Document
stringlengths
87
1.67M
Source
stringclasses
5 values
batch The subcommand allows to create multiple OSDs at the same time given an input of devices. The batch subcommand is closely related to drive-groups. One individual drive group specification translates to a single batch invocation. The subcommand is based to create, and will use the very same code path. All batch does is to calculate the appropriate sizes of all volumes and skip over already created volumes. All the features that ceph-volume lvm create supports, like dmcrypt, avoiding systemd units from starting, defining bluestore or filestore, are supported. Automatic sorting of disks If batch receives only a single list of data devices and other options are passed , ceph-volume will auto-sort disks by its rotational property and use non-rotating disks for block.db or journal depending on the objectstore used. If all devices are to be used for standalone OSDs, no matter if rotating or solid state, pass --no-auto. For example assuming bluestore is used and --no-auto is not passed, the deprecated behavior would deploy the following, depending on the devices passed: 1. Devices are all spinning HDDs: 1 OSD is created per device 2. Devices are all SSDs: 2 OSDs are created per device 3. Devices are a mix of HDDs and SSDs: data is placed on the spinning device, the block.db is created on the SSD, as large as possible. Note Although operations in ceph-volume lvm create allow usage of block.wal it isn’t supported with the auto behavior. This default auto-sorting behavior is now DEPRECATED and will be changed in future releases. Instead devices are not automatically sorted unless the --auto option is passed It is recommended to make use of the explicit device lists for block.db, block.wal and journal. Reporting By default batch will print a report of the computed OSD layout and ask the user to confirm. This can be overridden by passing --yes. If one wants to try out several invocations with being asked to deploy --report can be passed. ceph-volume will exit after printing the report. Consider the following invocation: $ ceph-volume lvm batch --report /dev/sdb /dev/sdc /dev/sdd --db-devices /dev/nvme0n1 This will deploy three OSDs with external db and wal volumes on an NVME device. pretty reporting The pretty report format (the default) would look like this: $ ceph-volume lvm batch --report /dev/sdb /dev/sdc /dev/sdd --db-devices /dev/nvme0n1 --> passed data devices: 3 physical, 0 LVM --> relative data size: 1.0 --> passed block_db devices: 1 physical, 0 LVM Total OSDs: 3 Type Path LV Size % of device ---------------------------------------------------------------------------------------------------- data /dev/sdb 300.00 GB 100.00% block_db /dev/nvme0n1 66.67 GB 33.33% ---------------------------------------------------------------------------------------------------- data /dev/sdc 300.00 GB 100.00% block_db /dev/nvme0n1 66.67 GB 33.33% ---------------------------------------------------------------------------------------------------- data /dev/sdd 300.00 GB 100.00% block_db /dev/nvme0n1 66.67 GB 33.33% JSON reporting Reporting can produce a structured output with --format json or --format json-pretty: $ ceph-volume lvm batch --report --format json-pretty /dev/sdb /dev/sdc /dev/sdd --db-devices /dev/nvme0n1 --> passed data devices: 3 physical, 0 LVM --> relative data size: 1.0 --> passed block_db devices: 1 physical, 0 LVM [ { "block_db": "/dev/nvme0n1", "block_db_size": "66.67 GB", "data": "/dev/sdb", "data_size": "300.00 GB", "encryption": "None" }, { "block_db": "/dev/nvme0n1", "block_db_size": "66.67 GB", "data": "/dev/sdc", "data_size": "300.00 GB", "encryption": "None" }, { "block_db": "/dev/nvme0n1", "block_db_size": "66.67 GB", "data": "/dev/sdd", "data_size": "300.00 GB", "encryption": "None" } ] Sizing When no sizing arguments are passed, ceph-volume will derive the sizing from the passed device lists (or the sorted lists when using the automatic sorting). ceph-volume batch will attempt to fully utilize a device’s available capacity. Relying on automatic sizing is recommended. If one requires a different sizing policy for wal, db or journal devices, ceph-volume offers implicit and explicit sizing rules. Implicit sizing Scenarios in which either devices are under-comitted or not all data devices are currently ready for use (due to a broken disk for example), one can still rely on ceph-volume automatic sizing. Users can provide hints to ceph-volume as to how many data devices should have their external volumes on a set of fast devices. These options are: • --block-db-slots • --block-wal-slots • --journal-slots For example, consider an OSD host that is supposed to contain 5 data devices and one device for wal/db volumes. However, one data device is currently broken and is being replaced. Instead of calculating the explicit sizes for the wal/db volume, one can simply call: $ ceph-volume lvm batch --report /dev/sdb /dev/sdc /dev/sdd /dev/sde --db-devices /dev/nvme0n1 --block-db-slots 5 Explicit sizing It is also possible to provide explicit sizes to ceph-volume via the arguments • --block-db-size • --block-wal-size • --journal-size ceph-volume will try to satisfy the requested sizes given the passed disks. If this is not possible, no OSDs will be deployed. Idempotency and disk replacements ceph-volume lvm batch intends to be idempotent, i.e. calling the same command repeatedly must result in the same outcome. For example calling: $ ceph-volume lvm batch --report /dev/sdb /dev/sdc /dev/sdd --db-devices /dev/nvme0n1 will result in three deployed OSDs (if all disks were available). Calling this command again, you will still end up with three OSDs and ceph-volume will exit with return code 0. Suppose /dev/sdc goes bad and needs to be replaced. After destroying the OSD and replacing the hardware, you can again call the same command and ceph-volume will detect that only two out of the three wanted OSDs are setup and re-create the missing OSD. This idempotency notion is tightly coupled to and extensively used by Advanced OSD Service Specifications.
ESSENTIALAI-STEM
Comments:Expedition 26 crew returns to Earth safely The Russians do not know what they are doing! Only America has the technology to enable humans to endure long term space flight.
WIKI
2013–14 Quaid-e-Azam Trophy The 2013–14 Quaid-e-Azam Trophy was one of two first-class domestic cricket competitions that were held in Pakistan during the 2013–14 season. It was the 56th edition of the Quaid-e-Azam Trophy, and was contested by fourteen teams representing regional cricket associations. It ran concurrently with the President's Trophy, which was contested by ten departmental teams. Rawalpindi won the Quaid-e-Azam Trophy for the first time defeating Islamabad in the final. Format The format of the Quaid-e-Azam Trophy remained unchanged from the previous season, with the fourteen regional teams divided into two groups. After a series of round-robin matches, the top four teams from each group proceeded to the Super-Eight stage of the competition, with the remaining six teams entering the "bottom six stage". In both final stages, the teams were split into two groups for a further set of round-robin matches, after which the final was contested by the top team from each Super-Eight group. Unlike the previous season, no departmental players were available and as a result the standing of the Quaid-e-Azam Trophy was diminished, with the President's Trophy being considered the "premier first-class tournament" in 2013–14. Standings and points Positions in the tables were determined by total points, most matches won, fewest matches lost, followed by adjusted net run rate (matches with no result, i.e. those where both teams did not complete their first innings, were disregarded); matches finishing in a draw were decided on first innings scores, with points awarded as follows: * Win having led on first innings = 9 points * Win having tied or trailed on first innings = 6 points * Tie having led on first innings = 5 points * Draw having led on first innings = 3 points * Draw having tied on first innings, or tie having trailed on first innings = 2 points * Loss, draw having trailed or with no result on first innings, or abandoned without a ball bowled = 0 points
WIKI
announcement Help someone with useful health advice. Acid Taste in Mouth Acid Taste in Mouth Do you have that disgusting acid taste in mouth? Here's an article on the causes and cures for this problem. Arjun Kulkarni Last Updated: Apr 9, 2018 Has something you ate last night left the proverbial 'bad taste' in your mouth? Acidic taste in mouth is a common occurrence. It is not a disease, but is actually a symptom, more often than not, of an underlying, larger problem of acid reflux disease. Causes When you eat the food, it passes through the esophagus down to the stomach. Between the esophagus and the stomach, there is a muscle known as a sphincter, which acts as a valve. Inside the stomach, there is a lot of acidic activity taking place to digest the food. The sphincter ensures that the food passes down the esophagus into the stomach, but the acid in the stomach doesn't pass into the esophagus. So, it makes sure that the food enters the stomach and the acid doesn't come out of the stomach. But, this sphincter doesn't work quite as efficiently in some people. Sometimes, the sphincter allows some of the acid to pass into the esophagus, which gives that slightly burning sensation in the upper abdomen. This is known as heartburn and is caused due to the reaction of the acid in the esophagus. When the acid travels up the esophagus, it gives that familiar acidic taste in mouth. This problem is also common in pregnant women and obese people, as there is already a lot more pressure on their stomach, hence there is a good chance that the sphincter will allow some acid to pass, when the pressure is too high. Sometimes, people with perfectly functional sphincters too suffer from this problem. Why? When you overeat or eat too much too fast, the food enters the stomach all of a sudden and hence, to digest so much food, excess acid is released by the stomach. Due to the excess food, acid and overall activity in the stomach, the sphincter releases some of the mix into the esophagus. The other factors which exacerbate the problem of acid reflux. Smoking and some medicines relax the sphincter and hence, the incidence acid reflux in the esophagus becomes more common. If your job or daily routine requires you to bend over a lot, then again the problem of acid taste in mouth will be very common. Treatment The best treatment for acid reflux is to monitor your diet. Make sure you don't overeat and the root cause of the acid taste in the mouth is non-existent. Follow the GERD diet. You could also have an antacid, which will help neutralize the acid in the esophagus. But, if it is a recurring problem, perhaps you need to cut down your smoking. With the prescription of your doctor, you could also take some acid-suppressing medication and prokinetic drugs. Acid suppressing medication helps keep the acid down in people who suffer from this problem often. Prokinetic drugs help speed up the process of digestion. In severe cases, surgery may be required to tighten up the sphincter and check if there has been any lasting damage on the esophagus due to recurring problem of acid reflux. Acid taste in mouth is very common and is not too harmful, if it is a one-off incident. But, if it is becoming more and more common, it may be wise to see a doctor.
ESSENTIALAI-STEM
User:Elizaweb/sandbox Practicing Citations This source provides valid, experimental research that ascertains that char cloth impregnated with boric acid and sodium chloride creates the most effective, adsorbent, micro porous material. This magazine produces articles on camping, surviving in the wild and savvy hacks for outdoor activities. This source provides a step by step, well explained method with accompanying pictures that lead the reader to make their own char cloth that is written from an un-biased, neutral point of view. Although this article was written with the purpose to explore the flammability resistance of natural cellulose-based materials for clothing purposes, it also delivers accurate, scientific research into pyrolytic conversion of cellulosic materials also used to make char cloth making it relevant to the Wikipedia article. It will be useful in the ‘History of Use’ section of the Wikipedia article as it offers direct insight via observation into the uses of fire starters/ tinder used by Indigenous tribes and the introduction of more advanced, though not necessarily superior, European invention to these communities. A multi-authored, academic paper published by the peer reviewed Pergamon Press, this source investigates the variations of microporous structures of char cloth when different fabric undergo pyrolysis. Answers to mod 7 Questions * Describe your media - Image of a campfire that can be used to make char cloth * Is it your own work ? - Yes, it is a photo (taken by me) of a campfire I made while camping * What is the file format?- JPEG * What license have you chosen?- Most restrictive acceptable license: : Own work; attribution required for reuse; reusers must share alike; version 4.0 of the Creative Commons CC-BY-SA license * What category/gallery will you add it to?- Added to Char cloth and campfire * Camp Fire for making Char cloth.jpg will you describe the file?- Campfire for making Char cloth
WIKI
-- Germany’s Westerwelle Says Financial ‘Firewall’ Needed to Stem Debt Crisis The European Union remains committed to the euro common currency and will erect a financial firewall to stem the debt crisis, German Foreign Minister Guido Westerwelle said. “We have to erect a firewall,” Westerwelle said in an interview on Bloomberg television today in Washington. “We have to show solidarity. We have to support those countries that are now in serious trouble.” He said “a long-term solution” is being sought. EU finance ministers will discuss tougher rules on budget deficits at a meeting on Jan. 23, according to a draft of a planned fiscal treaty obtained by Bloomberg News. Also on the agenda is a second financing package for Greece, which faces a 14.5 billion-euro ($18.8 billion) bond payment on March 20. Key to the new bailout package is a debt-swap deal between Greek officials and private creditors, who have been continuing negotiations in Athens . The “euro currency is strong, is successful and will survive,” Westerwelle said. “It is absolutely decisive that we stay together in the euro zone, that we understand Europe and the euro zone is not only our destiny, it’s also our desire.” He added that it was a crucial time “not only for Greece but for the euro zone.” 17-Nation Region Euro area countries have been setting up financial arrangements designed to stop the crisis from spilling over to countries outside the 17-nation region, a process known as constructing a “firewall.” Those structures include the European Stability Mechanism, known as the ESM, with a planned funding of 500 billion euros ($647 billion). European governments have redoubled efforts to set up the ESM by July, a year ahead of schedule, after a credit rating downgrade raised concerns over the strength of the temporary aid fund created at the outset of the crisis. “We have to support those countries that are now in serious trouble,” Westerwelle said. “It is necessary that structural reforms come through in Greece .” “Our German commitment is that all European countries stay on board, that all members of the euro zone stay on board and that we solve this crisis together,” Westerwelle said earlier in a meeting with Bloomberg reporters and editors. “There were some positive signals at the beginning of this year, for example the decreasing interest rates for Italy and Spain ,” Westerwelle responded when asked whether he sees the euro crisis abating. He said markets were not “too much impressed” by Standard & Poor’s decision to downgrade the credit rating of nine European countries last week “and I think this is good news.” To contact the reporters on this story: Meera Louis in Washington at mlouis1@bloomberg.net To contact the editor responsible for this story: Chris Wellisz at cwellisz@bloomberg.net
NEWS-MULTISOURCE
Wikipedia talk:Requests for arbitration/Wik mediation first? Has the matter of Wik gone to the Mediation Committee yet? That is necessary to happen before going to the Arbitration Committee, no? Kingturtle 00:12, 24 Feb 2004 (UTC) * Not according to our Jurisdiction at arbitration policy, which permits us to accept cases that have not gone through mediation. In this case, the mediator discussion can be read at the mediation board, and it seems to suggest that further mediation would not be helpful. Martin 00:24, 24 Feb 2004 (UTC) * The why does step four read: The other steps failing you must have requested mediation on the page Wikipedia:Requests for mediation and tried and failed to resolve the dispute through the good offices of the Wikipedia:Mediation Committee in order to proceed to the last step, requesting arbitration. ? Kingturtle 00:41, 24 Feb 2004 (UTC) * Because it's inaccurate and it needs fixing, on account of we're halfway through sorting the process out. * I moved your comment here because (a) you're not an arbitrator and (b) this page is tough enough to manage without threadmode making it worse. Yes, this is probably elitist, but it doesn't make it easier to figure out the requisite four votes needed when a few hundred people can interject their two cents. Martin 00:57, 24 Feb 2004 (UTC) * I agree that the metapage is overly posted. I was just following what looked like the protocol. Maybe you should remove the "Matters of" and "Evidence" from the metapage too. They are not formal requests. Kingturtle 01:35, 24 Feb 2004 (UTC) targeting RickK? Since the addition of my entry to this page, Wik has begun a campaing of reverting my reversions of POV material. He has turned his attention from reverting all of Anthony DiPierro's changes to reverting all of mine. RickK 04:44, 20 Feb 2004 (UTC) * Actually it was Rick who started reverting all of Hector's changes. I reverted his reversions exactly like Rick reverted my reversions of Anthony's nonsense edits. The only difference is that I can't block Rick as he blocked me. --Wik 04:47, Feb 20, 2004 (UTC) * Please note that I did not revert all of Hector's additions, unlike Wik, who announced that he would revert any and all additions made by Anthony, whatever their merit. RickK 04:50, 20 Feb 2004 (UTC) * I did not revert any and all of Anthony's edits either. If something was obviously correct, I left it in place. But if it wasn't obvious, I didn't necessarily waste time analyzing it, and reverted based on Anthony's history of stupid edits. And that's exactly the same Rick did with Hector, having once decided that Hector is on a POV crusade, he just reverted, thereby just pushing his own POV, as he has no less of a pro-American bias than Hector has an anti-American one. --Wik 05:00, Feb 20, 2004 (UTC) * I agree about this blind reversion. It seems like VeryVerily (and at least for today, RickK) always just looks through my user history and reverts every edit I make, no matter what it is. Here's an example - I edit the French Communist Party page and note that for years the PCF was the largest political party in France. I also change the nickname of Pol Pot to the real name Saloth Sar, but that is a minor point, since he is just one of the millions of PCF members anyway. So what happens? VV goes through my user history and reverts everything I editted. So I go through his edit history and re-revert everything. Then RickK does what VV did and re-re-reverts once again what I had re-reverted. On the conflicts between users page, RickK accuses me of "adding blatantly POV additions". How POV is is to note that the PCF was France's largest political party at one time? It's a fact, look at election results. Anyhow, for today at least, RickK accusing Wik of being revert-crazy is the pot calling the kettle black. -- HectorRodriguez 06:56, 20 Feb 2004 (UTC) * I hope the arbitration committee is able to establish that these types of reverts are not to continue. Reverting an established user without even doing a basic search to find the facts, and without even giving so much as a reason on the talk page or even in the comment section is not acceptable. If you've done a basic search and the information is not verifiable, then I can see removing it, once, with a comment "non-verifiable." But to go on reverting 5, 10, 15 times, with no comments, when a link to the verification is right there in the added references section is completely unacceptable. Wik has even gone so far as to remove my external links apparently without even looking at them. This is tantamount to a unilateral ban Wik has attempted to enforce against me, although he has graced me with the ability to add "obviously correct" material. Anthony DiPierro 15:30, 20 Feb 2004 (UTC) * Please keep politics out of it. The wikipedia would be so much simpler if everyone shared my POV as well. You have (in my eyes) a strong American POV, that is not shared by 172 or Wik. Perhaps we should ban everyone who disagrees with us? Secretlondon 08:21, Feb 25, 2004 (UTC) Is the matter now closed, since over seven days have passed since acceptance of the case and no decision has been made? -- Emsworth 22:29, Mar 7, 2004 (UTC) * I don't think there's a time limit on decisions being made. If there were a seven day limit, then all three current cases would just be thrown out, and that makes no sense. The arbitrators appear to be voting on the findings of fact and remedies at the moment: Requests for arbitration/Wik/Decision. fabiform | talk 22:36, 7 Mar 2004 (UTC) * Well, the "Emergency Session" section of arbitration policy would imply a one week deadline. Since we got four cases going on at once, we've interpreted that a little more flexibly than perhaps we should. Martin 23:13, 7 Mar 2004 (UTC) * For me four cases = four weeks to decide them all. I'm sure we will be able to go faster once everything is set up and we have some more experience. I'm spending as much time as I can on arbitration as it is. --mav 05:41, 8 Mar 2004 (UTC) thank you Arbitration Committee Thank you for making a ruling. Keep up the good work. I realize the process is time consuming, and that you have no previous Committees to refer to, but your work is vital to our community. Please take on more cases soon :) Kingturtle 23:51, 15 Mar 2004 (UTC) * Thanks! :) --mav * I will abide by the committee's ruling. --Uncle Ed 14:25, 16 Mar 2004 (UTC) What a crock Great. Wik gets a slap on the wrist, and Ed Poor, Hephaestos and I get warnings for doing what nobody else on Wikipedia had the guts to do. It's obvious that the Arbitration and Mediation process is nonsense, and I will not participate in it again. RickK | Talk 02:23, 16 Mar 2004 (UTC) * While I agree with you that arbitration didn't work very well in this situation, I believe that was because it was brought prematurely. As for not participating in arbitration, you really don't have a choice. Jimbo referred this case to the arbitration committee, and refusing to submit to arbitration, he says, "means an end to the privilege of editing." Anthony DiPierro 02:41, 16 Mar 2004 (UTC) * Rick, although a couple of people initially thanked me for temp-blocking Wik, I was acting unilaterally: i.e., as a vigilante. I would prefer that all of us follow a single set of rules, and that an enforcement policy be followed fairly. The "warning" I got merely restates as official policy what I've been hoping for all along. I am content. --Uncle Ed 14:30, 16 Mar 2004 (UTC) * Heh, past history suggests Wik will be unable to control himself and will be back in the dock soon enough. The process has revealed more Wik supporters than I would have guessed, which is interesting to know. Stan 14:59, 16 Mar 2004 (UTC) * Partially agreed: while the committee failed here in my opinion, I still welcome its existance. Hopefully future cases will be handled properly instead. — Jor (Darkelf) 15:00, 16 Mar 2004 (UTC) Rick: I'm unsure why you describe our reminder to Wik as a "slap on the wrist", and our reminder to you as a "warning", as if they were two very different beasts. They are both formal reminders. Also, you may note that Wik got, as well as a formal reminder, a three month probationary period, with the possibility of 24hr temp bans during this period. If you wish to assist the process, you may want to ensure that Wik complies by the terms of his probation, and apply a temporary ban if he does not. Martin 18:26, 16 Mar 2004 (UTC) * NO way. It would be just what people like you are looking for to get me blocked. RickK | Talk 01:17, 17 Mar 2004 (UTC) * See, now I'm just confused. The arbitration committee (as a group) has explicitly authorised sysops to temp-block Wik in certain circumstances, as laid down in "remedy three" of our decision. An administrator is unlikely to face much serious criticism for a block explicitly authorised by the arbitration committee. * Regardless of that, I hope you are at least reassured that Wik did not get off with just a "slap on the wrist". Martin 01:52, 17 Mar 2004 (UTC) * I'm dubious of the effect a temp block would even have. Edit comments from Wik such as "rv, new UTC day" lead me to believe that after the three months is up, the situation will revert to what it was before and this case will again be in arbitration. - Hephaestos|§ 01:56, 17 Mar 2004 (UTC) * So far, Wik is sticking to the terms set out by the arbitrations committee. For three months, we'll have relative peace, and we'll get experience with how well this remedy works. After three months, if this comes back to arbitration, the arbitrators are likely to hand down a stiffer sentence (at least according to what Fred said on the mailing list). I think it's a good result. -- Cyan 02:48, 17 Mar 2004 (UTC) * Well, in fact he just got his first 24 hour block. MyRedDice obviously disagreed with the UTC 24 hour idea. fabiform | talk 03:08, 17 Mar 2004 (UTC) * Yeah, I just used my judgement as a sysop, on seeing behaviour I felt might breach the probation. UTC (or any particular timezone) doesn't make much sense in an international project. Wik's suggestion of any 24 hour time period made more sense to me. I hadn't really considered the matter previously. * No doubt there will be future cases in which arbitration committee decisions are subject to interpretation. Folks have to use their judgement, in the end. Sysops who have a pattern of bad judgements will probably be asked by the community to resign as sysop. Martin 18:17, 17 Mar 2004 (UTC) I'd urge others to follow Martin's lead here - don't worry too much about how you measure the day. There's a certain amount of flexibility as to how to interpret "day" in the ruling. If you use your best judgement and act in good faith, you should be fine. I'm a bit disappointed that some are saying this remedy is a failure so soon, by the way. If after a month or two things are no better or are even worse than they were before, then we can probably say this rememdy hasn't done us much good, but to me it seems too early to be making such judgements just yet. --Camembert Clarification request copied from user talk:Wik Dear Wik, The arbitration committee has investigated your case, and reached a decision. As a result of that decision: The arbitration committee reminds you that auto-reverting any one user's edits is only acceptable if that user has been banned through the proper channels, or following clear community consensus. The arbitration committee rules that you shall be placed on probation for a period of three months. If during that time period you revert the same page more than three times on the same day, you may be given a 24 hour "timeout" ban, at sysop's judgement. This measure is intended to be in addition to any wider policy that the community may decide to apply. Thus, if the community decides to permit sysops to temp-ban users in revert wars, you may be banned for an additional 24 hours, above the normal banning period. Sincerely, Martin (on behalf of the arbitration committee) * Does "three times on the same day" mean on the same calendar day (if so, according to which timezone) or does it mean three times within any 24-hour period? Also, does "sysop's judgement" mean that if one sysop bans me, another who disagrees with it could immediately unban me? --Wik 23:39, Mar 15, 2004 (UTC) * I would suggest concentrating on avoiding making multiple reverts, rather than worrying about the exact definition of the word "day". You may wish to err on the side of safety. Martin 23:51, 15 Mar 2004 (UTC) * If you can't give a clear answer, I'll assume calendar days according to UTC. --Wik 00:00, Mar 16, 2004 (UTC) * You assumed wrong. See you in 24 hours. Martin 02:08, 17 Mar 2004 (UTC) discussion continued here [This] decision leaves some questions open, which probably no member of the committee thought about. Does "Three reverts in a day" refer to a calendar day, as might be typically assumed, or does "day" mean any 24-hour period? I asked on my talk page, but Martin failed to give a clear answer; I then said I would assume the calendar day, Martin didn't respond to that, yet he blocked me as soon as I reverted on a new calendar day, apparently because it wasn't 24 hours after the last revert on the previous day. I don't think he has the authority to decide this on his own anyway, and if so, he should have been clear. So I would like to have an official answer from the committee as a whole, and maybe Martin can be warned to adopt a more helpful attitude than he showed on my talk page. Furthermore I would like to know whether "sysop's judgement" means that a sysop can also unblock me if his judgement differs from another sysop who blocked me. --Wik 01:56, Mar 18, 2004 (UTC) * It is, to me, blindingly obvious that it means a rolling 24 hour period. * The sad thing, really, is that you're attempting to 'game' the system here, needing to work out exactly how much you're pissing everyone else off and whether you think you can get away with it. The point of the order was to encourage you to reform your poor behaviour, rather than merely act as a impediment on it. * Martin, now as in the past, enjoys my complete confidence. * James F. (talk) 02:18, 18 Mar 2004 (UTC) * How this is "blindingly obvious" is beyond me. Normally when one speaks of the "next day", it is the next calendar day, even if it's just ten minutes away. If you meant any 24-hour period you should have been explicit about that. So I would still request a vote of all arbitrators on that. As to the point of the order, an impediment is precisely what it is. If you want me to stop reverting as many times as I'm allowed, you should either provide a system of content arbitration or explain why I should just let content in place which I know is wrong. --Wik 02:25, Mar 18, 2004 (UTC) As far as I'm concerned, "day" means any 24-hour period, for the reasons Martin states above. I can only repeat what Martin said on your talk page and what James has said above: rather than trying to work out exactly how many reverts you're allowed before you get a ban, you should concentrate on avoiding reverting so much in the first place. I note that you're currently involved in edit wars over Antinomy, Paradox and Schnorrer. I note also that you've not made any comment on the talk page of any of those articles. Reverting a page without any discussion is rarely a productive way to edit. It's better to explain why you think your version is best and to address the concerns of others on the talk page. --Camembert * You can hardly expect that this kind of punishment makes me see things your way, so of course I want to know exactly how many reverts I'm allowed, especially when Anthony is in no way restricted and even allowed to use obvious sockpuppets to hide his reverts. The substance of the three disputes is rather self-evident, I also explained it on my user page. As usual, you're exhibiting your bias by blaming me, as if Anthony made any comment on those talk pages. --Wik 02:40, Mar 18, 2004 (UTC)
WIKI
Confused about how data propagates with DDAU I’m experiencing some unexpected behaviour when trying to implement DDAU when setting properties that are not contained in objects. I’ve created an Ember Twiddle showing the behaviour here. The code is below: controllers/application.js The controller is the owner of the data, which is comprised of foo (An object) and baz, a string. An action called setProperty is included, to be called when those data properties need to be updated. My understanding of DDAU is that this is done because data should only be mutated at the level which owns it. export default Ember.Controller.extend({ init() { this._super(...arguments); this.foo = { bar: 'one' }; this.baz = 'two' }, actions: { setProperty(prop, value) { this.set(prop, value); } } }); templates/application.hbs Simply inserts a component, passing in the data props and the closure action. {{my-component foo=foo baz=baz setProperty=(action "setProperty") }} components/my-component.js export default Component.extend({ actions: { updateProps() { this.setProperty('foo.bar', 'one-updated'); console.log(this.get('foo.bar')); // one-updated this.setProperty('baz', 'two-updated'); console.log(this.get('baz')); // two setTimeout(() => { console.log(`setTimeout: ${this.get('baz')}`); // two-updated }); } } }); templates/components/my-component.hbs baz value: {{baz}}<br> foo.bar value: {{foo.bar}}<br> <button {{action "updateProps"}}>Update Props</button> When the Update Props button in the component is clicked, the setProperty action is fired and the properties are updated as defined in the action. Both foo.bar and baz updated in the component template as expected. Here is where things get weird. Immediately after each time that I call the setProperty action from the component, I log the relevant property to the console. In the case of foo.bar, the console shows the updated value as expected. However, logging baz to the console after calling setProperty logs the initial value, not the updated one. Even weirder is that if I wrap the console.log statement in a setTimeout, it logs the updated value, even if no time interval is passed as an argument. I have three questions. 1. Why has baz not been updated by the time it is logged to the console and is there a way around this? 2. Why would the setTimeout make a difference? 3. Am I misunderstanding the best way to implement DDAU? Do I need to fundamentally reconsider my design pattern? You haven’t explained why synchronously accessing this.baz inside updateProps and seeing the new value is important to you. It probably shouldn’t be. If you’re trying to do some work in that spot to manually propagate the change, that is the problem. Another way to say this is: the component can’t safely assume that all changes to foo or bar will come from itself. So whatever you’re trying to do in reaction to them changing needs to be done in a place other than your own updateProps anyway. The explanation for the difference between foo and bar is that both are getting passed into your component only when the component gets rendered or re-rendered. Both of them will only update after a render happens. But setProperty isn’t changing foo, it’s changing a property inside foo, so you necessary see that change immediately, because you’re sharing one copy of the object between the controller and the component. Thank you, this makes a lot of sense. It helps to know why that pattern is unreliable, and that it should simply be avoided.
ESSENTIALAI-STEM
Yellow Hedgerow Dreamscape Yellow Hedgerow Dreamscape is a compilation album by British progressive rock band Porcupine Tree (at that time a pseudonym for private solo projects by Steven Wilson but later a fully fledged band in its own right). It is a compilation of the band's initial three tapes, Tarquin's Seaweed Farm, Love, Death & Mussolini and The Nostalgia Factory. It consists of the rest of the music from the tapes that was not included in the band's first studio album On the Sunday of Life... and a previously unreleased track "An Empty Box". The album was first released in 1994 as a limited run of 2,500 CD copies. In 2000, Gates of Dawn re-released the album as a double LP edition pressed on yellow vinyl, limited to 1000 copies, and on black vinyl up to 150 copies. 300 extra copies were pressed on green vinyl in 2005. Note that the vinyl version omits Steven's cover of Prince's song "The Cross", replacing it with the song "Out", from the Love, Death & Mussolini cassette. In May 2013, a reissue of Yellow Hedgerow Dreamscape became available to purchase exclusively through the Headphone Dust online store. It uses the vinyl track list. The vinyl edition of the album, using the mastering for the 2013 CD, was reissued in 2017 in the box set The Delerium Years 1991–1993. Two tracks from the Love, Death & Mussolini EP and The Nostalgia Factory have different titles on Yellow Hedgerow Dreamscape: "Colours Dance Angels Kiss" was renamed as "Track 11" and "Hokey Cokey" was renamed as "Execution of the Will of the Marquis de Sade". The main melodic motif from "Mute" was reused in Wilson's other main project at the time, No-Man, for the song "Days in the Trees."
WIKI
An Overview on Comets An Overview on Comets For centuries comets they have fascinated and enthralled us, being the inspiration for artists, story-tellers and scientists alike. Sweeping across the sky in brilliant definition, comets are something everyone recognises. Composition: Composed of a mixture of ice, rock and dust, comets have often been referred to as ‘dirty snowballs’. Scientists believe comets are formed in the far regions of the Solar System at the same time the planets were forming closer in. Since they have a high concentration of ice which has not been heated significantly, they may still hold pristine amounts of the ingredients from when the Solar System was formed. Because of this, scientists are engrossed with comets since they may hold the key to where we came from and what the entire universe is actually made of. The solid part of the comet is called the nucleus, their sizes ranging from yards to tens of miles. When a comet comes closer to the Sun, the sunlight will cause a part of the comet’s surface to convert from a solid to a gas without going through the liquid phase. This forms into a cloud which surrounds the nucleus and called the coma. The gases and particles making up this cloud are pushed outwards by solar winds and the pressure from the sunlight, which forms into tails, a breathtaking sight which comets are famous for. The nucleus is a small part of the comet, and some coma can actually grow larger than that of the sun. There have been reports of comas being so large that they can stretch from the Sun to the Earth, 93 million miles (150 million km). The comet tails take their name from the Latin kome which means ‘hair’, and the Greek kometes, ‘a star with hair’. Origins: They are thought to have originated in the Oort Cloud, a region of space which astronomers have not proved actually exists but in all probability does exist. The Oort Cloud is a cloud system which surrounds our Solar System 50,000 to 100,000 times further from the Sun than what the Earth is. Categories: Comets are put into several different categories depending on the type of orbits they have. Every so often, some comets will get flung from the Oort Cloud and spend thousands of years travelling to our Solar System where they end up in huge orbits around the Sun. It is not sure as to why they sent to this Solar System but scientists have put forward gravitational influences of nearby star as a theory. These are known as long-period comets. The second group of comets are called the short-period comets that have relatively short orbits of around 200 years. Scientists believe that they originate from the Kuipter Belt, a region of bodies made mostly of ice from around Jupiter and includes Pluto. The most famous comet from this group is the Comet Halley. The third group is made up of a few comets which orbit the Sun in the Asteroid Belt. When they get closer to the Sun, a part of their comas show. The fourth group consists of solitary bodies. They come from interstellar space and pass through the Solar System and never return; only a few of this group has been identified. Orbits: For quite some time, some scientists did not believe that comets travelled in orbits like planets; instead, they were believed to travel in straight lines. However, by the 17th century, astronomers were starting to change their minds after the research done by Johannes Kepler. Comets in Recent History: In 1680, a bright comet appeared in the sky following the detailed positional measurements made; seven years later, Isaac Newton proved that comets could obey the law of gravitation. Comets were meticulously studied by other scientists, allowing us to understand more about the universe and the role they play in it.
ESSENTIALAI-STEM
Baronian Baronian (in Armenian Պարոնյան) or in Western Armenian Պարոնեան) is an Armenian surname that means "son of a Baron". It is thought to have originated in the Cilician Kingdom, when the Western term Baron, a title of nobility, came to replace its Armenian counterpart Nakharar. However, since the actual title of Baron was not always hereditary, descendants of Barons were designated with the surname Baronian to indicate the nobility of their ancestor. Eventually, the usage of the word Baron in Armenian evolved and is currently used in the same way as Mister is used in modern English. For example, a man whose last name is Baronian may be referred to as Baron Baronian in modern times, though his last name still implies that a remote ancestor likely held the Baron title of nobility. Baronian can be also written as Paronyan, particularly in Eastern Armenian. Baronian / Paronyan may refer to: * Hagop Baronian (pronounced in Eastern Armenian as Hakop Paronyan) (1843–1891), influential Ottoman Armenian writer, satirist, educator, and social figure in the 19th century * Paronyan Musical Comedy Theatre of Yerevan, Yerevan State Musical Comedy Theatre, main theatre named after Baronian above * Jean-Baptiste Baronian, also known as Alexandre Lous (born 1942), French-language Belgian writer of Armenian descent, critic, essayist, children's book writer and novelist * Zareh Baronian (1941–2017), Romania-born Armenian theologian, abbot, Archimandrite
WIKI
Perth City Hall Perth City Hall is a civic building in King Edward Street, Perth, Scotland. Built in 1914, it is a Category B listed building. The building served as a music hall before closing in 2005 and being replaced by Perth Concert Hall. Major renovations began in 2018 which included the introduction of a museum in part of the building. It reopened on 30 March 2024 as the new home of Perth Museum, with the Stone of Destiny as one of the flagship items on display. History In the mid-19th century the administrative centre of the town was the old city chambers at the east end of the High Street. However, civic leaders needed a public hall in which to hold concerts and other public events and the first city hall, designed by William Macdonald Mackenzie, was built on the site of the old flesh, butter and meal markets in what became King Edward Street in 1844. By the turn of the century the first city hall was in a very dilapidated state and, after a piece of plaster fell from the ceiling injuring several people, the building was demolished in 1908. The foundation stone for the new building was laid by the Lord Provost, Councillor James Cuthbert, on 26 June 1909. It was designed by Harry Edward Clifford and Thomas Melville Lunan in the Classical style, built at a cost of £25,000 and officially opened by the Lord Justice General, Lord Dunedin, on 29 April 1911. The design involved a symmetrical main frontage with five bays facing King Edward Street (a 180-degree change from the original building's orientation), which was laid out between 1901 and 1902; the central section of three bays featured a large portico with three round-headed doorways with windows above flanked by full-height Ionic order columns in pairs. Perth mercat cross was erected immediately to the west of City Hall in 1913, during the building's reconstruction. Margaret Thatcher addressed the Scottish Conservative Party conference in the hall, just a week after becoming Prime Minister, in May 1979. Beyond the mercat cross, the main entrance of St John's Centre was built facing City Hall: the remainder of St John's Place was demolished in 1987 to make way for its construction. Perth City Hall hosted concerts from a number of high-profile performers throughout its history, including The Who in 1965 and The Spencer Davis Group in 1966 through to Morrissey as late as September 2004. However, following the opening of the Perth Concert Hall in 2005, the city hall became vacant and was placed on the Buildings at Risk Register for Scotland. In May 2012 Perth and Kinross Council submitted a proposal to demolish the hall and redevelop the site but this was rejected by Historic Scotland. The council then sought architectural proposals for the re-design of the existing building and the short-listed proposals were put on display in June 2017. Perth Museum In January 2019, BAM Construction began work on a £30 million programme of works to convert the city hall into a new heritage and arts attraction based on a design by Mecanoo. The new attraction will incorporate displays on the Stone of Destiny and the Kingdom of Alba. In December 2020, the Scottish Government announced that the Stone of Destiny would be relocated to the hall by 2024. A competition to name the building's forthcoming museum section was launched in March 2022, with the winning name being "Perth Museum", with 60% of the votes. The building reopened on 30 March 2024 as the Perth Museum, with the Stone of Destiny and the Carpow Logboat as two of the flagship items on display.
WIKI
Senate to Take Up House Bill on Zika Funding, Barbs and All The House is not in session this week, providing lawmakers a timeout after last week’s tumultuous Democratic sit-in. But senators will be in town, and they have a fight of their own coming over a spending package to address the Zika public health threat. The military construction and veterans’ spending bill forced through by House Republicans with no debate early Thursday morning contains $1.1 billion for Zika preparation and prevention — but it also contains some poison-pill provisions that are likely to drive off any Democratic support, notably one restricting the use of the money by Planned Parenthood. Democrats consider that add-on totally unacceptable, noting that the virus can be transmitted sexually. Other provisions also appeared to be added by House and Senate Republicans, who negotiated the measure on their own, to essentially dare Democrats to oppose the overdue Zika money. But Democrats have indicated they will not provide the support to overcome a 60-vote procedural hurdle. President Obama would most likely veto the measure if it got to his desk. Republicans, after taking months to advance the funding for the mosquito-borne disease, will no doubt argue that it is now Democrats who are blocking the funds. But the Republican record on the response is pretty clear, so that argument will be a tough sell. To irritate Democrats even more, Republicans quietly stripped from the underlying bill a House-passed provision banning the display of Confederate flags at national military cemeteries. That Democratic proposal was initially approved in a bipartisan House vote. Ah, Congress.
NEWS-MULTISOURCE
Talk:Ruins of Gedi/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Reviewer: Joe Roe (talk · contribs) 10:52, 19 January 2017 (UTC) First reading GA review – see WP:WIAGA for criteria An exceptionally comprehensive, detailed and well researched article. Just needs a few improvements to the layout and formatting (1b & 2a), and expansion of the lead, to meet GA standards. –&#8239;Joe (talk) 14:47, 19 January 2017 (UTC) * 1) Is it well written? * A. The prose is clear and concise, and the spelling and grammar are correct: * The prose is reasonably clear, if a little overburdened with detail. I spotted a few grammatical mistakes which I fixed, but I'm not the most eagle-eyed so the article would probably benefit from further copyediting. Nothing fatal though. * B. It complies with the manual of style guidelines for lead sections, layout, words to watch, fiction, and list incorporation: * The lead should be significantly expanded to summarise the major points in the article body (but drop details like the precise distance from multiple nearby locations!). Similarly, the infobox could be significantly expanded and it would be nice to see that lovely photo of the Great Mosque at the top of the article. Layout is also a major weakness. There are sections which significantly overlap (site description vs. architecture, site history vs. archaeology, local economy vs. maritime trade), ambiguously titled sections (isn't the whole article a "site description"? Can we expect the reader to infer the difference between "site history" and "history of occupation" from just the TOC?), and the order isn't logical to me. On the basis of other articles on archaeological sites I'd suggest something along the lines of: history of discovery and investigation -> history of the site -> description of the site -> interpretation of the site. But whatever you go with, you should definitely avoid splicing sections, e.g. having two sections on the history of investigation between descriptions of the architecture and finds. The standard "See also" and "External links" sections would also be a nice addition. Finally, while MOS:UNITS is not part of the GA standard, the inconsistent use of units is jarring. As this article doesn't not have strong ties to the US, ideally all the units should be given in SI, with an optional conversion. Either way it should be consistently SI-first or Imperial-first, and consistently converted or not converted. * 1) Is it verifiable with no original research? * A. It contains a list of all references (sources of information), presented in accordance with the layout style guideline: * Generally consistent, but a few references are not formatted using a template. None of the references are accompanied by URLs or DOIs even though many have online versions available. These should be added. Since lots of references are repeated, perhaps consider switching to shortened footnote style. * B. All in-line citations are from reliable sources, including those for direct quotations, statistics, published opinion, counter-intuitive or controversial statements that are challenged or likely to be challenged, and contentious material relating to living persons&mdash;science-based articles should follow the scientific citation guidelines: * Exemplary. Every single statement is directly cited to a high quality scholarly source. * C. It contains no original research: * The article relies quite heavily on primary sources, but I believe this is appropriate for an article about a single site. * D. It contains no copyright violations nor plagiarism: * No significant matches found by Earwig's copyvio detector. * 1) Is it broad in its coverage? * A. It addresses the main aspects of the topic: * Very comprehensive. My only suggestion would to be expand the section on this history of the site with more regional background, if sources are available. * B. It stays focused on the topic without going into unnecessary detail (see summary style): * As mentioned above I found the prose got a bit bogged down in the details, particularly in the description sections (e.g. listing every major structure, giving precise measurements) – and I'm used to reading site reports! I'll leave this to your discretion, though. * 1) Is it neutral? * It represents viewpoints fairly and without editorial bias, giving due weight to each: * 1) Is it stable? * It does not change significantly from day to day because of an ongoing edit war or content dispute: * 1) Is it illustrated, if possible, by images? * A. Images are tagged with their copyright status, and valid fair use rationales are provided for non-free content: * B. Images are relevant to the topic, and have suitable captions: * Very nice images. Are no photos of the finds available, though? * 1) Overall: * Pass or Fail: * On hold pending improvements to layout and formatting. and expansion of the lead (1b & 2a). * 1) Overall: * Pass or Fail: * On hold pending improvements to layout and formatting. and expansion of the lead (1b & 2a). Thanks so much for the review! I will get to work on the recommend edits; I agree with them all and I'll see what I can do. I have an absolutely bonkers week coming up, so I apologize in advance if it takes me more than a few days. Hopefully, though, I can work it into good shape ASAP! Ninafundisha (talk) 19:27, 21 January 2017 (UTC) Status query Joe Roe, Ninafundisha, where does this review stand? I see that Ninafundisha made a bunch of edits on January 22 and 23, and one further edit on February 11, but nothing since, and there's no indication here of what progress has been made and what is left. This review is nearly three months old, and should probably be wrapped up before too much longer. Thanks. BlueMoonset (talk) 05:06, 15 April 2017 (UTC) * BlueMoonset Joe Roe Thanks for the note - apologies for the delay; my semester has gotten away from me. I did make some pretty substantial edits to the organization of the page, and I think that it's pretty much ready to go. I got hung up on the changes requested to the references - I can add DOIs and such, but is there a quick way to switch to shortened footnote style? I'm not all that competent when it comes to organizing references, and so any advice on that front would be welcome. In any case, I will take a look through the article again this weekend, and I'll post a reply to each of the points in the review. Thanks again for your patience! Ninafundisha (talk) 01:43, 18 April 2017 (UTC) * While I can see the value in going SFN, I don't think this is required as part of the criteria (see What the Good article criteria are not - in particular If you are able to figure out what the source is, that's a good enough citation for GA) AIR corn (talk) 09:52, 20 April 2017 (UTC) Second reading I've taken another look at the article and made a few changes myself. The lead and organisation are much approved. The changes to the units and switch to SFN were just suggestions – I think the current version of the article more than meets the requirement for GA status. . –&#8239;Joe (talk) 09:09, 9 June 2017 (UTC) * Thanks to all of you, especially Joe Roe for the review! Very much appreciated. Ninafundisha (talk) 16:38, 10 June 2017 (UTC)
WIKI
Leiolopisma ceciliae Leiolopisma ceciliae, also known as the Réunion giant skink, was a species of skink found on Réunion. The species is classified as extinct.
WIKI
User:Esquivalience/Bitsquid Bitsquid is a game engine owned by Autodesk with an emphasis on performance, flexibility, and security.
WIKI
Page:United States Statutes at Large Volume 76.djvu/1715 SUBJECT INDEX Taxes—Continued Page Treaty obligations provision, nonapplicability to Revenue Act of 1962 1069 Telephone Service, extension of excise tax rate 114 Television and Radio Stations: Educational facilities, grants for 64 Surplus Government property, eligibility to receive 805 Tennessee: Southern I n t e r s t a t e Nuclear Compact, eligibility 253 Winchester Division, Eastern District, holding court at 222 Tennessee Valley Authority, appropriation for 1226 Territories, Office of, appropriation for_-_ 339 Tetanus, vaccination program, grants to States 1155 Texas: Brazos River Basin, flood control projects, authorization 1185 Buffalo Bayou, flood control project, authorization 1184 El Paso, land conveyance to city by Department of the Army 778 H e a t h Crossing, bridge construction over Rio Grande River 140 I n t e r s t a t e compact with Louisiana, waters of Sabine River, membership 34 Los Indios, bridge construction over Rio Grande River, authorization.. 153 Marshall Division, Eastern District, holding court at 247 Padre Island National Seashore, establishment 650 Rio Grande City, bridge construction over Rio Grande River, authorization 154 Sabine Lake Bridge and Causeway Authority, annual a u d i t; report 59, 60 Southern I n t e r s t a t e Nuclear Compact, eligibility 253 Trinity River Basin, flood control projects, authorization 1185 Texas and Pacific Railway Company, acquisition of stock from other carriers; capital stock increase 142 Thailand, attendance of citizen to Air Force Academy, authorization 85 Thanksgiving Day, 1961, proclamation... 1435 Theodore Roosevelt Association, donation of properties to public agencies 218 Theodore Roosevelt Birthplace National Historic Site, establishment authorized 217 1667 Thermometers, Clinical, modification and Page* withdrawal of duties, proclamation.. 1470 Timpanogos Cave National Monument, Utah, redefinition of boundaries, proclamation 1457 Tin, elimination in one-cent piece alloy 440 Tobacco: Acreage allotment transfer, extension of time for filing lease 151 Cigar-filler and cigar-binder, transfer by lease of acreage allotments, restriction 947 Tokens, Slugs, Disks, or Paper Similar to Money, prohibition against use 555 Trade Agreements: Effectuating certain agreements negotiated at the tariff conference, 196061; modification of part s of prior proclamations 1467, 1485, 1490 Modification of duties, authorization. _ 872 Trade Agreements Extension Act of 1951: Amendment, repeal of provisions 882 Cuba, suspension of preferential tariff t r e a t m e n t to products of 78 Trade Expansion Act of 1962 872 Trade Fairs, Mobile, promotion of foreign commerce through use of 1074 Trademark Act, 1946, Amendments: Applicability to foreign nationals 774 Registration and protection of trade marks, definitions, etc 769-775 Trademarks, divestment of Government interest in certain 1139 Trading With the Enemy Act, Amendments: Copyrights, estates and trusts, etc., divestment of Government interest in certain 1115 Motion pictures, transfer of vested titles to Library of Congress 1140 Trade m a r k s, divestment of Government interest in certain 1139 Vested property, sale in time of national emergency; lump-sum payment of claims of successor organization for return of 1113, 1114 War Claims Fund, deposits 1113, 1115 Transportation: Air, extension of excise tax on persons.. 115 Animals, diseased, regulation 129, 762 Corporations, taxes, carryover of net operating loss 648 Gambling devices, prohibitions against. 1075 Long- and short-haul charges, nonapplicability of provision to express companies 635 Mass transportation demonstration projects, appropriation for loans and grants 729 �
WIKI
AP®︎/College US Government and Politics Course: AP®︎/College US Government and Politics > Unit 1Lesson 3: Challenges of the Articles of Confederation The Articles of Confederation and Shays' Rebellion The Articles of Confederation established a weak central government, with states retaining sovereignty and independence. This system led to issues like Shays' Rebellion, highlighting the need for a stronger government. As a result, the Constitutional Convention was held, leading to the creation of the U.S. Constitution and a federalist system. Read the full text of the Articles of Confederation. Read the full text of the Articles of Confederation. Want to join the conversation? - What was Canada's reasoning for not joining the union?(14 votes) - The reason Canada did not join the union was because they relized the union had too many weakness.(9 votes) - how can a FREE government still allow slavery to be legal? Or Can they?(3 votes) - Many of the founding fathers were ashamed of slavery and acknowledged that it was incompatible with the ideals of liberty which inspired the formation of a free country. However, many of them owned slaves too. In fact, the colonies which permitted slavery and treated slaves as commodities, insisted that slaves should be added to their population so that they could have more representation in the House of Representatives. Notwithstanding the irony of this argument, this demand resulted in the Three-Fifths Compromise under which three-fifths of the slave population of the slave states would be considered during delimitation of seats. Slavery, an extremely divisive issue, was deeply entrenched in society and the economy in the late 18th century. Any attempt to abolish slavery would have led to widespread unrest and war (just like it did in the 1860s). So, the founders having abolitionist sentiments relented so as to ensure peace and unity in the newly formed United States and left the issue to future generations to sort out.(12 votes) - why did Canada not join(1 vote) - The Canadians weren't as severely affected by British tax policies like the American Colonies were. While there were some protests, many of the Canadians either tolerated the British presence or were frightened by the large British garrisons in Canada. Additionally, Canada didn't join the Union after the revolution probably because of some cultural separation between the American colonies and themselves, and also the fact that there were many attacks from the Americans on Canada, and that some Americans really resented Quebec, because of the land it got through the Quebec Act of 1775 that some of the Thirteen Colonies thought was theirs.(3 votes) - Why didn't Canada want to join even if the tax part wouldn't affect them that much.(2 votes) - How didn't the Massachusetts government not find out about Shays' Rebellion?(2 votes) - How does the Articles of Confederation have a different tone than the US Constitution?(1 vote) - The Articles of Confederation spoke about the states as separate but friendly. The Constitution spoke about them as being united under one government.(3 votes) - Why did poor farmers start the infamous Shays’ Rebellion?(1 vote) - The weaknesses of the Articles of Confederation became apparent to all as a result of an uprising of Massachusetts farmers in the summer of 1786. the farmers of western Massachusetts were heavily in debt, facing imprisonment and the loss of their lands. Many of them were veterans, who owed taxes that had gone unpaid while they were away fighting the Revolution. The Continental Congress had promised to pay them for their service, but the national government did not have sufficient money.(3 votes) - Was the Shays' Rebellion caused by the Articles of Confederation?(1 vote) - Shay's Rebellion was less caused by the Articles and was caused more by the lack of effective governance. It's like if someone is bleeding out and you use essential oils as a solution. Is the problem the oils or the bleeding out? So the Articles was more of a shoddy solution for the problem that caused Shay's Rebellion.(3 votes) - I read somewhere else that the Articles of Confederation was hastily composed and written as a temporary fix to the lack of government. Is that true?(2 votes) - Why would they pre-agree to something they are even hundred percent sure will happen?(1 vote) - [Instructor] As we talked about in other videos, shortly after the Declaration of Independence in July of 1776, the representatives from what were colonies but now self-declared states had to think about how to organize themselves. And so they start drafting the Articles of Confederation, which go into effect in 1781. Now as we'll see, Articles of Confederation do not provide for any type of real central government. It really was a mutual defense union with a little bit of free trade, as well see in the text here. This is some of the beginning passages of the Articles of Confederation, and I encourage you to read the whole thing, it's actually quite interesting. But you immediately see it has a very different tone than the one that we see in the US Constitution. The Constitution starts with "we the people," while the Articles of Confederation starts with "to all to whom these Presents shall come," so it's almost, you know, kind of an awkward business letter. "We the undersigned Delegates of the States "affixed to our Names send greeting. "Articles of Confederation and perpetual Union "between the states of New Hampshire, Massachusetts-bay, "Rhode Island and Providence Plantations, "Connecticut, New York, New Jersey, Pennsylvania, "Delaware, Maryland, Virginia, North Carolina, "South Carolina and Georgia. "The Stile of this Confederacy shall be "'The United States of America.'" This part is interesting. "Each state retains its sovereignty," so it rules over itself, it's not giving up its sovereignty to some type of a union. So it "retains its sovereignty, its freedom, "and independence, and every power, jurisdiction, and right, "which is not by this Confederation "expressly delegated to the United States, "in Congress assembled." So they're really viewing themselves as independent countries that are next to each other that for the sake of fighting the Revolutionary War, agree to things like mutual defense and free trade, but they are really separate countries. "The said States hereby severally enter into a firm league "of friendship with each other, for their common defense," so this is that mutual defense idea, "the security of their liberties, "and their mutual and general welfare, "binding themselves to assist each other "against all force offered to, or attacks made upon them, "or any of them, on account of religion, sovereignty, trade, "or any other pretense whatever." And then it says, "the better to secure and perpetuate "mutual friendship and intercourse among the people "of the different States in this Union, "the free inhabitants of each of these States... "shall be entitled to all privileges and immunities "of free citizens in the several States; "and the people of each State shall free ingress and regess "to and from any other State, and shall enjoy therein "all the privileges of trade and commerce." So people could travel back and forth between these states, there would be free trade, but these would be viewed as different countries. One interesting thing that you don't hear people talk a lot about, there is even a little passage here that allows Canada to join this confederation. "Canada, acceding to this confederation, "and adjoining in the measures of the United States, "shall be admitted into, and entitled to all the advanatages "of this Union; but no other colony shall be admitted "into the same, unless such admission "be agreed to by nine States." So they're saying hey, if Canada agrees, they are pre-agreeing to allow Canada to join this union, which Canada obviously does not join. But it's interesting to think that they thought about this. Now what are the weaknesses here? Well the most obvious one, I don't have the entire Articles of Confederation here, but how does this United States of America wield its power? Where does its money come from? It turns out that if it needs to generate revenue in order to take some action, it can't tax the citizens of the states, the states can only do that themselves. Instead it has to apply to the states in order to contribute to the United States of America. If you want to take some type of unified action, well you would have to have delegates from the various states, and meet together and decide what to do. You wouldn't have any strong leader being able to take decisive action. And so there really wasn't a notion of a central government here. There wasn't even a notion of one country, one nation. It really was about different sovereign states. And all of this, as we'll see, will come to a head in the mid-1780s. The United States has a significant amount of debt exiting the American Revolutionary War. Debt to countries like France. You also have debt on the individual level. Merchants owe money to European merchants and traders and lenders, and these lenders weren't interested in paper currency from these newly created states. They wanted hard currency, they wanted gold and they want silver. And so many of the merchants in the United States in turn put pressure on the people they lend money to, especially poor farmers, many of whom had been veterans in the Revolutionary War, to pay their debts in hard currency. And so you can imagine these poor farmers who were kind of the bottom of this food chain were in a pretty tough bind. They had fought in the Revolutionary War, they had risked their lives, many of them had been injured, but they actually did not get paid for their service, to a large degree. And then now, they were not able to even survive as farmers, because not only were they not able to borrow new funds, but some of their existing funds they had to pay back in hard currency, which wasn't available in the United States. And so all of this tension eventually comes to a head in western Massachusetts. This right here is a picture of Daniel Shays, who was one of these poor farmers in western Massachusetts who was also a veteran of the American Revolutionary War who was not paid for his service. And so he eventually becomes one of the leaders of these rebellious former veterans, poor farmers, and they start taking the courthouses of western Massachusetts, making them inoperable. These were the courthouses where people had to report to in order to talk about how they would repay their debt. Well you can imagine this worried many of the merchants who these people owed their debt to. It also worried many of the founding fathers, because it took some time for the government of Massachusetts to be able to react to this, and while that was happening, through mid-1786 into the beginning of 1787, this rebellion got stronger and stronger and stronger. Eventually, on January 25th, 1787, we see things coming to a head where Daniel Shays is leading his rebels to take the armory in Springfield, Massachusetts, which is in western Massachusetts, but stopped by militia. This is a militia that's paid for by merchants in the area, who probably want their debt paid, or just wanted functioning courthouses, or did not want all of these rioting farmers and former veterans. And so this rebellion is put down, but it shows the weakness inherent in the Articles of Confederation. This rebellion starts having the potential to spread well beyond Massachusetts. But there was not a coordinated action. In fact, it took many months to even be able to field a militia against the rebellion. It also highlighted the weakness of not having one central government that could take decisive action. Also one central government that could generate its own revenue through taxing the citizens of all of the states and using that for things like a military, or being able to negotiate debts with foreign countries. And so Shays' Rebellion is cited by many historians as one of the main catalysts, after it was put down, for having the Constitutional Convention in mid-1787 to rethink the Articles of Confederation. Now as we talked about in other videos, many people went to this convention thinking we're not just gonna edit the Articles of Confederation, we need to create a stronger central government. We need a federalist system where yes, the states can have rights, but we also need a central government. We need a strong leader at the head of that central government. And so they do draft what is now the Constitution at this convention, and after the convention, they sell this new constitution, because remember, it has to be ratified by the states through the Federalist Papers, which we also talk about in other videos, Hamilton organized it, but James Madison and John Jay also significant contributors, and eventually, the Articles of Confederation does get replaced, the Constitution is ratified, and it becomes effective on March 4th, 1789.
FINEWEB-EDU
Chuck Tanner Baseball Manager of the Year Award The Chuck Tanner Baseball Manager of the Year Award is the original name for two awards that are given by the Rotary Club of Pittsburgh, in Pittsburgh, Pennsylvania. It is named for Chuck Tanner, former manager of the Pittsburgh Pirates, and was first awarded on November 17, 2007, at the city's Rivers Club. For the first three years, the award was given to a manager in Major League Baseball. In 2010, a second award was presented to the "Chuck Tanner Collegiate Baseball Manager of the Year"; the original award was renamed the "Chuck Tanner Major League Baseball Manager of the Year Award". During the selection process, a major factor for the committee is each candidate's career achievement. Proceeds from the annual awards dinner in November are used by the club to support its humanitarian service initiatives and Rotary Foundation programs. Chuck Tanner Major League Baseball Manager of the Year Award * See footnote Chuck Tanner Collegiate Baseball Manager of the Year Award * 2010 – Joe Jordano, University of Pittsburgh * 2011 - Jim Chester, Penn State Greater Allegheny * 2012 - Loren Torres, Point Park University
WIKI
Gigabit Ethernet [Definition, Actual Speed, and Working Theory] [MiniTool Wiki] What Is Gigabit Ethernet Transmitting Ethernet frames at the rate of a gigabit per second is called Gigabit Ethernet (GbE or 1 GigE). Gigabit Ethernet is a part of the Ethernet family of computer networking and communication standards. Tip: Ethernet was initially introduced to the public in 1980 with the largest throughput of 10 megabits per second. In 1995, an updated version – Fast Ethernet, was released. It was also referred to as 10/100 with a throughput of 100 megabits per second. Gigabit Ethernet was released in 1998, which has a maximum throughput of 1, 000 megabits per second. The most popular variant 1000BASE-T was defined by the IEEE 802.3ab standard, which came into use in 1999. This variant has taken the place of fast ethernet in wired local networks because of its huge speed improvements over fast ethernet and its use of cables and equipment. To get more details of Gigabit Ethernet, please keep reading this post of MiniTool . The Actual Speed of Gigabit Ethernet In theory, the maximum speed of Gigabit Ethernet is gigabit per second (1,000 Mbps). However, the actual speed of Gigabit Ethernet cannot reach that number. Due to elements like network protocol overhead and re-transmissions because of collisions or other transient failures, devices can’t transfer useful message data at the 1 Gbps rate. In normal cases, the effective data transfer speed can reach 900 Mbps. The average connection speed varies according to the specific condition. For instance, disk drives can affect the performance of Gigabit Ethernet connection on computers. In addition to that, bandwidth can limit the connection as well. To be specific, the download speed of a whole home network is 1 Gbps, two running connections will immediately halve the available bandwidth for both devices. This is true for any number of concurrent devices too. Some home routers with Gigabit Ethernet ports may have CPUs that cannot cope with the load needed to support incoming or outgoing data processing at the full rate. The more client devices and concurrent sources of network traffic, the harder it will be for a router processor to support the highest speed transfer over any connection. How Does Gigabit Ethernet Work To use Gigabit Ethernet smoothly, it is vital to learn its working principle. It is said that fiber optic cables or other special network cable technology are required to reach gigabit speeds with Ethernet. Luckily, those Gigabit Ethernet cables are only required for long distances. In most cases, Gigabit Ethernet works well by using a regular Ethernet cable (the CAT5e and CAT6 cabling standards). Tip: These cable types follow the 1000BASE-T cabling standard that is also referred to IEEE 802.3ab. You may also be interested in this: What Can You Do When Ethernet Not Working on Windows 7/10 How to Know If a Network Supports Gigabit Ethernet To utilize Gigabit Ethernet, you need to know if it is supported by your network. Ethernet cables often carry the information about the standards they support, but they don’t imply whether the network is configured to run at the claimed rate. You can check the speed rating of an active Ethernet network connection through the Control Panel window. Here’s how to do. Step 1: Open the Run window by pressing Windows and R keys, and then type control and hit the Enter key. open Control Panel from Run window Step 2: In the next window, type network in the search bar and then click on the View network status and tasks option under the Network and Sharing Center section. View network status and tasks Step 3: Choose Ethernet in the prompted window to open the status window and view the network speed. If the speed can reach the announced speed of Gigabit Ethernet, then you can use it. Otherwise, you can’t utilize it. Bottom Line What is Gigabit Ethernet? This post has explained it to you. Additionally, it tells you the actual Gigabit Ethernet speed, its working theory, and some additional information. To sum up, this is a comprehensive guide for Gigabit Ethernet. • Linkedin • Reddit
ESSENTIALAI-STEM
Mikusch Mikusch - 7 months ago 41 HTML Question Regex to match anything with href="" but between two other tags I already have this Regex pattern that checks for every href="" in my document: \(href\s*=\s*(?:"|')(.*?)(?:"|')) Now I want it to match all href s ONLY in between <a and </a> tags, with other parameters still allowed in between. Do not match: <base href="http://www.w3schools.com/images/" target="_blank"> <link rel="apple-touch-icon" sizes="57x57" href="/apple-icon-57x57.png"> Match: <a href="http://www.w3schools.com/"></a> <a class="re" href="http://www.w3schools.com/"></a> <a href="http://www.w3schools.com/" class="re">This is a link</a> Thanks in advance, I've not been able to solve this problem as of yet. Answer Note: Due to the limitation of language classes (regular, stack), this can't be done 100%. But a close approximation is: <a\b[^>]*\shref="([^"]*)" Or, if you use named subexpressions: <a\b[^>]*\shref=(?P<QUOTE>["'])(?P<URL>.*?)(?P=QUOTE) Which will also handle apostrophe-delimited attributes. The last example can also be rewritten as: <a\b[^>]*\shref=(["'])(.*?)(\1) but remember to use the second subexpression, not the first one. It wasn't clear whether you want to grab the name of the link, but if you do, whichever regex you choose, you can add a simple appendix to get the name. For example, for the named subexpressions: <a\b[^>]*\shref=(?P<QUOTE>["'])(?P<URL>.*?)(?P=QUOTE)[^>]*>(?P<NAME>.*?)</a>
ESSENTIALAI-STEM
%A Machado, Ricardo %A Rother, Alexandre %A Comparin, Daniel %A Pawar, Ajinkya M. %A Matos, Felipe de Souza %A Cunha, Thais Christina %A Alberton, Luiz Rômulo %A Paranhos, Luiz Renato %D 2021 %T Removal of the smear layer by passive and continuous ultrasonic irrigation: a scanning electron microscopy study. %K %X Background: Due to the anatomical complexity of the root canal system, irrigation plays an essential role in endodontics. This in vitro study was sought to compare the removal of the smear layer (RSL) promoted by conventional irrigation (CI), passive ultrasonic irrigation (PUI) and continuous ultrasonic irrigation (CUI) with 17% EDTA, by using scanning electron microscopy (SEM). Material and Methods: Forty single-rooted human mandibular canines were instrumented and randomly assigned to four groups (n=10), according to the irrigation protocol aiming to the RSL: CG (control group) —conventional irrigation with distilled water; CI— conventional irrigation with 17% EDTA; PUI —passive ultrasonic irrigation with 17% EDTA; CUI— continuous ultrasonic irrigation with 17% EDTA. Hemisections from each sample were obtained, and images of each root canal third (cervical, middle and apical) were captured at 1000 X magnification by SEM. Three previously calibrated and blinded evaluators classified the RSL, according to the criteria proposed by Torabinejad et al.: small or no smear layer (all dentinal tubules were clean and open); 2 = moderate smear layer (no smear layer on the surface of root canal, but dentinal tubules contained debris); 3 = dense smear layer (covering practically all dentinal tubules entrances). Statistical analysis was performed by Kruskal-Wallis and Bonferroni tests (p<0.05). Results: Overall, CUI and cervical thirds showed better RSL rates, compared with the other methods and thirds, respectively (p<0.05). More specifically, the cervical thirds showed better results in the CG, CI and PUI groups (p<0.05), whereas the cervical and middle thirds were not significantly different in the CUI group. Conclusion: CUI was the most effective method for the RSL. %U https://joralres.com/index.php/JOralRes/article/view/joralres.2021.070 %J Journal of Oral Research %0 Journal Article %R 10.17126/joralres.2021.070 %P 1-8%V 10 %N 6 %@ 0719-2479 %8 2021-12-21
ESSENTIALAI-STEM
Captain Fantastic (soundtrack) Captain Fantastic (Original Score) is the film score to the 2016 film Captain Fantastic directed by Matt Ross, featuring the film's original music composed by Alex Somers, known for his collaborations with Sigur Rós frontman Jónsi, under the name Jónsi & Alex; it also marked Somers' film scoring debut. The album was released by Lakeshore Records on July 8, 2016, alongside the film, with a vinyl edition published by Invada Records on July 29. The soundtrack, entitled Captain Fantastic (Original Motion Picture Soundtrack) was released a week later, on July 15. Development Ross liked the musical works of Sigur Rós and also Somers' collaborative album with Jónsi called Riceboy Sleeps (2009). He and the film's editor, Joseph Krings used much of the music from the album as temp tracks for the rough cutting and liked the dreamy atmosphere. He then sent the script to Somers, who was fascinated by the idea of "leaving society altogether and make the move out into the nature" agreeing to be part of the film. Somers did not rely on an ambient music and instead the way he built with. Some of the challenges he felt were finding ways to have the music reflect the character's growth throughout the film, where "the family leaves their home in the forest and enters society and that major change needed to be reflected in the music somehow" which was tricky to show them. He and Ross wanted the music to strongly underpin the story and the characters, and did not want the adventurous feeling to play too much. Therefore, the music "embodies the spirit of the character’s wildness and the isolation that comes with living in the middle of a forest". Somers mostly developed the sounds by the old-fashioned way, recording to the finished film he was sent. He had a lot of time scoring the film as the filming was completed long back, and had no deadline pressure, so that he could record, re-record and experiment those tracks. The piece he wrote for the very first scene of the film, had to be deleted for the film, as he felt that the nature sounds being apt for the scene. Somers used piano, dulcitone, glockenspiel, guitars, strings, voices to enhance the ideas in the film. He also used drums and percussion sporadically, as most of the film centered around the forests. And to make it more organic, he used wire brushes scraping on snares and pencils on boxes and manually rubbed drum skins, which were meant to get the right rhythmic textures, and wanted them to sound like they could have been made in the forest. He also used a guitar amplifier choir which he never done before. He further collaborated with his friends, Jónsi and Sindri providing vocals, Amiina playing strings, Óbó played various instruments. Somers felt that he was able to put all of his compositions into the soundtrack as lot of music is not in the film, and as Ross gave him much time to experiment and record and re-record, ending up with loads of music. He took much of the cues he liked and assembled into the album. Reception Simon Tucker of Louder than War gave 9/10 to the album stating: "This album needs to be listened to. It is an album that exists in between the here and there (wherever ‘there’ may be). It’s the streams of light that break through the grey clouds on a rainy day. It gives you hope, it calms you down and it inspires you to reflect and progress with a positive heart and soul." Olivia Neilson of The State of the Arts wrote "Jonsi collaborator (the Icelandic vocalist of Sigur Ros), Alex Somers, creates a majestic score to complement the stunning cinematography and moving emotional journey Captain Fantastic will take you on." Tara Brady of The Irish Times wrote "Alex Somers score manages a similar aesthetic impact." Reviewing the film's soundtrack, Johnny Brayson of Bustle wrote "The Captain Fantastic soundtrack does a great job of transporting the viewer into the world of the film".
WIKI
-- Clariant Exit Seen Ending Leather-Chemical M&A False Starts Clariant AG (CLN) ’s decision to sell its leather-chemicals business is poised to spark more deals in the $4 billion industry, potentially ending more than five years of false starts by BASF SE and others to consolidate. Emboldened by Clariant’s disposal announcement in November, creditors of Germany’s TFL Ledertechnik are still holding out for an offer close to 200 million euros ($270 million) after receiving lower bids last year, people familiar with the situation said. A number of buyout firms are considering buying and merging the businesses, they said, asking not to be identified as the talks are private. Europe’s leather-chemicals industry -- dominated by a handful of companies including Germany’s Lanxess AG (LXS) and Dutch Stahl Holdings -- has suffered as Asian rivals added capacity driven by local demand for luxury bags, shoes and upholstery. Clariant tried to sell its unit in 2008, and Lanxess and BASF SE (BAS) previously discussed combining their leather-chemicals assets, said the people. “Clariant’s disposal could be a source of momentum,” said Bernd Schneider, a chemicals adviser at investment bank Lincoln International LLC. “In leather chemicals, someone has to make the first move. If there is movement with Clariant and maybe TFL, BASF could also hope for a sale.” Clariant’s leather services business has 12 production sites and employs more than 700 people. The unit had sales of 265 million Swiss francs ($292 million) in 2011 and earnings before interest, taxes, depreciation and amortization of 25 million francs. Shares of the chemical maker were little changed at 12.68 francs as of 10:12 a.m. in Zurich today. Fresh Impetus TFL, the maker of tanning agents and dyestuffs for leather bags and shoes, is being sold on behalf of creditors seeking repayments on debt taken on during a decade of ownership by buyout-firm Odewald & Cie. TFL, based in Weil am Rhein, Germany , spurned low offers from buyout firms in the second half of 2012, one of the people said. The sale of TFL, which stands for Together For Leather, is now progressing with mostly buyout firms vying for the asset, another person said. The company hired Leonardo & Co. in 2011 to find a buyer. With Clariant’s leather-chemicals unit also up for sale, private-equity firms are considering buying multiple assets and merging them to improve competitiveness, the people said. BASF in 2011 said it failed to find a buyer for its leather-chemicals assets as offers fell short of its own valuation. The company at the time said it will retain the business after management improved its performance. Stahl M&A Clariant, based in Muttenz, Switzerland, has hired Greenhill & Co. (GHL) as an adviser on its sale process, according to two people with knowledge of the situation. Representatives for Clariant, TFL, Lanxess, BASF, Greenhill and Leonardo declined to comment. Other potential buyers include European rivals. Stahl, owned by Paris-based buyout firm Wendel SA (MF) , is looking at some smaller acquisition targets to bolster its performance coatings business. Of the six largest competitors in Stahl’s industry, which together have more than 50 percent of the market, about three are for sale, Wendel board member Bernard Gautier said in December, adding that Stahl won’t miss out on good acquisition opportunities if prices are attractive. Lanxess, which has been in the leather-chemicals industry for almost 100 years, purchased Dow Chemical Co. (DOW) ’s chromium ore operations in South Africa in 2006, and it remains the only supplier with the entire value chain from the chrome ore to the leather tanning materials. Luxury Bags The Leverkusen, Germany-based company, which supplies car manufacturers such as Volkswagen AG (VOW) , is investing 40 million euros to expand chromium operations and will this year open a leather-chemicals plant in China . Christian Faitz, a Macquarie analyst, said Lanxess already has the leather-chemicals assets it needs and therefore may refrain from taking part in the current sales. “Lanxess is probably content with the position they have,” he said. “I don’t think they want any more assets. You can’t afford to forget that it’s a cyclical business.” As well as demand for luxury bags, shoes and upholstery, the leather-chemicals market is also tied to beef consumption and the availability of raw hides. Manufacturers’ needs for leather are also shifting, leading to new product developments. Lanxess markets its X-lite brand as capable of cutting the weight of premium leather destined for aircraft and luxury cars by as much as 30 percent. Anton Ticktin , a partner at investment bank Valence Group , said that investors often don’t realize that leather-chemicals assets can be more profitable than other businesses in the industry. “One of the biggest factors is the money and margins you make are much better than you would be led to believe if you looked at textile chemicals,” Ticktin said. “Look at the automotive sector and treatments for the nice leather seats in Mercedes cars. The margins can be pretty high, but buyers don’t always attribute that.” To contact the reporters on this story: Patrick Winters in Zurich at pwinters3@bloomberg.net ; Sheenagh Matthews in Frankfurt at smatthews6@bloomberg.net To contact the editor responsible for this story: Simon Thiel at sthiel1@bloomberg.net
NEWS-MULTISOURCE
Package Details: tageditor 3.1.1-1 Git Clone URL: https://aur.archlinux.org/tageditor.git (read-only) Package Base: tageditor Description: A tag editor with Qt GUI and command-line interface supporting MP4/M4A/AAC (iTunes), ID3, Vorbis, Opus, FLAC and Matroska Upstream URL: https://github.com/Martchus/tageditor Keywords: aac edit id3 matroska mp3 mp4 ogg opus Qt tags vorbis Licenses: GPL Submitter: Martchus Maintainer: Martchus Last Packager: Martchus Votes: 9 Popularity: 1.261096 First Submitted: 2015-08-27 19:29 Last Updated: 2018-06-03 20:39 Pinned Comments Martchus commented on 2016-05-18 22:03 All my packages are managed at GitHub where you can also contribute directly: https://github.com/Martchus/PKGBUILDs There also exist a binary repository: https://martchus.no-ip.biz/repo/arch/ownstuff Latest Comments Martchus commented on 2018-01-27 14:36 @lord_rel I've uploaded the missing packages. BTW: I also updated this package so using _json_export=OFF should actually work. In this case reflective-rapidjson is not required. So you can save a few build-time dependencies if you don't need the JSON export. lord_rel commented on 2018-01-27 12:07 reflective-rapidjson is missing from the official repos or AUR Martchus commented on 2017-09-13 08:51 Version of tagparser 6.4.0 contains serious bugs causing broken MP4 and Matroska files: https://github.com/Martchus/tagparser/issues/7 So it is highly recommended to update to 6.4.1 before continue using tagparser/tageditor. To apply the fixes is not required to rebuild tageditor. Martchus commented on 2017-02-02 16:07 I will improve this when updating the package anyways. This would also concern the dependencies c++utilities and qtutilities. However, I'm wondering what helper you use. I mean, when updating packages it should ensure that dependencies are built before packages requiring them (regardless of the specific version). ponsfoot commented on 2017-02-02 05:09 tageditor 2.2.0 requires tagparser>=6.2.0 so depends=() should be specified so. tageditor might be built before tagparser (especially on aur helper). Martchus commented on 2016-05-18 22:03 All my packages are managed at GitHub where you can also contribute directly: https://github.com/Martchus/PKGBUILDs There also exist a binary repository: https://martchus.no-ip.biz/repo/arch/ownstuff Martchus commented on 2015-09-06 19:38 I updated the tagparser library. It should build now. Martchus commented on 2015-09-06 12:10 I can reproduce the error and will check whats going on. (This problem actually occurs when building the tagparser, not the tageditor.) Simone98RC commented on 2015-09-06 09:47 Latest release can't be compiled due to a fatal error (../caseinsensitivecomparer.h: File o directory not existing)
ESSENTIALAI-STEM
Talk:Max Hall Formatting messed up The formatting of the bottom of the article is all messed up. Someone should fix. Johncolton (talk) 22:21, 3 July 2012 (UTC) Devout He is described as a devout Mormon. Need a reference to clearly show that he is "devout". How do we define devout, what are the objective criteria that are used? How do we not know he is simply an average follower of the religion and not "devout".Mwinog2777 (talk) 16:17, 26 August 2012 (UTC)
WIKI
User:Jdmg2004 =Introduction= I am a student at York College, City University of New York. My major is Business Administration and I am minoring in Psychology. I am considering that Wikipedia is not evil. I'm working through this by doing a Wikipedia editing assignment in my I/O Psychology course. My talk page doesn't contain much yet, but I am working on it. My Professor has assigned his class the project of creating and editing a User page. Soon, you will only see work from me on this page. Userboxes Color 2 Boy Scouts,1 Cub Scout, and 1 Eagle Scout /sandbox
WIKI
Getting Data In Search results for a sourcetype are null for a certain user. Where should I check the permissions? johnraftery Communicator We are using two different user accounts: the defult admin account, and one we have created called "consultant", which is restricted. When running this search: eventtype=x sourcetype=y host=z | where NOT isnull(ACTION_MX_TIMING) | table ACTION_MX_TIMING There are many results when running as admin, but none when running as consultant - all results are null. Where should I check the permissions? In Manager » Access controls » Roles, they both have identical settings for "Indexes searched by default", and for "Indexes" (the two boxes at the bottom of the screen). Thanks, John 0 Karma chimell Motivator Hi go to settings-->Eventtype in app context dropdown select All , in Owner dropdown select consultant and see if you have x eventtype in the result 0 Karma johnraftery Communicator Hi, thanks for your answer, but my admin role has to be the owner of the eventtypes (you can only have one owner). I've given the consultant role read and write permission for the eventtype, but they still can't see any results. 0 Karma vasildavid Path Finder I would make sure that the 'consultant' user has permissions to view whatever App context the 'eventtype' was created in. To explain in more detail, the 'admin' user probably has read/write permissions for that Splunk App, but 'consultant' does not, so when they use 'eventtype=x' they don't have access to that knowledge object and the search provides no results. 0 Karma johnraftery Communicator Thanks. In Settings->Event types->[my eventtype], admin has read/write access, and "Everyone" (which includes consultant role) has read access. So it should work, no? Or are you thinking of a different settings page? 0 Karma chimell Motivator In eventtype give read/write access to admin and consultant roles .if it don't works ,verify consultant capabilities and her restrictions . Verify also the priority 0 Karma johnraftery Communicator Ok, I've given eventtype read/write access to consultant, and that didn't work. Can you please tell me how to verify the other things? Which screen should I use? 0 Karma somesoni2 Revered Legend Since you've two roles, check the permission on the eventtype (settings->Event types-> x) to see if your consultant role has permission or not. johnraftery Communicator Thanks. In Settings->Event types->[my eventtype], admin has read/write access, and "Everyone" (which includes consultant role) has read access. So it should work, no? 0 Karma Take the 2021 Splunk Career Survey Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Earn $50 in Amazon cash!
ESSENTIALAI-STEM
Show Reference: "Object vision and spatial vision : two cortical pathways" Object vision and spatial vision: two cortical pathways Trends in Neurosciences, Vol. 6 (1983), pp. 414-417, doi:10.1016/0166-2236(83)90190-x by Mortimer Mishkin, Leslie G. Ungerleider, Kathleen A. Macko @article{mishkin-et-al-1983, abstract = {Evidence is reviewed indicating that striate cortex in the monkey is the source of two multisynaptic corticocortical pathways. One courses ventrally, interconnecting the striate, prestriate, and inferior temporal areas, and enables the visual identification of objects. The other runs dorsally, interconnecting the striate, prestriate, and inferior parietal areas, and allows instead the visual location of objects. How the information carried in these two separate pathways is reintegrated has become an important question for future research.}, author = {Mishkin, Mortimer and Ungerleider, Leslie G. and Macko, Kathleen A.}, doi = {10.1016/0166-2236(83)90190-x}, journal = {Trends in Neurosciences}, keywords = {biology, objects, vision}, pages = {414--417}, posted-at = {2013-04-30 16:15:25}, priority = {2}, title = {Object vision and spatial vision: two cortical pathways}, url = {http://dx.doi.org/10.1016/0166-2236(83)90190-x}, volume = {6}, year = {1983} } See the CiteULike entry for more info, PDF links, BibTex etc. Mishkin et al. proposed a theory suggesting that visual processing runs in two pathways: the what' and thewhere' pathway. The `what' pathway runs ventrally from the striate and prestriate to the inferior temporal cortex. This pathway is supposed to deal with the identification of objects. The `where' pathway runs dorsally from striate and prestriate to inferior parietal pathway. This pathway is supposed to deal with the localization of objects. Mishkin et al. already recognized the question of how and where the information carried in the different pathways could be integrated. They speculated that some of the targets of projections from the pathways, eg. in the limbic or system or the frontal lobe, could be convergence sites. Mishkin et al. stated that some preliminary results suggest that the hippocampal formation might play an important role.
ESSENTIALAI-STEM
Waunana Waunana is a genus of cellar spiders that was first described by B. A. Huber in 2000. Species it contains four species, found only in Ecuador, Colombia, and Panama: * Waunana anchicaya Huber, 2000 – Colombia, Ecuador * Waunana eberhardi Huber, 2000 – Colombia * Waunana modesta (Banks, 1929) (type) – Panama * Waunana tulcan Huber, 2000 – Ecuador
WIKI
This is the Social Security scam you don't want to fall for For many people, it's a call they're not expecting. An unknown caller tells you that your Social Security number has been suspended or canceled. If it happens to you, it's likely the latest iteration of a robocall scam the IRS warned individuals about earlier this year. Still other calls try to convince people to pay up with cash or gift cards in order to avoid getting arrested. Chances are, you or someone you know has received one of these calls. In the first six months of 2019, people filed 73,000 reports about Social Security fraud, according to the Federal Trade Commission, with losses totaling $17 million. And because you're caught unaware, you may be more susceptible than you think to becoming a victim. Now, congressional lawmakers have started to move toward curbing these practices. The House of Representatives passed a bill on Dec. 4 to limit robocalls by requiring carriers to block the numbers without charging consumers extra money. The Senate passed similar legislation earlier this year. And on Dec. 10, Reps. John Larson, D-Conn., and Tom Reed, R-N.Y., asked the Social Security Administration to review scam calls purporting to come from the agency. "While SSA has taken steps in recent months to prevent and raise public awareness about these imposter calls, we are alarmed that the scams continue to be widespread and severe," the congressmen wrote in a letter to Andrew Saul, commissioner of the Social Security Administration. Financial advisor Diahann Lassus, president of Lassus Wherley, a subsidiary of Peapack Gladstone Bank, received one of the Social Security scam calls herself. "I deleted the call," Lassus said. "Most people are not going to delete the call. "Most people are going to listen to it, and they're going to panic." The calls can be effective in defrauding victims because they "terrify people," Lassus said. At times like these, it helps to remember some basic facts. Most important, the Social Security Administration and IRS do not make these kinds of direct calls. "Don't be afraid to hang up," Lassus said. "If they're for real, then you'll get something in the mail." It's also important to be similarly suspicious of any notifications that come through email. "The Social Security Administration is not going to send you an email with a click here link," Lassus said. Also, limit how often you give out your Social Security number. You should think twice before revealing that information on medical forms, for example, where that information is often not necessary. "I personally never give out my Social Security number, except to the IRS," Lassus said.
NEWS-MULTISOURCE
Samaññaphala Sutta The Samaññaphala Sutta is the second discourse of the Digha Nikaya. Quotes * 'Suppose there were a man, a slave, a labourer, getting up before you and going to bed after you, willingly doing whatever has to be done, well-mannered, pleasant-spoken, working in your presence. And he might think, ... "I ought to do something meritorious. Suppose I were to shave off my hair and beard, don yellow robes, and go forth from the household life into homelessness!" And before long, he does so. And he, having gone forth might dwell, restrained in body, speech and thought, satisfied with the minimum of food and clothing, content, in solitude. And then if people were to announce to you: "Sire, you remember that slave who worked in your presence, and who shaved off his hair and beard and went forth into homelessness?" ... Would you then say: "That man must come back and be a slave and work for me as before?"' 'No indeed, Lord. For we should pay homage to him, we should rise and invite him and press him to receive from us robes, food, lodging, medicines for sickness and requisites, and make arrangements for his proper protection.' * M. Walshe, trans. (1987), verses 35-36, pp. 97-98 * As long, Sire, as a monk does not perceive the disappearance of the five hindrances in himself, he feels as if in debt, in sickness, in bonds, in slavery, on a desert journey. But when he perceives the disappearance of the five hindrances in himself, it is as if he were freed from debt, from sickness, from bonds, from slavery, from the perils of the desert. * M. Walshe, trans. (1987), verse 74, p. 102 * It is just as if a man were to draw out a reed from its sheath. He might think: “This is the reed, this is the sheath, reed and sheath are different. Now the reed has been pulled from the sheath.” … In the same way a monk with mind concentrated directs his mind to the production of a mind-made body. He draws that body out of this body. * M. Walshe, trans. (1987), verse 86, p. 104
WIKI
Untterable and Lies According to Lauren slater untterable refers to the difference between things that are known to be fact and true from what people think through the hatch of ideas or what people believe. This could be like people believing against what is known to be true and real. Lying on the other hand could mean telling what is not true with an intention. Lying could also be providing forceful thoughts to a person or a group of people. Therefore, utterable and lying will go hand in hand since if a person or people have different thinking against what is believed to be true it could have the same meaning as the lie. This is because believing against what is true or against a fact could a personal argument but he or she already knows the truth. If a person believes against what is true it is intentional since the person is aware of what is the truth. This goes hand in hand with lies since a liar already knows the truth but opts to give the wrong information. The decision to give a piece of forceful information is a personal judgment as well as deciding to believe against what is the fact. It is therefore seen that both lies and unutterable are what people decide to do but it is against facts of what is required. Although people have different believes personal judgments about things then contribute to either lies or unutterable. This, therefore, spells out that both lies and unutterable are the same things (Slater, pp.19-23). I agree with Lauren since she has disposed of what she is talking about right from the begging. This has made her book self-explanatory. There is no information in the book ‘lying’ that is contradicting or not understood since she has explained her methodology of writing and can be well seen. Right from the start, her theme is well spelled out as seen in the text she says that people thought that she was lying with a capital L but she was not. People thought she had tricked them but that was not true since she says that she only wanted people to understand well what she was talking about. As her form of writing of which everybody has a unique way of doing, people might have thought she tricked them. This is true since she says that she had spelled out her terms of the contract. I believe Lauren was an unreliable writer since she is saying in the text that right from the start, she had let people know so. Since she has said it herself that she was even worried because she had spelled out the words too clearly. This, therefore, makes me believe that Lauren told out the truth about being unreliable (Slater, pp.53-58). This is because all that she has told out in the text can be well seen in the whole book ‘lying’. One of the strategies is the text with one of the interviewers Ally’s Culhane. Here she says that right from the begging she did let the leaders know that she was unreliable. she says that she did spell out the terms of the contract very early to a point that she was even worried. Her worry then comes out to be any evidence that she was unreliable. How also people thought that she had tricked them could also be one of the ways to show her unreliability. In her book, she talks about the youths and the young woman. How she examines the thoughts of her youth was in a way a trick though she brings it out in the book. This indeed was a form of a trick since when examining her youths, they were not aware. Her unreliability here comes out through how she examines the minds of the youths but still talks about it clearly in the book (Slater, pp.60-63). It's therefore clear that here she used a trick to talk about the lie. From the text also she says that she wanted the people to understand her way of writing when the people said that she had tricked them. As a matter of truth, she had tricked people but argues that she wanted to make the people understand. She says that it was not her wish to trick people but she already had done that. This one, therefore, brings out her unreliability since she has done what she said was not her wish. What is the lesson learned about an unreliable writer as well as unreliable narrators? Through Lauren, a lot about the writers and narrators is brought out most especially from the text where she was being interviewed. Lauren has made it clear about unreliable writers that although it’s a writing technique the unreliable writers make sure that the readers understand that they should not always trust the writers. This is because they could be using tricks to keep the content of their message hidden and not easily understood. In any book, therefore, one should be smart enough since one could be dealing with any kind of a writer or narrator. Slater, Lauren. Lying: A metaphorical memoir. Random House, 2012.
FINEWEB-EDU
MDU Resources (MDU) to Expand Bakken Natural Gas Project MDU Resources Group, Inc.'sMDU subsidiary, WBI Energy, recently announced a plan to expand North Bakken Project. The plan includes the construction of nearly 67 miles of new pipeline from Bakken production areas in western North Dakota to an interconnection point with Northern Border Pipeline. Initially the expanded facility will provide 200 million cubic feet per day of natural gas transportation capacity. If required, the capacity can be extended to 375 million cubic feet per day, depending on customer demand. This expansion project will cost nearly $220 million. The construction of 20-inch diameter pipeline and two associated compressor facilities is expected to begin in early 2021 and will be completed in the later part of the year. The successful open season prompted WBI Energy to pursue the new expansion project. MDU Resources' Capex Plan MDU Resources announced long-term capital investment plan in the month of Nov 2018. The company expects to invest $2.6 billion through the 2019-2023 period, which is 13.7% higher from the previous five years plan of $2.3 billion for 2018-2022 period. MDU Resources will spend 56% of the planned investment in the Utility segment, 27.5% in construction materials and services segment as well as 16.5% in the pipeline and midstream segment. These investments will increase reliability of services and enable the company to serve increasing customer base effectively. The company expects customer base to expand annually by 1-2%. Natural Gas in the United States U.S. Energy Information Administration (EIA) expects record-high dry U.S. natural gas production to continue to grow through 2020, from an estimated 83.3 billion cubic feet per day (Bcf/d) in 2018 to 90.2 Bcf/d in 2019 and 92.2 Bcf/d in 2020. Total U.S. natural gas consumption will increase 1.3% year over year in 2019 and 1.1% in 2020 to a total of 83.5 billion cubic feet/day (Bcf/d). The environmental awareness has impacted coal-powered plants in the past few years. Utility companies are shifting their focus to low emission fuel, which is propelling the popularity of natural gas. We believe that this expansion project will enable MDU Resources to expand natural gas market and customer base. Price Movement Shares of MDU Resources have gained 5.1% in the past month compared with the industry 's rise of 6.2%. Zacks Rank and Key Picks MDU Resources has a Zacks Rank #2 (Buy). A few other top-ranked stocks from the same sector are Ameren Corporation AEE , FirstEnergy Corporation FE and IDACORP, Inc. IDA . Ameren and IDACORP sport a Zacks Rank #1(Strong Buy), FirstEnergy holds a Zacks Rank #2. You can see the complete list of today's Zacks #1 Rank stocks here . Long-term earnings growth of Ameren, FirstEnergy and IDACORP is pegged at 6.80%, 6.00% and 2.60%, respectively. The Zacks Consensus Estimate for 2019 earnings of Ameren, FirstEnergy and IDACORP have inched up 0.6%, 0.8% and 0.9% in the past 90 days, respectively. Wall Street's Next Amazon Zacks EVP Kevin Matras believes this familiar stock has only just begun its climb to become one of the greatest investments of all time. It's a once-in-a-generation opportunity to invest in pure genius. Click for details >> Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report IDACORP, Inc. (IDA): Free Stock Analysis Report FirstEnergy Corporation (FE): Free Stock Analysis Report Ameren Corporation (AEE): Get Free Report MDU Resources Group, Inc. (MDU): Get Free Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Create a Windows VM from a specialized disk Create a new VM by attaching a specialized managed disk as the OS disk using Powershell. A specialized disk is a copy of virtual hard disk (VHD) from an existing VM that maintains the user accounts, applications, and other state data from your original VM. When you use a specialized VHD to create a new VM, the new VM retains the computer name of the original VM. Other computer-specific information is also be kept and, in some cases, this duplicate information could cause issues. Be aware of what types of computer-specific information your applications rely on when copying a VM. You have two options: This topic shows you how to use managed disks. If you have a legacy deployment that requires using a storage account, see Create a VM from a specialized VHD in a storage account Before you begin If you use PowerShell, make sure that you have the latest version of the AzureRM.Compute PowerShell module. Install-Module AzureRM.Compute -RequiredVersion 2.6.0 For more information, see Azure PowerShell Versioning. Option 1: Upload a specialized VHD You can upload the VHD from a specialized VM created with an on-premises virtualization tool, like Hyper-V, or a VM exported from another cloud. Prepare the VM If you intend to use the VHD as-is to create a new VM, ensure the following steps are completed. • Prepare a Windows VHD to upload to Azure. Do not generalize the VM using Sysprep. • Remove any guest virtualization tools and agents that are installed on the VM (like VMware tools). • Ensure the VM is configured to pull its IP address and DNS settings via DHCP. This ensures that the server obtains an IP address within the VNet when it starts up. Get the storage account You need a storage account in Azure to store the uploaded VHD. You can either use an existing storage account or create a new one. To show the available storage accounts, type: Get-AzureRmStorageAccount If you want to use an existing storage account, proceed to the Upload the VHD section. If you need to create a storage account, follow these steps: 1. You need the name of the resource group where the storage account should be created. To find out all the resource groups that are in your subscription, type: Get-AzureRmResourceGroup To create a resource group named myResourceGroup in the West US region, type: New-AzureRmResourceGroup -Name myResourceGroup -Location "West US" 2. Create a storage account named mystorageaccount in this resource group by using the New-AzureRmStorageAccount cmdlet: New-AzureRmStorageAccount -ResourceGroupName myResourceGroup -Name mystorageaccount -Location "West US" ` -SkuName "Standard_LRS" -Kind "Storage" Upload the VHD to your storage account Use the Add-AzureRmVhd cmdlet to upload the VHD to a container in your storage account. This example uploads the file myVHD.vhd from "C:\Users\Public\Documents\Virtual hard disks\" to a storage account named mystorageaccount in the myResourceGroup resource group. The file is stored in the container named mycontainer and the new file name will be myUploadedVHD.vhd. $resourceGroupName = "myResourceGroup" $urlOfUploadedVhd = "https://mystorageaccount.blob.core.windows.net/mycontainer/myUploadedVHD.vhd" Add-AzureRmVhd -ResourceGroupName $resourceGroupName -Destination $urlOfUploadedVhd ` -LocalFilePath "C:\Users\Public\Documents\Virtual hard disks\myVHD.vhd" If successful, you get a response that looks similar to this: MD5 hash is being calculated for the file C:\Users\Public\Documents\Virtual hard disks\myVHD.vhd. MD5 hash calculation is completed. Elapsed time for the operation: 00:03:35 Creating new page blob of size 53687091712... Elapsed time for upload: 01:12:49 LocalFilePath DestinationUri ------------- -------------- C:\Users\Public\Doc... https://mystorageaccount.blob.core.windows.net/mycontainer/myUploadedVHD.vhd Depending on your network connection and the size of your VHD file, this command may take a while to complete Create a managed disk from the VHD Create a managed disk from the specialized VHD in your storage account using New-AzureRMDisk. This example uses myOSDisk1 for the disk name, puts the disk in StandardLRS storage, and uses https://storageaccount.blob.core.windows.net/vhdcontainer/osdisk.vhd as the URI for the source VHD. Create a new resource group for the new VM. $destinationResourceGroup = 'myDestinationResourceGroup' New-AzureRmResourceGroup -Location $location -Name $destinationResourceGroup Create the new OS disk from the uploaded VHD. $sourceUri = (https://storageaccount.blob.core.windows.net/vhdcontainer/osdisk.vhd) $osDiskName = 'myOsDisk' $osDisk = New-AzureRmDisk -DiskName $osDiskName -Disk ` (New-AzureRmDiskConfig -AccountType StandardLRS -Location $location -CreateOption Import ` -SourceUri $sourceUri) ` -ResourceGroupName $destinationResourceGroup Option 2: Copy an existing Azure VM You can create a copy of a VM that uses managed disks by taking a snapshot of the VM, then using that snapshot to create a new managed disk and a new VM. Take a snapshot of the OS disk You can take a snapshot of and entire VM (including all disks) or of just a single disk. The following steps show you how to take a snapshot of just the OS disk of your VM using the New-AzureRmSnapshot cmdlet. Set some parameters. $resourceGroupName = 'myResourceGroup' $vmName = 'myVM' $location = 'westus' $snapshotName = 'mySnapshot' Get the VM object. $vm = Get-AzureRmVM -Name $vmName -ResourceGroupName $resourceGroupName Get the OS disk name. $disk = Get-AzureRmDisk -ResourceGroupName $resourceGroupName -DiskName $vm.StorageProfile.OsDisk.Name Create the snapshot configuration. $snapshotConfig = New-AzureRmSnapshotConfig -SourceUri $disk.Id -OsType Windows -CreateOption Copy -Location $location Take the snapshot. $snapShot = New-AzureRmSnapshot -Snapshot $snapshotConfig -SnapshotName $snapshotName -ResourceGroupName $resourceGroupName If you plan to use the snapshot to create a VM that needs to be high performing, use the parameter -AccountType Premium_LRS with the New-AzureRmSnapshot command. The parameter creates the snapshot so that it's stored as a Premium Managed Disk. Premium Managed Disks are more expensive than Standard. So be sure you really need Premium before using the parameter. Create a new disk from the snapshot Create a managed disk from the snapshot using New-AzureRMDisk. This example uses myOSDisk for the disk name. Create a new resource group for the new VM. $destinationResourceGroup = 'myDestinationResourceGroup' New-AzureRmResourceGroup -Location $location -Name $destinationResourceGroup Set the OS disk name. $osDiskName = 'myOsDisk' Create the managed disk. $osDisk = New-AzureRmDisk -DiskName $osDiskName -Disk ` (New-AzureRmDiskConfig -Location $location -CreateOption Copy ` -SourceResourceId $snapshot.Id) ` -ResourceGroupName $destinationResourceGroup Create the new VM Create networking and other VM resources to be used by the new VM. Create the subNet and vNet Create the vNet and subNet of the virtual network. Create the subNet. This example creates a subnet named mySubNet, in the resource group myDestinationResourceGroup, and sets the subnet address prefix to 10.0.0.0/24. $subnetName = 'mySubNet' $singleSubnet = New-AzureRmVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.0.0/24 Create the vNet. This example sets the virtual network name to be myVnetName, the location to West US, and the address prefix for the virtual network to 10.0.0.0/16. $vnetName = "myVnetName" $vnet = New-AzureRmVirtualNetwork -Name $vnetName -ResourceGroupName $destinationResourceGroup -Location $location ` -AddressPrefix 10.0.0.0/16 -Subnet $singleSubnet Create the network security group and an RDP rule To be able to log in to your VM using RDP, you need to have a security rule that allows RDP access on port 3389. Because the VHD for the new VM was created from an existing specialized VM, you can use an account from the source virtual machine for RDP. This example sets the NSG name to myNsg and the RDP rule name to myRdpRule. $nsgName = "myNsg" $rdpRule = New-AzureRmNetworkSecurityRuleConfig -Name myRdpRule -Description "Allow RDP" ` -Access Allow -Protocol Tcp -Direction Inbound -Priority 110 ` -SourceAddressPrefix Internet -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 3389 $nsg = New-AzureRmNetworkSecurityGroup -ResourceGroupName $destinationResourceGroup -Location $location ` -Name $nsgName -SecurityRules $rdpRule For more information about endpoints and NSG rules, see Opening ports to a VM in Azure using PowerShell. Create a public IP address and NIC To enable communication with the virtual machine in the virtual network, you need a public IP address and a network interface. Create the public IP. In this example, the public IP address name is set to myIP. $ipName = "myIP" $pip = New-AzureRmPublicIpAddress -Name $ipName -ResourceGroupName $destinationResourceGroup -Location $location ` -AllocationMethod Dynamic Create the NIC. In this example, the NIC name is set to myNicName. $nicName = "myNicName" $nic = New-AzureRmNetworkInterface -Name $nicName -ResourceGroupName $destinationResourceGroup ` -Location $location -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id Set the VM name and size This example sets the VM name to myVM and the VM size to Standard_A2. $vmName = "myVM" $vmConfig = New-AzureRmVMConfig -VMName $vmName -VMSize "Standard_A2" Add the NIC $vm = Add-AzureRmVMNetworkInterface -VM $vmConfig -Id $nic.Id Add the OS disk Add the OS disk to the configuration using Set-AzureRmVMOSDisk. This example sets the size of the disk to 128 GB and attaches the managed disk as a Windows OS disk. $vm = Set-AzureRmVMOSDisk -VM $vm -ManagedDiskId $osDisk.Id -StorageAccountType StandardLRS ` -DiskSizeInGB 128 -CreateOption Attach -Windows Complete the VM Create the VM using New-AzureRMVMthe configurations that we just created. New-AzureRmVM -ResourceGroupName $destinationResourceGroup -Location $location -VM $vm If this command was successful, you'll see output like this: RequestId IsSuccessStatusCode StatusCode ReasonPhrase --------- ------------------- ---------- ------------ True OK OK Verify that the VM was created You should see the newly created VM either in the Azure portal, under Browse > Virtual machines, or by using the following PowerShell commands: $vmList = Get-AzureRmVM -ResourceGroupName $destinationResourceGroup $vmList.Name Next steps To sign in to your new virtual machine, browse to the VM in the portal, click Connect, and open the Remote Desktop RDP file. Use the account credentials of your original virtual machine to sign in to your new virtual machine. For more information, see How to connect and log on to an Azure virtual machine running Windows.
ESSENTIALAI-STEM
ypatus Etymology The first part is an affix of obscure origin, perhaps a denasalization of. The second part is from the same root underlying,. Adjective * 1) special, notable * 2) particular, separate
WIKI
Kep'el, California Kepel is a census-designated place and an unincorporated community within the Yurok reservation in Humboldt County, California, United States. Kep'el is in the northwestern part of the state.
WIKI
Should I Get Implants or Bridges? Should I Get Implants or Bridges?Thanks to the advances in dental medicine made in the last 30 years, patients with missing teeth now have several great options available. Dental bridges were the established method of replacing missing teeth until the technology for dental implants became widespread. The popularity of dental implants has risen steadily  in recent years. But maybe you don’t really understand the difference between a dental bridge vs. implant? And which treatment option is the right one for you? Most dentists including Dr. Mark Sowell of Sensational Smiles in Plano TX prefer implants due to their strength, longevity and ease of care. However, many things need to be considered when making this choice, including if your tooth loss is recent or happened years ago. Practical Reasons for Both In the past, a dental bridge was the only choice available to individuals with missing teeth. However, a bridge involves more than just the missing tooth. The adjacent teeth on either side of the gap will need to be prepared to support the bridge. This is done by removing most of the enamel in order to attach crowns over them that will support the bridge. With dental implants, Dr. Sowell embeds the implant post that holds the false tooth directly into the jawbone resulting in a tooth that is stronger and permanent. Nonetheless, a dental bridge may be your best option if the neighboring teeth have large or numerous fillings and may need crowns or caps in the future. If the tooth or teeth were lost a long time ago, the gum and bone tissue will have receded and procedures beyond the implant- such as bone grafts- may be needed before placement. The advantages and disadvantages to both procedures can ultimately be discussed with Dr. Sowell. Your Oral Care Routine Oral hygiene is definitely easier with an implant than a bridge. Dental bridges involve at least three crowns connected together to fill the space of the missing tooth. You cannot floss between them.  Nor can you remove them. This design creates difficulties when brushing and flossing, so it is important to be thorough when cleaning around them. Flossing, in particular, will create a challenge, requiring the additional step of threading the floss under the false tooth to prevent gum disease from setting in. In comparison, implants replace teeth individually without affecting other teeth. Therefore, you can brush and floss around an implant as you would your natural teeth, making oral care much easier and more effective than with bridges. Durability Dental implants are more durable than bridges, making them a tooth replacement solution that can last a lifetime. The metal cylinder or post that is embedded into the jawbone to support the abutment and crown is usually constructed of titanium or zirconia and this material fuses with your jawbone naturally, preventing future bone loss that can occur if there is not a tooth or implant in place. Because the implant is made of such strong material, they are mostly resistant to decay. If a dental implant is properly cared for, the implant portion can last a lifetime with only the crown (the false tooth mounted on top) requiring replacement every 15-20 years due to normal wear and tear. However, crowns can last longer if used with are and properly maintained. On the other hand, dental bridges last approximately 10 years on average before the entire bridge will need to be replaced. Also, because the remaining tooth structures beneath the crowns continue to be susceptible to decay and gum disease, bridges may fail earlier if not cared for properly. Cost Comparison While dental bridges cost less initially, their need for regular replacement in the future means you may spend more over time. With implants there is greater expense up front but you may save money over time. Fortunately, most dental insurance providers now pay for all or part of the implant process. The timetable for completing an implant is also generally more flexible, allowing patients to pay the cost in increments. For example, as sometimes a bone graft is needed to reinforce the jawbone to support an implant, the healing time will give the patient time to save more before an implant can be done. Dental Implants in Plano, TX Both options are preferable to being embarrassed of your smile or having difficulty chewing due to missing teeth. Although bridges are still a reliable and common procedure, dental implants have become more common in recent years, and in most cases are the preferred method of treatment for missing teeth due to their durability and the simplicity of their care. If you are considering dental implants, you need to choose the best implant dentist in your area. Dr. Mark Sowell of Sensational Smiles in Plano TX is a skilled professional with over 25 years in practice. For a consultation with Dr. Mark Sowell about dental implants or any other dental concern, please call (972) 382-6855 or schedule a complimentary consultation online today!
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/David Bradish The result was delete. Article's subject is found to lack the requisite notability for inclusion. &mdash; Coffee // have a cup // beans // 03:06, 7 February 2017 (UTC) David Bradish * – ( View AfD View log Stats ) Moving to AfD after the article creator attempted to remove the PROD tag. Concerns were raised at WP:BLPN that the page was a largely promotional orphaned article that had been around for over a year without improvement and no indication that it might meet our inclusion standards. Upon reviewing the article and the artists discography, I do not think he passes WP:MUSICBIO or WP:GNG. He is credited on albums from major labels, but always as a part of a group and never independently. There is no independent media coverage of him to satisfy GNG and combined with the article's promotional tone, it should be deleted. TonyBallioni (talk) 17:41, 28 January 2017 (UTC) * Note: This debate has been included in the list of Bands and musicians-related deletion discussions. Shawn in Montreal (talk) 18:28, 28 January 2017 (UTC) * Delete massive - I followed WP:BEFORE and found nothing to support this biography. There are no independent reporting sources, in violation of WP:PRIMARY - it's a vanity promotional article. Govindaharihari (talk) 19:04, 28 January 2017 (UTC) * There is something to be said for the fact that the WP:MUSICBIO requirements favor musicians living in communities that receive a large amount of media coverage and are accessed by commercial music institutions. Cuba, where David Bradish has spent much of his career, is not such a place, and even its clearly genuine leading musicians receive little authenticated coverage. For example, the David Bradish page refers to Pucho Lopez. A google search of Pucho Lopez returns this hit in Spanish: https://www.cibercuba.com/noticias/2012/09/15/muere-pucho-lopez-uno-de-los-arreglistas-mas-famosos-de-cuba, indicated that Mr. Lopez is real and quite well known. Yet he has no Wikipedia page. If there were a Pucho Lopez page, it would potentially link to a David Bradish page, making that page no longer an orphan. I agree that the vast majority of this page does not satisfy GNG, however I would encourage the creator to attempt to modify it and edit down the content in a way that might meet those standards. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:01, 28 January 2017 (UTC) * Delete - the problem is not that it's an orphan, but that the subject doesn't meet notability guidelines, despite what appears to be a long and varied career. I'm sure there's some place for this type of biography, but I don't think it's here. The is certainly an argument that Pucho López might be notable enough for an article, but that's not really the issue here. Shritwod (talk) 20:09, 28 January 2017 (UTC) * Maybe it would be best if the creator made pages for the bands Fred's Laundry and Sad Motion and artists who had played with David Bradish, such as Pucho Lopez, which would meet notability guidelines, and David Bradish could be mentioned in those articles. This might be the most appropriate way to publish this content on wikipedia. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:01, 28 January 2017 (UTC) * David has been the subject of multiple, non-trivial, published works appearing in sources that are reliable, not self-published: Aftonbladet is a Swedish tabloid published in Stockholm, Sweden. It is one of the larger daily newspapers in the Nordic countries.Expressen is one of two nationwide evening tabloid newspapers in Sweden, the other being Aftonbladet. Both on Wikipedia. Both newspapers have mentioned David separately many times on different occasions as David Bradish himself or as Mr Bradish when he worked as an independent artist - musician and also several mentions as a member of a band (main leader / singer of a band / bands). Articles don't report performance dates, release information or track listings. All of them underline David's achievements and engagement into social actions and projects (together with the Red Cross, national radio, public schools in Sweden and more). Some of the archives show private and officially signed letters e.g. from editors-in-chief or presidents of mentioned above newspapers and institutions / organizations. There is also a mention about David who was called publicly as the first King of Karaoke in a history of Sweden, when the country hadn't known yet what Karaoke is, back to 80s and 90s. If that's too little we can start gathering more press and media archives when David comes back from Cuba. * He was invited there another year in a row as a representative from Sweden to take part in the biggest and well known Havana Jazz Festival. I truly recommend to read a part concerning his engagement in Cuba. * I also disagree with the suggestion that the article has a promotional tone. If so, we can delete all links to all his personal platforms. Wikipedia article on David is nothing more than a life story told by a man who remembers 50s and the change of the world. He witnessed all social, political and economical changes through all these years. His struggle with American and Swedish system concerning private life and music. It is not a self promotion nor product placement and for sure not a paid material. I decided to write about David after seeing him on a stage and listen to many stories told by his friends, band members and so on. I am a journalist and writer and it is easy to check me up on Linkedin without any problem - you are more than welcome. * I disagree with the mark that "He is credited on albums from major labels, but always as a part of a group and never independently". * David released 3 albums on a major record labels (CBS, Sir Lancelot) both as a single artist under the name Mr. Bradish (there is a story on this in the article) and together with bands he established or was invited to perform with. * Has became one of the most prominent representatives of a notable style or the most prominent of the local scene of a city. As the only musician in Sweden he brought closer Karaoke to the swedish audience. He released first ever rap single. Sweden was too rural for rap music back to 70s and 80s. ”The Bureaucratic Boogie" was released in 1984 and was the Swedish first ever rap single. Mentioned by Aftonbladet press. He made a huge impact on rising awareness among Swedish students and society, while teaming up with the Red Cross, Save the children, Swedish Tv stations (Youtube still keeps this video) and Swedish radio, creating two huge projects - Dancers Who care and People Who Care - as a response to the Catastrophe in Ethiopia. * Has been a featured subject of a substantial broadcast segment across a national radio in Sweden and Sky Channel in London (long before MTV had appeared). * On his website you can find all voice overs he did for big companies such as Carlsberg, MTV, Panasonic and more. Recordings these companies have sent are uploaded to his website. That's why I made this website as a main source of information. * I would like to receive clear and simple answers what I should submit to keep this article. If you still think that it has promotional tone, please show me which parts and we can calm the tone a bit if needed. Please take a note that this musician is 72 and some evidence such as private contracts with Labels etc. might be provided after his death. * As I mentioned earlier, everything requires time. Especially when the artist is alive, still active and hard to reach due to his age and travels. I started creating this article, linking up names believing that someone will start continuing my work. Some names I bolded out in red to encourage others to extend it and create other profiles of great artists that worked their fingers off through their whole lives without being addicted to flash lights and cameras. Real, talented artist not those puppets created by agencies. Agata Mayer (talk) 20:40, 28 January 2017 (UTC)Agata Mayer * Delete as fails to meet WP:GNG. The references, though plentiful, are all self-published. This is a vanity article. Lincolnite (talk) 23:16, 6 February 2017 (UTC)
WIKI
Boucicaut Boucicaut may refer to: Persons * Jean I Le Maingre ( -1367), called "Boucicaut", Marshal of France * Jean II Le Maingre (1366-1421), son of Jean I, also called "Boucicaut", Marshal of France * Geoffrey Boucicaut, son of Jean I, governor of the Dauphiné from 1399 to 1407 * Boucicaut Master, an anonymous French or Flemish miniaturist and illuminator * Aristide Boucicaut, creator of the French department store Le Bon Marché * Alexandre Boucicaut, a Haitian football (soccer) player Other uses * Hôpital Boucicaut, a hospital in Paris * Boucicaut (Paris Métro), a station on line 8 of the Paris Métro
WIKI
How to work with extension methods in C# Extension methods enable you to extend the functionality of existing types sans the need of modifying the existing types or creating sub types from them extensionmethods The C# programming language provides support for extension methods from C# 3.0. An extension method is one that is used to extend the functionality of existing types by adding methods sans the need of creating new derived types. You don't need to create subclasses of existing classes or recompile or modify your existing classes to work with extension methods. Extension methods improve the readability of your code while at the same time allowing you to extend functionality of existing types. The common extension methods in .Net include the LINQ standard query operators that adds additional query capabilities to the System.Collections.IEnumerable and System.Collections.Generic.IEnumerable<T> types. Note that you can take advantage of extension methods to extend a class or an interface but you cannot override their methods. The MSDN states: "Extension methods enable you to "add" methods to existing types without creating a new derived type, recompiling, or otherwise modifying the original type. Extension methods are a special kind of static method, but they are called as if they were instance methods on the extended type." Essentially, an extension method is a special type of a static method and enable you to add functionality to an existing type even if you don't have access to the source code of the type. An extension method is just like another static method but has the “this” reference as its first parameter. You can add as many extension methods as you want to any type. Most importantly, you can also add extension methods to even a value type. When working with extension methods, keep these points in mind: • An extension method must be a static method • An extension method must be inside a static class -- the class can have any name • The parameter in an extension method should always have the "this" keyword preceding the type on which the method needs to be called Note that it you define an extension method on a type that has the same signature as any other method of the type that you are extending, the extension method will never be called. Programming extension methods in C# In this section we will explore how to program extension methods using C#. The following code listing illustrates how an extension method looks like. public static class StringExtensions     {         public static bool IsNumeric(this string str)         {             double output;             return double.TryParse(str, out output);         }     } Note the first parameter to the extension method. As already discussed, any extension method should be static and should have "this" keyword preceding the parameter you want the method to be called on. When you specify the "this" keyword in the parameter list the way it has been shown in the above example, you inform the compiler that an extension method has been defined for the string class. Here's how you can use the extension method IsNumeric on a string instance. static void Main(string[] args)         {             string str = "100";             if (str.IsNumeric())                 Console.WriteLine("The string object named str contains numeric value.");             Console.Read();         } When you execute the above program, the message ("The string object named str contains numeric value." Is displayed in the console window. You can use extension methods to inject new functionality via methods to a type sans the need of modifying, deriving or recompiling the original type. As I mentioned earlier, extension methods can also be applied to value types. Let's see how this can be achieved with an example. The following class named IntegerExtensions contains an extension method named IsEven that returns true if the integer on which it is called is even, false otherwise. public static class IntegerExtensions     {         public static bool IsEven(this int i)         {             return ((i % 2) == 0);         }     } And, here's how you can use the extension method IsEven on an integer. int n = 2; if(n.IsEven())  Console.WriteLine("The value of the integer is even."); Copyright © 2016 IDG Communications, Inc. How to choose a low-code development platform
ESSENTIALAI-STEM
Use the least commands as possible January, 4, 2021 by This is the number one thing I try to teach new controllers. Since we service the pilots it’s our job to make it as easy as is possible on them. Every message is added work, each one should be considered to be necessary. Limit your heading changes. Reduce the amount of altitude changes. Work on being correct the first time when sending commands. If you make a mistake, make sure you’re correct the second time. If there’s no conflict to avoid, don’t intervene. Don’t create work for yourself. Sending a ton of commands, making yourself busy when it’s not that busy is not always helpful. Try to send the least amount of commands as you can without sacrificing the necessary quality. It will lighten the pilot’s workload and your workload. Kyle Boas is the Founder of the IFATC Education Group. He is an IFATC Supervisor and Infinite Flight Appeals team member. — More
ESSENTIALAI-STEM
Tushiyah United Hebrew School – Scott Memorial Methodist Episcopal Church The Tushiyah United Hebrew School, later known as the Scott Memorial Methodist Episcopal Church, is an educational building located at 609 East Kirby Street in Detroit, Michigan. This building, an important work of architect Isadore M. Lewis, was constructed as the Tushiyah United Hebrew School and served as the headquarters of the United Hebrew Schools of Detroit. It later served as the Scott Memorial Methodist Episcopal Church, the first mainline African-American Methodist Episcopal church in Detroit. It was listed on the National Register of Historic Places in 2011. The building now houses the Kirby Center Lofts. Tushiyah United Hebrew School In the early 1920s, the number of people of Detroit increased dramatically, and with it, the city's Jewish population also grew. The new wave of Jewish arrivals, particularly those emigrating from Eastern Europe, spread north along what was then the Hastings Street corridor (the current location of I-75). Between 1919 and 1924, the new population built a series of Talmud Torah schools, which emphasized community-based education. The locations of these schools spread northward along Hastings Street, following the Jewish population. The Tushiyah United Hebrew School, built in 1922 on Kirby and St. Antoine, was one of these schools. Also known as the Kirby Center, it was constructed as the headquarters of the United Hebrew Schools. The building contained classrooms for 1500 students and an auditorium for 2000 people. It served not only as a school for children, but also hosted adult education classes and community group functions. The school was designed by Isadore M. Lewis, a Jewish architect who designed a wide array of commercial, industrial, and residential buildings, primarily for Jewish clients. Lewis was born in Appleton, Wisconsin in 1888, and in 1916 moved to Detroit to open his own architectural firm. He practiced in Detroit until at least 1960, and died in 1968. As the 1920s wound down, the Jewish population began shifting northward and westward away from the Tushiyah United Hebrew School, building homes and schools in the Dexter-Davidson neighborhood. New African-American residents began moving into the Hastings Street neighborhood as the earlier Jewish residents moved out. The shift in population, combined with the decline in popularity of the Talmud Torah schools, lead to the closure of the Tushiyah United Hebrew School in 1929. Scott Memorial Methodist Episcopal Church In 1929, after the closure of the school, the building was sold to the Scott Memorial Methodist Episcopal Church. The Scott Memorial ME church was founded in 1909; it was the first African-American Methodist Episcopal congregation in the city. The congregation started small, meeting in homes and storefronts and sharing a pastor with a congregation in Toledo, Ohio. In 1914, the church constructed its first building. The congregation continued to grow, and by 1924, Scott was planning on the construction of a second building. The church instead purchased the Tushiyah United Hebrew School in 1929, presumably because the cost, $92,500, was less than that for a new building. The congregation worked hard to retire the mortgage, and by 1943, the building was paid off. This freed funding for building improvements, and the congregation put in new pews and a new roof in 1943, and remodeled part of the first floor into a youth center in 1948. Scott Memorial was instrumental in the eventual unification of the white and African-American Methodist Episcopal churches. In 1957, Scott Memorial co-hosted an inter-racial leadership conference with the white Detroit Metropolitan Methodist Church, featuring an address by Thurgood Marshall, then an attorney for the NAACP. However, the Scott Memorial ME church continued to grow, with over 2000 members in the mid-1960s. In 1968, the congregation began once more to look for a larger building. In 1970, the predominantly white Grace United Methodist Church merged with another congregation and offered their building, located on West Boston, to Scott Memorial for $1.00. Scott Memorial accepted the offer, and moved from the Kirby building. In 1984, Scott Memorial sold the Kirby building to the Wild Life Field and Stream Club. In 1997, the building was sold again to the Most Worshipful Unity Grand Lodge of Michigan, Ancient and Accepted Masons. This organization owned the building as of 2011, but planned to sell it to a developer for conversion into apartments. The building was sold, and conversion into loft space was underway by 2015. Renovation was completed in 2016, and as of 2018, the building housed 3 two-bedroom, 21 one-bedroom and 2 studio apartments. Description The Tushiyah United Hebrew School – Scott Memorial Methodist Episcopal Church is a two-story commercial-style building with a concrete foundation, masonry walls, and steel framing. The building is clad with tan brick, and features decorative brickwork with cast stone trim, medallions, and reliefs. The original building was constructed in an L-shape, 102 feet by 134 feet. An arched roof, obscured by the parapet walls, covers the main section while the east-west section of the building has a flat roof. A single-story addition of concrete block and brick was built in 1950 across the rear, making a C-shape. The front facade, facing Kirby Street, has five bays. The center bay has four piers with limestone bands and an urn at the top. Each floor has a pair of one-over-one double-hung windows with transoms. The bay to the left of the center contains the entrance, with two aluminum and glass doors. Two one-over-one double-hung windows with transoms hang on the second floor, surmounted by a weathered plaque reading "Tushiyah United Hebrew Schools of Detroit." The parapet wall has a brick relief in the center. The bay to the right of the center is identical to the entrance bay, but with two one-over-one double-hung windows with transoms on the first floor in place of the entrance doors. The two end bays have two pairs of one-over-one double-hung windows with transoms on each floor. A classical metal cornice once ran the width of the facade, but has been removed. The side facade facing St. Antoine also has five bays: a wide center bay with five pairs of one-over-one double-hung windows with transoms, two flanking bays with three pairs of one-over-one double-hung windows with transoms, and two end bays with two pairs of one-over-one double-hung windows with transoms. Brick piers with limestone banding separate the windows. The elevations that do not face the street are red brick with limestone sills, pierced by similar one-over-one double-hung windows. Inside the building, the main entrance has a white tile floor containing green tiles spelling, "Kirby Center" and green-and-yellow tile wainscoting. The interior hallways have terrazzo floors, plaster walls, and acoustic ceiling tile. Classrooms open onto the hall through wood-and-glass doors with transoms; many rooms retain the original wood floors, wood trim, and plaster walls. A dining hall on the first floor is not original. An auditorium and associated coat room, bar area, and restrooms are on the second floor.
WIKI
Page:An Exposition of the Old and New Testament (1828) vol 3.djvu/63 Rh which leaves no room for such a complaint as this. (3.) That the terrors of God, which set themselves in array against him,, put him into such confusion, that he knew not how to address himself to God with the confidence with which he was formerly wont to approach him; (v. 34, 35.) "Beside the distance which I am kept at by his infinite transcendency, his present dealings with me are very discouraging. Let him take his rod away from me:" he means not so much his outward afflictions, as the load which lay upon his spirit from the apprehensions of God's wrath; that was his fear which terrified him: "Let that be removed, let me recover the sight of his mercy, and not be amazed with the sight of nothing but his terrors, and then I would speak, and order my cause before him. But it is not so with me, the cloud does not at all scatter, the wrath of God still fastens upon me, and preys on my spirits, as much as ever; and what to do I know not." From all this let us take occasion, [1.] To stand in awe of God, and to fear the power pf his wrath. If good men have been put into such consternation by it, where shall the ungodly and the sinner appear? [2.] To pity those that are wounded in spirit, and pray earnestly for them, because in that condition they know not how to pray for themselves. [3.] Carefully to keep up good thoughts of God in our minds, for hard thoughts of him are the inlets of much mischief. [4.] To bless God that we are not in such a disconsolate condition as poor Job was here in, but that we walk in the light of the Lord; let us rejoice therein, but rejoice with trembling. CHAP. X. Job owns here that he was full of confusion; (v. 15.) and as he was, so was his discourse: he knew not what to say, and perhaps sometimes scarcely knew what he said. In this chapter, I. He complains of the hardships he was under; (v. 1..7.) and then comforts himself with this, that he was in the hand of the God that made him, and pleads that, v. 8..13. II. He complains again of the severity of God's dealings with him, (v. 14..17.) and then comforts himself with this, that death would put an end to his troubles, v. 18..22. Y soul is weary of my life: I will leave my complaint upon myself; I will speak in the bitterness of my soul. 2. I will say unto God, Do not condemn me; show me wherefore thou contendest with me. 3. Is it good unto thee that thou shouldest oppress, that thou shouldest despise the work of thy hands, and shine upon the counsel of the wicked? 4. Hast thou eyes of flesh? or seest thou as man seeth? 5. Are thy days as the days of man? are thy years as man's days? 6. That thou inquirest after mine iniquity, and searchest after my sin? 7. Thou knowest that I am not wicked; and there is none that can deliver out of thy hand. Here is, I. A passionate resolution to persist in his complaint, v. 1. Being daunted with the dread of God's majesty, so that he could not plead his cause with him, he resolves to give himself some ease by giving vent to his resentments. He begins with vehement language, "My soul is weary of my life, weary of this body, and impatient to get clear of it, fallen out with life, and displeased at it, sick of it, and longing for death." Through the weakness of grace, he went contrary to the dictates even of nature itself. We should act more like men, did we act more like saints; faith and patience would keep us from being weary of our lives, (and cruel to them, as some read it,) even then when Providence has made them most wearisome to us; for that is to be weary of God's correction. Job, being weary of his life, and having ease no other way, resolves to complain, resolves to speak: he will not give vent to his soul by violent hands, but he will give vent to the bitterness of his soul by violent words. Losers think they may have leave to speak; and unbridled passions, as well as unbridled appetites, are apt to think it an excuse for their excursions, that they cannot help it; but what have we wisdom and grace for, but to keep the mouth as with a bridle? Job's corruption speaks here, yet grace puts in a word: 1. He will complain, but he will leave his complaint upon himself: he would not impeach God, nor charge him with unrighteousness or unkindness; but, though he knew not particularly the ground of God's controversy with him, and the cause of action, yet, in the general, he would suppose it to be in himself, and willingly bear all the blame. 2. He will speak, but it shall be the bitterness of his soul that he will express, not his settled judgment. If I speak amiss, it is not I, but sin that dwells in me, not my soul, but its bitterness. II. A humble petition to God. He will speak, but the first word shall be a prayer, and, as I am willing to understand it, it is a good prayer, v. 2. 1. That he might be delivered from the sting of his afflictions, which is sin; "Do not condemn me, do not separate me for ever from thee. Though I lie under the cross, let me not lie under the curse; though I smart by the rod of a Father, let me not be cut off by the sword of a Judge. Thou dost correct me, I will bear that as well as I can, but O do not condemn me!" It is the comfort of those who are in Christ Jesus, that, though they are in affliction, there is no condemnation to them, Rom. viii. 1. Nay, they are chastened of the Lord, that they may not be condemned with the world, 1 Cor. xi. 32. This, therefore, we should deprecate above any thing else, when we are in affliction; "However thou art pleased to deal with me, Lord, do not condemn me; my friends condemn me, but do not thou." 2. That he might be made acquainted with the true cause of his afflictions, and that is sin too; Lord, show me wherefore thou contendest with me. When God afflicts us, he contends with us; when he contends with us, there is always a reason. He is never angry without a cause, though we are, and it is desirable to know what the reason is, that we may repent of, mortify, and forsake, the sin for which God has a controversy with us: in inquiring it out, let conscience have leave to do its office, and to deal faithfully with us, as Gen. xiii. 21. III. A peevish expostulation with God concerning his dealings with him. Now he speaks in the bitterness of his soul indeed, not without some ill-natured reflections upon the righteousness of his God. 1. He thinks it unbecoming the goodness of God, and the mercifulness of his nature, to deal so hardly with his creature, as to lay upon him more than he can bear; (v. 3.) Is it good unto thee that thou shouldest oppress? No, certainly it is not; what he approves not in men, (Lam. iii. 34··36.) he will not do himself. "Lord, in dealing with me, thou seemest to oppress thy subject, to despise thy workmanship, and to countenance thine enemies. Now, Lord, what is the meaning of this? Such is thy nature, that this cannot be a pleasure to thee; and such is thy name, that it cannot be an honour to thee; why then dealest thou thus with me? What profit is there in my blood?" Far be it from Job to
WIKI
User:Dinumali Dinesh Mali is a son of Mr. P. Z. Mali how is working as Section Engineer in Central Railway Chalisgaon.
WIKI
Keto Diet - Food for Thought The Keto Diet (ketogenic diet) is considered by many to be a sure-fire way to increase weight loss by cutting/eliminating carbohydrates from the diet while focusing primarily on healthy fats and protein.    A no-carbohydrate or low-carbohydrate diet (no/low-carb diet) excludes for the most part, the dietary consumption of carbohydrates, and suggests fat as the main source of energy along with sufficient protein. A no/low-carbohydrate diet of this type causes the body to go into a state of ketosis, converting dietary fat and body fat into ketone bodies which are used to fuel parts of the body that do not oxidise fat for energy, especially the brain.    However, some bodily organs and parts of the brain still require glucose, which is tightly regulated by the liver and adequately supplied by converting glycerol from the breakdown of triglycerides. A no/low-carb diet tends to use mainly animal sourced foods (although it is possible to adapt a primarily plant based diet, or fully plant based diet, for vegetarians and vegans alike).     The ketogenic diet became popular as a therapy for epilepsy in the 1920s and '30s. It was developed to provide an alternative to non-mainstream fasting, which had demonstrated success as an epilepsy therapy. However, the diet was eventually largely abandoned due to the introduction of new anticonvulsant therapies.    In the 1970s, elements of the ketogenic diet (keto diet) were brought to the attention of the masses as The Atkins Diet, also known as the Atkins Nutritional Approach. It was, promoted by Robert Atkins, inspired by a research paper he read in The Journal of the American Medical Association. The paper entitled "Weight Reduction" was published by Alfred W. Pennington in 1958. In recent years, the diet has gone under a number of updates and modifications and is currently known as The New Atkins for a New You.    It has been noted that a common objection to Ketogenic diets is that people feel like they won't be able to exercise without carbohydrates. This may be true at first as one's body is switching from being a sugar burner to a fat burner, but this only usually lasts for about  weeks. People often get the concepts of the Keto Diet mixed up with a condition called ketoacidosis which only really happens with people who have type 1 diabetes. However, Keto Diets work for the most part by lowering insulin levels to a normal level, and this in turn increases fat burning, and suppresses the appetite.    Below is a list of the most common low-carb foods recommended for the ketogenic diet.   • beef, lamb, goat, venison, fish & seafood, pork and poultry, eggs, gelatin, ghee, butter - these are high in healthy omega 3 fatty acids  • offal such as liver, heart, kidneys and other organ meats • saturated fats sch as lard, tallow, chicken fat, duck fat, goose fat, clarified butter / ghee, butter, coconut oil • mono-unsaturated fats derived from avocado, macadamia and olive oil • polyunsaturated omega 3s, especially from fatty fish and seafood • leafy greens such as Swiss chard, bok choy, spinach, lettuce, chard, chives, endive • cruciferous vegetables such as dark leaf kale, kohlrabi, radishes • celery stalk, asparagus, cucumber, courgettes, butternut squash.
ESSENTIALAI-STEM
Japanese Church of Christ Japanese Church of Christ is a historic church at 268 W. 100 South in Salt Lake City, Utah. The Gothic Revival church building was constructed in 1924 and added to the National Register of Historic Places in 1982. From 1953 to 1967, the church housed two separate branches for Issei and Nisei. As of 2012 the congregation is affiliated with the Presbyterian Church (U.S.A.).
WIKI
Tom Tom - 1 year ago 76 PHP Question MySQL / PHP: Find similar / related items by tag / taxonomy I have a cities table which looks like this. |id| Name | |1 | Paris | |2 | London | |3 | New York| I have a tags table which looks like this. |id| tag | |1 | Europe | |2 | North America | |3 | River | and a cities_tags table: |id| city_id | tag_id | |1 | 1 | 1 | |2 | 1 | 3 | |3 | 2 | 1 | |4 | 2 | 3 | |5 | 3 | 2 | |6 | 3 | 3 | How do I calculate which are the most closely related city? For example. If I were looking at city 1 (Paris), the results should be: London (2), New York (3) I have found the Jaccard index but I'm unsure as how best to implement this. Answer Source You question about How do I calculate which are the most closely related city? For example. If I were looking at city 1 (Paris), the results should be: London (2), New York (3) and based on your provided data set there is only one thing to relate that is the common tags between the cities so the cities which shares the common tags would be the closest one below is the subquery which finds the cities (other than which is provided to find its closest cities) that shares the common tags SELECT * FROM `cities` WHERE id IN ( SELECT city_id FROM `cities_tags` WHERE tag_id IN ( SELECT tag_id FROM `cities_tags` WHERE city_id=1) AND city_id !=1 ) Working I assume you will input one of the city id or name to find their closest one in my case "Paris" has the id one SELECT tag_id FROM `cities_tags` WHERE city_id=1 It will find all the tags id which paris has then SELECT city_id FROM `cities_tags` WHERE tag_id IN ( SELECT tag_id FROM `cities_tags` WHERE city_id=1) AND city_id !=1 ) It will fetch all the cities except paris that has the some same tags that paris also has Here is your Fiddle While reading about the Jaccard similarity/index found some stuff to understand about the what actualy the terms is lets take this example we have two sets A & B Set A={A, B, C, D, E} Set B={I, H, G, F, E, D} Formula to calculate the jaccard similarity is JS=(A intersect B)/(A union B) A intersect B = {D,E}= 2 A union B ={A, B, C, D, E,I, H, G, F} =9 JS=2/9 =0.2222222222222222 Now move towards your scenario Paris has the tag_ids 1,3 so we make the set of this and call our Set P ={Europe,River} London has the tag_ids 1,3 so we make the set of this and call our Set L ={Europe,River} New York has the tag_ids 2,3 so we make the set of this and call our Set NW ={North America,River} Calculting the JS Paris with London JSPL = P intersect L / P union L , JSPL = 2/2 = 1 Calculting the JS Paris with New York JSPNW = P intersect NW / P union NW ,JSPNW = 1/3 = 0.3333333333 Here is the query so far which calcluates the perfect jaccard index you can see the below fiddle example SELECT a.*, ( (CASE WHEN a.`intersect` =0 THEN a.`union` ELSE a.`intersect` END ) /a.`union`) AS jaccard_index FROM ( SELECT q.* ,(q.sets + q.parisset) AS `union` , (q.sets - q.parisset) AS `intersect` FROM ( SELECT cities.`id`, cities.`name` , GROUP_CONCAT(tag_id SEPARATOR ',') sets , (SELECT GROUP_CONCAT(tag_id SEPARATOR ',') FROM `cities_tags` WHERE city_id= 1)AS parisset FROM `cities_tags` LEFT JOIN `cities` ON (cities_tags.`city_id` = cities.`id`) GROUP BY city_id ) q ) a ORDER BY jaccard_index DESC In above query i have the i have derived the result set to two subselects in order get my custom calculated aliases enter image description here You can add the filter in above query not to calculate the similarity with itself SELECT a.*, ( (CASE WHEN a.`intersect` =0 THEN a.`union` ELSE a.`intersect` END ) /a.`union`) AS jaccard_index FROM ( SELECT q.* ,(q.sets + q.parisset) AS `union` , (q.sets - q.parisset) AS `intersect` FROM ( SELECT cities.`id`, cities.`name` , GROUP_CONCAT(tag_id SEPARATOR ',') sets , (SELECT GROUP_CONCAT(tag_id SEPARATOR ',') FROM `cities_tags` WHERE city_id= 1)AS parisset FROM `cities_tags` LEFT JOIN `cities` ON (cities_tags.`city_id` = cities.`id`) WHERE cities.`id` !=1 GROUP BY city_id ) q ) a ORDER BY jaccard_index DESC So the result shows Paris is closely related to London and then related to New York Jaccard Similarity Fiddle
ESSENTIALAI-STEM
PubAg Main content area Coupled THMC models for bentonite in an argillite repository for nuclear waste: Illitization and its effect on swelling stress under high temperature Author: Zheng, Liange, Rutqvist, Jonny, Xu, Hao, Birkholzer, Jens T. Source: Engineering geology 2017 v.230 pp. 118-129 ISSN: 0013-7952 Subject: argillite, bentonite, decision making, engineering, hydrology, mechanical properties, mineral content, radioactive waste, simulation models, temperature Abstract: Subsurface manipulations such as those expected from the disposal of heat-emanating radioactive waste in deep repositories can induce strongly coupled Thermal (T), hydrological (H), mechanical (M) and chemical (C) processes. Adequate coupled THMC models are highly desirable or even indispensable for performance assessment of such repositories, for examples for the analysis of bentonite-based engineered barrier system (EBS) surrounding the emplaced waste. In this study, we present coupled THMC model simulations of a generic nuclear waste repository in an argillite with a bentonite-based buffer. The objective is to evaluate the chemical changes in the EBS bentonite and their effect on mechanical behavior under high temperature, attempting to shed light on whether EBS bentonite can sustain temperatures higher than 100°C without significant impact on barrier's performance.Two scenarios were simulated for comparison: a case in which the temperature near the waste canister peaks at 200°C and a case in which the temperature at the same spot culminate with about 100°C. Simulations for a generic case with Kunigel-VI bentonite as backfill and Opalinus Clay as host rock were conducted for 1000years and reported in the previous study (Zheng et al., 2015). In this paper, simulations for 100,000years have been done for two types of bentonite-based buffer materials: Kunigel-VI and FEBEX bentonite. This enables us to evaluate how different types of bentonite behave in terms of the illitization and its impact on swelling stress and whether we can generalize these results to support decision making. The simulations show the occurrence of illitization in the bentonite buffer and the enhancement of illitization under high temperature. However, FEBEX bentonite undergoes less illitization mainly due to the higher ion concentration in pore water and the lower content of K-feldspar in the bentonite mineral composition. Moreover, the reduction of swelling stress by chemical changes is more pronounced for Kunigel-VI bentonite than for FEBEX bentonite. Overall, the results of our model simulations suggest that an argillite repository with a bentonite-based EBS that is similar to FEBEX bentonite could sustain temperatures much higher than 100°C as far as illitization concerns. Model results also reveal that illitization is stabilized after about 2000years in bentonite near the waste package, but continues in bentonite near the bentonite-argillite interface, which manifests the strong effect of geochemical interaction between EBS bentonite and host rock on long term illitization in bentonite. Agid: 6092321
ESSENTIALAI-STEM
User:Szentendrei I am a Hungarian, living in Canada. I speak fluent Hungarian, English, and French. I also speak some German and Spanish (and a tiny bit of Polish and Russian). I have a Ph.D. in Computer Science from Yale University.
WIKI
Time Air Sweden Time Air Sweden, also known as Air Sweden, was a short-lived airline from Sweden that operated from 1991 to 1993. History The airline was established as LBF-Eda Varken in 1955 and operated taxi flights. It was renamed to Abal Air in 1982 and Time Air Sweden in 1990. Air Sweden was set up as a charter airline because the airline market in Sweden had not yet been deregulated. The airline operated cargo flights with its single Douglas DC-8-71F on the route Ostend-Stockholm-Delhi. The airline was owned by the Swedish businessman and former owner of Transwede, Thomas Johansson, with the main creditor being GE Capital. When GE Capital canceled the credits in 1993, the airline went bankrupt. This was due to the high losses related to an economic downturn in Sweden, as well as the purchase of two Lockheed L-1011 TriStars. Parts of the airline were later used to form West Air Sweden, specifically the single IAI Westwind that was left after the first one crashed. There is no connection between Time Air Sweden and the more recent airline Air Sweden.
WIKI
The Three Musketeers/Chapter 6 This affair made a great noise. M. de Treville scolded his Musketeers in public, and congratulated them in private; but as no time was to be lost in gaining the king, M. de Treville hastened to report himself at the Louvre. It was already too late. The king was closeted with the cardinal, and M. de Treville was informed that the king was busy and could not receive him at that moment. In the evening M. de Treville attended the king's gaming table. The king was winning; and as he was very avaricious, he was in an excellent humor. Perceiving M. de Treville at a distance-- "Come here, Monsieur Captain," said he, "come here, that I may growl at you. Do you know that his Eminence has been making fresh complaints against your Musketeers, and that with so much emotion, that this evening his Eminence is indisposed? Ah, these Musketeers of yours are very devils--fellows to be hanged." "No, sire," replied Treville, who saw at the first glance how things would go, "on the contrary, they are good creatures, as meek as lambs, and have but one desire, I'll be their warranty. And that is that their swords may never leave their scabbards but in your majesty's service. But what are they to do? The Guards of Monsieur the Cardinal are forever seeking quarrels with them, and for the honor of the corps even, the poor young men are obliged to defend themselves." "Listen to Monsieur de Treville," said the king; "listen to him! Would not one say he was speaking of a religious community? In truth, my dear Captain, I have a great mind to take away your commission and give it to Mademoiselle de Chemerault, to whom I promised an abbey. But don't fancy that I am going to take you on your bare word. I am called Louis the Just, Monsieur de Treville, and by and by, by and by we will see." "Ah, sire; it is because I confide in that justice that I shall wait patiently and quietly the good pleasure of your Majesty." "Wait, then, monsieur, wait," said the king; "I will not detain you long." In fact, fortune changed; and as the king began to lose what he had won, he was not sorry to find an excuse for playing Charlemagne--if we may use a gaming phrase of whose origin we confess our ignorance. The king therefore arose a minute after, and putting the money which lay before him into his pocket, the major part of which arose from his winnings, "La Vieuville," said he, "take my place; I must speak to Monsieur de Treville on an affair of importance. Ah, I had eighty louis before me; put down the same sum, so that they who have lost may have nothing to complain of. Justice before everything." Then turning toward M. de Treville and walking with him toward the embrasure of a window, "Well, monsieur," continued he, "you say it is his Eminence's Guards who have sought a quarrel with your Musketeers?" "Yes, sire, as they always do." "And how did the thing happen? Let us see, for you know, my dear Captain, a judge must hear both sides." "Good Lord! In the most simple and natural manner possible. Three of my best soldiers, whom your Majesty knows by name, and whose devotedness you have more than once appreciated, and who have, I dare affirm to the king, his service much at heart--three of my best soldiers, I say, Athos, Porthos, and Aramis, had made a party of pleasure with a young fellow from Gascony, whom I had introduced to them the same morning. The party was to take place at St. Germain, I believe, and they had appointed to meet at the Carmes-Deschaux, when they were disturbed by de Jussac, Cahusac, Bicarat, and two other Guardsmen, who certainly did not go there in such a numerous company without some ill intention against the edicts." "Ah, ah! You incline me to think so," said the king. "There is no doubt they went thither to fight themselves." "I do not accuse them, sire; but I leave your Majesty to judge what five armed men could possibly be going to do in such a deserted place as the neighborhood of the Convent des Carmes." "Yes, you are right, Treville, you are right!" "Then, upon seeing my Musketeers they changed their minds, and forgot their private hatred for partisan hatred; for your Majesty cannot be ignorant that the Musketeers, who belong to the king and nobody but the king, are the natural enemies of the Guardsmen, who belong to the cardinal." "Yes, Treville, yes," said the king, in a melancholy tone; "and it is very sad, believe me, to see thus two parties in France, two heads to royalty. But all this will come to an end, Treville, will come to an end. You say, then, that the Guardsmen sought a quarrel with the Musketeers?" "I say that it is probable that things have fallen out so, but I will not swear to it, sire. You know how difficult it is to discover the truth; and unless a man be endowed with that admirable instinct which causes Louis XIII to be named the Just--" "You are right, Treville; but they were not alone, your Musketeers. They had a youth with them?" "Yes, sire, and one wounded man; so that three of the king's Musketeers--one of whom was wounded--and a youth not only maintained their ground against five of the most terrible of the cardinal's Guardsmen, but absolutely brought four of them to earth." "Why, this is a victory!" cried the king, all radiant, "a complete victory!" "Yes, sire; as complete as that of the Bridge of Ce." "Four men, one of them wounded, and a youth, say you?" "One hardly a young man; but who, however, behaved himself so admirably on this occasion that I will take the liberty of recommending him to your Majesty." "How does he call himself?" "d'Artagnan, sire; he is the son of one of my oldest friends--the son of a man who served under the king your father, of glorious memory, in the civil war." "And you say this young man behaved himself well? Tell me how, Treville--you know how I delight in accounts of war and fighting." And Louis XIII twisted his mustache proudly, placing his hand upon his hip. "Sire," resumed Treville, "as I told you, Monsieur d'Artagnan is little more than a boy; and as he has not the honor of being a Musketeer, he was dressed as a citizen. The Guards of the cardinal, perceiving his youth and that he did not belong to the corps, invited him to retire before they attacked." "So you may plainly see, Treville," interrupted the king, "it was they who attacked?" "That is true, sire; there can be no more doubt on that head. They called upon him then to retire; but he answered that he was a Musketeer at heart, entirely devoted to your Majesty, and that therefore he would remain with Messieurs the Musketeers." "Brave young man!" murmured the king. "Well, he did remain with them; and your Majesty has in him so firm a champion that it was he who gave Jussac the terrible sword thrust which has made the cardinal so angry." "He who wounded Jussac!" cried the king, "he, a boy! Treville, that's impossible!" "It is as I have the honor to relate it to your Majesty." "Jussac, one of the first swordsmen in the kingdom?" "Well, sire, for once he found his master." "I will see this young man, Treville--I will see him; and if anything can be done--well, we will make it our business." "When will your Majesty deign to receive him?" "Tomorrow, at midday, Treville." "Shall I bring him alone?" "No, bring me all four together. I wish to thank them all at once. Devoted men are so rare, Treville, by the back staircase. It is useless to let the cardinal know." "Yes, sire." "You understand, Treville--an edict is still an edict, it is forbidden to fight, after all." "But this encounter, sire, is quite out of the ordinary conditions of a duel. It is a brawl; and the proof is that there were five of the cardinal's Guardsmen against my three Musketeers and Monsieur d'Artagnan." "That is true," said the king; "but never mind, Treville, come still by the back staircase." Treville smiled; but as it was indeed something to have prevailed upon this child to rebel against his master, he saluted the king respectfully, and with this agreement, took leave of him. That evening the three Musketeers were informed of the honor accorded them. As they had long been acquainted with the king, they were not much excited; but d'Artagnan, with his Gascon imagination, saw in it his future fortune, and passed the night in golden dreams. By eight o'clock in the morning he was at the apartment of Athos. D'Artagnan found the Musketeer dressed and ready to go out. As the hour to wait upon the king was not till twelve, he had made a party with Porthos and Aramis to play a game at tennis in a tennis court situated near the stables of the Luxembourg. Athos invited d'Artagnan to follow them; and although ignorant of the game, which he had never played, he accepted, not knowing what to do with his time from nine o'clock in the morning, as it then scarcely was, till twelve. The two Musketeers were already there, and were playing together. Athos, who was very expert in all bodily exercises, passed with d'Artagnan to the opposite side and challenged them; but at the first effort he made, although he played with his left hand, he found that his wound was yet too recent to allow of such exertion. D'Artagnan remained, therefore, alone; and as he declared he was too ignorant of the game to play it regularly they only continued giving balls to one another without counting. But one of these balls, launched by Porthos' herculean hand, passed so close to d'Artagnan's face that he thought that if, instead of passing near, it had hit him, his audience would have been probably lost, as it would have been impossible for him to present himself before the king. Now, as upon this audience, in his Gascon imagination, depended his future life, he saluted Aramis and Porthos politely, declaring that he would not resume the game until he should be prepared to play with them on more equal terms, and went and took his place near the cord and in the gallery. Unfortunately for d'Artagnan, among the spectators was one of his Eminence's Guardsmen, who, still irritated by the defeat of his companions, which had happened only the day before, had promised himself to seize the first opportunity of avenging it. He believed this opportunity was now come and addressed his neighbor: "It is not astonishing that that young man should be afraid of a ball, for he is doubtless a Musketeer apprentice." D'Artagnan turned round as if a serpent had stung him, and fixed his eyes intensely upon the Guardsman who had just made this insolent speech. "PARDIEU," resumed the latter, twisting his mustache, "look at me as long as you like, my little gentleman! I have said what I have said." "And as since that which you have said is too clear to require any explanation," replied d'Artagnan, in a low voice, "I beg you to follow me." "And when?" asked the Guardsman, with the same jeering air. "At once, if you please." "And you know who I am, without doubt?" "I? I am completely ignorant; nor does it much disquiet me." "You're in the wrong there; for if you knew my name, perhaps you would not be so pressing." "What is your name?" "Bernajoux, at your service." "Well, then, Monsieur Bernajoux," said d'Artagnan, tranquilly, "I will wait for you at the door." "Go, monsieur, I will follow you." "Do not hurry yourself, monsieur, lest it be observed that we go out together. You must be aware that for our undertaking, company would be in the way." "That's true," said the Guardsman, astonished that his name had not produced more effect upon the young man. Indeed, the name of Bernajoux was known to all the world, d'Artagnan alone excepted, perhaps; for it was one of those which figured most frequently in the daily brawls which all the edicts of the cardinal could not repress. Porthos and Aramis were so engaged with their game, and Athos was watching them with so much attention, that they did not even perceive their young companion go out, who, as he had told the Guardsman of his Eminence, stopped outside the door. An instant after, the Guardsman descended in his turn. As d'Artagnan had no time to lose, on account of the audience of the king, which was fixed for midday, he cast his eyes around, and seeing that the street was empty, said to his adversary, "My faith! It is fortunate for you, although your name is Bernajoux, to have only to deal with an apprentice Musketeer. Never mind; be content, I will do my best. On guard!" "But," said he whom d'Artagnan thus provoked, "it appears to me that this place is badly chosen, and that we should be better behind the Abbey St. Germain or in the Pre-aux-Clercs." "What you say is full of sense," replied d'Artagnan; "but unfortunately I have very little time to spare, having an appointment at twelve precisely. On guard, then, monsieur, on guard!" Bernajoux was not a man to have such a compliment paid to him twice. In an instant his sword glittered in his hand, and he sprang upon his adversary, whom, thanks to his great youthfulness, he hoped to intimidate. But d'Artagnan had on the preceding day served his apprenticeship. Fresh sharpened by his victory, full of hopes of future favor, he was resolved not to recoil a step. So the two swords were crossed close to the hilts, and as d'Artagnan stood firm, it was his adversary who made the retreating step; but d'Artagnan seized the moment at which, in this movement, the sword of Bernajoux deviated from the line. He freed his weapon, made a lunge, and touched his adversary on the shoulder. d'Artagnan immediately made a step backward and raised his sword; but Bernajoux cried out that it was nothing, and rushing blindly upon him, absolutely spitted himself upon d'Artagnan's sword. As, however, he did not fall, as he did not declare himself conquered, but only broke away toward the hotel of M. de la Tremouille, in whose service he had a relative, d'Artagnan was ignorant of the seriousness of the last wound his adversary had received, and pressing him warmly, without doubt would soon have completed his work with a third blow, when the noise which arose from the street being heard in the tennis court, two of the friends of the Guardsman, who had seen him go out after exchanging some words with d'Artagnan, rushed, sword in hand, from the court, and fell upon the conqueror. But Athos, Porthos, and Aramis quickly appeared in their turn, and the moment the two Guardsmen attacked their young companion, drove them back. Bernajoux now fell, and as the Guardsmen were only two against four, they began to cry, "To the rescue! The Hotel de la Tremouille!" At these cries, all who were in the hotel rushed out and fell upon the four companions, who on their side cried aloud, "To the rescue, Musketeers!" This cry was generally heeded; for the Musketeers were known to be enemies of the cardinal, and were beloved on account of the hatred they bore to his Eminence. Thus the soldiers of other companies than those which belonged to the Red Duke, as Aramis had called him, often took part with the king's Musketeers in these quarrels. Of three Guardsmen of the company of M. Dessessart who were passing, two came to the assistance of the four companions, while the other ran toward the hotel of M. de Treville, crying, "To the rescue, Musketeers! To the rescue!" As usual, this hotel was full of soldiers of this company, who hastened to the succor of their comrades. The MELEE became general, but strength was on the side of the Musketeers. The cardinal's Guards and M. de la Tremouille's people retreated into the hotel, the doors of which they closed just in time to prevent their enemies from entering with them. As to the wounded man, he had been taken in at once, and, as we have said, in a very bad state. Excitement was at its height among the Musketeers and their allies, and they even began to deliberate whether they should not set fire to the hotel to punish the insolence of M. de la Tremouille's domestics in daring to make a SORTIE upon the king's Musketeers. The proposition had been made, and received with enthusiasm, when fortunately eleven o'clock struck. D'Artagnan and his companions remembered their audience, and as they would very much have regretted that such an opportunity should be lost, they succeeded in calming their friends, who contented themselves with hurling some paving stones against the gates; but the gates were too strong. They soon tired of the sport. Besides, those who must be considered the leaders of the enterprise had quit the group and were making their way toward the hotel of M. de Treville, who was waiting for them, already informed of this fresh disturbance. "Quick to the Louvre," said he, "to the Louvre without losing an instant, and let us endeavor to see the king before he is prejudiced by the cardinal. We will describe the thing to him as a consequence of the affair of yesterday, and the two will pass off together." M. de Treville, accompanied by the four young fellows, directed his course toward the Louvre; but to the great astonishment of the captain of the Musketeers, he was informed that the king had gone stag hunting in the forest of St. Germain. M. de Treville required this intelligence to be repeated to him twice, and each time his companions saw his brow become darker. "Had his Majesty," asked he, "any intention of holding this hunting party yesterday?" "No, your Excellency," replied the valet de chambre, "the Master of the Hounds came this morning to inform him that he had marked down a stag. At first the king answered that he would not go; but he could not resist his love of sport, and set out after dinner." "And the king has seen the cardinal?" asked M. de Treville. "In all probability he has," replied the valet, "for I saw the horses harnessed to his Eminence's carriage this morning, and when I asked where he was going, they told me, 'To St. Germain.'" "He is beforehand with us," said M. de Treville. "Gentlemen, I will see the king this evening; but as to you, I do not advise you to risk doing so." This advice was too reasonable, and moreover came from a man who knew the king too well, to allow the four young men to dispute it. M. de Treville recommended everyone to return home and wait for news. On entering his hotel, M. de Treville thought it best to be first in making the complaint. He sent one of his servants to M. de la Tremouille with a letter in which he begged of him to eject the cardinal's Guardsmen from his house, and to reprimand his people for their audacity in making SORTIE against the king's Musketeers. But M. de la Tremouille--already prejudiced by his esquire, whose relative, as we already know, Bernajoux was-- replied that it was neither for M. de Treville nor the Musketeers to complain, but, on the contrary, for him, whose people the Musketeers had assaulted and whose hotel they had endeavored to burn. Now, as the debate between these two nobles might last a long time, each becoming, naturally, more firm in his own opinion, M. de Treville thought of an expedient which might terminate it quietly. This was to go himself to M. de la Tremouille. He repaired, therefore, immediately to his hotel, and caused himself to be announced. The two nobles saluted each other politely, for if no friendship existed between them, there was at least esteem. Both were men of courage and honor; and as M. de la Tremouille--a Protestant, and seeing the king seldom--was of no party, he did not, in general, carry any bias into his social relations. This time, however, his address, although polite, was cooler than usual. "Monsieur," said M. de Treville, "we fancy that we have each cause to complain of the other, and I am come to endeavor to clear up this affair." "I have no objection," replied M. de la Tremouille, "but I warn you that I am well informed, and all the fault is with your Musketeers." "You are too just and reasonable a man, monsieur!" said Treville, "not to accept the proposal I am about to make to you." "Make it, monsieur, I listen." "How is Monsieur Bernajoux, your esquire's relative?" "Why, monsieur, very ill indeed! In addition to the sword thrust in his arm, which is not dangerous, he has received another right through his lungs, of which the doctor says bad things." "But has the wounded man retained his senses?" "Perfectly." "Does he talk?" "With difficulty, but he can speak." "Well, monsieur, let us go to him. Let us adjure him, in the name of the God before whom he must perhaps appear, to speak the truth. I will take him for judge in his own cause, monsieur, and will believe what he will say." M. de la Tremouille reflected for an instant; then as it was difficult to suggest a more reasonable proposal, he agreed to it. Both descended to the chamber in which the wounded man lay. The latter, on seeing these two noble lords who came to visit him, endeavored to raise himself up in his bed; but he was too weak, and exhausted by the effort, he fell back again almost senseless. M. de la Tremouille approached him, and made him inhale some salts, which recalled him to life. Then M. de Treville, unwilling that it should be thought that he had influenced the wounded man, requested M. de la Tremouille to interrogate him himself. That happened which M. de Treville had foreseen. Placed between life and death, as Bernajoux was, he had no idea for a moment of concealing the truth; and he described to the two nobles the affair exactly as it had passed. This was all that M. de Treville wanted. He wished Bernajoux a speedy convalescence, took leave of M. de la Tremouille, returned to his hotel, and immediately sent word to the four friends that he awaited their company at dinner. M. de Treville entertained good company, wholly anticardinalist, though. It may easily be understood, therefore, that the conversation during the whole of dinner turned upon the two checks that his Eminence's Guardsmen had received. Now, as d'Artagnan had been the hero of these two fights, it was upon him that all the felicitations fell, which Athos, Porthos, and Aramis abandoned to him, not only as good comrades, but as men who had so often had their turn that could very well afford him his. Toward six o'clock M. de Treville announced that it was time to go to the Louvre; but as the hour of audience granted by his Majesty was past, instead of claiming the ENTREE by the back stairs, he placed himself with the four young men in the antechamber. The king had not yet returned from hunting. Our young men had been waiting about half an hour, amid a crowd of courtiers, when all the doors were thrown open, and his Majesty was announced. At his announcement d'Artagnan felt himself tremble to the very marrow of his bones. The coming instant would in all probability decide the rest of his life. His eyes therefore were fixed in a sort of agony upon the door through which the king must enter. Louis XIII appeared, walking fast. He was in hunting costume covered with dust, wearing large boots, and holding a whip in his hand. At the first glance, d'Artagnan judged that the mind of the king was stormy. This disposition, visible as it was in his Majesty, did not prevent the courtiers from ranging themselves along his pathway. In royal antechambers it is worth more to be viewed with an angry eye than not to be seen at all. The three Musketeers therefore did not hesitate to make a step forward. D'Artagnan on the contrary remained concealed behind them; but although the king knew Athos, Porthos, and Aramis personally, he passed before them without speaking or looking--indeed, as if he had never seen them before. As for M. de Treville, when the eyes of the king fell upon him, he sustained the look with so much firmness that it was the king who dropped his eyes; after which his Majesty, grumbling, entered his apartment. "Matters go but badly," said Athos, smiling; "and we shall not be made Chevaliers of the Order this time." "Wait here ten minutes," said M. de Treville; "and if at the expiration of ten minutes you do not see me come out, return to my hotel, for it will be useless for you to wait for me longer." The four young men waited ten minutes, a quarter of an hour, twenty minutes; and seeing that M. de Treville did not return, went away very uneasy as to what was going to happen. M. de Treville entered the king's cabinet boldly, and found his Majesty in a very ill humor, seated on an armchair, beating his boot with the handle of his whip. This, however, did not prevent his asking, with the greatest coolness, after his Majesty's health. "Bad, monsieur, bad!" replied the king; "I am bored." This was, in fact, the worst complaint of Louis XIII, who would sometimes take one of his courtiers to a window and say, "Monsieur So-and-so, let us weary ourselves together." "How! Your Majesty is bored? Have you not enjoyed the pleasures of the chase today?" "A fine pleasure, indeed, monsieur! Upon my soul, everything degenerates; and I don't know whether it is the game which leaves no scent, or the dogs that have no noses. We started a stag of ten branches. We chased him for six hours, and when he was near being taken--when St.-Simon was already putting his horn to his mouth to sound the mort--crack, all the pack takes the wrong scent and sets off after a two-year-older. I shall be obliged to give up hunting, as I have given up hawking. Ah, I am an unfortunate king, Monsieur de Treville! I had but one gerfalcon, and he died day before yesterday." "Indeed, sire, I wholly comprehend your disappointment. The misfortune is great; but I think you have still a good number of falcons, sparrow hawks, and tiercets." "And not a man to instruct them. Falconers are declining. I know no one but myself who is acquainted with the noble art of venery. After me it will all be over, and people will hunt with gins, snares, and traps. If I had but the time to train pupils! But there is the cardinal always at hand, who does not leave me a moment's repose; who talks to me about Spain, who talks to me about Austria, who talks to me about England! Ah! A PROPOS of the cardinal, Monsieur de Treville, I am vexed with you!" This was the chance at which M. de Treville waited for the king. He knew the king of old, and he knew that all these complaints were but a preface--a sort of excitation to encourage himself-- and that he had now come to his point at last. "And in what have I been so unfortunate as to displease your Majesty?" asked M. de Treville, feigning the most profound astonishment. "Is it thus you perform your charge, monsieur?" continued the king, without directly replying to de Treville's question. "Is it for this I name you captain of my Musketeers, that they should assassinate a man, disturb a whole quarter, and endeavor to set fire to Paris, without your saying a word? But yet," continued the king, "undoubtedly my haste accuses you wrongfully; without doubt the rioters are in prison, and you come to tell me justice is done." "Sire," replied M. de Treville, calmly, "on the contrary, I come to demand it of you." "And against whom?" cried the king. "Against calumniators," said M. de Treville. "Ah! This is something new," replied the king. "Will you tell me that your three damned Musketeers, Athos, Porthos, and Aramis, and your youngster from Bearn, have not fallen, like so many furies, upon poor Bernajoux, and have not maltreated him in such a fashion that probably by this time he is dead? Will you tell me that they did not lay siege to the hotel of the Duc de la Tremouille, and that they did not endeavor to burn it?--which would not, perhaps, have been a great misfortune in time of war, seeing that it is nothing but a nest of Huguenots, but which is, in time of peace, a frightful example. Tell me, now, can you deny all this?" "And who told you this fine story, sire?" asked Treville, quietly. "Who has told me this fine story, monsieur? Who should it be but he who watches while I sleep, who labors while I amuse myself, who conducts everything at home and abroad--in France as in Europe?" "Your Majesty probably refers to God," said M. de Treville; "for I know no one except God who can be so far above your Majesty." "No, monsieur; I speak of the prop of the state, of my only servant, of my only friend--of the cardinal." "His Eminence is not his holiness, sire." "What do you mean by that, monsieur?" "That it is only the Pope who is infallible, and that this infallibility does not extend to cardinals." "You mean to say that he deceives me; you mean to say that he betrays me? You accuse him, then? Come, speak; avow freely that you accuse him!" "No, sire, but I say that he deceives himself. I say that he is ill-informed. I say that he has hastily accused your Majesty's Musketeers, toward whom he is unjust, and that he has not obtained his information from good sources." "The accusation comes from Monsieur de la Tremouille, from the duke himself. What do you say to that?" "I might answer, sire, that he is too deeply interested in the question to be a very impartial witness; but so far from that, sire, I know the duke to be a royal gentleman, and I refer the matter to him--but upon one condition, sire." "What?" "It is that your Majesty will make him come here, will interrogate him yourself, TETE-A-TETE, without witnesses, and that I shall see your Majesty as soon as you have seen the duke." "What, then! You will bind yourself," cried the king, "by what Monsieur de la Tremouille shall say?" "Yes, sire." "You will accept his judgment?" "Undoubtedly." "Any you will submit to the reparation he may require?" "Certainly." "La Chesnaye," said the king. "La Chesnaye!" Louis XIII's confidential valet, who never left the door, entered in reply to the call. "La Chesnaye," said the king, "let someone go instantly and find Monsieur de la Tremouille; I wish to speak with him this evening." "Your Majesty gives me your word that you will not see anyone between Monsieur de la Tremouille and myself?" "Nobody, by the faith of a gentleman." "Tomorrow, then, sire?" "Tomorrow, monsieur." "At what o'clock, please your Majesty?" "At any hour you will." "But in coming too early I should be afraid of awakening your Majesty." "Awaken me! Do you think I ever sleep, then? I sleep no longer, monsieur. I sometimes dream, that's all. Come, then, as early as you like--at seven o'clock; but beware, if you and your Musketeers are guilty." "If my Musketeers are guilty, sire, the guilty shall be placed in your Majesty's hands, who will dispose of them at your good pleasure. Does your Majesty require anything further? Speak, I am ready to obey." "No, monsieur, no; I am not called Louis the Just without reason. Tomorrow, then, monsieur--tomorrow." "Till then, God preserve your Majesty!" However ill the king might sleep, M. de Treville slept still worse. He had ordered his three Musketeers and their companion to be with him at half past six in the morning. He took them with him, without encouraging them or promising them anything, and without concealing from them that their luck, and even his own, depended upon the cast of the dice. Arrived at the foot of the back stairs, he desired them to wait. If the king was still irritated against them, they would depart without being seen; if the king consented to see them, they would only have to be called. On arriving at the king's private antechamber, M. de Treville found La Chesnaye, who informed him that they had not been able to find M. de la Tremouille on the preceding evening at his hotel, that he returned too late to present himself at the Louvre, that he had only that moment arrived and that he was at that very hour with the king. This circumstance pleased M. de Treville much, as he thus became certain that no foreign suggestion could insinuate itself between M. de la Tremouille's testimony and himself. In fact, ten minutes had scarcely passed away when the door of the king's closet opened, and M. de Treville saw M. de la Tremouille come out. The duke came straight up to him, and said: "Monsieur de Treville, his Majesty has just sent for me in order to inquire respecting the circumstances which took place yesterday at my hotel. I have told him the truth; that is to say, that the fault lay with my people, and that I was ready to offer you my excuses. Since I have the good fortune to meet you, I beg you to receive them, and to hold me always as one of your friends." "Monsieur the Duke," said M. de Treville, "I was so confident of your loyalty that I required no other defender before his Majesty than yourself. I find that I have not been mistaken, and I thank you that there is still one man in France of whom may be said, without disappointment, what I have said of you." "That's well said," cried the king, who had heard all these compliments through the open door; "only tell him, Treville, since he wishes to be considered your friend, that I also wish to be one of his, but he neglects me; that it is nearly three years since I have seen him, and that I never do see him unless I send for him. Tell him all this for me, for these are things which a king cannot say for himself." "Thanks, sire, thanks," said the duke; "but your Majesty may be assured that it is not those--I do not speak of Monsieur de Treville--whom your Majesty sees at all hours of the day that are most devoted to you." "Ah! You have heard what I said? So much the better, Duke, so much the better," said the king, advancing toward the door. "Ah! It is you, Treville. Where are your Musketeers? I told you the day before yesterday to bring them with you; why have you not done so?" "They are below, sire, and with your permission La Chesnaye will bid them come up." "Yes, yes, let them come up immediately. It is nearly eight o'clock, and at nine I expect a visit. Go, Monsieur Duke, and return often. Come in, Treville." The Duke saluted and retired. At the moment he opened the door, the three Musketeers and d'Artagnan, conducted by La Chesnaye, appeared at the top of the staircase. "Come in, my braves," said the king, "come in; I am going to scold you." The Musketeers advanced, bowing, d'Artagnan following closely behind them. "What the devil!" continued the king. "Seven of his Eminence's Guards placed HORS DE COMBAT by you four in two days! That's too many, gentlemen, too many! If you go on so, his Eminence will be forced to renew his company in three weeks, and I to put the edicts in force in all their rigor. One now and then I don't say much about; but seven in two days, I repeat, it is too many, it is far too many!" "Therefore, sire, your Majesty sees that they are come, quite contrite and repentant, to offer you their excuses." "Quite contrite and repentant! Hem!" said the king. "I place no confidence in their hypocritical faces. In particular, there is one yonder of a Gascon look. Come hither, monsieur." D'Artagnan, who understood that it was to him this compliment was addressed, approached, assuming a most deprecating air. "Why you told me he was a young man? This is a boy, Treville, a mere boy! Do you mean to say that it was he who bestowed that severe thrust at Jussac?" "And those two equally fine thrusts at Bernajoux." "Truly!" "Without reckoning," said Athos, "that if he had not rescued me from the hands of Cahusac, I should not now have the honor of making my very humble reverence to your Majesty." "Why he is a very devil, this Bearnais! VENTRE-SAINT-GRIS, Monsieur de Treville, as the king my father would have said. But at this sort of work, many doublets must be slashed and many swords broken. Now, Gascons are always poor, are they not?" "Sire, I can assert that they have hitherto discovered no gold mines in their mountains; though the Lord owes them this miracle in recompense for the manner in which they supported the pretensions of the king your father." "Which is to say that the Gascons made a king of me, myself, seeing that I am my father's son, is it not, Treville? Well, happily, I don't say nay to it. La Chesnaye, go and see if by rummaging all my pockets you can find forty pistoles; and if you can find them, bring them to me. And now let us see, young man, with your hand upon your conscience, how did all this come to pass?" D'Artagnan related the adventure of the preceding day in all its details; how, not having been able to sleep for the joy he felt in the expectation of seeing his Majesty, he had gone to his three friends three hours before the hour of audience; how they had gone together to the tennis court, and how, upon the fear he had manifested lest he receive a ball in the face, he had been jeered at by Bernajoux who had nearly paid for his jeer with his life and M. de la Tremouille, who had nothing to do with the matter, with the loss of his hotel. "This is all very well," murmured the king, "yes, this is just the account the duke gave me of the affair. Poor cardinal! Seven men in two days, and those of his very best! But that's quite enough, gentlemen; please to understand, that's enough. You have taken your revenge for the Rue Ferou, and even exceeded it; you ought to be satisfied." "If your Majesty is so," said Treville, "we are." "Oh, yes; I am," added the king, taking a handful of gold from La Chesnaye, and putting it into the hand of d'Artagnan. "Here," said he, "is a proof of my satisfaction." At this epoch, the ideas of pride which are in fashion in our days did not prevail. A gentleman received, from hand to hand, money from the king, and was not the least in the world humiliated. D'Artagnan put his forty pistoles into his pocket without any scruple--on the contrary, thanking his Majesty greatly. "There," said the king, looking at a clock, "there, now, as it is half past eight, you may retire; for as I told you, I expect someone at nine. Thanks for your devotedness, gentlemen. I may continue to rely upon it, may I not?" "Oh, sire!" cried the four companions, with one voice, "we would allow ourselves to be cut to pieces in your Majesty's service." "Well, well, but keep whole; that will be better, and you will be more useful to me. Treville," added the king, in a low voice, as the others were retiring, "as you have no room in the Musketeers, and as we have besides decided that a novitiate is necessary before entering that corps, place this young man in the company of the Guards of Monsieur Dessessart, your brother-in-law. Ah, PARDIEU, Treville! I enjoy beforehand the face the cardinal will make. He will be furious; but I don't care. I am doing what is right." The king waved his hand to Treville, who left him and rejoined the Musketeers, whom he found sharing the forty pistoles with d'Artagnan. The cardinal, as his Majesty had said, was really furious, so furious that during eight days he absented himself from the king's gaming table. This did not prevent the king from being as complacent to him as possible whenever he met him, or from asking in the kindest tone, "Well, Monsieur Cardinal, how fares it with that poor Jussac and that poor Bernajoux of yours?" Les Trois Mousquetaires/Chapitre 6 Trzej muszkieterowie/Tom I/Rozdział VI De tre musketörerna/Kapitel 06
WIKI
Page:The Children's Plutarch, Greeks.djvu/45 it and keep the noble Aristides in memory. And so well did the folk of Athens love the remembrance of this Just Man that they gave large gifts of money to each of his daughters at their marriage, and to his son they gave a sum of silver and a plot of land well planted with trees. And for years afterward persons who belonged to his family received kind treatment from the city. In this way the good deeds of a man remain after he is dead, and make the world happier. OOK, my son," said an old Greek, as he and his boy walked along the sea-shore, "you see those old galleys? Once they were strong ships that carried fighting-men across the ocean, and now they are worn out; they lie half covered with sand in this lonely place; no one cares anything about them. And so it is with men who serve Athens. After they have done their best, and become old in the service of the city, they are laid aside and thought no more of." The boy, whose name was Themistocles (Them-is-to-cleez), gazed earnestly at the old ships. But
WIKI
Talk:Crypto-paganism "Pagan" silliness from spolied middle-class children What a collection of nonsense from spoiled children playing at "paganism"... Don't drag the Druze and Yazidi down into your lame masturbation. They actually face persecution at the hands of Islamist fascists. Stop trying to wrap your silly games and store-bought "religious artifacts" in the bloody shirt of their persecution. Assholes. This term is important because there are several thousand people throughout the modern world that fall under the umbrella of being crypto-pagans, that have been ruthlesly persecuted and nearly exterminated in some instances. Many people think that religion is a straighforward matter. The crypto-pagan phenomenon shows that things are not that simple, and that what may appear to the be the proffessed beleifs of a people can infact be starkly different from what is actually beleived. Many people are also not aware of the real variety in world religion, and tend to think of places like the middle east as being home to a monolithic and unchanging Islamic religion. User:Nygdan 1-17-2005 Rename In keeping with convention this article should be named "Crypto-paganism" or "Crypto-Paganism". I'm no expert so I don't know which capitalisation is correct. Please comment for/against here, I would not want to move this without some concensus. Zunaid 14:17, 25 January 2006 (UTC) This is a good point Zunaid, however, there are already a bunch of links elsewhere in the wikipedia that reference it as Crypto-pagans. I don't know if there is some way to redirect or what. If so, then your suggestion is most sensible. Nygdan 1-25-06 * It will automatically redirect, and it should be capitalized. I'll do it. Cuñado [[image:Bahaitemplatestar.png|20px]] - Talk 00:23, 26 January 2006 (UTC) Articles for Deletion debate This article survived an Articles for Deletion debate. The discussion can be found here. -Splash talk 00:48, 26 January 2006 (UTC) Hmm, hopefully, now that the page has survived, it won't try to WREACK ITS REVENGE UPON US ALL!!! I fear we've only made it stronger in trying and failing to kill it. Nygdan 1-25-06 * You spelled wreak wrong. Cuñado [[image:Bahaitemplatestar.png|20px]] - Talk 05:44, 26 January 2006 (UTC) See, the article's Revenge has already started! Nygdan 13:26, 26 January 2006 (UTC) Practices Perhaps the Practices section should be rewritten by someone who actually knows about the subject. Whoever wrote what's there doesn't know much about it and presents a pretty one-sided view of things. comment added by ChiMama (talk • contribs) 10:38, 3 May 2009 (UTC) Druze and Yazidi aren't pagans These sections should be removed from this article. Rwflammang (talk) 19:52, 11 February 2011 (UTC) * Agree. While there are over 200 books using the term Crypto-Pagan at Google Books, none of them also include either "Druze" or "Yezidi". Yworo (talk) 20:21, 11 February 2011 (UTC) Article seriously needs some citations This is my first submission to Wikipedia in a long time - just in case anyone's troubled by my non-existent list of previous edits. :o) I'm troubled by the phrasing of parts of this article. It seems, let's say, 'weighted' in places. For example: "'Given the high Christian religiosity of the United States, many American neopagans conceal their practices in daily life to avoid being ostracized or persecuted.'" This is probably true, insofar as some American pagans probably do feel unable to be open about their beliefs. There are, it's true, high levels of conservative Christian belief in certain areas. I'm not sure, though, that it's entirely safe for an encyclopaedia to talk about 'the high Christian religiosity of the United States'. I'm aware that religion in the US is a highly emotive issue, so it might be better to find a more neutral way to put this. If this section needs to identify the US specifically, then I suggest something like: "'In the United States, particularly in traditionally conservative Christian areas, some pagans feel unable to practice or express their beliefs publicly for fear of ostracism or persecution.'" I can't cite any sources for this, but the existing statement isn't cited either. I also think that this wording avoids the implication that they will be ostracised or persecuted, which smacks of an accusation, and replaces it with their concern that they will, which I think is more legitimate. "'Traditionally, the Wiccan Laws suggested hiding symbols, ceremonies and altars in plain sight[...]'" The article linked to here doesn't make any reference to hiding anything in plain sight. The link goes to the Wiccan Rede, and discusses the history and meaning of the rule, "An it harm none, do as you will", and its variants. The Wiccan Rede article is redirected from Wiccan Laws, however, so it may be that there was originally a Wiccan Laws article discussing this. "'Many crypto-pagan sects exist in the Middle East; they have gone underground to avoid persecution from the dominant Muslims.[citation needed] This can perhaps be seen in opposition to Europe, wherein pagan groups have simply been eliminated (short of recent revivals, such as the Ásatrú, and in Neo-druidism and Neopaganism), while some pagan traditions (e.g. New Year's Day) have been absorbed into mainstream Christianity.'" Crumbs. Where to start? By definition, if these Middle-Eastern sects have gone underground, they'd be difficult to identify. Who are they, then, and how do we know they're there? I appreciate this is pretty much covered by 'citation needed' - I'm just emphasising. 'Persecution from the dominant Muslims'? Again, without knowing anything at first hand about the socio-religious situation in the region (other than the picture painted by western media), it might be more neutral to refer to pagans' fear of persecution, as with Christianity in America, rather than imply that there would certainly be persecution. "'This can perhaps be seen in opposition to Europe, wherein pagan groups have simply been eliminated[...]'" That's very loaded, and I'd lay odds we'd struggle to find a reputable source to back it up. There is a tendency in pagan circles to portray the conversion of Europe from paganism to Christianity as an act of violent oppression: conversion at the point of a sword. In fact it was a more gradual process driven in large part by the appeal of the new religion. Saying 'pagan groups have simply been eliminated' gives a strong impression of systematic suppression, when in fact, as unpopular a view as it may be, most ancient pagan beliefs were simply left behind by the people themselves. What practices remained often weren't so much eliminated as absorbed or, as the article itself says, syncretised into Christianity. This is very different from 'simply eliminated'. "'In South America, with the aggressive evangelizing of state sponsored Christianity and the suppression of native religions, there have also, arguably, been some crypto-pagan groups.'" This desperately needs a cite. Even if it's 'common knowledge' or "everybody knows" for someone with knowledge of the area. If we're going to level accusations of 'aggressive evangelizing' by 'state-sponsored Christianity' against an entire geopolitical region, then we have to be able to back them up. Also: there have 'arguably' been crypto-pagan groups? Have there or haven't there? If we can show that there have, then we don't need 'arguably'. If we can't, then we shouldn't be making the claim at all. ''"Generally crypto-pagans in the Middle East have adopted Arabic and Islamic terminology as part of their cover. Equally often, the laity knows little about the religion, which is kept as a mystery for priests and people who have undergone initiation. The precise theology of many of these religions is still kept a closely guarded secret to this day, and the groups themselves will provide disinformation to further their secrecy."'' So how do we know about them? Seriously: this article is making a lot of assertions, but it's not saying how Wikipedia has managed to penetrate this shield of secrecy. This needs to be explained. This last paragraph in particular gives the strong impression that it's basically just someone's opinion. On this Talk page, all the way back in 2005, it seems, User:Nygdan said: "'This term is important because there are several thousand people throughout the modern world that fall under the umbrella of being crypto-pagans, that have been ruthlesly persecuted and nearly exterminated in some instances'" That's a very heavy claim, and as far as I can see, this article doesn't do anything to evidence it. There has been a citations tag at the top of the article since February 2010. I think if we haven't found something to back up what's being said in that time, we need to start seriously considering whether the article deserves to be here at all. - Coldwind139 (talk) 09:08, 20 December 2012 (UTC) * I've had a stab at re-writing the bulk of the article in what I hope will be a slightly less weighted style. I've put in a couple of links which may or may not be useful or acceptable - I tried to shorten one of them via TinyURL but didn't realise this service was blocked, so the full-length URL is now in the reference. I've tried to cite properly, but I'm no expert on academic referencing, so please feel free to correct if I've got it wrong. Or just revert the lot if I've made an unsalvageable pig's ear of the whole thing. :o) - Coldwind139 (talk) 15:13, 28 December 2012 (UTC) * Oh, and PS: I've removed most of the last section on crypto-paganism in Islamic cultures only because much of it as it stood seemed to be speculative. - Coldwind139 (talk) —Preceding undated comment added 15:15, 28 December 2012 (UTC)
WIKI
We are searching data for your request: Upon completion, a link will appear to access the found materials. Rejection and disappointment are two difficult feelings to understand and to bear, and more so if children suffer from them. Resilience is a trait that parents must promote in their children so that when they feel disappointed or rejected they can overcome these feelings and that it does not negatively affect their self-esteem. A child who feels rejected is because he believes that he does not fit in with others, be it with his classmates, with a group of friends and even with family and friends. But how can you help a child who feels rejected? 1. Understand their feelings. The first thing your child needs is that you listen to him and understand what he is going through, so he can understand and normalize his feelings so that he can handle them the next time they appear inside him. If your child hasn't been invited to a birthday party, he will need your comfort, but don't feel sorry for him. 2. Failure in friendship is not bad. Your child may be afraid of failure because he has been rejected, but you must teach him that failure is an excellent learning experience even if it creates uncomfortable feelings. When we fail or your child feels rejected when a friendship has failed, it can help to reevaluate their goals and be able to value people more and know that not everyone deserves their friendship. 3. Improve social skills. Sometimes children feel rejected because they do not understand non-verbal language when, for example, he tries to be funny in class and does not succeed or when his classmates tell him to stop and he continues just to be accepted, achieving the opposite. 4. Tolerance for frustration. Perhaps the child feels rejected because he has negative behavior towards others and they withdraw from him. When this happens it is necessary for children to realize what is happening in order to solve it. For example, if your child does not know how to lose and gets angry every time he does not win in a game, you may need to work on tolerance for frustration and practice reactions with board games at home. 5. There are more fish in the sea. If a child has been rejected by another child or by some group such as classmates, let him know that if they do not accept him, he should not stoop to trying to make them his friends. There are many people in the world who can be your friends and much better. People should accept and respect him, just as he should do with others. You can read more articles similar to How to help a child who feels rejected, in the category of Motivation on site.
FINEWEB-EDU
1977 Fort Lauderdale Strikers season The 1977 Fort Lauderdale Strikers season was the first season of the new team, and the club's eleventh season in professional soccer. It is also the first ever incarnation of the club's new name. Previously they were known as the Miami Toros. The 1977 squad won the North American Soccer League's Eastern Division of the Atlantic Conference, and was the top team in regular season with 19 victories for 161 points. First ever match The Strikers first-ever game was a preseason indoor match played on February 27, 1977 at the Bayfront Center in St. Petersburg, Florida, against the Tampa Bay Rowdies. Though only an exhibition, this was the first meeting in what was to become one of the most enduring rivalries in North American soccer, the Florida Derby. It would also set the tone for many years of indoor frustration for the Strikers as they fell, 9–8, to the hosts. NASL regular season W = Wins, L = Losses, GF = Goals For, GA = Goals Against, BP = Bonus Points, Pts= point system 6 points for a win, 0 points for a loss, 1 point for each regulation goal scored up to three per game.
WIKI
Route nationale 12 (Madagascar) Route nationale 12 (RN 12) is a primary highway in Madagascar of 240 km, running from Irondro to Vangaindrano. It crosses the regions of Vatovavy, Fitovinany and Atsimo-Atsinanana. It is paved but partly in bad condition. History The road was constructed in 1936, while the island was governed as the colony of French Madagascar. Construction of the road was conducted as corvée work; the French did not provide to the Antaisaka laborers during the day, an omission considered to be barbaric by the island's natives, and would arrest and imprison the natives who did not show up to participate in the construction for a period of 15 days. The road, upon its construction, was initially one of the best roads in Madagascar for travel, and was created with twelve ferries to bring people and vehicles across waterways. As time passed, however, the road fell into disrepair. By 1998, the highway had become an entirely dirt road and the ferry services had become unreliable; the road had become almost always partly impassible to vehicular traffic. Selected locations on route (north to south) * Irondro (intersection with RN 25) * Mizilo Gara (railway) * Manakara - 118km * Vohipeno - 202 km * Farafangana - 224 km * Vangaindrano - 299 km The section between Vohipeno and Farafangana is paved.
WIKI
Question: How Do You Adjust A Solex Carburetor? How do you adjust a 2bbl carburetor? How to Adjust a Carter 2BBL CarburetorStart the vehicle and apply the parking brake. Spray starting fluid around the base of the carburetor and intake manifold. Adjust the accelerator pump linkage. Adjust the metering rods. Adjust the fast idle. Adjust the choke unloader. Adjust the dashpot. Adjust the idle air bleed screws.. How do you adjust a 34 PICT 3 carb? Setting the 34PICT/3 carburetorEngine warmed up, but switched off. … Turn the Volume Control Screw (smaller screw in the side of the carby) in until it bottoms. … Start the engine and use the Bypass Screw (larger screw in the side of the carby) to set the idle at 850rpm (fast idle if you don’t have a tacho).More items… How do you adjust a Volkswagen carburetor? Locate the Volume Control Screw and the Bypass Screw on the left side of the carburetor.Screw it in GENTLY until it bottoms.Now unscrew it exactly 2-1/2 turns. X Research source This is the starting setting.Start the engine and use the Bypass Screw to set the idle at 850 rpm. How do you adjust the fuel mixture on a SU carb? The jet should be screwed up as high as the bridge if possible. Remove the air cleaner and the dashpot screw-in top and damper. Use a screwdriver to raise the piston. Turn the jet adjuster nut up as far as it will go, or until the jet is level with the bridge inside the carburettor.
ESSENTIALAI-STEM
Ugandan opposition lawmaker arrives in the U.S. for medical treatment KAMPALA (Reuters) - Prominent Ugandan opposition lawmaker Robert Kyagulanyi arrived in the United States on Saturday to seek medical treatment for what he said was torture by authorities in his country. Kyagulanyi, a popular musician known by his stage name Bobi Wine, was elected last year and has amassed a large following among youth electrified by his scathing criticism of President Yoweri Museveni, sometimes delivered in his songs. Protests had erupted in the Ugandan capital on Friday after police detained Kyagulanyi at the airport during a previous attempt to travel abroad for medical care. In a tweet posted on Saturday evening, Kyagulanyi said: “Safely arrived in the US where I’ll be receiving specialized treatment following the brutal torture at the hands of SFC soldiers.” That referred to Uganda’s Special Forces Command. “I will soon tell you what exactly happened to me since 13th August and what is next,” he said, referring to the day he was detained after being accused by authorities of throwing stones at a presidential convoy. He has pleaded not guilty to the charges. Kyagulanyi posted in his tweet a picture of himself sitting in a wheelchair and holding crutches, posing in an airport next to his wife. The lawmaker has said he was beaten up and tortured while in detention. Ugandan authorities initially dismissed the allegations that Kyagulanyi was beaten up in detention as “rubbish” and “fake news.” But late on Friday a police spokesman said there would be an investigation into those allegations. Kyagulanyi, who has emerged as a formidable threat to the president who has been in power for 32 years, was charged with treason over his alleged role in the stoning of Museveni’s convoy. Museveni has won praise in the West for his opposition to militant Islam in the region, but many Ugandans regard the 73-year-old as out of touch with his people, nearly 80 percent of whom are under the age of 30. He has been in power since 1986 and has repeatedly been accused by his opponents of rights abuses and the widespread use of security forces to suppress opposition to his rule. He denies charges that his government is involved in rights violations. Reporting by Omar Mohammed in Nairobi and Elias Biryabarema in Kampala; Writing by Omar Mohammed; Editing by Ingrid Melander and Alexandra Hudson
NEWS-MULTISOURCE
Muhammed Bozdağ Muhammed Bozdağ (born 1967) is a Turkish writer who publishes primarily self-help literature based on a blend of Islamic and New Age concepts. Background Bozdağ was born in Akçaabat in Trabzon Province. He is the father of three children. He graduated from Middle East Technical University and has a PhD in Administration and Political Science from Hacettepe and Gazi Universities. He is legislative expert and public administrator in Turkish Parliament, and has written several books on personal development. Work His books, titled Düşün ve Başar (Think and Succeed), Ruhsal Zekà (Spiritual Sincerity Intelligence), İstemenin Esrarı (Mysteries of Wishing) and Sonsuzluk Yolculuğu (The Journey of Eternity) have had near one million copies printed in Turkey. He wrote articles in journals like, Zafer and Köprü. Several interviews with him by newspapers like Taraf, Sabah, Star, and Hürriyet, give more information about his perspectives. His second book Spiritual Sincerity Intelligence was translated into and printed in Russian and German languages.
WIKI
Ot me-Avshalom Ot me-Avshalom (Hebrew: אות מאבשלום Translation: A Letter from Avshalom or A Sign from Avshalom) is a novel by Israeli author Nava Macmel-Atir published by Yediot Books in 2009. The book quickly became a best-seller, and Macmel-Atir received the Golden Book award for selling 20,000 copies in just three months after its release. Half a year after its publication, Ot me-Avshalom received the Platinum Book award from the Book Publishers Association of Israel for selling 40,000 copies. In June 2015, it received the "Diamond Book" commemoration for selling 100,000 copies. Plot A young graphologist, Alma Bach, embarks on the trail of a man whose handwriting was sent to her for analysis. She discovers characteristics such as sharp wit, high degree of general knowledge, and courage. She discovers a passionate man with a highly developed imagination, linguistic style, and the sensitivity of an artist, a man with a magnetic personality who draws people to him while at the same time secluding himself and keeping a secret, and who is capable of loving at great magnitudes and willing to sacrifice for his love, for his love of the land, for his love of a woman, and eventually to pay the ultimate price. Alma is determined to meet this man face-to-face. The story moves back and forth between two time periods: modern-day Israel, where Alma undergoes her journey to discover the man, and a biographical depiction of Avshalom Feinberg, founder and leader of the Nili spy ring, which starts in late 19th-century Palestine and continues into the early 20th century. Awards * Golden Book Commemoration – Book Publishers Association of Israel – September 2009 * Platinum Book Commemoration – Book Publishers Association of Israel – January 2010 * Diamond Book Commemoration – Book Publishers Association of Israel – June 2015
WIKI
SWQL query to get node-related IPAM network name So we have a lot of networks in IPAM and I need to gather all NPM nodes, related to certain subnets. I made a draft, but since Solarwinds doesn't support subqueries with more than 1 returned value, it is very ugly: SELECT   [Subnet].FriendlyName AS [SUB] , Nodes.Caption , Nodes.DNS , Nodes.IP , Nodes.CustomProperties.City , 'https://domain'+Nodes.DetailsUrl AS [URL] , Nodes.Status , Nodes.CustomProperties.NodeRole FROM Orion.Nodes AS [Nodes] JOIN IPAM.IPNodeReport AS [IP]   ON [Nodes].ip = [IP].IPAddress LEFT JOIN IPAM.GroupReport AS [Subnet]   ON [Subnet].GroupId = [IP].SubnetID --WHERE [Subnet].FriendlyName = 'ipam_network_name' WHERE  [Subnet].FriendlyName = 'ipam_network_name1' OR [Subnet].FriendlyName = 'ipam_network_name2' OR [Subnet].FriendlyName = 'ipam_network_name3' OR ~100 strings like that [Subnet].FriendlyName = 'ipam_network_name104' OR [Subnet].FriendlyName = 'ipam_network_name105' OR [Subnet].FriendlyName = 'ipam_network_name106' Could you tell me please how to optimise this? As a result I just wanna have an additional column with IPAM Network name near every node. Parents • what you have looks like it should be close to working, are you just hoping not to list all 100+ networks? Is there a way to filter on the name? Can you do like 'Ipam_network_name%' or something similar? We prefix our names for various uses. Below is just another way to do it that is a bit shorter?  [Subnet].FriendlyName in ( 'ipam_network_name1' , 'ipam_network_name2' , 'ipam_network_name3' ~100 strings like that , 'ipam_network_name104' , 'ipam_network_name105' , 'ipam_network_name106' ) Or can you put custom properties on the IP or IP Group Node for filtering?  Reply • what you have looks like it should be close to working, are you just hoping not to list all 100+ networks? Is there a way to filter on the name? Can you do like 'Ipam_network_name%' or something similar? We prefix our names for various uses. Below is just another way to do it that is a bit shorter?  [Subnet].FriendlyName in ( 'ipam_network_name1' , 'ipam_network_name2' , 'ipam_network_name3' ~100 strings like that , 'ipam_network_name104' , 'ipam_network_name105' , 'ipam_network_name106' ) Or can you put custom properties on the IP or IP Group Node for filtering?  Children No Data
ESSENTIALAI-STEM
Talk:Ursula Nordstrom Reference to "Dear Genius..." review? Might someone include a hyperlink to the review of Dear Genius...the letters of Ursula Nordstrom at http://www.nytimes.com/books/98/03/22/reviews/980322.22sinklet.html ? I wished to include it as a footnote when I added the reference to Syd Hoff's Danny and the Dinosaur (1958), but apparently I do not have permission to edit the references section... —Preceding unsigned comment added by Brandyandtimber (talk • contribs) 01:31, 25 February 2009 (UTC) * The references section is automatically generated when references are added to the article using the tags. (More info about that here if you're interested.) I went ahead and added that link for you. Propaniac (talk) 02:06, 25 February 2009 (UTC) The Mellops go flying 1956 wanderte Ungerer mit 60 Dollar und einigen Zeichnungen in der Tasche in die USA, nach New York, aus. Unterernährt und mit verschleppter Rippenfellentzündung begab er sich sofort in die Notfallstation eines Krankenhauses. Dort weigerte man sich, ihn zu behandeln, da er nicht genug Geld hatte, um eine Behandlung zu bezahlen. Anderntags versuchte er bei der Kinderbuchlektorin von Harper, Ursula Nordström, einen Vertrag für sein Kinderbuch zu erhalten. Nordström lehnte zunächst bedauernd ab, gab ihm aber schließlich nach einem Schwächeanfall einen Vorschuss von 500 Dollar Bargeld.[5] Bereits 1957 gewann er seinen ersten Preis für sein erstes illustriertes Kinderbuch, „The Mellops go flying“, eine Geschichte mit kleinen Schweinchen. Father's name I have changed the name of Nordstrom's father and linked it to Wikipedia's Henry E. Dixey article. I don't know where the authors of Minders of Make-believe found the "Dixie" spelling for Marie Nordstrom's husband's last name. I have recently done research and posted articles on Marie Nordstrom and her sister, Frances Nordstrom. In doing so, I have seen numerous contemporary newspaper articles that have his last name spelled "Dixey", as does the Wikipedia article about him. None had it "Dixie". Eddie Blick (talk) 22:13, 11 December 2018 (UTC)
WIKI
Mass media in Barbados The mass media in Barbados have had a long history of being entitled to an open policy by the Government, and by the citizenry with respect to press Freedoms. Barbados has a collection of local and foreign owned media entities providing the country with varying views via newspaper, magazine, television, or radio communications. In terms of broadcast media, the Barbados Government largely has a hands off policy, as long as the content being aired by a media outlet is not profane, libelous, lewd, slanderous or vile. Depending on the severity, situations like a swearing offense could treated by an initial warning, and might proceed to monetary fines only if further instances continue.
WIKI
2005 Danish local elections Local elections were held in Denmark on 15 November 2005. 2522 municipal council members were elected in Denmark's 98 municipalities and 205 regional council members in the five regions. Most of these were newly formed municipalities, namely 66 municipalities, that would only begin working from Monday 1 January 2007, as would the newly formed regions, and one municipality, Ærø, which was also part of the reform, which was allowed by the government to commence work for the first time already Sunday 1 January 2006. So the first term of office in this newly created municipality was the whole period of four years from 2006 until 2009. The reform was approved 26 June 2005 by the lawmakers in the Folketing and signature by the head of state (when?). The 238 municipal councils (Danish: kommunalbestyrelser; singular: kommunalbestyrelse) and 13 county councils that were to be abolished 1 January 2007 just continued their work one year more than the term of office (2002-2005) they were elected for until 31 December 2006 and then ceased to exist. Among the remaining 31 municipalities having their new councils elected was Bornholm Regional Municipality that was formed and began its work 1 January 2003. This was only the second time it had a new council elected, the first time being on 29 May 2002, and it was the first time its council served the whole term of office. Bornholm's merger was not a part of the reform, having been decided by the island's voters already on 29 May 2001. It was the new center-right government elected at the end of 2001 that drove the reform through parliament. The 30 municipalities that remained were not merged with other municipalities, so their newly elected councils served the whole term of office 1 January 2006 until 31 December 2009. Results of regional elections The Ministry of interior informed that voter turnout was 69.4%. The regions are not municipalities, and are not allowed to levy any taxes, but are financed only through block grants from the central government and the municipalities within each region. The results of the regional elections: Results of municipal elections The Ministry of interior informed that voter turnout was 69.5%. The results of the municipal elections: Mayors in the municipalities The mayors (Danish:Borgmester; plural:Borgmestre) of the 98 municipalities heads the council meetings and is the chairman of the finance committee in each of their respective municipalities. Only in Copenhagen, this mayor - the head of the finance committee and council meetings - is called the Lord Mayor (Danish:Overborgmester). Old and new mayors in the municipalities The term of office for the mayors elected by the majority of councillors among its members in each municipal council is the same as for the councils elected. The correct name for the municipality on the somewhat remote island of Bornholm is Regional Municipality, because the municipality also handles several tasks not carried out by the other Danish municipalities but by the regions.
WIKI
User:ThatPeskyCommoner/The Huge Benefits of OCD-for-Wikipedians In order to understand the enormous benefits that having (I won't say "suffering from", because it's a negative view) OCD, or Obsessive Compulsive Disorder, one first has to understand the disorder itself. So click on that link. To date, OCD has attracted almost-exclusively negative connotations. There is very little about it which is written from a neutral point of view. Consider, first, its very name: Disorder. In order to be less negative, let us consider it not as a disorder, but as a specific talent, which, at what others might label "Severe" levels, we could instead redefine as genius levels. The major criticisms of obsessive-compulsive behaviour are centred around the problems that it can cause when not correctly focussed and directed. These, however, are in fact extremely easy to cope with. All one has to do is to provide the required focus and direction. Here in Wikipedia, we have numerous repetitive, boring, tedious, monotonous, thankless, and ceaseless activities which are ideally suited to those who have this particular talent. Copy-editing articles for grammar and style where needed, researching for material necessary for adding citations (and then, obviously, adding them) to articles which need this work, correcting spelling and typographical errors, filling in bare urls, patrolling recent changes and new pages .... the list - fortunately for OCDers - is almost endless. And we do it very, very well. Obsessively, compulsively, tirelessly, and perfectionistically well. The huge benefits to Wikipedia are clear. But there are also huge benefits to the OCDer. All these endless tasks give the OCDer a lifetime of enjoyment which: * they are allowed - even encouraged - to do * don't irritate other members of the family * involve no self-mutilation * are quiet and unobtrusive * and don't waste the soap Wikipedians who have discovered the endless entertainment which OCD can provide make excellent WikiGnomes, WikiElves, WikiFairies, and WikiWolfcubs seeking a hunting mission.
WIKI
Richard Wright is a young man who grew up in the Deep South when the Jim Crow laws of the early twentieth century were in place. From an early age, Richard Wright was aware of the differences in two races: the black and the white. His rebelliousness against Jim Crow south made him successful in life. Although Richard wright lived in the Jim Crow south and struggled, he managed to become rebellious against his family, religion and authority. In the autobiography, Black Boy by Richard Wright the author shows the reader that he was very rebellious against his family at a young age. Just as I found a way to express myself through writing, I feel my siblings can find that same passion. If my siblings can inspire others they in return can inspire more and then a chain reaction has begun. Writing provides an avenue for individuality and expression. Just based off of personal experience I understand that writing can help anyone cope with their emotions and channel them into a positive platform. Mrs. Williamson took a little boy who was acting out from frustration to a college student writing a self-expressive English paper. Reading has been one of my favorite hobbies since I was a little child. I grew up as a normal child should grow and eventually I had to start learning for me to fit in society. My literacy started many years ago, after I knew how to talk and communicate with people. Reading my alphabet was quite stressful and I had to be given a hand by my family members. I remember my parents reading with me and it was the most meaningful and memorable way to spend time with me. Through the character of a 13-year-old boy, Twain shows how vulnerable Huck is to fall into the societal norm of thinking. Throughout the novel it is crucial to remember that whites at this time did not recognize black slaves as humans, but rather as property. By the way Huck was raised, he sees Jim as a black slave who can’t think for himself and has a very small range of emotions. In one instance in the book when Huck and Jim are stuck on the raft together, Jim starts talking enthusiastically about gaining his freedom and traveling back up the river to “steal” his family back. When Huck hears Jim’s excitement for what Huck knows is breaking a law, he immediately falls back into the learned mindset he was raised to believe: “Saying he would steal his children—children that belonged to a man I didn’t know; a man that hadn’t ever done me no harm” (95). However, the blacks were struggling for equality and their acceptance as free individuals, They were not taken seriously and were still segregated from the whites. Although they were free, the south still had a negative view upon the black population and maintained their hatred towards them. Twain wrote this book in the sense of being in the past and showing how the blacks were treated throughout slavery. Twain utilized his knowledge of the past and created a novel based upon a runaway boy and an escaping slave. Huckleberry Finn (the boy) and Jim (the slave) both escaped from society and traveled amuck down the river. His poignant speeches raised the ire of many Northerners, yet many still felt the slaves deserved their position in life. Douglass, for his own safety, was urged to travel to England where he stayed and spoke until 1847 when he returned to the U.S. to buy his freedom. At that point, he began to write and distribute an anti-slavery newspaper called "The North Star". Not only did he present news to the slaves, but it was also highly regarded as a good source of information for those opposed to slavery. During the Civil war, Doug... ... middle of paper ... ...thony]" (49). The Adventures of Huckleberry Finn highlights and portrays the cruelty of racism that surrounded the south in Pre-Civil War America; the racism depicted in the book still to this day receives uproar of controversy and criticism. Mark Twain’s ideas for his books like The Adventures of Huckleberry Finn, The Adventures of Tom Sawyer, and many others, came from his own experiences. Mark Twain was originally born Samuel Langhorne Clemens in 1835 in Florida, Missouri. At the age of four, he moved to a small town called Hannibal, located on the Mississippi River, which was a major focal point in The Adventure of Huckleberry Finn. In 1847 Samuel’s father suddenly died which sent the whole family into money crisis. Despite the many ways to prevent little or no education, for slaves in the south, education was a major role in the abolition of slavery and someone like Frederick Douglass used the education that he taught himself, to teach others and come out from a slave to a free man. In chapter one of the narrative, Douglass explains that his master separated him from his mother soon after his birth. This separation ensured that Douglass did not develop familial feelings towards his mother. Douglass devotes large parts of his narrative to demonstrating how a slave is “made” beginning at birth. He gave details how slaveholders first remove a child from his immediate family, and how that destroys a child’s support network and sense of personal history. Since they had joined the abolitionist movement. Frederik Douglass searched for his freedom and escaped his slave masters corrupt plantation when he was 20 years old. Although he successfully escaped to the north, he faced challenges by debating on who to trust, finding a place to stay and escaping from slaveholders. Although, he meets abolitionist and shares his story about his experience as a slave in the south. It created an awakening for slaves since he was one of the first slaves that wrote a biography of his life even though slaves were expected to be uneducated. He moved down South to get closer to the racial tensions in America and get inspired. That is when he decided to write another one of his best sellers, The Fire Next Time, this novel showed the readers what it was like to live as an African American. As it also offered the White race a view of themselves through the eyes of an African American. This was one of his most powerful novels, selling over one million copies and making the best sellers list; alongside Nobody Knows My Name. Shortly after Baldwin moved back into the United States, he was a huge hit with still a ton of inspiration inside of him and more he wanted to say about America and slavery; he was even on the cover of Time Magazine
FINEWEB-EDU
Page:United States Statutes at Large Volume 39 Part 1.djvu/213 192 SIXTY-FOURTH CONGRESS. Sess. I. Ch. 134. 1916. ulso course of military tra` as a minimum for its physically lit msm students, which course w en entered upon b(y any student shall, as regards such student, be a prerequisite for gra uation, estab- Pmm and at such §r)1s(tqi%1;i1onr1oipe or morsl units oi tllins) R esery)e pmhsh A _ cers rainm orps: r at no suc unit s a e esta — am my lished 0; rlsalintgxiod at;1any1s(pch’ institution pntilhan officer of th; °°¤“*"°"· aa§§S?§L. $5 SSE? a13t§a0’f.%?u°3§£`n€a‘I‘tn3‘.§¥ T _ struction at least one hundredvphysically fit male students. b,°{,',§$l'b,f,L'“'"j”‘ °° Sec. 43. The Secretary of ar is hereby authorized to prescribe R standard courses of theoretical and practical military training for °‘*“°°'“'““‘ units of the Reserve Officers’ Training orps, and no unit of the senior division shall be organized or maintained at any educational institution the authorities of which fail or neglect to adopt into their curificulum the; péescribed lcourses of mihtaiiy for the senior vision or 0 evote at east an average o thee ours per week per academic year to such military tra.ining· and no imit of the 'unior division shall be organized or maintained, at any educational iiistitution the authorities of which fail or_neglect to adopt into their cur- the upiéescribed oourses of militaiy for the junior vision, or evote at east an average o thee ours per week per _ academic year to such milit training. h ,§{,;,,g,',md _ Sig:. 44. to B{1o1e;·be1·(ship infthe Reserve OBicers’ Train- D wi - mg orps s a e it to stu ents o institutions in which units of such corps may be established who are citizens of the United States, who are not less than fourteen years of age, and whose bodily condition indicates that they are physically fit to perform military mf duty, or will be so upon arrival at military e. cm ,_,‘§;.,,‘}f,s,A{,g"g‘f °“" Sec. 45. The President is hereby authorizgd to detail such numbers of officers of the Army, either active or retired, not above the grade of colonel, as may be necessary, for duty as professors and assistant professors of m1htar§ science and tactics at institutions where one Limimm or more units of the eserve QfIicers’ Tra1n1n§Co s are maintained; but_the total number of active officers so etailled at educational mstitutions shall not exceed three hundred, and no active officer me sttsinietmsdtnottazztztiran amrirzozedruics . _ _ ir officers s t ' uaider the provisions of this section without their il:onIs(ent.6 lgetirgd oh cers below the grade of lieutenant colonel so detailed shall receive the fuway and_a lowances of their grade, and retired officers above m;,·,,,,, ,,,_,,,;,,°,' °m_ the gr e of major so detailed shall receive the same pa and allow- ~ *·¤¤¢¤r¤ ist apes; as a retpged mtajorhwpuld lseclegve snder a like detail}? No detail o officers on e ac ive s o the egu ar Army under the provisions of this section shall extend for more than f mggmls of GMM] inS;?tC·t‘i6~ This Pmsident is h9¥‘€l2Y ¤\t}l·lla01‘l:1e1lly:<? rdetail for, duty at u ions w_ ere one or more units o t R 015 ’ ‘ ' Qorps are maintained such number of enllistsdegefn, eitlllg altzltliirreugg ilstpgdeoguorfl flgegugar Army Reserve, asl hsii may deem necessargii ac ive noncommissione d t 'l uuigibsz seamen; got e$ed£1ve hundred, and all active nonclimhligsililned blficgefshiso etai s _ be additional in their res ective ades to thos - . . ST e other Retired mem wise authorized for the Arm. Retir l' '“°“` the Regular Army Reserve sh ll t be dell mcln Or m°mb°” Of _ _ _ a D0 e e. h ‘ · ggcgixli iiigggl W1th0\:;3 tlloeir consent. Wlgleg soulletlsliilecll liiZ;1;ii§1i I§u__0mmMqmP_ SEC 47 Thfpgy ant a oxysssces. I '¤¤¤¤, ¤¤¤— : ·, ecm ME 0_ B1`, }111d61' such regulations as he may prescribe, is hereby authorized to issue to institutions at which Ong or more units of the Reserve Officers’ Trainin Co ‘ ‘ d . _ g FPS are maintame SH3; lmbhc °£umalS> *“`mS¤ umfwmsy °Q¤1P¤1BHt, and means of transpo a ion as e may deem necessary. and to forage at the expense of
WIKI
mirrorless camera Noun * 1) A digital camera which, in contrast to DSLRs, does not use a mirror in order to ensure that the image presented to the photographer through the viewfinder is identical to that taken by the camera.
WIKI
Talk:Leland Isaacs Sr. References are available There are references available: Peaceray (talk) 17:08, 6 March 2022 (UTC) * Leland "Atta" Isaacs Sr. -wiki - Google Search * Leland "Atta" Isaacs Sr. ("slack key" OR "Hawaiian") - Google Book Search * Leland "Atta" Isaacs Sr. - Google Scholar
WIKI
Afghan War Casualty Report: July 12-18 at war The following report compiles all significant security incidents confirmed by New York Times reporters throughout Afghanistan from the past seven days. It is necessarily incomplete as many local officials refuse to confirm casualty information. The report includes government claims of insurgent casualty figures, but in most cases these cannot be independently verified by The Times. Similarly, the reports do not include Taliban claims for their attacks on the government unless they can be verified. Both sides routinely inflate casualty totals for their opponents. At least 92 pro-government forces and 45 civilians were killed during another bloody week of fighting in Afghanistan. The deadliest of the attacks took place in Badghis Province, where 46 Afghan commandos who had been planning a raid on a Taliban prison ended up near the house of the Taliban shadow governor in the Aab Kamari District, where both sides fought for seven hours. Thirty-five commandos and four civilians were killed; four others were taken prisoners by insurgents. Elsewhere, in Nangarhar Province, nine people were killed when a child carried out a suicide attack at a wedding party in Pachiragam District. Among those killed was Malik Tor, a pro-government militia commander, and eight civilians, including a child. Fourteen others were wounded. On Saturday, Sgt. Maj. James G. “Ryan” Sartor, a Special Forces company sergeant major, was killed as a result of injuries sustained from enemy small-arms fire during combat operations, the American military announced. [Read the Afghan War Casualty Report from previous weeks.] July 18 Kandahar Province: 11 people killed The Taliban used two vehicles laden with explosives to attack police headquarters in Kandahar City. Suicide bombers attempted to enter the headquarters, but they were shot and killed by security forces. Two police officers and nine civilians were killed, while 89 people, including four women and 11 children, were wounded. Four trucks parked in the vicinity of the clash were also destroyed, and the explosion shattered the doors and windows of nearby houses. July 17 Baghlan Province: one police officer killed The Taliban shot and killed a police officer in the Chehel Kapa village of Doshi District, using a pistol with a suppressor. They seized the officer’s weapon afterward. July 17 Kunduz Province: one pro-government militia member killed The Taliban shot and killed one pro-government militia member on Abdul Raouf Street in Khan Abad District, seizing his weapon. July 17 Herat Province: three civilians killed A motorcycle hit a roadside bomb in the du Juee village of Pashtun Zarghon District, killing three members of a single family, including the father, mother and child, who were traveling from Tulak District. July 17 Kunduz Province: one civilian killed A bomb attached to a bicycle exploded in the Third Police District of Kunduz City, the provincial capital, killing one civilian and wounding four others. July 17 Helmand Province: one police officer killed The Taliban attacked police who were patrolling in Greshk District center, killing one and wounding two others. July 17 Ghazni Province: two soldiers killed While visiting security outposts in the Qara Bagh District, Abdul Mobin, the commander of the Third Brigade of the Afghan army, and one of his bodyguards were killed in an insider attack. July 17 Sar-i-Pul Province: five children killed Five children between the ages of 8 and 12 were playing with a mortar shell left behind from previous battles in the Imam Jafar village of Sar-I-Pul City, the provincial capital, when it exploded, killing all five. July 16 Kabul Province: one member of the security forces killed General Abdul Ghafar, a senior member of the Afghan President’s Protection Services, was wounded by an explosion in the Qala-i-Zaman Khan area of Kabul, the capital, several days ago. He died of his wounds. July 16 Zabul Province: four civilians killed The Taliban fired several rockets into a bazaar in the center of Shajoy District, killing four people. July 16 Badghis Province: 35 Afghan commandos and four civilians killed During a raid on a Taliban prison near the house of the Taliban shadow governor in Aab Kamari District, 35 commandos and four civilians were killed. Four others were taken prisoner by insurgents. Local authorities said that 30 Taliban fighters were killed and 50 others were wounded. July 16 Khost Province: one civilian killed A group of Taliban fighters attacked a security outpost in the Borgai area of Dwamonda District. Before the attack was repelled, a vehicle was targeted, killing one civilian. July 16 Badghis Province: two civilians killed Afghan commandos carried out a night operation in the Minaqol village of Aab Kamari District. Two civilians and, according to authorities, 20 members of the Taliban were killed during the operation. July 16 Herat Province: two police officers killed The Taliban shot and killed two police officers in a bazaar in the center of Rabat e Sangi District, seizing their weapons. July 15 Badakhshan Province: one soldier killed The Taliban attacked two security outposts in the village of Gardana Ahmad and the bazaar in Raghistan District, where clashes continued for three hours. One soldier was killed and four local police officers were wounded, while local authorities claimed five Taliban fighters were also killed. July 15 Herat Province: one soldier killed One soldier was killed and six others were wounded during military operations in various districts of Herat Province. Local authorities claimed that 50 Taliban fighters were killed. July 15 Faryab Province: five members of the territorial army killed The Taliban attacked a security outpost in the village of Nazir Abad in Pashtun Kot District, killing five members of the territorial army. Local authorities claimed that two Taliban members were also killed. The Taliban were eventually pushed back from the area. July 15 Logar Province: two children killed An American drone targeted a gathering of the Taliban in the Kamal Khail area of Pul-e-Alam, the provincial capital, killing 22 Taliban fighters and wounding five others, according to local authorities. Two children who were playing in the area were also killed. July 14 Uruzgan Province: six civilians killed Six civilians were killed during a joint raid by Afghan and American special operation forces in the Khalij area of Gizab District. The Taliban took shelter in a home while fighting the security forces. Local authorities claimed that eight Taliban fighters were killed in the clashes. Several children and the owner of the house in which the Taliban took shelter were among the six killed. July 14 Badakhshan Province: One pro-government militia member killed A roadside bomb hit a vehicle carrying pro-government militia members in the Darayem District of Badakhshan Province, killing one commander and wounding three others. July 13 Sar-i-Pul Province: one pro-government militia member killed Mohammad Reza, a pro-government commander, was taken prisoner by the Taliban while traveling in the Gosfandy District. He was killed the same day by insurgents. July 13 Badghis Province: one soldier killed One soldier was killed and another was wounded when they were hit by a Taliban rocket while patrolling outside their base in Bala Murghab District. July 13 Badghis Province: four security forces killed Two Taliban members assassinated a police officer in the main roundabout of Qala e Naw City, the provincial capital. The attackers escaped to a building in the city. Four members of the security forces, including two police officers and two members of the National Directorate of Security, Afghanistan’s intelligence agency, were killed in clashes with the attackers, both of whom were eventually arrested. July 13 Jawzjan Province: three police officers killed The Taliban attacked the center of Qarqin District, where clashes continued for several hours. Three police officers were killed in the clashes. July 13 Faryab Province: one soldier killed The Taliban attacked a security outpost in Hazara Qala village of Pashtun Kot District, killing one member of the territorial army and wounding two others. Local authorities claimed that two Taliban members were killed. July 13 Baghlan Province: five police officers killed The Taliban attacked the center of Gozargah-e-Noor District, where reinforcements arrived in time to push back the Taliban. After leaving the area reinforcements were ambushed by the Taliban and a roadside bomb hit a Humvee, killing five police officers and wounding two others. July 13 Kandahar Province: two police officers killed A police truck was hit by a roadside bomb as it was transporting drinking water to an outpost in Mianashin District. Two police officers were killed and another was wounded in the explosion. July 13 Kunduz Province: one police officer killed A local police commander was killed during a military operation in Qurghan Tepa area of Imam Sahib District. Five villages were cleared of Taliban fighters in the district. July 13 Ghor Province: one police officer killed One police officer was killed and two others were wounded during a military operation in Ona village, in the Taiwara District. Local authorities claimed that nine Taliban members were killed during the operation. July 13 Faryab: American service member killed Sgt. Maj. James G. “Ryan” Sartor, a Special Forces company sergeant major, was killed as a result of injuries sustained from enemy small-arms fire during combat operations, the American military announced. July 12 Faryab Province: 12 security forces killed The Taliban responded to an ambush attack by the territorial army in the village of Kawliyan in Belcheragh District, killing 12 soldiers and wounding seven others. July 12 Nangarhar Province: nine people killed Malik Tor, a pro-government militia commander, and eight civilians including a child were killed in a suicide attack carried out by a child in the wedding party of the nephew of the commander in Pachiragam District. Fourteen others were wounded, some of whom are in critical condition. July 12 Badghis Province: one police officer killed Mohammad Akbar Faizi, the police chief of Qades District, died of wounds sustained from a clash with the Taliban 10 days earlier. July 12 Jowzjan Province: three police officers killed The Taliban attacked Qarqin District, where fighting continued for several hours. Three police officers were killed in the clashes. Additional forces were sent to push back the Taliban. July 12 Khost Province: two security forces killed A Taliban Red Unit attacked the police headquarters of Mosa Khail District in Khost City, killing one police officer and one soldier. Local authorities claimed that 16 members of the Taliban were killed and 13 others were wounded, while government forces seized various Taliban weapons and military equipment from the Taliban. Reporting was contributed by the following New York Times reporters: Jawad Sukhanyar from Kabul, Najim Rahim from Mazar-e-Sharif, Taimoor Shah from Kandahar, Asadullah Timory from Herat, Zabihullah Ghazi from Jalalabad and Farooq Jan Mangal from Khost.
NEWS-MULTISOURCE
Talk:Dizraeli --Blackfeather (talk) 02:52, 24 April 2017 (UTC)Blackfeather (added the Huck Magazine article).
WIKI
Fritz Plaumann State Park The Fritz Plaumann State Park (Parque Estadual Fritz Plaumann) is a state park in the state of Santa Catarina, Brazil. It protects one of the last remnants of seasonal deciduous forest in the state on the shore of the reservoir of the Itá Hydroelectric Power Plant. Location The Fritz Plaumann State Park is in the municipality of Concórdia in the west of Santa Catarina. It has an area of 741 ha. It is named after a German scientist who lived in the region. Fritz Plaumann (1902–94) gathered more than 80,000 specimens of insects during his long career, now exhibited at the Fritz Plaumann Entomological Museum (Museu Entomológico Fritz Plaumann) in Seara. The collection is the largest in Latin America and one of the largest in the world. The park is on the north shore of the lake formed by the dam of the Itá Hydroelectric Power Plant on the Uruguay River, built between 1990 and 2000. About 1/3 of the park is an island in the reservoir. The Queimados River rises above the city of Concórdia and its flooded mouth on the Uruguay River forms the western boundary of the park. The park contains the Lajeado Cruzeiro, a watercourse that has its sources around the park and its mouth near the flooded area of the Queimados River. The park's buffer zone is a 500 m strip around the park, extending to include small hydrographic basins that drain into the park. There are about 70 farms in the buffer zone growing various crops and raising dairy cattle, pigs, poultry and sheep. History Studies for implementation of conservation units to compensate for areas flooded by the Itá Dam began in 1990, and in 1994 an ecological station was defined with two parts, one in Santa Catarina and the other in Rio Grande do Sul. In 1996 the portion in Rio Grande do Sul was recategorized as the Teixeira Soares Municipal Nature Park, while the Santa Catarina portion remained an ecological station. Between 2000 and 2001 the management plan was prepared for what would be the Barra do Queimados Ecological Station. In 2003 public consultation were held on changing the management category and the name. The Fritz Plaumann State Park was created by state decree 797 of 24 September 2003, the first and only conservation unit protected seasonal deciduous forest in the State of Santa Catarina. It was created as environmental compensation for the Itá Hydroelectric Power Plant. The objective is to conserve and restore biodiversity of the Uruguay River Forest by generating and socializing knowledge and experience. Land ownership has been fully regularized. The park has received various prizes for its environmental management work. The ecological station management plan was revised and adapted in 2003 to 2004 to fit the state park category. The management plan was approved by FATMA ordinance 082/05 of 13 October 2005. The park was opened to the public in November 2007. A revised management plan was approved in November 2014. The park is managed by the Fritz Plaumann State Park Co-Management Team (ECOPEF), a civil society organization created in 2007, in cooperation with FATMA, the Santa Catarina environmental agency. Environment The park fully protects a remnant of Uruguay River Forest, a seasonal deciduous forest. The forest has typical plant species such as canafístula (Pelthoporum dubium), grápia (Apuleia leocarpa), cedar (Cedrela fissilis) and angico-vermelho (Parapiptadenia rigida). Many of the species of fauna in the park are threatened by hunting and deforestation. They include the tufted capuchin (Sapajus apella), lowland paca (Cuniculus paca), southern tamandua (Tamandua tetradactyla), red brocket (Mazama americana), Azara's agouti (Dasyprocta azarae), dusky-legged guan (Penelope obscura), the frog Vitreorana uranoscopa and snakes such as Bothrops neuwiedi and Spilotes pullatus. The main threats to the environment of the park are invasive forest species such as Hovenia dulcis and Hedychium coronarium, pollution from waste dumped into the Queimados River, and predatory hunting and fishing in and around the park. Facilities As of 2016 the park was open to the public on Wednesdays, Thursdays and Fridays from 14:00 to 17:00, on Saturday from 9:00 to 17:00 and on Sunday from 13:00 to 18:00. The visitor center has an exhibition room with a model and multi-themed panels on the nature and biodiversity of the area. It also contains a study hall, auditorium and housing for researchers. Several trails start from the visitor center. The 140 m Marrequinhas Trail is wheelchair accessible, with a theme of reservoir ecology, rivers and ecological relations in a fluvial environment. The 1460 m Lajeado Cruzeiro Trail takes one hour and a half for a guided walk, and has a theme of water resources and pollution problems. The 2440 m Mirante (Lookout) Trail is of moderate difficulty and takes two hours. Its theme is understanding of the hydrographic basins and the transformation of the landscape by human activity. The 2160 m Canafístula Trail is moderate to difficult and takes two hours. Small groups are given guided tours. The theme is basic concepts of ecology and biodiversity of the Uruguay River Forest.
WIKI
Worlds of David Darling Encyclopedia of Science     Home > Encyclopedia of Science Ambartsumian's Knot Arp 150 and Ambartsumian's Knot Arp 150 (The Guitar). Image credit: Canada-France-Hawaii Telescope A dwarf elliptical galaxy in the constellation Ursa Major located at the end of a what appears to be a bridge of matter extending from the elliptical galaxy NGC 3561B (R.A. 11h 11m, Dec. +28° 42'). The latter is interacting with the nearby spiral galaxy NGC 3651A giving rise to a number of tidal tails and tidal dwarf galaxies. The entire system is called Arp 105 or, colloquially, The Guitar, because of its overall shape. The enormously long tidal tail visible to the left (north) of NGC 3651A in the accompanying photo, Arp 105N, stretches out for 100,000 parsecs (325,000 light-years) from the parent galaxy. Ambartsumian's Knot lies at the end of a shorter tail called Arp 105S. Arp 150 lies close to the center of the rich cluster Abell 1185, which lies about 400 million light-years away. Related category    • GALAXIES
ESSENTIALAI-STEM
Drupal admin: displaying user roles on the account edit page Submitted by Frederic Marand on Wed, 2005-08-24 08:52 Some sites may wish to display to users what their roles are. Here is a small module allowing just this. Drupal user roles are typically seen only by the administrator when editing a user's account. As of 4.6.3, there seems to be no simple way to have them displayed to user when they access their own information in a theme- and theme-engine-independent way (a PHPtemplate-dependent trick is explained on drupal.org). So the simplest way appears to be a module implementing hook_user. This can be added to an existing module, or coded on its own. In this case the code is supposed to be implemented as csroles.module, meaning it is in a module of its own that has to be activated from http://www.example.com/admin/modules <?php // $Id: csroles.module,v 0.1 2005/08/24 00:41:00 FG Marand $ // Sample code due for the upcoming OSInet helpdesk support module for Drupal function csroles_help ($section = '')   {   $output = '' ;   switch ( $section)     {     // The description found on the admin/system/modules page.     case "admin/modules#description":       $output = t ("Allows for the display of an user's roles on their profile page") ;       break;     // The module's help text, displayed on the admin/help page     // and through the module's individual help link.     case "admin/help#customersupport":       $output = t ("Allows for the display of an user's roles on their profile page") ;       break ;     }   return $output;   } function csroles_user ($op, &$edit, &$user, $category = NULL)   {   $ret = NULL ;   switch ( $op)     {     case 'view':       {       $ret =  array ('account' => t('Personal information'))     ;       break ;       }     case 'categories':       {       $ret = array         (         array (           "name"   => "csroles",           "title"  => "user roles",           "weight" => 1)           ) ;       break ;       }     case 'form':       {       // When user tries to edit his own data:       if ($category == 'csroles') // default: account         {         $ret = array           (           array             (             'title' => 'You have been assigned roles:',             'data'  => '<ul><li>' . implode ('</li><li>', $edit ['roles'])                      . '</li></ul>',             'weight'=> 0,             )           ) ;         }       }     }   return $ret ;   } ?> For site admins wishes to display the same information in a block without adding a module to an already overloaded site, there is a shorter way: create a custom block in http://www.example.com/admin/block/add, setting the input filter to PHP code, and type: <?php global $user ; print ( "<ul>\r\n") ; foreach ( $user->roles as $role)   {   print ( "  <li>$role</li>\r\n") ;   } if ( $user->uid == 1)   print ( "  <li><em>sysop</em></li>\r\n") ; print ( "  </ul>\r\n") ; ?> Tagged for , , and in Technorati. It's quite simple: just test for that string in the foreach loop: <?php global $user ; print ( "<ul>\r\n") ; foreach ( $user->roles as $role)   {   if ( $role != 'authenticated user') // mask that role     {     print ( "  <li>$role</li>\r\n") ;     }   } if ( $user->uid == 1)   {   print ( "  <li><em>sysop</em></li>\r\n") ;   } print ( "  </ul>\r\n") ; ?> Due to the menu inheritance system, that list would basically be infinite, or very large, since any path with additional components to a valid path is also a valid path. So you probably want to only display part of that list of paths (pages). The question then becomes : exactly which pages would you display in that list ? If it's nodes, it can still be a very long list, as you can have up to 4 billion nodes on a Drupal 6 site. The question is much too wide: which part of that near-infinite number of do you want to display ? You just can not list every possible pages a user can access; the entire universe would not be enough to hold the display since any path beyond an allowed one is allowed too. To understand why this list is practically infinite, imagine user is allowed to see example.com/foo and no specific code handles any path longer than example.com/foo (i.e. no menu entry for foo/bar, for example). On example.com he will then be allowed to access any path matching regex /^foo\/\.*/ Now, why is this not infinite ? Basically because you just cannot send an infinite length URL to a server. Being infinite, it could not exist itself within a finite universe. But you get an idea of the available number of available paths.
ESSENTIALAI-STEM
Solved microsoft access web html5 pages Posted on 2014-10-22 4 668 Views Last Modified: 2014-12-05 I am in the process of convincing my colleagues to build a CMS database to store all our files / customer content etc. The challenge I have today is that due to confidentiality of the data in this proposed database it can't be stored outside of either: (a) Our work Network or (b) Our local laptops I have started creating the database using forms to display the results but I wanted to use the richer functionality of HTML5 to query the database and render the results.   In this way I could: a) Store a HTML5 file which is like a search report that lists all the content based on filters etc selected by user b) Store the underlying access database I don't wish to use "Data Access Pages" because I believe those seem very limited visually. I don't wish to use Forms because once again I am finding they tend to be very archaic in the appearance especially once we start nesting the forms. I basically want to leverage all the benefits of 'client side' web programming but the benefit of database access that is typically the domain of server side programming like PHP.  Yet I can't use PHP, ASP etc because everything has to stay within the 'walls' of the network or laptop. I found a JavaScript library that claims to be able to connect to an Access DB even if the end user doesn't have MS Access installed! I guess you store the javascript files in same directory as the DB - not sure if it works. Anyway, wanted to know what thoughts people have.  The reason I suggest MS Access is that it is normally installed by default on everyone's laptop and if the network solution (no.1 choice) is not possible, at least I can set up some kind of synchronization feature that allows a localized version of that database that can be queried using HTML5 search / report features. The option of getting a server at work or commissioning a system is not going to be possible until I get a working solution that proves the value and also gets the traction / usage by the rest of my colleagues. Many thanks if you got this far! :-) 0 Comment Question by:hennanra3 • 2 4 Comments   Author Comment by:hennanra3 ID: 40396321 Sorry - just to add we won't store files on the database - rather the database will link to files stored on the network or local laptop (if network not possible).   We are using something called mobile docs - similar to dropbox where we share all content so this is why even the local solution is possible but the network one is preferred of course. Also I am looking for something that doesn't require the users to do lots of configuration (e.g. setting up ODBC, installing a .NET application etc) on their laptops as I know they won't do that - the fewer barriers - the greater adoption / sponsorship this will garner.   Also it puts more roadblocks potentially if IT decide to upgrade or some users don't have admin rights etc etc. Thanks! 0   LVL 32 Expert Comment by:Big Monty ID: 40397019 I'd highly recommend against using MS Access, it's slow and doesn't handle loads of traffic very well. Also, instead of re-inventing the wheel here, have you thought about using a 3rd party system? MS SharePoint would be ideal for this situation, as it allows you store the files in a secure manner, as well allows you to customize the privileges for each user quite easily. The money spent on SharePoint would be vastly less than the man hours that would be spent on building it from the ground up. you may also want to look into Kentico, another document library system: http://www.kentico.com/Product/All-Features/Content-Management/Document-Management 0   Author Comment by:hennanra3 ID: 40397282 Hi there, thanks for responding but I put down reasons for not using a 3rd party system in my post.  At this stage I am looking only for alternatives that allow a file based approach like MS Access if alternatives are suggested, although I am quite confident there is no alternative that comes close based on the limitations I have put (happy to be proven wrong of course). I don't have the ability to implement a sharepoint system for now and this is something that is a tactical system that will work functionally. I have used MS Access on network before and for the volumes we are talking about (records in the hundreds / thousands) and the concurrent users (less than 3 at a time max for a given record set) is not such to warrant a strategic system yet. Anyway, I want to avoid going for reasons for using MS Access as I think they are well stated, I also know sharepoint and server based CMS approaches but once again it either requires a company based server (we won't get for political reasons) or an external server (we cannot use because it needs to be within the network or laptop). Thanks. 0   LVL 11 Accepted Solution by: Murfur earned 500 total points ID: 40399172 Can you install XAMPP or WampServer on a laptop? Or Visual Studio Express for Microsoft flavoured coding. These are all local installations of a server web hosting environment, typically used by developers for testing, but there is nothing to say it can't be used to host live data and you can also get them to talk to the Access database. Once up and running then all the other workstations can access the data via pointing their browser at the IP of the hosting machine and they will see the data laid out however you want. Also has the advantage of allowing you to build a proper UI for interactive pages like a search facility, result pagination etc. rather than presenting static pages with a lot of page scrolling to see the data 0 Featured Post Is Your Active Directory as Secure as You Think? More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more. Question has a verified solution. If you are experiencing a similar issue, please ask a related question This article describes how to create custom column layout styles for Bootstrap. The article uses 5 columns to illustrate the concept, but the principle can be extended to any number of columns. Find out what you should include to make the best professional email signature for your organization. The viewer will receive an overview of the basics of CSS showing inline styles. In the head tags set up your style tags: (CODE) Reference the nav tag and set your properties.: (CODE) Set the reference for the UL element and styles for it to ensu… Learn how to create flexible layouts using relative units in CSS.  New relative units added in CSS3 include vw(viewports width), vh(viewports height), vmin(minimum of viewports height and width), and vmax (maximum of viewports height and width). 911 members asked questions and received personalized solutions in the past 7 days. Join the community of 500,000 technology professionals and ask your questions. Join & Ask a Question Need Help in Real-Time? Connect with top rated Experts 22 Experts available now in Live! Get 1:1 Help Now
ESSENTIALAI-STEM
Actavis Challenges Suboxone Film Patent - Analyst Blog Actavis plc ( ACT ) is looking to get its generic version of Reckitt Benckiser's Suboxone Sublingual Film (buprenorphine hydrochloride and naloxone hydrochloride sublingual film 2 mg/0.5 mg and 8 mg/2 mg) approved in the U.S. Suboxone Film is approved for the maintenance treatment of opioid dependence. Actavis has submitted an Abbreviated New Drug Application (ANDA) with the U.S. Food and Drug Administration (FDA) for its generic version. Meanwhile, Reckitt Benckiser Pharmaceuticals, Inc., RB Pharmaceuticals Limited and MonoSol Rx, LLC have filed a patent infringement lawsuit against Actavis. The filing of the lawsuit within the stipulated time period under the Hatch-Waxman Act ensures that the FDA cannot grant final approval to Actavis' generics for up to 30 months or the court's decision, whichever is earlier. Actavis believes it may be first to file an ANDA for a generic version of Suboxone Film which means it would be entitled to 180 days of generic market exclusivity. According to IMS Health, U.S. sales of Suboxone Film (2/0.5mg and 8/2 mg) were about $1.2 billion for the 12 months ending Aug 31, 2013. While Actavis continues to work on driving generic product sales, the company is also working on strengthening its branded product portfolio. Earlier this month, Actavis acquired Warner Chilcott which has led to the creation of a leading global specialty pharmaceutical company with combined annual revenues of about $11 billion. The combined company holds the third position in the U.S. specialty pharmaceutical market with annual revenues of about $3 billion. Actavis currently carries a Zacks Rank #2 (Buy). At present, Akorn Inc. ( AKRX ), Mylan ( MYL ) and Dr. Reddy's Laboratories ( RDY ) also look attractive. While Akorn is a Zacks Rank #1 (Strong Buy) stock, Mylan and Dr. Reddy's are Zacks Rank #2 stocks. ACTAVIS PLC (ACT): Free Stock Analysis Report AKORN INC (AKRX): Free Stock Analysis Report MYLAN INC (MYL): Free Stock Analysis Report DOCTOR REDDYS (RDY): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Page:Curiosities of Olden Times.djvu/239 A Mysterious Vale Probably they had not seen the description of the discovery made by Björn and Helgi in 1654. They allude to the expedition of these clergymen, but give one of them a wrong name, and speak of their journal as vague and confused, which it is not. The account of the expedition of the two clergymen, Björn and Helgi, written in the same year that it was undertaken, is now, in Icelandic, in the British Museum. It is full of interest, and sufficiently curious to deserve attention. Björn and Helgi were brothers-in-law. In the summer of 1654, they met at Nes, where they had some conversation about Thorir's dale, and Helgi told his brother-in-law that he was convinced that either the valley itself, or some traces of it, could be seen by any one who would ascend the highest ridge of Geitlands Jökull. In consequence of this conversation, Björn, attended by two men, rode to Húsafell, where lived his sister and brother-in-law, and persuaded Helgi to accompany him on the glacier, Húsafell lies just under Ok. They started at an extremely early hour on St. Olaf's Day (28th July), without mentioning their intention to any one. This was on Thursday. They soon turned from the highway, following the west side of a cleft that enters a trunk-ravine near Húsafell, and then, reaching the north side of Ok glacier, they halted. There was a young man, Björn Jónsson by name, with the two 227
WIKI
Ultrasound imaging of the trapeziometacarpal articular cavity to investigate the presence of intraarticular gas bubbles after chiropractic manipulation Allan R. Jones, Christopher J. Yelverton, Charmaine Bester Research output: Contribution to journalArticlepeer-review 7 Citations (Scopus) Abstract Objective: The purpose of this study was to investigate the presence of intraarticular gas bubbles in the trapeziometacarpal joint cavity after chiropractic manipulation with audible cavitation and to assess the state of the gas bubbles after a 20-minute refractory period. Methods: This investigation included 18 asymptomatic male and female participants between the ages of 21 and 26 years. High-resolution (15 MHz) sonograms of the trapeziometacarpal articular cavity were obtained by an experienced musculoskeletal ultrasonographer at 3 intervals: premanipulation, within 30 seconds postmanipulation, and at 20 minutes postmanipulation. The sonograms were saved as digital copies for subsequent reports that were correlated with reports compiled during dynamic visualization of the articular cavity. Data were extracted from the reports for analysis. Results: The premanipulative sonograms showed that 27.78% of joints contained minute gas bubbles, also known as microcavities, within the synovial fluid before the joint was manipulated. The remaining 72.22% of joints contained no intraarticular microcavities. All of the postmanipulative sonograms revealed numerous large conspicuous gas bubbles within the synovial fluid. The postrefractory sonograms showed that, in 66.66% of the synovial fluid, gas bubbles were still visible, whereas the remaining 33.34% had no presence of gas bubbles or microcavities, and the synovial fluid had returned to its premanipulative state. Conclusion: The findings of this study suggest that synovial fluid may contain intraarticular microcavities even before a manipulation is performed. Numerous large intraarticular gas bubbles are formed during manipulation due to cavitation of the synovial fluid and were observed in the absence of an axial distractive load at the time of imaging. In most cases, these gas bubbles remained within the joint for longer than 20 minutes. Original languageEnglish Pages (from-to)476-484 Number of pages9 JournalJournal of Manipulative and Physiological Therapeutics Volume37 Issue number7 DOIs Publication statusPublished - 1 Sept 2014 Keywords • Chiropractic Manipulation • Manipulation • Synovial Fluid • Ultrasonography ASJC Scopus subject areas • Chiropractics Fingerprint Dive into the research topics of 'Ultrasound imaging of the trapeziometacarpal articular cavity to investigate the presence of intraarticular gas bubbles after chiropractic manipulation'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
User:MANOJ TIRKI/sandbox MANOJ TIRKI MEMBER OF CAPF DOB : 29/01/1993 BIRTH PLACE COOCHBEHAR IN WEST BENGAL
WIKI
Wikipedia:Articles for deletion/Emrah Yucel The result was keep. (non-admin closure) Mkativerata (talk) 20:50, 25 May 2010 (UTC) Emrah Yucel * – ( View AfD View log • ) BLP with no reliable third party sources confirming notability. Autobiography. Fiftytwo thirty (talk) 01:23, 12 May 2010 (UTC) Appears to be notable, although needs editing. Nomination Withdrawn. --Fiftytwo thirty (talk) 00:18, 25 May 2010 (UTC) * Delete - I can't find any reliable sources that indicate notability via a Google search, but it's possible I'm not looking in the right place. If someone can find some sources, then perhaps I would change my mind, but the article would need complete rewriting since it is an autobiography. P. D. Cook Talk to me! 01:37, 12 May 2010 (UTC) * Keep - Good job finding references. The autobiography issue still bothers me, as big test of notability is if someone other than the article's subject takes the initiative to create the article. Nonetheless, he seems well covered in various sources and I hope someone is willing to do some rewriting of this article, or at the very least, stub it down. P. D. Cook Talk to me! 16:03, 19 May 2010 (UTC) Please add new comments below this notice. Thanks, Ron Ritzman (talk) 01:43, 19 May 2010 (UTC) * Delete per nom. (GregJackP (talk) 14:14, 12 May 2010 (UTC)) * Note: This debate has been included in the list of Visual arts-related deletion discussions. -- • Gene93k (talk) 14:52, 12 May 2010 (UTC) * Note: This debate has been included in the list of Advertising-related deletion discussions. -- • Gene93k (talk) 14:52, 12 May 2010 (UTC) * Note: This debate has been included in the list of People-related deletion discussions. -- • Gene93k (talk) 14:52, 12 May 2010 (UTC) * Keep Okay, it looks like an autobiography, but we're talking about notability. Emrah Yücel created posters for many Hollywood films (Kill Bill, Frida, etc.), see Today's Zaman, Bak Magazine, Turkish Film Council, grafikerler.net. He is a recipient of the International Design Award and the Key Art Award . The COI issue should be resolved by neutral editing, not by deletion. --Vejvančický (talk | contribs) 13:04, 18 May 2010 (UTC) * Relisted to generate a more thorough discussion so consensus may be reached. * Keep — The "Turkish Film Council" seems legit and should satisfy any reality-based notability needs. The article needs to be rewritten with a heavy hand (and links) but should not be deleted. Carrite (talk) 15:33, 19 May 2010 (UTC)
WIKI
Page:Scientific results HMS Challenger vol 18 part 2.djvu/195 Rh 5. Gorgospyris eurycolpos, n. sp. (Pl. 87, fig. 5). Shell nut-shaped, rough, with deep sagittal stricture and irregular, roundish pores; two to three pairs of larger annular pores on each side of the stricture. Basal plate with four large collar pores. Feet eight, short, triangular, vertical, about one-fourth as long as the shell. Dimensions.—Shell 0.08 long, 0.13 broad; feet 0.02 long. Habits.—Central Pacific, Station 270, depth 2925 fathoms. 6. Gorgospyris liriope, n. sp. (Pl. 87, fig. 6). Shell nut-shaped, thorny, with sharp sagittal stricture and irregular, roundish pores. Two pairs of larger annular pores on each side of the ring. Basal plate with two very large circular pores only. Eight to ten short feet vertical, about one-fourth as long as the shell, with an elegant papillate knob at the distal end. Dimensions.—Shell 0.07 long, 0.1 broad; feet 0.02 long. Habitat.—South Atlantic, Station 323, depth 1900 fathoms. 7. Gorgospyris lamellosa, n. sp. Shell nut-shaped, tuberculate, with subregular circular pores. Basal plate with four larger and four alternate pairs of smaller pores. Feet fifteen to twenty-five, broad, lamellar, vertical, truncate, about as long as the shell, of irregular size and form, very variable. Dimensions.—Shell 0.07 long, 0.1 broad; feet 0.05 to 0.1 long. Habitat.—Fossil in Barbados. Definition.—Feet divided or branched. 8. Gorgospyris schizopodia, n. sp. (Pl. 87, fig. 4). Shell hemispherical, smooth, with slight sagittal stricture and small regular, circular pores. Basal plate with four large central and a circle of small pores. Feet fifteen to twenty, broad, lamellar, confluent at the base, about as long as the shell, irregularly divided or forked. Dimensions.—Shell 0.06 long, 0.08 broad; feet 0.05 to 0.08 long. Habitat.—Western Tropical Pacific, Station 225, depth 4475 fathoms. 9. Gorgospyris thamnopodia, n. sp. Thamnospyris thamnopodia, Haeckel, 1881, Prodromus, p. 143. Shell nut-shaped, tuberculate, with deep sagittal stricture and irregular, roundish pores. Basal plate with numerous small pores. Feet twenty to thirty, slender, curved, divergent, twice to three times as long as the shell, irregularly branched. Dimensions.—Shell 0.08 long, 0.12 broad; feet 0.15 to 0.25 long. Habitat.—Indian Ocean (Madagascar), Rabbe, surface.
WIKI
5 Expert Steps for Refactoring Legacy Code Dayana Mayfield Dayana Mayfield Engineering Legacy systems can be impossible to integrate with. They can make CI/CD tooling a nightmare. And, they can put your organization at risk of major cybersecurity failures, system outages, and user frustration. Refactoring legacy code is an important modernization strategy that dev teams use to update an entire system or application, or just its most risk-prone parts. Your code might be a big, jumbled mess of dependencies. You might be struggling to wrangle a monolith. Or maybe, your code was built using a framework that, no matter how hard you try, just isn’t the right fit for the system. Whatever the cause, refactoring might be the best modernization approach. Keep reading to learn more about what refactoring is, how it’s done, and how to choose the right development partner for your modernization project. What is refactoring legacy code? Refactoring legacy code is when a software development team updates the structure and architecture of outdated code, but doesn’t change the functionality. When a team adds or removes features, that is considered rewriting or rebuilding. Refactoring code is more cost-effective than rebuilding a system from scratch, but there are Why refactor legacy code (top benefits) Refactoring legacy code offers the potential to cut back on massive development expenses while paving the way for future innovation that will please customers, improve internal efficiency, or whatever else you’re hoping to achieve. • Cost savings – Maintaining legacy systems is expensive. You have to pay for the upkeep of outdated technology, and new development is often more expensive because you can’t get things done quickly. By refactoring and modernizing your code, you can cut down on unnecessary costs. • Adhere to modern best practices – Following current best practices isn’t something you do just for the sake of it. When you use modern technologies, you can attract better development talent, while keeping your current developers happy and retaining more of your staff. And when your code is modern, you can implement other best practices, like continuous deployment, to spread those advancements to other teams and be a competitive player in your market and a competitive employer. • Improve scalability – Outdated systems are prone to breakage, especially during times of heavy user load. You can improve your application’s scalability by refactoring the code—which leads to fewer system outages and customer support hassles. • Pave the way for future innovation – One of the top motivations for refactoring legacy code is to unlock organizational potential. • Improve interoperability – Outdated systems are typically not interoperable. You can’t easily integrate legacy systems with new systems, meaning you can’t implement modern apps and services. When you refactor your code, you can rearchitect the system so that it can be integrated with the platforms that matter to your organization. This, in turn, can save you hundreds of thousands of dollars, because you can integrate with other software, rather than having to build all of the new functionality you need from scratch. The bottom line is this: when your code is outdated or organized in a monolithic structure, developers can be worried about making changes and avoid them or feel frustrated with how dangerous and breakage-prone any updates are. This can affect everyone internally in your organization as well as your end users. Refactoring allows you to breathe new life into your application with code that is easier to support. Refactoring versus other modernization strategies Legacy systems need to be modernized to avoid massive business risks. But refactoring isn’t the only approach. In fact there are about 6 popular approaches available to you when modernizing legacy systems. Below, we see how refactoring stacks up against the other most popular options for modernization: Refactoring code versus rewriting code Refactoring code is a completely different process from rewriting code. When rewriting code, you’re essentially trashing all of the old code and writing it again from scratch. This can be too time-consuming and cost-prohibitive for many organizations, particularly if the system or application is complex and robust. But with refactoring, you improve the structure of the old code without changing its functionality. This is more cost-effective, but requires more of a commitment to QA testing, as there’s an increased risk of bugs and software crashes. Refactoring code versus rebuilding the system When rebuilding a system, you’re not just refactoring or rewriting old code—you’re reimagining the functionality. There’s a good chance that if your technology is out of date, so is your product strategy. You might need to reconsider all of the systems’ functionality. What features are unnecessary? What features can be removed, combined, or redesigned? What new features need to be added? What other systems should your modernized platform be able to integrate with? Depending on the nature of your software modernization project, you might refactor the code for some features, while completely rebuilding others. How to know if refactoring isn’t the right approach Can you refactor your code? Or do you need to rewrite the code or rebuild the system? These are the top signs that refactoring alone won’t be enough: • No one on your team knows how to maintain the code • The code is slow and inefficient • It’s nearly impossible to add new functionality or fix bugs • The code doesn’t function or perform how you expect • The code isn’t actively maintained and developed How do you refactor legacy code? The steps for refactoring legacy code depend on whether or not you need to modernize the entire application or make a change to just one area of the code to handle a new query. However, most organizations are looking to modernize the system as a whole so they can proactively address application risk. steps to refactor legacy code1. Audit the system’s architecture, code, and UX The first step is to audit the system. Discover how the legacy system is currently architected, review the code, and assess the feasibility of the UX. Even if you plan to only refactor a portion of your code, it’s important to not skip this step. After review, you might find that more sections need to be refactored. 2. Do deep product strategy If your system is outdated, you might have been failing to do product strategy as well. Does the system still meet user needs? Is the product roadmap current? For systems that are still actively maintained, you might not need to adjust your refactoring approach. But, if your application hasn’t undergone product strategy in months or years, then you might discover that there are so many required functionality changes that refactoring won’t be enough, and you need to rebuild the application instead. 3. Determine the new architecture Your system’s architecture should be simple, efficient, and scalable. It needs to process data efficiently today, and be ready to meet the needs of your users a year from now. The above steps should affect the new architecture that you choose. Many dev teams blanket-apply microservices as the new architecture to deal with monoliths, but microservices can cause development and testing challenges so be sure to talk with modernization experts before deciding. 4. Refactor the code During this step, you extract logic code to maintain an application’s existing functions and behaviors and then rewrite the code, using more modern frameworks and simpler approaches. If you just need to update a small part of your app, you might use the “application seams” method described in one of the expert tips below. With this method, you essentially wrap the change in a clean API so you’re not causing a trickle-down effect of bugs. 5. Run performance and QA tests With the right system architecture and refactored code, you should now be able to properly cover your application with unit tests. Write manual test cases as well as automated testing scripts for every functional unit of the product. Make sure to also have some QA testers manually explore the app in an ad hoc manner, so that they can find bugs that arise during more user flows. With refactored code, your performance tests should yield much better results. Be sure to test the performance of your app in a variety of environments, such as OS, browser, battery life, etc. You should also test the interoperability of the system. Test any one-way or two-way integrations to be sure that data is flowing as expected. 3 expert tips for refactoring code Refactoring is complex business. Keep this expert advice in mind. 1. Be mindful of behavior changes Michael C. Feathers authored the most popular book on dealing with legacy code in 2004. Although some aspects are outdated, much of the strategy mentioned is still applicable. He reminds us that whether we call something a bug fix or a new feature, what really matters is how it will affect the user experience. It’s super important to consider how refactoring your code could impact the required behaviors from users before proceeding. “There is a big difference between adding new behavior and changing old behavior. Behavior is the most important thing about software. It is what users depend on. Users like it when we add behavior (provided it is what they really wanted), but if we change or remove behavior they depend on (introduce bugs), they stop trusting us.” – Michael C. Feathers, author of Working Effectively with Legacy Code 2. Try the seam method for small refactoring fixes Kevin Ball describes a refactoring project where the team just needed to change the way user roles were created and formatted. A simple task, and yet one that was at the core of the product and led to many dependencies. He used a process that he calls “application seams” to make the change without introducing functional changes that would then affect other features. “Identify a location where you can create a clean API. This often involves ‘hoisting’ or ‘wrapping’ low-level functionality that is being accessed directly up into a higher level service or class. Next, refactor the service to create this API, introducing no functional changes. This often includes writing a bunch of unit tests for the new API. These unit tests serve the dual purpose of verifying your current implementation and making it safe to introduce changes in the layers underneath the API. Finally, update all calling code to use the new API. This should also introduce no functional changes, and to the extent possible, be validated by type checking and unit tests.” – Kevin Ball, Engineering Manage at Humu refactoring code safety quote3. Separate refactoring from other development for a safer approach Chris Birchall reminds us that refactoring shouldn’t be dangerous. So long as we’re not taking on too many changes or combining refactoring with other code changes, we should be able to safely refactor. “When performed correctly, refactoring should be perfectly safe. You can refactor all day long without fear of introducing any bugs. But if you’re not careful, what started out as a simple refactoring can rapidly spiral out of control, and before you know it you’ve edited half the files in the project, and you’re staring at an IDE full of red crosses. Separate refactoring from other work. Splitting refactoring work and other changes into separate commits in your version control system also makes it easier for you and other developers both to review the changes and to make sense of what you were doing when you revisit the code later.” – Chris Birchall, author of Re-Engineering Legacy Software How to choose the right development team to help you refactor your code If you plan on hiring a consulting firm to manage refactoring, you need to make sure you choose the right team. Here are some of the most important factors to consider: • Expertise in modernization (not just new development) – Make sure that the team you work with has successfully modernized and refactored code in the past. • Delivers product strategy – Look for a team that offers product strategy, so you can be sure you’re creating a product that satisfies user needs in the best possible way. • Fully managed team with all of the resources you need – The team should manage the project end-to-end with all of the necessary talent and resources, including frontend developers, backend developers, product managers, tech leads, UX designers, DevOps engineers, and QA managers. • Can take ownership or handover the product – The team should be able to match your long-term goals for product ownership, whether that’s taking ownership of the product for the foreseeable future or helping you upskill your team and managing the handover in an efficient and professional manner. Refactoring legacy code can be done unit by unit to protect current functionality while still paving the way for improved performance and interoperability. Ready to refactor your code and unlock your potential? Learn more about DevSquad. Building a product? Discover the DevSquad Difference Learn More
ESSENTIALAI-STEM
What is ground up asphalt called 02.09.2018 | by Martha Because the ground beneath the asphalt can repeatedly freeze and thaw, roads made with it are susceptible to cracks and pothole formation. Once it cools to ambient temperature, it becomes sturdy enough for automobile traffic. The material is heated to reactivate the binder, applied to the road surface and compacted, just as hot mix asphalt is. What is ground up asphalt called Added a new Open from web option that is located under the File Open menu. Here are answers to the most frequently asked questions regarding asphalt in the applications covered above. Heres an overview of the makeup of this material that is also called blacktop, pavement, asphalt cement and bitumen. Asphalt overlay is a paving method of applying a new layer of asphalt to a deteriorating surface rather than tearing the old surface up entirely. What you must be familiar with is what to ask for and what to look for in the mix design submitted. A Parenthood spin-off could be in the works Huffington Post. Recyclability and sustainability. Similar problems have been reported elsewhere with time. Check out the total number of Lok Sabha Seats state-wise. Recycled asphalt, or recycled asphalt pavement RAP, is old pavement that has been ground to produce aggregate-sized pieces. While the mixture is still hot, it is delivered to your job site and installed on top of a base or sub grade that has already been.
ESSENTIALAI-STEM
Remembering the Eastland Disaster on its 100th Anniversary At around 6 a.m. on July 24, 1915, as 2500 passengers were boarding the S.S. Eastland where it was docked in downtown Chicago, the ship began to list. The boat, which was to take employees of Western Electric Company on a cruise of Lake Michigan to Michigan City, Ind. for a company picnic, leaned starboard, then port, then back to starboard. At around 7:25 a.m., it listed to port more severely; then, slowly, it tipped over, coming to rest on its left side in 20 feet of water. Passengers were thrown from the deck into the river, and many below deck drowned in their cabins. In total, 844 people died, making it the worst disaster in Great Lakes history. Launched in 1903, the 265-foot boat—which was initially designed to hold 650 passengers—was flawed from the start: It was top-heavy, had no keel, and relied on ballast tanks, which were poorly designed, to keep it level. It had its first brush with disaster just a year later, when the ship, which had been certified to carry 3300 passengers, nearly capsized with 3000 people on board. Two years later, a severe listing occurred with 2530 people on board. Retrofitting in 1913 upped the Eastland’s official capacity to 2500, and likely imbued the craft with structural issues in addition to its other problems. Then, in 1915, President Woodrow Wilson signed the LaFollette Seaman's Act into law. Spurred by the Titanic’s sinking, the bill decreed that vessels have enough lifeboats to save 75 percent of their passengers. Despite a warning from the general manager of the Detroit & Cleveland Navigation Company that some Great Lakes boats "would turn 'turtle' if you attempted to navigate them with this additional weight on the upper decks," and although the law wouldn’t go into effect until November, the Eastland—a boat designed to hold six lifeboats—was given 11 lifeboats, 37 liferafts, and lifejackets for all the passengers and crew just three weeks before the disaster. Though bystanders jumped in the river to save victims, and rescuers cutting through the hull managed to pull out 40 survivors, the toll of the disaster was horrific: 70 percent of the victims were under 25 years old; 21 full families were wiped out. By all accounts, it was horrifying to watch. "The screaming was terrible," a man told The Chicago Tribune. "I watched one woman who seemed to be thrown from the top deck ... I saw her white hat float down the river, and that was all." Chicago Herald reporter Harlan Babcock wrote that, "When the boat toppled on its side those on the upper deck were hurled off like so many ants being brushed from a table. In an instant, the surface of the river was black with struggling, crying, frightened, drowning humanity. Wee infants floated about like corks." Investigations into the disaster began almost immediately, and dragged on for 24 years. Chief engineer Joseph Erickson, who was in charge of managing the Eastland’s ballast, was ultimately blamed, but these days, most believe it was the addition of extra lifeboats that rendered the Eastland so unstable. After it was pulled up from the river, the Eastland was renamed, commissioned as a naval vessel, then scrapped after World War II.
FINEWEB-EDU
How Domestic Cats Adapted to Living With Humans Published on: evolution of cats with humans The adaptation of domestic cats to living with humans is a fascinating topic that has intrigued researchers for decades. Through the process of domestication, cats have undergone notable changes in their behavior, physical attributes, and social dynamics. Understanding the evolution of domestic cats, their natural behavior changes, and the coevolution with humans provides valuable insight into the intricate relationship between these animals and their human companions. However, the extent to which cats have adapted to coexist with humans goes beyond the surface, involving genetic modifications and subtle behavioral adjustments that have contributed to their success as one of the most popular pets worldwide. Key Takeaways • Cats have undergone significant changes in behavior and socialization as a result of living with humans, including adjusting their hunting patterns and developing more social tendencies. • The coevolutionary process between humans and cats has led to a unique human-cat relationship, with ecological interactions driving the adaptation of both species to each other's presence. • Domestic cats have physical adaptations that facilitate their integration into human households, such as reduced size, adapted senses, and a focus on hunting smaller prey. • Selective breeding and genetic changes have played a role in the adaptation of domestic cats to living with humans, with genetic traits emerging that are favorable for cohabitation. Evolution of Domestic Cats The evolution of domestic cats can be traced back thousands of years to their wild ancestors, a process that has shaped their physical characteristics and behavioral traits through selective breeding and natural adaptation. The evolutionary timeline of domestic cats is a fascinating journey marked by their transition from solitary hunters to coexisting with humans. Environmental pressures played a significant role in this transformation. As cats adapted to living in close proximity to humans, they underwent changes to their behavior and physiology. Selective breeding by humans further influenced the evolution of domestic cats, leading to the development of various breeds with distinct traits. The domestication process allowed cats to thrive in diverse environments, displaying remarkable resilience and adaptability. Their keen hunting instincts, agility, and sensory capabilities were honed over generations, enabling them to become adept companions and efficient pest controllers in human settlements. Understanding the evolutionary history of domestic cats provides valuable insights into their unique behaviors and characteristics, fostering a deeper appreciation for these remarkable animals. Natural Behavior Changes Under the influence of environmental pressures and close coexistence with humans, domestic cats have undergone notable changes in their natural behaviors, reflecting their adaptive responses to living in human-inhabited environments. These instinctual responses are evident in the altered hunting behaviors of domestic cats. While their wild counterparts rely heavily on hunting for survival, domestic cats have adjusted their hunting patterns when living with humans. They often hunt less frequently, as their nutritional needs are met through human-provided food. Additionally, their hunting techniques have adapted to indoor environments, where they may engage in playful hunting behaviors rather than the intense predatory pursuits seen in the wild. Environmental adjustments are also observed in the social behaviors of domestic cats. In the wild, cats are usually solitary animals, but living with humans has led to the development of more social tendencies. Many domestic cats seek out human companionship and display affectionate behaviors, such as rubbing against their owners or sitting in their laps. These changes in natural behaviors reflect the domestic cat's ability to adapt to the human-inhabited environment, showcasing their remarkable capacity for behavioral flexibility in response to their living conditions. Human-Cat Coevolution Over time, the reciprocal influence between humans and domestic cats has shaped a pattern of coevolution, impacting the behavioral and physiological characteristics of both species. The evolutionary timeline of human-cat coexistence has led to significant ecological interactions, driving the adaptation of each species to the presence of the other. As humans transitioned from hunter-gatherer societies to settled communities, the storage of surplus grain attracted rodents, which in turn drew wild felines to human settlements. This proximity likely initiated the domestication process. As cats became more accustomed to living near humans, their behaviors and traits evolved to better align with the human environment. Similarly, humans' tolerance and even preference for cats with certain traits, such as sociability and tameness, have influenced the selective pressures acting on cat populations. This coevolutionary process has resulted in the development of a unique human-cat relationship, characterized by mutual benefit and companionship. Understanding the dynamics of human-cat coevolution provides valuable insights for enhancing the welfare of both species within shared environments. Physical Adaptations As the process of coevolution between humans and domestic cats continued, observable physical adaptations emerged in both species, reflecting the reciprocal influence and selective pressures within their shared environment. In domestic cats, physical changes have occurred over generations to better adapt to a life alongside humans. One notable adaptation is the retention of juvenile traits into adulthood, commonly known as neoteny, which has resulted in cats retaining a more playful and kitten-like demeanor, endearing them to humans and facilitating their integration into human households. Additionally, there has been a reduction in size compared to their wild ancestors, making them more suitable for indoor living. Their senses, particularly their vision and hearing, have also adapted to the domestic setting, allowing them to detect subtle movements and sounds, which is particularly useful for hunting in confined spaces. Furthermore, their hunting instincts have evolved to be more focused on smaller prey, such as insects and rodents, which are commonly found in human habitats. These physical adaptations highlight the intricate ways in which domestic cats have evolved to thrive in a human-centric environment. Behavioral Modifications Throughout the coevolutionary relationship between humans and domestic cats, behavioral modifications have become apparent, reflecting the adaptive responses of both species to the dynamics of their shared environment. The socialization process of domestic cats is significantly influenced by their interactions with humans and other animals. Kittens that are exposed to various stimuli in a positive and controlled manner during their early developmental stages tend to exhibit more sociable behaviors in adulthood. Environmental influences, such as the presence of other pets or the layout of the living space, also shape a cat's behavioral tendencies. Behavioral training is a key aspect of modifying a cat's behavior to better suit the human household. Positive reinforcement and understanding feline communication cues are essential in fostering desirable behaviors and discouraging undesirable ones. Cats often communicate through body language, vocalizations, and scent marking, and understanding these cues is fundamental in enhancing human-cat interactions. Genetic Changes The behavioral modifications observed in domestic cats in response to their interactions with humans and environmental influences have been accompanied by genetic changes that reflect the coevolutionary dynamics between the two species. Genetic mutations play a significant role in the adaptation of domestic cats to living with humans. Over time, selective breeding has led to the emergence of specific genetic traits that are favorable for cohabitation with humans. As humans started to form settlements and engage in agriculture, cats became attracted to the stable food sources and human settlements, leading to a mutualistic relationship. Through selective breeding, humans unintentionally favored certain genetic traits in cats, such as tameness, increased sociability, and reduced fear responses. These genetic changes have contributed to the domestication process, as cats with these traits were more likely to thrive in human environments. As a result, domestic cats have developed genetic adaptations that facilitate their coexistence with humans, demonstrating the intricate ways in which genetic changes have played a role in their domestication. Social Dynamics A notable aspect of the domestic cat's adaptation to coexisting with humans is the intricate social dynamics that have evolved between the two species, reflecting complex patterns of interaction and communication. Domestic cat relationships with humans are based on a combination of mutualism, where both species benefit, and commensalism, where cats benefit without affecting humans. Feline socialization has adapted to fit within human social structures, leading to cats developing various methods of communication to interact with their human companions. Cats have shown an ability to interpret human body language and vocal cues, adapting their behavior accordingly. They often display affiliative behaviors such as head-butting, rubbing against their human's leg, and purring, which are equivalent to friendly gestures in human social interactions. Furthermore, cats have been observed to exhibit social learning by mimicking human behavior, demonstrating their ability to adapt and integrate into human social dynamics. Understanding these social dynamics is crucial for fostering harmonious coexistence between cats and their human counterparts. Recognizing and respecting the feline socialization process can enhance the quality of the relationship, leading to a more enriching experience for both humans and their feline companions. Frequently Asked Questions How Do Domestic Cats Differ in Their Adaptation to Living With Humans Compared to Other Domesticated Animals? Domestic cats exhibit unique genetic markers and behavioral modifications in their adaptation to living with humans when compared to other domesticated animals. Their independent nature and hunting instincts distinguish them as adaptable and self-sufficient companions. What Are Some Common Misconceptions About the Coevolution of Humans and Domestic Cats? Misunderstood behavior and evolutionary misconceptions often surround the coevolution of humans and domestic cats. Erroneous beliefs about their solitary nature and their relationship with humans can lead to misunderstandings about their adaptation. Are There Specific Genetic Markers That Indicate a Cat's Ability to Adapt to Living With Humans? Genetic markers associated with behavioral traits in domestic cats indicate potential adaptability to living with humans. The evolutionary history and cultural influence have shaped these markers, offering insights into the coevolution of cats and humans. How Do Environmental Factors Play a Role in the Behavioral Modifications of Domestic Cats? Environmental influences play a crucial role in the behavioral changes of domestic cats. Human-animal interaction, living conditions, and exposure to stimuli all contribute to feline adaptation. Understanding these factors aids in promoting harmonious cohabitation. Can the Social Dynamics of Domestic Cats Change Over Time in Response to Living With Humans? Behavioral changes in domestic cats' social dynamics have been observed over time in response to human interaction. Cats may exhibit increased sociability or dependency, demonstrating their adaptable nature in the context of cohabitation with humans. Save 50% on your first Chewy.com order! We've partnered with Chewy.com to offer the best deal on premium cat products to our readers. Click or tap the button below to go to their exclusive discount page. Claim The Offer Gray tabby cat sitting Photo of author AUTHOR We're a team of cat lovers dedicated to sharing fun & useful info about our feline friends. From quirky cat behaviors to the latest trends in cat care, we've got it covered. Our collective expertise ranges from veterinary insights to personal stories of life with cats, ensuring a diverse and engaging experience for our readers. Whether you're a long-time cat owner or just beginning your journey into the world of these fascinating creatures, you'll find something to purr about with us!
ESSENTIALAI-STEM
Closed Bug 938261 Opened 6 years ago Closed 6 years ago [Contacts] Accessing the tel property of a mozContact when handling the "update" activity throws an error Categories (Core Graveyard :: DOM: Contacts, defect) x86 Gonk (Firefox OS) defect Not set Tracking (blocking-b2g:1.3+) RESOLVED DUPLICATE of bug 946294 1.3 Sprint 6 - 12/6 blocking-b2g 1.3+ People (Reporter: gtorodelvalle, Assigned: julienw) References Details Attachments (1 file) For some strange reason, when accessing the 'tel' property of a contact (no matter if using dot notation or Array notation) from the Contacts app when in an activity handling, the following error is thrown: [JavaScript Error: "Argument 1 of ContactTelField.initialize can't be converted to a sequence." {file: "jar:file:///system/b2g/omni.ja!/components/ContactManager.js" line: 245}] As additional info: - |'tel' in contact'| returns true. - Accessing the rest of the properties of a mozContact (id, category, name, email, adr, note, etc.) does not throw any error and seems to work fine. - Trying to access a not existent property (such as 'tel1') works as expected returning undefined. Blocks: 938219 blocking-b2g: --- → koi? What pick activity? What's the value of |type| for the phone number you picked? what's the user impact? can you provide an STR? Flags: needinfo?(gtorodelvalle) Joe, see bug 938219. Flags: needinfo?(gtorodelvalle) German, would you please share your contact db with us? Flags: needinfo?(gtorodelvalle) WebIDL related -> 1.3? blocking-b2g: koi? → 1.3? Damn it, I don't know why I keep on setting the koi? when these issues are related to the recent contacts WebIDL updates ;-999 Sorry guys! I'll try to get the DB and include it as a new attachment. Flags: needinfo?(gtorodelvalle) Attached file Contacts_DB.zip Julien, I am able to reproduce this bug on Gecko-4424186 and latest Gaia (as for now). You only have to have 1 contact in your contact list and launch the contact 'pick' activity from any other app. Anyhow, I include (what I think it is) the DB you need :-) If it not what you need, please do not hesitate to guide me through the steps to get the right one. Flags: needinfo?(felash) Hi Reuben, I am able to reproduce the bug creating a contact with just a given name and a phone number using the default "mobile" type, and of course selecting it once the contact pick activity is launched ;-) Everything works fine when selecting the contact from the contact list of the Contacts app. In this case, the contact details are properly shown. Looks good, thanks German! Reuben, do you plan to have a look on this today? I won't have time to look before tomorrow. Flags: needinfo?(felash) Yep. Flags: needinfo?(reuben.bmo) (In reply to gtorodelvalle from comment #8) > Hi Reuben, I am able to reproduce the bug creating a contact with just a > given name and a phone number using the default "mobile" type, and of course > selecting it once the contact pick activity is launched ;-) What contact pick activity? It works for me on the SMS app. Flags: needinfo?(reuben.bmo) See comment #11. Flags: needinfo?(gtorodelvalle) Hey Reuben, I have just re-tested it with Gecko-4424186 and latest Gaia from master and I am able to reproduce the issue according to the guidelines included in bug 938219. Of course, if using he SMS app the phone number where the SMS was sent can't be already associated to a contact to get the "Add to existing contact" option. Anyhow, I would say it is even more straightforward to reproduce it using the Dialer app. Just type some numbers in the Dialer app and click on the "Add contact" button on the lower left area of the Dialer. Do you get the selected contact to add that phone number to in edit mode after selecting it from the contact list? Thanks! Flags: needinfo?(gtorodelvalle) Please, see comment 13 Flags: needinfo?(reuben.bmo) There's an app called "UI tests" if you use eng build of gaia. It may be helpful for you to test contact activities. 1. Launch UI tests app 2. Click on API tab at the bottom bar 3. Click on Contacts 4. If you don't have any contacts, click on "Insert fake contacts." This may take some time since it inserts 500 contacts. 5. Click on activity buttons you want to test. They're at the bottom triage: blocks a blocker. 1.3+ blocking-b2g: 1.3? → 1.3+ Assignee: nobody → felash Depends on: 931711 Target Milestone: --- → 1.3 Sprint 6 - 12/6 Removing no longer needed need-info ;-) Thanks! Flags: needinfo?(reuben.bmo) So, when using the use case from bug 938261, I get: tel is {"value":"1235666","carrier":null,"type":"mobile"} Whereas all other uses got me something like: tel is {"type":[""],"value":"0267397915","carrier":null,"pref":null,"__exposedProps__":{"type":"rw","value":"rw","carrier":"rw","pref":"rw"}} The log is in the validateArrayField callback. So clearly there is something strange happening in this code path. Should we run the validateArrayField the "type" property as well? I must admit I don't understand well what validateArrayField is doing. Flags: needinfo?(reuben.bmo) validateArrayField is a wallpaper fix for not having arrays yet (bug 946294 will fix this). I'm not sure the problem is related to it. This looks like the same type of bug with JSONifiying mozContact objects that I fixed in bug 929492 and bug 930241. (In reply to Julien Wajsberg [:julienw] from comment #18) > So, when using the use case from bug 938261, I get: > > tel is {"value":"1235666","carrier":null,"type":"mobile"} |"type": "mobile"| sounds like trouble. I thought the picker was fixed to not return scalars for the array properties. Flags: needinfo?(reuben.bmo) So, does this come directly from the Contacts app? Could we throw an earlier error when setting the tel.type to a non-array property? Flags: needinfo?(reuben.bmo) Summary: [Contacts] Accessing the tel property of a mozContact when handling the pick activity throws an error → [Contacts] Accessing the tel property of a mozContact when handling the "update" activity throws an error See bug 938219 comment 11 for the root cause in the Contacts app. Now, while the fix in Contacts is very easy, I'd like to have an early failure for array values, just like we do for other WebIDL values. So Reuben, should we call validateArrayField on the "type" property? And shouldn't we call validateArrayField at setter time instead of getter time? I think earlier errors are better for everyone. Bug 946294 will bring us wonderful WebIDL arrays that will let us do as much sanitization as possible. I'm duping there then. Status: NEW → RESOLVED Closed: 6 years ago Flags: needinfo?(reuben.bmo) Resolution: --- → DUPLICATE Duplicate of bug: 946294 Product: Core → Core Graveyard You need to log in before you can comment on or make changes to this bug.
ESSENTIALAI-STEM
Ross High RFC Ross High RFC is a rugby union club based in Tranent, Scotland. The Men's team currently plays in. History The club was founded in 1970. The club, as its name suggests, grew out of the desire of the former pupils of Ross High School in Tranent to form a rugby union club. The first President of the club Bill Monteith was headmaster of the High School. The club's longest serving president was Scott Glynn, who was given a MBE for his charity work. Glynn died on 1 January 2020. A book was released Mon the Ross detailing the history of the club. Ross High RFC has a long-standing partnership with Welsh rugby union club Markham RFC near Caerphilly. Sides The club runs senior and under 18s training on Tuesday and Thursday nights from 7pm to 8.30pm. It is noted as for 'boys and girls from 8 to 80'. Men's * Holy Cross Sevens * Champions (1): 1993 * Broughton Sevens * Champions (1): 2006 * North Berwick Sevens * Champions (2): 1995, 1996 * Lenzie Sevens * Champions: 1996
WIKI
Candy Loving Candy Loving (born Candis Loving; September 4, 1956) is an American model. She was Playboy's Playmate of the Month for the January 1979 issue, which made her the magazine's 25th Anniversary Playmate. Her centerfold was photographed by Dwight Hooker. Early life Loving was born Candis Loving in Oswego, Kansas, on September 4, 1956, and moved to Ponca City, Oklahoma, at the age of three with her mother and four siblings. She graduated from Ponca City High School in 1974 and married Ron Prather. She then enrolled as a public relations major at the University of Oklahoma. Playboy career In 1978, the Playboy magazine began a yearlong nationwide Great Playmate Hunt for its 25th-anniversary publication. She was a junior at the University of Oklahoma, and working in a dress shop and as a waitress when she saw the ad in the paper. At the urging of her then-husband, Loving entered the contest and photographer Dwight Hooker shot the test photos of her. Seven months later the 22-year-old college student beat out more than 3,500 other models. Her centerfold came out in the January 1979 issue. That year, she took advantage of her celebrity status and moved out to California to pursue acting and modeling. She traveled the world as the ambassador of Playboy magazine during the 25th-anniversary celebrations, taking a year out of college to do so. Promotional appearances included the National Press Club in Washington D.C., and hosting a men's fashion show. In 2001, the readers of Playboy would vote her the runner-up for "the sexiest Playmate of the 1970s." Post Playboy At the time of her January 1979 centerfold appearance Loving was a senior at the University of Oklahoma studying public relations. By 1981 she realized celebrity life was not for her, so at age 25 she re-enrolled at the University of Oklahoma to finish her bachelor's degree in journalism and later began a Master of Arts degree in human relations. She used the money from her work at Playboy to fund her studies. She continued to perform publicity duties for the magazine, including signing posters at car shows, and considering her career options. She later met Tampa Bay Buccaneers offensive lineman Dave Reavis when both were judging a beauty pageant. She followed him to Tampa in July 1983. Even though their relationship did not last, she remained in southern Florida, working in the healthcare industry designing benefit packages for companies. She is no longer married but has one daughter. Filmography * Dance Fever (TV Series) (1979) as herself * The Misadventures of Sheriff Lobo playing "Herself" in episode: "Who's the Sexiest Girl in the World" (episode # 1.16), February 19, 1980 * Woody Allen's Stardust Memories (1980) only in the walk-on scene at the end as Tony's girlfriend * Playboy Playmates: The Early Years (documentary) (1982) as herself * Playboy Video Centerfold: Playmate 2000 Bernaola Twins (Video documentary) (2000) as herself * Playboy: The Party Continues (documentary) (2000) as herself * Playboy: The Ultimate Playmate Search (documentary) (2003) as herself * Playboy: 50 Years of Playmates (documentary) (2004) as herself
WIKI
Page:Rowland--The closing net.djvu/316 296 let him go ahead and do it. As for Ivan and his mob, they can go to the devil too. It was in this frame of mind that I arrived at Léontine's; and then, as I got out and turned to pay the driver, I got a jolt that knocked all the newborn impudence out of me—for there on the terrace, sitting at a table on the edge of the cleared space leading up to the door, was Rosalie, watching me intently; and at a table just abreast of her on the other side of the opening was a man in an artisan's blouse and a black straw hat, with one of the little round carpetbags in which plumbers, locksmiths and others carry their tools, on the pavement at his feet. Bearded though he was, I knew him at a glance for Chu-Chu. Even if I had not seen him vaguely in the dark the night before, I think I would have known him. Some instinct seemed to label him with his true self, and the same instinct warned me to let my eyes move absently past and to turn slowly on my heel and reach for the bell of Léontine's little door. "Was it a trap?" I thought like a flash. Did they mean to put me quickly and silently away and take a chance on such revelations as might or might not be produced? Was I a fool to go into the spider's web like an innocent little fly? The butler's steps were coming down the path. Had I better leave a verbal message and go away? I could say that I had just got back to the office and found the note and was sorry that I was engaged to lunch in the Bois, and had stopped on my way to make my excuses. All this went through my head like a single thought. Then the door opened and
WIKI
Abraham Miller Abraham Hugo Miller (March 13, 1851 – July 8, 1913) was a businessman, pastor and state legislator in Arkansas. He served in the Arkansas House of Representatives in 1874 and 1875. At the peak of his business operations, he was considered the wealthiest man in Arkansas. He was a pastor at Centennial Baptist Church in Helena, Arkansas. He and his wife were on the board of trustees at Arkansas Baptist College. He wrote an autobiography titled How I Succeeded in my Business.
WIKI
STATE OF NORTH CAROLINA v. SHAN CARTER No. 479A01 (Filed 22 August 2003) 1. Witnesses— cross-examination — repetitive and confrontational The trial court did not err during a capital sentencing proceeding by denying defendant the opportunity to further cross-examine and impeach the credibility of a State’s witness. The court limited cross-examination only after it became repetitive and confrontational. 2. Sentencing— capital — prior inconsistent statement about another crime — extrinsic evidence excluded The trial court did not err in a capital sentencing hearing by refusing to admit a signed police report about another crime as extrinsic evidence of a witness’s prior inconsistent statement. The point in contention was a collateral matter only tenuously relevant, and the court exercised its discretion properly to prevent this sentencing proceeding from becoming a second trial for the prior crime. 3. Constitutional Law— double jeopardy — current murder introduced at sentencing for prior murder — life sentence not acquittal A sentence of life imprisonment for a prior murder did not amount to an “acquittal” for this murder even though evidence of this murder was introduced at the capital sentencing hearing to support the course of conduct aggravating circumstance. Neither defendant’s guilt nor the appropriate sentence in the present case were fully litigated in the prior trial, and defendant was convicted and sentenced in this case for offenses quite distinct from the offenses in the prior trial. 4. Sentencing— capital — prior life sentence excluded There was no prejudicial error in a capital sentencing proceeding in the court’s granting of the State’s motion in limine to exclude defendant’s life sentence in another case where the clerk of court testified about the earlier sentence without objection. Moreover, the sentence imposed for the prior murder was irrelevant to the sentencing recommendation in this case. 5. Criminal Law— self-defense — instructions The trial court did not err in a first-degree murder prosecution by instructing the jury that defendant’s conduct could be excused if it appeared necessary to the defendant and he believed it to be necessary that he kill the victim to save himself from death or great bodily harm. Although defendant argued that this instruction deprived defendant of self-defense even if the jury found that the victim suffered injuries greater than defendant had intended, an instruction identical in all relevant respects was approved in State v. Richardson, 341 N.C. 585. 6. Homicide— first-degree murder — short-form indictment— constitutional A short-form first-degree murder indictment, which did not allege aggravating circumstances, was not unconstitutional. The structure and nature of the North Carolina capital punishment system provided defendant with reasonable and constitutionally sufficient notice of the aggravating circumstances that might be established by the State during defendant’s capital sentencing proceeding. The indictment sufficiently alleged the elements of first-degree murder. 7. Sentencing— capital — death penalty — not arbitrary The evidence fully supported the aggravating circumstances found by the jury in a capital sentencing proceeding, and there was no indication that the death sentences were imposed under the influence of passion, prejudice, or any other arbitrary consideration. 8. Sentencing— capital — death penalty — proportionate A death sentence was proportionate where defendant was convicted of first-degree murder based on premeditation and deliberation, defendant was found guilty of two counts of murder, defendant had been convicted of a prior violent felony, the jury found the course of conduct aggravating circumstance, and the jury expressly refused to find the statutory mitigating circumstances of mental or emotional disturbance or age. Appeal as of right pursuant to N.C.G.S. § 7A-27(a) from judgments imposing sentences of death entered by Judge Charles H. Henry on 19 March 2001 in Superior Court, New Hanover County, upon jury verdicts finding defendant guilty of two counts of first-degree murder. On 22 July 2002, the Supreme Court allowed defendant’s motion to bypass the Court of Appeals as to his appeal of additional judgments. Heard in the Supreme Court 11 March 2003. Roy Cooper, Attorney General, by Joan M. Cunningham, Assistant Attorney General, for the State. Edwin L. West, III, for defendant-appellant. MARTIN, Justice. On 24 February 1997, Shan Carter (defendant) was indicted for the first-degree murders of Tyrone Baker and Demetrius Greene. He was also subsequently indicted for discharging a firearm into occupied property, in violation of N.C.G.S. § 14-34.1, and possession of a firearm by a convicted felon, in violation of N.C.G.S. § 14-415.1. Defendant was tried capitally at the 5 February 2001 session of Superior Court, New Hanover County. The jury found defendant guilty on all counts. Defendant’s conviction of the first-degree murder of Baker was based on a theory of premeditation and deliberation. Defendant’s conviction of the first-degree murder of Greene was based on a theory of premeditation and deliberation under the doctrine of transferred intent, and was also based on the felony murder rule with Baker’s murder serving as the underlying felony. Following a capital sentencing proceeding, the jury recommended a sentence of death for each murder. The trial court entered judgment accordingly. The trial court also entered consecutive sentences of forty-six to sixty-five months for discharge of a firearm into an occupied vehicle and twenty to twenty-four months for possession of a firearm by a convicted felon. Defendant gave notice of appeal pursuant to N.C.G.S. § 7A-27(a). The evidence admitted at the guilt-innocence proceeding tended to show the following: Defendant has been convicted several times of illegal drug possession and sale. In late 1996, defendant was involved in a number of break-ins and burglaries in Wilmington, North Carolina, including one at the home of Keith Lamont Richardson and one at the home of a victim in the instant case, Tyrone Baker. Defendant, K’Wada Temony, and Damont White were all involved in the burglary of Baker’s home, which resulted in the theft of approximately $35,000 in cash. At one point, defendant referred to this $35,000 as “death money.” No evidence was admitted as to what, if anything, defendant may have stolen from Richardson. Richardson and Baker each eventually confronted defendant and his cohorts. One of these confrontations led to the convictions in the instant case. Sometime near the end of November 1996, Baker kidnapped White and took him to Baker’s apartment. Baker assaulted and threatened White in an attempt to discover the location of the missing $35,000. Baker then released White, who discussed the incident with Temony and defendant and alerted them that Baker was searching for those who had taken his money. In early February 1997, Richardson learned that defendant was the person who had broken into his home. Richardson subsequently saw defendant on the street and angrily confronted him about the break-in. During the confrontation, defendant drew a chrome .357 caliber revolver and Richardson fled. Defendant fired several shots, wounding Richardson’s arm. The instant charges stem from events occurring on the afternoon of 16 February 1997. On that afternoon, defendant and Temony were riding in defendant’s car. They stopped near a crowd of ten to fifteen people gathered in front of a grocery store located at the intersection of 10th and Dawson Streets in Wilmington. A number of residents were out on the neighborhood streets that day. Defendant and Temony exited the car; defendant began conducting drug transactions. Baker was also near this intersection, having visited a friend’s house across the street from the grocery store and a nearby barber shop. Defendant apparently did not notice Baker approach the crowd. Defendant first became aware of Baker’s presence when Baker attacked Temony, knocking him to the ground. Baker then approached defendant menacingly, with a jacket slung over his arm, concealing his hand. According to eyewitnesses, Baker was unarmed. Defendant claimed at trial that although he could not see a weapon, he feared Baker was armed and reacted in self-defense. Defendant testified: “I didn’t want to shoot first, I wanted to go ahead ... and do what I had to do before [Baker] did it to me. So I went ahead and pulled my gun out and I shot at him.” As Baker approached, defendant retreated, pulled a chrome .357 caliber revolver from under his jacket, and began shooting. Defendant testified that he pointed his gun towards the ground and intended only to force Baker away so that defendant could get to his car and leave. Defendant also testified that he did not intend to kill Baker and did not know at the time of the shooting whether any of the bullets actually hit Baker. After defendant fired the first shot, Baker tinned and ran around the corner, moving down 10th Street. According to defendant, “[Baker] ran and I went behind him shooting at him.” D’April Greene and her three children lived in a housing project near 10th and Dawson. On 16 February 1997, D’April was gathering the children for a trip to the toy store. The trip was intended to reward the children for making good grades. Excited about the trip and anxious to ride in the front seat, D’April’s eight-year-old son, Demetrius, ran ahead of the rest of his family. He ran across 10th Street and jumped into the front passenger seat of D’April’s car, which was parked on 10th Street approximately one hundred feet south of the grocery store. As D’April and her other two children crossed the street towards the car, D’April began to hear “fussing” near the intersection of 10th and Dawson. This “fussing” was quickly followed by gunfire. D’April and other witnesses then saw Baker rounding the corner with defendant in pursuit. As Baker ran down 10th Street, defendant followed him around the corner, continuing to fire between four and six shots. At some point, Baker ran in front of or near the Greene car in an attempt to cross 10th Street. During the course of the shooting, two of the bullets from defendant’s revolver struck Baker, one in the leg and one in the torso. Baker staggered across the street, collapsed in a grassy area near the sidewalk, and died shortly thereafter. A stray bullet from defendant’s revolver passed through the windshield of D’April Greene’s car and struck Demetrius Greene in the head. Demetrius died shortly thereafter. Forensic evidence subsequently confirmed that the bullets that struck Baker and Greene all came from the same gun, most likely a revolver. Moreover, forensic evidence showed those bullets could not have been fired from a gun later found in Temony’s possession. Immediately after the shooting, defendant and Temony got into defendant’s car and fled. They stopped briefly at defendant’s home, abandoned defendant’s car, and then went to a nearby motel. According to defendant, they spent the next two days in a motel room. Defendant claims he did not learn that Demetrius Greene had been killed until he saw the evening news. At some point, Temony disposed of defendant’s revolver. Meanwhile, police interviewed D’April Greene and other witnesses and obtained an identification of defendant as the shooter. Police subsequently searched defendant’s home and car. The officers found, among other things, gun holsters, drug trade paraphernalia, a shotgun, and some .357 caliber ammunition. On 18 February 1997, police received information that defendant had requested a taxicab at his motel. The officers used this opportunity to arrest defendant, sending a plain clothes officer to the motel to pose as a taxi driver. As the police arrived at the motel, defendant and Temony spotted them and ran. Defendant threw his jacket to the ground as he fled. After a brief foot chase, police arrested defendant and Temony. Additional evidence admitted during the capital sentencing proceeding tended to show the following: In the early morning hours of 18 February 1997, two masked, armed intruders broke into an apartment on Ringo Drive in Wilmington and attacked Louis Tyson. The intruders forced Tyson to the floor and attempted to bind him with duct tape. The intruders beat Tyson while demanding money and then shot Tyson once in each leg. The intruders then fled. Paper dust masks and remnants of the duct tape were found at the scene. Defendant was linked to the Tyson attack by evidence that: (1) duct tape and paper dust masks matching those used during the Tyson attack were found in defendant’s motel room after his arrest in the present case; (2) police found a shopping list, in defendant’s handwriting, in the pocket of the jacket defendant dropped when fleeing the police, and among the items on the list were duct tape, masks, and gloves; and (3) bloodstains found on this same jacket were genetically matched to Tyson’s blood. Evidence was also introduced concerning the murder of Donald Brunson. In the early morning hours of 6 December 1996, two intruders broke into the house where Brunson lived. Ana Santiago, who was Brunson’s girlfriend, and her son Carlos both lived with Brunson. The intruders awoke Brunson, Santiago, and Carlos at gunpoint and ordered them to lie down on the master bedroom floor. At some point, the intruders became angry. A shot was fired, and the intruders began beating Brunson. The intruders dragged Brunson to Carlos’ room and continued to beat him until he was unconscious. Then they tied up all three victims. The intruders placed Brunson in Santiago’s car and left, taking the car and Brunson with them. In the morning, the car was found near the local waste-water treatment plant. Brunson’s nearly nude body was found nearby. He had died as a result of gunshot wounds to his back. Temony and defendant were charged in connection with the Brunson case after their arrest in the present case. In connection with the Brunson murder, Temony pled guilty to second-degree murder, kidnapping, robbery, and burglary. Defendant was convicted of first-degree murder, kidnapping, and robbery with a dangerous weapon. Defendant presented a number of family members and friends as witnesses during the capital sentencing proceeding. These witnesses testified as to defendant’s childhood, which included frequent moves, the separation of his parents, and the deterioration of his relationship with his father. There was testimony that defendant had generally stayed out of trouble until he and his family moved to Wilmington. There was also testimony that defendant maintains a good relationship with his parents, siblings, nieces, and nephews. The additional facts and descriptions of events at trial necessary to an understanding of defendant’s arguments are set forth below. Defendant first contends the trial court erred by denying defendant the opportunity to fully cross-examine and impeach the credibility of one of the state’s witnesses. During the capital sentencing proceeding, the state presented evidence describing the circumstances of the Brunson murder. Defendant’s convictions arising from the Brunson murder were used in support of aggravating circumstances described in N.C.G.S. § I5A-2000(e)(2) (defendant previously convicted of a capital felony) and N.C.G.S. § 15A-2000(e)(3) (defendant previously convicted of a felony involving the use or threat of violence to the person). Ana Santiago appeared as a witness for the state and described the events that had occurred in the Brunson home on the night of the attack. During her testimony, she stated that there had been two intruders in the house that night. During cross-examination, defendant questioned Santiago about prior statements she had made to police during the investigation of the Brunson murder and during her testimony at the Brunson murder trial. In those prior statements, Santiago had stated that three, not two, intruders had entered the Brunson home. Defendant questioned Santiago several times about these prior inconsistent statements without objection. Each time, Santiago claimed she did not recall making those prior statements. The trial court sustained the state’s objections to further inquiry as to these statements and refused to admit a police report, signed by Santiago, stating that three men had entered the Brunson home. On voir dire, the police report was admitted as an offer of proof. After some discussion with counsel, the trial court ruled that defendant had ample opportunity to cross-examine the witness on the issue and that further inquiry was irrelevant to the key fact for sentencing purposes — the existence of defendant’s prior convictions. A person may not be sentenced to death “ ‘on the basis of information which he had no opportunity to deny or explain.’ ” Simmons v. South Carolina, 512 U.S. 154, 161, 129 L. Ed. 2d 133, 141 (1994) (quoting Gardner v. Florida, 430 U.S. 349, 362, 51 L. Ed. 2d 393, 404 (1977) (plurality opinion)). Accordingly, under North Carolina law, at a capital sentencing proceeding both the state and the defendant may introduce evidence concerning the circumstances surrounding the defendant’s prior crimes when those prior crimes support aggravating circumstances. State v. McDougall, 308 N.C. 1, 20-21, 301 S.E.2d 308, 320 (following State v. Taylor, 304 N.C. 249, 279, 283 S.E.2d 761, 780 (1981), cert. denied, 463 U.S. 1213, 77 L. Ed. 2d 1398 (1983)), cert. denied, 464 U.S. 865, 78 L. Ed. 2d 173 (1983). Once the state introduces evidence of the circumstances surrounding these prior crimes, it is anticipated that the defendant may elicit testimony tending to temper that evidence. State v. Jones, 339 N.C. 114, 152, 451 S.E.2d 826, 846 (1994), cert. denied, 515 U.S. 1169, 132 L. Ed. 2d 873 (1995). The admission of evidence during a capital sentencing proceeding, however, is not strictly governed by the Rules of Evidence. N.C.G.S. § 15A-2000(a)(3) (2001); N.C.G.S. § 8C-1, Rule 1101(b)(3) (2001). In McDougall, this Court described the role of the trial court in controlling the presentation of evidence concerning the circumstances surrounding prior crimes to be used as aggravating circumstances at a capital sentencing proceeding: It is the duty of the trial judge to supervise and control the trial to prevent injustice to either party. The court has the power and duty to control the examination and cross-examination of the witnesses. The trial judge may ban unduly repetitious and argumentative questions as well as inquiry into matters of tenuous relevance. The extent of cross-examination with respect to collateral matters is largely within the discretion of the trial judge. The proper exercise of this authority will prevent the determination of this aggravating circumstance from becoming a “mini-trial” of the previous charge. McDougall, 308 N.C. at 22, 301 S.E.2d at 321 (citations omitted); see also State v. Locklear, 349 N.C. 118, 158, 505 S.E.2d 277, 300 (1998) (trial court may exclude evidence during capital sentencing that is “repetitive, unreliable, or lacking an adequate foundation”), cert. denied, 526 U.S. 1075, 143 L. Ed. 2d 559 (1999); State v. Strickland, 346 N.C. 443, 461, 488 S.E.2d 194, 205 (1997) (admissibility of evidence during capital sentencing is based upon considerations of whether the evidence is “pertinent and reliable”), cert. denied, 522 U.S. 1078, 139 L. Ed. 2d 757 (1998); State v. Walls, 342 N.C. 1, 51, 463 S.E.2d 738, 764-65 (1995) (a trial court may exclude evidence of a mitigating circumstance which is repetitive or unreliable), cert. denied, 517 U.S. 1197, 134 L. Ed. 2d 794 (1996). A trial court has broad discretion over the scope of cross-examination in general and during a sentencing proceeding in particular. State v. Moses, 350 N.C. 741, 770-71, 517 S.E.2d 853, 871 (1999), cert. denied, 528 U.S. 1124, 145 L. Ed. 2d 826 (2000); State v. Anderson, 350 N.C. 152, 180, 513 S.E.2d 296, 313, cert. denied, 528 U.S. 973, 145 L. Ed. 2d 326 (1999). Defendant was not denied an opportunity to cross-examine Santiago concerning her prior statements. He was allowed to question Santiago repeatedly concerning her prior inconsistent statements. The transcript reveals that it was only after the tone of the cross-examination became repetitive and somewhat confrontational that the trial court asked defense counsel to “move along” and sustained the state’s objections to defendant’s repeated questions. The trial court properly exercised its broad discretion when it limited defendant’s cross-examination in this manner. Nor did the trial court err in refusing to admit extrinsic evidence of Santiago’s prior statement, namely, the signed police report. While the Rules of Evidence are not controlling in a sentencing proceeding, they can provide a helpful guide as to relevance. State v. Greene, 351 N.C. 562, 568, 528 S.E.2d 575, 579, cert. denied, 531 U.S. 1041, 148 L. Ed. 2d 543 (2000). As a general rule, under the Rules of Evidence, once a witness testifies about a collateral matter on cross-examination, the cross-examiner is bound by those answers of the witness and cannot contradict them with extrinsic evidence. 1 Kenneth S. Broun, Brandis and Broun on North Carolina Evidence § 160 (5th ed. 1998); see also State v. Burke, 343 N.C. 129, 154, 469 S.E.2d 901, 913, cert. denied, 519 U.S. 1013, 136 L. Ed. 2d 409 (1996). Repetitive evidence on irrelevant points serves only to prolong the trial and confuse the jury. Broun, North Carolina Evidence at § 160. In the present case, the exact number of attackers who entered the Brunson home was a collateral matter, and was only tenuously relevant to the fact that defendant was convicted of several felonies in connection with the Brunson murder. Santiago’s prior inconsistent statements were relevant to her credibility and defendant was allowed to explore that issue. In sustaining the state’s objection to admission of the police report, the trial court properly exercised its discretion to prevent the sentencing proceeding from becoming a second trial of the Brunson murder and to prevent an unnecessary digression into a collateral matter. Defendant’s argument is without merit. Next, defendant argues the trial court erred by denying defendant’s pretrial motion to dismiss. During the capital sentencing proceeding at defendant’s earlier trial for the Brunson murder, the state introduced evidence of the murders of Tyrone Baker and Demetrius Greene in support of the aggravating circumstance described in N.C.G.S. § 15A-2000(e)(ll) (the murder was part of a course of conduct in which the defendant engaged in other violent crimes). The state introduced the testimony of D’April Greene; Roderick Morgan, who was an eyewitness to the murders of lyrone Baker and Demetrius Greene; and Dr. Almeida, who performed the autopsies of Tyrone Baker and Demetrius Greene. The Brunson jury found the existence of the course of conduct aggravating circumstance and recommended life imprisonment without parole. D’April Greene, Roderick Morgan, and Dr. Almeida testified during the guih>innocence proceeding in the instant case as well. Prior to trial, defendant moved to dismiss the murder charges on double jeopardy and collateral estoppel grounds. Defendant argued that the capital sentencing proceeding in the Brunson trial was, in part, a trial of the Baker and Greene murders. According to defendant, because the jury in the Brunson trial had already considered evidence of the Baker and Greene murders and had been authorized to impose a sentence of death based in part upon the Baker and Greene murders, defendant’s life had already been placed in jeopardy once for those crimes. In effect, defendant argued, the jury’s recommendation of life imprisonment without parole in the Brunson trial “acquitted” defendant of the death penalty for the Baker and Greene murders. In his written motion, defendant moved for dismissal of the murder charges. During the hearing on the motion, defendant argued in the alternative that if trial proceeded, the state should be collaterally estopped from seeking the death penalty. The trial court denied defendant’s motion and noted his exception. On appeal, defendant renews this argument. In his brief, defendant relies principally on Ashe v. Swenson, 397 U.S. 436, 25 L. Ed. 2d 469 (1970), to support his argument that the state should have been collaterally estopped from seeking the death penalty in the present case. In Ashe, the defendant was charged with seven separate crimes in the robbery of a group of six poker players. Id. at 437-38, 25 L. Ed. 2d at 472. The defendant was to be tried separately on each count but was acquitted on the first count for lack of evidence. The state then brought the defendant to trial on the second count. Id. at 439, 25 L. Ed. 2d at 472-73. The United States Supreme Court held that the doctrine of collateral estoppel, as embodied in the rule against double jeopardy, prevented further prosecutions of the defendant for other crimes arising out of those same facts. Id. at 446-47, 25 L. Ed. 2d at 477. According to defendant, the present case is analogous. Defendant’s reliance on Ashe is misplaced. Ashe stands for the proposition that once a jury has conclusively determined the existence or nonexistence of a fact, the state is collaterally estopped under the Double Jeopardy Clause from relitigating that same issue in a second criminal proceeding. Id. at 442-43, 25 L. Ed. 2d at 475; see also Schiro v. Farley, 510 U.S. 222, 232, 127 L. Ed. 2d 47, 58 (1994). The holding in Ashe turned on the fact that the only “rationally conceivable issue in dispute” was whether defendant was in fact one of the robbers, and the first jury had expressly found the evidence insufficient to prove that fact. 397 U.S. at 445, 25 L. Ed. 2d at 476. There was no issue as to whether the defendant in Ashe could be properly charged and punished for each of the robberies if he was, in fact, one of the robbers. Id. at 446, 25 L. Ed. 2d at 477. The acquittal of a defendant in a previous proceeding only “precludes the state from relitigating in a subsequent prosecution any issue necessarily decided in favor of the defendant in the former acquittal.” State v. McKenzie, 292 N.C. 170, 175, 232 S.E.2d 424, 428 (1977). The key inquiry is, “ ‘taking into account the pleadings, evidence, charge, and other relevant matter, . . . whether a rational jury could have grounded its verdict upon an issue other than that which the defendant seeks to foreclose from consideration.’ ” Ashe, 397 U.S. at 444, 25 L. Ed. 2d at 475-76 (quoting Daniel K. Mayers & Fletcher L. Yarbrough, Bis Vexari: New Trials and Successive Prosecutions, 74 Harv. L. Rev. 1, 38-39 (1960)); see also McKenzie, 292 N.C. at 174, 232 S.E.2d at 428. Defendant has the burden of demonstrating that the issue he seeks to foreclose from relitigation was actually decided in the previous proceeding. Schiro, 510 U.S. at 233, 127 L. Ed. 2d at 59; McKenzie, 292 N.C. at 175, 232 S.E.2d at 428. Defendant’s argument is based on the fact that the state produced evidence at the present trial that was similar to evidence produced at the sentencing proceeding in the Brunson trial. The similarity of the evidence introduced in the two proceedings is not the test. See State v. Alston, 323 N.C. 614, 617, 374 S.E.2d 247, 249 (1988). The test is whether the jury in the Brunson trial could have rationally grounded its recommendation of life imprisonment on an issue other than the aggravating value of the Baker and Greene murders. See id. Defendant’s guilt of the offenses charged in the present case was never fully litigated during the Brunson trial, and neither was the appropriate sentence for the present crimes. Our examination of the transcript and exhibits from the Brunson trial, placed in the present record on appeal, reveals that the Brunson jury was never required to find the existence of all of the elements of first-degree premeditated and deliberate murder as to the Baker and Greene murders. Moreover, although some evidence of the Baker and Greene murders was presented to the Brunson jury, evidence concerning defendant’s violent acts towards Keith Richardson and Louis Tyson was also presented during the sentencing and guilt-innocence proceedings of the Brunson trial. The jury’s finding of the course of conduct aggravating circumstance in the Brunson trial could have been based on defendant’s other violent acts and was not necessarily based on any finding as to the Baker and Greene murders. Defendant did not stand charged with the Baker and Greene murders during the Brunson trial, nor was he prosecuted for them. Although defendant’s pattern of violent conduct, including the murders charged in the instant case, was possibly relevant to a determination of the appropriate punishment for the Brunson murder, the jury in the Brunson trial ultimately decided defendant’s guilt and recommended a sentence for the Brunson murder alone. This Court has rejected similar arguments in the past: In State v. Williams, 305 N.C. 656, 680-81, 292 S.E.2d 243, 258, cert. denied, 459 U.S. 1056, 74 L. Ed. 2d 622 (1982), the defendant was tried and convicted separately of two murders, committed hours apart in Gaston and Cabarrus Counties. The defendant was first tried and convicted for the Cabarrus County murder. Evidence of the Gaston County murder was introduced at the Cabarrus County trial to support a finding of an aggravating circumstance and defendant was sentenced to death. The defendant was then tried and convicted for the Gaston County murder. The jury in the Gaston County case found that the Cabarrus County murder supported a finding of an aggravating circumstance and recommended a sentence of death. On appeal, the defendant argued that because the jury at the Cabarrus County trial had already considered the facts of the Gaston County murder and had already sentenced him based in part upon those facts, he could not be tried for the Gaston County murder consistent with double jeopardy protections. In the alternative, the defendant argued that the Cabarrus County murder could not be used to support aggravating circumstances at the capital sentencing proceeding of the Gaston County trial. This Court flatly rejected the defendant’s argument, noting: “The defendant was not convicted of nor punished for the [Gaston County murder] in the prior trial. The defendant has been convicted and sentenced only once for the [Gaston County murder] and will only once be punished therefor.” Id. at 681, 292 S.E.2d at 258. In a different case, a defendant was convicted of two murders and each murder was used to support the (e)(ll) aggravating circumstance in the sentencing proceeding for the other murder. State v. Pinch, 306 N.C. 1, 29, 292 S.E.2d 203, 225, cert. denied, 459 U.S. 1056, 74 L. Ed. 2d 622 (1982), and overruled in part on other grounds by State v. Rouse, 339 N.C. 59, 451 S.E.2d 543 (1994), cert. denied, 516 U.S. 832, 133 L. Ed. 2d 60 (1995), and by State v. Robinson, 336 N.C. 78, 443 S.E.2d 306 (1994), cert. denied, 513 U.S. 1089, 130 L. Ed. 2d 650 (1995), and by State v. Benson, 323 N.C. 318, 372 S.E.2d 517 (1988), and abrogated in part on other grounds by State v. Wilson, 322 N.C. 117, 367 S.E.2d 589 (1988). In his brief to this Court, the defendant argued this was unconstitutional because “ ‘[t]he double jeopardy clause prohibits the prosecution from . . . obtaining a substantive conviction for a homicide and then using it again as an aggravating circumstance.’ ” Id. at 30, 292 S.E.2d at 225. This Court responded: [T]he jury’s consideration of a defendant’s commission of “other crimes of violence,” in making its ultimate penalty recommendation for that defendant’s conviction of a related but separate capital offense, is not logically equivalent to the defendant receiving multiple punishment for the same crime. Id. at 31, 292 S.E.2d at 226; see also State v. Boyd, 343 N.C. 699, 719-20, 473 S.E.2d 327, 338 (1996) (in a double homicide, submission of the facts of one homicide to aggravate the sentence imposed in the trial of the other homicide does not violate double jeopardy), cert. denied, 519 U.S. 1096, 136 L. Ed. 2d 722 (1997). Although the instant case is not identical to these cases, defendant’s argument is sufficiently analogous to the arguments discussed therein that we believe they control the outcome here. Defendant was not convicted of the Baker and Greene murders at the Brunson trial and has been convicted and sentenced only once for the Baker and Greene murders. The Brunson jury’s consideration of the instant crimes as an aggravating circumstance in a prior capital sentencing proceeding is not logically equivalent to the defendant having already received either punishment or acquittal of the present crimes. The double jeopardy clause protects against a second prosecution or second punishment for a single offense. Pinch, 306 N.C. at 31, 292 S.E.2d at 226; see also Schiro, 510 U.S. at 229, 127 L. Ed. 2d at 56; State v. Thompson, 349 N.C. 483, 495, 508 S.E.2d 277, 284 (1998). In the case at bar, defendant was convicted and sentenced for two offenses quite distinct from the offenses tried at the Brunson trial. It was “entirely proper” for each jury to consider defendant’s pattern of violent behavior when “determining whether defendant should pay the ultimate price for each life he took.” Pinch, 306 N.C. at 32, 292 S.E.2d at 226. Accordingly, “we decline to adopt a position which would prevent the administration and availability of equal justice for-equal crimes.” Id. at 30, 292 S.E.2d at 225. Defendant’s argument is without merit. Next, defendant argues the trial court erred during sentencing by excluding evidence as to the sentence recommended and imposed in the Brunson trial. Prior to the capital sentencing proceeding, the trial court allowed the state’s motion in limine and precluded defendant from mentioning during opening statements that the jury in the Brunson trial had recommended a sentence of life imprisonment. During the sentencing proceeding, the trial court also sustained the state’s objection to the admission of the full case file from the Brunson trial, which contained the jury’s sentencing recommendation. According to defendant, this may have misled the jury into believing that defendant was already under a sentence of death for the Brunson murder. Defendant argues such a misled jury might erroneously assume that its death verdict would be superfluous. Thus, the jury might mistakenly believe that it bore no actual responsibility for defendant’s death. According to defendant, the trial court’s ruling is therefore contrary to the legal principles discussed in Caldwell v. Mississippi, 472 U.S. 320, 328-29, 86 L. Ed. 2d 231, 239 (1985). At the outset, we note that the jury was made aware of defendant’s sentence for the Brunson murder. The clerk of court testified as to defendant’s sentence in the Brunson trial, and this testimony was admitted without objection. It is therefore difficult to see how the jury was misled on this issue. Assuming arguendo that the trial court erred at all in excluding such evidence, the fact that this same evidence was admitted without objection at a different point makes any alleged error likely harmless. See State v. Lee, 335 N.C. 244, 280, 439 S.E.2d 547, 565-66, cert. denied, 513 U.S. 891, 130 L. Ed. 2d 162 (1994). Moreover, Caldwell is not controlling here. The constitutional violation described in Caldwell involved a prosecutor telling a jury that it need not feel the full weight of its responsibility for deciding a death sentence, because an appellate court would review its determination and make the final decision to impose the death penalty. Caldwell, 472 U.S. at 325-26, 86 L. Ed. 2d at 237-38. The United States Supreme Court held this argument misleading and prejudicial because “ ‘[e]ven a novice attorney knows that appellate courts do not impose a death penalty, they merely review the jury’s decision and that review is with a presumption of correctness.’ ” Id. at 331, 86 L. Ed. 2d at 241 (quoting with approval the dissenting opinion below, Caldwell v. State, 443 So. 2d 806, 816 (Miss. 1983) (Lee, J., dissenting)). In the present case, allowing the state’s motion in limine and sustaining the state’s objections could not have led the jury to believe that some other tribunal would finally decide defendant’s sentence or that the jury’s sentencing recommendation was somehow not binding. There is no indication that the trial court’s rulings encouraged the jury to ignore its grave responsibility. As to the crimes charged in the instant case, the decision as to punishment was the jury’s alone and neither side intimated otherwise. Caldwell is based, at least in part, on the considerations articulated in a case that seems more directly relevant here, Lockett v. Ohio, 438 U.S. 586, 57 L. Ed. 2d 973 (1978) (plurality opinion). The general rule that the jury must not be misled as to its role in a capital sentencing proceeding is “rooted in a concern that the [capital] sentencing process should facilitate the responsible and reliable exercise of sentencing discretion.” Caldwell, 472 U.S. at 329, 86 L. Ed. 2d at 239 (citing Lockett and several other cases). In Lockett, the United States Supreme Court held that a sentencer in a capital sentencing proceeding may “not be precluded from considering, as a mitigating factor, any aspect of a defendant’s character or record and any of the circumstances of the offense that the defendant proffers as a basis for a sentence less than death.” 438 U.S. at 604, 57 L. Ed. 2d at 990. The types of considerations described in Lockett, Caldwell, and other cases do not require the admission of the evidence proffered here. Even in light of these considerations, a trial court is not limited in its authority to exclude irrelevant evidence. Lockett, 438 U.S. at 604 n.12, 57 L. Ed. 2d at 990 n.12. In other cases, this Court has held that a defendant’s potential or actual sentence for crimes other than the crime of which he or she stands convicted is irrelevant to a determination of a proper sentence and thus may be properly excluded. Robinson, 336 N.C. at 105-06, 443 S.E.2d at 319 (defendant’s sentences for other crimes arising from the same transaction are irrelevant to sentencing determination); Lee, 335 N.C. at 279-80, 439 S.E.2d at 565 (trial court properly excluded as irrelevant evidence that defendant would be sentenced separately for his additional crimes); see also State v. Reeves, 337 N.C. 700, 720, 448 S.E.2d 802, 810 (1994) (convictions and sentences for other crimes are not mitigating evidence), cert. denied, 514 U.S. 1114, 131 L. Ed. 2d 860 (1995); cf. State v. Robbins, 319 N.C. 465, 518, 356 S.E.2d 279, 310 (defendant’s status under the parole laws is irrelevant to a sentencing determination), cert. denied, 484 U.S. 918, 98 L. Ed. 2d 226 (1987). “That defendant is currently serving a life sentence for another unrelated crime is not a circumstance which tends to justify a sentence less than death for the capital crime for which defendant is being sentenced.” State v. Price, 331 N.C. 620, 634, 418 S.E.2d 169, 177 (1992), sentence vacated on other grounds, 506 U.S. 1043, 122 L. Ed. 2d 113 (1993). In sum, the jury heard the evidence defendant claims was wrongly excluded: that he had been sentenced to life imprisonment at his trial for the murder of Donald Brunson. Moreover, even if the evidence had been entirely excluded, there would be no error because the sentence imposed on defendant for the Brunson murder was irrelevant to the jury’s sentencing recommendation in the present case. Defendant’s argument is without merit. Defendant next argues that the trial court gave an erroneous instruction on the issue of self-defense. Prior to the jury deliberations at the end of the guilt-innocence proceeding, the trial court instructed the jury that defendant’s conduct could be excused on the basis of self-defense if “it appeared necessary to the defendant and he believed it to be necessary to kill Tyrone Baker in order to save himself from death or great bodily harm.” At trial, defendant admitted to firing his gun generally in Baker’s direction but claimed he aimed at the ground and did not mean to kill Baker. According to defendant, this instruction incorrectly required the jury to find that defendant believed it necessary to use a particular level of force, namely, deadly force, before he could claim self-defense. Defendant argues this instruction deprived him of the excuse of self-defense even if the jury found Baker had suffered injuries greater than defendant had anticipated. We addressed this issue in State v. Richardson, 341 N.C. 585, 461 S.E.2d 724 (1995). In Richardson, we approved a jury instruction that was, in all relevant respects, identical to the instruction at issue in the present case. Id. at 587, 597, 461 S.E.2d at 726, 731. Since Richardson, we have declined opportunities to reconsider the issue. See, e.g., State v. Laws, 345 N.C. 585, 600, 481 S.E.2d 641, 649 (1997); State v. Johnson, 343 N.C. 489, 494, 471 S.E.2d 409, 412 (1996). After carefully examining defendant’s argument, we find no reason to depart from our prior holdings. This argument is without merit. Defendant next contends that the short-form indictments charging him with murder erroneously failed to allege the aggravating circumstances serving as the basis for imposition of the death penalty. Defendant claims that aggravating circumstances must be alleged in his indictment pursuant to the United States Supreme Court decision in Ring v. Arizona, 536 U.S. 584, 153 L. Ed. 2d 556 (2002). Defendant’s argument is foreclosed by this Court’s decision in State v. Hunt, 357 N.C. 257, 582 S.E.2d 593 (2003). As explained in Hunt, the United States Supreme Court’s decision in Ring does not require that aggravating circumstances be alleged in a state-court murder indictment. Id. at 274, 582 S.E.2d at 604. This Court in Hunt also held that there is no statutory requirement that a short-form murder indictment contain aggravating circumstances. Id. at 272-73, 582 S.E.2d at 603-04. Prior to trial, defendant made a general assertion that failure to allege the aggravating circumstances in his indictment violated his due process rights. We review this alleged constitutional error pursuant to N.C.G.S. § 15A-1443(b). For reasons similar to those stated in Hunt, we determine beyond a reasonable doubt that the structure and nature of the North Carolina capital punishment system provided defendant with reasonable and constitutionally sufficient notice of the aggravating circumstances that might be established by the state during defendant’s capital sentencing proceeding. See id. at 274-78, 582 S.E.2d at 604-06. This assignment of error is without merit. Additionally, defendant contends that the short-form murder indictment used to charge him improperly alleged only the elements of second-degree murder and omitted the additional elements necessary to allege first-degree murder. Defendant concedes, as he must, that this Court has consistently rejected this argument. See, e.g., State v. Barden, 356 N.C. 316, 383-84, 572 S.E.2d 108, 150 (2002), cert. denied,-U.S. • — •, 155 L. Ed. 2d 1074 (2003); State v. Braxton, 352 N.C. 158, 174-75, 531 S.E.2d 428, 437 (2000), cert. denied, 531 U.S. 1130, 148 L. Ed. 2d 797 (2001); State v. Wallace, 351 N.C. 481, 508, 528 S.E.2d 326, 343, cert. denied, 531 U.S. 1018, 148 L. Ed. 2d 498 (2000); see also Hunt, 357 N.C. at 275, 582 S.E.2d at 604. We have considered defendant’s contention on this issue and find no reason to depart from our prior holdings. Having concluded that defendant’s trial and capital sentencing proceeding were free from prejudicial error, we are required to determine: (1) whether the record supports the jury’s finding of any aggravating circumstances upon which the sentencing court based its sentence of death; (2) whether the death sentence was imposed under the influence of passion, prejudice, or any other arbitrary factor; and (3) whether the death sentence is excessive or disproportionate to the penalty imposed in similar cases, considering both the crime and the defendant. N.C.G.S. § 15A-2000(d)(2). In the present case, defendant was convicted of two counts of murder, one count of discharging a firearm into occupied property, and one count of possession of a firearm by a convicted felon. The conviction for Tyrone Baker’s murder was based on a theory of premeditation and deliberation. The conviction for Demetrius Greene’s murder was based upon (1) a theory of premeditation and deliberation under the doctrine of transferred intent; and (2) the felony murder rule, with the Baker murder serving as the underlying felony. In each case, the jury found the same five statutory aggravating circumstances: (1) defendant had been previously convicted of a capital felony, N.C.G.S. § 15A-2000(e)(2); (2) defendant had been previously convicted of second-degree kidnapping, N.C.G.S. § 15A-2000(e)(3); (3) defendant had been previously convicted of armed robbery, N.C.G.S. § 15A-2000(e)(3); (4) defendant had been previously convicted of first-degree burglary, N.C.G.S. § 15A-2000(e)(3); and (5) the murder was part of a course of conduct that included the commission of other crimes of violence against other people, N.C.G.S. § 15A-2000(e)(ll). The first four aggravating circumstances in each case were supported by defendant’s various convictions in connection with the Brunson murder. The fifth circumstance in each case was supported by the evidence of defendant’s involvement in the Richardson and Tyson shootings. The trial court submitted to the jury four statutory mitigating circumstances as to each murder, including the catchall mitigating circumstance, N.C.G.S. § 15A-2000(f)(9). The jury found that only one statutory mitigating circumstance existed as to each murder: defendant acted under duress. N.C.G.S. § 15A-2000(f)(5) (2001). Of the thirteen nonstatutory mitigating circumstances which were submitted to the jury as to each murder, one or more jurors found that eleven circumstances existed and had mitigating value. After thoroughly examining the record, transcript, and briefs in this case, we conclude the evidence fully supports the aggravating circumstances found by the jury. Moreover, we find no indication that the death sentences were imposed under the influence of passion, prejudice, or any other arbitrary consideration. Defendant does not contend otherwise. Defendant does contend, however, that the sentence imposed upon him is excessive and disproportionate. Accordingly, and in light of N.C.G.S. § 15A-2000(d)(2), we turn to our statutorily imposed duty of proportionality review. The purpose of our proportionality review “ ‘is to eliminate the possibility that a person will be sentenced to die by the action of an aberrant jury.’ ” State v. Atkins, 349 N.C. 62, 114, 505 S.E.2d 97, 129 (1998) (quoting State v. Holden, 321 N.C. 125, 164-65, 362 S.E.2d 513, 537 (1987), cert. denied, 486 U.S. 1061, 100 L. Ed. 2d 935 (1988)), cert. denied, 526 U.S. 1147, 143 L. Ed. 2d 1036 (1999). In conducting our proportionality review, we compare the present case with other cases in which this Court has concluded that the death penalty was disproportionate. State v. McCollum, 334 N.C. 208, 240, 433 S.E.2d 144, 162 (1993), cert. denied, 512 U.S. 1254, 129 L. Ed. 2d 895 (1994). We have found the death penalty disproportionate in eight cases. State v. Kemmerlin, 356 N.C. 446, 573 S.E.2d 870 (2002); Benson, 323 N.C. 318, 372 S.E.2d 517; State v. Stokes, 319 N.C. 1, 352 S.E.2d 653 (1987); State v. Rogers, 316 N.C. 203, 341 S.E.2d 713 (1986), overruled on other grounds by State v. Gaines, 345 N.C. 647, 483 S.E.2d 396, cert. denied, 522 U.S. 900, 139 L. Ed. 2d 177 (1997), and by State v. Vandiver, 321 N.C. 570, 364 S.E.2d 373 (1988); State v. Young, 312 N.C. 669, 325 S.E.2d 181 (1985); State v. Hill, 311 N.C. 465, 319 S.E.2d 163 (1984); State v. Bondurant, 309 N.C. 674, 309 S.E.2d 170 (1983); State v. Jackson, 309 N.C. 26, 305 S.E.2d 703 (1983). After careful review, we conclude that the present case is not substantially similar to any case in which this Court has found the death penalty disproportionate. There are a number of distinctions between the present case and the disproportionate cases. First, defendant was convicted of first-degree murder on the basis of premeditation and deliberation. This indicates “a more calculated and cold-blooded crime.” Lee, 335 N.C. at 297, 439 S.E.2d at 575. The evidence strongly supported a finding of premeditated and deliberate murder. Here, defendant had been warned Baker was looking for him and had armed himself in anticipation of “doing what [he] had to do” if confronted. Defendant had been involved in a similar confrontation just a few days prior, and had shot and wounded Keith Lamont Richardson. Further, defendant testified that during the instant shootings, Baker had immediately started running after defendant fired the first shot. Despite the fact that Baker was obviously in flight, defendant chased Baker some distance down the street, firing at him repeatedly and continuously until Baker collapsed. Second, defendant was found guilty of two counts of first-degree murder. This Court has never found a death sentence disproportionate in a case where the defendant has been convicted of multiple murders. State v. Goode, 341 N.C. 513, 552, 461 S.E.2d 631, 654 (1995). The fact that defendant was convicted of the murder of Demetrius Greene on the basis of transferred intent does not change this analysis. “This Court has affirmed the death penalty in several cases involving death or serious injury to one or more persons other than the murder victim.” State v. McHone, 334 N.C. 627, 648, 435 S.E.2d 296, 308 (1993), cert. denied, 511 U.S. 1046, 128 L. Ed. 2d 220 (1994). Defendant fired repeatedly and recklessly at his intended victim while he was running down a busy residential city street crowded with innocent people. Defendant’s actions demonstrate an egregious and callous disregard for the sanctity of life and the safety of others. Only fate prevented defendant from being charged and convicted of several more murders. Third, this Court has also never found a death sentence disproportionate where the defendant has been convicted of a prior violent felony. State v. Jones, 342 N.C. 457, 481, 466 S.E.2d 696, 708, cert. denied, 518 U.S. 1010, 135 L. Ed. 2d 1058 (1996). “A jury could well be more willing to impose the death sentence on one who is prone to violence.” Id. Fourth, the jury found the existence of the course of conduct aggravating circumstance in connection with each murder. This Court has held that the course of conduct circumstance, standing alone, is sufficient to support a death sentence. State v. Bacon, 337 N.C. 66, 110 n.8, 446 S.E.2d 542, 566 n.8 (1994), cert. denied, 513 U.S. 1159, 130 L. Ed. 2d 1083 (1995). The evidence clearly shows that defendant’s violent behavior on 16 February 1997 was not an isolated incident, but was indicative of a dangerous pattern of violence. Fifth, and finally, the jury expressly refused to find two circumstances this Court has found key to a finding of disproportionality. Although the trial court submitted them, the jury refused to find either of the statutory mitigating circumstances described under N.C.G.S. § 15A-2000(f)(2) (murder committed while under the influence of a mental or emotional disturbance) and 15A-2000(f)(7) (defendant’s age at the time of the crime). This Court has relied on similar types of considerations in the past when ruling a death sentence disproportionate. Stokes, 319 N.C. at 21, 352 S.E.2d at 664 (age and impaired mental incapacity); see also Bondurant, 309 N.C. at 693-94, 309 S.E.2d at 182 (severe inebriation). We also compare the present case with cases in which this Court has found the death penalty proportionate. See McCollum, 334 N.C. at 240, 244, 433 S.E.2d at 162, 164. Although this Court considers all the cases in the pool of similar cases when engaging in proportionality review, “we will not undertake to discuss or cite all of those cases each time we carry out that duty.” State v. Gregory, 348 N.C. 203, 213, 499 S.E.2d 753, 760, cert. denied, 525 U.S. 952, 142 L. Ed. 2d 315 (1998). Here, for the reasons discussed above, we find this case more similar to cases in which we have found a sentence of death proportionate than to those in which we have found a sentence of death disproportionate. See McCollum, 334 N.C. at 244, 433 S.E.2d at 164. “Whether a sentence of death is ‘disproportionate in a particular case ultimately rest[s] upon the “experienced judgments” of the members of this Court.’ ” State v. Carroll, 356 N.C. 526, 555, 573 S.E.2d 899, 918 (2002) (quoting State v. Green, 336 N.C. 142, 198, 443 S.E.2d 14, 47, cert. denied, 513 U.S. 1046, 130 L. Ed. 2d 547 (1994)), cert. denied,-U.S.-, 156 L. Ed. 2d 640 (2003). Based upon the characteristics of this defendant and the crimes he committed, we are convinced that the death sentences recommended by the jury and ordered by the trial court in the instant case are not disproportionate. Defendant received a fair trial and capital sentencing proceeding free from prejudicial error. Accordingly, the judgments of the trial court sentencing defendant to death must be left undisturbed. NO ERROR.
CASELAW
Page:The Works of the Reverend George Whitefield, M.A. (1771 Vol 1).djvu/311 Dear James, I do not forget you. I hope you never will forget the love of, who died and hath given himself for you. Does not the very thought of this make you even to weep? Do you not want some private place where to vent your heart? Away then, I will detain you no longer. Retire into the woods. Go look to him whom you have pierced, and with a godly sorrow mourn for your sins, as a woman for her first-*born. At the same time, forget not to sigh out a prayer in behalf of, dear James, Your affectionate friend and servant, G. W. LETTER CCCXXIX. To Thomas Webb, an Orphan. On board the Mary and Ann, July 27, 1741. Dear Thomas, HOW inconsistent is the devil! How artfully does he strive to keep poor souls from ! Sometimes he labours to drive poor souls into despair; sometimes to presumption. These are the two rocks, against which he would fain have poor souls to make shipwreck of faith and a good conscience. I pray God to enable you to steer a middle course.—May you see your misery, and at the same time see your remedy in the cross and wounds of. He calls to all weary heavy laden souls; consequently he calls you. Your coming to him, will be a proof of your election. The devils know nothing of 's decrees. If ever he should tempt you so again, say, "If I do perish, I will perish at the feet of ." He is willing to save, to save to the uttermost. He sees, he feels your anguish. He longs to rejoice over you. Venture therefore upon him. Thomas, be not faithless, but believing. shall yet shew you his hands and his feet. He is the same now, as he was yesterday, full of love and condescension to self-condemned sinners. That you may experience the full power and efficacy of the Redeemer's blood, is the ardent prayer of, dear Thomas, Your sincere friend, G. W.
WIKI
Te Pēhi Kupe Te Pēhi Kupe (c. 1795–1828) was a Māori rangatira and war leader of Ngāti Toa and the uncle of Te Rauparaha. He took a leading part in what became known as the Musket Wars. He led the force that captured Kapiti Island for Ngāti Toa, then in 1824 managed to brazenly force passage on a ship to England where he was presented to George IV, learned to ride, recorded his moko and had his portrait painted. On his return journey he sold the various presents he had received in Sydney to purchase arms and ammunition, and was soon part of fellow Ngāti Toa chief Te Rauparaha's 1828 raids on the South Island. After sacking the pā at Kaikōura and Omihi they went further south to the major Ngāi Tahu pā at Kaiapoi, where they wished to trade. Learning that Te Rauparaha intended to attack them in the morning, and being aware of the attacks on their people at Kaikōura, the Kaiapoi people attacked the Ngati Toa. Te Pēhi was one of three Ngāti Toa chiefs killed as they slept overnight there, and this incident led to the revenge raids by Te Rauparaha in 1830 with the capture of Tama-i-hara-nui from Takapūneke near present-day Akaroa and the three-month successful siege of Kaiapoi and sacking of Ōnawe the next year.
WIKI
Annemiek Padt-Jansen Anna Maria Catharina "Annemiek" Padt-Jansen (15 August 1921 – 18 March 2007) was a Dutch harpist and politician. She was a member of the House of Representatives for the Labour Party from June 1969 until 10 May 1971 and again from 14 March 1972 until 7 December 1972. She was also a member of the board of the public broadcasting association VARA. She was a sister of the stand-up comedian. Political Positions During her time in parliament she was focused on children's rights and the emancipation of women and sexual minorities. Despite being a Roman Catholic, she believed that religion did not have a place in public life, and when sworn in as a member of parliament, she chose to take a secular, rather than religious, oath. Personal life Padt-Jansen was a Roman Catholic. She was married to Frans Jacob Padt until his death in 1969, and never remarried.
WIKI
Motors And Generators. Essay 1924 words - 8 pages Magnetism and Moving charges*Oersted had showed in the 19th century that a current carrying conductor was surrounded by a magnetic field*Moving charges experience a force in a magnetic fieldFactors that effect the magnitude of force*F = ILBsinƒÖVan Allen Radiation belts - example pf motion of charged particles in a field*Charged particles trapped inside the earth's magnetic field, which oscillate back and forth between the poles*These charged particles experience a force due to earth's magnetic field*Force strong perpendicular, none parallel - always has parallel and perpendicular components - there spiral out of controlForces on Parallel wires*Like current attract*Unlike currents repel*F = k I1I2L dThe Ampere*Defined in terms of the force between two parallel current carrying wires*One ampere flows in each infinitely long parallel wires, separated by 1 meter in a vacuum - force exerted is 2 x 10-7Experiment - Investigating the motor effect*Use of a current balance - on knife edgesMotor effect*The motion produced by the force acting in a current carrying wire in a magnetic field is called the motor effect*'Torque experienced by a current carrying wire in a magnetic field'Torque is defined as the turning moment of a force*T = Fd*Product of the force and perpendicular distance from axis to line of action of forceForces experienced by a current carrying loop in a magnetic filed*A current carrying loop in a magnetic field experiences a torque*Wire is catapulted from string B to weak B*Two long parallel wires - like currents attract, unlike repelRadial Magnetic field*Pole pieces of magnet are curved - thus coil always lies parallel to field - torque always maxElectric Motors*Convert electrical energy into mechanical energy*Classified as eitheroAC motors - induction, SynchronousoDC motors - Commutator motors*Consists of the followingoRotor - rotating partoStator - stationary part*In some cases the rotor carries the current, while stator provides magnetic field*In other cases B is the rotor, and stator carries IFeatures of DC*Armature*Magnetic field - permanent or electromagnets*Commutator - reverses direction of I every half turn*Conducting brushes - takes I to and from armatureArmature and Field Structure*Armature - number of coils are wrapped around iron core - free to rotate around the horizontal axis*Simple field structure - permanent magnets or electromagnets (more effective - larger magnetic field)*Curved magnets improve smoothness of torque - always max*Rectangular armature - located between field structureImportance of Commutator*Reverses direction of I every half turn - enables continuous spin of armature*Each commutator segment connected to either side of Armature*Momentum helps the process which creates a continuous motion in one directionRole of metal split ring and brushes in commutator*Metal split ringoCopper cylinder - 2 electronically separate halfsoEach half connected to one side of the armature*Conducting brushesoBrushes... Find Another Essay On Motors and Generators. aqa somehingn2jjjj2j2jj jjjj2jjjj - uhc - aqa something 4117 words - 17 pages Winchester Kits) and investigate how the speed and direction of rotation can be changed. BBC Bitesize – Electric motors Cyberphysics – The Motor Effect Pass My Exams – Electric Motors & Generators 4.7.2.2 The direction of rotation of a motor can be changed. HT only. The direction of the force on the conductor is reversed if either the direction of the current or the direction of the magnetic field is reversed. 0.5 Explain why changing the direction of the fewgewf Essay 1119 words - 4 pages alternating current, which means the voltage produced alternately reverses from positive to negative polarity, producing a corresponding change in the direction of current flow.Much like a DC generator, an AC generator requires a coil to cut across the force lines of a magnetic field. This coil is attached to two slip rings, which deliver the current to and from the load destination, thus completing the circuit. Alternating current generators are often Electronics and Communication Engeineering 952 words - 4 pages introduced us to power devices like power diodes, BJTs and MOSFETs and the tradeoffs involved with switching time/breakdown voltage/on-resistance. The course also covered the 3 basic DC-DC converter topologies – Buck, Boost, Buck-Boost, rectifiers and inverters. We were introduced to DC brushed motors, brushless motors, induction motors, stepper motors and the control strategies involved with each. This was where I really liked power electronics due to This Is An Industry Analysis On Electrical Equipments In US 916 words - 4 pages for motors and generators are utilities, pulp and paper manufacturers, petroleum refineries, mining operations, and other process oriented industries.The major customers for both switchgears and industrial controls are utilities, industrial companies, manufacturers, industrial companies, and wholesalers.Geography plays an important role in the electrical equipment manufacturing industry. “Proximity to complementary and secondary Copper 632 words - 3 pages rust. However, when the air grows damp, copperwill go from reddish-orange to reddish brown. After being in damp air forlong periods of time, a green film will coat the copper, called patina, whichwill protect it from further corrosion.Since copper is one of the most widely used metals in theworld we use it for a lot of things. Copper gives us water heaters, boilers andcooking utensils. It is used for out door power lines, cables, lamp cords, andhouse wiring. Electrical machinery like generators, motors, controllers,signaling devices, electro magnets, and communication devices all usecopper. Electricity Created by Magnets 1855 words - 8 pages applications and without magnets the technology that people take for granted would not be possible. “Magnets are essential for the generation of electric power and are used in motors, generators …” (Magnet). However, understanding magnets at the atomic level will give the source to why magnets have a south and north pole. The electrons of an atom are similar in all atoms for they spin or rotate as they move around the center of the atom just like the The Historical Development of AC Electricity and the Scientific Debate between Edison's DC Power System and Tesla's AC Power System 1516 words - 7 pages in 1882, where Sabastian Ferranti, in conjunction with Lord Kelvin designed electronic devices that could be used to implement an AC power system, including electrical generators and transformers. Five years later, Ferranti designed the Deptford power station, which is today regarded as one of the first power plants to implement a high-voltage generation system. Meanwhile, Michael Faraday’s discoveries in the field of electromagnetic induction The Many Uses of the Element Cobalt 1071 words - 5 pages corrosion resistant steels too. Cobalt is also used in other metals that are used for electronics and magnetics. Cobalt is used in magnets and electronics in quite a few ways. One use for cobalt is in magnetic alloys that are meant to keep a magnetic field for a certain period of time. These fields are used in motors and generators (Newton). Cobalt is used in these fields for many reasons. The main reason though is that cobalt has a high Curie The Many Uses of Cobalt 1084 words - 5 pages metals that are made for electronics and magnetics. Cobalt is in magnets and electronics in quite a few ways. One use for cobalt is in magnetic alloys that are meant to keep a magnetic field for a certain period of time. These fields include motors and generators (Newton). Cobalt is used in these fields for many reasons. The main reason though is that cobalt has a high Curie temperature. A Curie temperature is basically how hot a metal can be Marine Technician 1091 words - 4 pages and inspecting motors to locate defective parts, repairing engine mechanical equipment, and adjusting generators and replacing faulty wiring (America's Career InfoNet) are all things that I will be experiencing daily. Being a fishermen and around boats very often I had to adapt to them, learning to control and be able to fix the problems on my own. Some other things I will be doing in the field are very time consuming. These tasks as CareerOneStop The Diesel Hybrid Combustion Engine 1321 words - 5 pages utilizes diesel fuel and electric motors. The basic design started with removing all the original engine parts and replacing them with a 6.0L Daewoo diesel engine and 20 volt lead acid batteries (Siuru 1). This design uses the diesel engine, which acts as a generator to charge the batteries. The batteries are then used to power the locomotive. Batteries propel the locomotive leaving more empty space under the hood. The result of all this is Similar Essays Literature Review: Electric Motors And Generators 1534 words - 7 pages . 2014. . • "DC MOTORS AND GENERATORS." YouTube. YouTube, 25 July 2010. Web. 1 Mar. 2014. . • "Electric Fields." YouTube. YouTube, 9 Sept. 2010. Web. 1 Mar. 2014. . • "Electric motors and generators." Electric motors and generators. N.p., n.d. Web. 26 Feb. 2014. Hsc Physics – Motors And Generators – Summary Notes 975 words - 4 pages Motors and magnetic forces•Motor effect & F = BILoA current carrying conductor in a magnetic field experiences a force.oF = nBIL sin ӨF = force on conductor (N)n = number of coilsB = magnetic field strength (T)I = current in conductor (A)Ө = angle between conductor and magnetic field.•Conductor right angle to field = strong. Parallel = no force.•Force between current carrying wiresoAmpere’s Law: F = k I1 I2 Motor Rewinding Process Essay 1478 words - 6 pages pole? Masinde: Motors run due to effects of magnetism and hence artificial north and south poles of a magnet are created electrically through proper laying of turns in the slots. Writer: Between motors and generators, which one is easier to rewind? Masinde: Motors Writer: Why? Masinde: Motors have lesser internal details to consider than generators Writer: What do you mean by internal details? Masinde: Internal details mean the composition of the Nikola Tesla Essay 905 words - 4 pages after one year. In 1887, Tesla started the Tesla Electric Company in New York City. There, he produced three complete systems of AC machinery. For each system, Tesla designed generators to supply the current, motors that use the current, transformers to raise and lower voltages, and a variety of devices to automatically control the machinery. Tesla received patents for his polyphase system of AC generators, transformers, and motors in 1888
ESSENTIALAI-STEM
The past perfect continuous (also known as the past perfect progressive) is used to show that an action began in the past and continued to another time in the past. It is usually used to say how long that action had been in progress for, but it can also be used to say that an action caused a noticeable result in the past. This explanation also includes the difference between the past perfect and the past perfect continuous. You can download this guide, as well as a number of past perfect continuous grammar activities, in PDF format using the links at the bottom of this page. How to form the past perfect continuous Actions that were in progress before another time in the past We use the past perfect continuous to say an action or activity was in progress before another time in the past. If the past time is not known by the other person, we can state this using completed times in the past or with a time clause using the simple past. This is slightly different to the past continuous, which is used to show an action in progress at the specific time in the past, rather than before it. The past perfect continuous is often used to state the duration of a past action was in progress before another time in the past. To state the duration, we can use for, since and all: - I had been waiting for two hours when the doctor eventually saw me. - They had been living together for five years before they split up. - I’d been thinking about what you said since the last time we spoke. - Jamie had been working for the government since 1989 when he decided to retire last year. - Rachel hadn’t been feeling well all week, so she went to the doctor. - They’d been stealing cars all year before the police caught them. Note: If the focus of the sentence is on quantity, use the past perfect: She’d been sending five emails when I last checked. She’d sent five emails when I last checked. We’d been visiting Rome twice before my birthday. We’d visited Rome twice before my birthday. They had been winning the cup seven times before their latest victory. They had won the cup seven times before their latest victory. Note: The past perfect continuous shows that an action continued up to a time in the past. If the action had already finished before the time in the past, use the past perfect: - She had been writing the report for hours before the deadline. (She was writing the report up until the deadline.) - She had written the report before the deadline. (She completed writing the report before the deadline.) - My company had been making a lot of money before the covid pandemic began. (the company was still making a lot of money up to the point when the covid pandemic began) - My company had made a lot of money before the covid pandemic began. (the company had already made a lot of money before the covid pandemic began) The cause of something in the past We can use the past perfect continuous to show the cause of something that happened in the past: - She was upset because she had been arguing with her boyfriend. - Fiona felt sick because she had been eating so much chocolate. - Stanley was fired because he had been arriving late every day. - Her eyes were red as she had been crying. A noticeable result in the past We can use the past perfect continuous to show that a past action caused a noticeable result at a later time in the past. This is usually something you can sense (see, smell, feel, etc). - The room stunk of alcohol. Somebody had been drinking the night before. - He had been gardening so his hands were dirty. - The car was covered in mud. She had been off-roading in the countryside. - The house was in disarray. The kids had been playing all day. We don’t use any continuous tenses when we are talking about states: I had been knowing him for five years before he became famous. I had known him for five years before he became famous. We had been having that car for seven months before we sold it. We had had that car for seven months before we sold it. They had been belonging to that church for two years before it closed. They had belonged to that church for two years before it closed. Click on the links below to download a PDF version of this guide as well as a number of past perfect continuous activities:
FINEWEB-EDU
Credit Suisse takeover, central bank action calm jittery markets By Stefania Spezzati and Tom Westbrook March 20 (Reuters) - Moves by authorities to avert a global banking crisis appeared to have lifted market confidence on Monday as investors welcomed emergency dollar liquidity from top central banks and a historic Swiss-backed acquisition of troubled Credit Suisse by UBS Group. In a package orchestrated by Swiss regulators on Sunday, UBS Group AG UBSG.Swill pay 3 billion Swiss francs ($3.23 billion) for 167-year-old Credit Suisse Group AG CSGN.S and assume up to $5.4 billion in losses. Major central banks, faced with the risk of a fast-moving loss of confidence in the financial system, also scrambled on Sunday to bolster the flow of cash around the world with a series of coordinated currency swaps to ensure banks have the dollars needed to operate. The Swiss banking marriage is backed by a massive government guarantee, helping prevent what would have been one of the largest banking collapses since the fall of Lehman Brothers in 2008. Financial markets staged a modest relief rally in Asia on Monday but are wary about a range of risks including contagion, the fragile state of U.S. regional banks, and moral hazard. "Policy makers will be hoping that the weekend's UBS buyout of troubled Credit Suisse will draw a line under recent market stresses," said Brian Martin, ANZ head of G3 economics in London. "Central banks were already facing the conundrum of 'how much is enough?' in the face of resilient labour markets, given the lags with which their policy decisions affect economies. They now have a new conundrum: 'how much is too much?' for financial stability?" Pressure on UBS helped seal Sunday's deal. "It's a historic day in Switzerland, and a day frankly, we hoped, would not come," UBS Chairman Colm Kelleher told analysts on a conference call. "I would like to make it clear that while we did not initiate discussions, we believe that this transaction is financially attractive for UBS shareholders," Kelleher said. UBS CEO Ralph Hamers said there were still many details to be worked through. "I know that there must be still questions that we have not been able to answer," he said. "And I understand that and I even want to apologise for it." In a global response not seen since the height of the pandemic, the Fed said it had joined central banks in Canada, England, Japan, the EU and Switzerland in a coordinated action to enhance market liquidity. The European Central Bank vowed to support euro zone banks with loans if needed, adding the Swiss rescue of Credit Suisse was "instrumental" in restoring calm. UNRESOLVED ISSUES Problems remain in the U.S. banking sector, where bank stocks remained under pressure despite a move by several large banks to deposit $30 billion into First Republic Bank FRC.N, an institution rocked by the failures of Silicon Valley and Signature Bank SBNY.O. On Sunday, First Republic saw its credit ratings downgraded deeper into junk status by S&P Global, which said the deposit infusion may not solve its liquidity problems. U.S. bank deposits have stabilized, with outflows slowing or stopping and in some cases reversing, a U.S. official said on Sunday, adding the problems of Credit Suisse are unrelated to recent deposit runs on U.S. banks and that U.S. banks have limited exposure to Credit Suisse. The U.S. Federal Deposit Insurance Corp (FDIC) is planning to relaunch the sale process for Silicon Valley Bank SIVB.O, with the regulator seeking a potential breakup of the lender, according to people familiar with the matter. There are also concerns about what happens next at Credit Suisse and what that means for investors and employees. UBS chairman Kelleher told a media conference that it will wind down Credit Suisse's investment bank, which has thousands of employees worldwide. UBS said it expected annual cost savings of some $7 billion by 2027. The Swiss central bank said Sunday's deal includes 100 billion Swiss francs ($108 billion) in liquidity assistance for UBS and Credit Suisse. Credit Suisse shares had lost a quarter of their value last week. The bank was forced to tap $54 billion in central bank funding as it tries to recover from scandals that have undermined confidence. Under the deal with UBS, some Credit Suisse bondholders are major losers. The Swiss regulator decided that Credit Suisse bonds with a notional value of $17 billion will be valued at zero, angering some of the holders of the debt who thought they would be better protected than shareholders in the takeover deal announced on Sunday. ($1 = 0.9280 Swiss francs) Credit Suisse goes off piste https://tmsnrt.rs/42gv7M0 EXPLAINER-Credit Suisse: How did it get to a crisis point TIMELINE-How Credit Suisse has evolved over 167 years Credit Suisse lifeline, Silicon Valley Bank collapse: What you need to know ANALYSIS-Swiss blank cheque wins some time for Credit Suisse FACTBOX-Credit Suisse's troubles - spies, money laundering and central bank cash Credit Suisse and First Republic Bankhttps://tmsnrt.rs/3TrrFdA GRAPHIC-Credit Suisse goes off piste https://tmsnrt.rs/40arfdB GRAPHIC-Credit Suisse outflowhttps://tmsnrt.rs/3ZUJLqR GRAPHIC-Short positions on Credit Suissehttps://tmsnrt.rs/3XqcF0m EXCLUSIVE-UBS seeks about $6 bn in government guarantees for Credit Suisse deal -source BREAKINGVIEWS-Credit Suisse puts new dent in Swiss bank armour BREAKINGVIEWS-Credit Suisse’s cash line is just a stopgap GRAPHIC-Bank exposurehttps://tmsnrt.rs/3FxTWcJ Tale of two banks Tale of two bankshttps://tmsnrt.rs/3n1xPVC GRAPHIC-European bank sell-offhttps://tmsnrt.rs/40eAA4R GRAPHIC-Bank deposits turn lower Bank deposits turn lowerhttps://tmsnrt.rs/3TsVbj1 GRAPHIC-Majority of Americans oppose a bank bailouthttps://tmsnrt.rs/408dP1Y GRAPHIC-SVB, Signature Bank are first bank failures since 2020https://tmsnrt.rs/3T855X3 ANALYSIS-Asset concerns weigh on U.S. regional bank deal talks ANALYSIS-As worries over banks swirl, investors seek protection against market crash (Reporting by Stefania Spezzati, Oliver Hirt and John O'Donnell in Zurich; Additional reporting by Lananh Nguyen, Saeed Azhar and Hannah Langby and Reuters bureaus; Writing by Nick Zieminski and Sam Holmes; Editing by Lisa Shumaker and Muralikumar Anantharaman) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Cisco to buy optical gear maker Acacia for $2.8 billion to build 5G muscle (Reuters) - Network gear maker Cisco Systems Inc said on Tuesday it would buy optical component maker Acacia Communications Inc for $2.84 billion in cash, as it seeks to garner a bigger chunk of 5G spending by telecom companies. Globally, mobile networks would need higher-capacity optical interfaces to handle a surge of data when high-speed fifth-generation network comes on line in the next few years. Morningstar analyst Mark Cash said the acquisition will bolster Cisco’s technology for service providers upgrading to 5G and put its optical portfolio ahead of the shift toward using plug and play devices across various communication segments. According to Cisco’s Visual Networking Index, global internet traffic is projected to more than triple to 13.2 exabytes per day in 2022 from 4.1 exabytes per day in 2017. “Cisco’s optical portfolio was mainly for short range data center connections, and now gains Acacia’s skill set in areas such as metro, long-haul, and undersea,” Cash said. Revenue in Cisco’s infrastructure platform business, which includes switches and routers, rose 5% to $7.55 billion in its third quarter. That business is expected to get a boost from 5G communication networks, but Cisco executives have said they do not expect an impact until 2020. Cisco Chief Executive Officer Chuck Robbins, who took the helm in July 2015, has made acquisitions a central part of his efforts to add muscle to the hardware giant’s newer growth areas such as the cloud, internet of things and cyber security. Cisco’s $70 per share offer represents a premium of about 46% to Acacia’s closing price on Monday. Shares of Acacia rose about 35% to $64.86, while those of the Dow component were down marginally at $56.08. The deal is Cisco’s biggest since its $3.7 billion purchase of business performance monitoring software company AppDynamics in 2017. Acacia designs and manufactures high-speed, optical components and counts telecom service providers and data center operators as customers. Cisco is among its top 5 customers. Excluding Acacia’s cash and marketable securities, the deal is valued at $2.6 billion, Cisco said. The acquisition is expected to close during the second half of Cisco’s full year 2020. Reporting by Akanksha Rana and Vibhuti Sharma in Bengaluru; Editing by Maju Samuel and Saumyadeb Chakrabarty
NEWS-MULTISOURCE
Page:NTSB Rar-94-01.pdf/63 The MCEMA had most reccntly conducted a drill, simulating an aircraft accident, on June 17, 1993, in Mobile Bay. The local police and fire departments, Coast Guard, Sheriff's Department, and other agencies involved in the September 22 Amtrak accident participated Similar drills for accidents involving railroad operations would give participating agencies an opportunity to learn about their responsibilities and jurisdictions and to practice notification procedures, as well as mcthods of accounting for passengers and crew. The Safety Board concludes that if the MCEMA had held drills to simulate a train accident, the incident commander may have known about Amtrak's procedures for ticketing passengers, and CSXT may have had the correct telephone number for the Coast Guard. The Safety Board therefore recommends that the Federal Emergency Management Agency encourage local authorities to conduct emergency drills that simulate transportation accidents involving railroad operations. MCEMA critique of emergency response—In testimony, both the incident commander and the SAR controller discussed the emergency response to this accident. On September 28, 1993, the MCEMA conducted a critique of the emergency response that included represcentatives from many responding agencies A synopsis of major suggestions and observations follows * Because the Civil Air Patrol provided real-time television pictures to the MCEMA, the agency was able to monitor conditions at the accident site. * Agencies and volunteers shared their resources and helped transport equipment to the accident site. * Cellular phones were used to reduce radio communication problems and to limit battery use. * Had smaller boats been available to the Mobile Fire Department, it could have used them to transport personnel and equipment around the accident site * Amtrak representatives had to show divers the layout of cars that remained on the bridge because they were not familiar with the train equipment Since the accident, floor plans and a videotape describing Amtrak's emergency procedures have been provided to the Mobile Fire Department. A postaccident critique such as this one, especially when done in conjunction with periodic drills, is a valuable tool for identifying and implementing improvements in emergency response procedures. 57
WIKI