added archive https://web.archive.org/web/20150203120213/http://www.painphysicianjournal.com/linkout_vw.php?issn=1533-3159&vol=14&page=419 to http://www.painphysicianjournal.com/linkout_vw.php?issn=1533-3159&vol=14&page=419
* Added archive https://web.archive.org/web/20100324094134/http://www.rsds.org/2/fact_fiction/index.html to http://rsds.org/2/fact_fiction/index.html
Cheers.— InternetArchiveBot (Report bug) 19:12, 11 August 2017 (UTC)
Mirror box, tactile discrimination training and graded motor imagery are types of physical and occupational therapy
Therapy section was edited in the past and it is now unclear that the treatments above are part of physical therapy — Preceding unsigned comment added by 2605:E000:841A:B000:85F9:D07:BA0D:6C5 (talk) 21:27, 2 November 2017 (UTC)
Proposing Edit to Treatment Description in Box
I am proposing a change to the treatment description within the boxed section.
Current description: “Physical therapy (more effective with early diagnosis); medications (e.g., anticonvulsants, opioids, muscle relaxers, etc.); sympathetic nerve blockade; ketamine infusions; lidocaine infusions; implantable pharmaceuticals; amputation”
Edit would read: “Exercises (under the guidance of a physical therapist); medications (see list); sympathetic nerve blockade (largely historical); implantable pharmaceuticals; amputation”
Rational:
Physical therapy is a profession, not a treatment. Additionally, these treatments have show limited supportive evidence and warrants further discussion.
Opoids also need careful discussion and should not be prominently featured.
The IASP changed the name from RSD to CRPS because it feels that the evidence is clear that the sympathetic nervous system is not involved. Unecomeditor1 (talk) 14:08, 22 November 2023 (UTC)
Proposing Edit to move a paragraph from Signs and Symptoms Section
I am suggesting that the first paragraph of the "Signs and Symptoms" section should be moved to another section. The paragraph reads as follows:
"Clinical features of CRPS have been found to be inflammation resulting from the release of certain pro-inflammatory chemical signals from surrounding nerve cells; hypersensitization of pain receptors; dysfunction of local vasoconstriction and vasodilation; and maladaptive neuroplasticity."
These are not clinical features. This is current speculation about pathophysiology and etiology, and should be moved to the appropriate section. Unecomeditor1 (talk) 20:13, 1 December 2023 (UTC)
* Where would you propose it be moved? Perhaps the "Cause" section? Kimen8 (talk) 20:36, 1 December 2023 (UTC)
* I suggest it be moved to pathophysiology. Looking at that section, I see that these considerations are already addressed there. So it could simply be deleted in the "symptoms" section. Unecomeditor1 (talk) 21:47, 1 December 2023 (UTC)
* That seems reasonable. Those listed features are not symptoms, but are they also not "signs"? Kimen8 (talk) 21:52, 1 December 2023 (UTC)
* While inflammation and hypersensitivity are processes noted in CRPS, they are not specific only to CRPS. Many disease processes involve inflammation and hypersensitivity, therefore, they are not signs specific to CRPS.
* The discussion still needs to be mentioned, but it belongs in the pathophysiology section. Unecomeditor1 (talk) 00:08, 2 December 2023 (UTC)
Removal of Paragraph from "Signs and Symptoms"
Discussing the removal of the following paragraph, as it seems irrelevant in a distracting way.
"Symptoms may change over time, and they can vary from person to person. The more dynamic symptoms (especially vascular aspects (edema, temperature) and the location of pain) can change numerous times each day."
What is the purpose or benefit of emphasizing changes? Unecomeditor1 (talk) 16:23, 8 December 2023 (UTC)
Discussion of Edit to final paragraph of "Signs and Symptoms"
The paragraph was edited because a key aspect that characterizes CRPS is the absence of experimental data. Unecomeditor1 (talk) 16:32, 8 December 2023 (UTC)
* Can you explain how this source you used in this edit is relevant? For reference, you changed
* "Patients may develop burning pain and allodynia in either form of CRPS. Both forms of the syndrome are also characterized by autonomic dysfunction, which presents with temperature changes (usually localized, but can be global), cyanosis, and/or edema." to "Other findings are aspects of disuse including swelling, stiffness (limited range of motion), and disuse related changes to the skin (temperature, color) and bones (disuse osteoporosis)." The reference you added has no mention of CRPS and it's not clear how the change (or source) is relevant. Kimen8 (talk) 17:21, 15 December 2023 (UTC)
Removal of Two Images
I am proposing the removal of the two images located beneath the table summarizing CRPS. They are not a good representation of CRSP and are frightening. Unecomeditor1 (talk) 16:07, 15 December 2023 (UTC)
Using the word "association" instead of "cause" for CRPS
Since there is no measurable pathophysiology that corresponds with illness described as CRPS, we should avoid the words of cause and effect or of etiology. We should only speak of associations. Unecomeditor1 (talk) 22:49, 17 December 2023 (UTC)
* This is patently false; even a cursory Google search yields articles published in well-regarded peer-reviewed journals with “CRPS” and “pathophysiology” in the shared title. Please be cautious in your use of pathophysiology. Furthermore, the link between "measurable" and "cause" that you're suggesting is misleading. J E F-T (talk) 05:28, 3 January 2024 (UTC)
* The condition is still a syndrome with no measurable pathophysiology. If you have evidence of experimentally verifiable pathophysiology, that would be of interest to me. I study this and similar conditions and this would be new to me. Unecomeditor1 (talk) 16:12, 3 January 2024 (UTC)
* Easily accessible reviews of CRPS-I and -II pathophysiology are abundant. If you're looking for diagnostic biomarkers available for clinical use as evidence of "experimentally verifiable pathophysiology," CRPS, like many other conditions of the nervous system (e.g., MDD, bipolar disorder, PD, ASD, or ADHD), is unfortunately without one as of January 2024. If you're looking for reviews of CRPS pathophysiology as measured in experimental settings, please read the following recent articles:
* 1. Syndrome: A Comprehensive Review. J Pain Res. 2023;Volume 16:3061-3073. doi:10.2147/JPR.S423733
* 2. Birklein F, Ajit SK, Goebel A, Perez RSGM, Sommer C. Complex regional pain syndrome — phenotypic characteristics and potential biomarkers. Nat Rev Neurol. 2018;14(5):272-284. doi:10.1038/nrneurol.2018.20
* 3. Cuhadar U, Gentry C, Vastani N, et al. Autoantibodies produce pain in complex regional pain syndrome by sensitizing nociceptors. Pain. 2019;160(12):2855-2865. doi:10.1097/j.pain.0000000000001662
* 4. Marinus J, Moseley GL, Birklein F, et al. Clinical features and pathophysiology of complex regional pain syndrome. Lancet Neurol. 2011;10(7):637-648. doi:10.1016/S1474-4422(11)70106-5
* 5. Lloyd ECO, Dempsey B, Romero L. Complex Regional Pain Syndrome. Am Fam Physician. 2021;104(1):49-55.
* 6. David Clark J, Tawfik VL, Tajerian M, Kingery WS. Autoinflammatory and autoimmune contributions to complex regional pain syndrome. Mol Pain. 2018;14:1744806918799127. doi:10.1177/1744806918799127
* 7. Scheuren PS, De Schoenmacker I, Rosner J, Brunner F, Curt A, Hubli M. Pain-autonomic measures reveal nociceptive sensitization in complex regional pain syndrome. Eur J Pain Lond Engl. 2023;27(1):72-85. doi:10.1002/ejp.2040 J E F-T (talk) 00:25, 4 January 2024 (UTC)
* Thanks. That is helpful. Our sense is that those studies are speculations and early investigations rather than solid evidence. Among experts, it is widely agreed that CRPS is still a syndrome. We'll get to work on a systematic review of the available evidence regarding pathophysiology. Unecomeditor1 (talk) 15:03, 5 January 2024 (UTC)
Speculation regarding subtype pain intensities
Stating that type II is more painful than type I may not be accurate. Most "knowledge" regarding CRPS is speculative because the absence of experimental verification makes it difficult to address with scientific experiments. I'm not aware of any evidence that supports the contention that proposed subtypes vary in mean pain intensity. Unecomeditor1 (talk) 22:57, 17 December 2023 (UTC)
AMPS claim unsourced
CRPS, especially type II, is not commonly referred to as a form of AMPS in the literature. CRPS may have some overlap with AMPS in symptomatology, but the pathophysiologies are not synonymous enough to classify CRPS as a type of AMPS. The causal mechanisms of the CRPS types differ; lumping them under AMPS as one condition is inaccurately representing them as such. Furthermore, no reference to a peer-reviewed source was provided to make the claim in the introduction. J E F-T (talk) 05:21, 3 January 2024 (UTC) | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.