Document
stringlengths 87
1.67M
| Source
stringclasses 5
values |
|---|---|
Enemy (Days of the New song)
"Enemy" is a song by Days of the New and the lead single from their second eponymous album also known as "Green." The song reached #2 on Billboard's Mainstream Rock Tracks in 1999 and #10 on the Modern Rock Tracks the same year, becoming only their second song to hit the Top 10 on this chart. "Enemy" also serves as the ninth track on The Definitive Collection, released in 2008.
Overview
"Enemy" is a prime example of Travis Meeks' shift into new musical scape on "Green"; whereas the first album established a moderately stripped down acoustic rock style, "Enemy" incorporates classical strings as well as electronic effects and percussion comparable to that heard in dance club music. Regarding this decision, Meeks said, "It was an experiment. It was something that I wanted to try - just like putting red in a painting instead of using more blue, just trying something different." Acoustic guitar remains well implemented, however, and an echoed horn is also heard during the chorus. Vocal layering occurs throughout "Enemy" as well with clean singing in the foreground and a distant, hollower voice providing backup vocals. The song fades to silence as it nears the end. A moody acoustic guitar then enters which is soon accompanied by a lead guitar solo before slowly fading out together.
Meeks described the song composition process in an interview with LAUNCHcast, stating that he wrote the guitar and vocal pattern first before demoing in the studio. While there, he created the bass line and composed samples around that. Meeks also expressed hope that fans wouldn't get the impression that "Enemy" stylistically represents the entire album.
Lyrically, "Enemy" appears to focus on a vague dispute between a young man and his authority figure. The first lyric in the song proclaims, "Listen down you little man/I'm not the one who's trying to change you," yet perhaps ironically, also declares later, "you need to change now." Amidst these claims, the narrator also tries to maintain respect between the two and cite that he or she is not an enemy despite the aforementioned demands.
Music video
A video was produced for a remixed version of "Enemy" which edits the song length to 4:21 and introduces more electronic effects. A director's cut was also made available at Launch.com. Filmed in mid-August 1999, "Enemy" was directed by John Schindler and Louisiana native Chip Dumstorf who was also responsible for the "Green" album's art direction.
The majority of "Enemy" was shot at The Louisville Palace with an invitation for fans to appear as extras in the August 19 shooting. Scenes taking place outside were shot along the Ohio River in Indiana. The video includes fast motion footage such as people using a revolving door and walking outside an apartment building. A bald, red-skinned figure crouches in front of a stained glass window and becomes the physical embodiment of the masked, feathered man seen on it. Throughout the video, this caped and hooded man plays a game of chess with Meeks before replacing his mask, reentering the window, and departing in his red-skinned form. The band performs in a dark, foggy room of trees similar to the album's cover art. Various characters in strange wardrobe are seen dancing among the group in an almost rave-like fashion. Other footage shows Meeks singing alone in the psychedelically colored outdoors; a truss bridge over the Ohio River can be seen in the background.
|
WIKI
|
Tourism in Gabon
Tourism in Gabon is underdeveloped. Despite this, attractions include beaches, ocean and inland fishing facilities, the falls on the Ogooué River, and the Crystal Mountains. Tourists also come to see the famous hospital founded by Dr. Albert Schweitzer in Lambaréné. Hunting is legal in specific areas from December to September.
History
Until recently, tourism has been neglected, replaced by the export of raw materials such as oil and wood. In 2000, however, the Gabonese government worked on developing the sector by developing luxury and niche tourism, such as bush expeditions or safari trips. The previous December, a postgraduate certificate in tourism was launched at the University of Libreville. The only thing that stops Gabon from success is corruption. The Guardian Book of Statistics rates Gabon as one of the most corrupt countries in the world.
On September 4, 2002, Gabonese president Omar Bongo announced that his country would set aside 10 percent of its land for a national park system. Previously, it had no organization of national parks, working with The Wildlife Conservation Society on conservation issues. Currently, the system comprises over 10000 sqmi, surpassed only by Costa Rica in the percentage on land area, though in the latter's case the area of conservation is much smaller. These new parks are being developed for ecotourism, as an economic alternative to exploiting Gabon’s forests for lumber. The project was applauded by Dr. Steven Sanderson, president and CEO of the Wildlife Conservation Society, as "one of the most courageous conservation acts in the last 20 years."
National parks
Gabon's 13 national parks range from regions along its coastline, where hippopotamuses play on untouched beaches, to forest clearings home to "naive" gorillas.
Statistics
In 2000, there were about 2,450 hotel rooms. Roughly 155,000 tourists arrived that year, and tourism receipts totaled about $7 million. The year before, 120,000 foreigners arrived, with only 1 percent coming for tourism, and it accounted for between one and three percent of the GDP (Gross Domestic Product). A visitor is required to have a passport and visa, except if they are from France, Germany, or several African countries. They are also to provide evidence of yellow fever vaccination. The US Department of State estimated the average daily cost of staying in Gabon's capital of Libreville at $182 per day as of 2002, with expenses elsewhere in the country as low as $70 per day.
|
WIKI
|
Li Yu (Southern Tang)
Li Yu (c. 937 – 15 August 978 ), before 961 known as Li Congjia (李從嘉), also known as Li Houzhu (李後主; literally "Last Ruler Li" or "Last Lord Li") or Last Lord of Southern Tang (南唐後主), was the third ruler of the Southern Tang dynasty of China during the Five Dynasties and Ten Kingdoms period. He reigned from 961 until 976, when he was captured by the invading Northern Song dynasty armies which annexed his state.
Li Yu was sentenced to death by poisoning by Emperor Taizong of Song after 2 years as an exiled prisoner.
Li Yu was an incompetent ruler and poisoned Lin Renzhao and Pan You (潘佑) to death.
Family
Parents Consort and their respective issue(s)
* Father: Li Jing
* Mother: Empress Guangmu (光穆皇后; d.965) of the Zhong clan (鍾氏)
* Queen Zhaohui (昭惠國后), of the Zhou clan (周氏), personal name Ehuang (娥皇)
* Li Zhongyu (李仲寓; 958–994), Duke Qingyuan (清源郡公), first son
* Li Zhongxuan (李仲宣; 961–964), Prince Huaixian (岐懷獻王), second son
* Queen Zhou the Younger (小周后), of the Zhou clan (周氏)
* Baoyi, of the Huang clan (保儀黃氏)
* Gongren, of the Bao clan (宮人喬氏)
* Gongren, of the Zang clan (宮人臧氏)
Early life
In the same Chinese year Li Congjia was born, his grandfather Xu Zhigao, also known as Xu Gao (Li Bian) founded the state Qi (齊), renaming it Tang (known as the Southern Tang) 2 years later. When Li Congjia was 6, his father Li Jing became the next Southern Tang emperor. With Li Jing naming his younger brother Li Jingsui his heir apparent, his sixth eldest son Li Congjia seemed unlikely to ever succeed the throne. However, many of Li Congjia's brothers died very young, and after the death of the second eldest brother Li Hongmao (李弘茂) in 951, Li Congjia all of a sudden found himself right behind Li Hongji — the eldest brother — and uncle Li Jingsui in the succession line.
Li Hongji, a withdrawn and troubled young man, resented his crown prince uncle, whom he saw as a political enemy standing in his way. He also disliked his younger brother Li Congjia, even though they shared the same biological mother, Empress Zhong. Fearing the possible results of this family enmity, Li Congjia tried hard to be inconspicuous and focused on the arts, including poetry, painting and music. He loved reading, a passion encouraged by his father, also an acclaimed poet. At the age of 17, Li Congjia married Zhou Ehuang, chancellor Zhou Zong's daughter and a year his senior. Lady Zhou was not only highly educated but also multi-talented in music and the arts and the young couple enjoyed a very intimate relationship.
Accession to the throne
In 955, a year after Li Congjia's marriage, Southern Tang was invaded by Later Zhou. The resistance war did not end until spring 958, after Li Jing ceded all prefectures north of the Yangtze River to his powerful northern neighbor. Li Jing also relinquished all imperial trappings, degrading his own title from emperor to king (國主). The national humiliation was soon followed by familial tragedy: later that year Li Hongji poisoned uncle Li Jingsui to death, which was followed by his own death a few months later, allegedly hastened by many encounters with Li Jingsui's vengeful ghost.
Not long after Li Hongji's death in 959, Li Congjia was given the post of royal secretary (尚書令) so that he could familiarize himself of governmental affairs. However, despite being the king's eldest surviving son, a few ministers considered him too dissolute and weak for the crown prince position, including Zhong Mo, who pleaded to have Li Congjia's younger brother Li Congshan chosen instead. Li Jing found Zhong's suggestion offensive and demoted him.
Suffering from poor health, Li Jing decided to transfer all responsibilities to his successor. He named Li Congjia the crown prince in spring 961 to take over in the capital Jinling (金陵; modern Nanjing, Jiangsu) while he retired to the southern city of Hongzhou (洪州; modern Nanchang, Jiangxi). A few months later he died, and Li Congjia officially succeeded the throne, not without a last-second effort by Li Congshan to challenge him. By then Zhong Mo had also died, so Li Congshan asked chancellor Xu You to bring Li Jing's last will to him. Xu refused and confided in Li Congjia of Li Congshan's intentions. Li Congjia — changing his name to Li Yu — did not punish his younger brother other than a slight demotion.
Appeasing the Song Dynasty
A year before Li Yu ascended the throne, Southern Tang's nominal overlord Later Zhou had been replaced by the Song dynasty established by former Later Zhou general Zhao Kuangyin, who had earlier participated in several campaigns against Southern Tang. Knowing the limit of Southern Tang's military strength and trying hard to be subservient to the northern court, Li Yu immediately sent a high official Feng Yanlu with a letter — whose language was of extreme humility — to inform Song of his succession. Things got to a rocky start: during his accession to the throne Li Yu built a golden rooster, a symbol of imperial power, the news of which infuriated Zhao Kuangyin. In the end, the Southern Tang ambassador in the Song capital of Bianliang (汴梁; modern Kaifeng, Henan) had to give the explanation that the golden rooster was actually a "weird bird" to satisfy the Song emperor.
Such an embarrassing relationship would define Li's entire reign, as tribute payments, both regular and irregular, drained the Southern Tang treasury. Essentially Li was ready to fulfill Emperor Taizu of Song's every demand except go to Bianliang himself. In 963, Li Congshan who accompanied a tributary mission was held hostage in Bianliang and had to write letters on behalf of the Song emperor asking his elder brother also join him at the Song court. Li Yu, naturally, did not heed the request.
Successive deaths in the family
Li Yu remained close to his wife Zhou Ehuang — Queen Zhou — so close that he sometimes canceled government meetings to enjoy her performances. The absences continued until a censor (監察御史) spoke out against it.
In around 964, the second of the couple's two sons, a three-year-old still called by his milk name Ruibao (瑞保), died unexpectedly. Li would mourn his son by himself so as not to sadden his wife more than necessary, but Queen Zhou was completely devastated and quickly deteriorated in health. During her illness, Li attended her and did not disrobe for days. When the queen finally succumbed to illness, Li mourned so bitterly until "his bones stuck out and he could stand up only with the aid of a staff." In addition to several grieving poems, he chiseled the roughly 2000 characters of his "Dirge for the Zhaohui Queen Zhou" (昭惠周后誄) — "Zhaohui" being her posthumous name — to her headstone himself. Part of the dirge read (as translated by Daniel Bryant):
Li Yu cheated on his wife while she was dying. During her last days he also engaged in a secret sexual relationship with Queen Zhou the Younger, the queen's younger sister, who was only around 14 at that time. Worst of all, the queen discovered the "affair" which probably hastened her demise and multiplied Li Yu's regret. A few months later, in late 965, disaster stroke again: Queen Dowager Zhong died after several months of attentive care-taking by Li. The subsequent mourning period delayed Li's marriage to the younger Lady Zhou until 968.
Deaths of Lin Renzhao and Pan You
After conquering Jingnan, the Hunan region and Later Shu, the Song Dynasty army set off to invade Southern Han in 971, Southern Tang's southwestern neighbor. Lin Renzhao, the Southern Tang military governor of Zhenhai Command (鎮海軍) centering in Wuchang (in modern Hubei), believed the opportunity golden to attack the Song cities around Yangzhou (in modern Jiangsu) as the main Song army would be a long distance away and already severely fatigued. Li Yu immediately rejected Lin's request: "Stop the nonsense talks, (stop) destroying (our) country!"
What Li was perhaps unaware was a year before, the Song military had gotten hold of an important chart with detailed measurements of Yangtze River crossing points, provided by a Southern Tang defector named Fan Ruoshui. After the conquest of Southern Han, their next step was to eliminate Lin Renzhao. In 974, Emperor Taizu of Song got hold of a Lin portrait through agents working in Southern Tang, and Li Congshan, the hostage kept in Bianliang, was then made to believe that Lin's loyalty was with Song. When Li Yu was told of this, he without a thorough investigation secretly poisoned Lin to death. Chancellor Chen Qiao angrily reacted to Lin's death: "Seeing loyal ministers killed, I don't know where I will die!"
Li Yu also murdered Pan You (潘佑) by poisoning him.
Fall of Southern Tang
Li was an incompetent ruler who spent more time on literature and art, with little regard to the Song dynasty that was eyeing its weaker neighbor. In 971, Houzhu dropped the name of Tang from its Kingdom's name, in a desperate move to please the mighty Emperor Taizu of Song.
Of the many other kingdoms surrounding the Southern Tang, only Wuyue to the east had yet to fall. The Southern Tang's turn came in 974, when, after several refusals to summons to the Song court, on the excuse of illness, Song dynasty armies invaded. After a year long siege of the Southern Tang capital, modern Nanjing, Li Houzhu surrendered in 975. He and his family were taken as captives to the Song capital at present-day Kaifeng. In a later poem, Li wrote about the shame and regret he had on the day he was taken away from Jinling (as translated by Hsiung Ting ):
Death
He was poisoned by the Song emperor Taizong in 978, after he had written a poem that, in a veiled manner, lamented the destruction of his empire and the rape of his second wife Empress Zhou the Younger by the Song emperor. After his death, he was posthumously created the Prince of Wu (吳王).
Writing
Li was interested in cí poetry, which sometimes seems to characterize poetry of the Song Dynasty. However, he is not a Song poet: the Southern Tang is more a successor of Tang and precursor of the Song side that existed during the Tang-Song transition, also known as the Five Dynasties and Ten Kingdoms period. Li Yu represents both a continuation of the Tang poetry tradition, as well as representing the cí poetic style associated with the poetry of Song.
Li Houzhu devoted much of his time to pleasure-making and literature, and this is reflected in his early poems. A second phase of Li's cí poems seems to have been the development of an even sadder style after the death of his wife, in 964. His saddest, poems were composed during the years of his captivity, after he formally abdicated his reign to the Song, in 975. He was created the Marquess of Disobeyed Edicts (違命侯), a token title only. Actually, he was a prisoner, though with the outward accoutrements of a prince. Li's works from this period dwell on his regret for the lost kingdom and the pleasures it had brought him.
He developed the ci by broadening its scope from love to history and philosophy, particularly in his later works. He also introduced the two stanza form, and made use of contrasts between longer lines of nine characters and shorter ones of three and five. Only 45 of his ci poems survive, thirty of which have been verified to be his authentic works, the other of which are possibly composed by other writers. Also, seventeen shi style poems remain to his credit. His story is the subject of Cantonese operas.
Cí poetry
The roughly 40 (some of which incomplete owing to damaged manuscripts) cí poems possibly written by Li Yu are summarized in the table below. The cí as a poetic form follows set patterns or tunes (詞牌).
A few poems have been set to music in modern times, most notably the three songs in Teresa Teng's 1983 album Light Exquisite Feelings. Some of the songs are mentioned below.
Poetry Examples
Poems like these are often invoked in later periods of strife and confusion by literary figures.
Alone Up the Western Tower (獨上西樓)
"Alone Up the Western Tower" was written after his capture. Here the poem is translated by Chan Hong-mo:
This was also rendered into a song by Teresa Teng.
Jiangnan Remembrance (望江南), second stanza
Shi poetry
Li Yu's poems in the form of shi include:
* "Bìng Qǐ Tí Shān Shě Bì" (病起題山舍壁; "Getting up while Ill: Written Upon the Wall of My Mountain Lodge")
* "Bìng Zhōng Gǎn Huái" (病中感懷; "Feelings while Ill")
* "Bìng Zhōng Shū Shì" (病中書事; "Written while Ill")
* "Dào Shī" (悼詩; "Poem of Mourning")
* "Dù Zhōng Jiāng Wàng Shí Chéng Qì Xià" (渡中江望石城泣下; "Gazing at Stone City from Mid-River and Weeping")
* "Gǎn Huái" (感懷; "My Feelings") — 2 poems
* "Jiǔ Yuè Shí Rì Ǒu Shū" (九月十日偶書; "Jotted Down on the Tenth Day of the Ninth Month")
* "Méi Huā" (梅花; "Plum Blossoms") — 2 poems
* "Qiū Yīng" (秋鶯; "Autumn Warbler")
* "Shū Líng Yán Shǒu Jīn" (書靈筵手巾; "Written on the Napkin for a Sacrificial Banquet")
* "Shū Pí Pá Bèi" (書琵琶背; "Written on the Back of a Pipa")
* "Sòng Dèng Wáng Èr Shí Dì Cóng Yì Mù Xuān Chéng" (送鄧王二十弟從益牧宣城; "On Saying Farewell to My Younger Brother Chongyi, the Prince of Deng, Who is Going Away to Govern Xuancheng") — including a long letter
* "Tí jīn lóu zi hòu" (題金樓子後; "Written at the end of the Jinlouzi") — including a preface
* "Wǎn Chí" (輓辭; "Poem of Mourning") — 2 poems
"To the Tune of Liǔ Zhī" mentioned in the cí section may also be classified as a shi.
Prose writing
Li's surviving prose are miscellaneous in character. For example, "Dirge for the Zhaohui Queen Zhou" is rhymed and almost entirely in regular four-character metre, resembling the fu form a millennium before.
Calligraphy
Li Yu's calligraphy style has been dubbed "Golden Inlaid Dagger" (金錯刀) for its perceived force. As one Song Dynasty writer noted: "The large characters are like split bamboo, the small ones like clusters of needles; altogether unlike anything done with a brush!"
Television series
Three independent television series focused on the complex relationships between Li Yu (Li Houzhu), Emperor Taizu of Song (Zhao Kuangyin) and the various women in their lives. They are:
* The Sword and the Song (絕代雙雄), a 1986 Singaporean series starring Li Wenhai as Li Yu.
* Love, Sword, Mountain & River (情劍山河), a 1996 Taiwanese series starring Chin Feng as Li Yu.
* Li Houzhu and Zhao Kuangyin (李後主與趙匡胤), a 2006 Chinese series starring Nicky Wu as Li Yu.
|
WIKI
|
Value arrays
Value arrays — A container structure to maintain an array of generic values
Types and Values
struct GValueArray
Object Hierarchy
GBoxed
╰── GValueArray
Includes
#include <glib-object.h>
Description
The prime purpose of a GValueArray is for it to be used as an object property that holds an array of values. A GValueArray wraps an array of GValue elements in order for it to be used as a boxed type through G_TYPE_VALUE_ARRAY.
GValueArray is deprecated in favour of GArray since GLib 2.32. It is possible to create a GArray that behaves like a GValueArray by using the size of GValue as the element size, and by setting g_value_unset() as the clear function using g_array_set_clear_func(), for instance, the following code:
1
GValueArray *array = g_value_array_new (10);
can be replaced by:
1
2
GArray *array = g_array_sized_new (FALSE, TRUE, sizeof (GValue), 10);
g_array_set_clear_func (array, (GDestroyNotify) g_value_unset);
Functions
g_value_array_get_nth ()
GValue *
g_value_array_get_nth (GValueArray *value_array,
guint index_);
g_value_array_get_nth has been deprecated since version 2.32 and should not be used in newly-written code.
Use g_array_index() instead.
Return a pointer to the value at index_ containd in value_array .
Parameters
value_array
GValueArray to get a value from
index_
index of the value of interest
Returns
pointer to a value at index_ in value_array .
[transfer none]
g_value_array_new ()
GValueArray *
g_value_array_new (guint n_prealloced);
g_value_array_new has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_sized_new() instead.
Allocate and initialize a new GValueArray, optionally preserve space for n_prealloced elements. New arrays always contain 0 elements, regardless of the value of n_prealloced .
Parameters
n_prealloced
number of values to preallocate space for
Returns
a newly allocated GValueArray with 0 values
g_value_array_copy ()
GValueArray *
g_value_array_copy (const GValueArray *value_array);
g_value_array_copy has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_ref() instead.
Construct an exact copy of a GValueArray by duplicating all its contents.
Parameters
value_array
GValueArray to copy
Returns
Newly allocated copy of GValueArray.
[transfer full]
g_value_array_free ()
void
g_value_array_free (GValueArray *value_array);
g_value_array_free has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_unref() instead.
Free a GValueArray including its contents.
[skip]
Parameters
value_array
GValueArray to free
g_value_array_append ()
GValueArray *
g_value_array_append (GValueArray *value_array,
const GValue *value);
g_value_array_append has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_append_val() instead.
Insert a copy of value as last element of value_array . If value is NULL, an uninitialized value is appended.
Parameters
value_array
GValueArray to add an element to
value
GValue to copy into GValueArray, or NULL.
[nullable]
Returns
the GValueArray passed in as value_array .
[transfer none]
g_value_array_prepend ()
GValueArray *
g_value_array_prepend (GValueArray *value_array,
const GValue *value);
g_value_array_prepend has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_prepend_val() instead.
Insert a copy of value as first element of value_array . If value is NULL, an uninitialized value is prepended.
Parameters
value_array
GValueArray to add an element to
value
GValue to copy into GValueArray, or NULL.
[nullable]
Returns
the GValueArray passed in as value_array .
[transfer none]
g_value_array_insert ()
GValueArray *
g_value_array_insert (GValueArray *value_array,
guint index_,
const GValue *value);
g_value_array_insert has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_insert_val() instead.
Insert a copy of value at specified position into value_array . If value is NULL, an uninitialized value is inserted.
Parameters
value_array
GValueArray to add an element to
index_
insertion position, must be <= value_array->;n_values
value
GValue to copy into GValueArray, or NULL.
[nullable]
Returns
the GValueArray passed in as value_array .
[transfer none]
g_value_array_remove ()
GValueArray *
g_value_array_remove (GValueArray *value_array,
guint index_);
g_value_array_remove has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_remove_index() instead.
Remove the value at position index_ from value_array .
Parameters
value_array
GValueArray to remove an element from
index_
position of value to remove, which must be less than value_array->n_values
Returns
the GValueArray passed in as value_array .
[transfer none]
g_value_array_sort ()
GValueArray *
g_value_array_sort (GValueArray *value_array,
GCompareFunc compare_func);
g_value_array_sort has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_sort().
Sort value_array using compare_func to compare the elements according to the semantics of GCompareFunc.
The current implementation uses the same sorting algorithm as standard C qsort() function.
Parameters
value_array
GValueArray to sort
compare_func
function to compare elements.
[scope call]
Returns
the GValueArray passed in as value_array .
[transfer none]
g_value_array_sort_with_data ()
GValueArray *
g_value_array_sort_with_data (GValueArray *value_array,
GCompareDataFunc compare_func,
gpointer user_data);
g_value_array_sort_with_data has been deprecated since version 2.32 and should not be used in newly-written code.
Use GArray and g_array_sort_with_data().
Sort value_array using compare_func to compare the elements according to the semantics of GCompareDataFunc.
The current implementation uses the same sorting algorithm as standard C qsort() function.
[rename-to g_value_array_sort]
Parameters
value_array
GValueArray to sort
compare_func
function to compare elements.
[scope call]
user_data
extra data argument provided for compare_func .
[closure]
Returns
the GValueArray passed in as value_array .
[transfer none]
Types and Values
struct GValueArray
struct GValueArray {
guint n_values;
GValue *values;
};
A GValueArray contains an array of GValue elements.
Members
guint n_values;
number of values contained in the array
GValue *values;
array of values
|
ESSENTIALAI-STEM
|
Achey Breakey Parts: TPMS And Corrosion
Public Domain
It is not seriously in doubt that TPMS sensors are generally a good safety system. It's known that they have prevented many blowouts and potential injuries caused by loss of pressure. They've also saved millions of gallons of gas from mileage-draining under pressured tires.
But boy do they also cause some major headaches for owners and installers alike. Of the many headaches commonly associated with TPMS monitors, clearly, the achiest and breakiest is the valve stems. First-generation monitors especially, are not only showing the effects of age, but of some rather thoughtless design. Because so many of these sensors are a one-piece design, with the metal valve stem built into the sensor, any damage to the relatively cheap valve stem can make the expensive sensor simply useless.
And these metal valve stems do corrode and break far too easily. Valve stems on TPMS monitors can corrode for a number of different reasons. Knowing these reasons and how to prevent them can mean the difference between happy driving and disaster.
Problem: Metal Valve Caps
While the bright and shiny chrome plated or metal valve caps that you see everywhere are often a nice effect compared to dull black plastic caps, when it comes to TPMS stems, they're a clear and present danger. Metal caps can easily cause corrosion on the threads of TPMS stems as well as beginning to corrode themselves. The result is all too often that the cap will rust-weld itself to the stem, leading to outcomes from the cap simply seizing when a technician tries to remove it, to cross threading issues, or even having the stem break off entirely. When the valve stem is a nonremovable part of the TPMS monitor, this goes from being a minor issue to a critical and often expensive problem.
Solution: Rubber Valve Caps
It's simple: Do not ever put metal valve caps on your TPMS valve stems. Black plastic or rubber caps may be dull and boring, but boring can be good. Having your expensive monitors turned to junk by corrosion is excitement you don't need. As Barry Steinberg from Direct Tire told me, “Initially they were putting out a lot of metal caps on these metal valve stems and they were seizing and cracking and breaking. But ever since they've all gone to rubber valve caps we've seen a lot less of that.”
Problem: Brass Valve Cores
Inside every valve stem is a part called the valve core. It's the part that you press down on to let air out of your tires, and it can also be unscrewed and removed with a special tool to let air out of the tires really fast. Most of the rubber snap-in valve stems out there use valve cores made of brass. Because TPMS metal valve stems are usually aluminum, they cannot use brass cores. The reason is that brass will react to the aluminum and cause the core to weld itself to the stem, making it impossible to remove. The absurdity of the situation is clear – an untrained tire tech, or just one who is not paying attention that day, can cause the destruction of a hundred-dollar TPMS sensor by installing the wrong fifty-cent valve core.
Solution: Nickel-Coated Valve Cores
The only type of valve cores that can be used in TPMS sensors are the specialized nickel-coated cores that are specifically designed to go in the valve stems. It's pretty easy to tell the difference, as the brass valve cores are, well, brass-colored, and nickel cores are silver. It's an easy and important check to remove your valve caps after any work has been done and make sure that yours are silver. If they're not, have them replaced as soon as possible. The nickel-coated cores also need to be replaced with new ones every time they are removed, as the coating is thin and can wear off simply from the action of threading and removing them, which will expose the brass under the coating.
Problem: Air, Water, and Salt
The last reason that TPMS valve stems corrode is simply unavoidable. Stems are exposed to the air, they get wet, and especially in winter conditions, they get exposed to road salt and salt water. Corrosion is just a fact of life when it comes to metal parts, and valve stems are exposed every minute of the day. Collet nuts, the parts that screw down over the valve stem to tighten the whole assembly against the valve stem hole are especially vulnerable to the same kind of corrosion that can cause a valve cap or valve core to seize. Horror stories abound of collet nuts seizing, valve stems breaking at the slightest pressure applied by tire techs trying to remove them, and even of stems breaking off while the vehicle is in motion.
Solution: Proper Maintenance
The only solution to environmental corrosion is constant vigilance, mostly in the form of service packs. Service packs are small packets that tire dealers and installers keep with all the tiny parts and widgets that need to be replaced every time your tires are serviced. These packs will include:
• A new nickel-coated valve core.
• A new rubber or plastic valve cap.
• A new set of rubber gaskets to seal the valve hole in the wheel.
• A new collet nut.
Service packs, you may note, therefore cover all of the major reasons for corrosion problems I have already noted, that being the major reason they exist. By replacing each of these parts every time your tires are serviced, you keep corrosion at bay, preventing it from gaining a foothold in the cracks and crevices between all these seemingly insignificant little parts. This is why the service packs are so important, why responsible installers will always replace them, and why you should always resist the temptation to save the small fee that they will have to charge you for doing so.
There is also a much more permanent, if somewhat more expensive way of solving TPMS corrosion problems, which is to replace your first-generation TPMS sensors with second-generation aftermarket sensors. Most aftermarket sensors now use a removable snap-in rubber valve stem that not only completely avoids most corrosion problems, but can be easily and cheaply replaced if it is damaged. This is an especially good option to look at if your sensors are more than 6 years old, as the batteries on TPMS sensors are rated to last about 6-7 years, and cannot be replaced. That's another headache entirely.
|
ESSENTIALAI-STEM
|
Roger Herft
Roger Adrian Herft (born 11 July 1948) is a former bishop in the Anglican Church of Australia. He was the Archbishop of Perth from 2005 to 2017. He was previously the Bishop of Newcastle from 1993 to 2005 and the Bishop of Waikato in New Zealand from 1986.
Herft was removed from Holy Orders in February 2022, after the Episcopal Standards Board of the Anglican Church of Australia determined in December 2021 that Herft had failed to address child sex abuse claims made against priests under his control during his time as Bishop of Newcastle.
Early life and education
Herft was born in Wattegama in what is now Sri Lanka (then the Dominion of Ceylon). He studied at the Royal College in Colombo, later training for the ministry at the Theological College of Sri Lanka in Pilimatalawa. He received Bachelor of Theology and Bachelor of Divinity degrees from the University of Serampore.
Clerical career
After working in parish ministry and prison chaplaincy, he was invited by the Diocese of Waikato in New Zealand to become a parish consultant in 1983. In 1986, Herft was elected Bishop of Waikato, becoming one of the youngest bishops in the Anglican Communion; he was consecrated bishop on 28 October 1986.
Herft was elected Bishop of Newcastle, New South Wales, in 1992 and enthroned at Christ Church Cathedral in May 1993. He was chaplain of the 13th Lambeth Conference in 1998.
In 2004, Herft was elected as the seventh Archbishop of Perth and Metropolitan of the Province of Western Australia and was installed on 11 June 2005, succeeding Peter Carnley.
Herft nominated Kay Goldsworthy as Australia's first female Anglican bishop and consecrated her at St George's Cathedral in Perth on 22 May 2008.
Herft was made a Member of the Order of Australia in 2013 for service to the church, particularly interfaith relations and social justice.
On 11 May 2016, it was announced that he would succeed Jack Nicholls as the next prelate of the Venerable Order of St John. Prior to this he was sub prelate of the order in Western Australia. On 1 September 2016, however, it was announced that Tim Stevens, formerly the Anglican Bishop of Leicester, had been appointed as the prelate.
Royal Commission into Institutional Responses to Child Sexual Abuse
On 21 July 2016, the Australian Broadcasting Corporation (ABC), published an article which stated that "One of the nation's most senior Anglicans, the Archbishop of Perth, Roger Herft, received complaints about a priest involved in a paedophile ring but allegedly failed to formally report him to police." The article also says that "Archbishop Herft wrote that the complaint "left me in an unenviable position" because "Father Peter had my licence [to be a priest] and if he reoffended I would be held liable as I now had prior knowledge of his alleged behaviour". There is no record of Herft reporting the priest to police.
On 12 August 2016, Herft appeared before the Royal Commission into Institutional Responses to Child Sexual Abuse and was questioned about his policy in regard to the reporting and responses to allegations of abuse during his time as Bishop of Newcastle. Herft admitted that there had been no framework for dealing with accusations of child sexual assault during the first half of his tenure in Newcastle. He had written a policy called "Principles and Procedures for Dealing with Accusations of Sexual Harassment" in 1993, but this had not been prepared with child sexual abuse allegations in mind.
A record of a 1998 meeting between Herft and other church officials showed there had been concern about following up abuse allegations. Herft said that allegations would not have been followed up unless there was a formal written complaint. He agreed with the commission that this was "Totally unacceptable" as it left children at risk.
The commission heard evidence that Herft had been informed of allegations against Graeme Lawrence who had been dean of Newcastle Cathedral. Herft reported that he had no recollection of specific allegations against Lawrence, who was later defrocked after having group sex with a teenage boy.
Retirement
On 10 October 2016, Herft wrote a pastoral letter stating that he was standing down as archbishop to "focus my attention on the royal commission's ongoing inquiry into the Diocese of Newcastle". Herft said in the Royal Commission that he had "let down the people of Newcastle" and "let down the survivors in a way that remorse itself is a very poor emotion to express". Former Premier Richard Court, chair of the Perth Diocesan Trustees, said that Herft "enjoyed the full support and respect of the Trustees of the Diocese of Perth". It was also reported that "there was a belief among some of the laity and clergy that [Herft] should have resigned."
On 15 December 2016, the Diocese of Perth announced that Herft would retire on 7 July 2017 and remain on accrued leave until that date. This would be a year earlier than previously anticipated. Herft thanked the royal commission for holding him "personally accountable" during the hearing. He stated that he had developed a "much more realistic view" of the priesthood and hoped first-hand accounts from survivors would lead to widespread change within the Anglican Church.
On 10 January 2017 an article in The Australian stated that in 1996 the Bishop of Ballarat at the time, David Silk, had employed a priest who had transferred from Newcastle where Herft was bishop at the time. Allegations against the priest were reported to the Newcastle diocese in 1996 a few months after he had moved to Ballarat, and again in 1999. Silk said that Herft had not advised him of the allegations.
Removal from Holy Orders
In September 2021, the Episcopal Standards Board of the Anglican Church of Australia conducted a hearing about Herft's fitness to remain in Holy Orders. The Board examined how Herft responded to sex abuse claims made by priests in the Newcastle diocese during his time as bishop (including a priest who was found by the Royal Commission into Institutional Responses to Child Sexual Abuse to be a prolific child sex abuser, another priest who had been charged with 24 child sex offences in 2017, and the former Dean of Newcastle, Graeme Lawrence, who had been convicted of assaulting a 15 year old boy in 1991). Heft did not attend the Board's hearing.
The Board found that “[t]here were relevant protocols to guide, indeed impel, [Herft] to act in material respects, and additionally he had the capacity to call on the organs of the Church for resources, advice and support”, and "there was always the straightforward medium of reporting allegations of serious criminal conduct to the police", but that “[Herft] did not do so when the position of authority he held demanded that of him". The Board determined that Herft had failed to properly address claims made against these priests, that he was unfit to remain in Holy Orders and should be defrocked. Herft was removed from Holy Orders by Philip Freier on 1 February 2022.
Family
Herft is married to Cheryl and they have two adult sons.
|
WIKI
|
450+ experts on 30 subjects ready to help you just now
Starting from 3 hours delivery
Remember! This is just a sample.
You can get your custom paper by one of our expert writers.Get custom essay
121 writers online
Could you imagine being told that you do not qualify for a job solely because you are a woman? Excelling in college and being qualified yet cannot advance in the workforce? Or someone telling you that you have no right to be here because “it’s a man’s job”? These are realities women have faced in the workplace. Women were not allowed to work until 1960. This decade is where the idea of women in the workforce began to transform.
In 1960, there were defined roles in society. Women were housewives, they stayed home to cook, clean, and take care of the children. Men were the breadwinners and supported the family financially. It was an expectation that when then men came home after a long day, there would be dinner waiting on the table and the house would be spotless. This was a degrading role to women. It was also not an easy task as housework and childcare averaged 55 hours a week. During World War 2, women had to take over the jobs of men who went to war. Women entering the workforce during this time prompted the feminist movement. Women started to realize that they were more than a slave to their husband and in fact, an equal member of society. Although women could hold jobs in place of men, sexism was rampant. The structure of society prevented the majority of women from being able to reach their potential. For the few women who worked outside the home, commonly held positions were teachers, nurses, or secretaries. Occupations were clearly polarized as a “man’s job” or a “woman’s job”, with career options for women still leaning toward “caretaking” type jobs. Only three percent of lawyers and less than one percent of engineers in the U.S. were women. NASA began a change to this ideal when it opened its doors to mathematicians regardless of sex or race. Women like Katherine Johnson, Mary Jackson, and Dorothy Vaughan proved that women were just as intelligent as men and have equal potential. Finally, after women fight for three years to be recognized as equals, the first equal pay act was signed in 1963. This act forbid employers to pay different wages to men and women for doing the same job. Equality was slowly moving forward but the fight continued for many years.
In 1970, equal pay legislation was extended in order to close loopholes. Only 11 percent of women in 1970 had a college degree and in 1974, one in ten lawyers were women. Since it was the woman’s job to stay at home and raise the family, they could not have a career. Pregnancy and taking care of young children increases the difficulty of maintaining a job for a long period of time. This idea changed in 1978 when the Pregnancy Discrimination Act banned employment discrimination against pregnant women. This act made it possible for a woman to have a family and not lose their jobs because of pregnancy. Although there were more laws set to try to require and enforce equality in the workplace, there was still a lot of discrimination. For example, sexual discrimination was, and still is, a major form of discrimination in the workplace. With only 40 percent of women working, men controlled the workforce and felt power over women. When women are sexually harassed or discriminated against at work, they may feel devalued, suffer from stress and anxiety, and lose their motivation to work hard.
The feminist movement had tapered slightly after these laws were put into place, until the hit film “9 to 5” was released staring Dolly Parton in 1980. The movie used “humor to depict the systemic discrimination against women in the workplace” (Bravo, 2019). “9 to 5” brought attention to what was happening to women at work. Women were never looked at as being smart enough to have the position they earned, instead people wondered “why would they receive that job?”. This perspective was laid out in the movie. As Doralee states in the film, “So that’s why everyone around here treats me like some dime-store floozy. They all think I’m screwing the boss. And you just love it, don’t you? It gives you some kind of cheap thrill like knocking over pencils and picking up papers. I’ve put up with all of your pinching, poking, staring and chasing me around the desk because I need this job.” (Higgins, 1980) This brought to attention that premise that women earned their jobs and should not be treated any less than men. This also brought attention to the sexual harassment that was happening in the workplace. People would assume that a woman “slept her way to the top” or was given a job because of their appearance. The move “9 to 5” built momentum for the rising working women’s movement. This occurred during the same decade as the baby boomer generation. As the remainder of the baby boomers entered the work force, the women’s labor force continued to display impressive growth.
In the 1990s, equality laws continued to be passed. The Family Medical Leave Act supplied job protected leave to employees who needed time off to care for their families. This provided security to women. They can have a family and take care of their loved ones while knowing they can come back to a job. Women made up about 45 percent of the labor force and there were still jobs considered a “man’s job” and a “women’s job” (United States Bureau of Labor Statistics, 2007). With these stereotypes still perpetuating, the American Association of University Women argued that “Schools were more focused on educating boys than girls; Materials utilized in schools were more male-oriented; and girls were discouraged from taking advanced classes that would lead to significant economic mobility”. This would provide some explanation as to why women were still not breaking into male dominated professions. Girls were often led to believe that they couldn’t enter certain fields solely due to their gender. This provoked attention and directed congress to adopt the Gender Equity in Education Act in 1994 to train teachers in gender equity. It promoted math and science learning by girls, counseling to pregnant teens, and education to prevent sexual harassment. After this, woman began to integrate into engineering and medical careers. Even with further acceptance, the wage gap became the new problem. In 1995, women were receiving an average pay of $36,300 while men made and average of $47,100. Issues regarding sexual harassment were still prevalent during this decade. “De Coster, Estes, and Mueller (1999) find that females with greater tenure, independent of age, are more likely to view sexual harassment as a problem for them at work, concluding that the practice is used instrumentally against powerful females who encroach on male territory.”
In the 2000s, women were beginning to be viewed more equally, but they were still treated with disrespect. Imagine having to work twice as hard as everyone because you are a woman. Women must fight this gender battle every day. Although sexual discrimination occurs often, women have been able to strengthen their position in the labor force by gains in labor force participation. Most of this is with the help of Generation Z. Generation Z is known as the “blurred gender roles” generation. When this group takes over the workforce, sexism is expected to diminish. Growth of women in the workforce stagnated and women made up a total of 47 percent of the labor force in 2000. But the wage gap remains the main issue. In 2000, women earned an average of $41,600 compared to the men’s $57,509 (Parker and Geiger, 2018). For the same job, why do men make so much more than women? The job is given to a person for their skill set; pay should not be determined by gender.
Today, the wage gap has decreased slightly. In 2018, women make 82 cents for every dollar earned by men. This is a gender wage gap of 18 percent. If women are accounting for at least half of the household income while making 18 percent less than their male partners, how much more time does a woman have to put in, in order to make the same amount of money as men? Solely because of gender. “Today, 31% of women who are married to or cohabiting with a male partner contribute at least half of the couple’s total earnings, up from just 13% in 1980”. If change continues at the same slow pace, it will take 40 years (until 2059) for women to reach full pay parity. Sexism in general has begun to decline. There is not as much sexual harassment and there is more recognition to women’s accomplishments. With more women in the workforce at management level positions, men do not feel they have as much power over women as they did in the past.
From 1960 to today, women have made tremendous strides by moving into occupations that were previously dominated exclusively by men. Although the wage gap is still an issue, strong employment and equality laws have strengthened women’s positions in the workforce. Women need to continue proving that they are just as capable as men and continue to advocate for equality protection legislation.
We provide you with original essay samples, perfect formatting and styling
To export a reference to this article please select a referencing style below:
Where do you want us to send this sample?
Be careful. This essay is not unique
This essay was donated by a student and is likely to have been used and submitted before
Download this Sample
Free samples may contain mistakes and not unique parts
Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.
Please check your inbox.
We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!
Are you interested in getting a customized paper?Check it out!
|
FINEWEB-EDU
|
Page:United States Statutes at Large Volume 96 Part 2.djvu/1307
CONCURRENT RESOLUTIONS—SEPT. 30, 1982
96 STAT. 2669
Whereas in times of trial the leaders of our Nation often have gathered there to pray and seek God's guidance; Whereas this majestic monument to our Nation's faith in a Divine Creator dominates the physical and spiritual horizons of the city of Washington; Whereas the Cathedral is an architectural and artistic masterpiece that will lift up the human heart for centuries to come; Whereas the nave of this magnificent cathedral was dedicated in the year of America's two hundredth anniversary "for the reconciliation of the peoples of the earth"; Whereas the Cathedral inspires over five hundred thousand American visitors each year; and Whereas September 29, 1982, marks the seventy-fifth anniversary of this great Cathedral: Now, therefore, be it Resolved by the Senate (the House of Representatives concurring). That the Congress of the United States recognizes and pays tribute to the Washington Cathedral on its seventy-fifth anniversary and to all the men and women whose especial labors have contributed to the building of this great house of worship. SEC. 2. The Secretary of the Senate is directed to transmit a copy of this resolution to the Canon of the Cathedral Church of Saint Peter and Saint Paul.
i
Agreed to September 29, 1982. AVIATION INSURANCE—PREPARATION O F DUPLICATE CONFERENCE P A P E R S ON H.R. 5930
s^pt. 29. 1982 [H. Con. Res. 414]
Resolved by the House of Representatives (the Senate concurring). That the Secretary of the Senate and the Clerk of the House of Representatives are authorized and directed to prepare and sign ofGcial duplicates of the conference papers on the bill (H.R. 5930) to Ante, p. 1453. extend the aviation insurance program for five years. Agreed to September 29, 1982. PEARL STREET CENTENNIAL D A Y COMMEMORATION
_,
SPt- 30, 1982 [S. Con. Res. 117]
Whereas on September 4, 1882, Thomas Alva Edison's historic Pearl Street powerplant began supplying electricity in New York City; and Whereas this event signaled the birth of the electric power industry in this country and abroad; and Whereas the Pearl Street powerplant became the model for every central electric generating station in the world today; and Whereas the Pearl Street station, and the many central stations built thereafter, made possible a higher standard of living for all the world; and Whereas September 4, 1982, marks the one hundredth anniversary of the Pearl Street station: Now, therefore, be it
�
|
WIKI
|
Zuckerberg group proposes changes to Obama ‘startup visas’ | TheHill
The immigration advocacy group associated with Mark Zukerberg is offering up recommendations for a Department of Homeland Security (DHS) proposal that would allow foreign entrepreneurs to come to the United States. The group, FWD.us, submitted the revisions jointly with a coalition of 23 other groups, tech founders and tech executives. The submission was made as part of the of the the DHS’s 45-day period for comment on their proposed International Entrepreneur Rule or “startup visa.” The rule would allow the DHS to evaluate business owners interested coming to the U.S. on a case-by-case basis, pending certain criteria. FWD.us’s recommendations call for changes to the qualifying criteria to make it easier for foreign entrepreneurs to come to the United States. In their comment to the DHS, FWD.us outlined six eligibility revisions to the rule: reducing the minimum funding of a business in question from $345,000 to $250,000 from U.S. investors; increasing the visa term from a potential of five years to eight; broadening the definition of a U.S. investor; reducing the amount of jobs a startup must create; improving paths to permanent residence; and providing clearer guidelines for leaner, bootstrapped companies who don’t have significant investors. Gary Shapiro, president and CEO Consumer Technology Association (CTA) spoke favorably of the rule. “While we wait for Congress to take action on immigration reform, we welcome the White House's new 'startup visa' proposal to attract and retain the world's best and brightest talent,” Shapiro said. His organization is one of the 23 entities who supported FWD.us’s comments. FWD.us, who is affiliated with high-profile individuals in tech like Bill Gates and Marissa Mayer, has been an outspoken advocate for immigration reform and revisions to the H-1B visa. The White House has supported the DHS’s proposal, which does not require congressional approval and sprang from an executive action that President Obama took in 2014. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
|
NEWS-MULTISOURCE
|
The Medieval Countryside
Medieval farming families lived in longhouses; stone built rectangular houses with turf or thatched roofs. In the winter months they shared their houses with their farm animals. By the twelfth century the standard type of settlement in rural Cornwall consisted of small hamlets formed by several of these longhouses arranged around a communal yard or ‘townplace’.
Medieval hamlets were surrounded by extensive fields which were divided into long narrow strips. The layout of medieval hamlets and their fields is most clearly seen on Bodmin Moor, where some of the settlements were abandoned after the catastrophic plagues of the fourteenth century. In lowland areas most farms remained in use and the farm buildings we see today are on the site of medieval hamlets. At a later date the characteristic strip fields were enclosed by hedges but their imprint can often still be seen in today’s field pattern.
As the population grew and the economy became more diversified, with commerce and specialisation, so larger settlements developed. By the fourteenth century Cornwall was served by a network of small towns. Some grew up around early Christian centres, some developed as coastal or riverside trading ports, and others were established along major roads or at the crossing points of rivers.
The patchwork of small fields typical of the Cornish countryside follows the layout of the medieval field pattern; many of the farms dispersed throughout today’s landscape are on the site of medieval farms; the majority of lanes connecting these farms, and roads along which small towns have developed are also likely to be at least medieval in origin. We can begin to see that the blueprint for much of the countryside we live in was laid out in the medieval period.
The longhouse is a standard house type in Cornwall and the South West and is part of a wider tradition throughout Britain. The houses are stone built and most in Cornwall date from the twelfth to fifteenth centuries, although some are earlier than this.
The main characteristic of the medieval longhouse is that it provided under one roof both the living quarters for the household and room for the wintering of cattle. A cross-passage from a single entrance running across the house provided access to both rooms. The cowhouses or ‘shippons’ had mangers of wood or stone slabs built against the walls and a drain running down the centre of the floor. The living room acted as kitchen, dining room and bedroom. It was open to the rafters and contained a central hearth and fittings for benches and beds against the walls. Narrow slits served as windows.
Longhouse hamlets were the characteristic settlement type throughout medieval Cornwall. How these hamlets were organised can best be seen on Bodmin Moor where they often survive in their entirety. As the population expanded between the eleventh and fourteenth centuries so the pressure on available land increased. Settlements were established in parts of the moor which had been uninhabited since the Bronze Age. More than thirty of these settlements are now deserted; the process of desertion began in the fourteenth century as a result of outbreaks of plague – the Black Death. With the drastic reduction in population, holdings on better farming land in the nearby lowlands became available at the expense of some moorland settlements.
Most settlements are hamlets containing from two to six farmsteads, clustered together around a small open area or ‘townplace’ – a shared farmyard. Each farmstead comprises a main farmhouse and one or two smaller outbuildings serving as barns and animal houses. The buildings are usually laid out with their long axis running downslope to help drainage.
Survey of the deserted settlements on Bodmin Moor, made from aerial photographs and in the field, provides much information not only about the layout of the individual hamlets but also how they fitted into the landscape.
At Carwether, St Breward, for example, the hamlet covers about one hectare and consists of three longhouses, several ancillary buildings and some paddocks or garden plots. The buildings are arranged randomly along the valley side. Traces of ridge and furrow cultivation can be seen in the foreground and the settlement is surrounded by an extensive strip field system.
Medieval farms and hamlets had fields associated with them which included large areas under crop. Cultivation ridges, known as ridge and furrow, can be seen in many of the fields. The ridges, which are usually sinuous and irregular, provided raised seed beds in the thin soil and enhanced drainage. They were probably made by spade digging in rocky ground and by cattle-drawn plough in better soil.
The fields belonging to a medieval farm would often be enclosed by one or more long curving boundaries. Part of the enclosed area was cultivated and part used as pasture. Much of the arable land was subdivided into ‘strip fields’ with each strip defined by a low stony bank. Each farmstead within a hamlet had its own share of strips scattered through the fields.
Systems of crop rotation – ley husbandry – were employed, involving two to three years of arable cultivation (mainly of oats and rye), followed by four to nine years of grass. The turf which developed over this phase of the rotation would be sliced off by hand, then dried and burnt. The ashes would be mixed with manure and other dressings before being dug back in to replenish the soil. This technique is known as ‘beat burning’.
The medieval settlements on the fringes of Bodmin Moor were not abandoned and their field systems have remained in use. The form of the boundaries may have changed through time, with some added or removed, but today’s hedges very often fossilise the layout of the former strip fields.
A case in point is Fernacre in St Breward, where the present-day fields are clearly fossilising the pattern of former strip fields by the continued use of some of the strip boundaries. In the distance towards the top left of the photo are the fragmentary remains of some original strips.
Strip fields are found not just on Bodmin Moor, but throughout all upland areas of Cornwall. Some strips are thought to result from outfield cultivation. Outfield cultivation was practised in parts of Britain with large areas of poor land. It involved the temporary cultivation of land normally used as pasture. Documents show that in Cornwall outfield areas were only occasionally cultivated – maybe only every fifty years or so, when demand for produce was high or perhaps when prices were particularly favourable.
Lowland FieldsFew deserted longhouse settlements survive in lowland areas; here most have been superseded by later buildings. On the other hand the extent of the lowland farming landscape in the medieval period is shown by the widespread occurrence of former strip fields which were enclosed at a later date in a similar way to those at Fernacre. The greater part of the farmed landscape of Cornwall appears to have been divided into strip-fields during the medieval period. Documents show that strip-fields began to be enclosed from the thirteenth century onwards. The enclosure of these strips often leaves distinctive ‘markers’ behind in surviving field boundaries and field patterns, such as so-called ‘reversed-j’ or ‘reversed-s’ curves, and ‘dog-legs’.
Medieval TownsHistorical documents and records allow us a glimpse of social life in medieval Cornwall. Beyond their own family circle medieval farmers would come into daily contact with neighbours from their own hamlet, and frequent contact with families from nearby hamlets. Church every Sunday would be a chance to meet people from the wider parish. Trips to the nearest market towns would provide contact with farming families from a wider area, as well as traders and craftsmen and people from other walks of life. Like the rest of Britain medieval Cornwall was overwhelmingly rural in character, but by the fourteenth century was well served by a network of towns and markets. Towns in Cornwall were small but there were many of them. A number of factors define medieval settlements as towns or boroughs; their relatively large population, the ordered arrangement of houses along one or more streets, the craft specialisation of their inhabitants, and by the granting of the right to hold markets. Charters confirming borough status are common from the end of the twelfth century. Many of the towns retained rural characteristics, such as the strip fields that surrounded them.
The Origin Of Towns
Five markets are recorded in the Domesday Book; Launceston, Liskeard, Bodmin, St Germans and Marazion. Helston can also be regarded as a borough at this time. All except Liskeard were important religious centres and it is likely that religious communities were a focus for early medieval settlement. This is because the major religious sites served an administrative function and there was a need to support the non-agricultural religious communities with food and materials. Other centres, such as the early medieval lann sites at St Buryan, Probus, Crantock and elsewhere, may also have acted as markets in an unofficial capacity but were not recorded in the Domesday Book.
By the time of the Domesday Book in 1086, the market at Launceston had been moved to the castle from its former site at St Stephen by Launceston, where it had been owned by the church. Similarly the Norman lord, Count Robert, established a new market at Trematon castle, thereby undermining the church-owned market at St Germans. This was all part of the Norman lords’ drive to secure the valuable revenues which
were generated by the towns.
The Development Of Towns
From the twelfth century onwards an increasing number of markets and towns are recorded in documents. All of the new towns which had developed by the end of the twelfth century were coastal or inland ports, and trade was an obvious factor in their location. During the thirteenth and fourteenth centuries many new towns were established as fishing ports. Cornish trade included the export of tin, fish, slate and cloth, and the import from Brittany, Ireland, France and Spain of salt, linen, canvas, wine and fruit. After the twelfth century the increase in number of towns was a result of economic growth and population expansion.
As well as trading and fishing ports, towns were developed inland; these grew up along major roads and the crossing points of rivers. Some towns also had important administrative functions; for instance the County Jail was at Launceston, and Helston, Truro, Liskeard and Lostwithiel were Stannary towns.
Each Stannary town contained a Coinagehall for the twice yearly assaying (testing for purity and taxation) of tin. At Lostwithiel the Coinagehall formed part of the ‘Duchy Palace’, a large administration complex which at the end of the thirteenth century was the centre from which the Earldom estates were managed and contained the county court.
An aerial view of the town of Helston shows a fine example of a medieval town layout. The street plan can clearly be seen; there is a single main street running from left to right with two side roads. The streets are flanked by burgage plots, long narrow plots of land running at right angles from the street frontage.
|
FINEWEB-EDU
|
Francona
Francona is an Italian surname. Notable people with the surname include:
* Rick Francona (born 1951), American author, commentator, media military analyst and retired U.S. Air Force officer, cousin of Terry Francona
* Terry Francona (born 1959), American Major League Baseball manager
* Tito Francona (1933–2018), American Major League Baseball player, father of Terry Francona
|
WIKI
|
What is a progressive JPEG?
Reading Time: 2 minutesThe JPEG image format is one of the most commonly used image formats on the web. The format is most often used for colorful, complex images such as photographs. The JPEG specification includes a range of valid file extensions, however the most common are .jpg and .jpeg. No matter the extension used all JPEG images will be treated more or less the same. Although not all JPEG images are created equally. In the image formats specification there exists a lesser known setting. This setting, called Progressive Mode, can drastically improve the experience using JPEGs on the web.
Normal JPEG vs Progressive JPEG
The single biggest defining factor of an image format is generally compression – the methods vary widely. In fact it’s what makes certain formats better suited than others depending on how the image is used. Even within the JPEG format you can get wildly varying results based on export settings used. In most image programs the type of JPEG created when you save would be considered “Baseline mode”. To be brief, the best way to imagine baseline mode is that the image starts at the top and is interpreted line by line. Moving down the image each pixel line at a time while it compresses and/or displays the image. In contrast, to this, a progressive JPEG will actually show the entire image right away. The trade-off here being that it only loads some of the image data at a time. This means the image will load in at full size looking pixelated and will become more clear as it loads.
See it in action
Some times the best way to understand something is to see it in action. So that’s exactly what we’re gonna here, we’ll have the same exact image saved as both types of JPEG to compare. So we start by grabbing a high quality image to test with; in our case we’re gonna use a picture from Pexels of some kitties sleeping. Since this is such a high resolution image we’ll resize it down a bit before our test, so we resize it by about half. Now that it’s resized we’ll export two versions of the image, one in baseline and one with progressive. (Both images will use the exact same settings other than this one option and we’re using GIMP to create the images.)
Baseline JPEG
Progressive JPEG
So even with these images being rather large it’s sometimes hard to see the difference in their loading process. Included under each image is a ‘timeline’ view of how the image loads in over time. Keep in mind that the timeline view provided is very dramatized to illustrate the idea. If you were to load the page without any local cache you might actually see this behavior as images load!
Author Bio
About the Author: Dan Pock
Dan Pock does technical support at Liquid Web with a background in System Administration, Public Relations, and Customer Service.
His favorite things include his cats, Oscar Boots, and Dash Nougat; experimenting with PHP; and making up recipes (or at least attempting to). You can find his coding hijinks on GitHub, where he shares most of his projects and open source work.
Refer a friend and get hosting credit!
|
ESSENTIALAI-STEM
|
Pallante
Pallante is a surname. Notable people with the surname include:
* Aladdin Pallante (1912–1970), American actor and musician
* Andre Pallante (born 1998), American baseball player
* Maria Pallante (born 1964), American attorney
* Pablo Pallante (born 1979), Uruguayan footballer
|
WIKI
|
FFCV Loader
fastxtend’s fastai+FFCV Integrated DataLoader
fastxtend’s Loader adds fastai features to FFCV’s Loader, including one_batch, show_batch, show_results, and support for GPU batch transforms, to name a few.
source
Loader
Loader (fname:str|Path, batch_size:int, num_workers:int=-1,
os_cache:bool=True, order:ORDER_TYPE=<OrderOption.SEQUENTIAL: 1>,
distributed:bool=False, seed:int|None=None,
indices:Sequence[int]|None=None,
pipelines:Mapping[str,Sequence[Operation|nn.Module]]={},
custom_fields:Mapping[str,Field]={}, drop_last:bool|None=None,
batches_ahead:int=2, recompile:bool=False,
device:str|int|torch.device|None=None, async_tfms:bool=False,
n_inp:int|None=None, split_idx:int|None=None, do_setup:bool=True,
**kwargs)
FFCV Loader with fastai Transformed DataLoader TfmdDL batch transforms
Type Default Details
fname str | Path Path to the location of the dataset (FFCV beton format)
batch_size int Batch size
num_workers int -1 Number of CPU cores to use in parallel (default: All available up to 16)
os_cache bool True Leverage the OS for caching. Beneficial when there is enough memory to cache the dataset
order ORDER_TYPE OrderOption.SEQUENTIAL Dataset traversal order, one of: SEQEUNTIAL, RANDOM, QUASI_RANDOM
distributed bool False Emulates the behavior of PyTorch’s DistributedSampler for distributed training
seed int | None None Random seed for batch ordering
indices Sequence[int] | None None Subset dataset by returning only these indices
pipelines Mapping[str, Sequence[Operation | nn.Module]] {} Dictionary defining for each field the sequence of Decoders and transforms to apply
custom_fields Mapping[str, Field] {} Dictonary informing Loader of the types associated to fields that are using a custom type
drop_last bool | None None Drop non-full batch in each epoch. Defaults to True if order is SEQEUNTIAL
batches_ahead int 2 Number of batches prepared in advance; balances latency and memory
recompile bool False Recompile at every epoch. Required if FFCV augmentations change during training
device str | int | torch.device | None None Device to place batch. Defaults to fastai’s default_device
async_tfms bool False Asynchronously run batch_tfms before batch is drawn.
n_inp int | None None Number of inputs to the model. Defaults to pipelines length minus 1
split_idx int | None None Apply batch transform(s) to training (0) or validation (1) set. Defaults to valid if order is SEQEUNTIAL
do_setup bool True Run setup() for batch transform(s)
kwargs
Important Loader arguments:
• order: Controls how much memory is used for dataset caching and whether the dataset is randomly shuffled. Can be one of RANDOM, QUASI_RANDOM, or SEQUENTIAL. See the note below for more details. Defaults to SEQUENTIAL, which is unrandomized.
• os_cache: By default, FFCV will attempt to cache the entire dataset into RAM using the operating system’s caching. This can be changed by setting os_cache=False or setting the enviroment variable ‘FFCV_DEFAULT_CACHE_PROCESS’ to “True” or “1”. If os_cache=False then order must be set to QUASI_RANDOM for the training Loader.
• num_workers: If not set, will use all CPU cores up to 16 by default.
• batches_ahead: Controls the number of batches ahead the Loader works. Increasing uses more RAM, both CPU and GPU. Defaults to 2.
• n_inp: Controls which inputs to pass to the model. By default, set to number of pipelines minus 1.
• drop_last: Whether to drop the last partial batch. By default, will set to True if order is RANDOM or QUASI_RANDOM, False if SEQUENTIAL.
• device: The device to place the processed batches of data on. Defaults to fastai.torch_core.default_device if not set.
• async_tfms: Asynchronously apply batch_tfms before the batch is drawn. Can accelerate training if GPU compute isn’t fully saturated (95% or less) or if only using IntToFloatTensor and Normalize.
• split_idx: This tells the fastai batch transforms what dataset they are operating on. By default will use 0 (train) if order is RANDOM or QUASI_RANDOM, 1 (valid) if SEQUENTIAL.
• distributed: For distributed training on multiple GPUs. Emulates the behavior of PyTorch’s DistributedSampler. QUASI_RANDOM is unavailable with distributed training.
Note: Order Memory Usage
Each order option requires differing amounts of system memory.
• RANDOM caches the entire dataset in memory for fast random sampling. RANDOM uses the most memory.
• QUASI_RANDOM caches a subset of the dataset at a time in memory and randomly samples from the subset. Use when the entire dataset cannot fit into memory.
• SEQUENTIAL requires least memory. It loads a few samples ahead of time. As the name suggests, it is not random, and primarly is for validation.
Asynchronous batch transforms can accelerate training by decreasing the draw time at the expense of slightly longer batch step. If the GPU isn’t fully saturated, usually 95% or less compute use, this will be a net gain in training performance. async_tfms=True pairs well with ProgressiveResize, as the GPU is almost never saturated when training on smaller then full sized images. When near or fully saturated, asynchronous batch transforms usually result a wash in training time.
source
Loader.one_batch
Loader.one_batch (batches_ahead:bool=False)
Return one processed batch of input(s) and target(s), optionally loading batches_ahead
source
DataLoaderMixin.show_batch
DataLoaderMixin.show_batch (b:Optional[Tuple[torch.Tensor,...]]=None,
max_n:int=9, ctxs=None, show:bool=True,
unique:bool=False, **kwargs)
Show max_n input(s) and target(s) from the batch.
Type Default Details
b Tuple[Tensor, …] | None None Batch to show. If None calls one_batch
max_n int 9 Maximum number of items to show
ctxs NoneType None List of ctx objects to show data. Could be matplotlib axis, DataFrame etc
show bool True If False, return decoded batch instead of showing
unique bool False Whether to show only one
kwargs
source
DataLoaderMixin.show_results
DataLoaderMixin.show_results (b, out, max_n:int=9, ctxs=None,
show:bool=True, **kwargs)
Show max_n results with input(s), target(s) and prediction(s).
Type Default Details
b Batch to show results for
out Predicted output from model for the batch
max_n int 9 Maximum number of items to show
ctxs NoneType None List of ctx objects to show data. Could be matplotlib axis, DataFrame etc
show bool True If False, return decoded batch instead of showing
kwargs
source
DataLoaderMixin.to
DataLoaderMixin.to (device:Union[int,str,torch.device])
Sets self.device=device.
source
DataLoaderMixin.n_inp
DataLoaderMixin.n_inp ()
Number of elements in a batch for model input
source
DataLoaderMixin.decode
DataLoaderMixin.decode (b:Tuple[torch.Tensor,...])
Decode batch b
source
DataLoaderMixin.decode_batch
DataLoaderMixin.decode_batch (b:Tuple[torch.Tensor,...], max_n:int=9)
Decode up to max_n input(s) from batch b
|
ESSENTIALAI-STEM
|
Newborn with fevers and tremors: What's the diagnosis?
Article
His mother’s past medical history is significant for preeclampsia, previous opiate, and cocaine abuse, and current tobacco use, and she was incarcerated during the pregnancy. What's the diagnosis?
The case
A 40-and-2/7 week gestational age boy was born to a 30-year-old G4P0121 mother via vaginal delivery. The mother’s past medical history is significant for preeclampsia, previous opiate and cocaine abuse, and current tobacco use. Social history is significant as mother was incarcerated during this pregnancy. The mother reports being drug-free throughout this pregnancy despite prior opiate and cocaine use, and her urine drug screen on admission was negative. She received morphine on the maternity ward for pain. In the newborn nursery, the infant showed signs of irritability, high tone, and tremors on day of life 1, at which point he became febrile to 100.4 °F. Upon further inquiry, the mother admitted to cigarette smoking daily in pregnancy, and now admits to daily vaping, as much as 2 vaporized pods daily. The patient was transferred to the neonatal intensive care unit (NICU) for further evaluation.
Physical examination
The physical examination revealed a newborn who was alert, irritable, and difficult to console. He was tachycardic and tachypneic with lungs clear to auscultation bilaterally. His abdomen was soft with active bowel sounds. On neurologic exam, he had increased tone with tremors.
Differential diagnosis
Given the patient’s age, physical exam, and maternal history, a drug withdrawal syndrome was the leading diagnosis. Table 1 shows the differential diagnosis for a newborn with fever and tremors which includes infectious, metabolic, and neurovascular etiologies.
Laboratory studies
A metabolic panel revealed sodium 143 mmol/L, potassium 4.4 mmol/L, chloride 110 mmol/L, CO2 18 mmol/L, BUN 14 mg/dL, creatinine 1.42 mg/ dL, and glucose 75 mg/dL. Urine drug screen was positive for opiates (after maternal morphine was given). Meconium drug screen was negative. C- reactive protein 0.02 mg/dL and blood culture showed no growth for 5 days. Urine nicotine level was less than 2 ng/mL (ref: 2 ng/mL) and urine 3-OH cotinine level was 1399 ng/dL (ref: < 50 ng/dL).
Hospital course
In the NICU, the patient underwent a septic work-up and evaluation for drug exposure. He was started on ampicillin and gentamicin for a 48-hour sepsis rule-out. Because maternal cocaine use is associated with neonatal cerebral infarction, a CT of the head was performed and was unremarkable. A lumbar puncture was attempt- ed but was unsuccessful. The patient was treated with supportive care, including ad lib breast and bottle feedings, swaddling, and a low stimulation environment and improved. Anticonvulsant medications (phenobarbital) were considered, but not needed.
Diagnosis
Nicotine can cross the placenta and cause a significant withdrawal syndrome in newborns. Nicotine metabolite levels, particularly 3-OH cotinine, can be measured in the urine and may be the only positive lab result in a withdrawing infant. In our patient, the urine 3-OH cotinine level of 1399 ng/ dL (ref: < 50 ng/dL) is 28 times the upper limit of normal. All other lab work/ imaging were within normal limits.
Discussion
Vaping, or electronic cigarette use, is a popular mode of nicotine consumption among young adults. Many vaping-related illnesses have been described in the medical literature.1-3 Vaping can affect more than just the individuals who participate. In this case report, we describe the clinical course of a newborn exposed to a significant amount of nicotine in utero secondary to maternal vaping. Because of the popularity of vaping among young adults, it is likely that clinicians will see an emergence of vaping-related complications in both the young adults who vape, and their children.
Differential diagnoses were considered and systemically ruled out. Neonatal abstinence syndrome from opiates is a common etiology for neonatal drug withdrawal symptoms; this was ruled out with the negative maternal urine drug screen and negative newborn meconium drug screen. Neonatal sepsis remains high on the index of suspicion for all newborns with fever. For this reason, the patient was started on empiric antibiotic therapy for 48 hours; however sepsis secondary to bacteremia was ruled out when blood cultures were no growth for 5 days. Hypoglycemia is a common cause of tremors in a newborn; this was ruled out with normal glucose levels. Those who consume nicotine may abuse other drugs simultaneously. The use of maternal cocaine during pregnancy is associated with neonatal cerebral infarction.4 This was on the differential diagnosis for our patient and was ruled out with a normal head CT. In the presence of an elevated urine 3-OH cotinine level and negative work-up for other causes, our patient was given a diagnosis of neonatal nicotine withdrawal.
Nicotine is an addictive substance that is small enough to cross the placenta.5 In the brain, nicotine binds to nicotinic acetylcholine receptors (nAChRs), which are highly expressed in dopaminergic and GABAergic neurons in the ventral tegmental area and the nucleus accumbens.6 Mouse models of nicotine withdrawal have demonstrated that the nAChRs in the medial habenula of the diencephalon and its projection to the interpeduncular nucleus are particularly important mediators of nicotine withdrawal symptoms.7 Multiple organs in the fetus are adversely affected by nicotine exposure. This may manifest as orofacial defects, growth restriction, preterm birth, stillbirth, sudden infant death syndrome, or neonatal withdrawal symptoms.8 In the newborn, withdrawal from nicotine can present in a similar way to opiate withdrawal including irritability, high tone and tremors. Both opiate and nicotine withdrawal will result in high Neonatal Abstinence Scoring System/Finnegan Scores, making the 2 difficult to distinguish. The mother in our study consumed 2 vaporized pods per day, roughly equivalent to 2 packs of tobacco cigarettes per day. The patient’s urine metabolite result of 1399 mg/dL represents a value 28 times the upper limit of normal. This value correlated with the severity of our patient’s withdrawal syndrome.
Among teenagers, e-cigarette use has more than doubled between 2017 and 2019.9 A 2018 survey10 showed 3.6 million middle and high school students had used an e-cigarette in the past 30 days. Nicotine is the most commonly abused substance during pregnancy. Given the popularity of vaping, physicians will encounter more cases of nicotine-related complications than in recent decades. In the newborn nursery or NICU, this may manifest as neonatal nicotine withdrawal.
Providers must maintain a high index of suspicion when evaluating newborns with signs of withdrawal, especially when initial testing for opiates is negative. Meconium drug screening identifies substances that can elicit newborn withdrawal symptoms. Including nicotine and/or its metabolites in the meconium drug screen helps discern the level of exposure and assists in the management of withdrawal symptoms. Here, a urine level of 3-OH cotinine was measured. Although not a routine newborn screen for drug withdrawal, measuring urine 3-OH cotinine was invaluable in confirming the diagnosis of nicotine withdrawal. With this lab result, we were steered away from opioid-related interventions such as methadone and morphine. Measurement of nicotine and/or its metabolites (either in the urine or meconium) should be considered in routine screening tests for newborns with withdrawal symptoms.
Treatment and patient outcome
Nicotine withdrawal in newborns should be managed with supportive care and will self-resolve in days. Phenobarbital may be considered for seizures related to severe withdrawal. IV fluids may be administered if symptoms interfere with feeding and result in dehydration. Our patient’s symptoms resolved over 4 to 5 days. He was followed by a pediatrician for outpatient evaluation and management. Understanding the prevalence of nicotine abuse via e-cigarettes and the severity of the neonatal withdrawal syndrome are essential components of care for exposed newborns.
References
1. Layden JE, Ghinai I, Pray I, Kimball A. pulmonary illness related to e-cigarette use in Illinois and Wisconsin- final report. N Engl J Med.2020;382(10):903-916. doi: 10.1056/NEJMoa1911614.
2. Christiani DC. Vaping-induced acute lung injury. N Engl J Med.2020;382(10):960-962. doi:10.1056/NEJMe1912032.
3. Maddock SD, Cirulis MM, Callahan SJ, et al. Pulmonary lipid-laden macrophages and vaping. N Engl J Med.2019;381(15):1488-1489. doi:10.1056/NEJMc1912038.
4. Chasnoff IJ, Bussey ME, Savich R, Stack CM. Perinatal cerebral infarction and maternal cocaine use. J Pediatr. 1986;108(3):456-459. doi:10.1016/s0022-3476(86)80896-4.
5. Bailey NA, Diaz-Barbosa N. Effect of maternal substance abuse on the fetus, neonate and child. Pediatr Rev. 2018;39(11):550-558. doi:10.1542/pir.2017-0201.
6. Picciotto MR, Kenny PJ. Mechanisms of nicotine addiction. Cold Spring Harb Perspect Med.2021:11:a039610. doi:10.1101/cshperspect.a039610.
7. Salas R, Sturm R, Boulter J, De Biasi M. Nicotinic receptors in the habenulo-interpeduncular system are necessary for nicotine withdrawal in mice. J Neurosci.2009; 29:3014-3018. doi:10.1523/JNEUROSCI.4934-08.2009.
8. Mc-Grath-Morrow SA, Gorzkowski J, Groner JA, et al. The effects of nicotine on development. Pediatrics.2020;145(3): e20191346. doi:10.1542/peds.2019-1346.
9. Miech R, Johnston L, O’Malley PM, Bachman JG, Patrick ME. Trends in adolescent vaping, 2017-2019. N Engl J Med. 2019;381(15):1490‐1491. doi:10.1056/NEJMc1910739.
10. Glasser AM, Johnson AL, Niaura RS, Abrams DB, Pearson JL. youth vaping and tobacco use in context in the United States: results from the 2018 National Youth Tobacco Survey. Nicotine Tob Res. 2021;23(3):447-453. doi:10.1093/ntr/ntaa010
This article was originally published in Contemporary Pediatrics®.
Related Videos
The importance of diversity in obstetrics | Image Credit: © stanfordchildrens.org
Study confirms efficacy of JADA against postpartum bleeding | Image Credit: © Amy Taneja MD - © Amy Taneja MD - linkedin.com.
Sean Esplin, MD
Lewkowitz, Peahl, Shah
Haywood Brown, MD | Image credit: © USF Health
Jeanette Carpenter, MD
Milli
© 2023 MJH Life Sciences
All rights reserved.
|
ESSENTIALAI-STEM
|
Capsule Endoscopy
What is Capsule Endoscopy?
Capsule Endoscopy lets your doctor examine the lining of the middle part of your gastrointestinal tract, which includes the three portions of the small intestine (duodenum, jejunum, ileum). Capsule endoscopy allows for examination of the small intestine, which cannot be easily reached by traditional methods of endoscopy. Your doctor will give you a pill-sized video camera for you to swallow. This camera has its own light source and takes pictures of your small intestine as it passes through. These pictures are sent to a small recording device you have to wear on your body. Your doctor will be able to view these pictures at a later time and might be able to provide you with useful information regarding your small intestine.
Why is Capsule Endoscopy Done?
Capsule endoscopy helps your doctor evaluate the small intestine. This part of the bowel cannot be reached by traditional upper endoscopy or by colonoscopy. The most common reason
for doing capsule endoscopy is to search for a cause of bleeding from the small intestine. It may also be useful for detecting polyps, inflammatory bowel disease (Crohn’s disease), ulcers, and tumors of the small intestine. As is the case with most new diagnostic procedures, not all insurance companies are currently reimbursing for this procedure. You may need to check with your own insurance company to ensure that this is a covered benefit.
What Can I Expect During Capsule Endoscopy?
Your doctor will prepare you for the examination by applying a sensor device to your abdomen with adhesive sleeves (similar to tape). The pill-sized capsule endoscope is swallowed and passes naturally through your digestive tract while transmitting video images to a data recorder worn on your belt for approximately eight hours. At the end of the procedure you will return to the office and the data recorder is removed so that images of your small bowel can be put on a computer screen for physician review.
Capsule endoscopy may also be called:
• capsule enteroscopy
• wireless capsule endoscopy
17 W. Red Bank Avenue
Suite 306
Woodbury, NJ 08096
Phone: (856) 315-1000
Get Directions
|
ESSENTIALAI-STEM
|
User:Chunnu Kumar Chaurasia
I am a software engineer and having over 10 years of experience in designing and building software for the clients. I enjoy reading technical articles on Wikipedia, specifically the one related to information technology and any chance to contribute to these wonderful articles.
|
WIKI
|
Marriage Guidance Counsellor
The Marriage Guidance Counsellor sketch is from the second Monty Python's Flying Circus episode, "Sex and Violence", first broadcast late on Sunday, 12 October 1969. Written by Eric Idle, it was also featured in the 1971 spinoff film And Now for Something Completely Different.
The sketch features Michael Palin and Carol Cleveland as a married couple (Arthur and Deirdre Pewtey) and Eric Idle as their marriage counsellor. The marriage guidance counsellor flirts with a receptive Mrs Pewtey rather than giving the couple advice, and Mr Pewtey fails to react to this behaviour and stand up for himself, even to the point where he meekly leaves the room when asked by the counsellor, who is clearly about to make love to Mrs Pewtey. In the TV version, an American cowboy (John Cleese) convinces him he must "be a man" while in the film, the voice of God (also Cleese) convinces him.
When Mr Pewtey again compliantly retreats in response to the counsellor's demand to leave the amorous couple alone, the TV version of the sketch features him, in a familiar Python prank, getting hit in the head with a chicken by a knight in a suit of armour (Terry Gilliam). In And Now for Something Completely Different, it instead features another routine Python prank, a giant 16-ton weight being dropped onto Pewtey's body. The words "So much for Pathos!" pop up, ending both versions of the sketch.
|
WIKI
|
Jack Conners
Jack Conners (born July 10, 1943) is an American Democratic Party politician who served in the New Jersey General Assembly, where he represented the 7th Legislative District from 1998 until his resignation in 2011.
In the 1997 elections, Republican Diane Allen left the Assembly and ran for and won the Senate seat, while Democrats Herb Conaway and Conners were declared the winners in that year's Assembly race, after a recount which showed that Conaway was the top vote-getter and Conners winning the second seat by a margin of 74 votes. After eight months in office following his being sworn into office in January 1998, the courts threw out the results of the 1997 election due to problems with 160 uncounted ballots from a voting machine that affected the results for the second seat. Conners was ordered to leave office in September 1998 and Republican Ken Faulkner was seated in his place. In a November 1998 special election, Conners defeated Faulkner by 5,500 votes and was sworn into office for a second time that year.
Conners served in the Assembly on the Military and Veterans' Affairs Committee (as Chair), the Financial Institutions and Insurance Committee and the State Government Committee. Conners has served on the board of the Pennsauken High School Foundation, has been a board member of the Pennsauken Free Public Library and previously served as president of the Big Brothers / Big Sisters of Camden & Gloucester Counties. Conners served in the Delaware Army National Guard from 1964 to 1969 and the United States Army Reserve from 1969 to 1970. Conners attended La Salle University and the Rutgers University Edward J. Bloustein School of Planning and Public Policy. He is a resident of Pennsauken Township.
On March 29, 2011, Conners announced that he would not seek another term to the Assembly in 2011, due to the redrawing of his district that moved his hometown of Pennsauken into a district that primarily included Camden County municipalities, while his current district had been largely based in Burlington County. He announced his resignation on August 26, 2011, effective immediately to accept a position with Camden County as its director of veterans' affairs. Conners was succeeded in the Assembly by Troy Singleton, who was selected to fill the vacant seat and defended it as an incumbent in the general election.
|
WIKI
|
Page:Of the history and travels of Hector Maclean, late sailor.pdf/8
the cook, and as it blew a little hard, his hip was in danger. I being affraid of my elf, I was ordredordered [sic] by my captain to take a little, which I wiped allongtalongſt [sic] the pot bottom and there with blacked all my face, and being dreed in an old harn greygreasy [sic] frock of the cock's I was a mot antick figure, what aid he to my captain, have you no more hand but that thief like divel? go ir aid he into my boat, I refued untill my mater ordered me, and would have him to take the boy too ince he had taken the cook, but he told him be had no ue for boys, it was men he wanted; no help for me then but I mut go, and into the boat I came, and its down beide him he deired me to go afore amongt the ret of the hands, being affraid I hould dirty his cloaths, to which I anwered och, och, I at well enughenough [sic], I thank you kindly, which made the whole crew laugh at him and me, o we arivedarrived [sic] at the tender at lat, and they all went aboard, but I at till in the boat, as I had been to go no farther, the captain aked the lieutenant if he had catched any of the Matties hands, to which he anwered only one, and up he comes to ee me, looking over the gunnel, wore I was enough to fright the very devil. What for a black on of a b-- was that he had brought him now? how long have you been at ea aid he, only two days in a fihing boat aid I, and what did you do in the Mattie aid he? indeed I was the cook and made the meat aid I and how long time would you take to boileboil [sic] a peicepiece [sic] of pork aid he? about eleven or twlvetwelve [sic] hours aid I, and how many men is there on board of the Mattie aid he? hout hout, aid I, me does not know, I never count them, but make their meat
|
WIKI
|
2015 British Superbike Championship
The 2015 British Superbike Championship season was the 28th British Superbike Championship season. It began at Donington Park on 6 April and ended at the Brands Hatch GP circuit on 18 October. Shane Byrne is the defending champion.
|
WIKI
|
Why Does My iPhone Make A Static Noise? Here’s The Fix!
3
You’re making a phone call or listening to music, and your iPhone starts making static noises. Maybe the static is loud and constant, or maybe it only happens once in a while, but one thing’s for sure: It’s annoying. In this article, I’ll explain why your iPhone is making static noises and how to fix the problem for good.
Where Is The Static Coming From?
iPhone Earpiece and Bottom SpeakerStatic noises can come from either the earpiece or the speaker on the bottom of your iPhone. As advanced as they are, the basic technology behind your iPhone’s speakers hasn’t changed much since speakers were invented: Electric current flows into a thin material (called a diaphragm or membrane) that vibrates to create sound waves. In order to be able to vibrate, the material has to be very, very thin – and that makes it particularly susceptible to damage.
Why Is My iPhone Making Static Noises?
The first question we need to answer is this: Is my iPhone making static noises because of a hardware problem (the speaker has been physically damaged) or a software problem?
I won’t sugarcoat this: Most of the time, when an iPhone is making static noises, it means the speaker has been damaged. Unfortunately, a damaged speaker isn’t usually a problem that can be repaired at home – but don’t run off to the Apple Store just yet.
iPhone Speaker BottomThere are rare occasions where a serious software problem can cause an iPhone to make static noises. Your iPhone’s software controls every sound that plays on your iPhone, so when an iPhone’s software malfunctions, the speaker can too.
If your iPhone started making static noises after you dropped it or took it for a swim, there’s a very good chance the speaker has been physically damaged and your iPhone needs to be repaired. If your iPhone started making static noises and it isn’t damaged, it may have a software problem you can fix at home.
Why Is My iPhone 8 Speaker Making Static Noise?
Many people who purchased an iPhone 8 or 8 Plus have reported hearing a static noise coming from the earpiece of their iPhones during phone calls. There are a lot of small electronics crammed into the top of the iPhone 8 near the logic board.
Many electronics create electronic fields that can interfere with audio components of your iPhone 8, such as speakers. Although it hasn’t been confirmed, Apple may release a new software update that fixes the iPhone 8 static noise issue.
How To Fix Software Problems That Lead To iPhone Static Noises
The sure-fire way to determine whether a hardware or software problem is causing your iPhone to make static noises is to restore your iPhone. If you go to an Apple Store, a tech will always try to fix the software before repairing or replacing your iPhone. An iPhone Restore erases and reloads all the software on your iPhone, so the software is as new as when it came out of the box.
To restore your iPhone, you’ll need to connect it to a computer with iTunes. Make sure you back up your iPhone before you begin, because the restore process erases everything on your iPhone, including your personal data. You can restore your data from a backup when you set it up again.
There are three types of restores, and I recommend doing a DFU restore to attempt to solve this issue. It’s the deepest type of restore, and if this is a problem that can be solved, a DFU restore will solve it. My article about how to DFU restore an iPhone explains how. Come back here after you try it.
After your iPhone finishes restoring, it’s easy to tell whether the problem has been solved, especially if the static noises were coming from the speaker on the bottom of your iPhone.
Pull iPhone silent switch forwardFirst, make sure the ring / silent switch on the side of your iPhone is pulled to the forward “on” position. You’ll have to connect to Wi-Fi as you begin the setup process. You should hear clicking noises as you type in your password. If everything sounds OK, there’s a good chance the speaker on the bottom of your iPhone is undamaged.
If you were hearing static from your iPhone’s earpiece, you’ll need to walk through the entire setup process and make a phone call to determine whether or not the problem has been solved. If you’re still hearing static after you restore, your iPhone probably needs to be repaired.
If You Need To Repair Your iPhone
Unfortunately, when your iPhone’s earpiece or speaker has been damaged, it’s usually not a problem that can be repaired at home. Apple does replace iPhone speakers at the Genius Bar, so you won’t have to replace your entire iPhone if the speaker is damaged unless there’s other damage too.
Another option is Puls, an on-demand repair company that will come to you and repair your iPhone in as little as an hour. Puls repairs are performed by a certified technician and are protected by a lifetime warranty.
iphone speaker image
iPhone Can Play Clearly Now, The Static Is Gone
In this article, we determined whether a hardware or software problem was causing your iPhone to make loud static noises, and if you weren’t able to fix it at home, you know what to do next. I’d like to hear about your experience fixing this problem in the comments section below.
Thanks for reading, and remember to pay it forward,
David P.
Comments
About Author
I’m David Payette, the founder of Payette Forward, Inc. I am passionate about helping people to grow personally and professionally using the power of technology. Thank you for visiting payetteforward.com and I look forward to hearing from you!
|
ESSENTIALAI-STEM
|
Prologue to Spear of Lepanto
THE PAPAL PRIZE
Algiers - September 1580
The sun blazed down on the courtyard of the Kasbah, high above the bay and city of Algiers. There, a prisoner stood chained between two wooden posts as a whip stung his flesh with masterful precision.
His chilling shriek pierced the ears of the silent prisoners, many bearing scars from the same leather. Until this moment, the man, bound at his wrists and ankles, had not believed this could happen to him. He lunged forward in a hopeless effort to break free from the coarse bindings as a second strike tore into his flesh just above his right buttock. The thick straps, like the earth between the two heavy posts, were black with the blood of those who had been there before him. He knew this was only the beginning.
Shock and despair gripped the proud Alonso Quixote as he resigned himself to the whip. The irony made him grimace as scenes of home in La Mancha flashed through his mind. How many times had he ordered floggings for peasants on his own Spanish estate for the slightest offense?
Now it was he who was tied down, experiencing the searing strikes opening row after row of bleeding rivers on his back. For the first time in many years, he recited a prayer he remembered from his youth, and tensed for the next staggering blow.
The Kasbah’s majestic architectural design inspired respect and obedience from the people living below it. The imposing structure served as the administrative headquarters for the Pasha of Algiers and provided a prison for those unlucky captives deemed to have ransom value.
Hassan Pasha, a large man with a finely trimmed beard and a body that resembled a ripe pear, thought of himself as an enlightened viceroy. He treated his valuable ransom prisoners as his guests. He fed and clothed them humanely, and furnished medicines when they were ill. He also supplied them with writing materials so that they could correspond with their families across the Mediterranean. Communication with home was accomplished through a network of Christian missionaries, Trinitarian monks in particular, who carried letters throughout Europe for those imprisoned. Noted for their austerity, the Trinitarians also devoted one-third of their revenues to the liberation of Christian slaves.
The pasha was well aware that the families of his guests would pay ransoms as high as 1,000 gold ducats for their safe return. The guests in his honeycombed citadel included the sons of many of Europe’s most noble families; the majority from France, Italy, and Spain. Other unfortunates who became entangled in the corsairs’ Mediterranean webs included members of Europe’s powerful mercantile class who could afford to pay the pasha’s price. If a newly acquired prisoner was deemed to have little ransom value, he was either sold through a network of slave auctions that spanned the North African coast from Algiers to Cairo, or simply released to seek his own way home. A preponderance of those sorry souls commonly perished from starvation or disease.
As the region’s supreme administrator of Islamic law, Hassan Pasha enforced laws with varying degrees of severity, but at the top of his personal list was one rule that he enforced to the letter: do not insult my generous hospitality by attempting to escape. It would make him look foolish, and that he would not tolerate. A first offense would bring the bastinado, a painful beating with a stick, usually on the soles of the feet. A second offense would earn a public flogging, with salt poured into the lacerated wounds to increase the pain if the pasha were especially angered.
When Hassan Pasha assumed his post as the Turkish viceroy of Algiers in 1575, he inherited a difficult problem that his immediate predecessor had refused to address: Italian Jesuit missionary, Enrico Bassi.
After granting the Christian holy man an audience, he concluded that the strong-willed Italian was determined to trick or outwit him into granting far too many liberties for the small Christian minority of Algiers. Rather than slaughter thousands to make his point, he simply had the Jesuit seized and buried alive. All rumblings of discontent among the Christian population came to an abrupt end.
Conditions had softened since the Spanish had been driven from Algiers and the Barbary Coast in 1529 by the infamous Khayru d-Din, better known throughout Europe as the ruthless pirate Barbarossa. With Turkish financial and technical assistance, Barbarossa had overseen the construction of the Kasbah and positioned its 127 long-barreled cannons in such a precise manner that it was suicidal for any invasion fleet to attempt a landing at the city. For the past 51 years, the Spanish had not dared to test the cannons of the Kasbah that guarded the bay of Algiers.
Kareem Ben Ali took great pleasure in his work and smiled broadly as he drew back his whip for a second strike on the bound Quixote. He felt smug and proud to have been chosen by the pasha at the tournament held to select the most skilled in the use of whips.
Not bad, Kareem thought, for a bastard son of a drowned corsair and a mother whose short life had been spent on her back, dragging coins from faceless sailors. Orphaned at the age of ten, Kareem managed to survive the streets of Algiers for two years before he joined a band of street performers and learned to handle the whip, under the tutelage of a distant uncle that elevated him to a prized station in the household of the pasha.
There, in the middle of the main courtyard, Kareem — vain about his long, oiled mustache — looked upon himself as an artist as well as a dispenser of justice. He always performed before an audience. The pasha made certain that all his guests witnessed such punishments; sure it would discourage other escape attempts.
Kareem began at the prisoner’s upper buttocks and systematically worked up his back, with special care to hit the tight flesh of the rib cage. He had no sympathy for those who broke the laws of Allah, but always saved his best work for Christian prisoners. For them, he used a special whip with tiny shards of metal laced into its three tips; an ingenious innovation he was quite proud of. Kareem took great satisfaction in the placement of his strikes. Each would be precisely one inch apart and, by working from the bottom up, he could see each mark, unobscured by blood running from above. It delighted him to know that the designs he created on the flesh of his charges were indelible. Those who survived would never forget him.
Had the pasha known about the metal tips, he certainly would have one of his less dedicated floggers to lay a less artistic pattern on Kareem’s back. The pasha would not have wanted his valuable merchandise damaged beyond repair.
From a third-story cell overlooking the main courtyard, another prisoner - or guest, as the pasha preferred to have them called - peered through an iron-barred window. He could see the entire courtyard and the main gate that led directly to the docks nearly two miles away. He could smell the sea air and hear the song of the seagulls as they freely soared in all directions over the prison compound, his home for the past five years.
Though he had witnessed the brutal punishments many times, his eyes began to water as every muscle in his body grew tense. He well knew the agony in store for his compatriot at the whipping post, for on more than one occasion he had tasted the sting of Kareem’s whip. The scars on his back were proof of that.
Over the last five years, he had endured Kareem’s lash on three separate occasions. But every time he was released from his bindings and dragged back to his cell, he managed to give Kareem a wink and a smile of defiance. Kareem, for his part, returned the smile, acknowledging his victim’s bravado.
Now, by the mercy of God, this horrible nightmare seemed finally about to come to a conclusion. A ransom of 1,000 gold ducats, raised by his family, the Trinitarians, and an old comrade had finally been paid to the pasha. The comrade, who had only recently gotten word of his friend’s imprisonment, contributed the bulk of the ransom and virtually saved the man’s family from destitution.
As indifferent guards took the unconscious Alonso Quixote down from the whipping post and carried him away, the man in the cell reached over to his crude writing desk on which lay a tattered book. The journal, bound in worn leather, had been his salvation and only companion during his long confinement. Though most of the book was written in ink, he had used a special lemon juice solution to conceal the most sensitive entries from unwanted scrutiny. If the pasha knew the hidden secrets the journal contained, it would be the writer’s severed head, detached by the pasha’s own scimitar that would be returned to his family in Spain.
The man pressed the journal to his chest, treasuring the chronicle of events that seemed so far away, events that rocked the world and finally stopped the dreaded Turkish advance on Europe. Without the journal’s constant reminders of past glory, he surely would have perished into a world of madness. It would be the only thing of value he would take home with him.
On the cover of the journal, a treasured gift from a friend — that same friend who now had come to his aid — was inscribed the date and the name of its author: September 1570, Miguel de Cervantes.
He secured the journal under his nearly useless left arm. A gunshot wound received nine years earlier had permanently maimed his left hand, “to the greater glory,” he had written in his journal, “of the right.”
It seemed that, at last, he was, going home. Please, God, he prayed over and over, let this be true.
Hassan Pasha’s term as Ottoman magistrate had come to an end in Algiers, and he looked forward to the pleasures of his home and family in Constantinople. His share of ransom, after five years in Algiers, had earned him more than 27,000 gold ducats from the families of his European guests, a sum that would ensure a princely lifestyle for the rest of his life.
As was his custom, Hassan sent two armed guards to the departing prisoner’s quarters to bring him to the banquet room. Before his release, Cervantes would be the pasha’s guest one last time. After all, Hassan seemed to recall, the rules of hospitality as put forth in the holy Koran called for a gesture of kindness to an enemy whose family had paid such a great sum for his release. Even the Prophet himself had said: “Though the captive in your charge be an infidel, treat him with respect if his family meets your terms of release.” But Cervantes, long unwashed, must be bathed and given suitable clothing for their last meeting and for his journey home.
Cervantes was taken down into the deep bowels of the great fortress where the pasha’s baths were located. Countless centuries before, the Romans had discovered the caverns beneath the bluff overlooking the city of Algiers and had constructed a labyrinth of chambers to serve as their bathing facility. Arab hordes that had swept across North Africa in the eighth and ninth centuries had lent their influence to the baths, but it was the Turks who transformed the caverns into magnificently tiled chambers with an art form they inherited, copied, and added to from centuries of Byzantine refinements, as demonstrated in Constantinople and throughout Asia Minor.
The major bathing pool featured a miniature waterfall that drew water from a natural hot spring in an adjacent cavern. Surrounding the great underground cave were various steam and relaxation rooms. It was customary, after sitting in the purifying mineral steam, to submerge oneself into the cleansing mineral waters of the massive pool in the main chamber.
As he entered the subterranean baths, Cervantes was given a towel and a pair of leather sandals and told to disrobe. After quickly discarding his tattered garments and wrapping the towel around his waist, he followed an attendant into the next chamber. He had never experienced the rituals of the Turkish bath or hammamas, as the Turks referred to it.
As he entered through the arched entry, Cervantes glanced back in bewilderment at the two guards who had escorted him. Abdul and Ali smiled as Cervantes disappeared through the door. They were simple men who followed their orders, but they viewed Cervantes with unusual admiration because he had never stopped his attempts to escape, even though it meant torture and possible death. They respected his tenacious spirit, as did the viceroy, Hassan Pasha, who uncharacteristically had spared Cervantes’ life on three occasions.
Eight months earlier, Cervantes had plotted to secure a small coastal sailing ship in an attempt to escape and had been betrayed by another prisoner. Hassan Pasha, for a third time in his tenure as viceroy, had made an exception to his strict rule and refrained from taking Cervantes’ life. In doing this, he had declared that so long as he had the maimed Spaniard in safekeeping, his Christians, ships, and city were secured. Such was Cervantes heroic bearing in the eyes of his captors.
Cervantes entered a large room with beautiful multicolored tiles covering the floor, walls, and ceiling. In the center was a circular fire pit with bushel-sized granite stones piled up into a mound. Please, God, he prayed again, let me be really going home.
He was told to lie down and stretch out on the marble slab, called the belly stone, to work up a sweat. The attendant took a bucket of water and poured it onto the red-hot rocks, producing a tremendous cloud of steam.
Cervantes began to sweat in the moist heat, and felt an overwhelming sense of serenity as every muscle in his body relaxed and seemed to melt into the hard marble slab as he lay prone on a thick, soft towel. The steam cleansed every pore and he closed his eyes to enjoy the moment.
Maybe, he thought, it is possible that I will soon be a free man, reunited with my family and friends.
Cervantes wept. Questions raced through his mind in an uncontrolled torrent. So many questions with no apparent answers. Why had he been lost for the past five years? Why had God not answered his prayers sooner? These five years may have stripped away his dreams, but he was more determined than ever to survive. He had sworn on the memory of a sacred relic he had once held in his hands that he would not perish in this godforsaken land. The power of that relic had given him the strength to go on living.
As the heat in the chamber intensified, his mind began to doubt. What if this is a hoax? Is my desperation playing cruel games with my mind? Is this intense heat causing me to ramble and crash out of control? Is this a new form of torture? Will the heat become unbearable? Am I meant to die here?
Cervantes jumped up from his dream-like state, took a wooden ladle of water from a nearby bucket, and poured it over his head. As the cool water revived him, he remembered a favorite quotation from his school days, uttered by the great Roman statesman, Marcus Aurelius: “Shame on the soul, to falter on the road of life while the body still perseveres.”
With renewed vitality, he repeated over and over, words that would give him comfort and strength: Calm yourself, Miguel. Have faith. You are going home. You are going home. Please, God....
He sat down on the hot wooden bench, placing the water bucket next to him for periodic splashes of water. He remembered the day, five years earlier, when his ship, El Sol, had been captured only nine days out of Naples by three Turkish galliots off the coast of France near Marseilles. Because of his role at the battle of Lepanto, he had received letters of commendation from the supreme commander at Lepanto, Don Juan of Austria, Pope Pius V, and the Spanish viceroy of Sicily. Finally, after four years of military service, Cervantes and his younger brother, Rodrigo, were returning home in glory and honor. The Turks had found the letters and believed him to be a person of great importance, worth a valuable ransom. His family in Spain had been able to raise only fifty gold ducats, which had been enough to ransom only Rodrigo. Thus had begun Cervantes’ five-year ordeal.
An attendant entered the steam room and gently tapped Cervantes on the shoulder. In Turkic he told Cervantes to follow him into the bathing pool area. After five years of captivity, Cervantes had become proficient in both Arabic and Turkish. He dove into the refreshing mineral waters of the great pool, and swam and rested in intervals for the next half hour. He had not experienced such physical joy in such a long time, and had almost forgotten what it felt like.
As he floated and played in the pool, he remembered his happy school days in Madrid — the scent of orange blossoms in the garden of his professor, Juan López de Hoyos, and poems he had written that had brought him to the attention of the respected Spanish author.
He remembered the day that de Hoyos appeared as a surprise guest lecturer to discuss the writings of Fernando de Rojas and his masterpiece novel, La Celestina. Cervantes was so enamored by de Hoyos’ presentation and so passionate about de Rojas’ work, that he followed the professor after his lecture to a small cafe where he boldly introduced himself. Not only did he engage the amiable professor on alternative aspects of de Rojas’ work, but took the opportunity to recite several of his own poems to the surprised but very impressed professor.
One poem in particular was later chosen by de Hoyos for publication. How proud Cervantes had been to see his work in print. Slowly, he voiced each word of his loved Maiden of the Sea, as if it were spoken for the first time from the lips of a child.
The Maiden of the Sea chafes under the weight of her anchor.
But behold, the chains of contrived dreams lay heavy on her shoulders.
As the desultory waves crash against the barren rocks, the maiden’s song resonates
through the depths.
The song purges the sea of its pungent solitude.
Hence, the sea becomes one with man and the maiden’s tribute is fulfilled.
How he longed to return to that heavenly environment. Even the face of his beloved Dulcinea ran through his mind — the lost love he had eliminated long ago from his memories because of its hopelessness. She was of noble birth and had been promised in marriage to the son of a prominent family while she was just a child. When Miguel accepted the fact that they could never marry, he had briefly thought of ending his life or entering a monastery, but finally decided to devote himself to the pursuit of knowledge through his studies. He would prove to Dulcinea’s family, when he became Spain’s leading poet and a court favorite throughout Europe, that they had made a serious error in shunning him.
An attendant motioned to Cervantes to get out of the pool and gave him a large, cotton towel. Cervantes was led to another chamber with a long wooden table at its center. Here, the attendant put several towels on the table to make a comfortable mattress, and gestured to Cervantes to lie face down on it.
The attendant applied lavender-scented oil to his scarred back. Another attendant, this time a lithe, strong woman, entered the chamber and moved silently toward Cervantes’ prone body. She proceeded to exert a series of high-pressure circular strokes to his back, arms, and legs. Painful at first, his muscles loosened within minutes and the discomfort faded away.
What glorious heaven was this, Cervantes thought. Let it be true. Though his eyes were shut, he sensed the feel and scent to be that of a woman. He had not felt the touch of a woman since he left Naples with Rodrigo. Quickly subtracting his departure date from Naples, to what he believed was roughly the present date, he came to a staggering total: one thousand seven hundred and forty-nine days. Dear God, he thought, for a Spaniard — or any man — this was indeed an eternity.
But as the woman’s small, powerful hands gently stroked his neck and back, he again entered a realm of unfettered relaxation. Even the scars from Kareem’s whip seemed to dissolve, as if they had never existed. Cervantes closed his eyes and drifted off into a world high in the clouds, gliding carelessly over a great sea. He saw his mother, Leonor, and his father, Rodrigo, at the familiar family table with his six brothers and sisters. Had it been ten years since he had last seen them? He felt like a modern day Odysseus, whose odyssey was finally coming to an end. Let it be true... The Penelope who would be greeting him would be his beloved family. How he had dreamt of that day from his cell in the pasha’s stronghold.
Images of his family faded and Cervantes envisioned four ships on a horizon of misty clouds. Three of them flew the flags of Spain and Philip II; the fourth flaunted the papal flag of Pius V, its white and gold colors emblazed with the miter and keys of St. Peter. What kind of dream is this? Cervantes asked himself. Have I been transported back in time ten years to begin my odyssey again?
Suddenly, Cervantes found himself on the main deck of the papal galley. Walking toward him with a smile was his beloved friend and brother in arms, Leonardo Radolowick. “Oh, my dear God!” he whispered in disbelief.
|
FINEWEB-EDU
|
A life without hunger: The Ups (and downs) to modulating melanocortin-3 receptor signaling
Andrew A. Butler, Clemence Girardet, Maria Mavrikaki, James L. Trevaskis, Heather Macarthur, Daniel L. Marks, Susan A. Farr
Research output: Contribution to journalShort surveypeer-review
17 Scopus citations
Abstract
Melanocortin neurons conserve body mass in hyper- or hypo-caloric conditions by conveying signals from nutrient sensors into areas of the brain governing appetite and metabolism. In mice, melanocortin-3 receptor (MC3R) deletion alters nutrient partitioning independently of hyperphagia, promoting accumulation of fat over muscle mass. Enhanced rhythms in insulin and insulin-responsive metabolic genes during hypocaloric feeding suggest partial insulin resistance and enhanced lipogenesis. However, exactly where and how MC3Rs affect metabolic control to alter nutrient partitioning is not known. The behavioral phenotypes exhibited by MC3R-deficient mice suggest a contextual role in appetite control. The impact of MC3R-deficiency on feeding behavior when food is freely available is minor. However, homeostatic responses to hypocaloric conditioning involving increased expression of appetite-stimulating (orexigenic) neuropeptides, binge-feeding, food anticipatory activity (FAA), entrainment to nutrient availability and enhanced feeding-related motivational responses are compromised with MC3R-deficiency. Rescuing Mc3r transcription in hypothalamic and limbic neurons improves appetitive responses during hypocaloric conditioning while having minor effects on nutrient partitioning, suggesting orexigenic functions. Rescuing hypothalamic MC3Rs also restores responses of fasting-responsive hypothalamic orexigenic neurons in hypocaloric conditions, suggesting actions that sensitize fasting-responsive neurons to signals from nutrient sensors. MC3R signaling in ventromedial hypothalamic SF1(+ve) neurons improves metabolic control, but does not restore appetitive responses or nutrient partitioning. In summary, desensitization of fasting-responsive orexigenic neurons may underlie attenuated appetitive responses of MC3R-deficient mice in hypocaloric situations. Further studies are needed to identify the specific location(s) of MC3Rs controlling appetitive responses and partitioning of nutrients between fat and lean tissues.
Original languageEnglish (US)
Article number128
JournalFrontiers in Neuroscience
Volume11
Issue numberMAR
DOIs
StatePublished - Mar 16 2017
Keywords
• Appetite
• Diabetes
• Homeostasis
• Hypothalamus
• Limbic system
• Metabolism
• Neuropeptide
• Obesity
ASJC Scopus subject areas
• Neuroscience(all)
Fingerprint
Dive into the research topics of 'A life without hunger: The Ups (and downs) to modulating melanocortin-3 receptor signaling'. Together they form a unique fingerprint.
Cite this
|
ESSENTIALAI-STEM
|
Málaga Metro
The Málaga Metro (Metro de Málaga) is a semi-metro network in Málaga, Spain. Two lines link the city centre with the northwestern and southwestern suburbs, with a total length of 13.2 km and 19 stations, of which 12 are underground and 5 are surface-level light rail stops.
History
The metro was proposed during the 1990s to ease the crippling congestion when the Ministry of Public Works and Transport commissioned a study in 2001 into the feasibility of constructing a metro system in the city. The plan had four lines, radiating from the city centre, with stations roughly 500 m apart to allow a high level of accessibility, with funding for the project coming from both the local and the Spanish governments. The system was originally scheduled to open on 31 October 2013. The two lines finally opened in service on 30 July 2014, as a limited service terminating at El Perchel station, adjacent to Málaga María Zambrano railway station.
In March 2023, the metro was extended from its former city terminus at El Perchel station by 1.7 km into the historic centre of the city, which resulted in the increase of the metro's previous patronage from 28,000 daily users to 41,000 on the first operating day of the extension.
Lines
Here are the most important features of the two lines:
Route
Both lines run underground in the city centre. Line 1 goes from there to the University of Málaga. Between Universidad station and the Andalucía Tech terminus, it runs on the surface, which includes some at-grade intersections.
Line 2 runs entirely underground, from the city centre to the Jose Maria Martin Carpena Arena.
An extension of Line 1 from El Perchel further into the city centre with two underground stops, Guadalmedina and Atarazanas, opened on 27 March 2023. By extending the metro closer to the city centre, patronage is expected to reach 18 million annually.
Future
Line 2 will share El Perchel and Guadalmedina stations with Line 1, then was originally to emerge above ground and continue with four surface-level stops to Hospital Civil. The completion date for this extension is currently unknown, and this extension is predicted to increase overall annual patronage of the metro to 20.5 million. In 2019, the scope of the project was amended to a fully underground alignment from Guadalmedina to Hospital Civil.
Rolling stock
All trams are Urbos 3, manufactured by the Spanish company Construcciones y Auxiliar de Ferrocarriles. They are fully covered by CCTV and are throughout air-conditioned in an effort to provide security and comfort to a full capacity tramcar of 56 seated passengers with 170 standing. The capacity figure is accurate for likely peak-time usage, but the trains are also fully accessible to disabled passengers, who may slightly decrease capacity.
The trams are already in successful widespread use in other cities, including 30 on trams in Belgrade, with 40 are also planned for the Cuiabá system, in Brazil.
|
WIKI
|
User:MusikBot/TemplateProtector/Error log
* [07:39, 3 February 2019 (UTC)] TemplateProtector disabled
|
WIKI
|
Lukket
Flash Slideshow With ColdFusion
This project is for a Flash applet that takes dynamic ColdFusion input to present a series of graphics as a slideshow on a Web page.
Desired Functionality: a series of clickable slides will be presented centered within the boundary of the applet that will fade from one image to the next in a continuous loop. If a browser does not support Flash no error messages or requests to download flash will be generated, instead the first graphic and URL will be displayed in HTML as if there was no Flash applet present.
Specifications:
Overall applet size is 290 pixels width by 196 pixels height. If a selected graphic image to be shown as a slide is larger then it should be shrunk to fit and definitely shouldn't break the applet or run over the edges. Don't worry about maintaining height/width proportionality but do not clip images either.
Applet accepts these variables as input when the web page loads:
1) SlideTime = seconds each graphic is displayed.
2) SlideTime1 = seconds the initial display of the first graphic is shown when the applet first loads; when the same image is redisplayed again after recycling through the loop then SlideTime applies to it. In other words, SlideTime1 is only used once for the first image displayed.
3) SlideFadeTime = total seconds of transition from one slide to the next, same for all slides. Slides should fade smoothly into one another so that one is fading out at the same time the next one is fading in, not simply fade out and then the next one fade in.
4) SlideBGcolor = background color (using hexadecimal or Netscape color list) of the applet that will show as a border if the images are smaller than 290 x 196 pixels. If it is possible for the background of a Flash applet to be transparent that should be an option too.
5) SlidePath = absolute or relative path to graphics on server or (with absolute path) external graphic source.
6) SlideList = comma-delimited list of graphic filenames to be displayed in the order on the list. If an image is not present or fails to load the applet should not break or go blank but move seamlessly to the next image.
7) SlideURLs = comma-delimited list of either absolute or relative URLs to go with the SlideList. Assume SlideList and SlideURLs will always be equal-length lists but applet shouldn't break if they aren't. Clicking on a slide with a corresponding zero (0) in the SlideURLs list does nothing however because that is how to NOT attach a URL to a slide. Each URL is active on a slide from the end of the previous slide's SlideFadeTime (in other words from the start of a slide being completely faded in) to the end of its own SlideFadeTime.
Note: if developer feels that a ColdFusion array or structure will be superior to lists then either is an acceptable substitution.
The goal is a small fast-loading Flash applet which will immediately begin displaying the first image nearly as quickly as if it was just an image without any applet. If any of the above specifications will significantly bloat the size of the applet such that performance would be noticeably degraded then developer should notify me and we will negotiate a workaround compromise solution if possible.
Source and compiled code will be provided by the developer.
Evner: Adobe Flash, Cold Fusion
Se mere: coldfusion flash slideshow, slideshow coldfusion, web developer path, slideshow html 5, slide graphics, page break graphics, image web solution, how to start as web developer, how to download an applet, height and length, goal zero, flash slide show html, border html 5, applet.start, applet start, coldfusion slideshow, flash coldfusion slideshow, coldfusion list, coldfusion download, Absolute
Om arbejdsgiveren:
( 0 bedømmelser ) Long Beach, United States
Projekt ID: #186512
|
ESSENTIALAI-STEM
|
Lake Baringo AFR-236
Riparian Nation(s) Kenya
Surface Area 100 km2 Mean Depth 2.5 m Volume
Shoreline Catchment Area 6820 km2 Residence Time
Frozen Period Mixing Type Morphogenesis/Dam
Related Info/Site Ramsar Site #1159 (2002)
Description
Lake Baringo is named after the local word "Mparingo", meaning lake. The lake is located in the Eastern Rift Valley in Kenya and is one of the seven inland drainage lakes within the Rift Valley drainage basin. The lake has a surface area of about 100km2 and drains a total area of 6,820 km2. The lake is located in the administrative district of Baringo at an altitude of 1,000 m above sea level, while its basin extends to the neighboring districts of Koibatek, Laikipia and Nakuru.
Several seasonal rivers drain into the lake, including Ol Arabel, Makutan, Tangulbei, Endao and Chemeron. Perkerra and Molo are perennial rivers, although with significantly reduced water discharges during dry seasons. Lake Baringo experiences very high annual evaporation rates of 1,650-2,300 mm, compared to an annual rainfall of 450-900 mm. Thus, its survival depends on the inflows from rivers originating from the humid hillslopes of the drainage basin, where the annual rainfall varies between 1,100 mm and 2,700 mm.
Records indicate that between 1969 and 1972, the average depth of the lake was 8m. The current average depth is 2.5 m, with the deepest end of the lake being 3.5 m. The surface area of the lake has shown a decreasing trend.
|
ESSENTIALAI-STEM
|
CHICAGO TRUCK DRIVERS, Helpers and Warehouse Workers Union (Independent) Pension Fund, and Jack Stewart, Trustee, Plaintiffs-Appellees, Cross-Appellants, v. EL PASO CGP COMPANY, El Paso Midwest Company, El Paso CNG Company, L.L.C., American Natural Resources Company, and ANR Advance Holdings, Inc., Defendants-Appellants, Cross-Appellees.
Nos. 06-3362, 06-3397, 06-4040, 07-1353.
United States Court of Appeals, Seventh Circuit.
Argued Sept. 20, 2007.
Decided May 13, 2008.
Rehearing and Suggestion for Rehearing En Banc Denied July 2, 2008.
James D. O’Connell (argued), Much, Shelist, Freed, Denenberg, Ament & Ru-benstein, William W. Leathern, Jacobs, Burns, Orlove, Stanton & Hernandez, Chicago, IL, for Plaintiffs-Appellees, Cross-Appellants.
Thomas M. Christina (argued), Ogletree, Deakins, Nash, Smoak & Stewart, Green-ville, SC, for Defendants-Appellants, Cross-Appellees.
Before CUDAHY, POSNER, and WILLIAMS, Circuit Judges.
Judge Flaum did not participate in the consideration of this Petition for Rehearing.
CUDAHY, Circuit Judge.
The Chicago Truck Drivers, Helpers and Warehouse Workers Union (Independent) Pension Fund (the Fund) and its trustee, Jack Stewart, brought this suit against Defendants El Paso CGP Company, El Paso Midwest Company, El Paso CNG Company, L.L.C., American Natural Resources Company and ANR Advance Holdings, Inc. to collect withdrawal liability under the Multiemployer Pension Plan Amendments Act of 1980 (MPPAA). See 29 U.S.C § 1401(b)(1). The Defendants deny that they owe any withdrawal liability. The Fund, however, argues that the Defendants are not only liable but have forfeited their right to contest liability by failing to make a timely demand for arbitration back in 1999, when a proof of claim for withdrawal liability payment was filed in the Chapter 7 bankruptcy of one of the Defendants’ affiliates. The Defendants believe that their duty to arbitrate was not triggered in 1999 because the proof of claim was not the valid notice and demand for payment prescribed by the statute. The district court agreed with the Fund and granted its motion for summary judgment on liability but denied the Fund’s motion for judgment on damages, choosing instead to calculate damages under another theory. Both parties appealed.
The question before us immediately is not whether the Defendants are liable for the withdrawal assessment; it is whether the Fund’s filing of the proof of claim in a Chapter 7 bankruptcy constituted a statutory notice and demand and thus cut off the Defendant’s right to contest liability. We hold that the proof of claim was sufficient but only because the Defendants had actual notice of it no later than January 1, 2002. We therefore Affirm the judgment of the district court on liability. We disagree, however, with the district court’s resolution of the damages issues, so we Vacate the judgment on damages and Remand the case for further proceedings.
I.
The MPPAA is, of course, actually a series of amendments to the Employee Retirement Income Security Act of 1974 (ERISA). See 29 U.S.C. § 1001 et seq. ERISA is famously complicated and often tedious. As is customary, we begin with a brief review of the relevant law. Hopefully, this will make the exposition of the facts a bit more digestible.
The MPPAA protects employees in multiemployer pension plans by requiring employers who withdraw from such plans to pay their share of “unfunded vested benefits.” 29 U.S.C. § 1381(b)(1). This is known as “withdrawal liability.” When an employer withdraws, the plan sponsor calculates the amount of liability and, “[a]s soon as practicable,” notifies the employer of the liability and demands payment. 29 U.S.C. § 1399(b)(1). This “notice and demand” must include the amount of liability and a schedule of installment payments. When the employer receives the notice, it must begin paying according to the schedule. See Robbins v. Pepsi-Cola Metro. Bottling Co., 800 F.2d 641, 642-43 (7th Cir.1986) (per curiam). The statute places a premium on prompt payment; it is a “pay now, dispute later” scheme. Id. at 642. But the withdrawing employer “owes nothing” until the plan notifies it of its liability and demands payment. Milwaukee Brewery Workers’ Pension Plan v. Joseph Schlitz Brewing Co., 513 U.S. 414, 423, 115 S.Ct. 981, 130 L.Ed.2d 932 (1995).
If the employer wishes to dispute a plan sponsor’s assessment of withdrawal liability, it must arbitrate the issue. See 29 U.S.C. § 1401(a)(1). Exceptions to the arbitration requirement are made only in the rarest cases. See Central States, Se. & Sw. Areas Pension Fund v. Slotky, 956 F.2d 1369, 1373 (7th Cir.1992). Upon receipt of the notice and demand, the employer has 90 days to request an informal review by the plan of the assessment. See 29 U.S.C. § 1399(b)(2)(A). The employer then has roughly 120 additional days to demand' arbitration. See 29 U.S.C. § 1401(a)(1). If an employer fails to demand arbitration, the assessment becomes “due and owing on the schedule set forth by the plan sponsor.” 29 U.S.C § 1401(b)(1).
When a plan sponsor sues to collect withdrawal liability, it may sue the withdrawing employer or any trade or business under “common control” with the employer because members of a “controlled group” are jointly and severally liable for the withdrawal. 29 U.S.C. § 1301(b)(1). The definition of a “controlled group” under the MPPAA tracks the definition under the Internal Revenue Code and includes parent-subsidiary relationships. See 26 U.S.C. § 1563(a). The controlled group provision allows a plan “to deal exclusively with the defaulting employer known to the fund, while at the same time assuring [itself] that legal remedies can be maintained against all related entities in the control group.” Bd. of Trs. of Trucking Employees of North Jersey Welfare Fund, Inc.-Pension Fund v. Kero Leasing Corp., 377 F.3d 288, 306 (3d Cir.2004) (Rosenn, J., dissenting). Thus, any notice sent to one member of a controlled group is considered constructive notice to all other members of such a group. See Slotky, 956 F.2d at 1375.
Of course, the purpose of the MPPAA is to ensure that employers live up to the obligations they owe to the pension fund and to the employees who participate in it. But Congress also recognized that employers that have substantial pension liabilities may attempt to shirk their obligations through deceptive transactions. See Teamsters Pension Trust Fund—Bd. of Trs. of the Western Conference v. Allyn Transp. Co., 832 F.2d 502, 507 (9th Cir.1987). Congress thus provided that “[i]f a principal purpose of any transaction is to evade or avoid liability under this part, [Sections 1381 to 1405] shall be applied (and liability shall be determined and collected) without regard to such transaction.” 29 U.S.C. § 1392(c). This discourages companies from using corporate forms and manipulations to shield themselves from withdrawal liability.
II.
With all this in mind, we turn to the facts of the case. The Chicago Truck Drivers, Helpers and Warehouse Workers Union (Independent) (the Union) entered into a collective bargaining agreement with a trucking company called ANR Freight System, Inc. (ANR Freight) on April 3, 1994. The agreement required ANR Freight to contribute to the Fund.
ANR Freight was the wholly owned subsidiary of the Coastal Corporation (Coastal), a large oil and gas company. Coastal controlled ANR Freight through a series of intermediaries: Coastal was the sole stockholder of Coastal Natural Gas Company (Coastal Natural); Coastal Natural was the sole stockholder of ANRC; ANRC was the sole stockholder of ANRFS Holdings; and ANRFS Holdings was the sole stockholder of ANR Freight. Most of these companies subsequently changed names or were succeeded by other companies: Coastal became El Paso CGP Company; Coastal Natural became EL Paso CNG Company, L.L.C.; and ANRFS Holdings merged with El Paso Midwest Company. It is undisputed that, until November 3, 1995, these companies constituted a “controlled group,” which we will call the Coastal Group.
In 1995, the Coastal Group arranged to have ANR Freight merge with Advance Transportation Company (ATC), a wholly unrelated trucking company owned by its employees and by individual shareholders. The merger was accomplished in two steps. First, on August 14, 1995, ANR Freight exchanged stock with ATC, with the result that the Coastal Group and the shareholders of ATC each became 50% owners of each other’s companies. Second, on November 3, 1995, ATC merged with ANR Freight and the resulting company was immediately renamed ANR Advance Transportation Company (ANR Advance). As a result of the exchange of stock and the subsequent merger, ANR Advance was no longer part of the Coastal Group because the Coastal Group no longer owned 80% or more of ANR Advance’s stock. See United States v. Vogel Fertilizer Co., 455 U.S. 16, 29, 102 S.Ct. 821, 70 L.Ed.2d 792 (1982).
Over the next three years, ANR Advance operated its trucking business and made regular contributions to the Fund. On February 2, 1999, an involuntary Chapter 11 petition was filed against ANR Advance and, on March 3, 1999, a court converted the case into a Chapter 7 proceeding. The Fund decided that ANR Advance had withdrawn from the Fund and filed a proof of claim for withdrawal liability in the ANR Advance bankruptcy on June-3, 1999. The proof of claim referred to “withdrawal liability,” stated the total amount of the assessment and carried a liability payment schedule, which broke the assessment down into ten installments.
When the proof of claim was filed, the bankruptcy proceeding was under Chapter 7 and was being administered by a trustee, who apparently never informed the Defendants of the filing of the claim. The claim languished amidst sundry paperwork for over two years. In late 2001, Steven McKemy, a lawyer for the Defendants, finally discovered it while doing due diligence in the settlement of another case. The Defendants did not, however, respond to the proof of claim. They chose to sit on their hands.
So, apparently, did the Fund, which did not follow up on the notice and did not file suit to collect the liability. On November 18, 2004, more than five years after the original proof of claim was filed in the Chapter 7 bankruptcy, the Fund sent the Defendants a letter containing a notice and demand, which the Defendants received two days later. This notice and demand contained a new schedule of ten installments, with the first due on December 1, 2004. The Defendants did not pay the first installment until February 10, 2005. The Defendants requested review of the assessment on February 15, 2005. On August 3, 2005, they demanded arbitration.
On December 6, 2004, the Fund and its trustee, Jack Stewart, brought this action to collect withdrawal liability from the Defendants. The parties then filed cross-motions for summary judgment on the question of liability. On April 18, 2006, the district court granted the Fund’s motion for summary judgment and denied the Defendants’ motion. Shortly thereafter, the Fund moved for summary judgment on damages. The district court denied the Fund’s motion and, in a separate opinion, entered a final judgment following a different theory of damages.
III.
We first discuss the district court’s judgment on liability. Although ANR Advance severed its ties with the Defendants’ controlled group years before it withdrew from the plan, the Fund argues that the Defendants may still be held liable because the November 3,1995 merger was designed to “evade or avoid” withdrawal liability. See 29 U.S.C. § 1392(c). Evade or avoid allegations, however, are generally reserved for arbitration. See Banner Industries, Inc. v. Central States, Se. & Sw. Areas Pension Fund, 875 F.2d 1285, 1288 (7th Cir.1989). Thus, the Fund argues that the Defendants have waived their right to assert their non-liability by failing to demand arbitration.
If an employer fails to demand arbitration, the assessment becomes due and owing on the schedule provided by the plan. See 29 U.S.C § 1401(b)(1). But the Defendants’ statutory duty to arbitrate is not triggered initially until they receive a proper notice and demand. The district court thus correctly stated that, to prevail on a collection claim, the Fund must show that: (1) “the Fund was a multiemployer pension plan and the Defendants were an employer for the purposes of ERISA,” (2) “the Fund notified the Defendants of their assessed liability,” and (8) “Defendants failed to timely initiate arbitration.” Chicago Truck Drivers, Helpers & Warehouse Workers Union (Indep.) Pension Fund v. El Paso CGP Co., No. 04 C 7872, 2006 WL 1037152, at *4 (N.D.Ill. April 17, 2006).
The Fund is, of course, a multiem-ployer pension plan and it is undisputed that the Defendants were once MPPAA employers. This case hinges, in the first instance, on the adequacy and propriety of the June 3, 1999 notice and demand because a proper notice and demand starts the arbitration clock running and thus determines whether the initiation of arbitration was timely. If the only valid notice and demand in this case is the letter sent by the Fund on November 18, 2004, then the Defendants made a timely demand for arbitration. But, if the proof of claim filed in ANR Advance’s Chapter 7 bankruptcy on June 3, 1999 was a valid notice and demand, the Defendants waived their right to arbitration when this purported proof of claim was filed. The Fund would then prevail and we would need only to establish damages.
A.
We first examine the adequacy, as statutory notice and demand, of the proof of claim filed in bankruptcy on June 3, 1999. In order to satisfy the statutory requirements, a notice and demand must include the amount of the liability, a schedule of payments and a demand for payment; it must also be sent “to the employer.” 29 U.S.C. § 1399(b)(1). We have been indulgent about the specific form a notice and demand may take, and have recognized proofs of claim in bankruptcy to be adequate notices under the statute, at least in some situations. See Slotky, 956 F.2d at 1375; Trs. of the Chicago Truck Drivers, Helpers & Warehouse Workers Union (Indep.) Pension Fund v. Central Transport, Inc., 888 F.2d 1161, 1162 (7th Cir.1989). In Slotky and Central Transport, we recognized proofs of claim in Chapter 11 bankruptcies as meeting the statutory requirements. Here, the Defendants contend that the proof of claim did not contain a demand for payment but we have held that a proof of claim is, by definition, a demand for payment. Id. The Defendants also complain that the proof of claim here did not contain a schedule, which they interpret to mean a “timetable” rather than a “list.” This is beside the point. A proof of claim filed in bankruptcy need not contain a schedule of payment; such a schedule would be useless in that context, for the bankruptcy court can ultimately set its own schedule. Slotky, 956 F.2d at 1375.
But, as the Defendants point out, the statutory trigger for arbitration is not the mere existence of a proper notice and demand; the notice must be sent “to the employer.” 29 U.S.C. § 1399(b)(1). What distinguishes the present case from Slotky and Central Transport is that the proof of claim here was filed in a Chapter 7 bankruptcy, not a Chapter 11 bankruptcy. In a typical Chapter 11 bankruptcy, the debtor continues to control the business as debt- or-in-possession, so notice to the debtor-in-possession is, strictly speaking, notice to the employer. A Chapter 7 bankruptcy, on the other hand, is conducted by a trustee who is neither the agent of the debtor nor the fiduciary of the debtor. The trustee has no general duty to inform the debtor of the filing of a proof of claim; a duty to inform the debtor of the progress of the liquidation arises only if the. debtor so requests. See 11 U.S.C. § 704(a)(7). And it is unlikely that debtors will request this information, for debtors in a Chapter 7 bankruptcy know that the remaining funds will be inadequate to meet all obligations. As a result, a proof of claim filed in a Chapter 7 bankruptcy will not foresee-ably come to the attention of the employer or to a member of the controlled group (and apparently did not here until it was later inadvertently discovered).
This is, at least, how things typically work, and the Fund has not come forward with any evidence that suggests a different situation here. Perhaps the Fund could have shown that the debtor had, in fact, been an active participant in this bankruptcy; perhaps the debtor held meetings with the trustee and kept close tabs on the proceedings. Under these circumstances, the Fund should at least be charged with showing that the filing of a proof of claim was an effective means of conveying notice, which has not been done here. Nor did the Fund notify the Defendants directly of the Chapter 7 filing. Consequently, the proof of claim filed on. June 3, 1999 was an insufficient notice and demand under the statute.
B.
In addition, even if the present case had involved a Chapter 11 bankruptcy, we would have a serious problem of the adequacy of notice in this case. The problem arises with respect not to notice delivered directly to the employer but to notice delivered indirectly through the controlled group. The theory that notice to one member of a controlled group is notice to all is characterized as constructive notice and is generally recognized in connection with withdrawal liability. See Slotky, 956 F.2d at 1375; Central Transport, 888 F.2d at 1163-64.
When the proof of claim was filed on June 3, 1999, however, the Defendants were no longer a part of the same controlled group as ANR Advance (the subject of the proof of claim) and, hence, notice to the Defendants via the controlled group here is problematic. In essence, the Fund asks us to extend the constructive notice principle to include notice to former members of the controlled group. Such an application of the constructive notice principle is unprecedented in this circuit. In the cases we have examined in which the constructive notice principle has been applied, the employer has always been a member of the then-existing controlled group. See, e.g., Central States, Se. & Sw. Areas Pension Fund v. Nitehawk Exp., Inc., 223 F.3d 483 (7th Cir.2000); Slotky, 956 F.2d at 1375; Central Transport. 888 F.2d at 1163-64; IUE AFL-CIO Pension Fund v. Barker & Williamson, Inc., 788 F.2d 118 (3d Cir.1986). The Third Circuit, the only other circuit court to consider the issue, balked at such an extension of the constructive notice principle. See Kero Leasing, 377 F.3d at 298-99 & n. 10.
Nevertheless, the Fund believes that here the district court’s application of a constructive notice principle can be validated on the basis of the “evade or avoid” provision of 29 U.S.C. § 1392(c). This provision states that, if the primary purpose of a transaction is to “evade or avoid” pension liability, the transaction may be disregarded and liability enforced “without regard to such transaction.” Id. Again, this claim is unprecedented. In the reported cases, when a fund has alleged an “evade or avoid” transaction, the issue has been not the adequacy of notice but the validity of the transaction itself or the arbitrability of that issue. See, e.g., Sherwin-Williams Co. v. New York State Teamsters Conference Pension & Ret. Fund, 158 F.3d 387 (6th Cir.1998); Santa Fe Pacific Corp. v. Central States, Se. & Sw. Areas Pension Fund, 22 F.3d 725 (7th Cir.1994); Doherty v. Teamsters Pension Trust Fund of Philadelphia & Vicinity, 16 F.3d 1386 (3d Cir.1994); Banner Industries, 875 F.2d at 1288. Using the “evade or avoid” provisions to establish notice could have troubling consequences; those courts that have addressed the argument have thus rejected it. See Kero Leasing, 377 F.3d at 298-99 & n. 10; Trs. of the Chicago Truck Drivers, Helpers & Warehouse Workers Union (Indep.) v. Rentar Indus., Inc., 1989 WL 153559, at **4-5, 1989 U.S. Dist. LEXIS 13385, at **11-14 (N.D.Ill. Nov. 7, 1989).
As a practical matter, we cannot expect former owners always to be aware of a notice and demand that is sent after they have left the controlled group entirely. It is important to keep in mind that provisions like the “evade or avoid” provision reflect “congressional concern that the realities of business organizations should prevail over the formalities of corporate structure in imposing liability.” Cf. Pension Benefit Guar. Corp. v. Anthony Co., 537 F.Supp. 1048, 1052 n. 6 (N.D.Ill.1982). In the instant case, the Defendants retained an ownership interest in ANR Advance after the merger and loaned the company a substantial amount of money. But it is not difficult to imagine a case in which the relationship between current and former members of a controlled group is distant or, indeed, non-existent. In those cases, the practical justification for recognizing the application of a constructive notice principle loses much of its force.
We question the equity of denying a former owner the right to contest liability because it failed to respond to a notice sent to a company from which it was already separated. See Rentar Indus., 1989 WL 153559, at **4-5, 1989 U.S. Dist. LEXIS 13385, at **11-14. When a plan sponsor asserts a claim against a former member of a controlled group, the best practice always is to send that notice directly to the former owner, so that it has a clear opportunity to contest liability.
C.
Despite all these objections, the Fund’s proof of claim here did eventually reach the Defendants. In fact, in their answers to the Fund’s interrogatories, the Defendants admitted that their lawyer reviewed the proof of claim in question while doing due diligence in another lawsuit, and that the Defendants had “actual knowledge of the Proof of Claim no later than January 1, 2002.” Appellee’s App. at 275, 277. The Fund’s notice thus actually got “to the employer,” and the statutory duty to arbitrate was triggered when the Defendants “receive[d] the notice.” 29 U.S.C. § 1399(b)(2)(A). Nothing more is required if the notice and demand contains the necessary information, as this one did. Thus, this actual notice trumps any deficiencies in it as a statutory notice.
Desperate to avoid this conclusion, the Defendants now argue that “mere awareness” or “mere possession” of the proof of claim does not amount to “receipt.” They also argue that they knew of the proof of claim but did not know of its content. These arguments partake of the metaphysical. The proof of claim clearly stated that it concerned withdrawal liability; the Defendants cannot stick their heads in the sand and later claim ignorance. The Defendants also argue that the notice should have contained some signal that it could operate “against them,” but this is not the law. See Slotky, 956 F.2d at 1375.
The question then is simply whether the Defendants were entitled to ignore the proof of claim and wait to be sued, or whether they had to initiate arbitration. We have answered this question many times:
Anyone who suspects that he might be adjudged a member of a controlled group and therefore subjected to withdrawal liability would be well advised to commence arbitration, so that if a court holds that he is a member of such a group and hence is subject to such liability he won’t have waived the issues that are reserved for arbitration, as [the Defendant] did here.
Id. at 1373. Thus, the proof of claim— whatever its initial deficiencies — when it came to be inspected by an agent of the employer, operated to put the employer on notice of its withdrawal liability. The Fund was merely fortunate that its assessment of liability fell into the right hands. This stroke of luck cured the deficiencies in the Fund’s conformity with the statutory requirements. The information thus communicated to the employer was adequate for statutory purposes. It also disposes of the Defendant’s as-applied due process claim. The judgment entered by the district court on liability is thus affirmed.
IV.
We now turn to the judgment on damages. The central dispute here is whether the debt based on withdrawal liability owed by the Defendants was accelerated and became due when the Defendants became aware of their indebtedness. In its opinion on liability, the district court had stated that the Fund was entitled to accelerate the debt and cited our decision in Central States, Se. & Sw. Areas Pension Fund v. Basic American Indus., 252 F.3d 911 (7th Cir.2001). Shortly after the judgment on liability was entered, the Fund moved for an entry of summary judgment on damages and submitted a memorandum that relied heavily on our decision in Basic American. The Defendants filed a memorandum in opposition that advanced a different theory of damages than the one discussed in the Fund’s brief. The Fund was never given an opportunity to file a reply, although it had offered to do so.
In its decision on damages, the Court distinguished Basic American as a case applicable only to the statute of limitations and rejected the Fund’s calculation of damages. It held that the debt associated with withdrawal liability had never been accelerated and that the Defendants were required only to make installment payments according to the November 18, 2004 schedule. It thus limited the amount of interest to that accrued on past due installment payments. It did, however, award liquidated damages in the amount of 20% of the full withdrawal liability assessment plus attorney’s fees.
The Fund claims that the district court entered judgment on damages without giving the it notice or an opportunity to be heard on the issue. See R.J. Corman Derailment Servs., LLC v. Int’l Union of Operating Eng’rs, Local Union 150, AFL-CIO, 335 F.3d 643 (7th Cir.2003). The Fund argues that the district court gave the impression that the calculation of damages would involve a simple application of Basic American. The Defendants quarrel only with the district court’s decision to base liquidated damages on the full withdrawal liability assessment rather than on only the delinquent payments. Ultimately, we believe that the case must be remanded for further proceedings on the issue of damages.
A.
The MPPAA provides plan sponsors with a right to accelerate debt if the employer defaults. See 29 U.S.C. § 1399(c)(5). There are two ways to default under the statute: under § 1399(c)(5)(A), the employer can fail to make a payment when due; and, under § 1399(c)(5)(B), an event can transpire which creates a “substantial likelihood that an employer will be unable to pay its liability.” 29 U.S.C. § 1399(c)(5). Before an employer can be held to have defaulted on a missed payment, there must be notice and a sixty-day opportunity to cure. See 29 U.S.C. § 1399(c)(5)(A). Acceleration under the statute is permissive, not mandatory. See Chicago Truck Drivers, Helpers & Warehouse Union (Indep.) Pension Fund v. Century Motor Freight., 125 F.3d 526, 533 (7th Cir.1997). This permissive feature reflects the fact that acceleration might not be in the plan’s best interests. Cf. Bd. of Trs. of Disk No. 15 Machinists’ Pension Fund v. Kahle Eng’n Corp., 43 F.3d 852, 859 & n. 7 (3d Cir.1994). Relying on our decision in Basic American, however, the Fund argues that acceleration occurred automatically on July 3, 1999 or, at the latest, on April 1, 2002, despite its failure to satisfy any of the statutory requirements applying to notice of acceleration. See 29 U.S.C. § 1399(c)(5).
We agree with the district court that Basic American is distinguishable from the case at hand. Basic American was a case in which we decided at what point in time a claim for withdrawal liability first accrued for purposes of the statute of limitations. In order to determine that time, we had to determine the earliest possible moment at which the claim could have been brought. See Basic American, 252 F.3d at 915. Relying on principles of contract law, we found that the Fund could have brought a claim when the employer repudiated its withdrawal liability by ceasing operations and filing for bankruptcy. Id. at 918. Because that repudiation took place more than six years before the Fund brought suit, we held that the suit was barred. Given the nature of our inquiry, whether the plan sponsor in that case effectively exercised its right to accelerate under the statute was not relevant, and we have never applied Basic American outside of the statute of limitations context, which was applicable to that case. We did not purport in Basic American to find there a general principle of automatic acceleration of withdrawal debt. Thus, Basic American did not hold that the filing of a proof of claim in bankruptcy automatically accelerated a debt under the MPPAA. In fact, Basic American explicitly stated otherwise. Id. at 916 (“Filing for bankruptcy ... is not anticipatory repudiation per se.”). This makes sense within the statutory scheme, where the decision to exercise the right of acceleration is left to the Fund and the employer is given a statutory right to cure. See 29 U.S.C. § 1399(c)(5). The filing of a proof of claim does not absolve the Fund of its responsibility to comply with the statutory requirement of serving notice on the employer before accelerating the debt. Nor is there any basis for the Fund to argue that the debt was accelerated on June 3, 1999, years before the Defendants ever actually received the notice and demand.
The fact that we agree with the district court’s reasoning, however, does not resolve the issue of damages because the district court granted summary judgment on grounds very different from those presented in the Fund’s motion. In fact, the court ruled on the statutory acceleration issue without warning the Fund that it intended to do so. The Fund assumed that its summary judgment motion on its damage calculation would involve an application of Basic American. It is inconsequential that the Fund itself sought summary judgment, the question is whether the Fund was “fairly apprised of the ultimate basis for the district court’s reasoning.” R.J. Corman, 335 F.3d at 650. Of course, the district court may enter judgment on a ground not contained in the motion “if the parties have had an adequate opportunity to argue and present evidence on that point and summary judgment is otherwise appropriate.” 10A Charles Alan Wright, Arthur R. Miller & Mary Kay Kane, Federal Practice and Procedure § 2719 (3d ed.1998); accord Brock v. Carroll, 107 F.3d 241, 247 (4th Cir.1997) (Phillips, J., concurring and dissenting); Gasser Chair Co., Inc. v. Infanti Chair Mfg. Corp., 60 F.3d 770, 777-78 (Fed.Cir.1995).
We think that summary judgment was inappropriate in this case. The Fund was clearly surprised, for it had relied on Basic American throughout the litigation and the reference to Basic American in the district court’s opinion on liability signaled to the Fund that it would prevail on that theory. The Fund was thus under the impression that it was entitled to accelerate under the theory enunciated in Basic American. That is why the Fund addresses only Basic American in its motion and its supporting memorandum (statutory requirements for acceleration were mentioned but only for purposes of contrast). The Defendants, of course, try to argue that this omission operates as a waiver. We think the Fund’s silence on this issue is evidence of lack of notice and surprise, not waiver. See R.J. Corman, 335 F.3d at 648.
We also think that the Fund was disadvantaged. Obviously, it was not put on notice that it might argue an entitlement to accelerate the debt under § 1399(c)(5)(A). What is worse, the Fund was twice denied the opportunity to introduce additional evidence — once when its oral proffer was denied, and again when its motion to supplement the record was denied. The Fund’s potential evidence included a supplemental declaration by an employee of the Fund, Phyllis Gabriel, who stated that bankruptcy is an event under plan rules that indicates a substantial likelihood that an employer will be unable to pay its withdrawal liability. This evidence might have supported an argument for acceleration under § 1399(c)(5)(B), a possibility that the district court apparently never considered and which the Fund never had an opportunity to fully present. Had it been able at least to file a reply brief, the Fund could have alerted the district judge to these potential bases for statutory acceleration. Under the present circumstances, we believe that the district court should not have granted summary judgment on damages before giving the Fund an opportunity to present its statutory argument. The judgment on damages is thus vacated and the case remanded for consideration of acceleration under the statute, including an opportunity for the Fund to present its views on that issue. The district court’s decision on acceleration is therefore vacated and remanded for further proceedings.
B.
The district court awarded liquidated damages based on the entire withdrawal liability assessment, including payments that, under the district court’s decision, were not yet due. The liquidated damages issue raised by the Defendants thus depends on a resolution of the acceleration issue.
An action for withdrawal liability under the MPPAA is treated as an action for delinquent contributions under ERISA. ERISA permits 20% of any delinquent contribution to be charged to a defendant as liquidated damages, see 29 U.S.C. § 1132(g)(2)(C)(ii). This is the penalty that the employer pays for forcing a plan sponsor to litigate. See Central States, Se. & Sw. Areas Pension Fund v. Lady Baltimore Foods, Inc., 960 F.2d 1339, 1342 (7th Cir.1992). But a contribution is delinquent only if the “employer fails to make timely payment.” 29 U.S.C. § 1401(d). Thus, we have held that liquidated damages should be due only on delinquent payments, not on the portions of the withdrawal liability that have not yet come due. See Century Motor Freight, 125 F.3d at 535. We think the district court was inconsistent in finding that there had been no acceleration and yet imposing liquidated damages on the entire withdrawal liability assessment. On remand, the district court may first determine whether the debt was ever accelerated and, if so, when acceleration occurred. Liquidated damages may then be assessed on the delinquent portion of the assessment.
C.
The final question before us is whether the Defendants’ interim payments should have been applied first to the principal or to the accrued interest. It is the practice of the Fund to apply payments first to accrued interest; this practice comports with the federal common-law rule known as the United States Rule. See Story v. Livingston, 38 U.S. (13 Pet.) 359, 371, 10 L.Ed. 200 (1839). The rule that payment is first applied to accrued interest “applies in the absence of ‘a clearly expressed intention’ by the parties to allocate payments in some other way,” and it “does not permit the debtor unilaterally to allocate payments to principal rather than interest.” S. Natural Gas Co. v. Pursue Energy, 781 F.2d 1079, 1088 n. 11 (5th Cir.1986) (citations omitted). Because the parties did not specify otherwise in this case, the Rule would appear to apply.
The district court held, however, that the common-law rule contradicted federal regulations stating that interest on overdue withdrawal liability should be paid only from the “due date” until the “date paid.” 29 C.F.R. § 4219.32(a)(1). The regulations specify that the “date paid” is deemed to be the “date on which [the payment of withdrawal liability] is received.” 29 C.F.R. § 4219.32(d). The district court stressed that the Fund had “received” several quarterly installment payments (albeit late payments) from the Defendants. Those quarterly installments had, according to the district court, thus been “paid” and no further interest could be charged on them.
The district court apparently assumed that the payments were earmarked for the principal. This, however, begs the question. In order to determine when the payment was “received,” we need to know how the payment is applied. If the payment received by the Fund is not applied to the principal but instead applied to the accrued interest, then a portion of the principal was never “paid” and interest continues to accrue on that unpaid portion. We see no contradiction between the federal common-law rule and the regulations. Indeed, the United States Rule was intended to fill this kind of interstitial gap and we believe that it should be applied here. The statute should be broadly construed to effectuate its remedial purposes, which are to protect plan participants and the solvency of pension funds. See Teamsters Joint Council No. 83 v. Centra, Inc., 947 F.2d 115, 123 (4th Cir.1991). The common-law rule encourages employers to pay the balance in full, and this comports with the remedial goals of the statute.
V.
We Affirm the judgment of the district court on liability but Vacate the judgment on damages and Remand the case for further proceedings.
. While the Defendants claim that they were no longer MPPAA employers at the time of the withdrawal, this defense needs to be raised in arbitration. See Banner Industries, 875 F.2d at 1288.
. When a schedule does not specify the date when the first installment is due, the first installment would presumably be due sixty days after the notice was received. See 29 U.S.C. § 1399(c)(2).
. Notes written in the margins of the Defendants’ copy of the proof of claim (as well as other documents) suggest that the Defendants were also aware of the potential consequences of failing to respond. The Defendants objected to the admission of these documents on the grounds of attorney-client privilege, despite the fact that these objections had already been waived in prior litigation. The Fund’s motion to compel was denied as moot after the district court ruled in the Fund's favor on liability. We need not consider these matters here.
. Further, if the Fund had intended to accelerate the debt, why did it send a second notice and demand years later with an entirely new, superceding schedule? While that notice did purport to “reserve” the Fund's rights, it is troubling that the Fund would send what appear to be alternative or inconsistent demands for payment.
. The Fund’s complaint had two counts. Count I was an action for the full amount of withdrawal liability, while Count II was an action for interim installment payments. In the opinion on liability, the district court ruled in favor of the Fund on Count I. The opinion on damages, however, seems to reflect a Count II award rather than a Count I award. Thus, there seems to be some tension in the decision.
. The attorney's fees issue can also wait until the resolution of these issues.
. For example, assume that an employer was obligated to make a $1,000 installment payment to a pension fund on a certain date but sent the $1,000 a month later, after $100 of interest had already accrued. If the fund has a practice of paying the accrued interest first, then the fund has only really "received” $900 toward the installment payment because $100 was applied to the interest.
|
CASELAW
|
Java Static Binding and Dynamic Binding - The Coding Shala
Home >> Learn Java >> Java Static Binding and Dynamic Binding
Java Static Binding and Dynamic Binding
What do you mean by Binding? Binding means connecting a method call to the method body. Binding determines the type of object. There are two types of binding available in Java:
• Static Binding
• Dynamic Binding
Java Static Binding and Dynamic Binding - The Coding Shala
Java Static Binding
If the type of object is determined at the compiled time by the compiler, it is known as Static Binding or Early Binding. Binding of all the static, private and final methods is done at compile time or called static binding. We know static, private and final methods can not be overridden and always accessed by an object of a local class. That's why the compiler can easily determine the object of class and binding is done at compile time.
Example of Java Static Binding
The following example explains Java Static Binding:
//Java Static Biniding Example
//thecodingshala.com
class Parent{
static void Display(){
System.out.println("This is parent class");
}
final void M1(){
System.out.println("M1 method of Parent class");
}
}
class Child extends Parent{
static void Display(){
System.out.println("This is Child class");
}
}
class Main{
public static void main(String[] args){
Parent p1 = new Parent();
p1.Display(); //static binding
p1.M1(); //static binding
Parent p2 = new Child();
p2.Display(); //final cannot be overridden
}
}
Output:
This is parent class
M1 method of Parent class
This is parent class
Java Dynamic Binding
When the type of the object is determined at run-time, it is known as dynamic binding. Overriding is an example of dynamic binding. Dynamic binding is also known as Late Binding. The compiler goes only by referencing variable not by the type of object and therefore dynamic binding happens at the run time.
Example of Java Dynamic Binding
The following example explains the Java Dynamic Binding:
//Java Dynamic Binding Example
//thecodingshala.com
class Parent{
void Print(){
System.out.println("This is parent class");
}
}
class Child extends Parent{
@Override
void Print(){
System.out.println("This is child class");
}
}
class Main{
public static void main(String[] args){
Parent p1 = new Parent();
p1.Print();
Parent p2 = new Child(); //dynamic binding
p2.Print();
}
}
Output:
This is parent class
This is child class
NOTE: Virtual methods binding is done during run time.
Java Virtual Function
In object-oriented programming, a virtual function or virtual method is a function or method whose behavior can be overridden within an inheriting class by a function with the same signature.
NOTE: Java does not have a virtual keyword.
All the non-static are considered as virtual by default. To remove the default virtual feature in each function we have to make it private or final in java classes.
Question: Why the static method is not a virtual method in Java?
Answer: We can override the static method but it will not give the advantage of polymorphism. It is called method hiding not method overriding so static methods are not the virtual method.
Other Posts You May Like
Please leave a comment below if you like this post or found some error, it will help me to improve my content.
Comments
Popular Posts from this Blog
Shell Script to find sum, product and average of given numbers - The Coding Shala
Single Number 3 LeetCode Solution - The Coding Shala
LeetCode - Number of Good Pairs Solution - The Coding Shala
Shell Script to Create a Simple Calculator - The Coding Shala
Java Method Overloading - The Coding Shala
|
ESSENTIALAI-STEM
|
Stress and Anxiety: How to Battle Panic Attacks?
If there is an emotion that seems more and more common, it is surely stress. Caused by workplace pressures, difficulty in managing your love life or in dealing with everything at once, money problem, etc., stress can be difficult to describe and recognize. As a result, it is sometimes hard to admit being a victim. Yet, to get rid of it, we need to talk about it. Here are the best solutions to avoid panic attacks.
Do Breathing Exercises to Reduce Stress and Anxiety
Respiration is physiological and vital. But when you suffer from stress, your breathing gets stuck. You breathe in an uncontrolled manner and become temporarily unable to keep up with your own body’s needs. Your breath gets shorter and faster, you may even feel like choking. Dizziness, sweating, chest pain, shaking legs, your whole-body shivers! And all of those symptoms further exacerbate the state of stress.
The best solution is to learn to breathe on https://www.intermittent-breathing.com/. As scientists confirm, good breathing can have real benefits on your physical and emotional balance. In addition to bringing oxygen to your cells, it improves the functioning of the digestive organs and eliminate your toxic waste. Plus, a deep inhalation followed by a slow expiration significantly reduces the production of noradrenaline which is one of the stress hormones. Eventually, doing adequate breathing techniques can calm your anxiety attacks and help you empty your head.
Listen to your Loved Ones and avoid Denial
When something is stressing you out, it is important to talk about it with caring relatives and friends even if the first reflex is often to take refuge in denial. It can be easier to invoke temporary fatigue, a bad flu that is taking time to heal or a seasonal soft blow. But you have to know that feeling supported can help boost morale and loneliness is another great stressor. However, take care not to confuse anxiety attack with anguished state. It is a time-limited event, accompanied by physical symptoms such as a sensation of choking, tetany of muscles and sometimes an impression impending death.
Relieve Stress and Anxiety with Sport
Many sporting activities have a beneficial effect on stress. Among them are swimming, shooting, yoga, tai chi, horse riding, water sports, etc. Sports trigger in the body the production of hormones called endorphins. These hormones induce a great feeling of well-being. Physical activities also force you to focus on something else than your dark thoughts, your work, and your private life troubles.
You may also like...
|
ESSENTIALAI-STEM
|
This is a short post on log rotating AWS Elasticsearch indices easily using curator
In the past I’ve made a simple docker container with curator and with a simple actions file for managing indices.
This worked great on my own installation of Elasticsearch that managed our logs on a small scale. The actions file was:
---
actions:
1:
action: delete_indices
description: >-
Rolling indeces accoring to filters
options:
ignore_empty_list: True
#disable_action: True
disable_action: False
filters:
- filtertype: pattern
kind: prefix
value: filebeat-
- filtertype: age
source: name
direction: older
timestring: '%Y.%m.%d'
unit: days
unit_count: ${DAYS_TO_KEEP:14}
And it was controlled in the docker run command, which host to work on and what old indices should be deleted, with environment variables.
docker run --rm ES_HOST=elastic_host -e DAYS_TO_KEEP=days_to_keep omerha/docker-elasticsearch-curator:latest
Using AWS Elasticsearch
But when using AWS Elasticsearch, even if you allow access to the elasticsearch domain completely, and using REST to access it and every thing works, using the same curator docker image will give you an authentication error. Amazon use IAM to control access elasticsearch and curator creates an elasticsearch client that requires authentication.
So, curator as is stopes working due to authentication issues.
Well, the solution is very simple, and requires couple lines of codes and move curator to work as a lambda function, that easily authenticate and does log rotate.
The trick is in the start of the function code using boto for retriving credential token, and then use the token in AWS4Auth object when building the elasticsearch client.
The git repo is https://github.com/omerh/curator-lambda-aws-es it requires you to create a new lambda, with python 3.7 runtime. With the lowest resources needed for run, and put the timeout to the max.
As explained in the README.md file, the Lambda need to in addition to the basic lambda stuff, access to elasticsearch domain
...
{
"Effect": "Allow",
"Action": [
"es:ESHttpPost",
"es:ESHttpGet",
"es:ESHttpPut",
"es:ESHttpDelete"
],
"Resource": "arn:aws:es:*:*:*"
}
...
Using cloudwatch event you can trigger it, I use rate(1 day) and the elasticsearch host and what indices to delete are controlled with the environment variables ES_HOST and DAYS
Note, that the index time string should be timestring='%Y.%m.%d' as it is the default for all major log shippers: metricbeat, filebeat, fluentd, fluent-bit, logstash and can be easily edited in the lambda function if you changed it for any reason.
That’s it. Short and simple.
If you want to here about log shippers, which one’s to use, leave a comment bellow and I’ll do my best to answer or post about it
|
ESSENTIALAI-STEM
|
A guitar and a violin are both in the stringed instruments family but in different categories. The guitar is under the plucking category while the violin is in the bowed category. You can play the guitar by plucking or strumming the strings while pressing down notes on the fretboard. Generally, you need a bow to play the violin but there are song pieces where plucking is also done.
The violin may be smaller than a guitar but it is louder than it because its resonating chamber is smaller. The guitar can be played with accompaniment and melody while the violin is best as a featured solo instrument in an orchestra setting as it plays melodic lines.
There are several critical differences between a guitar and a violin. The guitar is scale length. It is between 24 and 26 inches, but this will vary slightly between varied brands and styles of guitars. A violin has a much shorter scale length of 12.8 inches. The strings on the violin are about one half as long as the strings on a guitar. The violin is a much smaller instrument. A guitar has frets.
A violin has no frets, and this makes a tremendous difference in the tonal qualities of the instruments. A guitar has six strings. A standard violin has four strings. Also, typically, a violin is played by drawing a bow across the strings to create a long, ringing single note. Guitars are usually strummed or picked.
|
FINEWEB-EDU
|
Help with PHP script "... is your new bicycle"
Discussion in 'Web Design and Development' started by cleo, Mar 5, 2008.
1. cleo macrumors 65816
cleo
Joined:
Jan 21, 2002
Location:
Tampa Bay Area, FL, USA
#1
Ok, so awhile ago I picked up a domain and wasn't sure what I'd ever use it for, but Barack Obama is Your New Bicycle totally inspired me. I want to create a similar effect: "random" word or phrase pulled from file/array, displayed as self-referential link, script runs again (thus new phrase) each time the link is clicked.
Here's the thing: I know enough PHP (and am a good enough researcher) to put something like this together, but I suspect it would not be efficient at all. I also suspect that for many other people, whipping up such a script would take no time flat. So... is anyone out there willing to help a girl out here? I'd definitely appreciate any pointers you can offer.
(BTW, my impulse, having only used "random" effects to a limited extent (like choosing which logo to show on my tumblelog, where there are only, like, 5 options) is to do something like
Code:
$x = rand(1,10);
if ($x == 1) { $phrase = "Macrumors is awesome";
elseif...
But, like I said, that doesn't seem very efficient, when there are 50+ quotes/phrases and I have no idea how much traffic will ensue.]
2. angelwatt Moderator emeritus
angelwatt
Joined:
Aug 16, 2005
Location:
USA
#2
This may work for you. Just put all of the possible quotes into an array and then randomly access one of them.
PHP:
$quotes = array('Quote 1''Quote 2''etc');
$phrase $quotes[rand(0count($quotes)+1)];
echo
$phrase;
3. Zortrium macrumors 6502
Joined:
Jun 23, 2003
#3
You could also use a switch statement, which is going to be faster than a long series of if/else statements.
4. alfaphlex macrumors newbie
Joined:
Feb 18, 2008
#4
Using switch in place of redundant if/else statements is good programming, but in this case, it wouldn't be very practical. Everytime time he decides to add a new phrase, he'd have to type:
case x:
"whatever phrase";
break;
Not only that, but he would also have to update his "$x = rand(1,10);" line after each case. That's 3 lines of code added and 1 line changed for every entry, which only increases the % of error as well as file size.
Angelwatts solution is much more simple and practical. For any new phrase he wants to add, he would just need to type a comma followed by the new phrase in the array. Nothing else needs to be changed.
improving on angelwatts solution, an even simpler way would be:
PHP:
$quotes file("quotesfile.txt");
$phrase $quotes[rand(0count($quotes)+1)];
echo
$phrase;
Doing it this way, all you would need to do is create a quotesfile.txt and just add every quote as a new line (no quotations needed). The file() function would read the quotesfile and return it as the same array($quotes) in angelwatt's example. Now there's no need to even type quotations and commas for the phrases.
5. cleo thread starter macrumors 65816
cleo
Joined:
Jan 21, 2002
Location:
Tampa Bay Area, FL, USA
#5
Thx, all! I went with alfaphlex's variation, and it works great. The only problem is that every now and then, nothing appears (instead of a phrase). (The page footer appears, though, so it's not like the entire page goes fubar.) Could that be because of the
PHP:
count($quotes)+1
bit? I've been pondering the +1, and I just don't get it. Since rand is inclusive, shouldn't it be
PHP:
rand(1count($quotes))
? :confused:
6. angelwatt Moderator emeritus
angelwatt
Joined:
Aug 16, 2005
Location:
USA
#6
When I tested without the +1 I was getting blanks like you are now, which is why I added it. I didn't have any empty occurrences with this though, but didn't test a whole lot. The documentation says it is inclusive so you'll need to start at 0 rather than one, and the +1 should possibly be -1 since the last index in the array is one less than than the number of items (because indexes start at 0). So try -1 I guess and see if that alleviates it.
7. notjustjay macrumors 603
notjustjay
Joined:
Sep 19, 2003
Location:
Canada, eh?
#7
Check that the quotes file doesn't include blank lines at the end. Often when we edit text files we hit Enter a few extra times and a bunch of blank lines pool at the bottom.
If you want to be really robust, add a while (strlen($phrase) < 1) condition around the code (do not include the line that loads $quotes from the file).
8. alfaphlex macrumors newbie
Joined:
Feb 18, 2008
#8
Good tip notjustjay. Like angelwatt stated, it should be -1 instead of +1 for the array count because arrays start indexing from 0 and not one. Didn't notice it earlier because my intention was only to create the $quotes array with the file() function.
So the rand part should be:
PHP:
rand(0count($quotes)-1)
An easy way to make sure you get no empty results no matter how many empty lines are in your quotes.txt file:
PHP:
do{
// Do this until you get a result that is not empty
$phrase $quotes[rand(0count($quotes)-1)];
}while(
rtrim($phrase) == NULL);
That way you can have as many empty lines as you want in your txt file, lol. So the whole thing should now be:
PHP:
$quotes file("quotesfile.txt");
do{
// Do this until you get a result that is not empty
$phrase $quotes[rand(0count($quotes)-1)];
}while(
rtrim($phrase) == NULL);
echo
$phrase;
Share This Page
|
ESSENTIALAI-STEM
|
User:Vivek singh kushwah/Books/astrophysics 1
astrophysics 1
* Astrophysics
* Exoplanet
* Interstellar medium
* Star system
* Outer space
* Cosmic microwave background
* Dark matter
* Galaxy
* Compact star
* Sagittarius A*
* Supermassive black hole
|
WIKI
|
Talk:Trim
Usenet/e-mail meaning?
There seems to be no link to information about trimming messages in e-mail or newsgroup discussions; the process of removing useless information from messages in such discussions, as described in the inline replying section of the posting styles article. -- oKto siTe - talk 15:45, 12 February 2007 (UTC)
|
WIKI
|
From d0eb90e337dd2a205ecfd2d6afddfbc7ed1c0627 Mon Sep 17 00:00:00 2001 From: "jberlin@webkit.org" Date: Fri, 18 Mar 2011 16:36:57 +0000 Subject: [PATCH] inspector/console/command-line-api.html timing out on Windows 7 Release (WebKit2 Tests). https://bugs.webkit.org/show_bug.cgi?id=56633 Unreviewed, skip command-line-api-inspect.html instead of command-line-api.html, since the former appears to be causing the latter (and probably console-clear.html as well) to time out. * platform/win-wk2/Skipped: * platform/win-wk2/inspector: Removed. * platform/win-wk2/inspector/console: Removed. * platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt: Removed. git-svn-id: https://svn.webkit.org/repository/webkit/trunk@81477 268f45cc-cd09-0410-ab3c-d52691b4dbfc --- LayoutTests/ChangeLog | 14 ++++++++++++++ LayoutTests/platform/win-wk2/Skipped | 2 +- .../console/command-line-api-inspect-expected.txt | 9 --------- 3 files changed, 15 insertions(+), 10 deletions(-) delete mode 100644 LayoutTests/platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt diff --git a/LayoutTests/ChangeLog b/LayoutTests/ChangeLog index 7cd55fe..ae66c9e 100644 --- a/LayoutTests/ChangeLog +++ b/LayoutTests/ChangeLog @@ -1,3 +1,17 @@ +2011-03-18 Jessie Berlin + + inspector/console/command-line-api.html timing out on Windows 7 Release (WebKit2 Tests). + https://bugs.webkit.org/show_bug.cgi?id=56633 + + Unreviewed, skip command-line-api-inspect.html instead of command-line-api.html, since the + former appears to be causing the latter (and probably console-clear.html as well) to time + out. + + * platform/win-wk2/Skipped: + * platform/win-wk2/inspector: Removed. + * platform/win-wk2/inspector/console: Removed. + * platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt: Removed. + 2011-03-18 Sergio Villar Senin Added new GTK+ test expectations. diff --git a/LayoutTests/platform/win-wk2/Skipped b/LayoutTests/platform/win-wk2/Skipped index 2f8b472..b793e0d 100644 --- a/LayoutTests/platform/win-wk2/Skipped +++ b/LayoutTests/platform/win-wk2/Skipped @@ -102,7 +102,7 @@ fast/forms/button-align.html media/audio-mpeg4-supported.html # Times out http://webkit.org/b/56633 -inspector/console/command-line-api.html +inspector/console/command-line-api-inspect.html # Times out http://webkit.org/b/56634 http/tests/xmlhttprequest/cross-origin-authorization.html diff --git a/LayoutTests/platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt b/LayoutTests/platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt deleted file mode 100644 index 0be85e1..0000000 --- a/LayoutTests/platform/win-wk2/inspector/console/command-line-api-inspect-expected.txt +++ /dev/null @@ -1,9 +0,0 @@ -CONSOLE MESSAGE: line 9: SECURITY_ERR: DOM Exception 18: An attempt was made to break through the security policy of the user agent. -layer at (0,0) size 800x600 - RenderView at (0,0) size 800x600 -layer at (0,0) size 800x600 - RenderBlock {HTML} at (0,0) size 800x600 - RenderBody {BODY} at (8,8) size 784x576 - RenderBlock {P} at (0,0) size 784x18 - RenderText {#text} at (0,0) size 281x18 - text run at (0,0) width 281: "Tests that inspect() command line api works." -- 1.8.3.1
|
ESSENTIALAI-STEM
|
Predicting sepsis severity at first clinical presentation: The role of endotypes and mechanistic signatures
Summary
Background
Inter-individual variability during sepsis limits appropriate triage of patients. Identifying, at first clinical presentation, gene expression signatures that predict subsequent severity will allow clinicians to identify the most at-risk groups of patients and enable appropriate antibiotic use.
Methods
Blood RNA-Seq and clinical data were collected from 348 patients in four emergency rooms (ER) and one intensive-care-unit (ICU), and 44 healthy controls. Gene expression profiles were analyzed using machine learning and data mining to identify clinically relevant gene signatures reflecting disease severity, organ dysfunction, mortality, and specific endotypes/mechanisms.
Findings
Gene expression signatures were obtained that predicted severity/organ dysfunction and mortality in both ER and ICU patients with accuracy/AUC of 77–80%. Network analysis revealed these signatures formed a coherent biological program, with specific but overlapping mechanisms/pathways. Given the heterogeneity of sepsis, we asked if patients could be assorted into discrete groups with distinct mechanisms (endotypes) and varying severity. Patients with early sepsis could be stratified into five distinct and novel mechanistic endotypes, named Neutrophilic-Suppressive/NPS, Inflammatory/INF, Innate-Host-Defense/IHD, Interferon/IFN, and Adaptive/ADA, each based on ∼200 unique gene expression differences, and distinct pathways/mechanisms (e.g., IL6/STAT3 in NPS). Endotypes had varying overall severity with two severe (NPS/INF) and one relatively benign (ADA) groupings, consistent with reanalysis of previous endotype studies. A 40 gene-classification tool (accuracy=96%) and several gene-pairs (accuracy=89–97%) accurately predicted endotype status in both ER and ICU validation cohorts.
Interpretation
The severity and endotype signatures indicate that distinct immune signatures precede the onset of severe sepsis and lethality, providing a method to triage early sepsis patients.
Introduction
Sepsis is defined by a dysfunctional, life-threatening response to infection leading to (multi-)organ dysfunction and failure. The global burden is high, with an estimated 48.9 million cases of sepsis worldwide in 2017, leading to 11 million deaths, nearly 1 in 5 global deaths.
• Rudd K.E.
• Johnson S.C.
• Agesa K.M.
• et al.
Global, regional, and national sepsis incidence, and mortality, 1990–2017: analysis for the global burden of disease study.
|
ESSENTIALAI-STEM
|
User:Israel duque/sandbox
Boca Del Rio,San Pedro town
{{Infobox settlement
* name = San Pedro Town
* official_name = Town of San Pedro, Ambergris Caye
* settlement_type = Town
* nickname = La Isla Bonita
* image_skyline = San Pedro, Belize - Collage.png
|
WIKI
|
# these are the variables your Makefile.am should set # the example is based on the colorbalance interface #glib_enum_headers=$(colorbalance_headers) #glib_enum_define=GST_COLOR_BALANCE #glib_gen_prefix=gst_color_balance #glib_gen_basename=colorbalance enum_headers=$(foreach h,$(glib_enum_headers),\n\#include \"$(h)\") # these are all the rules generating the relevant files $(glib_gen_basename)-marshal.h: $(glib_gen_basename)-marshal.list $(AM_V_GEN)$(GLIB_GENMARSHAL) --header --prefix=$(glib_gen_prefix)_marshal $^ > $(glib_gen_basename)-marshal.h.tmp && \ mv $(glib_gen_basename)-marshal.h.tmp $(glib_gen_basename)-marshal.h $(glib_gen_basename)-marshal.c: $(glib_gen_basename)-marshal.list $(AM_V_GEN)echo "#include \"$(glib_gen_basename)-marshal.h\"" >> $(glib_gen_basename)-marshal.c.tmp && \ $(GLIB_GENMARSHAL) --body --prefix=$(glib_gen_prefix)_marshal $^ >> $(glib_gen_basename)-marshal.c.tmp && \ mv $(glib_gen_basename)-marshal.c.tmp $(glib_gen_basename)-marshal.c $(glib_gen_basename)-enumtypes.h: $(glib_enum_headers) $(AM_V_GEN)$(GLIB_MKENUMS) \ --fhead "#ifndef __$(glib_enum_define)_ENUM_TYPES_H__\n#define __$(glib_enum_define)_ENUM_TYPES_H__\n\n#include \n\nG_BEGIN_DECLS\n" \ --fprod "\n/* enumerations from \"@filename@\" */\n" \ --vhead "GType @enum_name@_get_type (void);\n#define GST_TYPE_@ENUMSHORT@ (@enum_name@_get_type())\n" \ --ftail "G_END_DECLS\n\n#endif /* __$(glib_enum_define)_ENUM_TYPES_H__ */" \ $^ > $@ $(glib_gen_basename)-enumtypes.c: $(glib_enum_headers) @if test "x$(glib_enum_headers)" = "x"; then echo "ERROR: glib_enum_headers is empty, please fix Makefile"; exit 1; fi $(AM_V_GEN)$(GLIB_MKENUMS) \ --fhead "#include \"$(glib_gen_basename)-enumtypes.h\"\n$(enum_headers)" \ --fprod "\n/* enumerations from \"@filename@\" */" \ --vhead "GType\n@enum_name@_get_type (void)\n{\n static volatile gsize g_define_type_id__volatile = 0;\n if (g_once_init_enter (&g_define_type_id__volatile)) {\n static const G@Type@Value values[] = {" \ --vprod " { @VALUENAME@, \"@VALUENAME@\", \"@valuenick@\" }," \ --vtail " { 0, NULL, NULL }\n };\n GType g_define_type_id = g_@type@_register_static (\"@EnumName@\", values);\n g_once_init_leave (&g_define_type_id__volatile, g_define_type_id);\n }\n return g_define_type_id__volatile;\n}\n" \ $^ > $@ # a hack rule to make sure .Plo files exist because they get include'd # from Makefile's .deps/%-marshal.Plo: @touch $@ .deps/%-enumtypes.Plo: @touch $@
|
ESSENTIALAI-STEM
|
2016–17 FC Banants season
The 2016–17 season was FC Banants's sixteenth consecutive season in the Armenian Premier League. The club finished the previous season in 5th and reached the Semifinal of the Armenian Cup.
Appearances and goals
* colspan="14"|Players who left Banants during the season:
* colspan="14"|Players who left Banants during the season:
* }
|
WIKI
|
1992 Sierra Leonean coup d'état
The 1992 Sierra Leonean coup d'état was a coup d'état against the government of Sierra Leone by a group of young military officers led by 25-year-old Captain Valentine Strasser on 29 April 1992. Strasser took control of the government, deposing President Joseph Saidu Momoh.
Background
Sierra Leone had been governed since 1968 by the All People's Congress, which, after a constitutional referendum in 1978 suspected of being rigged, had become the sole legal party. Corruption and mismanagement had run rampant, both under Momoh and his predecessor, Siaka Stevens.
In March 1991, the country was plunged into the Sierra Leone Civil War, pitting the government against the invading Revolutionary United Front, under the command of Foday Sankoh. Front-line government soldiers were poorly supplied and fed, and some complained they had not been paid for three months. Captain Strasser witnessed the deplorable conditions firsthand, being assigned to a unit fighting the rebels. When he received a shrapnel wound, he became disgruntled when he found he could not be evacuated.
The coup
Strasser and other junior officers organised a coup. They took a convoy to Freetown, the capital, and seized the State House, where Momoh's office was located, though Momoh had not yet arrived. The State House was briefly recovered by loyal troops, but soon fell back into the mutineers' hands. When Momoh was found, he was sent into exile by helicopter to Guinea.
Results
Joseph Opala, an American historian who had spent much of his adult life in the country, was rounded up and dispatched to the American ambassador to see if the US government would recognise the new regime. African-American ambassador Johnny Young stated that, while it was not generally done, an exception would be made in this case because the previous government had not been democratically elected and also because of the desperate state of the country.
Banning all political parties, the National Provisional Ruling Council was formed as the new government. Parliament was dissolved.
|
WIKI
|
1907 WAFL Grand Final
The 1907 WAFL Grand Final was an Australian rules football game contested between the Perth Football Club and the East Fremantle Football Club, on 28 September 1907 at the Claremont Showground, to determine the premier team of the West Australian Football League (WAFL) for the 1907 season.
One of the most controversial matches in the league's history, the match was won on the day by East Fremantle by five points, then overturned on protest and awarded to Perth after the free kick which led to one of East Fremantle's goals was judged to have been awarded after the half time bell. The final result was a one-point win to Perth, 6.6 (42) d. 5.11 (41). It was Perth's first premiership.
Background
and had been the strongest teams in the 1907 WAFL season, each finishing the home-and-away season with a 14–3 record; East Fremantle won the minor premiership by percentage. Those two clubs qualified for the grand final with wins in their semi-finals: East Fremantle defeated third-placed by ten points; and Perth defeated fourth-placed by four points. South Fremantle lodged a protest against the loss, arguing that one of its goals had been improperly changed to a touched behind by the field umpire, but this was dismissed.
This match was certain to decide the season's premiership: since the teams entered the match with equal win–loss records and the finals were played under the first amended Argus system, there was no possibility for a challenge match.
Match
The match was played in fine weather conditions, with a very slight southerly breeze, at the Claremont Showground, with an estimated 8,500 in attendance. Ivo Crapp served as field umpire.
First quarter
In a first quarter which favoured East Fremantle, both teams had several early attacking chances repelled. However, ill discipline from Perth saw East Fremantle claim several free kicks and gain many of the best chances. East Fremantle scored first after ten minutes when Harry Sharpe kicked a behind; and soon after, Sharpe passed the ball to Billy McIntyre who kicked the game's opening goal. McIntyre scored another behind shortly afterwards, giving East Fremantle an eight point advantage. Another East Fremantle attack was marked at the goal-face by Perth defender Ronald Southee and repelled.
Perth advanced next, benefitting from two free kicks, from the second of which Ossie Winton scored their opening goal. East Fremantle pressed next, scoring two behinds (Sharpe from a long place kick and McIntyre after a pass from Sharpe). Perth scored one more behind, from Harry Nankervis, before the end of the quarter.
At quarter time, East Fremantle 1.4 (10) led Perth 1.1 (7) by only three points, despite overall having the better of the quarter, with better marking and teamwork compared with Perth, whose kicking efficiency was poor.
Second quarter
Perth had the better of the chances in the second quarter, with several rushes forward throughout the quarter which made the game challenging for the East Fremantle defenders. Harry Edmondson and Eddie Thompson both missed with early chances. Edmondson missed another shot later; but then kicked Perth's second goal after intercepting the kick-off from that behind. Perth attacked from the ensuing centre bounce, and Billy Orr kicked Perth's third goal from a snap shot. It was not until late in the quarter that play evened up, with both teams had several attacking chances repelled, with no more scores until the very end of the quarter.
Just after the bell rang for half time, East Fremantle half-forward Charles Doig was awarded a free kick for holding the man against St. John Kennedy in a ground contest; he kicked a goal from his after-the-siren kick to narrow the on-field margin to six points, Perth 3.4 (22) leading East Fremantle 2.4 (16). It was this free kick, and conjecture over whether it was awarded before or after the half time bell, which led to the Perth's protest after the game, and this goal which was ultimately removed from the score.
Third quarter
East Fremantle took control the game in the third quarter. Early pressure resulted in a behind to Dolly Christy, then a goal to Albert Heinrichs from a snap shot. Orr received a wide-angle free kick, which missed. Late goals were scored by George Brown and Christy. Perth had four scoring chances in the quarter, but managed only two behinds. A three-quarter time, the on-field score showed East Fremantle 5.8 (38) leading Perth 3.6 (24) by 14 points.
Final quarter
East Fremantle opened the final quarter with a strong attack, Sharpe kicking another goal from a snap shot to extend the on-field margin to 20 points and prompt some portions of the crowd to leave. Perth then swung the momentum of the game, making several attacking raids over the next ten minutes, netting three goals: the first came from mark by Edmondson, the second from Roy Wilson, and the third from Nankervis. With twelve minutes remaining, the on-field score showed East Perth only four points ahead, and soon after they increased the margin to five. However, Perth had all of the remaining attacking chances; Orr and Wilson both had late chances to kick goals, but neither scored. Perth continued to attack, but the final bell sounded before they could score again. The final onfield score showed East Fremantle 6.11 (47) defeating Perth 6.6 (42) by five points.
Overall
The Sunday Times' sportswriter considered East Fremantle wingman Archie Strang the best player on the ground, who was able to both contribute strongly and beat Perth star Andrew Ferguson in his position. East Fremantle ruckman Albert Heinrichs was also singled out for praise. Perth's team performance was relatively even, with veteran forward Jack Leckie the team's best on the day.
Protest
After the match, Perth lodged two points of protest against the result of the game: 1. That the goal kicked by Charles Doig at half time was wrongly recorded, inasmuch as the free from which it was kicked was awarded after the ringing of the bell 2. That the goal kicked by George Brown was wrongly awarded to East Fremantle in the third quarter and should have been scored a behind. The WAFL board of management met on Tuesday 1 October to discuss the protest, in a meeting which ran until after midnight.
Doig goal
Umpire Ivo Crapp testified his recollection of the free kick against St. John Kennedy, recalling that he blew his whistle, and then heard the bell immediately afterwards. He testified that had he would have conferred with the timekeepers had he not been sure that his whistle had beaten the bell.
The two timekeepers, one provided by each club, gave very different accounts of the incident. Perth timekeeper Frank Kennedy, who rang the bell, testified that he had finished ringing it about two seconds before Crapp blew his whistle; upon seeing that Crapp had awarded a free kick, he rang it again, then reported the issue to the Perth secretary. East Fremantle timekeeper R. G. Salter, testified that he heard the whistle five seconds before Kennedy began to ring the bell. Salter also admitted to having a 10/– bet with a friend on East Fremantle to win the game, but denied this affected his impartiality as a timekeeper.
Perth submitted a total of 47 witnesses, all testifying that they had heard the bell prior to the whistle, usually by somewhere between two and fifteen seconds. Witnesses included: the penalised player St. John Kennedy; the goal umpire J. Webb, a delegate from, who had begun leaving the field before returning to adjudicate on the goal; delegates from several other clubs and private citizens who were spectators at the match, including two who famously testified to having left for the bar after hearing the bell; and several Perth players including Henry Edmondson, captain John Leckie, Lou Cherry, and Dick Kennedy. Kennedy claimed to have spoken with Crapp about the timing of the bell on the field, and Crapp denied having the conversation.
East Fremantle presented only five witnesses, who testified that the bell went two to five seconds after the whistle, including: match boundary umpire Ernest Cooper, official scorer Jefferys, the free kick recipient Charles Doig, and East Fremantle player Dick Sweetman.
The relevant sub-clauses of the Laws of the Game at that time read:
* From Law 4: "At the first sound of the bell the ball shall be dead, but in the event of a player having marked the ball before the bell has rung, he shall be allowed his kick..."
* From Law 14: "The controlling body shall appoint for each match a field umpire, who shall have full control of play."
* From Law 16: "Two goal umpires shall be appointed for each match. They shall be sole judges of goals and behinds, and their decision shall be final, except in cases where the ball has become dead, either by ringing of the bell or by decision of the field umpire... a goal or behind given in accordance with the above cannot be annulled."
East Fremantle cited the interaction between Laws 14 and 16 as supporting the dismissal of the protest, while Perth also claimed the support of Law 16. There was ambiguity in the interpretation of Laws 4 and 14, in that it was not clear whether or not the field umpire's 'full control of play' included adjudicating the timing of the bell.
Following the presentation of evidence, the Appeals Board upheld Perth's protest, finding that the weight of evidence supported that the bell had first been rung prior to the whistle, and therefore that the free kick and resultant goal were improperly awarded. Doig's goal was struck from the record, and the result of the match was amended to a Perth victory, 6.6 (42) d. 5.11 (41).
Brown goal
Perth's second point of protest contended that Brown's goal in the third quarter could have been improperly awarded, based on a conversation alleged to have been overheard between central umpire Crapp and goal umpire Webb, in which Webb expressed doubt over whether a goal or behind had been scored before awarding the goal; the identity of the person who heard the conversation was not given. Perth's protest did not directly call for the score to be reversed, but rather for Webb to explain his decision. Webb denied the conversation and demanded an apology, and Perth withdrew the second point of protest.
Reaction
The decision drew surprise from many observers. In particular, many noted that while Perth's position was supported a greater number of witnesses, East Fremantle's position was supported by the higher calibre of witnesses whose statements should have had more weight, including all of the game's appointed neutral officials. (Goal umpire J. Webb, who testified for Perth, was not an appointed goal umpire, but a delegate who agreed at the last minute to cover the appointed goal umpire's absence). The Appeal Board was also criticised for allowing the clubs to submit club-affiliated witnesses at all, pointing to the League's refusal to allow to submit outside witnesses when it protested its semi-final loss against Perth only two weeks earlier; this led to Perth's numbers advantage in witnesses, as East Fremantle had elected not to bring outside witnesses on the expectation that they would not be permitted. Among the critics was East Fremantle captain Tom Wilson, who raised both points in a published news article the following day.
Fremantle newspapers reacted negatively to the news. The Evening Mail took a scathing line, leading with the headline "Perth premiers: beaten in football, they win in argument" in an acerbic article decrying the decision; the Empire was more measured in its language, but accused the largely Perth-based appeals board of regional and classist bias against the Fremantle-based clubs for both this decision, and the semi-final decision against South Fremantle.
Perth captain Jack Leckie commented "there is not a single man in the team who would not rather have done without [the premiership] than accept it under such conditions", and wished that the appeals board had declared no result and a rematch, rather than reverse the result of the game.
Aftermath
Before the 1 October meeting closed, Perth stated that it did not want to win the premiership on the protest, and offered East Fremantle a rematch for the following Saturday; however, at the regular League meeting on 2 October, the league ruled out an official rematch, as it would have required three weeks' procedural notice to change the rules governing the premiership; East Fremantle also declined an unofficial exhibition match.
Following the game, Perth and the Goldfields Football League's premier Boulder City attempted to arrange a fixture to decide the West Australian State Premiership as part of Boulder City's post-season visit to the coast; however, scheduling difficulties prevented this. In particular, Boulder City had arranged a match with South Fremantle on Fremantle Oval for its last Saturday on the coast; in an act of solidarity, South Fremantle yielded the fixture to East Fremantle, but refused to yield it to Perth; and, since the State Premiership was technically a tour match arranged privately between the clubs, the league had no power to change South Fremantle's mind. Some Fremantle newspapers still promoted the game as the State Premiership, although it is not recognised as such, and Boulder City 8.9 (57) defeated East Fremantle 5.3 (33).
On 30 October, East Fremantle tabled a letter asking the League to refer the matter of the premiership to the Australasian Football Council, which was turned down. The East Fremantle delegate threatened to take the appeal to the Supreme Court of Western Australia, but the threat was empty.
In November 1910, the Australasian Football Council amended Law 4, adding the sentence "the field umpire shall be the sole judge as to the first sound of the bell," to the law, formally resolving any ambiguity between Laws 4 and 14. Perth's protest would certainly have been dismissed under the amended law; and similar protests, which until 1910 were often successful if there was reasonable evidence about the timing of the bell, were thereafter almost never upheld.
|
WIKI
|
Talk:Fama Fraternitatis
Rose Cross & the Templars
There are huge similarities between the organisation and ideals of the Fraternity of the Rose Cross in the Fama Fraternitas and the original organisation and ideals of the Knights Templar when it was only nine rather penniless knights (interestingly there are supposed to be only 9 Brothers of the RC according to the FF. Even more interestingly, the ninth original Templar remains unnammed and unidentified to this day). Given the link between the use of the image of the Rose Cross by the Lisbon Templars this might have some credence behind it. The Portuguese Templars, along with the Scots Templars, were one of the branches which didn't get arrested and put on trial. The King of Portugal thought the charges were fake and found his Templars not guilty, no-one knows quite why the Scots Templars got away... ahem... Scot-free. :-) If there is a link between the Templars and the Rosicrucians it would make sense of the legend that Christian RC spent a lot of time in the Middle East talking to Arab mystics and doctors. The Templars were accused of spending a little too much time with the Sufis, as did St Francis of Assissi apparently. The Templar/RC connection becomes even more interesting when one considers that the year in which Max Heindel claims the movement was founded (1313) was the year in which the Templars were finally liquidated by Philip the Fair of France's bullying of the Pope.
On the other hand, it could all just be a load of hocus-pocus. ;-) ThePeg 17:39, 17 January 2007 (UTC)
Here's a reference. You decide:
"Together with seven other knights [Hugues de Payen and Godfrey de St Omer] proposed to guard the pilgrims as they made their way to and from the Holy Places. But they would not do so as regular knights - they would live as a small monastic community, following the rule of St Augustine... The King approved the plan and, on Christmas Day, Hugues and Godfrey swore vows of poverty, chastity and obedience... Within weeks of the founding of the Order, the Templars were introduced to the clergy at the Council of Nablus. The nine knights were accepted by those present and Hugues and his brothers began their task of policing the kingdom. The other founding knights were : Payen de Montdidier; Andre de Montbard; Archambaud de St Aignan, Geoffrey Bisol; two knights known only by their Christian names or Roland and Gondemar; while the ninth member remains unknown" The Knights Templar by Sean Martin, Page 25, ISBN<PHONE_NUMBER>
also from the same book, page 31:
"In his speech, Hugues described the origins of the Order and the rule by which they lived; communal meals taken in silence; plain clothing; no women. Each brother swore vows of poverty, chastity and obedience upon entering the Order. As the brethren were frequently called out of the Temple on knightly business, they were each allowed one horse and a handful of servants. When away from the Temple, recitation of paternosters replaced hearing the offices. Knights and their servants were under Hugues' command, with the whole order being answerable to the Patriarch of Jerusalem"
Compare all this to what the Brethren of the RC undertake in their vows. V interesting. :-) ThePeg 20:19, 17 January 2007 (UTC)
Identities
The article identifies two of the Brothers of the RC as Johannes Andreae and Francis Bacon. This is fine except for the fact that we don't know this for sure. Its purely supposition (Bacon, for instance, was not a painter or an architect), even though the initials fit and even though it may be correct. Shouldn't there be some note in the article about this?
Also, there seems to be a connection between Dee and the Rosicrucians. Although it doesn't feature in the Fama or the Confessio Dee's Hieroglyphic Monad features on the opening pages of the Chymical Wedding of Christian Rosenkreutz which is believed to be written by Andreae. Frances Yates posits that Andreae and Dee may have met during Dee's travels in Europe, probably in Bohemia, which, incidentally, is where Max Heindel claims the secret location of the Ascended Rosicrucians is located (Bohemia is also the English translation of the word Boehme, as in Jakob Boehme). Since Dee invented the Monad it seems likely that Andreae, in using it, either knew him or his work. Of course, it may have got to Andreae via Bacon, if Bacon really was a Rosicrucian etc. Bacon and Dee were contemporaries after all. ThePeg 14:12, 23 January 2007 (UTC)
* The initials identification contains a "?": the idea at the time was to express with it, as you correctly stated, that it is a "purely supposition", but perhaps this should be clearly stated in the article, that it is just a supposition. —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 22:51, 31 January 2007 (UTC).
Group Authorship
Does anyone know if anyone has put forward the theory that the Fama and Confessio were composed through a group authorship? They are presented as statements of a brotherhood but there is a sense to the writing that it has been composed by consensus as a group statement as opposed to the Chymical Wedding which has a very distinct style. If you look at other Rosicrucian texts (eg John Heydon's The Rose Cross Unveiled) they feel more individual. These seem more committee composed.
Also, is it not possible, in terms of Christian Rosenkreutz's putative existence that the Fama contains a mixture of allegory and fact? There may well have been a guy who did all these things (went to Arabia, Spain etc) who used the name C R as a pseudonym whose life is loosely described here. This is mixed up with the more allegorical description of the Tomb and finding his body etc. The whole R C manifestoes phenomema is sometimes described as a Ludibrium - ie a game-playing text which contains a mixture of literal and allegorical truth as well as genuine obscurantism so as to discover who is able to penetrate the truth or not - he who has ears to hear, let them hear - this might be a useful way of understanding the two documents. The texts are full of vieled references to a host of ideas Alchemical, Gnostic, Hermetic, Kaballistic, Sufic and mainstream Judaic, Christian and Islamic. Perhaps the riddle of them both is that they can only be understood when a lot of other things have been understood, then one might get to the truth. Does anyone know if this has been explored? ThePeg 17:13, 23 January 2007 (UTC)
* I surely do agree with your last comment: that is also the reason why the article mentions several authors and some philosophical concepts (i.e. rebirth and the Christic transmutation) and it is not limited only to an historic 'orthodox' approach. Obviously, the article, which was just edited as an initial attempt to understand deeper the "mixture of allegory and fact", may be improved with enlightening contributions; I guess this should be welcome when done with an altruistic purpose: in the sense that it was stated that a fundamental requisite is "that we be earnest to attain to the understanding and knowledge of philosophy". May you somehow add the above clarifying research of yours into the article or even re-construct the article itself? I think am not able advance it any further, at least not at this time. Thank you. —The preceding unsigned comment was added by <IP_ADDRESS> (talk) 23:16, 31 January 2007 (UTC).
Ok. You might also want to look at this link re the Fama: http://map.twentythree.us/board/index.php?board=4;action=display;threadid=144&start=0 ThePeg 14:05, 2 February 2007 (UTC)
The Name
Why is it called the Fama Fraternitatis? What is the significance of the name? Thanks. —Preceding unsigned comment added by Rockwell1916 (talk • contribs) 18:04, 8 June 2010 (UTC)
|
WIKI
|
Lawmakers, press hit the courts for charity tennis event | TheHill
Lawmakers and journalists teamed up Tuesday night for a good cause, hitting the court for the seventh Washington Kastles Charity Classic tennis tournament. The clouds parted just in time for attendees to watch Team Stripes beat Team Stars at the Kastles' new stadium in Union Market. The annual event raised money for Washington, D.C., charities, including the DC Ed Fund, N Street Village and Food & Friends. It was a bipartisan affair, with lawmakers from both parties, including Sen. Shelley Moore CapitoShelley Wellons Moore CapitoAmerica is in desperate need of infrastructure investment: Senate highway bill a step in the right direction On The Money: Economy adds 164K jobs in July | Trump signs two-year budget deal, but border showdown looms | US, EU strike deal on beef exports Trump border fight throws curveball into shutdown prospects MORE (R-W.Va.), Reps. Jared HuffmanJared William HuffmanDemocrats see window closing for impeachment Appetite for Democratic term limits fizzling out The Hill's Morning Report — Mueller testimony gives Trump a boost as Dems ponder next steps MORE (D-Calif.) and William TimmonsWilliam Evan TimmonsThe Hill's Morning Report — Mueller testimony gives Trump a boost as Dems ponder next steps The Hill's 12:30 Report: Muller testimony dominates Washington Lawmakers, press hit the courts for charity tennis event MORE (R-S.C.), and former Rep. Charlie DentCharles (Charlie) Wieder DentThe Hill's Morning Report — Mueller testimony gives Trump a boost as Dems ponder next steps The Hill's 12:30 Report: Muller testimony dominates Washington Lawmakers, press hit the courts for charity tennis event MORE (R-Pa.) taking part. Among the media participants were CNN reporter Michelle Kosinski, network president Jeff Zucker, and Wolf Blitzer, host of "The Situation Room." The Hill, a media sponsor of the event, was represented by Editor-in-Chief Bob CusackRobert (Bob) CusackThe Hill's Editor-in-Chief: Biden's lack of energy is an issue The Hill's Morning Report — Trump and the new Israel-'squad' controversy The Hill's Morning Report — Will Congress do anything on gun control? MORE. And tennis icon Nick Bollettieri was on hand as one of the event's celebrity coaches. Bollettieri jokingly pleaded the Fifth when asked whether Republicans or Democrats were the better tennis players in the event. But he opened up to talk about the importance of coming together for a worthy cause. “It’s all about helping inner-city children and that’s why I am here,” he said. “The future of America is based on young children and if they don’t have hope that they can reach their dreams, America will be in more trouble than it is today.” It was a competitive match with the Stripes, represented by tennis star Bruno Soares and D.C. United coach Ben Olsen, taking the first set in a 7-5 tiebreaker over the Stars' Yoshihito Nishioka, who plays for the Kastles, and Kastles owner Mark Ein. Kastles coach Murphy Jensen emceed the event and kept the mood light-hearted. At one point during the tournament, when CNN's Jeff Zucker took the court, Blitzer took over the umpire chair. The match was a close and hard-fought affair, with the Stripes ultimately prevailing by one point. ABC News chief White House correspondent Jonathan Karl was honored with the MVP award. Round 1 was full of chest bumps and laughs! Stripes up 7-5 after the first... #WKCC #KastlesStadiumatUnionMarket pic.twitter.com/4grp4ZF6N8 A little rain can’t slow me down. “Love” playing in @WashKastles’ charity classic tonight! #WKCC pic.twitter.com/MkfzNRKwEX View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
|
NEWS-MULTISOURCE
|
Porte de Champerret station
Porte de Champerret is a station on Paris Métro Line 3.
Location
The station is located under Boulevard Berthier between Rue de Courcelles and Avenue de Villiers. Oriented along a northeast–southwest axis, it is situated between the Louise Michel and Pereire stations and is extended by an old terminal loop.
History
The station is named after the Porte de Champerret, a gate in the nineteenth century Thiers Wall of Paris on the way to the hamlet of Champerret, which was merged with the commune of Levallois-Perret in 1867. The station was opened on 15 February 1911, when the line was extended from Pereire and was the western terminus of the line until its extension to Pont de Levallois – Bécon on 24 September 1937. It then became a transit station with the commissioning of the extension to the current terminus at Pont de Levallois - Bécon. The turning loop, under which the new tunnel passes, is now used as a depot.
As part of the RATP's Renouveau du métro program, the station's corridors were renovated on 21 September 2002.
In 2018, 3,431,010 travelers entered this station, which placed it at the 158th position of the metro stations for its frequency.
Access
The station has three entrances divided into four metro outlets, each embellished with a Dervaux type balustrade:
* access 1 - "Place Stuart-Merrill" comprising two fixed staircases indicated by the same mast with a yellow "M" inscribed in a circle, emerging at the eastern corner of this place near the Square Jérôme-Bellat;
* access 2 "Avenue Stéphane-Mallarmé - Espace Champerret", consisting of a fixed staircase lined and an ascending escalator, located in the heart of Place Stuart-Merrill, occupied by a dedicated bus station;
* access 3 - "Avenue de Villiers", consisting of a fixed staircase decorated with a Dervaux candelabra, located at the right of no. 141 of this avenue.
Platforms
Porte de Champerret is a station with a particular configuration. Because of its status as a former terminus, it has four tracks, distributed in two identical half-stations (one per direction) with two tracks framing an island platform under an elliptical vault, layout which it shares with Château de Vincennes on line 1 and Porte de la Villette on line 7. The tracks framing the axial pedestal are used by ordinary traffic on the line, the other two being dedicated to a depot for trains and giving access only to the old terminal loop westbound.
The decoration is classic with bevelled white ceramic tiles covering the walls, the vault, and the tunnel exits, while the lighting is provided by tubes and spotlights. The advertising frames are metallic and the name of the station is inscribed on enameleld plates, in capital letters on the side walls and in Parisine font on the platforms as well as the central wall. The seats are yellow motte style.
Bus connections
The bus station near the station is the terminus of several bus lines. The station is served by lines 84, 92, 93, PC, 163, 164 and 165 of the RATP Bus Network and, at night, by lines N16 and N52 of Noctilien bus service.
Nearby
* Espace Champerret
* Square Jérôme-Bellat
* Église Sainte-Odile
* Square Sainte-Odile
|
WIKI
|
Opinion | Why Do I Love Bollywood?
Aatish Taseer On a burning-hot afternoon last month, I found myself bawling my guts out in a Times Square movie theater. I was watching “Sultan,” a nearly three-hour-long Bollywood extravaganza that was released in July and is already one of the highest grossing Indian films ever. I am forever second-guessing my relationship with Bollywood. The films are simultaneously operatic, commercial and jingoistic. I fancy myself a connoisseur of more subtle emotions, and so it’s natural that I recoil from these melodramas that try, as Salman Rushdie once said, “to contain the whole of life.” And yet there I was, swallowed up in the middle of the afternoon by this behemoth of a film — with rollicking dance numbers — about a former Olympic wrestler from a small town trying to make a comeback in the big city as a fighter on TV. Three hours later, I was spat out an overwrought wreck. When I told a writer friend the whole story, he tried to console me. “How much of your bawling during ‘Sultan’ was just about missing India?” he asked. None, sadly. I had been away only a few weeks. Besides, I bawl at Bollywood films when I’m in India, too. “They affect me,” I wrote back. “I can’t help it!’’ There is something about a big, popular art form that dramatizes a society’s deepest tensions that I find desperately moving. In the West, this is the kind of heavy lifting that was once the preserve of the novel — think of Dickens and Balzac. But in India, Bollywood alone deals with our society’s inner tension, its fault lines and frictions. Beneath the overlay of song and plot is the vein of something deadly serious. The place to look for this is not in the face of the hero but in the face of the villain. The Bollywood villain is the embodiment of what India believes ails India. Over the years, the cast of villains has included British colonizers with shaved heads and icy blue eyes; decadent feudal landlords; drug kingpins with amber-tinted sunglasses; corrupt politicians in starched white kurtas; and, naturally, terrorists of every stripe. But in a spate of recent films, the villain has taken the form of India’s own inner demons as the country negotiates an anguished transition to global modernity. In “Sultan,” the villain, if there is one, is the culture of franchises and brands that has brought the outline of a modern society to India over the past 25 years. The eponymous protagonist and his story about a televised mixed martial arts league functions as a parable about a society trying to assimilate an onslaught of foreign influence. In every area of life, from sporting events to television channels, retail to restaurants, and even think tanks, magazines and publishing houses, modernity arrives in India ready-made. The country is in the process of refashioning itself in the image of the West. This recent spate of Bollywood films capture the violence and humiliation (and rage) that accompanies an old society remaking itself to fit the mold of another. In “Sultan,” the man who brings the televised martial arts league to India is part of the country’s moneyed English-speaking elite. He uses words like “bro” and “dude,” and he almost definitely went to college in the United States. He’s frustrated with his country’s unwillingness to embrace his league. Early on in the film, his father, who we are to understand is less of a foreigner in his own country, sits him down to give him a lesson. He speaks of the need for India to make the league its own. “It does have a future, but you don’t see it,” the father says, using the league as a metaphor for the country. “But the future of this league does not lie in the hands of white men.” Then, in speaking of the need for India to imbue modernity with her own essence, the father gives voice to a deeply disturbing emotion, an anger that boils up in societies bombarded by foreign influence. He says: “It is only when an Indian starts pummelling white men into the ground that the seats of that stadium will get crammed full of people.” Bollywood’s reach extends well beyond India. These melodramas, which are so distasteful to the contemporary European and American palate, play well in Kuala Lumpur and Cairo. This is the cinema of the global South, a fun house mirror image of Hollywood. In America, one rarely hears about what the transmission of global culture — which is in fact American culture — feels like on the receiving end. But it is not a neutral process. This transmission creates a profound disturbance. It reconfigures a society — its mores, its values, its relationships. It can deal a blow to the morale of a place. The word “confidence” comes up again and again in “Sultan,” and it speaks to the trauma an old society undergoes as it tries to absorb the appeal of a foreign culture, while at the same time trying to remain true to itself and its genius. What I love about Bollywood is that it is the only popular medium in which I can see these concerns reflected. We live in an age when civilizational anger has been so taken over by Islamic extremism that it has been rendered untouchable. Bollywood films like “Sultan” are a reminder that the rage of feeling culturally encircled is not limited to the Islamic world. Nor is it incomprehensible. That afternoon, as I wept my heart out on the last day of the brief appearance of “Sultan” in Manhattan, I realized that I was watching something that was commercial cinema for a vast portion of humanity, and yet utterly marginal in this center of Western power where I was watching it.
|
NEWS-MULTISOURCE
|
Talk:Amy Poehler/Archive 1
Why "feminist artist"?
While Poehler is an artist and may indeed consider herself a feminist, there is nothing in this article to distinguish her as a "feminist artist". Find something that supports the label or remove it. Treybien 18:46 18 September 2007 (UTC)
I removed this "She was promoted from featured player to full cast member on SNL, and is only the second person (the first is Eddie Murphy) to earn this distinction." from the article, as I'm 99% sure it is not correct. I believe I remember Horatio Sanz and Seth Meyers being featured players, and probably Maya Rudolph and Chris Parnell, as well. My general recollection is that at least 1/4 of the SNL regulars started as 'featured players'. Niteowlneils 15:57, 23 Aug 2004 (UTC)
I think Rachel Dratch was, too. RickK 05:25, Aug 24, 2004 (UTC)
* IMDb agrees. Niteowlneils 02:06, 11 Oct 2004 (UTC)
* Actually, I think bascailly all the performers start as "featured players", generally for the first two years, after which they are promoted to full cast member. The sentence should have said that Poehler was the only one other than Murphy to be made a featured player during her very first season. Whoever originally wrote that left the important bit out. I've corrected it. -R. fiend 07:04, 19 Feb 2005 (UTC)
Impressions?
Is there any precedent for a list of impressions that she does? If not, is there any reason to include this? It's the bulk of the article. Can't we just say "She does many impressions."? MrCheshire 02:30, 12 May 2007 (UTC)
oh quite you're whinning
* Wow. Terrific grammar there. Much better without the inane list, Cheshire. Well done. -R. fiend 23:57, 4 June 2007 (UTC)
Picture?
Can't anyone find a more flattering picture? She can be quite the attractive woman, that picture does not do her justice... Jersey John 04:17, 23 September 2007 (UTC)
* She IS an attractive person, her beauty cannot be impaired by whatever disadvantageous pictures are taken. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:30, 1 October 2007 (UTC)
* Actually, the purpose of an encyclopedia is to portray subjects accurately, not flatteringly. Does the picture identify her correctly? Yes, it does. <IP_ADDRESS> 02:13, 23 October 2007 (UTC)
* Worst doesn't mean most correct. <IP_ADDRESS> (talk) 06:35, 25 February 2008 (UTC)
* Yeah seriously guys, that picture is really...not good. Where do you go to find legal pictures anyway? I can do my best to find another one... —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:24, 18 March 2008 (UTC)
* You should see the picture on Rebecca Romijn's page. Poehler's doesn't look so bad in comparison. Ariadne55 (talk) 17:09, 2 April 2008 (UTC)
I agree. This picture is distractingly bad. <IP_ADDRESS> (talk) 21:02, 14 June 2009 (UTC)
The image not only portrays her physically. The facial expression and pose accurately conveys her limited psychological depth and "at-any-cost" purpose to retain celebrity.Traits which will become apparent when Tina Fey's ratings can no longer support other programs and Amy attempts to fend for herself.<IP_ADDRESS> (talk) 07:49, 20 May 2010 (UTC)<IP_ADDRESS> (talk) 07:48, 20 May 2010 (UTC) yle="font-size: smaller;" class="autosigned">—Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:34, 13 May 2010 (UTC)
Early Life & Career
The info under BC college's oldest improv group was wrong-- it was listed as being Second City. I changed it to "My Mother's Fleabag", the actual name of the group.
Updated early life and career sections a bit, giving UCB its own section, as it's such a large part of Poehler's career that I felt it was warranted. Previously, it was listed in the "other work" section.
Gave a little more info regarding her time on SNL, including her debut date.
Is there anything else we're missing? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 02:09, 1 June 2008 (UTC)
Seriously
Who the fuck watches tv and edits this shit in less than 5 minutes. I just watched weekend update on SNL when she announced she was leaving and some fucker already updated her biography saying she thanked people. Seriously. I wasn't even fucking 5 minutes. Get a fucking lay.<IP_ADDRESS>
You do realize that depending on where you are, the show may have aired an hour or so earlier. Plus, this is the Internet. A staff or audience member in the show could update. Relax <IP_ADDRESS> (talk) 08:37, 14 December 2008 (UTC)
Adding her new show in the first part
Maybe her new show should be mentioned in the first part of her description. After all she is a starter. And even though we never know what may happen to an early show, like it getting canceled, its still a big deal that she is the lead role in an NBC prime time show. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:27, 12 April 2009 (UTC)
Lead photo choices
I disagree with Fixedit's judgment of which photo is better. The one Fixedit inserted is blurry, and shows Pohler in partial profile. It's also far lower resolution than the head shot it replaces.
Given Fixedit's recent string of deletions on this, it seems like he/she is trying to make a point of some kind, though I can't imagine what that point might be. What exactly is wrong with the head shot that was here to begin with? -Pete (talk) 21:39, 18 September 2009 (UTC)
* Below is a gallery of head shots we have of Poehler; if people feel one is better over the other for the lead, feel free to make your opinion known:
* I'm not sure if you're joking or what. The colors are obviously wrong in D, that's not what her complexion is like, as other photos and videos of her show. It's a poorly taken photograph. Maybe she had turned red for the summer, I don't know. It's not reflective of what she looks like. A, B and E are accurate photos, any of those would be reasonable. Looks like A, C, D and E were taken the same day. C and especially D are defective pictures. Fixentries (talk) 00:01, 19 September 2009 (UTC)
* Color blindness - Fixentries (talk) 00:17, 19 September 2009 (UTC)
German American?
Is she German American? Badagnani (talk) 04:29, 19 April 2009 (UTC)
* judging by her name she is.--Tresckow (talk) 00:56, 27 July 2010 (UTC)
* Amy Poehler's ancestry is documented in detail here. Basically, she's 1/8th German, 1/8th Portuguese, 1/8th Anglo, and 5/8ths Irish. Not an atypical combination in Massachusetts. All Hallow's Wraith (talk) 00:53, 16 October 2012 (UTC)
Andy's little sister -- Conan
Back in 1999, "Stacey" e.g. http://www.youtube.com/watch?v=8P55OASR5bw ?should be part of Career? <IP_ADDRESS> (talk) 18:35, 22 February 2012 (UTC)
Really?
This article states: "Poehler dropped out of Boston College with a bachelor's degree in media and communications in 1993" Which is it? dropped out or graduated? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:59, 17 August 2013 (UTC)
* I reverted vandalism. BC Alumni magazine and other sources say she's a grad. WikiMrsP (talk) 14:56, 19 August 2013 (UTC)
Amy's husband
Amy is currently married to actor and comedian Chris Pratt
* Incorrect XFEM Skier (talk) 05:43, 20 May 2014 (UTC)
Correction to mistake on summary
In the summary of the article, it states that Amy is currently starring in the series Welcome to Sweden. This is incorrect. Amy is an executive producer for the show, and while she has indeed guest starred in two episodes so far, she is by no means part of the cast. She isn't listed as part of the cast on the show's official page on the NBC website (http://www.nbc.com/welcome-to-sweden/about), so I am going to change that line of the summary. <IP_ADDRESS> (talk) 21:24, 28 July 2014 (UTC)
New Article
A new article was recently published about Amy Poehler on Maclean's.com, titled ''Amy Poehler’s radical message: ‘Be nice. Work hard.’'' This article may have additional important information that could be added to this BLP, and can be found at http://www.macleans.ca/society/amy-poehlers-radical-message-be-nice-work-hard/. Best, Comatmebro ~Come at me~ 04:41, 3 November 2014 (UTC)
Inside the Actors Studio
This interview provides useful information for the article. Full interview on YouTube. --Lapadite (talk) 09:44, 1 February 2015 (UTC)
Publishing rumors
WikiProject:Biography is very clear that Wikipedia does not publish claims of breakups and relationships that have not been confirmed by the subjects themselves or their representatives. Claims by anonymous, unattributed, shadowy "sources" of uncertain agenda are by definition rumors, and we don't publish rumors. WP:NOTTABLOID applies. If editors want to start an RfC over this, any editor is welcome to do so. I would suggest, based on consensus at Talk:Scarlett Johansson over tabloid reports of her multiple pregnancies, only one instance of which turned out to be true, that most WikiProject:Biography editors would disagree with our publishing rumors. --Tenebrae (talk) 17:46, 13 October 2015 (UTC)
* Regarding Entertainment Tonight saying on Sept. 23 that it had "confirmed" Poehler and Kroll's breakup: It was not "confirmed" by the subjects or their representatives, so confirmed by who, exactly? If it's not the subjects or their reps, and it's still just anonymous "sources", then it's not "confirmed" but still gossip and rumor. An encyclopedia is supposed to have a higher standard than tabloid press. --Tenebrae (talk) 22:02, 13 October 2015 (UTC)
Correct; WP:BLP: "Biographies of living persons ("BLPs") must be written conservatively...Wikipedia is an encyclopedia, not a tabloid: it is not Wikipedia's job to be sensationalist, or to be the primary vehicle for the spread of titillating claims about people's lives also applies." If it hasn't been confirmed by the subject or their reps, then it should not be on the BLP. Lapadite (talk) 19:25, 14 October 2015 (UTC)
Poehler and Arnett's children
I've restored the article to its stable status quo following an editor remove the names and dates of the couple's children and mis-citing WP:BLPNAME and WP:DOB. As the closing admin noted in an identical case at Talk:Brian Austin Green, "NAMES & DATES OF BIRTH OF CHILDREN PERMITTED IN ARTICLE The policy on biographies of living persons clearly leaves the inclusion of details of family members up to the discretion of the article's editors, as long as the information is well-sourced. All editors seem to agree that there are reliable sources, and the overwhelming majority of editors favor keeping full names and dates of birth of the children in the article.--Aervanath (talk) 20:06, 25 September 2015 (UTC)"
In the Amy Poehler article, the names and dates were announced by the subject's own representative and published widely in reputable sources including the cited People magazine. If an editor, after having been reverted, wants to challenge the page's status quo in this regard, the proper thing is to discuss the issue here and, if they wish, to call an RfC here. --Tenebrae (talk) 22:36, 26 October 2015 (UTC)
Please see the following regarding the same issue and what other editors at BLP/N have already said on the subject:.
WP:BLPNAME states: "The presumption in favor of privacy is strong in the case of family members of articles' subjects and other loosely involved, otherwise low-profile persons. The names of any immediate, ex, or significant family members or any significant relationship of the subject of a BLP may be part of an article, if reliably sourced, subject to editorial discretion that such information is relevant to a reader's complete understanding of the subject"'.
"Low-profile" equals "not also notable".
Further, WP:DOB states: "If the ... person is borderline notable, err on the side of caution and simply list the year". -- WV ● ✉ ✓ 22:49, 26 October 2015 (UTC)
* The same interpretation as yours was already raised and rejected at the RfC.
* But given our history, let's not turn this into a protracted argument. Take the month out, if you want. If that compromise doesn't suit you, then call an RfC here. I'm fairly certain the outcome will be the same as at Brian Austin Green. --Tenebrae (talk) 22:58, 26 October 2015 (UTC)
* Winkelvi, DO NOT edit another editor's posts. First, you are not allowed to do so. Second, anything that either of us is quotes here is from another editor. You are deliberately trying to bait me, like you do with other editors, and before you make this escalate I will call in the admin who specifically said I should contact him if you behave in this fashion. Stay off my posts. --Tenebrae (talk) 23:29, 26 October 2015 (UTC)
* Um, it's not your "post", you just reproduced someone else's words, reposted them here, and added to them by bolding them. I really don't think you're allowed to do that as it seems to me it's borderline refactoring if not outright refactoring. Did you contact the editor whose words you have reproduced here and changed? Honestly, I'm not trying to deliberately do anything to you. But if you want to get an admin involved, knock yourself out. I haven't done anything to be worried about. Actually, it seems to me that you are the one doing the baiting. You started this discussion about an edit I made. No one forced you to do that or revert my edit. You could have left it alone, but you chose not to. I don't know what else you could have expected by starting a discussion here about my edit other than for me to respond. Not to mention this edit summary ("and since you insist on boldfacing, fine. Here.") certainly has a "neener-neener" baiting tone to it. If you do get an administrator involved, my question would be, "What do you expect to come of it?" -- WV ● ✉ ✓ 23:36, 26 October 2015 (UTC)
* I already addressed your point about quoting other editors and I'm not going to repeat it.
* I've been editing this article for some time now, including recently enough that I'm well visible in the article's history. 'Despite this, you choose to come edit this article, out of the literally one million-plus on Wikipedia you could edit.
* What do I expect to come out of it? The only thing I've ever wanted: for you to stay away from me, which I believe you said you would.
* I offered a good-faith compromise. You don't want to accept it, fine. Withdrawn. If you want to change the article's long-stable status quo in a contentious way, feel free to call an RfC.--Tenebrae (talk) 00:03, 27 October 2015 (UTC)
* "'Despite this, you choose to come edit this article, out of the literally one million-plus on Wikipedia you could edit." I've been editing this article for more than a year (see here). You've been editing this article for a little more than a month (see here). If anyone needs to go elsewhere (as you are implying I should), it's you based on my "seniority" at the article. But, I'm not that kind of person to insist such a thing. It's your choice if you want to stay editing this article, but it's not your right to think you have a lock on editing it based on who (you think) was here first. That's a form of article ownership, isn't it? Besides, if you want to avoid having contact with me, why did you revert my edit, and start this discussion about my edit? My edit that you reverted had nothing to do with anything you edited at this article, after all. Further, now that you know I've been at this article more than a year than you have, why would you want to stay at this article since you say you want to have nothing to do with me? -- WV ● ✉ ✓ 00:10, 27 October 2015 (UTC)
* I'm looking at the history. When I started in September, you hadn't been here since May, and without my having gone back to see previous pages of edits I could not have known in September that you were here. Regardless: If an editor wants to make a contentious change to the stable status quo of an article, he needs consensus. I've provided evidence of a recent RfC about an identical issue, which does not show consensus for the type of edit you made. Nonetheless, I offered a compromise, which you rejected with a bunch of bullying boldface. If you feel the RfC consensus was wrong, feel free to call a new RfC. Otherwise, please do not make contentious, non-consensus edits.
* Ownership? False accusation. Look at the many, many editors who have edited since I began editing here. --Tenebrae (talk) 00:24, 27 October 2015 (UTC)
* Yet another false accusation, which I recall now is something you do. I copy-pasted the outcome of the RfC, so no, I did not change a word. --Tenebrae (talk) 00:35, 27 October 2015 (UTC)
Not a false accusation at all. You refactored the comments. From WP:RTP: "Refactoring is a redrafting process in which talk page content is moved, removed, revised, restructured, hidden, or otherwise changed." Bolding (which you added to someone else's comments) is a revision and it changed the content you copied and pasted. In my opinion, it really shouldn't be done, which is why I removed the bolding, as it seemed to be against policy. Was it necessary to add it to someone else's words in order for me to understand what you were trying to say? -- WV ● ✉ ✓ 00:40, 27 October 2015 (UTC)
* Bolding did not change the content of what I quoted any more than bolding changed the content of what you quoted. And this going back and changing your original post after I respond to it is not what anyone would consider fair or honorable.
* You still don't seem to understand what I was trying to say, so in that respect nothing is helping. In any event, I'm not going to continue to discuss whether you have the right to change my post. You made a contentious edit that goes again the consensus of an identical case. I restored the status quo, as was proper. If you believe the status quo is wrong after this, please find a new consensus, --Tenebrae (talk) 00:55, 27 October 2015 (UTC)
* I understand what you are saying. I also understand what you are doing. Look, I'm not the one being contentious, I didn't revert anything you placed in or removed from the article. I'm not arguing against anything you've said. All I did was post a link to what has been said previously at BLP/N regarding the same kind of content in other articles and referenced what currently exists at WP:BLPNAME and WP:DOB. Really, nothing I've said indicates I'm spoiling for a fight. I can't, however, say the same for you. I'm not the one who went running to an administrator over something you started. And with that, I'm done discussing this. Can we move on and away from this now? -- WV ● ✉ ✓ 01:24, 27 October 2015 (UTC)
I agree that the children's names can be added to the article - if mentioned in high quality sources and/or announced by the subject or their representatives. Lapadite (talk) 11:01, 27 October 2015 (UTC)
Reported breakup
As is well understand at WIkiProject Biography, we do not include personal-life claims that are not confirmed by the subject or his/her representative or through outlets reporting documentary evidence (such as the fact of a marriage license). In the case of her reported breakup, neither subject nor their reps confirmed this claim, which was based on an anonymous "insider" "source". Anonymously sourced claims are simply rumors. WP:NOTTABLOID. --Tenebrae (talk) 23:56, 27 February 2016 (UTC)
Additions to the page
I am a student at LSU in a Women and gender studies class and I am going to add to this page. These are the things I want to potential add. Amy Poehler’s work in feminism and comedy. I want to add a section about her being a feminist icon. She is one of the most well known feminist celebrities and oozes feminism with everything she does and her Wikipedia page does not reflect that.
Something’s I might be touching on are: Feminist comedy- SNL Parks and Recreation ; Feminist characters she has played- Leslie Knope, Hillary Clinton ; Broad City- Feminist comedy show ; Smart Girls- Smart Girls at the Party, Smartgirls.com, Smart Girls Youtube ; Feminist quotes/work by her- Her book “Yes Please” ;
Let me know what you think! Kate3925 (talk) 16:04, 25 February 2016 (UTC)
* Admirable, but sounds like original-research synthesis. Please keep in mind we can only insert opinions stated by reliable-source outlets and authoritative experts, journalists, academics, etc., with drawing any conclusions or interpreting their plain statements. --Tenebrae (talk) 14:08, 26 February 2016 (UTC)
I agree with Tenebrae that there is some danger in veering into original research, however, I think adding a section on Amy Poehler's Smart Girls would be an easy way to improve the article and reflect some of Poehler's views. Obviously Smart Girls has it's own article, but I do think Amy's role in the company would be relevant to this page. Knope7 (talk) 16:57, 2 July 2016 (UTC)
BLP Noticeboard discussion
As of this moment, there is no consensus at Biographies of living persons/Noticeboard to include anonymously sourced gossip about her relationships. --Tenebrae (talk) 18:27, 18 July 2016 (UTC)
* Still true as of nearly three days later. -- Tenebrae (talk) 18:32, 21 July 2016 (UTC)
At this moment, there has been no easy consensus at Biographies of living persons/Noticeboard to keep the reliably sourced content about her ended relationship with Nick Kroll out of the Poehler article. That said, four editors out of seven have been fine with the content being in the article as long as it is reliably sourced, one being an administrator,. He cited WP:RS: "Base articles on reliable, third-party, published sources with a reputation for fact-checking and accuracy" and then stated, "Several of the news outlets cited on the breakup have excellent reputations. The LA Times in particular cites "multiple reports" and attempted to contact both parties. WP:RS does not require that we vet the fact checking that our sources actually carry out in each case. Doing so might be appropriate as an extra measure for a highly damaging report about a living person, but the end of a dating relationship does not seem that contentious. I think the sourcing passes muster in this situation." Further, thanks to, another reliable source came to light, that being an interview with Poehler in The Guardian. In it, the article's author, Elizabeth Day, stated, "She is so smart and eloquent on the topic that I find myself breezing through all the usual interview questions about where she grew up (Newton, Massachusetts with a younger brother, Greg), what her parents did (high-school teachers) and her past relationships (she’s recently split from fellow comedian Nick Kroll and is divorced from actor Will Arnett, with whom she has two sons, aged seven and five) simply because I want to hear more of what she thinks.". -- WV ● ✉ ✓ 19:51, 21 July 2016 (UTC)
* As several people suggested on the BLP notice board, I have removed the paragraph on the Kroll relationship. The version I removed suggests that Ms. Poehler is in an ongoing relationship with Mr. Kroll, and this is clearly contentious and unsourced, with several sources saying it has ended. While there is a dispute about the reliability of those sources, our WP:BLP policy says unsourced contentious claims must be removed immediately. While it is common for Wikipedia articles to include reliably sourced information on celebrity dating relationships, there is no requirement that we do so in every case. There were several suggestions for compromise wording on the noticeboard and hopefully one can gain a consensus here.--agr (talk) 13:03, 22 July 2016 (UTC)
* I think your action in removing the paragraph entirely was the best possible compromise and I support it. --Tenebrae (talk) 18:39, 22 July 2016 (UTC)
Kroll split
It was widely reported in September 2015 that Poehler and Kroll split. I think these widespread and credible reports warrant a sentence in this article. If someone can find a better source, please feel free to include it. I think it would be misleading at this point to mention Poehler's relationship with Kroll without mentioning that they split almost a year ago. Knope7 (talk) 22:58, 15 July 2016 (UTC)
* I agree, . The content is not controversial in nature, it was widely reported, and it should be included in the article. As far as reliable sources go, Us Weekly has been cautiously considered a reliable source, however, The San Jose Mercury News reported on it as well as People Magazine. For Wikipedia's purposes, both articles on the couple's break up are in line with WP:RS, WP:VERIFY, and WP:REF allowing for the content to sufficiently meet the threshold for inclusion. -- WV ● ✉ ✓ 15:59, 17 July 2016 (UTC)
* Anonymous "sources" on who someone is dating or not dating is not WP:BLP by any means. Additionally, the San Jose Mercury News is simply attributing Us, so that's a false cite. People also uses anonymous "sources." Wikipedia is does not report tabloid rumors. Do we need to take this to an RfC, because I'm sure the consensus will go along with this. --Tenebrae (talk) 17:32, 17 July 2016 (UTC)
* This is in addition to the fact Winkelvi agreed to stay away from me, so if he continues, I'm reopening the ANI and asking the admins who were involved in this to step in. --Tenebrae (talk) 17:33, 17 July 2016 (UTC)
* All "tabloids" are not equal. In my opinion, there are sufficient indicia of reliability around these reports to warrant their inclusion. Really though I think the options should be include the relationship and break-up or include neither the relationship nor the break-up. If you would like to take it to RfC, then please do. Knope7 (talk) 17:47, 17 July 2016 (UTC)
* I'm honestly not sure why "my [i.e. Knope7's] opinion" is sufficient to judge the reliability of anonymous sources. I'm a professional journalist and editor, and in my own opinion I genuinely see no basis for why this anonymous source is better than any another anonymous source in Us Weekly or elsewhere, who might claim this or that actress is pregnant or this or that singer is dating so-and-so. Are you also a media professional? Can you explain the basis for your opinion and what makes any given anonymous source trustworthy or why we should or should not use a gossip magazine's anonymous source? --Tenebrae (talk) 18:08, 17 July 2016 (UTC)
* I have my opinion and you have yours. I'm not going to argue over credentials. Let's be civil. I'm willing to discuss this issue and work together constructively, however, I do not appreciate the tone of some of your comments.
* The Los Angeles Times and San Jose Mercury News, among others, found the reporting from People and US Weekly sufficiently reliable to be the basis of one of their stories. Nearly every entertainment site ran some version of the story relying on People or US Weekly. People and US Weekly do have reputations for getting stories from celebrities. This story is nearly 10 months old and I searched and was not able to find any credible reports which refuted the split. So, every outlet reporting this story, including reputable papers such as the Los Angeles Times, and no sources refuting it in 10 months suggests it is reliable. I also tried to use language in the article which reflects that the split was reported rather than saying the split was confirmed by the couple. Moreover, I find it misleading to include the relationship without the break-up at this point. Knope7 (talk) 18:28, 17 July 2016 (UTC)
* The Los Angeles Times and San Jose Mercury News simply said, "Here's what Us Weekly is claiming." They did not do original reporting and obtain confirmation. A hundred sources could repeat the claim, but it all goes back to the same "source": some anonymous person of uncertain credibility or agenda who gave Us Weekly an unconfirmed claim — which by definition is a rumor. An encyclopedia does not traffic in gossip and rumor.
* Newspapers are not encyclopedias. Newspapers are famously "the first draft of history." Encyclopedias should be, as much as humanly possible, the definitive and concrete final word.
* RE: "was not able to find any credible reports which refuted the split." Some shadowy person's allegation isn't magically confirmed after 10 months or even 10 years. And if celebrities had to refute every anonymous claim made about them in celebrity magazines and the tabloid press, they'd have little time for anything else. Many, many celebrities never bother to refute media gossip.
* RE: "I also tried to use language in the article which reflects that the split was reported rather than saying the split was confirmed by the couple." One of the biggest weasel words we avoid is "reportedly." Anyone can report anything. And simply adding the word "reportedly" to gossip or a rumor doesn't make it OK or encyclopedic.
* RE: "I find it misleading to include the relationship without the break-up at this point." You suspect they've broken up — you don't know they've broken up. For all we know, they're still in a relationship but only seeing each other casually. You and I are not privy to their private lives. Some celebrities keep them very private. Some celebrities are homebodies. If an encyclopedia can't verify beyond any shadow of a doubt some claim about a person's private life, then it's gossip and does not belong in an encyclopedia. There's nothing misleading about not making "best guesses" as to whether something is true.
* Finally, there's a larger issue at stake: Stating unconfirmed, unverified, anonymously sourced claims as encyclopedic fact. Sometimes those claims will be correct. Sometimes they will not. There's no objective basis for saying, "This anonymous source is OK, but that one isn't." Where do we draw the line? That's the critical question. --Tenebrae (talk) 20:17, 17 July 2016 (UTC)
* They broke-up. Every entertainment news outlet reporting it is sufficient for me. There are several safeguards here to prevent the slippery slope from adding every article printed about a celebrity. One, both US Weekly and People (article here) reported the break-up with their own sources. These are the most reputable of the celebrity entertainment websites and the most likely to actually cultivate sources close to the celebrities. Two, several more traditional news outlets found the reporting of US Weekly and People solid enough to rely on. In addition to the sources mentioned before I'll add CBS news (article here) Three, nearly 10 months have past with no contrary reporting. I could see waiting a week, a month, maybe even six months to see if a correction or other reporting emerges, but at this point the articles stand. Four, weighing the evidence of a split (US, People, LA Times, CBS, nearly every entertainment news site) versus the evidence that a split did not happen (I found nothing), the weight of evidence suggests they have in fact split. I'll now wait to see if anyone would like to join the discussion before commenting further. Knope7 (talk) 21:18, 17 July 2016 (UTC)
* You're simply repeating statements I've already addressed in my post just above. Repeating them doesn't make them any more accurate or pertinent. But here's an additional something to address: This is an encyclopedia article, not a fan page that uses gossip sites to keep track of the subject's romantic purported comings-and-goings. --Tenebrae (talk) 23:01, 17 July 2016 (UTC)
* Tenebrae, I have been editing this article much longer than you, beginning in August 2014. You showed up here in late September 2015. There is no reason why I should bow out of this discussion or editing the article responsibly and in line with policy just because you are here, too. Allow me to point the following out: of the 38 edits you have made at this article, 30 of them have been complete reversions of what others have added and reversions that continuously cite "NOTATABLOID" - almost all in relation to the content being discussed now. If you want to take part in the discussion in a civil and helpful manner without threats and works toward consensus, that would be great and would be the right step to what our goal as editors is supposed to be. Seriously, two years after Poehler and her ex-boyfriend split up, there is no viable reason to keep that information out of the article and allow it to continue to say they are in a relationship together, when that, in fact, is verifiably untrue. Please work toward a consensus on this to will get that piece of updated information in. Keeping it out, two years down the road, seems counter-productive. Thank you,-- WV ● ✉ ✓ 21:32, 17 July 2016 (UTC)
I have started a discussion at the BLP project talk page here. Hopefully we can get some help there or possibly others who frequent/watchlist that talk page will come here to offer some help and insight. -- <span style="text-shadow: 4px 4px 15px #0099FF, -4px -4px 15px #99FF00;">WV ● <span style="text-shadow: 4px 4px 15px #FF9900, -4px -4px 15px #FF0099;">✉ ✓ 22:04, 17 July 2016 (UTC)
For future reference, here is another source for the split taking place in 2015: "So, if Kroll has finally graduated from douche-dom, why is he currently single? (He and Amy Poehler split up in 2015 after two years of dating.)" per Vanity Fair Knope7 (talk) 01:45, 29 December 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified one external link on Amy Poehler. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://archive.is/20130110235003/http://livefeed.hollywoodreporter.com/2008/07/nbc-wants-both.html to http://livefeed.hollywoodreporter.com/2008/07/nbc-wants-both.html
Cheers.— InternetArchiveBot (Report bug) 01:51, 9 September 2017 (UTC)
BLP vios
As a fellow editor noted today at User talk:<IP_ADDRESS>, an anon IP is edit-warring to add uncited BLP claims of ethnic heritage. I ask this anon IP, who is at the cusp of breaking 3RR, to discuss his concerns on this talk page. --Tenebrae (talk) 00:01, 13 September 2017 (UTC)
Her Middle Name
Her middle name is Meredith according to the IMDB page. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 13:01, 16 September 2018 (UTC)
* Her middle name on IMDB was provided by an IMDB user, which means it is not a reliable source. I have removed her middle name from the article. I will be happy to put it back with a reliable source. Knope7 (talk) 18:49, 27 April 2019 (UTC)
* I've added it back with the Los Angeles Times as a source. Knope7 (talk) 21:25, 27 April 2019 (UTC)
Ref 146 The 2011 TIME 100
Ref 146 The "2011 TIME 100" does not use a proper cite template and has no author/date parameters, I will let someone more familiar with the article sort it. Regards Spy-cicle💥 Talk? 02:01, 19 March 2021 (UTC)
Wiki Education Foundation-supported course assignment
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Kate3925.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 14:06, 16 January 2022 (UTC)
|
WIKI
|
User:Princewayza
Name:Anele Surname:Mtitshana hometown:Tsolo in Eastern cape Currently:im in CapeTown Nationality:South African marital:single dob:04May1998 Place of birth: Western cape,capetown
Iam an Afro singer since from 2011 my record label is Dead End Production in Gugulethu i have two brothers and 1 sister.
|
WIKI
|
“Sequence control structure” refers to the line-by-line execution by which statements are executed sequentially, in the same order in which they appear in the program. They might, for example, carry out a series of read or write operations, arithmetic operations, or assignments to variables.
The sequence control structure is the simplest of the three fundamental control structures that you learned about here. The following program shows an example of statements that are executed sequentially.
PHP
<?php
echo "Enter a number: ";
$a = trim(fgets(STDIN));
$b = $a * $a;
echo "The square of ", $a, " is ", $b;
?>
Java
public static void main(String[] args) throws java.io.IOException {
java.io.BufferedReader cin = new java.io.
BufferedReader(new java.io.InputStreamReader(System.in));
double a, b;
System.out.print("Enter a number: ");
a = Double.parseDouble(cin.readLine());
b = a * a;
System.out.println("The square of " + a + " is " + b);
}
C++
#include <iostream>
using namespace std;
int main() {
double a, b;
cout << "Enter a number: ";
cin >> a;
b = a * a;
cout << "The square of " << a << " is " << b;
return 0;
}
C#
static void Main() {
double a, b;
Console.Write("Enter a number: ");
a = Double.Parse(Console.ReadLine());
b = a * a;
Console.Write("The square of " + a + " is " + b);
Console.ReadKey();
}
Visual Basic
Sub Main()
Dim a, b As Double
Console.Write("Enter a number: ")
a = Console.ReadLine()
b = a ^ 2
Console.Write("The square of " & a & " is " & b)
Console.ReadKey()
End Sub
Python
a = int(input("Enter a number: "))
b = a ** 2
print("The square of", a, "is", b)
|
ESSENTIALAI-STEM
|
-- Data Analysis Should Be a Social Event
Here's a common business problem: You want to retain more of your customers. Depending on your corporate analytics culture and the experience of your analytical team, your analysts will probably approach this problem by asking one of the following questions: Both approaches clearly deliver value. However, we've found that companies that don't explore the social aspects of analytics are missing out on opportunities to use data to completely transform their businesses . To be sure, much has been written about analysts as storytellers (see, for instance, A Data Scientist's Real Job on HBR.org) and about creativity as part of the analytical process, but what has not been explored is the storytelling analyst actively participating in co-creating value with others. Psychologists believe that creativity flourishes in social contexts, as thoughts are translated into words, objects or images and in turn reformulated into ideas (this is one of the reasons why visualization of data is so valuable). On the management side, there is increasing evidence that co-creative processes involving consumers and other stakeholders can have a transformative effect on key processes such as new product development. Here's how it works in data analysis. You put together ad-hoc teams that involve not only analysts with relevant domain expertise but also represent skills from other domains, which brings new ways of thinking to old analytical problems. Over a short two or three day period the team will brainstorm around the problem involved and bring together as much data and as many analytical frameworks as they can to both frame up the problem and outline potential solutions or at least pathways to solutions. A compelling example of the co-creative analysis process can be seen at DataKind , a charity devoted to helping other charities extract value from their data. What DataKind does is bring together analysts, domain experts, and anyone with a passion about the problem in question for weekend "datadives" to "analyze Big Data in the service of humanity. In March this year, for example, it hosted a two-day session in co-operation with the World Bank, various UN agencies, and the Qatar Computing Research Institute to study data around poverty and corruption. This approach works well in business. We recently participated in a data-dive type process at a major telecommunications company. Like many telcos this company is trying to woo customers through customized marketing communications and offers. A team made up of analysts and business intelligence people from the operator plus some external consultants (ourselves) identified and applied an analytical methodology from the retail industry to quickly assess the needs and preferences of thousands of actual and potential customers. They built on these assessments to create 30 finely targeted marketing campaigns. Two-thirds of these were successful beyond the company's wildest hopes. All this came from just three days of group brainstorming. As with other co-creative processes, co-creative analytics comes with risks that must be mitigated through providing strong leadership and specifying clear deadlines and outcomes. But the fruits of the creative energy that you can unleash through teaming analysts and domain experts in these ways more than justify the investment of time and money involved.
|
NEWS-MULTISOURCE
|
James MARROW, Jr., Appellant, v. UNITED STATES, Appellee.
No. 89-1034.
District of Columbia Court of Appeals.
Argued Sept. 11, 1990.
Decided June 13, 1991.
Richard E. Holliday, Jr., Washington, D.C., for appellant.
John R. Fisher, Asst. U.S. Atty., with whom Jay B. Stephens, U.S. Atty., and Nancy J. Woodward, Asst. U.S. Atty., were on the brief, Washington, D.C., for appel-lee.
Before ROGERS, Chief Judge, and FERREN and TERRY, Associate Judges.
FERREN, Associate Judge:
Appellant challenges the trial court’s denial of his motion to dismiss a misdemeanor charge for lack of jurisdiction or, in the alternative, to transfer the charge to the Family Division. On February 6, 1989, appellant was arrested on a misdemeanor cocaine possession charge, D.C.Code § 33-541(d) (1988). On the same day he was also arrested — pursuant to an outstanding warrant — on a felony charge of assault with intent to murder while armed, D.C.Code §§ 22-503, -3202 (1989). Appellant, a 17-year-old, argues that the Criminal Division does not have jurisdiction over his misdemeanor charge because, at the time of his arrest for cocaine possession, he was still a juvenile, subject to Family Division jurisdiction, despite the February 1, 1989, warrant for his arrest on the felony charge for which he would be triable as an adult.
According to D.C.Code § 16-2301(3)(A)(i) (1989), once the United States Attorney has “charged” a defendant “who is sixteen years of age or older” with assault with intent to murder while armed, that defendant must be prosecuted as an adult for the charged felony and for all “subsequent delinquent act[s].” D.C.Code § 16-2307(h) (1989). The trial court ruled that the misdemeanor possession charge constituted a “subsequent delinquent act” within the meaning of § 16-2307(h). Specifically, the court concluded, “based on the outstanding felony warrant dated February 1st, 1989, that there had been a complaint lodged” against appellant before he allegedly committed the misdemeanor offense on February 6, 1989. Appellant argues that the date of presentment in court, February 7, 1989, not the date of issuing the warrant, February 1, 1989, is the crucial time for § 16-2307(h) purposes. He accordingly argues that because both the felony and the misdemeanor cases were presented in court the same day — the day after he was arrested on both charges — the misdemeanor cannot constitute a “subsequent delinquent act.”
We agree with the trial court that the date on which appellant was “charged by the United States attorney” with the felony, see D.C.Code § 16-2301(3)(A) (1989), was the date on which the judge signed and filed the arrest “warrant” based upon a criminal “complaint” signed by a police officer and a supporting “affidavit” signed by the police officer and “approved” by an Assistant United States Attorney who has designated the felony to be charged. See Super.Ct.Crim.R. 4(a). For statutory purposes the “charge” was filed before the date appellant was presented in court. We therefore affirm the trial court’s order and remand the case to the Criminal Division for trial.
I.
On February 1, 1989, the court issued a warrant for the arrest of appellant — who was then seventeen years old — for an assault with intent to commit murder while armed, allegedly committed on January 19, 1989. More specifically, the warrant was issued on the basis of a “complaint” and an “affidavit in support of an arrest warrant,” see supra note 2, signed and approved on February 1, respectively, by Metropolitan Police Officer Lorren D. Leadmon and Assistant United States Attorney Sherri L. Berthrong. On the application for an arrest warrant at the bottom of the complaint form, see supra note 2, Ms. Berthrong had designated the charge of assault with intent to murder while armed. Judge Kramer signed the application, which commanded any authorized federal or local officer to bring the defendant before the court to answer the designated charge. Five days later, on February 6, 1989, appellant was arrested for possession of cocaine, an offense allegedly committed that same day. The next day, February 7, he was arraigned on the misdemeanor and presented on the felony in the Criminal Division. On August 22, 1989, Judge Dixon denied appellant’s motion to dismiss the misdemeanor charge for lack of jurisdiction. Appellant filed a timely appeal two days later.
II.
In general, the Family Division has jurisdiction over a juvenile who meets the statutory definition of a “child” under D.C.Code § 16-2301(3) (1989). See D.C.Code §§ 16-2302, -2303 (1989). “Child” is defined as:
an individual who is under 18 years of age, except that the term “child” does not include an individual who is sixteen years of age or older and—
(A) charged by the United States attorney with (i) murder, forcible rape, burglary in the first degree, robbery while armed, or assault with intent to commit any such offense....
D.C.Code § 16-2301(3)(A)(i) (1989) (emphasis added). We have stated “that § 16-2301(3)(A), by deeming an individual not to be a ‘child’ when certain serious offenses are charged, in effect has decreed, by operation of law, a ‘transfer’ of that individual to the Criminal Division....” In re C.S., 384 A.2d 407, 409 (D.C.1977) (emphasis added). Thus, we have equated the point at which “transfer” occurs (for juveniles age sixteen or over) with the point at which the individual is properly “charged” with one of the enumerated serious offenses. That definition is important for purposes of § 16-2307(h), which provides that “[tjransfer of a child for criminal prosecution terminates the jurisdiction of the [Family] Division over the child with respect to any subsequent delinquent act....” D.C.Code § 16-2307(h) (1989). As a result, the Criminal Division — not the Family Division — would have jurisdiction over Marrow’s subsequent misdemeanor cocaine possession charge.
The question in this case, then, is when was appellant “charged by the United States attorney” with the felony of assault with intent to murder while armed: (1) when the criminal complaint, affidavit (showing the “charge” designated and “approved” by an Assistant United States Attorney), and warrant (based on probable cause) were signed by the judge and filed in the warrant office, see supra note 2, or (2) when appellant was actually presented in court after arrest? Appellant argues for the latter interpretation. More precisely, appellant argues that because he was not “charged” with the felony until his assault case was presented in Superior Court on February 7, his misdemeanor cocaine offense and arrest of February 6 cannot be considered a “subsequent delinquent act.”
Appellant cites In re M.R., 525 A.2d 614 (D.C.1987) (per curiam), to support this proposition. We find no such support in M.R. To the contrary, our discussion of when M.R. was criminally charged as a adult did not mention the dates on which M.R. had been arrested or his case had been presented in Superior Court. Thus, M.R. provides no basis for claiming such dates have relevance.
Appellant’s reliance on the time of presentment as the triggering event under § 16-2301(3)(A) for subsequent delinquent acts appears to be rooted not in any statute but in (1) a concern that the accused receive notice at an adversarial hearing of the criminal charge before subsequent acts can be treated as criminal acts, and (2) a concern that the government sufficiently examine its decision to prosecute before criminal jurisdiction automatically attaches to subsequent acts. Both concerns, while they may not be insubstantial, are without statutory foundation in determining the time of the United States Attorney’s “charge.”
As to notice, we find nothing in the statute or legislative history that suggests notice must be given at a hearing. The process of obtaining an arrest warrant — which includes a judge’s approval of charges designated by the United States Attorney and the filing of the complaint, supporting affidavit, and warrant in the warrant office, see supra note 2 — assures that a decision to charge has been made by the United States Attorney, based on probable cause, and that it is a matter of court record. Moreover, the United States Court of Appeals for the District of Columbia Circuit explicitly rejected the argument that due process requires a hearing before the prosecutor initiates the automatic jurisdictional transfer provisions of § 16-2301(3)(A). United States v. Bland, 153 U.S.App.D.C. 254, 262, 472 F.2d 1329, 1337 (1972), cert. denied, 412 U.S. 909, 93 S.Ct. 2294, 36 L.Ed.2d 975 (1973).
Similarly, we find nothing in the statute to suggest that more than probable cause —i.e., what the United States Attorney must show in the complaint and supporting affidavit to obtain an arrest warrant — is necessary to initiate the charging process and automatic jurisdictional transfer under § 16-2301(3)(A). Rather, the statute simply leaves the decision to “charge” to the United States Attorney, just as prosecutors have traditionally been left to decide what to charge and when to press for initiation of the arrest process.
Although neither the statute nor its legislative history expressly provides a definition of the phrase “charged by the United States attorney,” we believe the plain reading of the phrase makes clear that an individual is “charged” with one of the enumerated offenses under § 16-2301(3)(A) when a criminal complaint, affidavit in support of an arrest warrant approved by an Assistant United States Attorney, and warrant showing a felony “charge” designated by an Assistant United States Attorney are signed by a judge and filed in the warrant office. See supra note 2. Any delinquent act thereafter is a “subsequent delinquent act” for purposes of § 16-2307(h).
This definition is consistent with the purpose underlying § 16-2301(3)(A). As we have noted in earlier decisions, the intent of Congress in enacting this provision of the 1970 District of Columbia Court Reorganization Act was “to work a substantive contraction of the Juvenile Court’s earlier jurisdiction.” Pendergrast v. United States, 332 A.2d 919, 923 (D.C.1975). The House report stressed that its goal was to provide “a better mechanism for separation of the violent youthful offender and recidivist from the rest of the juvenile community.” H.R. Rep. No. 907, 91st Cong., 2d Sess. 50 (1970). See also In re C.S., 384 A.2d at 410; Pendergrast, 332 A.2d at 923. Congress accomplished this purpose by placing broad “charging” discretion in the hands of the United States Attorney under § 16-2301(3)(A). We have recognized this, for instance, when we noted that the transfer statute reflects “the intention of Congress that jurisdiction over a 16- or 17-year-old juvenile charged [by the Corporation Counsel] with one of the specified offenses is not to be exercised in the Family Division unless the United States Attorney elects not to charge such an accused as an adult.” Pendergrast, 332 A.2d at 923 (emphasis added). Similarly, we have stated that “[t]he United States Attorney has discretion under § 16-3201(3)(A) not to bring criminal charges against a 16- or 17-year-old youth_” In re C.S., 384 A.2d at 411 n. 7 (emphasis added). While not precisely defining the term “charged,” it is obvious from context that we did not take “charged” to mean the discretion to arrest and present but, rather, the discretion to decide what offenses to specify in the application for a warrant. See Super.Ct.Crim.R. 4 (issuance of warrant based on complaint and affidavit showing probable cause). Nothing in our previous decisions suggests otherwise.
Moreover, the United States Court of Appeals for the District of Columbia Circuit, in upholding § 16-2301(3)(A) against a due process challenge, specifically stated “that the exercise of the discretion vested by Section 2301(3)(A) in the United States Attorney to charge a person 16 years of age or older with certain enumerated offenses ... initiat[es] that person’s prosecution as an adult.” Bland, 153 U.S.App. D.C. at 260, 472 F.2d at 1335 (emphasis added). The court went on to note that § 16-2301(3)(A) embodies the concept of prosecutorial discretion, id., and squarely rejected the argument “that due process requires an adversary hearing before the prosecutor can exercise his age-old function of deciding what charge to bring against whom.” 153 U.S.App.D.C. at 262, 472 F.2d at 1336-37 (emphasis added). This decision leaves no doubt that “charged” for purposes of § 16-2301(3)(A) is a function of the United States Attorney's prosecutorial discretion which, under constitutional principles of separation of powers, is rarely subject to judicial review. 153 U.S.App.D.C. at 260-61, 472 F.2d at 1335-36.
Appellant’s reading of “charged” to require arrest and presentment would work a major change in case law and statutory language. We decline to follow this suggestion. We hold, rather, that an individual is “charged” under § 16-2301(3)(A) once a judge has signed and filed an arrest warrant in the warrant office based on probable cause derived from a complaint and supporting affidavit signed by a police officer and approved by an Assistant United States Attorney who has designated on the affidavit and the warrant one of the felony offenses enumerated in § 16-2301(3)(A). See supra note 2. Thus, Marrow’s delinquent cocaine possession act — an act committed after a judicially-approved warrant commanding his arrest for an enumerated offense — was a “subsequent delinquent act” for purposes of § 16-2307(h) and must be submitted for trial to the Criminal Court’s jurisdiction.
Accordingly, Judge Dixon’s order that the Criminal Division has jurisdiction over appellant’s misdemeanor charge of possession of cocaine is affirmed, and the case is remanded for trial.
So ordered.
ROGERS, Chief Judge,
concurring:
I join the majority opinion in its holding that a child is
charged [by the United States Attorney under D.C.Code] § 16-2301(3)(A) once a judge has signed and filed an arrest warrant in the warrant office based on probable cause derived from a complaint and supporting affidavit signed by a police officer and approved by an Assistant United States Attorney who has designated on the affidavit and the warrant one of the felony offenses enumerated in § 16-2301(3)(A).
Majority opinion at [1047]. Under our opinion in In re C.S., 384 A.2d 407 (D.C.1977), appellant is subject to prosecution as an adult for the subsequent drug offense. Therefore, I must also concur in the affirmance of the judgment. M.A.P. v. Ryan, 285 A.2d 310 (D.C.1971).
I write separately, however, because I am persuaded that our opinion in C.S. is contrary to the statutory scheme for the prosecution of subsequent delinquent acts under D.C.Code § 16-2307(h). Linking “all the consequences” that flow from a judicial transfer decision under D.C.Code § 16-2307(d) to a transfer under § 16-2301(3)(A) by action of the United States Attorney in charging an enumerated offense, see C.S., supra, 384 A.2d at 411, is contrary to the language of the statute and the clear, uncontroverted legislative history that Congress intended for a child under age 18 to be subject to the jurisdiction of the Family Division unless a judge had determined, after a hearing, that there were no reasonable prospects for rehabilitating the child before his majority. D.C. Code § 16-2307(d). The only exception that Congress authorized was for a child charged by the United States Attorney with certain violent offenses, D.C.Code § 16-2301(3)(A); in that event, the child would be prosecuted as an adult on that charge. Nothing in the plain language of the statute or the legislative history suggests, as the court concluded in C.S., that a subsequent delinquent act of such a child was to be prosecuted as an adult criminal offense in the absence of a judicial transfer proceeding. The seriousness of the court’s interpretation in C.S. is underscored by the fact that the transfer provision of the D.C. Court Reform and Criminal Procedure Act of 1970 closely followed the decision in Kent v. United States, 383 U.S. 541, 86 S.Ct. 1045, 16 L.Ed.2d 84 (1966), which held that a transfer of a juvenile for prosecution as an adult must accord with due process of law.
The District of Columbia Court Reform and Criminal Procedure Act of 1970, Pub.L. No. 91-358, 84 Stat. 473, 523, provides that a child under the age of 18 at the time of an alleged criminal offense is entitled to the protections of the juvenile justice system subject to two exceptions relevant to this appeal. First, under D.C.Code § 16-2301(3)(A), a “child” is defined to exclude persons between the ages of 16 and 18, who would otherwise be entitled to the protections of the juvenile justice system, who has been charged by the United States Attorney with an enumerated offense. Such a child, as a result of the prosecutor’s decision to charge an enumerated offense, is automatically transferred from the Family to the Criminal Division for prosecution on that charge. Second, the statute provides for the judicial transfer of certain children, on motion of the Corporation Counsel following consultation with the Director of Social Services. D.C.Code § 16-2307. A judge may order transfer of jurisdiction over the child from the Family to the Criminal Division only after a hearing at which the child is represented by counsel, and consideration of reports and factors spelled out in the statute. The judge must find that there are no “reasonable prospects for rehabilitating a child pri- or to his majority.” Id. § 16-2307(d). Restoration of Family Division jurisdiction over a child who is judicially transferred is nevertheless required, however, under certain conditions. Subsection (h) of § 16-2307 provides that:
Transfer of a child for criminal prosecution terminates the jurisdiction of the [Family] Division over the child with respect to any subsequent delinquent act; except that jurisdiction of the [Family] Division over the child is restored if (1) the criminal prosecution is terminated other than by a plea of guilty, a verdict of guilty, or a verdict of not guilty by reason of insanity, and (2) at the time of the termination of the criminal prosecution no indictment or information has been filed for criminal prosecution for an offense alleged to have been committed by the child subsequent to transfer. [Emphasis added.]
The only reason appellant faces adult prosecution in the Criminal Division for the drug offense is because it is considered a “subsequent delinquent act” under the reasoning of C.S. In C.S., supra, 384 A.2d at 407, that the court held that “once an individual who is sixteen years of age or older has been charged by the United States Attorney with a crime pursuant to D.C. Code 1973, § 16-2301(3)(A), then that individual shall be deemed transferred for criminal prosecution within the meaning of § 16-2307(h), with the resulting termination of Family Division jurisdiction (subject to restoration as prescribed).” 384 A.2d at 411 (footnote omitted). The court reached this conclusion on the basis of its view that Congress “must have intended to incorporate into § 16-2301(3)(A) all the consequences of a jurisdictional ‘transfer’ from Family to Criminal Division that are set forth in § 16-2307(h).” Id. The court explained:
If discretionary [judicial] “transfer of a child for criminal prosecution,” § 16-2307(h), automatically means that the Family Division loses jurisdiction over all “subsequent delinquent acts” of that child (subject to restoration of jurisdiction under certain circumstances not relevant here), there is no reason to believe that Congress intended to assure criminal prosecution of certain violent youthful offenders by virtue of § 16-2301(3)(A) and yet retain Family Division jurisdiction over their subsequent delinquent acts. Section 16-2307 provides for the judicial determination of suitability for adult criminal treatment, whereas § 16-2301(3)(A) is an effective legislative determination of such suitability. Because in either case the same substantive determination has been made, we conclude that Congress intended identical treatment of subsequent delinquent acts.
Id. at 411 (emphasis in original).
In reaching this conclusion, the court in C.S. viewed as not particularly relevant a statement by Senator Tydings that prosecution as an adult upon being charged by the United States Attorney “has no bearing on [a child’s] trial on subsequent charges, even if he is convicted.” Id. at 410 n. 3. Rather, the court decided as “a matter of logic,” id. at 410, that in view of “the overriding concern of Congress ... to remove both the first time ‘violent youth offender and the recidivist’ (age 16 and older) from the juvenile treatment system altogether — a measure designed primarily to protect ‘the rest of the juvenile community’ in detention,” id. at 411, that all of § 16-2307(h)’s consequences applied to juveniles in the Criminal Division by virtue of being charged by the United States Attorney under § 16-2301(3)(A). In rejecting the government’s view, which relied on the Senate Managers’ statement on the intent of Congress regarding subsequent delinquent acts by a child prosecuted as an adult pursuant to § 16-2301(3)(A), the court in C.S. placed emphasis on the House Report pointing to the intended contraction of juvenile jurisdiction. The court also emphasized the absence of floor debate or additional commentary in the Conference Report, which presumably would have supplemented Senator Tydings’ quotation of the Senate Managers’ statement, noting, by contrast, the intense debate in both houses on the definition of child and judicial transfer provisions. Id. at 410-411. There are serious flaws in this reasoning.
First, the plain language of the statute does not support the linkage of the two different transfer mechanisms for purposes of the treatment of subsequent delinquent acts. See Peoples Drug Stores v. District of Columbia, 470 A.2d 751, 753 (D.C.1983) (en banc) (“[T]he primary and general rule of statutory construction is that the intent of the lawmaker is to be found in the language that he has used.”) (quoting United States v. Goldenberg, 168 U.S. 95, 102-03, 18 S.Ct. 3, 4, 42 L.Ed. 394 (1897)). The statute is specific about the offenses that the United States Attorney may charge and does not refer to, much less authorize, the adult prosecution of subsequent delinquent acts in the absence of a judicial transfer of the child under § 16-2307. The statute is also explicit about the procedures that must be followed and the judicial finding that must be made before a judge may transfer jurisdiction over a child from the Family Division to the Criminal Division of the Superior Court. Only then does the statute authorize adult prosecution of subsequent delinquent acts, and even then the statute provides for restoration of Family Division jurisdiction of such a child if the offense underlying the judicial transfer is disposed of favorably to the child and in the meantime the child has not been charged by information or indictment as a result of a subsequent delinquent offense.
Second, Senator Tydings’s statement that being prosecuted as an adult upon being charged by the United States Attorney “has no bearing on [a child’s] trial on subsequent charges” is definitive evidence of legislative intent. Speaking on the Senate Floor following the Senate-House Conference, Senator Tydings, the chairman of the Senate District of Columbia Committee, stated:
Under the House version ... a juvenile once transferred [under the ad hoc procedure in § 16-2307 (judicial transfer)] was thereafter to be excluded from the juvenile system even if the charge proved at trial in the Criminal Division to be unfounded. The Senate conferees urged successfully that if the grounds for transfer prove to be without foundation, then logically and in all fairness Family Division jurisdiction must be restored; and any subsequent case against the child must be brought in the juvenile court (Family Division).
It bears mentioning that the latter concept in the conference substitute is intended to operate even more completely in cases’ shifted to the criminal court by the operations of the new definition of “child.” If a 16 year old is charged with armed robbery, he is to be tried in the Criminal Division. But trial once in the Criminal Division has no bearing on his trial on subsequent charges, even if he is convicted. So, for example, were a 16 year old first offender armed bank robber to receive a suspended sentence only to be subsequently charged with a later unrelated purse-snatching, he would nevertheless be tried in the Family Division unless specially ordered by the court to be transferred.
C.S., supra, 384 A.2d at 410 n. 3 (quoting 116 Cong.Rec. 24346 (1970) (emphasis added in the second paragraph)). In C.S. the court dismissed this statement as the view of one senator. Id. at 410. In fact, Senator Tydings was quoting directly from the Statement of the Managers on the part of the Senate Submitted Regarding the Conference Action Upon S. 2601, the President’s Crime Legislation for the District of Columbia, July 15, 1970 (Committee Print, 91st Cong., 2d Sess.). The Managers’ Statement was prepared as a definitive statement on the meaning of the provisions of the Conference agreement, to respond to misconceptions about the bill reported by the Senate-House Conferees. 116 Cong. Rec. S11942 (daily ed. July 22, 1970) (Senator Tydings describes Senate Managers’ Statement as the “official explanation” of the legislation’s content). Since the Conference agreement was enacted into law, the Managers’ Statement interpreting its provisions must be viewed as definitive evidence of legislative intent.
Third, the House Report reflected views which were modified in the Senate-House Conference agreement. The court in C.S. relied on the statement in the House Report that
Because of the great increase in the number of serious felonies committed by juveniles and because of the substantial difficulties in transferring juvenile offenders charged with serious felonies to the jurisdiction of the adult court under present law, provisions are made in this subchapter for a better mechanism for separation of the violent youthful offender and the recidivist from the rest of the juvenile community.
C.S. supra, 384 A.2d at 410 (quoting H.R. Rep. No. 907, 91st Cong., 2d Sess. 50 (1970)). The court also referred to dictum in Pendergrast v. United States, 332 A.2d 919, 923 (D.C.1975), in which the language quoted from the House Report was viewed as conveying Congress’ intention permanently to transfer for adult prosecution a child charged with an enumerated offense. Id. What the court appears to have overlooked is the fact that the bill passed by Congress adopted the Conference Report which included the provisions regarding subsequent delinquent acts described in the Senate Managers’ statement. The Senate Managers’ statement was consistent with the compromise adopted by the Conferees, and ultimately the Congress, to follow the House lead on the charging authority of the United States Attorney as to certain violent offenses and to adopt the Senate view on the treatment of subsequent delinquent acts. C.S., supra, 384 A.2d at 409. While the court in C.S. acknowledged this compromise, see id., it gave no weight to the plain language of Senate Managers’ statement regarding subsequent delinquent acts.
Furthermore, the Senate Managers’ statement is fully consistent with the statement in the House Report, on which the court relied in C.S., that juvenile jurisdiction was narrowed by “a better mechanism for separation of the violent youthful offender and the recidivist from the rest of the juvenile community.” Id. at 410-11 (citing H.R.Rep. No. 907, 91st Cong., 2d Sess. 50 (1970)). See Logan v. United States, 483 A.2d 664, 673-74 (D.C.1984) (compromise between House and Senate bills adopted by Conferees “greatly reduce[d] the number of cases which the House bill would have automatically transferred to the adult court for trial.”) (quoting Cong.Rec. S11384). That mechanism, as the House Report makes clear, involved two provisions, one for automatic transfer upon the United States Attorney’s charge of an enumerated offense and a second for judicial transfer proceedings. H.R.Rep. No. 907, 91st Cong., 2d Sess. 50, 148-49, 151 (1970). Nothing in the legislative history of the Conference Report contradicts the conclusion that the transfer mechanisms were to be entirely separate. Thus, language extending Criminal Division jurisdiction to subsequent delinquent acts was included in the provision regarding individualized judicial transfers, while no such language was included in the automatic enumerated-offense transfer provision.
Fourth, there was debate on the Conference Report which supported Senator Tyd-ings’ expression of legislative intent. The court in C.S. overlooked Senator Tydings’ direct response to the misleading assertion by a colleague during debate on the Conference agreement that transfer by action of the United States Attorney was irrevocable under the bill adopted by the Conferees. 116 Cong.Rec. S11757, S11760 (chart) (daily ed. July 20,1970). This assertion was directly met by Senator Tydings’ response that transfers by action of the United States Attorney were not irrevocable under the Conference agreement because “Juvenile Court jurisdiction is retained as to any other subsequent offense, even if the juvenile is found guilty of the original charge which led to the automatic transfer.” 116 Cong.Rec. S11943. In addition, the debate on the Conference agreement was directed, insofar as relevant here, to maintaining broad juvenile court jurisdiction for persons under age 18, and directly refutes the conclusion that the bill ultimately adopted by Congress sought to increase the exposure of persons under age 18 to prosecution as adults beyond the express language of the statutory provisions.
Neither party has cited, and I have not found, any indication in the legislative history that “all the consequences” of a judicial transfer under § 16-2307 were intended to apply to the subsequent delinquent acts of a child who is automatically transferred by the United States Attorney for adult prosecution for an enumerated offense under § 16-2301(3)(A). In fact, as noted elsewhere in this opinion, all indications are to the contrary. See generally Mary C. Lawton, Juvenile Proceedings— The New Look, 20 AmeR.Univ.L.Rev. 342 (1971) (Lawton) (discussing the juvenile provisions of the District of Columbia Court Reform Act). Therefore, neither the language of the statute nor the legislative history support the court’s conclusion in C.S., supra, that Congress intended that a child automatically transferred for an enumerated offense under § 16-2301(3)(A) would be subject to adult prosecution for subsequent delinquent acts (except as provided in § 16-2307(h)).
In other words, when the juvenile provisions of the District of Columbia Court Reform Act are read as a whole, the statutory scheme is clear. Congress vested broad discretion in the United States Attorney to prosecute enumerated offenses committed by persons between 16 and 18 years of age in an adult prosecution. Congress also favored the transfer of jurisdiction over certain juveniles on motion of the Corporation Counsel after a determination by a judge that there were no “reasonable prospects for rehabilitating the child prior to his majority.” In such cases, Congress further provided that Family Division jurisdiction would be restored if the transfer offense was concluded favorably to the child and, in the interim, an information or indictment had not been filed with respect to a delinquent offense occurring after the transfer. But Congress did not also provide that in the absence of a judicial transfer pursuant to § 16-2307, a child would be subject to prosecution as an adult for non-enumerated offenses which the United States Attorney did not have discretion to charge.
The linkage of § 16-2301(3)(A) and § 16-2307(h) by the court in C.S., is, thus, contrary to the statutory scheme and clear legislative intent, and overturns the presumption of juvenile treatment for persons under age 18. See United States v. Tucker, 407 A.2d 1067, 1070 (D.C.1979) (“in view of rehabilitative purposes of our juvenile justice system, D.C.Code 1973 § 16-2301(3) should be strictly construed against the prosecution and in favor of the person being proceeded against”). Instead of accepting the evidence that Congress did not intend generally to lower the age of juvenile jurisdiction, but only to carve out exceptions for those charged with enumerated offenses by the United States Attorney and those whom a judge had determined did not offer reasonable prospects for rehabilitation under the juvenile justice system, the C.S. court accomplished what opponents to the Conference agreement bill feared and proponents of the bill said was not intended. In so doing, the resulting deprivation of significant statutory rights for a child who has not been determined to be without reasonable prospects of rehabilitation before his majority is contrary to the statute and due process.
In Kent v. United States, 383 U.S. 541, 86 S.Ct. 1045, 16 L.Ed.2d 84 (1966), the Supreme Court held that fundamental procedural due process is required where “critically important” action “determining vitally important statutory rights of the juvenile” are at stake. Id. at 556, 86 S.Ct. at 1055. Although Kent addressed the waiver-of-jurisdiction statute in existence prior to the District of Columbia Court Reform Act of 1970, the two means by which a person under 18 can be prosecuted as an adult under the Act — by § 16-2301(3)(A) and § 16-2307 — result in the loss of the same type of important statutory rights at issue in Kent. In enacting the District of Columbia Court Reform Act, the legislative history indicates that Congress intended that juveniles be given their full due process rights. Indeed, the House Report specifically referred to the then-recent decision of the Supreme Court in Kent. See H.R.Rep. No. 907, 91st Cong., 2d Sess. 49, 53 (1970).
This court has acknowledged that, “[a]s the Supreme Court noted in addressing the precourt reorganization predecessor of § 16-2301(3), the decision whether an accused is subject to juvenile or adult court is a vitally important one which affects not only the length of confinement but many collateral interests such as the loss of civil rights, the use of an adjudication in subsequent proceedings and disqualification for public, employment.” Tucker, supra, 407 A.2d at 1071-72. Consequently, the loss of statutory rights to juvenile treatment of subsequent delinquent acts by a child automatically transferred under § 16-2301(3)(A) implicates the procedural due process rights required under Kent, supra, 383 U.S. 541, 86 S.Ct. 1045. Accordingly, while Congress may define who is a child in a manner that is a legislatively reasonable classification, Pendergrast, supra, 332 A.2d at 923-24 (following United States v. Bland, 153 U.S.App.D.C. 254, 258-59, 472 F.2d 1329, 1333-34 (1972), cert. denied, 412 U.S. 909, 93 S.Ct. 2294, 36 L.Ed.2d 975 (1973)), and Kent, supra, does not mean that a reasonable legislative classification would run afoul of due process, Kent does mean that non-adult status to a child may not be denied without due process protections. 383 U.S. at 557, 86 S.Ct. at 1055.
Due only to the court’s “logic” in C.S. is a child subject to continued adult prosecution when the child is neither a recidivist nor a person bereft of the prospects for rehabilitation; but for such “logic,” a child who is not prosecuted as an adult for an enumerated offense pursuant to § 16-2301(3)(A) would not be deprived of the benefits of the juvenile justice system without a hearing and judicial determination under § 16-2307, which includes procedural safeguards of a juvenile’s statutory rights. This interpretation of Congressional intent, in a manner that excludes appellant from the juvenile justice system, is not a wholly irrational classification; Congress considered several formulations for the jurisdiction of the juvenile system in the course of debate on the District of Columbia Court Reform Act, and other jurisdictions define the jurisdiction of the juvenile system in a more restrictive manner. See C.S. supra, 384 A.2d at 412 n. 11 (referring to the statute in Rhode Island); Bland, supra, 153 U.S.App.D.C. at 259 & n. 19, 472 F.2d at 1334 & n. 19. But, since the statutory scheme and legislative history make clear that such linkage between § 16-2301(3)(A) and § 16-2307(h) is inconsistent with the statutory scheme, the due process issue is manifest.
In conclusion: Because the Division is bound by the court’s prior decisions interpreting Congressional intent, M.A.P. v. Ryan, supra, 285 A.2d 310, I join the majority opinion in holding that the Criminal Division had jurisdiction of appellant Marrow’s subsequent misdemeanor drug charge.
. Appellant was convicted of the felony, which is not a subject of this appeal.
. The first step in a prosecution when the government seeks an arrest warrant is the preparation of a "complaint" and an "affidavit” in support of an arrest warrant. See Super.Ct. Crim.R. 4(a). In this case the complaint was signed by a police officer whose signature was attested by a judge. The affidavit, which was a separate sheet attached to the complaint, was signed by the police officer, signed and “approved” by an Assistant United States Attorney, and attested by a judge. Below the complaint on the same form was the application for a “warrant" which named the defendant and specified the charge designated by an Assistant United States Attorney. Upon finding probable cause based on the affidavit, the judge signed the "warrant” portion of the form commanding “The United States Marshal or any other authorized federal officer or the Chief of Police of the District of Columbia” to bring the defendant to court. The complaint, affidavit, and warrant then presumably were filed in the warrant office in the Special Proceedings Branch of the Criminal Division of the Clerk of the Superior Court. After the police officer arrested the defendant, the officer signed and dated a "return" on the “warrant” portion of the complaint form.
According to Super.Ct.Crim.R. 4(a), an arrest warrant may be issued to a police officer without approval of the United States Attorney upon a showing of "good cause.” Id. More specifically, the last sentence of Rule 4(a) provides:
Except for good cause shown by specific statements appearing in the complaint or in an affidavit filed with the complaint, no warrant shall be issued unless the complaint has been approved by an appropriate prosecutor.
For purposes of initiating a prosecution under D.C.Code § 16-2301(3)(A) (1989), the language of the statute makes clear that the felony complaint must have been approved by the office of the United States Attorney. The "good cause” exception permitted under Super.Ct.Crim.R. 4(a) cannot affect that requirement; thus, any warrant issued upon a complaint and affidavit signed by a police officer, without approval “by an appropriate prosecutor,” id., cannot serve as the basis for a “charge” cognizable under § 16-2301(3)(A).
In this case, the complaint, affidavit, and application for a warrant were signed by all the required parties on February 1, 1989 and apparently filed in the warrant office the same day. We do not decide what the critical date would be when the warrant for a crime "charged by the United States attorney,” D.C.Code § 16-2301(3)(A) (1989), is signed by the judge or filed in the warrant office on a day later than the one on which the police officer and Assistant United States Attorney signed the complaint, affidavit, and warrant application. For purposes of analysis in this opinion we note that all required signing occurred the same day, February 1, 1989. Moreover, we assume — absent any contention to the contrary — that all documents were filed in the warrant office in the ordinary course of business on February 1, 1989.
. The record contains a birth certificate with June 12, 1971 listed as the date of birth. The child’s name on the birth certificate is "James Quick,” later amended to "James S. Quick, Jr." Appellant’s mother, Eleanor Braithwaite, appeared at a status hearing and stated that appellant’s real name is James Quick and, as far as we can tell, the fact that the birth certificate belongs to appellant is uncontested.
. An order denying a motion to transfer a case from the Criminal Division to the Family Division is appealable as a final order. See Choco v. United States, 383 A.2d 333, 334-35 (D.C.1978).
. We do not address the question whether Family Division jurisdiction is restored under D.C. Code § 16-2307(h) (1989) when a defendant is arrested and presented in court first on an adult charge and then on a later-charged juvenile offense; the defendant is then indicted as an adult on the juvenile offense; and then the original adult charge is dismissed.
. In M.R., appellant sought to dismiss a juvenile delinquency proceeding for lack of jurisdiction, claiming that the Family Division “ceased to have jurisdiction after adult criminal charges had been filed against [appellant] for events which occurred before the events which were involved in the juvenile delinquency proceeding.” 525 A.2d at 614. We concluded that the answer depended on whether the criminal charges had been filed before or after the juvenile charges, without regard to the respective dates on which the charged criminal and delinquent acts took place. Accordingly, we sustained Family Division jurisdiction over a delinquency charge filed March 2, 1984 for a purse snatching which had occurred on February 24, 1984, even though a judicially-approved warrant containing a "charge” designated by the United States Attorney had been filed with the warrant office on March 16, 1984 for an armed robbery which had occurred on February 22, 1984.
.Apparently, judicially approved applications for arrest warrants are filed in the warrant office under seal and thus do not provide notice of criminal charges until a defendant is arrested pursuant to a warrant. See D.C.Code § l-1524(a)(3)(A) (1987) (exemption from Freedom of Information Act for "[¡Investigatory records compiled for law-enforcement purposes,” disclosure of which would "[¡Interfere with enforcement proceedings”).
. See S.Rep. No. 2981, 91st Cong., 1st Sess. (1969); H.R.Rep. No. 907, 91st Cong., 2d Sess. (1970). Dissenters to the Report of the House Committee on the District of Columbia on this bill noted, however, that “[t]he Committee bill would exclude altogether from juvenile court jurisdiction any child 16 or older simply accused by the United States Attorney of a serious crime ..H.R.Rep. No. 907, 91st Cong., 2d Sess. 208 (1970) (emphasis added).
. Our interpretation of the phrase "charged by the United States attorney" should not be confused with interpretation of the term "charged" when used in other contexts. The Sixth Amendment right to counsel, for instance, attaches “at or after the initiation of adversary judicial proceedings — whether by way of formal charge, preliminary hearing, indictment, information, or arraignment.” Kirby v. Illinois, 406 U.S. 682, 689, 92 S.Ct. 1877, 1882, 32 L.Ed.2d 411 (1972) (emphasis added). However, the constitutional right to counsel at all critical stages of a prosecution reflects different policy goals from those involved in triggering the automatic transfer of jurisdiction from the Family Division to the Criminal Division, see infra, and thus does not inform our decision here.
. The judicial transfer provisions are limited to a child age 15 or more alleged to have committed a felony, or age 16 or more and previously adjudicated a delinquent, or age 18 or older alleged to have committed a delinquent act pri- or to becoming age 18. D.C.Code § 16-2307(a)(l), (2), & (3) (1989).
. The enumerated offenses are murder, forcible rape, burglary in the first degree, robbery while armed, or assault with intent to commit any such offense, "and any other offense properly joinable with such an offense.” D.C.Code § 16-2301(3)(A). A “child" also does not include a person charged with an offense listed in subpart (A) and convicted by plea or verdict of a lesser included offense, § 16-2301(3)(B), or a person charged with a traffic offense. § 16 — 2301(3)(C). Congress also authorized a child under age 18 to be prosecuted as an adult for a traffic offense. D.C.Code § 16-2301(3)(C).
. The drug charge is not an enumerated offense under § 16-2301(3)(A), and appellant has never been transferred by court order under § 16-2307.
. The exceptions in the restoration provision, of § 16-2307(h), were, according to the Senate Report, part of the tempered logic in the bill reported by the Committee. The Senate Report states:
In the opinion of the committee, Family Division jurisdiction must be restored where the basis for the transfer has been invalidated. The Committee recognized that the ultimate finding, regarding the reasonable prospects of rehabilitation, consists of a prediction as to the nature of the child’s social character at the time of disposition. So too, the committee recognized that of great relevance [sic] to this prediction is the nature of the misconduct, which, at the time of any dispositional hearing, the child will have been found to have committed. Yet, in the committee’s opinion, it follows logically — from the fact that the transfer finding amounts to a prediction and from the assumption in that prediction that the child has committed the acts alleged — that a child who is found not to have committed the acts may well not suffer from the lesser prospects of rehabilitation predicted, and ought to be returned to the juvenile system.
The provision, that criminal charges based on misconduct subsequent to transfer bar the restoration of Family Division jurisdiction, simply constitutes a tempering of the logic just described. This tempering is justifiable in that the nature of the pending charge is only one of several factors to be considered at the transfer hearing, and as an accommodation of the demands of administrative ease.
S.Rep. No. 620, 91st Cong., 1st Sess. 12 (1969) (emphasis in original).
. Not joining the Senate Managers’ statement were Senators Eagleton, Goodell and Mathias, whose views in opposition to the bill reported by the Senate-House Conferees were directed at broader issues in the bill as well as opposition to any lowering of the juvenile age from 18 to 16 years of age. 116 Cong.Rec. 11745, 11754, 11756-60 (daily ed. July 20, 1970).
. See, e.g., 116 Cong.Rec. SI 1745, SI 1754, SI 1756-57, SI 1759 (daily ed. July 20, 1970); see also S.Rep. No. 620, 91st Cong. 1st Sess. 8 (1969).
. Under C.S., if the United States Attorney discovers that the juvenile charged is not the person who committed the charged offense— whether because misidentification, an alibi, or other circumstance renders impossible the further prosecution of the enumerated offense — the juvenile is nevertheless subject to prosecution as an adult for subsequent offenses not enumerated in § 16 — 2301(3)(A) unless the restoration provision of § 16-2307(h) kicks in. There is no suggestion in the language of the statute or the legislative history that this is what Congress intended.
Nor is there an indication that the Congress was more concerned with administrative efficiency in the processing of cases than in the appropriate assignment of a child for juvenile or adult prosecution. While the statement by Senator Tydings indicates that the Senate Committee on the District of Columbia did make some accommodations to administrative concerns, by inclusion of the restoration exception in § 16-2307(h), there is nothing in the record to suggest that Congressional concern about administrative matters went further.
. One explanation for the court’s opinion is suggested in a footnote. In footnote 12, the court stated that it was compelled to render a decision under severe statutory time restrictions without the benefit of comprehensive briefing, citing D.C.Code § 16-2327(b) (1973). Id. at 412 n. 12. See D.C.Code § 16-2328(b) (1989) (time limits for interlocutory juvenile appeals). The opinion was originally issued as an unpublished memorandum opinion and judgment, "which, after additional research, [was] expanded in this published opinion.” Id.
. The District of Columbia Court Reform Act, and its juvenile provisions, were written shortly after the Supreme Court decisions in In re Gault, 387 U.S. 1, 87 S.Ct. 1428, 18 L.Ed.2d 527 (1967) (due process requires certain procedural rights for juveniles faced with incarceration), In re Winship, 397 U.S. 358, 90 S.Ct. 1068, 25 L.Ed.2d 368 (1970) (proof beyond a reasonable doubt required in juvenile delinquency adjudications), and Kent v. United States, supra, (due process entitles juvenile to various procedural protections, including hearing, presence of counsel, and statement of reasons, before judicial transfer to adult court). The Senate Report stated that the juvenile provisions were written to provide juveniles with their due process of law. S.Rep. No. 620, 91st Cong., 1st Sess. 1 (1969). See generally Lawton, supra, at 343 (noting need for code revision in view of recent landmark decisions by the United States Supreme Court extending constitutional protections to juveniles).
. The rationale in Bland, supra, 153 U.S.App.D.C. at 259, 472 F.2d at 1334, that Congress was concerned with violent crimes by 16 and 17 years olds and recidivists, is inapplicable to nonviolent subsequent delinquent acts as well as violent subsequent delinquent acts committed by a person under age 18 where the enumerated offense is disposed of favorably to the child automatically transferred under § 16-2301(3)(A).
|
CASELAW
|
Wasi Ahmed
Wasi Ahmed (ওয়াসি আহমেদ) is an acclaimed Bangladeshi novelist and short story writer. His works in original and in translation have been anthologized in Bangladesh, India, Sri Lanka and UK. He has co-authored and edited an anthology of South Asian short stories. Formerly a civil servant and diplomat, he is currently associated with the English daily The Financial Express as consulting editor, and contributes to a number of Bangla and English dailies. Among others, he contributes a weekly post-editorial column for The Financial Express.
Early life and education
He was born in Sylhet, Bangladesh. He obtained his bachelor's and master's degree in English literature from University of Dhaka. He married Naseha Chawdhury on 5 August 1983.
Literary career
Writing since Early eighties. Language: Bengali, English
Major Field of writing: Short stories, novels Focus of Writing: One of the key areas that essentially characterises his writings, according to renowned critic Topodhir Bhattacharjee, is his interpretation of the reality of his time, often disguised under the garb of surface reality.
Others:
* Book reviews in English and Bangla, Articles on contemporary literature, Translation of contemporary short fiction from English into Bangla and vice versa. Writes weekly post-editorial column for the daily Financial Express on trade and economic affairs
* Participated in the International Writing Program (IWP) Fall Residency of outstanding global writers at the University of Iowa, Iowa city, USA (20 August- 8 November 2016)
* Served twice (2013 and 2015) as jury for the Prothom Alo Book of the Year award.
* Attended a number of translation workshops
* Presented keynote papers at a number of literary events organized by BRAC University, Shahitto Shova, Lekhok Shibir (Writers’ Union), The daily Prothom Alo
Translated Work
* The Overtakers, ISBN<PHONE_NUMBER>81-7, Publisher: Adorn Publication, 22 Segunbagicha Dhaka 1000. Year 2018
Short stories
* Shishijapon (Collection of Short Stories), ISBN<PHONE_NUMBER>572, Publisher: Kathaprokash, Kathaprokash, www.kathaprokash.com. Year 2022
* Shoitto Probaho (Collection of Short Stories), ISBN<PHONE_NUMBER>469, Publisher:Abul Khayer, Bengal Publication, Bengal Centre, Plot 2, Civil Aviation New Airport Road, Khilkhet, Dhaka1229. Year 2018
* Bok o Banshful (collection of 10 stories), ISBN<PHONE_NUMBER>817, Publisher: Bengal Publications Ltd, Bengal Center, New Airport Rd, Khilkhet, Dhaka 1229. Year 2015
* Kalashnikover Golap (collection of 10 stories), ISBN<PHONE_NUMBER>640, Publisher: Shuddhashar, Aziz Super Market,Shahbagh, Dhaka1200. Year 2012
* Nirbachito Golpo (selected stories), ISBN<PHONE_NUMBER>856, Publisher: Shuddhashar, Aziz Super Market, Shahbagh, Dhaka1200. Year 2011
* Tri Shimana (collection of 8 stories), Publisher: Oitijjya, 68/69 Paridas Rd, Banglabazar, Dhaka1100. Year 2009
* Shinga bajabe Israfil (collection of 9 stories), ISBN 984776400X, Publisher: Oitijjya, 68/69 Paridas Rd, Banglabazar, Dhaka 1100. Year 2006
* Tepantorer Sanko (collection of 8 stories), ISBN<PHONE_NUMBER>, Publisher: Oitijjya, 68/69 Paridas Rd, Banglabazar, Dhaka 1100. Year 2001
* Beejmontro (collection of 8 stories), ISBN<PHONE_NUMBER>, Publisher: Obosor Prokashona Sangstha, 46/1 HemendraDas Rd, Sutrapur, Dhaka1100. Year 1998
Novels
* Roudro O Chayar Noksha, ISBN<PHONE_NUMBER>830, Publisher: Kathaprokash, www.kathaprokash.com. Year 2022
* Borof Kol, ISBN<PHONE_NUMBER>660, Publisher: Kotha Prokash, 87 Aziz Co-Operative Super Market (3rd floor), Shahbag, Dhaka 1000, Bangladesh. Year 2021
* Eka Doka, ISBN<PHONE_NUMBER>212, Publisher: Prothom Prokashon, C A Bhaban, 100 Kazi Nazrul Islam Avenue, Daka 1215. Year 2017
* Tolkuthurir Gan, ISBN<PHONE_NUMBER>094, Publisher: Prothoma Prokashon, C A Bhaban, 100 Kazi Nazrul Islam Avenue, Dhaka 1215. Year 2015
* Sheet Pakhira, ISBN<PHONE_NUMBER>818, Publisher: Shuddhashar, Aziz Super Market, Shahbagh, Dhaka 1200. Year 2011
* Meghpahar, ISBN<PHONE_NUMBER>, Publisher: Oitijjya, 68/69 Paridas Rd, Banglabazar, Dhaka 1100. Year 2000
Children's Fiction
* Ek Je Chhilam Ami, ISBN<PHONE_NUMBER>, Bangladesh Shishu Academy, Doyel Chattar, Shahbag, Dhaka-1000. Year 1995
Translated stories in major anthologies
* The Book of Dhaka: A City in Short Fiction, ISBN 190558380X, Comma Press (commapress.co.uk). UK publishing date 14 July 2016
* On the side of the Enemy: Short Stories in Translation, ISBN<PHONE_NUMBER>634, edited and translated by Khademul Islam, published by Bengal Lights Book, Green Akshay Plaza, House 52, Road 2/1 Dhanmondi, Dhaka1209. Year 2015
* Voices of Asia: An Anthology of SAARC Fiction, edited by Ajit Cour and Pankaj Bhan, published by the Foundation of SAARC Writers and Literature, 4/6 Siri Fort Institutional Area, New Delhi110 049, India. Year 2002
Awards
* 2021: Abu Rushd Literary Award
* 2019: Bagla Academy Literary Award
* 2015: Akhtaruzzaman Elias Book of the Year Award (for the novel Tolkuthurir Gaan)
* 2015: IFIC Bank Literary Award (for the novel Tolkuthurir Gaan)
* 2012: Prothom Alo Book of the Year Award (for story collection Kalashnikover Golap)
* 2010: Jemcon Literary Award 2010 (for story collection Trishimana)
|
WIKI
|
What Causes Gout?
Filed under:Causes of Gout
What causes gout? There are different factors that may pre-disposition someone to have gout:
The uric acid crystals that cause gout symptoms are produced when the uric acid levels in the body increase. Purines in the food that we eat will create uric acid when they are broken down by the digestive process. The body naturally processes the foods and then send the uric acid to the kidneys, which in turn rid the body of the uric acid through urine. But, if the body is unable to eliminate all of the uric acid then gout symptoms may occur. Protein rich foods may be a cause of gout because they create higher levels of uric acid. Because affluent societies eat a diet of fat, proteins and alcohol, gout is more common. Lead poisoning can also be a cause of gout.
It is possible that kidney defects may genetically predisposition a person to develop gout. Additionally, racial factors may be a key factor– for example, it has been found that gout symptoms are high among the people of the Pacific Islands. In the United States, it has been found that African American males are twice as likely to have gout than Caucasians. Another cause of gout may be the seasonal changes, it has been found that many people experience more gout symptoms in the spring time.
Gout symptoms are more likely to occur in men between the ages of 40 and 50. Although hereditary factors may predisposition someone to gout, there are things that can be done to lower the uric acid levels and lessen the symptoms.
Other health factors may cause a person to develop gout including: obesity or excessive weight gain, hypertension, heavy alcohol intake, renal disorders, abnormal kidney function, and diabetes.
Some gout attacks may be triggered by recent surgery, this is most likely related to the fact that changes in the body fluids have occurred. Patients are advised that they should stop fluid intake in preparation for the surgery which changes the balance of body fluids.
|
ESSENTIALAI-STEM
|
U.N. South Sudan mission recalls police unit over sex abuse allegations
NAIROBI (Reuters) - The U.N. peacekeeping mission in South Sudan has recalled a Ghanaian police unit working at one of its protection camps while it investigates allegations that some of them were involved in sexual abuse, it said on Saturday.
The United Nations Mission in South Sudan said it had asked the 46-member unit to return to the capital Juba from its Protection of Civilians site in Wau, northwest of Juba, after an investigation was launched into a complaint that members of the unit were having sexual relations with women living at the camp.
UNMISS said in a statement that its head, David Shearer, and other mission leaders were briefed about the initial investigation and a decision was made to withdraw the unit from the site.
“The information received indicates that some members of the FPU (Formed Police Unit) allegedly engaged in transactional sex. This is a clear breach of the U.N. and UNMISS Code of Conduct which prohibits sexual relationships with vulnerable individuals, including all beneficiaries of assistance,” it said.
“UNMISS has informed U.N. headquarters in New York of the allegations, which in turn notified the Member State that the matter was being investigated by the United Nations. There is no indication that this behavior is more widespread within the Mission.”
South Sudan, which won independence from Sudan in 2011, descended into civil war in 2013 months after President Salva Kiir fired his deputy Riek Machar. Tens of thousands of people have been killed and a third of the population have fled their homes.
The United Nations has six civilian protection sites across the country, housing some 204,501 people.
UNMISS comprises over 17,000 peacekeeping personnel including 13,000 soldiers and 1500 police officers.
Reporting by George Obulutsa, Editing by William Maclean
|
NEWS-MULTISOURCE
|
Periodic solutions of discontinuous second order differential systems
Jaume Llibre, Marco Antonio Teixeira
Producció científica: Contribució a una revistaArticleRecercaAvaluat per experts
9 Cites (Scopus)
Resum
© 2014, Worldwide Center of Mathematics. All Rights reserved. We provide suffcient conditions for the existence of periodic solutions of some classes of autonomous and non-autonomous second order differential equations with discontinuous right-hand sides. In the plane the discontinuities considered are given by the straight lines either x = 0, or xy = 0. Two applications of these results are made, one to control systems with variable structure, and the other to small external periodic excitation of a discontinuous nonlinear oscillator. Key words and phrases. periodic solution, autonomous discontinuous second order differential equations, non- autonomous discontinuous second order differential equations.
Idioma originalEnglish
Pàgines (de-a)183-190
RevistaJournal of Singularities
Volum10
DOIs
Estat de la publicacióPublicada - 1 de gen. 2014
Fingerprint
Navegar pels temes de recerca de 'Periodic solutions of discontinuous second order differential systems'. Junts formen un fingerprint únic.
Com citar-ho
|
ESSENTIALAI-STEM
|
Page:Shirley (1849 Volume 1).djvu/194
spite of his leg and his deceit—just to pass time like; I’ve known some on ’em do as mich, and some o’ t’ bonniest and mimest looking too—ay! I’ve seen clean, trim young things, that looked as denty and pure as daisies, and wi’ time a body fun’ ’em out to be nowt but stinging, venomed nettles.”
“Joe’s a sensible fellow,” interjected Helstone.
“Howsiver, Sarah had another string to her bow: Fred. Murgatroyd, one of our lads, is for her, and as women judge men by their faces—and Fred. has a middling face, while Moses is none so handsome, as we all knaw—the lass took on wi’ Fred. A two-three months sin’, Murgatroyd and Moses chanced to meet one Sunday night; they’d both come lurking about these premises wi’ the notion of counselling Sarah to tak’ a bit of a walk wi’ them; they fell out, had a tussel, and Fred. was worsted: for he’s young and small, and Barraclough, for all he has only one leg, is almost as strong as Sugden there; indeed, anybody that hears him roaring at a revival or a love-feast, may be sure he’s no weakling.”
“Joe, you’re insupportable,” here broke in Mr. Moore. “You spin out your explanation as Moses spins out his sermons. The long and short of it is, Murgatroyd was jealous of Barraclough, and last night, as he and a friend took shelter in a barn from a shower, they heard and saw Moses conferring with some associates within. From their discourse, it
|
WIKI
|
Page:ProclusPlatoTheologyVolume1.djvu/66
That the ruling order of Gods is in continuity with the intellectual Gods. And that the division into fountains and principles may be assumed from the writings of Plato, through the theory about souls.
How the ruling Gods proceed. And that the supermundane peculiarity pertains to these Gods also.
What the peculiarity is of the ruling Gods. That the assimilative is especially characteristic of them. And how the causes of assimilation are antecedently assumed in the demiurgus; and how, in the intelligible paradigm.
What the powers are of the assimilative Gods. What their energies. And how many goods are imparted by them to the world, and to all mundane natures.
What the divisions are of the assimilative Gods. And that the greatest part of the discourse about them is concerning the middle orders in them.
Many demonstrations, that both according to Plato and other theologists, there is one demiurgus prior to the three demiurgi.
That Jupiter is twofold; one indeed, being prior to the three sons of Saturn, [but the other being one of them.] And how the three proceed from Saturn, and the one Jupiter.
That according to Plato also, the demiurgic monad subsists prior to the three sons of Saturn. Demonstrations of this from what is said in the Politicus, and in the Laws.
|
WIKI
|
Koori Station
Koori Station (桑折駅) is a railway station in the town of Koori, Fukushima, Japan operated by East Japan Railway Company (JR East).
Lines
Koori Station is served by the Tōhoku Main Line, and is located 285.9 rail kilometers from the official starting point of the line at Tokyo Station.
Station layout
The station has one side platform and one island platform connected to the station building by a footbridge, but only the side platform and one side of the island platform is in use. The station is staffed.
History
Koori Station opened on December 15, 1887. The station was absorbed into the JR East network upon the privatization of the Japanese National Railways (JNR) on April 1, 1987.
Passenger statistics
In fiscal 2018, the station was used by an average of 631 passengers daily (boarding passengers only).
Surrounding area
* Koori Post Office
* Koori town hall
|
WIKI
|
Sean Munson
Sean S. Munson (born April 27) is an American basketball player.
College career
Munson signed with Lafayette College and played there for one year. He transferred to Wagner College. Under coach Dereck Whittenburg, he was part of a team that won the NEC Regular Season and Tournament Championship. They advanced to the NCAA Tournament and played Pittsburgh.
In his three-year career at Wagner, he scored 801 points and grabbed 639 rebounds and was a starter during his Junior and Senior year. During his senior year (under Coach Mike Deane), he led his team in rebounding and scoring, and was ranked 30th in the nation in rebounding. Munson led his team to the NEC Championship game in 2005.
Education
Munson graduated from Wagner with a Double Major Degree in Mathematics and Computer Science with a Minor in Physics.
Honors
Munson was named to the NIT Tournament team. He traveled to the Bahamas to play the Bahamian National Team. He traveled to China to play the Chinese National Team. He was recognized as an Academic All-American. He also received the New York Metropolitan Area Basketball Student Athlete Award, which was presented at Madison Square Garden. The Northeast Conference awarded him the NEC Basketball Scholar Athlete Award. His alma mater, Wagner College, named him their Student Athlete of the Year.
Professional career
Munson has played professionally for four years. He played in Luxembourg for Black Star Mersch. He played in Israel for Afula. He played for Bnei Hasharon in Herzliya and Ra'anana.
|
WIKI
|
Wikipedia:Articles for deletion/Cobb Vanth
The result was keep. No prejudice against an AfD at a later time. A rbitrarily 0 ( talk ) 17:11, 11 November 2020 (UTC)
Cobb Vanth
* – ( View AfD View log )
Minor character, no real world significance. Onel 5969 TT me 00:34, 3 November 2020 (UTC)
* Note: This discussion has been included in the list of Science fiction and fantasy-related deletion discussions. Shellwood (talk) 01:37, 3 November 2020 (UTC)
* Note: This discussion has been included in the list of Television-related deletion discussions. Toughpigs (talk) 03:36, 3 November 2020 (UTC)
* Note: This discussion has been included in the list of Fictional elements-related deletion discussions. Toughpigs (talk) 03:36, 3 November 2020 (UTC)
* Keep. Minor character, but still received coverage, and will most likely have more in the future. Probably a case of WP:IDONTLIKEIT. Le Panini (Talk tome?) 01:26, 3 November 2020 (UTC)
* Give it a few days, even, for more third-party commentary to roll in, but leaning toward keep or redirect. If nothing else, the nascent real-world reaction section can handily be merged to the show or character list page, and we'd want that revision history. --EEMIV (talk) 02:27, 3 November 2020 (UTC)
* Weak keep or redirect. Agreed with EEMIV. A few okay sources for the reception section but hardly a convincing case for anyone who may have doubts about notability, hardly any developmental information at all. The creation of this article is a case of WP:TOOSOON, as this character is currently on the cusp of notability in my view, though my prediction is that the character will get further reliable, independent coverage in the months or years to come. Haleth (talk) 03:50, 3 November 2020 (UTC)
* Convert to draft: WP:TOOSOON. Dark knight 2149 22:32, 3 November 2020 (UTC)
* Keep: Good coverage in the Radio Times ("Who is Cobb Vanth? Timothy Olyphant’s Mandalorian character explained"), ScreenRant ("The Mandalorian’s Marshal & Armor Explained (Canon Backstory)") and TechRadar ("Did The Mandalorian season 2 just set up a Star Wars TV spin-off with Cobb Vanth?"). It's gone beyond the TOOSOON point; the character is actually getting coverage, and this has become a notable topic. — Toughpigs (talk) 23:02, 3 November 2020 (UTC)
* Comment. Borderline. There is a reception section and he is named by some sources, so it's not all passing sentence, but the coverage is still niche. --Piotr Konieczny aka Prokonsul Piotrus| reply here 04:25, 4 November 2020 (UTC)
* Weak keep per Toughpigs. There is coverage specifically about the character. Along with Toughpigs' sources above, there is GamesRadar+ (Timothy Olyphant's Cobb Vanth needs to be the first Mandalorian character with his own Disney Plus spin-off), Comic Book Resources (The Mandalorian: Timothy Olyphant's Cobb Vanth May Be Star Wars' Best... Villain!?), and CinemaBlend (The Mandalorian Season 2 Premiere: 6 Reasons Why Timothy Olyphant Is The Best Thing About 'The Marshal'). I could understand if someone said that this coverage is still mostly tied to the episode ("Chapter 9: The Marshal") so I could see a valid argument for redirecting the article there or to The Mandalorian character list, but there is enough at least limited coverage that an outright deletion would not make sense in this case. Aoba47 (talk) 21:38, 7 November 2020 (UTC)
* Keep Clearly enough coverage.Perdikos (talk) 07:01, 10 November 2020 (UTC)
|
WIKI
|
User:Stephanvs
This is my official page in Wikipedia. I'm expert in Royalty and history of currencies and anything about coins and banknotes
Questions
If you have questions, ask me here and I'll answer at anytime I can be available.
|
WIKI
|
Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/73530
Title: Role of mixed species microbial community biofilms in microbially influenced corrosion
Authors: Prasanna Jogdeo
Keywords: DRNTU::Science::Biological sciences::Microbiology
Issue Date: 2018
Source: Prasanna Jogdeo. (2018). Role of mixed species microbial community biofilms in microbially influenced corrosion. Doctoral thesis, Nanyang Technological University, Singapore.
Abstract: Microbially influenced corrosion (MIC) is a process where microorganisms are involved in the deterioration of materials. It is commonly associated with species rich microbial communities forming biofilms on surfaces, facilitating habitat remodeling through complex metabolic processes, such as the formation of anaerobic zones that facilitate the activity of key organisms such as sulfate reducers and iron oxidizers. MIC significantly impacts many industries such as oil and gas, transportation and logistics resulting in the annual loss of billions of dollars from structural damage and early replacement of infrastructure. Environmental factors such as nutrients, oxygen concentration, and convective fields affect the community composition and microstructure of biofilms, thus determining the corrosion rate of the material. Despite the general understanding that MIC results from community level metabolic activity, most MIC studies focus on single-species, axenic cultures or limited combinations of species. The aim of this study was to apply an interdisciplinary approach to assess the onset of MIC. Initial experiments to investigate the effect of a mixed community on MIC of stainless steel (SS) in equatorial seawater, showed a strong selection for biofilm-forming microorganisms from the seawater onto the metal surface. This selection happened rapidly within 1 h and the community did not change significantly over the subsequent 7 d of the experiment. Confocal Laser Scanning Microscopy (CLSM) analysis indicated that attachment and biofilm formation begin within a few hours after inoculation. At the same time, the corrosion potential was observed to increase, indicating that ennoblement of the metal had occurred. Due to challenges in controlling variability in the natural environment, it was essential to design laboratory systems to mimic environment under controlled conditions. Marine mixed microbial communities were enriched from seawater using different artificial seawater formulations and those communities were used as the inocula for subsequent experiments. Electrochemical analysis of coupons incubated with mixed species communities showed a rapid onset of MIC for stainless steel coupons that coincided with the initial stages of biofilm formation. In contrast to the results from the environmental study, no ennoblement of the stainless steel was observed in the laboratory experiments. Visualization of the metal surfaces and biofilms by confocal laser scanning microscopy (CLSM) and field emission scanning electron microscopy (FESEM) showed distinct changes in the topography of metal surfaces during the onset of MIC. It was additionally observed that the biofilms appeared to preferentially form at the inter grain boundaries and this may be a driving factor in pit formation. The community composition of the biofilms formed on the metal surface were found to depend on the composition of the type of stainless steel used and were significantly different from the planktonic community. The effect of several parameters (e.g., stirring, nutrient concentration, surface polishing and oxygen concentration) on MIC rate were investigated in a systematic manner. The carbon source determined the composition of the microbial community, thus the corrosion rate. Surface polishing affected the topography of the metal surface, which in turn changed the localization of biofilms on the surface as compared to unpolished coupons. A continuous flow cell system was designed to allow for continuous nutrient replenishment, which should more closely reflect the natural environment. As for the batch experiments, the results suggested that nutrient composition plays an important role in biofilm formation and determines MIC rate. The electrochemical impedance of the biofilm formed on stainless steel was consistent with the rapid MIC onset. This study has attempted to reproduce the environmental conditions in a reliable laboratory setup, while employing different techniques for the analysis of corrosion behaviour due to biofilms. Overall, the results from this study showed that marine communities rapidly colonize metal surfaces and such biofilms may be formed by organisms that specialize in growth as a biofilm. The results also showed that the early corrosion behaviour is primarily driven by nutrient concentration. However, to better understand the relationship between community members and MIC, further mechanistic studies are needed. Such studies will be possible through the combination of electrochemistry, image analysis and –omics methods to improve our understanding of the role of biofilms in MIC.
URI: http://hdl.handle.net/10356/73530
DOI: 10.32657/10356/73530
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:IGS Theses
Files in This Item:
File Description SizeFormat
PRASANNA JOGDEO 2018.pdf6.12 MBAdobe PDFThumbnail
View/Open
Page view(s)
183
Updated on Mar 7, 2021
Download(s) 50
68
Updated on Mar 7, 2021
Google ScholarTM
Check
Altmetric
Plumx
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.
|
ESSENTIALAI-STEM
|
When Should You Have a Neck or Disc Injury Checked Out?
When should you have a neck or disc injury checked out in West Linn?
Chiropractic West Linn OR Neck or Disc Injury
We’ve all woken up and realized we’re unable to move our heads because of neck pain. Neck pain in West Linn can ruin your day and can lead to spinal pain. The longevity of neck pain can not be determined. However, the pain can persist as a result of other severe conditions such as infection, injury, autoimmune disease, or cancer. Still, symptoms of cancer or autoimmune disease can not be hidden. In today's blog, we want to share some ways you can dictate neck pain and conclude whether or not you need to see the doctor.
What are the possible causes of neck pain in West Linn?
Neck pain is associated with many medical issues and injuries. Some causes of neck pain include:
Aging: Degenerative conditions such as osteoarthritis and spinal stenosis can cause neck pain as you age. Eventually, stress and motion can cause spinal disc degeneration, resulting in a herniated disc or pinched nerve.
Injury: Whiplash is trauma from a rough movement of the neck or head that can cause pain and soreness. Trauma injuries can affect your muscles, ligaments, discs, vertebral joints and nerve roots in the neck.
Mental stress: Tightening your neck muscles due to stress usually leads to neck pain and stiffness.
Physical strain: Overusing your neck muscles during tedious actions or demanding activities can lead to stiffness and pain.
Conditions that affect spinal balance: Poor posture (sitting for long periods of time; poor computer/keyboard/chair positioning), being overweight, weak abdominal muscles can have an effect on spine posture and contribute to neck pain.
Growths: In uncommon scenarios, masses including tumours, cysts and bone spurs can lead to neck pain.
Other health conditions such as meningitis, rheumatoid arthritis, cancer.
When should I call the doctor if I have neck pain?
Check-in with your doctor if your neck pain stops you from performing daily activities. In rare cases, this can be a call for a medical emergency. So, check-in with the doctor if you experience these symptoms:
It started after being involved in an accident.
It leads to numbness.
It happens with numbness or tingling in the arms, shoulders or legs.
It happens with weakness in the legs or loss of coordination in the arms or legs.
It occurs with headaches, dizziness, nausea, or vomiting.
Associated with loss of bowel or bladder control.
It occurs along with a stiff neck.
It comes with chills, fever, or unexplained weight loss.
No relief when resting or moving.
It does not respond to medications.
No relief after one week.
Neck Pain Can Signal Serious Disease
Neck pain can be a symptom of a severe medical condition, especially if the pain is accompanied by another symptom. Such symptoms can include fever, headache, nausea, unexplained drowsiness, confusion or mood swings, unexplained weight loss, or pain that spreads to the arms or legs.
Prevention
Some simple changes in your daily routine can help prevent neck pain. Consider trying to:
Use a good position when standing, sleeping and sitting.
Take frequent breaks during a long-distance journey or work long hours at your desk.
Adjust your desk, chair and computer for direct eye view.
If you smoke, quit.
Avoid lifting heavy objects.
LEARN MORE ABOUT CHIROPRACTIC AND WELLNESS SERVICES OFFERED BY REVIVE INJURY AND WELLNESS IN WEST LINN
More Advice:
When should you go to the doctor after an accident?
Can a Doctor Relieve Migraines
Does my dog need a chiropractor?
Define Stretching
Can a Chiropractor fix a migraine?
Additional Therapy
|
ESSENTIALAI-STEM
|
Syphilis and Pregnancy
The Doctors
Claire, from Tomball, Texas, e-mails that she is six weeks pregnant and afraid that she has contracted syphilis from her boyfriend. Her symptoms include painless sores and a rash around her vagina.
Dr. Lisa says that syphilis infections are on the rise and stresses that Claire needs to see her doctor for immediate treatment. Syphilis is a sexually transmitted disease (STD) caused by the bacterium treponema pallidum. Syphilis can be transmitted through vaginal, anal, or oral sex, and contact with an open sore or contact with a skin rash. The bacteria can enter the body through the penis, anus, vagina, mouth or through broken skin. The disease progresses in three different stages, the first of which includes one or more painless sores on the genitalia, often followed by a rash. If left untreated, the disease can destroy the central nervous system and severely damage organs.
An infected pregnant woman can pass the disease to her unborn child during her pregnancy. Depending on how long a pregnant woman has been infected, she may have a high risk of having a stillbirth (a baby born dead) or of giving birth to a baby who dies shortly after birth. An infected baby may be born without signs or symptoms of the disease. However, if not treated immediately, the baby may develop serious problems within a few weeks. Untreated babies may become developmentally delayed, have seizures or die.
Syphilis is not spread by contact with toilet seats, doorknobs, swimming pools, hot tubs, bathtubs, shared clothing, or eating utensils.
|
ESSENTIALAI-STEM
|
How Your Sleeping Position Can Reduce the Chances of Alzheimer?s
0
14
It may be hard to believe but your sleeping position can have a significant effect on your brain health.
It may be hard to believe but your sleeping position can have a significant effect on your brain health. According to a study conducted at the Stony Brook University in New York, body posture during sleep can significantly affect the rate by which brain wastes are removed. Thus, sleeping in a particular position can help reduce the chances of developing neurological conditions such as Alzheimer?s and Parkinson?s disease.
A study published in the Journal of Neuroscience indicated that a lateral sleeping position can facilitate the effective elimination of metabolic waste products and other toxic substances (such as beta amyloid and tau proteins) in the brain. When left to accumulate, these harmful chemicals can negatively affect brain processes and may increase a person?s risk of developing serious neurological diseases.
The research honed in on how different sleeping positions affect the rate by which the brains of mice remove waste. By using magnetic resonance imaging (MRI) scans, researchers were able to observe and analyze how different sleeping stances affect the glymphatic pathway (the system that gets rid of bad buildup and harmful chemicals in the brain).
Based on the results of their experiments, researchers were able to conclude that the lateral sleeping position or sleeping on one?s side removed metabolic brain wastes more effectively as compared to sleeping on one?s back or stomach. The researchers? colleagues at the University of Rochester then validated these data using fluorescence microscopy and radioactive tracers, and obtained the same results.
While further testing is needed to validate these observations in humans, the study has already accomplished a significant feat by reinforcing the connection between sleep and the development of neurological disorders.
How Sleep Affects the Brain
Aside from facilitating the effective removal of disease-causing substances in the brain, sleep also plays other important roles in keeping the brain in excellent condition.
• It can help repair daily wear and tear. Studies indicate that the body releases chemicals which are crucial for repairing the body and the brain during the deeper stages of sleep. On the other hand, extended wakefulness can permanently damage the neurons (nerve cells responsible for transmitting electrical impulses) and affect a person?s cognitive abilities.
• It can enhance learning. The information you obtained during the day are processed while you sleep. Thus, people who get enough sleep have higher IQs and better memories (both short-term and long-term) as compared to people who don?t get enough sleep.
These studies only prove that sleep is vital for your health and well-being so start getting enough sleep and get into the habit of sleeping on your side if you aren?t already doing it. It can do your brain a lot of good.
|
ESSENTIALAI-STEM
|
Central Serous Chorioretinopathy (CSCR)
What causes central serous chorioretinopathy
Central serous chorioretinopathy (CSCR) is an eye disorder directly associated with stress. It mostly affects people who have a hyperactive personality, or who are very competitive or exposed to prolonged stress. Particularly introverted individuals with personality disorders and the tendency to isolate themselves from social relationships also appear to be susceptible to CSCR.
What causes central serous chorioretinopathy? Emotional and physical stress and high levels of blood cortisol.
People most affected by CSCR are males between the ages of 25 and 55 years. In women, it is usually the result of cortisol-based therapies or conditions that increase blood cortisol.
Generally speaking, Central serous chorioretinopathy is not serious; however, it can cause great concern for those who suffer from it. It is characterized by the presence of concentrated areas of inflammation on the surface of the retina.
Central serous chorioretinopathy symptoms: fluid collects below the central portion of the retina (macula) in the absence of associated chorioretinal diseases. The symptoms involve blurred vision, presence of central dots and distorted images.
CSCR typically disappears spontaneously in two to four months with complete recovery of sight. It can however relapse and become chronic.
Be sure to ask your ophthalmologist for advice.
Recommended product
|
ESSENTIALAI-STEM
|
Violetear
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Violetear
Colibri coruscans.jpg
Sparkling violetear, Colibri coruscans
Scientific classification e
Kingdom: Animalia
Phylum: Chordata
Class: Aves
Order: Apodiformes
Family: Trochilidae
Subfamily: Trochilinae
Genus: Colibri
Spix, 1824
Species
5, see text
The violetears are hummingbirds of the genus Colibri. They are medium to large species found in Mexico, and Central and northern South America. The Mexican violetear occasionally wanders as far north as the United States and even Canada.
Violetears have ample rounded tails and short or medium black bills. Three of the four species have a mainly green plumage. The males have a violet blue patch running back and down from the eye, which is erected when they are excited, and a glittering throat patch. The female plumage is generally like the male’s, but the ear and throat patches are smaller.
Violetears build substantial cup nests into which two white eggs are laid. They have loud persistent songs, often repetitions of double notes.
These birds come readily to artificial nectar feeders, and show no fear of humans. They are aggressively territorial, and at feeders or flowering shrubs they spend much time chasing other hummingbirds, rather than feeding.
Species[edit]
References[edit]
|
ESSENTIALAI-STEM
|
Evaluate Ideals VDRs Vs Field VDRs
A VDR is a software program for safely sharing and storing info. They offer AES-certified 256-bit security and an in depth activity log. They are designed for small to large businesses, and they also experience two ideas for individuals.
The best VDRs enable you to audit important computer data and can get on in a variety of ways. As an example, a VDR can help you observe what documents your users are searching for and which ones are frequently accessed. You may also revoke use of documents. A VDR may also allow you to password-protect documents and add customized watermarks. Contrary to https://websecuredata24.com/compare-ideals-vdrs-vs-box-vdr/ Package, a VDR allows you to give different jobs to different users and set various permission levels.
A VDR also comes with a lot of peace of mind by safeguarding confidential data. This is important in the event you handle delicate data, and a VDR allows you to store large volumes of prints of documents carefully. A VDR also paths user activity and places specific user permissions. An excellent VDR provider should also have a flexible system that can be deployed on-premise or perhaps cloud-based, according to needs of your business.
Rates for VDRs varies greatly. A lot of providers request per gigabyte although some offer endless storage space. Opt for the dimensions of the data you need to store. Endless storage is the foremost option for much larger enterprises. However , some providers charge for each gigabyte, that makes them unacceptable for smaller sized projects.
Leave a Reply
|
ESSENTIALAI-STEM
|
Archive for June, 2009
Mysql Timestamp a useful Data type
Till now we were using DateTime Datatpe but latly found that there is some thing better for tracking user updation and insertion tracking, say we use for security purpose time crate and time update there Timestamp can be best used as it automatically updates column without mentioning it , following is the example
mysql> CREATE TABLE ts_test1 (
-> ts1 TIMESTAMP,
-> ts2 TIMESTAMP,
-> data CHAR(30)
-> );
Query OK, 0 rows affected (0.00 sec)
mysql> DESCRIBE ts_test1;
+——-+———–+——+—–+———————+——-+
| Field | Type | Null | Key | Default | Extra |
+——-+———–+——+—–+———————+——-+
| ts1 | timestamp | YES | | CURRENT_TIMESTAMP | |
| ts2 | timestamp | YES | | 0000-00-00 00:00:00 | |
| data | char(30) | YES | | NULL | |
+——-+———–+——+—–+———————+——-+
3 rows in set (0.01 sec)
mysql> INSERT INTO ts_test1 (data) VALUES (‘original_value’);
Query OK, 1 row affected (0.00 sec)
mysql> SELECT * FROM ts_test1;
+———————+———————+—————-+
| ts1 | ts2 | data |
+———————+———————+—————-+
| 2005-01-04 14:45:51 | 0000-00-00 00:00:00 | original_value |
+———————+———————+—————-+
1 row in set (0.00 sec)
mysql> . . . time passes . . .
mysql> UPDATE ts_test1 SET data=’updated_value’;
Query OK, 1 row affected (0.00 sec)
Rows matched: 1 Changed: 1 Warnings: 0
mysql> SELECT * FROM ts_test1;
+———————+———————+—————+
| ts1 | ts2 | data |
+———————+———————+—————+
| 2005-01-04 14:46:17 | 0000-00-00 00:00:00 | updated_value |
+———————+———————+—————+
1 row in set (0.00 sec)
The same behavior occurs if you specify both DEFAULT CURRENT_TIMESTAMP and ON UPDATE CURRENT_TIMESTAMP explicitly for the first TIMESTAMP column. It is also possible to use just one of the attributes. The following example uses DEFAULT CURRENT_TIMESTAMP, but omits ON UPDATE CURRENT_TIMESTAMP. The result is that the column is initialized automatically, but not updated when the record is updated:
mysql> CREATE TABLE ts_test2 (
-> created_time TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
-> data CHAR(30)
-> );
Query OK, 0 rows affected (0.00 sec)
mysql> INSERT INTO ts_test2 (data) VALUES (‘original_value’);
Query OK, 1 row affected (0.01 sec)
mysql> SELECT * FROM ts_test2;
+———————+—————-+
| created_time | data |
+———————+—————-+
| 2005-01-04 14:46:39 | original_value |
+———————+—————-+
1 row in set (0.00 sec)
mysql> . . . time passes . . .
mysql> UPDATE ts_test2 SET data=’updated_value’;
Query OK, 1 row affected (0.00 sec)
Rows matched: 1 Changed: 1 Warnings: 0
mysql> SELECT * FROM ts_test2;
+———————+—————+
| created_time | data |
+———————+—————+
| 2005-01-04 14:46:39 | updated_value |
+———————+—————+
1 row in set (0.00 sec)
Note that even though the record is updated, the created_time column is not. In versions of MySQL Server before 4.1, the UPDATE statement would have caused the created_time column to be updated as well.
The next example demonstrates how to create a TIMESTAMP column that is not set to the current timestamp when the record is created, but only when it is updated. In this case, the column definition includes ON UPDATE CURRENT_TIMESTAMP but omits DEFAULT CURRENT_TIMESTAMP:
mysql> CREATE TABLE ts_test3 (
-> updated_time TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
-> data CHAR(30)
-> );
Query OK, 0 rows affected (0.01 sec)
mysql> INSERT INTO ts_test3 (data) VALUES (‘original_value’);
Query OK, 1 row affected (0.00 sec)
mysql> SELECT * FROM ts_test3;
+———————+—————-+
| updated_time | data |
+———————+—————-+
| 0000-00-00 00:00:00 | original_value |
+———————+—————-+
1 row in set (0.00 sec)
mysql> UPDATE ts_test3 SET data=’updated_value’;
Query OK, 1 row affected (0.00 sec)
Rows matched: 1 Changed: 1 Warnings: 0
mysql> SELECT * FROM ts_test3;
+———————+—————+
| updated_time | data |
+———————+—————+
| 2005-01-04 14:47:10 | updated_value |
+———————+—————+
1 row in set (0.00 sec)
Note that you can choose to use CURRENT_TIMESTAMP with neither, either, or both of the attributes for a single TIMESTAMP column, but you cannot use DEFAULT CURRENT_TIMESTAMP with one column and ON UPDATE CURRENT_TIMESTAMP with another:
mysql> CREATE TABLE ts_test4 (
-> created TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
-> updated TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
-> data CHAR(30)
-> );
ERROR 1293 (HY000): Incorrect table definition; there can be
only one TIMESTAMP column with CURRENT_TIMESTAMP in DEFAULT
or ON UPDATE clause
Nevertheless, you can achieve the effect of having one column with the creation time and another with the time of the last update. To do this, create two TIMESTAMP columns. Define the column that should hold the creation time with DEFAULT 0 and explicitly set it to NULL whenever you INSERT a new record. Define the column that should hold the updated time with DEFAULT CURRENT_TIMESTAMP:
mysql> CREATE TABLE ts_test5 (
-> created TIMESTAMP DEFAULT 0,
-> updated TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
-> data CHAR(30)
-> );
Query OK, 0 rows affected (0.01 sec)
mysql> INSERT INTO ts_test5 (created, data)
-> VALUES (NULL, ‘original_value’);
Query OK, 1 row affected (0.00 sec)
mysql> SELECT * FROM ts_test5;
+———————+———————+—————-+
| created | updated | data |
+———————+———————+—————-+
| 2005-01-04 14:47:39 | 0000-00-00 00:00:00 | original_value |
+———————+———————+—————-+
1 row in set (0.00 sec)
mysql> . . . time passes . . .
mysql> UPDATE ts_test5 SET data=’updated_value’;
Query OK, 1 row affected (0.00 sec)
Rows matched: 1 Changed: 1 Warnings: 0
mysql> SELECT * FROM ts_test5;
+———————+———————+—————+
| created | updated | data |
+———————+———————+—————+
| 2005-01-04 14:47:39 | 2005-01-04 14:47:52 | updated_value |
+———————+———————+—————+
1 row in set (0.00 sec)
By default, MySQL defines TIMESTAMP columns as NOT NULL and stores the current timestamp in the column if you assign it a value of NULL. If you want to be able to store NULL in a TIMESTAMP column, you must explicitly write the column definition to allow NULL when creating or altering the column:
.chm To .pdf Converter
Well I Was thinking of reading mysql 5.0 certification Guide and came across the this .chm extension which not user friendly i feel , so was looking out for ways of puting it in pdf format, well you google it out chmtopdf pilot Click Here was there, it adds some text on top of the page but its fine till u want to have better user experiance.
well Let me know if you know better tool for the same.
|
ESSENTIALAI-STEM
|
Moseley Square, Glenelg
Moseley Square is a public square in the City of Holdfast Bay at Glenelg, and was named for Henry J. Moseley, the builder and first publican of the Pier Hotel, Glenelg. Located between Jetty Road and Glenelg Beach, the Square is the location of the Glenelg Town Hall, Glenelg Jetty, the Stamford Grand Hotel and various fast-food outlets. It is the terminus of the Glenelg tram line (for many years the only tram line in Adelaide) from Adelaide. It is a site of major events including the Glenelg Jazz Festival and the City to Bay Fun Run.
Centenary monument
On 28 December 1936 an 11 m obelisk, erected to commemorate the landing of British pioneer settlers 100 years, earlier was unveiled at Moseley Square. The memorial, also known as the Pioneers' Memorial, was designed by architect Gordon Beaumont Smith and shaped by Adelaide monumental mason A. S. Tillett from South Australian marble, placed on a base of Victor Harbor granite. It was topped by a 2.4 m bronze model of HMS Buffalo modelled by H. Dalton Hall. In the frieze at the top of its four faces were carved roundels containing bas-relief portraits of Governor Hindmarsh, Robert Gouger, Edward Gibbon Wakefield, and George Fife Angas. On the east and west faces were carved representations of the foundation and proclamation of the colony, from sketches by Ivor Hele and modelled in plaster by J. H. Choate of the School of Arts.
Bronze tablets on the northern and southern sides carry tributes to Wakefield, Gouger, Torrens, Angas, Nuyts, Flinders, Baudin, Sturt, Barker, and Light, and "the first settlers, men and women, who by faith and courage endured the hardships of pioneer settlement to lay the foundations of South Australia. Si monumentum requiris circumspice". — For [their] monument, look around you. — (as per Christopher Wren's epitaph in St Paul's Cathedral, London).
Stamford Grand Hotel
The Stamford Grand Hotel occupies a site previously occupied by the Pier Hotel, constructed in 1856.
1995 International Tattoo
Moseley Square was the venue for what was styled "Sensational Adelaide International Tattoo" between 23 November and 3 December 1995, starting at sunset. The event had the Centenary monument as a backdrop and the audience of around 3,000 was seated grandstand-fashion on three sides. Inspired by the Edinburgh Tattoo, it featured bands from the Royal Scots Dragoon Guards, Brigade of Gurkhas, Royal Australian Navy and South Australian Police Force, plus demonstrations from a quartet of flag wavers from Umbria and a composition "Celtic Dreaming" for didgeridoo, bodhrán and bagpipe. A VHS recording of highlights from the concerts was produced and marketed by the ABC.
The Square has undergone some refurbishment during the 2000s.
|
WIKI
|
User:Leirus
Hello and be welcome! This is my talk page. Currently I do not have time to create an elaborated one, but I will do it, promise!
I am not a native speaker (Of english, anyway) and my main goal here was translating to the spanish wiki, which is smaller than it should... However I am still trying to know if there is any particular process to do that without creating the articles from scratch.
|
WIKI
|
Malwala Palace
Malwala Palace was built in 1845 and is located in Hyderabad, telangana, India. Malwala Palace was located along the road leading towards east from Charminar. It was constructed in Mughal and Rajasthani style and in Hyderabadi courtyard style, was known for its richly carved. wooden pavilion. Other than Raja Bhagwandas Bagh Pavilion, Malwala Palace was the only other palace in Hyderabad having a wooden pavilion. Barring the grand gateway, the entire palace complex has been demolished in August 2000 and a shopping mall has been built in its place.
History
The Malwalas were responsible for the revenue records of the Nizam's dominions. The palace belonged to a noble family of Dewan Chandulal, the Malwala or the custodians of the Revenue Records (Daftar -i- Mal) of the erstwhile Hyderabad State. Built in the early 18th century by the noble Sagar Mall during the reign of first nizam in 1724, this was one of the very few palaces of Hyderabad built in the Mughal and Rajasthani styles of architecture. It acquired the name Malwala as Sagar Mall was the custodian of revenue records (maal) in hyderabad state. At the time department of revenue was held by the Mathur Kayastha family or Malwala family. During the 1940s, at the time of one of the family descendants, Raja Dharam Karan, the grandeur of the palace was resplendent and was noted for its glory and power.
It was an exquisite Diwan Khana made of huge arches in lacquered wood and painted with vegetable dyes and two galleries about 80 m in length flanking the Diwan Khana on each side constructed with Rangoon teak rafters. The galleries housed priceless collection of antique Indian art and artifacts. The palace also had a library, which boasted of a collection of rare books and manuscripts from the 10th century A.D. It is one of the few wooden edifices in the city, a double-storeyed mansion with inner courtyards, with its ornamental archway entrance rich in stucco work and a fountain at the centre. There were wooden pavilions on two sides and overhanging wooden balconies with intricate patterns in Rajasthani and Mughal architectural styles.
|
WIKI
|
Talk:Crown-Ikarus 286
Proposed merge with Orion Bus Industries Orion-Ikarus 286
Both bus models are virtually identical except for the name and manufacturing location, and so they do not warrant separate articles especially when one of the articles is very short. Therefore, I would propose that they be merged under the more general Ikarus 286 title. « « « SOME GADGET GEEK » » » (talk) 01:01, 7 February 2019 (UTC)
* Strong oppose: The Crown-Ikarus article is well-written and includes extensive citations of reliable sources (full disclosure: I wrote it), whereas the other one is so poor that it should have been deleted years ago; it has never cited a single source. When it was created in 2013, I assumed that someone would nominate it for deletion soon if it did not improve, which it never did. I did not PROD it myself, because I dislike arguing with other transit-fan editors, but I've kept it on my watchlist continuously and if someone else had PRODed it, I would have supported the deletion nomination. The complete lack of sourcing has also allowed major errors, including in the article's title (currently "Orion Bus Industries Orion-Ikarus 286"): No company named "Orion Bus Industries" existed during the years of production of the Orion-Ikarus. Orion was only a brand name until 1995, and the actual name of the company that built the Canadian Ikarus buses was Ontario Bus Industries. (The article on Orion Bus Industries was also badly erred/misleading on this point until just now, when I corrected that longstanding deficiency.)
* As to merging (temporarily setting aside my deletion argument): This is not just an article about a bus model; it is an article about a joint venture between a American company and a Hungarian company. For that reason, I have been planning to rename the article simply "Crown-Ikarus" (without "286") and tweak the intro wording in accordance with that move, for some time now, but had not gotten around to it. If the Crown-Ikarus and Orion-Ikarus buses were "virtually identical" (says who?) as User:Some Gadget Geek claims, that may (or may not) be true from the perspective of a bus driver or transit agency, but those are not the only points of view relevant for Wikipedia. The Crown-Ikarus was assembled entirely in the U.S., by a U.S. company (and using U.S. parts for nearly all but the bodyshells), while the Orion-Ikarus was assembled entirely in Canada, by a Canadian company (and a company that was not affiliated with Crown Coach). That is not a minor distinction. And bus fans are not the only audience for Wikipedia articles like this one. These two subjects should remain separate articles, and in my opinion the completely unsourced (and misnamed) "Orion Bus Industries Orion-Ikarus 286" article should be deleted until and unless it can be brought up to reasonable minimum WP standards. SJ Morg (talk) 12:04, 7 February 2019 (UTC)
|
WIKI
|
Page:Origin of metallic currency and weight standards.djvu/343
*[Greek: machos] which is taken to mean silphium-weigher ([Greek: sliphio-] being either a mis-spelling of the artist, or the local form of the word, whilst the latter part is connected with the Egyptian mach = to weigh). Close to the silphium packets is the word [Greek: MAEN], which has not been explained, but which may be simply a form of the word mina (manah, meneh) and denotes that each packet weighed that amount.
Coin of Metapontum.
The ear of corn (wheat) on the coins of Metapontum, an old Achaean colony in Magna Graecia, is explained by modern writers as a symbol of Demeter: but the story told by Strabo of how the early settlers dedicated a golden ear at Delphi because they had amassed such great wealth from agriculture, indicates a far simpler solution, that the chief product and chief article of barter of Metapontum was naturally placed on her coins. As the tunny adorns the coins of Cyzicus, so we find the cuttle-fish on the coins of Croton and Eretria. As this creature was devoured with great gusto by the ancients, as it is at the present day at Naples and in Palestine, there is. It has been inferred that this is an epithet of Demeter, but this is most unlikely, for in that case we should expect [Greek: Sôteira], as on the coins of Hipponium, Syracuse, Agrigentum, Corcyra, Cyzicus, and Apamea, not [Greek: Sôtêria], as the adjective. Thus we always find [Greek: Zeus Sôtêr], not [Greek: Sôtêrios]: cf. [Greek: Sôteira Eunomia], Pind. Ol. 16, [Greek: Sôteira Tycha], Ol. 2, [Greek: Sôteira Themis], Ol. 21. [Greek: Sôtêria] is rather Safety (Lat. Salus), who, as my friend Mr J. G. Frazer points out to me, was worshipped at Patrae and Aegeum, two of the chief towns of Achaea (Pausan. 21. 7; 24. 3). We also find such names of divinities as [Greek: Hygieia], [Greek: Homonoia] and [Greek: Nika] on the coins of Metapontum. As Metapontum was an Achaean colony, it is likely that Salus was worshipped there also. Besides it was to Apollo, and not to Demeter, that they dedicated their golden ear as a harvest thank-offering. [Greek: Theros] is the ear cut from the stalk after the ancient way of reaping, cf. [Greek: therê stachyôn], Plut.]
|
WIKI
|
Saturday, February 24, 2024
How to Choose the Perfect Ukraine Dedicated Server
Must read
Businesses and individuals rely heavily on online services and websites in today’s digital age. Whether running a small blog, an e-commerce store, or managing critical business applications, having a reliable hosting solution is crucial. One option that offers high performance and complete control is a Dedicated Server Ukraine. This article will guide you through selecting the perfect Dedicated Server to meet your specific needs.
What is a Dedicated Server?
A dedicated server is a robust computing solution that provides exclusive access to all its resources for a single user or organization. This means the entire server is dedicated solely to one user’s needs, including its CPU, RAM, storage, and bandwidth. This configuration offers several advantages, including exceptional performance, complete control over server settings and software, enhanced security, and scalability to accommodate growing demands. Additionally, the choice of server location can impact user experience, making it crucial to select a location that aligns with your target audience. Dedicated servers come in two primary types: managed, which includes support services, and unmanaged, where users handle all aspects of server management. While dedicated servers are more expensive than shared hosting or virtual private servers, their performance and control capabilities make them an ideal choice for businesses and individuals with specific hosting requirements.
Why Choose a Dedicated Server Ukraine?
Choosing a dedicated server in Ukraine can be a strategic decision for several reasons:
1. Proximity to Target Audience: If your website or online services primarily cater to users in Ukraine, hosting your server in Ukraine can significantly reduce latency. This means your website will load faster for users in this region, providing a better user experience.
2. Competitive Pricing: Ukraine offers competitive pricing for dedicated server hosting compared to many Western countries. This can benefit businesses and individuals looking to control hosting costs while benefiting from reliable server performance.
3. Political Stability: Ukraine has a stable political environment, which is crucial for the consistent operation of your server. You can have confidence that your server will remain online and accessible to users.
4. Growing Tech Infrastructure: Ukraine has steadily invested in its tech infrastructure. This includes modern data centres and improved internet connectivity. Hosting your server in Ukraine means benefiting from this evolving infrastructure.
5. Data Privacy and Security: Ukraine has data privacy regulations to protect user data, which can be reassuring for businesses concerned about data security. Additionally, controlling your server allows you to implement robust security measures.
Assessing Your Hosting Needs
Determine Your Website’s Traffic
Before choosing a dedicated server, evaluate your website’s traffic patterns. Understanding your traffic volume will help you select the appropriate server specifications to ensure smooth operations.
Resource Requirements
Consider your resource requirements, including CPU power, RAM, and storage capacity. Ensure that your server can handle your applications and data without performance bottlenecks.
Operating System Choice
Popular choices include Linux distributions like Ubuntu, CentOS, and Windows Server for specific software compatibility.
Server Hardware Considerations
CPU and RAM Specifications: Select the right CPU and RAM specifications based on your resource-intensive tasks. Higher-end CPUs and ample RAM are essential for running demanding applications smoothly.
Storage Options: Choose between SSD (Solid State Drive) and HDD (Hard Disk Drive) storage options. SSDs provide faster data access times and improve overall server performance.
Bandwidth and Network Speed: Consider the server’s bandwidth and network speed to ensure your website can handle traffic spikes and provide a fast user experience.
Budgeting for Your Dedicated Server
Budgeting for a Dedicated Server Ukraine is critical in selecting the right hosting solution. When planning your budget for a dedicated server, it’s essential to consider various cost factors. These factors typically include the upfront cost of server hardware, ongoing hosting provider fees, and any additional services or software licenses you may require.
Finding the right balance between your budget and hosting needs is critical. It’s essential to prioritize resources based on your specific requirements. For instance, if your website or applications demand high processing power, allocating more budget to a robust CPU and ample RAM may be necessary. Similarly, investing in quality customer support from your hosting provider can help ensure the smooth operation of your dedicated server.
Setting Up and Configuring Your Server
Setting up and configuring your Ukraine Dedicated Server is a pivotal task to ensure it functions optimally and securely. The initial server setup involves enhancing security by changing default passwords and configuring secure access methods. Network settings, including IP addresses and firewall rules, should be configured to control traffic effectively. Keeping the server’s operating system up-to-date with the latest patches is essential for security.
Once the foundational setup is complete, you’ll install the necessary software and applications tailored to your server’s purpose. These could include web servers like Apache or Nginx, databases, and other tools. Each software component should be configured and optimized for performance and security, following industry best practices.
Conclusion
In conclusion, choosing the perfect Linux Dedicated Server requires careful consideration of your specific needs and goals. You can make an informed decision by assessing your hosting needs, server location, hardware requirements, and budget constraints. When selecting a hosting provider, remember to prioritize security, scalability, and customer support.
Frequently Asked Questions (FAQs)
Q: Can I upgrade my dedicated server if my needs change?
A: Most hosting providers offer scalable solutions, allowing you to upgrade your server as your requirements grow.
Q: What is the difference between SSD and HDD storage?
A: SSDs offer faster data access times than HDDs, improving server performance.
Q: How can I protect my cheap dedicated server from DDoS attacks?
A: Many hosting providers offer DDoS protection services that can safeguard your server against such attacks.
Q: What is the average cost of a dedicated server in Ukraine?
A: The cost can vary significantly based on server specifications and hosting provider. It’s best to research and compare options.
Q: Is having a disaster recovery plan for my server essential?
A: A disaster recovery plan is crucial to ensure data and service continuity in case of unexpected events or server failures.
More articles
Trending
Latest article
|
ESSENTIALAI-STEM
|
Burlin Saheed
Burlin Saheed (3 January 1942 – 15 April 2009) was a Guyanese cricketer. He played in three first-class matches for British Guiana from 1965 to 1973.
|
WIKI
|
Colonia Suiza
Colonia Suiza (In English, Swiss Colony)is a town in the municipality of San Carlos de Bariloche, in the Bariloche Department, Río Negro, Argentina. It is located about 25 km from the city of San Carlos de Bariloche at the foot of Cerro López.
History
The first population arrived in 1883, when Henriette Goye-Borgeat and Joseph Goye, along with four of their children emigrated to Argentina from Saxon, Canton of Valais, Switzerland
Commercial activity
It has places to spend the night and restaurants that offer services to tourists who visit the region. The preparation of a meal called curanto stands out, originating in the south of Chile and Argentina, in which the food is cooked in a hole dug in the ground, filled with hot stones. There is also exploitation of small crops of raspberries and fruits from cold climates.
Population
It has increased 150 in 2010 which represents an increase of 74% compared to the 86 of the previous census.
|
WIKI
|
Samsung, Micron warn China's Xian lockdown could affect memory chip manufacturing
Adds Samsung announcement, details
Dec 30 (Reuters) - Samsung Electronics 005930.KS and Micron Technology MU.O, two of the world's largest memory chip makers, warned that a COVID-19 lockdown in the Chinese city of Xian could affect their chip manufacturing bases in the area.
Micron said on Wednesday the lockdown could lead to delays in the supply of its DRAM memory chips, which are widely used in data centres.
It said the stringent restrictions, which went into effect earlier this month, may be increasingly difficult to mitigate and had resulted in thinner staffing levels at its manufacturing site.
Samsung Electronics also said on Wednesday that it will temporarily adjust operations at its Xian manufacturing facilities for NAND flash memory chips, used for data storage in data centres, smartphones and other tech gadgets.
Chinese officials have imposed tough curbs on travel within and leaving Xian from Dec. 23, in line with Beijing's drive to immediately contain outbreaks as they appear.
"We are tapping our global supply chain, including our subcontractor partners, to help service our customers for these DRAM products," Micron said in a blog post.
"We project that these efforts will allow us to meet most of our customer demand, however there may be some near-term delays as we activate our network," the company said.
Micron added that it was working to minimize the risk of virus transmission and had employed measures including physical distancing and on-site testing and was encouraging vaccination.
Samsung has two production lines in Xian making advanced NAND Flash products, which account for 42.5% of its total NAND flash memory production capacity and 15.3% of the overall global output capacity, according to analysis provider TrendForce.
Seoul-based analysts said chips made in Samsung's Xian NAND plant would mainly go to the China market with limited shipments to overseas destinations, and some of the biggest demand for the kind of chips made in the plant would come from Chinese server companies.
Samsung said in a late Octoberearnings callthat it had entered the July-September quarter with low inventory of NAND chips, and intended to normalise inventory level during that quarter. It is expected to announce October-December earnings results in January.
(Reporting by Manya Saini in Bengaluru, Joyce Lee and Heekyong Yang in Seoul; Editing by Maju Samuel & Shri Navaratnam)
((Manya.Saini@thomsonreuters.com;))
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
|
NEWS-MULTISOURCE
|
How to Get Boost Mobile Unlock iPhone
Posted on
Having an iPhone may be good for many people because they can use it for communicating with other people, gaming, and browsing. But, sometime people may feel so annoying when they have locked iPhone. What is locked iPhone? Is there any way to unlock it? Find the answer below.
boost mobile unlock iphone se
Boost Mobile Locked iPhone
Talking about iPhone, iPhone is popular phone in the world. There are so many people who choose iPhone as their favorite phone. Why? It is because iPhone has good quality. Not only that, iPhone comes with various types and it makes you able to choose a phone based on your interest and budget. How about the version of iPhone? Have you known about locked and unlocked iPhone?
boost mobile unlock iphone
Actually, Apple offers two versions of iPhone, which are locked and unlocked. Locked iPhone means that your iPhone has been locked by a network carrier, such as AT&T, Verizon, Sprint, T-Mobile and Boost Mobile. When you buy locked iPhone, it means you are not allowed to use other carrier. It also happens if your iPhone locked by Boost Mobile, you will be unable to use other network carrier that you like.
Different from locked iPhone, unlocked iPhone is so useful. It allows you to use other carrier that you like the most. We know that every person has different interest. When they have unlocked iPhone, they will be able to use their desired carrier and try other carrier whenever they want. So, how to do when our iPhone is locked version? Is there any way to unlock it? Find the answer below.
How to Unlock Boost Mobile iPhone
As explained before, unlocked iPhone will make us easy to use other carrier. For people who like trying various carriers, having unlocked iPhone is so useful and helpful. But, how about people who have bought locked iPhone? Is there any way to unlock a locked iPhone? For example if your iPhone has been locked by Boost Mobile. Is there any way to unlock Boost Mobile iPhone? Actually, there is a way to unlock it. There are some ways to unlock Boost Mobile iPhone. You can follow the steps below:
Step 1
Before unlocking your Boost Mobile iPhone, you have to do some steps. The main step is make sure that your iPhone locked by Boost Mobile. Some people may think that their iPhone is locked by any carrier, but the fact may be wrong. So, you have to check whether your iPhone locked by Boost Mobile or not. How to check it? You just need to try other carrier. If other carrier doesn’t work in your iPhone, it means your iPhone has been locked by Boost Mobile.
Step 2
Not only check your iPhone, ask yourself before want to unlock your iPhone. Is unlocking iPhone useful for you? If Boost Mobile service makes you satisfied, you don’t have to unlock your iPhone. It will be different if you feel regret because of Boost Mobile service and want to try other carrier. Your profession may also influence it. If you are traveler or has profession that make you visit other countries, having unlocked iPhone will be useful because you can use local SIM card whenever you are in other country.
Step 3
The last step is unlocking your iPhone. Actually, you have two ways for unlocking your Boost Mobile iPhone. First, you can call Boost Mobile Company to unlock your iPhone. You have to pay for unlocking process. Other step is using third party. Nowadays, there are so many sites that offer unlocking process. You can choose trusted site which the service has been used by many customers. Finally, you will be able to unlock your iPhone. Before choosing a site, make sure you have known all the information of your iPhone, such as iPhone type, IMEI code, and many more. It will be used in unlocking process.
Those are some information for you about Boost Mobile unlock iPhone. Are you interested in unlocking your Boost Mobile iPhone? If so, you can use some tips above. Hopefully some tips about Boost Mobile unlock iPhone above will make you easy to unlock your iPhone.
Leave a Reply
Your email address will not be published. Required fields are marked *
|
ESSENTIALAI-STEM
|
File talk:Wurf katze 1day.jpg
This image is of poor quality and detracts from the surrounding text. If there is an image of similar subject but improved quality, it would certainly enhance this article.
|
WIKI
|
Page:United States Statutes at Large Volume 94 Part 1.djvu/136
:(1) strike the words “government of the Trust Territory of the Pacific Islands” wherever they appear and insert in lieu thereof the words “governments of the Trust Territory of the Pacific Islands or the Northern Mariana Islands,”;
* (2) after the words “High Commissioner of the Trust Territory of the Pacific Islands” insert the words “or Governor of the Northern Mariana Islands, as the case may be,”;
* (3) wherever the words “High Commissioner” appear and are not followed by the words “of the Trust Territory of the Pacific Islands” insert the words “or Governor, as the case may be,”; and
* (4) after the words “District Court of Guam” insert the words “or District Court of the Northern Mariana Islands, as the case may be”.
202. Effective October 1, 1980, there are hereby authorized to be appropriated to the Secretary of the Interior $24,400,000 plus or minus such amounts, if any, as may be justified by reason of ordinary fluctuations in construction costs from October 1979 price levels as indicated by engineering cost indexes applicable to the types of construction involved, for a grant to the Commonwealth of the Northern Mariana Islands to provide for health care services. No grant may be made by the Secretary of the Interior pursuant to this section without the prior approval of the Secretary of Health, Education, and Welfare.
203. Subsection (g) of section 5 of the Act entitled “An Act to authorize appropriations for certain insular areas of the United States, and for other purposes”, approved August 18, 1978 (92 Stat. 492), is amended by changing “not to exceed $3,000,000” to “such sums as may be necessary, but not to exceed $3,000,000 for development,”.
204. (a) Section 3(d) of the Act entitled “An Act to authorize appropriations for certain insular areas of the United States, and for other purposes” (Public Law 95-348; 92 Stat. 487) is amended by inserting “(1)” after “(d)” and by inserting “or upon receipt of a resolution adopted by both houses of the legislature of the Northern Mariana Islands accompanied by a letter of request from either the Governor or the Lieutenant Governor of the Northern Mariana Islands,” after “Constitution of the Northern Mariana Islands,” the first place it appears, and by adding at the end of “(d)” the following new paragraphs:
“(2) For purposes of carrying out any administration and enforcement required by this subsection, the Secretary of the Treasury (hereinafter in this subsection referred to as the ‘Secretary’), or his delegate, at no cost to the Northern Marianas government, may (A) employ citizens of the Northern Mariana Islands (as defined by Article III of the Covenant to Establish a Commonwealth of the Northern Mariana Islands in Political Union with the United States (approved, Public Law 94-241; 90 Stat. 265)), or (B) use the services of employees of the government of the Northern Mariana Islands, upon agreement to pay such government for the use of such services. In addition, the Secretary, or his delegate, shall make every effort to assure that citizens of the Northern Mariana Islands (as so defined) are trained to ultimately assume the administration and enforcement duties required of the Secretary or his delegate under this section. Notwithstanding any other provision of law, the Secretary or his delegate is authorized to the maximum extent feasible in administering and enforcing the requested sections of the Covenant, to employ and train Northern Mariana Islands’ citizens without regard to United States Civil Service hiring or job classification laws or any
|
WIKI
|
Monday, August 08, 2011
Mixed-Up Confusion: How I solved Mac Book Air's Wireless Disconnection Problem
That the world is screwed should not be news for you. People are dying of hunger in Somalia, riots break out in London, political fringe groups in the USA set the agenda for the whole wide world and the we-know-it-all politicans in Europe are driving the contient to bankrupcy. People are looking for safeheavens.
If there is a safeheaven, speaking financially, it must be Apple Inc. You've probably read already, that it has more cash than the American government. Yet, even with Apple there is something that is not right...
When I was coding for a research project back in the old days of my PHD, we were working with a modified Mobile IP stack. Not only the code itself was in development phase, but also we were modifying the code here and there to match our needs. For sometime we observed a weird phenomenon. Everything worked fine as long as there was some traffic between the clients and the server. As soon as the traffic died out, we had to restart everything from scracth.
As it was customary for such R&D projects, there was a demo coming in a few days, so we had to come up with a quick and dirty solution. We wrote a shell script that pinged the server every now and then to solve the problem. We knew it was a lousy solution and we had to solve the actual problem. And thats what we did eventually.
My girlfriend bought a shiny Mac Book Air recently. Everything worked fine, except the one thing that has to work bullet proof in Mac Book Airs: Wi-Fi. See, Mac Book Airs don't have ethernet connections, they work on Wi-Fi only. No Wi-Fi no internet. No internet, to system updates...
For some reason, our Mac Book disconnected and searched for an alternative access point at random intervals, even though there was nothing wrong with the signal quality.
The first entry on Apple forums on this issue is dated March 18 2008 [link to the entry]. Come 2011, there is still no official fix [link to the current questions]. I tried everyhing in this troubleshooting webpage[link] (not by Apple), from giving a static IP address to flushing DNS cache without any success.
So I tried out keeping the connection alive solution (called a heartbeat in geek talk), and the problem melted away. I wrote a simple shell script:
#!/bin/bash
ping -i 5 -n 192.168.1.1
and saved it as a shell file (pinger.sh). If you run this file with the terminal application, it pings the wireless AP every five seconds.
I still can't believe how Apple can let a bug go unfixed this long, that resembles the bugs I had when I was a PHD student, and be the richest organization in the world. Surely there are millions of annoying bugs that goe unfixed. There is definetely a Mixed-Up Confusion somewhere!
4 comments:
Engin Kurutepe said...
I didn't have this problem with my MacBook Air but had it with my 13" MacBook Pro. In that case it was related to the Router firmware, even though AVM Fritz strongly rejected it. Updating the router to the unreleased beta firmware solved the problem.
It seems that, either Apple is not implementing the 802.11n standard not very well or too strict so that there are some incompatibilities with some router firmwares.
Ahmet C. Toker said...
whats troubling is that this problem is known since 2008, thus not specific to lion.
the mac book air in question had no problem with other routers. so it is definitely a router compatibility issue. but what is not compatible is not the router, but mac book itself. 20 or so notebooks connected to the router i have without a problem, including mac book air and iphones. if there is an issue, its with apples developers.
i turned off the n/g option, so router is working in g mode only. not being able to comply with g after all these years seems impossible to me.
what I think this is a result of the Apple worldview. They'd rather have all Mac Book Air owners buy Mac wifi access points. And this is exactly why I am very skeptic about Mac products, no matter how visually seductive they are.
Frank C said...
If you close Terminal, will it stop running? How do you make it to where it "runs in the background" so you don't have to have the Terminal window open?
Thanks!
-Frank
Ahmet Cihat Toker said...
unfortunately i am not an active apple user, thus i don't know how you can make the script run in the background.
|
ESSENTIALAI-STEM
|
Affordable Access
Access to the full text
Epigenetic Activation of Silent Biosynthetic Gene Clusters in Endophytic Fungi Using Small Molecular Modifiers
Authors
• Pillay, Lynise C.
• Nekati, Lucpah
• Makhwitine, Phuti J.
• Ndlovu, Sizwe I.
Type
Published Article
Journal
Frontiers in Microbiology
Publisher
Frontiers Media SA
Publication Date
Feb 14, 2022
Volume
13
Identifiers
DOI: 10.3389/fmicb.2022.815008
Source
Frontiers
Keywords
Disciplines
• Microbiology
• Review
License
Green
Abstract
The discovery of silent biosynthetic gene clusters (BGCs) in fungi provides unlimited prospects to harness the secondary metabolites encoded by gene clusters for various applications, including pharmaceuticals. Amplifying these prospects is the new interest in exploring fungi living in the extremes, such as those associated with plants (fungal endophytes). Fungal species in endosymbiosis relationship with plants are recognized as the future factories of clinically relevant agents since discovering that they can produce similar metabolites as their plant host. The endophytes produce these compounds in natural environments as a defense mechanism against pathogens that infect the plant host or as a strategy for mitigating competitors. The signaling cascades leading to the expression of silent biosynthetic gene clusters in the natural environment remain unknown. Lack of knowledge on regulatory circuits of biosynthetic gene clusters limits the ability to exploit them in the laboratory. They are often silent and require tailor-designed strategies for activation. Epigenetic modification using small molecular compounds that alter the chromatin network, leading to the changes in secondary metabolites profile, has achieved considerable success. This review aims to comprehensively analyze the secondary metabolite profiles expressed after treatment with various epigenetic modifiers. We first describe the regulatory circuits governing the expression of secondary metabolites in fungi. Following this, we provide a detailed review of the small molecular modifiers, their mechanism(s) of action, and the diverse chemistries resulting from epigenetic modification. We further show that genetic deletion or epigenetic inhibition of histone deacetylases does not always lead to the overexpression or induction of silent secondary metabolites. Instead, the response is more complex and often leads to differential expression of secondary metabolites. Finally, we propose using this strategy as an initial screening tool to dereplicate promising fungal species.
Report this publication
Statistics
Seen <100 times
|
ESSENTIALAI-STEM
|
Made Up Stories (song)
Made Up Stories is the debut single from British band, Go:Audio, taken from the album of the same name. The single debuted at #85 on the UK Singles Chart. and reached #33 the following week.
During April 2008, the music video (featuring hand-picked fans of the band) was added to Kerrang!, Scuzz, The Hits and Fizz television stations. Hand-picked fans Included: Aaron Isaac-Hamm, Dani Salamone, Cheali Spencer, Nancy EL-Gamel, Naomi Edwards, Ben Gordon-Smith, Daisy Wootton, Simon Dugdale plus others. These fans were coined the M.U.S Crew after The band used a picture of them as their Myspace profile pic.
Music video
The video shows the band playing outside at night, surrounded by fans. It shows James' girlfriend going into his house with another man and kissing him. Members of the band frequently appear next to the couple unnoticed, in reference to the line, "I was there but you didn't see me." Near the end, the two kiss in the bedroom, but the song stops, and the girl goes over to the cupboard, presumably hearing a noise. The song then starts again, as numerous fans come out of the cupboard and rush out the room. The cheat also runs downstairs, embarrassed, but it is shown when he leaves the band were playing outside the house the whole time, and he runs away when fans come out the house. The girlfriend then comes to the door, only to see the band looking accusingly at her, and it ends with the lights dimming.
CD single
* 1) Made Up Stories
* 2) Woodchuck’s Revenge
CD single (acoustic version)
* 1) Made Up Stories (acoustic version)
7" Vinyl Bundle 1
* 1) Made Up Stories
* 2) You Don’t Have To
7" Vinyl Bundle 2
* 1) Made Up Stories
* 2) Made Up Stories (Impending Fall remix)
|
WIKI
|
Wikipedia:Articles for deletion/Famous Entrepreneurs
The result was delete. Sr13 07:43, 30 July 2007 (UTC)
Famous Entrepreneurs
* – (View AfD) (View log)
Redundant to Category:Businesspeople and all its subcategories. There are thousands of entrepreneurs with articles on Wikipedia so this list will be unmaintainable, but it appears to be only listing the most well-known ones, and "famous" is subjective and original research. Saikokira 01:18, 25 July 2007 (UTC)
* Delete, unmanageable and subjective list. NawlinWiki 01:41, 25 July 2007 (UTC)
* Delete the list is too subjective to be considered encyclopedic. Pats Sox Princess 01:46, 25 July 2007 (UTC)
* Delete per NawlinWiki. Iotha 01:59, 25 July 2007 (UTC)
* Delete unmaintainable list and how would you determine who would go on? Oysterguitarist 02:27, 25 July 2007 (UTC)
* Delete as too general.-- aBSuRDiST -T ☺ C- 03:05, 25 July 2007 (UTC)
* Keep as edited, the guys there seem actually to be famous. That the article could be edited poorly is not a reason for deletion, at least when its being edited well. DGG' (talk) 07:14, 25 July 2007 (UTC)
* Delete - a subjective list. - 52 Pickup 11:44, 25 July 2007 (UTC)
* Delete. Absurdly subjective.--Mantanmoreland 21:11, 25 July 2007 (UTC)
* Delete per nomination, far too subjective and open to interpretation for any type of encyclopedic coverage. Burntsauce 22:51, 27 July 2007 (UTC)
|
WIKI
|
IoT-cloud Globe Light
Published
Introduction: IoT-cloud Globe Light
My kids don't like to go to bed in complete darkness. So, a while ago, we bought globe light, which isn't very bright, but it makes room lit enough so kids aren't scared of shapes and shadows.
That globe isn't on through the whole night, it is needed just until kids fall asleep, so I turn it off when I go to bed. But, sometimes I'm lazy. Ok, I'm lazy often. And I wanted to make it lazy-friendly. First version of IoT-cloud connected globe was external hideous thing, big, ugly, brick-like, with miniature button which was in collision with globe's one on the cable - I could turn globe of with cable switch, but also cut power on IoT brick, and then cable switch was useless as it couldn't light it up without power... My wife also wasn't very satisfied with that brick...
That's why I've decided to make it better - everything should be embedded, only one switch, child-proof, and fool-proof - so ANYBODY could use it. My plan was to embed everything in base of globe, big, black hunk of plastic. It turned out that it has enough space for everything with off-the-shelf parts: Wemos D1 mini, solid state relay board, metal button with LED light and 220V to 5V driver. Only small drilling is needed to fit button and pull cable for power internals through base.
Parts:
• Wemos D1 mini - buy it here
• Solid state relay board- buy it here
• 220V to 5V driver - extracted from an old cellphone power supply, but can be used one like this
• Button with LED- buy it here
• Bunch of interconnecting wires
• Some better wires for 220V
• Some euro-style cable connectors
Tools:
• Soldering iron
• Soldering tin
• Small drill with tiny drill and sanding attachment (for button and cable holes)
• Exacto knife
• Hot glue gun (to stick everyting to the base)
Time to build: 2 hrs
Time to program: 15 min
Time to set Cayenne up: 30 min
Step 1: The Internals
I use Wemos D1 mini as board of choice, which is built around ESP8266. It has more than enough ports for this project, it is fast, easy to use and cheap. Programmed in Arduino IDE, it took less than 30% of space on ESP, which is great.
Solid state relay board switch pin is connected to Wemos's D5 pin, metal button is coneected to D6 pin and GND pin, and everything is connected to power supply's 5V and GND pin (Wemos power, relay power, button's LED).
Sketch is fairly short and easy to understand - Wemos monitors button, and when it's "short-circuited" to ground, it becomes LOW - then it's time to toggle relay. In Arduino IDE, pin D6 is set as pullup. It is also connected to MyDevices Cayenne cloud, and also gets Cayenne's button state. One more thing, when hardware button is pushed, it toggles Cayenne's button and one 2 state software sensor. Just to have FULL control of the thing.... :-)
I'll upload sketch later.
Step 2: Plans
As this is project for myself, I have hard-coded WiFi and Cayenne parameters, but I got few inquiries about IoT conversion, so I'll include WiFi Manager library and will have to make my library for Cayenne token. Also, I'll have to make instructions how to set up and use Cayenne for non-geeks.
Few ideas I got after building this are to fit globe with motor so it revolves slowly (also controlled via Cayenne, and MAYBE with hardware buttons) and to include DS18B20 thermal sensor so it reports temperature in room. While DS18B20 sensor is easy, almost trivial to fit, motor installation won't be so easy, but I guess I'll manage something out :-)
Share
Recommendations
• Water Contest
Water Contest
• Creative Misuse Contest
Creative Misuse Contest
• Clocks Contest
Clocks Contest
2 Discussions
0
user
Hengy
1 year ago
Nice instructable. Very nice result!
One question: what globe did you use? Did it come with a light inside, or is it an ordinary globe? Thanks!
1 reply
Hi.
I've bought rather cheap globe with plain old incandescent 15W bulb, E14 size, and later replaced it with 3W LED bulb, but I didn't have to wire it all up... It's supposed to be night light as well as kind of educational toy.
|
ESSENTIALAI-STEM
|
Wikipedia:Articles for deletion/Marathi Tigers
The result was delete. No prejudice against recreation if the film later surpasses WP:NFF and meets other notability criteria. North America1000 00:40, 5 January 2016 (UTC)
Marathi Tigers
* – ( View AfD View log Stats )
Does not meet WP:NFF; unsourced and unable to find any independent sources to establish notability. Drm310 (talk) 18:15, 20 December 2015 (UTC)
* Note: This debate has been included in the list of Film-related deletion discussions. clpo13(talk) 19:18, 20 December 2015 (UTC)
* Note: This debate has been included in the list of India-related deletion discussions. clpo13(talk) 19:18, 20 December 2015 (UTC)
* Marathi:
* writer/director:
* lead:
* lead:
* lead:
* music:
* ex producer:
* WP:INDAFD: "Marathi Tigers" "Avdhoot B. Kadam" "Ashish Vidyarthi" "Dr. Amol Kolhe" "Vikram Gokhale" "Swapnil H Digde"
Relisted to generate a more thorough discussion and clearer consensus.
* Temporary delete (or userfy) per being TOO SOON. The topic is sourcable, but has not yet released. We can allow it back after confirmed release and with inclusion of proper sources. Schmidt, Michael Q. 23:09, 21 December 2015 (UTC)
Please add new comments below this notice. Thanks, MBisanz talk 00:25, 28 December 2015 (UTC)
* Temporary delete per comment above FiendYT 16:24, 28 December 2015 (UTC)
* Temporary delete per MichaelQSchmidt. --Rubbish computer (Merry Christmas!: ...And a Happy New Year!) 18:03, 28 December 2015 (UTC)
* Delete for now as mentioned, clearly too soon it seems. SwisterTwister talk 02:58, 31 December 2015 (UTC)
* Delete - Any article can be undeleted so "temporary delete" is pointless, Anywho no evidence of notability Fails GNG. – Davey 2010 Merry Xmas / Happy New Year 00:13, 4 January 2016 (UTC)
|
WIKI
|
The Remains of the Day (film)
The Remains of the Day is a 1993 drama film adapted from the Booker Prize-winning 1989 novel of the same name by Kazuo Ishiguro. The film was directed by James Ivory, produced by Ismail Merchant, Mike Nichols, and John Calley and adapted by Ruth Prawer Jhabvala. It stars Anthony Hopkins as James Stevens and Emma Thompson as Miss Kenton, with James Fox, Christopher Reeve, Hugh Grant, Ben Chaplin, and Lena Headey in supporting roles.
The film was a critical and box office success and it was nominated for eight Academy Awards, including Best Picture, Best Actor (Hopkins), Best Actress (Thompson) and Best Adapted Screenplay (Jhabvala). In 1999, the British Film Institute ranked The Remains of the Day the 64th-greatest British film of the 20th century.
Plot
In 1958 postwar Britain, Stevens, the butler of Darlington Hall, receives a letter from the former housekeeper, Miss Kenton. Their past employer, the Earl of Darlington, has died a broken man, his reputation destroyed by his pre-Second World War support of Nazi Germany, and his stately country house has been sold to retired US Congressman Jack Lewis. Allowed to borrow the Daimler, Stevens sets off for the West Country to see Miss Kenton for the first time in decades.
A flashback to the 1930s shows Kenton's arrival at Darlington Hall, where the ever-efficient but deeply repressed Stevens derives his entire identity from his profession. He butts heads with the warmer, strong-willed Kenton, particularly when he refuses to acknowledge that his father, now an under-butler, is no longer able to perform his duties.
Displaying total professionalism, Stevens carries on as his father lies dying during Darlington's conference of like-minded fascist-sympathising British and European aristocrats. Also in attendance is Congressman Lewis, who admonishes the "gentleman politicians" as meddling amateurs, advising that "Europe has become the arena of Realpolitik" and warning of impending disaster.
Exposed to Nazi racial laws, Darlington gets Stevens to dismiss two newly appointed refugee German-Jewish maids despite his protest. Kenton threatens to resign but has nowhere to go, and a regretful Darlington is later unable to rehire the maids. Later Stevens is unable to answer an aristocratic guest's questions on global trade and politics, which the aristocrat claims to demonstrate the lower classes' ignorance and inability to govern themselves.
Relations thaw between Stevens and Kenton and she clearly shows her feelings for him, but the outwardly detached Stevens remains dedicated solely to his role as butler. She catches him reading a romance novel, which he explains is to improve his vocabulary, asking her not to invade his privacy again.
Lord Darlington's godson, journalist Reginald Cardinal, arrives on the day of a secret meeting at Darlington Hall between the British Prime Minister, Neville Chamberlain, and the German ambassador, Joachim von Ribbentrop. Appalled by his godfather's role in seeking appeasement for Nazi Germany, Cardinal tells Stevens that Darlington is being used by the Nazis, but Stevens feels it is not his place to judge his employer.
Kenton forms a relationship with former co-worker Tom Benn and accepts his proposal of marriage. She informs Stevens as an ultimatum, but he will not admit his feelings and only offers his congratulations. Finding her crying, his only response is to call her attention to a neglected domestic task, and she leaves Darlington Hall before the start of the Second World War.
En route to meeting Kenton in 1958, Stevens is mistaken for the gentry at a pub. Doctor Carlisle, a local GP, helps him refuel the Daimler and deduces that he is actually a manservant, asking his thoughts about Lord Darlington's actions. Denying having even met him, Stevens later admits to having served and respected him but Darlington confessed that his Nazi sympathies had been misguided and naive.
Stevens declares that, although Lord Darlington was unable to correct his error, he is attempting to correct his own. He meets Kenton, who has separated from her husband and runs a boarding house on the coast. They reminisce that Lord Darlington died from a broken heart after suing a newspaper for libel, losing the suit and his reputation, and Stevens mentions that Cardinal was killed in the war.
Kenton, now Mrs Benn, declines to resume her position at Darlington Hall, wishing to remain near her pregnant daughter and, despite years of unhappiness, thinking about going back to her husband. Stevens supposes they may never meet again and they part fondly but are both quietly upset, Miss Kenton visibly tearful as her bus pulls away.
Stevens returns to Darlington Hall, where Lewis asks if he remembers the old days, and Stevens replies that he was too busy serving. The two men free a pigeon from the house and it flies away, leaving Stevens and Darlington Hall far behind. The image then rises slowly, moving away from the large building, alone in the heart of the vast estate, surrounded by valleys and woods.
Production
A film adaptation of the novel was originally planned to be directed by Mike Nichols from a script by Harold Pinter. Meryl Streep’s then-agent, Sam Cohn, and the director sold her on the plum role of Miss Kenton. Both Meryl and Jeremy Irons read for Nichols, but the filmmaker opted not to cast them in roles later filled by Emma Thompson (ten years Meryl’s junior) and Anthony Hopkins (twenty years Emma’s senior). Cohn, who was also Nichols’s agent, didn’t make it clear to Meryl that she was no longer a candidate for Miss Kenton, she only learned later, after reading about Thompson’s casting. Shortly thereafter Streep made headlines after she fired her long time, east coast agent, signing with rival agent Bryan Lourd at the powerful Creative Artists Agency. Some of Pinter's script was used in the film, but, while Pinter was paid for his work, he asked to have his name removed from the credits, in keeping with his contract. Christopher C. Hudgins observes: "During our 1994 interview, Pinter told [Steven H.] Gale and me that he had learned his lesson after the revisions imposed on his script for The Handmaid's Tale, which he has decided not to publish. When his script for The Remains of the Day was radically revised by the James Ivory–Ismail Merchant partnership, he refused to allow his name to be listed in the credits" (125). Though no longer the director, Nichols remained associated with the project as one of its producers.
The music was recorded at Windmill Lane Studios in Dublin.
Settings
A number of English country estates were used as locations for the film, partly owing to the persuasive power of Ismail Merchant, who was able to cajole permission for the production to borrow houses not normally open to the public. Among them were Dyrham Park for the exterior of the house and the driveway, Powderham Castle (staircase, hall, music room, bedroom; used for the aqua-turquoise stairway scenes), Corsham Court (library and dining room) and Badminton House (servants' quarters, conservatory, entrance hall). Luciana Arrighi, the production designer, scouted most of these locations. Scenes were also shot in Weston-super-Mare, which stood in for Clevedon. The pub where Mr Stevens stays is the Hop Pole in Limpley Stoke; the shop featured is also in Limpley Stoke. The pub where Miss Kenton and Mr Benn meet is The George Inn in Norton St Philip.
Characters
The character of Sir Geoffrey Wren is based loosely on that of Sir Oswald Mosley, a British fascist active in the 1930s. Wren is depicted as a strict vegetarian, like Hitler. The 3rd Viscount Halifax (later created the 1st Earl of Halifax) also appears in the film. Lord Darlington tells Stevens that Halifax approved of the polish on the silver, and Lord Halifax himself later appears when Darlington meets secretly with the German Ambassador and his aides at night. Halifax was the chief architect of the British policy of appeasement from 1937 to 1939. Coincidentally, Halifax was born at Powderham Castle (above). The character of Congressman Jack Lewis in the film is a composite of two separate American characters in Kazuo Ishiguro's novel: Senator Lewis (who attends the pre-WW2 conference in Darlington Hall), and Mr Farraday, who succeeds Lord Darlington as master of Darlington Hall.
Release
The film had its premiere on 25 October 1993 at the Academy of Motion Picture Arts and Sciences in Los Angeles.
It was the opening night film at the London Film Festival on 4 November 1993 and opened in 94 theatres in the United States on 5 November.
Critical reception
The film has a 96% rating on Rotten Tomatoes based on 45 reviews, with an average rating of 8.5/10. The consensus states: "Smart, elegant, and blessed with impeccable performances from Anthony Hopkins and Emma Thompson, The Remains of the Day is a Merchant–Ivory classic." At Metacritic, which assigns a weighted average out of 100 to critics' reviews, it received a score of 86 based on 12 reviews. Audiences polled by CinemaScore gave the film an average grade of "A−" on an A+ to F scale.
Roger Ebert particularly praised the film, calling it "a subtle, thoughtful movie." In his favorable review for The Washington Post, Desson Howe wrote, "Put Anthony Hopkins, Emma Thompson and James Fox together and you can expect sterling performances." Vincent Canby of The New York Times said, in another favorable review, "Here's a film for adults. It's also about time to recognize that Mr. Ivory is one of our finest directors, something that critics tend to overlook because most of his films have been literary adaptations."
The film was named one of the best films of 1993 by over 50 critics, making it the fifth-most-acclaimed film of 1993.
Awards and nominations
* The film is #64 at the British Film Institute's "Top 100 British films".
* The film was also nominated for the American Film Institute's "100 Years...100 Passions" list.
Soundtrack
The original score was composed by Richard Robbins. It was nominated for the Academy Award for Best Original Score, but lost to Schindler's List.
* Track listing
* 1) Opening Titles, Darlington Hall – 7:27
* 2) The Keyhole and the Chinaman – 4:14
* 3) Tradition and Order – 1:51
* 4) The Conference Begins – 1:33
* 5) Sei Mir Gegrüsst (Schubert) – 4:13
* 6) The Cooks in the Kitchen – 1:34
* 7) Sir Geoffrey Wren and Stevens, Sr. – 2:41
* 8) You Mean a Great Deal to This House – 2:21
* 9) Loss and Separation – 6:19
* 10) Blue Moon – 4:57
* 11) Sentimental Love Story/Appeasement/In the Rain – 5:22
* 12) A Portrait Returns/Darlington Hall/End Credits – 6:54
|
WIKI
|
使用spring4实现websocket连接
本文摘自classinstance.cn。
之前我们都是用tomcat的jar包去实现websocket,因为tomcat7和8实现的代码不一样,升级完后7的代码无法在8下正常运行,项目报错。
听说spring4实现了websocket,于是我今天就研究了下。
我是在我原本的spring项目里加入的websocket,其他spring配置就不一一列举了,我的spring用的是4.0.6,tomcat8,jdk1.8,websocket相关具体实现如下:
maven加入:
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-websocket</artifactId>
<version>4.0.1.RELEASE</version>
</dependency>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-messaging</artifactId>
<version>4.0.1.RELEASE</version>
</dependency>
新增一份spring-websocket.xml:
<?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:p="http://www.springframework.org/schema/p"
xmlns:context="http://www.springframework.org/schema/context"
xmlns:mvc="http://www.springframework.org/schema/mvc"
xmlns:websocket="http://www.springframework.org/schema/websocket"
xsi:schemaLocation="http://www.springframework.org/schema/beans
http://www.springframework.org/schema/beans/spring-beans.xsd
http://www.springframework.org/schema/mvc http://www.springframework.org/schema/mvc/spring-mvc.xsd
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd
http://www.springframework.org/schema/websocket http://www.springframework.org/schema/websocket/spring-websocket.xsd
">
<bean id="websocketHandler" class="com.solr.websocket.WebsocketHandler"/>
<websocket:handlers>
<websocket:mapping path="/websocket" handler="websocketHandler"/>
<websocket:handshake-interceptors>
<bean class="com.solr.websocket.HandshakeInterceptor"/>
</websocket:handshake-interceptors>
</websocket:handlers>
</beans>
配置文件里有两个类要自己实现如下:
WebsocketHandler.java
package com.solr.websocket;
import org.springframework.web.socket.TextMessage;
import org.springframework.web.socket.WebSocketSession;
import org.springframework.web.socket.handler.TextWebSocketHandler;
public class WebsocketHandler extends TextWebSocketHandler {
@Override
protected void handleTextMessage(WebSocketSession session,
TextMessage message) throws Exception {//后端接收前端websocket.send的消息
super.handleTextMessage(session, message);
TextMessage returnMessage = new TextMessage(message.getPayload()+" received at server");
session.sendMessage(returnMessage);
}
}
HandshakeInterceptor.java
package com.solr.websocket;
import java.util.Map;
import org.springframework.http.server.ServerHttpRequest;
import org.springframework.http.server.ServerHttpResponse;
import org.springframework.web.socket.WebSocketHandler;
import org.springframework.web.socket.server.support.HttpSessionHandshakeInterceptor;
public class HandshakeInterceptor extends HttpSessionHandshakeInterceptor{
@Override
public boolean beforeHandshake(ServerHttpRequest request,
ServerHttpResponse response, WebSocketHandler wsHandler,
Map<String, Object> attributes) throws Exception {
System.out.println("Before Handshake");
return super.beforeHandshake(request, response, wsHandler, attributes);
}
@Override
public void afterHandshake(ServerHttpRequest request,
ServerHttpResponse response, WebSocketHandler wsHandler,
Exception ex) {
System.out.println("After Handshake");
super.afterHandshake(request, response, wsHandler, ex);
}
}
配置完后就可以用地址看看连的上websocket了:ws://127.0.0.1:8090/test/websocket
所以还需要前端用js连看看:
var ws = new WebSocket("ws://127.0.0.1:8090/test/websocket");
alert();
ws.onopen = function()
{ console.log("open");
ws.send("message123");
};
ws.onmessage = function(evt){
console.log(evt.data)
};
ws.onclose = function(evt){
console.log("WebSocketClosed!");
};
ws.onerror = function(evt){
console.log("WebSocketError!");
};
这样项目加入websocket支持就实现了!
注意:如果项目里有用到springMVC,需要将spring-websocket.xml文件里的配置,全部搬到springMVC的配置文件spring-mvc.xml里,也就是两个文件合并成一样文件,这样在web.xml中申明springmvc时,才能一并注册websocket的path到springmvc里,否则会报错:
WARN : No mapping found for HTTP request with URI [/websocket] in DispatcherServlet with name 'springMVC'
如果要应用到实际项目中,可查看我的一篇文章《使用spring4实现websocket连接(二)》。
相关阅读 >>
spring如何获取配置在application.properties文件中属性的值?
使用spring4实现websocket连接(二)
spring、springmvc、springboot和springcloud的区别
使用spring4实现websocket连接
spring事务管理与查询是否需要事务以及可重复读的问题
更多相关阅读请进入《spring4》频道 >>
打赏
取消
感谢您的支持,我会继续努力的!
扫码支持
扫码打赏,您说多少就多少
打开支付宝扫一扫,即可进行扫码打赏哦
分享从这里开始,精彩与您同在
评论
管理员已关闭评论功能...
|
ESSENTIALAI-STEM
|
Evolution of cerebellar tonsillar ischemia to cerebellar tonsillar cysts in the Chiari I malformation: radiological, surgical, and histological evidence.
Tubbs, R.S., Demerdash, A., Oskouian, R.J., Chern, J.J., Oakes, W.J. Evolution of cerebellar tonsillar ischemia to cerebellar tonsillar cysts in the Chiari I malformation: radiological, surgical, and histological evidence. Childs Nerv Syst. doi:10.1007/s00381-015-2960-7.
INTRODUCTION:
Scant data are available regarding ischemic insult to the spinal cord and the responsible blood supply. Therefore, we aimed to investigate a correlation between atherosclerosis of adjacent vessels and spinal cord ischemia.
MATERIALS AND METHODS:
In 20 unembalmed adult cadavers, samples of the vertebral arteries and aorta were removed and the degree of atherosclerosis with subsequent luminal occlusion was histologically analyzed. Next, adjacent segments of the spinal cord were harvested and submitted for immunohistological analysis of both neural and glial elements and blood supply.
RESULTS:
We identified proximal atherosclerosis in the majority of cadavers but with varying degrees of luminal occlusion. The greatest degree of luminal occlusion was found in the descending abdominal aorta. No specimen was found to have atherosclerosis of the anterior or posterior spinal or radicular arteries. No spinal cord histology showed signs of ischemia, even in specimens with a significant large parent vessel (vertebral artery and aorta) occlusion due to atherosclerosis. Neuropathology of these adjacent cord segments revealed no signs of ischemia or demyelination.
CONCLUSIONS:
Spinal cord ischemia is often misdiagnosed and can cause significant neurological compromise. However, based on our study, the degree of atherosclerosis of the adjacent parent vessel supply does not appear to be a predictor of neuronal and glial tissue damage of the adjacent spinal cord.
|
ESSENTIALAI-STEM
|
How Many Moons Does Earth Have?
It seems like there is an obvious answer to the question of how many moons does Earth have. We all know that Earth has one moon. Many years ago, we even named our satellite “Moon” since we thought it was the only natural occurrence of an object orbiting a planet.
But you might be surprised that the Moon is not the only object pulled into Earth’s orbit. Over centuries of exploring the cosmos, astronomers now know that hundreds of moons exist in the solar system. And Earth’s Moon is one of numerous temporary satellites that circle our planet.
The number of moons Earth holds over time ranges from none that humans recognized to one to multiple natural satellites. Let’s explore Earth’s Moon.
How Did The Moon Form?
Moons, or natural satellites, form in many types, shapes, and sizes. They usually have solid formations, and some larger moons even have their own atmospheres. Scientists think most moons formed from the gas and dust discs that orbited around planets during the early solar system.
After the planets formed, the remaining debris circled them. Some of it coalesced into natural satellites orbiting the world. But that’s not what astronomers believe happened with our Moon. Instead, they think Earth collided with a Mars-sized celestial object. The collision broke off a piece of our planet and created a massive dust and rock field.
That space debris formed the Moon around 4.5 billion years ago. You might wonder if we can gain more moons from other space debris around our planet. So, let’s keep diving into how many moons does Earth have.
How many moons does earth have?
Image Credit: NASA, LRO and Jatan Mehta
Near Earth Objects: Asteroids
In 2006, Arizona’s Catalina Sky Survey observers found something orbiting Earth. They first thought it was a spent rocket stage since its spectrum was similar to NASA’s titanium white paint. Rocket stages often wind up in heliocentric orbits.
But as astronomers looked more closely, they realized the object was a tiny asteroid about the size of a school bus. They called the natural satellite 2006 RH120. However, less than a year after they found the asteroid, it unexpectedly left Earth’s orbit for its next destination.
By 2011, Cornell astrophysicists suggested that Earth’s temporary second moon wasn’t an anomaly; instead, its presence is the norm for our home planet. So, how many moons does Earth have?
Scientists say that temporary natural satellites come into Earth’s orbit because of the gravitational pull between the Moon and Earth. These near-Earth objects (NEOs) are asteroids and comets that get pushed around by the outer planets. Then, their orbits bring them into Earth’s celestial neighborhood.
The Cornell team found that the gravitational system between Earth and the Moon frequently captures near-Earth objects. They think at least one NEO is orbiting Earth at any given time. The objects revolve around our world about three times in ten or so months before heading to another celestial body.
Asteroid illustration
Asteroid Illustration Credit: NASA, JPL-Caltech, and ASU
2009 BD
Another near-Earth Asteroid (NEA) is 2009 BD. It and 2006 RH120 are two of the 1,400 identified NEAs. But NASA says more than 12,800 NEAs orbit Earth. And if they are closer than the asteroid belt, studying these closer objects may shed light on the early solar system formation.
So, let’s back up. Just how many moons does Earth have? Are there 12,800 natural satellites? The answer isn’t as simple as that.
Earth has one Moon. However, it also has small objects coming and going in its orbit. These near-Earth asteroids and objects usually spend less than a year before moving on.
How Many Moons Does Earth Have?
Our Moon is the most significant and brightest object in the night sky. Our lives wouldn’t be the same without the Moon’s presence since humanity relies on the lunar-caused ocean tides. The natural satellite helps stabilize Earth as it rotates on its axis. And that gives us a relatively predictable climate over thousands of years.
We call Moon-related things “lunar” after the Latin name “Luna.” We even live by a lunar calendar. For example, one month is the time it takes the Moon to complete a rotation around Earth.
EARTH'S MOON
Image Credit: NASA and JPL-Caltech
Earth has one Moon. And it dictates much of our daily lives. The fishing industry is one example of humanity’s dependence on the lunar tides. Some anglers even believe fishing conditions thrive under a Full Moon when fish feed heavily at night. While no evidence proves this theory, anglers still credit lunar cycles for their catch (and blame them when they strike out.)
We have one Moon, but near-Earth objects often come into our world’s orbit for a short time.
|
ESSENTIALAI-STEM
|
Template:Diving the Cape Peninsula and False Bay boat dive charters
This is a template for text used in the "Get in" section of a large number of dive site articles in Diving the Cape Peninsula and False Bay
There are day charter boats which can take a diver to any of the dive sites in the region, but most operators only work from a limited number of launch sites, which limits the dive sites they visit. Visits to a dive site also depend on the weather and are generally not predictable or bookable more than two to four days in advance. See the listing for Cape Peninsula and False Bay boat dive charters and the associated services directory for contact details.
|
WIKI
|
Serotonergic modulation of sacral dorsal root stimulation-induced locomotor output in newborn rat.
Oueghlani Z, Juvin L, Lambert FM, Cardoit L, Courtand G, Masmejean F, Cazalets JR, Barrière G.
Neuropharmacology. 2019 Oct 18; (107815):
DOI: 10.1016/j.neuropharm.2019.107815
Descending neuromodulators from the brainstem play a major role in the development and regulation of spinal sensorimotor functions. Here, the contribution of serotonergic signaling in the lumbar spinal cord was investigated in the context of the generation of locomotor activity. Experiments were performed on in vitro spinal cord preparations from newborn rats (0–5 days). Rhythmic locomotor episodes (fictive locomotion) triggered by tonic electrical stimulations (2Hz, 30s) of a single sacral dorsal root were recorded from bilateral flexor-dominated (L2) and extensor-dominated (L5) ventral roots. We found that the activity pattern induced by sacral stimulation evolves over the 5 post-natal (P) day period. Although alternating rhythmic flexor-like motor bursts were expressed at all ages, the locomotor pattern of extensor-like bursting was progressively lost from P1 to P5. At later stages, serotonin (5-HT) and quipazine (5-HT2A receptor agonist) at concentrations sub-threshold for direct locomotor network activation promoted sacral stimulation-induced fictive locomotion. The 5-HT2A receptor antagonist ketanserin could reverse the agonist’s action but was ineffective when fictive locomotion was already expressed in the absence of 5-HT (mainly before P2). Although inhibiting 5-HT7 receptors with SB266990 did not affect locomotor pattern organization, activating 5-HT1A receptors with 8-OH-DPAT specifically deteriorated extensor phase motor burst activity. We conclude that during the first 5 post-natal days in rat, serotonergic signaling in the lumbar cord becomes increasingly critical for the expression of fictive locomotion. Our findings therefore further underline the importance of both descending serotonergic and sensory afferent pathways in shaping locomotor activity during postnatal development.
Auteurs Bordeaux Neurocampus
|
ESSENTIALAI-STEM
|
Page:Ivanhoe (1820 Volume 2).pdf/138
"Perjure not thyself," said the Norman, interrupting him, "and let not thine obstinacy seal thy doom, until thou hast seen and well considered the fate that awaits thee. Think not I speak to thee only to excite thy terror, and practise on the base cowardice thou hast derived from thy tribe—I swear to thee by that which thou dost believe, by the gospel which our church teaches, and by the keys which are given her to bind and to loose, that my purpose is deep and peremptory. This dungeon is no place for trifling. Prisoners ten thousand times more distinguished than thou have died within these walls, and their fate hath never been known. But for thee is reserved a long and lingering death, to which theirs were luxury."
He again made a signal for the siaves to approach, and spoke to them apart, in their own language, for he also had been in Palestine, where, perhaps, he had learnt his lesson of cruelty. The Saracens produced from their baskets a quantity of charcoal, a pair of bellows, and a flask of oil. While the one struck a light with a flint and steel, the other disposed the charcoal
|
WIKI
|
Soochow University (1900–1952)
The original Soochow University (東吳大學) was a university based in Suzhou and Shanghai in China, established in 1900. The university was registered in the state of Tennessee in the United States.
After the Chinese Civil War, the university was disbanded by the People's Republic of China government in 1952, with its faculties amalgamated with parts of other universities to create various specialist universities in Suzhou and Shanghai. One of these specialist institutions, the Jiangsu Teacher's College (also known as Jiangsu Normal School), took over the main Suzhou campus of the old Soochow University, and in 1982 adopted the English name Soochow University (a different Chinese name to the original institution was adopted).
A different university by the same name (both in English and Chinese) was set up by alumni in Taiwan in 1951.
History
The original Soochow University was founded by Methodist missionaries in Suzhou, Jiangsu, Qing dynasty in 1900 as a merger of three existing institutions: the Buffington Institute and the Kung Hang School in the city of Soochow (now spelled Suzhou), in Jiangsu Province, and the Anglo-Chinese College in Shanghai, which at the time was also part of Jiangsu Province. In 1901, the university registered in the state of Tennessee in the United States under the name Central University in China. Its first president was David Lawrence Anderson who was also the founder of the predecessor Kung Hang School.
The original Soochow University, like the university currently in Taiwan, was named Dōngwú Dàxué (東吳大學) in Chinese. "Dongwu" or "East Wu" refers to the Wu region, in which both Suzhou and Shanghai are located and of which Suzhou was historically the cultural and political centre.
Soochow University was especially well known for the quality of its law school, based in Shanghai.
After the Chinese Civil War, members of the Soochow Alumni Association who moved to Taiwan established a new institution in Taiwan in 1951 to make up for the Soochow University lost in mainland China. A law school was opened in 1954, and a full university was certified in 1971.
After the establishment of the PRC, the institution in Suzhou merged with the Southern Jiangsu College of Culture and Education and the Department of Mathematics and Physics at Jiangnan University to form the Jiangsu Teacher's College in 1952, while the law school in Shanghai merged into the East China University of Politics and Law. The English name Soochow University was revived in 1982 by the Jiangsu Teacher’s College; however, the original Chinese name Dongwu 東吳 was not adopted, and the institution was given the name Suzhou 苏州.
Successor universities
From 1900 to 1952, Soochow University operated in Suzhou and Shanghai
* Soochow University (Suzhou) (1982–present) - into which several of the original university's faculties merged in 1952, and based at the original campus of Soochow University.
* East China University of Political Science and Law - into which the Soochow University Law School merged in 1952.
* Shanghai University of Finance and Economics - into which the Soochow University accounting faculty merged in 1952.
* Soochow University (Taiwan) (operating in Taiwan 1952–present) - revival by alumni.
* Chung Chi College of the Chinese University of Hong Kong - founded in 1951 as a successor to 13 abolished Christian universities in mainland China, including Soochow University, later a founding college of the Chinese University of Hong Kong.
|
WIKI
|
1925 Northern Illinois State Teachers football team
The 1925 Northern Illinois State Teachers football team represented Northern Illinois State Teachers College as an independent during the 1925 college football season. They were led by third-year head coach William Muir and played their home games at Glidden Field, located on the east end of campus. The Teachers finished the season with a 6–1 record. Junior Hahn was the team's captain.
While Northern Illinois State had been a member of the Illinois Intercollegiate Athletic Conference prior to the 1925 season, it withdrew from the conference prior to its first game against another member, the October 10 game against North-Western College. Despite its withdrawal, North-Western attempted to protest the result of the game to conference officials, claiming that Northern Illinois State had used ineligible players.
|
WIKI
|
Transform
When students first meet transformations of co-ordinates, it tends to be a bit confusing and hard to make sense of. This isn't so much because transforming between different descriptions of a thing is difficult as because, up to that point, they've dealt with systems where there's an easy choice of description which, once you've learned to spot it, makes everything simple. The tricky thing is that not every system is amenable to such a choice of description; in particular, although its parts may each be easy to describe in terms that suit each part, the different parts are described in different terms, which complicates describing the interactions among the parts. However, given a suitable characterisation of the systems of description of the disparate parts, it is often possible to transform between the descriptions of the parts. We can model each part in terms of the description of it that makes that modelling simple; we can then characterise the behaviour of that part by some relations between the parameters describing it in its description, then transform those relations to express them in terms of the description that makes it easy to model some other part; the model of the first part might not be neatly expressed in this part's terms, but the conclusions of that model are now available as inputs to our model of the new part, using which we can now characterise the behaviour of this part by some relations among the parameters used to describe it and its response to and effects on the first part by relations between these and the parameters we used to cahracterise the first part (as viewed via our transformation). So transforming co-ordinates lets us build up models of more complex systems from models of simpler systems, each using its own co-ordinates.
In any case, our models express how things we experience (e.g. measure) relate to one another. The things we can measure aren't necessarily exactly the right things to measure, so we may end up using models in which the model parameter that we associate with some measurement doesn't exactly match it. For example, when folk first began studying heat, temperature and their relation to other (particularly mechanical, but also chemical) processes, they noticed that a column of mercury or water would expand as it was heated. The amount of expansion grew by roughly equal amounts upon adding roughly equal (in so far as the knew how to measure it) amounts of heat; so they used the expansion of columns of mercury in glass tubes to gauge temperature. Then they found that, for a given body of gas, the product P.V of pressure and volume varied only with temperature; and that, between different bodies of gas, increasing the amount increased P.V for any given temperature in proportion to the amount; when they divided P.V by a suitable measure of amount of gas, the result depended only on the temperature and was, roughly, just the temperature plus a constant. However, the offset from temperature did vary a little, if temperature was measured using the length of a column of mercury in a tube of glass; still, a wide variety of gasses gave (subject to suitable measure of amount) consistent P.V divided by amount senses of temperature; and so, in time, we switched to using this as our temperature parameter, across a broad range of temperatures. We then recalibrated our mercury thermometers so that the temperature markings aren't quite evenly spaced along the tube's length; mercury's rate of expansion with temeperature varies with (as defined by the P.V/amount of gasses) temperature. That change in how we measure temperature was a reparameterisation.
When we describe a body sitting on a flat surface and being pushed, partly parallel to the surface, partly perpendicularly, we find that the force parallel to the surface won't cause movement unless it exceeds some particular multiple of the force perpendicular to it; the multiplier is called the coefficient of friction for that body's contact with that surface. This uses co-ordinates parallel and perpendicular to the surface; and it works for surfaces in diverse orientations. We can use this to model a system made of several bodies connected by mechanisms (e.g. ropes and pulleys) that ensure particular relationships between the forces on the bodies; and typically there shall be gravity acting on the bodies, with the surfaces at various angles to the direction of gravity. So we use our model in each piece of surface's co-ordinates (parallel and perpendicular) and then relate the result to a common system of co-ordinates (vertical and horizontal) by transforms that rotate the model's co-ordinates; this is a fairly simple transform.
Valid CSSValid HTML 5 Written by Eddy.
|
ESSENTIALAI-STEM
|
Talk:Robert Braiden
Why was my page butchered?
I have spent a lot of time keeping my page up to date with information relevant to my work as a filmmaker. Someone has come in and removed considerable amounts of content and, bizarrely, has changed my name from Robert to Braiden. My first name is NOT Braiden. Whoever did this, why? Hengistboy (talk) 10:07, 8 July 2024 (UTC)
|
WIKI
|
Stathmopolitis
Stathmopolitis is a genus of moths belonging to the family Tineidae. It is the only genus of the Stathmopolitinae subfamily and contains only one species, Stathmopolitis tragocoprella, which is found on the Canary Islands.
The wingspan is 12–20 mm. The forewings are pale fawn, mottled with dark fuscous. The hindwings are pale greyish fuscous.
The larvae have been recorded feeding in old pellets of goats' dung. They are semitransparent ivory white, with a pale yellowish brown head.
|
WIKI
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.