Document
stringlengths 87
1.67M
| Source
stringclasses 5
values |
|---|---|
Ganoderma Lucidum Extract Powder: Health Benefits And Side Effects
2023-08-11 15:22:57
Ganoderma lucidum, ordinarily known as reishi, is a mushroom that has been utilized for therapeutic purposes in customary Chinese medication for more than 2,000 years. Due to its potential health benefits, Ganoderma lucidum extract powder has become a popular dietary supplement in recent years. In any case, similar to any enhancement, it is fundamental to comprehend both the advantages and the likely aftereffects prior to adding it to your routine.
What is Ganoderma Lucidum
A type of mushroom known as Ganoderma lucidum is found in Asia on hardwood trees. It has a distinctive appearance thanks to its woody stem and shiny red cap. The mushroom has been utilized for a really long time in conventional Chinese medication to advance life span, work on general well-being and prosperity, and treat different illnesses.
Polysaccharides, triterpenoids, and beta-glucans are just a few of the bioactive compounds found in ling zhi powder, which is extracted from the mushroom's fruiting body. In laboratory tests, these compounds were found to have anti-tumor, anti-inflammatory, and immune-stimulating properties.
Health Benefits of Ganoderma Lucidum Extract
Ganoderma Extract Powder’s potential health benefits have been the subject of numerous scientific investigations. Here is a portion of the medical advantages that have been distinguished:
1. Immune system assistance: Ganoderma lingzhi remove contains polysaccharides and beta-glucans, which have immunomodulatory impacts, meaning they can help control and improve resistant capability. A review distributed in the Diary of Restorative Food found that Ganoderma lucidum concentrate could animate the development of white platelets, which are key parts of the resistant framework.
2. Effects on inflammation: Triterpenoids in the extract have been shown to have significant anti-inflammatory properties. As a result, it has the potential to be helpful in the treatment of conditions related to inflammation like asthma and arthritis. A review distributed in the Diary of Ethnopharmacology found that the powder could ease lung irritation in mice.
3. Cardiovascular well-being: Research proposes that the concentrate might assist with bringing down circulatory strain and cholesterol levels, which can diminish the gamble of cardiovascular illness. Ganoderma lucidum powder had the ability to lower the levels of total cholesterol and triglycerides in rats, according to a study that was published in the Journal of Agricultural and Food Chemistry.
4. Liver capability improvement: By reducing inflammation and encouraging the regeneration of liver cells, powdered Ganoderma lucidum mushroom extract may assist in enhancing liver function. According to a study that was published in the International Journal of Medicinal Mushrooms, the extract might shield liver cells from toxins damage.
5. Deficiencies against cancer: The extract may have anti-tumor properties, according to some studies, making it a potential complementary therapy for cancer patients. It was found to be able to stop human breast cancer cells from growing, according to a study that was published in the Journal of Experimental and Clinical Cancer Research.
Ganoderma Lucidum Extract Side Effects
Although this powder is generally considered safe when consumed in moderation, the following potential side effects should be considered:
1. Reactions to allergies: Certain individuals might encounter hypersensitive responses to the mushroom or its concentrate, especially those with aversions to growths.
2. Drug cooperation: The extract may increase or decrease blood clotting when combined with certain medications, such as blood thinners.
3. Problems with the digestive system: High doses of the extract may cause digestive issues like nausea, diarrhea, or upset stomach.
4. Immune system issues: The extract should be avoided by people who have autoimmune conditions like lupus or multiple sclerosis because it may stimulate the immune system and make their symptoms worse.
Interference with the control of blood sugar: Before taking the extract, people with diabetes should talk to their doctor about how it might affect how well they control their blood sugar.
How to Make Rational Use of Ganoderma Lucidum Extract
How to use Ganoderma lucidum extract in a reasonable way When using Ganoderma lucidum extract, it is essential to use it in a rational way to maximize its potential health benefits and minimize its potential negative effects.
Speak with a medical professional: Always seek advice from a medical professional before incorporating any new supplements into your routine. They can help decide whether the enhancement is proper for yourself and prompt measurement.
Pick a trustworthy provider: It is essential to select a product of high quality from a reputable supplier. Try to find a standardized extract that has passed a third-party purity and potency test.
Follow the dosage instructions: It's vital to follow the suggested measurement on the item mark. Don't take more than the recommended amount because doing so could make side effects worse.
In conclusion, Ganoderma lucidum extract powder has the potential to support the immune system, have anti-inflammatory effects, improve cardiovascular health, improve liver function, and fight cancer. Be that as it may, it might likewise make side impacts, and it's crucial to utilize it by talking with a medical care supplier, picking a respectable provider, and following the suggested dose. Sanxin is one of the Ganoderma lucidum extract powder suppliers in China, and we can offer you best-customized ganoderma lucidum extract. If you want to buy this extract, please contact us.
|
ESSENTIALAI-STEM
|
Page:Four Dissertations - David Hume (1757).djvu/246
, though the principles of taste be universal, and nearly, if not entirely the same in all men; yet few are qualified to give judgment on any work of art, or establish their own sentiment as the standard of beauty. The organs of internal sensation are seldom so perfect as to allow the general principles their full play, and produce a feeling correspondent to those principles. They either labour under some defect, or are vitiated by some disorder; and by that means, excite a sentiment, which may be pronounced erroneous. When the critic has no delicacy, he judges without any distinction, and is only affected by the grosser and more palpable qualities of the object: The finer touches pass unnoticed and disregarded. Where he is not aided by practice, his verdict is attended with confusion and hesitation. Where no comparison has been employed, the most frivolous beauties, such as rather merit the name of defects, are the objects of his admiration. Where he lies under the influence of prejudice, all his natural sentiments are perverted. Where good sense is wanting, he is not qualified to discern the beauties of design and reasoning, which are the highest and most excellent. Under some or other of these
|
WIKI
|
Browser optionsedit
Want to get started with synthetic monitoring? See the quick start guide.
[beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. The options described here configure Heartbeat to run the synthetic monitoring test suites via Synthetic Agent on the Chromium browser. Additional shared options are defined in Common monitor options.
Browser based monitors can only be run in our Heartbeat docker image, or via the elastic-agent-complete docker image. For more information, see Synthetic monitoring using Docker.
Example configuration:
- type: browser
id: synthetic-inline-suites
name: Elastic website
schedule: '@every 1m'
source:
inline:
script: |-
step("load homepage", async () => {
await page.goto('https://www.elastic.co');
});
step("hover over products menu", async () => {
await page.hover('css=[data-nav-item=products]');
});
sourceedit
Contains information on how to run the synthetic test suites.
inlineedit
Runs the Synthetic test scripts that are defined inline in the configuration. See Synthetics syntax for more information.
This is the most convenient way to get Synthetic tests up and running, however, it becomes harder to maintain and share code as the number of test files increases. The recommended way to run Synthetic suites is to create an NPM project and start writing individual tests for all the user journeys and save them as JavaScript or TypeScript files. Once the project is created, the tests can be invoked either by Zip Url or Local directory method.
Heartbeat will use the latest compatible version(^1.0.0) of the Synthetics NPM library to run the inline journeys.
Zip URLedit
Remote zip endpoint configuration allows users to specify the location of a synthetics test project ZIP file.
Under zip_url, specify these options:
url
Location of the synthetics project repository.
folder
Relative directory path where the synthetic journey files are located in the repository.
username
The username for authenticating with the zip endpoint. This setting is optional.
password
The password for authenticating with the zip endpoint. This setting is optional.
ssl
SSL options applied to downloading the zip, not the browser. See SSL for more details.
If username and password are provided, they will be sent as HTTP Basic Authentication headers to the remote zip endpoint.
Example configuration:
- type: browser
id: todos-suites
name: Todos Journeys
schedule: '@every 1m'
source:
zip_url:
url: "https://github.com/elastic/synthetics/archive/refs/heads/master.zip"
folder: "examples/todos"
username: ""
password: ""
# ssl options apply to downloading the zip, not the browser
#ssl:
# certificate_authorities: ['/etc/ca.crt']
Local directoryedit
Local directory where the synthetic test files are located.
Example configuration:
- type: browser
id: local-journeys
name: Local journeys
schedule: '@every 1m'
source:
local:
path: "/path/to/synthetics/journeys"
paramsedit
Set this option to add user defined parameters for your scripts. This value takes arbitrary YAML that is then converted to JSON which is then passed into synthetics via the --params option. See Working with Params for more information.
Example:
- type: browser
id: local-journeys
name: Local journeys
schedule: '@every 1m'
source: # Omitted in this example for brevity
params:
root_url: http://example.net
my_custom_object:
a_key: ["a value"]
screenshotsedit
Set this option to manage the screenshots captured by the synthetics agent.
Under screenshots, specify one of these options:
on
capture screenshots for all steps in a journey (default)
off
do not capture any screenshots
only-on-failure
capture screenshots for all steps when a journey fails (any failing step marks the whole journey as failed)
Example configuration:
- type: browser
id: local-journeys
name: Local journeys
schedule: '@every 1m'
screenshots: "on"
source:
local:
path: "/path/to/synthetics/journeys"
ignore_https_errorsedit
Set this option to true to disable TLS/SSL validation in the synthetics browser. This is useful for testing sites that use self-signed certs. This option can also be used to test certs from non-standard CAs, though you will no longer get errors if there is anything wrong with the certificate.
sandboxedit
Set this option to true to enable the normally disabled chromium sandbox. Defaults to false.
throttlingedit
Set this option to control the network throttling. By default, all journeys are run with 5Mbps download, 3Mbps upload and 20ms latency which emulates a standard Cabel connection.
Users can control the throttling parameters, Below is an example of emulating a 3G connection with 1.6Mbps download, 750Kbps upload and 150ms round trip time.
- type: browser
schedule: '@every 1m'
throttling: "1.6d/0.75u/150l"
Network throttling can be completely disabled by passing false
- type: browser
schedule: '@every 1m'
throttling: false
filter_journeysedit
Set this option to filter journeys based on journey tags and names.
Example configuration:
- type: browser
id: local-journeys
name: Local journeys
schedule: '@every 1m'
filter_journeys:
tags: ["browse", "checkout"]
match: "login*"
source:
local:
path: "/path/to/synthetics/journeys"
tags
run only journeys with the given tag(s), or globs
match
run only journeys with a name or tags that matches the configured glob
synthetics_argsedit
Extra arguments to pass to the synthetics agent package. Takes a list of strings.
Run Once Mode (Experimental)edit
You can configure Heartbeat run monitors exactly once then exit, bypassing the scheduler. This is referred to as running Heartbeat in "run once" mode by setting heartbeat.run_once: true. All Heartbeat monitors will ignore their schedules and run exactly once at startup. This is an experimental feature and is subject to change.
Note, the schedule field is still required and is used by Heartbeat to set the expectation around when the next run will occur. That duration is encoded in the monitor.timespan field in the Heartbeat output.
# heartbeat.yml
heartbeat.run_once: true
heartbeat.monitors:
# your monitor config here...
|
ESSENTIALAI-STEM
|
1 Cryptocurrency to Avoid No Matter What
Longtime meme coin favorite Dogecoin (CRYPTO: DOGE) is up less than 1% for the year. That type of market underperformance really stands out when you consider that Bitcoin is up almost 120% for the year.
Zoom out beyond this year, and the picture gets even worse. Dogecoin has been on a long decline since May 2021, when it hit an all-time high of $0.74 during the peak of meme coin mania.
Currently trading at just $0.071, Dogecoin is just about one of the worst crypto investments you could possibly make right now. Here's why.
The $10 billion market cap conundrum
But surely, you might say, there's value somewhere with Dogecoin. After all, it is still the world's ninth-largest cryptocurrency, with a staggering $10 billion market capitalization. If Dogecoin were a stock, it would fall into the large-cap category, which includes stocks with market capitalizations of more than $10 billion. Examples of companies with $10 billion valuations include CarMax, KeyCorp, and Wynn Resorts.
Image source: Getty Images.
But unlike these companies, Dogecoin doesn't offer any obvious value. It doesn't own any cars, banks, or hotels. It is a meme coin, pure and simple.
In fact, it was created as a joke, and it is proud to announce this at every turn. There was absolutely no planned utility for the coin from the outset.
Dogecoin describes itself as an "accidental crypto movement that makes people smile." Granted, it's almost impossible to talk about this crypto without making some silly dog jokes, and yes, the Dogecoin dog mascot is cute. But is Dogecoin really worth $10 billion?
The $1 price problem
And then there's the matter of Dogecoin's price. If you look at a long-term trading chart of Dogecoin, it's stunning. There's basically a long flat line near zero from December 2013 (when it launched) to January 2021, when it suddenly increases in value dramatically. But it then loses its value within a matter of weeks, and has been on a slow road to nowhere ever since.
Just to be clear: Dogecoin has been around for nearly 10 years -- an entire decade -- and has never once broken through the $1 mark. I can't think of any stock that investors would hold on to, year after year, as it does nothing.
What makes Dogecoin's decline so ironic is that it coincides almost perfectly with the appearance of Elon Musk, a longtime Dogecoin supporter, on NBC's Saturday Night Live. On May 7, 2021, the day before Musk appeared on the show, Dogecoin was trading for $0.73. Within weeks, it was trading for just $0.30. This may have to do with the fact that Elon Musk basically admitted Dogecoin was "a hustle" during one of his SNL skits.
The Elon Musk X factor
And that brings me to my last major issue with Dogecoin: The acquisition of Twitter (now called X) by Musk has resulted in absolutely no value creation for Dogecoin. Back in April 2022, the thinking was that Musk would acquire Twitter, and then immediately add some sort of integration for Dogecoin, such as the ability to make micropayments on the platform. But that simply hasn't happened, and it has now been 18 months since the acquisition was announced.
Granted, there have been a few fun memories along the way. Musk famously appeared at this year's Super Bowl next to media mogul Rupert Murdoch while wearing a Dogecoin t-shirt. And he had a bit of fun around April Fool's Day, swapping out the blue Twitter bird icon for the Dogecoin dog icon on the social media platform. And there is even speculation that Musk's SpaceX will help Dogecoin become the first cryptocurrency to travel to outer space and become an intergalactic medium of exchange.
But what if I'm wrong?
Maybe Dogecoin is a giant inside joke, and I'm just not in on it. Maybe Dogecoin really is headed to the moon on a crypto rocket ship (both literally and metaphorically). And maybe Musk is such an incredible genius that I just can't possibly understand what he plans to do with Dogecoin.
But I don't think so. Dogecoin has had 10 years to succeed and has failed to do so. So don't get fooled by the $10 billion market cap or the constant buzz and speculation. Dogecoin is a cryptocurrency to avoid no matter what. Save yourself the heartache and buy another $10 billion market cap stock instead.
10 stocks we like better than Dogecoin
When our analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*
They just revealed what they believe are the ten best stocks for investors to buy right now... and Dogecoin wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of November 6, 2023
Dominic Basulto has positions in Bitcoin. The Motley Fool has positions in and recommends Bitcoin and CarMax. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
Carrefour Brasil misses Q1 profit estimate
May 15, 2018 / 10:29 AM / Updated 10 minutes ago Carrefour Brasil misses Q1 profit estimate Reuters Staff 1 Min Read
SAO PAULO, May 15 (Reuters) - Carrefour Brasil, the country’s largest food retailer, missed quarterly profit estimates on Tuesday, as administrative expenses went up.
In a securities filing, the company reported first-quarter net income of 332 million reais ($91.64 million), up 66.8 percent from the same period a year before, but below a Reuters consensus estimate of 359 million reais. $1 = 3.6229 reais Reporting by Carolina Mandl, editing by Louise Heavens
|
NEWS-MULTISOURCE
|
Page:06.CBOT.KD.PropheticalBooks.B.vol.6.LesserProphets.djvu/893
of Obadiah, as we possess it, was founded upon an earlier prophecy, which was adopted by the later editor of our book, and incorporated in his writings, and which had also been made use of by Jeremiah. In support of this hypothesis, the circumstance has been adduced, that Jeremiah's references to Obadiah only extend to Oba 1:9, that the introductory words in Obadiah, “Thus saith the Lord Jehovah concerning Edom,” do not stand in a close connection with what follows immediately after and thus appear to have been added at a later period, and that the rare word tiphlatstekhâ (Jer 49:16), which is not met with anywhere else in Jeremiah, is wanting in Obadiah. But the first phenomenon may be explained very simply, from the fact that the remaining portion of Obadiah (Oba 1:10-21) furnished nothing which Jeremiah could make use of for his object, and that we have an analogy in the relation between Jeremiah 48 and Isaiah's prophecy concerning Moab (Isaiah 15-16), where in just the same manner certain portions, viz., Isa 16:1-5, have not been made use of at all. Again, the want of any closer logical connection between the introduction, “Thus hath the Lord said with regard to Edom,” and what follows, “We have heard a rumour from Jehovah,” arises from the circumstance that these introductory words do not apply exclusively to what follows immediately after, but belong to the whole of Obadiah's prophecy (see at Oba 1:1). Moreover, these words could not have been wanting even in the supposed earlier or original prophecy, inasmuch as what follows would be unintelligible without them, since the name Edom, to which the suffixes and addresses in Oba 1:1-5 apply, would be altogether wanting. and lastly, the word tiphlatstekhâ, which is otherwise strange to Jeremiah, proves nothing in favour of an earlier source, which both Obadiah and Jeremiah employed; nor can we see any sufficient reason for its omission when the earlier oracle was adopted. The other arguments adduced in support of this hypothesis are entirely without significance, if not absolutely erroneous. The fact that from Oba 1:10 onwards, where Jeremiah ceases to make use of our prophecy, the connection between Obadiah and Joel commences, of which there is not the slightest trace in Oba 1:1-9, has its natural foundation in the contents of the two parts of Obadiah. The announcement of the judgment upon the Edomites in Oba 1:1-9 could not be
|
WIKI
|
DEV Community
Munif Tanjim
Munif Tanjim
Posted on • Updated on • Originally published at muniftanjim.dev
Neovim - Build UI using nui.nvim
I've been using Neovim almost everyday, for years now. I play around with my config files often and recently been trying out the built-in LSP features that come with Neovim 0.5+.
For my work stuffs I still use coc.nvim and I'm quite used to the nice and simple UIs it provides to interact with the LSP client. So I wanted something similar for the built-in LSP client too.
And I found some excellent projects that provide UIs for LSP. For example:
Surely, I could've used one of them and called it a day. But this blog post wouldn't be here if I did that! 😝
Instead I thought, what if I try to make those UIs myself? So the next logical (🤔) thing was to search for plugin/library for building Neovim UIs quickly. Here's what I found so far:
Most of the Neovim Lua plugins I saw share some version or variant of codes from these two plugins (because all of them are trying to do the same thing). All these duplication of efforts needs to end. But, how?
Initially I thought about contributing to popup.nvim or neovim-ui project. But those projects have different goals than what I had in mind. What I want is to have a high-level API with a lot of sugar for doing repetitive things. Those projects are focused more on low-level stuffs.
So... Alright people let's do this one last time! 🤟
Enter nui.nvim
The UI component library for Neovim that I've been working on for the past few weeks.
Features and Goals:
• Customizable UI
• High-level API to build UI elements
• Sugar for doing repetitive things, e.g. autocmd, keymap etc.
It's still in early stage of development, but it's quite usable right now. If you're interested in using it, have ideas, feature requests, want to contribute or just appreciate the project - please do check the GitHub repo MunifTanjim/nui.nvim 😃
Now, it's demo time...
UI for LSP Rename using nui.nvim
Let's try to build the UI for LSP textDocument/rename operation using nui.nvim.
First of all, let's get the identifier name under cursor:
local curr_name = vim.fn.expand("<cword>")
Enter fullscreen mode Exit fullscreen mode
To send request to the LSP server for renaming this identifier, we need the exact position of it. Neovim got us covered:
local params = vim.lsp.util.make_position_params()
Enter fullscreen mode Exit fullscreen mode
Now, what happens when we get the new name for the identifier? Let's write a on_submit callback function that is expected to be called with the new name:
local function on_submit(new_name)
if not new_name or #new_name == 0 or curr_name == new_name then
-- do nothing if `new_name` is empty or not changed.
return
end
-- add `newName` property to `params`.
-- this is needed for making `textDocument/rename` request.
params.newName = new_name
-- send the `textDocument/rename` request to LSP server
vim.lsp.buf_request(0, "textDocument/rename", params, function(_, result, _, _)
if not result then
-- do nothing if server returns empty result
return
end
-- the `result` contains all the places we need to update the
-- name of the identifier. so we apply those edits.
vim.lsp.util.apply_workspace_edit(result)
-- after the edits are applied, the files are not saved automatically.
-- let's remind ourselves to save those...
local total_files = vim.tbl_count(result.changes)
print(
string.format(
"Changed %s file%s. To save them run ':wa'",
total_files,
total_files > 1 and "s" or ""
)
)
end)
end
Enter fullscreen mode Exit fullscreen mode
Now that all those are done, let's focus on creating the UI for getting the new name for the identifier:
local Input = require("nui.input")
local popup_options = {
-- border for the window
border = {
style = "rounded",
text = {
top = "[Rename]",
top_align = "left"
},
},
-- highlight for the window.
highlight = "Normal:Normal",
-- place the popup window relative to the
-- buffer position of the identifier
relative = {
type = "buf",
position = {
-- this is the same `params` we got earlier
row = params.position.line,
col = params.position.character,
}
},
-- position the popup window on the line below identifier
position = {
row = 1,
col = 0,
},
-- 25 cells wide, should be enough for most identifier names
size = {
width = 25,
height = 1,
},
}
local input = Input(popup_options, {
-- set the default value to current name
default_value = curr_name,
-- pass the `on_submit` callback function we wrote earlier
on_submit = on_submit,
prompt = "",
})
Enter fullscreen mode Exit fullscreen mode
Believe it or not, the UI is ready. Now we just need to render it:
input:mount()
Enter fullscreen mode Exit fullscreen mode
That's it! The input popup window will show up.
UI for LSP Rename using nui.nvim
It'll initially be in INSERT mode. You can press Esc to exit INSERT mode or CTRL-c to close the popup window. If you press Enter, the on_submit callback function will be invoked with the input value and the popup window will be closed.
Let's add some additional interactions. If Esc is pressed in NORMAL mode, let's close the popup window:
-- close on <esc> in normal mode
input:map("n", "<esc>", input.input_props.on_close, { noremap = true })
Enter fullscreen mode Exit fullscreen mode
Also close it when the cursor leaves the popup window:
local event = require("nui.utils.autocmd").event
-- close when cursor leaves the buffer
input:on(event.BufLeave, input.input_props.on_close, { once = true })
Enter fullscreen mode Exit fullscreen mode
Now all you need to do is put all these inside a function nui_lsp_rename in a separate file and map your keys to start the renaming.
For example, put the file at ~/.config/nvim/lua/config/nui_lsp.lua:
-- file: ~/.config/nvim/lua/config/nui_lsp.lua
local function nui_lsp_rename()
-- ... the implementation from above
end
return {
lsp_rename = nui_lsp_rename,
}
Enter fullscreen mode Exit fullscreen mode
And map your keys in your Neovim config file:
-- file: ~/.config/nvim/init.lua
-- you probably want to put this inside the `on_attach` callback function
-- of your lsp server config and use `vim.api.nvim_buf_set_keymap` instead.
vim.api.nvim_set_keymap(
"n",
"<Leader>rn",
"<cmd>lua require('config.nui_lsp').lsp_rename()<CR>",
{ noremap = true, silent = true }
)
Enter fullscreen mode Exit fullscreen mode
You can find the whole snippet here Gist: Neovim LSP Rename with nui.nvim.
That's it for today!
If you have any queries, questions or thoughts on nui.nvim, let's Discuss at GitHub.
Have a great day! 😄
Originally published at muniftanjim.dev on July 18, 2021.
Top comments (0)
|
ESSENTIALAI-STEM
|
Page:Myth, Ritual, and Religion (Volume 2).djvu/335
Rh APPENDIX.
—♦—
APPENDIX A.
FONTENELLE'S FORGOTTEN COMMON-SENSE.
In the opinion of Aristotle, most discoveries and inventions have been made time after time and forgotten again. Aristotle may not have been quite correct in this view; and his remarks, perhaps, chiefly applied to politics, in which every conceivable and inconceivable experiment has doubtless been attempted. In a field of less general interest—namely, the explanation of the absurdities of mythology—the true cause was discovered more than a hundred years ago by a man of great reputation, and then was quietly forgotten. Why did the ancient peoples—above all, the Greeks—tell such extremely gross and irrational stories about their gods and heroes? That is the riddle of the mythological Sphinx. It was answered briefly, wittily, and correctly by Fontenelle; and the answer was neglected, and half-a-dozen learned but impossible theories have since come in and out of fashion. Only within the last ten years has Fontenelle's idea been, not resuscitated, but rediscovered. The followers of Mr. E. B. Taylor, Mannhardt, Gaidoz, and the rest, do not seem to be aware that they are only repeating the notions of the nephew of Corneille.
The Academician's theory is stated in a short essay, De l'Origine des Fables (Œuvres: Paris, 1758, vol. iii. p. 270).
|
WIKI
|
Vortioxetine Treatment for Anxiety Disorder: A Meta-Analysis Study | Bentham Science
Vortioxetine Treatment for Anxiety Disorder: A Meta-Analysis Study
Author(s): Anne Yee*, Chong Guan Ng, Loh Huai Seng.
Journal Name: Current Drug Targets
Volume 19 , Issue 12 , 2018
Journal Home
Translate in Chinese
Become EABM
Become Reviewer
Graphical Abstract:
Abstract:
Background: Vortioxetine is a multimodal antidepressant that has been developed for the treatment of major depressive and anxiety disorders. The aim of this review is to quantitatively synthesize all data of the efficacy, safety and tolerability of Vortioxetine in treating anxiety disorder.
Method: Terms of “Vortioxetine” OR “LuAA21004” AND “anxiety” OR “fear” OR “panic” OR “phobia” were searched. A total of two phase II and five phase III clinical trials were found.
Results: Vortioxetine was overall superior to placebo in terms of the mean change from baseline in HAM-A total score at week 8 with the pool effect size of -2.95, 95% CIs, -4.37 to -1.53, p<0.01. The patients who received 5 mg of Vortioxetine had higher response rate when compared to placebo (pooled odds ratio=1.4, 95% CI = 1.08 to 1.82, p=0.01). However, the pooled odds ratio of the HAMA remission rate was not statistically significant for both Vortioxetine and placebo (pooled odds ratio= 1.06, 95% CI = 0.86 to 1.30, p=0.62). Although the discontinuation due to adverse effects was higher in Vortioxetine than placebo group (pooled OR= 1.55, 95% CI = 1.04 to 2.31, P= 0.037), the lack of efficacy (pooled OR= 0.39, 95% CI = 0.27 to 0.57, P<0.01) was higher in placebo than Vortioxetine group. Most of the adverse effects were mild and moderate. Overall, Vortioxetine displayed a good safety and tolerability profile.
Conclusion: This review supports the use of Vortioxetine for anxiety disorder. However, further longterm placebo-control observational study or a post market survey would help in strengthening the evidence for this treatment modality.
Keywords: Vortioxetine, anxiety disorder, LuAA21004, generalised anxiety disorder, serotonin partial agonist reuptake inhibitor (SPARI).
Rights & PermissionsPrintExport Cite as
Article Details
VOLUME: 19
ISSUE: 12
Year: 2018
Page: [1412 - 1423]
Pages: 12
DOI: 10.2174/1389450118666171117131151
Price: $58
Article Metrics
PDF: 80
HTML: 9
EPUB: 1
PRC: 1
|
ESSENTIALAI-STEM
|
Kolar Assembly constituency
Kolar Assembly seat is one of the seats in Karnataka Legislative Assembly in India. It is a segment of Kolar Lok Sabha constituency.
1967
* P. Venkatagiriyappa (IND) : 13,216 votes
* D. A. Rashid (INC) : 9042 votes
1972
* D. Venkatramiah (IND) : 14,639 votes
* P. Venkatagiriyappa (IND) : 13,147 votes
2013
* R Vathur Prakash (IND) : 62,957 votes
* K. Srinivasa Gowda (JD-S) : 50,366 votes
* Naseer Ahmed (Congress) : 41,510 votes
* M S Anand (BJP) : 1,617
|
WIKI
|
User:GerardM/Fellows of the National Academy of Sciences, Arts and Letters of Burkina Faso
Fellows of the National Academy of Sciences, Arts and Letters of Burkina Faso
|
WIKI
|
Betty G
Bruktawit Getahun, better known by her stage name Betty G, is an Ethiopian singer and songwriter.
She initiated her career by collaborating with various artists, most notably, hip hop musician, like Nhatty Man, Henok Mehari, Jhonny Raga, and Henok Abebe. Her 2015 debut album Manew Fitsum and 2018 album Wegegta have been best selling album during 2016 and 2018.
Life and career
Bruktwait Getahun was born and raised in Addis Ababa, Ethiopia. She attended Lycée Guebre-Mariam, a French high school. She later joined the Commercial College of Addis Ababa and a French University, Universite de L"IAE Politier, via correspondence, graduating in 2009 with a dual degree in Office Management and General Management. With a music career starting humbly during her high school days, Betty G's stature has today seen her collaborate with several prominent Ethiopian artists including Teddy Afro, Zeritu Kebede, Jhonny Raga and Natnael Ayalew (Nhatty Man). On Coke Studio Africa 2017, Betty G collaborated with Cameroonian music group: X-Maleya as produced by Nigeria’s Chopstix. She sings in French, English and Amharic.
Bruktawit released her debut studio album entitled Manew Fitsum in 2015.
In 2018, Getahun released her critically acclaimed second album entitled Wegegta which earned her 6 AFRIMA nominations. The album was produced by Yamlu Molla who was also nominated for an AFRIMA Award.
She has noted that she does experiment with other genres of music such as jazz, rock, and electronic.
Betty G is a UNHCR high-profile supporter and has visited refugee camps within Ethiopia advocating for refugee' rights, particularly women refugees' rights.
Betty G was inducted for Nobel Peace Prize 2019, an award of Prime Minister Abiy Ahmed and sung two songs "Hagere" and "Sin Jalleda".
Discography
* Studio albums
* Manew Fitsum (2015)
* Wegegta (2018)
|
WIKI
|
Wikipedia:Articles for deletion/Moraxian
The result of the debate was delete. - Mailer Diablo 03:59, 10 January 2006 (UTC)
Moraxian
Apparent self-promotion attempt for porn website; no evident notability. Sandstein 19:00, 4 January 2006 (UTC)
* Delete advert. PJM 19:30, 4 January 2006 (UTC)
* Delete. non-notable. Atrian 21:07, 4 January 2006 (UTC)
* Delete wankercruft. Just zis Guy, you know? [T]/[C] [[Image:Flag of the United Kingdom.svg|25px| ]] AfD? 22:06, 4 January 2006 (UTC)
* Delete Porn advertising. -- (aeropagitica) 22:34, 4 January 2006 (UTC)
* Delete as non-notable website, advertising. http://moraxian.us has Alexa traffic rank of 276,000 (rank of 10,000 needed for website to be considered notable). —Quarl (talk) 2006-01-05 04:26Z
* Delete. Advertising, vanity.--Dakota ~ ε 07:23, 5 January 2006 (UTC)
|
WIKI
|
Murder in Mind (album)
Murder in Mind is the second album (though first not to be banned) by death metal band Desecration.
Track listing
* 1) "Intro"
* 2) "Murder in Mind"
* 3) "Impaled"
* 4) "Cerebral Annoxia"
* 5) "Stillborn Climax"
* 6) "Beyond Recognition"
* 7) "Bathroom Autopsy"
* 8) "Victimised"
* 9) "Incestual Sodomy"
* 10) "Obscene Publication"
* 11) "Crave for Rot"
Written by:
* Paul Arlett
* Glenn Thomas
* Jason Jad Davies
* John Young
|
WIKI
|
This explains the rapid growth as number of people using topical tat removal products. It does not take same biology whether in order to tattoo removal by laser or use a topical tat removal cream or teeth whitening gel. Getting rid of a tattoo can be a gradual associated with allowing the body to naturally replace those tattooed skin cells with new forms.
Here’s additional bad information and facts. No matter what method you choose, your tattoo sure isn’t completely detached. A lot depends on where on shape the tattoo is, skin tone type, the complexity and dimensions the tattoo, the color if inks used, additionally, you will deep the tattoo is considered to be.
In look at the news that having a tattoo put on, can sting a little, a person of the first concerns of someone who wants one removed might be how much pain in order to involved. The solution is ‘it depends.’ Tattoo removal by laser tends to sting just a little. In the hands of expert the discomfort in order to fairly warm.
Postoperative crusting or skin lesions. These are temporary complications, but both can leave scars. They also call awareness of the tattoo removal strategy.
Laser Tattoo Removal
laser tattoo removal is painful. Working with a tattoo applied is painful but people who have undergone the laser surgery procedure claim that it hurts above getting the tattoo.
Laser tattoo removal works from within out which suggests the laser has to penetrate your skin and denature aka break up the inks pigment and push it down towards your bloodstream which takes a number of years and smaller sized earlier, many treatments. In the flip side, trichloroacetic acid does not have to penetrate your skin to obtain the ink. Functions by peeling away extremely thin layers of skin from the surface in. Ultimately reaching the tattoo ink. This product doesn’t hurt, however some do report a slight discomfort that’s why it works on all colors. Trichloroacetic acid is a simple, safe, & very cost effective method of removing tattoo designs.
With new technology, developing a tattoo erased is increasingly easier to achieve. You can remove a tattoo permanently, leaving you with different one and healthy skin. Frightened cases there’s no scarring which is really a relief those who have wished they’d never been tattooed in the initial place. The way new lasers work merely sending a pulse of light through the skin, thus the pigment fragments is broken down in the tattoo. Your natural body’s immune system will allow these fragments to breakdown and withstand naturally.
|
ESSENTIALAI-STEM
|
No Urgency to Jump on Lululemon Athletica Inc. (LULU)
InvestorPlace InvestorPlace - Stock Market News, Stock Advice & Trading Tips
Lululemon Athletica Inc. 's (NASDAQ: LULU ) 15% decline last week has made headlines. The company reported a decent second quarter after the close on September 1, but lower-than-expected guidance for the full year sent the shares tanking.
I was asked on Twitter if the weakness was a buying opportunity, so let me explain why I'm not touching the stock just yet.
In its recent second-quarter report, the company matched Wall Street estimates with 11.8% earnings growth to 38 cents a share. Revenue was up 13.6% to $514.5 million, driven by improved sales comps and an increase in square footage thanks to the opening of 43 new company-owned stores. However, the results fell short of expectations by about $1 million.
10 Stocks to Take Profits On NOW
Comparable-store sales gained 3% in the quarter (4% on a constant currency basis), but the top line was affected by currency headwinds that held back results by $5.3 million, or 1%.
LULU Stock Looking Forward
For the current quarter, management expects revenue of $535 million - $545 million and earnings of 42 cents - 44 cents a share. And for the full year, guidance projects revenue of $2.32 billion - $2.35 billion on earnings of $2.07-$2.15 a share. This is what likely led to LULU's pullback, as Wall Street was looking for revenue of $2.34 billion and EPS of $2.15.
In addition, management noted that the company faced traffic headwinds in the second quarter and expects that weakness to continue through year-end. As a result, LULU has projected mid-single-digit sales comps, raising concerns about its ability to continue seeing solid growth.
LULU has been downgraded due to the weakness, with Jeffries moving the stock from a "buy" to a "hold" and lowering its target to $76 from $80 and Morgan Stanley revising its stance from "overweight" to "equal weight." The firm also reduced its price target to $70 from $74.
An Apple Inc. Today Keeps the Bears at Bay
But my major concern here is increased competition. While LULU's sales growth has outperformed the majority of the apparel industry, Under Armour Inc (NYSE: UA ) still far outshines its peers with growth around 30% in each of the last four quarter. Plus, LULU is trading at a premium. The stock sold for an average 42X current earnings during the month of August, compared to Nike Inc (NYSE: NKE ) at 26.4X, VF Corp (NYSE: VFC ) at 21.5X and Gap Inc (NYSE: GPS ) at 12X.
I'm keeping an eye on the stock, and while it could present a good opportunity in time, I don't see any urgency to buy right now.
Curious what Wall Street insider Charles Payne really thinks?Get more behind-the-scenes insights, valuable market research and hands-on guidance including live stock recommendations from Fox Business's rising star. Charles Payne'sSmart Talk is absolutely FREE for a limited-time only. Sign up today !
More From InvestorPlace
The 7 Best Monthly Dividend Stocks to Buy Now
5 Stocks to Buy for September
The post No Urgency to Jump on Lululemon Athletica Inc. (LULU) appeared first on InvestorPlace .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
James Bradley MORRISON, Appellant v. James CAMPBELL, Appellee.
No. 02-13-00174-CV.
Court of Appeals of Texas, Fort Worth.
Jan. 16, 2014.
Rehearing Overruled May 8, 2014.
Malcolm G. Renwiek, Renwick & Associates, P.C., Carrollton, TX, for Appellant.
Adam R. Hardison, Hardison Law Firm, Dallas, TX, for Appellee.
Panel: DAUPHINOT, WALKER, and McCOY, JJ.
OPINION
LEE ANN DAUPHINOT, Justice.
In this agreed interlocutory appeal, James Bradley Morrison appeals from the trial court’s denial of his motion for summary judgment on the claim for loss of use damages brought against him by James Campbell. Morrison’s vehicle struck Campbell’s motorcycle in an accident, and the motorcycle was damaged. Morrison argues that loss of use damages are not available to Campbell because his motorcycle was declared a total loss. Because we hold that damages for loss of use are available in total loss cases when the insurer unreasonably delays payment of a claim, we affirm the trial court’s denial of the motion for summary judgment.
Facts and Procedural History
The accident that gave rise to this suit occurred on October 23, 2009. On June 22, 2010, Morrison’s insurance carrier (Insurer) sent a letter to Campbell’s attorney denying Campbell’s claim based on its determination that Campbell was at fault for the accident because of “faulty evasive action & following too closely.” The record does not contain any more communications between Insurer and'Campbell’s attorney in 2010. On January 19, 2011, Insurer sent the attorney a letter offering $100,000.00 to settle Campbell’s personal injury claims arising out of the accident. That same month, Insurer sent Campbell a check for that amount.
The next month, Campbell’s attorney sent Insurer a letter regarding Campbell’s claims for damages to his motorcycle and other personal property. He stated that the damage to the motorcycle “rendered it inoperable. In addition to the property damage to his motorcycle, [Campbell] has lost the use of his motorcycle from the date of the collision to the present.” He asserted that the proper measure of loss of use damages is the reasonable rental value of a substitute vehicle and that “[t]he cost of renting a replacement motorcycle during this time is $125.00 per day.”
As for the repair and replacement costs, the attorney stated that he was authorized to accept the amounts listed in the letter “in full settlement of [Cambpell’s] property damage claim.” He listed the following items and amounts:
$1,664.70: helmet, leather chaps[,] and pants, see attached receipt
$1,095.11: accessories, see attached receipt
$24,605.29: cost of repair, see attached receipt
$61,625.00: loss of use from October 23, 2009 through February 28, 2011, 493 days x $125.00 per day
$88,990.10
The record does not, however, include any receipts that may have been attached to this letter.
On April 20, 2011, Insurer sent Campbell’s attorney an offer of $53,125.00 for the motorcycle, clear title, and salvage, plus $1,884.70 for the clothing damaged in the accident. Alternatively, it offered that if Campbell wanted to keep the salvage, Insurer would pay $42,825.00 for the motorcycle.
The attorney responded the next day with a letter accepting the offer of $42,825.00 plus the salvage. He also accepted the offer of $1,884.70 for the clothing items and demanded additional damages for Campbell’s damaged GPS system. He agreed to accept a total of $3,383.70 for the GPS and clothing items. He confirmed his understanding that as to Campbell’s loss of use claim, “[Insurer] rejected this claim, [and] that it is not included as part of this settlement.” A check from Insurer dated May 3, 2011 was made out to Campbell in the amount of $46,208.70.
On June 13, 2011, Campbell filed suit against Morrison for loss of use damages. In response to requests for admissions, Campbell admitted that the motorcycle was a total loss following the collision and that he accepted $42,825.00 as fair compensation for the fair market value of the motorcycle, “excluding [Campbell’s] claim for loss of use damages.”
Morrison filed a motion for summary judgment on the ground that as a matter of law, loss of use damages are available only for property that is repairable and are not available for property that has been declared a total loss. Campbell responded that the rule relied on by Morrison does not apply when the insurer delays paying a claim. He attached to his response his own affidavit in which he stated that because of the collision, his motorcycle had been damaged to the point that it could not be driven, that he was financially unable to replace the motorcycle until he had been paid the fair market value, and that Insurer “delayed paying [him] the fair market value of this motorcycle for a period exceeding eighteen months.” He also attached the police report of the accident, Insurer’s letter denying the claim, Insurer’s January 2011 letter offering to settle the personal injury claim, the February 2011 letter from his attorney demanding damages for the motorcycle and other personal property, the April 2011 offer from Insurer; the April 2011 letter from Campbell’s attorney accepting the offer and asking for damages for the GPS, and a copy of the May 2011 check from Insurer.
The trial court denied the summary judgment motion without specifying the basis of the ruling. The trial court approved Morrison’s application for an agreed interlocutory appeal on this question of law: “whether [Campbell] can recover loss of use damages where [Campbell’s] motorcycle was determined to be a total loss and where [Morrison] (through his insurer) substantially delayed compensating [Campbell] for its fair market value.” The court noted that it had denied the summary judgment motion on the merits, and it stated that “if the appellate court determines [Campbell] can recover loss of use damages under these circumstances, the case would likely resolve at mediation. Similarly, if the appellate court determines [Campbell] cannot recover loss of use damages under these circumstances, the case would likely be resolved.”
Standard of Review
We review a summary judgment de novo. We consider the evidence presented in the light most favorable to the nonmovant, crediting evidence favorable to the nonmovant if reasonable jurors could, and disregarding evidence contrary to the nonmovant unless reasonable jurors could not. We indulge every reasonable inference and resolve any doubts in the nonmovant’s favor. A defendant who conclusively negates at least one essential element of a cause of action is entitled to summary judgment on that claim.
We must accept as true the uncontro-verted evidence of the nonmovant. If the uncontroverted evidence is from an interested witness, it does nothing more than raise a fact issue unless it is clear, positive and direct, otherwise credible and free from contradictions and inconsistencies, and could have been readily controverted.
Analysis
Morrison argues in one issue that the trial court erred by denying his motion for summary judgment because under the law, loss of use damages are not available to Campbell because his motorcycle was declared a total loss and he was paid the fair market value for it.
The Rule in Texas
Texas law distinguishes between property that was damaged to the point of being totally destroyed and damaged property that can be repaired. In a suit for damages for personal property that has been totally destroyed, the proper measure of damages is the fair market value of the property at the time it was destroyed. Texas courts have consistently held that if personal property such as a vehicle is damaged but is repairable, the owner may recover the cost of repairs and damages for loss of the use of the vehicle, but if the property is totally destroyed, the owner can recover only the market value of the property and not loss of use damages. Campbell argues that the rule against recovering loss of use damages for totally destroyed property is the “the general rule,” as though the law has provided some exceptions. But we have found no case on this issue that declined to follow the rule or that created any exception, even when equity might weigh in favor of one. For example, the law has made no exception for when the owner cannot secure financing and is therefore unable to replace the property. In that case, the law still prohibits the recovery of loss of use damages.
But even long-standing rules should be re-examined periodically to determine whether they retain them validity in light of changed circumstances and standards. We therefore will consider the purpose of the rule and whether the rule continues to serve that purpose.
In Texas, the rule’s application has been justified on the basis of two assumptions: (1) that loss of use damages are included in an award of the market value of the property and therefore the rule prevents a double recovery for the plaintiff and (2) that when property is totally destroyed, it can be replaced immediately with no loss of use.
The Supreme Court of Texas discussed the rule in King v. McGuff in the context of whether the plaintiffs could recover rental value for a house damaged by fire. The fire had caused the house to lose 9/10 of its market value, a level of damage that the court equated with total destruction. The jury awarded the owners compensation for loss of use or rental value of the house while it was being restored, and it also awarded the difference between the reasonable market value of the house just before and just after the fire.
In its analysis, the court noted that Texas case law was “surprisingly meager” on the question of whether a person whose house had been totally destroyed by fire could be awarded both the lost market value of the house and also interest on the market value from the date of the loss to the date of trial. It concluded that there was “no suggestion” in any of the cases it had found that allowing the interest in cases in which the home had been totally destroyed (as opposed to partially destroyed) was improper.
The court then discussed the case of Lone Star Gas Co. v. Hutton, stating that other than that case, it knew of no case clearly supporting the proposition that a plaintiff may not recover compensation for loss of use for “a house or building tor-tiously destroyed in its entirety.” It stated that “it seems difficult to say that loss of use may not be compensated when the damage amounts to nine tenths of the value of the house, but will be, if it amounts to, say five tenths or six tenths.”
The court stated that in Lone Star Gas, the court had held that the plaintiff could not recover for permanent injury to land and also recover additional sums for loss of crops or lost rental value that would have accrued the next year. The court noted, however, that Lone Star Gas did not discuss whether the recovery of interest would have been allowed.
The court then recognized that in the case before it, unlike in Lone Star Gas, the question was whether loss of use damages could be recovered, not interest. It determined that there was no precedent in Texas on that question. It then made this determination:
Quite possibly the rule allowing interest intends to treat the latter as a substitute for loss of use pending the trial, though one can imagine cases in which it would seem inadequate. The difference between interest and rental value is not as great as it seems, because damages for lost use should in justice be defined to include a charge against the plaintiff of the equivalent of depreciation during the same period. Influenced considerably by the early Texas decisions previously referred to, we conclude that respondents are entitled to interest at the legal rate on the award [for lost market value] from the date of the fire to the date of judgment of the trial court, and that such interest should have been allowed instead of damages for lost use based on rental value.
Thus, although the court had earlier in the opinion stated that it was “difficult to say” that loss of use damages could be awarded for property partially, destroyed but not for property totally destroyed, it nevertheless set out the rule that interest may be recovered as an element of the measure of damages when property is totally destroyed, but loss of use damages may not be.
Subsequent Texas cases have noted that the reason that loss of use damages may not be awarded in total destruction cases is “because such damages are included as a part of the award for total loss viz: the difference in the market value immediately before and immediately after the injury.” These cases are in line with Lone Star Gas, in which the court stated that “[a] recovery for permanent injury [to land] would include also the rental value,” and “[t]o permit a recovery of the market and rental value in one case would permit a double recovery for the same damages.” Whether the market value includes an award for loss of use or whether it is the interest on the market value that substitutes for loss of use damages, in either case, awarding separate, additional compensation for loss of use damages would result in a double recovery. The rule in Texas, then, is based on the goal of avoiding double recovery for the plaintiff.
Along that same line of reasoning, Texas courts have also stated that the reason for treating repairable property and destroyed property cases differently is that in the case of total destruction, the owner can and will replace the property immediately and therefore suffers no loss of use. Thus, in Texas, we justify this rule by drawing a distinction between what we assume a person will do if the property is destroyed versus what we assume a person will do if the property can be repaired. If a person’s vehicle is totally destroyed, then rather than repairing it, the owner will replace it, and therefore the owner will not be deprived of the use of a vehicle. If, on the other hand, the vehicle must be repaired, the owners will be without the vehicle during the repair time. These assumptions also support the idea that allowing loss of use damages for totally destroyed property would give the property owner compensation in excess of the owner’s damages.
When insurance is involved, the situation changes somewhat but, in theory, not enough to merit a different rule. An insurer may declare a vehicle to be a “total loss” when it would not be absolutely impossible to repair it, but the damages are so extensive that repair would not be economically feasible. If it is not economically reasonable to pay the cost of repairs, the insurer will declare the vehicle to be a total loss. A totally destroyed vehicle compared to a total loss vehicle is essentially a distinction without a difference—in either case, the owner can replace the vehicle rather than waiting on repairs. And if the owner can afford to replace the vehicle while waiting for payment from the insurer, the owner can replace the vehicle as quickly as the owner can find a vehicle to buy. Because the vehicle will be replaced rather than repaired, the owner theoretically suffers no loss of use.
But when a vehicle is repairable and has not been declared a total loss, the owner must do without the vehicle while repairs are made. Likewise, if the owner does not have the financial resources to replace a totaled vehicle immediately, the owner must wait for payment of the insurance proceeds. The owner thus has some delay in that case, even if the vehicle is a total loss, because the owner must wait for the insurer to pay the claim. But in that case, the waiting stops with the claim’s payment, at which point the owner may replace the vehicle. When the vehicle is not totally destroyed and is not a total loss, on the other hand, the owner must continue to wait while the vehicle is repaired. Thus even if the claim is paid immediately, the owner will be without the vehicle during the repair period. The law provides compensation for that inconvenience in the form of loss of use damages.
Continued Validity of the Rule
We have found no Texas tort cases declining to follow the general rule that loss of use damages are not recoverable when property is totally destroyed. We have found only one court that has suggested that the rule ought not always be strictly applied, and even that court has not yet addressed the question directly. In Reinarz v. Griner, the Austin Court of Appeals held that it was an open question as to whether the Supreme Court would allow recovery for loss of use of totally destroyed property in special circumstances. Then in Mondragon v. Austin, on which Campbell relies, the Austin court took a step further and questioned the continued validity of the rule.
The Mondragon court acknowledged the general rule of disallowing loss of use damages for property that is totally destroyed. But in dicta, the court noted the apparent inequity in the arbitrary distinction between situations in which the property can be repaired and those in which it cannot. It noted the legal assumption we stated above—that when a vehicle is a total loss, “[c]ourts assume that the car can be replaced immediately,” whereas when a car is repairable, the car cannot be repaired immediately. The court stated that a person whose car must be repaired rather than replaced thus suffers both damage to the car itself and the loss of the car’s use, and the value of that loss of the car’s use does not necessarily correlate to the value of the car. The court then made the common sense observation that “even a person whose car is totally destroyed might suffer loss of use damages, because it may be difficult or impossible to replace the car immediately.” Recognizing that fact, the court stated that “the better policy might be to reconsider permitting loss of use damages in total destruction cases.” But because the property in Mondragon had not been totally destroyed, the court did not in that case need to decide whether to adopt a new rule.
We agree with the Mondragon court that we should reconsider whether we should permit loss of use damages in total destruction cases. To that end, we look to cases in other jurisdictions that have considered the question, and we discuss just a few of those cases here.
In Fukida v. Hon/Hawaii Service & Repair, the Supreme Court of Hawaii discussed the same rule in other states. The court concluded that “[a] person whose vehicle is completely destroyed suffers an indistinguishable inconvenience, during the reasonable period of time necessary to obtain a replacement vehicle, from that borne by a person, whose vehicle is only partially damaged, while he or she awaits the completion of repairs.” It held that “where a person is deprived of the use of his or her property due to the tortious conduct of another, he or she may recover ‘loss of use’ damages,” with the limitation that such damages are “as a general matter, limited to the period of time reasonably necessary to obtain a replacement (if the property is completely destroyed or cannot be returned by repair to its previous condition), [or] to effect repairs (if the property is merely damaged but reparable).”
In Bartlett v. Garrett, a district court in New Jersey reached a similar conclusion to the Fukida court, stating that “[w]hen an automobile is damaged through the negligence of another, temporary loss of the use of such vehicle pending repair or replacement is a reasonably foreseeable consequence of the defendant’s tortious conduct,” that the economic damages from the loss of the vehicle’s use are an injury “different in [k]ind from [property damage,” and that “[a] plaintiff in a total destruction case deprived of his reasonable loss-of-use expenses has simply not been made whole.” The court concluded that “fflt would be illogical and unjust to make recovery of this component of economic loss depend upon the extent of property damage to the vehicle.”
In Long v. McAllister, discussed in Fuk-ida, the Supreme Court of Iowa discussed the viability of the rule in that state, doing so “against the background that the principle underlying allowance of damages is that of compensation, the ultimate purpose being to place the injured party in as favorable a position as though no wrong had been committed.” The court observed that in that state, damages to personal property were limited to the market value of the property, including loss of use damages in cases in which the property could be repaired, and therefore in cases in which the property was totally destroyed, loss of use damages were not recoverable. Discussing the reasoning behind the rule, the court stated,
Inherent in our present rules governing damages to motor vehicles is the concept that the market value of the vehicle is the ceiling on recovery[,] whether the vehicle can be repaired or must be replaced. In some cases the owner will be fully compensated despite that limitation. Even when the vehicle is destroyed and delay occurs before compensation is received, interest on the market value of the vehicle from the date of the accident theoretically pays the owner for the delay.
In other cases, however, the present rules plainly do not permit full compensation. Loss of use damages will be incurred as readily when a vehicle is totally destroyed or when it cannot be restored by repair to its prior condition as when the vehicle can be restored by repair. Just as loss of use damages are necessary for full compensation when the vehicle can be restored to its prior condition, they are warranted when the vehicle is destroyed or cannot be so restored. No logical basis exists for cutting them off when the total reaches the vehicle’s market value before the injury.
The court cited Bartlett for its pinpointing of “[t]he fallacy in the market value ceiling upon recovery in a destruction case.” The court went on to note that “[t]he origin of the market value limitation lies in history rather than logic” in that damages in such cases “were based on analogy to conversion,” and the distinction of the damages available in the two situations perhaps “became important only with the advent of the motor vehicle and the practice of motor vehicle leasing and rental.” The court observed that “[l]oss of use damages are now permitted under various rules even in destruction cases in a growing number of other jurisdictions,” and it concluded that Iowa’s rules on damages relating to motor vehicles “should be modified to permit full compensation including loss of use damages.”
In Texas, we hold to the view that a party “shall be compensated for the injury done.” Texas courts have therefore allowed recovery of damages in excess of the market value of personal property, but only when the property can be repaired rather than when property must be replaced. Thus, in some cases we acknowledge that the recovery of the market value of property does not make the plaintiff whole.
The Supreme Court of California has addressed this issue, stating that “[t]here appears to be no logical or practical reason why a distinction should be drawn between cases in which the property is totally destroyed and those in which it has been injured but is repairable.” The court there held that “when the owner of a negligently destroyed ... vehicle has suffered injury by being deprived of the use of the vehicle during the period required for replacement, he is entitled ... to recover for loss of use.”
The Supreme Court of Nebraska discussed the reasoning behind not allowing loss of use damages in total-destruction cases. It included a lengthy excerpt from a treatise on the law of remedies addressing the issue, which suggested three arguments for the rule:
Loss of use claims are most commonly asserted for a period of time when the chattel is being repaired, but sometimes the chattel is destroyed and is not repairable. In such cases, loss of use claims are sometimes asserted for the period required to replace the chattel. A number of courts have refused to permit loss of use awards in cases of total destruction, and have limited recovery in such cases to the value of the article.
[1] Destruction, of course, was closely analogous to a conversion, where the measure of damages was the value of the chattel at the time of conversion, and it was natural enough to import the conversion measure into the destruction situation. There was probably some thought that the market value of the chattel—which reflected the right to use it gainfully—plus interest for the time the owner was deprived of it, actually furnished full compensation.
[2] Another argument made against granting loss of use where there was total destruction sounds rather strange in modern ears. The authors of Sedg-wick on Damages argued that when compensation for the whole value of the property destroyed is sought, “it is upon the theory that the plaintiffs entire interest in the property ceased at the time of the injury, and was replaced by a right to have the value of the property in money. Since, therefore, the plaintiff no longer has title to the property, he can no longer claim that he might make a future gain from it[.]” Such an argument probably would not be accepted, or even thought of, today. It is a conceptual argument that does not interest itself in whether the owner has actually lost something of value beyond the market value of his property; it interests itself only in a legal concept—passage of title—that is not a part of the real world of facts and has no significant relation to important facts of actual loss.
[3] A third argument against granting loss of use recovery where a chattel is totally destroyed is that to grant such recoveries opens the door to speculation. This argument, if acceptable, would seem to apply equally to any loss of use claim, whether there was destruction or merely damage. But the argument does not seem acceptable, because there is no essential reason why loss of use claims must be speculative. There is nothing speculative about the cost of a rental car for a specified time while the damaged vehicle is being repaired, nor is there anything speculative about the cost of a rental car for a specified time while a destroyed vehicle is being replaced.
The Nebraska court re-examined the application of the rule in that state and concluded that in some cases, the rule plainly did not permit full compensation. It thus held that “[l]oss of use damages will be incurred as readily when a vehicle is totally destroyed or when it cannot be restored by repair to its prior condition as when the vehicle can be restored by repair,” and therefore “[j]ust as loss of use damages are necessary for full compensation when the vehicle can be restored to its prior condition, they are warranted when the vehicle is destroyed or cannot be so restored,” and “[n]o logical basis exists for cutting them off when the total reaches the vehicle’s market value before the injury.”
More recently, the Supreme Court of Alaska addressed the question in Alaska Construction Equipment, Inc. v. Star Trucking, Inc., in a case of first impression in that state. That court also discussed the history behind the rule, explaining,
What should be the rule for loss of use damages in cases involving the total destruction of a chattel? We begin by noting that the general trend in other jurisdictions has been to allow loss of use damages in these cases. Similarly, it has been noted that traditional limitations on this kind of recovery were based on a questionable analogy between total destruction loss of use claims and historical trover or conversion claims. Earlier decisions assumed that the owner of the property would be fully compensated for its injury by receiving the market value of the destroyed chattel, making additional loss of use recovery excessive. Jurisdictions permitting loss of use damages in cases of total destruction have rejected this analogy, and its market-value ceiling on recovery, as a “fallacy.”
The court held that there is “no compelling reason to treat loss of use claims differently where the chattel is totally destroyed as opposed to only partially damaged.” As such, when property is totally destroyed, “loss of use damages should be permitted for the period of time that is reasonably required to obtain a suitable replacement for the property.”
The court also held, however, that a plaintiff may not recover both loss of use damages and prejudgment interest on the value of the property. The court reasoned that the interest “adequately compensates the owner of damaged property for economic loss for the period of time between the accident and the later award of the property’s value.” This reasoning appears to comport with the reasoning in earlier Texas cases for not allowing a person whose property was destroyed to recover both loss of use damages and prejudgment interest.
In Texas, however, interest is allowed as part of the damages both when property is destroyed and when it is repairable. That interest is part of the damages when property is repairable—and therefore when loss of use damages are available— belies the theory that awarding interest is an adequate substitute for loss of use damages, as suggested in King. If interest is an adequate substitute for loss of use, then we would not allow it to be awarded in cases in which the property is repairable and loss of use damages are available. We agree with the reasoning of the courts concluding that there is no compelling or logical reason to treat loss of use claims differently in destroyed property cases than we do in repairable property cases.
We need not, however, go so far as to hold that loss of use damages are available in every case of destroyed property. Even were we to declare that the rule no longer has validity in Texas, loss of use damages would not be available to a plaintiff who could replace the property immediately, if only because the plaintiff generally could not show any loss of use attributable to the defendant’s actions. And in this case, we are not called to decide whether loss of use damages should be available in all cases when property has been totally destroyed. We address the limited question of whether such damages should be available when an insurer unreasonably delays paying a claim. We answer that question in the affirmative: loss of use damages should be available when the claimant under an insurance policy cannot replace destroyed property because of the insurer’s unreasonable delay in paying the claim.
In a ease in which an insurer unreasonably delays paying the claim for a vehicle’s total loss, the insurer’s unreasonable action causes the owner of the destroyed property to be unable to immediately replace the vehicle and, consequently, to suffer the loss of the use of a vehicle. This is so because even if the property owner does not have the independent financial means to immediately replace the vehicle on his or her own, when the owner has a valid claim under an insurance policy, the owner would be able to replace the vehicle immediately upon the claim’s prompt payment. Thus, when an insurance policy covers the claim, it is only the insurer’s unreasonable delay that causes the harm. Because the owner cannot replace the vehicle as quickly as the owner would be able to with a prompt claim payment, the owner suffers both property damage (in the form of the loss of the car’s fair market value) as well as loss of the car’s use. A plaintiff in an unreasonable-delay case who recovers both the fair market value for the property and loss of use damages is not being awarded a double recovery, and a plaintiff in such a case who is not allowed loss of use damages is simply not being made whole. Thus, the rationale behind the general rule in Texas has no application to such cases.
Accordingly, we hold that when an insurer unreasonably delays payment on a total loss, the claimant may recover both the fair market value of the vehicle and reasonable loss of use damages. Thus, if Insurer unreasonably delayed paying Campbell’s claim, he may recover loss of use damages. We agree with the Austin court that in assessing loss of use damages, the defendant “takes his plaintiff as he finds him” and that courts are required “to consider the particular circumstances of the plaintiff and the facts of each case.” We overrule Morrison’s sole issue on appeal.
Conclusion
Having overruled Morrison’s issue on appeal, we affirm the trial court’s order denying Morrison’s motion for summary judgment, and we remand this case to the trial court for further proceedings.
. Because this lawsuit was filed before September 1, 2011, the former civil practice and remedies code section 51.014 applies to this case rather than the amended rule; therefore, this appeal was an agreed interlocutory appeal, not a permissive interlocutory appeal requiring this court's order accepting the appeal. See Tex. Civ. Prac. & Rem. Code Ann. § 51.014(d), (0 (West Supp.2013); Act of May 24, 2011, 82nd Leg., R.S., ch. 203, §§ 6.01-.02, 2011 Tex. Sess. Law Serv. 758, 761 (setting out when the new rule applies); Act of May 25, 2005, 79th Leg., R.S., ch. 1051, §§ 1, 2, 2005 Tex. Gen. Laws 3512, 3512-13; Act of May 11, 2005, 79th Leg., R.S., ch. 97, § 5, 2005 Tex. Gen. Laws 169, 180 (setting out former rule allowing agreed appeals).
. Travelers Ins. Co. v. Joachim, 315 S.W.3d 860, 862 (Tex.2010).
. Mann Frankfort Stein & Lipp Advisors, Inc. v. Fielding, 289 S.W.3d 844, 848 (Tex.2009).
. 20801, Inc. v. Parker, 249 S.W.3d 392, 399 (Tex.2008).
. Frost Nat'l Bank v. Fernandez, 315 S.W.3d 494, 508 (Tex.2010); see Tex.R. Civ. P. 166a(b), (c).
. Hellman v. Mateo, 772 S.W.2d 64, 66 (Tex.1989).
. Tex.R. Civ. P. 166a(c); Trico Techs. Corp. v. Montiel, 949 S.W.2d 308, 310 (Tex.1997).
. Waples-Platter Co. v. Commercial Standard Ins. Co., 156 Tex. 234, 236, 294 S.W.2d 375, 376-77 (1956); see also Tex. Farm Bureau Mut. Ins. Co. v. Wilde, 385 S.W.3d 733, 737 (Tex.App.-El Paso 2012, no pet.) (stating that plaintiff whose property is totally destroyed is limited to recovery of market-value damages); Lee v. Dykes, 312 S.W.3d 191, 195 (Tex.App.-Houston [14th Dist.] 2010, no pet.) (concluding that the meaning of “reasonable cash market value” is similar to the legal definition of "fair market value”); Hartford Ins. Co. v. Jiminez, 814 S.W.2d 551, 552 (Tex.App.-Houston [1st Dist.] 1991, no writ) (stating measure of damages is "reasonable market value”).
. Hanna v. Lott 888 S.W.2d 132, 139 (Tex.App.-Tyler 1994, no writ); see also Am. Jet, Inc. v. Leyendecker, 683 S.W.2d 121, 128 (Tex.App.-San Antonio 1984, no writ); Pickett v. J.J. Willis Trucking Co., 624 S.W.2d 664, 668-69 (Tex.App.-Houston [14th Dist.] 1981, writ ref’d n.r.e.); Wright v. Gernandt, 559 S.W.2d 864, 869 (Tex.Civ.App.-Corpus Christi 1977, no writ); Riddell v. Mays, 533 S.W.2d 910, 911 (Tex.Civ.App.-Waco 1976, no writ); Carson v. Bryan, 532 S.W.2d 711, 713 (Tex.Civ. App.-Amarillo 1976, no writ); Exp. Ins. Co. v. Herrera, 426 S.W.2d 895, 901 (Tex.Civ.App.-Corpus Christi 1968); Cogbill v. Martin, 308 S.W.2d 269, 271 (Tex.Civ.App.-Waco 1957, no writ); Kansas City S. Ry. Co. v. Frederick, 276 S.W.2d 332, 334 (Tex.Civ.App.-Beaumont 1955, writ ref'd n.r.e.).
. Hanna, 888 S.W.2d at 139.
. Wright's Adm’x v. Donnell, 34 Tex. 291, 306 (1871) ("[W]hen the reason of the rule fails, the rule itself should cease. Cessante ratione legis, cessat ipsa lex."); see also Sw. Bell Tel. Co., L.P. v. Mitchell, 276 S.W.3d 443, 447 (Tex.2008) (" '[W]e adhere to our precedents for reasons of efficiency, fairness, and legitimacy’, and 'when adherence to a judicially-created rule of law no longer furthers these interests, and "the general interest will suffer less by such departure, than from a strict adherence,” we should not hesitate to depart from a prior holding.' ”) (citations omitted); Otis Eng’g Corp. v. Clark, 668 S.W.2d 307, 310 (Tex.1983) (considering whether to change rule regarding employer liability in light of “changing social standards and increasing complexities of human relationships in today’s society”).
.See Mondragon v. Austin, 954 S.W.2d 191, 196 (Tex.App.-Austin 1997, pet. denied) (stating that courts assume that no loss of use occurs when a car is a total loss); Riddell, 533 S.W.2d at 911 (loss of use damages are included in an award of market value).
. 149 Tex. 432, 436, 234 S.W.2d 403, 405 (1950).
. Id. at 404, 406.
. Id. at 405.
. Id. at 405-06.
. Id. at 406.
. 58 S.W.2d 19, 20 (Tex.Com.App.1933, holding approved).
. King, 234 S.W.2d at 406.
. Id.
. Id.
. Id.
. Id.
. Id.
. Id. at 406-07.
. Id.; see also Cavnar v. Quality Control Parking, Inc., 696 S.W.2d 549, 553 (Tex.1985) (stating that the distinction between interest as damages and interest as interest had been abolished), abrogated on other grounds by Johnson & Higgins of Tex., Inc. v. Kenneco Energy, Inc., 962 S.W.2d 507 (Tex.1998) (modifying the common law such that prejudgment interest begins to accrue on the earlier of (1) 180 days after the date a defendant receives written notice of a claim or (2) the date suit is filed).
. Riddell, 533 S.W.2d at 911; see also ANT, Inc. v. Gibson, No. 05-95-01450-CV, 1997 WL 198738, at *9 (Tex.App.-Dallas Apr. 24, 1997, writ denied) (not designated for publication) ("Loss of use damages are included as a part of the award for total loss.”); Am. Jet, 683 S.W.2d at 128.
. Lone Star Gas Co., 58 S.W.2d at 21.
. See King, 234 S.W.2d at 407 (stating that an award of interest from the date of the fire to the date of judgment should have been allowed instead of damages for lost use).
. Mondragon, 954 S.W.2d at 196.
. Id.
. Id.
. See Canal Ins. Co. v. Hopkins, 238 S.W.3d 549, 564 (Tex.App.-Tyler 2007, pet. denied) (stating that "[i]t is commonly understood that ‘totaled’ [i.e., total loss] vehicles are those for which repairs would be too costly compared to the value of the vehicle”).
.See, e.g., Luna v. N. Star Dodge Sales, Inc., 667 S.W.2d 115, 119 (Tex.1984) (considering the appellant's deceptive trade practices act claim and stating that the appellant had “suffered compensable inconvenience for loss of use of her car”).
. 401 S.W.2d 274, 275 (Tex.Civ.App.-Austin 1966, no writ).
. 954 S.W.2d at 196.
. Id.
. Id. at 196-97.
. Id. at 196.
. Id. at 196-97.
. Id. at 196.
. Id.
. Id.
. 97 Hawai’i 38, 33 P.3d 204, 209-11 (2001).
. Id. at 211.
. Id.
. 130 N.J.Super. 193, 325 A.2d 866, 867 (1974).
. Id.
. 319 N.W.2d 256, 259 (Iowa 1982) (quotation marks omitted).
. Id.
. Id. at 260 (quoting and discussing Bartlett, 325 A.2d at 867).
. Id.
. Id. at 261 (citing cases in other jurisdictions in which loss of use damages were permitted in destruction of property cases).
. Luna, 667 S.W.2d at 119; McCullough-Baroid Petroleum Serv. NL Indus. v. Sexton, 618 S.W.2d 119, 120 (Tex.Civ.App.-Corpus Christi 1981, writ ref'd n.r.e.) (stating that "[i]n assessing damages to chattels caused by negligent acts of tortfeasors, the courts of this state have always sought to provide '... fair, reasonable, and proper compensation for the injury inflicted as a proximate result of the wrongful act complained of ") (quoting Pasadena State Bank v. Isaac, 149 Tex. 47, 228 S.W.2d 127 (1950)).
. See Mondragon, 954 S.W.2d at 195-96 (holding that loss of use damages are not limited to the total value of the car as a matter of law); McCullough-Baroid, 618 S.W.2d at 120 ("We are aware of no case which holds that the amount of recovery for repairs to the chattel plus loss of use of a chattel is limited by the fair market value of the chattel prior to the negligent act which caused the damage.”).
. Reynolds v. Bank of Am. Nat’l T. & S. Ass'n, 53 Cal.2d 49, 345 P.2d 926, 927 (1959).
. Id.
. Chlopek v. Schmall, 224 Neb. 78, 86-87, 396 N.W.2d 103, 109 (1986).
. Id. at 109-10 (quoting D. Dobbs, Handbook on the Law of Remedies, § 5.11 at 384-85 (1973)) (paragraph breaks added).
. Id. at 110.
. Id.
. 128 P.3d 164, 168-69 (Alaska 2006).
. Id. (citations omitted).
. Id. at 169.
. Id.
. Id. at 170.
. Id.
. See Tex. Fin.Code Ann. § 304.102 (West 2006) ("A judgment in a wrongful death, personal injury, or property damage case earns prejudgment interest.”); West v. Carpenter, 366 S.W.2d 826, 830 (Tex.Civ.App.-Amarillo 1963, writ ref’d n.r.e.).
. See King, 234 S.W.2d at 406-07.
. Mondragon, 954 S.W.2d at 194.
|
CASELAW
|
Talk:Cosmic Requiem
Matter #1
I thought of making this page today, but I found out that someone made it ten days ago. Congatulations to the person who made this page.
Matter #2
I think I'll add an infobox.
B T C 21:34 22 October 2007 (Eastern Time Zone)
|
WIKI
|
Global Ocean Data Analysis Project
The Global Ocean Data Analysis Project (GLODAP) is a synthesis project bringing together oceanographic data, featuring two major releases as of 2018. The central goal of GLODAP is to generate a global climatology of the World Ocean's carbon cycle for use in studies of both its natural and anthropogenically-forced states. GLODAP is funded by the National Oceanic and Atmospheric Administration, the U.S. Department of Energy, and the National Science Foundation.
The first GLODAP release (v1.1) was produced from data collected during the 1990s by research cruises on the World Ocean Circulation Experiment, Joint Global Ocean Flux Study and Ocean-Atmosphere Exchange Study programmes. The second GLODAP release (v2) extended the first using data from cruises from 2000–2013. The data are available both as individual "bottle data" from sample sites, and as interpolated fields on a standard longitude, latitude, depth grid.
Dataset
The GLODAPv1.1 climatology contains analysed fields of "present day" (1990s) dissolved inorganic carbon (DIC), alkalinity, carbon-14 (14C), CFC-11 and CFC-12.[1] The fields consist of three-dimensional, objectively-analysed global grids at 1° horizontal resolution, interpolated onto 33 standardised vertical intervals[2] from the surface (0 m) to the abyssal seafloor (5500 m). In terms of temporal resolution, the relative scarcity of the source data mean that, unlike the World Ocean Atlas, averaged fields are only produced for the annual time-scale. The GLODAP climatology is missing data in certain oceanic provinces including the Arctic Ocean, the Caribbean Sea, the Mediterranean Sea and Maritime Southeast Asia.
Additionally, analysis has attempted to separate natural from anthropogenic DIC, to produce fields of pre-industrial (18th century) DIC and "present day" anthropogenic CO2. This separation allows estimation of the magnitude of the ocean sink for anthropogenic CO2, and is important for studies of phenomena such as ocean acidification.[3][4] However, as anthropogenic DIC is chemically and physically identical to natural DIC, this separation is difficult. GLODAP used a mathematical technique known as C* (C-star)[5] to deconvolute anthropogenic from natural DIC (there are a number of alternative methods). This uses information about ocean biogeochemistry and CO2 surface disequilibrium together with other ocean tracers including carbon-14, CFC-11 and CFC-12 (which indicate water mass age) to try to separate out natural CO2 from that added during the ongoing anthropogenic transient. The technique is not straightforward and has associated errors, although it is gradually being refined to improve it. Its findings are generally supported by independent predictions made by dynamic models.[3][6]
The GLODAPv2 climatology largely repeats the earlier format, but makes use of the large number of observations of the ocean's carbon cycle made over the intervening period (2000–2013).[7][8] The analysed "present-day" fields in the resulting dataset are normalised to year 2002. Anthropogenic carbon was estimated in GLODAPv2 using a "transit-time distribution" (TTD) method (an approach using a Green's function).[9][8] In addition to updated fields of DIC (total and anthropogenic) and alkalinity, GLODAPv2 includes fields of seawater pH and calcium carbonate saturation state (Ω; omega). The latter is a non-dimensional number calculated by dividing the local carbonate ion concentration by the ambient saturation concentration for calcium carbonate (for the biomineral polymorphs calcite and aragonite), and relates to an oceanographic property, the carbonate compensation depth. Values of this below 1 indicate undersaturation, and potential dissolution, while values above 1 indicate supersaturation, and relative stability.
The following panels show sea surface concentrations of fields prepared by GLODAPv1.1. The "pre-industrial" is the 18th century, while "present-day" is approximately the 1990s.
The following panels show sea surface concentrations of fields prepared by GLODAPv2. The "pre-industrial" is the 18th century, while "present-day" is normalised to 2002. Note that these properties are shown in mass units (per kilogram of seawater) rather than the volume units (per cubic metre of seawater) used in the GLODAPv1.1 panels.
See also
References
1. Key, R.M., Kozyr, A., Sabine, C.L., Lee, K., Wanninkhof, R., Bullister, J., Feely, R.A., Millero, F., Mordy, C. and Peng, T.-H. (2004). A global ocean carbon climatology: Results from GLODAP. Global Biogeochemical Cycles 18, GB4031
2. Standardised intervals are at 0, 10, 20, 30, 50, 75, 100, 125, 150, 200, 250, 300, 400, 500, 600, 700, 800, 900, 1000, 1100, 1200, 1300, 1400, 1500, 1750, 2000, 2500, 3000, 3500, 4000, 4500, 5000, 5500 m
3. Orr, J. C. et al. (2005). Anthropogenic ocean acidification over the twenty-first century and its impact on calcifying organisms. Archived June 25, 2008, at the Wayback Machine Nature 437, 681–686
4. Raven, J. A. et al. (2005). Ocean acidification due to increasing atmospheric carbon dioxide. Royal Society, London, UK
5. Gruber, N., Sarmiento, J.L. and Stocker, T.F. (1996). An improved method for detecting anthropogenic CO2 in the oceans, Global Biogeochemical Cycles 10:809– 837
6. Matsumoto, K.; Gruber, N. (2005). "How accurate is the estimation of anthropogenic carbon in the ocean? An evaluation of the DC* method". Global Biogeochem. Cycles. 19. Bibcode:2005GBioC..19.3014M. doi:10.1029/2004GB002397.
7. Olsen, A.; Key, R.M.; van Heuven, S.; Lauvset, S.K.; Velo, A.; Lin, X.; Schirnick, C.; Kozyr, A.; Tanhua, T.; Hoppema, M.; Jutterström, S.; Steinfeldt, R.; Jeansson, E.; Ishii, M.; Pérez, F.F.; Suzuki, T. (2016). "The Global Ocean Data Analysis Project version 2 (GLODAPv2) – an internally consistent data product for the world ocean". Earth System Science Data. 8 (2): 297–323. Bibcode:2016ESSD....8..297O. doi:10.5194/essd-8-297-2016.
8. Lauvset, S.K.; Key, R.M.; Olsen, A.; van Heuven, S.; Velo, A.; Lin, X.; Schirnick, C.; Kozyr, A.; Tanhua, T.; Hoppema, M.; Jutterström, S.; Steinfeldt, R.; Jeansson, E.; Ishii, M.; Pérez, F.F.; Suzuki, T.; Watelet, S. (2016). "A new global interior ocean mapped climatology: the 1° × 1° GLODAP version 2". Earth System Science Data. 8: 325–340. Bibcode:2016ESSD....8..325L. doi:10.5194/essd-8-325-2016.
9. Waugh, D.W.; Hall, T.M.; McNeil, B.I.; Key, R.; Matear, R.J. (2006). "Anthropogenic CO
2
in the oceans estimated using transit-time distributions". Tellus. 58B: 376–390. Bibcode:2006TellB..58..376W. doi:10.1111/j.1600-0889.2006.00222.x.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.
|
ESSENTIALAI-STEM
|
John Lillywhite
John Lillywhite (10 November 1826 – 27 October 1874) was an English cricketer and umpire during the game's roundarm era.
John Lillywhite was part of a famous cricketing family, with his father, William Lillywhite, brother, Fred Lillywhite, and cousin, James Lillywhite all playing the sport. In 1863, members of the family established the sports outfitters Lillywhites.
Lillywhite was an all-rounder who batted right-handed and bowled right-arm roundarm, both slow and fast. He played between 1848 and 1873, taking 223 wickets in 185 matches at a bowling average of 11.56 and a best analysis of 8/54. He took five wickets in an innings 12 times and 10 wickets in a match twice. He scored 5,127 runs at a batting average of 17.43 with a highest score of 138 and two centuries. He took 94 catches.
At the end of the 1859 English cricket season, Lillywhite was one of the 12 players who took part in cricket's first overseas tour when an English team led by George Parr visited North America.
From 1856 to 1873, Lillywhite umpired in 29 first-class matches. In 1862, during an All-England Eleven v. Surrey match at The Oval, Lillywhite no-balled Edgar Willsher six times in succession for what he deemed to be illegal "high" deliveries. Willsher and the majority of his All-England teammates protested and abandoned the match, and Lillywhite was replaced the following day. The incident provoked much discussion and resulted in the laws of cricket being change to allow overarm bowling from the beginning of the 1864 season.
He also competed in Cornish wrestling tournaments in the mid-1800s. He died aged 47, after a lingering illness, at his residence in Seymour Street, Euston Square, on Tuesday 27 October 1874, and was buried at Highgate Cemetery on 31 October 1874.
|
WIKI
|
Run an Image With a Mutable Configuration
This section describes how to add a basic route to your local IG configuration folder, and mount the configuration to the Docker container.
If you change your configuration in a way that doesn't require IG to restart, you see the change in your running Docker image without restarting it or rebuilding it. For information about configuration changes that require restart, see "Changing the Configuration and Restarting IG".
Use this procedure to manage configuration externally to the Docker image. For example, use it when you are developing routes.
1. Add the following route to your local IG configuration as $HOME/.openig/config/routes/hello.json:
{
"name": "hello",
"handler": {
"type": "StaticResponseHandler",
"config": {
"status": 200,
"reason": "OK",
"headers": {
"Content-Type": [ "text/plain" ]
},
"entity": "Hello world!"
}
},
"condition": "${matches(request.uri.path, '^/hello')}"
}
The configuration contains a static response handler to return a "Hello world!" statement when the URI of a request finishes with /hello.
2. Run the Docker image, using the option to mount the local IG configuration directory:
$ docker run -p 8080:8080 -v $HOME/.openig:/var/ig/ ig-image
3. Go to http://localhost:8080/hello to access the route in the mounted configuration.
The "Hello world!" statement is displayed.
4. Edit hello.json to change the "Hello world!" statement, and save the file.
Go again to http://localhost:8080/hello to see that the message changed without changing your Docker image.
Read a different version of :
|
ESSENTIALAI-STEM
|
Mathematical Methods for Engineers II
Main Topics of Mathematical Methods of Engineers I
* Applied Linear Algebra
* Discrete equations
* Matrices
* Ordinary and Partial Differential Equations and Boundary Values
* Fourier
Main Topics of Mathematical Methods of Engineers II
* Differential equations with initial values
* Heat Equation
* Nonlinear Equations
* Large Linear Systems
* How to solve
* Direct methods
* Renumbering nodes
* Elimination methods
* Iterative methods
* Modern computing
* Optimization and Minimization
* Linear program
Lectures
Lecture 1: Difference Methods for Ordinary Differential Equations
|
WIKI
|
Quantum computing
Welcome to Quantum Computing!
Quantum Computing is an important tool for code breakers. Hence the pioneers in this topic have often worked for organisations like the National Security Agency in the USA, GCHQ in the UK. These two organisations collaborate with Echelon
Discussion questions
* How might quantum computing impact computer science?
* What applications does quantum computing have?
Learning paths and materials
* School:Computer science
* Portal:Quantum computing - plan additional learning resources for quantum computing.
* Portal:Particle physics
* Study guide:Quantum mechanics I
* Making sense of quantum mechanics
* Quantum theory of the atom
Wikipedia
* Quantum computing
* Quantum programming
* Kane quantum computer
* Quantum cognition
* Quantum gate
* Timeline of quantum computing
* Quantum complexity theory
|
WIKI
|
Cloud Networking Fundamentals: Establishing Connectivity and Security
**Cloud Networking Essentials: Connecting Resources Across Environments**
Cloud networking plays a pivotal role in enabling seamless connectivity and communication within and across cloud environments. It provides the foundation for accessing resources, sharing data, and ensuring secure and reliable network operations.
One of the key aspects of cloud networking is virtual private clouds (VPCs). VPCs are isolated network segments within a cloud provider’s infrastructure that allow users to create and manage their own private networks. VPCs provide a secure and controlled environment for deploying resources, such as virtual machines, containers, and databases.
To connect resources across VPCs, cloud providers offer virtual private gateways (VGWs). VGWs act as gateways between VPCs, allowing traffic to flow securely between them. Additionally, cloud providers provide peering connections, which enable direct connectivity between VPCs without the need for a VGW.
Another essential component of cloud networking is load balancing. Load balancers distribute incoming traffic across multiple servers or instances, ensuring high availability and scalability. Cloud providers offer various types of load balancers, including application load balancers, network load balancers, and global load balancers.
Security is paramount in cloud networking. Cloud providers implement robust security measures, such as firewalls, intrusion detection systems, and access control lists (ACLs), to protect networks from unauthorized access and malicious attacks. Additionally, cloud providers offer security groups, which allow users to define granular access rules for their resources.
Cloud networking also enables hybrid connectivity, allowing organizations to connect their on-premises networks to cloud environments. Hybrid connectivity solutions, such as VPNs and direct connect services, provide secure and reliable connections between on-premises and cloud resources.
Furthermore, cloud networking supports multi-cloud connectivity, enabling organizations to connect resources across multiple cloud providers. Multi-cloud connectivity solutions, such as cloud interconnect services, provide seamless and secure connections between different cloud environments.
In conclusion, cloud networking is essential for establishing connectivity and security across cloud environments. By leveraging VPCs, VGWs, load balancers, and security measures, organizations can create scalable, secure, and reliable networks that support their cloud-based applications and services. Additionally, cloud networking enables hybrid and multi-cloud connectivity, providing organizations with the flexibility and agility to meet their evolving business needs.
Interconnecting Cloud and On-Premises Environments: Hybrid Networking Strategies
**Cloud Networking Essentials: Connecting Resources Across Environments**
Cloud networking plays a pivotal role in enabling seamless connectivity between resources distributed across cloud and on-premises environments. By leveraging cloud networking services, organizations can extend their networks to the cloud, enabling secure and efficient access to applications, data, and services.
One of the key benefits of cloud networking is its ability to provide a unified network fabric that spans multiple environments. This allows organizations to manage their network infrastructure centrally, regardless of where their resources are located. Cloud networking services offer a range of features, including virtual private clouds (VPCs), virtual routers, and firewalls, which provide secure and flexible network connectivity.
VPCs are isolated virtual networks within the cloud that provide a secure and private environment for resources. They can be configured to connect to on-premises networks using VPNs or direct connect services. Virtual routers and firewalls provide network segmentation and security, allowing organizations to control access to resources and protect against unauthorized access.
Cloud networking also enables hybrid networking strategies, which combine cloud and on-premises resources to create a cohesive IT environment. Hybrid networking allows organizations to leverage the benefits of the cloud while maintaining control over their on-premises infrastructure. By connecting cloud and on-premises networks, organizations can seamlessly integrate applications, data, and services, regardless of their location.
To implement cloud networking effectively, organizations should consider the following best practices:
* **Define network requirements:** Clearly define the network requirements for cloud and on-premises resources, including security, performance, and availability.
* **Choose the right cloud networking services:** Select cloud networking services that meet the specific requirements of the organization, considering factors such as scalability, security, and cost.
* **Implement a hybrid networking strategy:** Develop a hybrid networking strategy that aligns with the organization’s business objectives and IT roadmap.
* **Monitor and manage the network:** Continuously monitor and manage the network to ensure optimal performance, security, and compliance.
By following these best practices, organizations can effectively implement cloud networking to connect resources across environments, enabling seamless connectivity, enhanced security, and improved operational efficiency. Cloud networking is an essential component of modern IT infrastructure, providing organizations with the flexibility and scalability to meet the demands of the digital age.
Optimizing Cloud Network Performance: Techniques for Scalability and Reliability
**Cloud Networking Essentials: Connecting Resources Across Environments**
Cloud networking plays a pivotal role in enabling seamless connectivity and communication between resources distributed across multiple cloud environments. By leveraging virtual networks, organizations can establish secure and scalable network infrastructures that facilitate efficient data transfer and application performance.
One of the key aspects of cloud networking is the ability to connect resources across different cloud providers. This interconnectivity allows organizations to leverage the strengths of multiple cloud platforms and optimize their IT infrastructure. By utilizing cloud interconnect services, organizations can establish private and secure connections between their on-premises networks and cloud environments, ensuring seamless data exchange and application integration.
Another essential aspect of cloud networking is the implementation of network segmentation. By dividing the network into smaller, isolated segments, organizations can enhance security and improve network performance. Network segmentation helps prevent the spread of malicious activity and ensures that critical resources are protected from unauthorized access.
To ensure optimal cloud network performance, organizations should adopt a scalable and reliable network architecture. This involves implementing load balancing techniques to distribute traffic across multiple servers, ensuring high availability and preventing bottlenecks. Additionally, organizations should leverage network monitoring tools to proactively identify and resolve network issues, minimizing downtime and maintaining network stability.
Furthermore, organizations should consider implementing network automation to streamline network management tasks. By automating network configuration, provisioning, and monitoring, organizations can reduce operational costs, improve efficiency, and enhance network security. Network automation tools can also help organizations quickly adapt to changing network requirements and ensure consistent network performance.
In conclusion, cloud networking is essential for connecting resources across multiple cloud environments and ensuring optimal network performance. By leveraging virtual networks, interconnecting cloud providers, implementing network segmentation, adopting scalable and reliable network architectures, and utilizing network automation, organizations can establish robust and efficient cloud networking infrastructures that support their business objectives and drive innovation.
|
ESSENTIALAI-STEM
|
Dehuiyeh, Khir
Dehuiyeh (, also Romanized as Dehū‘īyeh, Dehūyeh, and Dehvieh; also known as Dehū and Qal‘eh-ye Dohū) is a village in Khir Rural District, Runiz District, Estahban County, Fars Province, Iran. At the 2006 census, its population was 102, in 26 families.
|
WIKI
|
570
What Not To Do To Improve Overactive Bladder Symptoms
As you actively work to improve overactive bladder symptoms, ensure that you are not doing any of these things to worsen them.
Having OAB or overactive bladder is an embarrassing situation for many people. The prospect of talking about a problem that is considered a private one is not something people look forward to. This is one of the reasons why many people with overactive bladder symptoms find it difficult to actually seek help from health professionals. Unfortunately, when your condition forces you to constantly look for restrooms when you are out of home, and makes road trips a scary prospect, it is important for you to do something about it.
Overactive bladder symptoms can reduce your quality of life to quite an extent. While there are some things that are recommended for you to do in order to improve your overactive bladder symptoms, not many people tell you what not to do. There are certain things that you may be doing right now that are actively worsening your overactive bladder symptoms without your knowledge. Here’s what not to do if you want to see an improvement in overactive bladder symptoms.
Do Not Give In Immediately
Someone with overactive bladder symptoms is constantly wondering if they need to go to the bathroom, whether it would be a good idea to go now since a bathroom is visible, etc. Road trips and impromptu holidays are a strict no-no unless you know where and how many times you can stop for a bathroom break. It sounds like a solid policy then, to rush to the bathroom as soon as you feel the urge to go, right? Research does not agree.
Physicians say that a better way to manage overactive bladder symptoms is to practice holding in your urine for a while before giving in to the urge. This will enable you to have better control over your bladder spasms, while also serving to strengthen the muscles of your pelvic floor. The process of improving overactive bladder symptoms starts by retraining your bladder to complete its function properly. Set a schedule for yourself, hold on to the feeling of wanting to take a leak immediately, and go every hour or two on the clock as per your time-table.
Do Not Give Up on Pelvic Muscle Exercises
OAB is a chronic condition, such that it may never be completely treated. However, effective management of overactive bladder symptoms is possible, and should be done. One of the best ways to do this is to ensure that you are doing your pelvic floor muscle exercises daily every single day. These exercises are not like a fad diet or exercise routine that you can stop doing whenever you please. If you give up on these exercises, chances are high that your overactive bladder symptoms will return in full measure. Do not give up on pelvic floor muscle exercises such as Kegels, if you want to improve your overactive bladder symptoms.
Do Not Get Lured in By Stimulators
While there are a number of foods and drinks that worsen your overactive bladder symptoms, they may differ in different people. However, there are a couple of drinks that act as almost universal stimulators of overactive bladder symptoms. These include alcohol and beverages with caffeine in it. Alcohol is a known bladder stimulator. For people with overactive bladder symptoms, the nights are not exactly comfortable, as you may have to keep getting up to go to the bathroom. Alcohol makes this problem even worse by causing your body to create more urine.
The second stimulator is coffee and caffeine drinks. Studies show that reduing your coffee intake to just one cup a day can significantly improve your overactive bladder symptoms. In both cases, it is a better idea to go cold turkey to see exactly how much the drinks have been worsening your overactive bladder symptoms. You can then decide if you want to give them up for good, or add small quantities to your routine.
Furthermore, there are some medications that actually cause and worsen overactive bladder symptoms. These include water pills, NSAIDs, estrogen pills, allergy medication, antidepressants, etc. Do not stop taking any medication without your doctor’s express approval. Check with your physician about dosages and alternative medications if you feel like your pills are affecting your overactive bladder symptoms adversely.
About TheLifeDigest
We at TheLifeDigest.com constantly strive to provide you with well researched articles and anecdotes, that may personally resonate with you. Our endeavor is to cover various health conditions, their causes, physical and emotional effects, symptoms and remedies. We will also focus on diet, nutrition, fitness, exercise and the other aspects of overall well being of an individual. Through the articles, we not only aim to promote awareness, but would also like to help you adopt a healthy lifestyle that includes regular physical activity and good nutrition.
|
ESSENTIALAI-STEM
|
22,463 ARTICLES
ON THIS WIKI
Smeltery Controller
Smeltery Controller
Smeltery Controller
Name Smeltery Controller
Source Mod Tinkers' Construct
ID Name
TConstruct:Smeltery
Type Block
Stackable Yes (64)
Blast Resistance 60.0
Hardness 3.0
Solid Yes
Transparent No
Affected by Gravity No
Emits Light No
Flammable No
Required Tool Wooden Pickaxe
The Smeltery Controller is a machine added by Tinkers' Construct. Made from Seared Brick, it provides the interface for the Smeltery multiblock structure.
Each smeltery must have one and only one Smeltery Controller. It can be placed anywhere but the floor of the smeltery, which must be a 3x3 grid of Seared Bricks (it's not so neccessary to always build 3x3 floor, you can build 1x1 floor if you don't have enough seared bricks, or even 5x5 floor to smelt large amounts of ore). The Smeltery Controller checks for the presence of a properly constructed smeltery, and once completed, it allows the smeltery to be accessed via a right click. From its GUI, the player can insert materials to be smelted and see how much material and Lava remains in the smeltery. The items can be loaded through pipes or Hopper
Recipe[edit]
GUI Crafting Table.png
Seared Brick
Seared Brick
Seared Brick
Seared Brick
Seared Brick
Seared Brick
Seared Brick
Seared Brick
Smeltery Controller
Usage[edit]
SmelteryGUI.png
• The left most grid is for placing smeltable items into the smeltery, such as ores or ingots. The amount of items that can be held depends on how tall (or wide) the smeltery is.
• The middle gauge shows how molten liquid is in the smeltery. Different liquids can exist in the smeltery at the same time. The taller the smeltery the greater its capacity.
• The right meter shows how much lava is currently (you can use Blazing Pyrotheum to melt ores faster) in the smeltery. If using multiple Seared Tanks it may not always calculate the available lava correctly.
|
ESSENTIALAI-STEM
|
Wikipedia:Articles for deletion/Neoism (political ideology)
The result was delete. Sandstein 20:32, 24 July 2008 (UTC)
Neoism (political ideology)
* ( [ delete] ) – (View AfD) (View log)
Cannot quite call this original research because it references a website. But I suspect that the website was created by the author of this article. Non-notable new theory. — RHaworth (Talk | contribs) 11:37, 19 July 2008 (UTC) Though perhaps not quite mainstream or entirely verifiable information, maybe this article (and its author) should be given a chance at elaboration and further explanations... Besides, what is being advocated does not sound so unfavorable or absurd anyway. —Preceding unsigned comment added by Paxari (talk • contribs) 19:23, 19 July 2008 (UTC) — Paxari (talk • contribs) has made few or no other edits outside this topic.
* Merge/Redirect – any significant points to Neoism It will fit well there. ShoesssS Talk 12:12, 19 July 2008 (UTC)
* Delete Dissagree with redirect... The name implies a disambiguation page. Fails WP:N
* Delete unless independant references indicating notability can be found. Edward321 (talk) 13:05, 19 July 2008 (UTC)
* Delete as non-notable for lack of independent sources. Don't redirect to Neoism which is something quite different. JohnCD (talk) 13:49, 19 July 2008 (UTC)
First of all, I merely contributed to the creation of the website and Neoism is NOT a theory it is an IDEOLOGY. Second of all, one of Wikipedia’s so-called editors misspelled Independent as “inpedpendant “, if this is the intellectual caliber of the individuals judging my article then I have certainly lost a lot of respect for Wikipedia.
* Delete. No reliable sources present in the article, and I can't find any myself. (To limit false positives, I searched for ; these are apparently the seven basic principles of Neoism.) Anturiaethwr Talk 20:55, 19 July 2008 (UTC)
* Note: This debate has been included in the list of Politics-related deletion discussions. -- the wub "?!" 20:50, 20 July 2008 (UTC)
|
WIKI
|
We are searching data for your request:
Upon completion, a link will appear to access the found materials.
Destined to make a fortune from the furs of the American West, John Jacob Astor is born in modest circumstances in the small German village of Waldorf.
Although the number of foreign immigrants to the U.S. who succeeded in striking it rich is often exaggerated in the popular mind, Astor’s brilliant success demonstrates that “rags to riches” stories did sometimes happen. In his home village of Waldorf, Germany, not far from the city of Heidelberg, the young Astor’s opportunities were respectable though limited. The son of the village butcher, Astor could have followed in his father’s footsteps or entered some other modest trade. Instead, when he was 16 years old, Astor left Waldorf and traveled to London to join his brother in the manufacture of musical instruments.
Eager to find new markets, the two brothers looked overseas to the newly independent United States of America. In 1793, Astor sailed for America with a shipload of flutes and little money. En route, Astor became friends with a fur dealer who persuaded him to sell his flutes in New York and use the profits to buy furs to sell upon returning to London. He did, and the sizeable profit convinced him to enter full-time into the fur trade.
Quickly learning all he could about the growing American fur trade, Astor made numerous trips to the western frontier, and by the end of the century, he had become the leading fur merchant in the United States. After the Louisiana Purchase of 1803, Astor moved aggressively to exploit this huge new territory for its furs. Although Lewis and Clark’s exploration of the territory brought back the disappointing news that there was no easy water passage across the continent to the Pacific, Astor was nonetheless convinced that a Pacific Coast operation could profitably sell its furs to the huge China market. In 1810, he created the Pacific Fur Company. Within two years, his men had established a trading post named Astoria at the mouth of the Columbia River (about sixty miles northwest of modern-day Portland).
The outbreak of the War of 1812 forced Astor to abandon Astoria to the British, effectively destroying his Pacific Fur Company, but he eventually achieved much the same end by gradually expanding his New York-based American Fur Company westward. By 1823, Astor’s firm dominated the American fur trade east of the Rockies, although the British Hudson Bay Company maintained its hold in Oregon Territory until 1845. By then, the fur trade was already going into steep decline as beaver populations were wiped out and fashion shifted to silk rather than fur hats.
Fortunately, in the 1830s, the crafty Astor had begun diversifying his business interests by purchasing huge amounts of New York real estate. Building on the profits he had made in the fur trade, Astor abandoned his interest in the western frontier altogether in 1834 and concentrated on his East Coast investments. When he died in New York City in 1848, the German butcher’s son that had arrived in the U.S. with nothing but a shipload of flutes was the wealthiest man in America. His estate was conservatively estimated at $20 million.
John Jacob Astor
- American History
- Important Historical Figures
- Key Events
- U.S. Presidents
- Native American History
- American Revolution
- America Moves Westward
- The Gilded Age
- Crimes & Disasters
- The Most Important Inventions of the Industrial Revolution
John Jacob Astor was the wealthiest man in America in the early 19th century, and when he died in 1848 his fortune was estimated to be at least $20 million, an astounding sum for the time.
Astor had arrived in America as a poor German immigrant, and his determination and business sense led him to eventually create a monopoly in the fur trade. He diversified into real estate in New York City, and his fortune increased as the city grew.
Early life Edit
Johann Jakob Astor was born in 1763 in Walldorf, near Heidelberg, in the Electoral Palatinate. He was the youngest son of Johann Jacob Astor and Maria Magdalena vom Berg. His three elder brothers were George, Henry, and Melchior. In his childhood, Johann worked in his father's butcher shop and as a dairy salesman. In 1779, at the age of 16, he moved to London to join his brother George in working for an uncle's piano and flute manufacturer, Astor & Broadwood. While there, he learned English and anglicized his name to John Jacob Astor.
Migration to the United States Edit
In 1783 or March 1784, [ citation needed ] Astor emigrated to New York City, just after the end of the Revolutionary War when the United States became independent of Great Britain. There, he rented a room from Sarah Cox Todd, a widow, and began a flirtation with his landlady's daughter, also named Sarah Cox Todd. The young couple married in 1785. His intent had been to join his brother Henry, who had established a butcher shop in New York City.
However, a chance meeting with a fur trader on his voyage had inspired him to join the North American fur trade as well. After working at his brother's shop for a time, Astor began to purchase raw hides from Native Americans, prepare them himself, and resell them in London and elsewhere at great profit. He opened his own fur goods shop in New York in the late 1780s and also served as the New York agent of his uncle's musical instrument business. After gold was discovered [ where? ] , Astor looked for business throughout the United States.
Fortune from fur trade Edit
Astor took advantage of the 1794 Jay Treaty between Great Britain and the United States, which opened new markets in Canada and the Great Lakes region. In London, Astor at once made a contract with the North West Company, who from Montreal rivaled the trade interests of the Hudson's Bay Company, then based in London. [ citation needed ]
Astor imported furs from Montreal to New York and shipped them to Europe. By 1800, he had amassed almost a quarter of a million dollars (the equivalent of six million dollars in 2020) and had become one of the leading figures in the fur trade. His agents worked throughout the western areas and were ruthless in competition. In 1800, following the example of the Empress of China, the first American trading vessel to China, Astor traded furs, teas, and sandalwood with Canton in China, and greatly benefited from it.
The U.S. Embargo Act in 1807, however, disrupted Astor's import/export business because it closed off trade with Canada. With the permission of President Thomas Jefferson, Astor established the American Fur Company on April 6, 1808. He later formed subsidiaries: the Pacific Fur Company, and the Southwest Fur Company (in which Canadians had a part), in order to control fur trading in the Great Lakes areas and Columbia River region. His Columbia River trading post at Fort Astoria (established in April 1811) was the first United States community on the Pacific coast. He financed the overland Astor Expedition in 1810–12 to reach the outpost. Members of the expedition were to discover South Pass, through which hundreds of thousands of settlers on the Oregon, Mormon, and California trails used to later pass through the Rocky Mountains.
Astor's fur trading ventures were disrupted during the War of 1812, when the British captured his trading posts. In 1816, he joined the opium-smuggling trade. His American Fur Company purchased ten tons of Ottoman-produced opium, and shipped the contraband to Canton onboard the packet ship Macedonian. Astor later left the Chinese opium trade and sold opium solely in Britain.
Astor's business rebounded in 1817 after the U.S. Congress passed a protectionist law that barred foreign fur traders from U.S. territories. The American Fur Company came to dominate trading in the area around the Great Lakes, absorbing competitors in a monopoly. John Jacob Astor had a townhouse at 233 Broadway in Manhattan and a country estate, Hellgate, in Northern New York City.
In 1822, Astor established the Robert Stuart House on Mackinac Island in Michigan as headquarters for the reorganized American Fur Company, making the island a metropolis of the fur trade. Washington Irving described this at length, based on contemporary documents, diaries, etc., in his travelogue Astoria. Astor's commercial connections extended over the entire globe, and his ships were found in every sea. He and Sarah moved to a townhouse on Prince Street in Manhattan, New York.
Real estate and retirement Edit
Astor began buying land in New York City in 1799 and acquired sizable holdings along the waterfront. After the start of the 19th century, flush with China trade profits, he became more systematic, ambitious, and calculating by investing in New York real estate. In 1803, he bought a 70-acre farm on which he built the Astor Mansion at Hellgate. The property ran west of Broadway to the Hudson River between 42nd and 46th streets. That same year, and the following year, he bought considerable holdings from the disgraced Aaron Burr.
In the 1830s, Astor foresaw that the next big boom would be the build-up of New York, which would soon emerge as one of the world's greatest cities. Astor sold his interests in the American Fur Company, as well as all his other ventures, and used the money to buy and develop large tracts of Manhattan real estate. Astor correctly predicted the city's rapid growth northward on Manhattan Island, and he purchased more and more land beyond the then-existing city limits. Astor rarely built on his land, but leased it to others for rent and their use. After retiring from his business, Astor spent the rest of his life as a patron of culture. He supported the ornithologist John James Audubon in his studies, art work, and travels, and the presidential campaign of Henry Clay, Kentucky statesman.
On September 19, 1785, Astor married Sarah Cox Todd (April 9, 1762 – August 3, 1842). Her parents were Scottish immigrants Adam Todd and Sarah Cox. Although she brought him a dowry of only $300, she possessed a frugal mind and a business judgment that he declared better than that of most merchants. She assisted him in the practical details of his business, and managed Astor's affairs when he was away from New York.
- Magdalena Astor, 1788–1832
- Sarah Todd Astor, stillborn in 1790
- John Jacob Astor Jr., 1791–1869, sickly and mentally unstable , 1792–1875
- Dorothea Astor, 1795–1874
- Henry Astor II, 1797–1799
- Eliza Astor, 1801–1838, married Vincent Rumpff
- Unnamed son, 1802, died within a few days of birth
Astor belonged to the Freemasons, a fraternal order, and served as Master of Holland Lodge #8, New York City in 1788. Later he served as Grand Treasurer for the Grand Lodge of New York. He was president of the German Society of the City of New York from 1837 to 1841.
At the time of his death in 1848, Astor was the wealthiest person in the United States, leaving an estate estimated to be worth at least $20 million, or 0.9% of estimated US GDP at the time, which would be approximately $210 billion in equivalent 2020 value. His estimated net worth would have been equivalent to approximately $649.5 million in 2021 U.S. dollars using the more simple inflation chain estimation method. By comparison, the fortune of Jeff Bezos was worth approximately $200 billion in 2020, similar to Astor at approximately 0.9% of US GDP.
In his will, Astor bequeathed $400,000 to build the Astor Library for the New York public, which was later consolidated with other libraries to form the New York Public Library. He also left $50,000 for a poorhouse and orphanage in his German hometown of Walldorf. The Astorhaus is now operated as a museum honoring Astor. It is a renowned and popular fest hall for marriages. Astor donated gifts totaling $20,000 to the German Society of the City of New York, during his term as president, from 1837 until 1841.
Astor left the bulk of his fortune to his second son William, because his eldest son, John Jr., was sickly and mentally unstable. Astor left enough money to care for John Jr. for the rest of his life. Astor is buried in Trinity Church Cemetery in Manhattan, New York. Many members of his family had joined its congregation, but Astor remained a member of the local German Reformed congregation to his death. In the short story Bartleby, the Scrivener, Herman Melville used Astor as a symbol of men who made the earliest fortunes in New York. [ citation needed ]
The pair of marble lions that sit by the entrance of the New York Public Library Main Branch at Fifth Avenue and 42nd Street were originally named Leo Astor and Leo Lenox, after Astor and James Lenox, who founded the library from his own collection. Next, they were called Lord Astor and Lady Lenox (both lions are males). Mayor Fiorello La Guardia renamed them "Patience" and "Fortitude" during the Great Depression. [ citation needed ]
The coastal town of Astoria, Oregon, is named after Astor.
In 1908, when the association football club FC Astoria Walldorf was formed in Astor's birthplace in Germany, the group added "Astoria" to its name in his, and the family's, honor.
John J. Astor 5th, 79 Son of Builder of Hotel
John Jacob Astor 5th, a descendant of one of America's most fabled merchant princes, died yesterday at his home in Miami Beach. He was 79 years old.
His death was reported by two of his cousins, R. Thornton Wilson, and Stephen Spencer, who said they did not know the cause.
Mr. Astor was born in New York in August 1912. His father was John Jacob Astor 4th, a businessman and inventor, who built the Astoria Hotel in New York City that was later combined with the hotel next door to become the Waldorf-Astoria. His mother was the former Madeline Talmage Force of New York City. She was pregnant with him when she and her husband sailed on the Titanic. Her husband put her on a lifeboat and went down with the ship on April 15, 1912.
Mr. Astor 5th, one of whose half-brothers was Vincent Astor, the New York philanthropist, attended St. George's School, in Newport, R.I. Mr. Spencer said that his cousin never worked after he was dismissed from a job he held briefly after graduating from St. George's in the early 1930's.
Mr. Astor was married three times and divorced twice. His first wife was Ellen Tuck. His second wife was Gertrude Gretch. His third wife, Sue Sandford, died several years ago, Mr. Spencer said.
Establishing the Astor Empire
Sharp, ambitious and ruthless, Astor grew his shop into the country&aposs leading fur company by the turn of the century. He also began exporting furs to China and importing Chinese silk and tea. All of his fur businesses were merged into the American Fur Company in 1808.
After the successful expedition of Lewis and Clark ended in 1806, Astor saw opportunity in the West. He bought property in Oregon where a fort was built in 1811 and a settlement named Astoria was planned. But he sold the outpost soon after because of the War of 1812 between the United States and Great Britain.
After the war, he became even richer than before from a bond deal with the U.S. government. Astor&aposs New York City property holdings also substantially increased in value. He sold off his fur business in the 1830s and focused much of time of managing his estate and extensive real estate investments, included hotels and residential properties.
Astor was born on July 13, 1864, in Rhinebeck, New York. The great-grandson of John Jacob Astor, he grew up in a rich, influential family. Known as Jack, he attended Harvard University and later managed the family estate. He became active in real estate development, building the Astoria section of the Waldorf-Astoria Hotel in 1897. Astor built several other notable New York City hotels, including the St. Regis, which some have said was his greatest achievement.
Outside of the family business, Astor had many other interests. He tried his hand at being a writer in 1890s and authored an 1894 science-fiction novel called Journey in Other Worlds. Astor also enjoyed inventing things. He designed a bicycle brake and an improved turbine engine. When the Spanish-American War began in 1898, Astor offered his yacht, the Nourmahal, to the U.S. Navy to help in the war effort. He also served in the U.S. Army during this conflict.
Astor&aposs first marriage to Ava Lowle Willing was reportedly an unhappy one. The couple married in 1891 and had two children: Vincent and Alice. They divorced in 1909. He remarried in 1911 to Madeleine Talmage Force, who was 30 years younger than Astor. The couple went on holiday to Europe for a time and made the fateful decision to return the United States on the maiden voyage of the RMS Titanic in April 1912.
Family tree of John Jacob ASTOR IV
John Jacob Astor IV was born on July 13, 1864. He was the youngest of five children and only son of businessman, collector, and race horse breeder/owner William Backhouse Astor, Jr. (1829–1892) and socialite Caroline Webster "Lina" Schermerhorn (1830–1908). His four elder sisters were Emily (1854–1881), Helen (1855–1893), Charlotte (1858–1920), and Caroline (Carrie) (1861–1948). He was a great-grandson of fur-trader John Jacob Astor (1763–1848) and Sarah Cox Todd (1761–1834), whose fortune made the Astor family one of the wealthiest families in the United States. Jack's paternal grandfather William Backhouse Astor, Sr. (1792–1875).
In April 1912, Astor earned a prominent place in history when he embarked on the ocean liner RMS Titanic, which struck an iceberg and sank in the early hours of April 15. Astor was among the 1,514 people on board who did not survive. He was the richest passenger aboard the Titanic, and was thought to be among the richest people in the world at that time, with a net worth of $85,000,000 when he died.
© Copyright Wikipédia authors - This article is under licence CC BY-SA 3.0
The map below shows the places where the ancestors of the famous person lived.
The cold New York winter of 1788-1789 proved to be a boon for Astor’s fledgling import business. Local demand for furs increased dramatically and Astor could have sold many more if only he had had them in stock. To prevent future shortages, Astor decided to hunt for furs himself. He bought the necessary supplies in New York City and set out for the relatively unsettled northwestern corner of the state near the Canadian border and Lake Ontario. He targeted beavers and raccoons, because their furs were popular for coats, caps, and gloves. First, he followed Native American trails on foot, but soon he bought a canoe to move north more quickly. He slept outside and ate fish or meat from the animals he hunted. After a couple of weeks, he returned to New York City with many furs. With Sarah’s assistance, he dressed the animal skins skillfully and made a substantial profit selling them in his store. The large profit margin on furs fueled Astor’s ambition to expand his trade business. On subsequent trips, he brought beads, clothing, and wooden toys to trade with the Native Americans for furs and used the music from his flute to gain their trust in trade negotiations.
Other merchants began to copy Astor’s trade practices. Trade routes were established throughout upstate New York and merchants began to look to Montreal in British Canada as a source for additional furs. British colonial regulations required that Canadian furs had to be exported to London before they could be imported to the United States. This made imported Canadian furs much more expensive in the New York market. After Jay’s Treaty loosened trade restrictions between Canada and the United States in 1796, Astor began to import furs from Montreal directly to New York City. The region around the Great Lakes became more accessible to American traders as a result of the treaty. Consequently, competition in the New York fur trade stiffened, but Astor continued to profit due to his head start and years of experience.
Astor began to look for other outlets for his supply of furs. In 1800, he decided to enter the China trade. The first American-flag vessel had sailed to China in 1784, two years after the emperor of China had allowed certain merchants in Canton to trade with non-Chinese merchants. In the years that followed, Astor had watched the cautious steps taken by fellow New York merchants in the China trade. After careful research and meetings with fellow merchants and ship owners, Astor decided to ship furs and Hawaiian sandalwood to China and purchase silk, tea and spices for sale in New York. Silk was particularly important to Astor, since it was becoming fashionable in New York City and would complement his fur sales.
Thomas Jefferson’s Embargo Act of 1807, which forbade American-flag shipping from leaving American ports for foreign destinations in response to attacks on American vessels by British and French warships during the Napoleonic Wars, halted Astor’s overseas trade endeavors. The embargo was nothing short of a financial catastrophe for Astor, particularly since he also faced serious competition in the Great Lakes fur trade from the British-Canadian North West and Hudson’s Bay Companies. Astor decided to outflank the powerful, continental fur-trading duopoly by establishing fur trading posts on the Pacific coast and cementing American claims to the Oregon Territory. Astor’s plan for trading posts on the Pacific depended on support from President Jefferson. In 1808 he wrote, confidentially, to his friend DeWitt Clinton and explained his expansion plan with the expectation that Clinton would use his family connections to secure presidential consideration of the proposal. At the time, DeWitt Clinton’s uncle, George Clinton, served as Jefferson’s vice president.
In his first letter to the president on February 27, 1808, Astor asked for Jefferson’s permission to trade with the Native American tribes west of the Mississippi River. He also inquired about government assistance in the form of military support in the case of attacks by hostile Native Americans or the British. Jefferson was delighted with Astor’s letter because Astor’s plan mirrored his own vision of how the American West should be developed. An exchange of letters ensued in which Astor developed his idea of expanding American fur trading networks to the Pacific and impressed the president with his vision. Astor’s ambition was to gain control over the new fur trade in the relatively unexplored territories by establishing his own fur trading company. The company would provide structure and pace for the development of the West and would drive the British trading companies from United States territory. New York would serve as the enterprise’s headquarters.
Astor intended to lay out his trading route from St. Louis to the Pacific following in the footsteps of Lewis and Clark’s expedition through the Louisiana Territory. He wanted to make use of the knowledge gained from the expedition, but more importantly he wanted to take advantage of the region’s geography to further his business activities. Following the Louisiana Purchase, the United States had gained control of the entire length of the Mississippi River and Astor planned to use the river as the main route into the Louisiana Territory. The natural network of regional rivers branching westward from the Mississippi would provide access to hunting grounds and trading posts in the trans-Mississippi West. The furs would be brought to St. Louis first, and then shipped down the Mississippi to the Gulf of Mexico where they would be loaded onto ships for the sea voyage to New York.
Astor called his new business the American Fur Company, underscoring his own sense of patriotism. The trading company was incorporated for twenty-five years and capitalized with two million dollars (approximately $36 million in 2010$) in assets. Since Astor preferred to keep the company’s financial control in his own hands in order to increase the wealth of his family, he did not invite other investors to join the firm and tailored the organizational structure of the company to suit his needs. As the company’s sole owner, he made all the decisions and bore all the risk, sharing none with the nine managing directors he employed and who reported to him.
The Embargo Act of 1807 and subsequent trade restrictions forced Astor to focus on American-based business endeavors. Trading in furs and real estate provided income and helped him accumulate wealth during these years. He invested his profits from the pre-embargo China trade into New York real estate. The city had grown significantly over the years, and Astor believed that more immigrants would continue to arrive from Europe. In fact, the number of New York City inhabitants doubled from 33,000 to 60,000 between1790 and 1800. Astor began to purchase real estate in Manhattan outside the original colonial city limits. By 1819 he had invested $715,000 (approximately $12 million in 2010$) in Manhattan real estate, an investment of most of his cash and liquid capital that paid off because the city continued to grow during the early decades of the nineteenth century.
Astor continued to invest in real estate and housing from 1819 to 1834, when he stepped back as president of the American Fur Company. During these 15 years, Astor spent another $445,000 to acquire real estate and buildings. When he retreated from the fur trade after 1834, he entered a third phase of acquiring real estate. By then he had become convinced that the real estate business was the perfect business for him, because it allowed him to capitalize on the housing needs of thousands of immigrants arriving annually in New York City. He spent about $832,000 on real estate between the years 1834 and 1848. In total, he bought nearly two million dollars (approximately $57 million in 2010$) of Manhattan real estate, making his New York real estate endeavors the most important of all of his enterprises and providing the bulk of a fortune that far surpassed the wealth of all of his contemporaries. His courage to invest in unsettled farmland, his business instincts, and his foresight when it came to the future development, growth, and expansion of New York enabled him to become the richest man in America.
Astor was always concerned about his public image. He often discussed it with his advisors, and followed their strategy in order to make sure that his name was always associated with positive achievements and economic success and that only the most successful or most prestigious projects would bear the name Astor. Accordingly, the outpost in the Oregon Territory on the Pacific coast was named “Astoria,” his most prestigious hotel was the Astor House, the library he donated was the Astor Library, and in his will he provided funds for the construction and operation of a poorhouse in his hometown of Walldorf, named Astorhaus, which opened in 1854. Astor’s donation to the library represented his most significant philanthropic project. He wanted to enable all New Yorkers to educate themselves regardless of class. Astor was grateful for the education he had enjoyed as a relatively poor child in Walldorf, and he cherished learning as a highly valuable good. The Astor Library was first located on Astor Place, formerly Lafayette Square, close to William Backhouse Astor’s house, an Astor landmark in his beloved city. About fifty years after Astor’s death, however, New York City officials merged the Astor Library with the Lennox Library and the Tilden Trust to create the New York Public Library. The front of the current building still proudly shows visitors Astor’s mission: The Astor Library Founded By John Jacob Astor For The Advancement Of Useful Knowledge MDCCCXLVIII. Inside, the first room is still called Astor Hall, capturing the spirit of Astor in the library.
Astor accumulated his fortune in order to provide for his family and hence he made a will that assured that none of his children, grandchildren, and other kin would ever experience the kind of poverty that he had endured during his childhood. In return he demanded success and discipline from his heirs he expected eagerness, diligence, and entrepreneurial achievements from all members of the family and punished underachievers, who did not help increase the family fortune, by withdrawing care and financial support. When John Jacob Astor died, he was proud patriarch of his family and a respected member of New York’s elite. William Astor was his primary heir. He succeeded his father as patriarch of the family and inherited the title of the richest man in the United States.
Astor the Gentleman Farmer
Jakey Astor VI was often referred to as a gentleman farmer as he managed the approximate 150 acre farmstead. He was very proud of his dairy farm that had originally been called Bakehaven or Baker Haven Farm, named after Dr. Charles Baker, a Newark radiologist and milk delivery business owner. Astor had over 60 cows in the barn. Astor renamed the farm New Haven Farms and worked for years breading cows and selling his milk to a Bernardsville Creamery.
As a working farm, there were frequent visits from the area’s cub scouts and brownies in the late 1950s. On September 11, 1952 it was reported that over 700 children went on hayrides on John Astor’s tractor that was driven by Clyde Swensen. Also noted in the local Bernardsville News on November 10, 1955 that 15 windows in the estate were broken by someone with a slingshot. The Astor’s weren’t home at the time.
In 1964, the Somerset County Board of Chosen Freeholders began negotiating to purchase the farm for open space. The transaction closed with a purchase of over 460 acres covering from the Somerset Hills Airport all the way north to the Basking Ridge Country Club.
John Jacob Astor Passes Away
Today in Masonic History John Jacob Astor passes away in 1848.
John Jacob Astor was a German-born American businessman.
Astor was born in Waldorf, Germany near Heidelberg on July 17th, 1763. He was born Johann Jakob Astor. He was the youngest of 4 brothers. Astor began his business career in Germany as a dairy salesman for his fathers business.
In 1779, Astor, who was 16, moved to London where his brother had a musical instrument shop. He would work for his brother in London. He would also learn to speak English and anglicized his name.
In 1784, Astor immigrated to the United States just after the Revolutionary War. Initially he would help one of his other brothers establish a butcher shop. He would eventually start trading furs with Native Americans in the late 1780's. In New York City he would establish a fur shop and would sell instruments for his brother back in London.
Astor was a horse racing enthusiast. He would purchase a thoroughbred named Messenger. The horse would become the sire of the Standardbred breed of horses which is commonly used in trot or pace harness racing.
In 1794, Astor started trading with Canada for furs. He would import them to the United States and then sell them in Europe. By 1807, the United States Embargo Act prevented Astor from further trading with Canada. With the blessing of Thomas Jefferson, Astor created the American Fur Company. Some of the owners of the company were Canadians, this allowed Astor to get around the Embargo. During this time, Astor opened trade with China.
In 1799, Astor began acquiring land on the waterfront in New York City. Astor was convinced, correctly, that New York City was going to become one of the largest cities in the World. He began buying other land as well and in the 1830's saw the boom that was coming in New York City and bought land, even outside the then city limits of New York. He never settled or used any of the land himself, instead renting it out to others for their use.
After the War of 1812, the United States passed a ban on foreign fur traders, this allowed the American Fur Company to dominate the market in the United States.
When Astor finally decided to retire he was arguably the richest man in the United States. In adjusted 2006 U.S. dollars it is believed that Astor was worth $110.1 Billion. This would make Astor the 5th richest man ever in the United States. In 2011 adjusted dollars it is estimated that he was worth a more conservative figure of $1.272 Billion. He would use that wealth to support cultural endeavors. He would be a supporter of ornithologist John James Audubon.
When Astor passed away on March 29th, 1848, his will provided $400,000 for the establishment of the Astor Library, which after merging with other smaller libraries become the New York Public Library. He also provided money to create an orphanage in his home town of Waldorf. The orphanage is now a museum honoring Astor.
Astor was a member of Holland Lodge No. 8 in New York City. In 1788, he would serve as Worshipful Master of the lodge. He would later become the Grand Treasurer for the Grand Lodge of New York.
Later life and legacy
After retiring from his business, Astor spent the rest of his life as a patron of culture. He supported the famous ornithologist, John James Audubon, the poet/writer Edgar Allan Poe, and the presidential campaign of Henry Clay. At the time of his death in 1848, Astor was the wealthiest person in the United States, leaving an estate estimated to be worth at least 20 million dollars. In his will, in addition to the orders to build the Astor Library for the New York public, he had a poorhouse erected in his German hometown, Waldorf. As a symbol of the earliest fortunes in New York, John Jacob Astor is mentioned in Herman Melville’s great novella “Bartleby the Scrivener.”
The great bulk of his fortune was bequeathed to his second son, William Backhouse Astor Sr., instead of his eldest son John Jacob Astor II (1791-1869).
John Jacob Astor is interred in the Trinity Churchyard Cemetery in the New York City borough of Manhattan. The famous pair of marble lions that sit by the stairs of The New York Public Library at Fifth Avenue and Forty-second Street were origially named Leo Astor and Leo Lenox, after Astor and James Lenox, who founded the library. Then they were called Lord Astor and Lady Lenox (both lions are males), before being given the names Patience and Fortitude by Mayor Fiorello LaGuardia during the Great Depression.
Watch the video: 29 SHOCKING PHOTOS OF THE TITANIC SURVIVORS (October 2022).
|
FINEWEB-EDU
|
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Investigate the effect of sodium carbonate on water.
Extracts from this document...
Introduction
Chemistry Coursework I am going to investigate the effect of sodium carbonate on water. I will use a sample of water, and with differing amounts of sodium carbonate dissolved in the water and I will see how much soap solution it will take to create a permanent lather. I will use a burette and pipette and such items to measure soap solutions and the volume of water (which stays constant) and to weigh the mass of the sodium carbonate, I will use a digital weighing scale with a dust shield. I am also going to record observations throughout the experiment and also try and keep the temperature readings using a thermometer to see what effect it has by observation or if the results are out of proportion during the experiment since that is one of the uncontrollable variables. Water with dissolved Na2CO3 Burette Weighing scales Conical Flask Conical Flask Sodium Carbonate Apparatus: * Burette for accurate soap solution volume * Pipette for accurate water volume * Pipette filler for filling the pipette * Weighing Scales for accurate mass of Na2CO3 in grams * Conical Flask and bung used for shaking the water, sodium carbonate and soap solution. ...read more.
Middle
The key factors in this experiment are: * Amount of sodium carbonate-change * Amount of water-constant * Concentration of soap solution-controllable & variable * Water type (source) / hardness- controllable & variable * Temperature-uncontrollable & variable * Shaking intensity-controllable to a certain degree Reactions and equations The calcium and ions in the water and the magnesium ions react with (sodium) carbonate ions. Calcium ions + Carbonate ions Calcium Carbonate (From hard water) + (From sodium Carbonate) Ca2+ (aq) + CO32- (aq) CaCO3 (s) Another name for sodium carbonate is washing soda, because it was used for washing up when all of it was done using soap. This method of softening is called precipitation. The sodium carbonate removes the calcium ions from the water as a precipitate of calcium carbonate. Calcium ions + Stearate ions Calcium Stearate (From hard water) + (From soap) (scum) Ca2+(aq) + 2St-(aq) CaSt2(s) Another way of removing the hardness from the water is to add soap. Sodium stearate is the soap we are going to use since it is quite common in soap. ...read more.
Conclusion
shows how much soap was needed to create a permanent lather without sodium carbonate. When we did use sodium carbonate, (0.5000g) the water needed 4.0cm3 of soap solution to create a permanent lather and when we added 2.000g of sodium carbonate it only needed 3.0cm3 of soap solution to create a permanent lather. This shows that the more sodium carbonate you add, the less soap is needed, which means the water is softer. Sketch Graph Prediction Volume of soap (cm3) Mass of Sodium Carbonate (g) In effect, this graph shows that the higher the amount of sodium carbonate in the water, the less soap needed to create a permanent lather. This theoretically works because the sodium carbonate softens the water by removing the calcium ions which cause the hardness and the more you add, the softer the water gets, which means that it is easier to create a permanent lather which is what the sketch graph shows. The aim of this experiment is to investigate the effect of sodium carbonate on hard water and my prediction is that sodium carbonate will soften the water, which makes it easier for the soap to create a permanent lather. 1 By Thomas Cheung 4H ...read more.
The above preview is unformatted text
This student written piece of work is one of many that can be found in our GCSE Aqueous Chemistry section.
Found what you're looking for?
• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month
Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
See related essaysSee related essays
Related GCSE Aqueous Chemistry essays
1. Investigate the effect of sodium carbonate on hard water.
However, from other previous research I have found out that eventually the experiment will reach a point when there are no more calcium ions remaining in the water because the water has reached its maximum softness and no matter how much odium carbonate is added, the water will not become any softer.
2. In this experiment, we aim to investigate the effect of sodium carbonate on hard ...
Theory Now, the explanation of the theory behind the experiment. Soaps are compounds of sodium or potassium. A common soap, and the one used here, is sodium stearate (Na+St- where St- = C17H35COO-). Sodium stearate is soluble in water, but calcium stearate is not.
1. Establish what types of soil holds the most water and to see if changing ...
So consequently as a result of the pre test it is decided that their will be a measured amount of glass wool put into the funnels set at 0.5g. To avoid the problem of the filter funnel over flowing and because some soils are more denser and weigh more the
2. How much Iron (II) in 100 grams of Spinach Oleracea?
used is equal to those used of Oxalic Acid (aq). Now that I know the mols present in the Oxalic Acid (aq) and the volume used in the titration I can work out the concentration of it. Moles = Concentration x Volume Concentration = Moles Volume Concentration = 0.000207
1. AS Chemistry - Investigate the effect of sodium carbonate on hard water
In a previous experiment the amount of soap solution required to create the lather when no sodium carbonate was added was 7 cm3. The amount of soap solution required to create the lather when one gram of sodium carbonate was added however, was only five cm3.
2. Investigate the effect of sodium carbonate on hard water.
liquid to 0.1cm3; a weighing machine that is accurate to 3d.p, to weigh out small amounts of sodium carbonate; a stopwatch/stop clock to time the shaking and intervals. I also need the soap solution, hard water, sodium carbonate and a conical flask with a rubber cork.
1. Analysing Soft Drink
Strong acids: Strong acids have a strong proclivity to donate Hydrogen+ ions. All of the strong acids such as hydrochloric acid, Sulphric acid and Nitric acid are all 100% ionised in water. This mean all the strong acid would dissolve the reaction is fully complete and no unreacted substance remains in the solution.
2. the synthesis of azo dyes, aspirin and soap
This therefore pushes two of the oxygen electrons in one of the bonds down that is the electrons are delocalized and spread out between the two oxygen atoms. In proximity of these electrons, the O-H bond with the oxygen in the alcohol breaks and this then rearranges the electrons to
• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to
improve your own work
|
ESSENTIALAI-STEM
|
UNITED STATES of America v. Marshall KING and Nelson Brown.
Crim. Nos. 3:00CR109-01, 3:00CR109-03.
United States District Court, E.D. Virginia, Richmond Division.
July 11, 2000.
Michael C. Wallace, Assistant United States Attorney, Richmond, VA, for Government.
Matthew P. Geary, Richmond, VA, for King.
S. Neil Stout, Flax, Embrey & Stout, Richmond, VA, for Brown.
MEMORANDUM OPINION
PAYNE, District Judge.
Raycom Communications, Inc. d/b/a WTVR News 6 (“WTVR”) and its reporter, Jean Ziliani, as interveners in this case, have filed a motion to quash a subpoena duces tecum sought by the Defendants, Nelson Brown and Marshall King, under Fed. R.Crim.P. 17(c). The subpoena requests production of all unedited, unbroadcast videotapes, commonly known as “outtakes,” of Zi-liani’s interview of Apryl Gauldin, a Government witness in this case, as well as any notes made by Ziliani during the interview. The subpoena also seeks production of any other statements made to WTVR or Ziliani by prospective witnesses to this case. WTVR and Ziliani have moved to quash the subpoena on the ground- that the materials sought are subject to a qualified reportorial privilege said to be found in the First Amendment to the United States Constitution.
STATEMENT OF FACTS
On March 27, 2000, a federal grand jury returned an Indictment charging that Brown, King and their co-defendants participated in a conspiracy to distribute cocaine base; possessed cocaine base; distributed cocaine base to two women in exchange for sexual favors; and maintained a crack house. The Indictment alleged that Apryl Gauldin was one of the women who received drugs in exchange for sexual favors and otherwise implicates her in some of the conduct alleged in the Indictment.
These, and other charges, were originally the subject of an indictment returned by a state grand jury. The somewhat salacious nature of the charges and the occupations of some of the defendants (a Virginia State trooper, a Police Chief of a local town, and a funeral parlor operator of some local notoriety) have attracted significant media attention to the case. As a result, numerous articles and television reports have been published since the initial state indictment in this case was returned. See generally United States v. King, 192 F.R.D. 527, 528-30 (E.D.Va.2000).
At the beginning of May 2000, Ziliani interviewed Gauldin at the state prison in which Gauldin is incarcerated on a charge unrelated to this case. In exchange for the interview, the reporter promised Gauldin that her name and identity would be kept in confidence and that, to that end, the inter-' view would be published only by electronically masking Gauldin’s face and altering her voice. The interview lasted approximately 40 minutes, and it was recorded on video tape.
On May 3, 2000, Ziliani sought comments from one of the defense counsel and, in so doing, advised that she had conducted an extensive interview with one of the witnesses in the case and was preparing a news program that would address the allegations in the case. Thereafter, the defense counsel and the Assistant United States Attorney, acting independently of Ziliani, identified Gauldin, who by then was known to be a Government witness, as the person who had been interviewed by Ziliani.
All Defendants, except for Brown, then moved for entry of an order enjoining the Government’s witnesses from making statements to the press or others, and to enjoin WTVR from publishing any part of the interview with Gauldin. After an evidentiary hearing on the motion, the Court viewed in camera the approximately four minutes of the interview that WTVR and Ziliani proposed to publish. By Memorandum Opinion and Order, dated May 8, 2000, the motion to restrain publication of the four minutes of the interview was denied; and the motion to enjoin Government witnesses from making extrajudicial statements was granted, in part. King, 192 F.R.D. at 532, 534-36.
On May 15 and 16, 2000, WTVR aired a two-part report that included brief segments of Gauldin’s statements, electronically altered so as to disguise her voice and face. At oral argument on this motion, counsel for Brown represented that, when compared with the allegations of the Superseding Indictment and with discovery provided by the Government pursuant to an Agreed Discovery Order, the text of the aired segment of the Gauldin interview contains information exculpatory of Brown. King’s counsel made a similar representation.
Counsel for WTVR and Ziliani agreed at oral argument that Gauldin gave the interview with the understanding that all, or any part, of it could be published. Hence, there is no issue of confidentiality as to the substance of the interview. And, it was agreed at oral argument that, considering the independent discovery of Gauldin’s identity by counsel for the' Defendants and the United States, the confidentiality of the source’s identity is moot and hence is no longer a relevant factor in deciding the motion to quash. Finally, it is undisputed that the subpoena was not issued for purposes of harassment or vexation.
DISCUSSION
I. Have The Requirements Of Rule 17(c) Been Satisfied?
Before reaching the question whether WTVR and Ziliani hold a qualified privilege, it is necessary to ascertain whether the subpoena duces tecum satisfies the requirements of Fed.R.Crim.P. 17, which generally governs the issuance of subpoenas in criminal cases. Subsection (c) of Rule 17 speaks directly to subpoenas duces tecum of documentary evidence that are returnable before trial:
The court may direct that books, papers, documents or objects designated in the subpoena be produced before the court at a time prior to the trial or prior to the time when they are to be offered in evidence and may upon their production pemit the books, papers, documents or objects or portions thereof to be inspected by the parties and their attorneys.
Fed.R.Crim.P. 17(c) (emphasis added). In United States v. Nixon, 418 U.S. 683, 699, 94 S.Ct. 3090, 41 L.Ed.2d 1039 (1974), the Supreme Court of the United States set forth the standards by which district courts are to evaluate the enforceability of a subpoena duces tecum. Citing the established test devised by Judge Weinfeld in United States v. Iozia, 13 F.R.D. 335, 338 (S.D.N.Y.1952), the Supreme Court held that pretrial production of evidence by third parties pursuant to Rule 17(c) is appropriate only where the moving party shows:
(1) that the documents are evidentiary and relevant; (2) that they are not otherwise procurable reasonably in advance of trial by exercise of due diligence; (3) that the party cannot properly prepare for trial without such production and inspection in advance of trial and that the failure to obtain such inspection may tend unreasonably to delay trial; and (4) that the application is made in good faith and is not intended as a general “fishing expedition.”
Id. (footnote omitted); see also Bowman Dairy Co. v. United States, 341 U.S. 214, 221, 71 S.Ct. 675, 95 L.Ed. 879 (1951) (“In short, any document or other materials,.admissible as evidence, obtained by the Government by solicitation or voluntarily from third persons is subject to subpoena.”); United States v. Beckford, 964 F.Supp. 1010, 1031 (E.D.Va. 1997) (examining the requirements of Rule 17(c)).
The Supreme Court then conflated the generally accepted four facet formulation from Iozia into what has become the now talismanic paradigm: (1) relevancy; (2) admissibility; and (3) specificity. Nixon, 418 U.S. at 700, 94 S.Ct. 3090. In reality, the “admissibility” requirement of the Nixon formulation and the “evidentiary” requirement of Iozia (cited as the basis for Nixon) seem to be the same, while the “specificity” requirement of Nixon embodies both the “good faith” and “fishing expedition” concepts from Iozia, 13 F.R.D. at 338.
Ultimately, the decision whether to require the production of the requested documents before trial rests within the sound discretion of the district court. See Nixon, 418 U.S. at 702, 94 S.Ct. 3090. Furthermore, as comprehensively discussed in Beck-ford, the movant for a subpoena duces tecum is required by Rule 17(c) to file a motion as the procedural means by which to secure issuance of a pretrial subpoena duces tecum. 964 F.Supp. at 1023-25. The motion, and the evidence adduced at the hearing of it, affords the basis on which that discretion is to be exercised. Against this background, the task is to determine whether the three requirements of relevancy, admissibility, and specificity have been fulfilled.
A. Relevance
In Nixon, the Supreme Court concluded that, although the exact contents of the tape could not be fully described by the movant, “there was sufficient likelihood that each of the tapes contained] conversations relevant to the offenses charged in the indictment.” 418 U.S. at 700, 94 S.Ct. 3090. Here, the statements sought to be produced were made by one of the unindicted co-conspirators. After reviewing in camera the four minute segment proposed to be published, the Court confirmed that, although Gauldin’s statements were more detailed and graphic than the allegations of the Indictment, Gauldin’s statements clearly and directly concerned those allegations. See King, 192 F.R.D. 527, 530-31.
The unedited videotape of the entire Gaul-din interview has been produced for in camera review. A review of the whole interview leaves no doubt that the Defendants have satisfied the relevance requirement because, throughout the interview, Gauldin addresses in detail many of the allegations of the Superseding Indictment.
B. Admissibility
Exculpatory evidence in the possession of third parties is subject to a subpoena duces tecum. See United States v. Cuthbertson, 651 F.2d 189, 195 (3d Cir.), cert. denied, 454 U.S. 1056, 102 S.Ct. 604, 70 L.Ed.2d 594, (1981) (“Cuthbertson //”); cf. Brady v. Maryland, 373 U.S. 83, 87-88, 83 S.Ct. 1194, 10 L.Ed.2d 215 (1963); Giglio v. United States, 405 U.S. 150, 154, 92 S.Ct. 763, 31 L.Ed.2d 104 (1972). It also is true that Rule 17(c) subpoenas usually are not to be used as a means of procuring purely impeachment material in advance of trial. See Nixon, 418 U.S. at 701, 94 S.Ct. 3090 (“Generally, the need for evidence to impeach witnesses is insufficient to require its production [under Rule 17(c) ] in advance of trial.”) (citing United States v. Carter, 15 F.R.D. 367, 369-72 (D.D.C.1954) (Rule 17(c) may not be used to obtain statements of witnesses unless the witness testifies at trial)); Cuthbertson II, 651 F.2d at 195 (hearsay evidence which could only be used for impeachment may not be obtained by a Rule 17(c) subpoena); Beck-ford, 964 F.Supp. at 1032 (listing cases).
The rationale offered for generally eschewing the use of Rule 17(c) to secure impeachment material, whether in the hands of third parties or the Government, is that impeachment “materials ‘ripen into evidentiary material only if and when the witness testifies at trial.’ ” United States v. Messino, 882 F.Supp. 115, 116 (N.D.Ill.1995) (quoting United States v. Cuthbertson, 630 F.2d 139, 144 (3rd Cir.1980), cert, denied, 449 U.S. 1126, 101 S.Ct. 945, 67 L.Ed.2d 113 (1981) (“Cuthbertson /”)); see also United States v. LaRouche Campaign, 841 F.2d 1176, 1180 (1st Cir.1988) (for impeachment materials, “the admissibility prong of Rule 17(c) cannot be fully assessed until the corresponding witness testifies at trial.”). Indeed, that reasoning animated the decision to reject the request for pretrial production of witness statements in Carter, 15 F.R.D. at 369, 371, the decision cited in Nixon as authority for the observation that “[generally, the need for evidence to impeach witnesses is insufficient to require its production in advance of trial.” Nixon, 418 U.S. at 701-02, 94 S.Ct. 3090 (citing Carter, 15 F.R.D. at 371). It follows, therefore, that where it is known with certainty before trial that the witness will be called to testify, the admissibility determination, within the meaning of Nixon, can be made before trial, and the statements properly may be considered evidentiary. See LaRouche Campaign, 841 F.2d at 1180. In sum, witness statements useful for impeachment purposes are evidentiary within the meaning of Nixon, 418 U.S. at 699, 94 S.Ct. 3090, and within the meaning of Iozia, 13 F.R.D. at 338, 340-41, the decision which Nixon held to supply the test for Rule 17(c) subpoenas. The decisions which have analyzed the issue carefully have recognized as much by disposing of the “admissibility/evi-dentiary” inquiry as a question of timing.
The admissibility facet of Nixon also must be assessed in perspective of the principle that a prior inconsistent statement, otherwise inadmissible as hearsay, “may be admissible for the limited purpose of impeaching the witness.” United States v. Ince, 21 F.3d 576, 579 (4th Cir.1994). And, of course, if the witness, after being afforded an opportunity to explain or deny the statement, does not admit having made the prior inconsistent statement, the statement itself is admissible as an exhibit. Fed.R.Evid. 613(b); see also United States v. Truslow, 530 F.2d 257, 264 (4th Cir.1975); United States v. Lutz, 153 F.3d 723 (table), 1998 WL 486345 at *4 (4th Cir. Aug. 7,1998).
Having viewed the videotape of the Gaul-din interview in camera having considered defense counsel’s assessment of the already published segment thereof, and having examined the Superseding Indictment, it is rather clear that Gauldin’s statements in the interview will be useful for impeachment. And, here, there is no uncertainty whether Gaul-din will testify. . Indeed, at the hearing on this motion, counsel for the United States once again affirmed that Gauldin will testify at trial. The text of the original Indictment, the Superseding Indictment and the published segment of the Gauldin interview confirm this certainty. Thus, on this record, Gaul-din’s interview is evidentiary within the meaning of Nixon and Iozia and her statements will be admissible on cross-examination within the meaning of Nixon, Carter, Iozia and Ince. Hence, the Defendants have satisfied the “evidentiary/admissibility” facet of Nixon.
C. Specificity
Contrary to WTVR and Ziliani’s suggestion, the subpoena sought here is not fairly characterized as a general fishing expedition pursued by casting the “broadest possible net.” (Motion to Quash at 3). The subpoena specifically requests the unedited recordings, and the interview notes, of the Gauldin interview, as well as any other recordings of statements by or conversations with other known or potential witnesses to this case. The request is therefore specific to any tapes or notes from conversations with witnesses in this case. However, the record here shows that the only witness who has given a statement is Gauldin. Thus, the subpoena will be modified to require production of only the Gauldin interview. That, and the record as a whole, forecloses any contention here that the subpoena is “a general fishing expedition.” Nixon, 418 U.S. at 699, 94 S.Ct. 3090. And, there is no contention that the application for the subpoena was other than “in good faith.” Id.
D. Conclusion
An examination of the record shows that the subpoena duces tecum satisfies the three Nixon factors and therefore is enforceable as a Rule 17(c) subpoena. Moreover, the interview is lengthy and, as in Nixon, “transcription of the [video] tapes may take a significant amount of time.” Nixon, 418 U.S. at 702, 94 S.Ct. 3090. Clearly, the statement given to Ziliani by Gauldin is not available from any other source because the only alternate source is Gauldin, whose counsel has refused to let her be interviewed by counsel for Defendants. Considering the length of the interview and its substantive range, delaying production and inspection of the Gaul-din interview videotape would simply délay the trial, and unreasonably so.
II. Whether WTVR And Ziliani Hold A Qualified Newsreporter’s Privilege Pursuant To The First Amendment?
WTVR and Ziliani argue, however, that they cannot be compelled to provide the videotape of Ziliani’s interview with Gauldin because, in their view, a newsreporter has a qualified First Amendment privilege against disclosure of information obtained during the process of newsgathering. Thus, they assert what is often referred to as the “reportorial privilege” which was born in Garland v. Torre, 259 F.2d 545 (2nd Cir.), cert. denied, 358 U.S. 910, 79 S.Ct. 237, 3 L.Ed.2d 231 (1958).
The Supreme Court of the United States first confronted the issue in Branzburg v. Hayes, 408 U.S. 665, 92 S.Ct. 2646, 33 L.Ed.2d 626 (1972). Therefore, analysis of the reportorial privilege claimed by WTVR and Ziliani must begin with an understanding of Branzburg.
A. Branzburg v. Hayes Examined
Branzburg actually was four separate cases each of which involved a journalist who had been held in contempt for failure either to appear, or to testify, before grand juries which'were investigating criminal conduct as to which the reporters had secured information in the process of preparing stories for publication in newspapers. In one case, Branzburg appeared before the grand jury but declined to identify individuals whom he had seen in possession of marijuana or persons whom he had observed making hashish from marijuana while he was preparing an investigative report about marijuana production in Jefferson County, Kentucky. Branz-burg, 408 U.S. at 667-68, 92 S.Ct. 2646. The State trial judge ordered Branzburg to answer the questions and that order was affirmed on appeal by the State supreme court. In another case, Branzburg was subpoenaed to testify about criminal activity, which he had observed and photographed in Frankfort, Kentucky while investigating drug use in that city. Branzburg’s motion to quash the subpoena which required him to testify about violations of Kentucky’s drug laws was denied by the State trial and appellate courts. Id. at 669-70.
The third case decided in Branzburg was In re Pappas in which a television newsman/photographer refused to answer questions about events that had taken place in Black Panther headquarters to which the reporter was granted entry so that he could record photographically, and report on, an anticipated police raid on the organization’s headquarters. The State trial and appellate courts denied Pappas’ motion to quash.
The fourth case in Branzburg was United States v. Caldwell, in which Caldwell, a reporter also assigned to cover the Black Panther party and other black militant groups, was subpoenaed to appear before the grand jury and to testify about interviews given him for publication by officers and spokesmen of the Black Panther party and to produce the notes and tape recordings of those interviews. Caldwell refused to appear before the grand jury, he was cited for contempt, and the citation was affirmed on appeal.
Against those factual backgrounds, the Supreme Court considered the claims of the three newsmen (Branzburg, Pappas and Caldwell) that they possessed a privilege not to identify the sources, or the substance, of information that they had confidentially obtained in the preparation of news reports because “the burden on news gathering resulting from compelling reporters to disclose confidential information outweighs any public interest in obtaining the information.” Branzburg, 408 U.S. at 681, 92 S.Ct. 2646. Justice White wrote the opinion for the Court, which was joined by Chief Justice Burger, Justice Blackmun, Justice Powell and Justice Rehnquist. In addition to joining the opinion of the Court, Justice Powell wrote a simple concurrence. Justice Stewart wrote a dissent, which was joined by Justices Brennan and Marshall. Justice Douglas filed a dissent in United States v. Caldwell, 408 U.S. 665, 711, 92 S.Ct. 2686, 33 L.Ed.2d 657 (1972), which explicitly applied to the judgments in Branzburg and Pappas.
The Branzburg majority began its decision by acknowledging the undeniable importance of the First Amendment and the rights of the press. At the same time, the Court also outlined a goodly number of restrictions on the rights of the press established in its previous First Amendment jurisprudence. Branzburg, 408 U.S. at 683-85, 92 S.Ct. 2646. In perspective of those restrictions, the Court observed that:
It is thus not surprising that the great weight of authority is that newsmen are not exempt from the normal duty of appearing before a grand jury and answering questions relevant to a criminal investigation. At common law, courts consistently refused to recognize the existence of any privilege authorizing a newsman to refuse to reveal confidential information to a grand jury. In 1958, a news gatherer asserted for the first time that the First Amendment exempted confidential information from public disclosure pursuant to a subpoena issued in a civil suit, [citing Garland v. Torre], but the claim was denied, and this argument has been almost uniformly rejected since then although there are occasional dicta that, in circumstances not presented here, a newsmen might be excused.
Branzburg, 408 U.S. at 685-86, 92 S.Ct. 2646 (citations omitted).
Having concluded that the claimed reportorial privilege had been rather thoroughly rejected by the state and federal courts, Branzburg, 408 U.S. at 685-86, 92 S.Ct. 2646, and that the common law provided no support for it, id. at 685, 92 S.Ct. 2646, the Court observed that seventeen states had provided reporters with a statutory privilege of varying dimensions, “but the majority have not done so, and none has been provided by federal statute.” Branzburg, 408 U.S. at 689, 92 S.Ct. 2646. Against that background, the Court framed the issue by explaining that:
Until now the only testimonial privilege for unofficial witnesses that is rooted in the Federal Constitution is the Fifth Amendment privilege against compelled self-incrimination. We are asked to create another by interpreting the First Amendment to grant newsmen a testimonial privilege that other citizens do not enjoy.
Branzburg, 408 U.S. at 689-90, 92 S.Ct. 2646 (emphasis added). And, the Court rendered its decision in the next sentence by concluding: “This we decline to do.” Id. (emphasis added).
The explanation offered for this explicit and unequivocal rejection of a reportorial privildge was that:
Fair and effective law enforcement aimed at providing security for the person and property of the individual is a fundamental function of government, and the grand jury plays an important constitutionally mandated role in this process. On the records now before us, we perceive no basis for holding that the public interest in law enforcement and in ensuring effective grand jury proceedings is insufficient to override the consequential, but uncertain, burden on news gathering that is said to result from insisting that reporters, like other citizens, respond to relevant questions put to them in the course of a valid grand jury investigation or criminal trial.
408 U.S. at 690-91, 92 S.Ct. 2646 (emphasis added).
In reaching that conclusion, the Court flatly rejected the principal arguments made by the reporters that, absent protection of confidential sources by virtue of a privilege for the reporter, there would be a substantial burden on the newsgathering function and the consequent reporting function. That rejection, which was explained in great detail, Branzburg, 408 U.S. at 691-701, 92 S.Ct. 2646, was loudly decried as without merit by Justice Stewart’s dissent, id. at 735-36, 92 5. Ct. 2646, but was not at all diminished by Justice Powell’s concurring opinion. The Court also grounded its decision to deny a reportorial privilege on the extreme difficulty of applying it. Branzburg, 408 U.S. at 703-06, 92 S.Ct. 2646.
Branzburg thus clearly and quite unequivocally rejected the existence of a reportorial privilege grounded in the First Amendment. Having done so, it reversed the decision in Caldwell, thereby requiring the reporter to testify before the grand jury, affirmed the newsman’s citation for contempt in Branz-burg, and required the newsman in Pappas 'to appear before the grand jury and answer questions put to him.
Although he joined the opinion for the Court prepared by Justice White, Justice Powell also issued a concurring opinion “to emphasize what seems to me to be the limited nature of the Court’s holding.” Branz-burg, 408 U.S. at 709, 92 S.Ct. 2646 (Powell, J., concurring). In that simple concurrence, Justice Powell observed that “... if the newsman is called upon to give information bearing only a remote and tenuous relationship to the subject of the investigation, or if he has some other reason to believe that his testimony implicates confidential source relationship without a legitimate need of law enforcement, he will have access to the court on a motion to quash and an appropriate protective order may be entered.” Id. at 710, 92 S.Ct. 2646 (emphasis added). Justice Powell used the term “privilege” in the next sentence but it seems clear in context that the reference actually was directed to the judicial protections and remedies available to a reporter when called upon: (i) to give information that was remote and tenuous to the subject of the investigation; or (ii) to disclose confidential source information “without a legitimate need of law enforcement.” Id. In those two instances, Justice Powell explained that “the courts will be available to newsmen under circumstances where legitimate First Amendment interests require protection.” Id. And, as to that point, Justice Powell’s concurring opinion explicated an observation that was made by Justice White at the conclusion of the opinion for the Court. There, Justice White explained that:
[Njews gathering is not without its First Amendment protections, and grand jury investigations if instituted or conducted other than in good faith, would pose wholly different issues for resolution under the First Amendment. Official harassment of the press undertaken not for the purposes of law enforcement but to disrupt a reporter’s relationship with his news sources would have no justification. Grand juries are subject to judicial control and subpoenas to motions to quash. We do not expect courts will forget that grand juries must operate within the limits of the First Amendment as well as the Fifth.
Id. at 707-08, 92 S.Ct. 2646 (emphasis added) (footnote omitted).
Significantly, Justice Powell’s concurring opinion did not disassociate his views from the main, and quite unequivocal, holding of the majority opinion (which Justice Powell joined) that there was no reportorial privilege under the First Amendment. And, when viewed in context of Justice White’s majority opinion, the concurring opinion simply underscores that, in so holding, the Court was not depriving reporters of the protections which they already enjoyed under the First Amendment, a proposition also advanced by Justice White. And, to Justice Powell, the need for protection was to be judged on a case-by-case basis, with an appropriate balance to be struck based on the specific facts of each case.
To argue, as do some, that Justice Powell’s concurring opinion creates, sub silento, the very privilege that was so clearly rejected in the majority opinion which he joined is to read far too much into the use of the word “privilege” in one sentence and to ignore the thrust of the concurring opinion which was to underscore protection for the reporter in two clearly articulated instances. Nonetheless, that appears to be what some lower courts have done.
B. Branzburg, As Applied By Some Courts Of Appeals
An understanding of the developments in the lower courts following Branzburg requires some brief explication of the dissent filed by Justice Stewart and joined by Justice Brennan and Justice Marshall. The dissent acknowledged that “whether a reporter has a constitutional right to a confidential relationship with his source is of first impression here.” Branzburg, 408 U.S. at 725, 92 S.Ct. 2646 (Stewart, J., dissenting).
The dissent took the view that:
[w]hen a reporter is asked to appear before a grand jury and reveal confidences, I would hold that the government must (1) show that there is probable cause to believe that the newsman has information that is clearly relevant to a specific probable violation of law; (2) demonstrate that the information sought cannot be obtained by alternative means less destructive of First Amendment rights; and (3) demonstrate a compelling and overriding interest in the information.
Id. at 743, 92 S.Ct. 2646 (footnotes omitted). The majority opinion clearly rejected that rationale, Branzburg, 408 U.S. at 690, 700-01, 92 S.Ct. 2646, and, fairly read, Justice Powell’s concurring opinion does not remotely subscribe to the approach taken by Justice Stewart’s dissent.
Notwithstanding the Supreme Court’s rejection in Branzburg of the reportorial privilege in words both plain and clear, a number of courts of appeals have held that, under certain circumstances and for varying reasons, Justice Powell’s concurring opinion creates a qualified reportorial privilege. Some circuits have confined that privilege to civil cases and others have held that it applies to both civil and criminal eases.
In one of the first post-Branzburg decisions, Farr v. Pitchess, 522 F.2d 464, 467-68 (9th Cir.1975), cert. denied, 427 U.S. 912, 96 S.Ct. 3200, 49 L.Ed.2d 1203 (1976), the Ninth Circuit interpreted Branzburg as establishing a qualified privilege for journalists in all judicial proceedings, civil and criminal alike. However, more recently, the Ninth Circuit has refused to recognize a reporter’s privilege in response to a grand jury subpoena. In re Grand Jury Proceedings, 5 F.3d 397 (9th Cir.1993), cert. denied sub nom., Scarce v. United States, 510 U.S. 1041, 114 S.Ct. 685, 126 L.Ed.2d 652 (1994) (but suggesting that this rule might be confined to grand jury context).
Some circuits, relying on Justice Powell’s concurrence, have explicitly recognized a qualified reportorial privilege in criminal cases. See e.g. United States v. LaRouche Campaign, 841 F.2d 1176, 1182 (1st Cir. 1988); United States v. Burke, 700 F.2d 70, 77 (2d Cir.), cert. denied, 464 U.S. 816, 104 S.Ct. 72, 78 L.Ed.2d 85 (1983); Cuthbertson I, 630 F.2d 139, 147 (3d Cir.1980), cert. denied, 449 U.S. 1126, 101 S.Ct. 945, 67 L.Ed.2d 113 (1981); cf. United States v. Caporale, 806 F.2d 1487, 1504 (11th Cir.1986) (without discussion adopting standard for reportorial privilege as articulated in Miller v. Transamerican Press, Inc., 621 F.2d 721, modified, 628 F.2d 932 (5th Cir.1980), cert. denied, 450 U.S. 1041, 101 S.Ct. 1759, 68 L.Ed.2d 238 (1981)), cert. denied, 450 U.S. 1041, 101 S.Ct. 1759, 68 L.Ed.2d 238 (1981).
The Fifth Circuit, in Miller, 621 F.2d at 725, a libel action, held that a reporter had a First Amendment privilege to refuse to disclose the identity of a confidential informant. However, subsequently, the Fifth Circuit has held that reporters do not enjoy a qualified privilege not to disclose non-confidential information in criminal cases. United States v. Smith, 135 F.3d 963, 972 (5th Cir.1998) (explicitly reserving ruling on confidential information in criminal eases).
The United States Court of Appeals for the District of Columbia Circuit appears only to have considered the reportorial privilege in the civil context, recognizing a qualified privilege in Zerilli v. Smith, 656 F.2d 705, 714 (D.C.Cir.1981). The District Court for the District of Columbia, however, has recognized the reportorial privilege in a criminal case. United States v. Hubbard, 493 F.Supp. 202, 205 (D.D.C.1979).
Although the United States Court of Appeals for the Tenth Circuit has recognized a reportorial privilege in civil actions, see Silkwood v. Kerr-McGee Corp., 563 F.2d 433, 436-37 (10th Cir.1977), it has not examined whether such a privilege also exists in the criminal context. The Seventh Circuit has not addressed the issue. And, the Eighth Circuit, in a footnote following a citation to Branzburg with the parenthetical observation: “rejecting news reporter’s privilege,” stated:
Some courts have interpreted Branzburg as establishing a qualified news reporter’s privilege. Although the Ninth Circuit in Shoen cited our opinion in Cervantes [v. Time, Inc., 464 F.2d 986 (8th Cir.1972)] for support, we believe this question is an open one in this Circuit.
In re Grand Jury Subpoena Duces Tecum, 112 F.3d 910, 918 n. 8 (8th Cir.) (citations omitted), cert, denied sub nom., Office of President v. Office of Independent Counsel, 521 U.S. 1105, 117 S.Ct. 2482, 138 L.Ed.2d 991 (1997).
Thus, it is fair to say that many courts of appeals have been less than faithful in adhering to the explicit decision in Branzburg, most often offering as the justification, Justice Powell’s concurring opinion which, as outlined above and, as explained by the Sixth Circuit, affords no real warrant for the rather widespread disregard of Branzburg by the courts of appeals which have used the concurrence to conclude that Branzburg created a reportorial privilege. The Sixth Circuit articulated quite clearly why the general defalcation by some courts of appeals from the majority opinion in Branzburg (on the theory that it is warranted by the concurring opinion of Justice Powell) is simply unwarranted. Storer Communications, Inc. v. Giovan, 810 F.2d 580 (6th Cir.1987).
In Storer Communications, Bradley M. Stone, a Storer reporter, was held in contempt and subsequently imprisoned for failure to comply with a subpoena to give evidence before a grand jury. In particular, Stone was issued a subpoena duces tecum to produce certain videotapes reporting on the activities of Detroit youth gangs. The videotapes were sought to identify gang members in connection with an investigation of the murder of a state police officer. It was alleged that two of the gang members present during a filming of Stone’s production had committed the murder. The videotape was thought to permit identification of the perpetrators.
The Sixth Circuit began its analysis by making the observation that “[i]n contending that, as a newsreporter, he [Stone] was entitled to assert a ‘privilege grounded in the First Amendment,’ Stone would have us restructure the holding of the Supreme Court in Branzburg v. Hayes since the majority opinion in that case rejected the existence of such a first amendment testimonial privilege.” Storer Communications, 810 F.2d at 583 (citation omitted). In support of that observation, the Sixth Circuit cited the text of Branzburg, 408 U.S. at 689-91, 92 S.Ct. 2646, in which the claim of privilege was clearly rejected (“[t]his we decline to do”), and then explained the predicate for the reporter’s argument:
Stone insists, however, that when his reading of Justice Powell’s concurring opinion is superimposed upon Justice White’s majority decision, the government is required to make “a clear and convincing showing of relevancy, essentiality, and exhaustion of non-media sources” for obtaining the information before he can be compelled to testify. In arguing that this amounts to a “qualified privilege,” Stone relies heavily upon the dissenting opinion of three justices in Branzburg, and upon opinions from other circuit courts.
Storer Communications, 810 F.2d at 583-84. The Sixth Circuit rejected the reporter’s argument, concluding that, because acceptance of Stone’s position “would be tantamount to our substituting, as the holding of Branz-burg, the dissent written by Justice Stewart (joined by Justices Brennan and Marshall) for the majority opinion, we must reject that position.” Id. at 584. That conclusion was followed immediately by the Sixth Circuit’s observation that five of the Justices (Justices White, Blackmun, Powell, and Rehnquist and Chief Justice Berger) had explicitly declined to recognize the existence of a First Amendment reporter’s testimonial privilege not enjoyed by other citizens. Id.
Then, after explaining the rationale of the dissent by Justice Stewart, the Sixth Circuit stated that:
Accordingly, we decline to join some other circuits, to the extent that they have stated their contrary belief ... and have thereupon adopted the qualified privilege balancing process urged by the three Branzburg dissenters and rejected by the majority.
Id. at 584-85 (footnote omitted). The Sixth Circuit went on to articulate what it perceived to be the error of those courts which had accepted Justice Powell’s concurring opinion as supplying a rule different than the majority opinion. To that end, the court cited the part of Justice Powell’s opinion relied on by those errant decisions:
The asserted claim to privilege should be judged on its facts by the striking of a proper balance between freedom of the press and the obligation of all citizens to give relevant testimony with respect to criminal conduct. The balance of these vital constitutional and societal interests on a case-by-case basis accords with the tried and traditional way of adjudicating such questions. In short, the courts will be available to newsmen under circumstances where legitimate First Amendment interests require protection.
Id. at 585 (quoting Branzburg, 408 U.S. at 710, 92 S.Ct. 2646 (Powell, J., concurring)). As to that text, the Sixth Circuit held:
That portion of Justice Powell’s opinion certainly does not warrant the rewriting of the majority opinion to grant a First Amendment testimonial privilege to news-reporters, especially when the quoted language is considered in the context of that language which precedes it.
Id.
The justification for that interpretation of Justice Powell’s concurrence was that “Justice Powell was alluding to” the language from the majority opinion at the end of Justice White’s opinion which explained that reporters had certain protections. Id. (citing Branzburg, 408 U.S. at 707-08, 92 S.Ct. 2646). Storer then concluded that “[i]t is readily apparent, then, that Justice Powell’s concurring opinion is entirely consistent with the majority opinion, and neither limits nor expands upon its holding, but that, instead, it responds to what Justice Powell perceived as an unwarranted characterization of that holding by Justice Stewart.” Id.
An examination of the decisions that rely on Justice Powell’s concurring opinion to find a qualified reportorial privilege shows the truth of the Sixth Circuits view that:
Perhaps Justice Powell’s use of the term “privilege” has provided too great a temptation for those inclined to disagree with the majority opinion. In the sense that the balancing referred to by Justice Powell, when instigated by a reporter seeking to protect a confidential source, may result in the denial to a party of the use of evidence which is reliable, one is reminded of the invocation of a “privilege” as contrasted with an “exclusion” which prohibits the introduction of evidence which is unreliable or calculated to mislead or prejudice. But, this balancing of interest should not then be elevated on the basis of semantical confusion, to the status of a first amendment constitutional privilege.
Id. at 585-86 (footnote omitted).
Rather, as instructed by the majority and concurring Branzburg opinions, and as explained by the Sixth Circuit, district courts must make, on a case-by-case basis, a proper balance between freedom of the press and the obligation of all citizens to give relevant testimony “by determining whether the reporter is being harassed in order to disrupt his relationship with confidential news sources, whether the grand jury’s investigation is being conducted in good faith, whether the information sought bears more than a remote and tenuous relationship to the subject of the investigation, and whether a legitimate law enforcement need will be served by forced disclosure of the confidential relationship.” Id. at 586, 92 S.Ct. 2646.
C. Branzburg, As Applied By The Fourth Circuit
The decisions of the United States Court of Appeals for the Fourth Circuit also teach that approach. However, some of those decisions do so by describing the balancing as if it were a qualified privilege. Hence, it is necessary to assess those decisions, some of which the parties have cited and some of which they have not.
The Fourth Circuit first applied Branz-burg in United States v. Steelhammer, 539 F.2d 373 (4th Cir.1976), wherein the court reviewed the order of a district court committing newsreporters to six months imprisonment for contempt of an order directing them to answer questions of the prosecuting counsel when they were called to be witnesses under subpoena in a civil contempt trial. The majority opinion in Steelhammer construed Branzburg to require “a balancing of two vital considerations: protection of the public by exacting the truth versus protection of the public through maintenance of free press.” Steelhammer, 539 F.2d at 375. The majority construed Branzburg, not to accord “a privilege, absolute or qualified, to the reporter,” but to provide a privilege to the public. Id.
Judge'Winter dissented from that view; and his opinion subsequently was adopted as the opinion of the Fourth Circuit, sitting en banc, in United States v. Steelhammer, 561 F.2d 539 (4th Cir.1977). Judge Winter observed that the reporters had not acquired “the information sought to be elicited from them on a confidential basis” and that a “study of the record fails to turn up even a scintilla of evidence that the reporters were subpoenaed to harass them or to embarrass their newsgathering abilities at any future public meetings that the miners might hold.” 539 F.2d at 376. Thereupon, Judge Winter explained that:
It therefore seems to me that, in the balancing of interests suggested by Mr. Justice Powell in his concurring opinion in Branzburg v. Hayes, the absence of a claim of confidentiality and the lack of evidence of vindictiveness tip the scale to the conclusion that the district court was correct in requiring the reporters to testify-
Id. (emphasis added) (citation omitted).
Because Judge Winter’s opinion subsequently became the decision of the en banc court, his observations about the majority opinion are particularly important. On that point, Judge Winter explained that the absence of confidentiality and the absence of evidence of vindictiveness “convert the majority’s conclusion into a broad holding that journalists called as witnesses in civil cases have a privilege to refuse to testify about all events they have observed in their professional capacity if other witnesses, to the same events are available, despite the avowal that the holding is limited to the facts of the case.” Id. Quite clearly then, by adopting Judge Winter’s dissent as the opinion of the Court en banc, the Fourth Circuit, in Steel-hammer, rejected the reportorial privilege and grounded its decision in the language of Justice Powell’s concurrence, which like the concluding paragraphs of the Branzburg majority opinion, assures that reporters will be protected from harassment even though they have no First Amendment privilege, qualified or absolute.
The next occasion for consideration of the reportorial privilege by the Fourth Circuit was in LaRouche v. National Broadcasting Co., Inc., 780 F.2d 1134 (4th Cir.1986), cert. denied, 479 U.S. 818, 107 S.Ct. 79, 93 L.Ed.2d 34 (1986). LaRouche involved a civil action for defamation and a counterclaim for interference with business relations in which the plaintiff, LaRouche, moved to compel NBC to disclose the confidential sources of a story which was asserted to be defamatory. The district court refused to compel NBC to disclose confidential sources. In LaRouche, the Court of Appeals articulated this protection as “the journalist’s privilege.” Specifically the Court held that “[i]n determining whether the journalist’s privilege will protect the source in a given situation, it is necessary for the district court to balance the interests involved.” 780 F.2d at 1139 (citing Justice Powell’s concurring opinion in Branz-burg.) The court then turned to a test adopted by the Fifth Circuit observing that:
To aid in the balancing of these interests, courts have developed a three part test: (1) whether the information is relevant, (2) whether the information can be obtained by alternative means, and (3) whether there is a compelling interest in the information.
Id. (citing Miller v. Transamerican Press, Inc., 621 F.2d 721).
Six years later, the Fourth Circuit once again had occasion to assess the meaning of Branzburg in In re Shain, 978 F.2d 850 (4th Cir.1992). In Shain, the Court of Appeals reviewed, and affirmed, the contempt convictions of four reporters who refused to testify in a criminal trial about matters learned by the reporters during their newsgathering activities. The affirmance of the conviction used both the language of privilege and of protection:
[W]e hold that the incidental burden on the freedom of the press in the circumstances of this case does not require the invalidation of the subpoenas issued to the reporters and absent evidence of governmental harassment or bad faith, the reporters have no privilege different from that of any other citizen not to testify about knowledge relevant to a criminal prosecution.
Shain, 978 F.2d at 852 (emphasis added).
However, when explaining that its decision in Shain was directed by the decisions in Branzburg and Steelhammer, the Fourth Circuit explicitly recognized that “[i]n Branz-burg the Supreme Court refused to recognize a reporter’s privilege not to testify in criminal prosecutions about relevant evidence known to the reporter, regardless of whether the information was obtained during news-gathering.” Id. Following that observation, the Court of Appeals quoted the language from the Branzburg majority opinion in which the Court explicitly declined to create a privilege. Id. At the same time, the Fourth Circuit recognized that, in Branzburg, the Supreme Court had reaffirmed “First Amendment protections of news gathering” even though it had refused to create a reportorial privilege. Id. In that regard, the court articulated that the “Supreme Court cautioned that if information is sought from the press other than in good faith, a different issue is presented: ‘Official harassment of the press undertaken not for purposes of law enforcement but to disrupt a reporter’s relationship with his news sources would have no justification.’” Id. (quoting Branzburg, 408 U.S. at 707, 92 S.Ct. at 2670 (the majority opinion)).
The court then turned its attention to the concurring opinion of Justice Powell and held that “[i]n Steelhammer, we applied Branz-burg to compel testimony from the press in a civil contempt trial, recognizing that only when evidence of harassment is presented do we balance the interests involved.” Id. at 853 (citing Judge Winter’s dissent in Steel-hammer). Thereupon, the Fourth Circuit, after assessing the record, found that the reporters had asserted neither that the statements were given in confidence nor that there was harassment, observed that the reporter’s testimony would be relevant and not duplicative, and concluded that “the absence of confidentiality or vindictiveness in the facts of this case fatally undermines the reporter’s claim to a First Amendment privilege.” Id. at 853. In so doing, the opinion in Shain again resorted to the word “privilege,” but the holding in Shain rests squarely upon the observation that Branzburg had explicitly rejected the invitation to create a privilege and had been grounded, both in the majority and in Justice Powell’s concurring opinion, in the need to protect the press from harassment.
In fact, it was precisely that construction of Branzburg by the Shain majority that prompted Judge Wilkinson to issue a separate opinion concurring in the judgment reached by the majority, but declining to “embrace its reasoning.” Shain, 978 F.2d at 854. Judge Wilkinson would require the balancing specified in LaRouche in circumstances other than when the record demonstrated the presence of harassment. As Judge Wilkinson put it:
The majority implies, however, that the interest of the newsgatherer amounts to no more than an interest in remaining free from state harassment. Because a subpoena can rarely be challenged successfully on that basis, I submit that the' reportorial interest, as defined by the majority, is not much of an interest at all.
Id. at 854 (Wilkinson, J., concurring). Although Judge Wilkinson’s concurring opinion also mentions the word “privilege,” its thrust is not to create a privilege, but to require the kind of balancing called for by Justice Powell in circumstances other than when harassment is demonstrated by the record.
Therefore, the predicate for conducting the balancing of factors identified in LaRouche is, as a consequence of the decision in Shain, the circumstance in which both confidentiality of the source material and vexation or harassment is demonstrated by the record. ín sum, a survey of the decisions in this circuit teaches that our Court of Appeals has recognized that Branzburg does not create a reportorial privilege, but that it entitles reporters to protection under certain circumstances.
Here, the source was promised that her identity would be kept in confidence and the reporter has adhered to that promise. However, the source gave the information on the record and with the knowledge that the reporter intended to air all or part of it to the public. Hence, there is no claim here that the substance of the source’s communications were to be maintained in confidence (as might be the case, for example, if the source gave the information off the record and with the understanding that it was not for publication or quotation).
Thus, the only confidentiality involved here is the identity of the source. That, however, is a moot point because counsel for the Defendants independently arrived at the identity of the source and that identity is now a matter of public record. Hence, to the extent that there was confidentiality attached to the identification of the source, it has been eliminated. And, there is certainly nothing in this record to suggest that this prosecution or the desire to secure this evidence is animated by harassment or vexatiousness.
For the foregoing reasons, Branzburg affords no First Amendment reportorial privilege to WTVR or Ziliani. And, under Shain, the balancing process called for by LaRouche is not called into play here because there is neither vexation, harassment nor any remaining confidentiality. Accordingly, under the controlling precepts in this circuit, the motion to quash the subpoena for the videotape of the Gauldin interview must be denied.
Even if, as WTVR and Ziliani argue, the test to be applied is the balancing process set forth in LaRouche, the motion to quash the subpoena still must be denied. Under LaRouche, the factors to be assessed are: (1) whether the information sought is relevant; (2) whether the information could have been obtained by alternative means; and (3) whether there is a compelling interest in the information. 780 F.2d at 1139.
For the reasons explained in Part I above, the information sought by the subpoena is relevant and it cannot be obtained by alternative means. There is a compelling interest in having “every man’s evidence” at a criminal trial, Branzburg, 408 U.S. at 688, 92 S.Ct. 2646 (quoting United States v. Bryan, 339 U.S. 323, 331, 70 S.Ct. 724, 94 L.Ed. 884 (1950)), to the extent that it is relevant. The ability to impeach a key prosecution witness and to admit her statements into evidence to that end is a critically important component of a fair trial and is the sine qua non of a meaningful right to confrontation and cross-examination. These rights are secured to the Defendants by the Fifth and Sixth Amendments. And, society too has a compelling interest in assuring a fair trial and meaningful confrontation. As in Branzburg, Steelhammer and Shain, the compelling law enforcement interest overrides the interest of the press where, as here, there is no remaining confidentiality and not even the suggestion of vexation. Thus, when the LaRouche balance is struck, it justifies disclosure of the Gauldin interview.
CONCLUSION
For the foregoing reasons, the Motion to Quash, filed by WTVR and Ziliani, is denied. The subpoena duces tecum shall be modified to require production of only the unedited videotape of the Gauldin interview, and any verbatim or substantially verbatim quotations of Gauldin made by Ziliani during the interview.
The Clerk is directed to send a copy of this Memorandum Opinion to all counsel of record.
. Specifically, the subpoena requests:
Any and all recordings, of whatever nature, in unedited form, of any statements by or conversations with any person known or purporting to be a witness to alleged conduct in this case, and any notes, unedited or redacted of said statements or conversation with or between reporter Jean Zillioni [sic] and Apryl Gauldin.
. The Indictment also charged various firearms offenses. The grand jury returned a Superseding Indictment on May 24, 2000, adding charges of violations of the Mann Act, 18 U.S.C. § 2421, and the Travel Act, 18 U.S.C. § 1952(a)(3), and deleting some -charges that were found in the original indictment. The Superseding Indictment does not identify by name any of the women who are alleged to have bought drugs for sex. Additionally, the Superseding Indictment alleges that up to five women were involved in the scheme, not just the two named in the original Indictment.
. Although district courts are admonished that their discretion in issuing Rule 17(c) subpoenas is circumscribed by the responsibility to prevent Rule 17(c) from being improperly used as a discovery alternative to Fed.R.Crim.P. 16, see Bowman Dairy, 341 U.S. at 220, 71 S.Ct. 675, where, as here, the subpoena is directed to a third party, that precise problem is. not presented because Rule 16 regulates the discovery obligations of.the United States and the defendant, and does not address how the United States or the defendant may secure evidence in the possession of third-parties. Nonetheless, Nixon instructs that, even as to third parties, Rule 17(c) does not confer a fishing license upon litigants in criminal cases.
. In United States v. Cuthbertson, 630 F.2d 139, 144 (3rd Cir. 1980), the Third Circuit assumed, without deciding, that the text of Rule 17(c) provides for in camera inspection of the materials ordered to be produced in subpoena duces tecum. The First Circuit found in camera review proper:
[w]here there is a very likely need for materials by the' defense, a very real if generalized concern about excessive disclosure on the part of the media, a judicial economy interest in avoiding delay during trial, and the possibility that by the time a decision must be made on disclosure to a party the need for disclosure will have disappeared or diminished.
United States v. LaRouche Campaign, 841 F.2d 1176, 1183 (1st Cir.1988); accord In re Martin Marietta Corp., 856 F.2d 619, 621-22 (4th Cir. 1988) (affirming district court’s conclusion after in camera review that subpoena met Nixon requirements).
. Several courts have analyzed the issue without considering the decisions in Carter and Iozia on which the general statement in Nixon was based. See, e.g., United States v. Fields, 663 F.2d 880 (9th Cir.1981); United States v. Cherry, 876 F.Supp. 547, 551 (S.D.N.Y.1995). Those decisions seem to articulate an absolute prohibition against use of Rule 17(c) to secure impeachment material before trial. That construction of Rule 17, which ignores the plain language of Rule 17(c), is at odds with the well-reasoned decisions which have made the issue a discretionary one depending upon the facts of particular cases and upon the certainty with which the court could say that the person giving the statement would testify at trial. That construction also is at odds with the “chief innovation [of Rule 17(c) which] was to expedite the trial by providing a time and place before trial for the inspection of subpoenaed materials.” Nixon, 418 U.S. at 698-99, 94 S.Ct. 3090. Furthermore, a broad brush prohibition against requiring pretrial production of impeachment materials runs counter to the fundamental notion reflected in the third facet of the test enunciated in Iozia which is that the material is essential for a proper preparation of trial. 13 F.R.D. at 338. In this case, there is no doubt, after viewing the interview and inspecting the charging documents, that this material is necessary to properly prepare a defense at trial.
. See Sharon K. Malheiro, Note, The Journalist’s Reportorial Privilege — What Does It Protect And What Are Its Limits, 38 Drake L.Rev. 79 (1988).
. 408 U.S. at 709-10, 92 S.Ct. 2646; see also Igor Kirman, Note, Standing Apart To Be A Part: The Precedential Value Of Supreme Court Concurring Opinions, 95 Columbia L.Rev.2083, 2094 (1995). A simple concurrence is announced "Justice X, concurring.” Id. at 2084 n. 9. In Branzburg, Justice Powell announced his separate opinion as "Justice Powell, concurring.” 408 U.S. at 709, 92 S.Ct. 2646. A simple concurrence is a statement by a Justice who "explicitly agree[s] with both the legal rule and the outcome announced by the lead opinion and simply ex-pandís] upon that analysis in a separate opinion.” Ken Kimura, Note, A Legitimacy Model for the Interpretation of Plurality Decisions, 77 Cornell L.Rev. 1593, 1595 n. 13 (1992). Because of this, "[a] decision with only a simple concurrence should not be considered a plurality decision.” Id. Therefore, contrary to some commentators' remarks, see e.g. Michael Fitzsimmons, Defending the Informers: The Media's Right to Protect Non-Confidential Source Information Following United States v. Smith, 6 Vill. Sports & Ent.L.J. 295 (1999); Paul Marcus, The Reporter’s Privilege: An Analysis of the Common Law, Branzburg v. Hayes, and Recent Statutory Developments, 25 Ariz.L.Rev. 815 (1984), the opinion authored by Justice White is a majority, and not a plurality, opinion.
. Justice Douglas' dissent reflects his continued absolutist view of the First Amendment and is not in harmony with the dissent filed by Justices Stewart, Brennan and Marshall.
. Indeed, the commentators correctly have observed that there is afoot a general revolution in the courts of appeals when it comes to adhering to the five Justice majority in Branzburg. See generally Christopher J. Clark, The Recognition of a Qualified Privilege for Non-Confidential Journalistic Materials: Good Intentions, Bad Law, 65 Brook.L.Rev. 369 (1999); Alison Lynn Tuley, Note, Outtakes, Hidden Cameras, and the First Amendment: A Reporter's Privilege, 38 Wm. & Mary L.Rev. 1817 (1997); Brian M. Cullen, Note, Circumventing Branzburg: Absolute Protection for Confidential News Sources, 18 Suffolk U.L.Rev. 615 (1984).
. WTVR and Ziliani rely, in part, on the Fourth Circuit's decision in Church of Scientology International v. Daniels, 992 F.2d 1329 (4th Cir.), cert. denied, 510 U.S. 869, 114 S.Ct. 195, 126 L.Ed.2d 153 (1993), which involved a civil defamation action. In a very brief discussion, and without any citation to Branzburg, the Court held that the movant had failed to make the showing required for production of privileged materials, citing to LaRouche. 992 F.2d at 1335. In a parenthetical next to the citation to LaRouche, the Court succinctly set forth the balancing test adopted in LaRouche. Id. WTVR and Ziliani cite Daniels for the proposition that non-confidential materials are also protected by the asserted reportorial privilege. However, the Court, in Daniels, did not conclude that at all. Rather, the Court reasoned that non-confidentiality only influenced assessment of the relevance factor under La-Rouche. Id.; see also LaRouche, 780 F.2d at 1139 (the fact that movant already 'knew confidential sources' identities influenced court’s finding that movant had not exhausted alternative means of obtaining information). In any event, the construction of Daniels urged by WTVR and Ziliani is directly contrary to the conclusion in Steelhammer, 539 F.2d at 376 (Winter, J., dissenting), adopted by, 561 F.2d 539, 540 (4th Cir.1977) (en banc), that absence of confidentiality is a factor that goes in favor of disclosure. Accordingly, Daniels does not provide any meaningful support for WTVR and Ziliani’s motion.
. There is no contention here that the reportorial privilege is available under Federal Rule of Evidence 501. See, Boutrous & Stodder, Retool
ing The Federal Common-Law Reporter’s Privilege, 17 SPG Comm.Law 1 (1999). Hence, that issue need not be addressed.
. The same cannot be said of Ziliani’s notes unless they contain either verbatim or substantially verbatim quotations from Gauldin. See Cuthbertson I, 630 F.2d at 148; cf. United States v. Smith, 31 F.3d 1294, 1302 n. 7 (4th Cir.1994) (Notes taken by third parties during witness interviews may also qualify as a “statement" of the witness under § 3500(e)(2) [Jencks Act], if they are “substantially verbatim.”). Nor can there be disclosure of notes made in the editing or writing process.
|
CASELAW
|
OxidizedFinder Behavior and Compliance
OxidizedFinder strives to be as compliant as possible with other meta path importers. So generally speaking, the behavior as described by the importlib documentation should be compatible. In other words, things should mostly just work and any deviance from the importlib documentation constitutes a bug worth reporting.
That being said, OxidizedFinder’s approach to loading resources is drastically different from more traditional means, notably loading files from the filesystem. PyOxidizer breaks a lot of assumptions about how things have worked in Python and there is some behavior that may seem odd or in violation of documented behavior in Python.
The sections below attempt to call out known areas where OxidizedFinder deviates from typical behavior.
__file__ and __cached__ Module Attributes
Python modules typically have a __file__ attribute holding a str defining the filesystem path the source module was imported from (usually a path to a .py file). There is also the similar - but lesser known - __cached__ attribute holding the filesystem path of the bytecode module (usually the path to a .pyc file).
Important
OxidizedFinder will not set either attribute when importing modules from memory.
These attributes are not set because it isn’t obvious what the values should be! Typically, __file__ is used by Python as an anchor point to derive the path to some other file. However, when loading modules from memory, the traditional filesystem hierarchy of Python modules does not exist. In the opinion of PyOxidizer’s maintainer, exposing __file__ would be lying and this would cause more potential for harm than good.
While we may make it possible to define __file__ (and __cached__) on modules imported from memory someday, we do not yet support this.
OxidizedFinder does, however, set __file__ and __cached__ on modules imported from the filesystem. So, a workaround to restore these missing attributes is to avoid in-memory loading.
Note
Use of __file__ is commonly encountered in code loading resource files. See Loading Resource Files for more on this topic, including how to port code to more modern Python APIs for loading resources.
__path__ Module Attribute
Python modules that are also packages must have a __path__ attribute containing an iterable of str. The iterable can be empty.
If a module is imported from the filesystem, OxidizedFinder will set __path__ to the parent directory of the module’s file, just like the standard filesystem importer would.
If a module is imported from memory, __path__ will be set to the path of the current executable joined with the package name. e.g. if the current executable is /usr/bin/myapp and the module/package name is foo.bar, __path__ will be ["/usr/bin/myapp/foo/bar"]. On Windows, paths might look like C:\dev\myapp.exe\foo\bar.
Python’s zipimport importer uses the same approach for modules imported from zip files, so there is precedence for OxidizedFinder doing things this way.
ResourceReader Compatibility
ResourceReader has known compatibility differences with Python’s default filesystem-based importer. See Support for ResourceReader for details.
ResourceLoader Compatibility
The ResourceLoader interface is implemented but behavior of get_data(path) has some variance with Python’s filesystem-based importer.
See Support for ResourceLoader for details.
Note
ResourceLoader is deprecated as of Python 3.7. Code should be ported to ResourceReader / importlib.resources if possible.
importlib.metadata Compatibility
OxidizedFinder implements find_distributions() and therefore provides the required hook for importlib.metadata to resolve Distribution instances. However, the returned objects do not implement the full Distribution interface.
Here are the known differences between OxidizedDistribution and importlib.metadata.Distribution instances:
• locate_file() is not defined.
• @classmethod from_name() is not defined.
• @classmethod discover() is not defined.
• @staticmethod at() is not defined.
• @property files raises NotImplementedError.
There are additional _ prefixed attributes of importlib.metadata.Distribution that are not implemented. But we do not consider these part of the public API and don’t feel they are worth calling out.
In addition, OxidizedFinder.find_distributions() ignores the path attribute of the passed Context instance. Only the name attribute is consulted. If name is None, all packages with registered distribution files will be returned. Otherwise the returned list contains at most 1 PyOxidizerDistribution corresponding to the requested package name.
pkgutil Compatibility
The pkgutil package in Python’s standard library reacts to special functionality on MetaPathFinder instances.
pkgutil.iter_modules() attempts to use an iter_modules() method to obtain results.
OxidizedFinder implements iter_modules(prefix="") and pkgutil.iter_modules() should work. However, there are some differences in behavior:
• iter_modules() is defined to be a generator but OxidizedFinder.iter_modules() returns a list. list is iterable and this difference should hopefully be a harmless implementation detail.
• pkgutil.iter_modules() inspects sys.path_importer_cache as part of evaluating its path argument. However, OxidizedFinder does not populate sys.path_importer_cache, so path-based filtering via pkgutil.iter_modules(path=...) will not work like it does with the standard library’s importer.
|
ESSENTIALAI-STEM
|
4 Top Stock Trades for Wednesday: AMD, GOOGL, AMZN, NKLA
InvestorPlace - Stock Market News, Stock Advice & Trading Tips
Equities finally took a slight break on Tuesday, declining a bit after several strong days of rallying. With that in mind, let’s look at a few top stock trades for Wednesday.
Top Stock Trades for Tomorrow No. 1: Advanced Micro Devices (AMD)
Click to Enlarge
Source: Chart courtesy of StockCharts.com
Advanced Micro Devices (NASDAQ:AMD) has been quiet for a few weeks now, but started off hot on Tuesday. Shares ended the day up about 6.5%.
While the stock was having trouble reclaiming its 20-day moving average, it continued to hold its 50-day moving average. And although bulls weren’t in strong control necessarily, the setup was hardly bearish.
With a double-bottom near $49, investors had a measured risk/reward. And now, shares are pushing into downtrend resistance.
4 Electric Car Stocks to Charge Your Portfolio
If AMD stock can continue higher, it puts $58 in play. Above $58, and new all-time highs are possible. Should downtrend resistance keep AMD in check, however, see if the 20-day moving average acts as support. However, below the 50-day moving average is not a good development for longs.
Top Stock Trades for Tomorrow No. 2: Alphabet (GOOG, GOOGL)
Click to Enlarge
Source: Chart courtesy of StockCharts.com
Alphabet (NASDAQ:GOOGL, NASDAQ:GOOG) has been trading well, now hitting its highest level since February. It helps that the Nasdaq Composite hit a record high on Tuesday, baffling many investors.
Shares are breaking out over short-term resistance at $1,450 as GOOGL continues to fill into the big gap-down from February. If it can fill it up near $1,480, it puts $1,500-plus in play, as well as new highs.
On a dip, though, I need to see uptrend support (blue line) and the 20-day moving average hold as support. If it doesn’t, it could trigger a profit-taking reaction among traders who bought much lower.
Top Stock Trades for Tomorrow No. 3: Amazon (AMZN)
Click to Enlarge
Source: Chart courtesy of StockCharts.com
Like the Nasdaq, Amazon (NASDAQ:AMZN) is hitting new highs too. Shares are breaking out over $2,500 and uptrend resistance (thin blue line). Now what?
It would obviously be bullish to see prior resistance hold as support should Amazon pull back. If it doesn’t, though, see that uptrend support holds on the dip. Otherwise, it could signal that AMZN needs more time to consolidate.
One level to note is $2,531, which is the 161.8% extension from the March low to the February high. Above that, and bulls are in firm control.
6 Cybersecurity Stocks Keeping Your Data Safe
On a continued push, look to see if AMZN can climb to $2,745, which is the two-times extension of the previously mentioned range. For longer-term investors, the 261.8% extension comes into play near $3,090 — although, $3,000 will likely be a bigger hurdle than this mark.
Top Stock Trades for Tomorrow No. 4: Nikola (NKLA)
Click to Enlarge
Source: Chart courtesy of StockCharts.com
Nikola (NASDAQ:NKLA) shares are going bonkers. The stock rallied more than 100% on Monday and are up another 9% on Tuesday — although, the session’s range was incredibly wide. We’ve seen a high of $93.99 and a low of $57 today.
The electric car space has been heating up, with Tesla (NASDAQ:TSLA) and Nio (NYSE:NIO) also showing momentum lately.
As far as Nikola goes, this one is a no-touch for me. I would be interested in seeing if the stock can get to $100, but I will not stake my hard-earned dollars on finding out. A move below Tuesday’s low puts the week’s low in play at $40.42. Below that, and keep an eye on the $35 area. Below that, and bulls will lose control and momentum.
This is a great stock to observe, but likely too volatile to trade for most.
Bret Kenwell is the manager and author of Future Blue Chips and is on Twitter @BretKenwell. As of this writing, Bret Kenwell is long GOOGL and AMD.
The post 4 Top Stock Trades for Wednesday: AMD, GOOGL, AMZN, NKLA appeared first on InvestorPlace.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
blob: 1d0ac9ada44f9d569bbc442bc1142e924e8fa8bf [file] [log] [blame]
#include <cstdio>
#include "XLIFFFile.h"
#include "ValuesFile.h"
#include "localize.h"
#include <stdio.h>
int pseudolocalize_xliff(XLIFFFile* xliff, bool expand);
static int
test_filename(const string& file, const string& locale, const string& expected)
{
string result = translated_file_name(file, locale);
if (result != expected) {
fprintf(stderr, "translated_file_name test failed\n");
fprintf(stderr, " locale='%s'\n", locale.c_str());
fprintf(stderr, " expected='%s'\n", expected.c_str());
fprintf(stderr, " result='%s'\n", result.c_str());
return 1;
} else {
if (false) {
fprintf(stderr, "translated_file_name test passed\n");
fprintf(stderr, " locale='%s'\n", locale.c_str());
fprintf(stderr, " expected='%s'\n", expected.c_str());
fprintf(stderr, " result='%s'\n", result.c_str());
}
return 0;
}
}
static int
translated_file_name_test()
{
bool all = true;
int err = 0;
if (all) err |= test_filename("//device/samples/NotePad/res/values/strings.xml", "zz_ZZ",
"//device/samples/NotePad/res/values-zz-rZZ/strings.xml");
if (all) err |= test_filename("//device/samples/NotePad/res/values/strings.xml", "zz",
"//device/samples/NotePad/res/values-zz/strings.xml");
if (all) err |= test_filename("//device/samples/NotePad/res/values/strings.xml", "",
"//device/samples/NotePad/res/values/strings.xml");
return err;
}
bool
return_false(const string&, const TransUnit& unit, void* cookie)
{
return false;
}
static int
delete_trans_units()
{
XLIFFFile* xliff = XLIFFFile::Parse("testdata/strip_xliff.xliff");
if (xliff == NULL) {
printf("couldn't read file\n");
return 1;
}
if (false) {
printf("XLIFF was [[%s]]\n", xliff->ToString().c_str());
}
xliff->Filter(return_false, NULL);
if (false) {
printf("XLIFF is [[%s]]\n", xliff->ToString().c_str());
set<StringResource> const& strings = xliff->GetStringResources();
printf("strings.size=%zd\n", strings.size());
for (set<StringResource>::iterator it=strings.begin(); it!=strings.end(); it++) {
const StringResource& str = *it;
printf("STRING!!! id=%s value='%s' pos=%s file=%s version=%d(%s)\n", str.id.c_str(),
str.value->ContentsToString(ANDROID_NAMESPACES).c_str(),
str.pos.ToString().c_str(), str.file.c_str(), str.version,
str.versionString.c_str());
}
}
return 0;
}
static int
filter_trans_units()
{
XLIFFFile* xliff = XLIFFFile::Parse("testdata/strip_xliff.xliff");
if (xliff == NULL) {
printf("couldn't read file\n");
return 1;
}
if (false) {
printf("XLIFF was [[%s]]\n", xliff->ToString().c_str());
}
Settings setting;
xliff->Filter(keep_this_trans_unit, &setting);
if (false) {
printf("XLIFF is [[%s]]\n", xliff->ToString().c_str());
set<StringResource> const& strings = xliff->GetStringResources();
printf("strings.size=%zd\n", strings.size());
for (set<StringResource>::iterator it=strings.begin(); it!=strings.end(); it++) {
const StringResource& str = *it;
printf("STRING!!! id=%s value='%s' pos=%s file=%s version=%d(%s)\n", str.id.c_str(),
str.value->ContentsToString(ANDROID_NAMESPACES).c_str(),
str.pos.ToString().c_str(), str.file.c_str(), str.version,
str.versionString.c_str());
}
}
return 0;
}
static int
settings_test()
{
int err;
map<string,Settings> settings;
map<string,Settings>::iterator it;
err = read_settings("testdata/config.xml", &settings, "//asdf");
if (err != 0) {
return err;
}
if (false) {
for (it=settings.begin(); it!=settings.end(); it++) {
const Settings& setting = it->second;
printf("CONFIG:\n");
printf(" id='%s'\n", setting.id.c_str());
printf(" oldVersion='%s'\n", setting.oldVersion.c_str());
printf(" currentVersion='%s'\n", setting.currentVersion.c_str());
int i=0;
for (vector<string>::const_iterator app=setting.apps.begin();
app!=setting.apps.end(); app++) {
printf(" apps[%02d]='%s'\n", i, app->c_str());
i++;
}
i=0;
for (vector<Reject>::const_iterator reject=setting.reject.begin();
reject!=setting.reject.end(); reject++) {
i++;
printf(" reject[%02d]=('%s','%s','%s')\n", i, reject->file.c_str(),
reject->name.c_str(), reject->comment.c_str());
}
}
}
for (it=settings.begin(); it!=settings.end(); it++) {
const Settings& setting = it->second;
if (it->first != setting.id) {
fprintf(stderr, "it->first='%s' setting.id='%s'\n", it->first.c_str(),
setting.id.c_str());
err |= 1;
}
}
return err;
}
static int
test_one_pseudo(bool big, const char* expected)
{
XLIFFFile* xliff = XLIFFFile::Parse("testdata/pseudo.xliff");
if (xliff == NULL) {
printf("couldn't read file\n");
return 1;
}
if (false) {
printf("XLIFF was [[%s]]\n", xliff->ToString().c_str());
}
pseudolocalize_xliff(xliff, big);
string newString = xliff->ToString();
delete xliff;
if (false) {
printf("XLIFF is [[%s]]\n", newString.c_str());
}
if (false && newString != expected) {
fprintf(stderr, "xliff didn't translate as expected\n");
fprintf(stderr, "newString=[[%s]]\n", newString.c_str());
fprintf(stderr, "expected=[[%s]]\n", expected);
return 1;
}
return 0;
}
static int
pseudolocalize_test()
{
int err = 0;
err |= test_one_pseudo(false, "");
//err |= test_one_pseudo(true, "");
return err;
}
int
localize_test()
{
bool all = true;
int err = 0;
if (all) err |= translated_file_name_test();
if (all) err |= delete_trans_units();
if (all) err |= filter_trans_units();
if (all) err |= settings_test();
if (all) err |= pseudolocalize_test();
return err;
}
|
ESSENTIALAI-STEM
|
Lyle Boren
Lyle Hagler Boren (May 11, 1909 – July 2, 1992) was a U.S. Democratic Party politician and a member of the United States House of Representatives from Oklahoma, serving from 1937 to 1947 and was defeated for renomination in the 1946 election. He was known for his independence in the party, opposing labor union strikes on defense plants and attempts to expand the federal government.
Boren attracted national attention for his criticism of The Grapes of Wrath. He was active in state politics long after leaving Congress and is the father of former U.S. Senator and Oklahoma Governor David Boren, and grandfather of former U.S. Congressman Dan Boren, who represented Oklahoma's 2nd congressional district from 2005 to 2013.
Early life and career
Boren was born near Waxahachie, Texas, the son of Nannie May (née Weatherall) and Mark Latimer Boren, and moved to Lawton, Oklahoma in 1917, where he attended public schools. He finished high school in Choctaw, Oklahoma graduating from Choctaw High School, where the activities center used to bear his name until it was renamed in 2021. His sister was the "Heartbreak Hotel" songwriter Mae Axton. Boren was graduated from East Central College at Ada, Oklahoma, in 1930. From 1930 to 1935, he was a school teacher in Wolf, Oklahoma, and later served as a deputy procurement officer for the United States Department of the Treasury. Furthermore, he was involved in agricultural and mercantile business interests. He married the former Christine McKown, an Oklahoma State University graduate and public school teacher, in 1936, and had two children, David Boren and Susan Boren Dorman, and two grandchildren including Dan Boren.
Political career
Boren was first elected to the United States Congress in November 1936 as a Democrat, at the age of 26, and was the youngest person to serve in the House since Henry Clay. He was continuously re-elected until 1946 when he lost the Democratic primary election to Glen D. Johnson. Following his tenure in Congress, he resumed his business pursuits, except, in 1948, when he attempted to re-enter politics by running unsuccessfully for his former U.S. House seat.
Boren was known as an independent, opposing his party on several occasions. He worked against the growth of the federal government and excessive federal spending. He angered labor unions by backing legislation to ban strikes at defense plants, which did hurt him politically. Boren's legislative efforts included cancer research, old-age pensions, the Civil Aeronautics Board, newsprint and paper shortages, consumer product labeling, railroad freight rates, and municipal bonds.
In 1938, Boren told his fellow Congressmen, "The greatest problem in America today is to erase the question in the minds of men, 'What is the government going to do for me?' and replace it with the question, 'What can I do for my country".
Later life and state politics
After leaving Congress, Boren resumed many of his former mercantile business and agricultural pursuits. In 1957, he became a lobbyist for the railroad industry. He retired in 1969 and continued ranching in Oklahoma. He was also a spokesman and successful fund-raiser for the Oklahoma Democratic Party and worked tirelessly to help Democratic candidates win election to public office. Most notably, Boren assisted his son, David Boren's campaigns for Governor of Oklahoma in 1974, and U.S. Senate in 1978.
Retirement and death
Boren retired from public life due to failing health after approximately 50 years of service in Congress and later as an advocate for other candidates. He moved to Oklahoma City, Oklahoma, where he remained until his death on July 2, 1992.
|
WIKI
|
Overexpression of prostate specific membrane antigen by canine hemangiosarcoma cells provides opportunity for the molecular detection of disease burdens within hemorrhagic body cavity effusions
Matthew Dowling, Jonathan Samuelson, Bahaa Fadl-Alla, Holly C. Pondenis, Mark Byrum, Anne M. Barger, Timothy M. Fan
Research output: Contribution to journalArticle
Abstract
Background Canine hemangiosarcoma (cHSA) is a highly metastatic mesenchymal cancer that disseminates by hematogenous and direct implantation routes. Therapies for cHSA are generally ineffective, in part due to advanced clinical disease stage at the time of diagnosis. The validation of conventional molecular methods for detecting novel biomarkers preferentially expressed by cHSA could lead to more timely diagnosis, earlier therapeutic interventions, and improved outcomes. In humans, prostate-specific membrane antigen (PSMA) is a transmembrane protein overexpressed by prostate carcinoma and tumor-associated endothelium of various solid cancer histologies. Importantly, the preferential overexpression of PSMA by certain cancers has been leveraged for the development of diagnostic molecular imaging reagents and targeted therapeutics. Recently, PSMA has been qualitatively demonstrated to be expressed in cHSA cell lines, however, quantitative PSMA expressions and the potential utility of PSMA transcript identification in biologic fluids to support the presence of microscopic cHSA burden has not been reported. Therefore, this study sought to characterize the differential quantitative expressions of PSMA between cHSA and non-malignant tissues, and to determine the potential diagnostic utility of PCR-generated PSMA amplicons as a surrogate of rare cHSA cells dwelling within peritoneal and pericardial cavities. Methods Quantitative gene and protein expressions for PSMA were compared between one normal endothelial and six cHSA cell lines by RT-PCR, western blot analysis, and fluorescent microscopy. Additionally, gene and protein expressions of PSMA in normal canine tissues were characterized. Graded expressions of PSMA were determined in spontaneously-arising cHSA tumor samples and the feasibility of qualitative PCR as a molecular diagnostic to detect PSMA transcripts in whole blood from healthy dogs and hemorrhagic effusions from cHSA-bearing dogs were evaluated. Results PSMA gene and protein expressions were elevated (up to 6-fold) in cHSA cells compared with non-malignant endothelium. By immunohistochemistry, protein expressions of PSMA were detectable in all cHSA tissue samples evaluated. As predicted by human protein atlas data, PSMA’s expression was comparably identified at substantial levels in select normal canine tissues including kidney, liver, and intestine. In young healthy pet dogs, PSMA amplicons could not be identified in circulating whole blood yet were detectable in hemorrhagic effusions collected from pet dogs with confirmed cHSA or PSMA-expressing cancer. Conclusions PSMA is quantitatively overexpressed in cHSA compared to normal endothelium, but its protein expression is not restricted to only cHSA tumor tissues, as specific visceral organs also substantively express PSMA. Optimized qualitative PCR methods failed to amplify PSMA amplicons sufficiently for visible detection in circulating whole blood derived from healthy young dogs, yet PSMA transcripts were readily identifiable in hemorrhagic effusions collected from pet dogs with histologically confirmed cHSA or PSMA-expressing cancer. While preliminary, findings derived from a limited cohort of normal and diseased pet dogs provocatively raise the potential value of PSMA amplicon detection as an ancillary molecular diagnostic test for supporting the presence of microscopic cHSA disease burden within hemorrhagic body cavity effusions.
Original languageEnglish (US)
Article numbere0210297
JournalPloS one
Volume14
Issue number1
DOIs
StatePublished - Jan 2019
ASJC Scopus subject areas
• Biochemistry, Genetics and Molecular Biology(all)
• Agricultural and Biological Sciences(all)
• General
Fingerprint Dive into the research topics of 'Overexpression of prostate specific membrane antigen by canine hemangiosarcoma cells provides opportunity for the molecular detection of disease burdens within hemorrhagic body cavity effusions'. Together they form a unique fingerprint.
• Cite this
|
ESSENTIALAI-STEM
|
[Python-checkins] bpo-25130: Make unit-test about restricting the maximum number of nested blocks cpython-only (GH-28002)
serhiy-storchaka webhook-mailer at python.org
Sat Aug 28 14:33:59 EDT 2021
https://github.com/python/cpython/commit/eb263f9a356f5c5f21b8d5ce20bac92f31c40cad
commit: eb263f9a356f5c5f21b8d5ce20bac92f31c40cad
branch: main
author: Carl Friedrich Bolz-Tereick <cfbolz at gmx.de>
committer: serhiy-storchaka <storchaka at gmail.com>
date: 2021-08-28T21:33:50+03:00
summary:
bpo-25130: Make unit-test about restricting the maximum number of nested blocks cpython-only (GH-28002)
PyPy and potentially other implementations have different or no
contraints on the number of blocks that can be statically nested. move
the test that checks for this behaviour into a unit test and mark it as
CPython-only.
files:
M Lib/test/test_syntax.py
diff --git a/Lib/test/test_syntax.py b/Lib/test/test_syntax.py
index 43780ce273ef4..be8be898d0196 100644
--- a/Lib/test/test_syntax.py
+++ b/Lib/test/test_syntax.py
@@ -629,38 +629,6 @@
...
SyntaxError: 'break' outside loop
-This raises a SyntaxError, it used to raise a SystemError.
-Context for this change can be found on issue #27514
-
-In 2.5 there was a missing exception and an assert was triggered in a debug
-build. The number of blocks must be greater than CO_MAXBLOCKS. SF #1565514
-
- >>> while 1:
- ... while 2:
- ... while 3:
- ... while 4:
- ... while 5:
- ... while 6:
- ... while 8:
- ... while 9:
- ... while 10:
- ... while 11:
- ... while 12:
- ... while 13:
- ... while 14:
- ... while 15:
- ... while 16:
- ... while 17:
- ... while 18:
- ... while 19:
- ... while 20:
- ... while 21:
- ... while 22:
- ... break
- Traceback (most recent call last):
- ...
- SyntaxError: too many statically nested blocks
-
Misuse of the nonlocal and global statement can lead to a few unique syntax errors.
>>> def f():
@@ -1550,6 +1518,41 @@ def test_multiline_compiler_error_points_to_the_end(self):
lineno=3
)
+ @support.cpython_only
+ def test_syntax_error_on_deeply_nested_blocks(self):
+ # This raises a SyntaxError, it used to raise a SystemError. Context
+ # for this change can be found on issue #27514
+
+ # In 2.5 there was a missing exception and an assert was triggered in a
+ # debug build. The number of blocks must be greater than CO_MAXBLOCKS.
+ # SF #1565514
+
+ source = """
+while 1:
+ while 2:
+ while 3:
+ while 4:
+ while 5:
+ while 6:
+ while 8:
+ while 9:
+ while 10:
+ while 11:
+ while 12:
+ while 13:
+ while 14:
+ while 15:
+ while 16:
+ while 17:
+ while 18:
+ while 19:
+ while 20:
+ while 21:
+ while 22:
+ break
+"""
+ self._check_error(source, "too many statically nested blocks")
+
def test_main():
support.run_unittest(SyntaxTestCase)
More information about the Python-checkins mailing list
|
ESSENTIALAI-STEM
|
Supreme Court sides with death row inmate in race discrimination case
Washington (CNN)The Supreme Court ruled Monday morning in favor of a death row inmate in a case concerning race discrimination in jury selection. Timothy Tyrone Foster, an African-American, is on death row in Georgia for the 1987 murder of an elderly white woman, Queen Madge White. The jury that convicted him was all white. Twenty years after his sentence his attorneys obtained notes the prosecution team took while it was engaged in picking a jury, including marking potential jurors who were black had a "b" written by their name. "The focus on race in the prosecution's file plainly demonstrates a concerted effort to keep black prospective jurors off the jury," Chief Justice John Roberts wrote in the majority opinion. Justice Clarence Thomas was the only dissenter. The 7-1 decision comes as a welcome relief to critics who say racial discrimination in jury selection persists across the country some 30 years after the Supreme Court ruled potential jurors cannot be struck because of race. The decision does not vacate Foster's conviction; it opens the door for Foster to go back to the Georgia state court and argue for a new trial. The case is likely to cause other inmates across the country with similar claims to come forward and to seek a new trial. Monday's ruling can provide "new life to these so-called Batson claims in the lower courts and the issue of racial bias in jury selection," said Steve Vladeck, CNN contributor and law professor at American University Washington College of Law, referring to the 1986 case Batson v. Kentucky. Down a justice, John Roberts looks to find compromise, avoid 4-4 ties Foster's lawyers argued the notes reflect the fact the prosecution illegally took race into consideration as it struck every potential black juror. Georgia argued the notes reflect the prosecutors were simply preparing themselves for a racial bias challenge. "The State's new argument today does not dissuade us from the conclusion that its prosecutors were motivated in substantial part by race," Roberts wrote. "Two peremptory strikes on the basis of race are two more than the Constitution allows," he added. "This discrimination became apparent only because we obtained the prosecution's notes which revealed their intent to discriminate. Usually that does not happen," said Foster's lead lawyer, Stephen Bright, from the Southern Center of Human Rights. "The practice of discriminating in striking juries continues in courtrooms across the country. Usually courts ignore patterns of race discrimination and accept false reasons for the strikes." How the Supreme Court has changed since Antonin Scalia died Thomas dissent In his dissent, Thomas argued that the court didn't have the power to review the Georgia state court decision. Thomas also said he believed the Supreme Court owed more deference to the lower court's ruling that prosecutors had race-neutral reasons for striking specific jurors. In his view, "The Court today invites state prisoners to go searching for new 'evidence' by demanding the files of the prosecutors who long ago convicted them . ...I cannot go along with that 'sort of sandbagging of state courts.' New evidence should not justify the relitigation of Batson claims," Thomas wrote. "Even in the face of overwhelming evidence of racial bias on the part of the prosecutors, Justice Thomas still would have deferred to the state court's conclusion that there was no unconstitutional discrimination," Vladeck said. "The notion that, as Justice Thomas suggested, it is 'flabbergasting' that newly discovered evidence could prove racial bias on the part of prosecutors is itself flabbergasting, especially given the facts of this case, and an alarmingly deferential view for a Supreme Court justice to take," Vladeck added. What the prosecutor's notes showed White was a 79-year-old retired elementary school teacher who lived alone. In court papers, the state said Foster "broke her jaw, coated her face with talcum powder, sexually molested her with a salad-dressing bottle and strangled her to death." Nearly 20 years after the conviction, through an open records request, Foster's lawyers obtained the notes the prosecution team took while it was engaged in the process of picking a jury. Foster's lawyers said the notes reflect that the prosecution illegally took race into consideration as it struck every potential black juror. "We have an arsenal of smoking guns in this case," Bright told the justices at oral arguments. "The prosecutors in this case came to court on the morning of jury selection determined to strike all the black prospective jurors," Bright said. "Blacks were taken out of the picture here, they were taken and dealt with separately." Beth A. Burton, Georgia's Deputy Attorney General told the justices that the prosecutors at the time were anticipating future challenges from Foster's team and that is why they highlighted information concerning black jurors and prepared race-neutral explanations for the strikes. The notes, released in court filings, were taken as the legal teams prepared to pick a jury. Each side was granted "peremptory challenges" that allowed them to dismiss potential jurors without explanation. But Supreme Court precedent -- reaffirmed in 1986 -- says, however, that jurors cannot be struck because of their race. In the Foster case, the state and the defense used their peremptory strikes to reduce the pool to 12 jurors and four alternates. The state struck the four black potential jurors. One set of documents from the prosecution files shows that potential jurors who were black had a "B" written by their name and their names highlighted with a green pen. On some juror questionnaire sheets, the juror's race "black," "color" or "negro" was circled. One juror, Eddie Hood, was labeled "B #1. Others were labeled B#2, and B#3. Another set of the prosecution notes contains a coded key to identify race. There is a list of six "definite no's" --the top five are black. The Supreme Court's 1986 case held that once a defendant has produced enough evidence to raise an inference that the state impermissibly excluded a juror based on race, the state must come forward with a race-neutral explanation for the exclusion. According to Bright, the states' race-neutral justifications didn't hold up. For example, the prosecution said one reason it struck a 34-year-old black woman was that she was near the age of Foster.
|
NEWS-MULTISOURCE
|
gnunet-config(1) manipulate GNUnet configuration files
SYNOPSIS
gnunet-config [options]
DESCRIPTION
gnunet-config can be used to read or modify GNUnet configuration files.
OPTIONS
-f, --filename
When accessing a specific option using -s and -o, perform expansions as if the value represents a filename.
-s SECTION, --section=SECTION
Which configuration section should be accessed or edited. Required option.
-o OPTION, --option=OPTION
Which configuration option should be accessed or edited. Required to set a value. If not given, all values of a given section will be printed in the format "OPTION = VALUE".
-V VALUE, --value VALUE
Configuration value to store in the given section under the given option. Must only be given together with -s and -o options.
-c FILENAME, --config=FILENAME
Use the configuration file FILENAME.
-h, --help
Print short help on options.
-L LOGLEVEL, --loglevel=LOGLEVEL
Use LOGLEVEL for logging. Valid values are DEBUG, INFO, WARNING and ERROR.
-v, --version
Print GNUnet version number.
BUGS
Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic mail to <[email protected]>
|
ESSENTIALAI-STEM
|
Orthogonian
Etymology
Coined by in 1930 from, , + , to mean "straight shooter".
Noun
* 1) A member of the Orthogonian society, a social club at founded by Richard M. Nixon in opposition to the wealthy elites at Whittier.
Adjective
* 1) Pertaining to or characteristic of the Orthogonian society and its ethos of appealing to working-class values and opposition to a wealthy ruling elite.
Related terms
* Franklin
|
WIKI
|
Ideas on how to capitalize if the superconductor news is real?
For those of you not caught up, a paper was published out of Korea stating that a room temperature ambient pressure superconductor has been created. The initial peer reviews and attempts to recreate this experiment actually look positive.
If room temperature semiconductors have actually been discovered, they will become a part of nearly all technology/power grid related things. Simply put, there would be huge amounts of money to be made. What are some ideas on how to play this? My personal ideas have been:
IonQ - room temp superconductors would put us much closer to accessible quantum computing.
Copper/Lead mining/manufacturing companies - the superconductor proposed is made from these materials. Always good to sell shovels during a gold rush
|
NEWS-MULTISOURCE
|
User:DominicCapuano/Alpha 3 Robert Silverberg Anthology Series
Alpha 3 is a science fiction anthology edited by Robert Silverberg first published in 1972.
Stories in Alpha 3
* The Gift of Gab by Jack Vance
* Beyond Lies the Wub by Philip K. Dick
* Nine Hundred Grandmothers by R. A. Lafferty
* Total Environment by Brian W. Aldiss
* Day Million by Frederik Pohl
* Aristotle and the Gun by L. Sprague de Camp
* Under Old Earth by Cordwainder Smith
* The Shadow of Space by Philip Jose Farmer
* Come to Venus Melancholy by Thomas M. Disch
* Rescue Party by Arthur C. Clarke
|
WIKI
|
[048/118] af_unix: If we don't care about credentials coallesce all messages
Message ID 1367933964-1564-49-git-send-email-luis.henriques@canonical.com
State New
Headers show
Commit Message
Luis Henriques May 7, 2013, 1:38 p.m.
3.5.7.12 -stable review patch. If anyone has any objections, please let me know.
------------------
From: "Eric W. Biederman" <ebiederm@xmission.com>
commit 0e82e7f6dfeec1013339612f74abc2cdd29d43d2 upstream.
It was reported that the following LSB test case failed
https://lsbbugs.linuxfoundation.org/attachment.cgi?id=2144 because we
were not coallescing unix stream messages when the application was
expecting us to.
The problem was that the first send was before the socket was accepted
and thus sock->sk_socket was NULL in maybe_add_creds, and the second
send after the socket was accepted had a non-NULL value for sk->socket
and thus we could tell the credentials were not needed so we did not
bother.
The unnecessary credentials on the first message cause
unix_stream_recvmsg to start verifying that all messages had the same
credentials before coallescing and then the coallescing failed because
the second message had no credentials.
Ignoring credentials when we don't care in unix_stream_recvmsg fixes a
long standing pessimization which would fail to coallesce messages when
reading from a unix stream socket if the senders were different even if
we did not care about their credentials.
I have tested this and verified that the in the LSB test case mentioned
above that the messages do coallesce now, while the were failing to
coallesce without this change.
Reported-by: Karel Srot <ksrot@redhat.com>
Reported-by: Ding Tianhong <dingtianhong@huawei.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Luis Henriques <luis.henriques@canonical.com>
---
net/unix/af_unix.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Patch
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c
index 023db69..ce7db4b 100644
--- a/net/unix/af_unix.c
+++ b/net/unix/af_unix.c
@@ -1996,7 +1996,7 @@ again:
if ((UNIXCB(skb).pid != siocb->scm->pid) ||
(UNIXCB(skb).cred != siocb->scm->cred))
break;
- } else {
+ } else if (test_bit(SOCK_PASSCRED, &sock->flags)) {
/* Copy credentials */
scm_set_cred(siocb->scm, UNIXCB(skb).pid, UNIXCB(skb).cred);
check_creds = 1;
|
ESSENTIALAI-STEM
|
Talk:Learning engineering
Question regarding the statement: "Learning Engineering can also assist students by providing automatic and individualized feedback." Is it "learning engineering" providing automatic and individualized feedback or is it an intelligent tutoring system (perhaps created via a learning engineering process) that provides the automatic feedback? — Preceding unsigned comment added by Jgoodell2 (talk • contribs) 20:37, 2 November 2020 (UTC)
I added to the introduction content that presents Learning Engineering as a field that includes both design of learning experiences and improvement of educational approaches. It needs editing but gives a broader definition to what Learning Engineering is, consistent with last year's Learning Engineering COnference. I hope others will add text about designing for learners and learning and about different types of learning technologies. Janet Kolodner — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:39, 20 November 2020 (UTC)
|
WIKI
|
Wikipedia talk:Wikipedia Signpost/2024-01-31/In focus
That is a pretty good, and pretty accurate, description of the process. It gets easier with practice. But, yes, we are all quite, quite mad at FAC. Gog the Mild (talk) 15:37, 31 January 2024 (UTC)
* I'm not sure if that means everybody is angry at FAC, or if the people running FAC are insane :-) RoySmith (talk) 15:44, 31 January 2024 (UTC)
It's a heat/kitchen ratio and one's preferred location to either. <IP_ADDRESS> (talk) 15:57, 31 January 2024 (UTC)
I enjoyed reading this. Thanks for sharing your thoughts, Roy! I agree with you on most things. It's silly that we worry about the length of a horizontal line and the whitespace around it in 2024 but it's easier if you just do it as a habit rather than try and go back and fix it later, much like with citation consistency (which I also agree gets a little bit silly, but I can see why it's nice to have all citations to the same publication look the same). I also agree that writing at FA level makes your writing better in ways you don't necessarily notice. Most of all, I find it's nice to have your work reviewed and be found to be of a good standard and to get idea for improvement. There's no such thing as a perfect article and FAC is all about critical commentary so someone will always find something to say. Keep up the good work! HJ Mitchell | Penny for your thoughts? 17:14, 31 January 2024 (UTC)
Interesting read. I'm slightly puzzled that reviewers comment on things like endash spacing without actually fixing it themselves. All the best: Rich Farmbrough 20:37, 31 January 2024 (UTC).
* Many reviewers like to keep hands off to avoid any implication of a conflict of interest. Hawkeye7 (discuss) 07:10, 1 February 2024 (UTC)
* I would feel fairly comfortable fixing a dash while reviewing an article, but then again, I would fight someone if they change my date style, so I guess it's reasonable to be hesitant with making any style changes. ~ Maplestrip/Mable ( chat ) 14:42, 1 February 2024 (UTC)
Not sure if this is common knowledge, but many subject areas have specialized bibliographies usually in paper form -- although I wouldn't be surprised if online databases also exist. Further, academic periodicals will offer review articles that discuss recent publications in the topic of that periodical: for instance, Journal of Roman Studies used to provide at 5-year intervals a review article of epigraphic works published in the last 5 years. (It's been over 7 years since I've seen the last to appear, so JRS may have ceased this series.) However, these tools may not be available for popular culture topics, but your local friendly reference librarian can help you identify the ones you will find useful. -- llywrch (talk) 00:06, 1 February 2024 (UTC)
Excellent article; as good as anything I've read on what it's like at FAC. Thanks for writing this. Mike Christie (talk - contribs - library) 03:19, 1 February 2024 (UTC)
Thanks for this ... I too have had a recent experience with what I had hoped would be a similar FA success story that has only gotten as far as GA so far, despite plans made several years ago to get it to FA with the idea of getting it on the Main Page for a major anniversary late last year. That didn't happen (I should perhaps write a story about this one; it would be an interesting complement to yours as it does not end in total success). But I learned some of these same things in the process, and I have now put an article in FAC PR (something I didn't know about until you mentioned it before), already a GA, with the idea that I could get it to FA and get it on the Main Page for another anniversary date just over a year off. We'll see. Daniel Case (talk) 05:23, 1 February 2024 (UTC)
When responding to reviewer comments, it is often easier to edit from bottom to top, so changes you make do not disturb the reference numbering above. Hawkeye7 (discuss) 07:10, 1 February 2024 (UTC)
FAC is an important process on Wikipedia for sure, but I think it could benefit from more guidance and support. Reviewers and long-time participants of FAC assumes that people would come to FAC with a perfect piece of work and that mentality has slowly drive newcomers away. CactiStaccingCrane (talk) 12:56, 2 February 2024 (UTC)
Thanks for sharing your experience. It is highly useful for new nominators to FAC.Arjunaraoc (talk) 04:34, 14 February 2024 (UTC)
|
WIKI
|
CVE-2008-4106
NameCVE-2008-4106
DescriptionWordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote attackers to change an arbitrary user's password to a random value by registering a similar username and then requesting a password reset, related to a "SQL column truncation vulnerability." NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1871-1, DSA-1871-2
Debian Bugs500115
Vulnerable and fixed packages
The table below lists information on source packages.
Source PackageReleaseVersionStatus
wordpress (PTS)bullseye (security), bullseye5.7.11+dfsg1-0+deb11u1fixed
bookworm, bookworm (security)6.1.6+dfsg1-0+deb12u1fixed
trixie6.5.5+dfsg1-1fixed
sid6.6.1+dfsg1-1fixed
The information below is based on the following data on fixed versions.
PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wordpresssourceetch2.0.10-1etch5DSA-1871-2
wordpresssourcelenny2.5.1-11+lenny1DSA-1871-1
wordpresssource(unstable)2.5.1-8500115
Search for package or bug name: Reporting problems
|
ESSENTIALAI-STEM
|
By Frank Spillers
woman running
Summary: Fitness tracking is nuanced and even slightly controversial: Do users want to monitor and track (quantify) their behavior and activity? More importantly, does it work to increase motivation and reach health and wellness goals? Our research over the past 5 years has shown some clear user experience needs that most apps and fitness trackers completely miss in their UX strategy. We have been conducting studies in gamification, social UX, competitor feature adoption and efficacy (motivational success) with far-reaching implications for mobile wellness and health apps. Here we cover 7 research-based heuristic rules of thumb for designing mobile "e-health" experiences.
Hey Apple- why so sporadic with innovation?
Mobile health and wellness has exploded as a new category, and the future looks exciting as e-health and mobile delivered services and data improves. While Apple has demonstrated leadership in this category with the Apple Watch user experience overall, they also show us that there is room for improvement with their late and lackluster features in Women's health and Digital Wellness on the iPhone:
Specifically, in case you missed that news, Apple only just released an ovulation cycle feature this year, a feature that had been identified by independent developers and demanded by vocal women internationally for several years. (image below- Apple watch ovulation cycle tracking)
The Digital Wellness stats that appear on the new iOS just recently are late but worse, meaningless. Again, the issue of smartphone addiction has been openly discussed for at least four years in Silicon Valley. One has to wonder what took Apple so long? The stats are basically useless and provide nothing meaningful or helpful to combat iPhone addiction. What's missing? Personalization and UX features critical to digital wellness user experience. In the example below, who decides that Chrome is "too much screen time" or e.g. that YouTube is "too much entertainment". In both cases, those apps are being used for education, personal and professional development. The stats are missing context or intent of use (of the device or apps).
What's missing? Letting the user have control and choice to set goals, decide boundaries and benefit from meaningful personal analytics.
UX Heuristics for Fitness Trackers
In our research we uncovered seven recurring patterns that we consider essential guideposts to creating richly motivational health and wellness experiences. Many apps completely miss the boat on these, including Runtastic, a popular app acquired recently by Adidas. Note: Adidas ditched their app designed just for women, in favor Runtastic. Runtastic was the subject of one of our past studies on motivational impact of gamification and social UX features. We found it missed a critical element we called Context Integration (see #5 below).
The 7 research-based UX Heuristics for Fitness Trackers include:
1. Level of personalization: Default goal-setting for most users/most occasions; let the user decide what is desirable without making necessary restrictions imposing a hinder for the desired outcome/activity performance level.
2. Navigation/input: Provide a starting point for personalization features; a clear way to show that there are options/further ways of personalizing single functions. Gamification of the process of navigating and personalizing is critical.
3. Positive Feedback: Provide feedback that motivation and/or self-efficacy level has changed through user-defined ratings and questionnaires; system to provide new goals based on the user reported or system-defined motivation level; provide boundaries for motivation and self-efficacy to support users in their activity and needs; expose users to positive and constructive feedback that seems to promote greater motivation—a finding contrary to a study by Hollis, V.; Konrad, A.; Whittaker, (2015).
4. Multi-activity motivation analysis: Users expressed a desire for features that enable them to better analyze relations between data/information—activities and motivation/self-efficacy behaviour, e.g., between sleep/diet and high or low motivation. Users may be able to categorize activities based on the motivation or self-efficacy improvements they see, as well as to explore behaviours that promote higher motivation or increased self-efficacy.
5. Context integration: Capturing reflections on life events and emotional or social interactions during fitness tracking may be an important facilitator of motivation and self-efficacy. This can create an added sense of sociability or social UX known to drive healing, motivation behaviour change in healthcare.
6. Provide intelligence to encourage more targeted behaviour change: Giving users a means to explore their gathered data to increase their self-efficacy and fitness levels, can make the experience more meaningful. Interpreted data can be helpful (like SmartCoach in the Jawbone app) but making sense of activity trends and patterns and tying those to “victories” or self-defined goals might improve self-efficacy.
7. Sustain user motivation by leveraging intrinsic motivation into a playful experience: Use game elements and small rewards to support different stages of self-monitoring; thus it is possible to meet user needs for autonomy, competence, and relatedness that support the development of intrinsic motivation.
You can find the research paper here: Motivation and User Engagement in Fitness Tracking: Heuristics for Mobile Healthcare Wearables
Infographic of the 7 Heuristics for fitness tracking:
7 UX heuristics for fitness trackers
Download a PDF of the image above
Learn more about how to find features that differentiate your product in this Desirability webinar: Desirability First: Understanding customer value, insights and opportunities
|
ESSENTIALAI-STEM
|
Talk:MagicJack/Sentiment/Cons
When I signed up. I was not able to get a local prefix. I have to go with one that puts me in a long distance from family. Is there anyway to fix this problem? -- Wayne
* This is not a support "discussion" page. It's a page to "discuss" the underlying "con's" page, and topics that are contained there. See the wiki's "Requesting help" page for links to MJ's support and user support forums. Az2008 (talk) 17:21, 1 March 2009 (UTC)
Re: No Exit Feature
If you use MagicJack without the dongle, i.e. run from the hard drive, you can move/rename the *.skn files from the local mjusbsp folder. The SoftPhone app will show up with a bland UI, but has an Exit button that unloads from memory.
The first one to figure out how to make skins, can enable the Exit feature for everyone. <IP_ADDRESS> (talk) 20:58, 13 November 2009 (UTC)
|
WIKI
|
{-# LINE 1 "Data/Text/ICU/Error/Internal.hsc" #-}
{-# LANGUAGE DeriveDataTypeable, ForeignFunctionInterface,
{-# LINE 2 "Data/Text/ICU/Error/Internal.hsc" #-}
ScopedTypeVariables #-}
module Data.Text.ICU.Error.Internal
(
-- * Types
ICUError(..)
-- ** Low-level types
, UErrorCode
, ParseError(errError, errLine, errOffset)
, UParseError
-- * Functions
, isFailure
, isSuccess
, errorName
, handleError
, handleParseError
, throwOnError
, withError
) where
import Control.Exception (Exception, throw)
import Foreign.Ptr (Ptr)
import Foreign.Marshal.Alloc (alloca)
import Foreign.Marshal.Utils (with)
import Data.Int (Int32)
import Data.Typeable (Typeable)
import Foreign.C.String (CString, peekCString)
import Foreign.C.Types (CInt)
import Foreign.Storable (Storable(..))
import System.IO.Unsafe (unsafePerformIO)
{-# LINE 34 "Data/Text/ICU/Error/Internal.hsc" #-}
{-# LINE 35 "Data/Text/ICU/Error/Internal.hsc" #-}
type UErrorCode = CInt
-- | ICU error type. This is an instance of the 'Exception' type
-- class. A value of this type may be thrown as an exception by most
-- ICU functions.
newtype ICUError = ICUError {
fromErrorCode :: UErrorCode
} deriving (Eq, Typeable)
instance Show ICUError where
show code = "ICUError " ++ errorName code
instance Exception ICUError
-- | Detailed information about parsing errors. Used by ICU parsing
-- engines that parse long rules, patterns, or programs, where the
-- text being parsed is long enough that more information than an
-- 'ICUError' is needed to localize the error.
data ParseError = ParseError {
errError :: ICUError
, errLine :: !(Maybe Int)
-- ^ The line on which the error occured. If the parser uses this
-- field, it sets it to the line number of the source text line on
-- which the error appears, which will be be a positive value. If
-- the parser does not support line numbers, the value will be
-- 'Nothing'.
, errOffset :: !(Maybe Int)
-- ^ The character offset to the error. If the 'errLine' field is
-- 'Just' some value, then this field contains the offset from the
-- beginning of the line that contains the error. Otherwise, it
-- represents the offset from the start of the text. If the
-- parser does not support this field, it will have a value of
-- 'Nothing'.
} deriving (Show, Typeable)
type UParseError = ParseError
instance Exception ParseError
instance Storable ParseError where
sizeOf _ = (72)
{-# LINE 77 "Data/Text/ICU/Error/Internal.hsc" #-}
alignment _ = alignment (undefined :: CString)
peek ptr = do
(line::Int32) <- (\hsc_ptr -> peekByteOff hsc_ptr 0) ptr
{-# LINE 80 "Data/Text/ICU/Error/Internal.hsc" #-}
(offset::Int32) <- (\hsc_ptr -> peekByteOff hsc_ptr 4) ptr
{-# LINE 81 "Data/Text/ICU/Error/Internal.hsc" #-}
let wrap k = if k == -1 then Nothing else Just $! fromIntegral k
return $! ParseError undefined (wrap line) (wrap offset)
-- | Indicate whether the given error code is a success.
isSuccess :: ICUError -> Bool
{-# INLINE isSuccess #-}
isSuccess = (<= 0) . fromErrorCode
-- | Indicate whether the given error code is a failure.
isFailure :: ICUError -> Bool
{-# INLINE isFailure #-}
isFailure = (> 0) . fromErrorCode
-- | Throw an exception if the given code is actually an error.
throwOnError :: UErrorCode -> IO ()
{-# INLINE throwOnError #-}
throwOnError code = do
let err = (ICUError code)
if isFailure err
then throw err
else return ()
withError :: (Ptr UErrorCode -> IO a) -> IO (ICUError, a)
{-# INLINE withError #-}
withError action = with 0 $ \errPtr -> do
ret <- action errPtr
err <- peek errPtr
return (ICUError err, ret)
handleError :: (Ptr UErrorCode -> IO a) -> IO a
{-# INLINE handleError #-}
handleError action = with 0 $ \errPtr -> do
ret <- action errPtr
throwOnError =<< peek errPtr
return ret
handleParseError :: (ICUError -> Bool)
-> (Ptr UParseError -> Ptr UErrorCode -> IO a) -> IO a
handleParseError isParseError action =
with 0 $ \uerrPtr ->
alloca $ \perrPtr -> do
ret <- action perrPtr uerrPtr
err <- ICUError `fmap` peek uerrPtr
if isParseError err
then do
perr <- peek perrPtr
throw perr { errError = err }
else if isFailure err
then throw err
else return ret
-- | Return a string representing the name of the given error code.
errorName :: ICUError -> String
errorName code = unsafePerformIO $
peekCString (u_errorName (fromErrorCode code))
foreign import ccall unsafe "hs_text_icu.h __hs_u_errorName" u_errorName
:: UErrorCode -> CString
|
ESSENTIALAI-STEM
|
Jacinto Rodríguez Díaz
Pilot Colonel Jacinto Rodríguez Díaz (Totonicapán, 16 August 1901 – Guatemala City, 28 September 1929) was one of the aviation pioneers in Guatemala.
Biography
Rodríguez Díaz attended the military school, where he graduated as infantry second lieutenant, and then was assigned to the Presidential Army Staff of Manuel Estrada Cabrera. A few years later, travelled to the United States to attend the aviation school in that country. Along with Miguel García Granados Solís, Óscar Morales López and Ricardo "Chato" Rodas were the aviation pioneers in Guatemala when they collected funds to buy the first airplane in the country, which they christened with the name "Central America".
First airline service in Guatemala
In 1929, Guatemalan military aviators – led by Colonel Miguel García Granados Solís – had been able to set up a modest airline service in the country using three Ryan Brougham B-5 single engine planes that they used to transport mail and cargo to the farthest posts in Guatemala. Rodríguez Díaz flew to El Petén, a region that due to its remote location, it was much easier to reach El Petén by plane than by land. Rodríguez Díaz landed in Santa Elena on 20 Jul 1929, San Francisco in two occasions and La Libertad also in 1929. The first plane to land La Libertad was piloted by coronel Miguel García-Granados Solís -grandchild of former president Miguel García Granados- in 1926, followed by a visit of the famous American pilot Charles Lindbergh and Rodríguez Díaz was the third to land there in 1929.
But this pioneering service did not last very long: Rodríguez Díaz died in September 1929 in an air crash in Guatemala City, Garcia Granados left Guatemala and a French Aerial Mission arrived to Guatemala to train the military pilots of the Military Aviation Corps in warfare techniques.
Death
Colonel Rodríguez Díaz died on 28 September 1929, in a tragic accident known as "Dolores Street air crash"', along with lawyer José Luis Balcárcel (member of the Generation of 1920 intellectuals and classmate of future Literature Nobel Prize awardee Miguel Ángel Asturias, among others), the child Carlos Montano Novella and engineer Julio Montano Novella, Guatemalan Consul in New York City. Only Julio Montano survived.
Rodríguez Díaz's tomb was designed and built by Guatemalan sculptor Rafael Yela Günther and is in the Guatemala City General Cemetery.
Awards and recognitions
For his numerous services to his country, Colonel Rodríguez was awarded 53 medals and 15 trophies by the different army bases of the time: Fort Matamoros, Guard of Honor, Fort San José and the President's Army Staff. Colonel Rodríguez's father donated all his son's awards and trophies to the Guatemalan Military Academy after his death.
Jacinto Rodríguez Díaz Island
The Guatemalan government named a little island in his honor in San Miguel, El Petén. The island is situated in N 16°55'59.99" and W 89°52'59.99" and is a tourist attraction visited by those who come for the Tikal National Park and other interesting sites in that region.
|
WIKI
|
San Juan Philharmonic Chorale
The San Juan Philharmonic Chorale (Coral Filarmónica de San Juan in Spanish), is one of Puerto Rico’s top choral groups. It performs regularly with the Puerto Rico Symphony Orchestra (PRSO) and at the Casals Festival.
This critically acclaimed semi-professional group was established in 1986 by Carmen Acevedo Lucío, for a PRSO performance of Händel’s Messiah conducted by Margaret Hillis. Since then, the San Juan Philharmonic Chorale has collaborated with world-renowned conductors such as Krzysztof Penderecki, Helmuth Rilling, Gerard Schwarz, Lukas Foss, Julius Rudel, Yoav Talmi, Woldemar Nelsson, Andreas Delfs, Michael Lankester and Eugene Kohn.
In 1990 the group collaborated with the National Symphony Orchestra under the baton of Mstislav Rostropovich for a Casals’ Festival performance of Rimsky-Korsakov’s Le Coq d’Or. The group has also shared the stage with Philadelphia’s Mendelssohn Club.
In 2007, the San Juan Philharmonic Chorale’s 20th anniversary celebration includes performances with the PRSO of Roberto Sierra’s Missa Latina and sir William Walton’s Belshazzar's Feast.
The 80-voice choir is directed by Carmen Acevedo Lucío, also music professor at the University of Puerto Rico at Río Piedras. The San Juan Philharmonic Chorale is a member of Chorus America.
|
WIKI
|
Designing novel interfaces for better solar cells
Nowadays, big efforts are invested to invent new ways to extract the energy from renewable sources. Photovoltaic materials, which convert the light (photons) to electricity (voltage), are very promising for alternative energy. Important photovoltaic technologies are multi-crystalline SI solar cells and Cu(In,Ga)Se2 or Cu2ZnSnSe4 thin-film solar cells. But to further establish these technologies, both the reduction of production costs and the increase of solar cell efficiency are essential. The latter is reported to be strongly dependent on the internal interfaces as they can affect the transport of the photogenerated charge carriers.
In the last decade, designing new and better internal interfaces in such photovoltaic material becomes very crucial for controlling the quality of the cell. But to propose new development strategies, the mechanisms of the efficiency improvement at the atomic scale need to be first well understood. This can be done only by using advanced nanotechnology approaches, such as atom probe tomography, in order to track the atoms redistribution and their related phenomena (impurity segregation at grain boundaries or p-n Junction, clustering, diffusion).
Atom probe tomography is a very new technique, which was invented only couple of decades ago and therefore very attractive. The advantage of this powerful tool is that it shows both the structure and the composition of materials at atomic-scale. The resolution limit of this technique is 0.2 nm for the lateral resolution and 0.1 nm for the depth resolution, therefore it is considered as a high-resolution technique. The impurity level is as low as 20 ppm (0.002 at.%).
Therefore, the aim of Oana Cojocaru-Mirédin and her group “Interface Design in Solar Cells” is to perform chemical, structural, electrical, and optical characterization of the internal interfaces in solar cells by using nanotechnology approaches, such as atom probe tomography, in conjunction with complementary techniques (electron backscatter diffraction, transmission electron microscopy, cathodoluminescence, and electron beam-induced current).
The overarching goal is then to synthesize novel and improved multi-crystalline SI and Cu(In,Ga)Se2 or Cu2ZnSnSe4 thin-film solar cells in direct work with several institutes specialized on solar research.
Author: Oana Cojocaru-Mirédin
Go to Editor View
|
ESSENTIALAI-STEM
|
Golden Greats (Ian Brown album)
Golden Greats is the second solo album released by Ian Brown, first made famous by his role as frontman in the Stone Roses. It was described by NME as "a left-field masterpiece and Brown's best work for a decade", Golden Greats showcases a diverse usage of instruments including strings, mellotron and organs. A number of the tracks on the album were written by Brown whilst he was imprisoned for two months following a fracas with a flight attendant.
Track 10, "Babasónicos", is the name of an actual Argentine band that collaborated with Brown on the song.
Track listing
* 1) "Gettin' High" (Ian Brown, Aziz Ibrahim) – 4:01
* 2) "Love Like a Fountain" (Brown) – 5:14
* 3) "Free My Way" (Brown) – 4:19
* 4) "Set My Baby Free" (Brown, Aniff Akinola) – 4:26
* 5) "So Many Soldiers" (Brown, Dave McCracken, Tim Wills) – 5:16
* 6) "Golden Gaze" (Brown, Simon Wolstencroft, Mike Bennett, McCracken, Wills) – 3:56
* 7) "Dolphins Were Monkeys" (Brown, McCracken, Wills) – 5:06
* 8) "Neptune" (Brown, Sylvan Richardson) – 3:32
* 9) "First World" (Brown, Ibrahim) – 5:07
* 10) "Babasónicos" (Brown, Diego Tuñon, Walter Kebleris) – 4:05
"Gettin' High" includes an excerpt of "Morrassi" performed by Aziz Ibrahim
1. "Dolphins Were Monkeys" (Single Version) (Brown, McCracken, Wills) – 2:55
* 2005 US release bonus tracks
2. "Dolphins Were Monkeys" (Unkle Vs. South Remix) (Brown, McCracken, Wills) – 7:09
3. "Billie Jean" (Michael Jackson) – 3:36
4. "Thriller" (Rod Temperton) – 3:23
5. "Love Like a Fountain (Infected By Scourge of the Earth)" (Brown) – 3:35
Personnel
* Ian Brown – vocals, keyboards, drums, arrangements
* Aziz Ibrahim – guitar
* Tim Wills – electric guitar, piano
* Sylvan Richardson – electric guitar, bass guitar, keyboards, cello
* Carlos Hernán "Carca" Carcacha – guitar
* Dave McCracken – keyboards, programming
* Aniff Akinola – keyboards, drums
* Simon Wolstencroft – drums
* Dan Bierton – drums
* Diego Castellano – drums
* Inder "Goldfinger" Matharu – percussion
* Audrey Riley – cello
* Uma-T – harmonica
* DJ Peggyn – sound Fx
* Technical
* Ian Wright – cover portrait
|
WIKI
|
File Exchange
image thumbnail
Plot a 3D array using patch
version 1.11.0.0 (197 KB) by Adam A
Plotting a 3D array using a patch surface mesh
8 Downloads
Updated 10 Feb 2012
View Version History
View License
Plot a 3D array using patch
===========================
Adam H. Aitkenhead
adam.aitkenhead@christie.nhs.uk
The Christie NHS Foundation Trust
17th August 2010
USAGE
=====
This function enables a 3D array to be displayed using a patch surface mesh. To plot a 3D logical array, the function is called using the following syntax:
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ);
Alternatively, a 3D numeric array can be plotted such that the colour of each facet corresponds to the value of each voxel in the array. The plot is generated using the following command. (Note that voxels which are not to be displayed should contain a value of NaN.)
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ,'col');
The colormap to be used for the display of a 3D numeric array can be defined as follows:
>> cmap = jet(16);
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ,cmap,'col');
Also, the colorbar lower and upper limits can be defined by the user as follows:
>> clim = [1,10];
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ,clim,'col');
INPUT PARAMETERS
================
gridINPUT - 3D array of size (P,Q,R) - If not using the flag 'col', then gridINPUT should be a logical array. If using the flag 'col', then gridINPUT should be a numeric array, and all voxels which are not to be displayed should contain a value of NaN.
gridX (optional) - A 1xP array - List of the X axis coordinates.
gridY (optional) - A 1xQ array - List of the Y axis coordinates.
gridZ (optional) - A 1xR array - List of the Z axis coordinates.
cmap (optional) - A Nx3 array - The colormap definition. When plotting using the 'col' flag, cmap must be an Nx3 array, eg jet(32). When plotting a logical array, cmap must be an RGB triplet, eg [0.5,0.5,0].
clim (optional) - A 2x1 array - The colormap upper and lower limits.
ADDITIONAL INPUT FLAGS
======================
'col' (optional) - When this flag is present, the surface is plotted using colours which correspond to the value in each voxel. In the input array gridINPUT, voxels which are not to be displayed should have a value of NaN.
'barN' (optional) - Display a colorbar on North of plot.
'barE' (optional) - Display a colorbar on East of plot.
'barS' (optional) - Display a colorbar on South of plot.
'barW' (optional) - Display a colorbar on West of plot.
OUTPUT PARAMETERS
================
hpat (optional) - Handle to the patch object.
hcbar (optional) - Handle to the colorbar.
EXAMPLE
=======
For two examples, run the following code:
>> load exampleA.mat
>> figure
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ);
>> load exampleB.mat
>> figure
>> cmap = jet(16);
>> hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ,'col',cmap);
Cite As
Adam A (2020). Plot a 3D array using patch (https://www.mathworks.com/matlabcentral/fileexchange/28497-plot-a-3d-array-using-patch), MATLAB Central File Exchange. Retrieved .
Comments and Ratings (18)
Samantha Clayton
Marios
nice work. Is it possible to enable lighting effects?
Gyorgy Terdik
The examples do not work
UrsulaPR
Hi,
Great work, Adam, thank you very much. How could I obtain a smoothed representation, so the voxels do not seem cubes? I tried with shading(gca, 'flat') in Matlab R2014a, but no success.
All the best,
Ursula
UrsulaPR
Peter-Paul van Maanen
Hi Adam,
Great work!
I have to comment out line 511 in your file for the specified coordinates (gridX, gridY, gridZ) to work for my data:
%axis equal tight;
I get a 2D figure otherwise. I can send you my data if you want.
Thanks,
Peter-Paul
Hassan
Great work Adam.
However, I get this error whenever I run your code on my data:
??? Undefined function or method 'PATCH_3Darray' for input arguments of type 'double'.
Any idea of why I am getting this error and what should I do to fix it?
arthur
I found solution to my problem. It is just great, thank you once more.
arthur
Hello Adam, thank you so much for your work. I was just wondering how can i get a GRIDinput of reasonable size filled with Nans from my gridX,Y,Z vectors? i am trying meshgrid but the results is way to big and i am exceeding memory capacity. Do you please have any hint regarding my problem?
Thanks you,
Arthur
zawaiter
thanks adaM GREAT WORK
zawaiter
thank you for the great job.i wish u can give me a hand with this,what change i should apply to ur function so i can define a colorbar range. so the voxels colores will be mapped according to its value. and if its value is bigger than the highst rang it will be mapped to the highst rang and if it is smaller than the lower range it will be mapped to the lowest value.
Grigory
You may extend it by adding Alpha feature
1.
- after line 431 add: set(cell2mat(hpat),'FaceAlpha',alpha);
- or do it per cell basis one line earlier
2. after line 477 add: set(hpat,'FaceAlpha',alpha);
Alfa information could be specified as scalar, map or per element
Grigory
Felipe
Grate Adam, thanks, It’s efficient and just what I was seeking.
Adam A
Hi Rory,
Glad you're finding it useful. Regarding your problem, are you remembering to use the flag 'col' when you call the function? For example:
hpat = PATCH_3Darray(gridINPUT,gridX,gridY,gridZ,'col');
Rory Staunton
this is just what i was looking for, and super easy to use too!
my m x n x p array is mostly filled with NaN, and some values are in the range of ~100-10000. When I plot it with your function, everything is blue, as if the non-NaN values were all zero. Any clue how I can fix this?
thanks!!
Elmar
Knut
I havent had a chance to test this code, but it seems that you are trying to solve what I tried in the submission below. Judging from your image attachements, it seems that your solution is more complete than mine.
http://www.mathworks.com/matlabcentral/fileexchange/30721-image3
MATLAB Release Compatibility
Created with R2010a
Compatible with any release
Platform Compatibility
Windows macOS Linux
Acknowledgements
Inspired: Spectral Imaging Toolbox, 2d and 3d brain plots
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!
PATCH_3Darray/
|
ESSENTIALAI-STEM
|
Page:Popular tales from the Norse (1912).djvu/244
58 right when I told you she was a witch; but make haste and burn her before the pile burns low."
"Oh!" said the King, "we've wood enough and to spare, and so I'll wait a bit, for I have a mind to see what the end of all this will be."
As he spoke, up came the twelve princes riding along, as handsome well-grown lads as you'd wish to see; but the youngest prince had a wild duck's wing instead of his left arm.
"What's all this about?" asked the Princes.
"My Queen is to be burnt," said the King, "because she's a witch, and because she has eaten up her own babes."
"She hasn't eaten them at all," said the Princes. "Speak now, sister; you have set us free and saved us, now save yourself."
Then Snow-white and Rosy-red spoke, and told the whole story; how every time she was brought to bed, the old Queen, the King's stepmother, had stolen into her at night, had taken her babes away, and cut her little finger, and smeared the blood over her mouth; and then the Princes took the King, and showed him the snake-pit where three babes lay playing with adders and toads, and lovelier children you never saw.
So the King had them taken out at once, and went to his stepmother, and asked her what punishment she thought that woman deserved who could find it in her heart to betray a guiltless Queen and three such blessed little babes.
"She deserves to be fast bound between twelve unbroken steeds, so that each may take his share of her," said the old Queen.
|
WIKI
|
Page:United States Statutes at Large Volume 80 Part 1.djvu/1627
80 STAT, ]
PUBLIC LAW 89^10-NOV. 13, 1966
1591
Public Law 89-810 AN ACT To amend the District of Oolumbia Police and Firemen's Salary Act of 1958 to increase salaries of oflBcers and members of the Metropolitan Police force and the Fire Department, to amend the District of Columbia Teachers' Salary Act of 1955 to increase the salaries of teachers, school officers, and other employees of the Board of Education of the District of Columbia, and for other purposes.
November 13, 1966 [H. R. 15857]
Be it enacted &y the Seriate and House of Representatives of the United States of America in Congress assembled, TITLE I—SALARY INCREASES FOR DISTRICT OF COLUMBIA POLICEMEN AND FIREMEN 101. Section 101 of the District of Columbia Police and Firemen's Salary Act of 1958 (D.C. Code, sec. 4-823) is amended to read as follows: "SEC. 101. The annual rates of basic compensation of the officers and members of the Metropolitan Police force and the Fire Department of the District of Columbia shall be fixed in accordance with the following schedule of rates: SECTION
"SALARY SCHEDULE Service Step
'Salary class and title
Longevity Step 6
Class 1: Subclass (a) Fire private. Police private. Subclass (b) Private assigned as: Technician I. Plainclothesman. Subclass (c) Private assigned as: Technician II. Station clerk. Motorcycle officer, Class 2: Subclass (a) Fire inspector. Subclass do) Fire inspector assigned as: Technician I. Subclass (c) Fire inspector assigned as: Technician II. Class3 —Assistant marine engineer. Assistant pilot. Detective. Class 4: Subclass (a) Fire sergeant. Police sergeant. Subclass (b) Detective sergeant. Subclass (c) Police sergeant assigned as: Kfotorcycle officer. ClassS Fire lieutenant. Police lieutenant. Detective lieutenant. Class 6 Marine engine^'. Pilot. Class 7. Fire captain. Police captain. Detective captain.
8
9
$6,700
$7,040
$7,380
$7,720
$8,060
$8,400
$8,740
$9,080
$9,420
6,990
7.330
7,670
8,010
8,360
8,690
9,030
9,370
9,710
7,280
7,620
7,960
8,300
8,640
8.980
9,320
9,660
10,000
8,060
8,400
8,740
9,060
9,420
9,760
10,100
8,360
8,690
9,030
9,370
9,710
10,060
10,390
8,640
8,980
9,320
9,660
10,000
10,340
10,680
9,030
9,370
9,710
10,050
10,390
10,730
8,975
9,316
9,665
9,996
10,335
10,675
11,015
9,485
9,826
10,165
10,505
10,846
11,185
11,525
9,565
9,895
10,235
10,676
10,915
11,265
11,695
10,710
11,138
11,566
11,994
12,422
12,850
11,781
12,209
12,637
13,065
13,403
13,921
12,862
13,387
13,922
14.467
14,992
15,627
District of Columbia P o l i c e men and F i r e m e n ' s Salary Act Amendments of 1966. 78 Stat. 880.
�
|
WIKI
|
Houdini 12 Nodes Surface nodes
Records and caches its input geometry for faster playback.
Use this when cook times for a chain of ops is long and you need quicker playback, at the expense of using more memory.
Once cached, the geometries can be accessed in any order. This is better than a 2D flipbook or scene render since the geometry is still three dimensional. It is also ideal for pop networks since once it’s cached you can play it forward or backward.
This lets you scrub otherwise sluggish animations in real time, play pop networks backwards, etc. because the animation is precomputed and stored in memory.
Parameters
Start/End/Inc
A range of values at which to set the the index and param name when caching.
Index
Set to each value within the range for each geometry cached.
Index Param Name
A stampable parameter set to the index during caching.
Set Frame to Index When Caching
Set the local time to the index for each geometry cached.
Load
The loading behavior.
Reload All Cache
Clear the cache and reload everything.
Clear Cache
Delete all the stored cache.
Cache Points Only
Store a single topology for the first cached geometry and only point data for the remaining geometries.
Blend Position
Interpolate points between geometries.
To use this option, replace the Index with the floating point frame number $FF.
To check that you are blending subframe, use the playbar options to turn off integer frame values, and scrub the playbar slowly between frames.
Examples
Load | Launch
.../examples/nodes/sop/cache/SlowParticles.otl
This file uses the Particle SOP to create a stream of particles.
Then using the Cache SOP, the particles are slowed down. The Cache SOP has the ability to control the frame rate of an animation and read the animation slower than the global frame rate
Examples that use this node
Example forExample name
Poly LoftLoad | Launch
.../examples/nodes/sop/polyloft/PolyLoftPaste.otl
On this page
Related topics
|
ESSENTIALAI-STEM
|
Sidney V. Haas
Sidney Valentine Haas, M.D. (1870–1964) was a U.S. pediatrician whose research determined a dietary means of combating celiac disease.
Haas was born in Chicago and moved to New York City when he was six years old. He attended New York University Medical School and Columbia University's College of Physicians and Surgeons.
In 1924, Haas achieved notice when he published a medical paper detailing his use of a banana diet for the treatment of the eight children diagnosed with celiac disease. Haas incorrectly concluded that bananas enabled the breaking up of starches and the conversion of cane sugar into fruit sugar, which prevented the debilitating diarrhea of celiac disease. Haas’ research led to the development of the Specific Carbohydrate Diet, a nutritional regimen that restricted the use of complex carbohydrates (disaccharides and polysaccharides) and eliminated refined sugar, gluten and starch from the diet. Haas never accepted the finding that gluten was the damaging part of wheat; he insisted it was starch and called the discovery about a gluten a "disservice".
During his career, Haas treated over 600 cases of celiac disease. In 1951, he joined his son, Dr. Merrill P. Haas, in publishing the medical textbook The Management of Celiac Disease.
|
WIKI
|
Browse e-KNOWBASE
Category FAQs Search : Health
Question: Sweat and dehydration
Answer: When you exercise, your body sweats as it tries to return to its optimal temperature. As sweat evaporates from your skin, it removes heat from the body, but you also lose body fluid.
So, you need to drink fluid during exercise to replace the fluids you lose when you sweat. That way, you’ll reduce the risk of heat stress, maintain normal body function, and maintain performance levels. The general rule is: if you’re sweating, you need to be drinking fluids.
It is possible to drink too much during exercise. Over-hydration, in rare but severe cases, can lead to death. To avoid over- or under-hydration, it can be useful to know your sweat rate. That way, you can work out exactly how much you should be drinking. Or, talk to your GP or an accredited sports dietitian for a fluids plan.
To work out your sweat rate:
- Empty your bladder.
- Weigh yourself in minimal clothing, as close to the start of exercise as possible (this is your initial weight).
- Record the ambient temperature.
- Do your exercise session.
- Record the volume of any fluid you consume during your exercise session (fluid).
- Estimate (or measure!) urine losses during your exercise session (urine).
- Weigh yourself again at the end of your session, in the same clothing as before - be sure to towel off any excess sweat from your body first (this is your final weight).
- Your weight change during exercise, plus any fluids consumed, minus any urine losses, reflects your total fluid loss for that session. To work this out:
* Subtract your final weight from your initial weight.
* Add the weight of fluid (in kg) that you consumed while exercising.
* Subtract the weight of fluid (in kg) you lost through urination.
* To make this into an hourly rate, divide it by the number of hours you spent exercising.
Sweat rate (L/hr) = [initial weight (kg) – final weight (kg) + fluid (kg*) – urine (kg)] / time (hrs)
(*One litre of water or urine is equivalent to one kilogram.)
Remember, this is your sweat rate when exercising at a particular ambient temperature. Your sweat rate will change with the temperature, so it can be useful to measure your sweat rate at different times of the year.
(Source: Victoria State Government, 02 Dec 2020)
Source Link: https://www.betterhealth.vic.gov.au/health/HealthyLiving/Exercise-the-low-down-on-water-and-drinks
|
ESSENTIALAI-STEM
|
Popular Science Monthly/Volume 29/June 1886/What May Animals Be Taught?
|WHAT MAY ANIMALS BE TAUGHT?|
By M. J. DELBŒUF.
"THERE exists in animals," says Malebranche, "neither mind nor soul as we commonly understand the terms. They eat without pleasure, they cry out without pain, they grow without knowing it, they desire nothing, they know nothing, and, if they behave in a manner betokening intelligence, it is because God, who made them, has, to preserve them, formed their bodies in such a way that they avoid mechanically and without fear everything that is capable of destroying them." Malebranche was more categorical than Descartes on the subject of soul in beasts. The latter had doubts on the matter. He would not have been far from conceding thought to the higher animals. But then he would have had to concede it to all, even to the oyster and the sponge; and what have the oyster and the sponge that resembles a soul?
We know how this question occupied the seventeenth and eighteenth centuries. In the nineteenth century, Frédéric Cuvier, Flourens, and others took it up, and tried to establish upon facts a distinction between intelligence and instinct. Finally, Darwin came and wiped out every line of demarkation between man and animals. But, whatever may be the favor—rapidly gained—that surrounds the doctrine of transformism, we must not forget, on the one hand, that it is not universally accepted, nor on the other hand, that it does not answer the question of the intelligence of animals.
The great physiologist Schwann, for instance, who died in 1882, maintained that there was an insurmountable barrier between us and those whom Michelet calls our inferior brethren. To him animals were alembics and electric batteries; mechanics, physics, and chemistry could account for all their manifestations. Man alone contained an immaterial principle, the freedom of which constitutes his characteristic appanage. That is what he distinctly declared on that day when the European great men of science came to Liége with an ovation to the illustrious creator of the cellular theory, on the fortieth anniversary of his professorship. "By virtue of the cellular theory," he said, "we now know that a vital force, fundamentally distinct from matter, exists neither in the organism as a whole nor in every cell. All the phenomena of animal and vegetable life can be explained by the properties of atoms, which are the forces of inert nature, or by other forces of the same atoms hitherto unknown. Freedom alone establishes a limit at which the explanation by forces of this kind must necessarily stop. It obliges us to admit only in man a principle that is incompatible with the properties of matter."
To Schwann, as to Malebranche, the animal was an automaton. It is true that he did not regard it as a mechanism moved by an internal or external spring; it was an aggregation of atoms combined in a certain manner. On the other hand and in this he was at variance with Descartes—it was not thought, but liberty which, in his eyes, constituted the distinctive attribute of man. But essentially, to him as to the pure Cartesians, man was an animal inhabited by a spiritual substance a substance distinct from matter. I learned, however, from conversations I had with him on the subject, that he did not deny to animals the faculty of feeling pleasure and pain, memory, intelligence, and a certain amount of reason. In this he wandered essentially from Cartesianism, for in it he accorded thought to matter.
From the exclusively logical point of view, Cartesianism is impregnable. Animals do not feel or reason, but have only the appearance of doing so. From the same point of view Schwann's system is also impregnable. Animals feel and reason, but have not the power of deciding for themselves. From the point of view of feeling or common sense, the latter system is much more acceptable than the other. It may even be said that it satisfies the mind and the heart, and imposes no hindrance to scientific research. This has also been proved by Schwann's own example. But it is not less certainly irreconcilable with transformist theories of the descent of man; by it man should have a place apart in Nature.
The stories that have been recently published and held up to attention, as illustrations of the intelligence of animals, have really no bearing unless they indicate that animal intelligence is comparable to ours, in the sense that a passage may take place from one to the other by insensible degrees. Otherwise there would be no need of the demonstration; and Schwann as well as Darwin, Malebranche as well as Descartes, might subscribe to it; for we might say that, in a certain sense, a mechanism is intelligent.
Now, there are some facts that bear against the assimilation of the two kinds of intelligence. An infant, which in the beginning seems less intelligent than a young puppy, very early manifests its superiority; and one of the first things it learns is that which can not with any amount of attention be taught to a dog. It is the capacity of our race for improvement in contrast with the immobility that seems to attach to animal races. Need we, to illustrate this, speak of machines and tools, writing, and the fine arts? It is true that there are monkeys that can defend themselves with sticks and pebbles; fish that can throw up drops of water to stun the insects they want to swallow; and birds that can embellish their nests and form parterres of flowers which they will keep fresh. But these curious stories are not enough to close the discussion. Moreover, however similar these acts may appear in a material sense, they must not always be regarded as mentally alike. When my dog, at my order, brings my slippers or letters, he does not act with the same mind as a servant.
Indeed, the assimilation is sometimes justifiable. I had occasion in some articles that appeared in the "Revue Philosophique," on Mr. G. H. Lewes's last book (March and April, 1881), to relate a number of stories in which insects, mollusks, and hydras, as well as dogs, behaved, under particular circumstances, as a man would. Let me repeat one of them: "I was in the habit of giving bones to my poodle Mouston during dinner, and he would go into the yard to gnaw them. When the bone was too large for him, I would get up and go out with him, and split it before his eyes with a hatchet. One day, Mouston, after having gone out with his bone as usual, came back bringing it in his mouth, fixed himself in front of me and wagged his tail. I ordered him back, but he persisted in staying where he was. Finally, I thought of what he wanted and arose, while the animal indulged himself in leaps of satisfaction. The trouble was, that the bone was too large for him. Now, when I call to mind the expression of the dog when he showed me the bone without getting an answer from me, I could not help thinking that he must at that moment have had a very poor opinion of my understanding."
It is evident from this incident that Houston knew explicitly that the bone would be easier to manage if it was split, and that I alone had means of splitting it; and he had a clear and precise idea in anticipation of what he expected from me. Finally, he manifested his desire to me by the only means within his power. How much better could a deaf-mute do than he did?
But it is one thing to think by resemblances, and another thing to think by symbols. A story was recently published by M. Dubuc, of a pointer which had learned after a few years that its master went hunting every Sunday, while on the other days he went to business; and M. Dubuc concluded that the animal had learned to count up to seven.
This conclusion is not legitimate; it may even be said to be wrong. The dog distinguished Sunday by some features that were peculiar to it; by the movements about the house, the behavior and Sunday dress of the servants, the dress of the master, or any one or more of a number of things that make Sunday different from the other days of the week; but we may say without contradiction that it did not count seven. We ourselves, if we were restricted to a life absolutely uniform, would not be able to distinguish the seventh day without mnemotechnic aids, and as a rule we seldom recollect the day or the elate except by the assistance of intrinsic circumstances.
My dog, which was habitually on the watch, perfectly understood whether I was going out to my lectures or for a stroll. For some time, he went with me to the university, when I sent him back. But he very soon took in the signs characteristic of the days and hours when I went to my duty—the regularity, my breakfast habit, my dress, the books under my arm, the direction I took, and my thoughtful air. We all know how observing animals are, and every one who has a dog has remarked how readily they learn that they are to be invited to go with us.
My Mouston was a great vagabond. He would go off in the morning as soon as the door was opened, and would sometimes not return till evening; but if I said to him, "Mouston, we are going to take a walk," he would stay around the house and watch my every motion.
The fondness of dogs for going walking with their masters is worthy of remark. The three dogs I had had the freedom of the street, but it was a great treat to them all to go with me. Probably the pleasure of coming up every once in a while to smell their master's legs goes a great way to compensate them for the restraint of following a fixed road and the often-repeated annoyance of the sudden interruption of interesting conversations that have hardly been begun. We also know how quickly animals acquire the idea of the time of day. Sparrows know when it is time for the bread to be thrown out for them, and collect around the spot at that hour. Lacépède tells of a toad which used to come out of its hole at the time it was accustomed to be fed. I had a lizard that would leave its nest and climb up my sleeve at dinner-time. Persons of my age, in Liege, used to be acquainted with a vagabond dog that regularly at the same hour made the round of the cafés for the bones or the lumps of sugar which he was sure to receive from his friends there; and would as regularly every evening go to his sleeping-place under a particular gateway. This animal evidently perceived the time of day by certain signs that had been taught him by observation; and M. Dubuc's dog knew when it was Sunday, or hunting-day, by the same means. And if, on some Saturday, the house had been arranged and the household had managed to behave in the manner usual to Sunday, the dog too would have been found all prepared for his anticipated hunting excursion, just as if it had not been one day short of his accustomed seven.
This faculty of attentive observation of dogs may be stretched so far as to deceive an experimenter who is a little prepossessed on the subject.
In his paper before the British Association at Aberdeen, Sir John Lubbock related how Mr. Huggins, having arranged cards bearing the ten ciphers, gave his dog a problem, such as to give the square root of nine, or of sixteen, or the sum of two numbers. He would then touch each card in succession, and the dog would make a sound to inform his master when he came to the right one. The dog was always right. The secret of the experiment was that Mr. Huggins unconsciously informed the dog by his attitude when he came to the card that gave the answer. Sir John Lubbock tried to train his dog not to take a piece of bread till he had counted seven; but when he used a metronome the dog showed that he was lost. I made analogous and systematic experiments with my Mouston. They extended to the number four, and I aimed to make the sign of the number more and more indistinct, on each repetition of the experiment. As soon as it was quite effaced, the dog lost his knowledge of it, and his perplexed and inquiring look was amusing.
Sir John Lubbock mentions that Lichtenberg pretended to have a nightingale that could count three. Every day he gave it three meal-maggots, one at a time, and the bird never came back after it had got the third. This observation is very interesting, but we ought to know whether the nightingale did not perceive by some sign that the meal was over. I have no doubt that, if, in the experiments which I have made on siskins and gold-finches, I had had only three grains of hemp-seed in my mouth, they would not have returned after having taken the third seed, or at least would have been likely not to return; but in fact I had many grains, and I frightened them away when they had got three. My experiments were not brought to a conclusion, but, if they had been, it would not have been right to assume too readily that the birds knew how to count. We should have to inquire whether I had not involuntarily made some sign manifesting my intention. The remarkable experiments of Mr. Cumberland have revealed to us a whole category of motions of this kind which had never been taken account of before. Who, previous to him, would have suspected that the hand trembles in a different way when we think of seven and when we think of three?
The solution is not advanced, then, when we tell of the cases, curious and interesting as they may be, in which animals seem to behave like man; or, to speak more exactly, these cases are proof only with respect to persons who are inclined to attribute instincts alone to the animal, and deny it reflection and calculation. As the philosophers are still at this point, it may be well to try to undeceive them. Mutatis mutandis, the spider chooses the place for its web, and the bird for its nest, as the colonist selects the location of his farm-house, or of the pen for his goat or pig. I will agree that we may regard the laying of the eggs, the making and shaping of the nest, and the selection of materials as instinctive acts; but the selection of the place is necessarily of a deliberate and intelligent character.
If there is a difference between animal and human intelligence, it depends upon special causes, and these are what we are trying to disentangle. I have already remarked that man has the faculty of thinking by symbols, while the animal appears not to have it. What is a symbol? It is not easy to define the term. Let us say provisionally that it is a conventional mental sign, representing a clear abstraction. The definition is neither very good nor very clear, but it will do, for want of a better one. Before Thales and Pythagoras, thinkers had distinguished between the common idea and the concept. The common idea is formed within us, we may say, almost physiologically. Take, for example, the idea of horse. When I have seen twenty horses, I have seen for twenty times the qualities which they all have in common, while I have seen for a less number of times, or only once, their respective individual qualities; so that the common image engraves itself in the brain or in the sensorium, if that term is preferred, in deeper and deeper lines and stands out strongly at the base of the particular and fugitive images.
The concept partakes of the common idea, and it might perhaps be maintained that it is formed within us in the same manner. But the degree of abstraction which it necessitates is infinitely more considerable. Let it be, for example, the number four. We agree, it is true, that the idea of, say, any group of four fingers of the hand is a kind of common idea; but it is a good way from this idea, from this kind of group, to that of four distant and different objects, like the four limbs, the four largest cities in the world, the first four Roman emperors, or the four largest fruits. But this is not all. The number four is still easy to transform into images, but that is no longer the case when we come to higher numbers, such as seven, and, with still more reason, 20, 100, 1,000, etc. Yet the large numbers are not more difficult for us to conceive than the small ones. This is because we represent them by conventional signs, or the figures.
We must not, however, forget that some savage peoples can not count beyond four or five. Sir John Lubbock tells in his paper an anecdote of Mr. Galton, who, on one occasion, made a comparison of the arithmetical comprehension of a Damara savage of South Africa and a little dog. According to Mr. Galton, the comparison was not to the advantage of the man.
Let us now examine Sir John Lubbock's experiments. He wrote on his cards such words as go, bone, water, food, etc., in phonetic orthography, so as not to trouble his dog's head with the difficulties of English spelling; also words without significance to the animal, such as simple, nothing, ball, etc.; and he had cards with nothing written on them.
Van the dog soon learned to distinguish the blank cards from the written ones; then he learned to attach an idea to some of the latter; and finally was able to fetch to his master the card that corresponded with his wish. To get a single meal he had to fetch some eighteen or twenty of these cards, and he made no mistakes.
Sir John Lubbock concluded from this success that Van had learned to read. In one sense, this conclusion is absolutely false, but that is not the sense in which Sir John regarded the matter. In another sense it was true, and this is the point on which we need light.
There was never a dog whose master has not said and thought a thousand times that he only lacked speech. In fact, the dog seems to comprehend speech, and speaks in his expression. His eyes behind which, according to Madame de Staël's fine expression, he seems to conceal a human soul—interrogate, supplicate, and answer; his ears are erected, or lop over; his tail wags, and his whole body assumes marked attitudes, not to be misinterpreted, of desire, joy, attention, anger, repentance, fear, shame, and submission. Could he better express all of his feelings if he spoke? Should we understand him any better if he should say to us when he had been guilty of some misdeed, "I deserve to be punished, but don't, I pray you, be too hard on me," or if, after he had been corrected, he should politely thank us for our moderation? We perceive at once the distance between his language and ours. One is natural, the other conventional.
Does he understand our conventional language? He does, and he does not, but in the more exact sense he certainly does not. He understands us when we give him our usual orders: "Down!" "Come here!". "Go back!" "Give me your paw!" "Now, the other one!" "Seek it!" "Bring it here!" "Get out!" But we forget that we accompany our interjections with corresponding gestures, and that the interjection itself is only one gesture more. We forget how we have trained him, how we have worked upon his instinct to make him run for the stick we have thrown, and have taught him to bring it back in his jaws, by leading him, and showing him how, and petting him when he performs the trick aright. You accompany your orders with certain words as if you were speaking to a child, and gave them a precise signification; but the dog does not attach this signification to the word only; to him the word, or the vowel in the word, is only a sign that concurs with all the others in helping to make him understand what we want of him.
If, while sitting at my table, I say to my son, "Charles, will you be so good as to bring me my slippers?" he will understand me. If I say the same thing to my dog, in the same tone and without moving, he will not understand me. I shall have to express myself in a particular manner and a particular tone of voice. He will understand, "Houston, bring the slippers!" or "Houston, slippers!" or "Houston, bring!" But he will not understand the cool, calm request that is sufficient direction to my boy. The word slippers does not call up in him the idea of my slippers, but that of a complex action which he is to perform, consisting of a combination of successive movements winding up with a caress. Provided I make the accustomed gesture, he will obey, though I use the wrong word; and he will not obey, though I use the right word, if I speak in an indifferent tone as if to some one behind the scenes.
It frequently occurs to us to think in this way by sensible images, although we do not remark it. When in the morning I hear the servants go down, make the fire, and arrange the table, hear the rattling of the dishes, I do not think in words that they are getting breakfast, and are preparing the coffee, and putting on the bread, and the butter, and the sugar; but I see these preparations in images; I behold the coffee-pot, the milk-pitcher, the sugar-bowl and sugar, and the slices of bread; and I see in my mind's eye the housemaid in her white apron going back and forth, opening the cupboards, and arranging the table-service. When, after this, she knocks at my door, and calls out, "Breakfast is ready, sir," it is very possible that these words will not awaken in my mind the idea of breakfast, but that of time to get up, to wash, dress, and go to business. I attach to the words, with their strict sense, a more remote sense which is associated with them. This is the way dogs and animals generally think; and this is the meaning our language has to them. They do not analyze, but comprehend in block. This is the way the deaf-mute comprehends our signs.
It surely is not by analysis that the child learns to speak; he understands our phrases as a whole, and it is not till after some time that he comes to see in them separate words; but, finally, he decomposes the phrases. Now, if the child can do this, why can not the animal do it too? Because the animal does not, and the child does speak. The child speaks whenever it gives utterance to its desire or feeling. The dog does not speak, when, knowing that he deserves correction, he comes up, timidly and abjectly, to cringe at the feet of his master. It is voluntarily, that is, after having found out the how and the why, that the child has associated certain movements of the larynx with certain ideas. But you can not teach a dog to come up for correction gamboling and wagging his tail.
The deaf-mute comprehends and speaks to himself in reading writing. He speaks to you when he writes to you, because the voluntary and trained movement of his eyes or fingers has put on for him a precise signification. The parrot would be speaking if he said, "Let us have breakfast" whenever he wanted to eat; but he does not speak when he amuses himself by hailing every visitor with these words.
To return to Sir John Lubbock's dog, he speaks when he goes deliberately to look for the card which corresponds with his desire; we might perhaps say that he reads, for he distinguishes it among the others. Only, the sign might be a triangle or a square, a round figure or a dart; the result would be the same, and would have no bearing. Sir John's idea of phonetic writing has an air of whimsicality; and I am inclined to believe it must have been sportive, and that the secret of the matter lay in the simplification of the figure of which the dog had to grasp the meaning.
The question now arises whether we can hope to go much further with the animal. It is one of the most important questions in the discussion. After all, if the transformist doctrine is true, and there was an ancestor of man that did not know how to speak, and man has had to learn to speak, why may not the dog do the same? Professor P. J. Van Beneden, of the University of Louvain, had, and may still have, a dog which could accompany with his voice a tolerably complicated air played on the piano. My dog Marquis could sing in unison an air of "La Favorita" when a contralto friend gave him the keynote. Could we not get him to give some signification to his vowels? Possibly, but it would be a very hard task, for these reasons:
We speak and we write and read with the eyes. The blind man reads with his fingers and writes; the deaf-mute reads with his eyes, and he writes and even speaks without hearing. Language, under whatever form it is manifested, consists essentially of a series of voluntary and conscious movements, at least in the beginning (I mean reading with the eyes), to which we attach a certain meaning. These movements are of the most various and complicated character. The organs which produce them are either the vocal apparatus, exceedingly mobile and susceptible of assuming a great variety of figures, which includes the larynx, glottis, palate, cheeks, tongue, teeth, lips, and nose, or the fingers placed at the end of the arms, capable of various movements, or the eyes. The dog has neither our larynx nor hands; there remain to him only the eyes. He can not, then, learn to speak or to write. Could we teach him to read; and to what extent? The question comes back in a manner to this: Could we teach an armless mute, not deaf, to read? I think it would be a more formidable task than was that of teaching Laura Bridgman.
Under the old way it was very hard to teach children to read, even with the help of hearing, the sight, and the voice. We showed them the letter A, pronounced it, and made them repeat it; then we passed to the letter E, and so on. At the end of a year the most intelligent, at the end of two years less bright, ones were able to attach a determined sound to certain shapes, that is, when we bring it down to the final analysis, to certain conscious motions of the eyes. After that we taught them writing.
Not a great while ago a pedagogue was struck with an inspiration of genius. It occurred to him to teach reading and writing together. At first sight it seemed absurd to think of simplifying reading by adding writing to it. But what was the outcome of his plan? Why, that now, children, in the course of three months, and with much less difficulty and without help from the application of the ruler to their fingers, learn to read and write with much greater facility and correctness than they formerly could in three years.
This comes from the fact that the motions of the hand are associated with those of the eyes, and the form of the letters is thus engraved upon the memory by means of two different instruments, and therefore much more quickly, one assisting the other; and because the other associations of prolonged sound and articulate sound with that form have become surer and more rapid.
Would it be possible, by showing him the letter A, to make a mute, not deaf but armless, understand that the sign corresponds with a sound? Evidently the experiment would not succeed. We might with patience teach him to kneel, to get up, to walk, or to make certain gestures as we show him certain figures. We could do this with the mute more easily than with the dog, because we could exemplify the movement to him, and because also, imperfect as he is, he is a man and not a brute. He would also attach the same meaning to the pronounced sound, and would thus learn that the written sign A answers exactly to the sound A, as he would obey orders given by the voice, and we would be able to say that he understood language. He might also, if we put the alphabet at his command, manifest his wishes by indicating the sign corresponding with them, and we might be able to say that he had a language. Possibly we might be able to go further still, and train him to the point of interpreting the design; but I do not hazard much in saying that his education would still leave an enormous amount to be desired. It is very hard to make a great scholar even out of a deaf-mute who has arms and has learned to speak, and Sandersons are exceedingly rare.
But would the dog ever accomplish much more than to attach a kind of concrete significance to the figures of the letters; than to associate his necessities or his natural or artificial wants with them? It is very doubtful, and that is what is indicated by Sir John Lubbock's experiments:
Sir John painted six cards, two blue, two red, and two yellow. Three of these were put before the dog, who was to bring his master the card of the color that was shown him. Although he was rewarded every time he succeeded, he never fairly understood what was wanted of him. This was because the action of bringing the card of the right color did not appeal directly enough to his senses. Sir John obtained no better result with six cards marked I, II, III, etc. Van never exactly grasped the conformity of the figures.
What was it prevented my dog, upon whom I tried experiments in numbers, grasping the difference between three and four pieces of meat? He failed because he had to abstract the ideas of the numbers 3 and 4 from the variety of the figures which were presented to him. I have no doubt he might in time have learned to distinguish the triangles from the squares which I formed on the plate with the three and the four pieces of meat. The thing that baffled the beast—we must not forget that the dog carries the faculty of observation to a considerable length—was the incessantly variable diversity of the figures. Under these circumstances, the problem was made too complicated for his head, those means only being given which I had prepared for entering into communication with his intelligence.
If any of the readers of these pages is tempted to teach a dog arithmetic, he would do well, I think, to begin by making him distinguish one from two, permitting him to touch only a single piece at the word one, and two pieces at the word two. Then he could pass on to three, and, if he went so far, to four. After that, he might essay addition: one and two, one and three, and two and three. The experiment would be very interesting and instructive, whatever the result might be. For, as Sir John Lubbock says, we ought not to aim for any one result rather than another, but for the truth.
Is the dog, after all, a suitable subject to experiment upon, in regard to the distance that separates man from animals? Would it not be better to select the monkey, intractable as he is, but formed like us, and not only able to imitate our gestures but fond of doing so? We might by this means attempt a verification of M. Noiré's seductive hypothesis respecting the origin of language: that it is the product of a social state already considerably advanced, and that the sounds, being at first simply utterances accompanying the movements of the whole, finally become the signs of those movements. But suppose, for a moment, that the dog acquires some notion of number, what are we to conclude from it? Is the advance of such a kind that it can be communicated to the whole species or to a particular breed? That would be at least doubtful. There have been very serious and learned controversies respecting the possibility of the transmission by generation of acquired advantages. Weissmann decides the question in the negative. Only aptitudes are transmitted by descent. The discussion appears to be, to some extent, an affair of words. Some say pointer-dogs have been formed by hunters, who taught particular individuals not to chase after game, but only to signalize its presence, and that the knowledge of the fathers passed to their posterity. Others reply that this is not the case; even in the times of the corporations or trade-guilds the sons of shoemakers were not born shoemakers. Special aptitudes, manifested by particular individuals, have been turned to the best advantage; they have been cultivated, and thus breeds have been created by selection. I say that this is a question of words, because in any case the re-enforcement of the aptitude is something acquired, and this acquisition, it is admitted, passes to descendants.
Let us suppose, then, that we have created a race of calculating dogs. We might, by a bold but legitimate generalization, infer from that that all animals would be susceptible of acquiring abstract notions or of thinking by symbols. But the dog would have had an educator. Must man, then, also have had his educator? We see, thus, how this question would take shape, and it certainly would be no less grave or less perplexing than the alternative.
Again, let us suppose that the attempts utterly fail. We might, indeed, contend that the check was only a temporary one. But let us waive the evasion, and reason as though the dog were radically incapable of representing his thoughts by symbols. Would not absolute transformism, that is, the applicability of transformism to man, receive a mortal blow? I do not believe it. The only really legitimate conclusion would be, that not all species are indefinitely perfectible, but that only a few species, perhaps only one, have really entered upon the road to infinite progress, while the others have gone into a kind of blind alley. It is in the same way that the main stem of a tree may theoretically grow up indefinitely toward the sky, while the development of the lateral branches is necessarily limited by the power of the wood to resist rupture.
We thus see that this problem is one of an exceedingly interesting and tempting character. Although Malebranche has no partisans now, those who agree to some extent with Schwann form legions, and in their eyes transformism has only the value of a general doctrine. It is the question of the origin of man and his place in the world, which is raised by Sir John Lubbock's cards, and on which, with the co-operation of his dog Van, he has contributed to throw a little light. Anthropology also can only follow his experiments, the abortive ones as well as the successful ones, with legitimate curiosity, and return its most earnest thanks for them.—Translated for the Popular Science Monthly from the Revue Scientifique'.
|
FINEWEB-EDU
|
Talk:Box canyon
Merger proposal
I wonder whether this topic will ever be substantial enough to require a separate article. Since it is just a few sentences, I think it could be safely and effectively merged into Canyon. --beefyt (talk) 02:50, 26 September 2012 (UTC)
Alternate meaning
Isn't a "box canyon" what you get in some warehouses when you have high stacks of cardboard boxes on either side of a pathway? <IP_ADDRESS> (talk) 05:16, 5 September 2013 (UTC)
|
WIKI
|
Conor Keeley
Conor Keeley (born 13 December 1997) is an Irish professional footballer who plays as a defender for League of Ireland Premier Division club St Patrick's Athletic. His previous clubs are Shelbourne, Cabinteely, Ballymena United and Drogheda United.
Youth career
A native of Dunboyne, County Meath, Keeley began playing with top Dublin academy St Kevin's Boys, where he played from under-5s level to under 10's, before returning to his local side Dunboyne AFC for two years. He then moved on to the academy of League of Ireland club Shelbourne, where he won an under-13 SFAI Cup medal in his first season with the club.
Shelbourne
Keeley made his senior debut for Shelbourne on 17 October 2015, in a 2–0 win over Cobh Ramblers in the final game of the season. The 2016 season saw him struggle for appearances, making just 12 in all competitions resulting in him departing the club in search of more first team opportunities.
Cabinteely
Keeley signed for fellow League of Ireland First Division side Cabinteely ahead of the 2017 season and on 25 March 2017, he scored his first goal in senior football, in a 4–1 win over Cobh Ramblers. On 26 May 2017, he scored against his old side Shelbourne in a 4–1 win at Tolka Park. The 2019 season saw Keeley help the club to a 4th place playoff, qualifying them for the Promotion Playoffs, in which they defeated Longford Town on penalties in the first stage, which Keeley stated was the best moment of his career up to that point. He signed a new one-year contract with the club in January 2020. He departed the club at the end of the 2020 season, following 81 appearances and 9 goals in all competitions during his 4 seasons with the club.
Ballymena United
On 12 January 2021, Keeley signed a two-and-a-half-year contract with NIFL Premiership club Ballymena United. He scored his first goals for the club on 2–1 March 2021, scoring both goals in a 2–1 win at home to Linfield. On 10 December 2021, he scored in a 2–1 win at home to Larne. Keeley captained the side for the first time on 15 January 2022, in a 1–0 defeat away to Linfield. Keeley signed a new two-year contract with the club in July 2022. Keeley featured in all 5 of the club's games in their 2021–22 Irish Cup run, including the Final, as his side were defeated 2–1 by Crusaders at Windsor Park via a 121st-minute goal. On 31 December 2022, it was announced that the club had 'reluctantly' agreed to put Keeley on the transfer list to allow him his wish to move back closer to home. On 7 January 2023, he scored in what turned out to be his final appearance for the club, as they defeated Carrick Rangers on penalties after a 1–1 draw in the Irish Cup. He made a total of 70 appearances in all competitions for the club, scoring 9 goals.
Drogheda United
He signed for League of Ireland Premier Division club Drogheda United for an undisclosed fee on 10 January 2023. His first goal for the club came on 14 July 2023, in a 3–1 win away to UCD at the UCD Bowl. Keeley's performances drew interest from several clubs, including EFL League Two side Notts County, whom Drogheda rejected several bids for Keeley from in August 2023. He was voted Drogheda United Supporters Player of the Year for his performances in 2023.
St Patrick's Athletic
On 15 December 2023, it was announced that Keeley had signed a multi-year contract with St Patrick's Athletic. His first goal for the club came on 22 April 2024, volleying home a Brandon Kavanagh free-kick away to Derry City.
International career
Keeley featured for the Republic of Ireland Universities team in June 2018 in a 2–1 win over the second ranked team in the world at the time, France.
Personal life
Keeley is the brother of fellow professional footballer Josh Keeley, who is a goalkeeper that began his career at St Patrick's Athletic, before moving on to Premier League side Tottenham Hotspur in the summer of 2022. Their father Brendan Keeley was also a goalkeeper, who played for NIFL Premiership club Newry City among others. As a teenager Keeley also played Gaelic football and in May 2014 he scored 2–4 for St Peters Dunboyne in their 3–7 to 2–5 victory over Summerhill as they won the MFL Div 1 title. He also represented Meath GAA at county minor level.
Individual
* Drogheda United Supporters Player of the Year (1): 2023
|
WIKI
|
Udenu
Udenu is a Local Government Area of Enugu State, Nigeria. Its headquarters are in the town of Obollo-Afor (or Obolo) on the A3 highway.
Udenu local government has boundary with Nsukka at Nru Nsukka with Orba-Udulekenyi (popularly known as Orba).
It has an area of 248 km2 and a population of 178,466 at the 2006 census.
History
Politically, Udenu is a Local Government Area of Enugu State, Nigeria. Its headquarters are in the town of Obollo-Afor on the A3 highway. Geographically, It has an area of 248 km2 and a population of 178,466 at the 2006 census. The postal code of the area is 412.
Historically, Udenu as a local government was first carved out of the old Isi-Uzo local government in 1981. This second republic creation of the local government by Alhaji Shehu Shagari regime did not last as military government led by major General Muhammadu Buhari overthrew the then government and announced the proscription of all the newly created local governments.
Hon. Silas Odoh who hails from Ezimo administered the local government between 1981-1983 and Hon. Okey Ogbonna (Caesar) who is from Amalla also administered the council for only six months before the military struck.
On October 1, 1996, Udenu was once again created alongside others by the military government of General Sani Abacha in preparation for his transformation into a civilian president. A sole administration in the person of Samuel A. Ozioko (KSM) was immediately appointed to head the newly created local government with ten electoral wards. It has a population of about 178, 687 (88,381 males and 90,306 females) according to 2003 census conducted all over the federation.
Presciently Udenu has three development centers and about twenty five (25) Autonomous communities. The development centers include; Udenu, Udunedem and Orba Development centers.
For Details, Udenu development centres is made up of Amalla, Ifruka Umu Enachi, umu Egali, Obollo-Afor, Umu Ekwenu, iheakpu, Obollo-Nkwo Ibenda; Obollo-Orie, Obollo-Etiti, Ogwu/Ugbabe Uwani, Isi-Enu and Ajorogwu communities. Presently, Udenu is being administered by Dr. Daniel Ugwu.
Orba development centre comprises Ohom, Ajuona, Agu Orba and Orba communities and is being presently administered by Beatice Ezeaku.
While udeunedem development centre has Umundu, Ogbodu-Aba, Igugu, Ezimo Ulo, Ezimo Agu, Imilike Etiti Imilike Enu and Imilike Ani Communities.
Number Of Local Govt. Chairman/Administrators Since Inception
A local government election conducted in 1997 paved way to the reemergence of the first executive chairman of the present Udenu local government in the person of Hon. Chief (comrade) James .O. Ugwu, Igwurube I of Udenu from Imilike ward.
This government of the Democratic Party of Nigeria, though enmeshed in post-election litigation with the opposing united Nigeria people's party (UNCP) Concluded its Tenure in 1999.
The demise of the Nigerian maximum dictator in June 1998 Ushered in a new military government of General Abdulsalami Abubakar which dissolved the existing political parties and formed new ones.
In 1999, the second executive chairman of Udenu Local Government was Ushered in. The then chairman, chief Hon. Eugene Odoh of obollo-Afor who ran on the platform of All People's party (APP) which later became All Nigerian People's Party, his executive government lapsed in 2001 and he was re-sworn in as a caretaker committee chairman which ended in 2002.
Following the exit of Hon. Eugene Odoh in 2002, a transition committee chaired by chief (Hon) Bernard A. Eze who hails from Obollo-Afor came in the saddle. The transition government of chief Barnard Eze ended in 2003 after the general Election, Again, chief Bernard Eze was restored back as Udenu local Govt. caretaker committee chairman in 2003. the Govt. came to an end in 2004, when the then head of personnel management (HPM) in the person of chief B.B.C. Ayogu (JP) took over as a sole administrator. In the same 2004 a local government election was conducted and his regime came to an end. The local government election conduct in 2004 brought in the third executive chairman of Udenu local government. The person so elected was Hon, Fabian Ugwu (Okosisi) of the people's Democratic party who hails from Obollo-Eke. The government of Hon. Fabian Ugwu ran into troubled water while Kevin Ojobor, his deputy from Amalla ward acted for ten months. The suspension on Hon. Fabian ugwu was later lifted and he took over his exalted office. He later handed over to a caretaker government in 2007.
At the third quarter of 2007, a caretaker government was sworn in, in Udenu local government. This was chaired by Chief Hon. Innocent Anayo Eze from Obollo-Etiti ward. Within four months of its inception, a local government election was conducted and the caretaker committee government handed over to the fourth executive chairman of Udenu local government.
In January 2008, the fourth executive chairman of Udenu local government was brought in. The chairman was Hon. Prince Ezeh; a medical doctor who hails from Amalla ward, though politically based in Obollo-Etiti. The tenure of this administration lapsed in January 2010.
On 4 January 2010, the fifth executive chairman of Udenu local government emerged in the person of Dr. Godwin Ejikeme Abonyi. After two years of effective administration, he was reelected and again sworn in on 4 January 2012. Then, Dr. Godwin Abonyi was saddled with task of delivering the dividend of democracy to the people of Udenu local government. In January 2014, the sixth executive chairman of Udenu Hon. Amaechi Nwodo was sworn in and he piloted the affairs of the local government until the governor of the state adopted the caretaker system which brought Hon. Frank Ugwu from Orba ward as the caretaker on 11 January 2016.
In 2017, an election was conducted and Hon. Frank Ugwu officially became the seventh executive chairman of Udenu local government. He is currently piloting the affairs of the local government till date.
Presently, the Local Government Chairman of Udenu is Hon. Frank Ugwu.
The postal code of the area is 412.
Notable personalities
* Rt. Hon. Dr. Ifeanyi Ugwuanyi (Gburugburu), CON, Former Governor of Enugu State
* Hon. Frank Ugwu
* Professor D. N. Ezeh
* Hon. Silas Odoh
* Hon. Okey Ogbonna (Caesar)
* Samuel A. Ozioko (KSM)
* Hon. Chief (comrade) James .O. Ugwu, Igwurube I of Udenu
* Hon. Eugene Odoh
* Chief (Hon) Bernard A. Eze
* Chief B.B.C. Ayogu (JP)
* Hon, Fabian Ugwu (Okosisi)
* Chief Hon. Innocent Anayo Eze
* Hon. Prince Ezeh
* Dr. Godwin Ejikeme Abonyi
* Hon. Amaechi Nwodo
* Noel Ifeanyi Alumona
* Hon. Ijere Obinna Anthony
* Hon. Solomon Izuchukwu Onah
|
WIKI
|
Christian Erwig
Christian Erwig (born 16 February 1983 in Dorsten) is a German retired footballer.
Career
He made his Bundesliga debut on 25 February 2007, when he came on as a substitute in the 87th minute for FC Schalke 04 in a game against Bayer 04 Leverkusen, replacing Halil Altıntop.
Honours
* Bundesliga runner-up: 2006–07
|
WIKI
|
Wikipedia:Requests for arbitration/Guanaco, MarkSweep, et al/Evidence
Anyone, whether directly involved or not, may add evidence to this page. Please make a header for your evidence and sign your comments with your name.
When placing evidence here, please be considerate of the arbitrators and be concise. Long, rambling, or stream-of-conciousness rants are not helpful.
As such, it is extremely important that you use the prescribed format. Submitted evidence should include a link to the actual page diff; links to the page itself are not sufficient. For example, to cite the edit by Mennonot to the article Anomalous phenomenon adding a link to Hundredth Monkey use this form:.
This page is not for general discussion - for that, see talk page.
Please make a section for your evidence and add evidence only in your own section. Please limit your evidence to a maximum 1000 words and 100 diffs, a much shorter, concise presentation is more likely to be effective. Please focus on the issues raised in the complaint and answer and on diffs which illustrate behavior which relates to the issues.
If you disagree with some evidence you see here, please cite the evidence in your own section and provide counter-evidence, or an explanation of why the evidence is misleading. Do not edit within the evidence section of any other user.
Be aware that the Arbitrators may at times rework this page to try to make it more coherent. If you are a participant in the case or a third party, please don't try to refactor the page, let the Arbitrators do it. If you object to evidence which is inserted by other participants or third parties please cite the evidence and voice your objections within your own section of the page. It is especially important to not remove evidence presented by others. If something is put in the wrong place, please leave it for the arbitrators to move.
The Arbitrators may analyze evidence and other assertions at /Workshop. /Workshop provides for comment by parties and others as well as arbitrators. After arriving at proposed principles, findings of fact or remedies voting by Arbitrators takes place at /Proposed decision. Only Arbitrators may edit /Proposed decision.
The rollback tool should only be used for vandalism, not edit wars
Developer Brion Vibber's description of the rollback tool:
* Its intent is solely to be a timesaving shortcut for reverting mass vandalism ... No one should ever be in an edit war, sysops in particular should be aware that that's not cool, so there's no need to think about whether or not 'rollback' should be used in an edit war. It shouldn't, because we shouldn't be in that position in the first place. --Brion 17:58, 24 Sep 2003 (UTC)
Both Guanaco and MarkSweep engaged in an edit war using the rollback tool
* From 22:25, 2 March 2006 (UTC) to 22:43, 2 March 2006 (UTC), Guanaco reverted MarkSweep's edits on userboxes and user pages — specifically MarkSweep's removal of categories of user pages and the substing of user boxes
*
* From 03:27, 3 March 2006 (UTC) to 03:33, 3 March 2006 (UTC), MarkSweep rereverted Guanaco's reverts on userboxes
*
* From 04:20 on March 4, 2006 (UTC) to 04:25, 4 March 2006 (UTC), Guanaco re-reverted MarkSweep's reverts
*
Block logs
Zocky blocked MarkSweep for 3RR violation
* 11:32, 2 March 2006 Zocky blocked "MarkSweep (contribs)" with an expiry time of 3 hours (WP:3RR violation at Template:User pro-cannabis)
Guanaco reblocked MarkSweep for the same 3RR, but unblocked him five minutes later
* 21:32, 2 March 2006 Guanaco blocked "MarkSweep (contribs)" with an expiry time of 10:11 3 March 2006 (3RR on Template:User pro-cannabis)
* 21:37, 2 March 2006 Guanaco unblocked MarkSweep (contribs) (previously blocked for 3 hours for the same offense)
Evilphoenix blocked both Guanaco and MarkSweep for edit warring
* 06:51, 4 March 2006 Evilphoenix blocked "Guanaco (contribs)" with an expiry time of 12 hours (Disruptive edit warring with Marksweep)
* 06:52, 4 March 2006 Evilphoenix blocked "MarkSweep (contribs)" with an expiry time of 12 hours (disruptive edit warring with Guanaco)
Friday unblocked Guanaco but not MarkSweep
* 07:28, 4 March 2006 Friday unblocked Guanaco (contribs) (this block is not helpful)
* Currently, Friday has never blocked or unblocked MarkSweep
Guanaco continued to make inappropriate uses of the rollback tool after being unblocked
* From 18:37, 5 March 2006 (UTC) to 19:23, 5 March 2006 (UTC), Guanaco reverted MarkSweep's edits on even more userboxes and user pages — using the rollback tool to make edits similar to the ones that Guanaco made from 22:25, 2 March 2006 (UTC) to 22:43, 2 March 2006 (UTC)
* e.g.
MarkSweep made inappropriate uses of rollback, even after being notified about its proper purpose
* 21:20, 1 March 2006 : MarkSweep questionably removes categories from Template:User anarchist-alt, under a justification of "rsc".
* 23:29, 1 March 2006 : I revert the changes, and ask for clarification as to why such an action was made.
* 23:38, 1 March 2006 : MarkSweep again removes the category, calling it "superfluous" and saying there is "no need for double categorization".
* 23:43, 1 March 2006 : I again revert, not seeing how categories are "doubled" or superfluous.
* 23:43, 1 March 2006 : MarkSweep again reverts, this time using rollback.
* 23:44, 1 March 2006 : I revert, without using rollback, but seeing no reason to discuss further.
* 23:47, 1 March 2006 : MarkSweep makes his 4th reversion, saying he removed the category in order to subst the text. I'm left unclear at this point as to the purpose of such an action, but do not report it as violation of 3RR.
* 23:56, 1 March 2006 : I write to MarkSweep explaining the benefits of communication and correct use of rollback.
MarkSweep was later blocked for making 5 reversions to Template:User pro-cannabis. In this conflict he used rollback twice:
* 23:21, 1 March 2006 : This one, prior to my notice on his talk page
* 01:26, 2 March 2006 : This one, about two hours after I made the proper purpose of rollback explicitly clear
He also abused rollback at Template:User dyslexic:
* 03:31, 2 March 2006
Between 20:27, 2 March 2006 and 20:33, 2 March 2006 he used rollback in 54 other templates ; in all these cases he appeared to have been rolling back Guanaco, after the latter had abused rollback. However, it is clear that abusing the tool in response to abuse by another user does not serve in any respect as a justification.
MarkSweep sidestepped policy in order to delete target userboxes
MarkSweep engaged in a unilateral campaign to delete target userboxes, by a process of:
* Removing categories from target userboxes
* Substing userboxes to user pages
* Speedy deleting the targets, calling them "orphaned", even though there is no speedy deletion criteria allowing such an action. His category-removing/substing combination also resulted in a number of depopulated categories, which he deleted citing CSD C1.
* To his credit, however, he did appear to abandon "orphaned" as an acceptable criteria for speedy deletion after I questioned his actions.
Sarge Baldy 18:13, 8 March 2006 (UTC)
Statements by Jimbo Wales
* 21 January, 2006
* 11:01 Wikipedia talk:Proposed policy on userboxes: "Userboxes of a political or, more broadly, polemical, nature are bad for the project. They are attractive to the wrong kinds of people, and they give visitors the wrong idea of what it means to be a Wikipedian."
* 20 February, 2006
* 18:01 Userboxes/Beliefs: "It should be noted that use of such userboxes is strongly discouraged at Wikipedia, and it is likely that very soon all these userboxes will be deleted or moved to userspace soon. Their use and creation is not recommended at this time"
Catholic Alliance
* Talk page spamming by User:Shanedidona. Wording:
* CAoW Since you are listed as a Roman Catholic, I figured I'd send you this. Catholic Alliance of wikipedia has been nominated for Deletion. Please vote and/or tell other people to vote to keep this organization on wikipedia. The link to the voting page is here: Wikipedia:Miscellany for deletion/Wikipedia:Catholic Alliance of wikipedia
Other abuses of userboxes
* (aka Dwain) between 2336 on 15 December, 2005 and 0254 the following morning contacts the following editors:
* User:Tobit
* User:Burwellian
* User:Nainfa
* User:Sebastian Prospero
* User:Tdxiang
* User:Psy guy
* User:PaulHanson
* User:Patsw
* User:Mred64
* User:Merovingian
* User:Lacrimosus
* User:Klemen Kocjancic
* User:Kakero
* User:Jrquinlisk
* User:JohnAlbertRigali
* User:Gentgeen
* User:GVOLTT
* User:Getcrunk
* User:Eoghanacht
* User:EliasAlucard
* User:*drew
* User:Dcgomez
* User:Yo Mama 5000
* User:Canadian Mike
* User:Hollow Wilerding
* User:Bryan Nguyen
* User:Brisvegas
* User:Avalon
* User:Victor
* User:Army1987
* User:Str1977
* User:Acetic Acid
* User:Sawran
* User:Jakes18
* User:Chooserr
* User:Anti-Anonymex2
* User:Dominick
* User:Christopher Erickson
* User:Elliskev
* User:GreatGatsby
* User:Ironbrew
* User:Shanedidona
* User:Sherurcij
* User:WikiSceptic
* User:Thomas Aquinas
* User:TheQuaker
* User:Sbwii
* User:Speculative catholic
* User:Musical Linguist
* User:Jack Cox
* User:Danthemankhan
* User:Kinneyboy90
* User:Hégésippe Cormier
* User:EvKnight13
* User:Danthemankhan
* The wording: Pro-life celebrities category up for deletion!. Hi, I see that you are listed as a Pro-Life Wikipedian, well the Pro-life celebrities category is up for deletion. Category:Pro-life celebrities The abortion zealots don't want anyone to think that any celebrity is actually pro-life. Dwain
* contacts the following people listed as "Pro-life" between 0700 and 0702 on 20 December, 2005:
* User:Musical Linguist
* User:Thomas Aquinas
* User:Dominick
* User:Elliskev
* User:*drew
* The wording: Sean Black has removed an informative section from the Contraceptive patch article describing a law suit which is currently taking place and some of the risks involved in using such barbaric devices. Since you are listed as Pro-Life I was wondering if you might restore the original version, for I don't personally want to get baited into a 3rvt ban. Thank you, Chooserr
Userbox policy poll
By "recruiting massive numbers of inexperienced editors", StrangerInParadise "managed to heavily skew the userbox policy poll from what was overwhelming consensus to a mere supermajority" (I quote Jimbo Wales) using tendentious and sometimes blatantly false claims to whip up support. .
Although the poll was advertised more than most polls, appearing not only on Village Pump and Current surveys from an early date, but also being listed on Userboxes Wikiproject, StrangerInParadise continues to attack the poll with such arguments as "the vote was stacked in advance as a result of how it was selectively published" among other claims.
StrangerInParadise openly and admittedly nobbled an ongoing poll and now falsely claimed that it was deliberately stacked in advance.
StrangerInParadise is also known for his activities on WikiNews where he is also, unsurprisingly, involved in attacks on administrators. .
Swift growth of userboxes
* See Requests_for_arbitration/Tony_Sidaway/Evidence
Userbox-derived demographics
* See Wikipedia_talk:Userbox_policy_poll
* There is a very strong consensus among established editors for a policy involving the removal of political and polemical userboxes from template space, The demographic figures show that those opposing the new policy as a group have vastly fewer article edits and much less editing experience than those supporting. The demographic graph is on a logarithmic scale.
Polemical and inflammatory userboxes may be speedily deleted
* This is expected to be accepted in Principle 7 of Requests for arbitration/Tony Sidaway/Proposed decision
* At the time of writing, it has the required seven votes for a majority acceptance.
Political and polemical userboxes are a product of, and an accelerant of, the Septemberization of Wikipedia
I think we can take that as self-evident by now. I apologise for using the ugly neologism "Septemberization" to denote the abrupt process of degradation in quality that occurs when the intake of an online community exceeds its capacity to acculturate the newcomers. Unless one takes steps to assert the primacy of the culture, the result is Usenet, circa 1998 (wall-to-wall trolls), eventually decaying to Usenet, circa 2006 (silence).
MarkSweep has deleted many Political and polemical userboxes
* deletion log of User:MarkSweep
Guanaco has undeleted many Political and polemical userboxes
* deletion log of User:Guanaco
Userboxes have become a focus of legitimacy for trolls
I think this is self-evident from the above. We're seeing the divisivenesss of these little badges unleashed on our unprepared community in full force, and we are caving in when we should be putting our foot down. Trolls love to hide under a shibboleth like "free speech".
Some more on StrangerInParadise
had been active on English Wikipedia every single day since his sabotage on the userbox policy poll at WP:UPP. Until 23:29 on March 24th. For three days his account has been silent, though he is still around on WikiNews. I wonder if one of his other accounts has been active.
* And at 22:36, 27 March 2006, less than an hour after the above edit, back he comes. :)
Original reverts were justified
MarkSweep's edits to the templates were opposed by many users, including me, and were needlessly destructive. This was a valid reason to revert them. My use of rollback was only a shortcut; if I didn't have admin powers, I would have used a Javascript tool or reverted each page using the page history, which anyone can do.
I should not have reverted MarkSweep's edits to each template a second time; edit warring is bad. However, it was not an abuse of admin powers if I could have done it without them. In the future, I will try to avoid edit warring with or without using rollback.
Undeletion of userboxes also justified
All of the userboxes I undeleted had received a keep or undelete deletion result on Templates for deletion or Deletion review, or were not candidates for speedy deletion, even using a broad interpretation of T1. Therefore, my actions are supported by the Undeletion policy. —Guanaco 22:46, 9 March 2006 (UTC)
Reply to Flcelloguy
* Guanaco has sometimes been blunt, if not incivil
* This is irrelevant. Also, Wikipedia policy does not prohibit bluntness. —Guanaco 14:40, 18 March 2006 (UTC)
* Guanaco has mass reverted edits by a number of people
* I only restored templates if a broad interpretation of T1 did not apply, or for which there had been a deletion result of "keep" or "undelete". Kelly Martin used AWB to tag dozens of templates with db-divisive, even if T1 clearly did not apply. When I confronted her about this, she tried to justify tagging all of them by giving a few examples of templates that contained egregious personal attacks. —Guanaco 18:48, 13 March 2006 (UTC)
* Guanaco has called the deletion of userboxes "vandalism"
* I failed to maintain my assumption of good faith. It may not be vandalism, but deleting the template was in direct defiance of the Wikipedia community. —Guanaco 14:40, 18 March 2006 (UTC)
* Guanaco has called the ArbCom "corrupt"
* If I am wrong, the ArbCom will ignore this. This is irrelevant. And surely I'm not going to be punished for criticizing those in power? Wikipedia is not a totalitarian dictatorship. —Guanaco 14:40, 18 March 2006 (UTC)
* No administrator is ever obligated to use admin powers. —Guanaco 18:38, 13 March 2006 (UTC)
Reply to MarkSweep
* MarkSweep's template edits were mass-reverted in bad faith
* This is only evidence that I failed to maintain an assumption that MarkSweep was acting in good faith. It does not prove bad faith on my part. —Guanaco 02:05, 14 March 2006 (UTC)
Reply to Tinus
* Guanaco uses misleading summary
* The "rv vandalism" edit summary was a slightly tongue-in-cheek interpretation of my attempt and subsequent miserable failure to leave Wikipedia. I am not a vandal, and I have never tried to mislead any Wikipedia users.
* The quote I added is from Nineteen Eighty-Four and accurately describes the treatment of new or unpopular users at Wikipedia. —Guanaco 21:33, 20 March 2006 (UTC)
* Guanaco attempts to hide notice
* I had no intention of hiding the notice, and I have no reason to either. I archived everything because I was not going to continue any of the discussions on the page. I am not going to violate the injunction. —Guanaco 21:33, 20 March 2006 (UTC)
Reply to Tony Sidaway
* Userboxes have become a focus of legitimacy for trolls
* I agree with this statement fully, but cracking down is not an effective way of dealing with trolls. Out-of-process deletion, heated policy polls, and blocking often serve as troll food. —Guanaco 01:44, 22 March 2006 (UTC)
ABF Userbox
"From Administrators' noticeboard
18:45, 27 March 2006 MarkSweep deleted "User:Nathanrdotcom/Userboxes/ABF" (don't)
This is not even remotely an offensive userbox. If certain admins don't know what a parody is, they should learn it. There's a process to deleting userboxes and I suggest you follow them. If a user posts something you don't agree with, don't just arbitrarily delete their work, there's a wonderful place called my talk page where we can discuss these things like adults. I suggest you use it.
You know, the creator of the paedophile userbox claimed that was a parody and it wasn't (it was instead way out of line). I don't appreciate being put in the same category. I'm not even remotely in that same category. I even linked to WP:ABF (which is a parody) in that userbox. Read it again if you don't believe me -> here's another link.
Find a reason other than 'don't' to delete other users' hard work. — nath a(?) nrdotcom (T • C • W) 04:55, 28 March 2006 (UTC)
* As always, bring it up to WP:DRV. User:Zscout370 (Return Fire) 05:09, 28 March 2006 (UTC)
* Thank you, discussion has been moved. — [[Image:Flag_of_Ottawa%2C_Ontario.svg|20px]] [[Image:Flag of Ontario.svg|20px]] [[Image:Flag of Canada.svg|20px]] nath a(?) nrdotcom (T • C • W) 05:47, 28 March 2006 (UTC)
User:nathanrdotcom/Userboxes/ABF
''From Deletion review/Userbox debates. This shows that MarkSweep's actions are clearly disputed.''
MarkSweep arbitararily deleted a parody userbox that was in my userspace.
A subst of the userbox shows the contents as:
Deletion log shows: 18:45, 27 March 2006 MarkSweep deleted "User:Nathanrdotcom/Userboxes/ABF" (don't)
If you check the userbox, it was (and is) linked to WP:ABF (which is a parody).
"Don't" is not a reason. A logical reason why you don't agree with it (posted on my talk page) is more acceptable. I cannot support such out-of-process deletions of people's hard work.
I restored it, then tagged it for deletion (because by restoring it, I might not be following due process). — nath a(?) nrdotcom (T • C • W) 05:55, 28 March 2006 (UTC)
* Obvious undelete. Don't quite know where to begin....StrangerInParadise 08:38, 28 March 2006 (UTC)
* Keep deleted: begin with what is useful to an encyclopedia. --Doc ask? 10:35, 28 March 2006 (UTC)
* Undelete well the userbox isn't in the article space, is it? I also found the parody policy to be very funny, sometimes laughter is useful.... Homestarmy 14:24, 28 March 2006 (UTC)
* Undelete. Humour has its uses, even in an encyclopaedia. Why not use that villain picture (that's on WP:ABF itself) in the box to emphasise its humourous nature? --Sam Blanning (formerly Malthusian) (talk) 15:07, 28 March 2006 (UTC)
* Now that's an idea... — [[Image:Flag_of_Ottawa%2C_Ontario.svg|20px]] [[Image:Flag of Ontario.svg|20px]] [[Image:Flag of Canada.svg|20px]] nath a(?) nrdotcom (T • C • W) 20:36, 28 March 2006 (UTC)
* Undelete. Harmless parody. Sjakkalle (Check!) 15:07, 28 March 2006 (UTC)
* Painfully obvious undelete. Whether it's parody is irrelevant, really (I have a couple [grin]); it earns my vote because it's in the user's space and is not clearly divisive—the criteria, after all... Radio Kirk talk to me 15:23, 28 March 2006 (UTC)
* Why is this here? My user page gets vandalized all the time (Squidward). I just revert it. Are we supposed to be coming to deletion review for userpage vandalism now? Herostratus 18:38, 28 March 2006 (UTC)
* Oh, wait it was deleted, not blanked. That must mean somebody's hacked into an admin account? Good Lord, isn't that serious? Couldn't they go on an image deletion spree? Is the account blocked now, did you post to WP:ANI? I'm sure the real editor would want that done more than anyone. How did this happen? Yeeesh. Herostratus 18:45, 28 March 2006 (UTC)
* What? --Sam Blanning (formerly Malthusian) (talk) 18:52, 28 March 2006 (UTC)
* Im pretty sure MarkSweep is an admin. Homestarmy 19:37, 28 March 2006 (UTC)
* Yes, MarkSweep is an admin. He seems to delete and subst any userbox he doesn't like whenever he feels like it. There's currently a Request for Arbitration (RfAr) against him and another admin regarding this very subject. — [[Image:Flag_of_Ottawa%2C_Ontario.svg|20px]] [[Image:Flag of Ontario.svg|20px]] [[Image:Flag of Canada.svg|20px]] nath a(?) nrdotcom (T • C • W) 20:38, 28 March 2006 (UTC)
* Oh, OK, it was Mark Sweep. I didn't see that, I should have looked. I figured it was a regular admin who's account had been hacked. Sorry, nevermind. Undelete of course. Herostratus 20:44, 28 March 2006 (UTC)
* Please try to be more civil. Sam Korn (smoddy) 20:56, 28 March 2006 (UTC)
* Right, sorry. Really, if I'd noticed that it was Mark Sweep I wouldn't have said anything. That would have been unkind, because he's... well, you know. I know he can't help it. I would never on purpose pick on somone who is... well, like him. So, sorry. Herostratus 22:27, 28 March 2006 (UTC)
* Regardless of the issue there is no excuse for this sort of incivility. Please comment on the issues and not the person. Thank you. Rx StrangeLove 22:36, 28 March 2006 (UTC)
***I'm not attacking MarkSweep as a person (I don't know him, how can I attack someone I don't know?); however I am attacking his methods. — nath a(?) nrdotcom (T • C • W) 20:50, 28 March 2006 (UTC) ****If I can say this without sounding like a seven year old, I wasn't talking to you. Sam Korn (smoddy) 20:56, 28 March 2006 (UTC)
* Undelete . It's like that one poem-thingy, "we will fight them in the sea, we will fight them on the land" etc... "We will delete them in the mainspace, we will delete them in the userspace," well, the Userspace is for personal work and stuffs, there is no reason to delete boxen there -- Dragoonmac - If there was a problem yo I'll solve it 20:21, 28 March 2006 (UTC)
* Please read argumentum ad hominem. Cheers, Sam Korn (smoddy) 20:23, 28 March 2006 (UTC)
* Point taken, FYI, It wasn't meant as a personal attack (although I realise it could look that way). Edited. -- Dragoonmac - If there was a problem yo I'll solve it 22:20, 28 March 2006 (UTC)
* Undelete, it could be interpreted as a parody, so it is not a clear-cut enough case for it to be speedy-worthy. However, I would support its deletion in a TFD, since it could also be interpreted as being serious (unless something was added, like a villain picture that someone suggested, to make it obvious that it was a parody). Wh e re (talk) 21:24, 28 March 2006 (UTC)
* You mean this? I admit I'd prefer it over the old too.
— nath a(?) nrdotcom (T • C • W) 21:51, 28 March 2006 (UTC)
* I would have no objections over that. Wh e re (talk) 21:53, 28 March 2006 (UTC)
Summary
The following sections are intended as a rebuttal of some of the assertions made by Kelly Martin in her description of this case. I'm only offering evidence and arguments that directly relate to her description; if the scope of this case is broadened and requires additional evidence, please let me know.
I have been trying to restore sanity to user categorization since at least late January. For example, here I tried to replace an advocacy category with an encyclopedic category that could be used to identify editors by interest. As shown in the next section, my edits in the template space were generally aimed at improving templates to ensure a uniform appearance and compliance with various policies. Removal of categories was justified because (a) the removed categories did not further the goal of writing an encyclopedia; (b) some of the removed category links pointed to nonexistent categories (red links); (c) some of the removed categories failed to follow the naming conventions for user categorization; (d) some of the removed categories were clearly intended to be used for advocacy and were in fact subsequently used for vote stacking; (e) an implicit consensus was already in place (as e.g. expressed by the various "userbox" policy proposals) that double categorization of users (using categories in addition to templates) is at best superfluous. I have never removed a category which identified users by skill or interest. The affected categories range from the merely pointless to blatant Wikipedia-external advocacy.
My edits in the template namespace were mass-reverted by several editors, including, , , and possibly. I will argue in the next section that the reverts were carried out blindly, carelessly, and arguably in bad faith. However, the issue of which tools the reverts were carried out with is mostly immaterial. Admins have rollback at their disposal, but my edits were also reverted using popups and old-fashioned manual editing; other means would have been available as well, including AWB, "godmode light" and similar browser scripting, bots, etc. I will demonstrate below how rollback has actually been used by current and former administrators. Far from being restricted to reverting vandalism, rollback is used frequently to revert edits made in good faith (e.g. ).
MarkSweep's template edits were mass-reverted in bad faith
MarkSweep's edits to userbox templates were reverted blindly en masse by several users, including admins and non-admins. The manner in which this was done shows an assumption of bad faith on the part of those reverting: MarkSweep's edits included not only removal of unencyclopedic categories, but also substitution or removal of fair-use images, formatting fixes, and general cleanup. Reverting these edits blindly and en masse restored certain templates to an undesirable state (e.g. restoring fair-use images) and should be seen as a sign of bad faith. Note that the mass reverts were conducted using rollback (Guanaco, Geni), popups (AdamJacobMuller), and manual editing (Mike McGregor).
* MarkSweep removes a fair-use image, unencyclopedic category, and removes a stray <br> element to improve the look of the template
* Mike McGregor reverts with edit summary "RV", effectively restoring not just the unencyclopedic category, but also the fair-use image and stray line break
* Silence removes the fair-use image and stray line break a second time
* Silence removes the fair-use image and stray line break a second time
* MarkSweep tidies the formatting to bring it in line with other userbox templates; no categories were removed
* Guanaco rolls back
* etc.
* etc.
* MarkSweep removes a superfluous unencyclopedic category
* Misza13 resizes an image to improve the layout of the table
* Guanaco reverts both edits as "vandalism"
* Guanaco reverts both edits as "vandalism"
* MarkSweep removes an unencyclopedic category and fixes the punctuation of the template text
* AdamJacobMuller mass-reverts using popups
* Squell restores MarkSweep's punctuation fixes and admonishes AdamJacobMuller to "[b]e more careful when reverting"
* Squell restores MarkSweep's punctuation fixes and admonishes AdamJacobMuller to "[b]e more careful when reverting"
* MarkSweep removes a red link
* Guanaco rolls back
* rollback shitfest follows
* as of now (23:22, 12 March 2006 (UTC)), the template still includes a red link to an unencyclopedic category
* as of now (23:22, 12 March 2006 (UTC)), the template still includes a red link to an unencyclopedic category
* MarkSweep removes a red link to an unencyclopedic category
* Guanaco rolls back, etc.
* Geni rolls back, restoring the red link
* Geni, apparently realizing his mistake, self-reverts to MarkSweep's version without the red link
* Geni, apparently realizing his mistake, self-reverts to MarkSweep's version without the red link
* MarkSweep removes an unencyclopedic category and fixes the spacing around the floating <div> element
* Guanaco rolls back
* etc.
* etc.
* Further evidence of bad faith:
* Guanaco restores a deleted template with edit summary "rv template vandalism"
Rollback widely used to revert non-vandalism
The purpose of this section is to demonstrate how rollback has actually been used by administrators in recent history. The following list contains a small fraction of examples where administrators have used rollback to revert contributions of long standing, registered users (in most cases other administrators). Administrators who have used rollback to undo the edits of other administrators include Wikimedia Foundation employees, members of the OTRS team, arbitrators, bureaucrats, clerks, developers, and many other experienced editors.
* ALoan rolled back edits by Ambi
* A_Man_In_Black rolled back edits by Kelly_Martin
* A_Man_In_Black rolled back edits by Raul654
* A_Man_In_Black rolled back edits by Petaholmes
* A_Man_In_Black rolled back edits by Ambi
* A_Man_In_Black rolled back edits by Jacoplane
* Adam_Bishop rolled back edits by Darwinek
* Alkivar rolled back edits by Sherool
* Alkivar rolled back edits by Exploding_Boy
* Alkivar rolled back edits by RobertG
* Alkivar rolled back edits by NicholasTurnbull
* Ambi rolled back 450+ edits by non-admin Bobblewik
* Ambi rolled back edits by Rogerd
* Ambi rolled back edits by Ran
* Andrew_Norman rolled back edits by CJCurrie
* Andrewa rolled back edits by Qaz
* Angr rolled back edits by Rogerd
* Angr rolled back edits by TShilo12
* Arminius rolled back edits by Craigy144
* Arminius rolled back edits by Infrogmation
* Arminius rolled back edits by Lommer
* Arminius rolled back edits by Wgfinley
* Arminius rolled back edits by Theresa_knott
* Arminius rolled back edits by Jiang
* AzaToth rolled back edits by Snowspinner
* Bcorr rolled back edits by R3m0t
* Biekko rolled back edits by Bogdangiusca
* Blankfaze rolled back edits by Woohookitty
* Blankfaze rolled back edits by Mirv
* Brian0918 rolled back edits by Elf
* Brian0918 rolled back edits by Geni
* Briangotts rolled back edits by Rich_Farmbrough
* Brockert rolled back edits by Tim_Starling
* Brockert rolled back edits by Sundar
* Brockert rolled back edits by KF
* Brockert rolled back edits by Fvw
* Brookie rolled back edits by Quadell
* Bumm13 rolled back edits by Nightstallion
* Bunchofgrapes rolled back edits by Jtkiefer
* Burgundavia rolled back edits by Longhair
* Burgundavia rolled back edits by Quadell
* Burgundavia rolled back edits by Kaihsu
* CJCurrie rolled back edits by Anonymous_editor
* CYD rolled back edits by Icairns
* CYD rolled back edits by Lowellian
* CYD rolled back edits by Chris_73
* Cacycle rolled back edits by Jfdwolff
* Cburnett rolled back edits by Ianblair23
* Cecropia rolled back edits by Hall_Monitor
* Cedar-Guardian rolled back edits by Mike_Rosoft
* Celestianpower rolled back edits by Quarl
* Celestianpower rolled back edits by MarkSweep
* Celestianpower rolled back edits by Tony_Sidaway
* Celestianpower rolled back edits by Dbenbenn
* Celestianpower rolled back edits by FireFox
* CesarB rolled back edits by Mackensen
* Chmod007 rolled back edits by Jayjg
* Chmod007 rolled back edits by Oven_Fresh
* Christopher_Mahan rolled back edits by WhisperToMe
* Christopher_Mahan rolled back edits by Chris_73
* Christopher_Mahan rolled back edits by SimonP
* Chuq rolled back edits by Kbdank71
* Chuq rolled back edits by Everyking
* Clarkk rolled back edits by Harro5
* Cleared_as_filed rolled back edits by Physchim62
* ClockworkSoul rolled back edits by BorgQueen
* ClockworkSoul rolled back edits by Extreme_Unction
* Cnwb rolled back edits by Snottygobble on Cnwb's own talk page
* Cryptic rolled back edits by Guanaco
* Cyrius rolled back edits by Andrevan
* Cyrius rolled back edits by Ta_bu_shi_da_yu
* DESiegel rolled back edits by Pathoschild
* DJ_Clayworth rolled back edits by Morwen
* Dale_Arnett rolled back edits by ABCD
* Dan100 rolled back edits by Mindmatrix
* Dan100 rolled back edits by Adashiel
* DanielCD rolled back edits by Curps on DanielCD's own talk page
* Daniel_Quinlan rolled back edits by Infrogmation
* Daniel_Quinlan rolled back edits by JohnOwens
* Danny rolled back edits by SamuelWantman
* David.Monniaux rolled back edits by DJ_Clayworth
* DavidWBrooks rolled back edits by Quadell
* DavidWBrooks rolled back edits by Nlu
* DavidWBrooks rolled back edits by Zanimum
* DavidWBrooks rolled back edits by Peruvianllama
* David_Gerard rolled back edits by Geni
* Davidcannon rolled back edits by Eliezer
* Davidcannon rolled back edits by Rich_Farmbrough
* Davidcannon rolled back edits by TShilo12
* Dbenbenn rolled back edits by Mushroom
* Dbenbenn rolled back edits by Nv8200p
* Denni rolled back edits by Natalinasmpf
* Denni rolled back edits by CambridgeBayWeather
* Derek_Ross rolled back edits by Marudubshinki
* Dieter_Simon rolled back edits by DakotaKahn
* Dieter_Simon rolled back edits by Francs2000
* Dmn rolled back edits by Golbez
* Docu rolled back edits by R._fiend
* Dori rolled back edits by Lectonar
* Dragons_flight rolled back edits by Rich_Farmbrough
* DropDeadGorgias rolled back edits by Redux
* DropDeadGorgias rolled back edits by Francs2000
* Duncharris rolled back edits by Jonathunder
* Duncharris rolled back edits by Jacoplane
* Dysprosia rolled back edits by Brookie
* Earl_Andrew rolled back edits by Thue
* Earl_Andrew rolled back edits by CJCurrie
* Earl_Andrew rolled back edits by JYolkowski
* Earl_Andrew rolled back edits by CLW
* Earl_Andrew rolled back edits by Petaholmes
* Ed_Poor rolled back edits by FeloniousMonk
* Ed_Poor rolled back edits by Duncharris
* Ed_g2s rolled back edits by Splash
* Ed_g2s rolled back edits by Freakofnurture
* Ed_g2s rolled back edits by MacGyverMagic
* Ed_g2s rolled back edits by Beland
* EdwinHJ rolled back edits by Vegaswikian
* EdwinHJ rolled back edits by Smith03
* EdwinHJ rolled back edits by Harro5
* EdwinHJ rolled back edits by Earl_Andrew
* EdwinHJ rolled back edits by Wiki_alf
* Egil rolled back edits by Rmhermen
* Elf-friend rolled back edits by Snottygobble
* Elf rolled back edits by Philwelch
* Ellsworth rolled back edits by Lacrimosus
* Ellsworth rolled back edits by Gamaliel
* Enochlau rolled back edits by Jnothman
* Enochlau rolled back edits by Phil_Boswell
* Enochlau rolled back edits by Michael_Hardy
* Enochlau rolled back edits by Mikkalai
* Esteffect rolled back edits by Sango123
* Esteffect rolled back edits by Denelson83
* Evilphoenix rolled back edits by Water_Bottle
* Evilphoenix rolled back edits by Morven
* Evilphoenix rolled back edits by BrokenSegue
* Evilphoenix rolled back edits by Titoxd
* Exploding_Boy rolled back edits by WhisperToMe
* Exploding_Boy rolled back edits by Aecis
* Ezhiki rolled back edits by Kaldari
* FCYTravis rolled back edits by Docu
* Fastfission rolled back edits by Pakaran
* Fawcett5 rolled back edits by Miborovsky
* Fawcett5 rolled back edits by Petaholmes
* Fawcett5 rolled back edits by Mushroom
* FayssalF rolled back edits by Rdsmith4
* Feco rolled back edits by Natalinasmpf
* FeloniousMonk rolled back edits by FCYTravis
* FeloniousMonk rolled back edits by Jossi
* Fennec rolled back edits by RickK
* Flockmeal rolled back edits by Ian13
* Frazzydee rolled back edits by Ahoerstemeier
* Frazzydee rolled back edits by Neutrality
* Freakofnurture rolled back edits by Quadell
* Fred_Bauder rolled back edits by HOTR
* Fred_Bauder rolled back edits by Jdforrester
* Fred_Bauder rolled back edits by Izehar
* Fred_Bauder rolled back edits by Zzyzx11
* Friday rolled back edits by MarkSweep
* Func rolled back edits by Bishonen
* Fuzheado rolled back edits by Titoxd
* Gamaliel rolled back edits by Michael_Snow
* Gdr rolled back edits by Doc_glasgow
* Gdr rolled back edits by Longhair
* GeneralPatton rolled back edits by Darwinek
* Geni rolled back edits by MarkSweep
* Geni rolled back edits by Dmcdevit
* Geni rolled back edits by Jtkiefer
* Golbez rolled back edits by Sean_Black
* Golbez rolled back edits by Peruvianllama
* GregAsche rolled back edits by Zanimum
* Ground_Zero rolled back edits by Anonymous_editor
* Grue rolled back edits by non-admin Antaeus Feldspar
* Grunt rolled back edits by Jamesday
* Grunt rolled back edits by Neutrality
* Guanaco rolled back edits by Improv
* Guanaco rolled back edits by Doc_glasgow
* Guanaco rolled back edits by MarkSweep
* Guanaco rolled back edits by Kelly_Martin
* Guanaco rolled back edits by Physchim62
* Guanaco rolled back edits by Mackensen
* Guanaco rolled back edits by Sj
* Guanaco rolled back edits by Sceptre
* Guettarda rolled back edits by Talrias
* Hall_Monitor rolled back edits by FCYTravis
* Hall_Monitor rolled back edits by UkPaolo
* Hamster_Sandwich rolled back edits by Jacoplane
* Harro5 rolled back edits by Rich_Farmbrough
* Hawstom rolled back edits by Alai
* Hawstom rolled back edits by Fire_Star
* Henrygb rolled back edits by Mindspillage
* Heron rolled back edits by Jengod
* HOTR rolled back edits by Ral315
* Hyacinth rolled back edits by Charles_Matthews
* Hyacinth rolled back edits by Spangineer
* Hyacinth rolled back edits by CLW
* Infrogmation rolled back edits by Katefan0
* Infrogmation rolled back edits by JYolkowski
* Ingoolemo rolled back edits by DESiegel
* Isomorphic rolled back edits by RickK
* JCarriker rolled back edits by Malo
* JCarriker rolled back edits by Hall_Monitor
* JIP rolled back edits by Drini
* Jdavidb rolled back edits by Curps
* Jdforrester rolled back edits by Inter
* Jdforrester rolled back edits by Kbdank71
* Jeffrey_O._Gustafson rolled back edits by Worldtraveller
* JeremyA rolled back edits by Longhair
* Jerzy rolled back edits by Rich_Farmbrough
* Jerzy rolled back edits by Mike_Halterman
* JesseW rolled back edits by Rmhermen
* JesseW rolled back edits by GregAsche
* Jiang rolled back edits by Merovingian
* Jimfbleak rolled back edits by Ta_bu_shi_da_yu
* Jimfbleak rolled back edits by Pharos
* Jimfbleak rolled back edits by Urhixidur
* Jimfbleak rolled back edits by Husnock
* Jinian rolled back edits by Ashibaka
* Jinian rolled back edits by Brian0918
* JoanneB rolled back edits by Pgk
* JohnOwens rolled back edits by Malcolm_Farmer
* JonMoore rolled back edits by Vegaswikian
* Jonathunder rolled back edits by Duncharris
* Josh_Grosse rolled back edits by Fawcett5
* Joy rolled back edits by Eugene_van_der_Pijll
* Joy rolled back edits by Rama
* Joy_Stovall rolled back edits by KillerChihuahua
* Jtdirl rolled back edits by MarkSweep
* Jtdirl rolled back edits by Anonymous_editor
* Jtdirl rolled back edits by TimPope
* Jtkiefer rolled back edits by Babajobu
* Jtkiefer rolled back numerous edits by Netoholic and NetBot
* KF rolled back edits by BD2412
* Kaldari rolled back edits by Ambi
* Kaldari rolled back edits by GregAsche
* Katefan0 rolled back edits by JzG
* Kelly_Martin rolled back edits by Khaosworks
* Kelly_Martin rolled back edits by Evilphoenix
* Khendon rolled back edits by Drini
* Kirill_Lokshin rolled back edits by Leithp
* KnowledgeOfSelf rolled back edits by Sango123
* KnowledgeOfSelf rolled back edits by Drini
* Kwamikagami rolled back edits by Rich_Farmbrough
* Kwamikagami rolled back edits by TexasAndroid
* Lachatdelarue rolled back edits by Sjorford
* Lachatdelarue rolled back edits by Cburnett
* Lbmixpro rolled back edits by Wgfinley
* Lectonar rolled back edits by Angr
* Lommer rolled back edits by Petaholmes
* Lowellian rolled back edits by Thue
* Ludraman rolled back edits by Jpgordon
* MONGO rolled back edits by Brian0918
* MacGyverMagic rolled back edits by Uncle_G
* Mackensen rolled back edits by Pakaran
* Mackeriv rolled back edits by Adam_Bishop
* Malo rolled back edits by Antandrus
* Mark rolled back edits by Pgk
* MarkGallagher rolled back edits by SushiGeek
* MarkSweep rolled back edits by Guanaco
* MarkSweep rolled back edits by Sarge_Baldy
* Mark_Richards rolled back edits by Sesel
* Marshman rolled back edits by Mikkalai
* Marshman rolled back edits by Angr
* Marshman rolled back edits by Ike9898
* Marshman rolled back edits by BD2412
* Marudubshinki rolled back edits by Ilyanep
* Mathwiz2020 rolled back edits by Freakofnurture
* Mbecker rolled back edits by Tony_Sidaway
* Merovingian rolled back edits by RexNL
* Mikkalai rolled back edits by Deltabeignet
* Mirv rolled back edits by SlimVirgin
* Mirv rolled back edits by Phroziac
* Mkmcconn rolled back edits by Aaron_Brenneman
* Mkweise rolled back edits by Golbez
* Moink rolled back edits by Dale_Arnett
* Moriori rolled back edits by Pharos
* Moriori rolled back edits by Rje
* Moriori rolled back edits by Katefan0
* Mulad rolled back edits by Sfoskett
* MykReeve rolled back edits by Fuzheado
* MykReeve rolled back edits by Ed_g2s
* Mysekurity rolled back edits by SimonP
* Mysekurity rolled back edits by Goodoldpolonius2
* Mzajac rolled back edits by Docu
* NSLE rolled back edits by Ixfd64
* NSLE rolled back edits by Rich_Farmbrough
* NSLE rolled back edits by Bobo192
* NSLE rolled back edits by Shanel
* NSLE rolled back edits by Curps
* Nandesuka rolled back edits by Tony_Sidaway
* Nandesuka rolled back edits by Vsmith
* Nandesuka rolled back edits by Marudubshinki
* Necrothesp rolled back edits by Shanel
* Neutrality rolled back edits by Superm401
* Neutrality rolled back edits by Kaldari
* NicholasTurnbull rolled back edits by Nunh-huh
* NicholasTurnbull rolled back edits by Tony_Sidaway
* Nohat rolled back edits by Freakofnurture
* Nohat rolled back edits by Wernher
* Nohat rolled back edits by Jpgordon
* Nohat rolled back edits by Rschen7754
* Nohat rolled back edits by Zzyzx11
* Nufy8 rolled back edits by Marudubshinki
* Oberiko rolled back edits by Rich_Farmbrough
* OldakQuill rolled back edits by Violetriga
* PMA rolled back edits by Docu
* PMA rolled back edits by Ed_g2s
* PZFUN rolled back edits by Nightstallion
* PZFUN rolled back edits by Sjorford
* Pakaran rolled back edits by Danny
* Pakaran rolled back edits by Angela
* Patrick rolled back edits by ScottDavis
* Paul_A rolled back edits by Brockert
* PedanticallySpeaking rolled back edits by Nv8200p
* Peruvianllama rolled back edits by CJCurrie
* Phil_Boswell rolled back edits by Cedar-Guardian
* Phil_Sandifer rolled back edits by Titoxd
* Philwelch rolled back edits by Nlu
* Phroziac rolled back edits by Physchim62
* Phroziac rolled back edits by Mirv
* Physchim62 rolled back edits by Guanaco
* Piotrus rolled back edits by Chris_73
* Pollinator rolled back edits by Ixfd64
* Proteus rolled back edits by ALoan
* Proteus rolled back edits by Dbiv
* Proteus rolled back edits by Craigy144
* Proteus rolled back edits by MPF
* Proteus rolled back edits by Grenavitar
* Quadell rolled back edits by Chick_Bowen
* Quadell rolled back edits by Jkelly
* Quercusrobur rolled back edits by Curps
* Quercusrobur rolled back edits by FrancisTyers
* Quercusrobur rolled back edits by Nv8200p
* R._fiend rolled back edits by Tony_Sidaway
* R._fiend rolled back edits by SimonP
* R._fiend rolled back edits by DESiegel
* R3m0t rolled back edits by Flcelloguy
* Radiant! rolled back edits by Dbiv
* Ral315 rolled back edits by Dragons_flight
* Rama rolled back edits by Sesel
* Raul654 rolled back edits by Guanaco
* Raul654 rolled back edits by Enchanter
* Rd232 rolled back edits by Lupo
* Rdsmith4 rolled back edits by Geni
* RedWordSmith rolled back edits by ClockworkSoul
* Redux rolled back edits by David_Gerard
* Redwolf24 rolled back edits by Dan100
* Refdoc rolled back edits by Golbez
* Refdoc rolled back edits by Fuzheado
* Refdoc rolled back edits by Geni
* Reflex_Reaction rolled back edits by Omegatron
* Rfl rolled back edits by MacGyverMagic
* Rfl rolled back edits by Paul_August
* Rfl rolled back edits by Rje
* Rhymeless rolled back edits by Nlu
* RickK rolled back edits by Ugen64
* RickK rolled back edits by Tony_Sidaway
* RickK rolled back edits by Slrubenstein
* RickK rolled back edits by Kwamikagami
* RickK rolled back edits by Decumanus
* Rlquall rolled back edits by Rx_StrangeLove
* RoyBoy rolled back edits by Bobo192
* RoySmith rolled back edits by Ian13
* Rschen7754 rolled back edits by Pollinator
* Ryan_Delaney rolled back edits by Malo
* SCEhardt rolled back edits by Physchim62
* Sam_Korn rolled back edits by SoothingR
* SamuelWantman rolled back edits by CanadianCaesar
* Sasquatch rolled back edits by Jimbo_Wales
* Scott_Burley rolled back edits by Niteowlneils
* Seabhcan rolled back edits by Uncle_G
* Seabhcan rolled back edits by HappyCamper
* Sebastiankessel rolled back edits by Mysekurity
* Sebastiankessel rolled back edits by Mairi
* Secretlondon rolled back edits by Taxman
* Seth_Ilys rolled back edits by Raul654
* Shanel rolled back edits by FireFox
* Shanel rolled back edits by ESkog
* SimonP rolled back edits by Zzyzx11
* SimonP rolled back edits by Rich_Farmbrough
* SimonP rolled back edits by Bobo192
* SimonP rolled back edits by Cedar-Guardian
* SimonP rolled back edits by Ral315
* Sjakkalle rolled back edits by FireFox
* SlimVirgin rolled back edits by Sundar
* Slrubenstein rolled back edits by TShilo12
* Smith03 rolled back edits by Zzyzx11
* Smith03 rolled back edits by EdwinHJ
* Smith03 rolled back edits by Trilobite
* SmthManly rolled back edits by Gurubrahma
* SmthManly rolled back edits by Evil_Monkey
* Sn0wflake rolled back edits by EurekaLott
* Sn0wflake rolled back edits by Interiot
* Sn0wflake rolled back edits by Mushroom
* Snottygobble rolled back edits by Thue
* Snottygobble rolled back edits by Rich_Farmbrough
* Splash rolled back edits by Guanaco
* Ssd rolled back edits by Neutrality
* Hiding rolled back edits by Redux
* Stewartadcock rolled back edits by Lupin
* Sundar rolled back edits by Kingturtle
* Sundar rolled back edits by The_Anome
* Sundar rolled back edits by Knowledge_Seeker
* SushiGeek rolled back edits by Alhutch
* TShilo12 rolled back edits by Davidcannon
* Ta_bu_shi_da_yu rolled back edits by Splash
* Talrias rolled back edits by Guettarda
* Talrias rolled back edits by Luigi30
* Talrias rolled back edits by SlimVirgin
* Talrias rolled back edits by Angr
* Tannin rolled back edits by Gdr
* Tannin rolled back edits by Timwi
* Tannin rolled back edits by Brian0918
* TenOfAllTrades rolled back edits by Mel_Etitis
* TenOfAllTrades rolled back edits by Wiki_alf
* TenOfAllTrades rolled back edits by Anonymous_editor
* Texture rolled back edits by David_Gerard
* The_Epopt rolled back edits by UtherSRG
* The_Epopt rolled back edits by Lacrimosus
* The_Epopt rolled back edits by Ianblair23
* The_Epopt rolled back edits by Mikkalai
* The_Epopt rolled back edits by Tregoweth
* The_Tom rolled back edits by Brian0918
* The_Tom rolled back edits by CJCurrie
* The_Tom rolled back edits by HOTR
* The_Tom rolled back edits by JIP
* The_Tom rolled back edits by VampWillow
* The_Tom rolled back edits by Izehar
* The_Tom rolled back edits by Ta_bu_shi_da_yu
* The_wub rolled back edits by Mailer_diablo
* TheoClarke rolled back edits by UkPaolo
* Theresa_knott rolled back edits by Jdforrester
* Theresa_knott rolled back edits by Neutrality
* Theresa_knott rolled back edits by Grunt
* Theresa_knott rolled back edits by Moriori
* Thue rolled back edits by R3m0t
* Tillwe rolled back edits by Vsmith
* Tillwe rolled back edits by Slrubenstein
* Tillwe rolled back edits by EurekaLott
* TimPope rolled back edits by Jtdirl
* Tim_Starling rolled back edits by Brockert
* Tim_Starling rolled back edits by Jpgordon
* Tkinias rolled back edits by Sam_Hocevar
* Tom_harrison rolled back edits by Bhadani
* Trevor_macinnis rolled back edits by Neutrality
* Tznkai rolled back edits by Paul_August
* Ugen64 rolled back edits by Eliezer
* Ugen64 rolled back edits by RickK
* UtherSRG rolled back edits by Ed_g2s
* VampWillow rolled back edits by Seth_Ilys
* VampWillow rolled back edits by Kingturtle
* VampWillow rolled back edits by Sjorford
* Voice_of_All rolled back edits by DanielCD
* Wapcaplet rolled back edits by Mark_Dingemanse
* Wesley rolled back edits by Pollinator
* Wesley rolled back edits by Neutrality
* Who rolled back edits by GraemeL
* Wikiacc rolled back edits by Eliezer
* Wile_E._Heresiarch rolled back edits by WhisperToMe
* Wile_E._Heresiarch rolled back edits by Sam_Hocevar
* Wilfried_Derksen rolled back edits by Jmabel
* Wilfried_Derksen rolled back edits by Evil_Monkey
* Wilfried_Derksen rolled back edits by Ed_g2s
* Yamla rolled back edits by Jossi
* Yamla rolled back edits by RexNL
414 admins have used admin-on-admin rollback
This is a list of current and former administrators along with the number of times each of them has used rollback to undo the edits of other current or former administrators, based on their last 5000 contributions as of March 12, 2005. The counts may include accidental double rollbacks. A total of 414 out of 870 admins (48%) are involved.
Guanaco 382 ************************************** Jdforrester 92 ********* Morven 84 ******** MarkSweep 72 ******* Jiang 60 ****** Ed g2s 44 **** Wile E. Heresiarch 42 **** Violetriga 35 **** Gamaliel 35 **** Schneelocke 31 *** Pollinator 31 *** Phil Sandifer 27 *** Jtdirl 27 *** Sebastiankessel 26 *** Proteus 25 *** Jimfbleak 25 *** Blankfaze 25 *** SimonP 24 ** Nohat 23 ** Nunh-huh 22 ** Duncharris 21 ** Piotrus 20 ** GeneralPatton 20 ** RickK 19 ** PZFUN 19 ** John Kenney 18 ** Talrias 17 ** Mikkalai 16 ** Dbenbenn 16 ** Khaosworks 15 ** DavidWBrooks 15 ** Alkivar 15 ** Trevor macinnis 14 * Madchester 14 * Slrubenstein 13 * Ezhiki 13 * Celestianpower 13 * Cacycle 13 * ALoan 13 * Physchim62 12 * Danny 12 * Niteowlneils 11 * Who 10 * Ssd 10 * Geni 10 * The Tom 10 * SlimVirgin 9 * Petaholmes 9 * Joy 8 * Jerzy 8 * JIP 8 * Hyacinth 8 * Gdr 8 * Earl Andrew 8 * Andrevan 8 * A Man In Black 8 * SamuelWantman 7 * Rama 7 * Moriori 7 * Kwamikagami 7 * Infrogmation 7 * Freestylefrappe 7 * Evilphoenix 7 * Davidcannon 7 * ClockworkSoul 7 * The Epopt 6 * Splash 6 * Smith03 6 * Silsor 6 * Reflex Reaction 6 * NSLE 6 * Mirv 6 * Marshman 6 * Knowledge Seeker 6 * FeloniousMonk 6 * Exploding Boy 6 * EdwinHJ 6 * Docu 6 * Dbiv 6 * David.Monniaux 6 * Cyde 6 * Arminius 6 * Wilfried Derksen 5 * Ta bu shi da yu 5 * Sn0wflake 5 * R. fiend 5 * Paul A 5 * Oberiko 5 * Marudubshinki 5 * Henrygb 5 * Golbez 5 * FCYTravis 5 * Eugene van der Pijll 5 * Enochlau 5 * Dysprosia 5 * Ambi 5 * Adam Bishop 5 * Worldtraveller 4 VampWillow 4 UtherSRG 4 Ugen64 4 Tregoweth 4 Thue 4 Theresa knott 4 Sarge Baldy 4 Ran 4 RHaworth 4 Quercusrobur 4 Matt Crypto 4 Markalexander100 4 Kelly Martin 4 Kaldari 4 Jtkiefer 4 JonMoore 4 Fvw 4 Fred Bauder 4 Fawcett5 4 Denni 4 Cyrius 4 Christopher Mahan 4 CYD 4 CJCurrie 4 Burgundavia 4 Brockert 4 172 4 Zscout370 3 Xezbeth 3 Wiglaf 3 Wesley 3 Vsmith 3 UninvitedCompany 3 Timwi 3 Tillwe 3 Thryduulf 3 TenOfAllTrades 3 Tannin 3 TShilo12 3 Sundar 3 Snottygobble 3 Rossami 3 Rhymeless 3 Rfl 3 Refdoc 3 Redwolf24 3 Rdsmith4 3 Ragib 3 Postdlf 3 Phroziac 3 Peruvianllama 3 PMA 3 Omegatron 3 OldakQuill 3 Nightstallion 3 NicholasTurnbull 3 Necrothesp 3 Nandesuka 3 Mzajac 3 Mustafaa 3 Mike Halterman 3 Mackensen 3 Linuxbeak 3 KnowledgeOfSelf 3 Hemanshu 3 Hall Monitor 3 Grunt 3 GregAsche 3 Frazzydee 3 Ed Poor 3 DropDeadGorgias 3 Drini 3 DanielCD 3 Dan100 3 Cryptic 3 ContiE 3 Bcorr 3 Ævar Arnfjörð Bjarmason 2 Zoney 2 Zoe 2 Zero0000 2 Zanimum 2 Yamla 2 Xaosflux 2 Wernher 2 Tom harrison 2 Titoxd 2 Tim Starling 2 Stevertigo 2 Stevenj 2 SmthManly 2 Shanel 2 Secretlondon 2 Seabhcan 2 Sasquatch 2 Sam Hocevar 2 Rlquall 2 Raul654 2 R3m0t 2 Quadell 2 Phil Boswell 2 Pgk 2 Pakaran 2 Nlu 2 Neutrality 2 Mysekurity 2 MykReeve 2 MarkGallagher 2 Malo 2 Lbmixpro 2 Lachatdelarue 2 Kim Bruning 2 Katefan0 2 Kaihsu 2 Jonathunder 2 Jni 2 Jinian 2 JesseW 2 JCarriker 2 HOTR 2 Heron 2 Hawstom 2 Harro5 2 Hamster Sandwich 2 Gerald Farinas 2 Garzo 2 G-Man 2 Friday 2 Flcelloguy 2 Ferkelparade 2 Fastfission 2 Esteffect 2 Essjay 2 Ellsworth 2 DragonflySixtyseven 2 Dpbsmith 2 Doc glasgow 2 Dieter Simon 2 Daniel Quinlan 2 DJ Clayworth 2 Cutler 2 Curps 2 Cnwb 2 Cleared as filed 2 Chuq 2 Chris 73 2 Chmod007 2 Cecropia 2 Brookie 2 BrokenSegue 2 Brian0918 2 Bratsche 2 Bogdangiusca 2 Bkonrad 2 Biekko 2 Anonymous editor 2 Angr 2 Android79 2 Zzyzx11 1 Wikiacc 1 Wapcaplet 1 Voice of All 1 Viajero 1 Vaoverland 1 Utcursch 1 Urhixidur 1 Tznkai 1 Tkinias 1 TimPope 1 Thunderbrand 1 TheoClarke 1 The wub 1 The Anome 1 Thames 1 Texture 1 TUF-KAT 1 SushiGeek 1 Stewartadcock 1 Hiding 1 Solipsist 1 Sjakkalle 1 Sj 1 Seth Ilys 1 Sesel 1 Sean Black 1 Scott Burley 1 Sannse 1 Sango123 1 Sam Korn 1 SCZenz 1 SCEhardt 1 Ryan Delaney 1 Rschen7754 1 RoySmith 1 RoyBoy 1 Robchurch 1 Ricky81682 1 Rhobite 1 RexNL 1 Redux 1 RedWordSmith 1 Rd232 1 Rbrwr 1 Ral315 1 Radiant! 1 RN 1 Philwelch 1 PedanticallySpeaking 1 Pcb21 1 Paul August 1 Patrick 1 Nv8200p 1 Nufy8 1 Mulad 1 Morwen 1 Moncrief 1 Moink 1 Mkweise 1 Mkmcconn 1 Michael Snow 1 Merovingian 1 Mel Etitis 1 Mbecker 1 Maveric149 1 Mathwiz2020 1 Mark Richards 1 Mark 1 Mackeriv 1 MacGyverMagic 1 MONGO 1 Lupo 1 Lupin 1 Ludraman 1 Lowellian 1 Lommer 1 Lectonar 1 Kirill Lokshin 1 Kingturtle 1 Khendon 1 Karmafist 1 Karada 1 KF 1 Joy Stovall 1 Josh Grosse 1 JohnOwens 1 JoanneB 1 JeremyA 1 Jeffrey O. Gustafson 1 Jdavidb 1 Jaxl 1 JYolkowski 1 JDoorjam 1 Isomorphic 1 Ingoolemo 1 Ilyanep 1 Ike9898 1 Icairns 1 Ianblair23 1 Ian13 1 Husnock 1 Howcheng 1 Guettarda 1 Gtrmp 1 Ground Zero 1 Gadfium 1 Fuzheado 1 Func 1 Freakofnurture 1 Flockmeal 1 FireFox 1 Fennec 1 Feco 1 FayssalF 1 Evil Monkey 1 Evercat 1 Elf-friend 1 Elf 1 Egil 1 Dragons flight 1 Dori 1 Dmn 1 Diberri 1 Derek Ross 1 Delirium 1 Decumanus 1 Deb 1 Davodd 1 David Gerard 1 Dante Alighieri 1 Dale Arnett 1 DESiegel 1 CryptoDerk 1 Croat Canuck 1 Craigy144 1 Clarkk 1 Cimon avaro 1 ChrisO 1 CesarB 1 Cedar-Guardian 1 Cburnett 1 Carnildo 1 Carbonite 1 CSTAR 1 CLW 1 Bunchofgrapes 1 Bumm13 1 Briangotts 1 Ausir 1 Arcadian 1 Angela 1 Andrewa 1 Andrew Norman 1 Alteripse 1 Allen3 1 Alhutch 1 ABCD 1
Geni has abused his powers of reasoning
* is unencyclopedic, divisive, polemical troll food used for advocating a divisive cause.
* is unencyclopedic, divisive, polemical troll food created by a banned troll (Bourbons3 a.k.a. Dussst).
* is unencylopedic, divisive, ill-informed, condescending, polemical troll food with a thin veneer of fake humility ("this user accepts").
Guanaco has sometimes been blunt, if not incivil
* Guanaco, in reply to Karmafist's FAQ, says "Joeyramoney may have continued editing, but that doesn't excuse what Carbonite, Jimbo, and Voice of All did."
Guanaco has mass reverted edits by a number of people
* Guanaco has mass reverted, using the rollback, the contributions of multiple users, including MarkSweep, Improv, Kelly Martin, and Physchim62.
* For instance, undeleting userboxes Improv had deleted and then removing deleted:.
* Reverting subst's by MarkSweep:.
* Reverting deletion tags by Kelly Martin and Physchim62:
* These diffs represent only a small fraction of all the undeleting/restoring and reverting.
Guanaco has called the deletion of userboxes "vandalism"
* While restoring a userbox and removing deleted, Guanaco calls the actions of MarkSweep "template vandalism".
Guanaco has called the ArbCom "corrupt"
* Responding to someone's comment about desysop-ing MarkSweep, Guanaco calls the ArbCom "corrupt".
* This is where this actually was posted Tinus 21:20, 16 March 2006 (UTC)
* Guanaco has also said that he "[will] not... enforce an Arbitration ban (especially one that may not apply) under any circumstances".
First assertion
MarkSweep has abused his admin powers. Deletion:
Before T1:
* 11:01, 23 January 2006 MarkSweep deleted "Template:User freedom"
* 16:49, 2 February 2006 MarkSweep deleted "Template:User admins ignoring policy"
* 06:20, 4 February 2006 MarkSweep deleted "Template:User admins ignoring policy"
* 04:53, 5 February 2006 MarkSweep deleted "Template:User wishful"
None of these were within policy or process. Despite this he claims "out-of-process re-creation" as a reason for deletion in the same time period
Post T1
Orphaned is not listed on CSD. UE is not listed on WP:CSD.
* DeletedCategory:Pro-cannabis Wikipedians citeing C1. The catigory had not been empty for 4 days This diff (there are many simular ones) shows that MarkSweep must have known that the catigory had not been empty for 4 days
* Deleted Category:Freemason Wikipedians citeing C1. The catigory had not been empty for 4 days. This diff shows that MarkSweep must have nown this
* 05:56, 2 March 2006 MarkSweep deleted "Template:User review" (orphaned)
* 18:19, 21 March 2006 MarkSweep deleted "Template:User independent Chechnya" (UE)
Misc deletion
* 09:34, February 18, 2006 MarkSweep deleted "Wikipedia:WikiProject Userboxes/Alerts"
No justification for deletion under policy and Watch/schoolwatch shows such pages are tolerated if not encouraged.
Second assertion
MarkSweep has abused his blocking powers.
http://en.wikipedia.org/w/index.php?title=Wikipedia:Templates_for_deletion/Log/2006_February_19&diff=prev&oldid=40237585
* User:CFIF Lists Template:Polemical userboxes for deletion
* Marksweep does a speedy keep
* Marksweep then blocks User:CFIF without warning..
Response to MarkSweep by Sjakkalle
MarkSweep listed my rollback of User:FireFox's edit as an example of "Rollback widely used to revert non-vandalism". This is wrong. This rollback was clearly a case of reverting vandalism coming from FireFox's account, which came because he momentarily left his computer unattended in a computer room. . Sjakkalle (Check!) 08:47, 20 March 2006 (UTC)
Guanaco uses misleading summary, attempts to hide notice
First, Raul654 places a note regarding the injunction against him on Guanaco's talk page. Guanaco then decides to archive his talk page (edit summary 'archive', minor edit). Then, he replaces his talk page by some kind of quote, with summary 'bye'. The next day he reverses that edit with summary 'rv vandalism'. This edit is also marked as minor. Either he considers himself a vandal or his summary is misleading.
Mark Sweep was hostile to requests for diologue re: Bush Templates.
After I saw what seemed to be iregularities in the closing of discussion at TfD User_PresidentBush, which was closed after less then 24hr by Sweep. My frist attempt to open a diologue was on the page below the archived debate (which was closed by mark unilaterally declaring that "there will be no more George W. Bush templates of any form."). It seems this was likely overlooked, as it was already closed and I'd assume that mark did not return to it. So, I left a messege on his talk page, albeit a long one in an atempt to open a diologue regarding this closure. . This was dismissed and met with what seems to be a threat of a ban. . []. there was no response as to who else I should discuss this with or where the 'discussion amongst admins' had taken place.
Mark Sweep has abused his admin status to inappropriatly supressed debate on several occasions.
* Mark Sweep closed a TfD discussion after only 24hr 31hrs(? someone check my math please) of debate and unilaterally declaired that there would be no more bush templates. []
* Mark Sweep blanked a DRV regarding the bush templates saying discussion was closed. []
* Mark Sweep blanked a request for unprotect. []
more documentaion (although not exactally well orginized documentation) here Mike McGregor (Can) 01:56, 28 March 2006 (UTC)
MarkSweep has abused his admin status to inappropriately (and out-of-process) delete userboxes
MarkSweep arbitararily deleted a parody userbox that was in my userspace ([|link to discussion at WP:UBD]).
Deletion log shows: 18:45, 27 March 2006 MarkSweep deleted "User:Nathanrdotcom/Userboxes/ABF" (don't)
If you check the userbox, it was (and is) linked to WP:ABF (which is a parody).
"Don't" is not a reason. A logical reason why you don't agree with it (posted on my talk page) is more acceptable. I cannot support such out-of-process deletions of people's hard work.
MarkSweep knowingly and willingly engaged in unauthorized subst-ing of users' templates
..including my own. The templates he subst'd still exist even now, which makes me wonder what his ulterior motive was. You can't go around deleting/subst'ing things you don't agree with even if you're an admin. Follow process.
MarkSweep continues to delete userboxes even during this RfAr
...therefore making matters worse for himself (he was even advised on his talk page to stop, albeit by a lowly user [myself]).
Deletion log shows:
* 16:40, 4 April 2006 MarkSweep deleted "Template:User against Iraq war of aggression" (t1)
* 16:37, 4 April 2006 MarkSweep deleted "User:ROGNNTUDJUU!/GOP criminal" (g4)
* 16:37, 4 April 2006 MarkSweep deleted "Template:User GOP criminal" (r2)
* 15:56, 4 April 2006 MarkSweep deleted "Template:User GOP criminal" (g4)
* 14:40, 4 April 2006 MarkSweep deleted "Template:User homophobe" (t1)
* 14:39, 4 April 2006 MarkSweep deleted "Template:User GOP criminal" (t1)
MarkSweep knowingly and willingly violated policy by misrepresenting CSD-C1(empty) deletions
I made several attempts to indicate to MarkSweep that his edits were out of policy, and at no time did he indicate a willingness to reconsider his actions. In particular, the intentional depopulation of categories, with subsequent deletion of CSD-C1(empty), and redeletion under CSD-G4 (previously listed, i.e. speciously under CSD-C1) was a particular indication of prima facie bad faith (documented IncidentArchive78#Mark Sweep's continued disruption of Wikipedia).
MarkSweep was blocked for 3RR, and was encouraged to continue by other admins
His edit-warring also led to a 3RR block of only 3 hours. Note the administrative symapthy for the underlying deletions, which are far more serious than the 3RR. Note also how Zocky issues a warning to me for having described his actions (in IRC) as vandalism, and advises MarkSweep to continue the edit war by playing out the clock. Note that MarkSweep immediately went on to delete another userbox.
MarkSweep knowingly and willingly violated policy by engaging in mass-blanking and disruption
Specifically, MarkSweep engaged in mass-blanking, disruption of hundreds of Wikipedians who had chosen to list themselves in dozens of categories, edit warring and abuse of administrator tools in commission of same (all documented IncidentArchive79#User:MarkSweep and IncidentArchive78#Mark Sweep's continued disruption of Wikipedia, note the patterns of recidivism).
MarkSweep knowingly and willingly engaged in unauthorized subst-ing of users' templates
...including my own, where it was clearly not authorized as I had in the strongest terms protested his actions beforehand.
MarkSweep's actions were consistently done out-of-policy
The above actions have no policy justifications. Although Jimbo Wales has expressed concerns about userboxes, he has also expressly forbid the sort of actions in which MarkSweep has engaged, and certainly never authorized the sorts of CSD-C1 subterfuge MarkSweep repeatedly attempted.
MarkSweep's prima facie bad faith obviated the need for admin discussion prior to rollback
An admin acting so far out-of-policy and in clear bad faith as this should not be entitled to continue doing so. An admin doing so repeatedly over the course of weeks cannot be said to be entitled to yet another hearing to justify his acts. An admin acting this far out-of-policy cannot be said to retain the sanction of the community to act. The dozens of outraged user comments on MarkSweep's talk page only attest to this.
In principle, one acting like this through an admin account should be stopped immediately in his tracks simply for fear of impersonation, as per WP:AGF, no one should presume an admin would act so irresponsibly out-of-policy as this. That MarkSweep was able to amass such a record that this behavior becomes nonrepudiable on his part makes it all the worse.
Guanaco's actions during the entire affair were in support of policy
Guanaco reversed many of MarkSweep's wrongful actions, at both my request, and that of others [here various requests on Guanaco's talk page]. My only criticism of Guanaco is that he did not preempt further damage by blocking MarkSweep outright for a significant period of time. It is only his restraint in the matter which has caused damage.
To oppose MarkSweep's actions as Guanaco has cannot be considered either edit-warring or wheel-warring, as there is zero-claim of legitimacy on MarkSweep's part to begin with. The evidence of bad faith on MarkSweep's part, presented above, is too strong to overcome.
Guanaco's actions are especially commendable considering the overt hostility other admins have shown in their partisan opposition of userboxes (e.g. Physchim62 blocked Babajobu). Many who would otherwise have acted have been intimidated into inaction by this corruptive climate.
StrangerInParadise 07:45, 28 March 2006 (UTC)
Mark Sweep engages in unwarranted, unilateral decision-making
In February 2006, MarkSweep made remarks on user's talk page containing the following:,.
MarkSweep has closed deletion debates at improper times and before consensus was reached
MarkSweep has also closed deletion debates as shown here:
Concerning the finding of uncivil behavior
I have been made the subject of a finding of uncivil behavior, and proposed sanctions in connection with it, both brought by User:dmcdevit. Contrary to the wording of the specification, I make no habit of calling opponents vandals, but have insisted that MarkSweep's actions constitute vandalism, and have argued thusly, for example /Workshop#Deletion in bad faith is vandalism.
Apart from this, I do not use the word vandal save in the most uncontroversial "rv vand" edit summary usage. I did, once and a very long time ago, refer to an aestetically disagreeable edit as vandalism, unaware at the time of the very specific term of art the word had become. I was directed to WP:VAND, saw that I was entirely mistaken and did not repeat.
I would also point out that the only people to object to this usage in connection with MarkSweep have been userbox opponents. To censor such speech as uncivil is in a sense to preclude expression of what is, in the context of Wikipedian politics, a political opinion.
Concerning the finding of disruption, and proposed sanctions in connection with it
I did intentionally place a notice urging an Oppose vote on WP:UPP on the talk pages of 43 United Nations Wikipedians, and intended do 12 more (completing Wikipedians S through Z), and call it a day. Apart from knowing them to have been subject to MarkSweep's mass blanking and category depopulation efforts, I had no personal connection that I can recollect with those 43 contacted. I have made a clear statement on the matter.
I have been made the subject of a finding of disruption, and proposed sanctions in connection with it, both brought by User:dmcdevit. There is ample evidence that,
* I had no intent to violate policy
* there appeared to be no policy posted prohibiting this action
* if there was such a policy, I was unaware of it
* WP:UPP had every apperance of being a Wikipedia-wide poll in which all were encouraged to participate
* if governed by WP:STRAW (specifically WP:STRAW), the result is not a matter of numbers, nor a means to impose the tyranny of a majority (hence no disruption)
* if not so governed, then there is no policy prohibiting it
* WP:UPP made no mention of WP:STRAW, and I was unaware of even its existence, though having seen IRC communications, previous votes (over four years here on article talk pages), the apparent biases in the the WP:UPP announcements (especially WP:Userboxes), I had no reason to think there would be a problem with sending a partisan message to an affected group
* the statement, "Your userpage was briefly delisted by a rogue admin" is factually correct in its entirety, as was the charge of sabotage and damage: MarkSweep willfully and knowingly out-of-process damaged a list of Wikipedians by sabotaging templates so as to empty and delete them, i.e. he went rogue
* this is not technically disruption: the existence of a significant minority opposed to UPP is indisputable regardless of my actions, which was to be demonstrated by holding the poll in the first place
* my conversations with the first person who responded at the time, User:Mindspillage (apart from thank you notes of the message recipients), can confirm at least that I had no awareness that I was violating policy (it should also be apparent to the committee that I had no idea who she was). At no time did she appear to be doing other than questioning the propriety my actions, and no policy violation was cited. I was in no haste to continue (talking to a interested person became more important than leafleting) and entered into discussion when I was blocked by David Gerard
* I am on record as saying that, had I known of the existence of WP:STRAW#Voting etiquette, I would have posted the invitation to vote, inidicated that UPP would mandate the removal of the category, but not made a voting recommendation
* I have sought dialog on the matter at all relevant phases during and subsequent to the act, being very careful to consult with others (including User:dmcdevit, who brought the charges, and User:Mindspillage, who initially raised her concerns) lest I violate this unwritten policy a second time
* Were it my intention to wrongfully stack the vote, rather than pick a good neutral sample of affected Wikipedians, I could have chosen a far more polarised group than Category:United Nations Wikipedians, could have programatically left a randomized note on every last affected user over randomized intervals, and could have done so without the benefit of any username
First assertion
Place argument and diffs which support your assertion, for example, your first assertion might be "Jimmy Wales engages in edit warring". Here you would list specific edits to specific articles which show Jimmy Wales engaging in edit warring
Second assertion
Place argument and diffs which support the second assertion, for example, your second assertion might be "Jimmy Wales makes personal attacks". Here you would list specific edits where Jimmy Wales made personal attacks.
|
WIKI
|
Author:Helen Grace Hibbard
Works
* Wild poppies (1893)
* Wild roses of California, a book of verse (1902)
* California violets; a book of verse (1903)
* Forget-me-nots from California; a book of verse (1907)
* California sunshine, and other verses (1911)
* 'Neath Monterey pines (19??)
|
WIKI
|
Talk:Argo Records (UK)
Founding
Modified the article to include the brief reference to the label's founding in Day's book. The article now suffers from a conflict of sources, since the first issue, as stated in the BBC programme, does not seem consistent with the company's quoted aim. Philip Cross 15:23, 23 February 2006 (UTC)
Fair use rationale for Image:RG74 Sleeve.jpg
Image:RG74 Sleeve.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 20:28, 26 November 2007 (UTC)
Classical issues before 1990, surely
The article, as it stands, leaves the impression that the Argo label only began issuing classical music after its acquisition by Decca in 1990.
I know this is not the case. First off, Argo seems to have been affiliated with Decca long before 1990. Second, from the time I began listening to classical music in the early 1970s, I remember classical-music recordings on the Argo label, many of which featured the Academy of St.-Martin-in-the-Fields with Neville Marriner. There were also choral items such as Haydn Masses (St. John's College Choir) and so forth.
Obviously, this would be "original research" under Wikipedia rules. Could someone check this out and correct this, with appropriate references? (It's possible that only the year is wrong: perhaps "1970" should have been typed instead of "1990"?} Much thanks to whoever undertakes this.<IP_ADDRESS> (talk) 12:43, 21 December 2017 (UTC)
* It's true classical issues are not mentioned as extensively as they might be. The article does though mention the masses of Joseph Haydn being recorded from 1960, the Noye's Fludde by Benjamin Britten from 1961, and the Festival of Lessons and Carols (which includes pieces by J.S. Bach and others) being recorded in 1954. The label revival is from 1990, (English) Decca acquired Argo as long ago as 1957. Philip Cross (talk) 13:05, 21 December 2017 (UTC)
Very confusing
The parent article on Decca Records makes no mention of their connection. I will make a note on that talk page as well. Viriditas (talk) 00:51, 29 March 2023 (UTC)
|
WIKI
|
Page:Confederate Military History - 1899 - Volume 1.djvu/723
Rh he was promoted to captain, and continued in the United States service, on duty in New Mexico, until the spring of 1861, when he resigned his commission in order to tender his sword to Virginia. With the rank of lieutenant-colonel, corps of cavalry, he commanded the camp of instruction at Ashland, and was promoted brigadier-general June 17th. In command of the second brigade of the army of the Potomac under Beauregard he held the extreme right of the Confederate line during the first battle of Manassas, and after advancing in the prearranged movement against Centerville, was recalled to reinforce the Confederate left, but was not permitted to pursue the defeated enemy. He was promoted major-general in October, 1861, and given command of a division consisting of the brigades of Elzey, Trimble and Taylor, which in the following spring became famous under his active and fearless leadership during Jackson's campaign in the valley of the Shenandoah. After Jackson had fallen back from Kernstown, Ewell was sent to his aid from before Richmond. With his division he defeated Banks at Winchester, May 25th, commanded on the field during the defeat of Fremont at Cross Keys, and during the final victory at Port Republic held Fremont in check and aided in the defeat of Tyler. As senior major-general in Jackson's command, he participated in the subsequent battles before Richmond, and was distinguished in the Manassas campaign of 1862, at the battle of Cedar Mountain, the capture of the Federal stores at Manassas Junction, and the engagement at Groveton, on the evening of August 28th, when he fell with a wound in the knee, which compelled the amputation of the leg. Thus seriously disabled, he returned to the army in May, 1863, and with promotion to the rank of lieutenant-general was assigned to the command of the Second corps of the army of Northern Virginia, succeeding Stonewall Jackson, who had fallen at Chancellorsville. He was
|
WIKI
|
The Daily Startup: Khosla, Box CEO Aaron Levie Back ThoughtSpot - Venture Capital Dispatch - WSJ
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://blogs.wsj.com/venturecapital/2014/06/18/the-daily-startup-khosla-box-ceo-aaron-levie-back-thoughtspot/ ThoughtSpot has raised $30 million for software that lets customers conduct Google-like search and analytics across corporate data, an area that's been underdeveloped compared to the consumer world, reports Deborah Gage for VentureWire. The Series B round was led by Khosla Ventures and includes Box CEO Aaron Levie and current investor Lightspeed Venture Partners. The Silicon Valley company is making it a priority to hire top engineering and sales talentit's offering a $20,000 referral bonus to anyone outside of ThoughtSpot who refers a candidate through LinkedIn that gets hired, CEO Ajeet Singh said. It could double its staff to about 50 people by the end of the year. ALSO IN TODAY'S VENTUREWIRE (subscription required): Horizons Ventures, the Hong Kong-based firm of billionaire investor Li Ka-shing, led a $10 million Series A investment in Modern Meadow, a startup that can grow meat and leather in the lab, Lora Kolodny reports for VentureWire. Galvanize, a startup that runs coding classes, provides workspaces and other services for entrepreneurs, and operates a seed venture fund, raised $18 million in a Series A round, Yuliya Chernova reports for VentureWire. Other Machine Co. has raised $3 million in Series A funding to popularize its 3D cutter, a tool similar to a 3D printer that subtracts material from a block or board to create an object based on a digital design or scanned drawing. Bessemer Venture Partners, a firm known for investing in software-as-a-service companies that aim at specific business verticals, is continuing its investing thesis by leading an $11 million Series B round for ClearCare, a company offering software to the home-care industry. Fitt has emerged from stealth with seed funding provided by Crosslink Capital, 500 Startups and angel investors for an app that lets users of various fitness trackers create challenges and invite their friends to participate. BucketFeet, a footwear and design startup that works with a large network of artists to sell art-adorned shoes, has raised an additional $3.7 million in venture capital. Bridge Investments and Jumpstart Ventures led the financing, with participation from Crate & Barrel founder Gordon Segal. (VentureWire is a daily newsletter with comprehensive analysis of all the investments, deals and personnel moves involving start-ups and their venture backers. For a two-week trial, click here.) ELSEWHERE AROUND THE WEB: One Kings Lane Laying Off Up to 20% of Staff. Just six months after landing a big round of investment that valued it at $900 million, online home decor retailer One Kings Lane is laying off between 75 and 100 people, Jason Del Rey reports for re/code. Investors include Mousse Partners, Kleiner Perkins Caufield & Byers, Institutional Venture Partners, Greylock Partners and Tiger Global Management. Acceleprise Heads to San Francisco for Vertical SaaS. The nation's first enterprise SaaS accelerator is expanding from its original Washington D.C. location to open a San Francisco arm, with an emphasis on investing in vertical software-as-a-service opportunities, Michael Carney reports for PandoDaily. Applications for Acceleprise's first San Francisco class opened Tuesday with the target of a mid-August start date. Andreessen Backs African American Shaving Products. Onetime Andreessen Horowitz entrepreneur-in-residence Tristan Walker has raised $6.9 million in early-round financing from Andreessen, Upfront Ventures, Collaborative Fund and others for a startup making shaving razors geared especially toward African American men, the WSJ's Katherine Rosman reports. The personal care market for people of color is a multibillion dollar market that is underserved, Andreessen Partner Jeff Jordan said. SolarCity Buys Silevo. SolarCity agreed to acquire Silevo, a maker of high-efficiency solar modules, a move that the U.S. solar-panel installer expects will enable a breakthrough in the cost of solar power, the WSJ's Russell Gold reports. Silevo's investors included DT Capital Partners, GSR Ventures and NewMargin Ventures. The company raised more than $33 million. TaskRabbit Shakes Up Its Business Model. Errands marketplace TaskRabbit is shaking things up with a change to its business model, TechCrunch's Sarah Perez reports. The move comes after a series of other changes for the company, which included a round of layoffs last summer and a decline in the number of bids per task. BitPagos Looks to Boost Bitcoin Use in South America. Startup BitPagos has raised a seed round of $600,000 from Pantera Capital, Tim Draper, Barry Silbert, Boost Bitcoin Fund and others, with the hope that hotels and hostels in Argentina will bypass the country's troubled currency and accept payments in bitcoins or dollars, the WSJ's Georgia Wells reports. Entrepreneurs and Family Life. The thought of taking on the hard challenge of building a company while raising a young family seems like an impossible task, but startups and family life aren't that different after all, BodeTree CEO Chris Myers writes for the WSJ's Accelerators blog. Write to Zoran Basich at zoran.basich@wsj.com. Follow him on Twitter at @zoranbasich Disney and Vice, a Storybook Romance Trump Courts Black Vote but Avoids African-American Communities Companies Rethink Annual Pay Raises Islamist Extremists in Britain Tap Smugglers to Reach Syria Want to Book an Airbnb Stay? Not So Fast Terror, Brexit and U.S. Election Have Made 2016 the Year of Yeats Attention, Jumbo-Mortgage Shoppers: Deals Ahead Low Earners See Paychecks Grow Curbing Media Use for Your Children in Other Parents' Homes Subscribe NowSign In WSJ Membership Customer Service Tools & Features Ads More Copyright 2014 Dow Jones & Company, Inc. All Rights Reserved This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at 1-800-843-0008 or visit www.djreprints.com.
|
NEWS-MULTISOURCE
|
Citations:Manichaean
* 2004, Marcel Erdal, A Grammar Of Old Turkic, BRILL (ISBN<PHONE_NUMBER>941), page 112:
* Note that all the sources quoted here are Manichaean; this need not be a phonetic characteristic of a Manichaean dialect, however, but could also be due to laxer (or perhaps more phonetic) spelling conventions.
|
WIKI
|
First Solar Shows the Power of Big Solar
Image source: First Solar.
While the world of residential solar struggles with changing utility rules and uncertainty in long-term contracts, the utility-scale solar business has never looked stronger. Utilities are eager to sign contracts for large solar projects at highly attractive prices, and unlike residential customers, they're extremely solid counterparties.
First Solar showed some of that momentum this week when it signed 500 MW worth of solar contracts with Southern California Edison (SCE), a subsidiary of Edison International .
Big demand for big solar
The deal between SCE and First Solar is for four solar projects totaling 500 MW of capacity to be completed by the end of 2019. Two of the projects with 250 MW of capacity will be in California, one 100 MW project will be in Nevada, and a 150 MW project will be in Arizona. When completed, they will bring the agreements between SCE and First Solar to 2.2 GW of capacity.
Contract details weren't announced, but the trend for power purchase agreements in the U.S. suggests the price for energy will be less than $0.05 per kWh. That's competitive with wholesale rates, and the energy from these solar plants is highly reliable.
The impact on First Solar
500 MW of capacity is about one-sixth of First Solar's expected production in 2016, so this agreement is a big deal. And this is the first major announcement from First Solar that will take advantage of the extended solar investment tax credit (ITC).
Utility-scale solar projects take longer to contract and build than rooftop projects, so the market had been at a standstill while Congress debated extending the ITC. Now that it's been extended, solar companies can plan projects years in advance, something I think we'll see more of throughout the year. 2019 is a significant date because it's the final year of the 30% ITC before it begins to step down, so expect to see start dates around then.
SCE will need to evolve as a utility
The sheer scale of solar in SCE's territory is impressive, especially when you consider that the 2.2 GW I mentioned above doesn't include the residential and commercial customers who have put up solar in the last five years. That may make SCE a testing ground for the future of energy by the time projects like this are done. The utility may need to install massive amounts of energy storage to adapt to all of this solar, and it may even incorporate demand response on a wider scale.
What's encouraging for utility investors is that the company seems willing to adapt to these new energy sources. It's adapt or die in today's energy business, so being forward-thinking is important.
A solar wave is coming
This is one of the bigger solar contracts announced recently, but don't be surprised if it's just the beginning. The ITC extension will make solar cheaper for developers, and regulators are pushing for utilities to buy more solar. It's a good time to be a solar investor, especially if you can ride out the ups and downs the market can throw at you.
The next billion-dollar iSecret
The world's biggest tech company forgot to show you something at its recent event, but a few Wall Street analysts and the Fool didn't miss a beat: There's a small company that's powering their brand-new gadgets and the coming revolution in technology. And we think its stock price has nearly unlimited room to run for early, in-the-know investors! To be one of them, just click here .
The article First Solar Shows the Power of Big Solar originally appeared on Fool.com.
Travis Hoium owns shares of First Solar. The Motley Fool has no position in any of the stocks mentioned. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
Copyright © 1995 - 2016 The Motley Fool, LLC. All rights reserved. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
File talk:Kingdom of Kabul - Tigers Head.jpg
This image is upside down - you can tell because the letters in the writing are upside down
|
WIKI
|
Tutorial details
Android beginner tutorial: Part 69 - Queries and Cursors | App Code for Sale | Preview
Android beginner tutorial: Part 69 - Queries and Cursors | Android Tutorial
How to add our Content Provider to the Manifest xml and learn a bit about queries and cursors
Overview PAGE TOP
In this tutorial we will add our Content Provider to the Manifest xml and learn a bit about queries and cursors.
To make a Content Provider visible and usable by the system and your own application, we need to add it to the AndroidManifest.xml file of our project.
Add a new node provider to the application node, set values for two of its attributes - android:name and android:authorities. The name attribute points to the custom ContentProvider class, and the authorities value is the URI address of the provider:
<provider
android:name="com.kircode.codeforfood_test.myContentProvider"
android:authorities="com.kircode.codeforfood_test.contactprovider">
</provider>
To send SQL queries to the content provider from your application, use the ContentResolver object that is obtainable using getContentResolver() method.
For example, this way we can send a query that selects all names and phones of the people in our database.
String[] columns = new String[] {myDbHelper.NAME, myDbHelper.PHONE};
ContentResolver resolver = getContentResolver();
Cursor cursor = resolver.query(CONTENT_URI, columns, null, null, null);
The query() method, for instance, has 5 parameters. Those are the URI address of the provider, the projection (list of columns to return, if null - everything is returned), selection (what would normally be written after "WHERE" in an SQL command), selectionArgs (extra functionality for selection parameter) and sortOrder (what would normally be written after "ORDER BY").
The Cursor object that's returned to us is a helpful tool for navigating through the results of the query. It has a set of useful methods like moveToFirst(), moveToLast(), moveToNext(), moveToPrevious(), moveToPosition(), getToPosition() and more.
Since the Cursor lines up all the results in some sort of a row and moves back and forth displaying one at a time, there are a few methods that let us know where exactly the cursor is currently located. These methods are isFirst(), isLast(), isBeforeFirst() and isAfterLast().
The insert(), update() and delete() methods are also all called from the ContentResolver object, but they don't result any Cusors. They are even simpler commands that basically insert, update and delete rows in a table.
That's all for today.
Thanks for reading!
Reference PAGE TOP
http://kirill-poletaev.blogspot.it/2013/02/android-beginner-tutorial-part-69.html
0 Comments Leave a comment
Please login in order to leave a comment.
Newest first
!
Sign-in to your Chupamobile Account.
The Easiest way to Launch your next App or Game.
Join Chupamobile and get instant access to thousands of ready made App and Game Templates.
Creating an account means you’re okay with Chupamobile’s Terms of Service and Privacy Policy.
|
ESSENTIALAI-STEM
|
List of music sequencers
Music sequencers are hardware devices or application software that can record, edit, or play back music, by handling note and performance information.
Hardware sequencers
Many synthesizers, and by definition all music workstations, groove machines and drum machines, contain their own sequencers.
The following are specifically designed to function primarily as the music sequencers:
Rotating object with pins or holes
* Barrel or cylinder with pins (since 9th or 14th century) — utilized on barrel organs, carillons, music boxes
* Metal disc with punched holes (late 18th century) — utilized on several music boxes such as Polyphon, Regina, Symphonion, Ariston, Graphonola (early version), etc.
Punched paper
* Book music (since 1890) for pneumatics system — utilized on several mechanical organs
* Music roll for pneumatics system — utilized on player pianos (using piano rolls), Orchestrions, several mechanical organs, etc.
* Punch tape system for earliest studio synthesizers
* RCA Mark II Sound Synthesizer by Herbert Belar and Harry Olson at RCA, a room-filling device built in 1957 for half a million dollars. Included a 4-polyphony synth with 12 oscillators, a sequencer fed with wide paper tape, with output recorded by a disc cutting lathe.
* Siemens Synthesizer (1959) at Siemens-Studio für elektronische Musik
Sound-on-film
* Variophone (1930) by Evgeny Sholpo—on earliest version, hand drawn waves on film or disc were used to synthesize sound, and later versions were promised to experiment on musical intonations and temporal characteristics of live music performance, however not finished. Variophone is often referred as a forerunner of drawn sound system including ANS synthesizer and Oramics.
* Composer-Tron (1953) by Osmond Kendal—rhythmical sequences were controlled via marking cue on film, while timbre of note or envelope-shape of sound were defined via hand drawn shapes on a surface of a CRT input device, drawn with a grease pencil.
* ANS synthesizer (1938-1958) by Evgeny Murzin—an earliest realtime additive synthesizer using 720 microtonal sine waves (1/6 semitones × 10 octaves) generated by five glass discs. Composers could control the time evolution of amplitudes of each microtone via scratches on a glass plate user interface covered with black mastic.
* Oramics (1957) by Daphne Oram—hand drawn contours on a set of ten sprocketed synchronized strips of 35 film were used to control various parameters of monophonic sound generator (frequency, timbre, amplitude and duration). Polyphonic sounds were obtained using multitrack recording technique.
Electro-mechanical sequencers
* Wall of Sound (mid-1940s–1950s) by Raymond Scott—early electro-mechanical sequencer developed by Raymond Scott to produce rhythmic patterns, consistent with stepping relays, solenoids, and tone generators
* Circle Machine (1959) by Raymond Scott—electro-optical rotary sequencer developed by Raymond Scott to generate arbitrary waveforms, consistent with dimmer bulbs arranged in a ring, and a rotating arm with photocell scanning over the ring
* Wurlitzer Sideman (1959)—first commercial drum machine; rhythm patterns were electro-mechanically generated by rotating disk switches, and drum sounds were electronically generated by vacuum-tube circuits
Analog sequencers with CV/Gate interface
* Buchla 100's sequencer modules (1964/1966–)
* One of the earliest analog sequencers of the modular synthesizer era since 1960. Later, Robert Moog admired Buchla's unique works including it
* Moog 960 Sequential Controller / 961 Interface / 962 Sequential Switch (c.1968)
* A popular analog sequencer module for the Moog modular synthesizer system, following the earliest Buchla sequencer
* Aries AR334 (module)
* ARP 1601 and 1027 (module)
* Buchla 245, 246
* Doepfer Dark Time
* Electro Harmonix Sequencer
* EML 400
* ETI 603 (DIY project)
* genoQs Octopus-digital midi
* genoQs Nemo-digital midi
* Korg SQ-10
* MFB Urzwerg / MFB Urzwerg Pro—CV/Gate step sequencer with 8steps/4tracks or 16steps/2tracks; also synchronizable with MIDI sequencer
* Oberheim Mini Sequencer MS1A
* PAiA 4780
* Polyfusion AS1, AS1R and 2040/2041/2042/2043 modules
* PPG 313, 314
* Roland 104, 182, 717A
* Sequential Circuits Model 600
* Serge Modular TKB, SQP, SEQ8
* Steiner Parker 151
* Synthesizers.com Q119
* Synthesizers.com Q960—reissue of Moog 960
* WMS 1020A
* Yamaha CS30 (1977)—monophonic synthesizer keyboard with built-in 8-step analog sequencer
Analog-style MIDI step sequencers
Since the analog synthesizer revivals in the 1990s, newly designed MIDI sequencers with a series of knobs or sliders similar to analog sequencer have appeared. These often equip CV/Gate and DIN sync interface along with MIDI, and even patch memory for multiple sequence patterns and possibly song sequences. These analog-digital hybrid machines are often called "Analogue-style MIDI step sequencer" or "MIDI analogue sequencer", etc.
* Doepfer MAQ 16/3—MIDI analog sequencer, designed in cooperation with Kraftwerk
* Doepfer Regelwerk—MIDI analog sequencer with MIDI controller
* Frostwave Fat Controller
* Infection Music Phaedra
* Infection Music Zeit
* Latronic Notron
* Manikin Schrittmacher
* Quasimidi Polymorph (1999)—Four-part multitimbral tabletop synthesizer, with an analogue-like step sequencer
* Roland EF-303—Multiple effects unit with 16-step modulation, also usable as the analog-style MIDI step sequencer
* Sequentix P3
Analog-style MIDI pattern sequencers
Several machines also provide "song mode" to play the sequence of memorised patterns in specified order, as per drum machines.
* Doepfer Schaltwerk—MIDI pattern sequencer
Step sequencers (supported on)
Typical step sequencers are integrated on drum machines, bass machines, groove machines, music production machines, and these software versions. Often, these also support the semi-realtime recording mode, too.
* MFB Step 64—Standalone step sequencer dedicated for drum patterns (16 steps/4 tracks or 64 steps/1 track, 118 programs×4 banks, 16 song sequences, each with up to 128 sequences)
Embedded self-contained step sequencers
Several tiny keyboards provide a step sequencer combined with an independent timing mode for recording and performance:
* Casio VL-Tone VL-1 (1979), Casiotone MT-70 (c.1984), Sampletone SK-1 (1986), etc.—Timings of musical notes stored on the step sequencer, can be designated by the two trigger buttons labeled "One Key Play", around the right hand position
Embedded CV/Gate step sequencers
Several machines have white and black chromatic keypads, to enter the musical phrases.
* Multivox / Firstman SQ-01 (1980)—a forerunner of TB-303
* Roland TB-303 (1981)
* Roland SH-101 (1982)—monophonic keytar synthesizer with sequencer
* Roland MC-202 (1983)—monophonic tabletop synthesizer with sequencer, similar to SH-101
Embedded MIDI step sequencers
Groovebox-type machines with white and black chromatic keypads, often support step recording mode along with realtime recording mode:
* Korg Electribe / Electribe 2 series
* Roland Corporation MC series: MC-09 / MC-303 / MC-307 / MC-505 / MC-808 / MC-909
* Yamaha RM1x
* Yamaha RS7000—Music Production Studio
Other groovebox-type machines (including several music production machines) also often support step recording mode, of course:
* Linn 9000 (1984)
* Sequential Circuits Studio 440 (1986)
* E-mu SP-12 (1986)
* E-mu SP-1200 (1987)
* Akai MPC series (1988–)
* Akai MPC Renaissance / Studio / Fly (2012)—Software with control surfaces
* Native Instruments Maschine (2009)—Software with control surface
* Roland MV-30
* Roland MV-8000—Production Studio
Button-grid-style step sequencers
Recently emerging button-grid-style interfaces/instruments are naturally support step sequence. On these machines, one axis on grid means musical scale or sample to play, and another axis means timing of notes.
* Akai APC40—interface for Ableton Live
* Arduinome—interface
* Bliptronics 5000—instrument
* Monome—interface
* Novation Launchpad—interface for Ableton Live
* Yamaha Tenori-on—instrument
* Synthstrom Deluge - Piano-roll-style sequencing on 128 pads (16×8)
In addition, newly designed hardware MIDI sequencers equipping a series of knobs/sliders similar to analog sequencers, are appeared. For details, see.
CV/Gate
Also often support Gate clock and DIN sync interfaces.
* EDP Spider (late 1970s)—supported LINK and CV/Gate
* EMS Sequencer series (1971)
* Max Mathews GROOVE system (1970)
* Multivox MX-8100 / Firstman SQ-10 (1979/1980)—supported V/Oct. and Hz/V
* Oberheim DS-2 (1974)
* Roland CSQ-100
* Roland CSQ-600 (1980)—it memories 600 notes for individual 4 tracks, a buddy of TR-808
* Roland MC-4 Microcomposer (1981)
* Roland MC-8 Microcomposer (1977)—also supporting DCB via OP-8
* Sequential Circuits Model 800 (1977)
Proprietary digital interfaces (pre MIDI era)
* NED Synclavier series—CV/Gate interface and MIDI retrofit kit were available on Synclavier II. Also MIDI became standard feature on Synclavier PSMT
* Fairlight CMI series—CV/Gate interface was optionally available on Series II, and MIDI was supported on Series IIx and later models
* Oberheim DSX (Oberheim Parallel Bus)
* PPG Wave family (PPG Bus)
* Rhodes Chroma (Chroma Computer Interface)
* Roland JSQ-60 (Roland Digital Control Bus (DCB))
* Sequential Circuits PolySequencer 1005 (SCI Serial Bus)
* Yamaha CS70M (Key Code Interface)
Standalone MIDI sequencers
* Akai ASQ10
* Alesis MMT-8—a buddy of HR-16 drum machine
* Korg SQD-1
* Korg SQD-8
* Kawai Q-80
* Roland MC-327
* Roland MC series: MC-50/MC-50MkII/MC-80/MC-300/MC-500 Microcomposer
* Roland MSQ-100 (1985)
* Roland MSQ-700 (1984)—one of the earliest multitrack MIDI sequencer (8tr), a buddy of TR-909
* Roland SB-55—SMF recorder
* Yamaha QX series: QX1/QX3/QX5/QX7/QX21
MIDI phrase sequencers
* Zyklus MPS
Embedded MIDI sequencers
* Sequential Circuits Six-Track (1984), MultiTrak (1985), Split-8 / Pro-8 (1985)
MIDI sequencers with embedded sound module
* Yamaha TQ5—desktop version of EOS YS200 FM workstation
* Yamaha QY10—with embedded GM tone generator (1990)
* Yamaha QY20—with embedded GM tone generator (1992)
* Yamaha QY300—with embedded GM tone generator (1994)
* Yamaha QY20—with embedded GM tone generator (1995)
* Yamaha QY700—with embedded XG tone generator (1996)
* Yamaha QY70—with embedded XG tone generator (1997)
* Yamaha QY100—with embedded XG tone generator (2000)
Palmtop MIDI sequencers
* Korg SQ-8—palmtop sequencer
* Philips Micro Composer PMC100
* Roland PMA-5—palmtop sequencer with touch screen
* Yamaha Walkstation series: QY8/QY10/QY20/QY22/QY70/QY100—palmtop sequencer with embedded sound module
Accompaniment machines
* Boss DR-5 Dr.Rhythm Section
* Yamaha QR10 Musical Accompaniment Player
Open-source hardware
* MIDIbox Sequencer modules—Analog-style MIDI step sequencer/MIDI effect processor modules of MIDIbox project
* oTTo Sampler, Sequencer, Multi-engine synth and effects - in a box.
Scorewriters
* MuseScore—Linux, Windows, OS X
DAW with MIDI sequencers
* Ardour—Linux, OS X, FreeBSD, Windows
* LMMS—Linux, Windows
* MusE—Linux
* Qtractor—Linux
* Rosegarden—Linux
* Auxy: Beat Studio—iOS 7
Drum machines
* Hydrogen—Linux, OS X
Scorewriters
* Aegis Sonix—Amiga
Software MIDI sequencers
by Alfred Faust] at http://bnp.hansfaust.de/indexeng.html
* B-Step Sequencer from Monoplugs
* Fugue Machine from Alexandernaut
* Master Tracks Pro from Passport Music Software
* Bars & Pipes Professional from Blue Ribbon Software [improved
Loop-oriented DAWs with MIDI sequencers
* ACID Pro and Cinescore from Sony Creative Software
* Live from Ableton
* GarageBand from Apple
* REAPER from Cockos
* Tracktion from Mackie
Tracker-oriented DAWs with MIDI sequencers
* Renoise
DAWs with MIDI sequencers
* Ableton Live from Ableton
* Audition from Adobe (removed since Version 4 CS5.5)
* Bitwig Studio from Bitwig
* Cubase and Nuendo from Steinberg
* Digital Performer from MOTU
* REAPER from Cockos
* FL Studio from Image Line Software
* Logic Pro and Logic Express from Apple
* Mixcraft from Acoustica
* Mixbus from Harrison
* MuLab from MUTools
* MultitrackStudio from Bremmers Audio Design
* n-Track Studio from n-Track Software
* Pro Tools from Avid
* Samplitude, Sequoia, Music Maker and Music Studio from Magix
* Sonar, Music Creator and Home Studio from Cakewalk
* Studio One from PreSonus
* Podium from Zynewave (gratis)
* Z-Maestro from Z-Systems
Integrated software studio environments
* Reason and Record from Propellerhead
* Storm from Arturia
|
WIKI
|
Elasticsearch ram size
Hi Team,
I have installed Elasticsearch on windows 2016 server for the first time with hardware configuration of 16GB ram, 64 - bit OS, 8 core.
Now I want set the heap size of the elastic cluster.
What heap size should I have to assign for this and why?
Kindly help,
Tahseen
Elasticsearch now automatically sets the HEAP size for you. See Important Elasticsearch configuration | Elasticsearch Guide [7.15] | Elastic
Thank you for the quick response, but I have installed 7.7 version of Elasticsearch. And for the older version we need to set the heap size.
What elastic recommend for the windows 64-bit os with 16GM ram size.
Can you help me with this setting?
Regards,
Tahseen
I'd recommend to upgrade to 7.15.0.
For 7.7, you can look at Setting the heap size | Elasticsearch Guide [7.7] | Elastic but read carefully the last part of the page.
David,
what is setting to let Elasticsearch decide about jvm.
documentation didn't mention about that
It only said below. I am confuse. is this telling me not to touch jvm.options file and Elasticsearch will decide jvm heap by node role? am i correct on this assumption?
The documentation you took a screenshot from is for Elasticsearch 7.15, which I recommended to use earlier in this thread.
The link I shared for 7.7 (Setting the heap size | Elasticsearch Guide [7.7] | Elastic) says:
• Set Xmx and Xms to no more than 50% of your physical RAM. Elasticsearch requires memory for purposes other than the JVM heap and it is important to leave space for this. For instance, Elasticsearch uses off-heap buffers for efficient network communication, relies on the operating system’s filesystem cache for efficient access to files, and the JVM itself requires some memory too. It is normal to observe the Elasticsearch process using more memory than the limit configured with the Xmx setting.
• Set Xmx and Xms to no more than the threshold that the JVM uses for compressed object pointers (compressed oops); the exact threshold varies but is near 32 GB.
So use Half of the RAM available and no more than 30gb of HEAP.
yes I am using 7.15. just upgraded
so it is not automatic. you still have to edit jvm.options file and use 50% ? (default suggested by ELK)
So in 7.15, it's automatic.
Why do you say it's not?
David,
I might have not understanding what here automatic vs manual.
automatic for me is I don't have to change anything and Elasticsearch will choose jvm heap by taking 50% for actual memory
manual means I update jvm.options file, add jvm heap and start elasticearch.
Yes.
1 Like
Thank you for full explanation.
Thank you @dadoonet , for the advice I'll upgrade it to 7.15.
Regards,
Tahseen
|
ESSENTIALAI-STEM
|
Optimising/resizing/reducing images - am I missing something?
Hi, I've been using Smush Pro to optimise my images and it's made a big difference, however, the images still seem to be a problem on my site and are what is bringing down both my Google PageSpeed as well as my Performance Report on here. I've also been through the list of images that are listed in the Benchmarks section of the Performance Report and (I think) have made most of them as small as I can, but it is still showing a really low score for this. I am not sure what more I can do with them - they have been smushed, they aren't enormous images size wise (generally no bigger than 300x300px ish), I've saved them in a low-medium or low quality, but it's still saying I can reduce them further.
For example, one of the images listed says this:
Compressing and resizing http://www.essexmums.com/wp-content/uploads/sites/4/2017/01/Organix-Valentines-Day-Hearty-Breakfast.jpg could save 29.6KiB (88% reduction).
I've edited the file and it's the same size as it appears on the website, and has a quality of 5 when I save for web. Plus it's only 13kb in size so I don't know how I could possibly reduce it by 29.6kb! I feel like there must be something I'm missing here!
• Luís
Hi Louise ,
Hope you're doing well today!
I think you are taking the recommendations of our Hummingbird plugin, right? I tried to access to your website to check all the recommendations but I was unable. Could you please revoke and after regrant the support staff access again?
However, the recommendation "Compressing and resizing" is mostly related to the wrong use of the thumbnail size and the resize via HTML or CSS.
Checking the homepage of your site, this is what is happening:
So, you are using a thumbnail with 500x332px and resizing it to 234x155px. This is a bad pratice and you should use a thumbnail with the proper size (in this case with 234x155px) instead of resizing it.
Unfortunately, this is related to your theme, it's not registering the proper thumbnails sizes. It will require some changes in the settings and in the theme markup and you should contact the theme developer if not sure how to do this:
https://developer.wordpress.org/reference/functions/add_image_size/
I hope this information has been helpful. If I can help you in this or other questions, please let me know!
Cheers, Luís
• Luís
Hi Louise ,
Hope you're doing well today!
I give a look on the Performance report from Hummingbird and unfortunately the most recommendations are about the incorrect use of the thumbnails (as I mentioned in my previous reply).
You have also, two more recommendations in this section:
1 and 2) This is related to the full sized images. When you upload an image, WordPress crops and resizes every image, creating different versions of the image (thumbnails). By default, Smush Pro only compresses these thumbnails, not the original full-size images.
You should easily remove this suggestion, enabling the "Include my original full-size images " option in the Smush settings (network admin panel -> Settings--> WP Smush):
I hope this information has been helpful. If I can help you in this or other questions, please let me know!
Cheers, Luís
Thank NAME, for their help.
Let NAME know exactly why they deserved these points.
Gift a custom amount of points.
|
ESSENTIALAI-STEM
|
Page:A Thousand-Mile Walk To The Gulf.djvu/276
Rh wall between; the grand Sierra stood along the plain, colored in four horizontal bands:—the lowest, rose purple; the next higher, dark purple; the next, blue; and, above all, the white row of summits pointing to the heavens.
It may be asked, What have mountains fifty or a hundred miles away to do with Twenty Hill Hollow? To lovers of the wild, these mountains are not a hundred miles away. Their spiritual power and the goodness of the sky make them near, as a circle of friends. They rise as a portion of the hilled walls of the Hollow. You cannot feel yourself out of doors; plain, sky, and mountains ray beauty which you feel. You bathe in these spirit-beams, turning round and round, as if warming at a camp-fire. Presently you lose consciousness of your own separate existence: you blend with the landscape, and become part and parcel of nature.
|
WIKI
|
Miss Bluebeard
Miss Bluebeard is a 1925 American silent comedy film directed by Frank Tuttle and starring Bebe Daniels. It is based on a play, Little Miss Bluebeard, by Avery Hopwood.
Synopsis
Larry Charters is a composer who is visiting Paris, and is exhausted from so many women wanting to meet him and ask for his autograph. When he is about to leave and head back home, he asks his friend Bob to stem the tide of admiring ladies rushing his hotel door by pretending to be him. Larry takes off, and Bob does his best to pretend he is Larry. But Colette, an actress who inadvertently causes Bob to miss the boat train, finds that she gets more than she bargained for by befriending "Larry". While looking for a room for the night, the inebriated Mayor accidentally marries them as Mr. and Mrs. Charters. Undeterred, the couple meet up with the real Larry in London the next day. Larry has more girl-trouble with two women admirers nearly meeting in the hallway, one of whom is Lulu, who is nearly psychotically jealous of any other woman. Bertie Bird, who seems to do nothing more than sleep, is one of Larry's friends, and who asks for a key to his guest room so he can get a good night's sleep, after his napping all day. When Bob and Colette arrive, it is apparent that Larry and she fall in love instantly, but are too embarrassed to admit it, especially as she is married to Bob, although under Larry's name. Things get even more complex when Colette goes to bed in the guest bedroom, and is joined under the covers by Bertie. Suddenly Colette is branded as the Female Bluebeard, since she is "married" three times, albeit by three very tenuous means.
Cast
* Bebe Daniels as Colette Girard
* Robert Frazer as Larry Charters
* Kenneth MacKenna as Bob Hawley
* Raymond Griffith as The Honorable Bertie Bird
* Martha O'Dwyer as Lulu (credited as Martha Madison)
* Diana Kane as Gloria Harding
* Lawrence D'Orsay as Colonel Harding
* Florence Billings as Eva
* Ivan F. Simpson as Bounds (credited as Ivan Simpson)
Preservation
Prints of Miss Bluebeard are held in the BFI National Archive, UCLA Film and Television Archive, George Eastman Museum Motion Picture Collection, and Berkeley Art Museum and Pacific Film Archive.
|
WIKI
|
1979 Bandy World Championship
The 1979 Bandy World Championship was contested among four men's bandy playing nations. The championship was played in Sweden from 27 January-4 February 1979. Soviet Union, who remained unbeaten through the tournament, became champions.
Premier tour
* 27 January
* Norway – Finland 2–8
* Soviet Union – Sweden 4–3
* 28 January
* Norway – Sweden 1–7
* Soviet Union – Finland 4–4
* 30 January
* Finland – Sweden 1–8
* Soviet Union – Norway 6–4
* 1 February
* Norway – Sweden 0–4
* Soviet Union – Finland 6–3
* 2 February
* Finland – Sweden 1–7
* Soviet Union – Norway 7–2
* 4 February
* Norway – Finland 2–6
* Soviet Union – Sweden 4–2
|
WIKI
|
Australian shares fall as financials weigh; benchmark set for weekly drop
Financial stocks lead losses, fall 1.1%
Crown Resorts amongst top losers on the Australian benchmark index
NZ gains for second week in row
June 11 (Reuters) - Australian shares edged lower on Friday and were on track to post their first weekly loss in four, as weakness in heavyweight financials outweighed gains in gold and tech stocks.
The S&P/ASX 200 index .AXJO fell 0.3% to 7,280.6 by 0101 GMT. For the week so far, the benchmark index is down nearly 0.2%.
In other markets, Japan's Nikkei .N225 slipped 0.12% and S&P 500 E-minis futures EScv1 fell 0.03%.
Financial stocks .AXFJ, down 1.03%, weighed on the benchmark the most. The sub-index was down about 2.2% for the week. Challenger Ltd CGF.AX led losses, down 2.36%, followed by wealth manager AMP Ltd AMP.AX, which lost 2.07%.
The "Big Four" banks declined between 1% and 1.6%.
The energy index .AXEJ fell 0.62% despite oil prices hovering at two-year highs. The biggest percentage loser was fuel retailer Ampol Ltd ALD.AX, which shed 1.15%.
Bucking the sombre mood, tech stocks .AXIJ rose 2.04% led by Appen APX.AX, which was up 4.88%. Market darling Afterpay APT.AX jumped as much as 4.9% to mark its highest levels in a month.
Investors shrugged off cues from Wall Street which rose after U.S. inflation data appeared to support the Federal Reserve's assertion that the current wave of heightened inflation will be temporary. N/
Back in Australia, gold stocks .AXGD rallied 2.2%, leading gains on the benchmark as bullion prices nudged up after U.S. inflation data. Sector heavyweight Newcrest Mining NCM.AX climbed up to 1.6%.
Embattled casino operator Crown Resorts CWN.AX was among biggest losers on the benchmark, down as much as 3%, after the Victoria state extended a timeline and funding for an inquiry into its operations, increasing the time and level of regulatory scrutiny.
In New Zealand, the benchmark S&P/NZX 50 index .NZ50 rose 0.57% to 12,589.5. It was on track for its second straight weekly gain.
(Reporting by Savyata Mishra in Bengaluru; editing by Uttaresh.V)
((Savyata.mishra@thomsonreuters.com))
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
User:Hobbularmodule
I am a mathematically-minded graduate student in computer science with strong opinions and nothing to back them up. I'm best known for drawing a comic strip for one of the University of Wisconsin's daily student newspapers, The Badger Herald.
I also have a bizarre friend.
Wikipedia Interests
I regularly assist with the backlog in the Wikification drive, and participate in the Spanish translation projects.
Major contributions
I have made major contributions to the following pages:
* First Order Inductive Learner - from stub to actual article
* Line engraving - wikified
* Spanish Romance literature/Translation - translation
|
WIKI
|
User:Llsiemens/sandbox
use of photogrophy alwell as picture laws! Most pictures are legal but without proper athoratization pictures of famus/important people may be illigal to ubtaine. In order to make this legal the photograph must have been taken from a distance of 25 feet or more, pictures from the side and back are also accepted. faild to reserve the requierd distance and angle may courrupt the image making it against the law in some states. In canada,USA,Eurupe,and some other major countries it is against the law to photograph celebraties without a proper licenceing.
|
WIKI
|
This healthy vegetarian take on the Mexican stew pozole gets tons of flavor from poblano peppers, ancho chile powder and dried herbs and spices, while cannellini beans provide substance, protein and fiber. Chewy hominy--corn that has been treated with lime to remove the tough hull and germ--is integral to the stew. Look for it in cans in the Latin section of your supermarket. Serve the stew with shredded cabbage, radishes, fresh cilantro and sour cream.
Counseling and community: In-person group meetings typically meet at a community center or business on regular basis. Participants might engage in a group discussion, breakaway groups or one-on-one sessions with other members or program counselors. Some weight loss programs rely on internet-based forums and communities or mobile applications for meal planning, counseling, group interaction and support.
Similarly, just because snacks like blue chips don’t look like the greasy potato chips you know to avoid, don’t assume they’re a healthier option. “Yes, blue corn contains the antioxidant anthocyanin,” explains certified culinary nutritionist Trudy Stone. “However, much of the good stuff gets baked away during the process of creating the chips that very little nutritional value is left—leaving them not much healthier than your typical tortilla chip.”
Also some research shows that the human body is primed to consume most of its calories during daylight hours. But the lifestyle is problematic for many: Because family meals and dinners with friends often are scheduled for after sunset, "people who try to stop eating after 7pm can’t do it every day for the rest of their lives," says Dr. Seltzer, who supports an alternative strategy: Eating a hearty meal at your regular dinnertime.
You can get a lot of valuable vitamins and nutrients from fruit. However, when you just drink the fruit juice, you lose out on the fiber from the actual fruit that fills you up. As Rachel Harvest, a registered dietitian affiliated with Tournesol Wellness in New York, told Cosmopolitan, “Even 100 percent juice is just empty calories and another blood sugar spike.” If you’re serious about losing weight, here are 10 weight-loss products that are worth your money.
I’m in favor of any program that promotes whole foods over hyper-processed fare, and this is one thing the popular diet plans can agree on. Overly processed foods have been linked to weight gain, perhaps because many unhealthy packaged foods (think: potato chips, ice cream, frozen pizza, cookies and the like) lack the fiber found in many whole foods, including vegetables. Fiber helps fill us up, and research suggests that by simply adding more fiber to your menu, you can lose weight nearly as well as a more complicated approach. Consistently choosing whole foods is one way to do this.
Stroll around the block for 15 minutes and you’ll torch nearly three times as many calories as you would by sitting for the same amount of time, says a new study in the Journal of Physical Activity and Health. Plus, walking after a big holiday meal will help aid digestion. In the mood for a longer stroll? These three 40-minute walking workouts from celebrity trainer Harley Pasternak will help you burn even more calories.
The "all meat all the time" low-carb approach or strict veganism can be great options for people who thrive on clear diet rules (and those two are actually the most popular diets out there) but these extremes are not for everyone. If you prefer more of a moderate approach, the Flexitarian diet is the clear winner. The "flexible vegetarian" mindset allows you a healthy balance of plant-based foods, responsibly sourced meats, and quality fats. The best part? It's not super restrictive, so you have plenty of nutritious food options. (Start here: How to Adopt a Flexitarian Diet)
Many diet plans rely on meal-replacement shakes, bars or other snack type foods, while others rely on frozen entrees as a major part of your diet, like Medifast and Nutrisystem. Ask yourself if you want the bulk of your diet relying on prepackaged snacks, shakes or frozen meals, or if you prefer the flexibility of cooking your own meals or eating out frequently.
“There are many diet plans on the market today that promote good health,” says Emily Kyle, RDN, who is in private practice in Rochester, New York. “The key is finding one that does not cause you stress or agony.” Ask yourself questions such as: Would the diet guidelines make you happy? Anxious? Stressed? Are you able to follow them long term? “Factors such as enjoyment, flexibility, and longevity should be strongly considered,” adds Kyle.
Thank you Abel. I am finishing reading your book at this moment. I am encouraged because it sounds very doable. My family is in an overweight crisis and we need change drastically. My husband and daughter are both 200+ pounds over weight. Neither one of them are able to exercise so I am hoping that they will stick with this and lose weight without exercise for a while. Food cravings and hunger are big for them so educating ourselves on managing them is critical. I need to lose 20 pounds. We are working on this and have enjoyed your recipes greatly. We are all learning portion control as well.
The final possible culprit behind stubborn weight issues may be the stress hormone, cortisol. Too much cortisol will increase hunger levels, bringing along subsequent weight gain. The most common cause of elevated cortisol is chronic stress and lack of sleep (see tip #10), or cortisone medication (tip #9). It’s a good idea to try your best to do something about this.
Hello Adrian, I'm turning 38 next month I'm 157 pounds 5'4 i have 7 biological children with high heart rate problems I see a cardiologist on the 21rst of September. My Dr has me taking a 325mg aspirin daily. I want to get down to a healthy weight. I exercise to Richard Simmons sweating to the oldies every day in the morning. What do you feel is a healthy weight for me? Thank you, Darla Kukich.
There’s a phenomenon I’ve see happen again and again. A husband and wife realize they’ve been enjoying their after-dinner snacks a bit too much and are seeing the numbers on the scale rise. They decide to embark on a healthy diet to shed those excess pounds and, ideally, lose weight fast. Two months later, the husband’s shed serious pounds and is looking trim, while the wife struggles to get the scale to budge, even after a diet full of kale salads and grilled chicken breast.
Our gut microbiome controls far more than we give it credit for, which is why having your gut colonized with beneficial types of bacteria is so important. One way to do this is by taking a probiotic supplement. You can also make these 12 foods that boost good gut bacteria part of your everyday diet. Not only will this help you get sick less, feel happier, and ease digestion but it can also help you de-bloat, flattening out your tummy in the process. Try these home remedies to lose belly fat.
×
|
ESSENTIALAI-STEM
|
blob: 428f4493b069ef8c0aa1b3470f3068176bcf84ec [file] [log] [blame]
; RUN: llc < %s -mtriple=x86_64-apple-darwin -code-model=large -relocation-model=static | grep call | not grep rax
@.str = internal constant [26 x i8] c"%d, %f, %d, %lld, %d, %f\0A\00" ; <[26 x i8]*> [#uses=1]
declare i32 @printf(i8*, ...) nounwind
define i32 @main() nounwind {
entry:
%tmp10.i = tail call i32 (i8*, ...)* @printf( i8* getelementptr ([26 x i8]* @.str, i32 0, i64 0), i32 12, double 0x3FF3EB8520000000, i32 120, i64 123456677890, i32 -10, double 4.500000e+15 ) nounwind ; <i32> [#uses=0]
ret i32 0
}
|
ESSENTIALAI-STEM
|
Click or drag to resize
OrderedCompositePrimitiveAdd Method
Adds a primitive to the front of the composite. Primitives at the front are rendered on top of primitives at the bottom.
Namespace: AGI.Foundation.Graphics
Assembly: AGI.Foundation.Graphics (in AGI.Foundation.Graphics.dll) Version: 21.2.409.0 (21.2.409.0)
Syntax
public void Add(
Primitive primitive
)
Parameters
primitive
Type: AGI.Foundation.GraphicsPrimitive
The primitive to add to the composite.
Exceptions
ExceptionCondition
ArgumentNullExceptionprimitive is null.
ArgumentExceptionprimitive doesn't have the same ReferenceFrame as the composite.
ArgumentExceptionprimitive already was already added to a composite or the primitive manager.
Remarks
Primitives are rendered in the order they are added, so the first primitive added to the composite is rendered on the bottom and the last primitive added is rendered on top. The order can be changed with calls such as BringToFront(Primitive) and SendToBack(Primitive).
The ordered composite primitive is intended to contain primitives rendered on the globe's surface. It is only recommonded to add the following primitives:
In particular, it is not intended for use with: ModelPrimitive, SolidPrimitive, or CompositePrimitive.
Regardless of order in the composite, all SurfaceMeshPrimitives are rendered before other primitives in the composite.
See Also
|
ESSENTIALAI-STEM
|
ES Browser Version - (2.3) - Nested Query Issues
Hello,
Can anyone point me in the right direction please?
I am using the following query:
"query": {
bool: {
must: [
{
"nested": {
"path": "mlcs",
"query": {
"bool": {
"must": [
{
"match": {
"mlcs.deviceType": "\"Cheese Meat\""
}
}
]
}
}
}
}
]
}
}
My deviceType field is Analyzed but when i run the following query i get documents that contain both cheese and or meat in the deviceType nested field. I was expecting to just get deviceTypes that match the literal Cheese Meat together.
I have the same query on another index that is not nested and it only brings back docs that match Cheese Meat rather than either OR..
Thanks
I fixed this issue by changing my nested query to this:
"nested": {
"path": "mlcs",
"query": {
"match": {
"mlcs.deviceType": {
"query": "\"Cheese Meat\"",
"operator": "and"
}
}
}
}
|
ESSENTIALAI-STEM
|
Page:Notes and Queries - Series 11 - Volume 3.djvu/384
378
NOTES AND QUERIES. m s. in. MAY 13, 1911.
Rich, Earl of Warwick, whose other daughter and coheir was called " Essex," and took that name into the Finch family.
Sir John Harrington's granddaughter Anne Barrington married Charles Shale, goldsmith to Queen Anne, and their youngest daughter and coheir, who was called " Essex," mar- ried Richard Lowndes of Winsloe, High Sheriff of Bucks in 1742.
CONSTANCE RUSSELL.
Swallowfield Park, Reading.
The name Essex was in the seventeenth century given to more than one female member of the Cornish family of Robartes. Lady Essex Robartes died in 1689, aged 20. Another Essex Robartes of the same family was buried at Chelsea on 16 January, 1693/4.
The choice of the name in this instance was probably due to the friendship of Lord Robartes, afterwards Earl of Radnor, with the Earl of Essex, the general of the Parlia- mentary forces. W. P. COURTNEY.
HANOVERIAN REGIMENT (11 S. iii. 327). At the commencement of the war in 1779 between Great Britain and Spain there were in Gibraltar three Hanoverian Regiments, which served there to the end of the great siege in 1783. They were Hardenberg's, under Lieut. -Col. Hugo ; Reden's, under Lieut. -Col. Dachenhausen ; and De la Motte's, under Lieut.-Col. Schippergill. No doubt the regiment mentioned in the query is a lineal descendant of these. See 'A History of the Siege of Gibraltar,' by John Drinkwater. G. S. PARRY.
There were mercenary troops, both Ger- man and Swiss, employed by" the Britbh in the Crimean War. Part of the Swiss Legion was encamped at Dover in 1855. I do not know if they went to the Crimea. The depot of the German Legion landed at Dover on 19 May 1856. As peace had then been declared, it is probable that the Ger- man force had been to the seat of war and were then returning. There are still in Dover two or three German families, the fathers of which were in the German Legion. JOHN BAVINGTON JONES.
Dover.
CATHERINE HYDE (11 S. iii. 268). Catherine Hyde was the Marchioness Broglio Solari. She seems to have resided for many years in Venice, and to have died about 1845. In addition to the * Secret Memoirs of the Royal Family of France,' she wrote " Venice under the Yoke of France, and of Austria. By a Lady of Rank," London,
1824, 2 vols. ; and " Private Anecdotes of Foreign Courts, by the author of ' Memoirs of the Princess de Lamballe,' " London, 1827, 2 vols. After her death appeared ' Letters of the Marchioness Broglio Solari .... con- taining a Sketch of her Life, and Recollec- tions of Celebrated Characters : with Notes/ London, 1845. S. S. W.
GALLOWS BANK : MATTHEW COCKLING (11 S. iii. 187, 316). Another version of this- story, which has been located at Pendleton, Manchester, will be found in a capital ballad by William Harrison Aihsworth. It i* entitled, ' Old Grindrod's Ghost,' &nd i* included in the volume of ' Ballads.'
WILLIAM E. A. AXON. Manchester.
BISHOP EDWARD KING (11 S. iii. 307). According to 'Alumni Oxonienses (1715- 1886),' Edward King, second son of Walker King, Archdeacon of Rochester, was born in Westminster. T. SHEPHERD.
on
London : the City. By Sir Walter Besant. A. & C, Black.)
THIS is a glorified guide-book of the City of London, and contains particulars, arranged in sections, of almost every building in the City, and includes not only the old historical buildings of interest, but also the modern banks and institutions.
We do not fancy that much of the letterpress- is by the late Sir Walter Besant, whose name- the book bears, but it is a useful volume at the- present time, as it will enable our Coronation visitors to carry away a valuable souvenir of reminiscences, so far as the City of London is concerned. It contains a full note as to the City Companies and the City churches, and also special articles on the Tower and St. Paul's. It is a bulky volume for the ordinary tourist to carry about with him in investigating the City, but it will be valuable as a work of reference, and possibly a work of remembrance, to those who are keenly interested in the City of London or wish to acquire a knowledge of its- history.
It is somewhat odd that no reference is made- in the volume to the Mint or to the GuildhalL We were under the impression that the latter wa& the centre of the City of London's history.
An up-to-date map of the City accompanies the volume, which is beautifully illustrated and produced in a style worthy of its publishers.
The Burlington Magazine devotes its editorials- to ' The King Edward VII. Memorial ' and ' The Passing of Rembrandt's Mill.' The comments made are, as usual, well worth reading, combining independence of view and outspokenness with a genuine regard for art as a vital force. It is suggested once again that the high ground of Hyde-
|
WIKI
|
Page:Ante-Nicene Christian Library Vol 9.djvu/190
168 Simeon in the temple: through Zebulon He was believed in among the Gentiles, as says the prophet, "the land of Zabulon;" and through Benjamin [that is, Paul] He was glorified, by being preached throughout all the world.
And this was not without meaning; but that by means of the number of the ten men, he (Gideon) might appear as having Jesus for a helper, as [is indicated] by the compact entered into with them. And when he did not choose to partake with them in their idol-worship, they threw the blame upon him: for "Jerubbaal" signifies the judgment-seat of Baal.
"Take unto thee Joshua the son of Nun." For it was proper that Moses should lead the people out of Egypt, but that Jesus (Joshua) should lead them into the inheritance. Also that Moses, as was the case with the law, should cease to be, but that Joshua, as the word, and no untrue type of the Word made flesh , should be a preacher to the people. Then again, [it was fit] that Moses should give manna as food to the fathers, but Joshua wheat; as the first-fruits of life, a type of the body of Christ, as also the Scripture declares that the manna of the Lord ceased when the people had eaten wheat from the land.
|
WIKI
|
### Eclipse Workspace Patch 1.0 #P wordpress-trunk Index: wp-includes/formatting.php =================================================================== --- wp-includes/formatting.php (revision 17521) +++ wp-includes/formatting.php (working copy) @@ -654,23 +654,46 @@ $string = strtr($string, $chars); } else { // Assume ISO-8859-1 if not UTF-8 - $chars['in'] = chr(128).chr(131).chr(138).chr(142).chr(154).chr(158) - .chr(159).chr(162).chr(165).chr(181).chr(192).chr(193).chr(194) - .chr(195).chr(196).chr(197).chr(199).chr(200).chr(201).chr(202) - .chr(203).chr(204).chr(205).chr(206).chr(207).chr(209).chr(210) - .chr(211).chr(212).chr(213).chr(214).chr(216).chr(217).chr(218) - .chr(219).chr(220).chr(221).chr(224).chr(225).chr(226).chr(227) - .chr(228).chr(229).chr(231).chr(232).chr(233).chr(234).chr(235) - .chr(236).chr(237).chr(238).chr(239).chr(241).chr(242).chr(243) - .chr(244).chr(245).chr(246).chr(248).chr(249).chr(250).chr(251) - .chr(252).chr(253).chr(255); + $chars = array( + chr(128) => 'E', chr(131) => 'f', + chr(138) => 'S', chr(140) => 'OE', + chr(142) => 'Z', chr(154) => 's', + chr(156) => 'oe', chr(158) => 'z', + chr(159) => 'Y', chr(162) => 'c', + chr(165) => 'Y', chr(181) => 'u', + chr(192) => 'A', chr(193) => 'A', + chr(194) => 'A', chr(195) => 'A', + chr(196) => 'A', chr(197) => 'A', + chr(198) => 'AE', chr(199) => 'C', + chr(200) => 'E', chr(201) => 'E', + chr(202) => 'E', chr(203) => 'E', + chr(204) => 'I', chr(205) => 'I', + chr(206) => 'I', chr(207) => 'I', + chr(209) => 'N', chr(208) => 'DH', + chr(210) => 'O', chr(211) => 'O', + chr(212) => 'O', chr(213) => 'O', + chr(214) => 'O', chr(216) => 'O', + chr(217) => 'U', chr(218) => 'U', + chr(219) => 'U', chr(220) => 'U', + chr(221) => 'Y', chr(222) => 'TH', + chr(223) => 'ss', chr(224) => 'a', + chr(225) => 'a', chr(226) => 'a', + chr(227) => 'a', chr(228) => 'a', + chr(229) => 'a', chr(230) => 'ae', + chr(231) => 'c', chr(232) => 'e', + chr(233) => 'e', chr(234) => 'e', + chr(235) => 'e', chr(236) => 'i', + chr(237) => 'i', chr(238) => 'i', + chr(239) => 'i', chr(240) => 'dh', + chr(241) => 'n', chr(242) => 'o', + chr(243) => 'o', chr(244) => 'o', + chr(245) => 'o', chr(246) => 'o', + chr(248) => 'o', chr(249) => 'u', + chr(250) => 'u', chr(251) => 'u', + chr(252) => 'u', chr(253) => 'y', + chr(254) => 'th', chr(255) => 'y'); - $chars['out'] = "EfSZszYcYuAAAAAACEEEEIIIINOOOOOOUUUUYaaaaaaceeeeiiiinoooooouuuuyy"; - - $string = strtr($string, $chars['in'], $chars['out']); - $double_chars['in'] = array(chr(140), chr(156), chr(198), chr(208), chr(222), chr(223), chr(230), chr(240), chr(254)); - $double_chars['out'] = array('OE', 'oe', 'AE', 'DH', 'TH', 'ss', 'ae', 'dh', 'th'); - $string = str_replace($double_chars['in'], $double_chars['out'], $string); + $string = strtr($string, $chars); } return $string;
|
ESSENTIALAI-STEM
|
Please use this identifier to cite or link to this item: http://hdl.handle.net/2445/164291
Title: 'Anomalous' magnetic fabrics of dikes in the stable single domain/superparamagnetic threshold
Author: Soriano, C.
Beamud Amorós, Elisabet
Garcés Crespo, Miguel
Ort, M.
Keywords: Magnetisme
Vulcanisme
Magnetism
Volcanism
Issue Date: 2016
Publisher: Royal Astronomical Society
Abstract: 'Anomalous' magnetic fabrics in dikes that appear to indicate flowinto thewall confound many workers. Here, we present extensivemagnetic data on five dikes from Tenerife, Canary Islands, and use these to interpret the causes of the anomalous fabrics. Comparison of the anisotropy of magnetic susceptibility (AMS) and anhysteretic magnetization (AARM) results show that, in some cases, the anomalous fabrics are caused by single-domain grains, which produce AMS fabrics perpendicular to the grain elongation, whereas AARM fabrics are parallel. To check this, hysteresis experiments were used to characterize the domain state. These show most are mixtures of pseudo-single-domain or single-domain plus multi-domain particles, but many have wasp-waisted hysteresis loops, likely indicating mixed populations of stable single domain and superparamagnetic grains. First-order reversal curves were used to better characterize this and show mixtures of stable single-domain and superparamagnetic grains dominate the magnetic signal. Magnetic particles at the stable single-domain/superparamagnetic threshold are unstable at timespans relevant to the analytical techniques, so they produce complicated results. This suggests that anomalous AMS fabrics in dikes cannot simply be attributed to elongated stable single-domain particles and that mixtures of the different grain types can produce hybrid fabrics, in which the fabrics are neither perpendicular or parallel to the dike plane, that are difficult to interpret without extensive magnetic analysis.
Note: Reproducció del document publicat a: https://doi.org/10.1093/gji/ggv495
It is part of: Geophysical Journal International, 2016, vol. 204, num. 2, p. 1040-1059
URI: http://hdl.handle.net/2445/164291
Related resource: https://doi.org/10.1093/gji/ggv495
ISSN: 0956-540X
Appears in Collections:Articles publicats en revistes (Dinàmica de la Terra i l'Oceà)
Files in This Item:
File Description SizeFormat
656408.pdf7.25 MBAdobe PDFView/Open
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
|
ESSENTIALAI-STEM
|
Computers & Society/People
It is the people who make up the society. Here is a very small list of around 26 people who might be said to have contributed enormously to our modern world of Computers & Society.
By modern world we mean at least post 1990 up to the present 2008 and onwards. There is no doubt that people such as von Neumann, Turing, and so on were contributors to the discipline of Computer Science and thus directly and/or indirectly shapers of our modern Society. But they are not to be included. We want to list those who are still alive and contributing.
Each one listed here must have been significantly cited in this Wikibook and be still alive to qualify for inclusion.
= Bjarne Stroustrup (computer scientist) (1950- )=
* See his profile at (http://www.research.att.com/~bs/bio.html)
* Creator of the C++ programming language in 1979.
= Tim Berners-Lee (computer scientist) (1955- )=
* See his profile at W3C.
* Nice to know he blogs.
* Listed here for his seminal book „Weaving the Web : the original design and ultimate destiny of the World Wide Web by its inventor“, with Mark Fischetti. HarperCollins Publishers, New York, 2000. ISBN 006251587X (pbk.)
=Robert Cailliau (computer scientist) (1947- )=
* He has a personal website
* There is a book on the beginnings of the WWW: „How the Web Was Born: The Story of the World Wide Web“, James Gillies, Robert Cailliau (Oxford Paperbacks, 2000) ISBN 0-19-286207-3.
=Manuel Castells (sociologist) (1942- )=
* See his profile at the University of California, Berkeley.
* See his scientic work hosted in Catalonia, Spain.
* Listed here for his seminal book „The Internet galaxy : reflections on the Internet, business, and society“, Oxford University Press, Oxford, 2001. ISBN<PHONE_NUMBER>, ISBN<PHONE_NUMBER> (pbk.).
=John Naughton (networker) (19xx-)=
* Listed here because he is „Professor of the Public Understanding of Technology“ at the Open University (UK)
* Basic biographical facts of his own account
=Nicholas Negroponte (architect) (computer scientist) (1943- )=
* Listed here for One LapTop per Child, ...
|
WIKI
|
0.05). Nasal obstruction, post nasal drip (PND), reduced sense of smell, quality of life, CT scan and rhinoscopy scores were not significantly different between the two groups after intervention (P > 0.05). Facial pain severity score was significantly more reduced in intervention group in comparison with control group (P < 0.01). Conclusions: We concluded that application of Amphotericin B as an adjunctive medication to other common treatments, does not seemto be an efficientmethod for improvement of CRS symptoms.]]> Abstract Objectives: In this control trial study we showed the neuroprotective effects of the erythropoietin (EPO) in traumatic brain injury in animalmodel. Methods: The researchwas carried out on 50maleWistar ratsweighing 200 to 250 g. Theywere divided into two groups of control andcase. The ratswere anesthetized, right frontal craniotomywasperformedandthenthebraindamagewas causedbyweight-drop model. In the case group, after 3 hours and again after 24 hours of craniotomy and creation of brain lesions in the right hemisphere, 500 u/kg erythropoietinwas injected into peritoneumbut in the control group, the rats did not receive any drug. Then the behavior, motor function and balance on the second day and the fourteenth day after injection of erythropoietin were evaluated. After that, the rats were killed and the brain tissues sent to the laboratory for pathological assessment of brain tissues. Results: The average of cross-sectional damage in the case group that received erythropoietin drug was reported 22.55% and in the control group 37.41%, and themotor balance function after fourteenth day in the group that received erythropoietinwas 69.12% and better in comparison with the control group (46.27%) that did not receive any drug. Conclusions: erythropoietin has a protective effect on neurons and improves the sub-acute changes in head after brain injury and increases themotor balance abilities in rats.]]>
|
ESSENTIALAI-STEM
|
Suicide bomber kills twelve in northwest Pakistan
PakistanAt least twelve civilians have died and over 25 wounded in a suicide bombing in the Hangu District of north-west Pakistan, Thursday night. A convoy of 140 vehicles running from Tall, in Hangu District to the town of Parachinar in Kurram Agency, FATA was targeted.
The victims, some of them women, were at a petrol station in Hangu. The wounded were taken to adjoining hospitals.
According to police, the attacker detonated a bomb near a fully loaded bus. The convoy carried several people, vehicles filled with provisions and commodities for trading. A majority of the people in the group were Shia Muslims.
No one has yet claimed responsibility for the attack. Several insurgents have attacked the country's North West Frontier Province in the last year. Earlier, three died in another suicide attack on a police station in Karak, located in the same area.
Many Shi'as dwell in the Parachinar and Orakzai area which has been home to violence in the past. The Tall-Parachinar road was closed to the public in 2008 and 2009 due to Taliban activity. The latter targeted Shia Muslims, sources say. The road was re-opened about two months ago, with convoys guarded by security forces forming the bulk of the traffic.
Hangu borders Pakistan's tribal regions, where several militant groups are believed to be operating. However, security forces say that arrangements have improved from the past.
|
NEWS-MULTISOURCE
|
Top VC deals: Niantic, Vrvana, Deliveroo, Divergent 3D, Oviva, Portea
Here's a round-up of the most important deals in venture capital from the past week. Apple acquired Vrvana, the makers of Totem, a "mixed reality headset," in a deal worth an estimated $30 million, TechCrunch first reported. Earlier this year, Apple launched its ARKit to let developers make augmented reality apps for iOS devices. Apple CEO Tim Cook said AR has "broad mainstream applicability across education, entertainment interactive gaming, enterprise, and categories we probably haven't even thought of." Prior to the acquisition, the Montreal start-up focused on workplace and industrial uses of VR and AR. Niantic Labs, makers of the popular Pokemon Go mobile game, raised about $200 million in a new round of venture funding, according to an SEC filing. Niantic has a hotly anticipated Harry Potter game in the works, as CNBC previously reported. Investors in the round included Spark Capital and Founders Fund. Megan Quinn of Spark joined Niantic's board. Deliveroo, a London-based food delivery start-up, raised another $98 million, bringing its total capital raised to $482 million. As The Belfast Telegraph reported, investors included T. Rowe Price and Fidelity. Some of the funding is earmarked to support "delivery only" kitchens. Li Ka-shing's Horizons Ventures was among investors in a $65 million round for Divergent 3D, a company building experimental factories and aiming to make cars as efficiently as possible. Additional investors included O Luxe Holdings, Shanghai Investment Limited and Altran Technologies. India's Portea raised $26 million for an app that lets users book a range of health-care services to be delivered at home, from lab tests to physical therapy. As TechCrunch's Catherine Shu has noted, in India the senior living industry has not yet taken off, so many families are using Portea to take care of aging family members. Oviva raised $12 million to fight diabetes and obesity with an app. Currently used in the U.K., Switzerland and Germany, Oviva gives patients a way to message nutritionists directly, and to keep records of their own food consumption, weight and activity levels. The app then delivers them personalized recommendations. Investors included Albion Capital, Eight Roads Ventures, F-Prime Capital (a health-focused investment arm of Fidelity), Partech Ventures and Walking Ventures. Nelumbo raised about $2 million for technology to make heating and cooling systems operate more efficiently. The Bay Area start-up's primary innovation is a coating that can make it hard for frost to form on HVAC systems. The company is part of Cyclotron Road, an incubator affiliated with the University of California at Berkeley and its various research labs. Seedcamp, a firm that invests in European start-ups, closed its fourth seed fund at around $49 million (€41 million). Investors in the fund included corporate venture arms such as Unilever Ventures and venture capital firms like Index Ventures and Atomico.
|
NEWS-MULTISOURCE
|
Zhang Rujing
Zhang Rujing, alternatively known as Richard Chang Ru-gin, is a Taiwanese businessman and entrepreneur known for founding the largest contract chip manufacturer in mainland China, the Semiconductor Manufacturing International Corporation (SMIC). In mainland China, Zhang is known as "the father of China's foundry industry" and China's "godfather of semiconductors".
Early life and education
Zhang Rujing was born in 1948 in the city of Nanjing, Jiangsu Province (then in the Republic of China) to a steelworker, Zhang Xilun, and his wife Liu Peijin. Less than a year old, Zhang and his family fled with the retreating Kuomintang aboard a boat to Kaohsiung on the southern coast of Taiwan in 1949, reportedly to his mother's great distress. Growing up in Kaohsiung, Zhang excelled in his studies and was admitted to study at Taiwan's number-one-ranked university, National Taiwan University (NTU) in the capital, Taipei. After graduating from NTU's Mechanical Engineering Department in 1970, Zhang moved to the United States where he earned his master's degree in engineering from University at Buffalo's School of Engineering and, as soon as his newly-wed American wife completed her masters, moved to Southern Methodist University in Texas to earn his doctorate in electrical engineering.
Career
In 1977, at 29 years old, Zhang began working at the semi-conductor giant Texas Instruments alongside experts in integrated circuits with his first boss having been Nobel Prize in Physics laureate Jack Kilby. Starting as a design engineer, during his twenty formative years at Texas Instruments, Zhang would develop under the mentorship of his boss, Dr. Shao Zifan, and help establish large-scale microchip factories including four in Texas, and others in Italy, Japan, Singapore, and Taiwan. Zhang would bring his then retired parents to the United States from Taiwan. Coincidentally, Zhang Zhongmou, to-be founder of today's largest dedicated pure-play semiconductor foundry, Taiwan Semiconductor Manufacturing Company (TSMC), also worked at Texas Instruments, though the two never crossed-paths. In 1996, leaders from a visiting delegation from the now-defunct Chinese Ministry of Electronics Industry approached Zhang in the United States and, noting China's twenty-year gap in semiconductor manufacture, encouraged Zhang to return to mainland China and help his birth nation establish their own chip fabrication industry. In 1997, after twenty years of work at Texas Instruments and with prodding from his father to return to their homeland, Zhang agreed. Zhang's decision to bring his expertise back to develop the industry in his birth country is likened to Qian Xuesen, who returned from the United States to establish the People's Republic of China's rocket program.
Establishment of SMIC
Returning first to mainland China at age 50, Zhang explored the potential for a Chinese semiconductor factory but deemed the timing inopportune for the country. Zhang then decided to travel back to Taiwan and founded Shida Semiconductor with the help of his contacts at Texas Instruments. As TSMC expanded in Taiwan, its head, Zhang Zhongmou, convinced TSMC shareholders in 2000 to acquire Shida Semiconductor for $5 billion USD. Zhang Zhongmou, reportedly appreciative of Zhang Rujing's talent and expertise, requested that Zhang Rujing continue to lead Shida Semiconductor, a deal Zhang Rujing accepted on the purported condition that a factory one day be built in mainland China. Learning that Zhang Zhongmou did not intend to establish a factory in mainland China, in 2000, Zhang Rujing resigned, gave up his shares of TSMC, and travelled to the PRC capital of Beijing. Finding neither the city's mayor or vice mayor for science and technology who weren't in the city at that time, Zhang met with Deputy Directory of the Shanghai Economic Commission Jiang Shangzhou who brought Zhang south to Shanghai and introduced him to Zhangjiang Hi-Tech Park. That year, on 3 April 2000, Zhang founded the Semiconductor Manufacturing International Corporation (SMIC). By May, Zhang had recruited hundreds of engineers to Shanghai and construction of the plant began in August 2000. Zhang also moved both his mother (then over 90 years of age) and his American wife to mainland China. Zhang also reportedly built a 1,500 unit housing area for his employees and a bilingual K-12 school for children of employees.
Resignation
Already experienced in the establishment of semiconductor factories, Zhang continued to expand SMIC by building three 8 inch wafer factories in Shanghai, two 12 inch factories in Beijing, and purchased an 8 inch factory in Tianjin from Motorola. In 2002, the Taiwanese government, allegedly feeling pressure from SMIC's primary competitor, TSMC, ordered Zhang to withdraw his investment. After Zhang's refusal, the government fined him 15 million Taiwanese dollars threatening to bring more fines should Zhang not desist. In August 2003, as SMIC planned to launch an IPO in Hong Kong, TSMC sued SMIC in the United States courts for intellectual property theft and patent infringement. In 2005, SMIC was ordered to pay US$175 million to TSMC in damages, surrender TSMC documents, and halt the use of TSMC technology and processes in SMIC's fabrication. Later, in a separate lawsuit, a California jury would find that SMIC breached the terms of the 2005 settlement by not returning documents and disclosing TSMC trade secrets in patent applications. Along with a compensation of $200 million USD and 10% equity given by SMIC to TSMC in 2009, Zhang, then 61, was prohibited from operating in the chip industry for a period of three years.
Later life
In 2014, having passed his three-year prohibition from the semiconductor industry, a 66-year-old Zhang founded Shanghai Xinsheng, the first 300 mm large silicon wafer company in mainland China. In 2018, Zhang established SiEn (Qingdao) Integrated Circuits which, in 2021, began producing 8 inch silicon wafers and was testing 12 inch production. Zhang has continued to play an active role in the advocacy of the People's Republic of China's chip industry. Zhang has expressed his confidence that China would catch up to global leaders in the industries of third-generation gallium nitride (GaN) and silicon carbide (SiC) semiconductors. SiEn, meanwhile, has discussed potential partnerships with Huawei Technologies to allow access to semiconductor development services in what the Japanese Financial Newspaper Nikkei asserts is an attempt "to plug holes in its semiconductor supply chain caused by the U.S. crackdown on the tech giant".
|
WIKI
|
Page:United States Statutes at Large Volume 110 Part 1.djvu/1144
110 STAT. 1120 PUBLIC LAW 104-127—APR. 4, 1996 (B) by striking paragraphs (3) and (4) and inserting the following: "(3) RECOMMENDATION.—The Regional Director, based on the comments of the reviewers, shall make and submit a recommendation to the Board, which shall not be binding on the Board.". SEC. 728. ALTERNATIVE AGRICULTURAL RESEARCH AND COMMER- CIALIZATION REVOLVING FUND. Section 1664 of the Food, Agriculture, Conservation, and Trade Act of 1990 (7 U.S.C. 5908) is amended to read as follows: "SEC. 1664. ALTERNATIVE AGRICULTURAL RESEARCH AND COMMER- CIALIZATION REVOLVING FUND. " (a) ESTABLISHMENT.— There is established in the Treasury of the United States a revolving fund to be known as the Alternative Agricultural Research and Commercialization Revolving Fund. The Fund shall be available to the Corporation, without fiscal year limitation, to carry out this subtitle. "(b) CONTENTS OF FUND. — There shall be deposited in the Fund— "(1) such amounts as may be appropriated or transferred to support programs and activities of the Corporation; "(2) payments received from any source for products, services, or property furnished in connection with the activities of the Corporation; "(3) fees and royalties collected by the Corporation from licensing or other arrangements relating to commercialization of products developed through projects funded in whole or part by grants, contracts, or cooperative agreements executed by the Corporation; "(4) proceeds from the sale of assets, loans, and equity interests made in furtherance of the purposes of the Corporation; "(5) donations or contributions accepted by the Corporation to support authorized programs and activities; and "(6) any other funds acquired by the Corporation. "(c) FUNDING ALLOCATIONS. — Funding of projects and activities under this subtitle shall be subject to the following restrictions: "(1) Of the total amount of funds made available for a fiscal year under this subtitle— "(A) not more than the lesser of 15 percent or $3,000,000 may be set aside to be used for authorized administrative expenses of the Corporation; "(B) not more than 1 percent may be set aside to be used for generic studies and specific reviews of individual proposals for financial assistance; and "(C) except as provided in subsection (e), not less than 84 percent shall be set aside to be awarded to qualified applicants who file project applications with, or respond to requests for proposals from, the Corporation under sections 1660 and 1661. "(2) Any funds remaining uncommitted at the end of a fiscal year shall be credited to the Fund and added to the total program funds available to the Corporation for the next fiscal year. "(d) AUTHORIZED ADMINISTRATIVE EXPENSES.— For the purposes of this section, authorized administrative expenses shall include
�
|
WIKI
|
How to Detect When a User Scrolled to the Bottom of a Page with JavaScript
Learn how to detect when a user scrolls down toward the bottom of a page with raw JavaScript.
Sometimes you want to trigger an event, when the user has scrolled to the bottom of a page or a specific section.
Scroll to bottom detection (works in all modern browsers, IE9 and up)
window.onscroll = function() {
if (window.innerHeight + window.pageYOffset >= document.body.offsetHeight) {
alert("At the bottom!")
}
}
Edge case solution:
If the first one doesn’t work, try using the Math.ceil() method on window.pageYOffset:
window.onscroll = function() {
if ((window.innerHeight + Math.ceil(window.pageYOffset)) >= document.body.offsetHeight) {
alert('At the bottom!')
}
}
The reason for using Math.ceil is that some browsers use subpixel precision on elements. E.g. a width or height can be 500.25px.
Math.ceil will round upwards, e.g. 1.45px becomes 2px.
There’s also an issue with some Mac computers, which offset the window height by 1px. To work around that you can subtract a few pixels from the document height:
(window.innerHeight + window.pageYOffset) >= document.body.offsetHeight - 2
Note: scrollY is often used instead of pageYOffset. But scrollY doesn’t work in Internet Explorer. For modern cross-browser compatibility, use pageYOffset.
Here’s a CodePen showing a working example.
If you’re confused about the relationship between window.innerHeight, window.pageYOffset, and document.body.offsetHeight here’s a little helper function that logs the pixel value of each when you scroll:
window.onscroll = function() {
console.log('Window height (px):', window.innerHeight)
console.log('Currently scrolled from top (px):', window.pageYOffset)
console.log('Document height(px):', document.body.offsetHeight)
}
That should make it easier to understand how the scroll detection function works. Initially pageYOffset confused me. It refers to the number of current pixels scrolled vertically from top.
Has this been helpful to you?
You can support my work by sharing this article with others, or perhaps buy me a cup of coffee 😊
Kofi
Share & Discuss on
|
ESSENTIALAI-STEM
|
Code Completion With Special Characters
Answered
Hi,
I'm using code completion in my plugin to create expressions which begin with a $. When it comes to code completion for words such as 'file', everything is fine. However, when I try do the same for '$', it doesn't work.
Using a PsiViewer I can see that the element is whats expected in the extend() method I'm using, but nothing happens. I then track it back to CompletionService.getVariantsFromContributors() and find this isn't being called when the char is $ and actually completion parameters aren't being initialized (CodeCompletionHandlerBase.prepareCompletionParameters()).
How might I be able to work around this problem?
Thanks.
27 comments
Comment actions Permalink
Do you mean autopopup completion that doesn't appear, or explicit invocation (Ctrl+Space) that doesn't work?
0
Comment actions Permalink
Neither of these work
0
Comment actions Permalink
Is getVariantsFromContributors called during explicit completion?
0
Comment actions Permalink
Thanks, when I type a special character, getVariants is called with explicit completion, but not with auto completion. If I type any character other than a number or letter, auto completion doesn't happen and getVariants isn't called. Furthermore, using a PsiViewer, I see that the '$' is the element it should be (expression_start), however in getVariants the element type is BAD_CHARACTER. Once the expression start has been typed and I do explicit completion, the element type in get variants it the next part of the expression (key), giving me completion for possible keys (as it should).
0
Comment actions Permalink
By default, autopopup completion is only started when letters or digits are typed. You can add your own TypedHandlerDelegate and handle $ there.
The part about element types is hard to understand without knowing the details of your language and parser, but it might have something to do with the dummy identifier being inserted by completion engine.
0
Comment actions Permalink
So the auto popup is now working with the typed handler, I still have problems with the elements. In debugger I see PsiErrorElement:MyTokenType.KEY expected, got 'IntellijIdeaRulezzz'. Before i got just the letter I, is this the dummy identifier you mean?
0
Comment actions Permalink
Yes, IntellijIdeaRulezzz is the dummy identifier, and your parser should be prepared to it, as any other text.
0
Comment actions Permalink
Ah ok, so how can I set my parser to be prepared to it? The parser understands regular text, in the first element there is no text however, therefore it returns an error if text is returned. Is this the issue?
0
Comment actions Permalink
The parser surely can mark this as an error, but it still should produce some PSI for it that your completion would be able to analyze, and generate suggestions based on that PSI structure.
0
Comment actions Permalink
Sorry I'm not sure I follow. I believe the parser returns the expected element, as when I start typing the start of the expression, the psi viewer recognises this as the expression start. Is this what you mean when you say the parser should produce some element that completion can analyze?
0
Comment actions Permalink
What do you mean by "expected"? Expected by whom for which purpose?
The parser should produce some tree for every text, including the one with a dummy identifier IntellijIdeaRulezzz. In completion, you inspect the resulting tree (starting from completionParameters.getPosition(), which will likely contain the dummy identifier) and generate relevant suggestions for this position. The dummy identifier is inserted only for making it easier to inspect the parse tree.
0
Comment actions Permalink
Sorry, I mean expected by the parser. I've been trying to solve this however my progress is now stopped by an out of memory issue. The OOM error occurs whenever code completion is invoked. Originally the Xmx was set to 500m and as soon as I typed anything it would run out of memory. Testing it out, I set it to 1G, 1.5G and even 3G and it had enough memory so I could type (with no code completion showing up), but as soon as I explicitly invoke code completion, completion popup shows a loading symbol until it eventually runs out of memory. I'm really unsure how this has happened, any ideas or pointers on how I can debug would be amazing.
Edit: In debugger, I see that getVariantsFromContributors isn't being called anymore. It runs out of memory before this.
0
Comment actions Permalink
There's probably a memory snapshot generated in IDE bin or user home directory, you can try to understand the reasons from it. In addition, OOM could be caused by stack overflow, so a stacktrace of the OOM might also provide clues.
0
Comment actions Permalink
Thanks for replying. I've looked in home/user/.local/share/JetBrains/Toolbox/apps/IDEA-U/ch-0/191.7479.19 (which I am using). In the bin folder, I don't see any kind of memory snapshot. I'm not totally sure what I'm looking for or if I'm in the right place. Also, when I get the OOM, there is no stacktrace provided within the IDE. It shows the window with the options shutdown, continue or memory dump. I also don't know what to do with the memory dump or if this is useful to me. Where can I find the stacktrace or memory snapshot? Sorry I'm still getting to grips with stuff like this, thank you for your patience.
0
Comment actions Permalink
I've gotten to the bottom of the OOM error. I had removed the line
[^] { return BAD_CHARACTER; }
somewhere along the way, which was causing this out of memory issue. So returning to the original problem, I think my issue is with the JFlex macros. When I have:
KEY_CHARACTER= [^] | [${]
, with the expression start being ${, code completion works. However, this also works for any other character, which I dont want, I only want to to complete for ${ and otherwise return bad character. So I believe the way to achieve this is to write:
KEY_CHARACTER= [${]
however with this, the psi elements work correctly, but code completion doesn't work. Can someone see what I am doing wrong here? getVariantsFromContributors is being called in both cases, but my lookup element isn't being called with the 2nd case. Any help would be great, thank you.
0
Comment actions Permalink
Sorry, this is too unspecific, I can't understand what you mean by "this also works for any other character" (what's "this", what's "works for", where the characters are), "I only want to to complete for ${ and otherwise return bad character" (what's "complete for", "return" from where), "psi elements work correctly" (PSI elements usually don't work, they're just the data different code works with), "my lookup element isn't being called" (what exactly isn't called that you expect to be?).
0
Comment actions Permalink
Very sorry, I will try be more specific. So I want to be able to have code completion for an expression like this - ${value}, where "${" is the expression start, "value" is the value, and "}" is the expression end. My end goal is for the user to be able to type "$", and code completion will present "${}". So to achieve this, I have tried using the JFlex macro:
EXPRESSION_START= [^] | [${]
With this macro, when I type "$", code completion is invoked and shows ${}, which is good. The issue with the macro, is that when I type something like "hello", instead of "${", the syntax highlighter shows it to be a correct expression start, which it is not. I want only "${" to be shown as an expression start, any other characters, such as "hello", should be returned as bad characters. So in attempt to fix this, I replace that macro with:
EXPRESSION_START= [${]
With this macro, when I type "$", code completion is not invoked. However the other issue is fixed, as when I type "hello", it is shown as bad characters (as it should be), and "${" is shown as expression start. I am trying to find the right macro, which will allow code completion to be invoked, and only allow "${" as the expression start.
0
Comment actions Permalink
The second rule seems correct. How would "$hello" be lexed/parsed with it? Do you use MultiplePsiFilesPerDocumentFileViewProvider?
0
Comment actions Permalink
"$hello" is incorrect with the second rule. "$" is shown as correct, but the "h" in hello is parsed as bad character. I'm not totally sure about MultiplePsiFilesPerDocumentFileViewProvider. To perform code completion, I extend CompletionContributor, and use the "extend" method in my completion class' constructor. Is this the information you are after? To be more concise and specific with the issue, if the rule starts with "[^] |", code completion is invoked explicitly and automatically. Otherwise, it isn't invoked explicitly or automatically. This only applies to the EXPRESSION_START rule, which I believe is because it is the first element to be typed on any line. Thank you for your help and patience.
0
Comment actions Permalink
If you don't know what MultiplePsiFilesPerDocumentFileViewProvider is, you' probably aren't using it :)
So, if "h" is parsed as a bad character, how is "e" parsed then?
0
Comment actions Permalink
"e" and "llo", are parsed as the value. So it is "$h" shown as expression start, and "e" is a bad character and "llo" is correct value characters. The kind of functionality I'm after is similar to that of a java keyword, where you can be at the start of an empty file, invoke code completion and see a list of keywords. I can't see what I am doing wrong, if I make a sample project, could you see if you can spot my mistake?
0
Comment actions Permalink
If you want your completion to work after $, you need to write a pattern for the bad character that comes after a $, because CompletionParameters#getPosition will return this bad character.
0
Comment actions Permalink
I want code completion to work before the $, as if it was a java keyword. In java files, you can invoke completion right at the start of the file and it lists keywords. If you start typing a keyword, it also lists completion options. This is what I want, however I can only achieve it if I use the macro:
EXPRESSION_START=[^] | [${]
This is causing the bad character issue, because the "^" represents any character. But, it allows code completion to be invoked at the start of the file. So, when I use the correct macro:
EXPRESSION_START=[${]
All is fine with the bad character, only "${" is accepted, but code completion isn't invoked at the start of the file, as it was with the "^". My main question is, what is the difference between using "^" when it comes to code completion? Why does it either allow or not allow completion to be invoked?
Furthermore, the completion after the expression start is working. For example for the expression "${hello}", i can type "${h", which is shown as correct characters, and "h" invokes code completion for "hello". I can also make the expression start only accept "${", with anything else being bad characters. The issue is it either accepts only "${", or has code completion. I struggle to get both working.
0
Comment actions Permalink
If you want code completion to work in the start of a file, you should check how a file starting with "IntelliJ" is parsed, and write a pattern for that PSI.
"^" is irrelevant for code completion. Most likely, your parser shouldn't be changed for the code completion to work. It just has to produce some tree for every input text, and then it's CompletionContributor's responsibility to analyze all patterns you care about and check whether the current PSI position (with dummy identifier inserted) matches any of those.
0
Comment actions Permalink
Thank you very much, the issue is now mostly resolved after putting code completion for BAD_CHARACTER. This now gives me a new problem though. I type "$", code completion shows "${}" (which is great). When I hit enter, it inserts the whole "${}", leaving me with "$${}". When I look at the elements present. The first element is actually "PsiErrorElement:EXPRESSION_START expected, got "$"", with a sub element of "PsiElement(BAD_CHARACTER)". The following characters are just BAD_CHARACTERS, without an error element. My initial thought is to just write code completion for the error element but there are two issues. I don't create the error element in my code, and I can't get an instance of it. Second, if I wrote completion for the error element, wouldn't it always popup every time a mistake is made? Any guidance here would be much appreciated.
0
Comment actions Permalink
$${} is probably inserted because your LookupElement's lookup string is "${}", but the prefix matcher doesn't include "$" as prefix. You can fix it by either using CompletionResultSet#withPrefix, or by inserting only "{}".
And your completion contributor shouldn't react to any error element or BAD_CHARACTER. You can write a custom condition that checks the surrounding of that error element and determines whether completion makes sense there, and what kind of it does.
0
Comment actions Permalink
Excellent, everything is working now with this prefix handler. Thanks a lot for your help.
0
Please sign in to leave a comment.
|
ESSENTIALAI-STEM
|
Please note! This essay has been submitted by a student.
Death of a Salesman analysis tells the story of a man who was on the verge of losing everything. Set in the backdrop of New York and Boston, Willy Lowman is an old salesman who refuses to accept the truth about his reality. Being liked was more important than hard work in his world, so he worked very hard to be desired, which did not work well. He was on the verge of losing everything, and even when his neighbor threw him a lifeline, he refused as he thought he was above it. Willy was also losing his mind, unable to tell what was real and what was not. Hamlet, by Shakespeare, tells the story of a son on a journey to avenge his father. The King had been killed by his brother, Claudia, who went on to marry Hamlet’s mother, something that irked Hamlet. To take revenge, Hamlet decided to play a mad man so that Claudia would not suspect him. Soon it was unclear if Hamlet was playing a mad man or he was insane. Although both written years apart, the two stories share many similarities as well as differences.
At the heart of the two plays is a family. Willy came home to his wife and his two sons Biff and Happy. Willy’s family was going through a tough time because of the financial situation and the strained relationship between the sons and the father. His influence on his son can be felt throughout the play. Happy, who wanted to please the father, followed in his footsteps and was instead unhappy. He said he had no idea why he was working. Biff, on the other hand, was on the receiving end of his father’s insults “Why does Dad mock me all the time?. Willy wanted Biff to be more like him, a salesman. The King recruits Hamlet despite him being dead into avenging him. In both stories, the influence of the older generation can be felt on the younger people. Biff adored his father until he learned that he had an affair while Hamlet discovered his uncle’s treachery. This discovery destroyed the two young men as Biff could barely hold down a job while Hamlet was tossed into a world of plotting and revenge. Willy and Hamlet both suffered from insanity. While Willy was not aware of his deteriorating mind, Hamlet decided to act like a madman as part of his plan.
Death of a Salesman was written at the collapse of the American stock market that plunged the whole country into an economic crisis. While Willy’s problems seemed to be self-made, he could have gotten a job doing something else, the situation also contributed. Many American people at that period lost their jobs and were desperate. This single thing is enough to drive a man to insanity. Willy was desperate and had attempted suicide more than once before his actual death. His slow descent to madness may have been from his economic status. Hamlet, on the other hand, was written in the times of kings and queens; betrayal was not a new thing. Claudia, Hamlet’s uncle, murdered the King to take over “The serpent that did sting they father’s life now wears his crown”. He was also plotting on killing Hamlet, all the while pretending to be helping him. So while the two main characters met their death in the end, the motives and the methods were different. Willy, driven by desperation and the need to leave something for his family, committed suicide for them to collect the insurance. Hamlet died, having avenged his father by killing his uncle as the last act of his life.
The two plays, although written at different times, they have many similarities as well as differences. Both Willy and Hamlet were victims of circumstances, and both had to deal with the feelings of despair and hopelessness. They both had to deal with losses and tragedies that seemed to be out of their hands. In the end, the two characters met their deaths.
|
FINEWEB-EDU
|
The Supreme Court legalized same-sex marriage in the US after years of legal battles
On June 26, 2015, the US Supreme Court in Obergefell v. Hodges struck down states’ same-sex marriage bans as unconstitutional, effectively bringing marriage equality to all 50 states. Although the cases dealt with laws in Kentucky, Michigan, Ohio, and Tennessee specifically, the court’s decision encompassed the constitutionality of same-sex marriage bans across the nation. Over time, same-sex marriage rights have spread from Massachusetts in 2004 to two states in 2008 to eight states and Washington, DC, in 2012 to 37 states and DC just prior to the Supreme Court ruling — through court decisions, ballot initiatives, and state legislatures. In the remaining states where same-sex marriages are still prohibited, there are pending or ongoing court challenges. The Supreme Court’s ruling completes the long march, bringing marriage equality to all 50 states. The same-sex marriage battle had been decades in the making. In 2003, the Massachusetts Supreme Court legalized same-sex marriage in the state, making Massachusetts the first state in the country to allow gay and lesbian couples to marry, in 2004. At the same time, states through the 1990s and 2000s enacted bans on same-sex marriages through constitutional amendments and other legislation after the Hawaii Supreme Court suggested in 1993 that prohibiting same-sex couples from marrying might violate the state’s constitution. It’s these bans that became the focal point of the debate in courts, as pro-LGBTQ organizations like the American Civil Liberties Union, Lambda Legal, and the National Center for Lesbian Rights challenged them as unconstitutional. Many of the lower-court decisions were prompted by the Supreme Court’s 2013 ruling in United States v. Windsor, which cited the 14th Amendment to strike down the federal government’s ban on same-sex marriages. Lower courts by and large interpreted the 2013 decision to confirm that the 14th Amendment’s Equal Protection and Due Process clauses apply to gay, lesbian, and bisexual people, meaning that states — just like the federal government — were required to grant equal rights under marriage laws to same-sex couples. But not all lower courts agreed on the issue, so in early 2015 the Supreme Court agreed to take up the cases. This history is important not just because it led to the Supreme Court decision’s establishing marriage equality in the US, but because it also shaped the arguments and growing public support for same-sex marriage rights. As the Supreme Court considered a decision that would affect millions of gay, lesbian, and bisexual Americans, this history and public opinion played a crucial role — and helped usher in a widespread understanding that same-sex marriage rights are about bringing equality to the law.
|
NEWS-MULTISOURCE
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.