Document
stringlengths
87
1.67M
Source
stringclasses
5 values
1971 Stanford Indians football team The 1971 Stanford Indians football team represented Stanford University during the 1971 NCAA University Division football season. Led by ninth-year head coach John Ralston, the Indians were 8–3 in the regular season and repeated as Pacific-8 Conference champions at 6–1. The previous season, the Indians won the Pac-8 title and upset undefeated Ohio State in the Rose Bowl behind Heisman Trophy-winning quarterback Jim Plunkett, the first overall pick in the 1971 NFL draft. With the core of the "Thunder Chickens" defense returning, led by Jeff Siemon and Pete Lazetich, and an offense under the steady leadership of fifth-year senior quarterback Don Bunce, the Indians defended the conference title and upset fourth-ranked Michigan in the Rose Bowl. Shortly after their New Year's Day victory, Ralston resigned to become head coach and general manager of the Denver Broncos in the National Football League. A few weeks later, offensive coordinator Mike White was hired as head coach at rival California, his alma mater, and Stanford promoted defensive assistant Jack Christiansen to head coach. This was the final season with the "Indians" nickname, which was changed to "Cardinals" for 1972, and reduced to the singular "Cardinal" in 1982. Roster * Source: NFL Draft Six Stanford players were selected in the 1972 NFL Draft
WIKI
SFRP5 Secreted frizzled-related protein 5 is a protein that in humans is encoded by the SFRP5 gene. Secreted frizzled-related protein 5 (SFRP5) is a member of the SFRP family that contains a cysteine-rich domain homologous to the putative Wnt-binding site of Frizzled proteins. SFRPs act as soluble modulators of Wnt signaling. SFRP5 and SFRP1 may be involved in determining the polarity of photoreceptor cells in the retina. SFRP5 is highly expressed in the retinal pigment epithelium, and moderately expressed in the pancreas.
WIKI
Closest Binary Search Tree Value I, II Question I one closest value Solution can be solved by recursion [here])(http://www.cnblogs.com/jcliBlogger/p/4763200.html) class Solution { public: int closestValue(TreeNode* root, double target) { if (!root) return INT_MAX; if (!root->left && !root->right) return root->val; int left = closestValue(target->left, target); int right = closestValue(target->right, target); double td = abs(root->val - target), ld = abs(left - target), rd = abs(right - target); if (td < ld) return (td < rd) ? root->val : right; else return (ld < rd) ? left : right; } } or // recursive int closestValue(TreeNode* root, double target) { int a = root->val; auto kid = target < a ? root->left : root->right; if (!kid) return a; int b = closestValue(kid, target); return abs(a - target) < abs(b - target) ? a : b; } // iterative int closestValue(TreeNode* root, double target) { int closest = root->val; while (root) { if (abs(closest - target) >= abs(root->val - target)) closest = root->val; root = target < root->val ? root->left : root->right; } return closest; } more solution here Question II k closest values Solution here Solution { public: vector<int> closestKValues(TreeNode* root, double target, int k) { priority_queue<pair<double, int>> pq; closestK(root, pq, target, k); vector<int> closest; while(!pq.empty()) { closest.push_back(pq.top().second); pq.pop(); } return closest; } private: void closestK(TreeNode* node, priority_queue<pair<double, int>>pq, double target, int k){ if(!node) return ; pq.push(make_pair(abs(target - node->val), node->val)); if (pq.size() > k) pq.pop(); closestK(node->left, pq, target, k); closestK(node->right, pq, target, k); } }
ESSENTIALAI-STEM
Understanding Hormonal Therapy for Metastatic Breast Cancer Dr. Echt highlights the various hormonal therapies used in treating metastatic breast cancer. Decatur, TX – January 17, 2020 – Treatment for metastatic breast cancer is administered to ensure a patient can survive longer with the disease, experiences fewer side effects, and enjoys a quality life. Currently, there is no possible cure for metastatic breast cancer. Treatments given depend on several factors such as the gene mutations in the tumor, levels of HER2 and/or hormone receptors, and other organs that the cancer has spread to, and more.  “Oncologists often work together in a multidisciplinary system to develop appropriate treatment plans for patients,” explained Dr. Echt. “Treatment options for metastatic breast cancer vary. Some, like hormonal therapy, is ideal for hormone receptor-positive breast cancers.” Here are the various options for hormonal therapy for breast cancer: • Aromatase inhibitors (AIs) – Aromatase inhibitors can reduce the amount of oxygen produced by tissue by blocking the aromatase enzyme. The enzyme changes androgens into estrogen. Aromatase inhibitors include letrozole, exemestane, and anastrozole (Arimidex). • Tamoxifen (Soltamox) – This is a drug that prevents estrogen for binding to the breast cancer cells. It is an oral drug used on all breast cancer patients. It helps to improve cholesterol levels and bone health. • Ovarian suppression – This can be used together with tamoxifen, AI, or fulvestrant to cause temporary menopause by stopping ovaries from making estrogen. They include leuprolide or goserelin. Surgery can also stop estrogen production permanently. Ovarian suppression treats hormone receptor-positive metastatic breast cancers in younger women. • Fulvestrant (Faslodex) – This is a selective estrogen receptor downregulator (SERD) that helps to prevent the ability of estrogen attaching to estrogen receptors. It is used only in women of menopausal age. “Hormonal therapy helps to reduce the levels of progesterone and estrogen in the body to block them from reaching cancer cells,” continued Dr. Echt. “This will prevent cancer cells from using the hormones to grow and multiply. Hormone therapy can be combined with other targeted therapies to treat metastatic breast cancer. “However, it cannot be used with chemotherapy. More Choice Cancer Care Centers
ESSENTIALAI-STEM
-- S&P GSCI Commodity Index May Gain 6.4%, Barclays Says: Technical Analysis The S&P GSCI Spot Index of 24 commodities may gain at least 6.4 percent after the measure climbed above previous resistance levels, according to technical analysis by Barclays Capital. The attached chart shows the index has been moving higher since the beginning of 2009, and previous resistance levels at about 549 and 554 have now become support areas. The measure may climb to the 50 percent retracement of the 2008-2009 decline at about 600, one of the levels singled out in so-called Fibonacci analysis. “The past two weeks have seen many commodity markets slip lower, and while the risk of further downside price action remains, weakness should be seen as counter-trend and corrective,” New York-based Barclays analyst MacNeil Curry said in a report yesterday. “As such, we maintain our bullish bias for a push towards” the 50 percent Fibonacci level and “likely beyond,” he said. The index was at 564.1411 at 7:18 a.m. in London and reached a two-year high of 577.949 on Oct. 14. Assets invested against the S&P GSCI were estimated at between $75 billion and $80 billion as of August, Michael McGlone , senior director of commodities at S&P indices, said last month. Raw materials have gained as adverse weather boosted agricultural commodities and as investors bought metals as an alternative to a weakening dollar and on speculation the Federal Reserve will ease policy further to support growth. In technical analysis, investors and analysts study charts of trading patterns and prices to predict changes in a security, commodity, currency or index. Fibonacci analysis is based on the theory that prices tend to drop or climb by certain percentages after reaching a high or low. To contact the reporter on this story: Nicholas Larkin in London at nlarkin1@bloomberg.net . To contact the editor responsible for this story: Claudia Carpenter at ccarpenter2@bloomberg.net
NEWS-MULTISOURCE
New Patients Call (678) 359-4707 Dental Implants vs. Dentures Buford, GA Dental Implants vs Dentures An Overview Dr. Alla Brown and Dr. Amanda Newberry offer several options for the replacement of missing teeth to restore your optimal oral health in their Buford, GA dentist office. The best treatment for you will depend on your oral health needs, cosmetic goals, and budget. Dr. Brown or Dr. Newberry will evaluate your gums and teeth and present you with all of your treatment options. Dr. Brown and Dr. Newberry will explain the pros and cons of each treatment and how they will benefit you. A dental implant involves a metal post being surgically implanted into your jaw bone and then capped with a dental restoration like a dental crown. Dentures are a set of artificial teeth that are not permanent and require a lot of extra care. Buford, GA dentists, Dr. Brown and Dr. Newberry will recommend dental implants over dentures because they last longer and have a more natural looking result. Dental Implants vs Dentures What to Expect Care – Dentures involve a lot of care. They must be brushed daily and can possibly break if dropped. You can never let your dentures dry out and that can be a constant worry especially when not wearing them. Dental implants require the same care as your natural teeth and that eliminates a lot of extra work. You can brush them and floss them without worry of damaging them. Facial Appearance – A face without teeth will appear sunken and can add years to your appearance. Both dentures and dental implants will help keep the natural shape of your face and lower jaw area. But dental implants look more like natural teeth when compared to dentures. Dental Implants can be colored matched to your natural teeth as well. Eating Food – Dentures will deliver about a 30-40% normal chewing function. Dental implants will deliver a perfectly normal chewing function. The constant worry that your teeth may fall out while eating is not an issue with dental implants. Oftentimes, dentures may slip around or may not fit correctly leaving you with the worry of falling out. Cost – Dentures cost significantly less than dental implants up front. But dentures will also need replaced, realigned, or rebased over time. This cost can add up depending on the wear and tear. Dental implants cost more but are a permanent solution. If cared for properly, they will last forever. Fit and Comfort – With dentures, you may need to apply a gooey adhesive every time you wear them to hold them in your mouth. With Dental implants, you won’t need to do this extra step because they are surgically implanted and can be treated like a normal tooth. Also, dentures may be a bit uncomfortable because they may cover a large portion of your mouth with plastic depending on the type of dentures you need. They may feel weird in your mouth and take some time to get used to because they are bulky. Bone loss associated with tooth loss – If you’re missing a tooth or multiple teeth, that void can cause bone loss and deterioration in your jawbone. Your Lanier Smiles dentist will recommend dental implants over dentures because they are the only option for missing teeth that stimulates the jaw bone which helps stimulate bone growth. This will prevent bone loss. Learn More About Dental Implants
ESSENTIALAI-STEM
Are All Nitrile Gloves Food Safe and Secure? Unraveling the Facts 68 viewsBusiness 0 In various industries, especially in healthcare, food service, and beyond, nitrile gloves have become indispensable for providing protection against contaminants and promoting hygiene. However, when it comes to the food industry, ensuring the safety and security of nitrile gloves is of utmost importance. In this comprehensive guide, we will delve into the critical question: Are all nitrile gloves food-safe and secure? We'll explore the nuances of nitrile gloves, their food-safe characteristics, chemical resistance, powder-free options, and the role of manufacturers in ensuring the highest standards. Understanding Nitrile Gloves Nitrile gloves have gained widespread popularity due to their exceptional characteristics. They are synthetic gloves made from nitrile rubber, a type of synthetic rubber derived from acrylonitrile and butadiene. Nitrile gloves are known for their: 1. Resistance: Nitrile gloves offer excellent resistance to various chemicals, oils, and solvents, making them suitable for a range of industries. 2. Durability: They are durable and puncture-resistant, providing reliable protection against contaminants. 3. Allergen-Free: Nitrile gloves are a suitable alternative for individuals with latex allergies, as they do not contain natural rubber latex. Nitrile Gloves and Food Safety When it comes to the food industry, the safety of nitrile gloves is a critical consideration. Food safety regulations and standards emphasize the importance of using gloves that are safe for handling food. Fortunately, nitrile gloves are generally considered food safe for several reasons: 1. No Latex Proteins: Nitrile gloves are latex-free, eliminating the risk of latex protein allergies. This is crucial in food handling environments, where allergies can have severe consequences. 1. Chemical Resistance: Nitrile gloves exhibit excellent chemical resistance, preventing potential contamination of food items from chemicals, oils, or other substances. 1. No Powder Residue: Powdered gloves were once a common option, but they posed challenges in the food industry due to the risk of powder contamination. Many nitrile gloves are now available in a powder-free form, addressing this concern. 1. Compliance with Regulations: Reputable manufacturers ensure that their nitrile gloves comply with relevant food safety regulations and standards. This includes certifications from regulatory bodies that set safety benchmarks for gloves used in the food industry. 1. Color Coding for Safety: Some nitrile gloves designed specifically for the food industry are color-coded to differentiate them from gloves used in other applications. This helps prevent cross-contamination and ensures that the right gloves are used for food handling. Chemical Resistant Nitrile Gloves One of the standout features of nitrile gloves is their resistance to various chemicals. This makes them an ideal choice for industries where workers may come into contact with oils, solvents, and other hazardous substances. In the food industry, chemical-resistant nitrile gloves offer an added layer of protection against cleaning agents and food processing chemicals. Key Points: 1. Versatility: Chemical-resistant nitrile gloves are versatile and can be used for various tasks, from handling food to cleaning and sanitizing. 2. Durability: The chemical resistance of nitrile gloves enhances their durability, ensuring that they remain effective even in challenging environments. 3. Protection Against Contaminants: These gloves provide an effective barrier against contaminants, safeguarding both the wearer and the food being handled. Powder-Free Nitrile Gloves Powdered gloves were once popular for their ease of donning, but concerns about powder contamination led to the development of powder-free alternatives. Powder-free nitrile gloves offer several advantages, especially in food handling scenarios. Advantages of Powder-Free Nitrile Gloves: 1. Reduced Risk of Contamination: Powder-free gloves eliminate the risk of powder residue contaminating food, making them a safer choice in the food industry. 2. Latex Allergy Prevention: Powder-free nitrile gloves are suitable for individuals with latex allergies, as they do not contain latex proteins or powder. 3. Improved Grip: Powder-free gloves provide a better grip, enhancing dexterity and reducing the risk of accidents in food preparation and handling. The Role of Nitrile Gloves Manufacturers The safety and security of nitrile gloves, especially in food-related applications, heavily depend on the standards set by manufacturers. Reputable nitrile gloves manufacturers play a crucial role in ensuring the quality, compliance, and suitability of their products for the food industry. Responsibilities of Manufacturers: 1. Regulatory Compliance: Adherence to food safety regulations and standards is non-negotiable. Manufacturers should obtain certifications and approvals from regulatory bodies to guarantee the safety of their nitrile gloves for food handling. 2. Quality Assurance: Rigorous quality control measures, including testing for strength, durability, and chemical resistance, are essential to ensure that nitrile gloves meet the highest standards. 3. Education and Information: Manufacturers should provide clear information on the intended use of their nitrile gloves, including whether they are food-safe, chemical-resistant, and powder-free. This information helps users make informed choices. 4. Innovation: Ongoing research and development efforts contribute to the continuous improvement of nitrile gloves. Innovations in materials and manufacturing processes enhance the overall performance and safety of these gloves. 5. Transparent Labeling: Clear and transparent labeling on nitrile glove packaging ensures that users can easily identify whether the gloves are suitable for food handling and other specific applications. Conclusion: Nitrile Gloves and Food Safety In conclusion, nitrile gloves are a valuable asset in the food industry, offering a balance of durability, chemical resistance, and allergen-free properties. The majority of nitrile gloves are considered food-safe, especially when sourced from reputable manufacturers who prioritize quality, compliance, and user safety. Whether it's chemical-resistant nitrile gloves for handling cleaning agents or powder-free variants for food preparation, the diverse options available cater to the specific needs of the food industry. As users, businesses, and industries continue to prioritize food safety, the reliability and integrity of nitrile gloves stand as a crucial element in maintaining the highest standards of hygiene and protection in the handling of food products. Asked question
ESSENTIALAI-STEM
The Lily of the Valley * The Lily of the Valley, work by Honoré de Balzac, translated by Katharine Prescott Wormeley * The Lily of the Valley, a poem by Paul Laurence Dunbar * The Lily of the Valley, a poem by Letitia Elizabeth Landon, in Fisher's Drawing Room Scrap Book, 1836. * The Lily of the Valley, a poem by Eliza Jane Stephens
WIKI
Week 1, Lesson 2: Scripting for Geo-Information Sciences, demonstration of capabilities WUR Geoscripting WUR logo Today's items Good morning! Here is what you will do today: Time Activity Morning Self-study: go through the demo's below and finalise yesterday's lesson 13:30 to 15:30 Presentation & discussion Rest of the afternoon Do/finalise the exercise. Objective of today Demonstration of geo-scripting potential. This will be done by providing geo-spatial showcases (e.g. data manipulation, visualization, analysis). Every showcase will be followed by: • A reflection of what is the interest of using scripting for that particular problem. • An assessment of the R knowledge required to perform that particular problem. Learning outcomes of today: The objective of this lecture is to provide an overview of the capabilities of scripting to solve common problems of the Geo-Information world. This lesson is organized as a set of examples that you can run, visualize the output and understand how the use of scripting was beneficial to tackling the geo-issue. After each example, a reflection is provided about why using scripting is beneficial for tackling that particular issue, as well as what associated scripting skills were required in the example. So more specifically, at the end of the day you should: • Have an idea of what can be achieved using scripting. • Identify a situation where the use of scripting is beneficial over a click-based approach. • Have identified how scripting can benefit your own project (e.g. master thesis research questions). Why scripting? Automation The use of scripting is particularly well suited for automation. Automated systems can take different forms; • Online systems that deliver updated information every day without human intervention needed (e.g. weather prediction). • More simple systems that e.g. extract the date from a satellite image file name. Demo: Integrated analysis chain from download to analysis In the script below we do the following: • Download SRTM data for a country e.g. Belgium. • Randomly sample height data. • Visualise results ## Libraries needed library(raster) library(spatstat) library(rgeos) ## You can choose your own country here bel <- raster::getData('alt', country='BEL', mask=TRUE) ## SRTM 90m height data belshp <- raster::getData('GADM', country='BEL', level=2) ## administrative boundaries ## Create random points dran <- runifpoint(500, win = as.vector(extent(bel))) ## Make the random point spatial points S <- SpatialPoints(data.frame(x = dran$x, y = dran$y), proj4string = CRS(proj4string(belshp))) ## Select only the ones within belgium Sint <- gIntersection(S, belshp) ## Create a map plot(bel) plot(belshp, add=TRUE) plot(Sint, add = TRUE, col = "red", pch = 19, cex = 0.2) Now we can sample the height data, and plot following random point id: out <- extract(bel, Sint, df = TRUE) colnames(out) <- c("id", "height") head(out) ## id height ## 1 1 -2 ## 2 2 5 ## 3 3 0 ## 4 4 0 ## 5 5 19 ## 6 6 -1 plot(out, type = "p", pch = 19) This example can easily be run for every country of the world with minimal human intervention, and therefore also constitute an other case of automation. Question 1: You can use the script below to analyse height (or climate data) for your own country by modifying the script above! The contribution of scripting • Ability to automatically download data from any place in the world. • Quick and efficient analysis by sampling data randomly. • Can easiliy be repeated for other countries, other datasets (reproducible). • Fully integrated analysis chain, from data download to output. Basic scriping skills required • String handling (generate automatic file names, recognize patterns, etc ...). • Querying lists and data.frames. • Error handling. • Handling raster and vector data. • Understanding and using basic spatial analysis functions. Flexibility With GIS software you are often limited to a set of features the software provides and anything beyond is either very hard to implement or even impossible. Scripting offers a much greater flexibility, to: • Explore your data in all its dimensions. • Implement complex and custom made algorithms and functions. Demo 1: Visualize the temporal profile of a pixel The example below illustrates how a small function allows to quickly visualize temporal profile of a raster time-series. ## Download a spatio-temporal dataset download.file(url = 'https://raw.githubusercontent.com/loicdtx/bfastSpatial/master/data/tura.rda', destfile = 'tura.rda', method = 'auto') load('tura.rda') There is now a variable named tura in your environment, it is a time-series of NDVI over an area of Ethiopia. library(zoo) ## Define the function to extract and plot the time series click2ts <- function(x) { val <- click(x, n = 1) z <- getZ(x) plot(zoo(t(val), z), type = 'p', pch = 20, xlab = 'Time', ylab = 'NDVI (-)') } Then run the code block below. R will be waiting for you to click on the map, and quickly after the time-series will appear. plot(tura, 1) click2ts(tura) The contribution of scripting Exploring the temporal dimension of a dataset is often not possible in classical GIS environments. The flexibility of scripting allows to do that with minimal efforts. Basic scripting skills required • Understanding the structure of spatial objects. • Writing functions. Demo 2: Implement a custom made function to a raster time-series The example below uses a time-series of MODIS VCF data, which corresponds to percentage tree cover, to investigate temporal trends of tree cover over the Netherlands. ## Trend calculator library(zoo) library(lubridate) library(raster) ## Download data (if it doesn't work, try with method='wget') download.file(url = 'https://raw.githubusercontent.com/GeoScripting-WUR/Scripting4Geo/gh-pages/data/MODIS_VCF_2000-2010_NL.rds', destfile = 'MODIS_VCF_2000-2010_NL.rds', method = 'auto') ## Read the data modis <- readRDS('MODIS_VCF_2000-2010_NL.rds') ## Clean data (values > 100 correspond to water) modis[modis > 100] <- NA ## Visualize plot(modis, 1) # For the example we will reduce the extent so that processing does not take too long e <- extent(340101, 370323, 5756221, 5787772) plot(e, add=TRUE) modis_sub <- crop(modis, e) plot(modis_sub, 1) # Define function to calculate temporal trends fun <- function(x) { ts <- zoo(x, time) df <- data.frame(t = decimal_date(index(ts)), vcf = c(ts)) out <- try(lm(vcf ~ t, data = df)$coefficients[2], silent = T) if(class(out) == 'try-error') out <- NA return(out) } # Run the function spatially (this may take a few minutes, time for a break?) time <- getZ(modis) out <- calc(x = modis_sub, fun = fun) # Visualize output plot(out) hist(out, main = 'Tree cover change at 250 m resolution (2000-2010)', xlab = 'Percentage change') You should see a map displaying the tree cover percentage temporal trends for the 2000-2010 period. Contribution of scripting Scripting, thanks to its flexibility, offers the possibility to implement any custom made function to any dataset. Basic scripting skills required • Writing functions. • Manipulating spatial objects. • Knowing the details of the functions/algorithms to be implemented spatially. Visualization We saw earlier that simple maps can be produced with R for display in reports or static supports. R also offers more advanced visualisation capabilities, particularly suited for web content. Demo 1: Interactive maps Check out the nice new leaflet package for R, that creates interactive web maps with the JavaScript 'Leaflet' Library. Question 2: Try this in your own R environment. library(leaflet) m <- leaflet() m <- addTiles(m) m <- addMarkers(m, lng=5.665349, lat=51.987870, popup="Wageningen University") m See here for the result of the above code: Wageningen Leaflet Demo For more information: http://www.htmlwidgets.org/showcase_leaflet.html Demo 2: Interactive maps The map below (created using the googleVis package) displays statistics about the national parks of Europe. The data is automatically read from this wikipedia page, cleaned and formatted in a data frame, and a webmap is created using the gvisGeoChart() function. If you hover over the dots, the value of the mapped variables is displayed. The googleVis package provides wrappers to easily produce such kind of maps using the google visualization API. Note: This is advanced code and is shown here for reference purposes. You do not need to try to understand it right now. library(googleVis) library(XML) library(httr) # set googleVis options to change the behaviour of plot.gvis, # so that only the chart component of the HTML file is written into the # output file. op <- options(gvis.plot.tag='chart') # Read table from html url <- "http://en.wikipedia.org/wiki/List_of_national_parks" #x <- readHTMLTable(readLines(url), which=3, stringsAsFactors = FALSE) page <- GET(url, user_agent("httr")) x <- readHTMLTable(text_content(page), which=3, stringsAsFactors = FALSE) # Clean up df colnames (x) <- c('country', 'oldest', 'number', 'area_tot', 'country_percentage') x$oldest <- as.numeric(x$oldest) x$number <- as.numeric(gsub("\\*", "", x$number)) x$area_tot <- as.numeric(gsub("(,)|(\\[.*\\])", "", x$area_tot)) x$country_percentage <- as.numeric(gsub("(%)|(\\[.*\\])", "", x$country_percentage)) nationalParks <- x g <- gvisGeoChart(nationalParks, locationvar="country", colorvar = "oldest", sizevar = "number", options=list(region="150", displayMode="markers", colorAxis="{colors: ['green', 'blue']}")) plot(g) Demo 3: Interactive maps The above map is nice, but still pretty static; it only displays two variables, which we did not choose. The year the first park was created for the dot color, and the total number of parks in the country for the dot size. To make that map a bit more interactive we can embed it in a shiny App. Shiny is among the latest developments of the R world, supported by RStudio; it provides the possibility to create interactive plots. This app can either be run in an RStudio session or online. Advanced examples are possible, as shown below, with an integration of shiny and leaflet. (Example provided by RStudio) Contribution of scripting • "User friendly" interface to JavaScript libraries. Basic scipting skills required • Dataframe manipulation. • String manipulation (subsetting, pattern matching). • Function writing. Reproducibility All examples shown in this demo have at least one characteristic in common; they are all reproducible. While you may not always remember the parameters you have selected when analyzing or creating map in a GIS environment, scripting leaves a fully reproducible mark of what you have done. Today's summary To summarize, we learned today that scripting can be used for many purposes: • Automate steps and deal with large amounts of data. • Solve complex problems (run custom made functions, while traditional GIS environments are limited to the features they provide). • Make work reproducible (also beneficial for collaboration). • Visualize data and build interactive geo-data visualization tools. Assignment Submit a max 1/2 page document via Blackboard, where you identify (per team) a brief description of an idea or project in which you plan to use GeoScripting. Highlight: • The potential contribution of Geo-scripting for yourself. • The specific R or Python knowledge you would need to learn about. Keep it short, to the point and structured (e.g. a list of items are OK, no full sentences are needed). The deadline is before the end of today. Again, provide feedback to at least one other team on their assignment. Inspiration and more info
ESSENTIALAI-STEM
Battle for Kidman cattle empire sparks calls for change in Australia's foreign investment laws A fresh bidding war over Australia's biggest farm has reignited fears of anti-China sentiment and put pressure on Canberra to tidy up its foreign investment rules. The Kidman cattle empire sits across four Australian states, is home to 10 ranches and accounts for 2.6 percent of the nation's total agricultural land. It is also one of the biggest beef producers in a country that's ranked among the world's largest exporters of the meat. The landholding has been on sale since June last year but the government has blocked offers from Chinese buyers on the back of national interest and security concerns. Now, two new bids are on the table: a 365 million Australian dollar ($278 million) offer from Australian Outback Beef (AOB) and a A$386 million proposal by a consortium of four Australian families known as the BBHO syndicate. AOB is a joint-venture company majority owned by Hancock Prospecting, helmed by Gina Rinehart, Australia's richest woman, and one-third owned by Chinese developer Shanghai CRED. The BBHO group includes Australian land owners Tom Brinkworth, Malcolm Harris, Viv Oldfield and Sterling Buntine. Sentiment seems to be leaning towards BBHO as its offer is higher and doesn't require Australian foreign investment approval or clearance from Chinese regulators, unlike the AOB deal. But should BBHO win, it could be painted as another example of an increasingly protectionist stance from Australia on foreign investment, particularly from China, sparking a possible backlash from a valued trade partner. "If Australia is seen as being too protectionist and inconsistent in relation to foreign investment, we would be a less attractive destination," explained Vivienne Bath, professor of Chinese and international business law at the University of Sydney. Canberra has long voiced its openness to foreign investment but a flood of Chinese funds, particularly into real estate, has created a popular impression with the public that Chinese companies were "buying up Australia," noted Bath. And in recent months, the government has rejected a number of Chinese proposals for Australian state assets, citing national security and national interest issues. Treasurer Scott Morrison blocked offers from State Grid Corp of China and Hong Kong's Cheung Kong Infrastructure in August to buy a controlling stake in Ausgrid, the country's biggest electricity network. The decision would "severely" reduce the appetite for Chinese companies to invest in Australia, China's Commerce Ministry warned at the time. "Opinions toward Chinese investment within Australia have been mixed, with some advocating for more leniency in foreign investment and others for greater transparency on the investor's part to allay local concerns," the Council of Foreign Relations said in a recent note. It should be noted that some of the largest foreign bids to have been rejected have not been Chinese, including Royal Dutch Shell's attempt to take over LNG producer Woodside Petroleum, and U.S.-based Archer Daniels Midland's interest in GrainCorp. When it comes to the Kidman estate, though, tensions are particularly high. Regulators already rejected two separate Chinese offers for the landholding, once in November 2015 and again in April this year. Chinese deal-maker Charles Lieu, who worked on the $370 million April bid, told The Australian newspaper last month that bidders were badly treated by the Australian government. "This is an unfortunate trend developing in Western countries today, with deglobalization and xenophobia, populism and protectionism on the march," he said. Among Kidman's ten cattle stations is Anna Creek, the world's largest of its kind. It's located within South Australia's Woomera Prohibited Area (WPA), which is home to the world's largest land weapons testing range, operated by the Royal Australian Air Force. It 's also highly prospective; officials estimate about $35 billion worth of iron ore, gold and other mineral resources are potentially exploitable from the area over the next decade. Because the WPA is highly valuable to the government, the first Chinese offer was rejected in November on national security concerns. The Kidman family later agreed to exclude Anna Creek from future deals and the sale process was reopened in February. But even with the defense element out of the way, the sheer size and significance of the assets remained an issue, which led to the second rejection in April based on national interest concerns. The government could have handled the situation better by insisting on the block's break-up before sale, Bath pointed out. Presently, Anna Creek is excluded from the Hancock-CRED offer, but it is included under BBHO's proposal. Kidman is particularly sensitive for the government because it represents the largest holding of agricultural land held by a single owner in Australia, Bath explained. "An acquisition by a foreign investor of this amount of land would be a sensitive issue in any country, not just Australia." Speculation is also high that Australian lawmakers are afraid Beijing will use Australian land assets to profit from Asia's growing food demand. Australia has no difficulty financing its current account deficit, so it can afford to balance national interest concerns against the case for a free market, Shane Oliver, chief economist at AMP Capital, said. Experts widely agreed, however, that Canberra should release clearly worded legislation on foreign ownership of nationally-sensitive assets in order to avoid confusion over deals. "We need a clear political approach, not just an ad hoc determination," flagged Bath. In a more dire warning, former Foreign Minister Gareth Evans said in August that clear ground rules for foreign infrastructure investments must be introduced, or Canberra risked "a great deal of damage." —Follow CNBC International on and Facebook.
NEWS-MULTISOURCE
Talk:Israel Summer Time Israeli daylight savings law Should this be moved to Israeli daylight savings law... as of now I see no reason that it would be a proper noun. gren グレン 13:13, 24 August 2005 (UTC) I agree. Unless the law is actually called "Israeli Daylight Savings Law, it should be moved to its more grammatical correct twin. Jabberwalkee_ Deleted sentence I deleted this sentence, "Eventually, one hopes that the new law will be reflected in various timekeeping software, including even that published by Microsoft." because it is not neutral. Moved to Daylight Saving Law and corrected all references in article--Jabberwalkee 16:48, 4 February 2006 (UTC) * Since it isn't actually called this and discusses the previous law, and discuss summer time in general, I moved it to "Israel Summer Time" after European Summer Time (see edit summary for more). Epson291 (talk) 20:24, 16 March 2009 (UTC) Pesach Using this rule it turns out that the beginning of DST is usually before Pesach. Exceptions in the 21 century: 2013, 2051, 2067, 2078, 2089, 2097. -- 08:53, 11 July 2007 <IP_ADDRESS> Edit by affected company I did an edit to the name of my company listed in the article to fix the case (from LinGNU to Lingnu). I was not the one to introduce the link in the first place, I merely performed the technical edit of fixing the name. Still, in the interest of full disclosure, I list it here. Shachar (talk) 14:21, 30 March 2008 (UTC) Apparent ambiguity? Page has ... on the Sunday between Rosh Hashanah ... and Yom Kippur .... Rosh Hashanah is 1 Tishrei and Yom Kippur is 10 Tishrei. There are 8 days in between, hence there may apparently be TWO Sundays in between, on 2 & 9 Tishrei. That seems in need of explanation, here and maybe to the Knesset. There is no ambiguity if Rosh Hashanah is for this purpose taken as 1 & 2 Tishrei. <IP_ADDRESS> (talk) 13:26, 5 July 2008 (UTC) The same comment applies to but has At the last Sunday before 10th of Tishrei. I suggest a check with Hebrew authority. <IP_ADDRESS> (talk) 21:22, 7 July 2008 (UTC) * Indeed. Rosh Ha-Shana is always celebrated two days: 1st and 2nd of Tishre. There is always one Saturday between Rosh Ha-Shana and Yom Kippur, and it even has a special name in Jewish tradition: Shabbat Shuva. <IP_ADDRESS> (talk) 11:56, 8 July 2018 (UTC) Non-perpetual As the period now begins on the Gregorian Calendar and finishes on the Hebrew Calendar, and the Hebrew and Gregorian years differ in average length, the given Rules cannot hold in perpetuity. The mean lengths of Summer Time and of Winter Time will steadily drift on opposite directions, and eventually one will become negative. <IP_ADDRESS> (talk) 19:12, 30 October 2008 (UTC) * Nope. The hebrew calendar has leap years in order to correct this. This problem would happen with the islamic calendar.--ZealousGnome (talk) 10:09, 10 June 2011 (UTC) Article needs to be updated with latest law (November 2012) On 6 November 2012, the Israeli Parliament changed the daylight saving time law so that Israel’s daylight saving time will run an average of 193 days a year, compared to 182 under the former law. This means that Yom Kippur will now be included in the period of daylight saving time. Source: http://www.haaretz.com/news/national/despite-shas-pressure-knesset-extends-israel-s-daylight-saving-time.premium-1.475375 — Preceding unsigned comment added by Jrose6 (talk • contribs) 13:23, 6 November 2012 (UTC) Article needs to be updated, please New law has passed, extending IST to the last Sunday on October. — Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 18:30, July 10, 2013‎ (UTC) Why Friday/Sunday? I assume there is a religious reason for not changing the clock during the night from Friday to Saturday, i.e. early on Saturday morning. Perhaps changing the clock on Shabbat is not allowed as it would be work. But why doesn't summer time start and end on the same weekday, say early on Friday morning (which would be the start of a two-day weekend in the Jewish calendar)? --<IP_ADDRESS> (talk) 00:00, 29 October 2017 (UTC) * I couldn't find an authorized answer to this question, so I can only offer a reasonable guess - Until the early 1990s, the change of time occurred always on the night between Saturday and Sunday. Arie Deri, the Minister of the Interior at the time, told the Israeli press and the Knesset that he received a lot of complaints about sleep deprivation on the night before the beginning of a new working week. Since Friday night was out of the question for religious considerations (he himself is ultra-orthodox), he decided spring forward on Friday. But since there were no complaints about the opposite change during fall, he left it on Sunday, and this practice became a tradition. Nevertheless, the newest statute says the move forward is on the Friday before the last Sunday in March, in order to keep the gap with Europe permanent (always two days before Europe). <IP_ADDRESS> (talk) 11:56, 8 July 2018 (UTC) Palestine? The official name is Israel Summertime, but it looks like someone politic-oriented wanted to spread fakes — Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:48, 3 May 2020 (UTC)
WIKI
As a Haven or a Hedge, Gold and Silver ETFs Have Appeal Gold and silver exchange traded funds (ETFs) might move up and down with the whims of the broader market, but make no mistake: these investments have wide range of appeal and applications for any investors. The most recent swings in the prices of gold and silver were a direct result of market volatility created by the crisis in Europe. Now that the European Union has pulled together a $1 trillion rescue plan, silver and gold ETFs appear to be taking a breather. But that doesn't mean you should stick a fork in them. [ How Gold ETFs Got Their Groove Back. ] Barry James, who helps manage $2 billion at James Investment Research, says that gold "does well in periods of financial turmoil, so it is good to have some just in case." Frank Lesh, a trader at FuturePath Trading LLC, remarks that investors are fleeing to the relative safety of gold as the currencies markets fluctuate. [ The Bullish Case for Silver ETFs. ] Beyond that turmoil, these funds are far from irrelevant. Three of the biggest drivers of the prices of gold and silver outside of safe-haven investing are: Gold and especially silver have industrial uses. Gold is used in wiring and is an excellent conductor of electricity. Silver is also an excellent conductor of electricity and has antibacterial properties. It's used in nearly any industry you can think of. Gold and silver, prized for beauty, are widely used in jewelry. Spikes in gold demand are often seen around Indian wedding season, when brides are gifted with large amounts of gold to ensure their financial security. September is the heaviest buying month. Commodities in general, and gold and silver specifically, are appealing in periods of high inflation. This is a period that many believe is coming sooner rather than later, thanks to hefty government spending. Silver prices may continue to rise further on the back of gold's strength, but the weakness in base metals could constrain gains in silver prices, according to CommodityOnline . Shyamal Mehta, Sr. Commodity Analyst with Commodity Online, calculated that silver is trading above 7, 14 and 20 days weighted moving averages, which he says signals an uptrend. There's no shortage of choices when it comes to ETFs that invest in gold and silver ETFs. You only have to decide how you want your exposure: miners, futures or physical bullion. Go here to learn about the differences in each. For more information on gold and/or silver, visit our precious metals category . SPDR Gold Shares (NYSEArca: GLD ) ETFS Gold Trust (NYSEArca: SGOL ) iShares COMEX Gold (NYSEArca:IAU) PowerShares DB Gold Fund (NYSEArca:DGL) Market Vectors Gold Miners (NYSEArca:GDX) Market Vectors Junior Gold Miners (NYSEArca:GDXJ) iShares Silver Trust (NYSEArca: SLV ) ETFS Physical Silver (NYSEArca: SIVR ) PowerShares DB Silver (NYSEArca: DBS ) UBS E-TRACS CMCI Silver ETN (NYSEArca: USV ) Global X Silver Miners (NYSEArca:SIL) Max Chen contributed to this article. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Square acquires conversational AI startup Eloquent Labs – TechCrunch Square has acquired conversational artificial intelligence startup Eloquent Labs to help its merchants improve customer service. Eloquent Labs, which raised a $1.5 million seed round back in early 2017, offers to small businesses a conversational assistant named Elle. The idea is that Elle will help merchants with common customer service-related issues like returns, product tracking and FAQs. “Eloquent’s conversational AI services are exactly the kind of technology that can level the playing field for businesses of all sizes by providing sellers efficient ways to interact with their customers,” Square wrote in a blog post. “The team will advance messaging across our entire ecosystem, and together we will build tools that leverage the latest in natural language processing research.” There are a number of other startups in this space, including customer service software LiveChat, DigitalGenius and Olark. All three of those have raised more money than Eloquent Labs, which likely played a role in Square’s decision.
NEWS-MULTISOURCE
Justin Trudeau brownface scandal: photo and video show the Canadian prime minister wearing blackface Canadian Prime Minister Justin Trudeau, the handsome, charming champion of Western liberal ideals of diversity and inclusion, is facing a mounting political crisis after revelations that he appeared in brownface on more than one occasion in his not-too-distant past. It all started on Wednesday evening, when Time magazine published a photograph of Trudeau wearing offensive makeup at an Arabian Nights-themed party at West Point Grey Academy, the private day school where Trudeau was a teacher in 2001. The photo appeared in the school’s 2000-’01 yearbook. Trudeau was 29 years old at the time the photo was taken. In the image, Trudeau is dressed in a white turban decorated with a large feather in the front and what looks like a flowing white robe — what he later described as an “Aladdin costume.” His face, neck, and hands are all covered in dark brown makeup. He stands with a group of four women, his arm around one — none of whom are wearing brownface. Time magazine has just dropped a bombshell report on ⁦@JustinTrudeau⁩We are with the campaign now. We are told Trudeau will address this before his plane takes off. Photo Shows Justin Trudeau in Brownface at ‘Arabian Nights’ Party | Time https://t.co/LzDSPaGEiN Speaking to reporters shortly after the story broke, Trudeau said, “I deeply regret that I did that. I should have known better, but I didn’t. ... I’m deeply sorry that I did that.” “I take responsibility for my decision to do that. It was something that I didn’t think was racist at the time,” Trudeau said, adding that he knows now that it was racist. “I’m pissed off with myself for having done it.” When asked if he’d ever done something like this at any other time in his life, he revealed that in high school he’d participated in a talent show in which he “wore makeup and sang ‘Day-O,’” referring to a traditional Jamaican folk song. Then, on Thursday, yet another instance of Trudeau appearing in brownface surfaced. Canada’s Global News obtained video showing Trudeau, his face and neck covered in dark brown makeup, laughing, raising his hands in the air, and sticking out his tongue. He is dressed in a T-shirt and ripped jeans. His arms also seem to be covered in the dark makeup, but it is a bit difficult to tell for sure given the grainy quality of the video. It’s unclear when and where the video was taken, but it appears to be a separate instance from the Arabian Nights party. The Liberal Party of Canada, which Trudeau leads, confirmed to Global News that it is Trudeau who appears in the video. The prime minister is currently on the campaign trail in advance of the country’s federal elections on October 21. He indicated to reporters that he planned to continue campaigning, saying he’ll have to work harder now to convince voters of his values. He’s already facing the fallout from an unrelated political corruption scandal in which he and his political allies were accused of improperly pressuring Canada’s now-former minister of justice and attorney general, Jody Wilson-Raybould, to drop criminal corruption charges against the Quebec-based engineering company SNC-Lavalin. That scandal has somewhat tarnished his shiny image as a proponent of progressive values, as Vox’s Jen Kirby explained: Trudeau, who became prime minister in 2015, made transparency, inclusion, and openness a centerpiece of his leadership philosophy, and he became democracy’s biggest cheerleader. He modeled his governing platform on promoting gender equality and indigenous rights. His alleged pressure campaign and the eventual sidelining of Wilson-Raybould — a former prosecutor and indigenous woman who was once a symbol of Trudeau’s diverse and gender-balanced cabinet — very much looks like a betrayal of those values. The big question in the upcoming election was whether Trudeau’s record on other issues and his personal boyish charm would be enough to convince voters to reelect him. The revelation that he once chose to wear brownface multiple times — including at least once while he was a teacher attending a school function, no less — will certainly cause some voters to rethink whether Trudeau is the man they thought he was.
NEWS-MULTISOURCE
Page:Dictionary of National Biography volume 49.djvu/97 accordingly allied himself to Mansfeld and the protestant union in October 1626 (Negotiations, p. 571); but a victory over the imperialists was neutralised by a truce and Mansfeld's subsequent death (ib. pp. 579–593). Suspicion was aroused by the conduct of Bethlen, who complained that the promised subsidy of ten thousand dollars a month from England had not been paid (ib. p. 595). Nevertheless Roe succeeded in keeping Gabor more or less on the side of the German protestants, and also managed in their interest to quash the proposal for a treaty between Spain and the Porte (ib. p. 452). At the same time he was a warm friend of the Greek church in Turkey, and on intimate terms with its celebrated patriarch, Cyril Lucaris. Cyril presented through Roe to James I the celebrated ‘Codex Alexandrinus’ of the whole Bible, which the patriarch brought from his former see of Alexandria; it was transferred with the rest of the royal library to the British Museum in 1757 (cf. Negotiations, p. 618). Roe was himself a collector of Greek manuscripts. Twenty-nine Greek and other manuscripts, including an original copy of the synodal epistles of the council of Basle, which he brought home, he presented in 1628 to the Bodleian Library (, Annals of the Bodleian, 2nd ed., pp. 70, 72). A collection made by him of 242 coins was given by his widow, at his desire, to the Bodleian after his death. He also searched for Greek ‘marbles’ in behalf of the Duke of Buckingham and the second Earl of Arundel. ‘Naked I came in, and naked I goe out,’ he wrote on 6 April 1628, on finally leaving his embassy at Constantinople (ib. p. 810). June found him at Smyrna, whence he sailed to Leghorn, and on the way fought an engagement with Maltese galleys, during which he was struck down by a spar which had fortunately checked a ball (ib. pp. 826–7). Travelling across the continent, Roe visited Princess Elizabeth, the electress-palatine and queen of Bohemia, at Rhenen, and, in compliance with her wish, adopted the two daughters of Baron Rupa, an impoverished adherent of the elector (, Princesses of England, vi. 471). Reaching the Hague in December 1628, he presented to the Prince of Orange a memorial in which he urged that Bethlen Gabor should again be subsidised, and that Gustavus Adolphus should march into Silesia, where Bethlen would join him (Camden Society Miscellany, vol. vii.; Letters of Sir T. Roe, ed. S. R. Gardiner, pp. 2–4). He left the Hague at the end of February for England, and in May 1629 he submitted another memorial to the same effect to Charles I, and in the result was despatched in June on a mission to mediate a peace between the kings of Sweden and Poland (Instructions, printed ib. pp. 10–21). He visited the Swedish camp near Marienburg, and then the Polish camp, brought about a meeting of commissioners in September 1629, and succeeded in arranging a truce for six years (ib. p. 39). He was in close personal relations with Gustavus Adolphus, whose generous character strongly impressed him, while the Swedish king admitted that he owed chiefly to Roe the suggestion, which he put into effect in June 1630, of carrying the war into Germany and placing himself at the head of the protestant alliance. He called Roe his ‘strenuum consultorem,’ and sent him a present of 2,000l. on his victory at Leipzig (, Familiar Letters, ed. 1754, p. 228). After arranging the truce between Poland and Sweden, Roe drew up a treaty at Danzig settling the claims of that city with which he had been instructed to deal, and, breaking his homeward journey at Copenhagen, he concluded a treaty with Denmark which in other hands had been languishing for years. In the summer of 1630 Roe returned to England from this successful mission. The king had a gold medal struck in his honour, bearing the shields of Sweden and Poland and the date 1630, and on the reverse the crown of England supported by two angels, and beneath a monogram of Roe's initials (Cal. State Papers, Dom. 1630–1, p. 466). This medal Dame Eleanor Roe presented to the Bodleian Library in 1668 (, Annals, 2nd edit. p. 134). But beyond this barren honour the ambassador received no rewards. For six years he lived in retirement, suffering from limited means; his wife's purchased pension was in arrears; even payment was long withheld from him on account of the diamonds which he bought for the king at Constantinople, and the pleasures of a country life ill requited him for the lack of state employment. He ‘bought a cell’ for his old age at Stanford, and afterwards moved to Bulwick and then to Cranford (Cal. State Papers, Dom. 1629–31, pp. 344, &c.). At last, in January 1636–7, he was appointed chancellor of the order of the Garter, to which a year later a pension of 1,200l. a year was added (ib. 1637–8, p. 214). Meanwhile he was in constant correspondence with the queen of Bohemia, who addressed him as ‘Honest Tom,’ and who depended on his influence to counteract the indiscretions of her London agent, Sir Francis Nethersole [q. v.] (, Princesses, vi. 556–66). In 1638 he was once more sent abroad as ambassador extraordinary to attend the
WIKI
Third Time Lucky (TV series) Third Time Lucky is a British comedy television series which originally aired on ITV in 1982. A man meets his divorced first wife, and rekindles his romance with her. Main cast * Derek Nimmo as George Hutchenson * Nerys Hughes as Beth Jenkins * Debbie Farrington as Clare Hutchenson * Lorraine Brunning as Jenny Hutchenson * Clifford Earl as Bruce Jenkins * Angela Douglas as Millie King * Angela Piper as Sally Jenkins * Gerald Flood as Henry King * Robert Craig-Morgan as Peter * Nigel Greaves as Christopher Tracy
WIKI
Understanding Python Programming Language Python is a powerful dynamically typedinterpreted and object oriented high level programming language for Rapid Application DevelopmentPython was created in 1991 by Guido van Rossum as a multi-purpose programming language with easy to use and simple syntax. What makes Python Good Following are some of the important features of Python programming language. Simple and Expressive Syntax Python has a simple syntax with focus on solution rather than syntax, which makes it easy for programmers to write programs in Python. Portability (Write once run everywhere) Software programs written in Python are platform independent; this means you can execute programs written in python on all supported platform (including Windows , macOS and Linux) without making any changes in your code. Broad Collection of Standard Libraries Python has a huge set of standard libraries, which enables rapid application development without reinventing the wheel. Extendable and Embeddable You can extend the functionality of Python programs by writing Python Modulesin C or C++ and on the other hand Python itself can be embedded in applications written in C or C++ to enable scripting using Python language. Object Oriented Language Python supports Object Oriented Programming language. Python 2 vs. Python 3 There are two available flavors of Python, Python 2 and Python 3. Python 3 is the recommended version for development of new applications as Python 2 is approaching it’s end of life in 2020. Python Implementations Python itself is a programming language specification that is implemented by different vendors. In this section we will explore some of the major implementations of Python language. CPython The reference implementation written in C is CPythonCPython compiles the source code to intermediate bytecode which is then executed by the CPython Runtime or Virtual MachineCPython enables us to extend the functionality using modules written in native C. Jython The implementation of Python for JVM (Java Virtual Machine) is known Jython. Jython compiles the source code to JVM bytecode that will be executed by JVM. Jython enables use of Java code and libraries as Python modules. IronPython IronPython is the Python implementation for .NET Framework. IronPython enables us to use .NET Framework code and libraries from within the Python code. Python Distributions Following are few of most popular distributions other than official CPythondistribution. ActivePython ActivePython is Python programming language implementation provided by ActiveStateActivePython is available for all major platforms including Microsoft WindowsmacOs and Linux. Anaconda Anaconda is an open source Python distribution. Anaconda distribution also includes implementation R Language for statistical computing. An uses Anacondafor package managment and provides a user firendly GUI based installer for all major platforms including Microsoft WindowsmacOs and Linux. In next section we explore different approaches to execute Python code. Programming with Python Series 1. Python: Getting Started with Python Virtual Environments and pip References 1. What is Python? Executive Summary This article is part of Python Programming, IoT, Big Data, Data Science, AI and Machine Learning Tutorials Series, please click here to visit the complete list of articles and tutorials in this series. That’s it, hope you enjoyed it. You like this article, have any questions or suggestions please let us know in the comments section. Thanks and Happy Learning! Shoket Mahmood Ahmed One thought on “Understanding Python Programming Language Leave a Reply Your email address will not be published. Required fields are marked * Back to top
ESSENTIALAI-STEM
Lehrke Inlet Lehrke Inlet (-70.81667°N, -61.75°W) is an ice-filled inlet, 8 nmi wide, which recedes southwest for 17 nmi between Cape Boggs and Cape Sharbonneau, along the east coast of Palmer Land, Antarctica. Location The Lehrke Inlet of the Weddell Sea is on the east coast of Palmer Land, at the north end of the Black Coast of the Antarctic Peninsula. It is south of the Eielson Peninsula and Dolleman Island, and north of the Imshaug Peninsula and Steele Island. The Eland Mountains are to the northwest and the Welch Mountains are to the west-southwest. Glaciers feeding the inlet include, clockwise from the south, Gain Glacier, Dana Glacier, Yates Glacier, Matheson Glacier and Ashton Glacier. Other features include Cape Boggs, Cape Sharbonneau, Mount Hill on the Imshaus Peninsula, Neilson Peak on the Parmalee Massif, and Dawson Head. Discovery and name Lehrke Inlet was discovered by members of the United States Antarctic Service (USAS) who explored this coast on land and from the air in 1940. It was named for Lester Lehrke, boatswain's mate of USS Bear, one of the expedition ships, and sailmaker of the East Base. Dana Glacier -70.91667°N, -62.38333°W. A glacier about 30 nmi long. It drains the slopes at the southeast side of the Welch Mountains and flows east then northeast to discharge into the head of Lehrke Inlet just north of Parmelee Massif. Mapped by the United States Geological Survey (USGS) in 1974. Named by the United States Advisory Committee on Antarctic Names (US-ACAN) for Commander John B. Dana, United States Navy, Commanding Officer of United States Navy Squadron VXE-6 in Antarctica during Operation Deep Freeze, 1973; he was squadron Executive Officer, 1972, and Operations Officer, 1971. Yates Glacier -70.81667°N, -62.2°W. A glacier 3 nmi south of Matheson Glacier, discharging into the west side of Lehrke Inlet. Named by the UK Antarctic Place-Names Committee (UK-APC) after J. Yates, British Antarctic Survey (BAS) surveyor who worked in the general vicinity of this feature. Matheson Glacier -70.78333°N, -62.08333°W. A glacier 11 nmi long, lying 2 nmi south of Ashton Glacier, which it parallels, and flowing in an east direction to the west side of Lehrke Inlet. First sighted by members of the USAS who explored this coast by land and from the air in December 1940. First charted by a joint party consisting of members of the Ronne Antarctic Research Expedition (RARE) and Falkland Islands Dependencies Survey (FIDS) in 1947. Named by the FIDS for J. Matheson, a member of the FIDS at the Port Lockroy and Hope Bay bases, 1944-46. Ashton Glacier -70.73333°N, -61.95°W. A glacier 9 nmi long, which flows east-southeast from Mount Thompson to the northwest side of Lehrke Inlet, on the east coast of Palmer Land. The glacier was photographed from the air in December 1940 by the USAS, and was probably seen by the USAS ground survey party which explored this coast. A joint party consisting of members of the RARE and the FIDS charted the glacier in 1947. Named by the FIDS for L. Ashton, carpenter with the FIDS at the Port Lockroy and Hope Bay bases in 1944-45 and 1945-46, respectively. Dolleman Island -70.61667°N, -60.75°W. Rounded, ice-covered island, 13 nmi long, lying 8 nmi east of Cape Boggs. Discovered in 1940 by members of East Base of the US AS. Named for Heinrich Dolleman, tractor driver for the East Base. Cape Boggs -70.55°N, -61.38333°W. Bold, ice-covered headland marking the east extremity of Eielson Peninsula. Discovered by members of East Base of the USAS who charted this coast by land and from the air in 1940. Named for S.W. Boggs, Geographer, United States Department of State, whose political and geographical studies of Antarctica were used by the USAS. Cape Sharbonneau -70.83333°N, -61.45°W. A rounded, snow-covered headland forming the south side of the entrance to Lehrke Inlet. Members of the East Base of the USAS explored this coast in 1940. They charted this feature as an island which they named for Charles W. Sharbonneau, carpenter at East Base. It was determined to be a cape of Palmer Land in 1947 by a joint sledge party consisting of members of the RARE and the FIDS. Imshaug Peninsula -70.88333°N, -61.58333°W. A broad, snow-covered peninsula at the south side of Lehrke Inlet on the east coast of Palmer Land. Mapped by USGS in 1974. Named by US-ACAN for Henry A. Imshaug, United States Antarctic Research Program (USARP) biologist in a longrange biosystematic study of subantarctic floras with research at Islas Juan Ferndndez, 1965-66; Falkland Islands, 1967-68; Chilean archipelago, 1969; Campbell Island, 1969-70; and lies Kerguelen, 1970-71. Mount Hill -70.93333°N, -61.7°W. A mountain, 945 m high, standing 8 nmi southwest of Cape Sharbonneau at the east side of the head of Lehrke Inlet. Discovered by members of the East Base of the USAS who explored this coast by land and from the air in 1940. They named it Cape Hill for Archie C. Hill, cook at East Base. In 1947 it was determined to be a mountain distinct from Cape Sharbonneau to the northeast by a joint sledge party consisting of members of the RARE and the FIDS. Parmelee Massif -70.96667°N, -62.16667°W. A rugged mountain massif standing west of the base of Imshaug Peninsula at the head of Lehrke Inlet. Mapped by USGS in 1974. Named by US-ACAN for David F. Parmelee, USARP biologist who studied birds of the Antarctic pack ice ecosystems in the Antarctic Peninsula area from aboard icebreakers in 1972-73, 1973-74 and 1974-75. Neilson Peak -70.95°N, -62.21667°W. A peak in the central part of Parmelee Massif at the head of Lehrke Inlet. Mapped by USGS in 1974. Named by US-ACAN for David R. Neilson, USARP biologist at Palmer Station, 1975. Dawson Head -70.71667°N, -61.95°W. A high coastal point, or headland, along the northwest side of Lehrke Inlet. Mapped by USGS in 1974. Named by US-ACAN for Captain Opie L. Dawson, USCG (Ret.), Commanding Officer of the USCGC Glacier during the International Weddell Sea Oceanographic Expedition, 1968.
WIKI
Talk:Grote Broek Creation with help from nl.wikipedia This page was in part created based on the already existing page at nl.wikipedia, using this diff Mujinga (talk) 16:28, 12 April 2019 (UTC)Squatting
WIKI
Ch 13 Key Concepts Flashcards Preview SBL Exam 1 > Ch 13 Key Concepts > Flashcards Flashcards in Ch 13 Key Concepts Deck (27) Loading flashcards... 1 most common type of cancer in children, may be derived from either precursor B or T cells - highly aggressive tumors manifest with signs and sx of bone marrow failure, or as rapidly growing masses - tumor cells contain genetic lesions that block differentiation, leading to the accumulation of immature, nonfunctional blasts acute lymphoblastic leukemia/lymphoblastic lymphoma 2 most common leukemia in adults - tumor of mature B cells that usually manifests with bone marrow and lymph node involvement - indolent course, commonly associated with immune abnormalities, including an increased susceptibility to infection and autoimmune disorders small lymphocytic lymphoma/chronic lymphocytic leukemia 3 most common indolent lymphoma in adults - tumor cells recapitulate the growth pattern of normal germinal center B cells; most cases are associated with a (14:18) translocation that results in the over-expression of BCL2 follicular lymphoma 4 most common lymphoma of adults - heterogenous group of mature B cell tumors that share a large cell morphology and aggressive clinical behavior - rearrangements or mutations of BCL6 gene are recognized associations; one third carry a (14:18) translocation involving BCL2 and may arise from follicular lymphomas diffuse large B cell lymphoma 5 very aggressive tumor of mature B cells that usually arises at extranodal sites - strongly associated with translocations involving the MYC proto-oncogene - tumor cells often are latently infected by EBV burkitt lymphoma 6 plasma cell tumor that manifests with multiple lytic bone lesions associated with pathologic fractures and hypercalcemia - neoplastic plasma cells suppress normal humoral immunity and secrete partial immunoglobulins that are nephrotoxic multiple myeloma 7 multiple myoloma is associated with diverse translocations inolving what locus? IgH - leads to frequent dysregulation and over-expression of D cyclins 8 plasma cell neoplasm - common in older adults, progresses to myeloma at a rate of 1% of patients per year - M spike, but no other plasma cell neoplasm characteristics monoclonal gammopathy of unknown significance 9 plasma cell neoplasm - disseminated disease that pursues an usually indolent course smoldering myeloma 10 plasma cell neoplasm - solitary bone lesion identical to disseminated myeloma - most progress to myeloma within 7-10 years solitary osseous plasmacytoma 11 plasma cell neoplasm - solitary mass, usually in the upper aerodigestive tract - rarely progresses to systemic disease extramedullary plasmacytoma 12 B cell lymphoma that exhibits plasmacytic differentiation - clinical sx dominated by herviscosity related to high levels of tumor-derived IgM - highly associated with mutations in the MYD88 gene lymphoplasmacytic lymphoma 13 tumor of naive B cells that pursues a moderately aggressive course and is highly associated with translocations involving the cyclin D1 gene mantle cell lymphoma 14 indolent tumors of antigen-primed B cells that arise at sites of chronic immune stimulation and often remain localized for long periods of time marginal zone lymphoma 15 morphologically distinct, very indolent tumor of mature B cells that is highly associated with mutations in the BRAF serine/threonine kinase hairy cell leukemia 16 peripheral NK/T cell lymphoma: - aggressive T cell tumor, associated in a subset with activating mutations in the ALK tyrosine kinase anaplastic large cell lymphoma 17 peripheral NK/T cell lymphoma: - aggressive tumor of CD4 T cells that is uniformly associated with HTLV-1 infection adult T cell leukemia/lymphoma 18 peripheral NK/T cell lymphoma: - indolent tumor of cytotoxic T cells or NK cells that is associated with mutations in the transcription factor STAT3 and with autoimmune phenomena and cytopenias large granular lymphocytic leukemia 19 peripheral NK/T cell lymphoma: - aggressive tumor, usually derived from NK cells, that is strongly associated with EBV infection extranodal NK/T cell lymphoma 20 unusual tumor consisting mostly of reactive lymphocytes, macrophages, eosinophils, plasma cells and stromal cells mixed with rare tumor giant cells called **Reed-Sternberg cells** Hodgkin lymphoma 21 what are the two broad types of Hodgkin lymphoma? 1. classical 2. lymphocyte predominant 22 which form of Hodgkin lymphoma is frequently associated with acquired mutations that activate transcription factor NF-kB and EBV infection? classical - Reed-Sternberg cells make multiple cytokines and chemokines that influence the host response, and the host response in turn makes factors that support the growth of tumor cells 23 lymphocyte predominant Hodgkin lymphoma expresses what type of markers? B cell markers - NOT associated with EBV 24 aggressive tumors comprised of immature myeloid lineage blasts, which replace the marrow and suppress normal hematopoiesis - associated with diverse acquired mutations that lead to expression of abnormal transcription factors, which interfere with myeloid differentiation - often associated with mutations in genes encoding growth factor receptor signaling pathway components or regulators of the epigenome acute myeloid leukemias (AMLs) 25 tumors in which production of formed myeloid elements is initially increased, leading to high blood counts and extramedullary hematopoiesis - commonly associated with mutations that lead to constitutive activation of tyrosine kinase, which mimic signals from normal growth factors myeloproliferative disorders - all can transform to acute leukemia and to a spent phase of marrow fibrosis associated with anemia, thrombocytopenia, and splenomegaly 26 what are the most common pathogenic kinases of myeloproliferative disorders? - BCR-ABL (associated with CML) - mutated JAK2 (associated with polycythemia vera and primary myelofibrosis) 27 poorly understood myeloid tumors characterized by disordered and ineffective hematopoiesis and dysmaturation - recently shown to frequently harbor mutations in splicing factors and epigenetic regulators - manifest with one of more cytopenias and progress in 10-40% of cases to AML myelodisplastic symdromes
ESSENTIALAI-STEM
Autophagy Activator Autophagy Activator Autophagy is the major ‘cleaning system’ of the body. In autophagy the body recognizes damaged cells and recycles them Cellular self-eating modulates immunity and elimination of pathogens via autophagy. Autophagy gets triggered in response to stress like infections, starvation, high exertion or certain compounds such as various phytochemicals. You can promote autophagy with positive stressors such as intermittent fasting, regular sauna, exercise and cold exposure. When it comes to positive stressors in nutrition, it appears that the best way to activate autophagy is by fasting. Therefore, water is the best drink in terms of autophagy. However, some herbs have been shown to stimulate the pathways that are activated in autophagy, like AMPK. INGREDIENTS: • 2 tbsp cardamom • 2 tbsp curcumin • 2 tbsp ginger • 1 tbsp cinnamon • 1 tbsp spirulina • ½ tsp black pepper • ½ tsp cayenne pepper • ½ tsp rosemary • ½ tsp cloves Mix all the herbs and spices in a large Zip-lock bag or a Mason jar. Stir the blend together and store in a cupboard away from direct sunlight and moisture. Take 1 tsp daily when you are fasting, for example, in the morning. Mix with 3–4 dl hot water. Drink and enjoy slowly. 1 comment Write a comment Joe Joe The recipe to activate autophagy looks interesting, but is there any science behind why it would do this? For instance, why wouldn’t these ingredients subdue autophagy while fasting, as most other foods would do, rather than activate it? Write a comment Comments are moderated
ESSENTIALAI-STEM
Page:The Urantia Book, 1st Edition.djvu/1166 1100 All of this gravitates consciousness toward the subconscious rather than in the direction of the zone of spiritual contact, the superconscious. Many mystics have carried their mental dissociation to the level of abnormal mental manifestations. The more healthful attitude of spiritual meditation is to be found in reflective worship and in the prayer of thanksgiving. The direct communion with one's Thought Adjuster, such as occurred in the later years of Jesus' life in the flesh, should not be confused with these so-called mystical experiences. The factors which contribute to the initiation of mystic communion are indicative of the danger of such psychic states. The mystic status is favored by such things as: physical fatigue, fasting, psychic dissociation, profound aesthetic experiences, vivid sex impulses, fear, anxiety, rage, and wild dancing. Much of the material arising as a result of such preliminary preparation has its origin in the subconscious mind. However favorable may have been the conditions for mystic phenomena, it should be clearly understood that Jesus of Nazareth never resorted to such methods for communion with the Paradise Father. Jesus had no subconscious delusions or superconscious illusions. Evolutionary religions and revelatory religions may differ markedly in method, but in motive there is great similarity. Religion is not a specific function of life; rather is it a mode of living. True religion is a wholehearted devotion to some reality which the religionist deems to be of supreme value to himself and for all mankind. And the outstanding characteristics of all religions are: unquestioning loyalty and wholehearted devotion to supreme values. This religious devotion to supreme values is shown in the relation of the supposedly irreligious mother to her child and in the fervent loyalty of nonreligionists to an espoused cause. The accepted supreme value of the religionist may be base or even false, but it is nevertheless religious. A religion is genuine to just the extent that the value which is held to be supreme is truly a cosmic reality of genuine spiritual worth. The marks of human response to the religious impulse embrace the qualities of nobility and grandeur. The sincere religionist is conscious of universe citizenship and is aware of making contact with sources of superhuman power. He is thrilled and energized with the assurance of belonging to a superior and ennobled fellowship of the sons of God. The consciousness of self-worth has become augmented by the stimulus of the quest for the highest universe objectives—supreme goals. The self has surrendered to the intriguing drive of an all-encompassing motivation which imposes heightened self-discipline, lessens emotional conflict, and makes mortal life truly worth living. The morbid recognition of human limitations is changed to the natural consciousness of mortal shortcomings, associated with moral determination and spiritual aspiration to attain the highest universe and superuniverse goals. And this intense striving for the attainment of supermortal ideals is always characterized by increasing patience, forbearance, fortitude, and tolerance. But true religion is a living love, a life of service. The religionist's detachment from much that is purely temporal and trivial never leads to social isolation, and it should not destroy the sense of humor. Genuine religion takes nothing
WIKI
Template:Did you know nominations/Hao Peng (PRC) Hao Peng (PRC) * ... that Hao Peng has worked as a sent-down youth, a flight control system technician, vice chairman of Tibet, and governor of Qinghai? * Reviewed: World Meteorological Organization Created by Zanhe (talk). Self nominated at 14:47, 12 May 2013 (UTC). * Symbol question.svg Hook verified. New enough. Long enough. Only problem is the sources do not say "promoted" or "transferred" etc. They simply have dates and positions in chronological lists. A rewording may be necessary. Δρ.Κ. λόγοςπράξις 21:11, 14 May 2013 (UTC) * I removed a couple of instances of "promoted", but left intact a few other instances of very obvious promotions and transfers. When he was moved from one province to another, I think it's safe to say he was "transferred", and when he was appointed executive vice chairman, when his previous title was simply vice chairman, it's safe to say he was promoted. -Zanhe (talk) 12:40, 15 May 2013 (UTC) * I disagree. It's never safe to add out own words especially working with primary sources such as chronological lists because such action constitutes original research. Another example: After university Hao Peng joined the Aviation Industry Corporation of China, working at its flight control system factory in Lanzhou, Gansu. He started as a technician, steadily rising through the ranks to become the general manager of the factory in 1994. where the bolded text does not appear on any of the two lists that are supplied as sources. No mention of "joined", "Aviation Industry Corporation of China" or "steadily rising through the ranks to become". Even "general manager" is translated as "director" by Google. No matter how obvious to someone, these added words are original research. Δρ.Κ. λόγοςπράξις 13:09, 15 May 2013 (UTC) * Well, if you cannot add any extra words, even safe ones like "join" and "transfer", how do you write prose from a list? As for "Aviation Industry Corporation of China", it's just the English name of the Chinese company "中航工业" in the source (just go to official web site and search for the Chinese term). As for "director", the Chinese term in the source is "厂长", which literally means "factory head", and is usually translated as manager, general manager, or (less commonly) director (BTW, Google translate is generally terrible for Chinese). I've now changed it to "director" anyways and removed "rising through the ranks". -Zanhe (talk) 13:58, 15 May 2013 (UTC) * Symbol confirmed.svg Writing prose from a list should be done with great care and in a very minimalist way if at all. Usually the exclusive presence of lists in a bio indicates that the subject is not notable enough to be covered in word-articles by other news organisations. For instance the word "joined" is not accurate if he was "ordered" to go to that factory. But this is not the place to argue these points. I think the article as it stands now is sufficiently minimalist to pass for DYK. Δρ.Κ. λόγοςπράξις 14:25, 15 May 2013 (UTC)
WIKI
Sunday, May 19, 2024 A red milkweed beetle eating a milkweed leaf. (Photo: Jeanine Farley) As more people have become aware of the benefits of milkweed as a host plant for monarch butterflies, you will likely see more patches of it as you travel through the city. And if you look carefully, long before the monarchs arrive you may see a spotted, long red beetle with curled black antennae. This is a red milkweed beetle. The red milkweed beetle (Tetraopes tetrophthalmus) is a long-horned beetle, sometimes called “four eyes” as its Latin name indicates, because each antenna bisects an eye, literally giving it four. There are different kinds of milkweed beetles, specializing in different types of milkweed; the red milkweed beetle prefers common milkweed (Asclepias syriaca).  An adult eats milkweed leaves and flowers, cutting the veins of the leaf below where it eats and draining the sap from the area. The beetle feeds in the drained area, so it is less exposed to the sticky, milk-colored latex that gives milkweed its name. If a red milkweed beetle gets the latex on its mouth, it cleans itself by rubbing its mouth on the leaf, because if the latex hardens, it can gum up the beetle’s mouth. Many species of insects try to camouflage themselves from predators, but red milkweed beetles stand out against the green leaves of milkweed plants. They can do this because milkweeds are toxic to many predators, which means milkweed beetles, as consumers of milkweed, are also toxic to many predators. This is the same strategy used by monarch butterflies, also consumers of milkweed. The beetle is sometimes called “four eyes” because each antenna bisects an eye, literally giving it four. (Photo: Jeanine Farley) If you were to pick up a red milkweed beetle, you might hear it make a shrill squeaking sound by rubbing together structures on the front and back of the thorax. It makes this sound when it is stuck in a milkweed blossom, is fighting, falls on its back or is in other sorts of distress. When it crawls or feeds, a red milkweed beetle may make a soft purring sound. Life cycle In early summer, the female beetle lays eggs at the base of a milkweed stem. The larvae/grubs travel down the stem to the soil, feeding on the milkweed’s roots until fall. They overwinter in the root and form a pupal case/chrysalis in the soil the following spring. Adult red milkweed beetles emerge in early summer when the milkweed begins to flower. Red milkweed beetles and monarchs Native long-horned beetles such as the red milkweed beetle have a valuable place in our ecosystem, helping to preserve the balance of nature. Red milkweed beetles, herbivores that eat only milkweed, are not harmful to monarchs or harm monarch eggs or larvae, so you do not need to remove them from your milkweed plants. The two species can and do coexist peacefully. Jeanine Farley is an educational writer who has lived in the Boston area for more than 30 years. She enjoys taking photos of our urban wild things.
ESSENTIALAI-STEM
Carotid artery disease Carotid artery disease occurs when fatty deposits (plaques) clog the blood vessels that deliver blood to your brain and head (carotid arteries). The blockage increases your risk of stroke, a medical emergency that occurs when the blood supply to the brain is interrupted or seriously reduced. Stroke deprives your brain of oxygen. Within minutes, brain cells begin to die. Stroke is the fourth most common cause of death and the leading cause of permanent disability in the U.S. Carotid artery disease develops slowly. The first sign that you have the condition may be a stroke or transient ischemic attack (TIA). TIA is a temporary shortage of blood flow to your brain. Treatment of carotid artery disease usually involves a combination of lifestyle changes, medication and sometimes surgery. Symptoms Causes Risk factors Complications In its early stages, carotid artery disease often doesn't produce any signs or symptoms. The condition may go unnoticed until it's serious enough to deprive your brain of blood, causing a stroke or TIA. Signs and symptoms of a stroke or TIA include: • Sudden numbness or weakness in the face or limbs, often on only one side of the body • Sudden trouble speaking and understanding • Sudden trouble seeing in one or both eyes • Sudden dizziness or loss of balance • Sudden, severe headache with no known cause When to see a doctor Seek emergency care if you experience any signs or symptoms of stroke. Even if they last only a short while and then you feel normal, see a doctor right away. You may have experienced TIA, an important sign that you're at risk of a full-blown stroke. Talk to your doctor if you have risk factors for carotid artery disease. Even if you don't have any signs or symptoms, your doctor may recommend aggressive management of your risk factors to protect you from stroke. Seeing a doctor early increases your chances that carotid artery disease will be found and treated before a disabling stroke occurs. © 1998-2015 Mayo Foundation for Medical Education and Research (MFMER). All rights reserved. Terms of use
ESSENTIALAI-STEM
Firewall open port 3389 Hello I am very basic in Linux. Needed help for the following problem I have the following situation one nethserver 6.8 server with two network cards Red ( 192.168.1.15 ) and green ( 192.168.10.1 ) A Win7 computer 192.168.1.30 wanted to remotely access a PC win7 192.168.10.120 over port 3389 . This can be done through the webgui. How? Tanks in advance. Hi, And Welcome! First, please read this: http://docs.nethserver.org/en/latest/firewall.html and this: http://docs.nethserver.org/en/latest/firewall.html#port-forward After that, if you need more help, please ask. Best regards, Gabriel EDIT: 1 Like Problem solved. I was almost there , I had created a host and had made ​​the port forwarding only had completed the ‘allow only from’ field with 192.168.1.0 . It was enough to clear this field and got to work. Thank you for quick solution to the problem Paulo Paes 3 Likes
ESSENTIALAI-STEM
Roman Catholic Archdiocese of Dakar The Roman Catholic Archdiocese of Dakar (Dakaren(sis), French: Archidiocèse catholique romain de Dakar) is the Metropolitan See for the ecclesiastical province of Dakar in Senegal. History * February 2, 1863: Established as Apostolic Vicariate of Senegambia from the Apostolic Vicariate of Two Guineas and Senegambia in Gabon * January 27, 1936: Renamed as Apostolic Vicariate of Dakar * September 14, 1955: Promoted as Metropolitan Archdiocese of Dakar Special churches The seat of the archbishop is Cathédrale Notre Dame des Victoires in Dakar. There is a Minor Basilica at Basilique Notre-Dame de la Délivrance in Poponguine. Vicars Apostolic of Senegambia * Magloire-Désiré Barthet (1889-1898) * Joachim-Pierre Buléon, C.S.Sp. (1899-1900) * François-Nicolas-Alphonse Kunemann, C.S.Sp. (1901-1908) * Hyacinthe-Joseph Jalabert, C.S.Sp. (1909-1920) * Louis Le Hunsec, C.S.Sp. (1920-1926), appointed Superior General of the Congregation of the Holy Spirit Vicars Apostolic of Dakar * Auguste Grimault, C.S.Sp. (1927-1946) * Marcel-François Lefebvre, C.S.Sp. (1947-1955 see below) Archbishops of Dakar * Marcel-François Lefebvre, C.S.Sp. (see above 1955–1962), appointed Archbishop (personal title) of Tulle, France * Hyacinthe Thiandoum (1962-2000) (Cardinal in 1976) * Théodore-Adrien Sarr (2000-2014) (Cardinal in 2007) * Benjamin Ndiaye (2014–present) Auxiliary Bishop * Georges-Henri Guibert, C.S.Sp. (1949-1960), appointed Bishop of Saint-Denis-de-La Réunion Suffragan Diocese * Kaolack * Kolda * Saint-Louis du Sénégal * Tambacounda * Thiès * Ziguinchor
WIKI
Why we need IPv6 ? IPv6, the successor standard to IPv4, for existing networks that currently use IPv4 communications could solve the basic problem of the availability of only approximately 4.3 billion IPv4 addresses. Ceasing use of IPv4 addresses and only using IPv6 addresses, however, is impractical and thus maintaining an environment that enables mutual communication between IPv4 and IPv6 (dual stack environment) will be required for a certain period. Completing IPv6 support is therefore considered to require a large amount of both time and money. IPv6 addresses the main problem of IPv4, that is, the exhaustion of addresses to connect computers or host in a packet-switched network. IPv6 has a very large address space and consists of 128 bits as compared to 32 bits in IPv4. Therefore, it is now possible to support 2^128 unique IP addresses, a substantial increase in number of computers that can be addressed with the help of IPv6 addressing scheme. It is widely expected that the Internet will use IPv4 alongside IPv6 for the foreseeable future. IPv4-only and IPv6-only nodes cannot communicate directly, and need assistance from an intermediary gateway or must use other transition mechanisms. Leave a Reply
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/The next Shane Warne The result was delete. Aaron Brenneman (talk) 16:18, 13 August 2011 (UTC) The next Shane Warne * – ( View AfD View log ) Article is not encyclopedic, rather speculation on who the "next great player" will be for Australia's cricket team. Article may be better suited to be a section on the Shane Warne page, rather than it's own page. Wildthing61476 (talk) 14:10, 3 August 2011 (UTC) * Keep It's a common term that's been applied to each spinner since Warne's retirement (IE general coverage of notability). Exactly how long and hard did you look for sources to improve it in the 20 minutes of tagging from the initial creation? Lugnuts (talk) 14:14, 3 August 2011 (UTC) * Comment I've heard the term "The Next Michael Jordan", "The Next Wayne Gretzky" etc. tossed around for years about players, however it doesn't warrent it's OWN article. I've got no problem however with this being moved to a section on the Shane Warne article itself. It's good info actually, but to warrant its own article I think isn't needed. Wildthing61476 (talk) 14:17, 3 August 2011 (UTC) * Delete. Verging into WP:CRYSTAL territory. I agree that the discussion itself may be sufficiently notable but certainly not on its own, where it serves only as a collection of critical speculation. A merge per the above comment could be another choice, but several of the sources are just from blogs of questionable reliability. Several Times (talk) 16:29, 3 August 2011 (UTC) * Not sure about CRYSTAL as the term has been banded about historically (IE x player is billed as "the next Shane Warne"). There's no claim anywhere that they WILL be as good as Warne, but that the term has enough general coverage due to the crisis in Australian cricket. Strewth! Lugnuts (talk) 17:47, 3 August 2011 (UTC) * I wouldn't begin to claim that use of the phrase itself violates WP:CRYSTAL, but rather that having an article consisting only of summarized speculation violates it. Even if the article doesn't claim anything about a Shane Warne replacement's abilities, the claim that one of these individuals could replace him isn't encyclopedic without further context and reliable sources. Several Times (talk) 19:04, 3 August 2011 (UTC) * Delete - I see no encyclopedic value in this list, probably fails a whole list of article criteria as well. AssociateAffiliate (talk) 18:08, 3 August 2011 (UTC) * Article has been expanded and improved to have encyclopedic value. Lugnuts (talk) 11:41, 4 August 2011 (UTC) * Note: This debate has been included in the list of Australia-related deletion discussions. — • Gene93k (talk) 20:22, 3 August 2011 (UTC) * Note: This debate has been included in the list of Cricket-related deletion discussions. — • Gene93k (talk) 20:23, 3 August 2011 (UTC) * Delete original research and thought. Yes, it uses sources but only to advance the author's own concept. -- Mattinbgn (talk) 20:29, 3 August 2011 (UTC) * Comment - Just a general observation on the article: "Australian cricket team have been struggling to find a new off-spinner to replace him" - off-spinner period, I'd have thought any spinner who is good enough would do (it also implies to less informed readers that Warne was an off-spinner). AssociateAffiliate (talk) 20:30, 3 August 2011 (UTC) * Delete per all of the above. A fanism, unable to qualify. Notable references to the term on each player's page, properly cited, would be sufficient. S.G.(GH) ping! 20:50, 3 August 2011 (UTC) * Article has been expanded and improved to have encyclopedic value. Lugnuts (talk) 11:41, 4 August 2011 (UTC) * Hmmm. The article does come off a little like original research, but if the topic's notable, that's not a reason to delete but a reason to improve. I'm on the fence with this one. The term is widely used in the media (for those in doubt, google "next Shane Warne") and has been in use since 2006. But is it really an encyclopedic enough topic for a stand-alone article, or should it be merged to the Shane Warne article under a legacy section? Not sure. Will think on it for a few days... Jenks24 (talk) 21:57, 3 August 2011 (UTC) * Delete I assume that the absence of sources beside most of the names means that there is actually no evidence presented that anyone has ever called those players "the next Shane Warne". Not encyclopaedic. And even if they have been called "the next Shane Warne", that often says more about the person doing the calling than about the cricketer. Do we have any standards as to who has to be doing the calling? If I call the kid next door "the next Shane Warne", can he go in the list? This is a very silly article. HiLo48 (talk) 22:37, 3 August 2011 (UTC) * Has the kid who lives next door to you been picked to play for Australia? No, I didn't think so. Lugnuts (talk) 06:52, 4 August 2011 (UTC) * Ah, is being picked to play for Australia a requirement for appearing in the article? Please point us to where it says that? All I can see is "Each new spinner has been labeled..." The kid next door is new. If you think I'm being facetious and rude, maybe the quality of editing this article has attracted should indicate its absence of merit. HiLo48 (talk) 08:21, 4 August 2011 (UTC) * Well it goes without saying, which is why I didn't say it. Bottom line is that it's too much work for you to help, so you go for the easy option of delete. Lugnuts (talk) 11:38, 4 August 2011 (UTC) * Delete. Of course. Or perhaps it could be merged with The next Ian Botham and The next Garry Sobers. Johnlp (talk) 23:09, 3 August 2011 (UTC) * "delete of course" doesn't meet any policy rationale. Lugnuts (talk) 11:41, 4 August 2011 (UTC) * Keep: It might seem like nonsense, but this term is frequently used by the Australian media to refer to the Australian selectors' obsession with picking up then discarding spin bowlers like dirty laundry. In all seriousness though, a Google search for the term found 14,200 results. This "phenomenon" is clearly well documented, if you include the articles w. Nathan Lyon, recently selected for Australia's tour of Sri Lanka, has already been dubbed by at least one source "the new Warne" (here). The article could do with a rewording of the intro eg. "Australia's next Shane Warne" is a term used to describe..., and perhaps a table of each player's results at Test level. IgnorantArmies?! * Nice work on the expansion! Note to closing admins - most of the above delete comments were made by deletion monkeys who !voted before the expansion took place. Lugnuts (talk) 11:42, 4 August 2011 (UTC) * Thanks for assuming good faith and attacking editors who happen to have a different opinion than you. Wildthing61476 (talk) 13:05, 4 August 2011 (UTC) * Yes, it is better now (this thread HAS achieved something!), but still some way to go. Note to closing admins - most of the above Keep comments were made by editors with bad manners. HiLo48 (talk) 11:48, 4 August 2011 (UTC) * Interesting comments both above and below, HiLo48 :) Despite the expansion, I'm starting to think if the creation of a "Popular Culture" section in the Shane Warne main article might be a better idea than a whole article devoted to the subject. Thank God they never did make that TV series. IgnorantArmies?! * I really don't appreciate being referred to as a deletion monkey simply because I thought this page met the criteria for deletion. It does justify its existence better now through the addition of sources and context, but I'm still not convinced the phrase itself is genuinely encyclopedic outside the context of referring to Shane Warne. Several Times (talk) 17:40, 4 August 2011 (UTC) * I might accept "Australia's next Shane Warne" is a term used by crappy tabloid media to describe.., along with a rename of the article to "Idiotic speculation from the Murdoch media" HiLo48 (talk) 10:39, 4 August 2011 (UTC) * Comment - It's just a term, hardly worth having an article. Where would it stop? Dominic Cork was dubbed the new Ian Botham once, shall we have The Next Ian Botham article, as Johnlp says? Or when Kevin O'Brien retires, shall we have The Next Kevin O'Brien? Or maybe we can have The Next Andy Lloyd (some poor soul at there might want to become the 2nd Test opening batsman not to be dismissed, and take a knock to the head to achieve it)? Terms are always loosely thrown around by media, Monty Panesar and Ajantha Mendis are testament to that. AssociateAffiliate (talk) 13:27, 4 August 2011 (UTC) * Delete Speculative and not-Encyclopedic. This also isn't a notable categorisation of the cricketers listed. Nick-D (talk) 10:21, 5 August 2011 (UTC) * Delete as per WP:CRYSTAL. You may be called "next " and be dropped a month later. I notice high use of WP:BLUDGEON in this AfD. LibStar (talk) 12:18, 5 August 2011 (UTC) * Comment: WP:CRYSTAL doesn't really apply here, as the article doesn't deal with who the next Shane Warne will supposedly be, rather it deals with the term, as used repetitively enough by the Australian media to comply with WP:V. IgnorantArmies?! 13:27, 5 August 2011 (UTC) * the article implies anyone with that label will be as good as Shane Warne, why are statistics even provided? The term is so loosely used by journalists with no encyclopaedic definition of what it means precisely, you can play offspin and be called it. Is it someone that will be as good as Shane Warne? Complete POV. Why not make an article on the next Ronaldo or next Bill Clinton next Margaret Thatcher? LibStar (talk) 16:23, 5 August 2011 (UTC) * Delete. Unencyclopaedic nonsense. Just a phrase. Not even a often-used or well-known or notable phrase. Search "top of the class" - a common English language phrase returns 475 million Google hits and no Wikipedia article. Text could be merged to an article on the history of the Australian Cricket Team, if that exists. Bleakcomb (talk) 02:54, 8 August 2011 (UTC) * Delete as per WP:CRYSTAL. Stuartyeates (talk) 01:45, 10 August 2011 (UTC) * Delete. doesnt belong in a encyclopedia Naomib1996 (talk) 13:05, 11 August 2011 (UTC) * Merge a short mention into a new legacy section in Shane Warne. Certainly not encyclopaedic enough for its own article. However, as can be seen here it is a phrase used in reliable sources. The dilemma that Australia have in replacing Warne is also widely reported. I think that someone seeing this phrase in the media might well come here for more information on the concept. There are plenty of sources available and it could be wrapped up in a legacy section dealing with the succession question. Bridgeplayer (talk) 23:28, 12 August 2011 (UTC) * Merge to Shane Warne. References for individuals mentioned can be applied to their respective articles. Putting them together in a list like this can be construed as WP:SYNTHESIS. — Arsonal (talk + contribs) — 06:43, 13 August 2011 (UTC)
WIKI
Peniel Proper noun * 1) The, an interdenominational holiness rescue mission founded in Los Angeles in 1886 and dissolved in 1949.
WIKI
User:Coolcats58 I will "Replace this example text with information about you." at some point when I have the time and inclination... but not today.
WIKI
Dai Jinhua Dai Jinhua is a Chinese feminist cultural critic. She is a Professor in the Institute of Comparative Literature and Culture, Peking University. Her research interests include popular culture, film studies, and gender studies. She taught at the Beijing Film Academy before assuming professorship at the Institute of Comparative Literature and Culture and directorship of the Center for Film and Cultural Studies at Peking University. She has long been engaged in the New Rural Reconstruction Movement and the Green movement. She is the author of more than ten scholarly monographs. Her works have been translated into English, French, German, Italian, Spanish, Japanese, and Korean. Her literary, film and TV commentary have addressed an expanding audience in China, Taiwan and Hong Kong over the last decades. Ideas Dai is known for her early critique of the self-Orientalizing tendencies of filmmakers considered to be part of China's Fifth Generation such as Zhang Yimou and Chen Kaige. According to Dai, the historical imagery of their films tend to produce "oriental landscapes" that are oriented towards Western reception and prize recognition. In addition, she has written extensively about the representation of women in Chinese film. In one of her most well-known critiques, she examines the trope of gender-crossing through the myth of Hua Mulan (a woman who disguises herself as a man to join the army as a substitute for her father) in a series of women-centered films such as New Women, and revolutionary operas such as White-Haired Girl and the Red Detachment of Women. For her, this myth usefully indicates how drag, which can be subversive of patriarchal systems, can also reinforce them. Dai's work is generally critical of capitalism—she has been associated with the New Left. One of her analyses of consumerism in China traces the transformation of the word guangchang, which referred to the politicized space of the public square, but now is often used in the names of shopping centers. She has also described the market for souvenirs and historical tours related to the Maoist era as "imaginary nostalgia" that acts as a “substitute for historical consciousness". Biography * 1959 Born in Beijing * 1982 Graduated from Department of Chinese Literature, Peking University * 1987-1992 Lecturer, Department of Filmic Literature, Beijing Film Institute * 1992-1993 Associate Professor, Department of Filmic Literature, Beijing Film Institute * 1993-1997 Associate Professor, Institute of Comparative Literature and Culture, Peking University * 1996–present Adjunct Professor, Ohio State University (graduate program) * 1997–present Professor, Department of Chinese Literature and Language, Institute of Comparative Literature and Culture, Peking University * 2009–present Adjunct Professor, Department of Cultural Studies, Lingnan University Writings * 《蒙面骑士–墨西哥副司令马科斯文集》(Masked Rider: The Writings of Subcomandante Marcos), 2006 * 《性别中国》(Gendering China). Taipei: Rye Field, 2005. * Cinema and Desire: Feminist Marxism and Cultural Politics in the Work of Dai Jinhua, eds. Jing Wang and Tani E. Barlow. London: Verso, 2002. * 《镜城突围》(Breaking Out of the Mirror City). Beijing: China National Press, 1995. * 《隐形书写–90年代中国文化研究》(Invisible Writing: Cultural Studies in China in the 1990s), Nanjing: Jiangsu People’s Press, 1999. * 《犹在镜中–戴锦华访谈录》(Through a Glass Darkly: Interviews with Dai Jinhua), Beijing: Knowledge Press, 1999. Translated into Korean, Seoul: BreenBee, 2009.
WIKI
Copiotroph A copiotroph is an organism found in environments rich in nutrients, particularly carbon. They are the opposite to oligotrophs, which survive in much lower carbon concentrations. Copiotrophic organisms tend to grow in high organic substrate conditions. For example, copiotrophic organisms grow in Sewage lagoons. They grow in organic substrate conditions up to 100x higher than oligotrophs. Due to this substrate concentration inclination, copiotrophs are often found in nutrient rich waters near coastlines or estuaries. Classification and Identification The bacterial phyla can be differentiated into copiotrophic or oligotrophic categories that correspond and structure the functions of soil bacterial communities. Interaction with other organisms Copiotrophic relation between oligotrophic bacteria depends on the amount of concentration the soil has of C compounds. If the soil has large amounts of organic C, it would then favor the copiotrophic bacteria. Ecology Copiotrophic bacteria are a key component in the soil C cycle. It is most important during the period of the year when vegetation is photosynthetically active and exudes large amounts of simple C compounds like sugar, amino acids, and organic acids. Copiotrophic bacteria are also found within marine life. Lifestyle Copiotrophs have a higher Michaelis-Menten constant than oligotrophs. This constant is directly correlated to environmental substrate preference. In these high resource environments, copiotrophs exhibit a “feast-and-famine” lifestyle. They utilize the available nutrients in the environment rapidly resulting in nutrient depletion which forces them to starve. This is possible through increasing their growth rate with nutrient uptake. However, when nutrients in the environment get depleted, copiotrophs struggle to survive for long periods of time. Copiotrophs do not have the ability to respond to starvation. It is hypothesized that this may be a lost trait. Another possibility is that microbes never evolved to survive these extreme conditions. Oligotrophs can outcompete copiotrophs in low-nutrient environments. This causes low-nutrient conditions to continue for extended periods of time, making it difficult for copiotrophs to sustain life. Copiotrophs are larger than oligotrophs and need more energy, requiring larger concentrations of substrate for survival. Copiotrophs are motile. Copiotrophs can have external organelles such as flagella that extend out of a microbe’s cell to facilitate movement. Copiotrophs are also chemotactic, meaning they can detect nutrients in the environment. These help the microbes travel quickly to nearby food sources. Chemotaxis also enables the organism to travel away from a restricting compound. There are multiple methods for chemotaxis in these organisms. This includes the “run and tumble” strategy in which the organism randomly picks a direction to move in. However, if it senses that the concentration gradient is decreasing they stop and choose another random direction to travel in. Another strategy includes the “run and reverse” in which the organism runs towards a nutrient. If it notices the gradient decreasing, it moves back to where the gradient is larger and heads in another direction from this new position. Through their motility and chemotaxis, copiotrophic microbes respond quickly to nutrients in their environment. With the help of these mechanisms, copiotrophs can travel to and stay in nutrient dense areas long enough for transcriptional regulatory systems to increase gene expression. This in turn helps them increase metabolic processes in high nutrient areas allowing them to maximize their growth during these patches. Growth characteristics Copiotrophs are characterized by a high maximum growth rate. This high growth rate allows for copiotrophs to have a larger genome and cell size than their oligotrophic counterparts. The copiotrophic genome encompasses more ribosomal RNA operons than the oligotrophic genome. Ribosomal RNA operons are linearly related to growth rate. The ribosomal RNA operons are responsible for expression of genes in clusters. The larger amount of ribosomal content allows for more rapid growth. Oligotrophs have one ribosomal RNA operon while copiotrophs can contain up to fifteen operons. Copiotrophs tend to have a lower carbon use efficiency than oligotrophs. This is the ratio of carbon used for production of biomass per total carbon consumed by the organism. Carbon use efficiency can be used to understand organisms lifestyles, whether they primarily create biomass or require carbon for maintenance energy. Energy is necessary for the copiotrophic lifestyle which includes motility and chemotaxis. This energy could otherwise be used for biomass production. This results in a lower efficiency than the oligotrophic lifestyle which primarily uses energy for the creation of biomass. Copiotrophs have a lower protein yield than oligotrophs. Protein yield is the amount of protein synthesized per O2 consumed. This is also associated with the higher ribosomal RNA operons. Overall, copiotrophs create more protein than their oligotrophic peers, however due to the copiotrophs' lower carbon use efficiency, less protein is produced per gram O2 consumed by the organisms.
WIKI
scene.org File Archive File download <root>­/­parties­/­2007­/­evoke07­/­demo/kakiarts_-_8bit_wonderland.zip File size: 5 672 366 bytes (5.41M) File date: 2007-08-12 23:05:57 Download count: all-time: 3 646 Screenshot (by pouët.net) Screenshot Preview • 8bit-linux-x86 184.48K • 8bit.exe 133.50K • 8bit.ve2 5.21M • readme.txt 4.38K • screenshot.jpg 50.15K file_id.diz __ ,-\| `` _ __ __ ,' | _.[\ ././/-<' `-/| `p' \ ../''' \ ,''. ,-'\ __| ........................./ `.` . | \ \ ]. oY--\,' |...... | __-.. ,' ` \ 'pd \ `.d/\_ \ | || | '`:-]/ . | -]U|.P/ `\'\ '-.=--^..' || | oo:-- : `--\ b \ | _.. -.` ./\. || | _.-''__,.-' \ "- ,/].,-/\ ` b d || | ,' ,-'' .`+-. /'',_.. `...'I_ || | / /_ '.\ ' V. /8d8| `O./8'` || | ,' J` |. \_`=:: |88/ ` || \/,o'/' _ |./-. |'\'' <J8P' || P /'/ ,'|/|L'\, ./Y ' _ "8 || \' ,| _ __ /b/ / `\/\//:]L L `>o/_,.. || '/ "| `/ "''YY' ..\`P \._:d./,'' \ || |b' \ \. \\|'\ _._//\</\I| || d\ \ . ` _ PU'' '"''''' ' `8\\]/ || O' `Y `-.'__ 8. -/ |\/ || |' `J\ ./`--.| ,d 'P || | `V\ | _\ . _ __P' || |, / \_. _ o _,/\\[ `-"--"-' || | ,' -" 'Y'' `b\.P' \ || | /,' \ . | || | |,d '\ \| || || |'| <h.. |P || \ | \\/ / _ || 8. '.| /\| P/ _,.--XX`-o_ || ,' ]. `` _ ./ '/ ,/-X- XX XX `.. || | / `. `d/\__ .,pY'/-' `\ XX XX XXX `.. || | || `-P. P'\.,.\ '\. `8. XX XXX XX `o_ || \. | `---o/ "-=../=/8".._ 'Y\ X XX XX \b || \ '. `-- ._ b.\ ( -o-.`\ XX XX XX YoJ| `. ' _ `._ Y".].]. -.8/ `2\ XX XX _,.b::-"L |`._'-._ -` ..-PYb=:,| \\_ X _,.ooP=-"'___.Yd. \___:\. '-..______________:::__::==_____:/o.==8\od=.o--/""""':J| '-._ '-._ \:==....=------'''' '`-._ '".._ `-._ '`-._ ## ## ######## ## `##_ ##-..######## ######## ######## ####### ## ## ## ## ## `##_ `-._ ## ## ## ## ## ######## ######## ######## ## `-######## ######## ## ####### ## ## ## ## ## ## ## ##.. ##`b## ## ## ## ## ## ######## ## ## ## ######## ## ## ## ####### `b `. `. \. www.kakiarts.de P R E S E N T S `. `. " 8 - B I T W O N D E R L A N D " \ \ A T E V O K E 2 0 0 7 | | | | KeyJ: code, additional graphics .' || gabi: graphics, debugging help | / dq: music, debugging help | ,' special thanks to subc^drg `----'' Now that we finally have an engine capable of fancy shaders'n'stuff, we still don't use all the bling: this demo runs even on the barest OpenGL 1.2 implementations. This doesn't mean that everything worked flawlessly, though: we had to work around severe bugs in drivers from all three major graphics vendors :( This version has been tested on systems with nVidia, ATI and even Intel graphics chips. Something at GeForce 6 or Radeon X level or above is recommended. It has been tested on Windows XP, Windows Vista and Ubuntu 7.04, but it should also work on every other non-ancient version of x86 Win32 and Linux operating systems.
ESSENTIALAI-STEM
How to Create and Manage User Codes for the Schlage Connect Smart Lock The great thing about having a keypad lock like the Schlage Connect is that you don’t need physical keys at all. Instead, you just enter in a key code (aka user codes) and you’re off to the races. Here’s how to create and manage key codes for the Schlage Connect smart lock, both on the lock itself and on your phone. RELATED: How to Install and Set Up the Schlage Connect Smart Lock Before we begin, you’ll need to know your lock’s programming code, which can be found on the back of the interior portion of the unit. You should have jotted it down before installing the lock in the first place, but if not, you’ll need to take it apart and write down the programming code. This is required to put the lock into programming mode, which allows you to change and manage the lock’s settings. How to Add a User Code The Schlage Connect comes with a couple of default codes out of the box, but it’s best to come up with your own code to use. To get started, open your door and extend the deadbolt so that it’s in the locked position (you’ll begin all programming this way). From there, press down on the Schlage button at the top of the keypad and then enter in your six-digit programming code (again, you’ll begin all programming this way). After pressing the Schlage button and entering in your programming code, press “1” and then enter in the new user code that you want to use twice. So if you wanted your new user code to be 1234, you would enter in 12341234. (Note: please don’t use 1234 as your door code.) If successful, the green checkmark will blink twice and you’ll also hear two beeps. If you get a red X, press the Schlage button to start over. To add a user code using your phone, you’ll first need to connect the smart lock to a smarthome hub. In my case, I’m using the Wink Hub 2 along with the Wink app. Take a look at our setup guide on how to do this. You can use a different hub, and it should follow a somewhat similar process. Select your lock in the app and then tap on the arrow off to the right. You may need to enter in your Wink password before continuing, but once that’s done, you’ll get to the User Codes screen. Tap on “Add a User Code”. Type in the new user code. You’ll need to enter in twice to confirm. After that, give the user code a name, as well as a reminder if you ever need to delete it in the near future. Then hit “Done”. How to Delete a User Code To delete a user code on the lock itself, press the Schlage button followed by the programming code, and then hit “2”. After that, enter in the user code that you want to delete twice. If successful, you’ll get a blinking green checkmark and two beeps. You can also delete all user codes at once by pressing the Schlage button, entering in the programming code, pressing “6”, and then entering in the programming code again. This will prevent you from unlocking your door with a user code (since there are none) until you create a new user code. To delete a user code on your phone, tap on the arrow off to the right to access the lock’s user codes. From there, tap on the user code that you want to delete. Then tap “Delete This Code”. How to Change the User Code Length The Schlage Connect allows you to use anywhere from four-digit user codes up to eight-digit user codes. Keep in mind, though, that changing the user code length will also erase all current user codes, so you’ll have to create new codes after you do this. To change the length, press the Schlage button, enter in the programming code followed by “8”, and then hit the number on the keypad that corresponds to the length you want to use (you’ll press this number twice). So if you want six-digit user codes, you’ll press 66. If successful, you’ll get a blinking green checkmark and two beeps. To change the user code length on your phone, tap on the arrow off to the right to access the lock’s user codes and select “User Code Length”. Select a number between four and eight and then tap on “Set User Code Length”. Remember, this will delete all current user codes, so you’ll need to go back and create new ones when you do this. Craig Lloyd writes about smarthome for How-To Geek, and is an aspiring handyman who loves tinkering with anything and everything around the house. He's also a mediocre gamer, aviation geek, baseball fan, motorcyclist, and proud introvert.
ESSENTIALAI-STEM
Pattern (sewing) In sewing and fashion design, a pattern is the template from which the parts of a garment are traced onto woven or knitted fabrics before being cut out and assembled. Patterns are usually made of paper, and are sometimes made of sturdier materials like paperboard or cardboard if they need to be more robust to withstand repeated use. The process of making or cutting patterns is sometimes compounded to the one-word patternmaking, but it can also be written pattern(-)making or pattern cutting. A sloper pattern, also called a block pattern, is a custom-fitted, basic pattern from which patterns for many different styles can be developed. The process of changing the size of a finished pattern is called pattern grading. Several companies, like Butterick and Simplicity, specialize in selling pre-graded patterns directly to consumers who will sew the patterns at home. These patterns are usually printed on tissue paper and include multiple sizes that overlap each other. An illustrated instruction sheet for use and assembly of the item is usually included. The pattern may include multiple style options in one package. Commercial clothing manufacturers make their own patterns in-house as part of their design and production process, usually employing at least one specialized patternmaker. In bespoke clothing, slopers and patterns must be developed for each client, while for commercial production, patterns will be made to fit several standard body sizes. Pattern making A patternmaker typically employs one of two methods to create a pattern. The flat-pattern method is where the entire pattern is drafted on a flat surface from measurements, using rulers, curves, and straight-edges. A pattern maker would also use various tools such as a notcher, drill, and awl to mark the pattern. Usually, flat patterning begins with the creation of a "sloper" or "block" pattern: a simple, fitted garment made to the wearer's measurements. For women, this will usually be a jewel-neck bodice and narrow skirt, and for men, an upper sloper and a pants sloper. The final sloper pattern is usually made of cardboard or paperboard, without seam allowances or style details (thicker paper or cardboard allows repeated tracing and pattern development from the original sloper). Once the shape of the sloper has been refined by making a series of mock-up garments called toiles (UK) or muslins (US) or Nessel in German, the final sloper can be used to create patterns for many styles of garments with varying necklines, sleeves, dart placements, and so on. The flat pattern drafting method is the most commonly used method in menswear; menswear rarely involves draping. The draping method involves creating a mock-up pattern made of a strong fabric (such as calico) in a linen weave. The fabric is far coarser than muslin, but less coarse and thick than canvas or denim. However, it is still very cheap, owing to its unfinished and undyed appearance. Then, by pinning this fabric directly on a form, the fabric outline and markings will be then transferred onto a paper pattern, or the fabric itself will be used as the pattern. Designers drafting a sculpted evening gown or dress which uses a lot of fabric--typically cut on the bias--will use the draping technique, as it is very difficult to achieve this with a flat pattern. This method is also used for collars. Each pattern manufacturer has their own size ranges. A distinction is made between a basic pattern, a first pattern, and a production pattern. Patternmakers grade the first cuts to the desired size with the aid of CAD software (computer-aided design). The production pattern must contain all the information necessary for production and all the necessary parts. The collections are produced in sets of sizes. The customer has the garment altered after purchase, if necessary. Pattern digitizing After a paper/fabric pattern is completed, very often patternmakers digitize their patterns for archiving and vendor communication purposes. The previous standard for digitizing was the digitizing tablet. Nowadays, automatic options such as scanners and camera systems are available. Fitting patterns Mass market patterns are made standardized, so store-bought patterns fit most people well. Experienced dressmakers can adjust standard patterns to better fit any body shape. A sewer may choose a standard size (usually from the wearer's bust measurement) that has been pre-graded on a purchased pattern. They may decide to tailor or adjust a pattern to improve the fit or style for the garment wearer by using French curves, hip curves, and cutting or folding on straight edges. There are alternate methods of adjusting a pattern, either directly on flat pattern pieces from the wearer's measurements, using a pre-draped personalized sloper, or using draping methods on a dress form with inexpensive fabrics like muslin. Some dress forms are adjustable to match the wearer's unique measurements, and the muslin is fit around the form accordingly. By taking it in or letting it out, a smaller or larger fit can be made from the original pattern. Creating a sample from canvas is another method of making patterns. Canvas fabric is inexpensive, not elastic and made from Urticaceae. It is easy to work with when making quick adjustments, by pinning the fabric around the wearer or a dress form. The sewer cuts the pieces using the same method that they will use for the actual garment, according to a pattern. The pieces are then fit together and darts and other adjustments are made. This provides the sewer with measurements to use as a guideline for marking the patterns and cutting the fabric for the finished garment. Pattern grading Pattern grading is the process of shrinking or enlarging a finished pattern to accommodate it to people of different sizes. Grading rules determine how patterns increase or decrease to create different sizes. Fabric type also influences pattern grading standards. The cost of pattern grading is incomplete without considering marker making. Parametric pattern drafting Parametric pattern drafting implies using a program algorithm to draft patterns for every individual size from scratch, using size measurements, variables and geometric objects. Standard pattern symbols Sewing patterns typically include standard symbols and marks that guide the cutter and/or sewer in cutting and assembling the pieces of the pattern. Patterns may use: * Notches, to indicate: * Seam allowances. (not all patterns include allowances) * Centerlines and other lines important to the fit like the waistline, hip, breast, shoulder tip, etc. * Zipper placement * Fold point for folded hems and facings * Matched points, especially for long or curving seams or seams with ease. For example, the Armscye will usually be notched at the point where ease should begin to be added to the sleeve cap. There is usually no ease through the underarm. * Circular holes, perhaps made by an awl or circular punch, to indicate: * A dart apex * Corners, as they are stitched, i.e. without seam allowances * Pocket placement, or the placement of other details like trimming * Buttonholes and buttons * A long arrow, drawn on top of the pattern, to indicate: * Grainline, or how the pattern should be aligned with the fabric. The arrow is meant to be aligned parallel to the straight grain of the fabric. A long arrow with arrowheads at both ends indicates that either of two orientations is possible. An arrow with one head probably indicates that the fabric has a direction to it which needs to be considered, such as a pattern which should face up when the wearer is standing. * Double lines indicating where the pattern may be lengthened or shortened for a different fit * Dot, triangle, or square symbols, to provide "match points" for adjoining pattern pieces, similar to putting puzzle pieces together Many patterns will also have full outlines for some features, like for a patch pocket, making it easier to visualize how things go together. Patterns for commercial clothing manufacture The making of industrial patterns begins with an existing block pattern that most closely resembles the designer's vision. Patterns are cut of oak tag (manila folder) paper, punched with a hole and stored by hanging with a special hook. The pattern is first checked for accuracy, then it is cut out of sample fabrics and the resulting garment is fit-tested. Once the pattern meets the designer's approval, a small production run of selling samples is made and the style is presented to buyers in wholesale markets. If the style has demonstrated sales potential, the pattern is graded for sizes, usually by computer with an apparel industry specific CAD program. There are a wide variety of pattern making and grading/marker making programs, each with their own features. Following grading, the pattern must be vetted; the accuracy of each size and the direct comparison in laying seam lines is done. After these steps have been followed and any errors corrected, the pattern is approved for production. When the manufacturing company is ready to manufacture the style, all of the sizes of each given pattern piece are arranged into a marker, usually by computer. A marker is an arrangement of all of the pattern pieces over the area of the fabric to be cut that minimizes fabric waste while maintaining the desired grainlines. It's sort of like a pattern of patterns from which all pieces will be cut. The marker is then laid on top of the layers of fabric and cut. Commercial markers often include multiple sets of patterns for popular sizes. For example: one set of size Small, two sets of size Medium and one set of size Large. Once the style has been sold and delivered to stores – and if it proves to be quite popular – the pattern of this style will itself become a block, with subsequent generations of patterns developed from it. Standard designing and adjusting tools * Hip curve * L-Square * French curves * Pattern notcher * Dress forms * Slopers - Bodice, skirt, trousers, etc. Retail patterns Home sewing patterns are generally printed on tissue paper and sold in packets containing sewing instructions and suggestions for fabric and trim. They are also available over the Internet as downloadable files. Home sewers can print the patterns at home or take the electronic file to a business that does copying and printing. Many pattern companies distribute sewing patterns as electronic files as an alternative to, or in place of, pre-printed packets, which the home sewer can print at home or take to a local copyshop, as they include large format printing versions. Modern patterns are available in a wide range of prices, sizes, styles, and sewing skill levels, to meet the needs of consumers. The majority of modern-day home sewing patterns contain multiple sizes in one pattern. Once a pattern is removed from a package, you can either cut the pattern based on the size you will be making or you can preserve the pattern by tracing it. The pattern is traced onto fabric using one of several methods. In one method, tracing paper with transferable ink on one side is placed between the pattern and the fabric. A tracing wheel is moved over the pattern outlines, transferring the markings onto the fabric with ink that is removable by erasing or washing. In another method, tracing paper is laid directly over a purchased pattern, and the pieces are traced. The pieces are cut, then the tracing paper is pinned and/or basted to the fabric. The fabric can then be cut to match the outlines on the tracing paper. Vintage patterns may come with small holes pre-punched into the pattern paper. These are for creating tailor's tacks, a type of basting where thread is sewn into the fabric in short lengths to serve as a guideline for cutting and assembling fabric pieces. Besides illustrating the finished garment, pattern envelopes typically include charts for sizing, the number of pieces included in a pattern, and suggested fabrics and necessary sewing notions and supplies. Ebenezer Butterick invented the commercially produced graded home sewing pattern in 1863 (based on grading systems used by Victorian tailors), originally selling hand-drawn patterns for men's and boys' clothing. In 1866, Butterick added patterns for women's clothing, which remains the heart of the home sewing pattern market today.
WIKI
BRIEF-AT & S says H1 net loss 14.8 million euros Nov 2 (Reuters) - AT & S Austria Technologie und Systemtechnik Aktiengesellschaft AG : * At 386.5 million euros ($429.63 million) in H1, revenue maintained high level of 387.1 million euros in previous year * EBITDA declined by 41.1 million euros or -44.1 percent from 93.2 million euros to 52.1 million euros in first half of year * H1 profit fell by -56.9 million euros from 42.1 million euros in prior-year period to -14.8 million euros * Expects an increase in revenue of 4-6 percent for financial year 2016/17 * EBITDA margin should range between 15- 16 percent primarily due to start-up effects in Chongqing * EBITDA margin in core business should be at a similar level as in financial year 2015/16 * Higher depreciation and amortisation of an additional about 40 million euros for Chongqing project in financial year 2016/17 will have a significant influence on EBIT Source text - bit.ly/2fda6L0 Further company coverage: ($1 = 0.8996 euros) (Gdynia Newsroom)
NEWS-MULTISOURCE
Monthly Archives: June 2020 Foods that can hinder or help Glaucoma Dr. Marc Grossman and Michael Edson have written a great easy-to-read book on Glaucoma. this helps clarify what causes it, what eye drops do and how to control it naturally. A very interesting chapter is how food can affect the eye pressure which is a marker for Glaucoma. This is an excerpt from their book, Natural Eye Care Series: Glaucoma  click the title to get more info. Foods Known to Decrease IOP  (A good thing). Studies have shown that there are natural ways to reduce intra-ocular pressure naturally including the following: eating a healthy diet high in fruits and vegetables. People with glaucoma can reduce their eye pressure by five to seven millimeters of mercury (mm/Hg) with an improved diet and supplement program—a reduction that is as good as, or better than, achieved with drugs. In general, a diet high in beta-carotene, vitamin C, vitamin E, and selenium is recommended. Foods containing those nutrients include garlic, onions, beans, spinach, celery, turnips, yellow and orange vegetables, green leafy vegetables, seaweed, apples, oranges, and tomatoes. In addition, drinking lots of water helps maintain the flow of nutrients to the eye and drains metabolic wastes and toxins from eye tissues. Optimally, you should drink 16 four-ounce glasses of water per day, every half-hour. Our bloodstream can only handle being diluted by about four ounces at any one time. When you drink more than four ounces at a time, this means more work for the kidneys to filter water that hasn’t had a chance to travel through the lymph system and clean body tissues. Avoid carbonated, caffeinated, and alcoholic beverages since they can actually dehydrate eye tissues. Your optimal water intake depends upon your particular physiology, diet, climate, and physical activity. Too much water intake can reduce blood salt levels (hyponatremia) and cause cells to flood. Adequate water intake helps maintain the flow of nutrients to the lens and release wastes and toxins from tissues.[x] Spring water without chlorine or fluoride is the best. Drinking filtered water may remove needed minerals. Adding back a full complement of electrolytes will help prevent mineral deficiency that exacerbates dehydration. A good way to gauge if you are properly hydrated is by the color of your urine. If it is dark yellow, then you are dehydrated and need to drink more water. If your urine is as clear as water, then you have over-hydrated and should cut back intake. Green tea is very beneficial for your health and body but drinking too much can be dehydrating. FOODS THAT CAN INCREASE IOP (a bad thing): Coffee. Drinking just 1 cup of coffee can increase IOP by 1-4mm Hg for at least 90 minutes.Regular coffee drinkers have a higher average IOP (approximately 3mm Hg).However, coffee beans also contain antioxidant com-pounds. These antioxidative effects and their possible neuro-protective implications need further research. One study concluded that oxidative stress can be a causative factor in glaucoma, and targeted nutrients can reduce oxidative stress at the level of mito-chondria. This can be achieved by supplementing with ginkgo biloba and liquids that contain polyphenolic compounds (such as tea, red wine, dark chocolate, or coffee), which all have anti-oxidative properties. Glutamate. Evidence also exists that glutamate contributes to glaucoma, so it is best to avoid any foods with monosodium glutamate (MSG). Glutamate that is not biochemically bound to other amino acids, causes our inherent glutamate levels to increase rapidly. These “free” forms of glutamate are found in nearly all processed or packaged foods. Genetic predisposition to glutamate sensitivity is being investigated. Glutamate naturally found in some food is linked to amino acids and is slowly processed by the digestive system. Free gluta-mate passes through the digestive system rapidly and is quickly absorbed into the bloodstream. In some foods, such as aged or cured cheese or meats, soy sauce, mushrooms, tomatoes, broccoli, peas, walnuts, and gluten, glutamate exists in a free form. Glutamate is an essential nutrient for proper brain functioning, but excess glutamate results in “excitotoxicity” causing nerve cell death. Normally the brain is protected by the blood-brain barrier, but such protection can break down in cases such as head injury, stroke, or high blood pressure and as a by-product of aging. If the blood-brain barrier is compromised, then excess glutamate in the brain and nerve cell death can be the result.[vi] Artificial sweeteners. Avoid artificial sweeteners as studies indicate possible neurotoxicity. Research has shown the intake of artificial sweeteners such as aspartame metabolizes into phenylalanine, aspartic acid, and methanol. An increase in phenylalanine and aspartic acid interferes with the transport of serotonin and dopamine to the brain, increases neuronal hyperexcitability, and leads to degeneration in astrocytes and neurons.  Advertisement
ESSENTIALAI-STEM
Search 85,489 tutors FIND TUTORS Ask a question 0 0 Under what circumstances would you use a sequential file over a database? Tutors, please sign in to answer this question. 2 Answers A sequential file would be used when the data is character based and not binary, and when the entire file is to be read, and there are considerations for portability. One example would be a file that held a game's high score information. The data would consist primarily of strings, and there would be no specific queries made to that data. There would be little performance requirements. Information returned to the calling code would most likely only need to be parsed from beginning to end with any further filtration to be handled outside of the core file reading functionalitly. As a standard text file there would be little concern for portability issues, and little memory resources would be required since no large database application would need to be instantiated.  A database would be more beneficial if there were numerous queries expected, and when functions were required on specific portions of data, and/or when the data contained more complex data such as objects or mutimedia. In such cases to read a file from beginning to end would pose performance issues. A database file would not have those issues because it could query the data at any point within the data and could make changes anywhere within that data without having to iterate through the entire file from start to finish for each call. Basic data manipulation such as sorting, filtering, adding or deleting could be handled by the database relieving the need to have to write all of the supporting code for those functions.    The two permanent storage types could be used interchangeably if the program required both types of data interaction. In such a case the program would most likely make calls only to the database file with the database being responsible for creation and manipulation (rewrite) of the sequential file by means of import and export.   Typical candidates for a sequential file would include   - the application is applying changes in a transactional mode - changes are applied in a batch mode with no user access to the data while updating is going on - only a single user is involved, eliminating concurrency issues - data access is either not real-time or high access speed is not critical   Both types could be used concurrently, but in such a case the sequential data would most likely be both small in scope and relatively static (as opposed to volatile.) An typical example would be code/decode lookup files.
ESSENTIALAI-STEM
Go [golang]null許可DBカラムをjson変換する More than 1 year has passed since last update. はじめ 最近golangを書き始めています。 JSONを返却するAPIを書いている時に、NULL許可カラムの扱いに困りました。 そのAPIはどんなことやってたの? • DBからデータ取得 • structにマッピング • json変換してレスポンス返却 はい、きっとよくあるやつです。 何がどう困ったか userテーブルでmiddle_nameカラムはNULL許可で、マッピングさせる structは、sample1のように定義しました。 id `int` first_name `varchar(255)` middle_name `varchar(255) DEFAULT NULL` last_name `varchar(255)` sample1.go type User struct { Id uint32 `json:"id"` FirstName string `json:"first_name"` MiddleName string `json:"middle_name"` LastName string `json:"last_name"` } すると、DBのMiddleNameカラムデータがNULLの時に、string型にマッピングできません。 sql.NullString型にする sample2.go type User struct { Id uint32 `json:"id"` FirstName string `json:"first_name"` MiddleName sql.NullString `json:"middle_name"` LastName string `json:"last_name"` } goのsqlパッケージにNullStringってのがあって、 DBのNULLデータをいい感じにstructにマッピングしてくれます。 やったぜ! あとは、json.Marshallでjson変換するだけ♪ json変換した結果、sql.NullString型自体がjson化されていて、(´・ω・`)ガッカリ。 unexpected.go { "id" : 1, "first_name" : "Dennis", "middle_name" : { "String" : "", "Valid" : false }, "last_name" : "Suratna" } expected.go { "id" : 1, "first_name" : "Dennis", "middle_name" : null, "last_name" : "Suratna" } null値を変換してくれるライブラリーを使う gopkg.in/guregu/null.v3 nullとzeroというパッケージがあるらしく、jsonのmarshalがかかると null -> 0 or 空文字("") に変換してくれるらしい。 sampleコード書いてみました。 sample.go package main import ( null "gopkg.in/guregu/null.v3" zero "gopkg.in/guregu/null.v3/zero" "database/sql" "encoding/json" "fmt" ) type DBUser struct { Id uint32 `json:"id"` FirstName string `json:"first_name"` MiddleName sql.NullString `json:"middle_name"` LastName string `json:"last_name"` Salary sql.NullInt64 `json:"salary"` } type JsonNullUser struct { Id uint32 `json:"id"` FirstName string `json:"first_name"` MiddleName null.String `json:"middle_name"` LastName string `json:"last_name"` Salary null.Int `json:"salary"` } type JsonZeroUser struct { Id uint32 `json:"id"` FirstName string `json:"first_name"` MiddleName zero.String `json:"middle_name"` LastName string `json:"last_name"` Salary zero.Int `json:"salary"` } func main() { // --- sql.nullString user1 := &DBUser { Id: 1, FirstName: "Min", LastName: "Oh", } user1Json, _ := json.Marshal(user1) fmt.Println(string(user1Json)) // (1) // --- null.String, null.Int user2 := &JsonNullUser{ Id: 2, FirstName: "Mark", LastName: "Parker", } user2Json, _ := json.Marshal(user2) fmt.Println(string(user2Json)) // (2) user21 := &JsonNullUser{ Id: 21, FirstName: "Mark", MiddleName: null.NewString("", true), LastName: "Parker", Salary: null.NewInt(0, true), } user21Json, _ := json.Marshal(user21) fmt.Println(string(user21Json)) // (3) user3 := &JsonNullUser{ Id: 3, FirstName: "Jack", MiddleName: null.NewString("Junior", true), LastName: "Paul", Salary: null.NewInt(30, true), } user3Json, _ := json.Marshal(user3) fmt.Println(string(user3Json)) // (4) // --- zero.String, zeroInt user4 := &JsonZeroUser{ Id: 4, FirstName: "Mark", LastName: "Parker", } user4Json, _ := json.Marshal(user4) fmt.Println(string(user4Json)) // (5) user41 := &JsonZeroUser{ Id: 41, FirstName: "Mark", MiddleName: zero.NewString("", true), LastName: "Parker", Salary: zero.NewInt(0, true), } user41Json, _ := json.Marshal(user41) fmt.Println(string(user41Json)) // (6) user5 := &JsonZeroUser{ Id: 5, FirstName: "Jack", MiddleName: zero.NewString("Junior", true), LastName: "Paul", Salary: zero.NewInt(30, true), } user5Json, _ := json.Marshal(user5) fmt.Println(string(user5Json)) // (7) 実行結果 (1) {"id":1,"first_name":"Min","middle_name":{"String":"","Valid":false},"last_name":"Oh","salary":{"Int64":0,"Valid":false}} (2) {"id":2,"first_name":"Mark","middle_name":null,"last_name":"Parker","salary":null} (3) {"id":21,"first_name":"Mark","middle_name":"","last_name":"Parker","salary":0} (4) {"id":3,"first_name":"Jack","middle_name":"Junior","last_name":"Paul","salary":30} (5) {"id":4,"first_name":"Mark","middle_name":"","last_name":"Parker","salary":0} (6) {"id":41,"first_name":"Mark","middle_name":"","last_name":"Parker","salary":0} (7) {"id":5,"first_name":"Jack","middle_name":"Junior","last_name":"Paul","salary":30} 今回は、zeroパッケージは不要でnullパッケージだけで用が足りそうです。 参考 http://dennissuratna.com/marshalling-nullable-string-db-value-to-json-in-go/ http://qiita.com/guregu/items/726f34f80de4e9ba7539#guregunull
ESSENTIALAI-STEM
Wernher von Braun - The Nazi Behind NASA Documentary The man known to history as Wernher von Braun was born on the 23rd of March 1912 in the small town of Wirsitz in what is now northwest Poland midway between Poznan and Gdansk, but which in 1912 was a part of the eastern regions of the Second German Reich in Prussia. His father was Magnus von Braun, a German government official in Prussia, the family belonged to the baronial rank in eastern Germany and as such Wernher had the noble cognomen Freiherr included in his name, Magnus von Braun rose to a position of some considerable power during Wernher’s youth and he consequently served as the German Minister for Food and Agriculture for a brief period between the summer of 1932 and early 1933. His mother, Emmy von Quistorp, could trace her lineage back to several European royal houses and as such the von Brauns could lay claim to a high social status in Germany, however, the family’s claims to nobility were scuppered just years after Wernher’s birth, German involvement and defeat by Britain, France, Italy and the United States in the First World War between 1914 and 1918 saw an end to the German Second Reich, when a new German Republic, known as the Weimar Republic, was formed in late 1918 and early 1919 the old German nobility had their legal privileges removed, though the family continued to use the Freiherr cognomen in their names. Though he was born in the Polish parts of Germany the young Wernher was soon living in the heartland of Germany, when he was just three years old his family moved to Berlin, the capital of wartime Germany, to facilitate Magnus’s work as a government official, as he grew older the young Wernher was transferred to numerous private schools around Germany. The wider context in which he was growing up was critical in the development of Wernher’s scientific interests, in 1914 Europe had been thrown into a continent-wide war which soon expanded to other parts of the world, the First World War would have its winner and losers, Germany being one of the latter, but what all sides benefited from was the burst of technological development which walked hand in hand with the conflict, by the end of the war in 1918 new technologies had been rapidly developed, mostly associated with the battlefield and the supply of the armed forces. Perhaps the most novel was the armoured tank, a mechanised war machine which did not exist in 1914, but the most significant for von Braun’s later career were surely the rapid advances in aviation and ballistics. When the war started air flight was only recently invented, Orville and Wilbur Wright having flown the first ever plane at Kitty Hawk in North Carolina in December 1903, but by the time the war ended ended aviation was much more common, planes had been used from 1914 for reconnaissance, as fighter planes and increasingly to drop bombs on the enemy, individuals were consequently beginning to imagine new ways of sending ships and objects soaring into the sky using the more powerful explosives and ballistics which had been developed for use on the Western Front in France between 1914 and 1918. These new innovations clearly caught the young Wernher’s imagination early on, when he was just twelve years old von Braun was arrested in Berlin for having attached half a dozen of the biggest fireworks he could acquire to a small coaster wagon in an effort to see how fast he could make it move, later in his life von Braun reflected on his first ballistics experiment, stating “It performed beyond my wildest dreams, the wagon careened crazily about, trailing a trail of fire like a comet”. His interests were fuelled further as he entered his teenage years and there was a growing societal fascination in Germany with the idea of space travel, for instance, in 1927 the Verein für Raumschiffahrt or Society for Space Travel, an amateur rocket association, was founded in Germany, in October 1929 the German-Austrian film director, Fritz Lang’s acclaimed movie Frau im Mond or Woman in the Moon, a tale about taking a trip to the Moon, premiered in Berlin, through it the basics of rocket travel were presented on screen for the first time. As he entered his late teens von Braun’s own fascination with rocketry, space travel and engineering was gaining momentum, at sometime in late 1929 or early 1930 he met and befriended Willie Ley, an influential member of the German Society for Space Travel, he also entered the Technical University of Berlin in 1930. It was through Ley and the Society for Space Travel that von Braun met the more significant influence on his early career, Hermann Oberth, Oberth was a Hungarian-born German physicist and engineer, who was one of the most important figures in the early development of the field of rocketry, he had acted as a consultant to Lang in his production of Woman in the Moon and in 1929 had won the first Prix REP-Hirsch awarded by the French Astronomical Society for his work on astronautics, it was also in 1929 that he began experiments with liquid-fuelled rockets which he called Kegelduse, the concept of fuelling modern rockets with innovative liquid fuels and the advances von Braun would go on to make in this field for both the Nazi regime in Germany and later the United States would later constitute his most significant scientific achievements, it is consequently impossible to understate the influence of Oberth on the young von Braun, who in later life would refer to Oberth as “the guiding-star of my life”. In the years that followed von Braun’s academic achievement expanded rapidly, he spent the autumn term at the Swiss Federal Institute of Technology in Zurich and then returned to Berlin to finish a diploma in mechanical engineering at the Technical University of Berlin, following this he very speedily completed a PhD in physics at what was then the Friedrich-Wilhelm University and is now the Humboldt University in Berlin, this was awarded for a study entitled Construction, Theoretical, and Experimental Solution to the Problem of the Liquid Propellant Rocket in April 1934, throughout this time he maintained a keen interest in the concept of space travel, but for the present time this would remain a theoretical interest, ultimately von Braun’s practical work increasingly focused on rocketry and ballistics. Even before von Braun had completed his PhD thesis he had been employed by the German government, his first posting was under the Weimar Republic government working in the German Ordnance Department from 1932 onwards as he was also undertaking his doctoral research. Early in 1933 enormous changes, which would impact on the trajectory of von Braun’s entire life, swept through Germany, following a catastrophic economic collapse in Germany in the aftermath of the Wall Street Crash of 1929 and the Great Depression which followed it, a number of extremist parties had gained larger followings in the country, one of these, the National Socialist German Workers’ Party had risen to become the largest party in the country following the Reichstag elections in 1932, now early in 1933 they entered government and soon afterwards used a fire at the Reichstag building as an excuse to pass an Enabling Act which allowed their leader, Adolf Hitler, and his ministers to rule by decree, the Nazi Party had come to power, and in the months ahead began to tighten its grip on the German government and German society. Von Braun’s associations with the Nazi Party are unquestionably the most controversial feature of his life and career, there is no doubting that he was a member of the Nazi Party and a top scientist for the administration, however, von Braun was adamant after the Second World War that was to follow from 1939 to 1945 that he had joined the party only when the war broke out in Europe and purely in the interests of career advancement. He also maintained that he had never been inclined towards the ideology of the Nazis, regarding his work in developing weapons for the Nazis throughout the war, he simply stated that his country was at war and as a scientist in the employ of the government at the time he felt it was his duty as a German to conduct the work which he did. Controversy has raged around this ever since, particularly around certain inconsistencies in von Braun’s version of his associations with the Nazi Party, later in life he claimed that he had only joined the Nazi Party in 1939 after he was effectively pressured into doing so, however, official records show that von Braun had joined the Nazi Party in November 1937, moreover he had also joined the paramilitary wing of the Nazi Party, the Schutzstaffel or SS, in 1940, he gained promotion within that organisation several times in the years that followed, when questioned about this in the United States years later, von Braun again argued that his membership of the SS was solely for the purposes of career advancement, but many accounts have surfaced since from eye-witnesses, some subsequent to von Braun’s own death, which suggest von Braun was a more enthusiastic member of the SS than he claimed. The truth of all this is hard to determine, many individuals were coerced into joining various branches of the Nazi Party during their twelve year rule in Germany and von Braun would certainly not have been alone in this regard, but there is enough ambiguity to suggest he may have been a supporter of the Nazis, even if he wasn’t his close associations with Hitler’s regime do not reflect well on his character. By the time he completed his doctoral studies in 1934 von Braun had started working for the Nazi government at a laboratory and rocket test site at Kummersdorf about twenty-five kilometres south of Berlin, it was here in December 1934 where von Braun’s team of engineers and scientists successfully launched two liquid-fuel rockets to altitudes of between two and a half and three and a half kilometres, named the A-2 rockets, for Aggregate-2, they were the first in a series of exponentially more effective rockets which von Braun and his team would develop over the next ten years, the technology here largely centred around alcohol and liquid oxygen as highly combustible fuels which were used to create extremely high temperatures to propel the rockets. Into the mid-1930s Wernher and his team at Kummersdorf continued experimenting with various novel innovations around liquid fuels and rockets, all of this was occurring as the German army was rearming and the Nazi state was attempting to recover territory which it had lost at the end of the First World War to Poland, Czechoslovakia and other neighbouring states, as part of this von Braun was involved in developing prototype rocket-propelled aircraft for the German Luftwaffe, or air-force, between 1936 and 1938, however a very poor safety record and difficulty controlling the direction of the planes powered in this fashion made von Braun’s designs in this regard impractical for the time being, these years also saw gradual improvements in the design of Wernher’s rockets, the A-3 and A-4 rockets being launched higher and faster than their predecessor, the A-2. In 1937 von Braun was also relocated to the centre where he would spend most of his remaining time in Germany, that year the Nazi regime established Peenemunde Army Research Centre on the Baltic Sea coast of northern Germany, von Braun and his research team were moved here from Kummersdorf and his research would be carried out here for most of the next eight years at a specially equipped Liquid Rocket Fuel and Guided Missile Centre, at its height over 10,000 people would be employed here, such was the scale of the operations von Braun would soon be in charge of, he served as Technical Director at Peenemunde from 1937 through to 1945. The innovations being developed at the research centre at Peenemunde would soon be needed for the war effort, on the 7th of March 1936 the Nazi regime had remilitarised the Rhineland which German troops were forbidden from entering according to the terms of the Treaty of Versailles which had concluded the First World War, two years later in March 1938 Hitler oversaw the union of Germany and Austria and in the autumn of that year the Nazis began applying international pressure to have a large portion of Czechoslovakia known as the Sudetenland which had a large German population annexed to the German state. The process of bringing central Europe under German control was largely completed in the spring of 1939 when Czechoslovakia and Hungary were formed into puppet regimes or annexed, these acts finally forced Britain and France to act, when Hitler and Nazi Germany invaded Poland on the 1st of September 1939, the two western powers declared war on Germany in response on the 3rd of September, the Second World War had commenced, it would last for six years and in the course of it von Braun would oversee the development of some spectacular innovations in rocketry, ballistics and liquid-fuelled aircraft from the research centre at Peenemunde. Von Braun was soon making advances to fit the war effort, in the first twelve months of the war his team developed the A-5 rocket, the latest in the series of rockets he had been working on since the early 1930s, the A-5 reached altitudes of upwards of nearly twenty kilometres, an enormous increase in propulsion on what von Braun’s rockets had been capable of just five or six years earlier. By the early 1940s von Braun set out on the final course to develop the weapon for which he would become an infamous figure in international scientific circles by the end of the war, by 1941 it had been concluded that the A-4 rocket had the best potential for development as a long-range guided ballistic missile, by that time the necessary technologies were in place, some derived from the other Aggregate test rocket series, principle here were liquid-fuelled rocket engines, but the team at Peenemunde had also developed advanced supersonic aerodynamics and a gyroscopic guidance system which would allow the missile to fly with some level of control after its initial propulsion. What became known as the V-2 rocket was first launched on a trial basis from Peenemunde in October 1942 and reached a height of 84 kilometres, the rocket was fourteen metres long and carried a 1000kg warhead at the very front of it, it was fuelled primarily using a mix of ethanol and liquid oxygen with a water mixture to reducing internal heating to prevent the rocket exploding in flight, a turbo-pump forced the liquid fuel into a combustion chamber at a rate of thirty-three gallons per second which were then ignited, the resulting combustion gases then exited the combustion chamber at over 2,800 degrees Celsius and a speed of 6,500 feet per second, it was this combustion process which allowed for the V-2 to travel with the velocity it did even carrying such a heavy warhead. The military potential of the new rockets being designed at Peenemunde by von Braun were clear to the Nazi regime, they were also much needed from 1942 onwards, Germany’s invasion of Russia in the summer of 1941 had not worked out as expected, the German army failed to capture Moscow and several other key strategic cities before the harsh Russian winter set in, without adequate winter clothes German troops perished in large numbers on the Eastern Front in the winter of 1941. Then the following autumn and winter the Nazis failed to seize the city of Stalingrad in the south of Russia after pumping huge resources and troops into the region in an effort to secure the vital oil fields of the region, when the Russians went on the counter-offensive late in 1942 they would ultimately would not stop until they reached Berlin two and a half years later. With the war effort having soured the Nazis increasingly began to hope that a miracle weapon could be developed in Germany that would offset Germany’s losses on the battlefield, although the rockets von Braun had developed could not act as such a miracle weapon, it could nevertheless prove extremely beneficial in striking at Britain from Europe, accordingly in 1943 enormous resources were pumped into developing hundreds of A-4 rockets. They were also renamed, as the Vengeance-2 or V-2 rocket. Eventually more than 3,000 V-2s would be fired at London before the war ended, killing more than 2,500 civilians and terrorising the city, there was no effective way of stopping a V-2 rocket once it was fired and the level of damage the city and its people suffered when one was launched was purely dependent on how accurate its flight trajectory was, admittedly the accuracy of the rockets at this early stage was quite mixed. Von Braun’s central role in developing this weapon for the Nazi regime would have been controversial enough, but the manner in which the V-2 rockets were being manufactured between 1943 and 1945 was doubly so, as more and more German men were conscripted into the German armed forces in the final years of the war, the Nazi regime increasingly turned to the hundreds of thousands of men and women who were being confined in the concentration camps which had been established around Europe to detain Jews, gypsies, political prisoners and POWs as a source of slave labour. When a labour shortage caused delays in the production schedule of the V-2 rockets in the spring of 1943, one of the chief engineers at Peenemunde, Arthur Rudolph, proposed using inmates from the nearby Mittlebau-Dora concentration camp as slave labour to produce the rockets, this plan was soon implemented and many of the V-2 rockets produced between 1943 and early 1945 were built by concentration camp inmates under duress, many being beaten and tortured if they did not work sufficiently hard enough, in the end more labourers were actually killed in the workshops where the rockets were built than were killed in London when the weapon was used against Britain. There is no denying that von Braun knew about the conditions these slave labourers endured, yet, as with his membership of the Nazi Party, he later excused it as something which he could not influence in any way, and described the conditions at the factories as repulsive. But again there are conflicting arguments, several witnesses came forward many years after the war and claimed von Braun had been complicit in the abuse of slave labourers from the camps and hand-picked those who would work in the factories producing the V-2s, however, as with his sympathies or lack thereof towards the Nazi Party, we may never know how complicit von Braun was in the use of slave labour to build the thousands of V-2 rockets which were produced between 1943 and 1945. Von Braun and his team at the research centre at Peenemunde knew their value to the scientific community, as the winter of 1944 turned into the spring of 1945 and the Russians, Americans and British barrelled into Germany from the east and the west, he and his team began considering what they would do, how would they surrender to the victors and which ones? Ultimately they decided to surrender to the Americans, in the spring of 1945 blueprints were made of much of the work and research which had been carried out at Peenemunde since the late 1930s, these were hidden for future use, they would have to wait for an opportunity to make their surrender though, in February and March they were being moved towards the Austrian and Bavarian Alps by the German high command as the research centre at Peenemunde was abandoned in the wake of the Russian advance along the Baltic coast, in April, while being moved in Bavaria, von Braun and several of his team eloped, crossed the border into Austria and surrendered to the 44th US Infantry Division on the 2nd of May, six days later Germany surrendered unconditionally to the allies, the war was over in Europe. Von Braun would not face prosecution or punishment for his involvement with the Nazi regime and the German war effort, he was considered to be too valuable, months before the Americans, British and Russians began streaming into Germany in 1945 the United States government had prepared a Black List of top German scientists, engineers and technicians which it wanted to locate and interrogate in Germany, von Braun and the senior members of his research team at Peenemunde were at the very top of that list. In the weeks following the end of the war the Black List evolved into what became known as Operation Paperclip, a secret US intelligence program through which 1,600 German scientists and their families were taken from Germany to the United States, the trade-off was clear, move to the United States, provide information on the research they had been involved in for the Nazis and put it to use for the United States, in return the individual scientists would eventually be absolved of any crimes they had committed in their service to the Nazi regime. Von Braun was quickly involved, in June 1945 he was moved to the US occupied zone in Germany, he was kept confined and interviewed extensively in the weeks that followed, curiously one of the interviewers was L. S. Snell, a British rocket engineer who would go on to play a critical role in the development of the Concorde engine years later, in June von Braun’s transfer to the United States was approved and he arrived at Wilmington, Delaware on the 20th of September 1945, the second act of his life had begun. Yet for all that the United States’ government had prioritised bringing von Braun to America in 1945, his services were certainly not maximised in the years that immediately followed his relocation to America, von Braun and his team were sent to Fort Bliss on the state border between New Mexico and Texas, over the next few years here they were responsible for refurbishing some V-2 rockets and outlining to the US military the procedures for their manufacture and launching, but they were otherwise not given huge leeway to work on developing new rockets and their lives were heavily restricted here, for instance being unable to leave the admittedly large grounds of Fort Bliss without permission. On a personal level, von Braun underwent some profound change at this time, though raised as a Lutheran, his attitudes towards religion were ambivalent until 1945, he had also remained a bachelor into his thirties and had been something of a lothario at Peenemunde, serially dating female employees at the north German research centre, this changed in the first few years of his new American life, in 1946 he became an adherent of Evangelical Christianity, his religious beliefs seem to have been genuine, rather than some effort to better his image in America, it has, though, been speculated with some justification that his religious conversion might have been owing to an effort to absolve himself from his associations with the Nazis and their crimes. His marital status also changed shortly after his arrival in the United States, in the spring of 1947 he received permission from the US government to briefly return to Germany in order to marry his 18 year old cousin, a not wholly unusual marital arrangement by the standards of the 1940s, he and Maria von Braun would have three children, Iris, Margrit and Peter, in the years ahead, thus, whatever the moral ambiguity of Wernher’s marriage arrangements might be by contemporary standards, his life had settled down by the late 1940s, he had become a pious Christian and a family man. In 1950 von Braun and his associates were moved to Huntsville in the state of Alabama to work on developing the first large American ballistic rocket, one which eventually could carry a nuclear warhead and replace the standard nuclear bomb, what became known as the Redstone Rocket was the direct descendant of the V-2 and was fuelled using a mix of alcohol, liquid oxygen and hydrogen peroxide, the first such rocket lifted off on the 20th of August 1953, its operational range was up to 320 kilometres and by the late 1950s they were being deployed in Europe on one of the major fronts which had developed in the new Cold War between the US and Soviet Russia, back in von Braun’s homeland of Germany. Throughout the 1950s von Braun was also seeking to popularise the idea of Space exploration and travel, the German scientist’s earlier interest in this area had never diminished, at the height of his work in Germany he had been responsible for sending the first man-made object into Space, on the 20th of June 1944 a V-2 rocket, bearing the serial number MW18014, was launched from Peenemunde, it reached an apogee of 196 kilometres and accordingly broke the Kármán Line, the defined boundary between Earth’s atmosphere and Outer Space, this is the first recorded instance of a rocket being sent into Space orbit. During his hiatus at Fort Bliss von Braun had returned to the issue and in 1948 he had written a book on the subject which he only published 1952, The Mars Project was a non-fiction work outlining a technical blueprint for how an expedition could be sent to Mars and a colony established there, as he stated himself in the Preface to a later edition: “My basic objective during the preparation of The Mars Project had been to demonstrate that on the basis of the technologies and the know-how then available (in 1948), the launching of a large expedition to Mars was a definite technical possibility.” Though he would never see anything approaching a manned mission to Mars in his lifetime, von Braun was soon to be involved in the US’s efforts to begin exploring Space, the country’s attempts were belated, in the aftermath of the Second World War the Soviet Union had begun pumping resources into rocket development and tentative space exploration, on the 4th of October 1957 the Soviets succeeded in launching, Sputnik-1, the first ever artificial Earth satellite into low Earth orbit. A month later on the 3rd of November 1957 the Soviets sent the first living organism into space on Sputnik-2, a dog named Laika, these events shocked the US government, which now determined to invest heavily in its own Space program, triggering what has come to be known as the Space Race, a distinct part of the wider US-Soviet Cold War. The inception of the Space Race gave von Braun a second life, for twelve years in the United States he had been marginalised in the country, given little room to do anything other than share and moderately develop the technology which had been used in the Aggregate and V-2 rockets back in Germany, now he was set free to begin experimenting again with his team. Within months his team had developed the Jupiter-C, a modified Redstone Rocket which on the 31st of January 1958 launched the United States’ first satellite, named Explorer-1, into low Earth orbit, consequently it was using a more developed version of von Braun’s V-2 rockets that America launched its first satellite. More was to follow, on the 29th of July 1958 the United States’ government established the National Aeronautics and Space Administration, popularly known by its acronym, NASA, from its inception von Braun was central to NASA’s work, his pivotal role was formalised in July 1960 when the George C. Marshall Space Flight Centre was established at Huntsville in Alabama as a successor to the Redstone research centre, the Marshall Centre was to become the single largest research centre at NASA, charged primarily with developing the launch vehicles and rocket propulsion systems for sending US Spacecraft into orbit, von Braun was the Centre’s first Director and the senior research team was staffed almost entirely by nationalised Germans who been brought to the United States in 1945, he would serve in the role for nearly ten years, throughout the period of NASA’s most ambitious and concerted efforts to further Space exploration. Von Braun’s first years in charge of the Marshall Centre focused on developing the launch capabilities for the spacecraft for NASA’s Project Mercury, the first spaceflight programme undertaken by the agency, Mercury’s goal was to put an American into Space and return him safely to Earth afterwards, it was implicit that the goal was to achieve this feat before the Soviets. To achieve this in the later 1950s and early 1960s von Braun and his team were working on a new generation of rockets, one was the Atlas class of rockets which had been under development since the mid-1950s, the others were the Saturn rockets, which were the direct successors of the Jupiter rockets which had fired the first American satellite into low Earth orbit in January 1958, von Braun proposed the rename in October 1958, over the next few years at Marshall von Braun and his team were responsible for developing these two rocket classes which would serve as the primary launching vehicles for US spacecraft for the duration of the Space Race throughout the 1960s, without them NASA would not have been able to achieve what it would achieve during that period. These rockets and launch vehicles were becoming particularly necessary in the early 1960s as the Space Race intensified, the next major milestone for both the Soviets and the US was to put a man in Space, this was eventually achieved on the 12th of April 1961 when the Russian cosmonaut, Yuri Gagarin, completed one orbit of the Earth in the Vostok-1 capsule. In many ways von Braun seems to have been responsible for the Soviets reaching this critical milestone before the US, NASA had been ready to send a manned mission into Space in early 1961 before Gagarin’s orbit, but von Braun had insisted on further tests being carried out to ensure the safety and efficacy of the Redstone launching vehicle, thus, when Alan Shephard became the first American in Space on the 5th of May 1961 he only narrowly missed out on being the first human being in Space to Gagarin, who had completed his mission less than four weeks earlier, the delay, while unfortunate from the perspective of Project Mercury, is a testament to the precision and safety standards which von Braun was employing at Marshall in the early 1960s. The Soviet Union had comprehensively won the first acts of the Space Race, but the US was catching up as the 1960s progressed, in February 1962 John Glenn became the first American to complete an orbit of Earth, his spacecraft was jettisoned into Space using an Atlas D Launch Vehicle, one of the first functioning rockets of the new classes being designed by von Braun and his team at Marshall, standing at nearly thirty metres in height, it was capable of jettisoning Glenn’s Friendship-7 spacecraft, weighing nearly 3,000 pounds, into orbit before disengaging. The Space Race settled into this pattern throughout the mid-1960s, the United States was constantly close to reaching milestones before the Soviets, but was perennially pipped by them right at the end, on the 12th of October 1964 the Soviets sent the first multi-person spacecraft into Space, with Vladimir Komarov, Konstantin Feoktistov and Boris Yegorov on board, this outpaced the Americans by five months, Virgil Grissom and John Young were the first Americans to share a spaceflight on board the Gemini 3 spacecraft in March 1965. More significantly, the Russians beat the Americans to the first spacewalk, on the 18th of March 1965 the Russian cosmonaut, Aleksey Leonov, became the first human being to exit a spacecraft and float around Space, Ed White had to settle for being the first American to do so when he conducted the same task on the 3rd of June, two and a half months after Leonov. Finally though the US caught up and began to reach milestones before the Russians, in December 1965 the Americans were the first to complete a rendezvous between two spacecraft in orbit when the Gemini 6 and Gemini 7 rendezvoused in Earth’s orbit, then in March 1966 two American astronauts, Neil Armstrong and David Scott, successfully completed the first docking in space when they successfully attached their Gemini 8 spacecraft to a pre-launched orbital. However, the target was increasingly now the Moon, on the 3rd of February 1966 the Russians were the first to successfully land a lunar module on the surface of the Moon, the Luna 9 was an unmanned spacecraft which took just over four days to reach the Moon and then began transmitting back images from its surface, the race was now on to see who could send the first manned mission to Earth’s only natural satellite. Von Braun would be critical in these efforts, the issue was developing a rocket launch vehicle which could propel a spacecraft capable of carrying multiple individuals and a lunar module to the Moon some 385,000 kilometres away, to undertake this action the Apollo Program had been launched in 1961 by President John F. Kennedy, but it was some years before it was even remotely practical to speak of actually achieving this goal. Central to the Apollo Program’s success were the Saturn class rockets which von Braun and his team had been developing at Huntsville since the late 1950s, from late 1967 these were utilised by the Apollo missions, these missions were unmanned at first, but from Apollo 7 onwards were crewed missions, in December 1968 Apollo 8 became the first manned spaceflight to orbit the Moon, a feat which Apollo 10 replicated in May 1969, with these milestones reached the stage was set for Apollo 11 which would eventually leave Earth on the 16th of July 1969. It is impossible to understate von Braun’s role in the success of the Apollo 11 mission, the spacecraft was launched using a Saturn V super-heavy lift launch vehicle, the culmination of von Braun and his team’s work at Marshall throughout the 1960s, this rocket was 110 metres in length and weighed 2.8 million kgs, the Saturn V rocket launched through three phases using millions of litres of kerosene fuel, liquid oxygen and liquid hydrogen, the combined effect of all this burn was immense, for instance, the first burn utilised 770,000 litres of kerosene fuel and 1.2 million litres of liquid oxygen, which then created 7.5 million pounds of thrust, by the time the rocket went through all three stages the Saturn V rocket had created enough thrust to effectively jettison the spacecraft into Deep Space, when it completed the three stages every part of the enormous rocket had been used and detached from the spacecraft, which was the only portion of what started on the ground on Earth that was left at the end of the launch, it was this launch process which sent the comparatively tiny Apollo 11 spacecraft into Deep Space on the 16th of July 1969. This was the culmination of Wernher von Braun’s experiments with liquid fuels and rocketry which he had commenced forty years earlier in Germany, to this day the Saturn V rocket is the only launch vehicle which has ever carried human beings outside of low Earth orbit into Deep Space, a half a century after its first launch it remains the tallest, heaviest and most powerful rocket to ever be used in spaceflight and holds the record for the heaviest payload launched from Earth’s surface. When Apollo 11 touched down on the surface of the Moon on the 20th of July 1969 it was the culmination of the years of endeavour and innovation at NASA and the Marshall Centre, but unbeknownst to the individuals involved, it would also be the beginning of the end for the Space Program, von Braun’s research had been enormously costly, adjusted for inflation the Saturn V had cost fifty billion dollars to develop in today’s money and each launch cost one and a quarter billion dollars, consequently, with the Space Race effectively won by landing the first human beings on the Moon, the US government began to wind down the Apollo Program, five further Apollo missions landed two men each on the Moon between November 1969 and December 1972, each one blasted into Deep Space using the Saturn V rocket, then the Apollo Program was ended, no one has ever returned to the Moon since and no rocket has ever been built to eclipse von Braun’s. Von Braun’s life seems like an anti-climax thereafter, how could it not, only continued missions and endeavours like the Apollo Program had been could have continued the level of achievement which had culminated in the Apollo 11 Moon landings, looking ever outward von Braun had expressed a desire following Armstrong and Aldrin’s maiden Moonwalk that the Saturn V could be further developed to begin developing a rocket capable of sending a mission to Mars, his long held dream, but, this was just not politically feasible in the 1970s as the Cold War entered a period of significant détente and the Space Race ended. In the end von Braun appears to have realised that there was no possibility of this occurring reasonably quickly, in March 1970 he relocated with his family to Washington DC to take up the position of Deputy Associate Administrator at NASA’s political headquarters in the US capital, it did not suit him, eventually after two years after bickering over budget cuts he quit in May 1972. Weeks later he had taken up a role as vice-president for engineering and development at Fairchild Industries, an American aircraft and aerospace manufacturer, however, within months his life took a darker turn, in 1973 he was diagnosed with kidney cancer, a kind which could not be effectively treated in the 1970s, but which would be so today, despite the terminal nature of his cancer he continued to work, partly at Fairchild, and partly as an independent public speaker, in the latter role von Braun sought to keep American Space travel in the public eye and to popularise the idea of launching a mission to Mars, but with little success. Eventually Wernher retired at the very end of 1976, deteriorating health forcing him to on the 31st of December, he had been awarded a National Medal of Science by the administration of Gerald Ford in 1975 for his accomplishments in the field of Engineering Sciences, and the medal was finally bestowed in 1977, owing to his illness he was unable to attend the ceremony to receive the medal from the country which had made him a citizen after his dubious earlier life in Germany, he died just weeks later on the 16th of June 1977, aged 65, the cancer in his kidneys having spread to his pancreas. There is no denying that Wernher von Braun was a brilliant scientist and the enormity of his contributions to Space exploration, Sam Phillips, who served as the Director of the Apollo Program during its most critical period between 1964 and 1969, stated after the Moon landings that he did not believe it would have been possible for the United States to reach the Moon as quickly as it did had it not been for von Braun’s contributions to the Space Program, if it had ever got there at all. The Saturn V rocket which carried each of the Apollo missions which went to the Moon remains the only rocket to have taken human beings beyond low Earth orbit and is one of the great accomplishments of modern engineering and rocketry, it was the culmination of von Braun’s life work, the end point for the man who as a child had first attached fireworks to a coaster wagon and sent it barrelling down a Berlin street. On the way to producing the Saturn V rocket many other accomplishments added to his legacy, some of these have greatly influenced the modern world, it was a von Braun rocket which sent the first US satellite into Space, today there are over 2,500 active-duty satellites in low Earth orbit, powering everything from Cable TV to the Internet, the rocketry systems and engineering feats which he and his various research teams between the 1930s and the 1960s worked on have shaped the modern world in many ways which even they would not have foreseen when they developed them in the middle of the twentieth century, it is unsurprising that many streets, buildings and even a crater on the Moon have been named after him. But his story is a complex one and in many ways an uncomfortable one, as the author of a popular account of the Moonlanders, Andrew Smith, wrote several years ago, von Braun’s “spirit haunts Apollo like a spectre”, while historians may argue about how deeply involved in the Nazi regime von Braun was in the 1930s and 1940s, there is no denying that he was one of their principal scientists, that his factories employed slave labour in the last years of the Second World War and that he put his abilities to work producing weapons which showered London with the first ever ballistic rockets in the closing months of the war, no account of von Braun can overlook this record. We are left with a paradoxical figure, his leading biographer, Michael Neufeld, has perhaps best summarised his life, stating that, in evolutionary terms leaving Earth to explore Space constitutes one of the most important endeavours of the twentieth century, in those terms at least “Wernher von Braun deserves to be remembered as one of the seminal engineers and scientists of the twentieth century. His life is, simultaneously, a symbol of the temptations of engineers and scientists in that century and beyond: the temptation to work on weapons of mass destruction in the name of duty to one’s nation, the temptation to work with an evil regime in return for the resources to carry out the research closest to one’s heart. He truly was a twentieth-century Faust.” What do you think of Wernher von Braun? Was he a brilliant scientist whose political affiliations can be viewed separately from his scientific work, or was he an amoral Nazi-sympathiser who should never have been rehabilitated by the United States government? Please let us know in the comment section, and in the meantime, thank you very much for watching.
FINEWEB-EDU
Balance leads to Boo's boys' unbeaten weekend at Nike event Boo Williams worries when he loses and worries almost as much when he wins. He stresses about improvement when his teams lose and about overconfidence when they win. He has the good fortune to address the latter situation after his boys 17-and-under travel team went unbeaten over the weekend in Nike's Elite Youth Basketball League stop at the BooPlex, the marquee division of his annual tournament. Boo's boys capped a 5-0 weekend with two wins Sunday. They sped away from the talented, Georgia-based Southern Stampede 70-62 in the morning, then capped the weekend with a 70-64 comeback win against Chicago-based Mac Irvin Fire and its monster-in-training, 6-foot-10 Cliff Alexander. I think the key now is, we've just to keep going and not get big-headed, Boo said. Unfortunately, it's very different than tournaments. You win a tournament, you get all excited, and you go to the next tournament. Now, your record's good and you've got a lead, but you've still got nine more games. Boo's starless bunch no top-100 rated players, no ACC scholarship offers yet is now 8-1 and leads its division in the EYBL, Nike's summer-long, barnstorming league. The EYBL has two more stops next month, in Dallas and Minneapolis, after which the playoff field is determined for the annual Peach Jam in July. We played tons better than we did in Los Angeles, forward Dwayne Foreman said, referring to the first EYBL stop. After our first two games here, we really started putting it together. We're really good now. I think we can win … we can be one of the best teams in this tournament. Foreman, a 6-8 junior from Woodbridge by way of Massanutten Military Academy, totaled 30 points and seven rebounds, on 13-for-18 shooting in Sunday's two games. Rugged Rokas Gustys, a 6-9 junior from Lithuania who plays at Oak Hill Academy, totaled 20 points and 14 rebounds. Thon Maker, the 7-foot freshman from Australia, had 11 points and 13 rebounds against Mac Irvin and all weekend put himself on the lists of every recruiting service and a slew of college coaches. I think our posts played well, Boo said. We played within ourselves. We got the ball inside. I think the guys really played hard. Boo's assistants Leon Goolsby, Ivan Thomas and Jack Meriwether helped him manage games and player minutes, and Bill Tose' helped prepare scouting reports on opponents. Compared to the first week, I think we got a lot better, guard Robert Johnson said. We played a couple of the stronger teams this week and that gave us a chance to show how much better we are. Johnson, a 6-3 junior from Benedictine in Richmond, scored 19 of his 23 points in the second half against Mac Irvin. He scored 16 points, with six assists in Sunday's first game. Boo's team trailed Mac Irvin 31-25 at halftime, as Alexander soared and muscled his way to 15 points and 10 rebounds. In the second half, he managed just two points and five rebounds. Clearly, he and his teammates missed Jahlil Okafor, the 6-11 center and consensus No. 1 player in the country, who sat out the second consecutive weekend with an ankle injury. The big boy got tired, Boo said. If he didn't get tired, we wouldn't have no game. Can you imagine them with him and Okafor? There'd be no goals. I mean, he just got tired of dunking. The first half, that was an NBA guy who happened to come to the wrong game at the wrong time. Boo's team built a 12-point lead in the second half before a late flurry cut it to a one-possession game twice in the last minute. Johnson and Marc Evans from Great Bridge hit four free throws in the last 20 seconds to help clinch it. Boo never dreamed of going undefeated over the weekend, not against that level of competition. But for his players, it was a point of pride. Coach Boo was saying we showed resiliency after each game, Foreman said. After each game we bounced back. We knew we had to take care of business because this is his complex. We knew we had to go undefeated.
NEWS-MULTISOURCE
Skip to Content What Is a Welding Table & What Is It Used For? What Is a Welding Table & What Is It Used For? Choosing the right welding table goes beyond function and features. Although having something with the latest and greatest leveling technology is essential, most important is employee safety, productivity, and comfort. What is a Welding Table? A welding table is a flat metal work table specifically designed to help welders with their trade. Welding tables are stable, adjustable, and the fact that they are metal helps with preventing fires as well. A welding table is not just any other table; it has been designed with the welder in mind. Welding tables are specifically designed to withstand the high heat of welding in addition to being able-bodied enough to support heavy weight and allow working on different joints & angles to create a good product. Types of Welding Table There are several different types of welding tables available for purchase. They differ in size, scale, and level of adjust-ability; some even come with additional features such as a vice or an integrated work light. What is a Welding Table used for? The primary function of a welding table is to provide a stable surface for your welder and your work piece. They are especially helpful when working with heavy pieces or large welding equipment because the table will prevent them from shifting or warping as you weld, ensuring consistent quality results. A welding tables helps with the overall aesthetics of a welding operation by providing a stable, safe surface for welding. Where To Buy a Welding Table A Welding Table is available at many supply companies like Harbor Freight. Be sure to buy from a trusted retailer due to fraud & quality control. Bestseller No. 1 VEVOR Welding Table 30'' x 20'' Steel Welding Table Three 1.1 in. / 28mm Slots Welding Bench Table Adjustable Angle & Height Portable Table, Casters, Retractable Guide Rails, Eccentric Leveling Foot • 30" x 20" Countertop: It's large desktop size (30" x 20"/76 x 51 cm) can meet your different working needs. Three 1. 1" /28 mm slots in the tabletop allow for insertion of clamps to reach any point on the table. Three retractable, perpendicular steel guide rails can be used as guides, stops, or clamping edges. • Three Tilt Angles: There are three tilt angles (0°, 30, and 90°) are available in this welding bench table. By adjusting the angle, it can be adapted to fit different materials for work. Two table legs are equipped with two casters, making it effortless to move and rotate the table. Control your working environment with ease. • 400 lbs Load Capacity: A carbon steel frame has forged this solid but lightweight welding table and has increased the load-bearing capacity to 400 lbs. Heavy-duty zinc plated surface makes it resistant to rust and ensures a long service time. • Adjustable Height: There are four height levels to choose from: 30.7"/78 cm, 32.7"/83 cm 34.6"/88 cm, and 36.6"/93 cm. The table height is perfect for sit down welding and meets the needs of people with different heights. • Wide Application: VEVOR's welding table is suitable for professionals and is secure enough to be used by metalworking enthusiasts. With our tools, it becomes easier to weld small and complex parts. Bestseller No. 2 Strong Hand Tools, Nomad, Steel Welding Table, Three 1.1″ (28mm) Tabletop Slots, Adjustable Angle & Height, Casters, Retractable Guide Rails, Eccentric Leveling Foot, TS3020, Black • Three 1. 1″ (28mm) slots in the tabletop allow for insertion of clamps to reach any point on the table. • Tabletop tilts to three positions: Horizontal, 30°, and folded for mobility. • Two retractable, perpendicular steel guide rails can be used as guides, stops, or clamping edges. • Affordable, convenient welding and work table for the welding shop or home shop • Tabletop height can be adjusted from 26″ to 32″ (660 – 810 mm). Bestseller No. 3 KASTFORCE KF3002 Portable Welding Table Wedling Cart Universal Work Table with 5/8" /16mm Holes on Top • Design Patent Pending portable welding table • 18 inch*36 inch (480*915mm) heavy duty welding top • storage tray for material and tools storage • 4 bearing heavy duty 3inch swivels with brake function • Welding top thickness: 10Ga (2.8mm). Holes diameter: 5/8" (16mm) Bestseller No. 4 Klutch Mobile Welding Workstation 26-Pc. Metal Fit-Up Kit • 4mm thick table top with fixed position steel top boards featuring 4 separate 20in. x 12in. sections • Standard 16mm dia. holes evenly spaced 2in. apart for exceptional flexibility in fixture setup • Firm grip handle and 4 heavy-duty 3in. swivel casters allow you to easily move the welding table where you need it, while built-in stabilizer feet provide a firm, stable surface when needed Welding Table Requirements & Considerations Here are the most important things to keep in mind when choosing a welding table. Quality This is not the time to skip out on quality for a deal. Cheap welding tables tend to move around, or they lack features that can help a welder complete their task faster. Leveling The best welding tables have some type of leveling technology. These tables can also be portable, and when they are set down in a new location, they can be adjusted. If a welders table is not level, there will be issues with the project they are working on. Tables that offer leveling are also usually quite stable. Adjusting the height on the welding table is also essential to make sure that employees are working at the correct level. Grid Patterns and Measurements Many welding tables have measurements and grid patterns on the table surface. This is to help eliminate the need for more tools in the workspace. There are various options for what you may need the table to have on it. Load Capacity Like any table, welding tables will only be able to support a certain amount of weight. Think about the tools and machinery that will be placed on the table, in addition to the force of the employee working, and make sure you get a table that can handle the load, especially if you are looking at portable tables. Safety Make sure your table is in a safe area with durable cables, ideally surrounded by a welding curtain and a fume extractor. Make sure that any users have essential welding tools & equipment like welding gloves. How Do You Use a Welding Table? Welding work tables are straightforward to use. When you first get your new welding table, there will be adjustments that need to be made to it to accommodate the needs of the welder. Once the table is set up and ready, there should be no additional modifications unless the table is moved. Welding Table FAQs Here are some common questions about Welding Tables. Why use a welding table? Welding tables are designed for welders- they are stable, safe, and easy to use. The table also has grid patterns or measurements on them which can reduce the need for additional equipment in the workspace. What makes a good welding table? A good welding table will assist with providing stability, safety, and ease of use. Welding tables are designed with the welder in mind; they come equipped with helpful grid patterns or measurements. Quality is not to be compromised when searching for a welding table because cheap options tend to move around or lack features that can help complete tasks more efficiently. There are different types of welding tables available so it is wise to decide on size, scale, level of adjustable height before starting any project on your new table. Look for adjustable legs, welding clamps, Welders should evaluate how much weight they plan on putting on their welders based off what tools will be used and if necessary purchase a new one that can support the weight load needed for the project at hand – furthermore, all potential hazards such as a fire hazard or shielding should be considered and the area designated for the welding table should contain those hazards by surrounding them with a welders curtain and fume extractor. How thick should a welding table be? Welding tables can come in a variety of thicknesses. Typically, thinner weight tables are used for light production, while heavier table designs are appropriate for workers who have to move their welding station often or have plenty of materials. Best material for a welding table? Carbon Steel is a great material to use for a welding table because it’s durable, easy to work with and as an added bonus, steel will not oxidize through atmospheric exposure. The main benefits of a steel welding table include durability and workability among others. Steel also has the advantage of resisting corrosion (vs iron) which makes it a good choice for people who plan on moving their welding project often or working in a highly corrosive environment. Next Steps Welding tables are a great way to increase efficiency and safety for any worker or DIYer. By understanding the purpose of welders, you can choose the best table that will allow them to work safely with minimal adjustments needed.
ESSENTIALAI-STEM
Samuel C. Watson Samuel C. Watson (c. 1832 – March 13, 1892) was a druggist, medical doctor, and civic leader in Detroit, Michigan, and Chatham, Ontario. In the late 1850s and early 1860s, Watson was a part of the Detroit–Chatham Underground Railroad and closely connected with William Whipper and George DeBaptiste. During the American Civil War (1861–1865), Watson settled in Detroit, where he would eventually become a city councilman. He was politically independent, and found himself on opposite sides of debates with DeBaptiste and other Michigan blacks, and he switched from the Republican to the Democratic party in the mid-1880s. Early life Samuel C. Watson was born a slave in about 1832 in St. James Parish, South Carolina. When he was nine years old, his master died and he was sent with two brothers and two sisters to Washington, D.C., under the guardianship of Rev. William McLane, a Presbyterian preacher. He had already begun some education, and in Washington, he attended a school led by the wife of abolitionist and Underground Railroad conductor Leonard Grimes. He then attended Union Seminary led by John F. Cook. At the age of sixteen he enrolled at Phillips Academy in Andover, Massachusetts, where he studied for three years, one year in the classical department, before dropping out. The next spring he joined the crew of the survey schooner USS Madison (1822) at Brooklyn Navy Yard where he took part in surveys between Delaware Bay and Portland, Maine. The ship returned to New York, and Watson was discharged. He then followed his brothers and moved to Ohio and enrolled at Oberlin College. He again did not finish his studies, opting instead in 1853 to transfer to the Medical Department at the University of Michigan in Ann Arbor, Michigan. He left that school in 1856, moving to Cleveland, Ohio, to finish his studies at the Western Homeopathic College where he graduated in the winter of 1856, and was granted an M. D. in 1857. He then moved to Chatham, Ontario, where he practiced medicine until the fall of 1858. In Chatham, his offices were on the Charity block on King and Adelaid Streets owned by James Charity and also containing the offices of the Provincial Freeman run by Mary Ann Shadd. Canada That fall, he moved to British Columbia, following a gold rush there. Unsuccessful, he returned to Chatham the next fall. In 1859, he joined the steamboat the T. Whitney co-owned by abolitionists William Whipper and George DeBaptiste and run by DeBaptiste which shipped lumber and escaped slaves between Sandusky, Ohio, Detroit, Michigan, and Amherstburg, Ontario. In the winter of 1861, he married Sarah L. Cassey, the only daughter of Joseph and Ann Cassey in Salem, Massachusetts, and the couple settled in Toronto, where Watson was licensed to practice medicine. Detroit In 1863, Watson moved to Detroit, where he opened a drug store, which he ran until his death in 1892, although he was prohibited from practicing medicine there. His first wife, Sarah, died in 1875. The couple had six children, three of whom died in childhood. In 1877, he married again, to Camilla Coleman, the daughter of M. F. Coleman of Philadelphia. The couple had two children. Public career Watson became involved in Republican politics and in 1874, was president of the Detroit Political Union, an African American political action group which opposed the political efforts of George DeBaptiste, John D. Richards, and Walter Y. Clark. That year, Watson was nominated to the state legislature, but lost in the election. In 1875, he was nominated to the Board of Estimates, but again lost due to a ballot irregularity involving a misspelling of Watson's name as Samuel G. Watson rather than Samuel C. Watson. Since parties supplied their own ballots, Detroit blacks charged that the misspelling represented a betrayal of Watson by Republicans. His democratic opponent, M. J. Mills, refused the nomination and the alderman voted Watson to the seat. In 1876, he was again nominated to the state legislature and again lost. In 1883, he was nominated to the city council and was elected to the three-year term. He was chosen a state delegate-at-large for the 1884 Republican National Convention, favoring James G. Blaine for president, but who would lose in the general election to Grover Cleveland. Watson was politically independent minded, and his selection as a delegate was disputed, with Saginaw lumber baron William Q. Atwood the other candidate to represent black Michiganders. Watson along with Obadiah C. Wood feuded with Albert W. Hill, and when Watson term in the city council ended, he was not put up for a second term. When Watson's term in the city council ended, he requested and was promised a seat in the assessor's office, but in the end was not appointed. About that time, he left the Republican party, and in 1888, Watson wrote an article published in the Detroit Free Press in support of independent politics and questioning the Republican Party's support for civil rights. He formed the Independent Colored Democratic Club and was a member of the Jacksonians club. in 1892, he supported Grover Cleveland in the presidential election. In 1891, he was appointed to the Jury Commission by Michigan Governor Edwin B. Winans. Watson was also active in civic affairs. In 1884, he was honorary commissioner for the State of Michigan to the colored department of the World's Fair, the World Cotton Centennial in New Orleans. He was loosely connected to the Congregational denomination of the Christian church. Death Watson became very sick with the flu in the winter of 1890–1891, but recovered. In late February or early March 1892, he was again ill, and on March 13, 1892, Watson died of pneumonia. His funeral was held at his home on 559 Jefferson Avenue and he was buried at Elmwood Cemetery.
WIKI
MDPI MDPI (Multidisciplinary Digital Publishing Institute) is a publisher of open-access scientific journals. It publishes over 390 peer-reviewed, open access journals. MDPI is among the largest publishers in the world in terms of journal article output, and is the largest publisher of open access articles. It was founded by Shu-Kun Lin as a chemical sample archive. Between 2016 and 2020, the number of peer-reviewed papers published by MDPI grew significantly, with year-over-year growth of over 50% in 2017, 2018 and 2019, attracting attention to their very fast article processing times. In a review of 26 open-access "mega-journals" that published over 3,500 papers in 2022, 11 (42%) of the journals were from MDPI. Besides launching its own journals, MDPI has acquired journals from other publishers, such as Tomography from Grapho Publications in 2021, and Nursing Reports and Audiology Research from PagePress Publications in 2020. As of January 2024, MDPI publishes 433 academic journals, including 92 journals indexed within the Science Citation Index Expanded, 7 journals indexed within the Social Sciences Citation Index, 138 journals listed in SciFinder, and 270 in Scopus. Its journals are included in the DOAJ. MDPI also publishes open access books indexed in DOAB, OAPEN and BCI. It is a member of the Open Access Scholarly Publishers Association (OASPA), the Committee on Publication Ethics (COPE), the International Association of Scientific, Technical, and Medical Publishers (STM), and a participating publisher and supporter of the Initiative for Open Citations (I4OC). MDPI's business model is based on establishing entirely open access broad-discipline journals, with fast processing times from submission to publication and article processing charges paid by the author, their institutions or funders. MDPI's business practices have attracted controversy, with critics suggesting it sacrifices editorial and academic rigor in favor of operational speed and business interests. MDPI was included on Jeffrey Beall's list of predatory open access publishing companies in 2014 but was removed in 2015 following a successful appeal while applying pressure on Beall's employer. Some journals published by MDPI have also been noted by the Chinese Academy of Sciences and Norwegian Scientific Index for lack of rigor and possible predatory practices. History MDPI traces its roots to Molecular Diversity Preservation International, also abbreviated MDPI, which was founded by Shu-Kun Lin in 1996 as a chemical sample archive, with some scholarly publishing and conference activities. The second organisation, Multidisciplinary Digital Publishing Institute, was founded in 2010, primarily as a publisher. All of MDPI's journals have been open access and since 2008 published under a Creative Commons Attribution License (CC BY). Molecular Diversity Preservation International Molecular Diversity Preservation International was founded and registered as a non-profit association (Verein) by Shu-Kun Lin and Benoit R. Turin in Basel in 1996 to enable the deposit and exchange of rare molecular and biomolecular research samples. The journal Molecules was established in 1996 in collaboration with Springer-Verlag (now Springer Science+Business Media) in order to document the chemical samples of the MDPI collection. Several other journals were established by the MDPI Verein, including Entropy (1999), the International Journal of Molecular Sciences (2000), Sensors (2001), Marine Drugs (2003), and the International Journal of Environmental Research and Public Health (2004). The publisher MDPI AG was spun off from MDPI Verein in 2010. MDPI Verein co-organized several academic conferences, including the International Symposium on Frontiers in Molecular Science. It also runs virtual conferences, such as the Electronic Conference on Synthetic Organic Chemistry, which was started in 1997. In 2010 MDPI launched the platform Sciforum.net to host virtual conferences. In 2014, various virtual conferences were hosted in the areas of synthetic organic chemistry, material sciences, sensors, and sustainability. In 2015, MDPI co-organized two physical conferences with and at the University of Basel, the 4th Internationational Symposium on Sensor Science and the 5th World Sustainability Forum. Since 2015, scholars can organize their own conference for free on the Sciforum platform. MDPI (Multidisciplinary Digital Publishing Institute) MDPI as a publisher of open-access scientific journals was spun off from the Molecular Diversity Preservation International organization. It was formally registered by Shu-Kun Lin and Dietrich Rordorf in May 2010 with its official headquarters in Basel, Switzerland. Including Switzerland, MDPI has editorial offices in 11 countries, with five offices in China, two offices in both Romania and Serbia, and offices in the United Kingdom, Canada, Spain, Poland, Japan, Thailand, and Singapore. The number of published papers has been growing significantly in the last decade with year over year growth of over 50% in 2017, 2018 and 2019, with 110,000 papers published in 2019. MDPI reported publishing 235,638 papers in 2021 alone. In 2020, MDPI was the largest publisher of open access papers in the world and the 5th largest publisher overall in terms of journal paper output. MDPI was an early pioneer of the special issue model for academic publishing. The special issues are collections of papers on a specific topic, handled by guest editors (as opposed to members of the journal's editorial board). Many special issue papers are invited, either by the journal staff or by the guest editors. Roughly 88% of MDPI papers are published in special issues. The number of MDPI special issues has grown rapidly, alongside significant year-over-year growth in total papers published: in 2020, MDPI journals hosted a total of 6,756 special issues, compared to 39,587 special issues in 2021. However, only 10,504 of these 2021 special issues ultimately resulted in published papers. The number of special issues publishing papers rose to 17,777 in 2022. Who's Afraid of Peer Review? In 2013, the MDPI journal Cancers was targeted in the "Who's Afraid of Peer Review?" sting operation and rejected the fake paper. Inclusion in Beall's list MDPI was included on Jeffrey Beall's list of predatory open access publishing companies in February 2014. Beall's concern was that "MDPI's warehouse journals contain hundreds of lightly-reviewed articles that are mainly written and published for promotion and tenure purposes rather than to communicate science." Beall also claimed that MDPI used email spam to solicit manuscripts and that the company listed researchers, including Nobel laureates, on their editorial boards without their knowledge. MDPI responded to Beall's claims, seeking to debunk them. Chemist Peter Murray-Rust criticized the inclusion of MDPI in Beall's list, stating that his criticism of the publisher "lacks evidence" and is "irresponsible". MDPI made a successful appeal to the Beall's list appeals board in October 2015, and was removed from the list. Even after its removal, Beall remained critical of MDPI; in December 2015 he wrote: "it is clear that MDPI sees peer review as merely a perfunctory step that publishers have to endure before publishing papers and accepting money from the authors," and "it's clear that MDPI's peer review is managed by clueless clerical staff in China." Beall's list was shut down in 2017. Beall later wrote that he had been pressured to shut down the list by his employer University of Colorado Denver and various publishers, specifically mentioning MDPI as a publisher that had "tried to be as annoying as possible to the university so that the officials would get so tired of the emails that they would silence me just to make them stop." 2014 OASPA evaluation Following Beall's criticism of MDPI, the Open Access Scholarly Publishers Association (OASPA) conducted an investigation in April 2014. This investigation was based on the controversy surrounding two papers, one in Life, the other in Nutrients; the listing of Nobel Prize winners on the website; the roles of editorial board members and of Shu-Ki Lin within the company; and the functions of the different office locations. OASPA concluded that MDPI satisfactorily meets the OASPA Membership Criteria. 2016 data breach In August 2016, MDPI was breached, leaving exposed 17.5 GB of data, including 845,000 e-mail addresses and e-mail exchanges between authors, editors and reviewers. According to MDPI, the unprotected instance at which the data was breached has since been protected. Resignations of editors In August 2018, 10 senior editors (including the editor-in-chief) of the journal Nutrients resigned, alleging that MDPI forced the replacement of the editor-in-chief because of his high editorial standards and for resisting pressure to "accept manuscripts of mediocre quality and importance." In June 2020, the would-be guest editors of a special issue in the International Journal of Environmental Research and Health resigned after being informed by an MDPI representative that a quota of publication-fee exemptions allocated to the special issue could only be given to scholars from developed countries. In 2021, five members of the editorial board of the journal Vaccines resigned after Vaccines published a controversial article that misused data to reach the incorrect conclusion that vaccines against COVID-19 had no clear benefit. Withdrawals of support by faculties and universities In December 2021, the Faculty of Science of the University of South Bohemia in České Budějovice announced that it will stop financial support for publishing in MDPI journals, officially recommended against publishing in or reviewing for MDPI, and warned that publications in MDPI journals might not be taken into account for evaluations of employees and departments. In January 2023, Zhejiang Gongshang University (浙江工商大学) in Hangzhou, China, announced it would no longer include articles published in Hindawi, MDPI, and Frontiers journals when evaluating researcher performance. Inclusion in Early Warning List of the Chinese Academy of Sciences In December 2020, the Chinese Academy of Sciences published a list of journals that may suffer from issues of scientific quality and other risk characteristics. There were 22 MDPI group journals in the 65 journals given in its initial list. MDPI responded to the list promising to communicate with the academy and improve its journals' parameters to remove the affected journals from the list as soon as possible. The list was updated in December 2021 and reduced to only 41 journals, of which seven MDPI journals were included. Perception of Hungarian researchers A survey published in 2022 asked Hungarian researchers for their perception of MDPI journals. Those Hungarian researchers generally felt MDPI journals were sufficiently prestigious to be worth publishing in, being indexed in major databases and having reasonable journal impact factor. However, most researchers felt the primary driving force to publish with MDPI journals was their fast article turnaround time. In 2019–2020, MDPI articles took 35–37 days on average for acceptance (including revisions), and 41 days to publish the final article online after its initial submission, as compared to an industry average of 163 days. Assessments in the Nordic countries MDPI has been criticized by scientific bodies in Norway, Finland, and Denmark that rank academic journals for their quality and relevance. In the Finnish and Danish lists, the majority of MDPI journals do not meet the criteria of the body to be ranked in the list. The Norwegian Scientific Index has been less critical, giving the vast majority of individual MDPI journals designations as "level 1", denoting a publisher as academic; although some journals are ranked "level 0" denoting non-academic status, including one of MDPI's flagship journals, Sustainability. In 2021, following a survey sent to Norwegian scientists, the Norwegian Scientific Index also created a special rank called "level X", which was used to denote journals undergoing evaluation as possible predatory journals, specifically citing concerns over MDPI journals for the new rank's creation. The head of the National Publication Committee of Norway and a number of Norwegian scholars have been highly critical of MDPI, with some lobbying to remove MDPI from the Norwegian Scientific Index entirely. They cite the poor reputation of MDPI among Nordic scientific bodies, how there are many academics that boycott MDPI journals outright, or accuse MDPI journals of having a peer review process that is not up to academic standards. Among their descriptions, they call MDPI a Chinese organization with a "small artificial office in Switzerland", and "a money-making machine" that plays on the desire of academics to embellish their CV (see publish-or-perish). Allegation of anomalous citation patterns In July 2021, Maria Ángeles Oviedo-García published a paper in OUP journal Research Evaluation claiming that MDPI journals had anomalously high self-citation rates compared to leading journals in the same fields. The alleged high self-citation rate is not to other articles in the same journal, but rather to other MDPI journals. Oviedo-García argued that this is indicative of predatory journals. MDPI released a response to Oviedo-García's paper on their website eight days later. MDPI highlighted a number of issues with the article and its framing, arguing in particular that leading journals should not be directly compared to non-leading journals; MDPI also argued that, when compared to other publishers, MDPI does not have anomalously high self-citations. Research Evaluation published an expression of concern for Oviedo-García's paper in September 2021, which eventually led to a correction published in April 2023. Changes made to the article added caveats and toned down inflammatory language, however the core conclusions remained the same. A 2023 study utilizing a different method reached a broadly similar conclusion that MDPI journals had more self-citations than journals by other publishers. The study also found that MDPI journals received more citations from a smaller network of journals, relative to journals by other publishers. Concerns over papers connected to a research paper mill In December 2021, it was reported how the research paper mill International Publisher Ltd. had sold authorships to hundreds of publications published across most major publishers; a controversy attracting international attention that affected many major publishing groups. The report highlighted a ring of MDPI guest editors that provided a network for the sale of authorship for articles published across multiple MDPI journals (Sustainability, Mathematics, Energies, and the Journal of Theoretical and Applied Commerce Research). Also in December 2021, Dr. Brian Perron highlighted how International Publisher Ltd. had published articles in the International Journal of Emerging Technologies in Learning (iJet), and MDPI including articles from Energies. In response, iJet retracted thirty articles, and thanked Perron and his team for their concerning findings. In response, Damaris Critchlow from MDPI stated that MDPI was investigating the papers in question and developing strategies to combat paper mills. Perron later expressed appreciation with how iJet had handled its response, but frustration with MDPI for not taking his allegations of fraud seriously, citing how one Energies article still did not even have an expression of concern added six months later. 2023 Clarivate delistings In February 2023, Clarivate discontinued coverage of two MDPI journals, the International Journal of Environmental Research and Public Health and the Journal of Risk and Financial Management in the Web of Science, for publishing content not related to their scope. As a result, both were removed from the Clarivate Web of Science database, losing their impact factors. Also, citations from these journals no longer affect the impact factors of other journals. Controversial articles In December 2011, the MDPI journal Life published Erik D. Andrulis' theoretical paper, "Theory of the Origin, Evolution, and Nature of Life", aiming at presenting a framework to explain life. It attracted coverage by the popular science and technology magazines Ars Technica and Popular Science, which characterized it as "crazy" and "hilarious". A member of Life 's editorial board resigned in response. In 2013, another MDPI journal, Entropy, published a review paper claiming glyphosate may be the most important factor in the development of obesity, depression, attention deficit hyperactivity disorder, autism, Alzheimer's disease, Parkinson's disease, multiple sclerosis, cancer, and infertility. The paper itself does not contain any primary research results. It was criticized as pseudo-science by the popular science magazine Discover. With regard to the same controversial study, Jeffrey Beall rhetorically asked, "When publishers like MDPI disseminate research by science activists like Stephanie Seneff and her co-authors, I think it's fair to question the credibility of all the research that MDPI publishes. Will MDPI publish anything for money?". A study published in the MDPI journal Nutrients in 2011 went through a series of corrections first in August 2011, then in April 2012, and then again in February 2014. The article claimed that obesity rates in Australia increased in the same timeframe that sugary soft drink consumption declined by 10%. The article was used by soft drink industry lobbyists to argue that sugary drinks were not significantly contributing to obesity rates. However the article itself debunked its own claim, with one figure showing that soft drink consumption had increased by 30% during the time period where the authors claimed a 10% reduction in consumption. Nutrients issued a correction claiming that the previously described 10% drop in consumption referred to an increase in the use of artificial sweeteners, and reflected overall sugar consumption rather than soft drink consumption. The correction said that "some words were missing." This correction has been derided by some as "nonsense" and untrue, suggesting that the correction does not address the core issue of whether sugar consumption increased in Australia over the time period investigated. The journal Nutrients and the senior author of the article maintain that the thrice-corrected article is now accurate, and that corrections that were made were immaterial to the conclusions of the study. In 2016, MDPI journal Behavioral Sciences published a review paper that claimed that watching pornography is a cause of erectile dysfunction. After critics raised concerns, an independent review by the Committee on Publication Ethics (COPE) recommended that the article be retracted, based on issues including an unusual editorial process in which the listed journal editor declared that he "was not involved in the final decision regarding correction/retraction/authorship," an inaccurate and incomplete conflict of interest declaration that failed to disclose author connections with anti-pornography activist groups, failure to obtain informed consent from the study subjects, and failure to protect the identities of those subjects. Instead of retracting the paper, MDPI removed the editor's name from the paper and issued an amended conflict of interest statement which, according to Retraction Watch, did not fully address the conflicts of interest identified by COPE, nor the other issues identified by them. When contacted by Retraction Watch, MDPI's response was "The argument is already done. Both sides got large audience. Time to stop and made peace." The journal Magnetochemistry accepted a paper in 2019 by a controversial scientist Susan Pockett which stated that "scientists are suppressing evidence that microwave radiation from smartphones and other devices cause harm to people". The paper was later that year retracted due to lack of a scientific contribution and being an opinion article. The journal initially invited Susan Pockett to submit a paper according to the author's own account. In 2019, MDPI journal Psych published an editorial on race and intelligence by Richard Lynn, who had previously had his emeritus status revoked due to his promotion of discredited sexist and racist views, such as scientific racism. MDPI later issued an expression of concern and changed the status of the article from editorial to opinion, three months after publication. According to science journalist Angela Saini, Psych had also published other similar work defending scientific racism. In 2021, the MDPI journal Vaccines published an article by pseudoscience advocate Harald Walach and colleagues claiming a "lack of clear benefit" for COVID-19 vaccines. The article was heavily criticized for misusing data and as a result reaching a false conclusion. Katie Ewer, one of the journal's editors, called the publication of the article "grossly irresponsible" and resigned from the editorial board as a protest against its publication. Subsequently, four other members of the editorial board also resigned. Shortly afterwards, the journal published an "expression of concern" regarding the article and opened an investigation into the review process. The paper had received three reviewer reports (which the journal later made public) which were however not very detailed and had apparently been written by reviewers who did not have topic expertise. Vaccines eventually decided to retract the article. Proliferation of special issues Paolo Crosetto, research director at INRAE-GAEL, first noted the proliferation of MDPI special issues in his blog in April 2021, giving them, alongside a fast turnaround time, credit for MDPI's success. He reported that in 2013, MDPI published 388 special issues, or about 5 per journals, while in 2021, the number grew to nearly 40,000, or about 500 per journal. Special issues usually are proposed by scientists to journals, who then makes a decision about whether or not the special issue is suitable for the journal. Crosetto noted that in contrast, "at MDPI, it is the publisher who sends out invitations for Special Issue, and it is unclear which role, if any, the editorial board of the normal issues has in the process." In July 2021, Oviedo-García analysed the number of special issues published by MDPI journals in 2019 and 2020. In 2019, the numbers varied greatly, from 14 in the journal Vaccines, to 500 in the journal International Journal of Molecular Sciences, with the average number of special issues in each journal being 113. The number of special issues was more than double the number of regular issues in over 90% of MDPI journals. In 2020, the numbers were even higher, reaching "as surprisingly high as 788 special issues in Sustainability, 830 in Applied Sciences, and 846 in Materials." Nearly 95% of all MDPI journals published more than one special issue per week. According to Jack Grove in Inside Higher Ed, International Journal of Molecular Sciences will host 3,514 "special issues with a closing date in 2023", and Sustainability 3,512, averaging over more than nine special issues per day. This number of special issues leads to "concerns about how peer review can be conducted effectively at this scale" as well as questions about the thematic relevance to the journal.
WIKI
Healthy eating habits/Answering Questions about Women, Healthy bones and Sources of Calcium The purpose of this guide is to answer common questions on serves of dairy for calcium requirements, different sources of calcium other than dairy and for using a variety of sources in meals for optimum calcium intake. It was developed for women over 35 years. Background There are over 170 uses for calcium in our body and 99% is used for bone strength. The calcium makes our bones strong and the bones in turn serve as a storage reservoir for calcium. If our diet is lacking in calcium, the body will take it from the reservoir in the bones, making them weaker. Osteoporosis is the weakening of the internal structure of the bone. 3.4% of Australians have confirmed osteoporosis and significantly, 82% of these cases are women. Healthy bones will be denser while weaker bones will have a more porous structure, which will fracture more easily. From 35 years onward, the process of bone regeneration slows down and after 60 years, 50% of all women experience osteoporotic fracture (Whitney et al, 2011). How much is a serve of dairy? * 250 ml or 1 cup milk or calcium fortified soy * 200 g or ¾ cup yogurt * 40 g hard cheese How many serves per day do women require? (NHMRC, 2014) * 2½ serves per day until 50 years * serves per day after 50 years How I can incorporate serves in my day? Examples * 125 ml on cereal at breakfast; 200 g tub yogurt as a snack; 40 g cheddar on a sandwich * 200 g yogurt with oats at breakfast; 125 ml skim milk in a latte as a snack; 30 g Parmesan on pasta Animal and plant sources of calcium (compiled Whitney et al, 2011; Nuttab 2010 online) Animal sources and plant sources NOT animal vs. plants! When plant and/ or animal sources are grouped together and served in the one meal, small milligrams of calcium add up to calcium rich meals. This adds variety to the diet as well as sources of Vitamin C, Folate and dietary fibre. In addition there is increasing evidence that a dietary pattern with a wide variety of foods is important for good health, rather than the emphasis on one or two food groups. For example, the Mediterranean diet (reference). Bioavailability Bioavailability is the rate and extent to which calcium (or any nutrient) can be absorbed by the body and utilised for the requirements. Plant sources have greater bioavailability than animal sources. Calcium bioavailability of animal and plant sources (Whitney et al, 2011) Bioavailability and plant sources In countries like China where almost no dairy products are consumed, osteoporosis is uncommon, providing evidence that plant sources can play a vital role in strong bones. Grouping many different vegetables in the one meal not only provides for greater calcium, but takes advantage of the greater bioavailability of plant sourced calcium (Whitney et al, 2011). Stir Fry of Bok Choy, Tofu, Almonds and Broccoli Serves 2 1 bunch Bok Choy 2 cups broccoli florets 1 red capsicum cut into thin strips 1 cup calcium set tofu, cut into cubes and marinated in 2 tbsp. of tamari, 1 tbsp. of grated fresh ginger, 1 tbsp. grated fresh garlic, and juice of 1 lemon 60 g almonds, lightly toasted in oven 2 tbsp. peanut or grape seed oil ½ tsp. toasted sesame oil 1 tsp. grated ginger extra Juice of ½ lemon Bake marinated tofu cubes in moderate oven for 20-30 minutes. Heat peanut oil and stir fry capsicum first followed by green vegetables. Add marinade drained from tofu and continue until vegetables are just cooked. Add another tsp. of grated ginger, sir though and add juice of half a lemon Add tofu, almonds and sprinkle with sesame oil, stir gently through. Serve with brown rice Calcium note: 2 cups of raw Bok Choy (which will wilt) can contain as much as 300 mg of calcium, the same as 250 ml serve of cow’s milk. Sardine Fish Cakes with Sweet Potato http://www.primalpalate.com/paleo-recipe/sardine-and-sweet-potato-fish-cakes/ Calcium note: Serve with a sauce of 3 heaped tsp. of tahini (387 mg calcium) thinned with 100 g of natural yogurt (225 mg calcium) and flavoured with finely chopped coriander. Cauliflower and Brussels Sprout Cheese Gratin http://www.canadianliving.com/food/cauliflower_and_brussels_sprouts_gratin.php Calcium note: combining dairy sources with good plant sources increases total calcium intake in one meal. General Australian Guide to Healthy Eating, http://www.eatforhealth.gov.au/ Better Health Channel: Calcium (see Osteoporosis risk quiz in sidebar) http://www.betterhealth.vic.gov.au/bhcv2/bhcarticles.nsf/pages/Calcium?open Osteoporosis Australia at http://www.osteoporosis.org.au/ Individual Advice Dietitians Association of Australia, http://daa.asn.au/ to find an accredited practicing dietitian
WIKI
Megali Idea The Megali Idea (Μεγάλη Ιδέα) is a nationalist and irredentist concept that expresses the goal of reviving the Byzantine Empire, by establishing a Greek state, which would include the large Greek populations that were still under Ottoman rule after the end of the Greek War of Independence (1821–1829) and all the regions that had large Greek populations (parts of the southern Balkans, Anatolia and Cyprus). The term appeared for the first time during the debates of Prime Minister Ioannis Kolettis with King Otto that preceded the promulgation of the 1844 constitution. It came to dominate foreign relations and played a significant role in domestic politics for much of the first century of Greek independence. The expression was new in 1844 but the concept had roots in the Greek popular psyche, which long had hopes of liberation from Ottoman rule and restoration of the Byzantine Empire. Πάλι με χρόνια με καιρούς, * πάλι δικά μας θα 'ναι! (Once more, as years and time go by, once more they shall be ours). The Megali Idea implies establishing a Greek state, which would be a territory encompassing mostly the former Byzantine lands from the Ionian Sea in the west to Anatolia and the Black Sea to the east and from Thrace, Macedonia and Epirus in the north to Crete and Cyprus to the south. This new state would have Constantinople as its capital: it would be the "Greece of Two Continents and Five Seas" (Europe and Asia, the Ionian, Aegean, Marmara, Black and Libyan Seas). If realized, this would expand modern Greece to roughly the same size and extent of the later Byzantine Empire, after its restoration in 1261 AD. The Megali Idea dominated foreign policy and domestic politics of Greece from the War of Independence in the 1820s through the Balkan wars in the beginning of the 20th century. It started to fade after the Greco-Turkish War (1919–1922), followed by the population exchange between Greece and Turkey in 1923. Despite the end of the Megali Idea project in 1922, by then the Greek state had expanded four times, either through military conquest or diplomacy (often with British support). After the creation of Greece in 1830, it acquired the Ionian Islands (Treaty of London, 1864), Thessaly (Convention of Constantinople (1881)), Macedonia, Crete, (southern) Epirus and the Eastern Aegean Islands (Treaty of Bucharest), and Western Thrace (Treaty of Neuilly, 1920). The Dodecanese were acquired after the Second World War (Treaty of Peace with Italy, 1947). A related concept is enosis. Fall of Constantinople The Byzantine Empire was Eastern Roman in origin and was called the "Roman Empire" by its inhabitants, though often not by the Latin West, which regarded it as Greek. After its fall, Hieronymus Wolf popularized the usage of "Byzantium". An informal cultural division had existed within the Roman Empire for centuries. Although Latin was the official language of the empire, Greek was the lingua franca in the East and was regularly used alongside Latin in official business. The division of the Empire following the death of Emperor Theodosius in AD 395 added a formal political layer to the informal cultural division. Following the adoption of Christianity in the 4th century, Greek was also the dominant liturgical language, as exemplified by the fact the New Testament was written in Greek. These factors ultimately led to Greek replacing Latin as the official language in AD 620. Byzantium held out against numerous invasions over the centuries and during the 10th and early 11th centuries managed to reclaim considerable territory in the Balkans, Anatolia and to a lesser extent Syria. The Turkish invasion of the mid to late 11th century however greatly weakened the Empire and, although it partially recovered under the Komnenos dynasty, it never managed to regain control of the Anatolian interior, cutting the empire off from a valuable source of manpower and tax revenue. In 1204 Constantinople was besieged and sacked during the Fourth Crusade and became the Capital of what has come to be known as the Latin Empire, a French dominated crusader state, until it was liberated by the Empire of Nicaea, the Byzantine state in exile, in 1261. However, Byzantine strength would rapidly diminish towards the end of the 13th century and evaporated almost entirely during the 14th century, to the extent that by 1400 little remained of the Empire except Constantinople, the city’s immediate surroundings and some small territories in modern-day Greece. In 1453 the Ottoman Turks besieged and captured Constantinople officially marking the end of the Roman Empire and also the end of Greek predominance in the city; although it would continue to have a considerable Greek speaking population and the Patriarch of Constantinople continued to reside in the city. Greeks under Ottoman rule Subject Nationalities of the German Alliance (1917) (cropped).jpg in 1917.{{legend|black|Bulgars and Turks}} {{legend|maroon|Greeks}} {{legend|yellow|Armenians}} {{legend|teal|Kurds}} {{legend|orange|Lazes}} {{legend|olive|Arabs}} {{legend|green|Nestorians}}]] Under the millet system which was in force during the Ottoman Empire, the population was classified according to religion rather than language or ethnicity. Orthodox Greeks were seen as part of the millet-i Rûm (literally "Roman community") which included all Orthodox Christians, including beside Greeks also Bulgarians, Serbs, Vlachs, Slavs, Georgians, Romanians and Albanians, despite their differences in ethnicity and language and despite the fact that the religious hierarchy was Greek dominated. It is not clear to what extent one can speak of a Greek identity during those times as opposed to a Christian or Orthodox identity. In the late 1780s, Catherine II of Russia and Joseph II of Austria intended to reclaim the Byzantine heritage and restore the Greek statehood as part of their joint Greek Plan. During the Middle Ages and the Ottoman period, Greek-speaking Christians identified as Romans and thought of themselves as the descendants of the Roman Empire (including the medieval Eastern Roman Empire). The term Roman was often interpreted as synonymous with Christian throughout Europe and the Mediterranean during this time. The terms Greek or Hellene were largely seen by Ottoman Christians as referring to the ancient pagan peoples of the region. This changed during the late stages of the Ottoman Empire and the emergence of the Greek independence movement. Greek War of Independence and later After the Greek War of Independence ended in 1829, a new southern Greek state was established, with assistance from the British Empire, Kingdom of France, and Imperial Russia. However, this new Greek state under John Capodistrias after the Greek War of Independence was, with Serbia, one of the only two countries of the era whose population was smaller than the population of the same ethnicity outside its borders; most ethnic Greeks still resided within the borders of the Ottoman Empire. This version of Greece was designed by the Great Powers, who had no desire to see a larger Greek state replace the Ottoman Empire. The Great Idea embodied a desire to bring all ethnic Greeks into the Greek state, and subsequently revive the Byzantine Empire; it applied specifically to the Greeks in Epirus, Thessaly, Macedonia, Thrace, the Aegean Islands, Crete, Cyprus, parts of Anatolia, and the city of Constantinople (which would replace Athens as the capital). When the young Danish prince Wilhelm Georg was elected king in 1863, the title offered to him by the Greek National Assembly was not "King of Greece", the title of his deposed predecessor, King Otto; but rather "King of the Hellenes". Implicit in the wording was that George I was to be king of all Greeks, regardless of whether they then lived within the borders of his new kingdom. The first additional areas to be incorporated into the Kingdom were the Ionian islands in 1864, and later Thessaly with the Treaty of Berlin (1878). Revolts, Cretan crisis and Greco-Turkish War (1897) In January 1897, violence and disorder were escalating in Crete, polarizing the population. Massacres of the Christian population took place in Chania and Rethimno. The Greek government, pressured by public opinion, intransigent political elements, extreme nationalist groups (e.g. Ethniki Etairia) and with the Great Powers reluctant to intervene, decided to send warships and personnel to assist the Cretans. The Great Powers had no option then but to proceed with the occupation of the island, but they were too late. A Greek force of 1,500 men had landed at Kolymbari on 1 February 1897, and its commanding officer, Colonel Timoleon Vassos, declared that he was taking over the island "in the name of the King of the Hellenes" and that he was announcing the union of Crete with Greece. This led to an uprising that spread immediately throughout the island. The Great Powers finally decided to land their troops and stopped the Greek army force from approaching Chania. At the same time their fleets blockaded Crete, preventing both Greeks and Turks from bringing any more troops to the island. The Ottoman Empire, in reaction to the rebellion of Crete and the assistance sent by Greece, relocated a significant part of its army in the Balkans to the north of Thessaly, close to the borders with Greece. Greece in reply reinforced its borders in Thessaly. However, irregular Greek forces and followers of the Megali Idea acted without orders and raided Turkish outposts, leading the Ottoman Empire to declare war on Greece; the war is known as the Greco-Turkish War of 1897. The Turkish army, far outnumbering the Greek, was also better prepared, due to the recent reforms carried out by a German mission under Baron von der Goltz. The Greek army fell back in retreat. The other Great Powers then intervened and an armistice was signed in May 1897. The war, however, only ended in December of that year. The military failure in the Greco-Turkish war cost Greece small territorial losses along the border line in northern Thessaly, and a large sum of financial reparations that wrecked Greece's economy for years, while giving no lasting solution to the Cretan Question. The Great Powers (Britain, France, Russia, and Italy) in order to prevent future clashes and trying to avoid the creation of a revanchist climate in Greece, imposed what they thought of as a lasting solution; Crete was proclaimed an autonomous Cretan State. The four Great Powers assumed the administration of Crete; and, in a decisive diplomatic victory for Greece, Prince George of Greece (second son of King George I) became High Commissioner. Balkan Wars A major proponent of the Megali Idea was Eleftherios Venizelos, under whose leadership Greek territory doubled in the Balkan Wars of 1912–13 — southern Epirus, Crete, Lesbos, Chios, Ikaria, Samos, Samothrace, Lemnos and the majority of Macedonia were attached to Greece. Born and raised in Crete, in 1909 Venizelos was already a prominent Cretan and had influence in mainland Greece. As such, he was invited after the Goudi coup in 1909 by the Military League to become Prime Minister of Greece. Venizelos pressed forward a series of reforms in society, as well as the military and administration, which helped Greece succeed in its goals during the Balkan Wars. World War I Following the Greek gains in the Balkan Wars, the Ottomans began to persecute ethnic Greeks living in the Empire, which led to ethnic cleansing in the Greek genocide. This persecution continued into World War I when the Ottomans declared for the Central Powers on late 1914. Greece remained neutral until 1917 when they joined the Allies. Refugees reports of Turkish atrocities as well as the Allied victory in World War I seemed to promise an even greater realization of the Megali Idea. Greece gained a foothold in Asia Minor with a protectorate over Smyrna and its hinterland. Following 5 years of Greek administration, a referendum was to be held to determine whether the territory would revert to Ottoman control or join Greece. Greece also gained the islands of Imbros and Tenedos, Western and Eastern Thrace, the border then drawn a few miles from the walls of Constantinople. Greco-Turkish War (1919–1922) Greece's efforts to take control of Smyrna in accordance with the Treaty of Sèvres were thwarted by Turkish revolutionaries, who were resisting the Allies. The Turks finally prevailed and expelled the Greeks from Anatolia during the Greco-Turkish War (1919–1922) (part of the Turkish War of Independence). The war was concluded by the Treaty of Lausanne which saw Greece cede Eastern Thrace, Imbros, Tenedos and Smyrna to the nascent Turkish Republic. To avoid any further territorial claims, both Greece and Turkey engaged in an "exchange of populations": During the conflict, 151,892 Greeks had already fled Asia Minor. The Treaty of Lausanne moved 1,104,216 Greeks from Turkey, while 380,000 Turks left the Greek territory for Turkey. The transfers ended any further appetite for pursuing the concept of a Greater Greece and ended the 3000 year Greek habitation of Asia Minor. Further population exchanges occurred after World War I, including 40,027 Greeks from Bulgaria, 58,522 from Russia (because of the defeat of the White Army led by Pyotr Wrangel) and 10,080 from other lands (for example Dodecanese or Albania), while 70,000 Bulgarians from Thrace and Macedonia had moved to Bulgaria. From the Bulgarian refugees ca. 66,000 were from Greek Macedonia. The immediate reception of refugees to Greece cost 45 million francs, so the League of Nations arranged for a loan of 150 million francs to aid settlement of refugees. In 1930, Venizelos even went on an official visit to Turkey, where he proposed that Mustafa Kemal be awarded the Nobel Peace Prize. The Greek novelist Yiorgos Theotokas described the psychological impact of the defeat of 1922:"'For a short time, while the Treaty of Serves ran its joyful but uncertain course, it seemed to them that the...long-buried hopes of their ancestors were to be fulfilled. But the terrible summer of 1922 came all too soon. From the hermitage of Arsenios they watched, tense with anxiety, the daily unfolding of the national tragedy, the last desperate efforts of the Royalist Governments of Greece to save the situation, the failure of King Constantine's attempt to take Constantinople, and the final Catastrophe. In mid-August Mustapha Kemal broke through the Greek front and the Greek army, exhausted by ten years of warfare and the privations of the Asia Minor campaign, was vanquished in two weeks. The Turks, advancing rapidly, recaptured in quick succession Afion-Karahisar, Eski-Shehir, Kiutahia, Brussa, Oushak—and then Smyrna! Once again the banners of Islam floated proudly, tauntingly, over the Aegean coast opposite Chios and Mytilene. The whole of Ionia was in flames. Slaughter and pillage descended on the smiling city of Smyrna and in a few short days turned it into a ruin...As day succeeded day, Greece seemed to have become paralyzed, to have lost all will, all ability to resist the blows of fate. The swiftness of the catastrophe completely overwhelmed the State, flooded as it was by the thousands of fleeting soldiers and refugees who sought shelter on the Greek coasts.The nation was plunged into deep despair... Greece had lost her big gamble and had been uprooted from Asia Minor. St. Sophia remained in the hands of the Moslems. The brilliant plans of 1918 were mocking visions, hallucinations, dreams. And the return of reality was truly heartbreaking. The tale of the years was not yet told, then, the historic hour, the fulfillment of the Great Idea, the moment they had longed for with such faith and such anxiety for five tortured, bloody centuries, had not yet come! It was all a lie!'" World War II, annexation of Dodecanese and Cyprus dispute Although the Great Idea ceased to be a driving force behind Greek foreign policy, some remnants continued to influence Greek foreign policy throughout the remainder of the 20th century. Thus, after his coup d'état of 4 August 1936, Ioannis Metaxas proclaimed the advent of the "Third Hellenic Civilization", similar to Adolf Hitler's Third Reich (influenced by pan-Germanism). The attack by Italy from Albania and the Greek victories enabled Greece to conquer, during the winter of 1940–1941, parts of southern Albania (Northern Epirus, as it is identified by Greeks) which were administered as a province of Greece for a short time until the German offensive of April 1941. The occupation, resistance and the civil war initially put the Great Idea in the background. Nevertheless, another very good diplomatic performance by the Greek side at the Paris Peace Conference, 1946 secured a further enlargement of Greek territory, in the form of the Dodecanese Islands, despite the very strong opposition of Vyacheslav Molotov and the Soviet delegates. The British colony of Cyprus became the "apple of discord" between the two countries, putting an end to the positive Greco-Turkish relations that had existed since the Kemal-Venizelos agreement in the 1930s. In 1955, a Greek army colonel of Greek Cypriot origin, George Grivas, began a campaign of civil disobedience whose purpose was primarily to drive the British from the island, then move for Enosis with Greece. The Greek prime minister, Alexandros Papagos, was not unfavourable to this idea. There was increasing polarisation of opinion between the dominant Greek population and the minority Turks. The problems in Cyprus affected the continent itself. In September 1955, in response to the demand for Énosis, an anti-Greek riot took place in Istanbul. During the Istanbul Pogrom 4,000 stores, 100 hotels and restaurants and 70 churches were destroyed or damaged. This led to the last great wave of migration from Turkey to Greece. The Zürich Agreement of 1959 culminated in independence of the island with Greece, Turkey and UK as guarantee powers. The inter-ethnic clashes from 1960 led to the dispatch of a peacekeeping force of the United Nations in 1964. The Cyprus issue was revived by the dictatorship of the colonels, who presented their April 21, 1967, coup d'état as the only way to defend the traditional values of what they called the "Hellenic-Christian Civilization". Brigadier General Ioannidis arranged, in July 1974, to overthrow Cypriot President Archbishop Makarios, and proceed with Enosis (union with Greece). This led to Turkey invading the island in response, with the expulsion of Greek Cypriots in areas controlled by Turkey, and the flight of Turkish Cypriots from the south. In 1983, the north declared independence and to this day, Turkey is the only country that recognizes Northern Cyprus. Attempted revival by Golden Dawn The ultra-nationalist Golden Dawn party, which had electoral support from 2010 to 2019, supports the Megali Idea, with party leader, Nikolaos Michaloliakos stating: "For two thousand years, the Jews would say a wish during their festivals, "next year in Jerusalem", and ultimately after many centuries they managed to make it a reality. So I too conclude with a wish: Next year in Constantinople, in Smyrna, in Trebizond!" Michaloliakos criticized Thessaloniki mayor Yiannis Boutaris for wanting to name a street after Atatürk, who was born in the city when it was still part of the Ottoman Empire. In January 2013, a group of Golden Dawn supporters attacked the car of Turkish consul-general Osman İlhan Şener and hurled insults at Atatürk, during an anti-Turkey protest in Komotini. Mihaloliakos has also called for the "liberation" of Northern Epirus. Golden Dawn and its former Cypriot counterpart ELAM support enosis. In 2015, close to 100 Golden Dawn members and leaders were arrested on a range of charges, including murder and racketeering. In 2019, the party's level of support, slumped to less than 2%. In October 2020, most of Golden Dawn's leadership was convicted, including Michaloliakos. As of 2023, the party, which never enjoyed electoral support above 10% of the popular vote, now has no remaining members in either the Hellenic or European Parliament.
WIKI
You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today. Subscribe .Net Core Banner Today, I sat down to create a DAL for one of our internal projects here and was rather surprised by what I was met with when I clicked the Data option in 'Add New Item' Homer Simpson Confusedin Visual Studio. The ADO .Net Entity Data Model and EF Generators were completely gone. Why? Well... because Microsoft hasn't made them yet, but that didn't stop them from releasing .Net Core 3 or EF 6, of course. When has not having a fully baked product ever stopped Microsoft before, right? Who remembers Windows ME or Vista? 😆 I was shocked to see people on Stack Overflow and Microsoft alike recommending that people create a project targeting the standard .net framework, create their designer or code first classes, and then paste them into their .Net Core project. 😳 This post will walk you through the steps necessary to get EF 6.x installed in your .Net Core 3 application and how to scaffold your existing database, so you have data models and a database context that you can work with. Missing Entity Framework Options Adding EF to .Net Core 3 The good news is that adding EF to a Core 3.1.2 project is actually pretty simple. You simply need to complete the following steps: 1. First, you want to make sure that you have the .Net Core SDK, which you may find here. *Note this is the x64 installer. 2. Now that you have installed the SDK you will be able to install EF directly into your core project. To do this open up the package manager console in Visual Studio and issue the following command: dotnet tool install --global dotnet-ef 3. Next, you're going to need to add a couple of packages so that you can generate your models from an existing database or make updates in the future. You do that with the following commands in package manager console: dotnet add package Microsoft.EntityFrameworkCore.SqlServer dotnet add package Microsoft.EntityFrameworkCore.Design 4. Last but not least, you'll most likely want to scaffold your existing database and build out your models and dbContext. To do that, you execute the following command: dotnet ef dbcontext scaffold "Server=xxxxxx;Database=xxxxxx;Trusted_Connection=True;" Microsoft.EntityFrameworkCore.SqlServer ---output-dir Models Voila! That's it. All of your models should be located in the Models directory off of the root within your project. As always, should you have any questions or need any help you can always reach out to us on our Contact Page. Until next time... Happy Coding! Happy Coding!
ESSENTIALAI-STEM
Download Windows 98 Complete Setup Download Windows 98 ISO from softrar.com for free. You can use the ISO file for virtualization purposes. The ISO file can also be used as OS in your computer if you have the CD/floppy of Windows 98. Download Windows 98 if you want to download windows 98 for study purposes or for fun. Or you might be interested to use the old OS just for checking the things out, then this the perfect place for you. You can download Windows 98 here for free. Windows 98 Download File size: 625 MB Filename: Windows 98 Second Edition ISO Distributor: Microsoft Launcher: Microsoft Language: English Year: 1999 link for amazon purchase Windows 98 Windows 98 home screen After the success of Windows 95, Microsoft has brought the new Windows 98 for the users in May, 15,1998. Windows 98 was officially released on may, 15,998 but wasn’t completely available for users until June, 25,1998. In Windows 98, Microsoft has highly focused on web integration. The OS uses the MS-DOS with FAT32 support to run on your computer. They also improved support for devices like ACPI, AGP, 1394, USB, IEEE, MMX and DVD. The Windows 98 works the same as Windows 95, on MS-DOS 7.1. There were also improved in User-Interface for users. They have made it more clear and clean desktop for the users by adding the start menu shortcuts/quick launch. Where they have added programs like Internet Explorer 4.0/5.0, deskbands, activate desktop and channels. There was an option to customize the taskbar with the addition of Microsoft Plus. Microsoft Plus was a collection or bundle of applications where you could find anti-virus, disk cleaner, CD player, and Wallpaper. All of these features were completely free for Windows 98 and Windows 95 users. As a comparison for Windows 95 and 98 both had Microsoft Plus but there were some big changes in the bundles. Windows 95 had more like an older and fewer number of the app as compared to Windows 98. In windows 98, Microsoft also improved the audio card support with more advanced and better windows drivers. Direct x6.1 and Windows player 6.2 was also introduced who replaced the old media player of Windows 3 or Windows 95. Other supports were also improved like USB support, LAN and memory support as well. The Old Internet Explorer 4.0 was also replaced with Internet Explorer 5.0. The internet connection sharing was also introduced in Windows 98. There is DirectX x6.0 in the option for you to install it on your computer.                                                                                                    Note: Remember that it will require a full OEM (Original Equipment Manufacturer) to be bootable. Windows 98 editions There were two versions of Windows 98, the first and second editions. The first edition was the OS present on different computers preinstalled or also called the RTM Gold version. The first edition was the most common version present on newly purchased computers. However, the second edition was the original version of Windows 98. Unlike Windows 98 first edition, in the second edition, you can install the latest version of Internet Explorer 5.0, Microsoft Net Frame version 1.0 and 2.0, Remote desktop 5.1 and even Microsoft Office. Yes, you read it right, you are able to run Microsoft Office on your Windows 98. You can also install Direct 9.0c.   Features: Here are some features which are added to windows 98. Channels Is a feature of windows 98 where you are downloading a page, where it synchronizes with that website. You will be able to read the content without the internet(offline) and it gets frequent updates as well. Activate Desktop This feature allowed users to have a customized screen. Multiple Screen This was the first time for users to use multiple screens at a single time. Background options Now, in Windows 98 you are able to use file types like “.jpg, BMP, PCX, HTML, and GIF” as your desktop wallpaper. Paint With Windows 98, Microsoft has also improved Paint as well. In new Paint, you are able to open file types like .jpg, .bmp, PCX, HMTL, and GIF. Hardware support There were also improvements made for hardware support as well. They had improved the floppy disk HSFLOP.PDR, which helped highly to increase floppy speed. They also added CD-ROM support however, the installation was optional for the users. Power Management This feature will allow the users to turn on/off their monitor after some period of time. Extended network connections Microsoft has improved its connectivity to the internet even more in windows 98. They have brought the old Internet Explorer 4 to 5 and has also improved the LAN support for better internet performance. The web is more optimized and easier to use now. Requirements The following requirements should be completed to install or run Windows 98 on your computer. Processor:          486DX/66 MHz or higher Memory:            16MB RAM (24 MB of RAM is recommended) or higher Hard-drive:        320 MB or higher Graphics:             VGA or higher resolution Hardware:         CD-ROM or DVD-ROM, Mouse, Keyboard How to install Windows 98 on your computer? Before to download windows 98 and install it on your computer, you will need a few things before. Remember that Windows 98 is an old OS, so it cannot run most of the current applications present in the market. It should also be mentioned that you might find slower performance with numbers of bugs and possible crashes. You should have a backup of your data before installing it because you might lose them while installing Windows 98. It will be easier and safe to install it on an empty drive. After or during the installation you might get some notifications about to upgrade to Windows 10/ Latest Windows, so ignore them all. You will also need the drivers of sound, videos, and network if you don’t possess the cards. Disk partition for Windows 98 before installing the Windows 98 OS, you need to do the partition of your computer. This partition will help you to install Windows 98 on your computer. Without this, you won’t be able to install Windows 98 on your computer. 1. Insert your file Try to insert your floppy/ CD (if you have used the Amazon link) or the booted USB/CD drive (to create a bootable USB drive of Windows 98 is below) on your computer. It is not compulsory to have a floppy, bootable CD or DVD. Just download Windows 98 ISO and restart your computer. 2. Choose the drive Make sure you have configured the Bois first. Now, you will get two options to install it on your computer. You can either install it from your hard drive or from CD/ Floppy you have put. Choose where your ISO file is by putting the number of the drive and press Enter. If this option appears doesn’t appear, worry not. Just follow the next step. 3. Choose the with or without CD booting Now, basically you will get two options of booting windows 98 with a CD or without a CD. The difference is that with CD it will do the partition on its own while without the partition will be a task for you. 4. Type fdisk A back screen of command prompt will appear, type fdisk and continue to the next step. 5. Press Y Some details will be given on your screen. Now, press Y and continue to the next step. 6. Choose “Create DOS partition Four options will be given to you. Choose the first option (Create DOS Partition or Logical Dos Drive) by putting 1 and pressing Enter. 7. Create “Primary DOS partition Another four options will be given. Now, Select the first option (Create Primary DOS Partition) and put 1 and press Enter. 8. Maximum size of Partition You will get this notification. You can either select it by typing Y or reject it by typing N. However if you want to other partition as well then we would recommend type N and create an extended partition and continue. 9. Press “ESC After the partition is complete your computer will require to restart. Press ESC to restart your computer. 10. Choose “without CD-ROM support Now, an option will appear. Choose the option of Start Windows 98 setup without CD-ROM support by typing 2 and pressing Enter. If your computer turns off, then again the same option will appear. Choose the same option and continue. 11. Type “Format If you got some drives name or other issues then type extract ebd.cab format.com and when the extraction is done, type format c: or else these steps are not necessary. And you will need to continue to the next part of installing Windows 98 which is given below. 12. Type “Y Now, as you want to format the disk C: which in result all of your files will be deleted. You will need to format the drive. To do that type Y and press Enter. 13. Drive name When you are done with formatting your drive. Follow the next step by putting the drive name. You put the drive name (of 11 characters) or leave it blank. Installing Windows 98 As now you have done the partition for windows 98, it is time to install it. Remember that the partition section is compulsory and you cannot install Windows 98 with the partition. 1. Put the floppy The first step is to put the floppy or CD in your computer and restart the computer. 2. CD Rom support Now, choose the CD Rom Support option and continue to next step. 3. Type C:\Windows\options\cabs Type the following “C:\Windows\options\cabs” and press “Enter”. 4. Type Setup You have typed C:\Windows\options\cabs now type “Setup” in the end and continue. 5. Continue The computer will scan disk and click on “Continue”. 6. Select directory Choose the second option. 7. Type “C:\Windows” Now, type “C:\Windows” and click on “Next”. A caution will appear, “accept” and continue to next step. 8. Setup option Choose the custom and click on the “Next” button. Now, choose all the files you want to install by clicking on the boxes. And click on “Next”. 9. Computer details Fill in the blanks and continue. 10. Choose the other options The last thing to do is to select languages, locations and keep going forward. 11. Last step After a while, your computer will need to restart (restart your computer). When your computer starts enter the details and choose the other options like computer name, time zone and continue. Your computer will load and a few moments later your windows 98 is successfully installed. Windows 98 product key? Now you are done to download Windows 98, you might be in search of its product key? Here is a link for Windows 98 product keys. Click on the link and put the product key to activate your windows 98. Can you still use Windows 98? Yes, you can still use Windows 98. The OS is not officially supported, still you can use it for free by downloading Windows 98 on softrar.com. Zaf Hey, it is Zaf. I am a content writer who has written above 120 contents. I am a tech enthusiast who is constantly learning and trying to improve his skills to help others. My goal is to provide the software and their solutions to others. 6 Responses 1. Renea Sasao says: Hi, always i used to check weblog posts here early in the dawn, because i like to learn more and more.| 2. This is really attention-grabbing, You’re an excessively professional blogger. I’ve joined your rss feed and sit up for in the hunt for more of your great post. Additionally, I’ve shared your website in my social networks| 3. Hi colleagues, its impressive article about teachingand completely explained, keep it up all the time.| 4. Hi terrific website! Does running a blog such as this require a large amount of work? I’ve absolutely no understanding of coding but I had been hoping to start my own blog soon. Anyway, if you have any suggestions or techniques for new blog owners please share. I know this is off topic but I just had to ask. Appreciate it!| 5. I like reading a post that will make men and women think. Also, thank you for allowing me to comment!| 6. Stunning quest there. What occurred after? Take care!| Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Money-rich, time-poor (2nd nomination) The result was delete‎__EXPECTED_UNCONNECTED_PAGE__. ✗ plicit 00:27, 15 February 2024 (UTC) Money-rich, time-poor AfDs for this article: * – ( View AfD View log | edits since nomination) The article in its lamentable current state reads more like a brief collection of vague examples within the very broad concept of time poverty. I'd say an article on this particular phrase is more suited for Wikitionary than for Wikipedia. A concise definition and any brief etymological/historical context of the expression is all that's needed. Mooonswimmer 20:57, 1 February 2024 (UTC) * Note: This discussion has been included in the deletion sorting lists for the following topics: Business and Economics. Shellwood (talk) 21:03, 1 February 2024 (UTC) * Move to Time poverty, which appears to be a valid research subject, and expand. PaulT2022 (talk) 23:14, 1 February 2024 (UTC) Please add new comments below this notice. Thanks, ✗ plicit 00:09, 9 February 2024 (UTC) * Delete. There doesn't seem to be any scholarly/encyclopedia content here. Closed Limelike Curves (talk) 22:04, 5 February 2024 (UTC) * Relisted to generate a more thorough discussion and clearer consensus. * Delete Heavy on WP:SYNTH, and the term itself is sourced to LinkedIn, clearly not a RS. A merge or move to Time poverty doesn't make much sense because the sources cited aren't specifically describing the same thing (hence the SYNTH) and without all the examples-in-search-of-a-subject, there isn't much left that isn't already covered in that article. WeirdNAnnoyed (talk) 01:35, 9 February 2024 (UTC) * Delete: This feels largely like an essay. It includes many opinions in the prose ("Time by all accounts, [sic] is the most valuable thing people can possess.") and doesn't source the common use of the phrase very well. Mentions articles but doesn't attribute authors. I think that "time poverty" might be notable, but the article is supposed to be about the phrase, and none of the work of this article is really usable except for the sources (besides the Linkedin one). —asparagusus (interaction) sprouts! 23:26, 9 February 2024 (UTC)
WIKI
different story Noun * 1) Any story featuring elements of science fiction or fantasy (as opposed to typical stories which are set in the real world).
WIKI
UPDATE 1-Autostrade in talks over bill for collapsed Genoa bridge (Recasts with talks with commissioner over 400 mln euro payment) MILAN, Dec 28 (Reuters) - Italy’s Autostrade said it is in talks over a request to pay 400 million euros ($460 million) to fund the rebuilding of the collapsed Genoa bridge with the special commissioner appointed by the government to oversee its reconstruction. Autostrade, part of infrastructure group Atlantia, operated the bridge that collapsed on Aug. 14, killing 43 people and severing a motorway that connects the port city of Genoa with southern France. The government blamed Autostrade for the disaster and decided to exclude the business from the reconstruction project, even though it will have to pay for it. The special commissioner, Genoa Mayor Marco Bucci, has asked Autostrade for around 400 million euros to fund the rebuilding of the bridge as well as the purchase of empty buildings under it. Autostrade said it was having “daily and constructive talks” with the commissioner, but added that it had filed a legal complaint against the government decree that excludes it from rebuilding the viaduct, arguing that it violated existing laws. The reconstruction contract has been awarded by Bucci to Italy’s biggest builder Salini Impregilo and shipbuilder Fincantieri. The project will cost 202 million euros plus tax and be completed in 12 months, the commissioner has said. ($1 = 0.8721 euros) (Reporting by Francesca Landini in Milan and Paola Balsomini in Genoa, editing by Valentina Za and Louise Heavens)
NEWS-MULTISOURCE
George Frederick Edmonstone Sir George Frederick Edmonstone, KCB (11 April 1813 – 24 September 1864) was an administrator in India. Life Edmonstone was born in Calcutta, the fourth son of Neil Benjamin Edmonstone (1765–1841), a member of the supreme council in India and a director of the East India Company. In 1829 Edmonstone went to the East India College at Haileybury, the precursor of Haileybury and Imperial Service College, before proceeding to Bengal in 1831. He held various positions in the Indian civil service before being appointed as Lieutenant-Governor of the North-Western Provinces from 19 January 1859 to 27 February 1863. Retiring in 1963, Edmonstone was made a knight commander of the Order of the Bath (civil division) in December 1863. He died in Effingham, Surrey on 24 September 1824. There is a plaque dedicated to him in St Lawrence's Church, Effingham. One of the houses at Haileybury and Imperial Service College was named after Edmonstone, along with other distinguished Indian civil servants. Time line
WIKI
What (exactly) is bullying? Grayson Bruce's backpack struck a nerve, one that didn't originate with My Little Pony or Candler Elementary. The 9-year-old boy's account of being told not to bring his "My Little Pony" backpack to school because it triggered bullying propelled him into the national spotlight last week, drawing a national response as huge in volume as it was in fervor. Tens of thousands supporters from around the country weighed in on social media, many calling the school system with profane comments and veiled threats. Some wanted the school's principal fired and others asked for an overhaul of the district's bullying prevention methods. But even within the 600-student community of Candler Elementary, the perception of how much of a problem bullying truly presents — and what it even means — varies widely. "As parents, we think the negative attention on our schools has just been totally uncalled for and blown out of proportion," Candler Elementary PTA president Allison Frady said. "Candler doesn't really have bullies," she said. "We don't have a bullying situation here. We just don't. Kids will be mean to each other or get into it, but as far as actual, physical bullying — it's really not an issue. Kids will be kids." School officials say defining bullying is among the greatest challenges in addressing it, especially when the parents reporting incidents aren't always on the same page. "The fact is that bullying is not a school issue, it's a societal, cultural issue," said David Thompson, director of student services for Buncombe County Schools. "Of course we want to address it in school and take it incredibly seriously, but the only way to actually 'solve' bullying is to address it in our culture, not just the classroom." Logistically, defining bullying in a school setting can be almost as complex as solving it. There are dozens of ways a school administrator or teacher can label conflict in disciplinary records, and there is no perfect checklist for "bullying" and "non-bullying" incidents, even when all the facts are present. A fight or conflict between two students could be called anything from "conflict" to "fights" to "disrespect," depending on the observations and perspective of the teacher or administrator reporting it. "It's difficult to get hard data on bullying," Thompson said. "We have probably 30 or 40 discipline codes. Interpretation has a lot to do with it." For the 2012-13 school year, 113 discipline incidents were specifically for bullying, Thompson said. There were 31 reports to the school's bullying hotline and about 175 online bullying reports. About 15-20 percent of the online reports lacked sufficient detail to provide adequate follow up, he said. The school district only recently started collecting the data, making it impossible to offer any real comparisons over time. Nationwide, it's estimated about 30 percent of what's actually happening is being reported, Thompson said, so even that data only tells us so much. Reports come most often from grades five through nine, he said. All staff are trained in recognizing bullying, but not every incident fits neatly into one category or another. "The problem with labeling everything one way is that you have to address different types of conflict differently," Thompson said. "If two students are calling each other names, there are ways we can address that through counseling and mediation. If the issue really is bullying, though, mediation isn't an effective way to handle it." "If it's bullying, meaning there's an imbalance of power, then mediation is not the way to handle it," he said. "It's a complex, layered issue." The U.S. Department of Health and Human Services defines bullying as unwanted, aggressive behavior among school-aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Bullying includes making threats, spreading rumors, attacking someone physically or verbally and excluding someone from a group on purpose. The line between conflict and bullying comes with a balance of power, Thompson said. If both parties have a sense of control, and that's being exchanged, it's conflict. If one party has more control in that conflict, it may be bullying. During a March 2013 telephone survey of more than 5,000 parents in Buncombe County, 58 percent of parents said the school system does a "good job" of preventing bullying. About 34 percent of parents said the schools could do more to create a climate that encourages respect and discourages bullying, and about 8 percent of parents surveyed said they could to a lot more to prevent bullying. The questions were part of a bigger school safety survey following the Sandy Hook school shootings. The school's primary anti-bullying programming falls under the districtwide Positive Behavioral Interventions and Supports. The program is fairly young — it was first introduced five years ago and has been slowly implemented across the district. Eight schools have yet to implement the program, one of which is Candler Elementary. Behavioral programs can take several years to yield results, Thompson said, though schools in the district have already been recognized for progress. Emma Elementary School, Enka Middle School and Clyde A. Erwin Middle School were recognized recently by the North Carolina Department of Public Instruction for implementation PBIS. The Behavioral Interventions and Supports program is widely-used approach comprised of intervention practices, disciplinary strategies and staff training for "establishing the social culture, learning and teaching environment and individual behavior supports needed to achieve academic and social success for all students." Each school has a program team of staff and administrators, during which bullying incidence and reports would be reviewed. Support for Grayson Grayson's family has already seen something of a happy ending, though his mother, Noreen Bruce, said she won't stop at getting Grayson's backpack back in school. The school district in a statement last week said administrators regretted "that the issue of being told to leave the bookbag at home was perceived as blaming Grayson." That was not the intent, the district said. Buncombe County Schools administrators have offered to help Grayson acclimate to a new elementary school within the district if that's what he wants, and they will work with Bruce to introduce new anti-bullying programming in schools. "What I wanted at the beginning of all this was just to do the right thing for my kid, to get him what we needed for him to be happy," Bruce said. "But we want something good to come of this, and I think there's a lot of work we can do." Bruce said she will work with Thompson to help organize a parent advisory council on bullying, and Thompson is already in the process of writing a federal grant to devote more funding to bullying prevention efforts. Bruce, who made several national media appearances over the last week with Grayson, said the response has been overwhelmingly positive from a national audience but somewhat mixed at home. "Some parents are still pretty mad at us," Bruce said. "And that's unfortunate. It was never our intention to attack the schools ... we want to make them better." Bruce said the response from some who supported Grayson has even been unwanted. Many called the school and central office with aggressive messages and threats on Grayson's behalf. "That was really eye opening to me," Bruce said. "It's no wonder we have a bullying problem here, when we have parents who are actively bullying a school." Many of Grayson's supporters jumped on the "bullying triggers" concept first, saying the idea of hiding an item that elicits bullying is comparable to blaming the victim. "Every parent is going to find a different line of talking with their child about how they can find the best mode of expression," said Eliza Byard, executive director of the national Gay, Lesbian and Straight Education Network. "The key here is that kids will be happier and healthier if they have parents working with them. And that work is so worth it," Byard said. "If your kid knows you're on their team, they can handle a lot more than if they feel that they're alone in it. Parents have to be careful, even if you think you're protecting your child by leaving the backpack at home, that can send the wrong message. "We're incredibly encouraged there's been progress in the district, and what happened here is really in line with what we're seeing across the country, that schools are responding and working with parents in supportive ways when parents speak out and really express concern."
FINEWEB-EDU
Health Benefits Of Hemp Oil Hemp oil, also known as hemp seed oil, is one of the most popular herbal remedies on the market today. Advocates of the substance say it's able to improve acne, treat cancer, slow the progression of Alzheimer's disease, reduce the chances of developing heart disease, and provide several other miracle health benefits. Some of the claims have clinical research to back them up, while others don't have any scientific backing. Hemp oil won't work as a cure-all, and it's important to understand the actual potential benefits of using it. Scientific data indicates hemp oil can be helpful for skin conditions and inflammation due to its chemical components. By understanding how the substances in hemp oil help health, individuals can make informed decisions regarding their supplement usage. Treats Acne Dreamstime There is a good amount of scientific data indicating hemp oil can help treat acne. One study conducted in 2014 concluded hemp oil has powerful effects when treating acne, and even went so far as to say it's a near-universal treatment for different forms of acne, which is a huge potential breakthrough. Acne comes in many different forms, and it's influenced by a variety of causes. One of the biggest causes is genetics. Some individuals experience only minor acne breakouts during adolescence, while others experience severe acne throughout their entire lives. The 2014 study was a preliminary one that's opened the door for more potential findings. Further research is being conducted regarding the exact ways hemp oil can help with acne. This will allow experts to fine-tune dosages and understand how best to take advantage of the substance's benefits. The study indicated hemp oil was able to suppress the overproduction of oil in the sebaceous glands on the skin. Oil overproduction is what causes pores and glands to be clogged, leading to pimples. Read more about the health benefits of hemp oil now. Alleviates Eczema And Psoriasis Dreamstime Hemp oil has been proven to have significant health benefits in regards to a variety of skin conditions. In addition to the promising research regarding acne treatment, there have been studies showing hemp oil can help with the treatment of eczema and psoriasis. One study in 2005 was conducted over twenty weeks. The researchers analyzed the data and concluded taking hemp oil supplements as part of a balanced diet could help eczema symptoms to improve. After taking hempseed oil, patients with eczema experienced an increase in their linoleic acid, alpha-linolenic acid, and essential fatty acid levels. There wasn't any significant increase in arachidonic acid. The participants indicated the dryness and itchiness of their skin were improved, and they had less need to use topical dermal medication. For psoriasis, a study conducted in 2015 showed omega-3 fatty acids may help treat the condition when taken in supplement form. Hemp oil is rich in these compounds. According to the study, omega-3 fatty acids have the highest efficacy when combined with oral retinoids, UVB phototherapy, and topically applied vitamin D. Uncover more health benefits of hemp oil now. Acts As An Antibacterial Dreamstime Some studies have been done regarding the use of hemp oil as an antibacterial agent. There has been data proving hemp oil has antibacterial properties and may affect certain strains of bacteria. To find out about its efficacy on other strains of bacteria, more studies need to be done. The antibacterial properties of the oil shouldn't be used as a replacement for antibiotics in individuals who have bacterial infections. The study indicates hemp oil is more effective as a preventative measure than as an actively killing one. Antibiotics attack an infection that already exists, while hemp oil's antibacterial properties are better at inhibiting the growth of bacteria. One of the bacteria that showed inhibited growth was Staphylococcus aureus. This finding was significant because this kind of bacteria can be dangerous. It has the potential to be responsible for several health conditions. In addition to causing skin infections, this bacteria can lead to pneumonia of the lungs, bone infections, and heart valve infections. Discover additional health benefits of hemp oil now. Reduces Inflammation Dreamstime Some evidence has been compiled that indicates hemp oil can reduce inflammation. A study conducted in 2011 showed adding omega-3 fatty acids to one's diet might help reduce inflammatory activity in the body. Omega-3s are found in hemp oil and several other naturally occurring supplements as well. Inflammation is a process that can cause serious pain and discomfort in the body. If the inflammatory processes continue over time, they can also lead to damage in different areas of the body. Some chronic health conditions are exacerbated or caused by inflammation. If an individual experiences chronic inflammation and pain, they may benefit from hemp oil or other dietary supplements that have high omega-3s. In the 2011 study, it was shown that different individuals have different abilities to absorb vital omega-3 supplements when they come in different forms. More studies are being conducted regarding the ability of the body to absorb vital omega-3s and omega-6s from different types of supplements. Get more information on the health benefits linked to hemp oil now. Natural Pain Relief Dreamstime Hemp oil can contribute to natural pain relief in multiple ways. One is that, as previously mentioned, the omega-3 components of the oil may help reduce inflammation. For those who experience chronic pain due to inflammation, the anti-inflammatory effects can have a significant impact on pain levels. The same is true of those recovering from a temporary muscle injury that's become inflamed. Another study done in 2011 indicated hemp oil can help reduce painful and uncomfortable symptoms related to menopause. Hemp oil is not the same substance as marijuana, though it comes from the same plant, the Cannabis sativa plant. To make hemp oil, the ripe seeds of hemp plants are cold-pressed. The plants don't contain THC, which is the compound that creates the 'high' in marijuana. However, they retain the painkilling properties marijuana boasts. MORE FROM HEALTHPREP Katherine MacAulay
ESSENTIALAI-STEM
User:<IP_ADDRESS> Hi, about "free software" and "open source software", I've replied to your post on the slightly old Wesnoth article: http://en.wikinews.org/wiki/Talk:Open_source_game_Wesnoth_reaches_version_1.0 <IP_ADDRESS> 14:00, 11 October 2005 (UTC)
WIKI
Roy HOWARD, Jeryl Abramson and YRP, LLC, Plaintiffs, v. The TOWN OF BETHEL, et al., Defendants. No. 06 Civ. 0032(WCC). United States District Court, S.D. New York. March 28, 2007. Law Office of Russell A. Schindler, Kingston, NY (Russell A. Schindler, of Counsel), for Plaintiffs. Drake, Loeb, Heller, Kennedy, Gogerty, Gaba & Rodd, PLLC, New Windsor, NY (Stephen J. Gaba, of Counsel), for all Town of Bethel Defendants. Sullivan County Attorney, Monticello, NY (Samuel S. Yasgur, of Counsel), for Defendant Daniel Hogue. OPINION AND ORDER WILLIAM C. CONNER, Senior District Judge. Plaintiffs Roy Howard, Jeryl Abramson and YRP, LLC (“YRP”) bring this action pursuant to 42 U.S.C. § 1983 against defendants the Town of Bethel (the “Town”), the Town of Bethel Planning Board (the “Planning Board”), Herman Bressler, Chairman of the Planning Board, Planning Board members William Brey, Elmer Brucher, Leon Smith, Wilfred Hughson, Timothy Dollard and Bernard Greisberg (collectively, the “Planning Board members”), Victoria Vassmer-Simpson, the Town Supervisor, Town Board members Robert Blaise, Harold Russell, Richard Crumley and Daniel Sturm (collectively, the “Town Board members”), and Daniel Hogue, Sheriff of Sullivan County. Specifically, plaintiffs allege that defendants infringed their rights to freedom of speech, assembly and association, as guaranteed by the First Amendment to the United States Constitution, as well as their Fourteenth Amendment right to due process of law and equal protection of the laws by imposing restrictions on plaintiffs’ ability to hold a large public gathering and outdoor camping event commemorating the 1969 Woodstock festival. In addition to damages and injunctive relief, plaintiffs seek a declaratory judgment that certain Town public assembly ordinances are unconstitutional. The Town defendants now move for summary judgment on all counts, contending that: (1) the Rooker-Feldman doctrine and the doctrines of collateral estoppel and res ju-dicata bar plaintiffs’ First Amendment claims; (2) the doctrine of absolute legislative immunity bars plaintiffs’ claims against the Town Board members; (3) the doctrine of qualified immunity bars plaintiffs claims against the Planning Board members; and (4) plaintiffs’ First and Fourteenth Amendment claims fail on the merits. Defendant Hogue moves, pursuant to Fed. R. Crv. P. 12(b)(6), to dismiss the Complaint for failure to state a claim upon which relief may be granted. For the reasons that follow, defendants’ motions are granted. BACKGROUND The record reveals the following facts. Plaintiffs are owners of more than 100 acres of real property located within the County of Sullivan, New York, which is located near the site where the historic 1969 Woodstock music festival took place. (Complt.¶¶ 11-12.) The property is located in an area classified under the Town of Bethel Code of Ordinances (the “Town Code”) as an agricultural district. (Town Defs. Rule 56.1 Stmt. ¶ 7.) In 1996, plaintiffs held a three-day outdoor music festival on their property in commemoration of the 1969 Woodstock event. (Id. ¶ 3.) The festival, which included live music and performances, was attended by thousands of people, many of whom camped on plaintiffs’ property. (Id. ¶4.) The Town Code permits such uses of agricultural property upon grant of a special use permit and site plan approval by the Planning Board. (Id. ¶ 8.) Plaintiffs, however, did not obtain a special use permit before holding the event. (Id. ¶ 15.) The following year, plaintiffs proposed to hold a similar event, but the Town successfully sued them in New York State Supreme Court and obtained a permanent injunction preventing plaintiffs from holding festivals without the land use approvals required by the Town Code. (Id. ¶¶ 18-19.) Notwithstanding the 1998 state court injunction, from 1997 to 2003, plaintiffs have held an event on the property each August, which they have variously denominated a “political rally,” “garage sale,” or “private party.” (Id. ¶ 20.) In December of 2003, plaintiffs applied for a special use permit to hold an event in August 2004. (Id. ¶ 28.) Plaintiffs stated that they would be charging an admission fee and operating concession stands on the property, but did not request permission to allow camping during the event. (Id. ¶ 29.) The Town granted plaintiffs’ application on the condition that they prohibit camping and the lighting of open fires. (Id. ¶ 30.) Nevertheless, plaintiffs permitted attendees to camp, as well as light and maintain open fires. (Id. ¶ 34.) The following year, plaintiffs again sought a permit, this time with a provision for camping. (Id. ¶¶ 35-37.) It was denied due to several incidences of non-compliance with the Town Code, including plaintiffs’ failure to pay consultant fees incurred by the Town in evaluating the application on public health, safety and transportation criteria. (Id. ¶¶ 38-41.) Plaintiffs nonetheless held their gathering, but ostensibly did not charge admission. (Id. ¶¶ 42-44.) Rather, they collected “suggested donations” of $35 from those in attendance. (Id.) During the event, plaintiff alleges that Hogue’s deputy sheriffs established a roadblock and searched festival attendees, as well as engaged in helicopter flyovers of the property. (Pls. Mem. Opp. Summ. J. at 1-2.) Plaintiffs subsequently filed the present lawsuit. During the pendency of this litigation, in August 2006, defendants moved, by Order to Show Cause in New York State Supreme Court, to enjoin plaintiff from holding a festival, which was scheduled to begin on August 10, 2006. (Gaba Reply Decl., Ex. C (transcript of 2006 state court proceeding).) At that proceeding, the court addressed plaintiffs’ constitutional arguments at length and held that: (1) the ordinances in question did not violate the First Amendment; and (2) plaintiffs were bound by the 1998 permanent injunction prohibiting them from holding the festival without first obtaining a permit. (See id.) Accordingly, the court enjoined plaintiffs from holding their event. (See id.) DISCUSSION I. The Town Defendants’ Motion for Summary Judgment Summary judgment may be granted where there are no genuine issues of material fact and the movant is entitled to judgment as a matter of law. See Fed. R. Civ. P. 56(c); Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247-50, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). A fact is material only if, based on that fact, a reasonable jury could find in favor of the nonmoving party. Anderson, 477 U.S. at 248, 106 S.Ct. 2505. The burden rests on the mov-ant to demonstrate the absence of a genuine issue of material fact. Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). In deciding whether summary judgment is appropriate, the court resolves all ambiguities and draws all permissible factual inferences against the movant. See Anderson, 477 U.S. at 255, 106 S.Ct. 2505. To defeat summary judgment, the nonmovant must go beyond the pleadings and “do more than simply show that there is some metaphysical doubt as to the material facts.” Matsushita Elec. Indus. Co., v. Zenith Radio Corp., 475 U.S. 574, 586, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). The Court’s role at this stage of the litigation is not to decide issues of material fact, but to discern whether any exist. See Gallo v. Prudential Residential Servs., L.P., 22 F.3d 1219, 1224 (2d Cir.1994). A. Plaintiffs’ First Amendment Claims Are Barred by Collateral Estoppel The first count of plaintiffs’ Complaint, sounding against the Town, contends that sections 57.2, 57.3 and 57.9 of the Town Code establish “the outright criminalization of ‘sleeping outside’ ” and are thus overbroad in violation of the First Amendment. (Pls. Mem. Opp. Mot. Summ. J. at 12.) Additionally, plaintiffs contend that, in failing to grant them a special use permit, the Planning Board and Planning Board members violated their rights to freedom of speech, association and assembly under the First Amendment to the United States Constitution. (Compita 62-64.) The Town defendants contend that plaintiffs’ claims are barred by collateral estoppel, as they were previously litigated in 1998 and 2006. We agree. As a preliminary matter, we must ascertain whether New York or federal principles of collateral estoppel control our analysis in the present case. As the United States Supreme Court has acknowledged, [t]he preclusive effect of a state court judgment in a subsequent federal lawsuit generally is determined by the full faith and credit statute, which provides that state judicial proceedings “shall have the same full faith and credit in every court within the United States ... as they have by law or usage in the courts of such State ... from which they are taken.” 28 U.S.C. § 1738. This statute directs a federal court to refer to the preclusion law of the State in which judgment was rendered. “It has long been established that § 1738 does not allow federal courts to employ their own rules of [preclusion] in determining the effect of state judgments. Rather, it goes beyond the common law and commands a federal court to accept the rules chosen by the State from which the judgment is taken.” Kremer v. Chemical Construction Corp., 456 U.S. 461, 481-482, 102 S.Ct. 1883, 72 L.Ed.2d 262 (1982); see also Allen v. McCurry, 449 U.S. 90, 96, 101 S.Ct. 411, 66 L.Ed.2d 308 (1980). Section 1738 embodies concerns of comity and federalism that allow the States to determine, subject to the requirements of the statute and the Due Process Clause, the preclusive effect of judgments in their own courts. Marrese v. Am. Academy of Orthopaedic Surgeons, 470 U.S. 373, 380, 105 S.Ct. 1327, 84 L.Ed.2d 274 (1985). Accordingly, we apply New York principles of collateral estoppel to the present case. Under New York law, “[t]he doctrine of collateral estoppel precludes a party from relitigating an issue which has previously been decided against him in a proceeding in which he had a fair opportunity to fully litigate the point .... ” Kaufman v. Eli Lilly & Co., 65 N.Y.2d 449, 455-56, 482 N.E.2d 63, 492 N.Y.S.2d 584 (1985) (internal quotation marks omitted; citations omitted). The doctrine serves the two-fold purpose of conserving limited judicial resources and preventing a losing party from getting a second bite at the apple by merely choosing a new forum in which to litigate. See id. In order to invoke the doctrine of collateral estoppel, a party must demonstrate that: (1) “the identical issue necessarily [was] decided in the prior action and [is] decisive of the present action”; and (2) “the party to be precluded from relitigating the issue ... had a full and fair opportunity to contest the prior determination.” Id. The burden of demonstrating that the issues in the present case and the prior litigation are identical rests on the party seeking the benefit of collateral estoppel, whereas the party seeking to avoid application of the doctrine has the burden of proving that it lacked a full and fair opportunity to litigate the issue in the prior proceeding. Id. As a preliminary matter, we note that collateral estoppel can be invoked only against a party to the prior action or one in privity with such a party. Buechel v. Bain, 97 N.Y.2d 295, 303-05, 766 N.E.2d 914, 740 N.Y.S.2d 252 (2001). Plaintiffs contend that, because Abramson was not a party to the prior litigation, the doctrine cannot be applied to the present case. Perhaps unsurprisingly, plaintiffs do not address the issue of privity. Id. at 304, 740 N.Y.S.2d 252, 766 N.E.2d 914 (internal quotation marks omitted; citations omitted). In the present case, our privity inquiry is not a difficult one, as it is undisputed that Howard and YRP were parties in the 1998 action and that Abram-son acquired title to the subject property from Howard. Accordingly, we conclude that, as a successor to his property interest, Abramson is in privity with Howard and is subject to collateral estoppel in the same manner as his grantor. See id. In the context of collateral estoppel, privity does not have a single well-defined meaning .... Rather, privity is an amorphous concept not easy of application ... and includes those who are successors to a property interest, those who control an action although not formal parties to it, those whose interests are represented by a party to the action, and [those who are] coparties to a prior action.... Turning to the first element, we note that in order for an issue to satisfy the identity requirement, it must have been actually litigated and necessarily decided in the prior proceeding. D’Arata v. N.Y. Cent. Mut. Fire Ins. Co., 76 N.Y.2d 659, 666-67, 564 N.E.2d 634, 563 N.Y.S.2d 24 (1990). In order to have been actually litigated, the issue “ ‘must have been properly raised by the pleadings or otherwise placed in issue and actually determined in the prior proceeding.’ ” Evans v. Ottimo, 469 F.3d 278, 282 (2d Cir.2006) (quoting D’Arata, 76 N.Y.2d at 667, 563 N.Y.S.2d 24, 564 N.E.2d 634). In the present case, the validity of the ordinances at issue was necessarily adjudicated implicitly at the 1998 proceeding and explicitly at the 2006 preliminary injunction hearing. In the 1998 proceeding, plaintiffs argued as an affirmative defense that “the Zoning Code of the Town of Bethel and Town of Bethel Uniform Fire Prevention and Building Code Enforcement Law are unconstitutional, invalid, illegal, and unenforceable.” (See Town Defs. Mem. Supp. Summ. J., Ex. 16.) Notwithstanding this argument, the state court issued an injunction enjoining plaintiffs from non-compliance with the very provisions they claimed violated the constitution. Plainly, the court’s issuance of the injunction included Moreover, even assuming, arguendo, that the constitutionality of the ordinances in question was not actually litigated at that 1998 proceeding, it was specifically addressed by the New York Supreme Court during the 2006 injunction proceeding. At that proceeding, the court specifically held: With respect to the issues raised by [plaintiffs] as to the constitutionality [of the applicable regulations], it is well recognized that municipalities have considerable authority to implement zoning plans and programs to insure the health and safety of their residents. [See, e.g., Stringfellow’s of N.Y., Ltd. v. City of N.Y., 91 N.Y.2d 382, 694 N.E.2d 407, 671 N.Y.S.2d 406 (1998).] The court is well aware of the impact that the 1969 Woodstock festival had upon both attendees and the Sullivan County residents[, p]ar-ticularly those residing in the immediate vicinity. While subsequent events held on the site have not attracted the numbers originally in attendanee[,] they have evoked such interest as to attract hundreds, if not thousands, to this commemorative event. Accordingly, the court finds it is neither unreasonable [n]or unconstitutional for the Town of Bethel to require permits for such gatherings[, i]n light of the potential safety and health hazards such may engender. Notably, the court does not agree with [plaintiffs] that the definition of camping is so broad as to be unconstitutional given it[s] underlying intent. Simply stated, the town has a right to ensure that events of this magnitude are well regulated and conducted[, particularly with respect to traffic issues and health and safety of the attendees in terms of sources of food and water, sanitary conditions, and habitable space, and toilet facilities. (See Gaba Reply Decl., Ex. C (transcript of 2006 state court proceeding).) In light of the foregoing, we conclude that the matter was actually litigated and necessarily decided in the 2006 proceeding. The first element is therefore satisfied. The second element, namely whether the party against whom preclusion is sought had a full and fair opportunity to contest the prior determination, is also satisfied. Plaintiffs, in attempted support of their burden of proof, see Kaufman, 65 N.Y.2d at 456, 492 N.Y.S.2d 584, 482 N.E.2d 63, argue that they were not afforded a full and fair opportunity to litigate the matter in 1998 because “[njothing in the record indicates that the State Court ... ever passed on the claimed constitutional infirmities.” (Pls. Mem. Opp. Summ. J. at 9.) Plaintiffs do not address the 2006 preliminary injunction hearing. As the 2006 state court’s ruling demonstrates, plaintiffs actually presented then-arguments to a trial court of general jurisdiction, which issued a formal ruling. Although the state court’s opinion was brief due to the emergency nature of the proceeding, it provided plaintiffs with a clearly articulated ruling that was appeal-able as of right under N.Y. C.P.L.R. § 5701. See Singer v. Dep’t of Fin. of City of N.Y., 191 A.D.2d 320, 321, 594 N.Y.S.2d 774 (1st Dep’t 1993) (“[T]he order appealed decided a motion made upon notice and imposed a preliminary injunction; therefore it presents an appealable issue for this Court [pursuant to N.Y. C.P.L.R. 5701].”). Plaintiff has made no indication that it filed a notice of appeal from the 2006 state court decision and this Court’s independent search has discovered none. Additionally, we note that although not a full-blown trial on the merits, hearings on preliminary injunction hearings are routinely afforded issue preclusive effect if they meet the requirements for application of the collateral estoppel. See, e.g., Seven Acre Wood St. Assocs., Inc. v. Town of Bedford, 302 A.D.2d 511, 512, 755 N.Y.S.2d 257 (2d Dep’t 2003) (“[P]laintiff was collaterally estopped from relitigating the issue of the installation of two culverts by the defendant ... since this issue was litigated previously in an action ... in the Supreme Court, ... wherein a motion for a preliminary injunction involving the same culverts was denied, and the plaintiff had a full and fair opportunity to contest the prior determination.”); cf. Jeffreys v. Griffin, 1 N.Y.3d 34, 41-42, 801 N.E.2d 404, 769 N.Y.S.2d 184 (2003) (stating that even administrative proceedings give rise to issue preclusion if they are “quasi-judicial in the general sense required for application of the doctrine of collateral estoppel”) (internal quotation marks omitted). Plaintiffs have, on two occasions in the last several years, become embroiled in litigation against the Town over the precise issue they now bring before this Court, namely whether the Town’s ordinance structure and refusal to grant them a special use permit violate the First Amendment. Having twice been defeated on those claims in courts of competent jurisdiction, plaintiffs are now estopped from pursuing them here. Accordingly, plaintiffs’ First Amendment claims, asserted in counts one, two, six and seven of their Complaint, are dismissed. B. The Town’s Imposition of Consultant Fees Does Not Offend Due Process Plaintiffs next contend that the Town’s practice of imposing consultant fees in connection with evaluating their application for a special use permit, violates their Fourteenth Amendment right to procedural due process of law. An examination of plaintiffs’ exhibits reveals that the Town attempted to collect consultant fees in the amount of $1,243.90, but plaintiffs’ Memorandum of Law contains only the following argument in support of their procedural due process claim: Although the law of the State of New York may authorize charging consultant’s fees, it is alleged herein that [defendants] failed to follow their own procedures with respect to having the Building Inspector “confer with the applicant” for the purpose of computing the amount to be placed in escrow. This is the basis for the Fifth Amendment/Fourteenth Amendment due process claim set forth in the Third Cause of Action. As such, the mere fact that State law authorizes the Town of Bethel to collect such fees ignores the gravamen of the Plaintiffs’ cause of action. Thus, the motion for summary judgment in this regard should be denied. (Pls. Mem. Opp. Summ. J. at 13.) Plaintiffs statement that state law permits the imposition of fees is confirmed by the New York Court of Appeals’ decision in Suffolk County Builders Association, Inc. v. County of Suffolk, 46 N.Y.2d 613, 619, 389 N.E.2d 133, 415 N.Y.S.2d 821 (1979), in which it held that “[t]he power to regulate subsumes the concomitant power to license and to set fees reasonably related to the cost of licensing.... For, without the power to do so, a local governmental agency might well find itself without the means to fulfill its statutory imperative.” (citations omitted). Of course, as the Suffolk County Builders court recognized, “[t]hus the power to enact fees ... must be regarded as circumscribed by a similarly implied limitation that the fees charged be reasonably necessary to the accomplishment of the regulatory program ....” Id. Plaintiffs challenge, however, not the reasonableness of the fee, but the Town’s purported failure to “follow its own procedures” and consult with plaintiffs as to the fee’s precise amount. “A two-prong test applies to analyze procedural due process claims. First, the threshold issue is always whether the plaintiff has a property or liberty interest protected by the Constitution. Second, if a protected interest is identified, a court must then consider whether the government deprived the plaintiff of that interest without due process.” Henderson v. New York, 423 F.Supp.2d 129, 145 (S.D.N.Y.2006) (internal quotations omitted). The procedural component of the Due Process Clause of the Fourteenth Amendment protects an individual’s property interests. See Bd. of Regents of State Colls. v. Roth, 408 U.S. 564, 577, 92 S.Ct. 2701, 33 L.Ed.2d 548 (1972). “To have a property interest in a benefit, a person clearly must have more than an abstract need or desire for it. He must have more than a unilateral expectation of it. He must, instead, have a legitimate claim of entitlement to it.” Id. The Constitution does not create property interests, “[r]ather they are created and their dimensions are defined by existing rules or understandings that stem from an independent source such as state law....” Id. Assuming, arguendo, that plaintiffs have a protected property interest in being permitted to hold their festival without the imposition of a licensing and consultant fee, their claim still must fail, as they were provided ample process in connection with the fee’s imposition. Specifically, plaintiffs appeared before the Planning Board or an affiliated body at least seven times in connection with their permit application and exchanged numerous letter correspondences with the Planning Board. At one such meeting, the issue of plaintiffs’ failure to pay consultant fees was specifically addressed, yet plaintiffs failed to comment on the matter. (See Town Defs. Mem. Supp. Summ. J., Ex. 62.) Moreover, plaintiffs were afforded the opportunity to independently audit the fees sought to be imposed. See Town Code § 130-06A(E) (“Any applicant may request to inspect said invoices and vouchers submitted by any expert retained by the Town.”). This they also failed to do. The failure of the Planning Board to follow its own regulations by not “eon-fer[ring] with the applicant,” does not rise to the level of a due process violation, particularly in light of the fact that plaintiffs had the opportunity to audit the fees and verbally address them with the Planning Board. See United States v. Caceres, 440 U.S. 741, 749-57, 99 S.Ct. 1465, 59 L.Ed.2d 733 (1979) (holding that IRS’s violation of its internal regulations did not give rise to actionable claims pursuant to § 1983 in the absence of an underlying constitutional claim). Due process of law does not amount to process of plaintiffs’ choosing. Indeed, any failure to confer further with plaintiffs is likely due to their antagonistic approach to the regulatory process and immature and unprofessional behavior at hearings before the Planning Board. (See, e.g., Town Defs. Mem. Supp. Summ. J., Ex. 21 (affidavit of Town Building Inspector noting plaintiffs’ failure to address logistical and public safety shortcomings as well as imprecise nature of plaintiffs’ proposed 1998 site plan); Town Defs. Mem. Supp. Summ. J., Ex. 41 (memorandum from Planning Board to plaintiffs detailing their failure to comply with conditions of 2004 special use permit); Town Defs. Mem. Supp. Summ. J., Ex. 56 (memorandum from Planning Board consultant indicating that plaintiffs’ 2005 site plan was “woefully inadequate” and “lacking] the most essential data” to determine whether the subject property could support a large-scale campground); Town Defs. Mem. Supp. Summ. J., Ex. 62 (transcript of public Planning Board hearing at which Howard became irate and stated, with regard to the proposed festival: “We are going to have a fire with people playing drums and masturbating. That is for sure, we won’t have that.”).) Accordingly, we conclude that, under the circumstances, due process required no further conference with plaintiffs. Count three of plaintiffs’ complaint is therefore dismissed. C. The Town’s Denial of Plaintiffs’ Request for a Special Use Permit Did Not Violate the Equal Protection Clause Plaintiffs next contend that the actions of the Town, the Planning Board and Town Board member Russell in connection with their application for a special use permit constituted disparate treatment in violation of the Fourteenth Amendment’s Equal Protection Clause. (See Complt. ¶¶ 76-77.) Specifically, plaintiffs claim that other entities within the Town were not charged consultant fees or required to obtain permit approval before advertising for their events. In order to state a “class-of-one” claim, a plaintiff must show that he “has been treated differently from others similarly situated and that there is no rational basis for the difference in treatment.” Vill. of Willowbrook v. Olech, 528 U.S. 562, 564, 120 S.Ct. 1073, 145 L.Ed.2d 1060 (2000); see also Chestnut Ridge Assocs., Llc v. Vill. of Chestnut Ridge, 194 Fed.Appx. 76, 77 (2d Cir.2006); Neilson v. D’Angelis, 409 F.3d 100, 105 (2d Cir.2005). In order to succeed on this claim, “the level of similarity between plaintiffs and the persons with whom they compare themselves must be extremely high.” Neilson, 409 F.3d at 104 (citing Purze v. Vill. of Winthrop Harbor, 286 F.3d 452, 455 (7th Cir.2002)). Indeed, the similarity between the plaintiff and the alleged similarly situated individuals must be “prima face identical.” Neilson, 409 F.3d at 105, 106 (“Where a plaintiff in a class of one equal protection case relies on similarity alone, a more stringent standard must be applied than is applied in a racial discrimination case.”); see also Baum v. Rockland County, 161 Fed.Appx. 62, 65 (2d Cir.2005) (“For such a claim to meet with success, ‘the level of similarity between plaintiffs and the persons with whom they compare themselves must be extremely high’ .... ”). To this end, the plaintiff must demonstrate that: “(i) no rational person could regard the circumstances of the plaintiff to differ from those of a comparator to a degree that would justify the differential treatment on the basis of a legitimate government policy; and (ii) the similarity in circumstances and difference in treatment are sufficient to exclude the possibility that the defendant acted on the basis of a mistake.” Neilson, 409 F.3d at 105; see also Williams v. Wright, 162 Fed.Appx. 69, 70 (2d Cir.2006). Plaintiffs fail, as a matter of law, to meet this standard. Plaintiffs cite three entities that were accorded treatment differing from their own, but in no instance do they adduce any evidence of their similarity with the proffered organizations. The first proffered entity is the Town of Bethel Local Development Corporation (the “BLDC”), a not-for-profit charitable corporation that, inter alia, promotes public performances and cultural festivals throughout the Town. The second, although not specifically named, is the entity that holds concerts at the Bethel Woods facility, a concert hall seated on the site of the original Woodstock festival. (Howard Aff. ¶ 33.) The third is simply identified as “Zoot.” Plaintiffs cannot demonstrate their similarity to any of the aforementioned entities. Despite their characterization of the fee for admission to their most recent event as a “voluntary donation,” plaintiffs’ statements to the Planning Board belie their actual motives. At the November 9, 2004 Planning Board meeting, plaintiff Abramson specifically stated: “Whatever that might be gentlemen this is the best that I can do. [The ordinances] are there for a reason and we will comply to the best of our ability. We are operating a business and we have to make money .... ” (Town Defs. Mem. Supp. Summ. J., Ex. 40 (emphasis added).) Indeed, plaintiffs advertised that the price of admission to their event was $35 per person as late as August 2, 2005. Plainly, the BLDC, which operates as a non-profit corporation, can reasonably be distinguished from a revenue-generating venture. Indeed, non-profit organizations are routinely afforded tax exemption, see 26 U.S.C. § 501, and their officers and directors are afforded limited liability for their official actions. See N.Y. C.L.S. Non-Profit-Corp. Law § 720-a. Clearly, the waiver of consultant fees and exemption from permitting requirements may rationally be applied preferentially to nonprofit organizations established for the benefit of the public. With regard to the requirement of obtaining Planning Board approval before advertising, we note that this requirement was particularly appropriate in the case of plaintiffs, considering their history of failure to conform to Town Code regulatory health and safety requirements, which on two occasions have justified the issuance of state court injunctions. The question of the Bethel Woods organization appears, at first glance, to be a closer one. Plaintiffs, however, have provided the Court with absolutely no information permitting comparison with themselves, despite the fact that they have had more than a year to conduct discovery. Similarly, this Court cannot seriously entertain plaintiffs’ allegation that a person or entity identified only as “Zoot” is sufficiently identical to them to sustain a class of one equal protection claim. Under the circumstances, we conclude that plaintiffs have failed to meet their burden of demonstrating that they are “ ‘prima facie identical in all relevant respects,’ ” Neilson, 409 F.3d at 104, to either the Bethel Woods organization or “Zoot.” Plaintiffs’ equal protection claim, as embodied in count five of their Complaint, is therefore dismissed. II. Defendant Hogue’s Motion to Dismiss We now turn to defendant Hogue’s motion to dismiss count four of plaintiffs’ Complaint pursuant to Fed. R. Civ. P. 12(b)(6). Our standard for ruling on a motion to dismiss is well-established. When ruling on a motion to dismiss pursuant to Rule 12(b)(6), the Court must accept all of the well-pleaded facts as true and consider those facts in the light most favorable to plaintiff. See Scheuer v. Rhodes, 416 U.S. 232, 236-37, 94 S.Ct. 1683, 40 L.Ed.2d 90 (1974). On such a motion, the issue is “whether the claimant is entitled to offer evidence to support the claims.” Id. at 236, 94 S.Ct. 1683. A complaint should not be dismissed for failure to state a claim “unless it appears beyond doubt that the plaintiff can prove no set of facts in support of his claim which would entitle him to relief.” Padavan v. United States, 82 F.3d 23, 26 (2d Cir.1996) (quoting Hughes v. Rowe, 449 U.S. 5, 10, 101 S.Ct. 173, 66 L.Ed.2d 163 (1980)). In the present case, defendant Hogue has supplied an affidavit containing a recitation of what he considers the pertinent facts. Although, in assessing the legal sufficiency of a claim, the Court may consider those facts alleged in documents that are “integral” to plaintiffs claims, even if not explicitly incorporated by reference, see Cortec Indus., Inc. v. Sum Holding L.P., 949 F.2d 42, 46-48 (2d Cir.1991); Smart v. Goord, 441 F.Supp.2d 631, 637 (S.D.N.Y.2006) (“ ‘[W]hile courts generally do not consider matters outside the pleadings, they may consider documents attached to the pleadings, documents referenced in the pleadings, or documents that are integral to the pleadings in order to determine if a complaint should survive a 12(b)(6) motion.’ ”), an affidavit of a defendant containing a statement of facts contradicting those in the Complaint is not such a document. Accordingly, we do not consider the statements contained in Ho-gue’s affidavit. Plaintiffs’ claim against Hogue is twofold, as they allege that, through his deputies, he: (1) infringed the Fourth Amendment rights of those attending the festival by illegally searching and seizing their persons; and (2) impermissibly chilled plaintiffs’ protected speech by subjecting their guests to a roadblock and helicopter flyovers. (Compitió 73-75.) Hogue, for his part, contends that: (1) plaintiffs lack standing to assert the Fourth Amendment rights of their guests; and (2) the exercise of plaintiffs’ First Amendment rights was not chilled as a matter of law. We agree. We first address plaintiffs’ claim that Hogue violated the rights of those in attendance by subjecting them to illegal searches and seizures. In order to prevail on a Fourth Amendment claim, there must be a search and seizure of the claimant’s person, house, papers or effects, conducted by an agent of the government, or, as first stated by Justice Harlan, there must be an invasion of the claimant’s reasonable expectation of privacy. Katz v. United States, 389 U.S. 347, 360-61, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967) (Harlan, J. concurring). It is well-established, however, that “ ‘Fourth Amendment rights are personal rights which, like some other constitutional rights, may not be vicariously asserted.’ ” Rakas v. Illinois, 439 U.S. 128, 133-34, 99 S.Ct. 421, 58 L.Ed.2d 387 (1978). Accordingly, because plaintiffs attempt to assert their guests’ individual Fourth Amendment rights, rather than their own, their Fourth Amendment claim must be dismissed. We now turn to plaintiffs’ claim that the imposition of a police roadblock and helicopter flyovers impermissibly chilled their protected speech and expression. To recover on a claim that government actors, by their words or conduct, chilled one’s right to freedom of speech, “plaintiff must prove: (1) he has an interest protected by the First Amendment; (2) defendants’ actions were motivated or substantially caused by his exercise of that right; and (3) defendants’ actions effectively chilled the exercise of his First Amendment right.” Curley v. Village of Suffern, 268 F.3d 65, 73 (2d Cir.2001). Once a plaintiff has satisfied the first two elements, the inquiry becomes whether the government actor’s conduct “ ‘can reasonably be interpreted as intimating that some form of punishment or adverse regulatory action will follow the failure to accede to the official’s request....’” Zieper v. Metzinger, 392 F.Supp.2d 516, 525 (S.D.N.Y.2005) (citations omitted). Even assuming the existence of the first two elements, plaintiffs’ claim still must fail, for they cannot demonstrate that their exercise of free speech was “actually chilled.” See Curley, 268 F.3d at 73 (“[P]laintiff must show, with respect to the third element, that his First Amendment rights were ‘actually chilled.’ ”). As the Curley court succinctly stated: “Where a party can show no change in his behavior, he has quite plainly shown no chilling of his First Amendment right to free speech.” Id. (citing Singer v. Fulton County Sheriff, 63 F.3d 110, 120 (2d Cir.1995)) (plaintiffs speech not chilled where, even after his arrest, he continued to publish his newspaper criticizing village government); Spear v. Town of W. Hartford, 954 F.2d 63, 67 (2d Cir.1992) (plaintiffs speech not chilled where he continued to publish critical editorials even after town brought suit against him). In the present case, plaintiffs have not alleged that Hogue’s conduct affected their expression in any manner whatsoever. Indeed, it is undisputed that the 2005 festival occurred despite the presence of the roadblock and helicopter flyovers. It is also undisputed that the 2006 festival would have occurred but for the issuance of the 2006 state court injunction. Accordingly, plaintiffs’ First Amendment claim against Hogue, contained in count four of their Complaint, must be dismissed. CONCLUSION For all of the foregoing reasons, the motion of defendants the Town of Bethel, the Town of Bethel Planning Board, Herman Bressler, Chairman of the Planning Board, Planning Board members William Brey, Elmer Brucher, Leon Smith, Wilfred Hughson, Timothy Dollard and Bernard Greisberg, Victoria Vassmer-Simpson, the Town Supervisor, and Town Board members Robert Blaise, Harold Russell, Richard Crumley and Daniel Sturm for summary judgment is granted in its entirety. Additionally, the motion of defendant Daniel Hogue to dismiss count four of plaintiffs’ complaint is granted in its entirety. The Clerk’s Office is directed to enter judgment in favor of defendants dismissing the case with prejudice and without costs or attorney’s fees. SO ORDERED. . YRP is organized under the laws of New York and is operated by the individual plaintiffs. . The Town is located in the State of New York, County of Sullivan. . We refer to the Town, the Planning Board, the Planning Board members and the Town Board members as the "Town defendants” and all defendants collectively as the "defendants.” . Plaintiff's due process claims are purportedly brought pursuant to "the Fifth Amendment of the United States Constitution as made applicable to the States by operation of the Fourteenth Amendment.” Although the distinction is largely academic, we note that Fourteenth Amendment’s Due Process Clause, not that of the Fifth Amendment, governs conduct by state actors, see Dusenbery v. United States, 534 U.S. 161, 167, 122 S.Ct. 694, 151 L.Ed.2d 597 (2002) ("The Due Process Clause of the Fifth Amendment prohibits the United States, as the Due Process Clause of the Fourteenth Amendment prohibits the States, from depriving any person of property without 'due process of law.’ ”), and tailor our analysis accordingly. .Howard is the former sole owner of the property in question. In 1997, Howard transferred to YRP title of most of the real property at issue, which he used for the purpose of holding festivals and concerts. Howard subsequently conveyed another interest in the property to Abramson. The record is unclear as to precisely when Abramson acquired his interest, but it appears that Abramson has been involved in the festival activities since their inception. . Unless otherwise specified, citations to the Town defendants' Rule 56.1 Statement reflect assertions that plaintiffs do not dispute. . Plaintiffs objected, arguing, inter alia, that the applicable Town Code provisions were unconstitutional. (See Town Defs. Mem. Supp. Summ. J. Ex. 16.) . Unless otherwise indicated, citations to affidavits submitted by defendants reflect information that is uncontested by plaintiff. . Town Code § 57.2 provides, in pertinent part: For the purpose of this chapter, the following words, terms and phrases shall have the meaning ascribed to them in this section: CAMPING — The use of a property as a site for sleeping outside, or; the parking of travel trailers or similar equipment, the erection of tents or other shelters, to serve as temporary residences. . Town Code § 57.3 provides, in pertinent part: "No person ... being the owner, user, operator or occupant of any land within the Town of Bethel, shall use or allow the use of such land for a campground or RV park or any other form of camping regulated herein unless a license has been obtained as herein provided.” .Town Code § 57.9 provides, in pertinent part: Any person ... who uses any property or allows their property to be used in violation of any provision of this chapter shall be guilty of a misdemeanor and an offense against this chapter and subject to imprisonment or a fine of not less than two-hundred-fifty dollars ($250). When a violation of any of the provisions of this chapter is continuous, each day or portion thereof shall constitute a separate and distinct violation. . Although Abramson was not a party in the 1998 or 2006 state court proceedings, as a consequence of our holding that he was in an implicit and necessary rejection of plaintiffs’ constitutional argument. privity with Howard and for the sake of consistency, we refer to Howard, YRP and Abramson collectively as “plaintiffs.” . The court issued the preliminary injunction one day before plaintiffs’ proposed event was scheduled to occur. (See Gaba Reply Decl., Ex. C (transcript of 2006 state court proceeding).) . N.Y. C.P.L.R. § 5701 provides, in pertinent part: An appeal may be taken to the appellate division as of right in an action, originating in the supreme court or a county court: 1. from any final or interlocutory judgment except one entered subsequent to an order of the appellate division which disposes of all the issues in the action; or 2. from an order not specified in subdivision (b), where the motion it decided was made upon notice and it: (i)grants, refuses, continues or modifies a provisional remedy; or (ii) settles, grants or refuses an application to resettle a transcript or statement on appeal; or (iii) grants or refuses a new trial; except where specific questions of fact arising upon the issues in an action triable by the court have been tried by a jury, pursuant to an order for that purpose, and the order grants or refuses a new trial upon the merits; or (iv) involves some part of the merits; or (v) affects a substantial right; or (vi) in effect determines the action and prevents a judgment from which an appeal might be taken; or (vii) determines a statutory provision of the state to be unconstitutional, and the determination appears from the reasons given for the decision or is necessarily implied in the decision .... . One of the provisions at issue, namely Town Code § 130-06A, which authorizes the assessment of consultant fees, was passed in 2004, six years after the 1998 state court litigation. Nonetheless, plaintiffs’ First Amendment challenge to its validity is collaterally estopped as a consequence of the 2006 state court proceedings. . Town Code § 130-06A authorizes the Town, in connection with a permit application, to retain engineering, legal, planning and other expert consulting services and clerical costs for (1) assistance related to the review and processing of applications coming before said bodies and the Town Building Department and (2) the monitoring and inspection of construction of projects by the Building Inspector for projects approved by said Planning Board and/or Zoning Board of Appeals.... Payment for the services of any expert consultant is to be made from funds deposited by the applicant with the Town Supervisor to be placed in an escrow account established for that purpose. The Building Inspector, as agent for the Planning Board and/or Zoning Board of Appeals, shall confer with the applicant and compute the amount of the escrow to be posted with the Town. Said amount shall be reasonably related to the costs attendant to the Town's review and processing of the application and/or the monitoring or inspecting of the construction of the project. The Town shall engage any expert at a reasonable rate that is no greater than that customarily charged by said expert and in no event at a rate greater than that paid by the Town to said expert for similar work.... .As stated previously, see supra note 4, the Due Process Clause of the Fourteenth Amendment, not that of the Fifth Amendment, governs conduct by state actors. . Plaintiffs contend, in their Complaint, that the BLDC is generally exempted from permitting sections of the Town Code. (See Complt. ¶¶ 40-43.) . Plaintiffs’ sole reference to “Zoot” appears in Howard's Affidavit in Opposition to Summary Judgment, which states: "Plaintiffs believe that [a consultant] conducted a site visit and provided consultant's services to 'Zoot’s' application for a permit to conduct an outdoor concert, and no consultant fee was charged.” (Howard Aff. ¶ 32.)
CASELAW
User:Inceptio I am French and I occasionally contribute to Wikipedia either personally or professionally. Below, you will find all my contributions (unpaid and paid), which I maid on the different wiki (French / English) On the French Wikipedia * Contribution to the page on the Segur de la Santé On the English Wikipedia * Correction of translation mistake * Update of French media circulation figure * Addition of information or correction of factual mistake on France (French healthcare system; French politics) Paid contribution I work for the communication agency LJ Communication, based in Paris. I indicate below the pages for which I intervened on behalf of our clients On the French Wikipedia * John Persenda (page created on 12 November 2020) - Client: the SPHERE group; Link: service provider; Type of remuneration: integrated in the monthly fee * Sphere (page updated) - Client: the SPHERE group; Link: provider; Type of remuneration: integrated in the monthly fee On the English Wikipedia * Translation from French to English of John Persenda page - Client: the SPHERE group; Link: provider; Type of remuneration: integrated in the monthly fee * Translation from French to English of Sphere pages - Client: the SPHERE group; Link: provider; Type of remuneration: integrated in the monthly fee (ongoing - not published for the moment)
WIKI
Rand Paul: Trump 'fully supports my plan to replace Obamacare' Sen. Rand Paul on Friday said President-elect Donald Trump "fully supports" his plan to simultaneously repeal and replace the Affordable Care Act. "I just spoke to [Trump] and he fully supports my plan to replace Obamacare the same day we repeal it," the Kentucky senator tweeted. "The time to act is now." During an appearance on MSNBC's "Morning Joe" Wednesday, the libertarian-leaning senator urged congressional Republicans to not repeal the healthcare law without proposing and passing a replacement bill the same day, warning that insurance companies could go bankrupt and require a bailout if they did not. “I think it's imperative that Republicans do a replacement simultaneous to repeal,” Paul said. “If they don't, Obamacare continues to unravel.” Trump had advocated for such an approach to repealing Obamacare following his electoral victory. “We’re going to do it simultaneously. It’ll be just fine. That’s what I do. I do a good job,” the president-elect said in his first post-election interview with "60 Minutes" on Nov. 11. “We’re not going to have like a two-day period and we’re not going to have a two-year period where there’s nothing. It will be repealed and replaced. It’ll be great health care for much less money.” Other Republican senators who have come out in recent days in favor of simultaneous repeal and replace include Bob Corker, Lamar Alexander, Susan Collins and Tom Cotton. Following a meeting between GOP congressional leadership and Vice President-elect Mike Pence, Republican lawmakers have reportedly prioritized repealing the law. Though lawmakers say they fully intend to put forth legislation to replace the law, a plan has yet to materialize, leaving open the potential for a delay between repealing and replacing. President Barack Obama, meanwhile, has urged restraint, telling Republicans that repealing and not replacing the law would be "reckless." "The question for Paul Ryan and Mitch McConnell is, why is it that you feel obliged to repeal it before you show what it is that’s going to replace it," Obama told Vox in an interview Friday. "There’s been no real explanation about why you’d try to do this before the new president is inaugurated."
NEWS-MULTISOURCE
CitrusLeaf Journal Thoughts on software, design, technologies Using Redis as secondary index 4 months ago · 2 MIN READ #redis  We recently set out to build a bus booking website for one of our clients. We decided to use PHP 7 (Laravel), PostgreSQL 9.6, Redis 3.0, Beanstalkd as the primary architectural components. While we used PostgreSQL to store relational data such as Bus trips, User information, Booking details, Transactional info (from the payment gateway), we decided to utilize Redis as a secondary index to improve the overall performance and the results were impressive. We've always been a fan of open source projects like Redis, but the real-life performance improvement made us love Redis even more. This blog post explains the performance issues that we were facing and how we improved them. Performance Matters No matter how big or small your software product is, performance has now become crucial part of the overall architecture. Given the competition, most software products become irrelevant quickly because they're either slow or unresponsive. Most users want instant-gratification and hence it's mandatory to make performant software products if you want to stay in the business. Mass insertion in RDBMS hurts performance When tested from a user's perspective, we found that the website was slow when we performed search. The 3rd party API which we integrated sent a huge JSON which would have the all the trips between source and destination and each trip object in the JSON would have complete trip information along with pick-up and dropping points of the trip. The problem was the mass insertion of those pick-up and dropping points in the Database. We decided to investigate further by putting appropriate log statements in the code where we performed mass insertion of these points. To our surprise, the insertion took nearly 20000 ms (~20 seconds) when inserting the records. We even put the whole insertion logic into a transaction and removed indexing from the tables but it barely improve the insertion time. Redis to the rescue! We decided to use Redis to store the points data and the performance gains have been huge since. We're almost down to 1000 ms ( ~1 second) in storing the points data no matter how big the JSON is. The credit goes to PHP 7 as well, because PHP 7 is nearly 100% faster compared to previous versions. We also moved our filter logic to Redis by building secondary indexes on the filter terms. For example, we used keys of format: source:destination:date:travel_name and the values of such keys is the trip_id in the database. So whenever a filter is performed on travel_name, we simply build this key, get all the associated trip_ids as values and simply query the database in a WhereIn clause. Conclusion At the end of the day, modern web-apps needs to be performant in order to be productive and useful to the end users. Using tools like Redis as secondary indexes is definitely a way to go, in our opinion. ··· Amrit Rathi Proudly powered by Canvas · Sign In
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/First public library First public library was proposed for deletion. This page is an archive of the discussion about the proposed deletion. This page is no longer live. Further comments should be made on the article's talk page rather than here so that this page is preserved as an historic record. The result of the debate was MERGE AND REDIRECT There may be an article about this, but this isn't it. Rick'''K 05:38, Jul 15, 2004 (UTC) Strange reasoning. The whole point of wikipedia is that articles can be edited. As the creator of this article I very actively welcome all edits to the text I originally wrote for the article. Rick, in your cryptic statement above you appear to grant the validity of such an article topic, so why mark it for deletion? I have gone into greater detail on my rationale for the article in the talk page attached to the article. -- Oska 06:34, Jul 15, 2004 (UTC) * I've taken on board comments that this information doesn't perhaps warrant an article in itself. However I think the History of Libraries is a significant topic and does deserve a separate article in which the information in the marked article could appear. I have begun a discussion on the need for such an article in the Talk:Library page. -- Oska 12:43, Jul 15, 2004 (UTC) * Not sure this warrants an article in itself - I'd vote to merge with public library. Average Earthman 11:21, 15 Jul 2004 (UTC) * Redirect to Public library and create a section there about the many claimants to the title of "first public library in the United States," including: that founded in 1731 by Benjamin Franklin in Philadelphia, one founded in 1833 in Peterborough, New Hampshire, the Boston Public Library , the Franklin, Massachusetts public library , etc. etc. Dpbsmith 12:48, 15 Jul 2004 (UTC) P. S. I'm a little bit uneasy about basing this on the claim by an acknowledged "unconventional historian," do other historians or commentators on this one address the claim about the first public library? Dpbsmith 12:53, 15 Jul 2004 (UTC) * I agree in decision and reasoning with Dpbsmith. There are a lot of troubles with deciding upon the first public library. One could argue that Alexandria counts. One can argue that the circulating libraries of the 18th c. in England are prior. It all depends on how "public" you want it to be and how much of a "library" you want it to be. Even "first state commissioned, maintained, and erected library" is gnarled. It would be wonderful if Oska's work were incorporated into the main Public library article and opened to the discussion of claims. Geogre 00:26, 16 Jul 2004 (UTC) * I agree with Dpbsmith. Merge with Public library and expand. - Plutor 18:29, 17 Jul 2004 (UTC) * I'm resigned to it being merged. I just want to say that the reason I chose to start a new page and add a link from public library was because none of the information that I had seemed very authoratitive. I thought it better to 'quarantine' it off in it's own page. I have since gone and looked in paper encyclopedias and they are not good on this subject either. It seems extraordinary to me that the origins of such an important and valuable institution don't seem to have been well explored. -- Oska 09:47, Jul 18, 2004 (UTC) * For what it's worth, you might make it a sect. called "Purported First Public Library." I'm sure that's occurred to you. Good thinking on your part about the segregation of the topic, but, if you indicate that this is one narrative of many, I don't think you'll mess up the NPOV of public library. Geogre 17:44, 18 Jul 2004 (UTC) (I went to two "first state university in the US" schools.) * Keep. Move. Expand. --[[User:OldakQuill|Oldak Quill]] 18:12, 20 Jul 2004 (UTC) * Redirect to public library. Bacchiad 03:38, 21 Jul 2004 (UTC) This page is now preserved as an archive of the debate and, like other '/delete' pages is no longer 'live'. Subsequent comments on the issue, the deletion or on the decision-making process should be placed on the relevant 'live' pages. Please do not edit this page. * Rename to history of the public library. Please don't just erase Oska's work, even if it is incomplete. I agree that "first public library" is not a good article title, as it implies that we have identified, or are trying to identify, a single institution. Don't forget that the public lending library has its own history, which could be a subsection of the article. -- Heron 09:42, 23 Jul 2004 (UTC)
WIKI
Page:The perfect dress fitter ... Complete instructions in the art of cutting all kinds of garments (IA perfectdressfitt00bear).pdf/35 Lay off by same rule; regulate elbow and L. of arm measures same as on other sleeves. 4F is elbow point, 3D L. of arm. Change 2F same amount as 3D. Lay off by same rule. If changes have been made on upper sleeve, change elbow point 4A and L. of arm points 2F and 2A same amount.
WIKI
Godzilla vs. Hedorah Godzilla vs. Hedorah is a 1971 film about a monster spawned from pollution that fights Godzilla. * Directed by Yoshimitsu Banno. Written by Takeshi Kimura. Creature of Slime and Sludge Spawned by Pollution's Poison Threatens to Destroy the Earth! (taglines) Dialogue * Dr. Yano: Do you know what a meteor is? * Ken Yano: Sure, it's a falling star that falls to earth. * Dr. Yano: Well, Hedorah attached itself to one of those stars. * Dr. Yano: In each creature there's a weakness. * Ken Yano: Hedorah's only sludge...he can be dried. Taglines * Creature of Slime and Sludge Spawned by Pollution's Poison Threatens to Destroy the Earth! * Out of Pollution's Depth's It Slithers! Breathing Poison...Leaving a wake of deadly slime...Destroying all in its path! * Our environment is doomed! Cast * Akira Yamauchi — Dr. Toru Yano * Hiroyuki Kawase — Ken Yano * Keiko Mari — Miki Fujinomiya * Toshio Shiba — Yukio Keuchi
WIKI
Confide in Me "Confide in Me" is a song by Australian singer Kylie Minogue from her self-titled fifth studio album (1994). It was released as the album's lead single on 29 August 1994 by Deconstruction, Imago, and Mushroom Records. The track was written by Steve Anderson, Dave Seaman, and Owain Barton, whilst production was handled by British trio Brothers in Rhythm. It was recorded in London, United Kingdom at DMC and Sarm West Studios. Musically, it is a pop song that incorporates elements of indie music, dance-pop, and Middle Eastern instrumentation such as strings and percussion, whilst the lyrical content talks about Minogue's earnest of seduction and manipulating people to confide into her. Upon its release, "Confide in Me" received universal acclaim from music critics. Several critics selected the track as a standout from many of her records and compilation, whilst individual reviews commended Minogue's vocals, the production and influence of Middle Eastern elements. The track received nominations at some award ceremonies, along with being listed on critic's year-end lists. Commercially, the track experienced success in regions like Australia, United Kingdom, Scotland, Ireland, France, and New Zealand. It also became Minogue's only charting single in the US during the 1990s period, having peaked at 39 on the US Billboard Dance Club Songs chart. An accompanying music video was directed by Paul Boyd in Los Angeles, California during July 1994; it featured six different videos of Minogue in a commercial to help the audience confide their numerous problems to each character. The song has been performed on several of Minogue's concerts, and most recently on her 2019 Summer Tour. "Confide in Me" has been noted by critics and publications as one of the most iconic and innovative singles from the 1990s era, and Minogue's singles history, and has been recognised by authors as an important period of Minogue's career and musical "re-inventions". Alongside this, it has been sampled and covered by musicians, and used in several media. Background and production After Minogue's previous single release, her cover version of the Kool and the Gang's track "Celebration" with the record label PWL, she left them and signed a contract to United Kingdom dance label Deconstruction Records in 1993. During her time with PWL, she felt that her producers, the British trio Stock Aitken Waterman was treating her "very much [like] a puppet in the beginning. I was blinkered by my record company. I was unable to look left or right". "Confide in Me" was written by Steve Anderson, Dave Seaman, and Owain Barton, whilst production was handled by British trio Brothers in Rhythm, whom the former two writers are members of. According to British author Sean Smith, who wrote a biography detailing Minogue's career, Brothers in Rhythm had developed a demo version of the song in just under an hour, and Minogue has been travelling to her Chelsea, London home. Minogue was contacted by the members of Brothers in Rhythm to record the track, so she went to their homebase to record the track in one take. Seaman was surprised with the development process, stating to Smith; "It just all kind of flowed out and slotted into place, which is usually the case with the good stuff". Anderson was impressed with the demo that he decided to use it as the final recording; he commented "Obviously, there were embellishments to it and we spent a lot of time on the whole production, but it was still the original one that we were using". However, some additional vocals by Minogue were recorded at DMC and Sarm West Studios in London, United Kingdom, and was mixed in the same locations by Niall Flynn and Paul West. Composition Brothers in Rhythm were "well aware" of a crossover dynamic between pop and dance music at the time, noting that Minogue's vocals and "willingness to experiment with music" made them able to "push the envelope" further. Brothers in Rhythm composed the track, and is a pop song that incorporates elements of indie music, dance-pop, and Middle Eastern instrumentation such as strings and percussion. The opening part of the track, which lasts 50 seconds, were from the original demo of the track, and features an orchestral arrangement from musician Will Malone and a piano section by Anderson, which was performed using a Bösendorfer. The opening section also features a violin solo by Gavyn Wright, where Anderson and Wright commented that the inclusion was merely an "improvisation" to further help the record's sound. During the song's opening and bridge section, a gated didgeridoo is played by Anderson. According to Jason Lipshutz, writing for the American magazine Billboard, "'Confide in Me' continued Minogue on her path away from simplistic pop atop a swath of strings and Middle Eastern influences". Jude Rogers from The Guardian gave it a similar review, "before it pivots off the hook of an early-80s cult classic (the melody of Jane and Barton's 'It's a Fine Day', already revisited a few years earlier on Opus III's rave-era hit)". She also noted that the track samples from the 1974 Jimmy Smith jazz cover of Barry White's "I'm Gonna Love You Just a Little More Baby". Similarly, Nick Levine from Digital Spy labelled it "Middle Eastern pop", with elements of "string-swathed dance-pop". Larry Flick labelled the sound as "atmosphere", and believed it was influenced by downtempo music, while AllMusic's Tim Sendra described it as a "dramatic trip hop ballad". Lyrically, the content talks about Minogue's earnest of seduction and manipulating people to confide into her. The message in the lyrics is that it is she who manipulates the situation between her and someone by saying "I can keep a secret/and throw away the key"; it also represents the respect as the "power remains hers". It later explains that, in the bridge part where she sings "Stick or twist/The choice is yours", she teasers her lover that they hold the key to power. According to William Baker, whom had written a biography with Minogue detailing her career and life, he says that the song "symbolizes internal power struggle that rages beneath her [Kylie's] surface" as he continues "she is both puppet and puppet master". Release "Confide in Me" was released as the album's lead single on 29 August 1994 and was her first single to be distributed by Deconstruction; Imago and Mushroom also released it as a CD single, cassette tape and 12-inch and 7-inch vinyl. Two CD sets were released in the UK and Australia; the first CD featured the master mix, plus two remixes of the track, whilst the second CD featured the extended mix and two B-sides titled "Nothing Can Stop Us", originally by Saint Etienne, and "If You Don't Love Me", originally by Prefab Sprout. The European CD single featured the master mix and The Truth remix, whilst the US maxi CD included the radio edit, plus two remixes of the song and a remix of her song "Where Has the Love Gone?". Two vinyl sets were published in the UK and US, and the UK and Australia; the first featured the master mix and two remixes, whilst the latter spawned three remixes of "Confide in Me" and two remixes of "Where Has the Love Gone?". Released in the UK, a special 7-inch jukebox vinyl included two remixes, whilst two cassettes were distributed in the US and Australia respectively. In 2003, to promote Minogue's success with her album's Fever (2001) and Body Language in Asia, a promotional disc with five remixes of the single was issued in Japan and Israel, whilst a limited edition 12-inch vinyl was released in the UK to commemorate the 10th anniversary of the release. Critical response "Confide in Me" received universal acclaim from music critics. Sean Smith labelled the track a "classic" to Minogue's discography, as similar to how William Baker viewed it. Larry Flick from Billboard complimented "the gorgeously atmospheric, downtempo album cut". Nick Levine from Digital Spy selected it as the standout, and commented "How can we plump for anything other than 'Confide in Me'? Fifteen years on, this sumptuous, string-swathed dance-pop epic still caresses the ears like a flirty hair stylist." Caroline Sullivan from The Guardian noted that it "has a classical violin overture that unfolds into a snake-charming Eastern melody. Kylie sounds delightfully woebegone." Mike Wass from Idolator wrote that "the Brothers in Rhythm-produced gem was the stepping stone that took her from the glorious pop of 'Better the Devil You Know' to collaborating with Nick Cave on 'Where the Wild Roses Grow'." He added that it was "a vehicle to showcase a then-hugely-underrated voice." Music writer James Masterton deemed it an "exotic, string-laden single". Alan Jones from Music Week gave it five out of five and named it Single of the Week, noting that "a widescreen string-driven shuffle which allows her to deliver a soft and polished vocal." Johnny Cigarettes from NME wrote, "It trickles in sounding a dead spit for The Associates' "Breakfast". all elegantly weeping violins, then a loose breakbeat kicks in, the guitar from The Doors' "The End" tingles round the edges, and a soaring melancholic chorus finally ties your stomach in a knot." He also felt that it "sounds uncannily like Saint Etienne". Another NME editor, Paul Moody, named it "Kylie's gorgeous Maddie-esque sleaze-out". Quentin Harrison from PopMatters highlighted the track from the parent album, and said "Minogue's international perspective lent her canvas precision, not iciness as witnessed with 'Confide in Me'. The cut played like a lost spy film accompaniment, its grandiose strings and rumbling groove enthralled. 'Confide in Me' let Minogue become the vocalist cynics sneered she'd never be ...". Tim Jeffery from the Record Mirror Dance Update said, "Very Madonna-ish, in fact, even down to the giggly chuckle thrown in occasionally. Huge." Another Record Mirror editor, James Hamilton, deemed it a "Madonna-ishly moaned and muttered Brothers in Rhythm creation". British author and critic Adrian Denning enjoyed the track and called it "truly timeless and absolutely wonderful." He declared the track "Arguably still her finest musical moment to this date," and found the production and lyrical delivery "classy". Billboard's Jason Lipshutz wrote of the track: Deeply flirtatious and as knowingly dramatic as a James Bond theme song, "Confide in Me" continued Minogue on her path away from simplistic pop atop a swath of strings and Middle Eastern influences. The deadpanned bridge -- "Stick or twist, the choice is yours/Hit or miss, what's mine is yours" -- is delivered in a murmur that yearns for a Serious Artiste label. Chris True at AllMusic described the song as "slicker, more stylish, and less hooky than anything she had previously recorded." He also highlighted the track as one of the album standouts. Similarly, Marc Andrews from DNA Magazine reviewed the remastered vinyl of the parent album and pointed it as the best track on the album. Mike Wass from Idolator said "the Australian diva switched labels and reemerged with a haunting Brothers in Rhythm-produced indie-pop anthem that still seethes and seduces 20 years later." Writing for the Herald Sun, Cameron Adams placed it at number two on his list of the singer's best songs, in honour of her 50th birthday, calling it: "THE one that changed everything – where Kylie became instantly cool [...] a lush, six-minute experimental epic with middle eastern vibes and modern dance beats, it automatically drew a line in the sand to reboot Kylie". Stephen Meade from The Network Forty described it as a "haunting dance-friendly sound". A negative review came from Hot Press editor Craig Fitzsimons; he criticised the "boring" production, saying "'Confide in Me' is exactly what you would expect; a boring, nothingy post-Stock Aiken Waterman piece of dance fluff enlivened only by Kylie's breathy exhortations to 'Stick or twist/The choice is yours/Hit or miss/What's mine is yours'." In the 2002 ITV show 'There's only 1 Kylie' dedicated to her, the tracks writers & producers Steve Anderson, Dave Seaman explained how Confide In Me with its patented Madonna whisper rap and sultry eastern vibes, was inspired by Madonna's Justify My Love & Erotica singles. They wanted to create that same sultry, eastern vibe made infamous by Madonna during that 90's part of her career. Chart performance Commercially, the track experienced success in regions like Australia, United Kingdom, Ireland, France, Finland, and New Zealand. It debuted at number 31 on the Australian Singles Chart, but went straight to number one the following week, marking it one of the highest jumps for a single in Australian chart history. It became Minogue's first Australian number one single since her 1988 track "Got to Be Certain", and remained at number one for four weeks. It stayed inside the top 10 for nine weeks, and eventually spent a total of 25 weeks in the top 100. It debuted at number two on the UK Singles Chart, having been stalled by Wet Wet Wet's Love is All Around (in its last of 15 weeks at number one), and lasted a total of 14 weeks inside the top 100 chart. It was certified Silver by the British Phonographic Industry (BPI) for shipments of 200,000 units, and sold 183,000 units by March 2014. The single peaked at number three on the Finnish Singles Chart, but failed to enter the top ten in Ireland, peaking at number 12 during September 1994. In New Zealand, "Confide in Me" debuted and peaked at number 12, which was her first charting single since 1990's "Step Back in Time". It lasted four non-consecutive weeks inside the top 20, and stayed in the chart for nine weeks overall. The song was success on the French Singles Chart, peaking at number ten during its 13th week, and lasted a total charting span of 18 weeks. In Switzerland, it reached number 20 in its third week and lasted 8 weeks inside the top 100 chart. It stayed inside the German Singles Chart for 7 weeks, peaking at number 50, one of Minogue's lowest charting singles in that region. Elsewhere, it reached the top 40 in regions like the Netherlands' Dutch Top 40 chart, Belgium's region of Flanders, and in Sweden. The song was released by Imago Records in North America, and managed to chart on the US Billboard Dance Club Songs chart at number 39, staying in there for six weeks; this was Minogue's first and only charting single in the US during the 1990s period. Music video An accompanying music video was directed by Paul Boyd in Los Angeles, California during July 1994. According to William Baker, the video "presents Kylie as a kaleidoscope of female stereotypes that at first suggest her to be a plastic commodity. This notion is overturned by the lyrical content that reveals, contrarily, a multi-dimensional character who actually empowers". Minogue had shot the video just before working on the 1994 action-film Street Fighter, which she already had a tight schedule at the time due to promoting the single's release in the US, South East Asia, and in Australia. The video opens with a hand print, with the title underneath saying 'Touch the screen'; it hovers to the right, and six screens are divided into different "stereotypes" of Minogue; one with army-esque material, a rainbow background, drugs, blood splatter, a "love heart" candy with the words "Call me" on it, and the final with an egg. During the entire video, several title screens appear that feature seductive phrases as similar to an advertisement commercial, including "Call me", "Call now", and a fake phone number for the audience to call; some title screens are written in different languages including French, German, Italian and Spanish. As the first verse starts, each individual Minogue clone sings the track in their respective areas. The video ends with all six figures walking off their sets, with the fake phone number at the bottom of the video. Sean Smith noted that the each Kylie was "slightly sinister and contained no cute skipping and jumping". Editors from Out.com highlighted the video amongst some of her best work. In an extended analysis, Bence Illés from Pop-Cultured said "The music videos accompanying the album were also Kylie's most colourful and provocative videos to date. 'Confide in Me' presented Minogue singing in front of six different colourful paintings symbolising murder, war and peace, sexuality, and drug use (as a nod to the 90s clubbing culture). The video also featured the singer as a femme fatale, as well as a cute girl, reminiscent to her career beginnings." Lewis Corner from Digital Spy listed it as one of Minogue's most surprising transformations, and also on a similar list by Simon Duke at Chronicle Live. The video placed third in the vote for Best Video at the 1994 Smash Hits Poll Winners Party. Live performances As part of both single and album promotion, Minogue performed "Confide in Me" on some TV shows such as Hey Hey It's Saturday in Australia and Top of the Pops in the United Kingdom. "Confide in Me" has been performed on several concert tours by Minogue. It was first performed on her 1998 Intimate and Live tour, where it appeared in the fifth section. It was also performed in her fifth segment of the On a Night Like This Tour, following a performance of "Butterfly". The song was included in the Streetstyle section of her KylieFever2002 tour, where Minogue portrayed a police officer who, throughout this section, mixes with the kids on the street. The song was included on the 2005 Showgirl: The Greatest Hits Tour, during which a male dancer in eveningwear pursues the singer through gas-lit streets, until the pair engage in a ballroom dancing. Minogue was unable to complete the tour as she was diagnosed with early breast cancer and had to cancel the Australian leg of the tour. After undergoing treatment and recovery, she resumed the concert tour in the form of Showgirl: The Homecoming Tour in 2006, and "Confide in Me" was again added to the set list, with dancers manipulating her like a puppet during the performance. Minogue included "Confide in Me" on the setlist of her 2009 For You, for Me tour, which was her first time touring in North America. As part of Aphrodite album promotion in 2010, Minogue performed a concert for BBC Radio 2 Acoustic Live Sessions, in which she sang an acoustic version of "Confide in Me", accompanied by a full orchestra band. The song was performed again on the 2011 Aphrodite: Les Folies Tour, where it opened the fifth section; Minogue wears a "Bacofoil ball gown" to perform the song. At the London stop of Hurts's Happiness Tour, on 4 November 2011, Minogue joined duo band to perform a duet of "Confide in Me". On the Kiss Me Once Tour in 2014, an a cappella portion of the song was performed on selected concerts, during the fan request moment. Minogue performed "Confide in Me" on A Kylie Christmas concert series in 2016, on act two, between "Come into My World" and "The One", performed as a duet with musician John Grant. The song was also included on the Golden Tour (2018–19); dressed in a white suit, Minogue performed an acoustic guitar-driven version of the song, which was described as "brooding" and "yearning" by some critics. Writing for News.com.au, Nick Bond felt the singer "somehow managed to ratchet up the song's drama more than previously possible". It was also included on the setlist of the Summer 2019 tour, being performed with Minogue stood with her dancers collapsed around her feet, "looking like Delacroix's Liberty Leading the People" according to NME's Dan Stubbs. Other uses and appearances "Confide in Me" has been sampled and covered by several different musicians since its release. British rock band The Sisters of Mercy played a cover version of the song during their 1997 tour. Croatian rock band Analena covered the single, and their version appeared as a B-side to their single "Arhythmetics" in 2000. Similarly, a cover version by Australian artist Ben Lee appeared on his extended play The Dirty Little Secrets in 2002 and the b-side to his single "Something Borrowed, Something Blue". In 2006, another cover was added to Angtoria's album God Has a Plan for Us All, whilst British singer Nerina Pallot recorded her version for her single "Sophia". British duo Hurts performed a live version of the song, whilst Australian bands The Cat Empire and Tame Impala recorded their versions as stand-alone recordings. British rapper Example sampled the track for his own song "No Sleep for the Wicked", whilst Australian artist Missy Higgins recorded it for her fourth studio album Oz (2014). The single was performed on the Australia Broadway show Priscilla, Queen of the Desert in 2007. "Confide in Me" has appeared on numerous greatest hits compilation albums conducted by Minogue, including the titular compilation album (2001), Ultimate Kylie (2004), The Best of Kylie Minogue (2012) and Step Back in Time: The Definitive Collection (2019). Some compilations, such as Ultimate Kylie and The Best of Kylie Minogue (2012) feature altered versions of the single, whilst the Phillip Damien Mix has appeared on her remix album Essential Mixes (2010). However, the compilation albums Confide in Me: The Irresistible Kylie (2007) and Confide in Me (2016 edition) are exactly the same album releases but distributed in two different years, meaning "Confide in Me" has been used in two same album releases. In 2018, a cover of the song was used throughout the marketing for the Foxtel miniseries, Picnic at Hanging Rock. Legacy Since its release, "Confide in Me" has been noted by critics and publications as one of the most iconic and innovative singles from the 1990s era, and Minogue's singles history, and has been recognised by authors as an important period of Minogue's career and musical "re-inventions". According to Lee Barron, who wrote the book Social Theory in Popular Culture, the image of the music video was an example and opening of "Indie Kylie"; an image that later progressed through the work of her 1997 album Impossible Princess. Jude Rogers from The Guardian listed the track on her "10 of the Best Kylie Minogue Songs" in June 2016; Rogers complimented the production and said "The effect is utterly mesmerising, and Kylie is in total control from the off, telling you she "can keep a secret / And throw away the key". Later she turns the middle eight into a particularly pervy-sounding card game ("Stick or twist / The choice is yours"), and also plays with the idea of her fame ("Hit or miss / The choice is yours")." She also said the track was her "greatest, strangest hit". Brittany Porter from AXS.com listed the lyric "'I stand in the distance/I I view from afar/Should I offer some assistance/Should it matter who you are?'" as some of her best lyrical performances to date. Nick Levine from Digital Spy labelled it one of her most standout singles to date. Louis Virtel, writing for the website NewNowNext.com, hosted by Logo TV, listed it as her third best track from 48 selected songs; he compared it to the work of Irish singer Sinéad O'Connor and said "Demanding intimacy is a Kylie strong suit, and her performance on this gently prodding, yet desperately longing track is so lovely and vulnerable ... Kylie's comfort in provocatively challenging a lover to be more honest is one of her greatest audio moments." Jason Lipshutz from Billboard listed it amongst nine other tracks on his "Kylie Minogue Primer: The Top 10 Past Hits You Need To Know" list. Zac Bayly from Oyster Magazine called it his favourite Minogue track. Stephen from Homorazzi.com listed it at number 7 on his "Top 10's: Top 10 Kylie Songs of All Time", stating "'Confide in Me' actually grew on me as time wore on. My first exposure to it was in her Greatest Hits album and it wasn't a track I paid much attention to, but in time it's grown into one of my favourites." On the American website AllMusic, it has been selected as a highlight numerous times from her albums: Confide in Me, Hits+, Greatest Hits 87–97, and Greatest Hits 87–99. Track listings * Australian CD1 and cassette single, UK CD2 * 1) "Confide in Me" (Master Mix) – 5:51 * 2) "Nothing Can Stop Us" – 4:04 * 3) "If You Don't Love Me" – 2:08 * Australian CD2 * 1) "Confide in Me" (Master Mix) – 5:51 * 2) "Confide in Me" (Big Brothers Mix) – 10:27 * 3) "Confide in Me" (The Truth Mix) – 6:46 * 4) "Where Has the Love Gone?" (Fire Island Mix) – 7:48 * 5) "Where Has the Love Gone?" (Roach Motel Mix) – 8:02 * UK CD1 * 1) "Confide in Me" (Master Mix) – 5:51 * 2) "Confide in Me" (Big Brothers Mix) – 10:27 * 3) "Confide in Me" (The Truth Mix) – 6:46 * UK cassette single and European CD single * 1) "Confide in Me" (radio mix) – 4:24 * 2) "Confide in Me" (The Truth Mix) – 6:46 * European CD maxi-single * 1) "Confide in Me" (radio mix) – 4:24 * 2) "Confide in Me" (Master Mix) – 5:51 * 3) "Confide in Me" (Big Brothers Mix) – 10:27 * 4) "Confide in Me" (The Truth Mix) – 6:46 * US CD maxi-single * 1) "Confide in Me" (radio mix) – 4:24 * 2) "Confide in Me" (Master Mix) – 5:51 * 3) "Confide in Me" (The Truth Mix) – 6:46 * 4) "Where Has the Love Gone?" (Fire Island 12-inch mix) – 7:48 * US cassette single * 1) "Confide in Me" (radio mix) - 4:24 * 2) "Where Has the Love Gone?" (Fire Island 12-inch mix) – 7:48 Note: The Phillip Damien mixes were released exclusively in the US for promotional purposes only. The "Bass Change Mix" was later added to the commercial release of Put Yourself in My Place under the name "Phillip Damien Mix". Otherwise, they are identical. Credits and personnel Credits adapted from the CD liner notes of Kylie Minogue: Recording * Partially recorded at Minogue's home in Chelsea, London. * Recorded and mixed at DMC and Sarm West Studios in London, England, 1994. Personnel * Kylie Minogue – vocals, backing vocals * Steve Anderson – instrumentation, production, composing, songwriting * Dave Seaman – instrumentation, production, composing, songwriting * Owain Barton – songwriting * Brothers in Rhythm – composing, arranging * Niall Flynn – mixing * Paul West – mixing * Paul Boyd – music video director
WIKI
/** /* $Id: io.c,v 1.1 1998/02/13 08:56:07 falcon Exp $ /* ICB1IO.C icb protcol 1 i/o functions */ /**/ #include "config.h" #include #include #include #include #include #include #include #include #include #include #include "show.h" int cur_socket; int gotsigpipe; int carrier; long timer[2]; char stuff[4][255]; char *bigbuf; extern int server_wrap; extern void scrub_free ( void*, int ); extern char *nibble ( char*, int ); extern int idletrack; void got_sigpipe ( signum ) int signum; { gotsigpipe = signum; } void catch_sig() { signal ( SIGPIPE, got_sigpipe ); } int client_socket ( d0, d1, d2, d3, pnum ) unsigned char d0, d1, d2, d3; unsigned short pnum; { int i, s; struct sockaddr_in sin; carrier = 0; if((s=socket(AF_INET, SOCK_STREAM, 0))==-1) { perror("clientsocket: socket() error "); return ( -1 ); } memset ( &sin, 0, sizeof(sin) ); ((unsigned char*)(&sin.sin_addr.s_addr))[0] = d0; ((unsigned char*)(&sin.sin_addr.s_addr))[1] = d1; ((unsigned char*)(&sin.sin_addr.s_addr))[2] = d2; ((unsigned char*)(&sin.sin_addr.s_addr))[3] = d3; sin.sin_family = AF_INET; sin.sin_port = htons ( pnum ); if( connect ( s, (struct sockaddr*) &sin, sizeof(sin) ) == -1 ) { perror("client_socket: connect() error "); return ( -1 ); } catch_sig(); carrier = 1; return ( s ); } int clientsocket ( dest, pnum ) char *dest; unsigned short pnum; { int i, s; struct sockaddr_in sin; unsigned long foo; struct hostent *zeeaddrezz; carrier = 0; if((s=socket(AF_INET, SOCK_STREAM, 0))==-1) { perror("clientsocket: socket() error "); return ( -1 ); } memset ( &sin, 0, sizeof(sin) ); zeeaddrezz = gethostbyname ( dest ); if ( zeeaddrezz == NULL ) { perror("clientsocket: gethostbyname() error"); return ( -1 ); } ((unsigned char*)(&sin.sin_addr.s_addr))[0] = ((unsigned char*)(zeeaddrezz->h_addr))[0], ((unsigned char*)(&sin.sin_addr.s_addr))[1] = ((unsigned char*)(zeeaddrezz->h_addr))[1], ((unsigned char*)(&sin.sin_addr.s_addr))[2] = ((unsigned char*)(zeeaddrezz->h_addr))[2], ((unsigned char*)(&sin.sin_addr.s_addr))[3] = ((unsigned char*)(zeeaddrezz->h_addr))[3], sin.sin_family = AF_INET; sin.sin_port = htons ( pnum ); if( connect ( s, (struct sockaddr*) &sin, sizeof(sin) ) == -1 ) { perror("clientsocket: connect() error "); return ( -1 ); } catch_sig(); carrier = 1; return ( s ); } int checkfd ( fd ) int fd; { int one = 1; fd_set hand; struct timeval foo; int result; FD_ZERO ( &hand ); FD_SET ( fd, &hand ); foo.tv_sec = 0; foo.tv_usec = 0; result = select ( 8, &hand, NULL, NULL, &foo ); if ( result < 0 ) carrier = 0; return ( FD_ISSET ( fd, &hand ) ); } void split ( buf, iter ) unsigned char *buf; int iter; { int i,n,k; n = 0; for ( i = 0; i < iter; i++ ) { k = 0; while ( buf[n] > 1 ) { stuff[i][k] = buf[n]; k++; n++; } /* end of while */ stuff[i][k] = 0; n++; } /* end of for */ k = 0; while ( buf[n] ) { stuff[i][k] = buf[n]; k++; n++; } /* end of while */ stuff[i][k] = 0; } /* end of function split() */ void readpacket ( fd, kind ) int fd; char *kind; { unsigned char len; char buf[256]; int i,j,k; int result; len = 0; i = 0; if ( !carrier ) return; read ( fd, &len, 1 ); while ( i < len ) { result = read ( fd, buf+i, ((int)len)-i ); if ( result < 1 ) { carrier = 0; return; } i += result; } buf[len] = 0; stuff[0][0] = 0; stuff[1][0] = 0; stuff[2][0] = 0; stuff[3][0] = 0; *kind = buf[0]; switch ( buf[0] ) { case 'a' : break; /* login verification */ case 'b' : split ( buf+1, 1 ); break; /* public message */ case 'c' : split ( buf+1, 1 ); break; /* private message */ case 'g' : break; /* exit. now. or incur the server's wrath! */ case 'j' : break; /* protocol check. */ case 'd' : split ( buf+1, 1 ); break; /* status message */ case 'f' : split ( buf+1, 1 ); break; /* announcement message */ case 'i' : split ( buf+1, 1 ); break; /* command message */ default : k = strlen(buf+1); for (j=0;j 240 ) { begin = 0; end = 239; while ( !quit ) { while ( ( end > (begin+1) ) && ( msg[end] != ' ' ) ) end--; for ( i = begin; i < end; i++ ) buf[i-begin] = msg[i]; buf[i-begin] = 0; writepub ( fd, buf ); if ( ( k - end ) < 241 ) { quit = 1; for ( i = end; i < k; i++ ) buf[i-end] = msg[i]; buf[i-end] = 0; writepub ( fd, buf ); if ( bigbuf != NULL ) { scrub_free ( bigbuf, strlen(bigbuf) ); bigbuf = NULL; } } else { begin = end; end = begin + 239; } /* end of if..else */ } /* end of while */ return; } /* end of if */ if ( !msg[0] ) return; sprintf ( buf, " b%s%c", msg, 0 ); foo = strlen ( buf ); lfo = strlen ( buf ); buf[0] = foo; write ( fd, buf, foo + 1); idletrack = time(NULL); } void writecmd ( fd, what, who, msg ) int fd; char *what, *who, *msg; { unsigned char shuttle[256]; unsigned char foo; extern int debug; shuttle[0] = 0; sprintf ( shuttle, " h%s%c", what, 1 ); if ( who != NULL ) strcat ( shuttle, who ); if ( msg != NULL ) { if ( who != NULL ) strcat ( shuttle, " " ); strcat ( shuttle, msg ); } foo = strlen ( shuttle ); if(debug) oprint ("writecmd: '%s'", shuttle ); shuttle[0] = foo; write ( fd, shuttle, foo + 1 ); idletrack = time(NULL); } void gotogroup ( fd, which ) int fd; char *which; { writecmd ( fd, "g", NULL, which ); } void settopic ( fd, what ) int fd; char *what; { writecmd ( fd, "topic", NULL, what ); } void passmod ( fd, who ) int fd; char *who; { writecmd ( fd, "pass", who, NULL ); } void writepriv ( fd, who, msg ) int fd; char *who; char *msg; { unsigned char buf[256]; int i, j, k, kw, quit; int n, index, nindex; unsigned char **bufs; unsigned char *scmd; unsigned char *susr; extern int debug; if(debug) { oprint ("writepriv: msg is %X\n", (long) msg ); oprint ("writepriv: bigbuf is %X\n", (long) bigbuf ); } if ( who == NULL ) return; if ( msg == NULL ) return; kw = strlen ( who ); if ( kw < 1 ) return; insert_tabhis ( who ); /* inserting name to tab history table */ k = strlen ( msg ); if ( k < 1 ) return; if ( k + kw > 240 ) { /* argh! too big for packet, gotta split it up */ if ( server_wrap ) { /* need to prepend server command to the message */ scmd = nibble ( msg, 0 ); susr = nibble ( msg, 1 ); } else { scmd = NULL; susr = NULL; } n = 0; /* number of packets to transmit == #/discrete /m's */ index = 0; /* incremented to the end of the next packet */ quit = 0; while (!quit) { int mag; nindex = index; /* nindex is the beginning of the new packet */ buf[0] = 0; if ( n ) if ( scmd != NULL ) { /* if this the second or later packets, prepend server command */ strcat ( buf, scmd ); strcat ( buf, " " ); } if ( n ) if ( susr != NULL ) { /* if this the second or later packets, prepend dest nick */ strcat ( buf, susr ); strcat ( buf, " " ); } n++; mag = strlen ( buf ); i = mag; /* finding the end of this packet, copying into buf as we go */ while ( ( nindex - index + mag < 240 ) && ( nindex < k ) ) { buf[i] = msg[nindex]; i++; nindex++; } /* if we ran right up to the 240 char limit, wordwrap. */ /* this is icky code -- basically trying to find the */ /* first whitespace within 5 chars of the endpoint. */ if ( nindex - index + mag >= 240 ) for ( j = 0; ( j < 10 ) && ( i > 0 ) && ( buf[i] != ' ' ) && ( nindex - 10 > index ); j++, i--, nindex-- ); buf[i+1] = 0; index = nindex + 1; if ( index >= k ) quit = 1; writecmd ( fd, "m", who, buf ); /* send this packet */ for (j=0;j<256;j++) buf[j] = 0; /* paranoia is your friend */ } /* end of while */ if ( scmd != NULL ) scrub_free(scmd,strlen(scmd)); if ( susr != NULL ) scrub_free(susr,strlen(susr)); return; } /* end of if */ /* fall-through case: no packet splits */ writecmd ( fd, "m", who, msg ); } void writemail(fd,who,msg) int fd; char *who; char *msg; { unsigned char buf[256]; int begin, end, i, k, kw, quit; quit = 0; kw = strlen ( who ); k = strlen ( msg ) + kw; if ( k > 240 - kw ) { begin = 0; end = 239 - kw; while ( !quit ) { while ( ( end > (begin+1) ) && ( msg[end] != ' ' ) ) end--; for ( i = begin; i < end; i++ ) buf[i-begin] = msg[i]; buf[i-begin] = 0; writemail ( fd, who, buf ); if ( ( k - end ) < 241 - kw ) { if ( ( k - end ) < 1 ) return; quit = 1; for ( i = end; i < k; i++ ) buf[i-end] = msg[i]; buf[i-end] = 0; writemail ( fd, who, buf ); if ( bigbuf != NULL ) { scrub_free ( bigbuf, strlen(bigbuf) ); bigbuf = NULL; } } else { begin = end; end = begin + 239 - kw; } /* end of if..else */ } /* end of while */ return; } /* end of if */ writecmd(fd,"write",who,msg); } void login ( fd, name, nick, group, cmd, pass ) int fd; char *name, *nick, *group, *cmd, *pass; { unsigned char buf[256]; unsigned char foo; if ( strlen ( name ) + strlen ( nick ) + strlen ( group ) + strlen ( cmd ) + strlen ( pass ) > 247 ) return; sprintf ( buf, " a%s%c%s%c%s%c%s%c%s%c", name, 1, nick, 1, group, 1, cmd, 1, pass, 0 ); foo = strlen ( buf ); buf[0] = foo; write ( fd, buf, foo + 1 ); idletrack = time(NULL); }
ESSENTIALAI-STEM
User:FisherQueen/Archive52 {| style="text-align:center; border: 1px solid #000000; background-color:#3CB371; width: 100%" ! style="font-family: Trebuchet MS, sans-serif; color: #000000; font-size: large; line-height: 1.3em;" colspan="2"|FisherQueen * - padding:1em;padding-top:0.5em;" User Page · Talk page · Archives · Sandbox · Patrol · Templates * style="text-align:left; padding: 8px; background-color:#DCDCDC"| * style="text-align:left; padding: 8px; background-color:#DCDCDC"| The Signpost: 31 January 2011 Read this Signpost in full &middot; Single-page &middot; Unsubscribe &middot; EdwardsBot (talk) 01:40, 1 February 2011 (UTC) Thanks Been editing a while lately and you're the first to say hi. =) Dictabeard (talk) 12:54, 4 February 2011 (UTC) * Hi! :) -FisherQueen (talk · contribs) 12:55, 4 February 2011 (UTC) Thanks for your welcome. I have also made several edits, but had received no feedback until I heard from you. My most recent edit, on 2.18.11, on the article for the Caja del Rio, registered me by my computer address, rather than my user name. I have no idea why, although I would prefer to have my user name on the history. Riorider (talk) 05:38, 18 February 2011 (UTC) riorider * Most likely, you were logged out and didn't notice (that's happened to be before). -11:29, 18 February 2011 (UTC) Nomadic Wax Hi! I'm trying to create a page for Nomadic Wax, which you previously flagged (A7). We have rewritten our text to make it clear how socially relevant and important Nomadic Wax is, and we are including outside links to back this up. The name is blocked, how can we go about re-trying this/ getting the name unblocked? Thank you! Lauranomadic (talk) 18:39, 4 February 2011 (UTC)lauranomadic * If you mean User:Nomadicwax the answer is that it can't be unblocked. Usernames may not represent a company or organization. And as you can see from the notices there, subjects are not supposed to write about themselves either, as you are doing. Beeblebrox (talk) 20:25, 4 February 2011 (UTC) * Yeah, what he said: if this is your own company, don't bother writing about it, but simply wait, and get on with your business. When the company becomes so important that it meets Wikipedia's notability criteria, it'll also be so important that plenty of people outside the company will want to write the article, and you won't have to lift a finger. Are you at all interested in helping as a volunteer to write an encyclopedia? It's mentally stimulating, and sometimes lots of fun. -FisherQueen (talk · contribs) 21:39, 4 February 2011 (UTC) WWNH It's been determined that all licensed radio & television stations are notable. There've been discussions on WP:WPRS. Therefore, WWNH, a licensed radio station, is notable.Stereorock (talk) 02:59, 6 February 2011 (UTC) * I agree with that decision. The only reason I tagged this particular article is that I wasn't able to verify the existence of WWNH. -FisherQueen (talk · contribs) 23:00, 9 February 2011 (UTC) IP block A full block should be added to the IP User:<IP_ADDRESS> because he doesn't listen to warnings and keeps on blanking his talk page. Creation7689 (talk) 17:35, 6 February 2011 (UTC) * I've blocked her ability to blank the talk page. I don't like to do that, but since this seems to be a block-avoiding vandal, I don't feel quite as badly as I would for a useful but confused editor. -FisherQueen (talk · contribs) 23:00, 6 February 2011 (UTC) * Ok, and isn't the IP also blocked from editing? Because it made two more edits since it was supposedly blocked. Creation7689 (talk) 20:06, 8 February 2011 (UTC) The Signpost: 7 February 2011 Read this Signpost in full &middot; Single-page &middot; Unsubscribe &middot; EdwardsBot (talk) 01:16, 8 February 2011 (UTC) FISH OFF This is apropos your reply on 24 January 2011 which you subsequently deleted. What I had written was certainly not a lengthy series of poorly written insults. Lengthy yes, because you deserved it. Poorly written - Certainly not. But then you would have to have a very good grasp of the English vocabulary to understand good English language, which you presumably or rather most certainly don't. And anyways, since you must be rarely coming across good English, it would probably be difficult for you to understand the quality of it, since you are always busy scribbling on this scribble book of yours called Wikipedia. Also, you mentioned that in case I need any specific help from you, I should keep the message brief and clearly explain what I want you to do. I am keeping it very brief and telling you that I for sure, do not need any help from you, but you certainly require help in real life. So, I am quite clearly explaining you to go, and get some help in real life, instead of scribbling away in virtual life. Anyways, I am not going to be concerned with this matter henceforth and so, put a full stop to it here. So, I will not be bothering to check your reply to this final message. I have nothing to do with this entire issue anymore. I close this matter by using the most appropriate words for you – FISH OFF. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:30, 9 February 2011 (UTC) * You forgot to explain what you want. And I still have no idea who you are or why you are unhappy with me. But don't bother to explain; I stopped caring. -FisherQueen (talk · contribs) 21:54, 9 February 2011 (UTC) * What a coincidence, you just declined to unblock one of my personal trolls who also does not take the time to specify who they originally were or why they are holding a long term grudge and deliberately pointing themselves out to be blocked again. Ain't adminship grand? Beeblebrox (talk) 22:15, 9 February 2011 (UTC) * I have this fantasy. I need to learn a lot more about technology, first, and also some private-detective skills. I imagine a blog in which I identify the real-life identity of Internet trolls, with photos and details about their lives. Interviews with their friends and relations, maybe, or video of them interacting with their bosses or mothers or teachers. I'm endlessly curious about who they are, and what they are like in real life. I suppose that many of them are poorly socialized junior high school boys, though, and my blog would quickly get boring. -FisherQueen (talk · contribs) 22:18, 9 February 2011 (UTC) Crofton Middle School Hey not sure how to leave a formal message but Crofton Middle School is actually a place this is Dudicus97 but yeah if you could just restore and delete all the names and stuff that'd be great. It offends us at CMS when people who don't live here assume it doesn't exist. — Preceding unsigned comment added by Dudicus97 (talk • contribs) 22:42, 9 February 2011 (UTC) * I have no doubt that it exists, but I don't know whether it meets Wikipedia's notability criteria, and what you wrote was not an encyclopedia article. Most middle schools are not so significant that an encyclopedia would need an article about them; if this is one of those rare middle schools that is notable, there was nothing in your article that would show that. -FisherQueen (talk · contribs) 22:45, 9 February 2011 (UTC) Dhoncarlo4 Hi FisherQueen. Wanted to leave you a note to let you know that I've tried before to get Dhoncarlo to not use wikipedia for his chatting and group accounts, to little avail. At this point, probably just best to block and tag. Syrthiss (talk) 14:57, 10 February 2011 (UTC) I would like to create a new page '''Hi FisherQueen. I have read over all the immature recreations of "Shakur Green" page. I would like to have permission to write up an article on him. What would you need from to make this possible?''' — Preceding unsigned comment added by RedPeppers247 (talk • contribs) 03:52, 11 February 2011 (UTC) * All you need is (a) to not be Shakur Green, or someone who works for him, (b) to explain what part of the notability criteria he meets, and (c) to present two or three reliable independent sources (like newspaper articles, magazine articles, or significant online sources) discussing his importance to the music industry. It looks like there have been six versions of that article created, and not one of them had those. -FisherQueen (talk · contribs) 11:52, 11 February 2011 (UTC) * You may find the article on creating your first article helpful, or the article wizard. -FisherQueen (talk · contribs) 12:38, 11 February 2011 (UTC) I read over Notability (Meets: 1,2,3,11) and Reliable Indie Sources I found several(Including: MTV,VH1,E!Online,USAToday,KissFM). What's the next step from this point? Where do I submit this information? — Preceding unsigned comment added by RedPeppers247 (talk • contribs) 04:14, 12 February 2011 (UTC) * When I searched, I didn't find articles about Shakur Green at any of those sources. Can you share the links with me for the best three articles about him? -FisherQueen (talk · contribs) 05:57, 12 February 2011 (UTC) The article I would like to write and post on Wikipedia is from his interview with Power 99. Links are below: * http://www.mtv.com/news/articles/1655547/miley-cyrus-nick-jonas-recording-duet-album.jhtml - This one confirms that Green is a music producer who has worked with Miley Cyrus. * http://www.vh1.com/news/articles/1655547/20110107/index.jhtml - this one confirms that Green is a music producer who has worked with Miley Cyrus. * http://www.kidglue.com/2011/01/17/miley-cyrus-hannah-montana-finale-whats-next-for-miley-cyrus/ -Same for this one. * http://www.demilovatostreetteam.com/2011/01/14/shakur-green-wants-to-work-with-demi/ - This one doesn't really meet WP:RS — Preceding unsigned comment added by RedPeppers247 (talk • contribs) 07:00, 12 February 2011 (UTC) * Wikipedia articles have to contain information that is verified in reliable sources. The sources you have only give enough information to write one sentence: "Shakur Green is a music producer who has worked with Miley Cyrus." One sentence isn't really an encyclopedia article, so it would probably be tagged for deletion almost immediately. Those articles are really about Miley Cyrus, not about Shakur Green. There won't be enough verifiable information to write an article until people start writing articles that are detailed and about Green- articles that really discuss his career in depth. If it were me, I wouldn't start an article if those were all the sources I had. -FisherQueen (talk · contribs) 12:24, 12 February 2011 (UTC) I understand. But I was thinking of writing up a Stub for encyclopedia and over time expand it into a full article. I recorded his interview with Power 99FM. Enough for a encyclopedia stub Also, found over 148 articles which I could take bits and pieces from. — Preceding unsigned comment added by RedPeppers247 (talk • contribs) 20:43, 12 February 2011 (UTC) * That's certainly up to you. So far, all of the versions of that article have been seriously undersourced, which is why they have been deleted. If these four are your best sources, then your sources aren't good enough- if there are better sources, I'm not sure why you didn't choose to share them, but that's your call. If you create another article, it should at the very least clearly state what makes him notable (notability is not communicable; just working with notable people doesn't make a producer notable), and cite multiple articles that write in depth about him. If you don't do that, it'll just be tagged for deletion for a seventh time by whoever is looking at new pages. -FisherQueen (talk · contribs) 20:50, 12 February 2011 (UTC) Thank You. The page I am looking to edit http://en.wikipedia.org/wiki/Shakur_Green the page has been protected. — Preceding unsigned comment added by RedPeppers247 (talk • contribs) 21:35, 12 February 2011 (UTC) * Oh, I didn't realize that it was protected. That will keep you from creating the article, then, since you'd need to convince an administrator that this person meets the notability criteria and that there are good sources available, in order to have it unprotected. You haven't convinced me, based on the information and sources you've given, so I wouldn't feel good about unprotecting it. Of course, someone else might feel differently. You could try Deletion Review if you want to get a discussion going instead of having to depend on just my opinion.-FisherQueen (talk · contribs) 21:47, 12 February 2011 (UTC) I'm writing you from my android and it's starting to act up. I'll provide more information once I get home. Thanks. RedPeppers247 (talk) 21:57, 12 February 2011 (UTC) My thanks Hi, FisherQueen. I know it's later than expected, but thank you for unblocking me; although I have one question. How do you block people from editing due to vandalism? Jeff Ortals (talk) 02:35, 13 February 2011 (UTC) * I push the 'block' button, which I have because I'm an admin. People who aren't admins can report vandals at WP:AIV, where there are usually a few admins watching and responding to problems. -FisherQueen (talk · contribs) 02:49, 13 February 2011 (UTC) The Signpost: 14 February 2011 Read this Signpost in full &middot; Single-page &middot; Unsubscribe &middot; EdwardsBot (talk) 01:18, 15 February 2011 (UTC) Deletion of the Rhon Mizrachi page I didn't receive any intimation about the deletion of the page for Rhon Mizrachi, nor any response for the criteria I presented regarding the inclusion of the completely new draft. There is sufficient material regarding his importance and position within the martial arts community, what else do you need to see in addition to the material provided in the entry? Victornyc01 (talk) 05:39, 16 February 2011 (UTC) * I did delete a page titled Rhon Mizrachi, but what you're saying isn't what I saw when I looked at it; was there a later version under a different title? The article I saw didn't have any particular claim to notability, and the only sources were to articles about the martial art, not to articles about Mizrachi. I tried to discuss that on the article's talk page, but when there was no response after a full day, I assumed the author had realized that the person didn't meet the notability criteria and abandoned it, so I went ahead and deleted. -FisherQueen (talk · contribs) 13:05, 16 February 2011 (UTC) Hi FisherQueen, I'm very new to Wikipedia, I (perhaps mistakenly) thought I'd receive a prompt by email if there was any change/update. The version I posted was markedly different from the previous one that had been deleted in 2008. This Feb 2011 article was not only worded differently but also made apparent his lineage and relation to the founding parties for this martial art (Krav Maga). The articles cited that mention Mizrachi mention him specifically because he is an authority on the subject of Krav Maga in its variations—a version of it is taught in the Israeli military, another for general civilian street confrontation self-defense which includes material for extenuating circumstances pertaining to women(rape prevention) etc. In the United States, he is among a very rare few that authoritatively represent the different facets and philosophy of this particular martial art. Also, it's notable that outside Israel, he's the highest practicing recipient of his belts which he's received from the founders of the art (this is not mentioned in the article because it posits his information for understandable conflicts with guidelines etc). After I posted this last version I came to find yet more material in print form, would it help to bring those references also ? Also, for my future reference, where please should I check to see any response from you/an editor? I would be happy to come back this page for the Rhon Mizrachi entry in the meantime. Victornyc01 (talk) 20:27, 16 February 2011 (UTC) * In general, at Wikipedia, you should look for responses wherever you've left the original comment- for example, I'll respond to this question here, as I responded on the article talk page to the comment you left on the article talk page. At the top of your screen you see 'my watchlist,' where you can click to see updates on any pages you are 'watching.' You can click the 'watch' tab manually to watch a page for updates or responses, or you can use 'my preferences' to set Wikipedia to automatically add any page you edit to your watchlist. Once you get in the habit of checking your watchlist, it works like a charm. As for the article, it isn't enough that articles about Krav Maga mention Rhon Mizrachi; you need articles that are primarily about him before you have enough verifiable information to write an article. -FisherQueen (talk · contribs) 22:17, 16 February 2011 (UTC) Denial of Unblock Request FisherQueen, You recently denied an unblock request stating: "Comparing your unblock requests to your contributions, I can only conclude that you do not understand what edit-warring is. Looking at your contributions, you appear also to be unfamiliar with encyclopedia writing, and what sorts of information are useful in an encyclopedia article. A closer look at your edits seem to indicate that you are focused on promoting a negative point of view of Key Lime Air, and that your focus on this goal has kept you from writing in ways that are most beneficial to the encyclopedia. If you are interested in editing again after your block expires, you should seek consensus on the talk page for significant edits until you have a better feel for what kinds of edits would be helpful at Wikipedia, and don't continue making the same edits without such consensus if they are removed. FisherQueen (talk · contribs) 23:29, 15 February 2011 (UTC)" My contributions are not any different than those in other articles. I merely added content to other content that existed as far back as 2007. You claim I focus on promoting a negative point of view of Key Lime Air. Well, my contributions are similar to others added years before mine by others. Also, is it fair that all content only be positive content. The content I added is true, verifiable and in the publics right to know. Especially since the Article company provides services to the public that effect life. If you'll look at Article Gulfstream_International_Airlines, there is very similiar content. You also notice that there are very common and specific users that revise the negative content in the arena of aviation faults. This is not in the best interetst of the public to hide factual saftey related content from the public. The public comes to Wikipedia to learn about something. To hide all the facts is not right. Although my contributions to Key Lime Air may be negative, they are factual and verifiable. But if you look deeper, not all my contributions are negative. User:<IP_ADDRESS> * It would not be appropriate for me to encourage you by discussing anything with you while you're evading your block. When you understand WP:EW and WP:DISPUTE, you'll know better how to deal with your desired edits. -FisherQueen (talk · contribs) 22:11, 16 February 2011 (UTC) Legal Lawsuit FisherQueen, I agree to give up my lawsuit but I require some apologies from the user that accused me publicly of collusion. Meanwhile, the aggressive message I sent to that user was a mistake, as confirmed by the fact that I erased the message I sent right after realizing that it was on public display. Elementalkarl (talk · contribs) 00:44, 25 February 2011 (UTC)" — Preceding unsigned comment added by Elementalkarl (talk • contribs) * I want to clarify; is the apology a condition of not suing? -FisherQueen (talk · contribs) 00:47, 25 February 2011 (UTC) It is nothing more than a gentlemen's agreement that I am asking for. I am not going to sue in any case. Elementalkarl (talk —Preceding undated comment added 00:51, 25 February 2011 (UTC). * I'll accept that as an unqualified retraction, then, and not block your account, which is good. Obviously I can't make anyone else sorry for what he or she said. Conflict, sadly, is an inevitable part of editing Wikipedia, and I'll let you deal with that in any polite and reasonable way you choose. -FisherQueen (talk · contribs) 00:53, 25 February 2011 (UTC) I appreciate your understanding and I do apologize for wasting your time on such issue. Nevertheless, I still expect apologies from the aforementioned user who has been poisoning my life for few months already by sabotaging numerous articles about English-language Hong Kong journalists that I've been contributing to, in order to increase public awareness about their identity, background and work. I also noticed on his 'talk' page that numerous other user have been complaining about his action. Elementalkarl (talk * As far as I can see, the only comment on his talk page about the dispute you're having with him is from you. If you mean general abuse... all Wikipedia talk pages have that, even mine. It's never a good idea to assume that they're right unless you've looked into it. Most of the complainers on my talk page are teenaged vandals and people trying to promote themselves, their friends, their businesses, their web sites, and their bands. There's a neverending parade of vandalism and promotion at Wikipedia, and none of them like it when you stop them from what they're doing. -FisherQueen (talk · contribs) 01:41, 25 February 2011 (UTC) The Signpost: 21 February 2011 Read this Signpost in full &middot; Single-page &middot; Unsubscribe &middot; EdwardsBot (talk) 17:39, 22 February 2011 (UTC) AMOS JOANNIDES Why did you delete that page? i was unaware of the comments you made because I am new to wikipedia. i was looking at the rules in question and the artist falls under the 3-7 and 11th i believe. please put the page back up immediately. — Preceding unsigned comment added by MattSThomson (talk • contribs) 18:44, 26 February 2011 (UTC) I am giving you much more them than I was given to respond. I simply want to know why, after having proven that the AMOS JOANNIDES page meets all requirements, is the page still down?(NagemRedam (talk) 20:16, 26 February 2011 (UTC)) * It isn't helpful for you to create a new username, so I'm going to block this account from editing. Would you like me to say again what I said on your talk page earlier this afternoon? Since you have a conflict of interest, it isn't appropriate for you to write about this topic. If you're interested in helping to write the encyclopedia, you should choose subjects that you aren't directly involved with. -FisherQueen (talk · contribs) 02:04, 27 February 2011 (UTC) * Please note also that I double-checked the article you created, and it doesn't seem to include the necessary multiple independent nontrivial sources. Don't worry- if he is as significant as you say, it is inevitable that people who aren't being paid to promote him will write about him, and you're still welcome to edit Wikipedia as a personal hobby if you like. The only reason you are having so much trouble is because, in trying to advertise your client, you are doing something that is fundamentally not what Wikipedia is. Like playing soccer in a movie theatre... you'll be much happier if you use this space for its intended purpose, instead of a purpose it isn't suited to. -FisherQueen (talk · contribs) 02:13, 27 February 2011 (UTC) * I appreciate that you took the time to review the page. let me just say that I was unaware that it was seen as promotion. In my opinion, it was a reference point on the artist. I understand the West Brome Records page being removed, because it only had Amos Joannides as an artist, but I do feel that the Amos Joannides page was a useful point of reference, that stated nothing but fact. It was also not complete, as I was going to include the Billboard page, Montreal Gazette reviews, CBC Radio and Montreal CJAD segments devoted to the artist. I would also like to say that, being unaware of exactly how Wikipedia works, and after seeing *new message* alerts, I kept looking and being unable to find my inbox, therefore I was unaware of the messages being posted on my talk-page. You are absolutely right that the artist will have a page made by his fans, and it will probably be sooner rather than later. (MattSThomson (talk) 15:44, 27 February 2011 (UTC)).
WIKI
13 chansons décadentes et fantasmagoriques 13 chansons décadentes et fantasmagoriques is the first album by experimental French singer Brigitte Fontaine, released in 1966 on the Productions Jacques Canetti label. Fontaine has disowned the album, which she states is merely a "draft" compared to her later works. Track listing All songs by Brigitte Fontaine.
WIKI
Where to order Valium  Feature  Description  Product Name Valium  Benefits Combat anxiety, alleviate muscle spasms, and control seizure disorders.  Ingredients Premium Diazepam  Dosage Tailored to individual needs – ensuring effective treatment.  Price Starting at just $3.49 per pill. Best deal!  Buy Now In the annals of pharmaceutical history, few drugs have made as indelible a mark as Valium. Known generically as diazepam, Valium emerged in the 1960s as a revolutionary treatment for anxiety, muscle spasms, and seizures, quickly becoming a household name. Its initial acclaim was rooted in its efficacy and the sense of calm it offered to millions. Yet, as the years progressed, the narrative surrounding Valium shifted, with increasing concerns over dependency and misuse marring its image. Today, the role of Valium in modern pharmacy is one of caution, reflection, and ongoing relevance.Valium is part of the benzodiazepine family, a class of sedative medications known for their tranquilizing effects. These drugs work by enhancing the activity of neurotransmitters in the brain, inducing a sense of relaxation and calm. In its heyday, Valium was prescribed for a wide array of conditions, from anxiety and panic attacks to insomnia and muscle spasms. However, the tide began to turn as reports of addiction and withdrawal symptoms grew more prevalent. The medical community’s understanding of the risks associated with long-term use of benzodiazepines evolved, leading to more stringent prescribing guidelines and a search for alternative treatments.Despite the backdrop of concern, Valium remains a staple in the pharmaceutical arsenal, albeit with a more nuanced role. In modern pharmacy practice, Valium is prescribed with greater caution, often as a short-term solution or when other treatments have failed. Its efficacy, particularly in acute anxiety situations and specific medical procedures, is undeniable. For certain seizure disorders or severe muscle spasms, Valium provides relief that newer medications cannot always match. However, its use is now more closely monitored, with an emphasis on minimizing duration and dosage to mitigate the risk of dependency.The contemporary approach to Valium also reflects a broader shift in pharmacy and medicine towards personalized care. Pharmacists and healthcare providers are more vigilant in reviewing patient histories, considering potential drug interactions, and educating patients about the risks and benefits of Valium. This patient-centered approach is crucial in managing the delicate balance between alleviating distressing symptoms and avoiding long-term complications.In addition to its therapeutic role, Valium’s journey offers valuable lessons for the pharmaceutical industry and healthcare providers. It underscores the importance of ongoing research, vigilance, and adaptability. As new information emerges about the long-term effects of medications, the medical community must be prepared to adjust prescribing habits and explore alternative treatments. This is evident in the growing interest in non-pharmacological approaches to anxiety and other conditions for which Valium was once the go-to remedy. Cognitive-behavioral therapy, lifestyle changes, and other medications are increasingly recommended as part of a comprehensive treatment plan.The legal and regulatory landscape surrounding Valium has also evolved. Increased scheduling and monitoring efforts aim to curb misuse and ensure that Valium is prescribed only when truly necessary. Prescription drug monitoring programs (PDMPs) have become a critical tool in tracking prescriptions and preventing abuse. These changes reflect a broader societal recognition of the potential dangers of prescription medications and a commitment to safeguarding public health.Looking ahead, the role of Valium in modern pharmacy will likely continue to be defined by a balance between benefit and caution. Ongoing research into the long-term effects of benzodiazepines, as well as the development of new and safer alternatives, will further inform its use. Additionally, as our understanding of mental health and neurological disorders deepens, so too will our strategies for treating them. Valium, with its complex legacy, will remain a symbol of both the potential and the pitfalls of pharmaceutical solutions.In conclusion, Valium’s story is far from over. Its place in modern pharmacy is a testament to its enduring effectiveness but also a reminder of the continuous need for vigilance in medication management. As we move forward, the lessons learned from Valium’s history will undoubtedly shape future approaches to pharmaceutical care, emphasizing safety, personalization, and a holistic understanding of health and wellness. Valium, once a symbol of a quieter, more tranquil life, now represents the intricate dance between innovation and caution that characterizes modern medicine.
ESSENTIALAI-STEM
Talk:2008 Philadelphia Phillies season Game log Why was the game log moved to a page where it is transcluded instead of being in the main page? It doesn't make any sense to move it because it's only being used on one page. KV5 (talk) 02:47, 3 May 2008 (UTC) updating? why is no one updating the game log? --Smuckers It has to be good|undefined 21:18, 22 September 2008 (UTC) * What do you mean "no one"? Just because I haven't updated it immediately after every game like I used to. I have a new job that takes a lot of time. Sorry if I can't be here every minute. If you think it's a problem, do it yourself. KV5 • Squawk box • Fight on! 23:41, 22 September 2008 (UTC) * Happy? KV5 • Squawk box • Fight on! 23:49, 22 September 2008 (UTC) * I am truly stunned by your comment, KV5 :-( It was not meant to be rude. --Smuckers It has to be good|undefined 23:52, 22 September 2008 (UTC) * Well, you have my apologies, I am highly stressed and find myself completely without the time that I would like to be spending on the articles that I enjoy working on. Unfortunately I am spread very thinly here and elsewhere and took on many tasks which have gone by the wayside due to work. KV5 • Squawk box • Fight on! 00:04, 23 September 2008 (UTC) Controversy with the Mets I don't understand the "Controversy with the Mets" heading and section. How is it "controversal" for a player to say that his team is the one to beat? <IP_ADDRESS> (talk) 16:52, 16 October 2008 (UTC) * It was controversial in the media, and it was extremely controversial when Rollins did it in 2007. KV5 • Squawk box • Fight on! 16:55, 16 October 2008 (UTC) * I agree, I was a little confused why it was there as well. Seems like it was blown up. Athletes/Teams say things like that all the time about opponents, but it doesn't get written in an encyclopedia. Also, this article is getting little long. Smuckers It has to be good|undefined 18:18, 16 October 2008 (UTC) * It contains all the necessary and legitimate season information and I am planning on getting this peer reviewed and then going for a GA, so I don't intend to remove anything. KV5 • Squawk box • Fight on! 19:26, 16 October 2008 (UTC) Awards Jimmy Rollins and Shane Victorino have earned Golden Gloves. Cole Hamels was World Series MVP. Rollins also was inducted into the AFL Hall of Fame. Should we create an Awards section to further demonstrate the Phillies performance? Where?Mjf3719 (talk) 14:07, 6 November 2008 (UTC) * I'll try to take a look this evening and include some further information. KV5 • Squawk box • Fight on! 14:40, 6 November 2008 (UTC) Proposed removal of redundant publisher information A number of citations in this article unnecessarily include the publisher for periodicals and websites that have their own Wikipedia article. This information has no value to anyone wanting to check or track down references. For example, publisher=Washington Post Company for references to The Washington Post, or publisher=MLB Advanced Media for references to MLB.com, only make the article longer - significantly longer when repeated many times - without adding anything useful. Therefore I plan to upgrade the article's citations to remove all such redundant publisher info, bringing them into line with the recommended use of the cite template (see Template:Citation). I'll also remove redundant 'location' parameters (e.g. work=New York Times|location=New York), as suggested by the template's usage guidelines. Please raise any questions here or on my talk page. Colonies Chris (talk) 20:05, 11 January 2013 (UTC) External links modified Hello fellow Wikipedians, I have just added archive links to 1 one external link on 2008 Philadelphia Phillies season. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes: * Added archive https://web.archive.org/20081025065358/http://cbs3.com:80/local/world.series.trophy.2.847415.html to http://cbs3.com/local/world.series.trophy.2.847415.html Cheers.—cyberbot II Talk to my owner :Online 03:20, 22 January 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 6 one external links on 2008 Philadelphia Phillies season. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Corrected formatting/usage for http://journalgazette.net/apps/pbcs.dll/article?AID=/20081023/SPORTS06/810230331/0/SP * Corrected formatting/usage for http://blogs.phillynews.com/inquirer/zozone/2007/10/phillies_coaching_staff_is_bac.html * Corrected formatting/usage for http://philadelphia.phillies.mlb.com/team/player.jsp?player_id=240694 * Corrected formatting/usage for http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/09/15/SP6412T668.DTL * Corrected formatting/usage for http://www.philly.com/inquirer/multimedia/8055132.html * Added archive https://web.archive.org/web/20110724082914/http://www.philadelphiasportscongress.org/events/wanamaker-athletic-award/past-winners/ to http://www.philadelphiasportscongress.org/events/wanamaker-athletic-award/past-winners/ Cheers.— InternetArchiveBot (Report bug) 17:41, 19 September 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 8 external links on 2008 Philadelphia Phillies season. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Corrected formatting/usage for http://journalgazette.net/apps/pbcs.dll/article?AID=%2F20081023%2FSPORTS06%2F810230331%2F0%2FSP * Corrected formatting/usage for http://blogs.phillynews.com/inquirer/zozone/2007/10/phillies_coaching_staff_is_bac.html * Corrected formatting/usage for http://philadelphia.phillies.mlb.com/team/player.jsp?player_id=240694 * Added archive https://web.archive.org/web/20080716201813/http://www.sportsline.com/mlb/allstar/voting to http://www.sportsline.com/mlb/allstar/voting * Corrected formatting/usage for http://www.sfgate.com/cgi-bin/article.cgi?f=%2Fc%2Fa%2F2008%2F09%2F15%2FSP6412T668.DTL * Corrected formatting/usage for http://www.philly.com/inquirer/multimedia/8055132.html * Added archive https://web.archive.org/web/20090223202250/http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=%2Fwww%2Fstory%2F01-09-2009%2F0004952249&EDATE= to http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=%2Fwww%2Fstory%2F01-09-2009%2F0004952249&EDATE= * Corrected formatting/usage for http://mlb.mlb.com/news/article.jsp?ymd=20081105&content_id=3664890&vkey=news_mlb&fext=.jsp&c_id=mlb Cheers.— InternetArchiveBot (Report bug) 05:03, 18 June 2017 (UTC)
WIKI
User:Centralcoe As part of the Court's outreach efforts, as a clerk for the U.S. Bankruptcy Court for the Central District of California, I am contributing information that will improve the quality of bankruptcy court-related pages. I am aware of Wikipedia's policies and guidelines and I will abide by them. If you would like to contact me, please leave a message on my talk page.
WIKI
org.zaval.lw.event Class LwMouseEvent java.lang.Object | +--java.util.EventObject | +--org.zaval.lw.event.LwAWTEvent | +--org.zaval.lw.event.LwMouseEvent All Implemented Interfaces: java.io.Serializable Direct Known Subclasses: LwMouseMotionEvent public class LwMouseEvent extends LwAWTEvent This class is used with light weight components to describe mouse events. See Also: Serialized Form Field Summary protected  int ax             protected  int ay             protected  int clickCount             protected  int mask             static int MOUSE_CLICKED           The mouse clicked event type. static int MOUSE_ENTERED           The mouse entered event type. static int MOUSE_EXITED           The mouse exited event type. static int MOUSE_PRESSED           The mouse pressed event type. static int MOUSE_RELEASED           The mouse released event type. protected  int x             protected  int y               Fields inherited from class org.zaval.lw.event.LwAWTEvent COMP_UID, CONT_UID, FOCUS_UID, id, KEY_UID, MOTION_UID, MOUSE_UID, WIN_UID   Fields inherited from class java.util.EventObject source   Constructor Summary LwMouseEvent(LwComponent target, int id, int ax, int ay, int mask, int clickCount)           Constructs the event object with the specified source object, the event id, the absolute mouse pointer location, mask and click count.   Method Summary  int getAbsX()           Gets the x coordinate of the mouse pointer relatively the desktop parent component.  int getAbsY()           Gets the y coordinate of the mouse pointer relatively the desktop parent component.  int getClickCount()           Gets the number of consecutive mouse clicks.  int getMask()           Gets the mask.  int getUID()           Gets the UID of the event.  int getX()           Gets the x coordinate of the mouse pointer relatively the source component.  int getY()           Gets the y coordinate of the mouse pointer relatively the source component.  void reset(LwComponent target, int id, int ax, int ay, int mask, int clickCount)               Methods inherited from class org.zaval.lw.event.LwAWTEvent getID, getLwComponent   Methods inherited from class java.util.EventObject getSource, toString   Methods inherited from class java.lang.Object clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait   Field Detail MOUSE_CLICKED public static final int MOUSE_CLICKED The mouse clicked event type. MOUSE_PRESSED public static final int MOUSE_PRESSED The mouse pressed event type. MOUSE_RELEASED public static final int MOUSE_RELEASED The mouse released event type. MOUSE_ENTERED public static final int MOUSE_ENTERED The mouse entered event type. MOUSE_EXITED public static final int MOUSE_EXITED The mouse exited event type. x protected int x y protected int y ax protected int ax ay protected int ay mask protected int mask clickCount protected int clickCount Constructor Detail LwMouseEvent public LwMouseEvent(LwComponent target, int id, int ax, int ay, int mask, int clickCount) Constructs the event object with the specified source object, the event id, the absolute mouse pointer location, mask and click count. The location defines x and y coordinates relatively the desktop parent component of the light weight source component. Parameters: target - the object where the event originated. id - the specified event id. ax - the x coordinate relatively the desktop parent component. ay - the y coordinate relatively the desktop parent component. mask - the specified mask. The mask can be used to check trigger keys status. clickCount - the number of consecutive clicks. Method Detail reset public void reset(LwComponent target, int id, int ax, int ay, int mask, int clickCount) getMask public int getMask() Gets the mask. The mask can be used to test if the "Ctrl", "Alt" and so on keys are pressed or not. Use java.awt.event.InputEvent key modifiers constants for the purpose. Returns: a mask. getAbsX public int getAbsX() Gets the x coordinate of the mouse pointer relatively the desktop parent component. Returns: a x coordinate. getAbsY public int getAbsY() Gets the y coordinate of the mouse pointer relatively the desktop parent component. Returns: an y coordinate. getX public int getX() Gets the x coordinate of the mouse pointer relatively the source component. Returns: a x coordinate. getY public int getY() Gets the y coordinate of the mouse pointer relatively the source component. Returns: an y coordinate. getUID public int getUID() Gets the UID of the event. The class uses LwAWTEvent.MOUSE_UID as the event UID. Overrides: getUID in class LwAWTEvent Returns: an UID. getClickCount public int getClickCount() Gets the number of consecutive mouse clicks. Returns: a number of consecutive mouse clicks. Copyright © Zaval Creative Engineering Group, 2000-2005. http://www.zaval.org
ESSENTIALAI-STEM
NAD+ Vs NADH: What Is The Difference Between The Two? human cell visualized by many circle covered by squares | Feature | NAD+ Vs NADH: What Is The Difference Between The Two? Is there a difference between NAD+ vs. NADH? Keep reading to find out!   RELATED: Aerobic Glycolysis: How An Increased Demand For NAD+ Can Boost It   In this Article: 1. What Is NAD? 2. What Are NAD+ and NADH? 3. NADH vs. NAD+: How Are They Different?  4. How Do They Work Together? 5. Why Is the NAD+ and NADH Ratio Important? 6. How Can You Increase NAD+ Levels?    NAD+ vs. NADH: Everything You Need to Know What Is NAD? Some people use NAD, NAD+, and NADH interchangeably, but they aren’t the same. Before understanding the difference between NAD+ vs. NADH, you need to understand NAD. NAD stands for nicotinamide adenine dinucleotide. It’s a coenzyme found in every cell, and it has two distinct forms: NAD+ and NADH. To carry out different functions in the body, NAD can switch to either of its forms. So when NAD is used without the plus sign (+), it’s a general term that refers to both NAD+ and NADH.   What Are NAD+ and NADH? The NAD+ and NADH are both molecules. They are both reduced and oxidized forms of NAD. Scientists also call them a redox couple because they come from the same molecule and involve redox reactions. Redox reactions are chemical reactions that include changing the oxidation states of atoms by gaining or losing electrons. Scientists will say that a molecule is reduced when it gains an electron. On the other hand, when a molecule loses electrons, scientists will say that they are oxidized. NAD+ is the most stable form of NAD—essentially, it’s a charged NAD. Through a redox reaction, NAD+ can be converted to NADH. In this process, a charged hydrogen molecule (H+) and two electrons are added to NAD+. When NAD+ transforms into NADH, it loses the plus sign because the H+ neutralizes the NAD+. NADH can turn back into NAD+ when it reduces and gains an electron. So NAD can cycle back and forth from NAD+ and NADH. RELATED: Obesogenic Diet Drives Epigenetic Predisposition To Metabolic Disorders   NADH vs. NAD+: How Are They Different? NAD+ and NADH are similar but have different functions. The charged state of a molecule alone changes how it interacts with other molecules, so NAD+ and NADH have distinct roles in various biological activities. NADH mainly functions as transportation for electrons during cellular respiration. NAD+, on the other hand, plays a vital role in various biological processes. One of its primary functions is to activate sirtuins. Sirtuins are a family of proteins that are critical to cellular health and functioning. It helps maintain cellular homeostasis and regulates cellular metabolism and energy production. Without NAD+, this protein family won’t be able to function well. Unfortunately, NAD+ declines with age. So, at a certain point, the body can have a limited supply. Initially, researchers believed that the decline of NAD+ contributes to aging and certain chronic illnesses. Now, researchers are interested in the effects of the NAD+ and NADH ratio on overall functioning. RELATED: 5 Amazing NAD Supplement Benefits For Overall Health   How Do They Work Together? Cells use NAD+ and NADH in various ways. For example, the liver uses it to break down ethanol. Ethanol usually enters the body when people drink alcoholic beverages. To break down the ethanol, NAD+ will take its H+ to make NADH. Another critical and interrelated function of NAD+ and NADH is the energy generation. The ratio of NAD+ and NADH informs how well cells can make adenosine triphosphate or ATP. ATP is an organic compound that gives cells the energy they need to engage in various processes. During cellular respiration, when NAD+ transforms into NADH, ATP is created. There are three phases the body goes through to produce ATP from food: • Glycolysis – This phase converts glucose from food into pyruvate and hydrogen. So in this phase, NAD+ transforms into NADH. • Krebs cycle – This phase breaks down glucose and other molecules into carbon dioxide or water. The breakdown releases ATP. In this phase, NAD+ transforms into NADH. • Electron transport chain – In this phase, NADH breaks down into NAD+, H+, and a few electrons. The cell’s mitochondria use the H+ to create ATP. Among the three phases, the electron transport chain creates the most ATP.   Why Is the NAD+ and NADH Ratio Important? Researchers believe that low NAD+ and NADH ratios may have an impact on different biological processes. While they may be distinct forms of NAD, their functions are intertwined. So when the ratio is lopsided, it may impact how well they function. The body’s needs for NAD+ and NADH may have an impact on their ratio. For instance, chronic alcohol drinkers may have more NAHD in their system. The body will need to use more NAD+ to break down the ethanol and, in turn, create more NADH. On top of that, when sirtuins use NAD+, they don’t transform it into NADH. Instead, they use it to form nicotinamide. At this point, scientists still don’t know the optimal NAD+ and NADH ratio. NAD+ and NADH levels can vary in different parts of the cell. In animal studies, scientists have found that the same ratios can function differently in different parts of the cell. They also found that ratio depletion in one part of the cell doesn’t always impact other parts of the cell (including the mitochondria). Most scientists are in agreement, though that increasing the NAD+ and NADH ratio will allow cells to create more energy. Interestingly, while many studies show that NAD+ declines with age, a new study shows that NADH may increase as you age. When NAD+ decreases, but NADH increases, the ratio declines and becomes more lopsided. So, while it’s clear that both NAD+ and NADH work together to maintain cellular function, there are still many aspects of NAD regulation that aren’t clear.   How Can You Increase NAD+ Levels? While the underlying cellular mechanisms aren’t clear, scientists are trying to address the NAD+ decline that comes with age. Researchers identified a precursor vitamin, nicotinamide riboside, that can help increase NAD+. After administering it as a supplement to healthy adults for eight weeks, the researchers found a significant increase in NAD+ levels. Depending on the dosage, NAD+ levels increased between 40-90%. If you’re interested in learning more about NAD+ supplements and what it can do for your overall health, visit the TruDiagnositc website.   What are your thoughts on NAD+ supplements? Share them with us in the comments section below.  Up Next: More To Explore
ESSENTIALAI-STEM
ia64/xen-unstable view xen/include/asm-ia64/vmx_uaccess.h @ 6552:a9873d384da4 Merge. author adsharma@los-vmm.sc.intel.com date Thu Aug 25 12:24:48 2005 -0700 (2005-08-25) parents 112d44270733 fa0754a9f64f children dfaf788ab18c line source 1 /* -*- Mode:C; c-basic-offset:4; tab-width:4; indent-tabs-mode:nil -*- */ 2 /* 3 * vmx_uaccess.h: Defines vmx specific macros to transfer memory areas 4 * across the domain/hypervisor boundary. 5 * 6 * This program is free software; you can redistribute it and/or modify it 7 * under the terms and conditions of the GNU General Public License, 8 * version 2, as published by the Free Software Foundation. 9 * 10 * This program is distributed in the hope it will be useful, but WITHOUT 11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 13 * more details. 14 * 15 * You should have received a copy of the GNU General Public License along with 16 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple 17 * Place - Suite 330, Boston, MA 02111-1307 USA. 18 * 19 * Note: For vmx enabled environment, poor man's policy is actually 20 * useless since HV resides in completely different address space as 21 * domain. So the only way to do the access is search vTLB first, and 22 * access identity mapped address if hit. 23 * 24 * Copyright (c) 2004, Intel Corporation. 25 * Kun Tian (Kevin Tian) (kevin.tian@intel.com) 26 */ 28 #ifndef __ASM_IA64_VMX_UACCESS_H__ 29 #define __ASM_IA64_VMX_UACCESS_H__ 31 #include <xen/compiler.h> 32 #include <xen/errno.h> 33 #include <xen/sched.h> 35 #include <asm/intrinsics.h> 36 #include <asm/vmmu.h> 38 /* Since HV never accesses domain space directly, most security check can 39 * be dummy now 40 */ 41 asm (".section \"__ex_table\", \"a\"\n\t.previous"); 43 /* VT-i reserves bit 60 for the VMM; guest addresses have bit 60 = bit 59 */ 44 #define IS_VMM_ADDRESS(addr) ((((addr) >> 60) ^ ((addr) >> 59)) & 1) 45 /* For back compatibility */ 46 #define __access_ok(addr, size, segment) 1 47 #define access_ok(addr, size, segment) __access_ok((addr), (size), (segment)) 49 /* 50 * These are the main single-value transfer routines. They automatically 51 * use the right size if we just have the right pointer type. 52 * 53 * Careful to not 54 * (a) re-use the arguments for side effects (sizeof/typeof is ok) 55 * (b) require any knowledge of processes at this stage 56 */ 57 #define put_user(x, ptr) __put_user((x), (ptr)) 58 #define get_user(x, ptr) __get_user((x), (ptr)) 60 #define __put_user(x, ptr) __do_put_user((__typeof__(*(ptr))) (x), (ptr), sizeof(*(ptr))) 61 #define __get_user(x, ptr) __do_get_user((x), (ptr), sizeof(*(ptr))) 63 /* TODO: add specific unaligned access later. If assuming aligned at 64 * 1,2,4,8 bytes by far, it's impossible for operand spaning two 65 * vTLB entry 66 */ 67 extern long 68 __domain_va_to_ma(unsigned long va, unsigned long* ma, unsigned long *len); 70 #define __do_put_user(x, ptr, size) \ 71 ({ \ 72 __typeof__ (x) __pu_x = (x); \ 73 __typeof__ (*(ptr)) __user *__pu_ptr = (ptr); \ 74 __typeof__ (size) __pu_size = (size); \ 75 unsigned long __pu_ma; \ 76 long __pu_err; \ 77 \ 78 __pu_err = __domain_va_to_ma((unsigned long)__pu_ptr, \ 79 &__pu_ma, &__pu_size); \ 80 __pu_err ? (__pu_err = -EFAULT) : \ 81 (*((__typeof__ (*(ptr)) *)__va(__pu_ma)) = x); \ 82 __pu_err; \ 83 }) 85 #define __do_get_user(x, ptr, size) \ 86 ({ \ 87 __typeof__ (x) __gu_x = (x); \ 88 __typeof__ (*(ptr)) __user *__gu_ptr = (ptr); \ 89 __typeof__ (size) __gu_size = (size); \ 90 unsigned long __gu_ma; \ 91 long __gu_err; \ 92 \ 93 __gu_err = __domain_va_to_ma((unsigned long)__gu_ptr, \ 94 &__gu_ma, &__gu_size); \ 95 __gu_err ? (__gu_err = -EFAULT) : \ 96 (x = *((__typeof__ (*(ptr)) *)__va(__gu_ma))); \ 97 __gu_err; \ 98 }) 100 /* More complex copy from domain */ 101 #define copy_from_user(to, from, n) __copy_from_user((to), (from), (n)) 102 #define copy_to_user(to, from, n) __copy_to_user((to), (from), (n)) 103 #define clear_user(to, n) __clear_user((t0), (n)) 105 static inline unsigned long 106 __copy_from_user(void *to, void *from, unsigned long n) 107 { 108 unsigned long ma, i; 110 i = n; 111 while(!__domain_va_to_ma((unsigned long)from, &ma, &i)) { 112 memcpy(to, (void *)__va(ma), i); 113 n -= i; 114 if (!n) 115 break; 116 from += i; 117 to += i; 118 i = n; 119 } 120 return n; 121 } 123 static inline unsigned long 124 __copy_to_user(void *to, void *from, unsigned long n) 125 { 126 unsigned long ma, i; 128 i = n; 129 while(!__domain_va_to_ma((unsigned long)to, &ma, &i)) { 130 memcpy((void *)__va(ma), from, i); 131 n -= i; 132 if (!n) 133 break; 134 from += i; 135 to += i; 136 i = n; 137 } 138 return n; 139 } 141 static inline unsigned long 142 __clear_user(void *to, unsigned long n) 143 { 144 unsigned long ma, i; 146 i = n; 147 while(!__domain_va_to_ma((unsigned long)to, &ma, &i)) { 148 memset((void *)__va(ma), 0, i); 149 n -= i; 150 if (!n) 151 break; 152 to += i; 153 i = n; 154 } 155 return n; 156 } 158 #endif // __ASM_IA64_VMX_UACCESS_H__
ESSENTIALAI-STEM
Russian spring punch The Russian spring punch is a highball cocktail of vodka and liqueur, per IBA specified ingredients. The International Bartenders Association lists the beverage in its New Era Drinks category. The Russian spring punch was created in London, England by Dick Bradsell in the 1980s. He claims not to remember which bar he was working at at the time, but tells the story of how he created the recipe for personal friends wishing to hold a cocktail party while minimizing the amount of money they had to spend on alcohol. Participants were provided with the vodka, cassis, sugar syrup and lemon juice, and were asked to bring their own sparkling wine. It is named for the Russian vodka, and the Tom Collins, which is a spring drink.
WIKI
Page:Grimm's household tales, volume 2 (1884).djvu/420 406 that day forth his property begins to decrease as much as it had increased before. He entreats the snake to take him into favour again, but it says, "Dost thou think that I have forgotten the blow which the bowl received instead of my head? There can be no peace between us!" Then the knight continues in poverty all the days of his life. The same story is in Mone's Anzeiger, 1837, pp. 174, 175. Another story from Switzerland, The Queen of the Snakes (Deutsche Sagen, 1. 220), also belongs to this group. A poor shepherd-girl becomes prosperous because she gives milk to a snake which is dying of hunger. II. From Hesse. According to another story, in a certain farm the daughter of the house had the task of milking the cows which were in the fields, and for this purpose usually drove them into a shed or cow-house. Once when she was milking, a great snake crept out from beneath the boards. The girl filled a little trough, into which she often poured milk for the cats, with milk, and set it before the snake, which drank the whole of it. This she did daily, and even in winter. When the girl was married, and all the guests were sitting happily at table, the snake unexpectedly came into the room and laid down before the bride a valuable crown of gold and silver as a mark of its gratitude. A Tyrolese version in Zingerle, p. 106, agrees with this, and the story of the Snake Queen in Vonbun, pp. 21, 22, is closely allied. In Lower Lusatia (Büsching's Wöchentliche Nachrichten, 3. 343, 345) it is believed that there is a water snake-king who wears a crown on his head which is not only valuable in itself, but also brings great riches to its possessor. On a sunny May day a certain man ventures to spread out a great white sheet on a green plot in front of the castle of Lübenau, for the Snake King is fond of putting his crown down on pure white things, and then playing with the other snakes. Hardly has the man spread the sheet when the King appears, puts his crown on it, and then goes away to play with the snakes. And now the man comes softly thither (on horseback in order to escape the quicker), seizes the sheet on which the crown is lying, by the four corners, and gallops off. He hears the shrill whistling of the snakes behind him, but escapes by the speed of his horse. The possession of the precious crown soon makes him enormously rich. III. From Berlin. From Zwehrn. This is the story of how Dummling came to great good fortune (see note to No. 63), but it is told with peculiar gracefulness. In their hearty contempt for Dummling, the other apprentices intentionally bring lame and wall-eyed horses, just as
WIKI
Wikipedia:Sockpuppet investigations/Gilberatalessandro054/Archive Suspected sockpuppets SPAs which are adding extremely poorly written content to Indonesian military history articles. Previous account was blocked indefinitely for edit warring, essentially a severe case of WP:CIR (and possibly inability to read). SPAs started editing pretty much immediately after the block on the same articles with the same edits, , ; or on Draft pages made the other SPAs , ,. Cursory glance also shows similar signs of poor English, and geolocating the IP all suggest an Indonesian user - different ISPs, though. IP 27.124 was already blocked temporarily. Juxlos (talk) 17:34, 24 May 2024 (UTC) Juxlos (talk) 17:34, 24 May 2024 (UTC) Comments by other users today made the same edit to Battle of Bau that master edit-warred on before being blocked: pinging User:Eastfarthingan, who dealt with this a few weeks ago. Wikishovel (talk) 06:14, 25 May 2024 (UTC) Clerk, CheckUser, and/or patrolling admin comments * No comment on the IPs, but the three accounts are ✅ to one another, plus which looks like a backup sleeper. Digging around for any more. Girth Summit (blether) 17:44, 30 May 2024 (UTC) * Don't see any more - blocking the accounts, will leave this open in case anyone wants to look at the IPs behaviourally. Girth Summit (blether) 17:47, 30 May 2024 (UTC) * IPs haven't edited recently, closing. Spicy (talk) 07:06, 31 May 2024 (UTC) Suspected sockpuppets This account was created on June 1, 2024, shortly after the account was blocked. Both of its edits mirror those made by the blocked account on the same articles. (this account edit) (confirmed sock edit). Ckfasdf (talk) 13:44, 1 June 2024 (UTC) Comments by other users Clerk, CheckUser, and/or patrolling admin comments * Extraordinary Writ (talk) 21:10, 1 June 2024 (UTC) * Sleepers found: * Spicy (talk) 12:13, 9 June 2024 (UTC)
WIKI
Apple's AI strategy: devices, not cloud Apple's artificial intelligence strategy continues to be focused on running workloads locally on devices, rather than relying heavily on cloud-based resources, as competitors Google, Amazon, and Microsoft do. While this fits in with Apple's core business -- selling devices -- and the company's emphasis on user privacy, it could put it at a competitive disadvantage with many app makers, who prefer the more flexible approach from competitors as they look at add AI features. Between announcements about iOS, Mac and Siri, Apple made two big announcements about AI at its Worldwide Developer Conference in San Jose last week. First, it introduced a new framework called CreateML that app makers can use to train AI models on Macs. Apple developers can try out Create ML inside the app that many of them are already very familiar with: Xcode, Apple's own app for coding programs for its devices. And they can use Swift, Apple's programming language, rather than having to pick up one that's more closely associated with AI development, like Python. To keep things simple, the software even supports dragging and dropping when the time comes to train models with a bunch of data. Second, it announced updates to its Core ML software, first introduced last year, for easily incorporating AI models into apps for iPhones and other Apple devices. These AI models are smaller, so they will take up less space on devices once they've been embedded into apps. For years, plenty of developers have taken a different path -- hosting models in public clouds operated by Amazon, Google, Microsoft and other companies. Many developers choose to train their models in clouds, too. They can pay to rent out banks of powerful machines for as long as they need to in order to get models operating at a level they're happy with. With Core ML it is possible to optimize a cloud-trained model for Apple devices -- but with Create ML, the Mac basically doubles as a server. That approach has some advantages, Apple believes. "User privacy is fully respected," Apple's Francesco Rossi told developers in one conference session last week. "By running on machine learning models on-device, we guarantee that the data never leaves the device of the users." Additionally, apps using Core ML won't be affected by network issues -- they'll keep working fast, because the computing work happens on users' devices, Rossi said. Apple's approach has some fans. "It addresses two major pain points: training of models on the cloud is expensive, and getting them to work on mobile devices is difficult at best," Alex Jaimes, vice president of AI and data science at automotive start-up Nauto, told CNBC in an email. "If Apple can provide tools that make it feasible to train models locally at reasonable speeds, it could further increase its hardware footprint because for individual developers training models locally on a single machine is much more cost effective than doing so on the cloud." What's more, making it easier to add AI to apps for iOS could lead to greater engagement, "luring consumers and feeding that ecosystem," Jaimes wrote. It could also bring revenue growth for Apple's app stores -- part of the company's growing services business. The trouble is, Create ML is coming out late. Google introduced its open-source AI framework, TensorFlow, almost three years ago. "TensorFlow is leagues and leagues ahead of [Create ML], which currently looks like a toy compared to it," Reza Zadeh, CEO of startup Matroid, told CNBC over email. Google has been busy adding Swift support to TensorFlow, and it recently introduced ML Kit, which works on both Android and iOS and can operate on devices or from Google's cloud. "No serious developer or researcher is even considering" using the Create ML technology, Zadeh said.
NEWS-MULTISOURCE
Talk:Mountain pass Hint ..for research: are there passes which never were passed? Maybe there are geographic saddle points which nobody wants to enter, i.e. between lower mountains in Alaska, Sibiria or Antarctica. There are saddle points beween mountains climbed by men - but never traversed: imho the South Col of Mount Everest. Entered mainly from the west by some 2000 or 3000 persons. Extremely seldom entered (imo 9 persons) from the east side, but everybody climbed down same side as he climbed up.. No traverse. --<IP_ADDRESS> (talk) 18:06, 2 April 2008 (UTC) Water gap I came across the articles water gap and wind gap. It might be useful to link to these in the article and constant how they are different; or, if they aren't, to considering merging. —Sladen (talk) 15:09, 2 December 2008 (UTC) Restructuring of the article Consider removal of the Andes Mountains section, or merging with another subject, as it fits poorly into the structure of this article. Consider reducing the summary, and placing some of the information into sub-topics such as Formation, Etymology, Famous passes and other relevant topics. GARETHenterprises© 17:39, 3 April 2009 (UTC) —Preceding unsigned comment added by Garethdennis (talk • contribs) Comment This page is totally wrong. A pass is a route through high mountains. It is frequently at a saddle point, but is not defined to be so. <IP_ADDRESS> (talk) 18:46, 1 May 2009 (UTC) "Summit": another word for a pass? A summit is usually considered to be the highest point on a pass; however, the term is sometimes used for the highest point on a mountain or hill. To confuse matters further, however, a summit may be a high point along a road, whether or not in a pass; in either case, the geographical feature may be designated on maps, road signs, etc., as "Such-and-such Summit," rather than "Such-and-such Pass." If anyone has reliable links to information about this, it might be incorporated into the article. <IP_ADDRESS> (talk) 04:46, 28 August 2009 (UTC) * A summit is the term usually reserved for a peak but yes it has the subsidiary meaning of the high point of a road through a hill or mountain range as in the phrase 'summit of the (such and such) road'. Okay to insert in article provided the context is explained. Geopersona (talk) 07:24, 7 February 2010 (UTC) use of 'feet' for measurement It's the 21st century for Christ's sake. Please stop using feet and inches to measure things like mountains. It's a primitive system used only by a very small number of people round the world (mostly Americans) and totally confuses the rest of us. Sure someone will point out that some British people still use such measurements but anyone who has been schooled since the 1970s was ONLY taught metric units. Wikipedia shouldn't be dumbing down and if Americans can't find the sense to use metric measurements then we shouldn't pander to such ignorance. Proving measurements in imperial units (or using both imperial and metric) just discourages Americans from ever bothering to convert.--Xania talk 22:23, 30 August 2009 (UTC) * This page uses metres. Foot equivalents are mentioned in parentheses. Are you asking people to stop using feet altogether, even parenthetically? Are you confused by the parentheses? Pfly (talk) 03:08, 31 August 2009 (UTC) * Apparently confused by parentheses. Maybe Xania expects us to dumb down Wikipedia and remove parentheses so that he/she is not confused anymore. Pantherskin (talk) 06:19, 4 September 2009 (UTC) * How narrow-minded! If people want to use feet to measure mountain heights, let them! Wikipedia conveniently caters for both. --Bermicourt (talk) 19:10, 8 July 2011 (UTC) Brennig 'Brennig' has been listed as a word for a pass - in what language is this? Citation required or it needs removing- I'm happy for someone to enlighten me. Geopersona (talk) 07:26, 7 February 2010 (UTC) Cols and saddles are not necessarily mountain passes Whilst a mountain pass usually crosses a col or saddle, they are not the same thing and cols and saddles may have no recognised routes over them. I propose we create a separate article called "col" (redirect "saddle"). --Bermicourt (talk) 19:10, 8 July 2011 (UTC) 42 passes between Argentina and Chile? Pasting this now-archived Reference Desk thread here as it is about this page and some text that ought to be confirmed/clarified/adjusted. Pfly (talk) 22:04, 16 October 2011 (UTC) Is there some sort of defined criterion or criteria for what does and doesn't constitute a mountain pass? Our article on the topic says that there are precisely 42 passes in the 5300-km-long border between Argentina and Chile; it would seem that some sort is necessary in order to say that most low spots between mountains aren't truly passes. Is there perhaps a minimum amount of topographic prominence for the mountains on each side of the pass? Nyttend (talk) 01:11, 29 September 2011 (UTC) * There could be within some limited context, but not in general. For a very non-pass-looking-pass, take a look at Deadhorse Pass, File:CupLakeDeadhorsePass.jpg—it's the dip on the right side of the photo. I wonder about the claim of "precisely 42 passes" on the Argentina-Chile border. Seems fishy. Perhaps there is some context, like "named passes" (although I would think there are many more than 42), or some arbitrary cutoff prominence. Or perhaps Chile and Argentina have some official standard they abide by for whatever the term would be in Spanish... Pfly (talk) 01:33, 29 September 2011 (UTC) * I would think that one criterion -- maybe the only one -- is that at least a few people have actually used it to get from one side to the other. Looie496 (talk) 01:41, 29 September 2011 (UTC) * That doesn't work. Someone could cross a mountain by going over the top, but that doesn't make the peak a pass! APL (talk) 02:15, 29 September 2011 (UTC) * According to there are more than 42 official border crossings, all named "paso" such-and-such. Pfly (talk) 01:47, 29 September 2011 (UTC) * The full quote from mountain pass is * "For passes with roads, it is also customary to have a small roadside sign giving the name of the pass and its elevation above mean sea level. An example of this is Argentina and Chile that share the world's third longest international border, 5,300 kilometres (3,300 mi) long, running from north to the south through the Andes mountains, having a total of 42 mountain passes between them" * --emphasis mine. I think the article is saying that there are 42 passes with roads, each of which has a sign with a name and elevation. I have no idea if that's true, but it does seem to imply how the count was arrived at. SemanticMantis (talk) 01:55, 29 September 2011 (UTC) Political,Cultural etc. significance I'm being lazy here. But this article could do with some info on the wider significance of mountain passes beyond geography and transport. Even beside their historical significance these places are fascinating.<IP_ADDRESS> (talk) 16:00, 2 April 2018 (UTC) * What sort of wider significance are you thinking of? Geography and transport seems pretty all-encompassing to me. - DavidWBrooks (talk) 17:15, 2 April 2018 (UTC) Water gap and wind gap Following up a comment from 13 years ago (!!!) - both water gap and wind gap are small, lame articles with no references but good graphics - they should be incorporated into this one. - DavidWBrooks (talk) 19:15, 29 September 2021 (UTC)
WIKI
President's DayThe original version of the holiday was in commemoration of George Washington's birthday in 1796 (the last full year of his presidency). Washington, according to the calendar that has been used since at least the mid-18th century, was born on February 22, 1732. According to the old style calendar in use back then, however, he was born on February 11. At least in 1796, many Americans celebrated his birthday on the 22nd while others marked the occasion on the 11th instead. By the early 19th century, Washington's Birthday had taken firm root in the American experience as a bona fide national holiday. Its traditions included Birthnight Balls in various regions, speeches and receptions given by prominent public figures, and a lot of revelry in taverns throughout the land. Then along came Abraham Lincoln, another revered president and fellow February baby (born on the 12th of the month). The first formal observance of his birthday took place in 1865, the year after his assassination, when both houses of Congress gathered for a memorial address. While Lincoln's Birthday did not become a federal holiday like George Washington's, it did become a legal holiday in several states. In 1968, legislation (HR 15951) was enacted that affected several federal holidays. One of these was Washington's Birthday, the observation of which was shifted to the third Monday in February each year whether or not it fell on the 22nd. This act, which took effect in 1971, was designed to simplify the yearly calendar of holidays and give federal employees some standard three-day weekends in the process. Apparently, while the holiday in February is still officially known as Washington's Birthday (at least according to the Office of Personnel Management), it has become popularly (and, perhaps in some cases at the state level, legally) known as "President's Day." This has made the third Monday in February a day for honoring both Washington and Lincoln, as well as all the other men who have served as president.
FINEWEB-EDU
0 I was using the old version of nodejs. Then i removed the old version using "rm rf- " command, but it was still showing the version when i run the "node -v " command, so i searched and deleted some more files. Now when i try to install:- it does not install and show the following message:- sudo apt-get install npm Reading package lists... Done Building dependency tree Reading state information... Done npm is already the newest version (3.5.2-0ubuntu4). 0 upgraded, 0 newly installed, 0 to remove and 70 not upgraded. 1 Answer 1 0 the best way to figure this out is use: whereis node this will help you pinpoint where the current package is. navigate there and make sure the package is not a symlink (because if it is, apt-get might not work for you) also, as far as I remember there was something called nodejs-legacy so make sure you don't have this installed, too. Once all is uninstalled I highly suggest using node version manager: https://github.com/creationix/nvm (helpful hint: read readme and installer output VERY carefully to avoid installation issues) I suggest using nvm, because ubuntu repository doesn't keep node version up to date, and it's way easier to switch between them if your project happens to use older release as a dependency. 1 • Thanks @janmyszkier...successfully resolved the issue.And surely NVM is the best way to install the nodejs and upgrading version. Mar 2, 2019 at 6:26 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
ESSENTIALAI-STEM
What is the Rainbow Effect in DLP Projectors? How to Reduce or Fix? An In-Depth Guide author James K. Brownlee Rainbow Effect in DLP Projectors So, What is the Rainbow Effect in DLP Projectors? These days, every manufacturer aims to offer their projectors with an extensive feature set and sharper images at an affordable price. Thus, the DLP technology—which uses a “DMD chip” as part of its functioning mechanism—makes it conceivable. How is the DLP Chip operated? The DMD chip, or “Digital Micromirror Device,” is used in DLP projectors. A semiconductor part of this DMD device is used to reflect images on it using tiny mirrors. It takes at least 500 pins to enclose the skull in these minuscule mirrors completely. A clean image is produced by each tiny mirror, which represents a pixel on the screen. DLP projectors are hence renowned for offering realistic color in reasonably priced solutions. However, it also has a lot of negative aspects, such as a rainbow effect. And, where is this rainbow effect seen? An optical illusion known as the rainbow effect can be seen while looking at images that a DLP projector has displayed. What does a DLP projector’s rainbow effect mean? what is blue light in projectors Blue light, primarily visible to a few people during gloomy situations on a screen, is produced when a light source projects an image onto a surface. Thus, the rainbow effect refers to the well-known color breakdown that flashes Red, blurred, and Green shadows on the screen. The light is reflected onto the screen by the projector’s lens while this color wheel spins quickly. The color wheel rotates, causing the light colors to combine and produce a rainbow effect through the projector’s lens, which then projects the image onto the screen. Other effects that the projector’s lens can produce include fading in and out and adding movement to the image. What Causes the Rainbow Effect? While using a DLP chip inside the device, projectors can occasionally create a rainbow effect, while being a terrific way to watch movies or presentations. This is the point at which a potentially distracting color spectrum of red, green, and blue hues combines. Let’s talk about how to fix the rainbow effect with DLP projectors, having already discussed what it is. Technique 1: Solving the Issue • The projector lens needs to be focused on the screen in order to resolve the issue. • One way to achieve this is by adjusting the projector’s distance from the screen. • Changing the projector’s settings is another method to stop the rainbow effect. • You may lessen or even completely remove the rainbow effect using an option included on many projector models. • Lastly, consider moving to a matte finish if you currently utilize a glossy screen. This will lessen the rainbow’s appearance and aid in more uniform light diffracting. Technique 2: Diminish the Rainbow Impact on my projector Take a break between the presentation and the video if you’re not interested in seeing rainbow effects or are already noticing them. The procedures listed below should be followed in order to minimize or repair the rainbow effect: • Making sure your projector is correctly calibrated is the first step. If not, you should calibrate it in accordance with the directions in the handbook. • The projector’s focus needs to be adjusted next. If the images appear fuzzy, you can adjust the projector’s distance from the screen by moving it closer or farther away. • Now change the parameters on the projector. There are settings on many projector models that let you minimize or completely remove the rainbow effect. • Lastly, consider switching to a matte finish if you are utilizing a shiny screen. This will lessen the rainbow effect and assist in distracting the light more equally. • You might need to ask the projector’s manufacturer for help if you still have problems minimizing the rainbow effect. • The projector’s light source can also be made less bright. By doing this, you can lessen the rainbow effect and color intensity. In order to lessen the rainbow effect, the projector can also be equipped with filtering software. FAQs: Frequently Asked Questions Why do I fail to observe any rainbow effects but my friends on the same projector screen? Despite repeatedly observing for several hours, many moviegoers fail to detect the rainbow effect. However, long-term exposure to white and vibrant colors causes some people to become aware of the rainbow effect. Rainbow effects: Glossy vs. matte Screens You will observe rainbow effects more on a glossy screen than on a matte finish. The rainbow effect can be significantly reduced by using this software, which modulates the speed of the color wheel. They eliminate frame spreading and substitute shadow effects for effects due to the pre-set temporal smoothing. Conclusion: What is the Rainbow Effect in the DLP Projector? By following the solutions to rainbow effects mentioned in this article, you can indeed reduce the effects by 80% if done correctly. However, it becomes challenging to do so in some situations as DLP chips are designed that way. In that case, you can change DLP projectors to laser projectors. Laser projectors are great when it comes to handling Rainbow effects. I have also reviewed top laser projectors earlier this year. Related: Best Laser Projectors 2024 Leave a Comment Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
DXing DXing, taken from DX, the telegraphic shorthand for "distance" or "distant", is the hobby of receiving and identifying distant radio or television signals, or making two-way radio contact with distant stations in amateur radio, citizens band radio or other two-way radio communications. Many DXers also attempt to obtain written verifications of reception or contact, sometimes referred to as "QSLs" or "veries". The practice of DXing arose during the early days of radio broadcasting. Listeners would mail "reception reports" to radio broadcasting stations in hopes of getting a written acknowledgement or a QSL card that served to officially verify they had heard a distant station. Collecting these cards became popular with radio listeners in the 1920s and 1930s, and reception reports were often used by early broadcasters to gauge the effectiveness of their transmissions. Although international shortwave broadcasts are on the decline, DXing remains popular among dedicated shortwave listeners. The pursuit of two-way contact between distant amateur radio operators is also a significant activity within the amateur radio hobby. AM radio DX Early radio listeners, often using home made crystal sets and long wire antennas, found radio stations few and far between. With the broadcast bands uncrowded, signals of the most powerful stations could be heard over hundreds of miles, but weaker signals required more precise tuning or better receiving gear. By the 1950s, and continuing through the mid-1970s, many of the most powerful North American "clear channel" stations such as KDKA, WLW, WGY, CKLW, CHUM, WABC, WJR, WLS, WKBW, KFI, KAAY, KSL and a host of border blasters from Mexico pumped out Top 40 music played by popular disc jockeys. As most smaller, local AM radio stations had to sign off at night, the big 50 kW stations were able to reach listeners hundreds of miles away. The popularity of DXing the medium-wave band has diminished as the popular music formats quickly migrated to the clearer, though less propagating, FM radio beginning in the 1970s. Meanwhile, the MW band in the United States was getting more and more crowded with new stations and existing stations receiving FCC authorization to operate, with low power, at night—this largely peaked in the conservative talk radio boom of the 1990s, and especially since the 2010s, the AM band has gone into decline. In Canada, the decline came sooner as AM stations began moving to FM beginning in the 1980s and continuing through today. A limited number of music stations, including WSM in the United States, CFZM in Canada and—on weekends—WABC still program music on their clear-channel signals. Outside of the Americas and Australia, most AM radio broadcasting was in the form of synchronous networks of government-operated stations, operating with hundreds, even thousands of kilowatts of power. Still, the lower powered stations and occasional trans-oceanic signal were popular DX targets. Shortwave DX Especially during wartime and times of conflict, reception of international broadcasters, whose signals propagate around the world on the shortwave bands has been popular with both casual listeners and DXing hobbyists. With the rise in popularity of streaming audio over the internet, many international broadcasters (including the BBC and Voice of America) have cut back on their shortwave broadcasts. Missionary religious broadcasters still make extensive use of shortwave radio to reach less developed countries around the world. In addition to international broadcasters, the shortwave bands also are home to military communications, RTTY, amateur radio, pirate radio, and broadcasts of numbers stations. Many of these signals are transmitted in single side band mode, which requires the use of specialized receivers more suitable to DXing than to casual listening. VHF DXing Though sporadic in nature, signals on the FM broadcast and VHF television bands – especially those stations at the lower end of these bands – can "skip" for hundreds, even thousands of miles. North American FM stations have been received in Western Europe, and European TV signals have been received on the West Coast of the U.S. Police, fire, and military communications on the VHF bands are also DX'ed to some extent on multi-band radio scanners, though they are mainly listened to strictly on a local basis. One difficulty is in identifying the exact origins of communications of this nature, as opposed to commercial broadcasters which must identify themselves at the top of each hour, and can often be identified through mentions of sponsors, slogans, etc. throughout their programming. Amateur radio DX Amateur radio operators who specialize in making two way radio contact with other amateurs in distant countries are also referred to as "DXers". On the HF (also known as shortwave) amateur bands, DX stations are those in foreign countries. On the VHF/UHF amateur bands, DX stations can be within the same country or continent, since making a long-distance VHF contact, without the help of a satellite, can be very difficult. DXers collect QSL cards as proof of contact and can earn special certificates and awards from amateur radio organizations. In addition, many clubs offer awards for communicating with a certain number of DX stations. For example, the ARRL offers the DX Century Club award, or DXCC. The basic certificate is awarded for working and confirming at least 100 entities on the ARRL DXCC List. For award purposes, entities/areas other than nation-states (countries) can be classified as "DX countries". For example, the French territory of Reunion Island in the Indian Ocean is counted as a DX country, even though it is a region of France. The rules for determining what is a DX country can be quite complex and to avoid potential confusion, radio amateurs often use the term entity instead of country. In addition to entities, some awards are based on island groups in the world's oceans. On the VHF/UHF bands, many radio amateurs pursue awards based on Maidenhead grid locators. In order to give other amateurs a chance to confirm contacts at new or exotic locations, amateurs have mounted DXpeditions to countries or regions that have no permanent base of amateur radio operators. There are also frequent contests where radio amateurs operate their stations on certain dates for a fixed period of time to try to communicate with as many DX stations as possible. DX clubs Many radio enthusiasts are members of DX clubs in many countries around the world. The clubs are a useful source of information about news relating to international radio, as well as an opportunity to socialize. One example is the British DX Club. QSL cards A number of DXers collect acknowledgement cards called QSL cards. QSL cards often have a picture and messages indicating their country's culture or technological life on one side, and confirmation of the listeners reception data on the other. SINPO report SINPO is a code used to indicate reception quality in each of five attributes, graded on a scale of 1 to 5, where '1' means the quality was very bad and '5' very good. The attributes are: S – Signal strength I – Interference with other stations or broadcasters N – Noise ratio in the received signal P – Propagation (ups and downs of the reception) O – Overall merit Reports are sent by post or email, and may include the listeners geographical location in longitude and latitude, the types of receiver and antennae used, the frequency the transmission was heard on, a brief description of the programme listened to, their opinion about it, and suggestions if any. Although the SINPO code is a subjective measure, a particular broadcast may receive SINPO reports from several listeners from the same area, allowing the broadcaster to compare reports and gain insight into signal coverage. Variants of this report are: a) the SIO report which omits the Noise and Propagation, b) grading on a scale of 1 to 3 (instead of 1 to 5) and c) the SINFO report where the F stands for fading. DX communication DX communication is communication over large or relatively uncommon distances. On the UHF or VHF bands which are typically used for short range or line of sight communications, DX may represent communication with stations 50 or 100 miles away. The UHF and microwave bands have also been used to accomplish Earth–Moon–Earth communication between stations worldwide. On the low frequency bands (30 kHz to 30 MHz), contacts between stations separated by more than 100 miles are often considered DX, but in amateur radio on the high-frequency bands, DX is referred to as stations outside of the receiver's country (see the section, Amateur radio DX). Among amateur radio operators and shortwave listeners, most traditional DX communication occurs on the HF bands, where the ionosphere is used to refract the transmitted radio beam. The beam returns to the Earth's surface, and may then be reflected back into the ionosphere for a second bounce. Ionospheric refraction is generally only feasible for frequencies below about 50 MHz, and is highly dependent upon atmospheric conditions, the time of day, and the eleven-year sunspot cycle. It is also affected by solar storms and some other solar events, which can alter the Earth's ionosphere by ejecting a shower of charged particles. The angle of refraction places a minimum on the distance at which the refracted beam will first return to Earth. This distance decreases with frequency. As a result, any station employing DX will be surrounded by an annular dead zone where they can't hear other stations or be heard by them. This is the phenomenon that allows short wave radio reception to occur beyond the limits of line of sight. It is utilized by amateur radio enthusiasts (hams), shortwave broadcast stations (such as BBC and Voice of America) and others, and is what allows one to hear AM (MW) stations from areas far from their location. It is one of the backups to failure of long-distance communication by satellites, when their operation is affected by electromagnetic storms from the sun. For example, in clear ionosphere conditions, one can hear France Inter on 711 kHz, far into the UK and as far as Reading, Berkshire. It is also possible to hear Radio Australia from Melbourne as far away as Lansing, Michigan, a distance of some 9,835 miles (15,827 kilometers). DXing equipment Equipment used in DXing ranges from inexpensive portable receivers to deluxe equipment costing thousands of dollars. Using just a simple AM radio, one can easily hear signals from the most powerful stations propagating hundreds of miles at night. Car radios are also used for DXing the AM broadcast bands. Inexpensive shortwave radio receivers can receive signals emanating from several countries during any time of day. Serious hobbyists use more elaborate receivers designed specifically for pulling in distant signals, and often build their own antennas designed for a specific frequency band. In general, an inexpensive desktop or "PC Radio" will be able to "hear" just about what a very expensive high-performance receiver can receive. The difference between the two types is that the expensive receiver will have more filtering options and usually better adjacent channel interference blocking, sometimes resulting in the difference of being able to receive or not receive a signal under poor conditions. Enthusiasts utilize personal computers alongside radio control software tailored for FM reception, such as XDR-GTK, specifically designed for use with devices like the Sony XDR F1HD and NXP TEF668x-based receivers. This software utilizies the connection and simultaneous control of multiple radio receivers. Additionally, tools like FM-DX Webserver, accessible directly through a web browser, further enhance the experience for FM & AM enthusiasts. These setups enable hobbyists to engage in diversity reception, allowing for comprehensive "A to B" comparisons of various antennas and receivers to optimize signal reception, along with the option to scan remotely. Many simple wire antennas can be made inexpensively. Having two dipole antennas at right angles to each other (for example, one running north–south and one running east–west) can produce dramatically different reception patterns.
WIKI
Star Excursion Balance Test Introduction The Star Excursion Balance Test (SEBT) is a dynamic test that requires strength, flexibility, and proprioception. It is a measure of dynamic balance that provides a significant challenge to athletes and physically active individuals. The test can be used to assess physical performance, but can also be used to screen deficits in dynamic postural control due to musculoskeletal injuries (e.g. chronic ankle instability), to identify athletes at greater risk for lower extremity injury, as well as during the rehabilitation of orthopedic injuries in healthy active adults.[1][2] The SEBT can also be used to compare balance ability among different sports and to assess physical performance. Research has suggested to use this test as a screening tool for sport participation as well as a post-rehabilitation test to ensure dynamic functional symmetry. It has also been shown that the performance of SEBT improves after training.[2] It is important that the test captures the greatest amount of information with regards to instability in the shortest amount of time.[2] Technique Before the SEBT can be performed, a small amount of setup is required. Four strips of athletic tape will need to be cut to a length of 6-8 feet each. Two pieces will be used to form a ‘+’, with the other two being placed over top to form an ‘x’ so that a star shape is formed. It is important that all lines are separated from each other by a 45° angle.[3] The goal of the SEBT is to maintain single leg stance on one leg while reaching as far as possible with the contralateral leg [2]. The person performing the test must maintain a their balance on one leg, while using the other leg to reach as far as possible in 8 different directions. The person (standing on his/her left leg for example) must reach in 8 different positions, once in each of the following directions: anterior, anteromedial, medial, posteromedial, posterior, posterolateral, lateral and anterolateral.[3] The anterior, posteromedial and posterolateral directions appear to be important to identify individuals with chronic ankle instability and athletes at greater risk of lower extremity injury.[2] When the person demonstrates a significantly decreased reach while standing on the injured limb compared to standing on the healthy limb, the Star Excursion Balance Test has highlighted his/her's loss of dynamic postural control.[3] The test originally incorporated reaching in eight directions while standing on each foot, but factor analysis indicated that one reach direction in particular (posteromedial) was able to accurately identify individuals with chronic ankle instability as well as performing all eight directions.[2] SEBT.png 1. Anterior 2. Anteromedial 3. Medial 4. Posteromedial 5. Posterior 6. Posterolateral 7. Lateral 8. Anterolateral                          There is a similar test to the SEBT, but only utilizes three directions, and is known as the 'Y-test'. Evidence There have been different studies that have investigated the evidence of the Star Excursion Balance Test. First, an overview of the reliability. 1. According to Hertel, Miller, and Deneger (2000), the reliability of the SEBT ranges between r = 0.85-0.96[1] 2. According to Plisky et al (2006), the reliability of this test ranges between 0.82-0.87 and scores 0.99 for the measurement of limb length[4] 3. In two other studies, Kinezey et al (1998) and Hardy et al (2008), the reliability of the SEBT was determined as having intra-class correlation coefficients ranging from 0.67-0.87[5][6] 4. Chaiwanichsiri et al (2005) concluded that the Star Excursion Balance training was more effective than a conventional therapy program in improving functional stability of a sprained ankle[7] 5. Plisky et al (2009) concluded that the intra-rater reliability of the SEBT as being moderate to good (ICC 0.67- 0.97) and inter-rater reliability as being poor to good (0.35-0.93)[2] The SEBT appears to be an effective means for determining reach deficits both between and within subjects with unilateral chronic ankle instability.[3] It can also be used to determine deficits and asymmetries in individuals, as well to assist in the return to play decision-making process.[2] To discuss the validity of this test in certain injured populations, such as patellofemoral pain syndrome, further research is still recommended.[3] Recent Related Research (from Pubmed) References 1. 1.0 1.1 Advanced fitness assessment and exercise prescription. Heyward V. Human kinetics, 6th edition: 303 (5) 2. 2.0 2.1 2.2 2.3 2.4 2.5 2.6 2.7 The Reliability of an Instrumented Device for Measuring Components of the Star Excursion Balance Test. Plisky P et al. Am J Sports Phys Ther. 2009 May; 4(2): 92–99. (2B) 3. 3.0 3.1 3.2 3.3 3.4 Efficacy of the Star Excursion Balance Tests in Detecting Reach Deficits in Subjects With Chronic Ankle Instability. Olmsted L., Caria C., Hertel J., Shultz S. Journal of Athletic Training 2002;37(4):501–506 (1B) 4. Star Excursion Balance Test as a Predictor of Lower Extremity Injury in High School Basketball Players. Plisky P., Rauh M., Kaminski T., Underwood F. Journal of Orthopaedic and Sports Physical Therapy 2006; 36 (12) (1B) 5. The reliability of the star-excursion test in assessing dynamic balance. Kinzey SJ., Armstrong CW., et al. J Orthop Sports Phys Ther. 1998;27(5): 365-360 (1B) 6. Prophylactic Ankle Braces and SEBT Measures in Healthy Volunteers. Hardy L., Huxel K., Brucker J., Nesser T. Journal of Athletic Training 2008;43(4):347–351 (2C) 7. Star Excursion Balance Training : Effects on Ankle Functional Stability after Ankle Sprain. Chaiwanichsiri D., Lorprayoon E., Noomanoch L. J Med Assoc Thai 2005; 88(4): 90-94 (1B)
ESSENTIALAI-STEM
User:Testedbiren/sandbox Article: Broadband While fiber optics are generally faster than wireless broadband, over the years wireless broadband is expected to grow rapidly, as it provides other features, such as, streaming videos on demand.
WIKI
By Arleen Thukral, MS A virtual private network (VPN) is used to connect remote points—including users, databases, or whole offices—to an organization’s central secured network. Businesses use VPNs to connect remote datacenters while individuals often utlize them to get access to network resources when they’re not physically on the same local area network, or to secure and encrypt their communication when they’re using an untrusted public network. Note: This may be cheaper than a dedicated leased line connection for the average small- to medium-sized enterprise. The rationale for creating a VPN installation, however, comes from a need for security and dedicated data control. How It Works When a VPN client establishes a VPN connection, a virtual interface is created on the VPN client that represents the interface connected to the VPN server. The virtual interface of the VPN client and the VPN server must then be assigned Internet Protocol (IP) addresses. By default, the VPN server obtains IP addresses for itself and VPN clients using the Dynamic Host Configuration Protocol; otherwise, a static pool of IP addresses can be configured to define one or more address ranges. But in order for a VPN to perform properly, the server must have enough bandwidth to accommodate the number of active users at any one time. Types of VPNs There are numerous types of VPNs. Internet Protocol Security (IPSec), for starters, is a standard VPN that is flexible and configurable in terms of its ability to connect two networks. With IPSec, traffic is encrypted and authenticated to protect it against undetected alteration. But it’s important to remember that data encryption should always be used for VPN connections where private data is transmitted across a public network, such as the Internet. Furthermore, Secure Sockets Layer (SSL) links a single computer to an application gateway on a corporate network. Because SSL VPNs use the client’s web browser as an interface, the client machine often needs additional software. Also, operating system compatibility considerations are required for the extra client software download. Healthcare organizations (HCOs) typically deploy this type of VPN connection for internal employee use. With healthcare being a vast and complex environment, HCOs should develop guidelines—for instance, megapixel requirements for remote diagnostic review software. And biomedical engineers and technicians should be at the frontlines of decision-making regarding the use of personal devices for telemedicine. Moreover, mobile VPNs (mVPNs) are integral to certain industry use cases, such as public safety and emergency services. What differentiates mVPNs from traditional VPNs, however, is the lack of fixed endpoints. Unlike traditional VPNs, the mVPN must maintain the user’s connection while dealing with the logins to each new endpoint—using a client to do so. Furthermore, a number of VPN service providers (i.e., OBS VPN Galerie) are now beginning to offer integrated public cloud services as part of their VPN offer (cloud-centric VPN 2.0). Another VPN option is site-to-site, where a tunnel is built statically between a client’s site and their hosted firewall. Tunneling is a method of using a network infrastructure to transfer data from one network over another network. Instead of sending a frame how the originating node produces it, the tunneling protocol encapsulates the frame in an additional header, which provides routing information. (For reference: A tunnel is the logical path that the encapsulated packets traverse the network.) This means users pass secure traffic, although they can only initiate when at a specified location. Security and Privacy Controls There are many security and privacy controls to be aware of for information systems, per the National Institute of Standards and Technology (NIST) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. One of the jobs of an information security officer is reviewing access control for each type of VPN. Note: There may be regulations that govern the flow of information within a system and between interconnected systems, such as “copy/paste.” And the principle of least privilege provides only authorized users with the access to accomplish assigned tasks. Also, session locks prevent access to the system after a certain period of inactivity. What’s more, contractor VPN accounts can be established, which have implemented IP restrictions that limit vendor remote access to a subnet of internal IP space. Even so, if the systems are already access-controlled, an organization may deem this security control “low risk.” Finally, the latest generation of VPN features self-contained hardware solutions. And since they’re self-contained, the VPN hardware cuts down on file server usage. These new VPNs—which are small and easy to set up—use, but still contain, all the necessary security and performance features. So, to sum it up, the popularity of VPNs continues to grow and evolve, providing institutions of all sizes a means to leverage the Internet to reduce communication costs. Arleen Thukral, MS, is chief biomedical engineer at VA Central California Health Care System in Fresno. Questions and comments can be directed to [email protected].    
ESSENTIALAI-STEM
Elastic Days Elastic Days is the third solo studio album by Dinosaur Jr. frontman J Mascis. It was released through Sub Pop Records on November 9, 2018. Release On August 21, 2018, Mascis announced the release of his new album, along with the first single "See You at the Movies". The second single "Everything She Said" was released on September 18, 2018. The third single "Web So Dense" was released on October 16, 2018. Production The album was recorded at Mascis' Bisquiteen Studio in Amherst, Massachusetts, and features vocal contributions by Pall Jenkins, Mark Mulcahy and Zoë Randell. Tour In support of the album, Mascis went on a North American tour, starting on November 7, 2018 in Vancouver, British Columbia and finished on December 15, 2018 in Portland, Maine. Critical reception Elastic Days was met with "generally favorable" reviews from critics. At Metacritic, which assigns a weighted average rating out of 100 to reviews from mainstream publications, this release received an average score of 75, based on 17 reviews. Aggregator Album of the Year gave the release a 75 out of 100 based on a critical consensus of 21 reviews. Mark Deming from AllMusic explained that Mascis' vocals on the album sound "more lucid, better focused and more conscious of what he has to say; the performances have a depth of feeling he doesn't always reveal in Dinosaur Jr.." Personnel Musicians * J Mascis – vocals, guitar, drums * Ken Maiuri – piano on tracks 1 to 5, 7, 8, 10 * Mark Mulcahy – guest vocals * Zoë Randell – guest vocals * Pete Snake – guest vocals * Pall Jenkins – guest vocals Production * John Agnello – mixer * Steve Hassett – engineer * Greg Calbi – mastering
WIKI
Ontario Highway 51 King's Highway 51, commonly referred to as Highway 51, was a provincially maintained highway in the Canadian province of Ontario that connected Highway 3 in Eatonville with Rondeau Provincial Park. An earlier designation existed south of Orangeville, connecting Highway 24 with Highway 10 in Caledon Village. This iteration was assumed in 1938, but later renumbered as Highway24 In 1961. The more recent incarnation of the route number was assumed in 1970, but then decommissioned in 1997 and transferred to what is now the city of Chatham-Kent. Route description Highway 51 was a short connector road that served to link Highway 3 to Rondeau Provincial Park. At its southern terminus, the highway began at the entrance gates to the provincial park, proceeding northeast through a small community of recreational cottages. The highway exited the park and turned north onto what is now Chatham–Kent Road 15. From here the highway progressed straight north to Highway 3, passing through the community of New Scotland along the way. Trees continue to line both sides of this section of the highway, with farmland sprawling out beyond that. History In 1961, the section of Highway24 between Highway51 and Orangeville was renumbered as Highway 136; Highway51 was renumbered as Highway24 and the latter signed concurrently with Highway10 north to Orangeville. On April9, 1970, the road from Eatonville to Rondeau Provincial Park was designated as Highway51. This iteration of the route remained unaltered until April1, 1997, when it was transferred to Kent County, now the City of Chatham–Kent. It was subsequently designated as Chatham–Kent Road15.
WIKI
Page:Dictionary of National Biography volume 40.djvu/409 :: Queen's Chamber.’ Their appearance in this form exercised an appreciable influence upon the contemporary drama. * 1) ‘A Commentarie or Exposition vpon the twoo Epistles Generall of Sainct Peter and that of Sainct Jude,’ translated from the Latin of Martin Luther, 1581. * 2) ‘True and Christian Friendshippe,’ translated from the Latin, 1586. * 3) ‘The Olde Mans Dietarie,’ translated, 1586. * 4) ‘The True Tryall and Examination of a Mans own Selfe,’ translated, 1587. * 5) ‘An Herbal for the Bible,’ 1587. * 6) ‘Principum ac illustrium aliquot et eruditorum in Anglia virorum Encomia,’ and ‘Illustrium aliquot Anglorum Encomia,’ contributed to Leland's ‘De Rebus Britannicis Collectanea’ in 1589 (ed. 1770, v. 79). * 7) ‘Ioannis Brunsuerdi Maclesfeldensis Gymnasiarchæ Progymnasmata quædam Poetica,’ 1590. * 8) ‘Thomas Newton's Staff to lean on,’ 1590. * 9) ‘Vocabula Magistri Stanbrigii,’ 1577; 2nd edit. 1596; 3rd edit. 1615; 4th edit. 1636; 5th edit. 1649. To the above may be added (a) ‘The Booke of Marcus Tullius Cicero, entituled Paradoxia Stoicorum …’ 1569, the dedication of which, signed Thomas Newton, is dated ‘from Greenwich the kalendes of June 1569;’ and (b) ‘A Pleasaunt Dialogue concerning Phisicke and Phisitions … translated out of the Castlin tongue by T. N.,’ 1580. His verses, both English and Latin, appear in more than twenty separate works between 1576 and 1597, including Blandie's translation of Osorius's ‘Discourse of Ciuill and Christian Nobilitie,’ 1576; Batman's ‘Golden Booke of the Leaden Goddes,’ 1577; Hunnis's ‘Hive of Hunnye,’ 1578; Munday's ‘Mirror of Mutabilitie,’ 1579; Bullein's ‘Bulwarke of Defence,’ 1579; ‘Mirror for Magistrates,’ 1587; Ives's ‘Instructions for the Warres,’ 1589; Ripley's ‘Compound of Alchymy,’ 1591; Tymme's ‘Briefe Description of Hierusalem,’ 1595; and he wrote a metrical epilogue to Heywood's ‘Workes’ of 1587. Thomas Newton of Cheshire must not be confounded with Thomas Newton, ‘gent.,’ who was apparently of Lancashire origin, and, under the initials ‘T. N. G.,’ published ‘Atropoion Delion: on the death of Delia with the tears of her funeral. A poetical excursive Discourse on our late Eliza,’ 1603. This is dedicated to Alice, countess of Derby, wife of Sir Thomas Egerton, lord keeper. It is reprinted in Nichols's ‘Progresses of Queen Elizabeth.’ The same writer is responsible for a flowery romance entitled ‘A Pleasant New History, or a Fragrant Posie made of three flowers, Rosa, Rosalynd, and Rosemary,’ 1604. NEWTON, THOMAS (1704–1782), bishop of Bristol, born at Lichfield on 1 Jan. 1704 (N.S.), was the son of John Newton, a brandy and cider merchant. His mother, the daughter of a clergyman named Rhodes, died a year after his birth. He was first sent to Lichfield grammar school. His father afterwards married a sister of Dr. Trebeck, the first rector of St. George's, Hanover Square, London, and by Trebeck's advice he was sent to Westminster in 1717, and in 1718 was nominated to a scholarship by Bishop Smalridge, also a native of Lichfield. At Westminster he was a contemporary of the future Lord Mansfield and other men afterwards distinguished. He regretted that he dropped friendships which might have been useful by applying for a scholarship at Trinity College, Cambridge, in May 1723, instead of going to Christ Church. He graduated B.A. in 1726–7, and M.A. in 1730. A polite reference to Bentley, then master, in a college exercise, appears to have helped him to obtain a fellowship at Trinity. He prepared a stock of twenty sermons, and was ordained deacon in December 1729 and priest in the following February by Bishop Gibson. He became curate to Trebeck at St. George's, and was chosen reader at Grosvenor Chapel in South Audley Street. He was soon well known in the parish, and became tutor to the son of, lord Carpenter [q. v.], in whose house he lived for some years. The position enabled him to begin a collection of books and pictures. In 1738 [q. v.], then vicar of St. Martin's, appointed him morning preacher at the Spring Gardens Chapel. His connection was increased by an acquaintance with Mrs. Devenish, whose first husband had been the dramatist, [q. v.] She introduced him to Pulteney, for whom he had already the ‘profoundest veneration.’ Pulteney, on becoming Earl of Bath (1742), appointed Newton his chaplain. Newton appears to have enjoyed the political confidence of his patron, and has preserved some accounts of the intrigues in which Bath was concerned at the overthrow of Walpole, and again in 1746. Bath obtained for him in 1744 the rectory of St. Mary-le-Bow, then in the king's presentation, by the preferment
WIKI
User:Stephen Kpelafiya/sandbox Dog Man Is A Book That Fights The Cop And a Good Dog. He's Like Zuzu in Dog Man Unleased. The First Book Was Published On August 30, 2016 The Book Was For Dav Pilkey. Dog Man Was The 2016 Kid Choice Book
WIKI
Reduction of physical assignments to a standard lod table: Chromosome 1 B. J.B. Keats, N. E. Morton, D. C. Rao Research output: Contribution to journalArticlepeer-review 18 Scopus citations Abstract A method for reducing physical assignments of markers to a lod score table is described, and these tables are added to those from family data to provide a consistent genetic map of chromosome 1. Various chiasma maps are considered, and the results suggest that terminalization of chiasmata does occur. Chiasmata appear to be significantly less localized in oocytes than spermatocytes, and crossing-over in the vicinity of the centromere is more common in females than in males. Original languageEnglish Pages (from-to)353-359 Number of pages7 JournalHuman genetics Volume56 Issue number3 DOIs StatePublished - Feb 1981 Fingerprint Dive into the research topics of 'Reduction of physical assignments to a standard lod table: Chromosome 1'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Talk:List of tallest buildings in Ottawa–Gatineau Untitled * The following discussion is an archived debate of the proposal. Please do not modify it. Subsequent comments should be made in a new section on the talk page. No further edits should be made to this section. The result of the debate was move. &mdash; Nightstallion (?) 11:04, 21 January 2006 (UTC) Earlier discussion * It seems to be that this list should be amended to be the National Capital Region's tallest buildings, esp. since the tallest building is on the Gatineau side. When the downtown exists on both sides of the river, and it's one interconnected metropolitan area, it seems silly to have a list that pretends that nothing exists on one side of the river. Skeezix1000 19:48, 11 November 2005 (UTC) * Maybe a page at List of Gatineau's 10 tallest skyscrapers is warrented. -- Earl Andrew - talk 20:08, 11 November 2005 (UTC) * I'm not sure that would help. Gatineau and Ottawa are one urban area, so it seems to me that any list is incomplete unless one deals collectively with both in one list. It doesn't seem realistic to say Place de Ville is the tallest building when one can see an even taller building standing nearby. There's a building in Alta Vista on the list, yet the list excludes taller buildings a stone's throw away from Parliament Hill. If the point is to have a list that reflects political boundaries, then it's fine as it is; but if the point of the article is to have an accurate and realistic list of the tallest buildings in an urban area, then I'd argue that the article should be revised to incorporate the entire metropolitan area. Skeezix1000 21:21, 11 November 2005 (UTC) * The page is for Ottawa, not Ottawa-Gatineau. -- Earl Andrew - talk 23:28, 12 November 2005 (UTC) * Thanks for that - I hadn't noticed. :) What I'm saying, and maybe I haven't explained it very well, is that it's kind of pointless having an article on the tallest buildings that ignores some of the tallest buildings in the core. Skeezix1000 16:07, 13 November 2005 (UTC) Voting * Support. Ottawa and Gatineau constitute one urban area, and are within the same Census Metropolitan Area. Their downtown cores are adjacent to one another, both dominated by the same employer (the federal government), with tens of thousands of commuters going back and forth every day. Given the close proximity and integration of the downtown cores, it is frankly silly (and misleading) to have a list that ranks certain buildings to be the tallest, when taller buildings are within walking distance and eyesight. I do not believe that it is sufficient to simply make note of other tall buildings in Gatineau (as the article currently does), or to have a sister-article for tall builings in Gatineau, because either option requires the reader to compare the lists and comments to figure out which building is actually the tallest in the urban area. If the goal is to have the most accurate information, then the scope of the article should be broadened. Skeezix1000 13:31, 16 January 2006 (UTC) * Support per the mini-essay by Skeezix1000! Our article at Ottawa also seems to also put the two together: "The combined population of Ottawa and Gatineau exceeds one million residents."[1]--Lox (t,c) 16:49, 20 January 2006 (UTC) * The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made in a new section on this talk page. No further edits should be made to this section. 10 or more? In the first sentence: "This is a list of the 10 tallest ..." is mentioned that this list includes only ten buildings but there are more than fifteen buildings listed on the main list. Wabba The I (talk) 14:24, 31 May 2013 (UTC) Move discussion in progress There is a move discussion in progress on Talk:List of tallest bridges in the world which affects this page. Please participate on that page and not in this talk page section. Thank you. —RMCD bot 13:19, 22 April 2015 (UTC) "Tallest ottawa" listed at Redirects for discussion A discussion is taking place to address the redirect Tallest ottawa. The discussion will occur at Redirects for discussion/Log/2020 September 25 until a consensus is reached, and readers of this page are welcome to contribute to the discussion. Regards, SONIC 678 16:31, 25 September 2020 (UTC) Dramatic Change of this article Why was there such a dramatic change to this article with regards to building heights? I'm not sure its been improved to be more accurate. The one glaring issue is Le Parc is definitely 104m tall but now is nowhere to be found. This calls into question the entire accuracy of the article for me. I've been coming to this article for quite a few years now and I just don't know about it anymore. Gravelcyclist (talk) 13:59, 27 November 2023 (UTC) * Further discussion about the updated building heights is here: User talk:Harleyd613 (cc Harleyd613) Consigned (talk) 22:22, 4 June 2024 (UTC) Header image Hi Harleyd613, thank you for all of the photos. I find the skyline images at the top of the article too small to give a proper overview of the city when introducing the article; do you have any which give a good view of the skyline when shrunk to a thumbnail? At List of tallest buildings in Calgary there's a single image at the top then some wide skylines further below. Consigned (talk) 22:26, 4 June 2024 (UTC)
WIKI
Consumer Sector Update for 07/14/2015: VNCE,BAMM,EPAX Top Consumer Stocks CWMT -0.32% MCD +0.54% DIS -0.07% CVS +0.22% KO +1.45% Consumer stocks were narrowly higher today with shares of consumer staples companies in the S&P 500 hanging on to a 0.1% gain while shares of consumer discretionary firms in the S&P 500 were about 0.2% higher. In company news, Vince Holding Corp ( VNCE ) slid to an all-time low on Tuesday after CEO Jill Granoff late yesterday went public with her plans to step down at the apparels manufacturer. Granoff previously told the company's board of director of her plans and has agreed to stay on until a permanent replacement is identified and hired for the post. Separately, Vince Holding last night also said it has hired Livia Lee as its new chief merchandising officer. Lee is scheduled to begin work at the company on July 20 and will report directly to Granoff and her successor once that person is selected. Also, the company said Karin Gregersen was leaving as company president and chief creative officer. The company will not hire a replacement for Lee. VNCE shares were down almost 19% at $9.73 each, earlier sinking to a record low of $9.46 a share. Entering today's session, the stock already had retreated more than 58% over the past 12 months before today's decline. In other sector news, (+) BAMM, (+19.7%) Investor group led by Board Chairman Clyde Anderson makes $21 million going-private offer, paying $3.25 per share in cash, a 23% premium over yesterday's closing price. (-) EPAX, (-25.3%) Announces plans to cease operations and shutter its student and adult travel businesses by the end of 2015. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Car Running Hot (Temperature Gauge Rising) But Not Overheating – Why? It can be a scary thing when your car warns you that it’s overheating. A hot engine can cause plenty of problems if not taken care of right away. In the worst-case scenarios, you may find yourself broken down on the side of the road, smoke coming out of your engine. An overheating car can lead to massive engine damage. Your engine can crack under the heat and begin to leak oil. Also, your head gasket, cylinders, and pistons can all warp. In the best-case scenario, you may lose some performance. At the worst, your entire engine can seize. To proactively avoid these issues, it’s essential to keep an eye on your car’s temperature gauge. But what if all the signs point towards a hot engine, but it’s not overheating? This article will cover what the means and what to do in that particular situation. Why Is My Car Running Hot But Not Overheating? There are a few reasons why your car may be hot but not overheating. Most of these reasons are related to your cooling system. It may be that your radiator is clogged or damaged, that your coolant is low, that your water pump is damaged, that your thermostat is damaged, or that your engine is simply overworked. In some cases, you may find that everything appears to be perfectly fine with your cooling system. In such cases, it could be simply that your cooling system is in need of a tune-up to work more efficiently. It could be as simple as changing out your coolant to stop your car from running hot. 5 Symptoms and Causes Of A Car Running Hot But Not Overheating As stated above, the most common reasons for an engine to run hot but not overheat include: – Radiator clogged or damaged – Low coolant – Water pump damage – Thermostat damage – Overworked engine. These five issues all have different symptoms that may indicate what the problem is. If The Temperature Gauge Reading Fluctuates This is for those moments that the temperate seems to rise dramatically and then go back to normal. Perhaps you are stopped or accelerating on the highway, and all of a sudden, your temperature gauge is reading high, but the moment you go to check out the issue, the temperature has returned to normal. What is the problem here? The problem is rarely the temperature gauge itself. While not impossible, the gauge is generally known to outlive the life of the car. Instead, the temperature gauge gives some indication of what the problem may be. The most common reason for a temperature fluctuating in this way is a broken thermostat. Thankfully a thermostat is relatively cheap and easy to replace. A dying radiator fan may also be the cause. If it is the fan, you may notice the fan making a strange noise, and you will be able to see it spinning weirdly. The cylinder head gasket may also be a culprit. When the engine gets hot, this is often the first thing to break. A damaged gasket will cause a coolant leak into the engine oil. Lastly, if you don’t have enough coolant, you may have this problem. If The Temperature Gague Reading Is High If your temperature gauge is consistently running high, there may be four reasons for this. One, it may simply mean that your engine is overheating. Two, you may be leaking coolant. Three, like the fluctuating temperature, you may have a broken thermostat. And finally, if your car is running hot, it may mean that you need your water pump or water pump basket replaced. If The Temperature Gauge Reading is Low If you notice that your engine is steaming, but your temperature gauge is still reading low, then there may be some reasons for it. One, if you notice that the temperature gauge is still reading as cold even after the vehicle has had time to warm up, then it may be the temperature gauge itself that needs to be replaced. Generally, the temperature gauge will only read cold when the engine isn’t running. Second, it could be that the thermostat is stuck open. In the case that the vehicle is overcooled, the thermostat can get stuck open, meaning that it will only read cold afterward. In this case, the thermostat will need to be replaced. What You Should Do It Your Car Runs Hot First, let’s go over some signs that your car is overheating. First off, you may have steam coming out of the hood. If you get near the hood of the car, you may notice that it is hot. There could also be coolant leaking on the ground or a strange smell. While the car is still running, you may notice a ticking or thumping noise coming from the engine. Additionally, you may see that you are not getting as much power from your engine. The temperature gauge is not often the problem with an overheating car. Instead, it is usually the first indicator that something is wrong. In the rare chance that the temperature gauge is broken, however, you will notice one of two things. Either the temperature reading will highly fluctuate, or the temperature reading will just remain cold. If your system that your temperature gauge is the issue, you can test it with a multimeter to check that it’s running correctly. The first step to performing this test is to locate your temperature gauge. In most vehicles, it will be housed near the thermostat. There is a chance, however, that it will be attached to a cylinder head. If you still can’t find it, try following the upper radiator hose. Once you have located your temperature gauge, you will be able to use a multimeter to measure the coolant temperature gauge’s resistance value. The expected value should be in your car’s manual. If not, you should be able to look it up online. Most vehicles will have a resistance value of 3000 ohms at 55F. To test your resistance level, connect one of the multimeter’s leads to the sensor’s electrical connector terminal. The other lead will be connected to a different terminal. From here, take your readings. You will want to take readings when your car is turned off, when it is turned on and warmed up, and when it is turned off again. Compare your readings to those from the manual. While performing these tests, if your notice the gauge has 0 resistance, there is no change while the car warms up, there are damaged wires, or the gauge itself appears damaged, then it will need to be replaced. How To Treat Symptoms Of A Car Running Hot But Not Overheating If you notice that your vehicle is overheating, there are a few things that you can do to avoid damage to your engine. 1. Pull over as soon as it is safe to do so. The main thing that you can do for a hot car is to stop driving it. By pulling over and shutting off the vehicle, you are giving the engine time to come back down to a regular temperature. While you’re waiting, watch the temperature gauge to make sure that it is going down. Since it probably isn’t a good idea to keep driving it beyond this point, feel free to call a friend or a tow service. 2. Turn off the A/C and turn up the heat. This one may seem counterintuitive, but running the A/C can actually add stress to your engine. Then by turning on the heat, you will be pulling heat away from the engine and into the car. This is a great option if you can’t pull over right away and need to keep driving for a little while first. 3. Check the coolant. In many situations where the car is overheating, the issue is often related to low or leaking coolant. Check your coolant level once you are safely pulled over. If you have any with you, add more coolant. If you don’t know where your coolant reservoir is, you can consult your car’s manual. 4. Start the engine. After you’ve given your car plenty of time to cool down, try starting the engine again. Keep an eye on the temperature gauge to make sure that your car doesn’t start to overheat again. If you need to, this would be the time to start (carefully) driving towards the nearest garage. As you drive, keep an eye on the temperature gauge and pull over again if you notice that the car is starting to overheat. FAQ Why Is My Car Overheating, But My Temperature Gauge Is Normal? This is usually one of two things. Either the thermostat is broken and no longer taking reading correctly, or the temperature gauge is broken. Another option is that you have a faulty radiator cap. If the radiator cap isn’t sealed correctly, steam will escape from your radiator, even if the car isn’t overheating. This will make it look as though it’s overheating even though the temperature gauge says everything is okay. Why Is My Car Overheating, but It Has Coolant in It? If there is coolant in your car and it is still overheating, it’s likely that the problem is the coolant isn’t able to circulate correctly. This can be caused by a broken water pump, a stuck thermostat, a blockage in your radiator, or a plugged heater core. Why Is My Car Overheating but No Smoke Under the Hood? Not every overheating car is going to smoke and burn. If there’s no smoke, it could be that your coolant is low. Also, there could be an issue with the thermostat, or the coolant may not be circulating through the radiator correctly. How Long Can I Drive My Car While It’s Running Hot? If your car is already overheating, you don’t want to drive it any further than a quarter-mile. As soon as you notice that it’s overheating, pull over as soon as it’s safe to do so. If you can, call a tow truck. If you can’t call a tow truck, then wait for your car to cool down and carefully drive towards a garage while keeping an eye on the temperature gauge. If it starts to overheat again, pull over again. Is It Normal for the Car Hood to Be Hot? Under normal circumstances, it is completely okay for your car hood to be a little warm while the car is running. If you can comfortably hold your hand on your hood for at least ten seconds, then it’s fine. However, if it is noticeably extremely hot, then that may be cause for concern. What Is the Normal Temperature Gauge Reading of a Car Engine? Your car temperature gauge is usually just an arrow that fluctuates between C for cold and H for hot. When the car is cooled down, the error should be pointed at C. When the car is running, the arrow should be in about the middle, give or take. The temperature of the engine when it is running normally should be somewhere between 195 and 220 Fahrenheit. How to Know if My Engine Is Damaged From Overheating? When you inspect your engine, there are a few tell-tale signs that the engine was damaged from overheating. These include a cracked engine block, broken head gasket, warped cylinders, and melted or cracked seals. How Often Do You Need to Replace Your Temperature Sensor? When it comes to the normal running of a car, the temperature sensor should be replaced about every 100,000 miles. However, if the car wasn’t properly maintained, you may find the sensor failing before then. Author: DJ Dave Junior is a hands-on automotive technician with experience in performing service, diagnostics, and repairs on domestic and imported vehicles. He enjoys writing and sharing his knowledge far and wide. Leave a Reply Your email address will not be published.
ESSENTIALAI-STEM
Page:Romance & Reality 3.pdf/287 Rh "Nay, I have not wanted you till now;" and throwing her arm round her companion's neck, she kissed her: it was a silent renewal of affection, as if she mutely asked her forgiveness for having envied her happiness. She was soon asleep; and Beatrice, now fully awakened by anxiety, watched over her unquiet slumbers as you would watch a feverish child. Once Emily started up—"Is my letter gone to Lady Mandeville?" But on Beatrice's assurance that it should be sent the first thing in the morning, she dropped her head back on the pillow and slumbered again. The sunshine of summer, and the showers of spring, brought in the next day. White clouds wandered over the sky, like the uncertain aims of the weak and vain—and like them, too, often ending in darkness and tears. The wind stirred the leaves of the old trees with a sound like falling rain—a melancholy voice that suited well with their gloomy shade. But in the garden was life in all its glad and bright hues: the early roses and the late violets opened their urns, exhaling in perfume the drops they caught, till every breath was pleasure; the laburnums, those prodigals of fleeting wealth, were covered with gold; and the Persian lilacs waved
WIKI
Page:The Biographical Dictionary of America, vol. 05.djvu/145 HART8HORXE HAETSTEXE lector of the port of Philadelphia from A.ugust, 1880. He was major-general in command of the Pennsylvania national guard, 1879-89. An eques- trian statue in bronze, one and one-half life size, executed by F. Wellington Ruckstuhl, was placed in front of the capitol building, Harrisburg, in 1899. On the front of the monument is tlie inscription: "John Frederick Hartranft. The hero of Fort Stedman. Born December 16, 1830. Died October 17, 1889." On the northern side: "Colonel 4th Pennsylvania Infantry, April 20, 1861-July 27, 1861. Colonel 51st Pennsylvania Infantry, Nov. 16, 1861-July 2, 1864. Brigadier- General United States Volunteers, May 12, 1864- January, 15, 1866. Brevetted 3Iajor-General, March 25, 1865." On the southern side: "Com- mander 3d Division, 9tli Corps, Army of the Poto- mac, 1864-1865." On the rear: " Auditor-General, May 1, 1866-November 8, 1872. Governor, Janu- ary 21, 1873-January 18, 1879." He died in Nor- ri.stown, Pa., Oct. 17, 1SS9. HARTSHORNE, Charles, capitalist, was born in Philadelphia, Pa., Sept. 2, 1829; .son of Dr. Joseph and Anna (Bonsall) Hartshorne, and a descendant in the fifth generation from Richard Hartshorne, born in Leicestershire, England, in 1641, who came to America in 1669. He was a student at Haverford college, 1843-45, entered the junior class of the University of Pennsylvania in 1845 and was graduated A.B., 1847, A.M., 1850. He engaged in railroad enterprises and was elected president of the Quakake railroad companj- in 1857; president of the Lehigh & Mahanoy rail- road company in 1862; vice-president of the Lehigh Valley railroad company in 1868, its presi- dent in 1880, and again its vice-president in 1888. He was elected a trustee of Lehigh imiversity and of Haverford and Bryn Mawr colleges; a member of the board of managers of the Pennsyl- vania hospital ; and a member of the American academy of political and social science. He was married June 8. 1859, to Caroline C, daughter of Edward Yarnall of Philadelphia, and grand- daughter of Thomas Pym Cope. HARTSHORNE, Edward, physician, was born in Philadelphia, Pa., May 14, 1818; son of Dr. Joseph and Anna (Bonsall) Hartshorne; grandson of William and Susannah (Saunders) Hartshorne, and a descendant of Ricliard Hartshorne, a mem- ber of the Society of Friends from England, who settled in New Jersey in 1669. William Hartshorne was treasurer of tlie first internal improvement society of America, of which George Washington was president. Dr. Joseph (born 1779, died 1850), M.D., University of Pennsylvania, 1805, was a celebrated physician, the inventor of "Harts- horne's splint," and attending surgeon at the Pennsylvania hospital. Edward was graduated at the College of New Jersey, A.B., 1837, A.M., 1840; and at the University of Pennsylvania, M.D., 1840. He was a surgeon of the Wills eye hospital, of the Pennsylvania hospital and of the Eastern state penitentiary of Pennsylvania. He was consulting surgeon in the U.S. army, 1861-65, secretary of the executive committee of the U.S. sanitarj^ commission, Philadelphia; editor of the Journal of Prison Discipline and Phi- lanthropy, and wrote Separate System of Prison Discipline ; notes to Taylor's Medical Jurisprudence (1854) ; and Ophthalmic Medicine and Surgery (1856). He died in Phrladelphia. Pa., June 22, 1885. HARTSHORNE, Henry, physician, was born in Philadelphia, Pa., March 16, 1823; son of Dr. Joseph and Anna (Bonsall) Hartshorne; and grandson of William Hartshorne. He was gradu- ated at Haverford college, A.B., 1839, A.M., 1842, and in medicine from the University of Pennsyl- vania in 1845. He was professor of the institutes of medicine at the Philadelphia college of medi- cine, 1853-55; of the pi'actice of medicine at the University of Pennsylvania, 1859-66; of hygiene, 1866-67; and of organic science and philo.sophy in Haverford college, 1867-71; and of physiology and hygiene, 1871-76. He also held medical chairs in the Pennsylvania college of dental surgery, in the Woman's medical college of Pennsylvania, and in Girard college. He experimented on himself and others in 1848 to prove the effects and ascer- tain the safety of the internal use of chloroform. He received the honorary' degree of LL.D. from the University of Pennsylvania in 1884. He edited The Friends Pevieic, and is the author of: Monograph on Glycerin; Essay on Cholera; Guide to the Medicine-chest ; Conspectos of the Medical Scien- ces (1869) ; Essentials of the Principles and Practice of Medicine (4th ed, 1874) ; and Summer Songs (1865). He died in Tokio, Japan, Feb. 10, 1897. HARTSTENE, Henry J., naval officer, was warranted a midshipman in the U.S. navj- from North Carolina in 1828; was a lieutenant in 1840, a commander in 1855, and resigned from the U.S. navy in 1861. He was with the Wilkes explor- ing expedition in 1838 ; was subsequently attached to the coast survey, and in command of the 77- linois. He i-escued Dr. Kane and his i^arty at Upernavik, Aug. 6, 1855, and brought them to New York; conveyed to England the British exploring bark Besolute rescued by Captain Bud- dington and purchased by congress as a present to the British government in 1856. He after- ward engaged in taking soundings for the Atlantic cable. After his resignation from the U.S. navy in December, 1860, he joined the South Carolina forces and had command of the few guard boats that took part in the investment of Fort Sumter in April, 1861, and he was present at the evacua- tion of the fort. He then joined the Confederate States navy and when the Isaac Smith, carrying
WIKI
What are some things about oceans that only sailors know? 3 Mar,2023 Navigating the open ocean is a skill that requires knowledge and experience, and only sailors know the ins and outs of the best strategies to stay safe while at sea. While sailing, it is important to be aware of potential hazards, such as storms, rogue waves, and other vessels. Here are some tips on how to navigate the open oceans and avoid potential hazards: • Know Your Route: Before setting off, make sure you have a detailed plan of your route, including the anticipated weather conditions. This will help you avoid areas that are prone to storms and other dangerous weather patterns. • Stay Alert: When sailing, it’s important to always stay alert and be aware of your surroundings. Keep an eye out for other vessels and be prepared to take evasive action if necessary. • Check the Weather: Before setting off, check the forecast and be prepared for changing weather conditions. Keeping an eye on the weather can help you avoid storms and other hazardous weather patterns. • Prepare for Emergencies: Always be prepared for any emergency situation by packing a first aid kit and other emergency supplies. Having a plan for how to respond in an emergency can help you stay safe in the open ocean. By following these tips, sailors can navigate the open oceans and avoid potential hazards. Knowing the ins and outs of the open ocean is an invaluable skill that only sailors possess. Sailing on open oceans can be a thrilling and rewarding experience. Not only is it a great way to relax and see the world, but there are also a number of benefits that only experienced sailors know. Here are a few of the benefits of sailing on the open oceans: • Exploring Uncharted Waters: One of the great things about sailing on the open oceans is the opportunity to explore new places that few people have ever seen before. Whether it’s a secluded cove or a remote island, you can discover hidden gems that are completely off the beaten path. • A Sense of Freedom: Sailing on the open oceans can also give you a sense of freedom that you can’t get from any other activity. There’s nothing quite like being out on the open water, with no one but the wind and the waves to keep you company. • Seeing the World: Sailing on the open oceans can be a great way to see the world. You can sail to different parts of the world, which can give you an entirely different perspective on life. You can also get a better understanding of different cultures and customs, as well as experience different climates. These are just some of the benefits of sailing on the open oceans. Experienced sailors know that there’s much more to it than just the thrill of the journey. It’s a great way to relax, explore new places, and see the world in a completely new way. Sailing across the ocean is a daunting task that requires careful preparation and planning. Before heading off on your journey, you should take the time to make sure your boat is in tip-top shape and ready for the journey ahead. Here are some tips for preparing your boat for a long voyage across the oceans: • Inspect your boat: Make sure to thoroughly inspect your boat before leaving. Check the hull, deck, and rigging for any signs of wear and tear, and ensure all of the necessary parts are in working order. Make sure all of your safety equipment, such as life jackets, flares, and distress signals, are in good condition and ready to use. • Check the weather: Before setting sail, make sure to check the weather forecast and plan accordingly. Always plan for changes in the weather and be prepared for unexpected storms and rough seas. Make sure to have a plan in case you get caught in bad weather. • Pack the essentials: Make sure to pack the essentials for your voyage, such as food, drinking water, and any necessary tools and spare parts. Make sure to have enough fuel to last the trip, and always have a backup plan in case you run out. Don’t forget to bring entertainment as well, such as books, music, and cards. These are just a few of the things that sailors need to know before embarking on a long voyage across the oceans. With careful preparation and planning, you can ensure a safe and enjoyable journey. Bon voyage! The ocean is a vast and mysterious place, and only sailors know the secrets it holds. From the smallest of creatures like plankton and krill, to the majestic creatures like whales and sharks, the ocean is home to a variety of unique wildlife and marine life. Some of these creatures, such as the giant squid, can only be found in the depths of the ocean and are rarely seen by humans. Other creatures, like the manatee, are found in more shallow waters and have become a popular tourist attraction. And while many of these creatures can be found in other parts of the world, the ocean has its own special variety of wildlife and marine life, including some truly fascinating creatures. The anglerfish, for example, has a light-up lure on its head that it uses to attract its prey, while the sea cucumber is a unique creature that looks like a cross between an octopus and a starfish. There are even creatures like the blobfish, which is a deep-sea fish that looks like a blob of gelatin. Sailors also know about the ocean’s unique ecosystems, from the coral reefs of the Caribbean to the kelp forests of the Pacific Northwest. These ecosystems provide a home for a variety of marine life, from colorful coral fish to the mysterious giant squid. No matter where you sail, you’re sure to see something new and exciting in the ocean. So if you ever find yourself out on the open sea, keep an eye out for the unexpected. You never know what you’ll find beneath the surface! Sailing on the oceans has been a part of human history for centuries. From the first voyages of exploration to the modern-day sailing vessels, the oceans have seen many different vessels and generations of sailors. But what are some things about the oceans that only sailors know? Here, we’ll uncover the fascinating history of sailing on the oceans and the secrets of the sea that only experienced sailors are privy to. One of the most fascinating aspects of the oceans is their depth. Even with modern technology, sailors can only explore about 1% of the ocean’s depths. For centuries, sailors relied on their knowledge of the stars, the currents, and the weather to guide them across the water. They were also able to recognize the sounds of the ocean and the signs of the sea creatures that dwelled in its depths. This knowledge was essential to their survival and enabled them to travel great distances without getting lost. Another thing that only sailors know is the importance of the tides. Sailors must know how the tides will affect their voyage in order to navigate safely and effectively. The tides can change the speed and direction of the ocean currents, making it difficult to predict where a ship is headed. Additionally, sailors are familiar with the different types of sea life and the various hazards that can be encountered while sailing on the oceans. Finally, sailors have a unique appreciation for the beauty of the oceans. From the sunrises and sunsets to the calmness of the waves, sailors have experienced it all. They have witnessed the beauty of the open sea and the power of the storms that can come without warning. With this knowledge, they are able to appreciate the beauty of the sea and the danger that lies beneath its depths. Sailing on the oceans is a unique experience that only sailors can truly understand. Through their knowledge of the ocean’s depths, tides, sea life, and beauty, they are able to appreciate the power and grandeur of the ocean in a way that only sailors can. So, when you’re out on the open sea, take a moment to appreciate the secrets of the ocean that only experienced sailors know. Write a comment
ESSENTIALAI-STEM
Page:History of Greece Vol I.djvu/477 GRECIAN CHRONOLOGY FOUNDED ON MYTHES. 445 that of the Greeks generally, the more shall we be com inccd that it formed essentially and inseparably a portion of Hellenic religious faith. The mythe both presupposes, and springs out of, a settled basis, and a strong expansive force of religious, social, and patriotic feeling, operating upon a past which is little better than a blank as to positive knowledge. It resembles history, in so far as its form is narrative ; it resembles philosophy, in so far as it is occasionally illustrative ; but in its essence and substance, in the mental tendencies by which it is created as well as in those by which it is judged and upheld, it is a popularized expression of the divine and heroic faith of the people. Grecian antiquity cannot be at all understood except in con- nection with Grecian religion. It begins with gods and it ends with historical men, the former being recognized not simply as gods, but as primitive ancestors, and connected with the latter by a long mythical genealogy, partly heroic and partly human. Now the whole value of such genealogies arises from their being taken entire ; the god or hero at the top is in point of fact the most im- portant member of the whole j 1 for the length and continuity of the series arises from anxiety on the part of historical men to join themselves by a thread of descent with the being whom they worshipped in their gentile sacrifices. Without the ancestorial god, the whole pedigree would have become not only acephalous, but worthless and uninteresting. The pride of the Herakleids, Asklepiads, JEakids, Neleids, Daedalids, etc. was attached to the primitive eponymous hero and to the god from whom they sprung, not to the line of names, generally long and barren, through which the divine or heroic dignity gradually dwindled down into com- mon manhood. Indeed, the length of the genealogy (as I have before remarked) was an evidence of the humility of the his- torical man, which led him to place himself at a respectful dis- tance from the gods or heroes ; for Hekatajus of Miletus, who ranked himself as the fifteenth descendant of a god, might per- 1 For a description of similar tendencies in the Asiatic religions, see Movers, Die Phonizier, ch. v. p. 153 (Bonn, 1841): he points out the same phenomena as in the Greek, coalescence between the ideas of ancestry and worship, confusion between gods and men in the past, increasing tendency to Euemerize (pp. 156-1 57 )t
WIKI
Peer-Reviewed Journal Details Mandatory Fields Faure, AJ,Seoighe, C,Mulder, NJ 2011 January BMC Bioinformatics Investigating the effect of paralogs on microarray gene-set analysis Published () Optional Fields EXPRESSION DATA HUMAN LUNG TESTING ASSOCIATION FUNCTIONAL-GROUPS ONTOLOGY TERMS GLOBAL TEST CELL-LINES TOOL SURVIVAL BIOLOGY 12 Background: In order to interpret the results obtained from a microarray experiment, researchers often shift focus from analysis of individual differentially expressed genes to analyses of sets of genes. These gene-set analysis (GSA) methods use previously accumulated biological knowledge to group genes into sets and then aim to rank these gene sets in a way that reflects their relative importance in the experimental situation in question. We suspect that the presence of paralogs affects the ability of GSA methods to accurately identify the most important sets of genes for subsequent research.Results: We show that paralogs, which typically have high sequence identity and similar molecular functions, also exhibit high correlation in their expression patterns. We investigate this correlation as a potential confounding factor common to current GSA methods using Indygene http://www.cbio.uct.ac.za/indygene, a web tool that reduces a supplied list of genes so that it includes no pairwise paralogy relationships above a specified sequence similarity threshold. We use the tool to reanalyse previously published microarray datasets and determine the potential utility of accounting for the presence of paralogs.Conclusions: The Indygene tool efficiently removes paralogy relationships from a given dataset and we found that such a reduction, performed prior to GSA, has the ability to generate significantly different results that often represent novel and plausible biological hypotheses. This was demonstrated for three different GSA approaches when applied to the reanalysis of previously published microarray datasets and suggests that the redundancy and non-independence of paralogs is an important consideration when dealing with GSA methodologies. ARTN 29 Grant Details Publication Themes
ESSENTIALAI-STEM
Scottish Premier Reserve League The Scottish Premier Reserve League was the top reserve team league for Scottish football teams. The competition started at the same time as the inauguration of the Scottish Premier League in the 1998–99 season. It was initially an under-21 league, with a quota of five players over the age limit allowed per team in any match. The league was discontinued after the 2008–09 season. Since then, alternative structures have been mooted, such as allowing the bigger clubs to field reserve teams in the lower divisions of the Scottish Football League.
WIKI
Category:National Natural Landmarks in Wyoming National Natural Landmarks of Wyoming as designated by the National Park Service. See also: List of National Natural Landmarks
WIKI