Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Ready To Heel That Pain? Plantar Fascia Ruptures and Tears Plantar Fasciitis sufferers are at risk for two types of physical injury: ruptures and tears of the plantar fascia ligament. This article provides an easy-to-read summary of both types of injuries and describes common treatment options. Plantar Fasciitis is a condition involving the plantar fascia ligament, which spans the arch of the foot from heel to ball. In a healthy foot, this elastic band of tissue springs and stretches within a healthy range of motion. In the presence of Plantar Fasciitis, the ligament experiences movement beyond this normal range, resulting in inflammation. The most common symptom of Plantar Fasciitis is heel pain, which is often most severe upon arising in the morning, but lessens as the day goes on. If you are experiencing pain in one or both heels, take this as a warning sign that you may be developing Plantar Fasciitis. In many cases, ruptures and tears of the plantar fascia ligament can be avoided with preventative care. What is a Plantar Fascia Rupture? This painful injury makes headlines because of the number of athletes – especially professional basketball players – who experience it. However, plantar fascia ruptures can occur in anyone who participates in high-impact exercise, such as jogging, or from having an abnormal gait due to structural anomalies, being overweight or wearing improper footwear. Ruptures of the plantar fascia ligament may be signaled by a popping sound, intense pain, swelling and bruises appearing on the foot. If your plantar fascia has ruptured, you will typically be unable to rest your full weight on that foot or to push off on it. If you believe you’ve experienced a rupture, you should seek immediate medical help. Surgery is generally not indicated in such cases. Rather, your doctor will typically recommend up to two weeks of rest, the use of a removable walking boot and crutches. You may receive a referral to a physical therapist or instructions for carrying out foot and heel stretching exercises on your own. Once you are able to bear weight on the injured foot again, you will likely receive a recommendation for the use of a custom orthotic shoe insert designed to support and improve the mechanics of the foot. Studies are currently being conducted on the use of Platelet Rich Plasma injections as a means of hastening recovery and providing long-lasting results, but evidence is, as of yet, inconclusive. The average adult will recover from a plantar fascia rupture in three to four months. Avoiding the pain of a plantar fascia rupture and the disruption in daily life it creates should be the goal of anyone experiencing onset symptoms of aching in the heel. Preventative use of a Plantar Fasciitis-specific orthotic insert, such as HTP Heel Seats, can help you ward off serious injury to the plantar fascia ligament before it happens. Our patented Fascia-Bar orthotics are endorsed by athletes and by the American Podiatric Medical Association. What is a Plantar Fascia Tear? Though the term is sometimes used interchangeably with ‘plantar fascia rupture’, a tear in the plantar fascia may have a less pronounced onset. Tears in the ligament tissue can be so small that no popping sound will be heard, and pain may develop so gradually in the heel that the sufferer is not aware of a specific moment at which the injury occurred. As with a rupture of the plantar fascia ligament, tears can result from high-impact exercise, insufficient rest periods, use of ill-fitting footwear, structural conditions of the foot that result in an abnormal gait, obesity and the normal aging process. If left untreated, the plantar fascia ligament can become subject to larger or more numerous tears, weakening the fiber of the plantar fascia and resulting in increased pain to the point of debility. If you have been diagnosed with Plantar Fasciitis, preventing tears or healing existent ones depends upon a combination of rest, icing, heel stretching exercises and daily use of a custom orthotic insert. The Fascia-Bar technology present in HTP Heel Seats is the culmination of 30 years of research and is unique on the orthotics market. A clinical study proves Fascia-Bar technology to be twice as effective in promoting healing from Plantar Fasciitis as a leading name brand. HTP Heel Seats realign the biomechanics of the foot, gently stretching and lifting the injured plantar fascia ligament back into a healthy position. At the same time, these remarkable inserts apply therapeutic acupressure to the heel bone, stimulating the body’s natural ability to heal itself. More than 90% of Heel That Pain’s customers experience significant relief from their symptoms. Don’t Ignore the Warning Signs of Heel Pain Pain is actually a gift in that it is your body’s way of signaling that something has gone wrong. It is never safe to ignore heel pain. By acting quickly, you may prevent plantar fascia ruptures and tears with a combination of rest, icing, stretches and the use of an appropriate orthotic. In addition to preventing serious outcomes, Plantar Fasciitis shoe inserts can speed recovery and prevent future injury. Ready to find the right treatment for your heel pain? Shop our orthotic solutions. Do you have questions about symptoms of heel pain you’ve recently noticed? Phone our heel pain experts at 877-215-3200. Home Remedies HTP Treatments
ESSENTIALAI-STEM
Cyprian (bishop of Wrocław) Cyprian was a medieval Bishop of Wrocław and Lubusz. Little is known about his origins, career or his Episcopal work. From 1193 he was Abbot of the Olbin Monastery and in April 1198 became Bishop of Lubusz. In 1201 was elected bishop in Wrocław becoming the first bishop of Wroclaw selected by the Cathedral chapter not directly by the Prince. He was a close associate and supporter of Silesian Princes Bolesław and Henry the Bearded. With Archbishop of Gniezno, Henryk Kietlicz, he acted as advocate between the warring Piast Princes. He oversaw the foundation of the monastery in Trzebnica. Tradition attributes the removal of the last pagan places of worship to him. He died 16 November 1207.
WIKI
Nosral Recordings Nosral Recordings is a Christian metal record label based out of Madison, Wisconsin, United States. The label originated in 2017, as a sister-label of Rottweiler Records, by Mike Larson of Frost Like Ashes. Shortly after forming in April, by May the label signed Ascending King, their first act. Several acts signed to the label by 2018, including Symphony of Heaven, Nuclear Blaze, Children of Wrath, Cruentis and Enemy of Satan. Eventually, Nosral became a full-on independent label from Rottweiler. In 2019, the label closed and became defunct. Last Known Roster * The Abrasive Realization (disbanded) * Ascending King (active) * Cruentis (active) * Enemy of Satan (active) * Frostnoise (active) * I.N.R.I (active) * Light Unseen (active) * Nattesorg (active) * Nuclear Blaze (active) * Old Man Frost (active) * Outrage A.D. (active) * Symphony of Heaven (active, Rottweiler Records) * Thief on the Cross (active) * Trinityria Hvitetrone (active) * Unblack Metal Fist (active) Former * The Beckoning (disbanded) * Children of Wrath (active, independent) * Dead Human Prophecies (disbanded, as The Abrasive Realization) * Frost Like Ashes (active, Rottweiler Records) * Katharos (active, as Tordenskrall) * Shadow Puncher (active, independent) Associated acts * Ambianicnoise (active, Naorg Production) * Cephalophore (active) * Cryptic Rising (active, independent) * Fear of Ghost (active) * Frostbreath (active) * Ghlavkdur (active) * Noisechrist (active) * Prophetic (active) * Solomon Kane (active) * Thundertrance (active, Naorg Production)
WIKI
Maize streak virus From Wikipedia, the free encyclopedia Jump to: navigation, search Maize streak virus Common names: MSV, streak of maize Causal agents: Maize streak virus Hosts: maize, Urochloa panicoides Vectors: leafhoppers (Cicadulina mbila, and other Cicadulina species, such as C. storeyi, C. arachidis and C. dabrowski) EPPO code: MSV000 Distribution: sub-Saharan Africa Maize streak virus Virus classification Group: Group II (ssDNA) Order: Unassigned Family: Geminiviridae Genus: Mastrevirus Species: Maize streak virus Maize streak virus is a plant disease. It is an insect-transmitted maize pathogen in the genus Mastrevirus of the family Geminiviridae that is endemic in sub-Saharan Africa. The A-strain of MSV (MSV-A) causes sporadic maize streak disease epidemics throughout the maize growing regions of Africa.[1][2][3] MSV was first described by the South African entomologist Claude Fuller who referred to it in a 1901 report as “mealie variegation”.[4] The development of conventionally resistant maize varieties has been a priority since the 1950s in Kenya, Nigeria, South Africa and elsewhere, with a good deal of success: however, there are several genes associated with resistance, and breeding is complex. Transgenically resistant or genetically modified maize varieties are currently under development in South Africa.[5] MSV is mainly transmitted by Cicadulina mbila, but other leafhopper species, such as C. storeyi, C. arachidis and C. dabrowski, are also able to transmit the virus. Typical of all mastreviruses, MSV's circular, ~2.7-Kb monopartite single-stranded (ss) DNA genome encodes only four proteins. Bidirectional transcription from a long intergenic region (LIR) results in the virion-sense expression of a movement protein (MP) and a coat protein (CP), and the complementary-sense expression of the replication-associated proteins, Rep and RepA. Whereas the MP and CP are involved in virus movement and encapsidation,[6] Rep is an essential initiator of virus replication, and RepA is a regulator of host and viral gene transcription.[7][8][9][10] Due to genome size restrictions, MSV usurps host DNA replication and double-stranded DNA break repair proteins to replicate its genome via, respectively, rolling-circle [11] and recombination-dependent mechanisms.[12] References[edit] 1. ^ Dionne N Shepherd, Darren P Martin, Eric Van Der Walt, Kyle Dent, Arvind Varsani, Ed Rybicki (2009), "Maize streak virus: an old and complex ‘emerging’ pathogen", Molecular Plant Pathology 11: 1–12, doi:10.1111/j.1364-3703.2009.00568.x  2. ^ Darren P. Martin and Dionne N. Shepherd (2009), "The epidemiology, economic impact and control of maize streak disease", Food Security 1: 305–315, doi:10.1007/s12571-009-0023-1  3. ^ Nilsa A. Bosque-Pérez (2000), "Eight decades of maize streak virus research", Virus Research 71: 107–121, doi:10.1016/S0168-1702(00)00192-1  4. ^ McAlister, A. (27 October 2010). "South Africa at front line of GM research". Media Club South Africa. Retrieved 21 October 2011.  5. ^ Dionne N. Shepherd, Tichaona Mangwende, Darren P. Martin, Marion Bezuidenhout, Frederik J. Kloppers, Charlene H. Carolissen, Adérito L. Monjane, Edward P. Rybicki, and Jennifer A. Thomson (2007), "Maize streak virus-resistant transgenic maize: a first for Africa", Plant Biotechnology Journal 5: 759–767, doi:10.1111/j.1467-7652.2007.00279.x, PMID 17924935  6. ^ Sondra G. Lazarowitz, Allison J. Pinder, Vernon D. Damsteegt, and Stephen G. Rogers (1989), "Maize streak virus genes essential for systemic spread and symptom development", EMBO J 8: 1023–1032, PMID 400910  7. ^ Xiangcan Zhan, Kim A. Richardson, Ann Haley and Bret A. M. Morris (1993), "The Activity of the Coat Protein Promoter of Chloris Striate Mosaic Virus Is Enhanced by Its Own and C1-C2 Gene Products", Virology 193: 498–502, doi:10.1006/viro.1993.1153, PMID 8438584  8. ^ JMI Hofer, EL Dekker, HV Reynolds, CJ Woolston, BS Cox and PM Mullineaux (1992), "Coordinate Regulation of Replication and Virion Sense Gene Expression in Wheat Dwarf Virus", The Plant Cell 4: 213–223, doi:10.2307/3869574, PMID 1633494  9. ^ Kathleen L. Hefferon, Yong-Sun Moon, Ying Fan (2006), "Multi-tasking of nonstructural gene products is required for bean yellow dwarf geminivirus transcriptional regulation", The FEBS Journal 273: 4482–4494, doi:10.1111/j.1742-4658.2006.05454.x, PMID 16972938  10. ^ S Collin, M Fernández-Lobato, P S Gooding, P M Mullineaux, and C Fenoll (1996), "The two nonstructural proteins from wheat dwarf virus involved in viral gene expression and replication are retinoblastoma-binding proteins", Virology 219: 324–329, doi:10.1006/viro.1996.0256, PMID 8623550  11. ^ Keith Saunders, Andrew Lucy and John Stanley (1991), "DNA forms of the geminivirus African cassava mosaic virus consistent with a rolling circle mechanism of replication", Nucleic Acids Research 19: 2325–2330, doi:10.1093/nar/19.9.2325, PMID 2041773  12. ^ Julia B. Erdmann, Dionne N. Shepherd, Darren P. Martin, Arvind Varsani, Edward P. Rybicki, and Holger Jeske (2010), "Replicative intermediates of maize streak virus found during leaf development.", Journal of General Virology 91: 1077–1081, doi:10.1099/vir.0.017574-0, PMID 20032206  External links[edit] *http://www.sciencemag.org/cgi/content/summary/315/5809/182
ESSENTIALAI-STEM
Vestbygda, Nordland Vestbygda or Offersøy is a village in Lødingen Municipality in Nordland county, Norway. The village is located on the southern shore of the island of Hinnøya along the inner part of the Vestfjorden. It is located about 50 km by car southwest of the main village of Lødingen. The central village area of Vestbygda is called Offersøy, and that is where Vestbygd Church is located.
WIKI
Farhad’s and Mike’s Week in Tech: The Political Evolution of Silicon Valley Each Saturday, Farhad Manjoo and Mike Isaac, technology reporters at The New York Times, review the week’s news, offering analysis and maybe a joke or two about the most important developments in the tech industry. Mike: Hey hey, Farhad! I regret to say I may not be my usual, incredibly sharp self in this week’s newsletter, as I am dealing with a back injury and the medication may have dulled my wits. So basically I’m down to your level, which may actually make you feel more comfortable. Farhad: What a nasty woman you are. Mike: Um, thank you, Farhad. On to this week’s news! On Monday, another page turned in the endless story that is the Apple car project, the troubled attempts by the Cupertino company to get some sort of self-driving car rolling in the future, as we’ve reported on extensively in the past. According to Bloomberg, the ambitions of the projects have been scaled back drastically, which may mean Apple won’t build its own car after all. It may turn out more like things Uber is doing, which pairs the technology company with automakers to create custom cars with self-driving technology to guide them. Or the whole thing could fall apart. I think Apple should have just bought a carmaker and brought it all in-house. Seems to me that the great hubris of Silicon Valley is thinking that you can build everything, no matter how complex, on your own. Farhad: Hey, Apple’s no puppet. You’re the puppet! You’re the puppet! Mike: I’m going to ignore that and keep going. Speaking of disastrous car wrecks, a bit more Twitter news to talk about. Earlier this week, the company hired Greg Gopman to work on its fledgling virtual reality and 360-degree video efforts. TechCrunch criticized the hire, citing a screed against the homeless that Gopman posted to Facebook a while back that made him persona non grata of San Francisco for quite some time. Shortly after that, Twitter fired Gopman, apparently not wanting to deal with the added headache of a guy who (at one point, but apparently no longer) hated the homeless, especially while the company is dealing with negative headlines from every which direction regarding its sale process, or lack thereof. TechCrunch, bafflingly, criticized that move as well. Some people are never satisfied. For me, the biggest takeaway here is that VR tweets seem like the most insane thing ever. But I have been wrong before. Farhad: Oh, there was another politics-related dust-up in Silicon Valley this week. You remember Peter Thiel, the billionaire venture capitalist who secretly funded the lawsuit that put Gawker out of business and is also the tech world’s most prominent supporter of Donald Trump? Well, a bunch of his friends and associates said this week that they weren’t going to punish him for donating $1.25 million to Trump. Mark Zuckerberg, Facebook’s chief, said Thiel would remain a member of Facebook’s board. “We can’t create a culture that says it cares about diversity and then excludes almost half the country because they back a political candidate,” Zuckerberg wrote in a memo to Facebook’s staff. Citing similar reasons, Y Combinator, the start-up incubator, also said it would not cut ties with Thiel, even though it disagrees with Trump. That set off a wave of outrage among people who’ve been trying to promote diversity in the tech industry. Project Include, a group that seeks to advise companies on gender and racial diversity, said it was cutting off ties with Y Combinator because Thiel’s donation to Trump stands in contrast to its goals. To me, it seems we’re witnessing a newfound political awareness in the tech industry, which is reliably lefty but has long been willing to sit out national political disputes. I don’t think Thiel’s donation is going to cost him anything beyond social awkwardness, but in the long run, I suspect it will spark a progressive awakening among many in the industry. What do you think? Mike: It’s kind of funny to me how willing tech has been to put itself front and center in the global conversation — they eat up magazine covers and love to be on mostly meaningless power lists, just like me — but then feel completely blindsided when their politics are called into question. To me, if you’re building technology that is literally shaping the world as it will be defined in the future, there is no avoiding that your personal ideologies will come into question at some point. Perhaps this Thiel situation will finally bring that sense of self-awareness to those who hadn’t realized this yet. In any case, yeah, I think it’s probably going to rouse techies to be more vocal than they’ve been in the past. Farhad: Yay, more Medium posts! Mike: Finally, I want to talk about Nintendo. The company released its first teaser trailer on Thursday for Switch, a new console that combines the power and familiarity of a video game setup in your living room with the portability of a hand-held gaming device. It’s a novel idea: People still want to play video games on their big-screen TVs at home, so you have to produce a console as successful as the Xbox or PlayStation that can run next-generation graphics and games. That said, everyone games on the go these days. The advent of the smartphone changed what we think of when we think of gaming, as users have migrated en masse to freemium or low-cost app gaming on their phones. It’s easier if, say, you’re commuting, since you only have to carry one device that you already have in your pocket anyway. I have my thoughts on this — namely, it could be awesome or terrible — but I wonder mostly about the content that needs to fill this thing out. And other than the highly successful franchises Nintendo has built out over the years like Mario, Zelda and a handful of others, I haven’t really seen any blockbuster titles from them in some time. What do you think? Fail or win? Farhad: I’m willing to reserve judgment, but at the moment, I’m skeptical of this idea. From the video, the Switch looks like a tablet computer that can be fitted with some game controllers when you’re on the go, and then connected to your TV when you’re home. But if that’s the case, you have to wonder why you need a stand-alone device — why couldn’t you just carry around a controller for your smartphone or tablet, and then connect your device to your TV when you’re home? In other words, why is Nintendo making new hardware when it could simply put out its games for the iPhone, iPad and Android devices? Mike: This is the eternal question for Nintendo. They seem to cling desperately to owning the hardware, which seems questionable to me since it is a lower-margin business than, say, plopping out a series of janky smartphone games and sticking Zelda’s face on it. Farhad: That suggests the second complication. Nintendo recently announced that it is planning to put out some content for other platforms. For instance a Mario game, Super Mario Run, will be available in the iPhone’s App Store this December. But if that’s the case, which platform will get Nintendo’s best games — will Nintendo Switch get the exclusives, or will iOS and Android (which have far more users) be given the same titles? To me, it seems like a complicated path. I’d favor something simpler: Kill the hardware, focus on creating killer games, release them for high prices on iOS and Android, and profit. Mike: An intriguing thought. I’m not sure I fully agree with killing hardware entirely, but I understand the impulse. And for what it’s worth, Nintendo’s valuable intellectual property assets would at least give them a leg up in content in the near term. Look at Disney: After they bought “Star Wars” they planned to crank out a movie a year until 2020, and everywhere I look there’s a BB-8 motorized ball for me to trip over. O.K., enough for me today. I’m going back to my back-healing poses: Lying flat on the floor like a starfish, tweeting from my phone. Farhad: You’re a bad hombre, my friend. A bad hombre. Hope you feel better!
NEWS-MULTISOURCE
Majken Majken or Maiken is a Nordic female given name that may refer to * Maiken Caspersen Falla (born 1990), Norwegian cross-country skier * Majken Åberg (1918–1999), Swedish Olympic discus thrower * Majken Johansson (1930–1993), Swedish poet and writer * Majken Vange (born 1975), Danish Olympic badminton player * Majken Thorup (born 1979), Danish Olympic swimmer * Majken Christensen, Danish, Los Angeles–based musician
WIKI
Impact of obesity on the survival of patients with early-stage squamous cell carcinoma of the oral tongue Neil M. Iyengar, Amit Kochhar, Patrick G. Morris, Luc G. Morris, Xi K. Zhou, Ronald A. Ghossein, Alejandro Pino, Matthew G. Fury, David G. Pfister, Snehal G. Patel, Jay O. Boyle, Clifford A. Hudis, Andrew J. Dannenberg Research output: Contribution to journalArticlepeer-review 40 Scopus citations Abstract BACKGROUND Although obesity increases risk and negatively affects survival for many malignancies, the prognostic implications in squamous cell carcinoma (SCC) of the oral tongue, a disease often associated with prediagnosis weight loss, are unknown. METHODS Patients with T1-T2 oral tongue SCC underwent curative-intent resection in this single-institution study. All patients underwent nutritional assessment prior to surgery. Body mass index (BMI) was calculated from measured height and weight and categorized as obese (≥ 30 kg/m2), overweight (25-29.9 kg/m2), or normal (18.5-24.9 kg/m2). Clinical outcomes, including disease-specific survival, recurrence-free survival, and overall survival, were compared by BMI group using Cox regression. RESULTS From 2000 to 2009, 155 patients (90 men, 65 women) of median age 57 years (range, 18-86 years) were included. Baseline characteristics were similar by BMI group. Obesity was significantly associated with adverse disease-specific survival compared with normal weight in univariable (hazard ratio [HR] = 2.65, 95% confidence interval [CI] = 1.07-6.59; P = .04) and multivariable analyses (HR = 5.01; 95% CI = 1.69-14.81; P = .004). A consistent association was seen between obesity and worse recurrence-free survival (HR = 1.87; 95% CI = 0.90-3.88) and between obesity and worse overall survival (HR = 2.03; 95% CI = 0.88-4.65) though without reaching statistical significance (P = .09 and P = .10, respectively) in multivariable analyses. CONCLUSIONS In this retrospective study, obesity was an adverse independent prognostic variable. This association may not have been previously appreciated due to confounding by multiple factors including prediagnosis weight loss. Original languageEnglish (US) Pages (from-to)983-991 Number of pages9 JournalCancer Volume120 Issue number7 DOIs StatePublished - Apr 1 2014 Keywords • body mass index • head and neck neoplasms • obesity • prognosis • squamous cell carcinoma of the head and neck • tongue neoplasms ASJC Scopus subject areas • Cancer Research • Oncology Fingerprint Dive into the research topics of 'Impact of obesity on the survival of patients with early-stage squamous cell carcinoma of the oral tongue'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Mary Killman Mary Killman (born April 9, 1991) is an American synchronized swimmer. After switching to synchronized swimming from race swimming, Killman was a member of the teams that won silver medals in the duet and team competitions at the 2011 Pan American Games in Guadalajara, Mexico and 2015 Pan American Games in Toronto, Ontario, Canada. Biography Killman was born on April 9, 1991, in Ada, Oklahoma, and grew up in Texas. She is an enrolled member of the Citizen Potawatomi Nation, a federally recognized tribe based in Oklahoma. Originally a competitor in racing events, Killman began to participate in synchronized swimming competitions at the age of 11, and at age 15 gave up racing to focus exclusively on synchronized swimming. After competing in youth competitions through the 2000s, in 2007 Killman was named to her first National Team at the mere age of 16. In 2009 Killman found success at the United States National Championships, finishing third in the solo competition, second in the duet competition, and first in the team competition. Shortly before the 2011 Pan American Games in Guadalajara, Mexico, she was partnered with Mariya Koroleva to compete as a duet. At those games, Killman and Koroleva won a silver medal in the duet competition, and were part of the United States team that won a silver in the team competition as well. The pair qualified for the women's duet at the 2012 Summer Olympics in London, and due to the failure of the United States to qualify for the team event, they were the only American women to compete in synchronized swimming at those games. Following the 2012 Olympics, Killman joined the Lindenwood University synchronized swimming team, one of six collegiate varsity synchronized programs in the United States and is currently a four times USA synchro athlete of the year (2010, 2011, 2012, 2014); she holds five US senior national solo titles (2010, 2013, 2014, 2015, 2016) and three US collegiate national solo titles (2013, 2014, 2015) with the 4th consecutive title not claimed due to not competing at the collegiate level for her senior year.
WIKI
Page:Eliot - Silas Marner, 1907.djvu/301 CHAP. XVI I shall want anything else when we've got a little garden; and I knew Aaron would dig it for us,' she went on with roguish triumph—'I knew that very well.' 'You're a deep little puss; you are,' said Silas, with the mild passive happiness of love-crowned age in his face; 'but you'll make yourself fine and beholden to Aaron.' '0 no, I shan't,' said Eppie, laughing and frisking; 'he likes it' 'Come, come, let me carry your prayer-book, else you'll be dropping it, jumping i' that way.' Eppie was now aware that her behaviour was under observation, but it was only the observation of a friendly donkey, browsing with a log fastened to his foot—a meek donkey, not scornfully critical of human trivialities, but thankful to share in them, if possible, by getting his nose scratched; and Eppie did not fail to gratify him with her usual notice, though it was attended with the inconvenience of his following them, painfully, up to the very door of their home. But the sound of a sharp bark inside, as Eppie put the key in the door, modified the donkey's views, and he limped away again without bidding. The sharp bark was the sign of an excited welcome that was awaiting them from a knowing brown terrier, who, after dancing at their legs in a hysterical manner, rushed with a worrying noise at a tortoise-shell kitten under the loom, and then rushed back with a sharp bark again, as much as to say, 'I have done my duty by this feeble creature, you perceive'; while the lady-mother of
WIKI
August 2014 Transient Ischemic Attacks Transient Ischemic Attacks --TIA’s A transient ischemic attack (TIA) is caused by a temporary reduction of oxygenated and glucose rich blood in the brain. Generally most episodes last only few seconds to a few minutes. Basically it has the same identical origins as ischemic stroke. TIAs are most frequently caused by atherosclerotic cerebrovascular disease. This occurs when cholesterol plaque is deposited inside the major or minor arteries which feed the brain. This plaque forms after the inner lining of an artery has been injured. The plaque causes narrowing of the blood vessels and reduced blood flow, increased the pressure of the blood within the vessel and slows blood flow down. When circulation is slowed, blood platelets tend to clump at the area of injury or blockage. This, along with the deposition of cholesterol causing the atherosclerosis buildup creates a mass which protrudes into the artery hence further slowing down blood flow and eventually either the vessel closes to no longer allow blood flow at all or a blood clot or thrombosis is created. A plaque fragment can break off and be carried by through blood stream to lodge at a distant site in the brain. These are the two main causes of a TIA.   Signs and Symptoms • Sudden onset of weakness, tingling, or numbness typically involving one side of the body. • Vision loss • Speech difficulty, vertigo, double vision, imbalance, or lack of coordination of the limbs. •   What Risk Factors Increase the Chance of a TIA Occurring? The major risk factors contributing to TIAs are: • High blood pressure • Certain types of heart and valvular diseases • Smoking • Diabetes mellitus • Advancing age •   Making The Diagnosis • The most significant symptom of TIA is the speed at which it comes and goes: rapid onset, brief    duration, and then a return to normal is the usual sequence. • Recurrence of the same or similar symptoms is also significant. • Weakness in only one arm or leg. •   Final diagnosis as with stroke is based on the pattern of symptoms the type of symptoms, past medical history, family history, present signs and symptoms and findings upon a complete physician examination Physical examination should include evaluation of both eyes and blood pressure and listening for a noise (or a bruit) which can only be heart with a stethoscope when listening over the artery which feeds the area of impairment. Diagnostic Testing can be helpful in finalizing the diagnosis and determining the extent of the process, especially ruling out the causes of hemorrhagic stroke. The testing done, may include CAT Scan or MRI of the Head or Cerebral Arteriography to provide images of the arteries for evaluation.   How Serious Is Transient Ischemic Attack? The signs and symptoms of TIA are very similar to those of ischemic stroke, with one important difference, that is they disappear completely within 24 hours. An individual may have one or more TIAs in the same day or they can be separated by days, week's, months or even years. Generally they will lasts no more than a few minutes. Any TIA should be considered to be a warning sign that a stroke may follow in the near future, even within a few minutes. Approximately one-third of all persons who have TIAs will later have a stroke. A third will have more TIAs and another third will have no further cerebrovascular symptoms. While arterial atherosclerotic plaque deposits are very common, they are not necessarily the only cause for TIA. The separate arterial networks in the brain have a built-in safety factor through extensive, small interconnections between them. When blood flow is gradually impeded in one network, these interconnections tend to enlarge so another arterial network can take over the blood supply to that region, a phenomenon called collateral circulation. As a result, a completely blocked artery may be harmless if collateral circulation is sufficient. An additional safety factor is that the arteries to the brain are usually large enough to provide an adequate blood supply even when they are narrowed up to 75 percent by a plaque deposit. A TIA, therefore, is a warning that your safety factors are being overwhelmed.   Treatment The purpose of treatment of TIA is primarily to prevent the occurrence of a stroke. This is done by improving arterial blood flow to the brain and so that a subsequent stroke can be avoided. Medication: • High blood pressure must be treated and brought into normal levels. • If high blood pressure does not exist then prevention is directed primarily at reducing the risk of any blood clots    forming. •   Presently the most common medication used for this purpose is aspirin. (In addition to its pain-relieving ability, aspirin also inhibits the way platelets clump together; the presence of too many platelets at a narrowed site may further compromise the flow of blood to the brain.) The physician may prescribe it first on a trial basis. Anticoagulants (such as heparin or sodium warfarin) may be recommended in some situations. Anticoagulants or blood thinners also reduce the tendency for blood clots to form.   Surgery: Surgery is generally a last resort and the primary surgery performed when dealing with TIAs is carotid endarterectomy. Here the arterial plaque is removed to lower the risk of further TIAs. The ideal candidate for this operation is an individual who has one or more TIAs without complications and diagnostic testing demonstrates that these TIAs were most likely caused by atherosclerotic plaque deposits in the arteries of the neck providing blood flow to the brain. It is best if the individual has no other symptoms suggestive of a stroke. A less than ideal person, is anyone else, especially someone with high blood pressure of symptoms of an ongoing stroke. To Learn About Ischemic Strokes. To Learn About Hemorrhagic Strokes.  
ESSENTIALAI-STEM
Friday, September 15, 2006 Marco Polo Born In Venice, September 15, 1254 Today in 1254, Marco Polo was born in Venice, which is today part of Italy. Marco, his father Nicolo and his uncle Maffeo, while not the first Europeans to visit the area we now call China, had such a storied journey to the Far East that its telling helped shape European journeys of discovery for hundreds of years. The Polo family were merchants, which in the Venice of the 13th century often meant travel to remote locations in order to secure sought-after items. Niccolo Polo and his brother Maffeo were successful traders and spent a large portion of their careers in the area around the Black Sea and as far east as modern day Uzbekistan. In 1264, the two met the brother of the Grand Khan Kublai. He was headed to the Mongol capital of Khanbaliq, which today is Beijing, China. After a journey of two years, the brothers and the traveling party reached Khanbaliq and received a gracious welcome and an audience with the Khan. The Khan sent the men back home with precious cargo: a man who was to be the Mongol ambassador to the Pope, a letter from the Khan asking for teachers to be sent east to instruct his people about Christianity and Western life, and a small golden tablet that granted them safe passage anywhere within the Khan's lands. The ambassador left the brothers near the halfway point of the journey, but they continued on with their letter to His Holiness. They eventually delivered the letter and were given a reply from the Pope that was to be delivered to the Khan. The brothers set out again for Cathay (their word for China) in 1271, but this time they took other travelers: Nicolo's son Marco, who was 17, and two friars. The route, which would become known as the Silk Road, contained its share of danger and disease. Marco fell ill on the way and the group had to stop in Badakhshan for a year in order for him to recover. The Polo's journey to the Far East took several years, but they arrived safely and were granted another audience with Kublai Khan. According to Marco, he became a court favorite, so much so that the Khan gave him a job at the court as a sort of personal ambassador in his kingdom. During his 17 years of employment, Marco traveled far and wide in China, Burma and India on special missions. He became an excellent speaker who could converse in at least four languages. In 1291, the Khan sent Marco on one final mission. He was ordered to escort a Mongol princess to her wedding. The trip took over two years, after which Marco, his father and his uncle were released from their obligations at the court and allowed to begin their trip home to Venice. The Polos became celebrities in Venice. In an age when most people rarely if ever traveled away from the town in which they were born, tales of the Far East seemed like stories of another planet. Despite repeated tellings of the famous stories, it is doubtful that anything about the Polos would've been written down had it not been for a war between Venice and Genoa in 1298. Although the details are lost, Marco ended up in prison for several months. During that time, he dictated the story of his journeys to another prisoner, Rustichello da Pisa. When Marco was released in 1299, he had his book published with the title Il Milione, or "The Million". It was an enormous success, no easy feat in the days before the printing press. Some historians doubt that Marco Polo and his family ever made the journey to Kublai Khan's court. As with so many stories from the Middle Ages, there is no way to know exactly what happened. Marco's book was translated to Latin and then to Italian, although it is thought to have been written in Old French. Translators of the day could be fairly liberal with their interpretations, so it is possible that the book contains inaccuracies. Regardless of it's accuracy, the book obviously inspired at least one great explorer, Christopher Columbus. Among Columbus's belongings was a copy of "The Million" with detailed notes written in the margins of almost every page. After Marco Polo returned to Venice, his days of travel were over. He married and had three daughters, all of whom married into nobility. He died at his home at the age of 69 in January, 1324. Posted by Matt Dattilo at 10:49:00 PM Subscribe to: Post Comments (Atom) Marco Polo was a great man. Venice was one of the biggest cultural centres in 13th century and it was motherland for a lot of the greatest minds of the time. hotels in Venice Post a Comment
FINEWEB-EDU
User:Deathsoul182 Deathsoul was born Rajeev Goossayne Nunkoo on May 12, 1985, at Vacoas, Mauritius island, Deathsoul graduated from school of electronic at Rose-hill and then attended lycee Mauricien in Pheonix,where he received his associate's degree engineering in 2005.
WIKI
NYPD Blue season 11 The eleventh season of NYPD Blue premiered on ABC on September 23, 2003, and concluded on May 11, 2004.
WIKI
RockOnGom RockOnGom - 8 months ago 21 Javascript Question JQuery window resize doesn't fire The question is really bored but i haven't handle it. I need to call an object method when window resized. The code is as shown below var ThemeDesignerHelper = new function () { this.initialize = function () { debugger; var self = this; $(document).ready(function () { $(window).resize(function () { alert("res"); }); }); } this.initialize(); } Jquery doesn't fire alert when i resized window. I think this is not about jquery or my browser version because when i tried the above code on jsfiddle it works perfectly. Why does not above code work? Anyone have any opinion to share with me. Note: When i change window to document it works! Answer If you must solve this problem immediately you can use javascript window event listener as below $(document).ready(function () { if (window.addEventListener) { window.addEventListener("resize", function(){alert("res")}, false); } else if (object.attachEvent) { object.attachEvent("on" + "resize", function(){alert("res")}); } else { console.error("unknown event listener object."); } });
ESSENTIALAI-STEM
 Grid Comparison Grid Comparison LegiTest ›› Asserts ›› Data Management ›› Parent Previous Next Grid Comparison The grid comparison assert will compare two grids, it expects both sides to be equal. The user can specify different criteria for the comparison to be made. Grid Comparison Editor Difference log maximum size - This is the maximum number of rows to send to LegiTest server if the test suite is configured to send results to the server. Ignore aggregates - Toggle on and off to specify if aggregate comparisons should be ignored. Ignore different rows - Toggle on and off to specify if rows that differ should be ignored. Ignore expected-only rows - Toggle on and off to specify if rows only appearing in the expected grid should be ignored. Ignore actual-only rows - Toggle on and off to specify if rows only appearing in the actual grid should be ignored. Include equal rows - Toggle on and off to specify if rows that match are sent to LegiTest server. By default, only rows that differ or exist on only one side of the comparison are sent. Expected results grid - This is the grid of 'expected' results - i.e. the result set that we want our test to match. A previous action should load the grid to a specific resource key. Comparison manifest asset - This is the comparison manifest asset that determines what items are compared. Actual results grid - This is the grid of 'actual' results - i.e. the result set that our test produced. A previous action should load the grid to a specific resource key. Test output message row limit - When the comparison fails an error message is produced and visible in the test runner. This specifies how many detail rows may be included in that message.
ESSENTIALAI-STEM
User:Immanuelle/familytree Documentation page for the User:Immanuelle/familytree.js script imported from wikipedias User:Daduxing/familytree.js script, formally User:GregU/familytree.js, for Tree chart // Wiki user script to help maintain ; or // boxes-and-lines diagrams, by allowing you to edit the diagram // in a simpler and more standard ASCII art format. // Greg Ubben, 1 Dec 2008 // // To install, add: importScript("User:Daduxing/familytree.js"); // to your common.js page. This adds an option [Templates → Art] // to the toolbox menu when editing familytrees. // // It is a two pass operation. // 1. Press [Templates → Art] -- the template code is changed into an intermediate // format and the menu option changes to [Art → Templates] // 2. Press [Art → Templates] -- converts the "Art" back in to cleaned up template code // // // IE may work better than Firefox since it supports typeover mode. //
WIKI
Page:EB1911 - Volume 26.djvu/270 Rh failed owing to a rising of the burghers, who sympathized with the Confederates, and on the 16th of July 1394 the peace was prolonged for twenty years (and again in 1412 for fifty years), various stipulations being made by which the long struggle of the League against the Habsburgs was finally crowned with success. By the peace of 1394 Glarus was freed on payment of £200 annually (in 1395 it bought up all the rights of Sackingen); Zug too was released from Austrian rule. Schwyz was given the advocatia of the great abbey of Einsiedeln; Lucerne got the Entlebuch (finally in 1405), Sempach and Rothenburg, Bern and Soleure were confirmed in their conquests. Above all, the Confederation as a whole was relieved from the overlordship of the Habsburgs, to whom, however, all their rights and dues as landed proprietors were expressly reserved; Bern, Zürich and Soleure guaranteeing the maintenance of these rights and dues, with power in case of need to call on the other Confederates to support them by arms. Though the house of Habsburg entertained hopes of recovering its former rights, so that technically the treaties of 1389, 1394 and 1412 were but truces, it finally and for ever renounced all its feudal rights and privileges within the Confederation by the “Everlasting Compact” of 1474. It is probable that Bern did not take any active share in the Sempach War because she was bound by the treaty of peace made with the Austrians in 1368; and Soleure, allied with Bern, was doubtless a party to the treaty of 1394 (though not yet in the League), because of its sufferings in 1382 at the hands of the Kyburg line of the Habsburgs, whose possessions (Thun, Burgdorf, &c.) in 1384 fell into the hands of the two allies. We may mention here the foray (known as the English or Gugler War) made in 1375 by Enguerrand de Coucy (husband of Isabella, daughter of Edward III. of England) and his freebooters (many of them Englishmen and Welshmen), called “Gugler” from their pointed steel caps, with the object of obtaining possession of certain towns in the Aargau (including Sempach), which he claimed as the dowry of his mother Catherine, daughter of the Leopold who was defeated at Morgarten. He was put to rout in the Entlebuch by the men of Bern, Lucerne, Schwyz and Unterwalden in December 1375. This victory was commemorated with great rejoicings in 1875. 3. The great victory at Sempach not merely vastly increased the fame of the Everlasting League but also enabled it to extend both its influence and its territory. The 15th century is the period when both the League and its several members took the aggressive, and the expansion of their power and lands cannot be better seen than by comparing the state of things at the beginning and at the end of this century. The pastoral highlands of Appenzell (Abbatis Cella) and the town of St Gall had long been trying to throw off the rights exercised over them by the great abbey of St Gall. The Appenzellers, especially, had offered a stubborn resistance, and the abbot’s troops had been beaten back by them in 1403 on the heights of Vögelinseck, and again in 1405 in the great fight on the Stoss Pass (which leads up into the highlands), in which the abbot was backed by the duke of Austria. The tales of the heroic defence of Uri Rotach of Appenzell, and of the appearance of a company of Appenzell women disguised as warriors which turned the battle, are told in connexion with this light, but do not appear till the 17th and 18th centuries, being thus quite unhistorical, so far as our genuine evidence goes. Schwyz had given them some help, and in 1411 Appenzell was placed under the protection of the League (save Bern), with which in the next year the city of St Gall made a similar treaty to last ten years. So too in 1416–1417 several of the “tithings” of the Upper Valais (i.e. the upper stretch of the Rhone valley), which in 1388 had beaten the bishop and the nobles in a great tight at Visp, became closely associated with Lucerne, Uri and Unterwalden. It required aid in its final struggle (1418–19) against the great house of Raron, the count-bishop of Sitten (or Sion), and the house of Savoy, which held the Lower Valais—the Forest districts, on the other hand, wishing to secure themselves against Raron and Savoy in their attempt to conquer permanently the Val d’Ossola on the south side of the Simplon Pass. Bern, however, supported its burgher, the lord of Raron, and peace was made in 1420. Such were the first links which bound these lands with the League; but they did not become full members for a long time—Appenzell in 1513, St Gall in 1803, the Valais in 1815. Space will not allow us to enumerate all the small conquests made in the first half of the 15th century by every member of the League; suffice it to say that each increased and rounded off its territory, but did not give the conquered lands any political rights, governing them as “subject lands,” often very harshly. The same phenomenon of lands which had won their own freedom playing the part of tyrant over other lands which joined them more or less by their voluntary action is seen on a larger scale in the case of the conquest of the Aargau, and in the first attempts to secure a footing south of the Alps. In 1412 the treaty of 1394 between the League and the Habsburgs had been renewed for fifty years; but when in 1415 Duke Frederick of Austria helped Pope John XXII. to escape from Constance, where the great ecumenical council was then sitting, and the emperor Sigismund placed the duke under the ban of the Empire, summoning all members of the Empire to arm against him, the League hesitated, because of their treaty of 1412, till the emperor declared that all the rights and lands of Austria in the League were forfeited, and that their compact did not release them from their obligations to the Empire. In the name, therefore, of the emperor, and by his special command, the different members of the League overran the extensive Habsburg possessions in the Aargau. The chief share fell to Bern, but certain districts (known as the Freie Aemter) were joined together and governed as bailiwicks held in common by all the members of the League (save Uri, busied in the south, and Bern, who had already secured the lion’s share of the spoil for herself). This is the first case in which the League as a whole took up the position of rulers over districts which, though guaranteed in the enjoyment of their old rights, were nevertheless politically unfree. As an encouragement and a reward, Sigismund had granted in advance to the League the right of criminal jurisdiction (haute justice or Blutbann), which points to the fact that they were soon to become independent of the Empire, as they were of Austria. As the natural policy of Bern was to seek to enlarge its borders at the expense of Austria, and later of Savoy, so we find that Uri, shut off by physical causes from extension in other directions, as steadily turned its eyes towards the south. In 1410 the valley of Urseren was finally joined to Uri; though communications were difficult, and carried on only by Italian means of the “Stiebende Brücke,” a wooden bridge suspended by chains over the Reuss, along the side of a great rocky buttress (pierced in 1707 by the tunnel known as the Urnerloch), yet this enlargement of the territory of Uri gave it complete command over the St Gotthard Pass, long commercially important, and now to serve for purposes of war and conquest. Already in 1403 Uri and Obwalden had taken advantage of a quarrel with the duke of Milan as to custom dues at the market of Varese to occupy the long narrow upper Ticino valley on the south of the pass called the Val Leventina; in 1411 the men of the same two lands, exasperated by the insults of the local lords, called on the other members of the League, and all jointly (except Bern) occupied the Val d’Ossola, on the south side of the Simplon Pass. But in 1414 they lost this to Savoy, and, with the object of getting it back, obtained in 1416–1417 the alliance of the men of the Upper Valais, then fighting for freedom, and thus regained (1416) the valley, despite the exertions of the great Milanese general Carmagnola. In 1419 Uri and Obwalden bought from its lord the town and district of Bellinzona. This rapid advance, however, did not approve itself to the duke of Milan, and Carmagnola reoccupied both valleys; the Confederates were not at one with regard to these southern conquests; a small body pressed on in front of the rest, but was cut to pieces at Arbedo near Bellinzona in 1422. A bold attempt in 1425 by a Schwyzer, Peter Rissi by name, to recover the Val d’Ossola caused the Confederates to send a force to rescue these adventurers; but
WIKI
Page:The One Woman (1903).pdf/383 The warden put his hand on the electric switch. There was a shout and a stir without, the thump of hurrying feet, and the butt of a guard's gun thundered against the door. The warden sprang forward. "Stop! The Governor!" he heard faintly shouted through the deep-padded panels.
WIKI
A better default ToString with PostSharp Essentials by Petr Hudeček on 16 Jun 2020 During debugging and prototyping, we often rely on the ToString method to know what an object looks like. This works well for built-in types like integer and string but becomes less helpful for classes and structs unless we override the ToString method manually. Unfortunately, this requires a lot of boilerplate. In this article, I introduce PostSharp.Community.ToString, a free and open-source extension to PostSharp that automatically generates the ToString method for you. Here’s what a debugger view of an object in Visual Studio might look like when you don’t override ToString:  The values you see for strings and integers are valuable but the default ToString implementation on custom types is not as valuable. In this case, perhaps the only useful information it provides is that the variable or property isn’t null. To learn more, I would need to expand. I could implement an override for ToString for each of these classes (Hero, AbilityScores, and HeldItem) by hand but that would mean writing and maintaining that code.  Enter PostSharp.Community.ToString, our new free and open-source PostSharp add-in that adds a better default ToString implementation. If I add the attribute [ToString] to a class, PostSharp will synthesize a reasonable ToString method based on the class’s fields and properties for me. As with the other add-ins we presented in this series of blog posts, we owe the idea as well as a significant portion of the implementation to Fody, this time to the add-in ToString.Fody What does it do You apply the attribute [ToString] to a class, like this: [ToString] class TestClass { public int Foo { get; set; } public double bar; [IgnoreDuringToString] public string Baz { get; set; } }   And during compilation, PostSharp synthesizes a ToString method for that class so the end result will be the same as if your code was actually this: class TestClass { public int Foo { get; set; } public double bar; public string Baz { get; set; } public override string ToString() { return $"TestClass; Foo:{Foo},bar:{bar}"; } }   All of your fields and properties, as well as the type name, are displayed in the string. You can exclude the type name or individual fields and properties, and you can set the separators (“,” and “:”) by setting properties on the attribute. The GitHub readme file has details. This already has some advantages, especially for prototyping and debugging, over writing the ToString method yourself: • It’s less code for you to write. • It’s automatically updated as you add or remove fields and properties. But there’s an even greater benefit that comes with multicasting. Multicasting ToString everywhere PostSharp attributes are what we call “multicast attributes”: If you attach a multicast attribute to an assembly, it is the same as if you attached it to all the classes in that assembly. So I can type in this: [assembly: ToString(PropertiesSeparator =", ", PropertyNameToValueSeparator = ": ", WriteTypeName = false)] And now all classes in the assembly have a new and improved ToString implementation. (At least, all classes where I didn’t override ToString manually: a “real” ToString method still takes precedence over a PostSharp-created one.) Our multicast attributes also have filters you can use to target a subset of classes. And so, by adding this one line, now my debugger view looks like this:   And that is way more informative. I find this synthesized ToString method also valuable for rapid application development. When I’m prototyping or creating a quick-and-dirty user interface, I can have many objects that are eventually displayed to the user by being ToString’d. In situations where I don’t care about the exact presentation of a class, a [ToString] attribute will say everything there is to say about an object and can be appropriate. Conclusion Adding [ToString] to your solution saves you some time and code during debugging and for rapid prototyping. It also allows you to set a different “default” for your ToString methods, which you can target to namespaces, assemblies or even the whole solution using multicasting. For more information on PostSharp.Community.ToString, see the GitHub readme file.
ESSENTIALAI-STEM
The Powerful Combination of Cybersecurity and Pipeline Integrity Data The Powerful Combination of Cybersecurity and Pipeline Integrity Data Roseland O&G For many years, midstream operators have been conducting cyber vulnerability assessments to identify risks in the digital field architecture. Likewise, these same operators are required to conduct consequence analyses and a host of other pipeline integrity assessments. This article explores the value of examining those findings through a combined lens and the ability to comprehensively address and mitigate risks. Midstream operators have conducted cyber vulnerability assessments on operational technology (OT) assets for the past two decades. These assessments, separate from the business and enterprise networks, are considered mission critical. Essential to ensuring continuity of operations, these assets are also high-value targets to adversaries. Whether meeting safety goals and corporate values or meeting federal guidance or directives, the importance of identifying and mitigating risks is evident. Cyber vulnerability assessments typically include penetration testing and scanning tools that, in conjunction with the technical skills of an assessment team, produce a list of vulnerabilities. These vulnerabilities include the operating system, application and network vulnerabilities. Assessments also identify risks such as open ports, default passwords, access control weaknesses, and gaps in patching. Assessment findings indicate the current security posture – or a snapshot – of a system, network or complete digital architecture. Assessments utilizing the risk equation, R(f) = T x V x C, where Risk is a function of Threat, Vulnerability and Consequence, result in actionable mitigation findings. Reducing cyber vulnerabilities in mission critical assets means reducing overall risk to operations. Some significant challenges can exist, however, in applying those mitigations. Many operators do not maintain a fully prioritized list of sites and assets in enough depth to assign values. This requires a clear asset inventory, including technology and data, as well as consideration of highest value operations, federal determination of site criticality, and supply chain dependencies. Because cyber vulnerability assessments in the OT environment are often commissioned or conducted by technical staff, a broader view of the overall risk portfolio of the organization may not exist. While mitigating all risks is ideal, realistically, organizations must prioritize mitigations around budget and time constraints. Choosing mitigations that provide the best return on investment by adding to stability, safety and operational continuity is essential. Identifying and mitigating risks in the highest valued operational areas requires a view of individual pipelines, segments, sites, throughput and technology assets within the operation. Pipeline integrity assessments may be an excellent place to obtain that view. The paradigm shift in perceiving and addressing cybersecurity in relation to pipeline integrity was catalyzed by the infamous cyberattack on the Colonial Pipeline in 2021. This unprecedented event exposed critical vulnerabilities in asset management within the energy transport industry, compelling major operators and government entities to take proactive measures in updating and establishing standards and regulations. Pipeline transportation remains the most secure and dependable method for transporting energy resources. However, with the aging of pipeline assets and the emergence of novel threats jeopardizing the safety and reliability of these systems, the significance of managing pipeline integrity with a risk-based approach has become more imperative and intricate than ever before. Identifying and assessing potential threats to pipelines and associated facilities pose a formidable challenge for operators. A paramount concern lies in acquiring and utilizing reliable data for conducting thorough threat assessments. The effectiveness of an integrity management program hinges on the quality and availability of such data. Presently, operators have access to a range of tools to enhance their capabilities in preventing, detecting and responding to cyber incidents. To effectively manage the integrity of assets, it is crucial to comprehend the risks associated with potential events, assess their consequences, and establish robust risk management strategies. Upon establishing a risk model for their pipeline assets, operators must recognize cybersecurity threats, irrespective of the complexity of the risk model or the size of the asset. Two primary objectives while evaluating this threat involve gauging the criticality of the asset in terms of availability and assessing the current level of awareness and knowledge regarding potential threats to the asset. Throughout this process, operators may lack awareness of vulnerabilities and cyber threats. In such cases, it is prudent to conduct comprehensive gap analyses to compare the existing situation with the desired target state and devise appropriate action plans to bridge any identified gaps. Combining pipeline security and integrity assessments and analyses produces findings that establish a complete view of risk. This approach offers a manageable view of operational complexities by aligning critical pipeline assets, integrity data, and security zones and conduits. This can be a powerful, comprehensive view that: • provides the basis for risk-based business and operational decisions • establishes ROI for security and capital investments • assists in meeting compliance goals Security and integrity assessment teams, working together, can streamline data collection, assessments and evaluation of findings. Deliverables and output from a combined approach can assist the customer to identify and prioritize: • operational dependencies • mission-critical assets • potential consequences (cyber, physical, operational) • critical failure points The growing regulatory landscape, including industry standards and federal guidelines, expects asset owners to have a clear and accurate view of their operations and understand potential consequences. This combined approach enables pipeline operators to optimize the use of resources, both in terms of time and budget. Shared data, tools and expertise can be leveraged across the integrated assessment process, leading to greater efficiency and cost-effectiveness, while allowing an asset owner to map potential downtime or damage-related risks to operational consequences. In addition, it assists in identifying a customer’s placement in the national critical infrastructure and supply chain, including product delivery and supply receipt impacts, as well as broader market impacts. Demonstrating a comprehensive approach to pipeline security and integrity reassures stakeholders, including investors, regulators and the public, that the operator is committed to ensuring the safe and reliable transportation of energy resources. Overall, the convergence of pipeline security and integrity assessments and analyses empowers operators to make informed decisions, improve overall operational resilience, and maintain the integrity of their pipeline assets in an increasingly complex and dynamic threat landscape. Author Profile Annie McIntyre is an expert in operational security for critical infrastructure and the director of operational security for EverLine. Everline’s technical stack offers fully integrated compliance, SCADA/IT, control room and security services. Visit EverLine at www.everlineus.com. Author Profile Director of Integrity Management - Everline | Website Romina Peverelli is Everline’s Director of Integrity Management. 3 Ways Technology is Going to Shape the Oil and Gas Industry Free to Download Today Oil and gas operations are commonly found in remote locations far from company headquarters. Now, it's possible to monitor pump operations, collate and analyze seismic data, and track employees around the world from almost anywhere. Whether employees are in the office or in the field, the internet and related applications enable a greater multidirectional flow of information – and control – than ever before. Related posts
ESSENTIALAI-STEM
North Korean missile launch attempt apparently failed, South Korea says Seoul (CNN)North Korea attempted to launch a missile Tuesday, although it appeared to be unsuccessful, South Korea's military said. One missile was test-fired from the eastern city of Wonsan at 5:20 a.m., the South Korea Joint Chiefs of Staff (JCS) said. "Our military has maintained readiness as (we are) bracing for possibilities of additional provocations," said Jeon Ha-gyu, the chief of public affairs for the JCS. It appears to be the latest in a string of missile tests as the country tries to advance its weapons program in defiance of the international community and its closest regional ally, China. Initial reports suggested it was an intermediate-range Musudan missile, according to a U.S. defense official; if confirmed, it would be the fourth time North Korea has tried and failed to launch this type of missile. The missile apparently flew for about two or three seconds and then exploded, the official said. It's not clear if the missile made it over water. China's Ministry of Foreign Affairs urged all parties "to refrain from taking any action that may escalate tensions" on the Korean Peninsula. Yoshihide Suga, Japan's chief cabinet secretary, said that no missile was confirmed to have flown towards Japan. The last several months have been particularly contentious on the Korean Peninsula, after North Korea claimed to have tested its first hydrogen bomb and fired a satellite into orbit. Both actions violated numerous United Nations Security Council resolutions. Earlier this month, North Korean leader Kim Jong Un proposed holding military talks with South Korea to ease tensions but Seoul dismissed the offer, saying it wasn't sincere given that Pyongyang was continuing to develop a nuclear arsenal. U.S. President Barack Obama, speaking at the G7 summit in Japan on Thursday, said that North Korea was a "big worry." "They're not at the point right now where they can effectively hit U.S. targets, but each time that they test, even if those tests fail, they learn something," he said. "It's clear that ideologically they're still convinced that -- and Kim Jong Un in particular seems to be convinced that his own legitimacy is tied up in the developing of nuclear weapons." CNN's Barbara Starr contributed to this report.
NEWS-MULTISOURCE
Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium x ? Solved Setting an Environment Variable from a shell script Posted on 2002-04-11 9 Medium Priority ? 331 Views Last Modified: 2013-12-27 I have been given a good reason why this is impossible but I seem to remmber that I have seen it done some where.  If you know how I can do this let me know otherwise just insult me and be done. esentially I want to setenv JUNK /ORANGE/Dogs run the script and then echo $JUNK and see the path on the command line.  shell script doesn't matter. Have tried borne, korn, perl, tcsh, csh. If I am not missing something can I do what I want with a C or Java executable 0 Comment Question by:SafeSql • 3 • 3 • 2 • +1 9 Comments   LVL 40 Expert Comment by:jlevie ID: 6935616 My understanding of what you want is to set an env variable from with a script and have that variable visible in the current shell after executing the script. That's eaily enough done if the script is correctly executed. For instance if I had a file named gork containing: spork="dowha diddy" export spork I could do: chaos> . gork chaos> echo $spork dowha diddy In a like manner I could modify the PATH, i.e., chaos> cat >gork <<EOF > PATH=$PATH:$JUNK ; export PATH > EOF chaos> JUNK=/ORANGE/Dogs; export JUNK chaos> . gork chaos> echo $PATH /usr/local/bin:/usr.../bin:/ORANGE/Dogs You could also do this with a C  or program. The important fact to remember is that for the change in the environment to persist after the script exits a sub shell can't be used to execute whatever will be changing the environment. And that's becahuse inheritance is downwards into subshells but not upwards into the parent. 0   LVL 51 Expert Comment by:ahoffmann ID: 6936148 more specific using jlevie's gork example: sh# . ./gork ksh# . ./gork bash# . ./gork for csh and tcsh gork must look like: setenv spork "dowha diddy" then use it like: csh% source ./gork 0   LVL 14 Expert Comment by:chris_calabrese ID: 6936628 Just as an aside, it is possible to do this in Plan 9 through /proc.  I don't remember the exact syntax, but it'd be something akin to this: echo /ORANGE/Dogs > /proc/$PPID/env/JUNK 0 Concerto Cloud for Software Providers & ISVs Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes! Learn how Concerto can help you.   Author Comment by:SafeSql ID: 6936860 Both answers work which is good. Problem is that I am trying to get a "command" that I can give a less than unix savy person so that they can setup a test environment. For instance /home/smith>echo $target_system production /home/smith>go_developement YOU ARE NOW SAFE TO RUN /home/smith>echo $target_system development Thus I can maintain the settings by modifing the go_development file.  The gork solution works but I worry the user will forget the ". " or the "source" As I understand it if go_development is a "shell script" this is not possible because inheritance.  ie. the shell script makes its own subprocess based on the parent. So I guess the question is would a c or java executable create its own "shell" or does it run in the parent shell? and thus... 0   LVL 40 Accepted Solution by: jlevie earned 800 total points ID: 6937094 I'm not aware of any way to do what you want other than the ". cmd" or "source cmd" method. As far as I know the same restriction that applies to executing a shell script applies to a perl, C, Java, etc. program. In each case the process that is fiddling with the environment is a sub process of the current shell and thus the current shell won't see any changes the subprocess makes in its environment. 0   LVL 51 Expert Comment by:ahoffmann ID: 6937277 assuming go_developement is a shell script, and switch_env is the shell script to be sourced to switch environment, you have following choices: # csh, tcsh: # go_developement contains following: source switch_env # sh, ksh, bash: # go_developement contains following: . switch_env alternatively you may provide shell aliases instead, like # csh, tcsh: alias dev     'source switch_env; go_developement' # ksh, bash: alias='. switch_env; go_developement' 0   Author Comment by:SafeSql ID: 6937603 Both answers work which is good. Problem is that I am trying to get a "command" that I can give a less than unix savy person so that they can setup a test environment. For instance /home/smith>echo $target_system production /home/smith>go_developement YOU ARE NOW SAFE TO RUN /home/smith>echo $target_system development Thus I can maintain the settings by modifing the go_development file.  The gork solution works but I worry the user will forget the ". " or the "source" As I understand it if go_development is a "shell script" this is not possible because inheritance.  ie. the shell script makes its own subprocess based on the parent. So I guess the question is would a c or java executable create its own "shell" or does it run in the parent shell? and thus... 0   Author Comment by:SafeSql ID: 6937630 Thanks for the help 0   LVL 51 Expert Comment by:ahoffmann ID: 6938514 is the graded answer realy the one which solved your problem? 0 Featured Post Technology Partners: We Want Your Opinion! We value your feedback. Take our survey and automatically be enter to win anyone of the following: Yeti Cooler, Amazon eGift Card, and Movie eGift Card! Question has a verified solution. If you are experiencing a similar issue, please ask a related question In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu… A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca… Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor… Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.: Suggested Courses Course of the Month10 days, 10 hours left to enroll 571 members asked questions and received personalized solutions in the past 7 days. Join the community of 500,000 technology professionals and ask your questions. Join & Ask a Question
ESSENTIALAI-STEM
Page:Fasti ecclesiae Anglicanae Volume 3.djvu/678 672 CAiM BRIDGE. William Grigg, M.A., fellow of Jesus college^ suc- ceeded in 1713. Ob. 9th April 1726. Charles Morgan, M. A., vice Dr. Grigg, i8th April 1726. Ob. 30th April 1736. John Wilcox, D.D., 1736. Ob. 16th Sept. 1762. Peter Stephen Goddard, D.D., 1762. Ob. 1781. John Torkington, B.D., Nov. 1781. Ob. nth July 1815. William Webb, B.D., 1815. The arms of this college are thus blazoned : Two coats impaled within a bordure gutty; the first is or, three chevronels gules ; the other or, a cross gules. VALENCE INIARY, COMMONLY CALLED PEMBROKE COLLEGE, Was founded by Mary, daughter of Guydo de Chastillon, earl of St. Pol in France, and Mary, daughter of John, earl of Richmond, by Beatrix, daughter of Henry III, king of England, baroness of Voisser and Montenac; she married when very young Audomarus de Valencia, earl of Pembroke, whose widow she was, when she founded this college in ^343- MASTERS^7. Robert Thorpe was elected in 1347, and vacated it in 1364. Thomas Bvxgham, M.A., elected in 1364, vacated it in 1389 for the rectory of Little Gransden. Ob. 1393. 37 I am indebted to the kind- office. The election of Master ness of Dr. Ainshe, the ])rescnt rests entirely with the fellows, master of this college, for the Copy of the Statutes, MS. Harl. list of his predecessors in this N<^. 7034.
WIKI
TCG Ütğm Arif Ekmekçi (A-575) TCG Ütğm Arif Ekmekçi (A-575), also known as TCG Üsteğmen Arif Ekmekçi (A-575), is a Turkish auxiliary ship for fleet support of the Turkish Naval Forces, commissioned in January 2024. She was named after a naval speicial operations officer, who died during a military exercise at sea. History On 17 July 2012, the Defence Industry Agency (SSB) of the Ministry of National Defense launched a project for the building of two auxiliary ships for fleet support to meet the needs of the Turkish Naval Forces. Selah Shipyard A contract was signed between the SSB and Selah Shipyard in Tuzla, Istanbul on 24 November 2014. After project begin in February 2015, it was planned that the first ship in 16 months, and the second ship in 26 months would be completed. The second ship, TCG Ütğm Arif Ekmekçi (A-575), was launched on 7 July 2017, and the outfitting activities began. In 2018, Selah Shipyard started to experience financial difficulties, and many workers were laid off without compensation. In September 2019, the shipbuilding company declared bankruptcy application to the court due to inability to make payments. The ships remained in the shipyard with their equipment, and sea trial activities were unfinished. Ada Shipyard On 9 February 2021, a contract was signed between the SSB and the defence engineering company STM to outfit the unfinished ships, and deliver them to the Turkish Navy as soon as possible. On 24 March 2021, works started at Ada Shipyard in Tuzla, Istanbul. Sea trials began on 7 July 2023. The ship entered service in the Turkish Navy with a ceremony on 19 January 2024. She was named TCG Ütğm Arif Ekmeçi after the naval special operations officer, who died during a naval exercise, and with the hull number A-575. Characteristics The ship is 106.51 m long, and has a beam of 16.80 m. Her displacement tonnage is 8477 LT. She has a range of 9500 nmi at 12 kn. The ship is capable of carrying 4036 LT of F-76 diesel fuel, 336 LT of JP-5 helicopter fuel, 631 LT of drinking water and 8 standard containers. The vessel features 108 m3 of storage space, an electro-hydraulic crane with 18 LT lifting capacity and a helipad of 15 LT load capacity. She is armed with two 12.7 mm Aselsan STAMP stabilized machine guns. The number of ship's crew is 82. Namesake Arif Ekmekçi was born to Yılmaz and Kadun Ekmekçi in Tirebolu, Giresun Province, northern Turkey on 14 February 1964. He entered Naval High School at Heybeliada in Istanbul. After finishing his secondary education in 1982, he continued his military education in the Naval Academy at Tuzla, Istanbul, and graduated in 1986. He then took training at the Underwater Attack Commando (SAT Komando) course, and became an underwater operation specialist officer in 1991. The next year, he married. On 15 April 1993, Arif Ekmekçi, in the rank of a Lieutenant (junior grade), (Üsteğmen), was tasked to simulate an escape from a submarine underwater together with a teammate during the naval exercise "Deniz Kurdu-93" ("Sea Wolf-93") off the coast of Amasra in the Black Sea. He and his teammate simultaneously exited the submarine, however, Ekmekçi could not get to the surface. Search and rescue efforts remained unsuccessful, only his diving fins were found. In December 2007, diving suits containing human bone fragments were caught in the nets of fishermen fishing off the coast of Amasra. In case the body belonged to Arif Ekmekçi, a blood sample was taken from the mother, and a bone sample was taken from the body in the father's grave. After a ten-month DNA test process, it became clear that the body belonged to Arif Ekmekçi. In August 2008, his remains were buried in Edirnekapı Martyr's Cemetery in Istanbul. Sister ship * TCG Yzb Güngör Durmuş
WIKI
Modra lasta Modra lasta (English: The Blue Swallow) is a Croatian children's magazine geared for primary school students. It is published monthly by Školska knjiga. History The very first issue, titled Djeca za Djecu ([By] Children for Children) was published in Zagreb in 1954 by Josip Sabolović, a primary school teacher, and featured contributions by his pupils. The editor-in-chief was Blankica Veselić. The first issue had only four black-and-white pages containing a few essays, drawings and song lyrics made by pupils. Djeca za Djecu soon got very popular so the following issues included contributions by pupils from other Zagreb schools, and eventually, from schools in other cities around the country. As the project grew larger, more adults got involved in it, so the magazine needed a new name. In 1959 a readership poll was held to determine the new name and the winning suggestion was Plava lasta (The Blue Swallow) - but since there was already a newspaper called Plavi vjesnik (The Blue Gazette), it was adapted into Modra lasta (modra and plava being synonymous terms for the color blue in Croatian). It continued to be published throughout the following decades and it achieved huge readership numbers thanks to the independent distribution network (as it is distributed directly in most primary schools), the emphasis on children's contributions, and its colorful and simple coverage of topics that closely follow the school curriculum. Lastan Lastan is a fictional boy character that first appeared in Modra lasta in 1969. Initially he had his own column called Sastanak s Lastanom (Meeting Lastan) where he wrote about his hobbies, games, strategies for better learning, etc. At the end of the school year readers would send him their questions and he would answer them in the following issue. His column became an instant hit and turned Lastan into a well-known mascot of the magazine. Comic strip anthology Modra lasta usually has four comics in every issue, usually appearing on the last pages of the magazine. The first comic "Vječno proljeće" published in Modra lasta was created by editor Stjepko Težak and illustrated by Hortenzije Pavić in 1958. However, Ivica Bednjanec claims that first comic published in Modra lasta is his Uskočka osveta (Uskok's revenge), made by Bednjanec but upon scenario of dr Stjepko Težak. Over the years, many other comics appeared in Modra lasta, the most famous ones being Lastan and Osmoškolci created by Ivica Bednjanec. The magazine played a very important role in popularizing comics during the 1990s and is today seen as one of the most important magazines in the history of comics in Croatia. It serialized works of other authors most notably Darko Macan (Borovnica), Goran Sudžuka (Svebor i Plamena), Krešimir Zimonić (Zlatka), Andrija Maurović, Julio Radilović, Štef Bartolić (Gluhe Laste), Neugebauer brothers and others. Other sections appearing regularly are Lastoskop (monthly horoscope as told by Lastan), various personality tests, crosswords and famous quotations. Prominent contributors Among the many children's contributions published over the years, some were made by people who later became prominent figures in Croatian society, such as: * Vesna Pusić (politician) * Jadranka Kosor (politician) * Mira Furlan (actress) * Božidar Alić (actor) * Rajko Dujmić (composer) * Željka Ogresta (journalist) * Tanja Torbarina (columnist) * Stjepan Čuić (author)
WIKI
Evelyn Yang, Wife of Andrew Yang, Says She Was Assaulted by Her Gynecologist In an interview with CNN, Ms. Yang said the doctor, Robert Hadden, sexually assaulted her in 2012, when she was seven months pregnant. Evelyn Yang, the wife of the Democratic presidential candidate Andrew Yang, said in an interview broadcast on Thursday that she was sexually assaulted by her gynecologist in 2012, when she was pregnant with her first child. In an interview with CNN, Ms. Yang said she blamed herself for the abuse and didn’t tell her husband. She said she was speaking out now after reading letters from voters, including one from a woman who wrote that Mr. Yang’s message of empowerment for female entrepreneurs inspired her to press sexual assault charges against an investor in her company. Ms. Yang, 38, said she was also emboldened by the positive response she and her husband had received when talking to voters about their son Christopher, who has autism. “Something about being on the trail and meeting people and seeing the difference that we’ve been making already has moved me to share my own story about it, about sexual assault,” Ms. Yang told CNN. She added that “everyone has their own MeToo story,” but “not everyone has the audience or platform to tell their story, and I actually feel like I’m in this very privileged position to be able to do that.” Ms. Yang said she was assaulted by Robert Hadden, a gynecologist in Manhattan who has since been accused of sexual abuse by multiple patients. She said Mr. Hadden assaulted her in his exam room when she was seven months pregnant. “I was dressed and ready to go,” she told CNN. “Then, at the last minute, he kind of made up an excuse. He said something about, ‘I think you might need a C-section,’ and he proceeded to grab me over to him and undress me and examine me internally, ungloved.” Ms. Yang said she was “frozen” during the assault. But she said she later worked with the Manhattan district attorney’s office to build a case against Mr. Hadden and testified before the grand jury that indicted him in 2014 on charges involving six women, including five counts of a criminal sexual act. In 2016, the office of the district attorney, Cyrus R. Vance Jr., agreed to a plea deal that allowed Mr. Hadden to avoid jail time. Under the agreement, Mr. Hadden gave up his medical license and pleaded guilty to a single felony count of criminal sexual act in the third degree, and one misdemeanor count of forcible touching. Mr. Vance’s office also went against the recommendation of a state panel and sought the lowest sex offender status for the doctor, which a judge granted. Ms. Yang said an assistant district attorney in the office “sounded apologetic” about the deal. Ms. Yang said she was frustrated that she was not allowed to speak directly to the judge when Mr. Hadden was sentenced. “I was just flat-out denied,” she told CNN. “It was very strategic so that the judge wouldn’t be influenced if there were dozens of women in court saying that this man had assaulted them to this degree, maybe the judge would have said, ‘Why is he not getting any jail time? Why aren’t you pursuing jail time?’” In a statement on Thursday, Mr. Vance said: “Dr. Hadden was a serial sexual predator who used access and power to take advantage of women in their most vulnerable states. We support all of his survivors, and applaud their strength and courage.” Mr. Vance added that because a conviction is never guaranteed in a criminal trial, his office’s primary concern was holding Mr. Hadden accountable and “making sure he could never do this again — which is why we insisted on a felony conviction and permanent surrender of his medical license.” “While we stand by our legal analysis and resulting disposition of this difficult case, we regret that this resolution has caused survivors pain,” Mr. Vance said. A call to a phone number listed for Mr. Hadden went unanswered on Thursday night. Isabelle A. Kirshner, who represented Mr. Hadden in the criminal case, declined to comment. Mr. Yang’s campaign said Ms. Yang would not comment beyond the CNN interview. She is one of more than two dozen women who are suing Mr. Hadden, Columbia University and its affiliated hospitals, arguing that they failed to properly supervise Mr. Hadden. A lawyer for the hospitals has argued in court documents that the statute of limitations had passed by the time the lawsuit was filed in March 2017. Mr. Yang, a former tech executive, said in a statement on Thursday that he supported his wife in speaking out about the assault. “I’m extraordinarily proud of Evelyn for telling her story, and my heart breaks every time I think of what she had to experience,” he said, adding, “I hope that Evelyn’s story gives strength to those who have suffered and sends a clear message that our institutions must do more to protect and respond to women.” Updated Jan. 31, 2020
NEWS-MULTISOURCE
Filmarchives online Film Archives Online is a web gateway providing easy access to moving image collections from various European film archives. It allows the search of a growing number of individual archival databases. Since February 2007, catalogue information on around 25.000 film works – mainly non-fiction material – is searchable in English, German, French, Italian, and Czech. The database is constantly growing. Where available, streaming videos and screenshots are provided with the respective film work entry. As locating moving images is often a complex, time-consuming, and costly process, film archives online aim to simplify the access and distribution of archival films in Europe. The portal addresses user groups from professional media and film production to scientific research. Content, filmographic data, and physical characteristics can be used to search moving images. Search results provide available information about the existence and location of the materials. In addition to the search function, the website provides contact information to facilitate access to the moving image items and, if available, links to digital content available for online viewing. Film archives online result from the MIDAS project (Moving Image Database for Access and Re-use of European Film Collections). MIDAS was initiated in January 2006 as a pilot project in the MEDIA Programme of the European Commission and ended in January 2009. It was coordinated by the Deutsches Filminstitut and other institutions dedicated to collecting and preserving the European film heritage. The consortium comprises eighteen institutions – among them the British Film Institute, Národní Filmový Archiv (Prague), the Cinémathèque Royale de Belgique (Brussels) and the DEFA Foundation.
WIKI
QGIS 2.8.1 Getting Shape Files into SQL Server 2008 Express R2 For digital mapping the shp extension is the equivalent of csv files – A significant amount of information is still held in shape files and even if it is not, nearly every GIS package can export to shape format. It’s therefore pretty vital that you understand how to get this format into your backends. Turns out QGIS 2.8.1 comes with a very handy excecutable called ogr2ogr.exe On my computer this was downloaded with my installation of QGIS 2.8.1 and placed in the the following directory C:\Program Files\QGIS Wien\bin It looks like this executable has been a part of the the download for sometime so if you are on a different version of QGIS I suspect the file will be on your machine but in a directory other that QGIS Wien – whatever your version is. If in doubt a simple search on ogr2ogr should give you the location. From the command prompt you need to either navigate to the location of ogr2ogr.exe or place the full path into the instruction. In the following I have navigated to the appropriate directory using change directory command at the prompt. I then input the following. ogr2ogr -overwrite -f MSSQLSpatial "MSSQL:server=MARK-LENOVO\SQLEXPRESS;database=Geodatabase;trusted_connection=yes" "C:\Users\Mark\Documents\shp\polygon\n_america.shp" On return it will start to import the information creating a new table in your SQL Server instance within the database listed in your parameter string. It looks like it just names the table the same as the shape file, I suspect if that name already exists as a tablename in SQL Server that table will be overwritten with the new shape file. Also note that the import process can take a fair bit of time for large files so be patient. I tested it initially with a small import which it did relatively quickly, I then went and hit it with 500 thousand records and it took a little over 2 hours. Still good to know that it can cope. Once you have imported the information into SQL you should perform some form of spatial indexing on the table. I have noted that layers that have spatial indexing are drawn differently than non spatial indexed layers. Layers with spatial indexes are drawn in more rapidly all over the district much like a spray from a can. Non spatial indexed layers appear on screen slower as if painted from one side to the other. Setting up a Blank SQL Server Spatially enabled Table using Microsoft SQL Server Management Studio 2008R2 Express and displaying it in QGIS 2.8.1 Programs used; 1- SQL Server 2008R2 Express 2- SQL Server Management Studio 2008R2 Express 3- QGIS The example uses UK national grids coordinates to create a Triangle Polygon in a SQL Server Table I’ve previously written that while we’ve had spatially enabled SQL Server for over 5 years I constantly come across line of business applications that although using SQL Server have not and do not intend to spatially enable the application. This is undoubtedly because of the difficulty in re-designing legacy systems actively in use and because the benefits although significant are not generally requested by all but the most knowledgable of colleagues. While I understand this legacy system reasoning spatially enabled databases are the future so its just a matter of when and not if an application will require alteration. Understanding it in this context makes it really a requirement to start seriously planning for its inclusion. Developerers creating new applications however should always consider spatially enabling relevant tables from the start even if it is not specked by the client/colleague. It being so much easier to spend a couple of minutes future proofing the schema of a new born database rather than hours trying to retrofit a live in production back end. Firstly it’s important to understand what a geodatabase in SQL Server actually is. Really it is a normal database which has one table that has a field that has a geometry or geography value type. In this example I will use desktop QGIS 2.8.1 to display the resulting geometry but any other digital mapping package that can link to SQL Server could be used. SQL Server also has a very rudimentary Mapping Display but you will need something better if you want to manipulate boundaries visually. Many digital mapping products have plugins that will create Geodatabases and tables however I haven’t seen one for QGIS. I really wanted to be able to create spatial SQL tables on my own without recourse to paid tools directly in SQL Server Management Studio. So here’s my method of creating blank polygon table whose geometry is ready to be read and edited in QGIS or any other digital mapping system just using SQL Server Management Studio Express 08R2. Steps 1. Create a new Table 2. Ensure the table has an identity Key that increments 3. Create a geometry column 4. Write a query that updates the geometry column UPDATE T001Sites SET Coordinates=geometry::STGeomFromText(‘POLYGON((301804 675762,295789 663732,309581 664870,301804 675762))’,27700) You will note that there are four coordinates here (each coordinate being a pair of numbers ) The first coordinate and last are the same this is required by SQL to ensure that the polygon is closed. The 27700 number is the Spatial Reference System Identifier (SRID) – it is a unique value used to unambiguosly identify projecttion. 27700 is the unique identifier for the United Kingdom National Grid and represents the coordinates my example refer to. The spatial reference identification system is defined by the European Petroleum Survey Group (EPSG) standard which is a set of standards developmed for cartography surveying etc and owned by the Oil and Gas Producers Group list here; http://www.epsg-registry.org/ The above coordinates display a triangle in West Lothian near Edinburgh 5. Set up the connection to SQL Server Instance Ensure the box marked “Only look in the geometry_columns metadata table” checkbox is unchecked. By default this is checked and if the geometry_columns table does not exist you will get an error message. QGIS-SSMS-Connection 6. Display the table and edit as appropriate. Select the table then hit the Add button QGIS-SSMS-TableReadyforDisplay And here is the SQL Server table in QGIS ready to be added to or edited. QGISshowingSQLServerPolygon Enabling Geospatial integration in applications. Despite the fact that spatially enabled databases have been around pretty much everywhere for quite sometime there’s still a heck a lot of enterprise applications out there that are not using the feature even though their backends support it. SQL server has had the facility since 2008 , Oracle has it as well although it is with the expensive Oracle 11g Enterprise edition. So if its available why are so many applications not using it? Well one of the reasons is that many of the applications which would benefit from introduction are central to organisations and were in existence long before the feature was available in backend databases. So why not introduce it as an update? Well the problem is a geospatial attribute is a form of primary key more accurate than the often completely arbitrary primary keys that most tables will take as their reference. Adding it is likely to require not just the addition of a geospatial attribute which will be a defacto primary but potentially adding a full table not as a child but as a parent to the previous parent records – the former parent records requiring the addition of foreign keys that relate to their parents. As most of you know altering primary keys in tables is pretty much equivalent to transplant surgery for a database. Totally wiping a primary key and starting with a different primary key that needs to then be captured for itself and related back to its children is if anything several orders of magnitude worse than that.. Doesn’t sound good does it. This is another case where if you have paying clients or you have a purchased product that isn’t going to happen until there is an outside force from a competitor. But the benefits are legion. As it stands most information in geographical systems is flat files that has to be updated directly within either the web gis or a gis desktop. These programs are really terrible making an application fully geospatial by design allows the UI you to display the geographical information in the GIS – web or desktop and related information in forms which often have vastly improved searching / linking to other systems drop down boxes well pretty much everything. Leave plenty of time for it but would be proper automation. Too many GIS systems are mirrored copies of a database that periodically have to be updated. This is not the long term optimum. Attaching Databases to SQL Server 08R2 Express jigsaw2 It should be noted that the following although the easiest way to get a new database into an instance it should not be used in a production environment. In fact doing so may get you sacked. If experimenting though this method should be fine. If in doubt seek help as in a production environment you would want to look through all the code before attaching anything into an instance. Go to SQL server management studio and on the Databases tree Right click and select Attach….. Attach database window should appear which will allow you to use the Add… button to navigate to the \Data\ subdirectory where all the sql server databases are held. IMPORTANT – prior to loading a file in the database will have needed to have been DETACHED and you should always move anything mdf file that you are wanting to put into a database into the data subdirectory. This ordinarily is done by going to database in question scrolling down to the database and right clicking on the database Tasks > – Detach… WARNING If a database has not been detached properly it may NOT be possible to re-attach the database this is of course a security feature. So experimenting with simple moving files about will not work… The listed code below does it at command line but the above works in SSMS The default location for databases in SQL 08R2 Express is C:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS\MSSQL\DATA The default location for database in SQL 2012 is C:\Program Files\Microsoft SQL Server\MSSQL11.[InstanceName\MSSQL\DATA Stopping and Starting SQL Server Instance 08R2 Express startstop Simply within SSMS right click on the instance and hit STOP and To start an instance if you are still in SSMS you can simply right click and hit start Note if you stop a SQL Server instance from within SSMS AND then exit SSMS and try and go back in you will be denied as SSMS is unable to connect to a service that is not up and running. In such a case to restart the instance you need to go to SQL server configuration manager and click on the instance and restart from there. In Windows 8.1 you can get to config manager by using the search facility. Windows 10 Alternative Hit the search ring type in services.msc A new dialog should appea that will have Services(Local) with several columns – Name / Description / Status / StartupType You want the Status to be Running Use the mouse to highlight SQL Server (MSSQLServer) and then right click Start Your server should now be running Allowing sa login and altering password SSMS SQL 08 R2 Express password-security Recently I installed SQL Server 08 R2 Express. As part of the standard installation the sa login is disabled as default. Clearly although this is a useful security feature it is a bit awkward if you are wanting to undertake certain tasks and as part of the installation this security feature is in no way obvious. So what do you do to re-enable it? Firstly log into SSMS under the machine windows login. Go to the Security section of the server (not any of the databases) and expand the Logins branch. SA the system admin should be listed and if it is disabled it will have a small red down arrow next to it. To re-enable highlight sa and right click Select properties Select Status now alter the following Permissions to connect to database engine Set this to GRANT Login Set this to Enabled Now highlight instance itself and right click and go to properties. Within server properties highlight Security. And change set server authentication to SQL Server and Windows Authentication mode. You should have sa login now enabled – don’t worry if sa still has a small red arrow next to it the SSMS client needs to be refreshed to see changes to set up. If you want to change the password for the SSMS server I would recommend running the following. ALTER LOGIN sa ENABLE ; GO ALTER LOGIN sa WITH PASSWORD = 'DifficultPass9£' ; GO Note you can enforce the requirement for a strong password within the same security section of the sa login if you require.
ESSENTIALAI-STEM
User:Mp6180/Evaluate an Article Evaluate an article This is where you will complete your article evaluation. Please use the template below to evaluate your selected article. * Name of article: 23andMe * I chose this article because these types of genetic tests are interesting to me. I would like to learn more about this test as I evaluate the article. Lead * I think the introductory paragraph begins with a very general sentence, and then goes on into further detail to accurately and concisely explain what the 23 and Me service is and does. The Lead accurately explains information that will be presented in the article. It provides an interesting introduction into this service's history and products. Content * The article's content is very relevant to the topic and was updated last on September 5, 2019. The only missing content I could think of is in the "accuracy concerns" section, where I feel that some data statistics would be helpful to explain the actual accuracy of the test, and the reasons for the concerns. However, this section does include updated information about the company planning to specify their result interpretations. In addition, I think that more information regarding the creation of the technology for this product would be interesting to include. Tone and Balance * The article reads to be on the slightly positive side of neutral writing. I feel that the information provided generally glossed over the negatives of using this product, such as the inaccuracies; though there was a designated section for "accuracy concerns." As aforementioned, I think this information was underrepresented. I think that more data and updated information would make a positive impact on how this article fully presents this topic. In addition, I think that the content was presented to make this service appear as a company, and did not focus on the actual technology and science behind it as much as the author should have. Sources and References * The sources are from reputable sources, up-to-date, and worked when I clicked on them. The sources are thorough besides my aforementioned qualm of lack of scientific information. Organization * The article is clear, concise, and flows well. I did not find any errors in the writing. The sections accurately reflected information presented in the article. Images and Media * The article includes one image of the test kit for the product. It is well-captioned and helps the reader to understand what the test actually entails. It adheres to Wikipedia guidelines. Checking the talk page * The conversations about this article are regarding the positive tone of the article referring to it as an "ad," which I believe has been toned down since the comments were made in 2009. The talk page also has other suggestions for improvement that an author has already made. This article is part of the following WikiProjects: Medicine/Medical genetics, Companies, Genetics, California/San Francisco Bay Area, Computational Biology, Google, Computing, Apple Inc., and Genealogy. The way Wikipedia discusses this topic is more mechanical given the grammar and content of the words being said. For example, someone suggested that the article should include information about what the company's name means. Overall impressions * This article provides interesting and accurate information regarding the topic presented. It describes the processes that the company has gone through with the FDA for approval, the history of its funding, reasons for peoples' qualms with the service, and many other aspects that people may be interested in when researching this topic. The article can be improved by including more data statistics about the service's accuracy and by explaining more of the scientific details behind the interpretations and development of such a product. The article is well-developed and the authors have made important changes to the content based on what I saw on its Talk page; however, there are still developments that can be made. Optional activity * Link to feedback: Talk:23andMe
WIKI
Merseburg-Querfurt Merseburg-Querfurt was a district (Kreis) in the south of Saxony-Anhalt, Germany. Neighboring districts were (from northwest clockwise) Sangerhausen, Mansfelder Land, Saalkreis, the district-free city Halle, the districts Delitzsch and Leipziger Land in Saxony, the districts Weißenfels and Burgenlandkreis, and the Kyffhäuserkreis in Thuringia. History The district was created in 1994 by merging the previous districts Merseburg and Querfurt. Geography The main river of the district is the Saale.
WIKI
Metro Style Apps Control Initialization in XAML/C# & HTML5/JS Overview Version: This article is being written on 06/21/2012 using Windows 8 Release Preview as a reference.  In Windows 8 Metro Style apps you have a number of choices for your markup and programming languages  You can choose the XAML markup language with C#, VB.NET or even C++.  You now also have the choice of using HTML5 as your markup language along with JavaScript as the programming language. Both XAML and HTML5 provide a way for you to define object instances in a declarative way.  When creating Metro Style apps with XAML, we declare instances of objects defined in the family of Windows.UI.Xaml.Controls namespaces, as well as some others.  These namespaces are provided as part of the WIndows API for Metro Style apps, They are included with the Windows SDK which is automatically referenced by the Visual Studio project templates. When creating HTML5/JS Metro Style apps, you can use the HTML5 markup to define either standard HTML5 elements (div,span,input,button, etc).  These standard HTML5 elements are the EXACT same elements you would use in a browser based application. With HTML5/JS Metro Style apps can also declare control instances from the WinJS.UI namespaces provided by the Windows API for Metro Style apps (AppBar, Flyout, ViewBox, etc), . the project templates provided with Visual Studio automatically reference the “WinJS” library.  This library is provided with the Windows 8 SDK (C:\Program Files (x86)\Microsoft SDKs\Windows\v8.0\ExtensionSDKs\Microsoft.WinJS.1.0.RC\1.0\).  The WinJS library is made up of a number of individual JavaScript files, but one in particular (ui.js) includes control definitions for the JavaScript WinJS.UI namespace.  These controls provided features similar to those provided in the Windows.UI.Xaml.Controls namespace used by XAML developers.   Control Declaration and Initialization in XAML Metro Style Apps As an example, here is a Windows.UI.Xaml.Controls.Viewbox control declaration in a XAML document (note, this is just a document fragment) <Viewbox x:Name="xamlViewbox"></Viewbox> The line of XAML above declares a Viewbox instance named “xamlViewbox”.  To do the same thing in C#, I could do the following : Viewbox csharpViewbox; Both above examples DECLARE a Windows.UI.Xaml.Controls.Viewbox instance.  They don’t actually INITIALIZE them .  In c# for example, our csharpViewbox would not EXIST until we initialized it, or constructed it somehow.  For example: csharpViewbox = new Viewbox(); Well, that’s fine for our controls defined in code, but for the controls that are defined in XAML, like our xamlViewbox above, they get initialized a slightly different way. The following assumes you are using Visual Studio as your development environment.  When you do a build in Visual Studio, it actually generates some code on your behalf behind the scenes.  In the constructor for your XAML document, the Visual Studio templates provide a call to a magical “InitializeComponent()” method.  public sealed partial class MainPage : Page { //Declare a Viewbox in code Viewbox csharpViewbox; public MainPage() { //Objects declared in code can be initialized (constructed) normally csharpViewbox = new Viewbox(); //Objects declared in XAML get initialized differently.... //Calls the Application.LoadComponet to initiaze the obje3cts declared in XAML //Then wires local names (like xamlViewbox) up to those objects this.InitializeComponent(); } //... irrelevant code not shown } The InitializeComponent() method isn’t actually provided by the base class, but provided instead by Visual Studio as part of the build process.  If you go to the definition of the method (right click on the method name, and select “Go To Definition…”) you will see that the method is defined in the <PageName>.g.i.cs code file. In there, you’ll see a call to the Application.LoadComponent() method.  This method walks your XAML document, and creates object instances for each object declared in the XAML.  The method then wires your local variable up to the objects in the tree created by Application.LoadComponent().  Here is a commented version of the InitializeComponent method: public void InitializeComponent() { //Only load the content if it hasn't been loaded already if (_contentLoaded) return; //Mark the content as loaded so we don't load it again _contentLoaded = true; //Use the Application LoadComponent method to walk the XAML document and //initialize (construct) each object declared in XAML. //This puts the objects on the head Application.LoadComponent (this, new System.Uri("ms-appx:///MainPage.xaml"), Windows.UI.Xaml.Controls.Primitives.ComponentResourceLocation.Application); //map the local names (like xamlViewbox) up to the object references created in the //LoadComponent method above xamlViewbox = (Windows.UI.Xaml.Controls.Viewbox)this.FindName("xamlViewbox"); } Because of this you want to make sure that you don’t try to use any of the objects declared in XAML BEFORE the call to InitializeComponent().  Control Declaration and Initialization in HTML5/JS Metro Style Apps WinJS.UI Control initialization in HTML5 apps is very similar to how control instances are initialized in XAML as described above.  There are some differences however.  First off all, your HTML5 documents will contain a mixture of standard HTML5 elements, as well as WinJS.UI controls.  The HTML5 elements are exposed to you via the DOM and you can use standard getElementByID() method calls to retrieve a reference to them, or the new standard querySelector and querySelectorAll methods, or heck or use libraries like jQuery if you prefer. There are also however, the controls provied by the WinJS library and defined by the WinJS.UI namespace.  Those need to be initailized just like the XAML objects needed to be constructed above.  So again, let’s look at an example of the HTML5 markup method to declare a WinJS.UI.ViewBox: <div id="html5ViewBox" data-win-control="WinJS.UI.ViewBox"></div> Again, we could declare controls in JavaScript code: var jsViewBox; But just like our XAML/C# example above these controls are declared, but not initialized.  We could initialize our JavaScript variable like this: jsViewBox = new WinJS.UI.ViewBox(); For the controls declared in HTML5 markup however, they don’t get initialized until the WinJS.UI.processAll() is called. The templates provided by Visual Studio automatically call the WinJS.UI.processAll() method for you from initial HTML5 document’s app.onactivated function. app.onactivated = function (args) { if (args.detail.kind === activation.ActivationKind.launch) { if (args.detail.previousExecutionState !== activation.ApplicationExecutionState.terminated) { // TODO: This application has been newly launched. Initialize // your application here. } else { // TODO: This application has been reactivated from suspension. // Restore application state here. } args.setPromise(WinJS.UI.processAll()); } }; Unlike the InitalizeComponent() method described above for XAML documents, the WinJS.UI.processAll() method is NOT generated on the fly.  It is provided as part of the WinJS library and exists in the base.js file.  Its job is similar however.  It walks your HTML5 documents and retrieves all elements marked with the “data-win-control” attribute.  It then resolves the type of the control from the attribute and instantiates it.  processAll: function (rootElement) { /// <signature helpKeyword="WinJS.UI.processAll"> /// <summary locid="WinJS.UI.processAll"> /// Applies declarative control binding to all elements, starting at the specified root element. /// </summary> /// <param name="rootElement" type="Object" domElement="true" locid="WinJS.UI.processAll_p:rootElement"> /// The element at which to start applying the binding. If this parameter is not specified, the binding is applied to the entire document. /// </param> /// <returns type="WinJS.Promise" locid="WinJS.UI.processAll_returnValue"> /// A promise that is fulfilled when binding has been applied to all the controls. /// </returns> /// </signature> if (!processedAllCalled) { return WinJS.Utilities.ready().then(function () { processedAllCalled = true; return processAllImpl(rootElement); }); } else { return processAllImpl(rootElement); } } While you would be able to retrieve the HTML5 element for the control, the actual WinJS.UI control functionality wouldn’t exist until the call to WinJS.UI.processAll() has completed.  Once it has though, you can then get to the control features by first retrieving the element by it’s ID, and then accessing the .winControl property on it. var h5Vb = document.querySelector("#html5ViewBox").winControl; Summary Metro style app development is made up of both declarative, imperative, and functional programming styles.  When we declare controls in code, it is easy to see when controls are both declared as well as when they are initialized.  When we define objects in a declarative way using either XAML or HTML5, it is necessary for initialization to occur before we can interact with the controls.  In this article I showed how initialization occurs in both XAML and HTML5 Metro Style apps. Leave a Reply Internal NC Code: 1306 Message: Could not read from server: 'token.nucaptcha.com'
ESSENTIALAI-STEM
This project has moved. For the latest updates, please go here. Installation Just download the latest version from http://communitybridge2.codeplex.com/releases and execute the msi file. If you do not have .NET 4 runtime installed, you will first be redirected to the download page: http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=17718 Starting the bridge You can start the bridge by selecting "Community Bridge 2" in your program files. It will then ask you for your LiveId username and password. You need to specify the same as in the answers-forums. Be aware that in the first time, only selected people wil lhave access to the forums via the bridge. This selection is done by Microsoft. Connect your newsreader After the bridge has started and you have successfully authenticated, you can start your newsreader and create a new account. Please be sure you select port 120 (instead of 119) in your newsreader! Alternatively you can change the port in the main UI and restart the bridge. • Detailed instruction for Windows Live Mail: SetupWLM Hint: If you use also the social/msdn/technet bridge, be aware that you need to create TWO accounts in your newsreader. Beside your existing (social/msdn/technet) account, you need to create a new account with port 120. If your newsreader does not support two indentical servernames (like Thunderbird), then you need to specify 127.0.0.1 as servername. Understanding the newsgroup names The answers forums are not very easy transferable into newsgroup names. The main problem is, that there are only a hand full of forums which has several metadata information. This structure is mapped with the bridge into newsgroups. For each available forum, there is one main-newsgroup. For each available metadata, there is one sub newsgroup. AnswersForumMetaData.jpg For example "Office" is one forum; this forum has metadata like "Excel, Access, Word, ..." or "Office 2007, 2010, ...". For each of this metadata a newsgroup is created. So you will see the following newsgroups: • answers.en-us.office • answers.en-us.office.excel • answers.en-us.office.access • answers.en-us.office.word • answers.en-us.office.office_2007 • answers.en-us.office.office_2010 Be aware that a thread ,might be present in two newsgroups if several meta infos are assigned to this thread (like Excel and Office 2007, then this thread is visible in "answers.en-us.office" (contains all threads), "answers.en-us.office.excel" and "answers.en-us.office.office_2007". Plaintext converter Today most newsreader also support HTML postings. But if your want you can enable the plaintext converter. This will convert the HTML into plaintext. For more info see: http://communitybridge.codeplex.com/wikipage?title=Markup%20Guide&referringTitle=Documentation Issues If you have any issues with the bridge, please provide us some feedback. You can either use this page (http://communitybridge2.codeplex.com/workitem/list/basic) or all MVPs can use the new private MVP forum: http://social.microsoft.com/Forums/en-us/mvpnntpanswersbridge/threads. Advanced options Bridge2.jpg Advanced actions for beginning: - prefetch Newsgroup list (may take 2-3 minutes) - prefetch the newsgroups you want to subscribe to (you can use the text filter at the bottom for filtering - then you can start your newsreader, get the newsgroup list from the bridge and subscribe to newsgroups Some background information: Answers is "thread-based", not message-based. That means that all services the bridge does are based on what information it gets about the threads from the webservice (cpslite). cpslite is what runs on the Microsoft side and delivers the data from Answers to the bridge. cpslite is limited to the last 1000 Threads. This means that you cannot go back more than one thousand threads with the initial prefetch. The number of messages you get depends on the forum (of course) and the number of messages in each thread. The average number of messages is around 3 to 5 per thread. So, with 1000 threads you may get around 3000 - 5000 messages. If you get a lot less that means this forums doesn't have that many threads/messages. The default for prefetching threads is set to 300. This will get you an average of 500 - 1000 messages for a forum. Once a newsgroup is prefetched the fetching of new threeads/messages is done in realtime when your newsreader connects and asks for new messages. Normally, this action should be finished within the timeout of your newsreader. But it may happen with large groups that this action takes longer. In this case your newsreader may timeout and stop trying. The bridge will NOT stop when the newsreader disconnects and will go on fetching that group until it is up-to-date. So, with the enxt conenct your newsreader should then get fresh data. "Old" messages: Because of the thread-based nature of Answers it may happen that you get old messages that you didn't want to get and that don't seem to "fit" in the "last 1000". This may happen for instance if an old thread got some activity (a new posting, soem moderator action, a "mark as answer" etc.). Authentication and bridge startup The bridge may seem to startup slowly (e.g. it may take up to a minute until the "Stop" button appears). If you experience that use the "Create LiveID auto login" menu item to create an authentication blob. This should speed-up things. Reauthentication: The bridge has to reauthenticate automatically every hour. If that fails for some reason it may not be able to connect to the webservice anymore. In that case exit the bridge and restart it. This problem should arise only very rarely if ever. Newsgroup names: The newsgroups names are derived from the tags Answers uses. Answers does not have "sub forums". There is only one main forum like Windows or Office or Internet Explorer. The sub forums for specific versions or Windows versions or other topics are just "tags". Then we also have a lot of locales, e.g. "languages". From this mix the bridge creates around 9000 groups. This is only a subset of what you could create by recombination of the various tags. If you subscribe for instance to - answers.de-DE.ie you get the German Internet Explorer forum. - answers.de-DE.ie.ie9 - answers.de-DE.ie.windows7 give you a subset of the main IE forum with the messages for the respective tags. Please note that although these are subsets of the main forum and contain messages from it the bridge and your newsreader has to fetch all of it. Which means you get lots of duplicate messages in the bridge cache and in your subscribed groups in the newsreader. We can't avoid that. So, the suggestion is, that you subscribe only to the main group or only to a few sub groups or you will create a lot of duplicate network traffic and data. Meta Data: You can display the metadata about a thread/message in the subject or in the signature of a message or both or none. This can be set in advanced settings. Default is set to "in subject and signature". Last edited Nov 15, 2013 at 8:06 PM by jkalmbach, version 17 Comments RobertAldwinckle Aug 24, 2012 at 7:45 PM  I would like to see a description of the UserMappings feature. I assume that it is the mechanism (for example) to let WLMail users take advantage of its Ctrl-h command? I added a mapping for my name and E-mail address but so far the bridge is not providing that conversion. E.g. all my posts are just From: my name. I hope I don't have to refresh the NNTP account to make this work. Obviously I would have to do that to make it work on all my threads but I would be happy just to see it start working on new threads.
ESSENTIALAI-STEM
Mesabi Tribune The Mesabi Tribune is a daily newspaper published in Virginia, Minnesota. It is one of the oldest surviving businesses in the city. History The newspaper was founded in 1893 as the Virginia Enterprise and switched names to Mesabi Daily News in 1945. The very first editor of the paper was named R. McGarry, who was succeeded by D. A. Cuppernoll in 1895. In 2014, Adams Publishing group acquired 34 papers, including the Daily News, from American Consolidated Media. In 2020, the newspaper was combined with the Hibbing Daily Tribune to create the Mesabi Tribune.
WIKI
Wikipedia:Articles for deletion/Livin' Like It's 1987 The result was G10 The article is unsourced, alleges that an author was a failure. Removing that content leaves an unreasonably short (A1) article, hence it goes. No prejudice against recreating a sourced and non-negative article, which can then be assessed upon its merits. Jclemens (talk) 16:12, 31 March 2010 (UTC) Livin' Like It's 1987 * – ( View AfD View log • ) Contested prod. Reason was that this book does not assert notability. In fact, with the claim that it didn't sell well, it pretty much explicitly disclaims notability. The Wordsmith Communicate 02:32, 31 March 2010 (UTC) * Delete, I can't find proof that this book even exists; my searching certainly hasn't turned up anything that could possibly support notability. Glenfarclas ( talk ) 03:59, 31 March 2010 (UTC) * Delete This is an example of "damning with faint praise". The sentence "The book did not sell well at all and today is off the market. Scott Walsh himself bought all of the remaining copies" pretty well sums up the reasons why this is not notable. To Scott Walsh, I salute you for going after the dream, that most of us have, of publishing a book. Mandsford (talk) 13:29, 31 March 2010 (UTC) * Note: This debate has been included in the list of Literature-related deletion discussions. -- • Gene93k (talk) 15:07, 31 March 2010 (UTC)
WIKI
1. Computing CheckBox inside a DBGrid Here's how to place a check box into a DBGrid. Create visually more attractive user interfaces for editing boolean fields inside a DBGrid.  Win prizes by sharing code! Do you have some Delphi code you want to share? Are you interested in winning a prize for your work? Delphi Programming Quickies Contest  More of this Feature • Adding components into a DBGrid - the theory • Download sample QuickiesContest.mdb database  Join the Discussion "Post your views, comments, questions and doubts to this article." Discuss!  Related Resources • free DB Course.TOC • Coloring DBGrid • Multiple row selection in DBGrid • Sorting a DBGrid by Column click • Using Delphi DB components • more Database articles This is the first article, in the series of articles named "Adding components to a DBGrid". The idea is to show how to place just about any Delphi control (visual component) into a cell of a DGBrid. If you are unfamiliar with the idea, please first read the "Adding components to a DBGrid" article. CheckBox in a DBGrid? As discussed in the above article, there are many ways (and reasons) why you should consider customizing the output of a DBGrid: suppose you have a boolean field in your dataset. By default, the DBGrid displays boolean fields as "True" or "False" depending on the value of the data field. If you think the same way I do, it is much more visually attractive to be able to you use a "true" check box control to enable editing of such fields. Creating a sample application To begin, start Delphi and, on that default empty new form, place a TDBGrid, a TADOTable, and a TADOConnection, TDataSource. Leave all the component names as Delphi named them when dropped on the form (DBGrid1, ADOQuery1, AdoTable1, ...). Use the Object Inspector to set a ConnectionString property of the ADOConnection1 (TADOConnection) component to point to the sample QuickiesContest.mdb MS Access database. Connect DBGrid1 to DataSource1, DataSource1 to ADOTable1, and finally ADOTable1 to ADOConnection1. ADOTable1's TableName property should point to the Articles table (thus making the DBGrid display the records of the Articles table). If you have set all the properties correctly, when you run the application (given that the Active property of the ADOTable1 component is True) you should see the following output: Boolean fields in a DBGrid What you need to "see" in the above picture is that, by default, the DBGrid displays the boolean field's value as "True" or "False" depending on the value of the data field. The field that holds the boolean value is "Winner". What we are up against in this article is to make the above picture look like the one below: DBCheckBox in DBGrid CheckBox in a DBGrid! Or, better to say, a DBCheckBox in a DBGrid. Ok, here we go. To show a check box inside a cell of a DBGrid we'll need to make one available for us at run time. Select the "Data controls" page on the Component Palette and pick a TDBCheckbox. Drop one anywhere on the form - it doesn't matter where, since most of the time it will be invisible or floating over the grid. TDBCheckBox is a data-aware control that allows the user to select or deselect a single value - most appropriate for boolean fields. Next, set its Visible property to False. Change the Color property of DBCheckBox1 to the same color as the DBGrid (so it blends in with the DBGrid) and remove the Caption. And most importantly, make sure the DBCheckBox1 is connected to the DataSource1 and to the correct field (DataSource = DataSource1, DataField = Winner). Note that all the above DBCheckBox1's property values can be set in the form's OnCreate event like: procedure TForm1.FormCreate(Sender: TObject); begin DBCheckBox1.DataSource := DataSource1; DBCheckBox1.DataField := 'Winner'; DBCheckBox1.Visible := False; DBCheckBox1.Color := DBGrid1.Color; DBCheckBox1.Caption := ''; //explained later in the article DBCheckBox1.ValueChecked := 'Yes a Winner!'; DBCheckBox1.ValueUnChecked := 'Not this time.'; end; What comes next is the most interesting part. While editing the boolean field in the DBGrid, we need to make sure the DBCheckBox1 is placed above ("floating") the cell in the DBGrid displaying the boolean field. For the rest of the (non-focused) cells carrying the boolean fields (in the "Winner" column), we need to provide some graphical representation of the boolean value (True/False). This means you need at least two images for drawing: one for the checked (True value) state, and one for the unchecked (False value) state. The easiest way to accomplish this is to use the Windows API DrawFrameControl function to draw directly on the DBGrid's canvas. Here's the code in the DBGrid's OnDrawColumnCell event handler that occurs when the grid needs to paint a cell. procedure TForm1.DBGrid1DrawColumnCell( Sender: TObject; const Rect: TRect; DataCol: Integer; Column: TColumn; State: TGridDrawState); const IsChecked : array[Boolean] of Integer = (DFCS_BUTTONCHECK, DFCS_BUTTONCHECK or DFCS_CHECKED); var DrawState: Integer; DrawRect: TRect; begin if (gdFocused in State) then begin if (Column.Field.FieldName = DBCheckBox1.DataField) then begin DBCheckBox1.Left := Rect.Left + DBGrid1.Left + 2; DBCheckBox1.Top := Rect.Top + DBGrid1.top + 2; DBCheckBox1.Width := Rect.Right - Rect.Left; DBCheckBox1.Height := Rect.Bottom - Rect.Top; DBCheckBox1.Visible := True; end end else begin if (Column.Field.FieldName = DBCheckBox1.DataField) then begin DrawRect:=Rect; InflateRect(DrawRect,-1,-1); DrawState := ISChecked[Column.Field.AsBoolean]; DBGrid1.Canvas.FillRect(Rect); DrawFrameControl(DBGrid1.Canvas.Handle, DrawRect, DFC_BUTTON, DrawState); end; end; end; To finish this step, we need to make sure DBCheckBox1 is invisible when we leave the cell: procedure TForm1.DBGrid1ColExit(Sender: TObject); begin if DBGrid1.SelectedField.FieldName = DBCheckBox1.DataField then DBCheckBox1.Visible := False end; We need just two more events to handle. Note that when in editing mode, all keystrokes are going to the DBGrid's cell, we have to make sure they are sent to the CheckBox. In the case of a CheckBox we are primarily interested in the [Tab] and the [Space] key. [Tab] should move the input focus to the next cell, and [Space] should toggle the state of the CheckBox. procedure TForm1.DBGrid1KeyPress(Sender: TObject; var Key: Char); begin if (key = Chr(9)) then Exit; if (DBGrid1.SelectedField.FieldName = DBCheckBox1.DataField) then begin DBCheckBox1.SetFocus; SendMessage(DBCheckBox1.Handle, WM_Char, word(Key), 0); end; end; And finally, the last touch. It could be appropriate for the Caption of the checkbox to change as the user checks or unchecks the box. Note that the DBCheckBox has two properties (ValueChecked and ValueUnChecked) used to specify the field value represented by the check box when it is checked / unchecked. My ValueChecked property holds 'Yes a Winner!' and ValueUnChecked equals 'Not this time.' procedure TForm1.DBCheckBox1Click(Sender: TObject); begin if DBCheckBox1.Checked then DBCheckBox1.Caption := DBCheckBox1.ValueChecked else DBCheckBox1.Caption := DBCheckBox1.ValueUnChecked; end; That's it. Run the project and voila ... check boxes all over the Winner field's column. If you need any help with the code I encourage you to post any questions on the Delphi Programming Forum. Need more DBGrid related articles? Be sure to check the rest of the articles dealing with the DBGrid (and other db-aware) components. A Beginner's Guide to Delphi Database Programming >> >> the TOP ©2013 About.com. All rights reserved.
ESSENTIALAI-STEM
GOP Senator Mike Lee Says Mitt Romney's Trump Impeachment Vote Is No Cause for Alarm Utah Republican Senator Mike Lee released a statement Friday on his campaign website discussing the differences between himself and Mitt Romney, his fellow GOP senator from the same stateespecially over their differing votes on whether to impeach former President Donald Trump. Romney was one of seven Republicans who joined all 50 Democrats who voted in favor of convicting the former president during his second Senate impeachment trial. In the lengthy statement, Lee wrote about how breaking from the majority or entirety of the GOP can be both liberating and terrifying, usually at the same time. Even though the differing votes are rare, Lee said that they do occur from time to time. He went on to state the differing opinions show that each senator has been forthcoming on how they decided to vote. In any event, the fact that Senator Romney and I sometimes disagree (either with each other or with most Senate Republicans, or both) is not itself cause for alarm, Lee said in the statement. To the contrary, it shows that neither one of us blindly defers to anyone. We each do our own homework and then, after conferring with our colleagues on both sides of the aisle and with each other, we reach our own conclusions. He also said that while the pair may disagree, they remain respectful of the other's independent judgment and studied analysis. Lee went on to quote former President Ronald Reagan, from his time as governor of California, to demonstrate how vast and broad the Republican Party is. He then went on to say that there was plenty of room in the Republican tent for both of them, and added that Republicans have to work to chart the proper course for our party. The senator continued by saying that varied discussions in the party were beneficial. The Republican Party should work tirelessly to take back the House and Senate in 2022. Having different perspectives within our party leads to more robust debate, which in turn produces more thoughtful policy outcomesall of which will be a benefit to Republicans in future elections, he said. Lee's statement ended by saying that the Republican Party is open to all. With our eyes fixed on the future, we should be including and inviting our friends, neighbors, colleagues, and family membersand anyone else who might be discouraged or disaffectedby bringing more people into the tent. Despite seemingly defending Romney's right to a differing opinion, Lee has also made clear that he still disagrees with his fellow Utah senator's vote to convict Trump. Tweeting a story from the Salt Lake Tribune, which claimed he was defending Romney's vote, Lee called the headline misleading and affirmatively deceptive. I didn't defend anyone voting to convict. Nor would I. My vote to acquit was correct, he wrote. I didn't defend anyone voting to convict. Nor would I. My vote to acquit was correct. Newsweek reached out to Romney's press secretaries for comment. A press contact for Lee referred Newsweek to the senator's statement from Friday night. Update 2/20/21 10:30 a.m. ET: This story has been updated to note that Lee's press contact referred Newsweek to his Friday statement. You have 4 free articles remaining this month Sign-up to our daily newsletter for more articles like this + access to 5 extra articles To continue reading login or create an account. No subscription required. See why nearly a quarter of a million subscribers begin their day with the Starting 5. 2021 NEWSWEEK DIGITAL LLC
NEWS-MULTISOURCE
-- Note to Turkey: Pianist’s Tweets Are Crass, Not Criminal Fazil Say, the Turkish pianist and composer was arraigned today in a Turkish court, accused of inciting hatred and insulting Islam on Twitter. How can this be? This is the Turkey that we all want the rest of the Middle East to emulate in its tolerance. It's the same Turkey that, when radical Islamists across the region started storming U.S. embassies over a video that portrayed the Prophet Muhammad as a pedophile, condemned the protests and violence, as well as the video. So maybe what Say said was even worse? There are about half a dozen tweets and retweets in the indictment, here are the highlights: “What if there is raki in paradise but not in hell, while there is Chivas Regal in hell and not in paradise? What will happen then? This is the most important question!” Another tweet makes fun of a muezzin for taking only 22 seconds to sing the call to prayer, asking if he has a mistress or some raki waiting for him to get back to. Another suggests that whenever people are notably greedy or thieves or otherwise bad, they turn out to be "exceedingly pious." So not exactly a high-end debate or in the best of taste, but did they "incite public hatred"? That's a charge that most legal systems reserve for people who inflame one ethnic or religious group against another, with a view to violence. Does the Turkish justice system think that this globetrotting pianist was trying to trigger riots against religious conservatives in Turkey? Maybe not, but Turkey's penal code does criminalize insulting religious values, just as in the bad old days of the ultranationalists and generals, Turkey criminalized insulting the republic's founder, Mustafa Kemal Ataturk, or "Turkishness." Prime Minister Recep Tayyip Erdogan and his ruling Justice and Development Party rolled back the worst impact of those laws, which for decades had been used to restrict free speech, especially by those the regime felt to be insufficiently Turkish -- such as members of the country's minority Armenian and Kurdish communities. The amendments were a real achievement and shouldn't be belittled. Yet the government didn't get rid of the "insult" clauses in the penal code. Erdogan issued more civil cases against people who allegedly insulted him -- mainly journalists but also a street performance group, a stand-up comedian and an amateur British collage artist -- than any Turkish leader before him. (He dropped all outstanding insult cases last year, shortly after a Wall Street Journal article on the subject.) It remains a crime to insult an official in Turkey. TV presenter Cuneyt Ozdemir was facing a three-year prison term, accused of tweeting criticism of a judge, until the term was lifted in October as part of an amnesty (conditional on his not repeating the offense). Ozdemir's alleged criticism was of a judge, who upheld a lower court decision to void jail sentences against 26 men who had gang-raped a 13-year-old girl, on grounds that she consented. Now, instead of ethnic-Armenian writer Hrant Dink being prosecuted under the "insulting Turkishness" laws, a secular pianist is on trial for insulting religious values. Is this progress? I'd like to say yes -- Dink, after all, was shot dead by a nationalist in the streets of Istanbul in 2007. Fazil Say's trial was postponed until February, and you have to hope the courts will drop the case, rather than invite more ridicule and criticism in the EU's annual progress report on Turkey's membership bid. Unfortunately, the case against Say is part of a pattern. Turkey's democratic progress has stalled. If the government wants to keeps its moderate, pro- democracy reputation intact it needs decriminalize insults, whether these are made against officials, Turkishness or religion. They are free speech, pure and simple. (Marc Champion is a member of Bloomberg View's editorial board. Follow him on Twitter.) Read more breaking commentary from Bloomberg View columnists and editors at the Ticker .
NEWS-MULTISOURCE
-- Barnes & Noble Stores Seen Topping Market Value: Real M&A For Barnes & Noble Inc. (BKS) founder Leonard Riggio to take his bookstores private, he may need to write a check for more than the entire company’s market value. Riggio said yesterday that he will offer to buy the retail stores and website of the New York-based company he started more than 40 years ago, leaving shareholders with Barnes & Noble’s college book and Nook e-reader businesses. The retail chain alone is worth about $1 billion, according to the average of four analysts’ estimates compiled by Bloomberg, more than Barnes & Noble’s market capitalization yesterday of $902 million. Buying the bookstores would give Riggio the most profitable piece of a company that throws off more cash relative to its share price than 94 percent of North American specialty retailers, according to data compiled by Bloomberg. Barnes & Noble has been dragged down by concerns over the value of Nook, which continues to lose money despite investments from Microsoft Corp. (MSFT) and Pearson Plc (PSON) , Credit Suisse Group AG said. “This is the catalyst we had been expecting for a long time to unlock the value of Barnes & Noble,” Albert Saporta, managing director of AIM&R, a Geneva-based alternative investment research firm, said in an e-mail. The chain “can be run profitably as a private company.” Riggio, Barnes & Noble’s largest shareholder with about 30 percent of the stock, said yesterday in a filing that the price for the retail business will be negotiated with the board. Bookstore Value The stores and website may be valued at $700 million to $1.2 billion, according to a range of estimates from analysts at AIM&R, Janney Montgomery Scott LLC, Maxim Group LLC and Credit Suisse. The average estimate is about $1 billion. Mary Ellen Keating , a spokeswoman for Barnes & Noble, declined to comment on a potential bid price or valuation of the company’s retail assets. A deal would come as the stock trades at an 88 percent discount to its revenue for the past 12 months, even after climbing yesterday by the most in four months, data compiled by Bloomberg show. That’s the second-cheapest among North American specialty retailers larger than $500 million, which fetch a median ratio of 1.1. Barnes & Noble also had cash from operations in the past year equal to about 11 percent of its stock price, while the industry’s median free cash flow yield is less than half that level, the data show. “It’s extraordinarily cheap,” John Tinker , a New York- based analyst for Maxim Group, said in a phone interview. Barnes & Noble “is a slowly melting ice cube and one that could be repositioned.” Small Premium Tinker values the bookstores at $990 million, or almost $14 a share using what he calls conservative estimates for cash flow. That’s just 2.4 percent higher than the stock’s average price in the last 20 days. The shares ended yesterday at $15.06. Today, the stock rose 2.7 percent to $15.46, ending at its highest closing level in more than two months. Barnes & Noble has been sacrificing profits to invest in its Nook Media business, while battling declining sales as readers spent less at stores and transitioned to digital books. Selling the retail chain and website would leave investors with just Nook Media, which may have losses of close to $300 million this year, according to Credit Suisse. “The issue for investors is not whether there is more value than the stock price in Barnes & Noble bookstores,” Gary Balter , a New York-based analyst at Credit Suisse, said in a note to clients yesterday. “That is an easy yes. The issue is whether there is positive value in the money-losing and increasingly poorly positioned Nook Media division.” Liberty Stake Billionaire John Malone ’s Liberty Media Corp. (LMCA) invested $204 million in Barnes & Noble in August 2011, allowing the company to spend more on its Nook e-readers to keep up with competitors. The deal gave Liberty Media preferred shares that are convertible into 12 million common shares at $17 apiece and voting rights . With $2.8 billion in cash and no debt , Liberty Media could back Riggio in taking the bookstores private and may have a strategic interest in doing so, Maxim Group’s Tinker said. Malone is also chairman of Liberty Interactive Corp. (LINTA) , which owns the QVC home-shopping television network. Almost half of QVC’s sales now come from its website and Malone could seek to partner it with Barnes & Noble should it want a retail presence quickly, according to Tinker. Courtnee Ulrich, a spokeswoman for Liberty Media, didn’t respond to requests for comment. Nook Future “Riggio will win it, with Liberty’s backing,” he said. “This is someone who has played the game extremely well and who might be backed by the smartest financial engineers in the business -- Liberty. The question then becomes, what does Nook trade for on a standalone basis?” The Nook business would need to reconsider its strategy because investing that heavily in its own devices won’t be sustainable without the profits from the bookstore operations, according to Peter Wahlstrom, an analyst at Morningstar Inc. in Chicago . That could be a good thing, he said. “I view this as a positive,” Wahlstrom said in a phone interview. To contact the reporters on this story: Tara Lachapelle in New York at tlachapelle@bloomberg.net ; Matt Townsend in New York at mtownsend9@bloomberg.net To contact the editors responsible for this story: Robin Ajello at rajello@bloomberg.net ; Sarah Rabil at srabil@bloomberg.net
NEWS-MULTISOURCE
John Thynne (died 1604) Sir John Thynne (21 September 1555 – 21 November 1604) of Longleat House, Wiltshire, was an English landowner and Member of Parliament. He was the eldest son of Sir John Thynne of Longleat and Christian, the daughter of Sir Richard Gresham, a London mercer. He was educated at Oxford, graduating BA in 1573. He succeeded his father in 1580, inheriting Longleat House, which his father had built, and was knighted in 1603. He married Joan, the daughter of Sir Rowland Heyward, Lord Mayor of London, of Cripplegate, London, with whom he had two sons. He served as a Justice of the Peace in Wiltshire, Gloucestershire, Hampshire and Shropshire and was appointed High Sheriff of Wiltshire for 1593–94. He was elected a Member (MP) of the Parliament of England for Heytesbury in 1584, 1586, 1593, 1597 and 1601, and for Wiltshire in 1589 and 1604. His wife's father gave her Caus Castle in Shropshire, but its ownership was disputed. After he and Joan took the castle by force in 1591, Joan lived at Caus whilst John was based at Longleat. The letters between them illustrate their partnership. Joan appears to have managed many aspects of their estate. In 1594, his son and heir Thomas made a secret marriage to Maria Tuchet, the daughter of George Tuchet, Lord Audley and Lucy Marvyn. This was the family of their enemies: Thomas's grandfather Sir John Thynne had a 15-year feud with Sir James Marvyn, Maria's grandfather. Joan was involved with unsuccessful attempts for many years to have that marriage annulled. The secret marriage is said to have contributed to the inspiration for Shakespeare's Romeo and Juliet. The dispute over the marriage was resolved in 1601, and when her husband John died in 1604, Longleat passed into the hands of her enemy Maria Thynne. He was succeeded by his eldest son Thomas and his wife Maria Thynne.
WIKI
Why dis‐activate the airbag? But why dis‐activate the airbag, which is intended to protect the driver or the passengers? 1 – Because when the driver uses his vehicle as a battering ram, the airbag in his steering wheel is very likely to inflate and hamper him in his gestures at the precise moment of impact but above all in the following seconds. The main aim of this so-called lead vehicle is to get through but also to remain capable of getting away and clearing a passage for the other vehicles coming behind. Hence the airbag in this situation becomes a very serious handicap that can rapidly put the aggressors in a position of superiority. The same is even truer for the driver of the car containing the passenger at risk. 2 – If the passenger-side airbag opens against the bodyguard sitting next to the driver, the bodyguard is in turn placed in a position of weakness because of this airbag that has inflated and continues to be a handicap for several seconds afterwards. He cannot properly use his weapon and runs the risk of being hampered by the airbag for several seconds – situations which the aggressors will not fail to exploit to their advantage. Secondly, the ABS system will be dis-activated on the rear wheels, which are the ones to which the handbrake applies, for this type of driving technique. But be careful, some carmakers have put the handbrake on the front wheels, making the car incompatible with this very-high‐security driving technique. Some dis-activate the whole ABS system when the driver is capable of reproducing an equivalent level of braking or even a more precise level in the case of certain drivers. Why dis‐activate a security system that is extremely useful in a car when we are talking of very high security? The answer is precisely because we are in extreme situations, with trained experts, and it is possible to achieve an even shorter braking distance with perfect mastery of technique with or without ABS. How is this done? It involves braking with the handbrake and the help of the steering wheel in such a way as to make the vehicle perform a complete U-turn. This technique is applied only when, for example, the attackers have placed a heavy truck right in the middle of the road and made it impossible to ram the latter because it is equivalent to a solid brick wall in these conditions. In these circumstances, security drivers try to get away to the rear and often in this manner if the road is wide enough. If not, it will mean confrontation of the kind they try to avoid unless absolutely essential. Warning: when using the handbrake and turning the wheel, the car will systematically find itself in the reverse lane of the road. Warning: the safety ratchets on the handbrake are systematically dis-activated before setting off so that the handbrake can never remain blocked at the end of this maneuver.
ESSENTIALAI-STEM
Sonja STUMO, Plaintiff-Appellant, v. UNITED AIR LINES, INC. et al., Defendants-Appellees. No. 15904. United States Court of Appeals Seventh Circuit. Aug. 10, 1967. George F. Archer, Chicago, Ill., for appellant. Allen E. Gramza, Stuart Bernstein and Arthur J. Kowitt, Chicago, Ill., Mayer, Friedlich, Spiess, Tierney, Brown & Platt, Chicago, Ill., of counsel, for appellees. Before HASTINGS, Chief Judge, MAJOR, Senior Circuit Judge, and SCHNACKENBERG, Circuit Judge. MAJOR, Senior Circuit Judge. Plaintiff, an employee of United Air Lines, Inc. (United), brought this action against it and other defendants for the recovery of compensatory and punitive damages and other relief, for her alleged wrongful discharge on March 14, 1966. United is a common carrier by air, and it and its employees are subject to Title II of the Railway Labor Act, Title 45 U.S.C.A. Sec. 181 et seq. Defendant Air Line Pilots Association (ALPA) is a union representing the employees of United, including plaintiff, in an appropriate unit. United and ALPA operate under a collective bargaining agreement which sets forth the rights and responsibilities of the parties thereto. Defendants Ritner, Hardesty, McAnallen and Robertson were members of United’s System Board of Adjustment, the two former being designees of United and the two latter of ALPA. Defendant Ruby was president of ALPA. Defendants United, Ritner and Hardesty, pursuant to Rule 12(b) (1) and (6) of the Federal Rules of Civil Procedure, moved to dismiss the complaint for the following reasons: “1. The Court lacks jurisdiction over the subject matter of this suit since plaintiff’s exclusive remedy is before the United Air Lines. Stewardesses and Flight Stewards System Board of Adjustment; “2. This action is premature since the System Board of Adjustment has not yet heard and decided plaintiff’s grievance, and any constitutional impairment alleged in the Railway Labor Act may be asserted by plaintiff in a suit to review any award of the System Board of Adjustment which plaintiff may deem to be in violation of her constitutional rights; “3. The complaint fails to state a claim upon which relief can be granted.” A similar motion was filed by ALPA, Mc-Anallen and Robertson. The Court permitted the filing of numerous affidavits and other documentary evidence submitted by the parties in support of their respective positions. The Court by its order of October 4, 1966, allowed defendants’ motion to dismiss for lack of jurisdiction on the ground that “plaintiff having elected the grievance procedure and alleging no fraud or misrepresentation on part of either or both defendants is bound by such election.” From this order plaintiff appeals. In this Court defendants argue as an alternative basis for affirming the order of dismissal that the Court was without jurisdiction for want of diversity of citizenship. Of the numerous issues argued by the respective parties, we think there clearly emerges the controlling issue as to whether the System Board acquired exclusive jurisdiction of plaintiff’s grievance, which she submitted to it in accordance with the terms of the collective bargaining agreement. As alleged in plaintiff’s complaint: “At all times relevant hereto an agreement existed between the defendant Air Line Pilots Association Air Line Stewardesses and Flight Stewards Division, a labor union duly certified and recognized, which covered the pay, rules and working conditions of stewardesses employed by United including Plaintiff; said contract contained a Section XII, ‘Investigation and Discipline’, and a Section XIII, ‘System Board of Adjustment’, set up in compliance with Sec. 204, Title II of the Railway Labor Act and whose jurisdiction was governed by the authority of Sec. 3, Title I of the Act.” A letter of discharge, dated March 14, 1966, was sent to plaintiff by Mary Decker, her supervisor, in conformity with Sec. XII-A-1 of the collective bargaining agreement between ALPA and United. Sections XII and XIII of the agreement contain procedures for the processing of discharge grievances. They provide for a series of appeals through various levels of supervision up to the vice president and general manager of the Customer Services and ultimately to the System Board of Adjustment. The Board’s decisions, in all cases “properly referrable to it” are expressly made “final and binding upon the parties thereto.” The System Board has jurisdiction, inter alia, over all “disputes between [an] employee * * * and the company * * * growing out of grievances or out of the interpretation or application of any of the terms of this agreement.” The Board consists of four members, two selected by the company and two by ALPA, with provision for appointment of a neutral referee in the event of a deadlock. Unless a timely appeal is taken to the System Board from the company’s fourth level decision, that decision becomes “final and binding” under the contract. Upon her discharge, plaintiff set in motion the contract grievance machinery. We need not recite in detail the evidentiary circumstances concerning the numerous hearings which were held at plaintiff’s request. This is so for the reason, as we understand, that there is no claim by plaintiff that the contract procedure was not followed at least until June 15, 1966, when her grievance was submitted to the System Board. On brief plaintiff states: “As required by the Railway Labor Act (45 U.S.C. 184), Plaintiff grieved this dispute and it was handled in the usual manner up to and including the chief operating officer of the carrier so designated (a Mr. E. C. Westervelt) but Stumo was not reinstated.” More than that, plaintiff argues that the Act “does not give the employee an election but compels processing the grievance in the usual manner to the chief operator of the carrier” as a prerequisite to the right of the employee to elect to sue in a court for wrongful discharge. It may be of some relevancy to point out that at the first hearing, held on March 29, 1966, plaintiff appeared with a fellow stewardess, and Mary Decker was present for the company. Plaintiff’s grievance was denied and a copy of the decision was sent to her and to ALPA’s legal department, at her request. Hearing on a further appeal was held April 28, 1966, to which plaintiff was accompanied by the chairman of the ALPA local and by a fellow employee. Following this hearing, copies of the decision were sent to plaintiff and to the ALPA legal department. At this stage of the proceeding United received a letter from Mr. George F. Archer, dated April 29, 1966, in which he stated, “Please be advised that Miss Sonja Stumo is a client of mine and has requested that I examine the pertinent decisions that have been rendered in the above case.” He requested a copy of the decision following the hearing of April 28, 1966, with which he was supplied. The record reveals an exchange of a series of letters between Archer and United, which in the main we regard as immaterial. It may be pertinent to note, however, that in a letter dated May 25, 1966, Archer demanded that United “reinstate Miss Stumo with full back pay, seniority and a letter of apology * * In a letter dated June 3, 1966, United advised Archer that under the terms of the collective bargaining agreement and the Railway Labor Act, an appeal would lie to the System Board of Adjustment. In the meantime, plaintiff by letter dated May 5, 1966, requested an appeal hearing from the adverse decision following the hearing of April 28. In response to this request she was advised by United, in a letter dated May 10, of a hearing date of May 18, 1966. Copies of this letter were sent to ALPA’s local chairman, to its legal department and to Mr. Archer. Two of plaintiff’s fellow stewardesses accompanied her to this hearing. For some reason not explained by the record, Archer was not present and his name was not mentioned by plaintiff. On May 25, 1966, plaintiff was advised that her appeal was denied, and copies of the decision were sent to ALPA’s legal department and to Miss Hollé, one of the stewardesses who had appeared with plaintiff at the hearing. On June 15, 1966, ALPA submitted plaintiff’s grievance to the System Board, protesting her discharge. This submission, in our opinion, is of great importance, perhaps decisive of the issue before us. The letter was directed to David S. Ritner (a defendant), Chairman, United Air Lines, Inc. Stewardesses’, System Board of Adjustment, and was signed by Charles H. Ruby (a defendant), as President of Air Line Pilots Association (Steward and Stewardess Division). The letter set forth the provisions of the collective bargaining agreement which required the Board to consider any dispute properly submitted to it by an employee which had not been previously settled in accordance with the terms of the agreement. The letter stated the questions at issue, the facts upon which plaintiff relied and her position with reference thereto, as well as the position of the employer. It concluded: “Wherefore, the grieving stewardess herewith requests the decision of the Board: “1. That the Company was not justified in the discharge of the grievant. “2. That the grievant be fully reinstated, that she be made whole any monetary losses sustained and that all papers pertaining hereto be removed from her file, and “3. That the grievant have such other, further or different relief as this Board may deem just and proper.” John G. Loomos, regular staff attorney for ALPA, in an affidavit stated, among other things: “3. That he furnished both subject and her attorney with advice before each of the hearings provided for in the Collective Bargaining Agreement. Similar assistance was rendered her by local Air Line Pilots Association officials. “4. Per her request, a letter submitting her grievance to the United Air Lines, Inc. Steward & Stewardess System Board of Adjustment was prepared by me for signature by Association President, Charles H. Ruby.” Thus, it is not open to doubt but that plaintiff’s grievance was properly submitted by ALPA to the System Board, at her request, and that the letter of submission was prepared by ALPA’s legal counsel. Although Archer does not expressly affirm or deny that he had knowledge of the submission, it is plainly inferable that he did. Moreover, a reading of the correspondence between Archer and United leaves us with the distinct impression that he was not interested in aiding his client in processing her grievance before the System Board but was concerned only with preparing the way for court action. On July 6, 1966, plaintiff by her attorney, Archer, filed the instant complaint in the United States District Court. Thus, we have a situation where plaintiff by ALPA, her duly authorized agent, properly submitted her grievance to the System Board, and some three weeks later, without notice and without affording the Board an opportunity to hear and decide her grievance, abandoned the same and elected to resort to the Court for relief. She not only abandoned her submission to the System Board but sought to enjoin it from hearing and deciding the matter. This brings us to a consideration of the cases relied upon by the parties in support of their respective positions. Moore v. Illinois Central Railroad Co., 312 U.S. 630, 61 S.Ct. 754, 85 L.Ed. 1089, is much relied upon by plaintiff. It is the progenitor of a long line of cases and has been often cited and discussed by the Supreme Court. An attempt to analyze these many cases in detail would unduly burden this opinion. Furthermore, in the view which we take of the matter, it is not necessary. True, in Moore, the Court held that a discharged railroad employee, who claimed to have been wrongfully discharged in violation of his union contract, could pursue his remedy under state law for breach of contract without having to exhaust either his contract remedies or his administrative remedy before the National Railroad Adjustment Board. In the instant case we need not be concerned with state law as it is not relied upon by plaintiff. Subsequent decisions of the Supreme Court have severely limited the Moore doctrine to the particular facts of that case, which were quite dissimilar from those before us. In Slocum v. Delaware, Lackawanna & Western Railroad Co., 339 U.S. 239, 70 S.Ct. 577, 94 L.Ed. 795, the Court held that the jurisdiction of the Adjustment Board to adjust grievances and disputes of the type there involved was exclusive. As to Moore the Court stated (page 244, 70 S.Ct. page 580): “ * * * Moore was discharged by the railroad. He could have challenged the validity of his discharge before the Board, seeking reinstatement and back pay. Instead he chose to accept the railroad’s action in discharging him as final, thereby ceasing to be an employee, and brought suit claiming damages for breach of contract. As we there held, the Railway Labor Act does not bar courts from adjudicating such cases. * * * “We hold that the jurisdiction of the Board to adjust grievances and disputes of the type here involved is exclusive. The holding of the Moore case does not conflict with this decision, and no contrary inference should be drawn from any language in the Moore opinion.” As we have shown, in the instant case plaintiff did not recognize her discharge as final but challenged its validity before the Board by seeking reinstatement. In Transcontinental & Western Air, Inc. v. Koppal, 345 U.S. 653, 73 S.Ct. 906, 97 L.Ed. 1325, one of the questions was whether an employee of a carrier subject to the Railway Labor Act must show that he has exhausted his administrative remedies under the contract of employment. The Court answered the question in the affirmative, “provided the applicable state law so requires.” The Court (page 660, 73 S.Ct. 906) repeated the interpretation of Moore which it made in Slocum (above quoted), and concluded (page 661, 73 S.Ct. page 910): “Where the applicable law permits his recovery of damages without showing his prior exhaustion of his administrative remedies, he may so recover, as he did in the Moore litigation, supra, under Mississippi law.” Walker v. Southern Railway Co., 385 U.S. 196, 87 S.Ct. 365, 17 L.Ed.2d 294, much relied upon by plaintiff, held that a railroad employee who had received a final discharge was not barred from maintaining a court suit for damages because of failure to pursue administrative remedies. The Court interpreted Moore as deciding (page 196, 87 S.Ct. page 365): “ * * * a discharged railroad employee aggrieved by the discharge may either (1) pursue his remedy under the administrative procedures established by an applicable collective bargaining agreement subject to the Railway Labor Act, and his right of review before the National Railroad Adjustment Board, or (2) if he accepts his discharge as final, bring an action at law in an appropriate state court for money damages if the state courts recognize such a claim.” We do not interpret Walker to hold that a discharged employee can maintain a court action for damages for wrongful discharge and at the same time seek to maintain his status as an employee. Certainly Walker, and no other ease so far as we are aware, stands for the proposition that an aggrieved employee may pursue his administrative remedies up to and including submission of his grievance to the System Board, abandon it, and resort to court action. Moreover, the Court in Walker, after discussing (page 198, 87 S.Ct. page 366) a number of defects which produced delays in the processing of claims, concluded its opinion as follows: “In consequence, Congress enacted Public Law 89-456, 80 Stat. 208-210, effective June 20, 1966, which drastically revises the procedures in order to remedy the defects. Of course, the new procedures were not available to ' petitioner * * * ” It thus appears that the Court would have reached a different result if, as in the instant case, the enactment mentioned had been available to the plaintiff. Two cases, Pennsylvania Railroad Co. v. Day, 360 U.S. 548, 79 S.Ct. 1322, 3 L.Ed.2d 1422, and Union Pacific Railroad Co. v. Price, 360 U.S. 601, 79 S.Ct. 1351, 3 L.Ed.2d 1460, both decided June 29, 1959, involved facts quite similar to those here. In Day, the Court stated (360 U.S. page 552, 79 S.Ct. page 1325): “Moreover, the discharged employee may challenge the validity of his discharge before the Board, seeking reinstatement and back pay. See Union Pacific R. Co. v. Price, post, 360 U.S. p. 601, 79 S.Ct. 1351. Thus it is plain both from a reading of the Act in light of its purpose and the needs of its administration and from the settled administrative interpretation that the Board has jurisdiction over respondent’s claim for compensation. “Since the Board has jurisdiction, it must have exclusive primary jurisdiction.” The Court distinguished Moore thus (page 553, 79 S.Ct. page 1325): “Moore carved out from the controlling doctrine of primary jurisdiction the unusual and special situation of wrongful discharge where the aggrieved employee has been expelled from the employment relationship.” In Price, the employee’s union, after processing his grievance through the required management levels with unsatisfactory results, submitted his case to the National Railroad Adjustment Board, which denied the claim. Thereafter, Price filed his court action, alleging wrongful dismissal in violation of the collective bargaining agreement for the same reasons urged before the Adjustment Board. The Court distinguished Moore thus (360 U.S. page 609, 79 S.Ct. page 1356, footnote): “However, the holding in Moore was simply that a common-law remedy for damages might be pursued by a discharged employee who did not resort to the statutory remedy before the Board to challenge the validity of his dismissal. A different question arises here where the employee obtained a determination from the Board, and, having lost, is seeking to relitigate in the courts the same issue as to the validity of his discharge.” It held (page 617, 79 S.Ct. page 1360): “We therefore hold that the respondent’s submission to the Board of his grievances as to the validity of his discharge precludes him from seeking damages in the instant common-law action.” Thus, in Price, the employee resorted to his administrative remedy, challenged his discharge by submitting his grievance to the Adjustment Board and, after receiving an adverse decision, filed his court action. In the case here, the employee resorted to her administrative remedy, challenged her discharge by submitting her grievance to the System Board and, without giving it an opportunity to hear and decide, abandoned the same and filed her court action. The reasoning by which the Court reached its result in Price is controlling here. A contrary holding would make a shambles of the statutory and contractual provisions for the settlement of grievances. Perhaps we should not conclude our reference to the cases without mention of Vaca et al. v. Sipes, 386 U.S. 171, 87 S.Ct. 903, 17 L.Ed.2d 842, decided February 27, 1967. In that case an employee was permitted to maintain an action in a state court against a union for its refusal to take his grievance to arbitration. Plaintiff obtained a judgment against the union, which was affirmed by the Missouri Supreme Court but reversed by the United States Supreme Court on the ground that plaintiff had failed to prove that the refusal of the union was arbitrary or the result of bad faith. Of course, the facts there are a far cry from those here, where the union by its representatives processed plaintiff’s grievance in the usual and ordinary manner and, at her request, properly prepared and submitted it to the System Board. In discussing the employee’s duty to exhaust administrative remedies, the Court in Vaca stated (page 184, 87 S.Ct. page 914): “Since the employee’s claim is based upon breach of the collective bargaining agreement, he is bound by terms of that agreement which govern the manner in which contractual rights may be enforced. For this reason, it is settled that the employee must at least attempt to exhaust exclusive grievance and arbitration procedures established by the bargaining agreement.” (Italics supplied.) Plaintiff argues that she did “at least attempt” to exhaust the grievance procedures provided by the agreement. The fallacy of this argument resides in the fact that while plaintiff pursued her contractual remedies up to and including the submission of her grievance to the System Board, she abandoned the same and resorted to court action. Thus, by her voluntary act she thwarted the jurisdiction of the System Board, which she had invoked, and rendered nugatory the attempt which she had initiated. Vaca is of no aid to plaintiff. Plaintiff advances numerous subsidiary contentions which do not require extended consideration. She asserts that to deprive her of a jury trial for her alleged wrongful discharge is a violation of the Seventh Amendment to the Constitution. This argument is wholly without merit. See Union Pacific Railroad Co. v. Price, 360 U.S. 601, 79 S.Ct. 1351, 13 L.Ed.2d 1460; Pennsylvania Railroad Co. v. Day, 360 U.S. 548, 79 S.Ct. 1322, 3 L.Ed.2d 1422, and Parker v. Illinois Cent. Ry. Co. et al., D.C., 108 F.Supp. 186, 188. Plaintiff fails to recognize that Congress has the power to modify or abolish common law rights or remedies. See Silver v. Silver, 280 U.S. 117, 122, 50 S.Ct. 57, 74 L.Ed. 221, and Mountain Timber Co. v. State of Washington, 243 U.S. 219, 37 S.Ct. 260, 61 L.Ed. 685. Plaintiff argues, apparently as an excuse for abandoning her voluntary submission, that she cannot receive a fair trial before the System Board. The thrust of her argument on this point is based upon the make-up of the Board, that is, that it is composed of members selected by the employer and the union. A similar contention made to this Court in Arnold et al. v. United Air Lines, Inc. et al., 296 F.2d 191, was answered, correctly we think, adversely to the employee. An examination of plaintiff’s complaint reveals that a number of her allegations are of a conclusory nature; some are positively refuted by the documentary proof submitted in connection therewith and others are irrelevant to any issue in the case. She alleges in effect that because she was a non-union member, ALPA refused proper legal assistance, thereby discriminating against her. We have previously shown how her grievance was processed, which plaintiff admits was “in the usual and ordinary manner,” and how it was prepared by the legal department of ALPA and submitted to the System Board. The record completely dispels the allegation that she was treated unfairly or discriminated against by ALPA. More than that, by the time her grievance was submitted to the System Board she had employed a private attorney. Plaintiff on brief states, “ * * * this record is replete with plaintiff’s vain attempts to lay the foundations for a fair trial.” This statement would be more accurate if it read, “This record is replete with plaintiff’s vain attempts to lay the foundations which would justify her abandonment of the proceedings which she initiated before the System Board, so as to resort to court action.” Of the numerous letters exchanged between United and Archer, plaintiff calls particular attention to those of June 21 and June 28, directed by Archer to United, which United did not answer. These letters, so it is asserted, were attempts to obtain vital information conducive to a fair trial before the System Board. In the June 21 letter Archer suggested that a neutral referee be designated to sit with the System Board, and submitted for that purpose the names of six persons. The suggestion was premature inasmuch as the agreement expressly provided that a neutral referee should be employed only in the event of a Board deadlock, which obviously could not take place until after the grievance was heard. Courtesy might have suggested a reply, but United was under no legal obligation to do so. In the June 28 letter Archer requested a copy of plaintiff’s submission to the System Board which, as we have previously shown, had already been furnished him by the legal counsel for ALPA. Concern was expressed in the letter that the writer was not being kept informed of the steps being taken regarding plaintiff’s grievance. The letter was self-serving, and United’s failure to answer it within one week is no proof of the charge of unfairness. It evidently was the last step taken in preparation for court action, which was commenced one week later. One other allegation of the complaint perhaps should be noted. It is alleged that United wilfully told plaintiff “that her conduct was akin to embezzling of company funds.” We assume it is this allegation upon which plaintiff seeks exemplary damages. It is not alleged that the statement was false or that it was made by any person for whose utterances United would be liable. Moreover and of more importance, it was irrelevant to any issue which plaintiff submitted to the System Board. We hold that the complaint was properly dismissed on the ground that the System Board acquired exclusive jurisdiction to hear and decide plaintiff’s grievance, which she submitted to it in accordance with the terms of the collective bargaining agreement. This makes it unnecessary to consider or decide the alternative basis suggested by defendants as a reason for affirmance, that is, a lack of diversity of citizenship. The order appealed from is Affirmed. SCHNACKENBERG, Circuit Judge (dissenting): Sonja Stumo, plaintiff, appeals from an order of the district court entered September 27, 1966, granting motions to dismiss her complaint, filed by defendants United Air Lines, Inc., a Delaware corporation, “United”, E. S. Ritner, R. W. Hardesty, Carole McAnallen and Diane Robertson (as members of the United Air Lines System Board of Adjustment), Air Line Pilots Association-Stewardess and Flight Stewards Division, and Charles H. Ruby, as its president and individually. Plaintiff’s complaint, in count I, alleged a cause of action against United for wrongful discharge, arising under the fifth and seventh amendments of the United States constitution and also the Railway Labor Act, 45 U.S.C. §§ 181, 184, and 153 First (m) and (p), as conferred by 28 U.S.C. § 1337; and § 301 of the Labor Management Relations Act, 29 U.S.C. § 185, as amended. From the complaint it appears that plaintiff was hired by United as a stewardess effective July 7, 1958, and was so employed until her discharge on March 14, 1966. Her supervisor, Mary Decker, then notified her by letter that she was discharged for violations of United’s travel policy on December 20 and 25, 1965. Pursuant to the labor contract in effect, she requested a hearing and an investigation, and hearings were held at United’s offices. Count I charges that United willfully disregarded plaintiff’s rights in conducting hearings in reference to her and, in other respects, was guilty of improper handling of her rights, and that, as a direct result thereof, she was willfully and wrongfully discharged, for which she seeks both compensatory and exemplary damages. In count II, plaintiff charges that United’s System Board of Adjustment— Stewardess Division received a Letter of Submission from the Union which conferred jurisdiction on the Board to hear plaintiff’s grievance of wrongful discharge, but the Union refused to offer legal aid to her, a nonunion employee, although all [Union] members are assigned a staff lawyer to represent them at such Board hearings. She also charges that defendant, Board members Ritner, Hardesty, McAnallen and Robertson, are employees of United, who are junior in rank to United’s officers, who had already denied plaintiff’s grievance, and that she “cannot get a fair hearing at the said System Board.” Plaintiff’s suit, prays, inter alia, that defendants be enjoined from “prosecuting, hearing and/or deciding” her discharge grievance against United. The following relevant facts occurring before this suit was instituted appear in an affidavit filed in support of United’s motion to dismiss: In the letter from Mary Decker discharging plaintiff, she was told she was expected to reimburse United for $29.09. Plaintiff appealed from her discharge to Stewardess Service Manager Hale by letter dated March 17, 1966 and requested “an investigation hearing” of the discharge, and decisions rendered. Hale replied on March 23, 1966 by letter, stating the charges. In Hale’s office a hearing was held March 31, 1966. By letter dated April 8, 1966, he informed plaintiff that the charges were accurate and that she had a responsibility to acquaint herself with the proper procedures. On April 15, 1966, plaintiff appealed from this decision to vice-president Dorsey, relying on the agreement between United and AUPA. W. L. Rich-man, staff representative, Employee Relations, and designee of Dorsey to hear plaintiff’s grievance, set April 28, 1966 for a hearing. There :'s nothing in the record from which the court can determine what statements, sworn or unsworn, were made at the hearing on April 28, 1966. The record merely shows that there were present besides plaintiff and Richman, the following: Miss Decker, Passenger-agent Voss, Stewardess Kaye and Marilyn Hollé (ALPA chairman of O’Hare Local). At this point, attorney George F. Archer under date of April 29, 1966, wrote United vice-president Dorsey, stating that plaintiff had become his client and requested all pertinent information to be released in the future, as well as a copy of any decision based on the April 28th hearing. By letter dated May 3, 1966, Rich-man notified plaintiff that her grievance was denied for the reason that she had failed to satisfactorily explain various questions which she had been asked. Dorsey replied to Archer on May 4, 1966, enclosing copies of the letter of charges dated March 23, 1966, the Hale decision of April 8, 1966, and the Richman May 3,1966 decision. Dorsey requested that thereafter all correspondence be addressed to F. A. Brown, vice-president and general manager of United. Thereupon plaintiff on May 5, 1966 wrote Mr. Brown requesting “an appeal hearing, as provided in the Agreement” and asking that copies of hearing notices and decisions rendered be sent to her and attorney Archer. Whereupon vice-president and general manager of customer service, E. C. Westervelt (who had been appointed designee for Mr. Brown) replied by letter dated May 10, 1966 setting a hearing for May 18, 1966 in the stewardess office at O’Hare, a copy of which letter was sent to attorney Archer. Under date of May 25,1966, Westervelt wrote plaintiff a letter in which he referred to the May 18, 1966 hearing, at which plaintiff, as well as Miss Hollé and stewardess Prato, Miss Decker and Mr. Hale were present. Westervelt concluded that plaintiff’s discharge was proper and therefore her grievance was denied. On the same date, May 25, Archer wrote Brown, in part: “ * * * the appeal ‘opinions’ have not been predicated upon the facts presented at the hearings; they have been prejudged, and the burden of proof has been shifted. * * * We further state that an arbitrary standard was imposed on Miss Stumo that has not been applied to United’s unionized employees.” However, Brown replied on June 3, 1966, indicating that plaintiff was “required to make any further appeal to the System Board of Adjustment”. Following Brown’s suggestion, Archer on June 8, 1966 inquired of him the date of the next Board meeting, the names of its members and other information. Due to Brown’s absence, O. E. Wilkinson on June 13, 1966 furnished the names of the four board members and gave the name of Ritner as board chairman to whom plaintiff should submit her appeal. The Union by letter of June 15, 1966 submitted plaintiff’s grievance to the System Board. On July 6, 1966, plaintiff filed her suit in the district court. 1. It is the basic contention of plaintiff that she was wrongfully discharged and that this is a common-law action arising therefrom. Moore v. Illinois Central R. Co., 312 U.S. 630, 61 S.Ct. 754, 85 L.Ed. 1089 (1941). She maintains that she could not obtain an impartial hearing before the Board, because of its makeup. This court now relies on Union Pacific R. Co. v. Price, 360 U.S. 601, 79 S.Ct. 1351, 13 L.Ed.2d 1460 (1959). But there petitioner Price knew that his union, with his consent, submitted to the National Railroad Adjustment Board his grievance against a railroad employer, which was dismissed by the Board, and therefore he was precluded from seeking damages for that dismissal in a common-law action. As the court pointed out at 602, 79 S.Ct. at 1352: “This is a diversity common-law action brought by the respondent, a former employee of petitioner railroad, in the United States District Court * * * to recover damages from the railroad for allegedly wrongfully discharging him in violation of the collective bargaining agreement between it and the Brotherhood of Railroad Trainmen. * * * ” The court thereupon added: “ * * * The validity of the discharge was previously challenged upon the same grounds before the National Railroad Adjustment Board, First Division, in a proceeding brought by the Brotherhood on respondent’s behalf under § 3 First (i) of the Railway Labor Act, seeking the respondent’s reinstatement with back pay. The Board rendered an award in favor of the petitioner. The question for decision here is whether the respondent may pursue a common-law remedy for damages for his allegedly wrongful dismissal after having chosen to pursue the statutory remedy which resulted in a determination by the National Adjustment Board that his dismissal was justified.” (Italics supplied.) At 605, 79 S.Ct. 1351, the court pointed out that by its award and adjustment board denied the claim, and some three years later the damage suit was filed in court. At 607, 79 S.Ct. at 1355, the court stated: “ * * * Even if the procedure followed by the railroad constituted a proper investigation, the Board’s outright denial of the claim is explicable only on the ground that the Board also held that Article 32(b) did not justify the respondent in disobeying the dispatcher’s instruction to remain at Nipton. We conclude that both issues were decided by the Board against the respondent, and therefore reach the question whether the respondent, despite the adverse determination of the Adjustment Board, could pursue the common-law remedy for damages in the District Court.” and at 608-609, 79 S.Ct. at 1355, the court added: “ * * * Congress barred the employee’s subsequent resort to the common-law remedy after an adverse determination of his grievance by the Adjustment Board.” Obviously in the case at bar, while plaintiff in good faith attempted to exhaust the available grievance procedures, it is a fact that the Board never made a final decision or award. It therefore follows, that (unlike Price), there having been no determination of her grievance by the Board, plaintiff was not thereby barred from proceeding with her common-law action. Although plaintiff was discharged by United and she claims that the discharge was wrongful, defense counsel has not cited any case overruling the principles announced in Moore. Moreover, in Slocum v. Delaware, L. & W. R. Co., 339 U.S. 239, at 244, 70 S.Ct. 577, at 580, 94 L.Ed. 795 (1950), Moore was cited as authoritative, the court saying: “Our holding here is not inconsistent with our holding in Moore v. Illinois Central R. Co., 312 U.S. 630, 61 S.Ct. 754, 85 L.Ed. 1089. Moore was discharged by the railroad. He could have challenged the validity of his discharge before the Board, seeking reinstatement and back pay. Instead he chose to accept the railroad’s action in discharging him as final, thereby ceasing to be an employee, and brought suit claiming damages for breach of contract. As we there held, the Railway Labor Act does not bar courts from adjudicating such cases. A common-law or statutory action for wrongful discharge differs from any remedy which the Board has power to provide, and does not involve questions of future relations between the railroad and its other employees. * * * ” In addition, we have the benefit of the recent decision in Vaca v. Sipes, 386 U.S. 171, at 179, 87 S.Ct. 903, at 911, 17 L. Ed.2d 842 (1967), where the court recognized the general rule that neither state nor federal courts have jurisdiction over suits directly involving activity subject to the National Labor Relations Act, citing San Diego Building Trades Council, etc. v. Garmon, 359 U.S. 236, at 245, 79 S.Ct. 773, 3 L.Ed.2d 775. However, the court in Vaca proceeded to say: “This pre-emption doctrine, however, has never been rigidly applied to cases where it could not fairly be inferred that Congress intended exclusive jurisdiction to lie with the NLRB, * * *» Further, 386 U.S. at pages 184-185, 87 S.Ct. at page 914, the court stated: “ * * * For this reason, it is settled that the employee must at least attempt to exhaust exclusive grievance and arbitration procedures established by the bargaining agreement. Republic Steel Corp. v. Maddox, 379 U.S. 650, 85 S.Ct. 614, 13 L.Ed.2d 580. However, because these contractual remedies have been devised and are often controlled by the union and the employer, they may well prove unsatisfactory or unworkable for the individual grievant. The problem then is to determine under what circumstances the individual employee may obtain judicial review of his breach-of-contract claim despite his failure to secure relief through the contractual remedial procedures.” At 187, 87 S.Ct. at 915, the court went on to say: “ * * * If a breach of duty by the union and a breach of contract by the employer are proven the court must fashion an appropriate remedy. * * Moreover, under all the circumstances of this case, it would be unrealistic to contend that plaintiff’s bona fide endeav- or to obtain relief by the administrative process in and of itself barred her from filing her action for damages against United, on the theory that she had thereby elected to proceed solely with the administrative proceedings. While counsel for United argue that “if plaintiff were to abandon the grievance route in midstream, her right to recover under the contract for wrongful discharge would terminate according to its own terms”, they choose to ignore the frustration which overwhelmed her efforts to exhaust her administrative remedies. 2. Defendants contend that plaintiff cannot maintain her action for wrongful discharge in the federal courts because she has failed to satisfy the basic requirements of the Moore case. They note that Moore was based upon diversity of citizenship and that, in the case at bar, in her complaint plaintiff does not allege diversity. Thus defendants rely on Transcontinental & Western Air, Inc. v. Koppal, 345 U.S. 653, 73 S.Ct. 906, 97 L.Ed. 1325 (1953) which was an action brought by a discharged employee for damages for wrongful discharge, and was based on diversity of citizenship. There plaintiff relied upon the law of Missouri. It appears, however, that from its very nature the controversy involved in this ease is one which arose under the laws of the United States, 28 U.S.C.A. § 1331 and § 1337. International Ass’n of Machinists v. Central Airlines, 372 U.S. 682, 684, 83 S.Ct. 956, 10 L.Ed.2d 67 (1963). The case before us is not a diversity action. In Republic Steel Corp. v. Maddox, 379 U.S. 650, at 657, 85 S.Ct. 614, at 618, 13 L.Ed.2d 580 (1965), the court said: “ * * * Federal law governs ‘Suits for violation of contracts between an employer and a labor organization * * ** * *» (Emphasis supplied.) but recognized that Moore is not overruled. On the other hand, the court concluded that “the general federal rule” (underscoring mine) applies. I agree with the logic of plaintiff’s counsel herein when he suggests that the rights of a litigant such as plaintiff visa-vis an interstate air carrier do not depend on the varying laws of the many states it crosses. I would hold that diversity of citizenship is not essential to plaintiff’s cause of action when asserted under federal law. This principle of federal law was recognized by United itself when it recently filed suit in the District Court for the Northern District of Illinois, Eastern Division (62 C 2116), seeking to enjoin its pilots from ignoring certain training procedures for jet aircraft. Diversity of citizenship not being present, United based federal jurisdiction upon §§ 1331 and 1337, supra. 3. In its brief United declares that plaintiff cannot rely upon Machinists to sustain federal jurisdiction and at the same time “avoid the federal policy of exhaustion which governs federally en-forcible contracts”. But she does not seek to avoid that policy. Rather, in accordance with federal law, she made a bona fide attempt to comply with and exhaust her administrative remedies. When, because of the circumstances which confronted her, the Board’s action promised to be abortive, plaintiff was justified in filing the present suit for unlawful discharge. At the trial of her damage suit, the bona fides of her efforts to exhaust her administrative remedies will be an issue. The requirements of federal, not state, law will control. The guidelines in that respect were laid down in Republic Steel Corp. v. Maddox, supra, 652, 85 S.Ct. 616: “As a general rule in cases to which federal law applies, federal labor policy requires that individaul employees wishing to assert contract grievances must attempt use of the contract grievance procedure agreed upon by employer and union as the mode of redress. * * * ” I would hold that the record before us indicates that there is a sufficient showing that plaintiff at the trial of her damage suit could present evidence, under her complaint, from which the court could find that she had met the requirements of the policy stated in Maddox. For these reasons, I would reverse the order from which this appeal was taken and would remand to the district court for further proceedings in accordance herewith. . Sometimes referred to herein as the “Union” or “AUPA”. . While count II asked for certain injunctive relief and for a declaration that parts of the Railway Labor Act are unconstitutional, for that purpose it is now not relied upon by plaintiff, and I would consider it abandoned as a basis for such relief. . Plaintiff had been confronted with the reality of the situation including the presence on the Board of two employees of United who were junior in standing to the company officials against whom plaintiff’s grievances were directed. In addition there were two stewardesses on the Board, also employees of United, who were members of the union. As pointed out, plaintiff was not a member of the union. Cf. Arnold v. United Air Lines, Inc., 7 Cir., 296 F.2d 191, 195 (1961). . Vaoa relies upon the doctrine developed in Steele v. Louisville & N. R. Co., 323 U.S. 192, 65 S.Ct. 226, 89 L.Ed. 173 (1944), which, in turn, involved the Railway Labor Act. . § 1331(a) provides: The district courts shall have original jurisdiction of all civil actions wherein the matter in controversy * * * arises under the Constitution, laws * * * of the United States. § 1337 provides said courts * * * shall have original jurisdiction of any civil action or proceeding arising under any Act of Congress regulating commerce or protecting trade and commerce against restraints and monopolies. . Scholarly treatises supporting this conclusion appear in Exhaustion of Remedies and Wrongful Discharge Under the Railway Labor Act, 25 U.Chi.L.Rev. 686, 688 (1958) ; Jaffe, The Exhaustion of Administrative Remedies, 12 Buffalo L. Rev. 327, 329 (1963).
CASELAW
Arcesius (architect) Arcesius or (T)arcesius was an Ionian architect who worked in Ionia during the 3rd century BCE. He is mentioned in a passage of Vitruvius and it is considered that the T of his name was assimilated in the relevant manuscript from the previous word negavit. He allegedly worked in Tralles and was assigned the Temple of Asclepius there. Vitruvius (vi. 3. 1) mentions him in association with the Ionian architects Pythios and Hermogenes for writing treatises criticizing the Doric order for being "faulty" and "inharmonious." He is probably the same as Argelius, a name similar in the relative list given by Vitruvius of Ionian architects who wrote treatises on various architectural topics (Vitruvius, vii praef. 12).
WIKI
It was couture at its most cozy, yet executed with all the bravado and technique one expects from Chanel. Just One Look | Chanel The tag line for Karl Lagerfeld’s haute couture show for Chanel promised “new vintage” — or, collectible clothes worn with the offhand elegance of gorgeous, gamine flea marketeers. The lines were long and fluid, the proportions roomy, the textures snugly; the models wore crystal snoods and fingerless, trumpet-shaped gloves. It was couture at its most cozy, yet executed with all the how-do-they-do-that bravado and technique one expects from Chanel. Here on Jamie Bochert: a capacious jacket, liberally sprinkled with stones and sequins, over a divine 1930s dress of pale blush ribbons.
NEWS-MULTISOURCE
maanantaikappale Etymology * referring to the common belief that products made on Monday are of lower than average quality Noun * 1) something made on Monday, dud, lemon defective or inadequate item, especially in comparison with other basically similar products
WIKI
Page:The Folk-Lore Journal Volume 5 1887.djvu/192 184 After this adventure, she took the advice of another neighbour, who told her the best way to get rid of the spriggan and have her own child returned was "to put the small body upon the ashes' pile, and beat it well with a broom; then lay it naked under a church stile I there leave it and keep out of sight and hearing till the turn of night; when nine times out of ten, the thing will be taken away and the stolen child returned." This was finally done, all the women of the village after it had been put upon a convenient pile "belabouring it with their brooms," upon which it naturally set up a frightful roar. After dark it was laid under the stile, and there next morning the woman "found her own 'dear cheeld' sleeping on some dry straw" most beautifully clean and wrapped in a piece of chintz. "Jenny nursed her recovered child with great care, but there was always something queer about it, as there always is about one that has been in the fairies power—if only for a few days." There are many other tales of changelings, but they resemble each other so much that they are not worth relating. In the one above quoted from Mr. Bottrell he gives a third charm for getting a child restored as follows, "Make by night a smoky fire, with green ferns and dry. When the chimney and house are full of smoke as one can bear, throw the changeling on the hearthstone; go out of the house, turn three times round; when one enters the right child will be restored." Spriggans too guard the vast treasures that are supposed to be buried beneath our immense cams and in our cliff castles. No matter if the work be carried on by night or by day, they are sure to punish the rash person who ventures to dig in hopes of securing them. When he has got some way down, he finds himself surrounded by hundreds of ugly beings, in some cases almost as tall as he, who scare the unhappy man until he loses all control over himself, throws down his tools, and rushes off as fast as he can possibly go. The fright often makes him so ill that he has to lie for days in bed. Should he ever »ummon up courage to return to the spot, he will find the pit refilled, and no traces to show that the ground had been disturbed. Knockers (pronounced knackers) are mine fairies, popularly supposed to be (as related elsewhere) the souls of the Jews who crucified Christ, sent by the Romans to work as slaves in the tin
WIKI
Verrucidae Verrucidae is a family of asymmetrical sessile barnacles in the order Verrucomorpha. There are about 14 genera and more than 90 described species in Verrucidae. Genera These genera belong to the family Verrucidae: * Altiverruca Pilsbry, 1916 * Brochiverruca Zevina, 1993 * Cameraverruca Pilsbry, 1916 * Costatoverruca Young, 1998 * Cristallinaverruca Young, 2002 * Gibbosaverruca Young, 2002 * Globuloverruca Young, 2004 * Metaverruca Pilsbry, 1916 * Newmaniverruca Young, 1998 * Rostratoverruca Broch, 1922 * Spongoverruca Zevina, 1987 * Verruca Schumacher, 1817 * † Priscoverruca Gale, 2014 * † Youngiverruca Gale, 2014
WIKI
Regional distribution of serotonergic receptors: A systems neuroscience perspective on the downstream effects of the multimodal-acting antidepressant vortioxetine on excitatory and inhibitory neurotransmission Alan L. Pehrson, Theepica Jeyarajah, Connie Sanchez Research output: Contribution to journalReview articlepeer-review 16 Scopus citations Abstract Previous work from this laboratory hypothesized that the multimodal antidepressant vortioxetine enhances cognitive function through a complex mechanism, using serotonergic (5-hydroxytryptamine, 5-HT) receptor actions to modulate gamma-butyric acid (GABA) and glutamate neurotransmission in key brain regions like the prefrontal cortex (PFC) and hippocampus. However, serotonergic receptors have circumscribed expression patterns, and therefore vortioxetine's effects on GABA and glutamate neurotransmission will probably be regionally selective. In this article, we attempt to develop a conceptual framework in which the effects of 5-HT, selective serotonin reuptake inhibitors (SSRIs), and vortioxetine on GABA and glutamate neurotransmission can be understood in the PFC and striatum - 2 regions with roles in cognition and substantially different 5-HT receptor expression patterns. Thus, we review the anatomy of the neuronal microcircuitry in the PFC and striatum, anatomical data on 5-HT receptor expression within these microcircuits, and electrophysiological evidence on the effects of 5-HT on the behavior of each cell type. This analysis suggests that 5-HT and SSRIs will have markedly different effects within the PFC, where they will induce mixed effects on GABA and glutamate neurotransmission, compared to the striatum, where they will enhance GABAergic interneuron activity and drive down the activity of medium spiny neurons. Vortioxetine is expected to reduce GABAergic interneuron activity in the PFC and concomitantly increase cortical pyramidal neuron firing. However in the striatum, vortioxetine is expected to increase activity at GABAergic interneurons and have mixed excitatory and inhibitory effects in medium spiny neurons. Thus the conceptual framework developed here suggests that vortioxetine will have regionally selective effects on GABA and glutamate neurotransmission. Original languageEnglish Pages (from-to)162-183 Number of pages22 JournalCNS Spectrums Volume21 Issue number2 DOIs StatePublished - 1 Apr 2016 Keywords • 5-HT receptor • GABA • Lu AA21004 • glutamate • vortioxetine Fingerprint Dive into the research topics of 'Regional distribution of serotonergic receptors: A systems neuroscience perspective on the downstream effects of the multimodal-acting antidepressant vortioxetine on excitatory and inhibitory neurotransmission'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
super light Noun * 1) An aircraft classification above and below. * 2) An aircraft fitting that class * 1) An aircraft fitting that class Coordinate terms
WIKI
Wednesday, July 9, 2008 Stemming, Part 2: Functional Programming In the last posting, we looked at what the Porter Stemmer will need to do, and we glanced at functional programming. Now, we’ll consider what information the stemmer will need to keep processing a word, and we’ll start examining what data structures Clojure provides to keep track of that information. What We Need to Keep Track Of The primary data that the stemmer needs to track is the word itself. It strips characters off the end of the word, and occasionally it adds a character back on or changes the last character. Also, the stemmer needs an index into the word. Sometimes, one function will analyze the word and mark a location. A later function may then change the word based upon that index. Of course, to keep the functions from getting too complicated, the stemmer should package those two data—the word and the index—together. Clojure Data Structures So what does Clojure give us to manage this data? I’ll list a few of Clojure’s data structures here. Also, since in a functional language a data type is defined by the functions that operate on it, we’ll look at them too. And as we go along, we’ll try everything out. Lists The most basic data type is almost any lisp is the list. It is a sequence of elements that is optimized for adding items onto and remove items from the beginning of the list. List literals have parentheses around the items. Of course, this also looks like a function call, so we have to quote the list to indicate that we want it treated as a list: user=> '(1 2 3) (1 2 3) Lists can also be constructed using list: user=> (list 1 2 3) (1 2 3) Finally, you can convert a list or vector to a list using the seq function. (The thing in square brackets below is a vector. See the next section for details.) user=> (seq [1 2 3]) (1 2 3) Vectors Vectors are conceptually similar to lists, except that they make it easy to add items to or remove items from the end of the vector. Vector literals also look like lists, except they use square brackets ([ and ]). Since these can’t be confused with function calls, you don’t need to quote them. You can also create a vector using the vector function. And finally, you can convert a list to a vector using vec: user=> [1 2 3 4] [1 2 3 4] user=> (vector 1 2 3 4) [1 2 3 4] user=> (vec '(1 2 3 4)) [1 2 3 4] You can also get part of a vector using subvec. It takes one or two indexes into the vector. If called with one index, it returns everything from that index to the end of the vector; if called with two, it returns everything from the starting index up to, but not including, the second. The index for the first item is always zero, because that’s the way computers do things. (I could explain, but trust me: you don’t want to know.) user=> (subvec [1 2 3 4 5] 2) [3 4 5] user=> (subvec [1 2 3 4 5] 2 4) [3 4] Sequences Both lists and vectors (as well as some other things) are sequences. Sequence functions take any type of sequence and operate on it. Some of these functions always return lists; some of them return the same type that was passed in to it; some of the functions return information about the sequence or about what it contains. Here are some of the more important sequence functions: count returns the number of items in the sequence. user=> (count [1 2 3]) 3 nth returns an element from the sequence. Remember that the index of the first item is zero. user=> (nth [1 2 3] 1) 2 pop returns a sequence without one item. In lists, this is the first item; in vectors, it is the last. user=> (pop '(1 2 3)) (2 3) user=> (pop [1 2 3]) [1 2] peek returns one item from the sequence. In lists, this is the first item; in vectors, it is the last. user=> (peek '(1 2 3)) 1 user=> (peek [1 2 3]) 3 take returns the first n items in the sequence as a list. user=> (take 2 [1 2 3 4 5]) (1 2) conj returns the sequence with one item added to it. In lists, the item is added to the beginning of the list; in vectors, it is added to the end. user=> (conj '(1 2 3) 4) (4 1 2 3) user=> (conj [1 2 3] 4) [1 2 3 4] into takes two sequences. It returns the results of calling conj on the first sequence with each item in the second sequence. user=> (into '(1 2 3) [4 5 6]) (6 5 4 1 2 3) user=> (into [1 2 3] '(4 5 6)) [1 2 3 4 5 6] You can see that different types of sequences share functions; that the functions do conceptually similar things; but that what exactly happens for each function- and sequence-type-combination may differ. Also, note that vectors make it easy to add and remove items from the end of the list. Because of this, are ideal for storing the word while the stemmer processes it. Mappings A mapping is the same as a hash table in Perl or a dictionary in Python. Actually, just as Clojure has different types of sequences, it also has a couple of different types of mappings. Hash maps are the most common, and that is the one I’ll be referring to below. Literals for hash maps use curly braces ({ and }), and they don’t require any punctuation between keys and values or between key/value pairs. You can include a comma, but that’s whitespace and is just ignored. Notice that when Clojure prints the mapping, it adds the commas, because they make it easier to read. We’ll use them too for that reason. user=> {"a" 1 "the" 2 "but" 3} {"a" 1, "but" 3, "the" 2} hash-map also creates a mapping using a function. user=> (hash-map "a" 1 "the" 2 "but" 3) {"a" 1, "but" 3, "the" 2} assoc associates a key with a value in the mapping. user=> (assoc {"a" 1, "the" 2, "but" 3} "and" 4) {"a" 1, "but" 3, "the" 2, "and" 4} dissoc removes a key from the mapping. user=> (dissoc {"a" 1, "the" 2, "but" 3} "but") {"a" 1, "the" 2} count, like with sequences, returns how many key/value pairs are in the hash map. user=> (count {"a" 1, "the" 2, "but" 3}) 3 For the next posting, I’ll introduce some more data types, and we’ll apply them to the stemmer. 4 comments: Anonymous said... in "Vectors are conceptually similar to lists, except that they make it easy to add items to or remove items from the beginning of the vector." did you intend to say end (instead of beginning)"? ..jim Anonymous said... in "Vectors are conceptually similar to lists, except that they make it easy to add items to or remove items from the beginning of the vector.", did you intend 'end' (instead of 'beginning') ..jim Eric Rochester said... I sure did. Thanks. Eric Emeka said... This comment has been removed by the author.  
ESSENTIALAI-STEM
Ruby TAYLOR, Appellant v. Hilda L. SOLIS, Secretary of Labor, et al., Appellees. No. 07-5401. United States Court of Appeals, District of Columbia Circuit. Argued Nov. 14, 2008. Decided July 10, 2009. Richard L. Swick argued the cause for appellant. On the briefs were David H. Shapiro and Alana M. Hecht. Kenneth Adebonojo, Assistant U.S. Attorney, argued the cause for appellees. With him on the brief were Jeffrey A. Taylor, U.S. Attorney, R. Craig Lawrence, Assistant U.S. Attorney, and Judith R. Starr, Counsel, Pension Benefit Guaranty Corporation. Before: GINSBURG, HENDERSON and ROGERS, Circuit Judges. Opinion for the Court filed by Circuit Judge GINSBURG. Dissenting opinion filed by Circuit Judge ROGERS. GINSBURG, Circuit Judge: Ruby Taylor, an African-American woman, sued her employer, the Pension Benefit Guaranty Corporation, under Title VII of the Civil Rights Act of 1964, claiming her supervisors sexually harassed her to the point of creating a hostile work environment and, when she complained, retaliated against her. The district court granted summary judgment to the Corporation because it concluded, as a matter of law, (1) the employer had an affirmative defense to Taylor’s claim of sexual harassment and, (2) with regard to retaliation, Taylor (a) had not offered a prima facie showing that her protected activity caused most of the alleged acts of retaliation, (b) had failed to show one such act was a materially adverse action, and (c) had failed to rebut the Corporation’s nondiseriminatory explanation of another. We affirm, holding as a matter of law that the PBGC has an affirmative defense to the claim of sexual harassment and that Taylor has failed to meet her burden regarding the claim of retaliation. I. Background We accept as true the evidence offered by, and draw all reasonable inferences in favor of, Taylor, who at all relevant times was an auditor in the Pre-Termination Process Division (PPD) of the PBGC. Taylor’s direct supervisor was Jonathan Henkel, who oversaw all the auditors in the PPD. Robert Bacon oversaw all the financial analysts in the PPD. Bacon and Henkel reported to Robert Joy, the manager of the PPD, who reported to Bennie Hagans, Director of the Insurance Operations Department (IOD). The Corporation’s policy against sexual harassment directs employees who believe they have been sexually harassed “immediately [to] contact an EEO Counselor or the EEO Manager,” who is to investigate the charge of harassment and, if warranted, implement an appropriate remedy. The policy also states the “PBGC’s managers and supervisors have a particular responsibility for providing a work environment free of ... sexual harassment.” Taylor alleges her supervisors created a sexually charged atmosphere at the PPD. Henkel, Joy, and Hagans occasionally flirted with female employees, but particularly offensive to Taylor was a summer 2001 scavenger hunt, undertaken as a “team building exercise,” during which, in order to earn points for a “wow,” a female coworker produced a yellow brassiere from her gym bag, and a male coworker asked Taylor, who had red hair, if her hair was red “all over.” Bacon and Henkel awarded Taylor’s team bonus points for what Henkel referred to as this “embarrassing moment.” According to Taylor, Bacon began in 2001 to engage in frequent acts of harassment. Although Taylor and Bacon had been running partners for nearly a year, Taylor stopped running with him in the summer of 2001 because she felt he had overstepped the bounds of a professional relationship. In October Bacon told Taylor he could persuade Henkel to give her a good performance evaluation. When Henkel did so, Bacon asked her, “what are you going to do for me?” Around the same time, Taylor posted on her office door an October 2, 2001 e-mail detailing the Corporation’s policy concerning sexual harassment. In or before November Bacon began intimating Taylor was not in love with her fiance, saying he could beat him up. Taylor confided in her friend, David Smith, a team leader in the IOD, that she felt harassed; he did not advise her to go to the EEO Counselor, nor did he do so himself. Also in 2001 Taylor confronted Bacon and threatened to report him if he did not stop sexually harassing her. Bacon said that because he was a “nice guy,” everyone “would think ... [she was] the problem.” On April 3, 2002 Bacon saw Taylor in the hall and, referring to her uncovered arms, said, “I see you flaunting that black.” The next day, when Bacon entered her office, Taylor kept her back to him; Bacon asked repeatedly, “what did I tell you about turning your back to me when I’m talking to you,” which Taylor ascribed to a desire on his part to “see my legs or chest.” A day later Bacon, finding Taylor alone in the copy room, walked toward her with his hands raised as if, in her view, he was preparing to choke her. When she protested, he did not touch her, but he called her “baby” and said he would touch her if he wanted. Taylor reported Bacon’s conduct on April 9, 2002. She first filed a complaint with the PBGC’s internal investigator, who did not find a violation of the Corporation’s policy. When her complaint to the EEO office had proved unavailing, she brought this suit in the district court on August 19, 2003. Taylor alleges her supervisors retaliated against her in response to her complaint and her lawsuit. In 2002 Hagans criticized her “negative behaviors.” Joy and Henkel, who had evaluated her job performance as “Outstanding” in 2001, rated her work “Excellent” in 2002 and “Fully Effective” in 2003, and in the third quarter of 2003 required her to submit biweekly reports of her progress on pending cases. In November 2003, after Taylor had submitted a confusing request for leave, Henkel, at the direction of the Human Resources Department, listed Taylor as AWOL. (The listing was later rescinded and Taylor received back pay.) Finally, in 2004 Joy refused to recommend Taylor for a new position the PBGC considered creating but ultimately did not create. Taylor filed a second EEO complaint on February 5, 2004 and a second lawsuit on April 22, 2005, claiming continued harassment and retaliation. The district court consolidated Taylor’s lawsuits and granted the PBGC’s motion for summary judgment. See Taylor v. Chao, 516 F.Supp.2d 128, 130 (2007). With respect to Taylor’s claim of sexual harassment, the court held the Corporation’s anti-harassment policy and complaint procedure together with Taylor’s delay in reporting Bacon provided, as a matter of law, an affirmative defense. Id. at 134-35. In the alternative, the court held Taylor had not shown a reasonable jury could find her supervisors’ conduct created a hostile environment. Id. at 135-37. As for retaliation, the court concluded, with respect to most of Taylor’s claims, she had not produced prima facie evidence showing her filing the April 2002 complaint caused her supervisors to retaliate against her. Id. at 138. The court also held Hagans’s criticism of Taylor’s “negative behaviors” was not a “materially adverse act.” Id. at 137-38. Finally, the court held Taylor had made out a prima facie case of retaliation with respect to the performance evaluation she received in 2002 but had failed to rebut the PBGC’s legitimate explanation for that evaluation. Id. at 138-39. II. Analysis We review the judgment of the district court de novo. See Venetian Casino Resort, L.L.C. v. EEOC, 530 F.3d 925, 929 (D.C.Cir.2008). We begin with Taylor’s claim of sexual harassment and then turn to her claim of retaliation. A. Sexual Harassment Title VII provides: “All personnel actions Affecting employees ... in executive agencies ... shall be made free from any discrimination based on ... sex,” 42 U.S.C. § 2000e-16(a), and thus makes it unlawful for a supervisor in a covered federal agency to create a hostile environment based upon an employee’s sex. See Bundy v. Jackson, 641 F.2d 934, 944-46 (D.C.Cir.1981). Sexual harassment creates a hostile environment only if it is so “severe or pervasive [as] to alter the conditions of [the victim’s] employment and create an abusive working environment.” Meritor Sav. Bank v. Vinson, 477 U.S. 57, 67, 106 S.Ct. 2399, 91 L.Ed.2d 49 (1986). The employer has an affirmative defense to a hostile environment claim if (1) the employer “exercised reasonable care to prevent and correct promptly any sexually harassing behavior” and (2) “the plaintiff employee unreasonably failed to take advantage of any preventive or corrective opportunities provided by the employer or to avoid harm otherwise.” Faragher v. City of Boca Raton, 524 U.S. 775, 807, 118 S.Ct. 2275, 141 L.Ed.2d 662 (1998); see also Burlington Indus, v. Ellerth, 524 U.S. 742, 765, 118 S.Ct. 2257, 141 L.Ed.2d 633 (1998). The PBGC argues Taylor was not subjected to a hostile work environment and, in any event, the district court correctly held the employer had an affirmative defense because Taylor unreasonably failed to use its complaint procedure. See Ellerth, 524 U.S. at 765, 118 S.Ct. 2257 (“any unreasonable failure to use any complaint procedure provided by the employer ... will normally suffice to satisfy the employer’s burden”). Taylor does not challenge the adequacy of the Corporation’s procedure. Therefore, the PBGC may avoid liability if it shows “that, as a matter of law, a reasonable person in [Taylor’s] place would have come forward early enough to prevent [the] harassment from becoming ‘severe or pervasive.’ ” Greene v. Dalton, 164 F.3d 671, 675 (D.C.Cir.1999). We agree with the district court and the PBGC that a reasonable employee in Taylor’s position would have come forward in October or November 2001, when Taylor instead posted the PBGC’s sexual harassment policy on her office door and told her Mend Smith that Bacon had been sexually harassing her. A reasonable employee who believes and tells others she is being sexually harassed would report it if she knows — as Taylor should have and apparently did know- — -a complaint procedure has been established for that purpose. When Taylor finally did report Bacon’s conduct in April 2002, the PBGC duly investigated and, even though it did not find harassment, see Baskerville v. Culligan Int’l Co., 50 F.3d 428, 430 (7th Cir.1995) (occasional vulgar banter not sexual harassment), the sort of conduct about which Taylor had complained did not recur. Taylor argues she effectively notified the PBGC’s management of her complaint in the fall of 2001 when she confided in her friend Smith. Taylor, however, could not reasonably have believed talking to Smith was a substitute for using the agency’s complaint procedure. Although Smith, as a member of management, may have had, as the policy states, a “particular responsibility” to address workplace discrimination, he was neither Bacon’s supervisor nor an EEO officer. The policy expressly required Taylor, if she believed she was being harassed, “immediately [to] contact an EEO Counselor or the EEO Manager.” Having ignored the complaint procedure, Taylor cannot now complain that Smith should have filed a formal complaint on her behalf or himself reprimanded Bacon, who did not report to him. Taylor also argues her report to Smith was sufficient in the light of Bundy, in which we held an employer vicariously liable for its supervisors’ harassment of a subordinate. In Bundy, however, the employer, unlike the PBGC, had not established a sexual harassment policy with a complaint procedure. See 641 F.2d at 943, 947-48. Taylor argues in the alternative that her delay in filing a complaint, from the fall of 2001 to April 2002, was not unreasonable. But, as the PBGC points out, an employee has a “prompt reporting duty under the prophylactic rules” approved in Faragher, and five or six months is “anything but prompt.” Baldwin v. Blue Cross/Blue Shield of Ala., 480 F.3d 1287, 1306-07 (11th Cir.2007) (three months and two weeks held an unreasonable delay). In reply Taylor notes a failure to complain may be reasonable in unusual circumstances, such as a “genuine [and] reasonable .... fear of retaliation.” Adams v. O’Reilly Auto., Inc., 538 F.3d 926, 932-33 (8th Cir.2008) (“fear of retaliation” generally not an excuse for failing to report sexual harassment); see also Roebuck v. Washington, 408 F.3d 790, 795 (D.C.Cir.2005) (“fear and uncertainty” about scope of employer’s policy may in certain circumstances make employee’s “delay in complaining reasonable”). Taylor suggests various “factors” show her delay was reasonable but only one warrants mention. According to Taylor’s first EEO complaint, Bacon told her in 2001 “no one would believe” her if she reported him; “they would think ... [she was] the problem.” A reasonable jury could not find Taylor was reasonably deterred by Bacon’s statement. Bacon did not threaten Taylor with an adverse employment action and, indeed, he could not have done because he was not her supervisor and did not have the authority to evaluate her performance or to take any action against her. In fact, Bacon had no leverage at all with which to intimidate Taylor — apart from his assertion that those in authority would believe him and not her. And that is not enough to establish a credible fear of retaliation. See Barrett v. Applied Radiant Energy Corp., 240 F.3d 262, 267 (4th Cir.2001) (rejecting as “speculative” and “generalized” employee’s fear of retaliation based upon alleged friendship between president of corporation and alleged harasser, her supervisor); id. at 268 (rejecting view that “friendships should relieve an employee of her reporting obligation and effectively impose automatic liability on the employer”). Because “failure [would have been] the only cost” to Taylor of reporting Bacon in the fall of 2001, see Reed v. MBNA Mktg. Sys., 333 F.3d 27, 36 (1st Cir.2003); see also Walton v. Johnson & Johnson Servs., 347 F.3d 1272, 1290-91 (11th Cir.2003) (absent credible threat of retaliation, subjective fear of reprisal not an excuse for failure to report), no reasonable jury could find Taylor reasonably waited five or six months before reporting what she believed was sexual harassment. We therefore affirm the district court’s judgment with respect to Taylor’s first cause of action. B. Retaliation Under Title VII, it is unlawful for an employer “to discriminate against any of [its] employees ... because [she] has made a charge ... or participated in any manner in an investigation” of discrimination. 42 U.S.C. § 2000e-3(a); see Rochon v. Gonzales, 438 F.3d 1211, 1219 (D.C.Cir.2006) (“general ban on retaliation in § 2000e-3(a)” applies to federal employers through § 2000e-16). In order to prevail upon a claim of unlawful retaliation, an employee must show “she engaged in protected activity, as a consequence of which her employer took a materially adverse action against her.” Weber v. Battista, 494 F.3d 179, 184 (D.C.Cir.2007). A materially adverse action is one that “could well dissuade a reasonable worker from making or supporting a charge of discrimination.” Burlington N. & Santa Fe Ry. Co. v. White, 548 U.S. 53, 57, 126 S.Ct. 2405, 165 L.Ed.2d 345 (2006); see Rochon, 438 F.3d at 1219. The district court held Taylor had failed to show that her filing the April 2002 complaint had been the cause of four of the reprisals she alleged, had failed to show material adversity with respect to one, and had failed to rebut the PBGC’s nondiscriminatory explanation of another. See Taylor, 516 F.Supp.2d at 138-39. We affirm the district court on the ground that five of the six alleged reprisals were not materially adverse actions and Taylor cannot show the sixth was retaliatory. First. Hagans criticized Taylor for exhibiting “negative behaviors.” The district court held, and we agree, that Hagans’s criticism was not a materially adverse action. See id. at 138; see also Burlington Northern, 548 U.S. at 68, 126 S.Ct. 2405 (“petty slights [and] minor annoyances” would not deter reasonable employee from making charge of discrimination). Second. Henkel and Joy slowed the processing of Taylor’s cases after she filed her complaint and Joy and Henkel required her (as they had some other auditors) to submit biweekly reports on the status of her work. Such minor “inconveniences and alteration of job responsibilities [do] not rise to the level of adverse action” necessary to support a claim. Stewart v. Evans, 275 F.3d 1126, 1135 (D.C.Cir.2002); see Wiley, 511 F.3d at 161 (change in workload a trivial harm); cf. Holcomb v. Powell, 433 F.3d 889, 897 (D.C.Cir.2006) (“We have consistently declined to serve as a ‘super-personnel department’ ”); accord Dale v. Chicago Tribune Co., 797 F.2d 458, 464 (7th Cir.1986). Third. Joy did not recommend Taylor for a position the PBGC was considering creating but ultimately did not create. Although a refusal to promote is a materially adverse action, see Stewart v. Ashcroft, 352 F.3d 422, 427 (D.C.Cir.2003), because there was no position to which she might have been promoted, Taylor was not denied a tangible opportunity to advance her career. Cf. Baloch v. Kempthorne, 550 F.3d 1191, 1199 (D.C.Cir.2008) (“evaluations and written warnings were not adverse actions because none had ‘tangible job consequences’ ” (construing Whittaker v. N. Ill. Univ., 424 F.3d 640, 648 (7th Cir.2005))); Brown v. Brody, 199 F.3d 446, 457 (D.C.Cir.1999) (plaintiff must show “reasonable trier of fact could conclude [she] has suffered objectively tangible harm”). In any event, Joy’s non-recommendation for a hypothetical position would not have dissuaded a reasonable employee from coming forward. Fourth and fifth. Taylor’s supervisors twice lowered her performance evaluation — from “Outstanding” in 2001, to “Excellent” in 2002, and to “Fully Effective” in 2003. In order for a performance evaluation to be materially adverse, it must affect the employee’s “position, grade level, salary, or promotion opportunities.” See Baloch, 550 F.3d at 1199. Taylor’s bare, conclusory allegation that she was denied promotional and bonus opportunities “[a]s a result of PBGC’s unlawful conduct in violating Title VIPs prohibition against retaliation” does not discharge her burden to show the evaluations were “ed to financial harms.” Id. Sixth. Taylor was temporarily listed as AWOL in the first or second week of November 2003. Although the PBGC ultimately rescinded the listing and gave Taylor her lost pay, the temporary deprivation of wages counts as a materially adverse action. See Greer v. Paulson, 505 F.3d 1306, 1317 (D.C.Cir.2007) (“diminution in pay or benefits can [be adverse] even when the employer later provides back pay”). The Corporation offered a nondiseriminatory reason for the challenged action: The Human Resources Department directed Henkel to list Taylor as AWOL because the leave slip she submitted appeared to indicate Taylor had not obtained Henkel’s prior approval, as all auditors were required to do. After Taylor had returned to work and the confusion was eventually dispelled, the AWOL charge was rescinded and Taylor’s pay restored. We therefore move to the question of retaliation vel non, see Jones, 557 F.3d at 678, which in this instance reduces to whether a reasonable jury could find the Corporation’s “proffered explanation is unworthy of credence,” Tex. Dep’t of Cmty. Affairs v. Burdine, 450 U.S. 248, 256, 101 S.Ct. 1089, 67 L.Ed.2d 207 (1981). Taylor rebuts the PBGC’s explanation by asserting she contacted Henkel regarding her request for annual leave before she left the leave slip in his in-box. Although Henkel denies having given Taylor oral approval, we assume a reasonable jury could credit Taylor’s account. Her account, however, does nothing to undermine the PBGC’s explanation because in her opposition to the motion for summary judgment she acknowledged she erred in completing the request form by “mistakenly checking] the ‘sick leave’ box” but entering the dates in the area for annual leave. Henkel therefore asked Human Resources for direction and merely implemented their decision. Once the confusion, which Taylor herself had created, was cleared up, her record was corrected and her pay was restored. Therefore, no reasonable jury could infer the PBGC retaliated against Taylor when it treated her as having taken leave without permission. See Greer, 505 F.3d at 1319-20. Taylor’s remaining arguments on this score are even further off the mark, but two do deserve mention. First, on appeal Taylor newly points out that the PBGC placed her on AWOL in November 2003, two and one-half months after she filed her first lawsuit; hence, she argues, “there is sufficient temporal proximity for a reasonable jury to find” the Corporation was retaliating against her. On the contrary, an inference of retaliatory motive based upon the “mere proximity” in time between Taylor’s filing her first suit and the AWOL listing two and one-half months later would be untenable on the record here. See Woodruff v. Peters, 482 F.3d 521, 530 (D.C.Cir.2007) (“positive evidence beyond mere proximity is required to defeat the presumption that the proffered explanations are genuine”); Bilow v. Much Shelist Freed Denenberg Ament & Rubenstein, P.C., 277 F.3d 882, 895 (7th Cir.2001) (rejecting argument that “two-month period between [protected activity] and [employee’s] discharge establishes a ‘causal connection’ between the two events” when employee had not pointed to other circumstances suggesting events were related); see also Clark County Sch. Dist. v. Breeden, 532 U.S. 268, 273, 121 S.Ct. 1508, 149 L.Ed.2d 509 (2001) (stating, “to establish a prima facie case ... the temporal proximity must be ‘very close,’ ” and citing with approval case holding three month interval is, as a matter of law, not close enough); Kipp v. Mo. Highway & Transp. Comm’n, 280 F.3d 893, 897 (8th Cir.2002) (holding employee failed to make out “causal link” required for prima facie case of retaliation because two months between protected activity and challenged action could not, as a matter of law, “justify a finding in [her] favor”). Second, Taylor argues the jury could infer either Henkel or the Human Resources Department or both retaliated against her because on more than one occasion after she filed her EEO complaint Henkel criticized her work and yelled at her and because her coworkers somehow learned she had been listed as AWOL. These incidents do not amount to the “pattern of antagonism” required for a reasonable jury to infer Henkel, much less Human Resources, was retaliating against Taylor. Cf. Woodson v. Scott Paper Co., 109 F.3d 913, 920-21 (3d Cir.1997) (“plaintiff can establish a link between his or her protected behavior and [the alleged reprisal] if the employer engaged in a pattern of antagonism in the intervening period”). The petty slights she describes, which would not qualify as adverse actions, see Burlington Northern, 548 U.S. at 68, 126 S.Ct. 2405, likewise do not suffice to make out a case of retaliation, see id. (“Title VII ... does not set forth ‘a general civility code for the American workplace’ ” (quoting Oncale v. Sundowner Offshore Servs., 523 U.S. 75, 80, 118 S.Ct. 998, 140 L.Ed.2d 201 (1998))). In sum, the PBGC was entitled to summary judgment because Taylor has not provided a reasonable jury any basis upon which to disbelieve the PBGC’s explanation of the AWOL incident. III. Conclusion For the foregoing reasons, the judgment of the district court is Affirmed. ROGERS, Circuit Judge, dissenting. Because a reasonable jury could find in appellant Ruby Taylor’s favor, I would reverse the grant of summary judgment. This is clear but for the court’s failure in three instances to apply the correct legal standards. I. Upon review of the grant of summary judgment, it is not the role of the court to evaluate and weigh the proffered evidence. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). Instead, this court must view the evidence before the district court in the light most favorable to the non-moving party — here, Taylor — and must accord her the benefit of all reasonable inferences. Id. at 255, 106 S.Ct. 2505; Salazar v. Washington Metro. Transit Auth., 401 F.3d 504, 507 (D.C.Cir.2005). Yet the court has done the opposite, presenting the evidence in the light most unfavorable to Taylor and denying her the benefit of the reasonable inferences to which she is entitled. How else could the court conclude, for instance, that Taylor was the cause of the temporary denial of a week’s pay when she proffered evidence that she had cleared her leave from work with her supervisor in advance, that she had successfully requested leave in a similar fashion on prior occasions, and that her supervisor remembered approving the leave request? This example is only one of several that demonstrates the manner in which applying the wrong standard of review infects the court’s analysis. Applying the correct standard of review, the evidence shows that Taylor had been an auditor for approximately ten years and had received an outstanding performance evaluation in 2001. In a nutshell, she proffered evidence that she had been subject to casual sexual harassment by Robert Bacon beginning in the fall of 2001, that she was not fully informed of her options under her employer’s sexual harassment procedures, that her harasser used his supervisory authority to intimidate her by suggesting that if she formally complained about his harassment she would be punished and not him, that she complained to a member of management, David Smith, who did not recommend she report the harassment to anyone else, and that when the harassment intensified in the winter of 2001-02 to the point of becoming physically threatening, she filed a formal complaint in April 2002, as her employer’s policy contemplated. Her fear that her supervisors would retaliate if she filed a formal complaint was realized soon thereafter. For example, Robert Joy, the manager of the Pre-termination Process Division in which Taylor worked, refused to recommend her for a job with another supervisor and told her harasser she had lied. Bennie Hagans, the head of the Insurance Operations Department and Joy’s superi- or, warned her about her “negative behaviors.” Her immediate supervisor, Jonathan Henkel, required for the first time that she submit biweekly reports of her progress on pending cases, which since she filed her complaint had consisted of less desirable, low priority cases. Her work was reviewed more slowly, even though her performance evaluations turned on productivity, with the result that she was downgraded from “outstanding” to “excellent” in 2002 and further downgraded to “fully effective” in 2003. Then, a mere two and one half months after she filed a complaint in the district court, she was denied a week’s pay for an unknown period of time when Henkel placed on absent without leave (“AWOL”) status, even though she had obtained leave permission from him in advance and he recalled approving it. Taylor filed a second complaint in February 2004. Viewing this evidence in the aggregate and according Taylor favorable inferences, a reasonable jury could find she proved hostile environment sex discrimination and retaliation. For purposes of surviving summary judgment, she has overcome the two hurdles that the court identifies. II. Delay in reporting sexual harassment. On the question whether Taylor’s sexual harassment claims are barred because of her delay in filing a formal complaint, this court held in Greene v. Dalton, 164 F.3d 671 (D.C.Cir.1999), that an employer is not entitled to summary judgment under the second element of a Faragher/Ellerth affirmative defense unless it shows that, “as a matter of law, a reasonable person in [the employee’s] place would have come forward early enough to prevent [the] harassment from becoming’ severe or pervasive,’ ” id. at 675. This is an objective standard, and a genuine issue of material fact remains as to whether a reasonable person in Taylor’s position would have reported any occurrences prior to the April 5, 2002 copy room incident. Contrary to binding precedent, however, the court converts this objective standard into one that is subjective, Op. at 1319 and so errs. See LaShawn A. v. Barry, 87 F.3d 1389, 1395 (D.C.Cir.1996) (en banc). Roebuck v. Washington, 408 F.3d 790 (D.C.Cir.2005), is instructive in demonstrating there is a material issue of disputed fact. There, Linda Roebuck, an administrative assistant in the D.C. Department of Corrections, alleged her supervisor Mr. Corbett had sexually harassed her, id. at 791. Roebuck presented evidence that Corbett had sexually harassed her “off and on,” id., for almost two years beginning in 1995, id. When he was promoted to Deputy Warden in August 1997, he requested Roebuck’s transfer to his office and “resumed harassing her.” Id. During October 1997 through January of the following year, his harassment intensified. For example, he left a note reading “Sexy” on a stack of her work assignments, made suggestive hand gestures, and several times tried to kiss her. Id. at 791-92. The final straw came on January 16, when Corbett called Roebuck into his office, where he had “bedroom music” playing, and simply stared at her, saying nothing. Id. at 792. When Roebuck asked what he wanted, he just kept staring. Id. Roebuck left, but Corbett immediately called her back and resumed his silent staring. Id. On January 21, Roebuck formally complained to a lieutenant that Corbett was sexually harassing her. Id. The jury rejected her claims against her employer, finding that two years was an unreasonable amount of time to wait to file a complaint. Id. Although this court affirmed, it concluded that “[ujpon this record, a reasonable jury certainly could have found in Roebuck’s favor.” Id. at 796 (emphasis added). Cf. Watts v. Kroger Co., 170 F.3d 505 (5th Cir.1999). Assuming the truth of the statements proffered by Taylor, see Greene, 164 F.3d at 674, and granting her all favorable inferences from her evidence, Anderson, 477 U.S. at 255, 106 S.Ct. 2505, Taylor’s case bears a striking resemblance to the escalating harassment in Roebuck, and a reasonable jury “could certainly [find]” in Taylor’s favor, concluding that a reasonable person in her position would not have reported Bacon’s conduct prior to April 2002, when his harassment intensified and assumed a more dangerous and threatening character than it had before. The “off and on” 2001 incidents were fleeting and resembled the “simple teasing” and “offhand comments” that do not amount to actionable harassment, Faragher, 524 U.S. at 788, 118 S.Ct. 2275, and a jury might well find a reasonable person would not report them. The April incidents, by contrast, were more explicit and physically charged, centering on Taylor’s physical appearance, and occurred on consecutive days. On April 3, Bacon told Taylor that she was “flaunting that black,” referring to her exposed arms. On April 4, when she turned her head but not her body to acknowledge him as he came into her office, he motioned with his hand that she should turn around. After she refused, he kept motioning with his hand that she should turn around, saying, “What did I tell you about turning your back to me? You’d better turn around when I’m talking to you.” Taylor averred that “this was the entire conversation,” and that he wanted her to turn around so that he could see her chest and legs. On April 5, the two met in the copy room, at which point Bacon approached her with his hands raised as if he were going to choke her. When she told him not to touch her, he said, “I’ll touch you if I want to. I can do what I want to.” During that incident, he also called her “baby” and told her to “go ahead [and report him]. Go tell Robert [Bacon’s supervisor]. He won’t do anything. He likes me too much.” Taylor formally reported this behavior on April 9. This increasingly physical and aggressive series of April incidents stand in stark contrast to prior incidents — the most serious of which were the “red all over” comment made, not by Bacon, but by Taylor’s coworker whom Bacon awarded with bonus points for the “embarrassing” moment, and Bacon’s inquiry after she received an outstanding performance evaluation about what was she going to do for him. Other incidents were on the level of Bacon mentioning to Taylor that he wanted to be “her friend” or that she did not actually love her fiance and that he could “beat him,” conduct that could be described as casual “off and on” harassment, Roebuck, 408 F.3d at 791. Furthermore, the challenged events lasted, at most, seven months until Taylor formally reported them, as opposed to the two years during which Roebuck endured such harassment before it intensified and she formally complained. Although the lesser “off and on” incidents contribute to the atmospheric element of a hostile environment sex discrimination claim, see Nat’l R.R. Passenger Corp. v. Morgan, 536 U.S. 101, 115, 122 S.Ct. 2061, 153 L.Ed.2d 106 (2002), a reasonable jury could find they were not yet so startling or foreboding that a reasonable person in Taylor’s position would have come forward earlier to prevent Bacon’s harassment from becoming as severe and pervasive as it became in April 2002. Her employer’s sexual harassment policy contemplated that employees would not file formal complaints until the harassment had become objectively severe, when the employee “reasonably perceived [such conduct] as creating a hostile or abusive work environment.” Policy Statement on the Prevention of Sexual Harassment, PBGC Notice No. 96-11 (emphasis added). Reviewing Taylor’s proffered evidence, however, the court errs with respect to the legal standard for determining when, under Faragher and Greene, an employee must take advantage of her employer’s corrective procedures. Despite directly relevant precedent and the employer’s sexual harassment policy that defined sexual harassment in objective terms, the court holds, as a matter of law, that Taylor should have reported Bacon’s harassment in “October or November of 2001” because “[a] reasonable employee who believes and tells others she is being sexually harassed would report it.” Op. at 1318. This holding abandons binding precedent by converting what was heretofore a legally objective inquiry into when an employee should have reported harassment, Greene, 164 F.3d at 675, into one that is now subjective. The court accomplishes this conversion by sleight of hand, recasting Greene’s objective standard in terms of the employee’s subjective belief. Yet the purpose of an objective standard is to provide a frame of reference that excludes an individual’s subjective belief. Otherwise, an objective test would be meaningless and, in this type of case, would have the unintended consequence of placing a more stringent reporting requirement on a more sensitive plaintiff, who may believe she is being sexually harassed when, in fact, a reasonable person would disagree. Under the correct legal standard— whether an employee who reasonably believes she is being sexually harassed would report it or was unreasonable in not reporting it — it is for a jury to decide whether Taylor should reasonably have believed she was being sexually harassed in a manner that required reporting. On this record, a reasonable jury could find that the fall 2001 incidents were not so startling or foreboding a reasonable person would have reported them to prevent escalation and/or that the employer’s objective sexual harassment policy did not cover Bacon’s pre-April 2002 conduct, which became reportable only when it escalated from “off and on” comments to physically aggressive advances. In either instance, Taylor’s decision not to report earlier would be reasonable. The affidavit of supervisor David Smith supports both of these inferences, stating that Taylor became more and more upset with Bacon’s behavior, that Smith “guess[ed]” Bacon’s behavior began around September or the fall of 2001, and that “[i]t was a gradual thing.... [I]t gradually over the months, it got to be pretty severe.” Smith Aff. 6-7 (emphasis added). The court’s response, that Taylor believed she was being harassed in “October or November 2001” because she “posted the [employer’s] sexual harassment policy on her office door and told her friend Smith that Bacon had been sexually harassing her,” Op. at 1319, is a red herring, ignoring both the objective tests articulated in Faragher and Greene as well as the employer’s objective sexual harassment policy, and misdirecting the relevant inquiry. Whether Taylor herself believed she was being sexually harassed is irrelevant under all applicable standards. As further evidence on which a jury could base a finding that Taylor did not unreasonably delay in reporting Bacon’s conduct, Taylor proffered evidence that Bacon at least twice threatened retaliation if she complained about him. In addition to the copy room incident, Bacon had previously told Taylor that if she “said something, they would think that [she was] the problem, not him.” In Roebuck, the court held “whether fear [of retaliation] and uncertainty [about the scope of the employer’s policy] made Roebuck’s delay in complaining reasonable was for the jury to decide.” Roebuck, 408 F.3d at 795. Here too there is a material issue of fact for the jury to resolve. To avoid this conclusion the court instead evaluates Taylor’s evidence to find that Bacon had “no leverage at all with which to intimidate Taylor” because he was not her supervisor. Op. at 1319. But Taylor proffered undisputed evidence that Bacon had told her he could get her an outstanding performance evaluation because he, her immediate supervisor (Henkel), and their supervisor (Joy) would as a group discuss what ratings to give subordinates, and that Bacon took credit when she received her outstanding evaluation. Further, it was undisputed that Bacon and Henkel socialized together and were “golfing buddies” who played golf approximately ten times a year. A reasonable jury could find that, faced with such management solidarity, any perceived delay in reporting Bacon’s conduct was reasonable. The cases on which the court relies do not dictate a contrary conclusion. For instance, although the Fourth Circuit in Barrett v. Applied Radiant Energy Corp., 240 F.3d 262 (4th Cir.2001), rejected the “argument that reporting sexual harassment is rendered futile merely because members of the management team happen to be friends,” id. at 268, the court overlooks both the different evidence Taylor offered regarding Bacon’s ability to get her an outstanding evaluation and the difference that the Fourth Circuit drew between fear of futility and fear of retaliation. That court’s statement referred to futility and responded to employee Barrett’s contention that she failed to report her supervisor’s behavior because he was friends with management and she “did not think it would do any good.” Id. In this respect, “the only cost” to Barrett would have been failure to prevail upon filing a complaint, as she had no objective reason to fear retaliation. See Reed v. MBNA Mktg. Sys., 333 F.3d 27, 36 (1st Cir.2003). Yet the Fourth Circuit made no similar statement regarding fear of retaliation, stating only that “generalized” and “nebulous” fear of retaliation would not suffice to explain a delay in reporting. Barrett, 240 F.3d at 267. Here, by contrast, Taylor presented evidence from which a reasonable jury could find that she had a specific, “credible,” Reed, 333 F.3d at 36, reason to fear retaliation that was not merely “generalized,” Barrett, 240 F.3d at 267, “nebulous,” id., or “subjective,” Walton v. Johnson & Johnson Servs., 347 F.3d 1272, 1290 (11th Cir.2003). “[F]ailure” was therefore not “ ‘the only cost’ to Taylor of reporting Bacon in the fall of 2001,” Op. at 1319 (quoting Reed, 333 F.3d at 36), and a jury could find that any reasonable delay was justified under the circumstances. With favorable inferences, Taylor’s fear was no less substantiated than Roebuck’s, whose supervisor commented only once, vaguely, that he did not want to “find out [she] was taking sides with Lieutenant Clark,” who had witnessed him trying to kiss Roebuck. Roebuck, 408 F.3d at 792. Indeed, Taylor’s proffered evidence of retaliatory threats and conduct is stronger than was Roebuck’s. III. Retaliation. The evidence Taylor proffered to show retaliation illustrates why an employee would hesitate before filing a complaint pursuant to an employer’s sexual harassment policy. A complaint leads to an investigation that alerts the accused and other employees, including, as occurred here, the complaining employee’s immediate supervisor (Henkel) and his superiors (Joy and Hagans), that the employee has filed a complaint against another supervisor (Bacon). That process may itself cause negative consequences for an employee regardless of the outcome of the employer’s remedial process. Nonetheless, the high bar set for discrimination claims is no less high for claims of retaliation, see Brown v. Brody, 199 F.3d 446, 457 (D.C.Cir.1999), and an employee may recover damages only for those instances of retaliation that resulted in a “materially adverse” action. Burlington N. & Santa Fe Ry. v. White, 548 U.S. 53, 57, 68-69, 126 S.Ct. 2405, 165 L.Ed.2d 345 (2006). As with Taylor’s sexual harassment claim, the court improperly, and with great consequence, denies Taylor the benefit of reasonable and favorable inferences from the evidence. E.g. Op. at 1322 (concluding an inference of retaliatory motive would be “untenable on the record here” where based on “ ‘mere proximity’ ” between the time she filed suit and the AWOL listing). It also disaggregates her evidence, Op. at 1321, when the legal standard requires it to be viewed in the aggregate. Although correctly concluding that the withholding of pay due pursuant to the “AWOL” incident was a materially adverse action, Op. at 1321, the court weighs and evaluates conflicting evidence in holding that Taylor failed to rebut her supervisor’s non-discriminatory reason for placing her on AWOL status, Op. at 1322. Dissecting the portrait of her work experiences after she formally complained, Op. at 1321-23, and failing to view the evidence in the aggregate, the court concludes that “Taylor herself had created” “the confusion” with regards to this incident. Viewed under the correct legal standard, however, Taylor has raised a material issue of disputed fact on which a reasonable jury could find in her favor. Taylor’s retaliation claim is governed by the three-step framework of McDonnell Douglas Corp. v. Green, 411 U.S. 792, 93 S.Ct. 1817, 36 L.Ed.2d 668 (1973). Under this framework, Taylor proffered evidence establishing a prima facie case of unlawful retaliation. After engaging in statutorily protected activity when she reported Bacon, her supervisor (Henkel) claimed she was AWOL even though she had followed the usual procedures for requesting leave, and denied her a week of earned pay, withholding it for an unknown period of time. As the court holds, that withholding was a materially adverse action. Op. at 1322. Howeyer, the court’s subsequent analysis fails both to acknowledge the aggregate effect of Taylor’s evidence of a causal connection between the protected activity and the adverse action and to accord her favorable inferences. In Greer v. Paulson, 505 F.3d 1306 (D.C.Cir.2007), this court held, “After the employer offers a non-[retaliatory] justification for its actions, the McDonnell Douglas [ ] framework falls away, and [the court] must determine whether a reasonable jury ... could infer [retaliation] from the combination of (1) the plaintiffs prima facie case; (2) any evidence the plaintiff presents to attack the employer’s proffered explanation for its actions; and (3) any further evidence of [retaliation] that may be available to the plaintiff,” id. at 1318 (third alteration and ellipsis in original; internal quotation marks omitted)(quoting Aka v. Wash. Hosp. Ctr., 156 F.3d 1284, 1289 (D.C.Cir.1998) (en banc)); see Singletary v. Dist. of Columbia, 351 F.3d 519, 524 (D.C.Cir.2003) (applying McDonnell Douglas to a retaliation claim). Greer makes clear that all instances of retaliation, whether or not they are individually actionable under Burlington Northern, are relevant to this determination because they shed light on whether actionable conduct was retaliatory in nature. As the First Circuit has pointed out, “the critical inquiry becomes whether the aggregate evidence of pretext and retaliatory animus suffices to make out a jury question.” Mesnick v. Gen. Elec. Co., 950 F.2d 816, 827 (1st Cir.1991) (emphasis added). Taylor’s proffered evidence pointed to a series of actions that adversely affected her ability to do her job. For example, there was evidence that as a result of her formal complaint, her immediate supervisor (Henkel) held up her work, delaying its submission to the Office of General Counsel, and assigned her low priority cases, all resulting in a lower level of productivity for the twelve-month period than in previous years. Where performance evaluations are directly correlated to productivity, as was true in Taylor’s employment situation, these actions necessarily resulted in steadily declining evaluations, from “outstanding” to “excellent” in 2002, and from “excellent” to “fully effective” in 2003. Taylor expressed fear that if they continued to decline she might receive an “unacceptable,” which is grounds for dismissal. As further examples, there was evidence that her second level supervisor (Joy) with whom she rarely spoke, had recommended she not be hired by another supervisor because he did not trust Taylor, that he'had advised Bacon not to go by her office “because she could take this, you know, as a way to tell another lie,” Bacon Depo. at 102, and that her third-level supervisor (Hagans) warned her about her “negative behaviors.” When viewed in context with other proffered instances of management retaliation, and contrary to the court’s impermissible weighing and disaggregation of the evidence against Taylor, a reasonable jury could disbelieve her supervisor’s claimed reason for placing her on AWOL status and instead credit Taylor’s account of what transpired. See Aka, 156 F.3d at 1290 (quoting St. Mary’s Honor Center v. Hicks, 509 U.S. 502, 511, 113 S.Ct. 2742, 125 L.Ed.2d 407 (1993)). According to Taylor, she requested leave in person and Henkel approved it informally, a practice that he admits is standard, acknowledging that in the past he signed her leave slips even after her leave had begun. Henkel thus knew exactly what type of leave she was requesting and which dates she would be out of the office. Nonetheless, seeing an opportunity to make her life more difficult in view of her complaint against his supervisor-friend and golfing buddy, when he noticed she checked the box for sick leave but placed the dates she would be out on a line above (next to annual leave), he claimed “confusion” and reported her to Human Resources, which, as an experienced supervisor, he knew would instruct him to designate her AWOL. There was no evidence that Human Resources would have so instructed had he not referred her request or had he advised, based on the conversation Taylor avers she had with him, what type of leave she wanted. There is no evidence, in fact, that Human Resources routinely reviewed these request forms when they were approved by the employee’s supervisor. The court would instead improperly credit her employer’s account of the events, stating that Henkel, “confused” by Taylor’s “err[or] in completing the request form by ‘mistakenly checking] the sick leave box’ but entering the dates in the area for annual leave,” Op. at 1322 & n.* (second alteration in original) (quoting Taylor’s Opp. to Mot. Summ. J. at 37), requested guidance from Human Resources. The court relies on her supervisor’s incomprehensible affidavit testimony: “Well, there was some confusion as to whether it was sick leave or annual leave. When I talked to personnel basically they said if it was sick leave cause [sic] she put the sign at the time for leave in the annual spot, but she checked off the sick leave portion of it, so I didn’t know if she was on sick leave or annual leave.” Henkel Aff. 9. This hardly establishes undisputedly that Taylor was the cause of any “confusion.” Admitting in the same affidavit that during the years he had been her supervisor there had never been a problem with Taylor’s leave, Henkel claimed “personnel” directed she be placed on AWOL because she had not received his prior approval. Id. at 10. This is not the same explanation for disapproval as the “confusion” he identified earlier. Moreover, the leave request slip, on which the court also relies, belies the “confusion” explanation. On that request Henkel wrote in longhand that he “did not receive [the leave request] until Friday afternoon 10/31” and that “I’m assuming prior arrangements were made for this leave but no arrangements were made with me.” This explanation makes no reference to “confusion” about the type of leave requested. Moreover, Taylor averred that she had requested leave in person and cleared her leave with Henkel informally, a practice that he admits is standard and which in this instance would undermine any “confusion” claim about what type of leave she sought. Given Taylor’s evidence, Henkel’s affidavit, and the leave request form showing what appear to be Henkel’s handwritten alterations to a previously signed and approved document, a material issue of disputed fact remains as to whether Henkel approved her leave as she claimed on October 31 or disapproved it on November 4 because of “confusion.” Although his apparent change of position may, as the court suggests, be “consistent with the [employer]^ explanation that Henkel [was confused],” Op. at 1322 n.*, the employer’s explanation must be more than “consistent” to prevail on summary judgment; it must exist to the exclusion of another also consistent explanation that favors the non-moving party in order to demonstrate entitlement to a judgment as a matter of law. Fed.R.Civ.P. 56(c); see Anderson, 477 U.S. at 247, 106 S.Ct. 2505. Here, that other explanation is that Henkel conjured up a “confusion” rationale, an account supported by, for example, the inconsistency between his affidavit testimony that he did not find out about Taylor’s leave until he came back to work in November 2003 and the leave slip itself, on which he acknowledged receiving it on October 31, 2003, and which he appears to have signed and dated the same day. See supra n. 6; Aka, 156 F.3d at 1290. Reaching the opposite conclusion by crediting the employer’s “confusion” explanation, the court compounds its error by improperly disaggregating Taylor’s evidence and disregarding all proffered instances of retaliation that it concludes were not materially adverse. In doing so, the court fundamentally misconceives the relevance of this evidence. Even assuming these events are not themselves legally viable adverse actions, they are nonetheless evidence that the withholding of pay, an undisputedly viable adverse action, was retaliatory, and the court offers no good explanation for its disregard of those acts when it concludes otherwise. Nor can it. Just as Taylor’s counsel offered “revenge is a dish best served cold,” Oral Arg. at 32:04, retaliation can involve “a thousand cuts,” Patterson v. Whitman, No. 02-2213, 2003 U.S. Dist. LEXIS 26726, at *8 (D.D.C. June 9, 2003). Where one of those cuts was a materially adverse action, it blinks reality to suggest the other 999 shed no light on whether that cut was intentional and retaliatory. The court objects that it cannot “merely assume! ] allegedly retaliatory acts were in fact retaliatory.” Op. at 1323 n.*. At summary judgment, however, that is exactly what the court must do. Taylor proffered evidence of a pattern of managerial retaliation, and properly viewed, her evidence is not so untenable as to merit dismissal at this stage of the proceedings. Verbal reprimands for “negative behaviors,” telling other supervisors that an employee cannot be trusted and tells “lie[s],” and slowed work processing that inevitably results in steadily declining performance evaluations that — -if continued — could result in dismissal are not “trivial actions,” id., even assuming they do not constitute actionable retaliation, but see Russell v. Principi, 257 F.3d 815, 818, 819 (D.C.Cir.2001); Weber v. Battista, 494 F.3d 179, 185 (D.C.Cir.2007). On this record, a reasonable jury could find that her supervisor’s reporting her to Human Resources, when in similar circumstances in the past he had not, was one of a series of retaliatory acts that resulted in the denial of a week’s pay for an unknown amount of time. The merits of this question are for the jury to decide, not this court. In summary, circuit courts of appeal have acknowledged the difficult position that employees face as a result of the Supreme Court’s efforts in Faragher and Ellerth to limit vicarious liability for workplace sexual harassment. See Reed, 333 F.3d at 35; Walton, 347 F.3d at 1290; Barrett, 240 F.3d at 268. The dilemma for the victim is real: reporting casual flirtation too early likely results in exoneration for the harasser and workplace condemnation of the victim; reporting too late may bar relief altogether, even though the conduct has become progressively more severe. Navigating this tricky terrain, in Roebuck this court acknowledged on facts similar to Taylor’s that a jury could have found the plaintiff was reasonable in not immediately reporting unwanted advances. See also Greene, 164 F.3d at 674-75. Because this court must accord Taylor as the nonmoving party all favorable inferences from the evidence, a reasonable jury could find she did not unreasonably delay in reporting harassment under her employer’s policy establishing an objective standard for reporting. It is no response to ignore, as the court does, the required standard of review and binding precedent on the substantive legal standards to be applied. The standard for reporting is an objective one, not the subjective one the court fashions today. A reasonable jury, viewing her proffered evidence in the aggregate, as the correct legal standard requires, also could find that her supervisor unlawfully retaliated against her for filing a formal complaint. The court can reach the opposite conclusion only by discarding that standard of review when it disaggregates and thereby discounts favorable evidence, denies Taylor the benefit of favorable inferences, and ignores the real world retaliatory consequences of the employer’s actions. Whether a reasonable jury would find in Taylor’s favor or conclude she is not credible is not the question before this court, only whether she can survive summary judgment. Essentially, the court overlooks that “all that is required [from the nonmoving party to defeat summary judgment] is that sufficient evidence supporting the claimed factual dispute be shown to require a jury or judge to resolve the parties’ differing versions of the truth at trial.” First Nat’l Bank of Ariz. v. Cities Serv. Co., 391 U.S. 253, 288-89, 88 S.Ct. 1575, 20 L.Ed.2d 569 (1968). Accordingly, on this record I would reverse the grant of summary judgment and remand the case to the district court. The PBGC is a nonprofit corporation "established within the Department of Labor,” 29 U.S.C. § 1302(a), and the Secretary of Labor is the Chairman of its Board of Directors, id. § 1302(d). The dissent deems it "irrelevant” "[w]hether Taylor herself believed she was being sexually harassed,” Dissenting op. at 1327, and suggests the court is "placing a more stringent reporting requirement on a more sensitive plaintiff,” id. at 1327. A plaintiff who knows about her employer’s complaint procedure and fails to use it even as she tells a manager she is being harassed runs head long into the prophylactic rule announced in Faragher, which was not designed to protect sensitive employees, but rather to encourage all employees to "avoid[] harm” when doing so is possible, and to ensure a plaintiff is not "reward[ed] ... for what her own efforts could have avoided.” 524 U.S. at 806-07, 118 S.Ct. 2275. Roebuck, which involved repeated harassment by and a threat from the employee’s supervisor, is not to the contrary. See 408 F.3d at 791-92; Dissenting op. at 1324-25 (noting that employee in Roebuck "alleged her supervisor ... had sexually harassed her"). Bacon had no supervisory authority over Taylor. In Roebuck, moreover, the question was whether "fear and uncertainty made [the employee’s] delay in complaining reasonable” under the circumstances. 408 F.3d at 795. The dissent suggests Taylor may reasonably have been uncertain whether Bacon’s conduct violated the PBGC's policy because the policy “defined sexual harassment in objective terms.” Dissenting op. at 1326-27. Taylor, however, was not at all uncertain; she believed and told others she was being harassed. Nor could a reasonable jury find Taylor was uncertain about what the PBGC's policy required of her: As Taylor acknowledged in both her EEO complaint and an affidavit, in October 2001 she posted on her door a PBGC e-mail that stated "[i]f you believe that you are a victim or witness to workplace harassment, please report it immediately to an EEO Official or Counselor.” Retaliation claims based upon circumstantial evidence are governed by the three-step test of McDonnell Douglas Corp. v. Green, 411 U.S. 792, 93 S.Ct. 1817, 36 L.Ed.2d 668 (1973), which requires the employee first to establish prima facie the elements of retaliation. See Wiley v. Glassman, 511 F.3d 151, 155 (D.C.Cir.2007). If the plaintiff does so, then the burden shifts to the employer to offer a legitimate, nondiscriminatory reason for its action. Id. If the employer does so, then the court "need not — and should not — decide - whether the plaintiff actually made out a prima facie case under McDonnell Douglas," Brady v. Office of Sergeant at Arms, 520 F.3d 490, 494 (D.C.Cir.2008) (disparate treatment claim); Jones v. Bernanke, 557 F.3d 670, 678 (D.C.Cir.2009) (retaliation claim); rather, the court should proceed to the question of retaliation vel non. The court can resolve that question in favor of the employer based either upon the employee’s failure to rebut its explanation or upon the employee’s failure to prove an element of her case — here that her employer took a materially adverse action against her. A circuit court is "justified in resolving an issue not passed on below ... where the proper resolution is beyond any doubt.” Singleton v. Wulff, 428 U.S. 106, 121, 96 S.Ct. 2868, 49 L.Ed.2d 826 (1976); see Jones, 557 F.3d at 676 ("we may affirm a judgment on any ground the record supports,” provided "the opposing party had a 'fair opportunity' to address” that ground). Taylor, who had the burden of proof, had such an opportunity and took it; she engaged in extensive discovery aimed at proving retaliation. Although, as the dissent notes (at n. 6), it appears from the face of the leave slip that Henkel first approved Taylor's request, he explained that as a matter of course he signed such slips when he received them. His change of position is consistent with the PBGC's explanation that Henkel, confused by Taylor’s error in completing the slip, requested guidance from Human Resources. Taylor offers this argument to show she made out a prima facie case but, because she wants this case remanded to the district court for a trial on the merits, we take her argument as equally applicable to the issue before us. Contrary to the suggestion that Taylor suffered retaliation by "a thousand cuts,” Dissenting op. at 1332, there is no such pattern of abuse here. The dissent merely assumes allegedly retaliatory acts were in fact retaliatory. Id. at 1329-30, 1332. Nor does the dissent explain how trivial actions on the part of Joy and Henkel could support a reasonable inference that the Human Resources Department acted with a retaliatory motive. Id. at 1332. . In Faragher v. City of Boca Raton, 524 U.S. 775, 118 S.Ct. 2275, 141 L.Ed.2d 662 (1998), the Supreme Court held that employers have an affirmative defense against actionable hostile environment claims when no tangible employment action is taken against the employee-plaintiff. The defense has two necessary elements: (1) "the employer exercised reasonable care to prevent and correct promptly any sexually harassing behavior,” and (2) "the plaintiff employee unreasonably failed to take advantage of any preventive or corrective opportunities provided by the employer or to avoid harm otherwise.” Faragher, 524 U.S. at 807, 118 S.Ct. 2275; see Burlington Indus., Inc. v. Ellerth, 524 U.S. 742, 765, 118 S.Ct. 2257, 141 L.Ed.2d 633 (1998). . The court makes no attempt to explain how Bacon's conduct prior to April 2002 differs from the "off and on” harassment that Roebuck endured before Corbett’s harassment escalated and she filed a formal complaint. Although it attempts to distinguish Roebuck on the ground that “the question [there] was whether 'fear and uncertainty made [the employee’s] delay in complaining reasonable,' ” Op. at 1319-20 n.® (quoting Roebuck, 408 F.3d at 795) (second alteration in original), Roebuck’s supervisor threatened retaliation less than a month before she complained in January 1998, and her uncertainty about whether the employer's sexual harassment policy applied to conduct outside of the workplace extended at most to October of the previous year. Yet her supervisor had been harassing her "off and on” for nearly two years prior; "fear and uncertainty” thus came into play only after a long period of ongoing harassment. The court offers no reason why Roebuck’s two-year delay in reporting any of this "off and on” harassment was excusable, see Roebuck, 408 F.3d at 796, while Taylor’s at most seven month delay is not. . The Policy Statement defined "sexual harassment” as: [v]erbal or physical conduct of a sexual nature, including unwelcome sexual advances and requests for sexual favors ... when: a. submission to such conduct is made explicitly either a term or condition of an individual’s employment; b. submission to or rejection of such conduct by an individual is used as the basis for employment decisions affecting such individual; or c. such conduct is reasonably perceived as creating a hostile or abusive work environment. Policy Statement on the Prevention of Sexual Harassment, PBGC Notice No. 96-11 (emphasis added). . The court misreads Taylor’s EEO complaint, Op. at 7, 10 n.*, which does not state that she posted the sexual harassment policy on her door in response to Bacon’s conduct towards her, but rather — and only — that she posted it in response to "several incidents with the PPD management staff that I think are incidents of harassment so that was my subtle way to say look at this, stop, you are behaving in this manner, be careful.” EEO Compl. Att. 8. Taylor makes no mention here whether these "incidents” related to her specifically; at the summary judgment stage, the court must view the facts in the light most favorable to her and conclude they did not. Moreover, the court fails to acknowledge what the court in Roebuck presumed, namely the wide gulf between a layperson’s use of the word "harassment” to try to prevent inquiry into her personal affairs, and a court’s use of the same word as a term of art to express a legal conclusion under Faragher and Meritor. For instance, a male boss who calls a female employee "honey” or "sweetie” may provoke a response to stop "sexually harassing me” or a complaint to a friend that she is being "sexually harassed,” but she would be wrong as a legal matter if she thought such conduct, without more, was actionable or that the incident merited reporting under the policy of Taylor’s employer. So too with Taylor’s statements to Bacon in response to him telling her he "bet [he] could beat [her boyfriend]” or to Smith when she complained about Bacon's behavior. . To the extent the court interprets this statement, which appeared only as a parenthetical in Taylor’s opposition to the motion for summary judgment, as an acknowledgment of her error in completing the form, the court ignores the more obvious contextual interpretation that Taylor was recounting Henkel’s claimed basis for "confusion,” not confessing error. Again, the court views the record in the light least favorable to Taylor. . Taylor’s leave request form has a typed "X” only in the box marked "Accrued Sick Leave,” which appears in a column listing various types of leave, and a typed listing of the dates on the first line to show when she would be out and the number of work hours she would miss. Beside her signature in the "CERTIFICATION” box is typed "10/31/03” for the date of the request. By contrast, on the signature line for "OFFICIAL ACTION ON REQUEST,” the "X” next to "APPROVED” is scratched out and an "X” appears next to "DISAPPROVED”. On the signature line, following Henkel's signature is (he handwritten date "11/04/03,” which is written over the handwritten date, "10/31/03,” effectively crossing out that date.
CASELAW
2018 OFC Women's Nations Cup qualification The 2018 OFC Women's Nations Cup qualification tournament was a football competition that took place from 24 to 30 August 2018 in Lautoka, Fiji to determine the final women's national team which joined the seven automatically qualified teams in the 2018 OFC Women's Nations Cup final tournament in New Caledonia. Teams On 31 October 2017, the OFC announced its executive's decision on the teams to compete in the tournament. For the first time, the OFC Women's Nations Cup is a compulsory tournament, so all 11 OFC member national teams entered the tournament. The four lowest-ranked teams, based on previous regional performances of all women's national teams, entered the qualification tournament while the remaining teams were given a bye to the final tournament. Format The four lowest-ranked teams based on previous regional performances of all women’s national teams (American Samoa, Solomon Islands, Vanuatu, and Fiji) entered the qualification tournament, which was played in a single round-robin format in Fiji. The winner advanced to the 2018 OFC Women's Nations Cup, held from 18 November to 1 December 2018 in New Caledonia, joining the other seven teams which received a bye into the group stage. The Nations Cup serves as the Oceanian qualifiers to the 2019 FIFA Women's World Cup, with the champions qualifying for the final tournament in France, as well as the 2020 Summer Olympics women's football tournament in Japan, as long as they are a member of the International Olympic Committee (IOC). Each team can name a maximum of 20 players. Tiebreakers The ranking of teams is determined as follows: * 1) Points obtained in all qualifying matches; * 2) Goal difference in all qualifying matches; * 3) Number of goals scored in all qualifying matches; * 4) Points obtained in the matches played between the teams in question; * 5) Goal difference in the matches played between the teams in question; * 6) Number of goals scored in the matches played between the teams in question; * 7) Fair play points in all qualifying matches (only one deduction can be applied to a player in a single match): * 8) Coin toss or drawing of lots. Draw The draw for the qualification tournament was held on 21 March 2018 at the OFC Headquarters in Auckland, New Zealand. The hosts Fiji were assigned to position 1 and were exempted from the draw, while the remaining teams were drawn into the other positions without any seeding in order to determine the match schedule. The draw for the match schedule resulted in the following positions: Note: Bolded team qualified for the 2018 OFC Women's Nations Cup. Venue The qualification tournament was held at Churchill Park in Lautoka, Fiji. The tournament was originally scheduled to be held in Pago Pago, American Samoa from 27 August to 4 September 2018, but in March 2018 the venue was changed to Fiji. The qualification tournament in Fiji was originally scheduled to take place from 25–31 August 2018, but was later adjusted to 24–30 August. Schedule The match schedule was revealed on 6 July 2018. The schedule of qualification is as follows: Matches All times are local, FJT (UTC+12). Qualified teams The following eight teams qualified for the final tournament.
WIKI
Who was the “good thief” and why is he a saint? Probably the best known criminal-turned-saint in the Catholic Church is St. Dismas. He was the “good” or “penitent” thief crucified alongside Jesus, and was promised Heaven by Jesus Christ himself. These words of Jesus Christ led the early Christian community to believe the “good thief” repented of his crimes and entered Heaven later that day. This automatically made him a saint, as a saint is more loosely defined as anyone enjoying the beatific vision in Heaven. Very little is known about this man, though tradition often applies the name “Dismas” to him, which means either “sunset” or “death.” What can be ascertained is that he was a criminal in the eyes of Roman law. According to one biblical scholar, “Two of the most common [criminals condemned to crucifixion] were low-life criminals and enemies of the state … Low-life criminals would include, for example, slaves who had escaped from their masters and committed a crime. If caught, a slave could be crucified. There were two reasons they were subjected to such a tortuous, slow, and humiliating death. They were receiving the ‘ultimate’ punishment for their crime and, possibly more important, they were being used as a spectacle to warn any other slave who was thinking about escaping or committing crimes what could happen to them.” We don’t know the crime for which Dismas was sentenced, but it was likely something along those lines. An article on FaithND offers one interesting legend about the early life of Dismas, “One legend says that Dismas and his fellow thief held up Joseph and Mary when they were fleeing to Egypt with the child Jesus. Dismas is said to have been moved to compassion and bribed his companion to let the Holy Family pass safely.” His feast day is commemorated on March 25, the calendar date that early Christians believed marked the day Christ died. Not surprisingly, Dismas is regarded as a patron saint of prisoners, and many prison chapels or halfway houses for ex-convicts have been named for him.
FINEWEB-EDU
Talk:barter Question: What is troc French for? Which definition does it pertain to? I don't think we can simply have a ==Translations== section. To be useful translations need to be indexed to the actual English definition. --mav * Troc is for exchange of good without money. I hope that template would come soon. You're right it may cause problems whith polysemic words (a word whith several meanings) -- Youssefsan * Unless somebody is going to run a bot soon, I think it is OK, in fact best, that we just experiment and see what is going to work with all the things we want to do. Wiktionary is going to be far more than just a dictionary so we need to work on developing a great template - this will take time for us to work to bugs out. We also need to figure out what our primary sources will be for all the information types we want to have. I personaly like WordNet's dictionary (this is what I have been using) but I'm not sure if their license will work with the GNU FDL. --mav Question: Is it technically possible to make a link to wiktionaries in other languages? It would be interesting to discover the difficult problem of the ethymology of this word through them. -- olivierChaussavoine 2. (intransitive) to haggle over the terms of such an exchange; bargain Can anybody confirm this? https://www.wordreference.com/definition/barter --Backinstadiums (talk) 16:14, 5 November 2020 (UTC)
WIKI
Many people have made lifting weights and working out a part of their lifestyle. It has become an option for people who want to attain improved physique and overall health. Most of the time, individuals workout to lose unwanted pounds and gain muscle mass. Some workout and exercise for relaxation and relieve stress. However some do not have the money to avail of gym memberships and acquire necessary equipments. These individuals can use resistance bands to aid them in their workout regimen. These bands are versatile alternatives to workout routines that requires machines and equipments. In addition, this bands are cheap, handy, and are easy to use. Resistance bands are widely used in strength, conditioning, and rehabilitation programs. Resistance bands are hollow elastic tubes that are becoming a handy tool many workout routines. These bands provide continuous resistance throughout every exercise movement which makes it feel harder. The tension provided by these bands may aid in the development of muscle strength, speed and power. When used properly, these bands can provide the right level of tension without using free weights or machines. In addition, these bands offer more variety of workout because one can create tension from many angles and can be adjusted to any shape and size of the body. Because of this, not only the major muscles are trained but also the small ones. Fitness experts believe that stabilizing the muscles properly is important in muscle development, injury prevention, and improved health. Regular exercise and a healthy diet can give many benefits like improved physical and mental health. Using resistance bands during workouts may provide additional tension needed for improved health and a fit-looking body. Resistance bands added in a training regimen may help promote the following: Improved muscle strength and tone Weight management Prevention and control of health conditions such as diabetes, heart disease and arthritis Pain management Improved mobility and balance Improved posture Decreased risk of injury Increased bone density and strength Reduced body fat Increased muscle-to-fat ratio Boosted metabolism (burning more kilojoules when at rest) Improved sleep patterns Increased self-esteem Enhanced performance of everyday tasks because of improved strength and flexibility Enhanced self-esteem Increased cognition and memory Working out with resistance bands not only promotes improved overall health but is also an effective and safe way to train. Unlike weight-training, working out with resistance bands uses tension to improve muscle development and strength. This tension can be adjusted quickly and simply by changing bands or shortening the length of the band. Being able to change resistance quickly in workouts may help increase the cardiovascular aspect of one’s workout. In addition, resistance bands are ideal for many seniors because tension can be adjusted to the tension that suits them. Another notable advantage of resistance bands is it portable and can be brought while traveling because it fits in an ordinary bag. Resistance bands are ideal for individuals who want workouts that builds strength and improve overall health. Similar Studies
ESSENTIALAI-STEM
Jane Eyre- REVISION Grade 12 1. What is the weather like as the novel opens? A. Cold and rainy. B. Hot and muggy. C. Temperate and mild. D. Warm and sunny. 2. According to Jane, who bullies and punishes her "not two or three times in the week, nor once or twice in the day, but continually?" A. Georgiana. B. Eliza. C. John. D. Bessie. 3. Why is Jane taken and locked in the red-room? A. Because she defends herself against John. B. Because she pulls Georgiana's hair. C. Because she tells on Eliza. D. Because she defends herself against Bessie. 4. What hope does Mr. Lockwood give Jane? A. He asks her if she would like to go into a convent. B. He asks her if she wants to go to America. C. He asks her if she wants to live with a different family. D. He asks her if she wants to go to school. 5. What is Lowood Institution? A. It is a mental hospital. B. It is a prison. C. It is a charity school for orphaned girls. D. It is one of the few schools of higher learning that is open to women. 6. Why does Jane speak to the girl reading in the garden? A. The girl spoke to her first. B. Jane feels they are alike in their natures because she also finds solace in books. C. Jane wants to borrow the book. D. The headmistress told her she had to speak to at least two people every day or risk expulsion: it is the headmistress’ way of "socializing" Jane. 7. What advice does Helen give Jane? A. Be quiet but sneaky. B. Fight back at every opportunity. C. Endure punishment and criticism and forgive and love the enemy. D. Go along with the rules, read, and assimilate as much knowledge as possible: then escape. 8. How is Jane's temperament different from Helen's? A. Jane is more religious. B. Jane is not as neat and organized as Helen. C. Jane is shy, but Helen is not. D. Jane is a fighter who cannot meekly accept injustice. 9. Which of the following does not describe Mr. Brocklehurst? A. He says fasting is good for the girls' souls. B. He expects the girls to lead an austere life. C. He says the girls should never marry but should become governesses or teachers. D. He insists that the older girls cut their hair. 10. What happens to Helen Burns? A. She gets a teaching position and leaves the school. B. She is expelled for socializing with one of the delivery boys. C. She is ill with consumption and eventually dies. D. She enters a convent. 11. What is Adele's relation to Mr. Rochester? A. She is his niece. B. She is his ward. C. She is his younger sister. D. She is his adopted daughter. 12. How does Jane first meet Mr. Rochester? A. She is introduced at dinner by the housekeeper. B. Mr. Rochester observes her teaching Adele. He later calls her into his office and introduces himself. C. Mr. Rochester picks her up at the station when she first arrives. D. She meets him on the road from Hay while she is out walking. She helps him return to his saddle after his horse goes down on the ice. 13. What is unusual about Jane's first meeting with Mr. Rochester? A. Mr. Rochester does not tell Jane who he is. B. Mr. Rochester does not speak to Jane. She thinks he is impaired. C. He acts as though he detests her. D. She feels an eerie chill, a premonition of something evil associated with him. 14. In what way does Jane captivate Mr. Rochester? A. He is charmed by her honesty and wit. B. He thinks she is impudent and acts "above her station." C. He thinks she is a spoiled brat. D. He thinks she is too ignorant to hold the position she has undertaken. 15. Which of the following statements does not describe Blanche Ingram? A. She is kind and full of deep passions. B. She is tall and beautiful. C. She is well-versed in charming the gentlemen. D. She is very wealthy. 16. Who is Mr. Mason? A. He is Mr. Rochester's cousin. B. He is an old acquaintance of Mr. Rochester from the West Indies. C. He is Bertha’s brother D. He is a fortune teller and magician whom Mr. Rochester has hired for entertainment. 17. Why does Jane consent to return to Gateshead? A. Mr. Rochester tells her she must do it or she cannot stay at Thornfield. B. She knows it is the moral thing to do. C. She secretly hopes she will receive a portion of Mrs. Reed's fortune if she is kind and compassionate. D. She is merely curious about what all of the family members have been doing. 18. What name does Jane give the Rivers? A. She calls herself Jane Rochester. B. She gives her real name, Jane Eyre. C. She calls herself Jane Reed. D. She calls herself Jane Elliott 19. What is St. John's offer to Jane? A. He wants her to start a missionary church in Ireland. B. He wants her to take over the running of Moor House and open it as an orphanage. C. He wants to send her to school, all expenses paid. D. He wants her to come with him as his wife and companion missionary. 20. Which character in the novel looked for a meaning in a life of duty and selfdenial? A. It was Jane Eyre. B. It was Mrs. Poole. C. It was Mr. Brocklehurst. D. It was St. John Rivers.
FINEWEB-EDU
Buchanon Buchanon is a surname. Notable people with the name include: * Phillip Buchanon (born 1980), American football player * Will Buchanon (born 1983), American football player * Willie Buchanon (born 1950), American football player
WIKI
Talk:Mike Jackson (automotive) "Catastrophic" edits via email: AutoNation (The Company) and Chairman Mike Jackson through the Offices of Corporate Communications would like to know why you made such "Catastrophic" edits of Mr. Jackson's Wikipedia biography? User:Tramel33166/Marc Cannon Dec 12/12/13 3:39 PM * As stated on the edit, "Remove text copied verbatim from the Personal section on Mike Jackson's Facebook page". Wikipedia does not permit editors to plagiarize a published source for inclusion into a Wikipedia article unless the editor was the original author of the published source and there is no conflict of interest. More information on Wikipedia's policies is provided in the following articles: * Plagiarism: https://en.wikipedia.org/wiki/Wikipedia:Plagiarism * Conflict of Interest: https://en.wikipedia.org/wiki/Wikipedia:Conflict_of_interest * Copyright Infringement: https://en.wikipedia.org/wiki/Copyright_infringement * If you think that I was incorrect in my assessment of this situation, I will request that an administrator review my actions and determine a proper resolution. Mgrē@sŏn ( Talk ) 21:51, 13 December 2013 (UTC) Thanks for the reply. I've read your reply to our inquiry...and understand the copy-write points presented. They are correct. But as you stated; the case of the single editor for both; this is inplay here. There is an additional "twist". AutoNation's Office of Corporate Communications has hired "agents for hire" for both Mike Jackson's Facebook page and his Wikipedia page, so the original is the same content which came from the same owner. Mr. Jackson and the Office of Corporate Communication provided the information for both. So, of course, they would match. But, after I reviewed the original content, I did find that it did not meet Wikipedia "standards" regardless and I alerted the office of such. The "office" has directed me to change the Wikipedia page to reflect the same information but not in the same format as the original Wikipedia page or the Facebook page so it may "stand on its own merits". Hopefully this will resolve the copy-write issue. ..... Your experience is valuable here and we look forward to improve Mr. Jackson's Wikipedia article. Regards S. Henshey Corporate Map Inc. Administrative Logistics Services External links modified (January 2018) Hello fellow Wikipedians, I have just modified one external link on Mike Jackson (auto). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20100411023530/http://www.equilar.com/CEO_Compensation/AutoNation_Mike_Jackson.php to http://www.equilar.com/CEO_Compensation/AutoNation_Mike_Jackson.php Cheers.— InternetArchiveBot (Report bug) 10:40, 30 January 2018 (UTC)
WIKI
Talk:Street Marker Theft Street Marker Theft Sorry, but I don't think this article is helpful. Propose redirect to Street sign theft If you want a full debate, I can refer it to Redirects for discussion or to Articles for Deletion &mdash; Gaff ταλκ 15:58, 5 October 2014 (UTC)
WIKI
“Full Circle,” Ms. Lynn’s first new album since “Van Lear Rose” in 2004, is part of a huge trove of recent recordings. Loretta Lynn Mines a Legacy of Heartaches and High Notes HURRICANE MILLS, Tenn. — “I really didn’t mean to knock his teeth out.” Over a lunchtime bowl of chicken noodle soup in the glass-walled dining room of her modern, hillside mansion here, Loretta Lynn was recounting a scuffle she had with her hard-drinking husband a few years before she started writing and singing the succinct, forthright songs that made her the undisputed queen of country music. Her eyes, a brilliant star-sapphire blue, still blazed at the memory.
NEWS-MULTISOURCE
0 As my system updates to newer versions of certain libraries, monerod breaks every once in a while with errors among the likes of: monerod: error while loading shared libraries: libunbound.so.2: cannot open shared object file: No such file or directory I then recompile and the binary is back to a working state by having it realize that we're now at libunbound.so.8. In order to avoid that necessity, I'd rather statically link the entire binary (ending up with one big single file). A Stackoverflow answer on the topic suggests that success cannot be guaranteed, but maybe any of you has experience on this? Maybe there's an even better way to permanently solve this? (No "symlink the old name to the new lib and cross fingers" please) • I read somewhere that a static build may require that boost be compiled with -fPIC. – user1425 Sep 18 '18 at 13:08 1 More recently there are submodules in the Monero source tree, thus you must git submodule init && git submodule update from the root of a cloned repository. Then to link statically, make release-static. I'd suggest running make clean first if you have been trying and failing beforehand. | improve this answer | | 1 You can't make static monero binaries. The closest you can do is a dynamic build which links statically against most libraries, such as boost, etc. The Makefile has a number of predefined targets for this, called *static* (because close enough). For example: make release-static You'll still end with a few dynamic libraries, but a lot fewer. | improve this answer | | • This is a little misleading. When the linker is asked to perform static linkage, all user supplied libraries have to be static and thus linked into the resulting binary. Only some system libraries can be dynamically linked and most systems provide as many libs as possible as static libs on development systems. This is so you can create binaries that work on things like win 7 and 10 with one build. You end up with a binary that is portable amongst any same system (e.g. Windows x86-64) regardless of whether that system doesn't have any of your user supplied libraries, such as unbound. – jtgrassie Sep 23 '18 at 13:24 Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Richard Fröhlich Richard Georg Fröhlich (born 5 June 1986) is a German professional basketball player. He grew up in a small town called Oldendorf. The son of Georg and Vineta Fröhlich, he has 4 sisters; one of them, Linda Fröhlich, is considered the best women's player in Germany. Fröhlich, also called "Richie", played from 2006 to 2008 for head coach Rick Croy at Citrus College in Glendora, California. As a freshman, he averaged 4.1 points and 3.3 rebounds per game, shot 55.2 percent from the floor, and had 11 steals and seven blocks as a freshman. During Fröhlich's second year at Citrus College he averaged 6.9 points and 4.4 rebounds per game, blocked 22 shots and shot 55.9 percent from the field. He helped his team to a 35–1 record, the Western State Conference title, and the California Community College Athletic Association (CCCAA) championship. For his junior year, Fröhlich transferred to the University of Texas San Antonio, playing for former NBA player Brooks James Thompson. Fröhlich averaged 2.6 points and 2.3 rebounds in just 7.3 min a game. The Roadrunners made it to the 2009 State Farm Southland Conference Tournament Championship Game. Fröhlich averaged 2.2 points per game and grabbed 1.9 rebounds in 8.8 minutes during his senior season. His team went to the 2010 State Farm Southland Conference Tournament. For the 2010–2011 season Fröhlich signed his first professional contract with the Cuxhaven Bascats in the Basketball Bundesliga where he scored 5.2 points per game and had 3.e rebounds in 12 minutes. He scored 14 points in a game against Saar-Pfalz. For the 2011–2012 season Fröhlich signed with the Uni-Riesen Leipzig.
WIKI
Wikipedia:WikiProject Spam/LinkReports/lavanguardia.es Reporting statistics of link lavanguardia.es; 10 records. * lavanguardia.es resolves to <IP_ADDRESS> -. * Link is not on the blacklist. * Link is not on the blacklist. Reports COIBot reported 10 links. * 11:57:16, Mon Jan 25, 2010 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Cayetano_Galeote - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 03:03:46, Wed Jan 13, 2010 en:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - en:Deaths_in_2010 - diff (undo) - COIBot UserReport - en:Special:Contributions/<IP_ADDRESS>. * 10:23:16, Fri Jun 19, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Vicente_Ferrer_Moncho - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 14:06:29, Tue Jun 02, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Bhopal - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 14:05:08, Tue Jun 02, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Desastre_de_Bhopal - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 13:42:03, Mon May 25, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Adolf_Eichmann - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 08:48:52, Mon Apr 20, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Calle_de_Fuencarral_(Madrid) - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 12:16:54, Tue Mar 31, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) <IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>)) - es:Masacre_de_Puerto_Hurraco - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 15:14:56, Mon Mar 02, 2009 es:user:<IP_ADDRESS> <-> lavanguardia.es (0%/0%/0% - (server close) User IP close to IP of server of lavanguardia.es (<IP_ADDRESS> in close proximity of IP lavanguardia.es (<IP_ADDRESS>))) - es:Jack_el_Destripador - diff (undo) - COIBot UserReport - es:Special:Contributions/<IP_ADDRESS>. * 19:53:50, Wed Sep 10, 2008 es:user:Angus <-> lavanguardia.es (88.2%/35.71%/31.4% - calculated overlap Angus <-> lavanguardia.es) - es:Tiflis - diff (undo) - COIBot UserReport - es:Special:Contributions/Angus. Below a full report on all use of the link lavanguardia.es. LinkWatcher records: Too many linkwatcher records (3920 > 250)- ask database maintainer when data is really needed (data will then be dumped on Wikipedia talk:WikiProject Spam/LinkReports/lavanguardia.es).
WIKI
Blocking the Self-Destruct Program of Dopamine Neurons through Macrophage Migration Inhibitory Factor Nuclease Inhibition Research output: Contribution to journalArticlepeer-review Abstract Parkinson's disease (PD) is a progressive neurodegenerative condition that pathognomonically involves the death of dopaminergic neurons in the substantia nigra pars compacta, resulting in a myriad of motor and non-motor symptoms. Given the insurmountable burden of this disease on the population and healthcare system, significant efforts have been put forth toward generating disease modifying therapies. This class of treatments characteristically alters disease course, as opposed to current strategies that focus on managing symptoms. Previous literature has implicated the cell death pathway known as parthanatos in PD progression. Inhibition of this pathway by targeting poly (ADP)-ribose polymerase 1 (PARP1) prevents neurodegeneration in a model of idiopathic PD. However, PARP1 has a vast repertoire of functions within the body, increasing the probability of side effects with the long-term treatment likely necessary for clinically significant neuroprotection. Recent work culminated in the development of a novel agent targeting the macrophage migration inhibitory factor (MIF) nuclease domain, also named parthanatos-associated apoptosis-inducing factor nuclease (PAAN). This nuclease activity specifically executes the terminal step in parthanatos. Parthanatos-associated apoptosis-inducing factor nuclease inhibitor-1 was neuroprotective in multiple preclinical mouse models of PD. This piece will focus on contextualizing this discovery, emphasizing its significance, and discussing its potential implications for parthanatos-directed treatment. Original languageEnglish (US) Pages (from-to)644-650 Number of pages7 JournalMovement Disorders Volume39 Issue number4 DOIs StatePublished - Apr 2024 Keywords • Parkinson's disease; parthanatos; macrophage migration inhibitory factor ASJC Scopus subject areas • Clinical Neurology • Neurology Fingerprint Dive into the research topics of 'Blocking the Self-Destruct Program of Dopamine Neurons through Macrophage Migration Inhibitory Factor Nuclease Inhibition'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
We include products we think are useful for our readers. If you buy through links on this page, we may earn a small commission Here’s our process. Healthline only shows you brands and products that we stand behind. Our team thoroughly researches and evaluates the recommendations we make on our site. To establish that the product manufacturers addressed safety and efficacy standards, we: • Evaluate ingredients and composition: Do they have the potential to cause harm? • Fact-check all health claims: Do they align with the current body of scientific evidence? • Assess the brand: Does it operate with integrity and adhere to industry best practices? We do the research so you can find trusted products for your health and wellness. The inside of your knee can hurt for many reasons, but it is often due to a deterioration of cartilage. It can also follow a sports injury or other type of trauma to your knee. Knee pain is common and can be a symptom of many different knee conditions or injuries. The inside of your knee, also called the medial knee or the medial compartment, is the area of the knee that’s closest to your opposite knee. Your knee consists of the intersection of four bones, four ligaments, several tendons, two menisci, and cartilage. It is easily injured because it’s one of the most complex joints in the body. There are a variety of causes of inner knee pain. Many of them can be linked to an injury. Some of the most common incidents that cause knee injury and pain include falls, sports injuries, or increased activity. Adults — particularly those older than 60 — are most likely to experience knee pain. However, inner knee pain can also occur in children and adolescents. According to the American Academy of Family Physicians, the most common causes of inner knee pain in children are: Here are seven of the most common possible causes of inner knee pain. Osteoarthritis (OA) is a degenerative disease that breaks down cartilage, causing the bones in your joints to grind together. If you experience inner knee pain while putting pressure on your joint, such as when walking up and down stairs or sitting down in a chair, you may have OA. Because this pressure causes the pain, your symptoms may get more severe as the day goes on. Rheumatoid arthritis (RA) is an autoimmune disease that can also cause inner knee pain. RA causes inflammation in your joints, so people with RA may experience severe inner knee pain in the morning, with symptoms decreasing throughout the day. The medial collateral ligament (MCL) runs along the outside of your inner knee to stabilize the joint. If the ligament overstretches, you may have an MCL sprain. The MCL can also tear partially or fully. An MCL injury most commonly occurs after force is applied to the outer knee, such as in contact sports. Symptoms of an MCL injury include: The meniscus is cartilage that provides a cushion between bones in a joint. There are two menisci in each knee. They serve as cushions between your thigh and shin bones. Your meniscus can tear or become damaged if your knee is rotated or put under pressure, most commonly during sports or athletic activities. There are four major types of meniscus tears: Depending on the severity of the injury, you may also feel: A bursa is a small, fluid-filled sac that helps reduce friction between joints. There are several bursae located throughout your body. Bursae are also located in your knees between the MCL and three tendons: the sartorius, gracilis, and semitendinosus. They’re collectively called the pes anserinus. If the bursa becomes overused or irritated, it can produce extra fluid that causes swelling and pressure on your knee. This inflammation is known as pes anserine bursitis. According to the American Academy of Orthopaedic Surgeons, there are several causes of pes anserine bursitis: Plica are small folds in the joint lining. Medial plicae cover your inner knee. Overuse, such as from repeatedly flexing your knee, can irritate the medial plicae. This causes the folds to thicken and become stuck between the bones. In addition to dull inner knee pain, you may experience locking knees and possibly a cracking sound. Learn more about plica syndrome. If you suffer a direct blow to your knee, such as a being hit by a blunt object or falling hard, you could bruise your knee bone. This is also known as a knee contusion. A knee contusion could cause inner knee pain, depending on where you were hit. Other symptoms of knee contusions include: Knee injuries are fairly common, and many can be resolved at home. If you have symptoms for more than three days, you may have a more serious injury and should visit a doctor. Doctors may recommend more involved treatment methods depending on the cause of your pain. Home remedies Minor knee pain is very common and can often be treated at home. One of the most common remedies for minor knee pain is rest, ice, compression, and elevation, or RICE. Try the following RICE methods: • Avoid the activity that causes you pain. • Use crutches to keep weight off your knee. • Ice the area three or four times per day for 20 minutes at a time. • Wrap your knee using an elastic compression bandage. • Place pillows underneath your knee to elevate it to the same level or higher than the level of your heart. You may also take nonsteroidal anti-inflammatory drugs such as ibuprofen (Advil) to alleviate swelling. If symptoms persist after three days despite this treatment or if your pain worsens, talk to your doctor. Other inner knee pain treatments If your inner knee pain worsens after several days, or if basic at-home remedies don’t alleviate symptoms, you should go see your doctor. Some treatment methods for more serious knee injuries include: While not all causes of inner knee pain are preventable, doctors and physical therapists recognize strengthening the leg muscles, specifically the quadriceps and hamstrings, as one of the most effective ways to treat and prevent knee injury. According to a 2008 study from the University of Minnesota’s department of orthopaedic surgery, helpful exercises include: In addition, you should always begin and end exercising of any kind with stretching all the muscles involved, especially the quadriceps and hamstrings. Check out these quad and hamstring exercises to strengthen bad knees.
ESSENTIALAI-STEM
Skip to main content CASE Statements in PostgreSQL In this tutorial, you'll learn how to write conditional queries in PostgreSQL using the PostgreSQL CASE conditional expression. Apr 2019  · 7 min read Conditional expressions are one of the most fundamental elements of any programming paradigm. Common conditional expressions include if-else blocks and switch cases. You can formulate conditional expressions in PostgreSQL using WHEN-THEN case which is very similar to if-else blocks. In this tutorial, you will learn how to do this. Before you start writing condition queries, it is important that you set up a local PostgreSQL database. You will do this in the first section of this tutorial. Note: To be able to follow along with this tutorial you need to know the basics of SQL and PostgreSQL. Feel free to refresh the basics with the following resources: Setting up a PostgreSQL database locally You can use this backup file and restore it in your PostgreSQL server. If you want to know how to do this, you can follow this article. After you successfully restore the backup, you should be able to see these tables in the database - • countries • route_table • station_table • train_table This tutorial, however, only uses the countries table. Feel free explore the tables provided in the database backup. Also, you may want to form your own databases and tables. You should have a table (populated with the details about different countries around the globe) by now if you restored the database backup. Let's now explore the countries table very briefly. Exploring the countries table very briefly After restoring the database, you can view the table in the pgAdmin interface which comes with the default installation of PostgreSQL. Upon running a simple SELECT statement, you get to know about the columns, their data-types and also the rows the table is containing - database The table contains details about a total of 206 different countries from various regions of the world. How many regions exactly? The below query should give you the answer to the question. SELECT COUNT(DISTINCT(region)) from countries; It turns out that there are 23 different regions covered in this table such as Western Europe, Polynesia, the Middle East and so on. You can explore the table with your own quick questions, and along the way, you may find out interesting facts. Let's now see the anatomy of a basic PostgreSQL CASE. Introduction to PostgreSQL CASE The following describes the general form of a PostgreSQL case with WHEN-THEN construct - CASE WHEN condition_1 THEN result_1 WHEN condition_2 THEN result_2 ... ELSE result_n END Here are some critical points that you should keep in mind while constructing CASEs in PostgreSQL: • Each condition is a boolean expression and based on its output the result is chosen. If all the expressions corresponding to WHEN are evaluated to be False, then the result respective to the ELSE part is shown. In case, you don't specify the ELSE part; the query will return null. • A condition is generally applied on a column that is present in the table you are operating on. Conditional query constructs like the above are typically done with SELECT statements. Keep in mind that, the column must be present in the SELECT statement of your query, on which you are specifying the boolean expressions (in CASE). But when you are using CASE in pair with a where clause, you need not to follow this (more on this later). • The data-type of the results has to be uniform. You cannot return a string in result_1 and an integer in result_2 and so on. Let's dig into some examples now. Writing PostgreSQL CASEs Let's start simple. You will now write a CASE to group the countries with respect to the independence year. Independence years are recorded in the indep_year column. Let's say you have three groups of independence years of the countries which you need to follow. You will create three groups of independence years for this - • Before 1900 (indep_year < 1900) • Between 1900 and 1930 (indep_year <= 1930) • After 1930 (indep_year > 1930) The final result of the query should contain the following columns - • name (of the country) • continent (to which the country belongs) • indep_year • And the independence years' group that you will create. Let's name that as indep_year_group. Let's now write the query - SELECT name, continent, indep_year, CASE WHEN indep_year < 1900 THEN 'before 1900' WHEN indep_year <= 1930 THEN 'between 1900 and 1930' ELSE 'after 1930' END AS indep_year_group FROM countries ORDER BY indep_year_group; (The query is inspired from DataCamp's Joining Data in SQL course.) Upon executing the query, you will see many countries like Palestine, Puerto Rico, etc. for which no independence year is provided in the table. Hence they got between 1900 and 1930 group. PostgreSQL CASEs can have multiple conditions. There are a handful of entries in the table where the name of country and capital is the same. You can add this to your previously constructed CASE - SELECT name, continent, indep_year, CASE WHEN (indep_year < 1900) AND (countries.name = countries.capital) THEN 'before 1900 and capital same' WHEN indep_year <= 1930 AND (countries.name = countries.capital) THEN 'between 1900 and 1930 and capital same' ELSE 'after 1930_and_no_same_capital' END AS indep_year_group FROM countries ORDER BY indep_year_group; Another exciting thing about CASEs is that you can pair them with aggregate functions like SUM(). To implement a CASE with the aggregate function SUM(), you will need a different table where this might be a good idea. Let's create a simple table named student_grades having the following columns and data-types - • student_name (string) • student_stream (string) • student_grade (character) The following query creates the table for you - CREATE TABLE student_grades (student_name character varying, student_stream character varying, student_grade character); Let's insert some records into the table now. You can do this using a few INSERT statements. Let's say after the insertions, the table student_grades now has the following records - table Now, you will write a CASE to get the sum of the students that belong to certain grade groups. As you can see, according to the instances of the table, there are three distinct grades - A, B and C. The conditional query should return an output similar to the following - table The query for this - SELECT SUM ( CASE WHEN student_grade = 'A' THEN 1 ELSE 0 END ) AS "High Scoring", SUM ( CASE WHEN student_grade = 'B' THEN 1 ELSE 0 END ) AS "Mid Scoring", SUM ( CASE WHEN student_grade = 'C' THEN 1 ELSE 0 END ) AS "Low Scoring" FROM student_grades; This is how you can pair up CASE with aggregate functions to come up with interesting facts about the data. Conclusion and further reading That is all for this tutorial. In this tutorial, you learned how to incorporate if-then like conditioning into your SQL queries to come with interesting reportings. You worked through several examples to strengthen this skill. If you are looking for more challenging exercises, you should take the following DataCamp courses on SQL - Feel free to let me know your questions on this tutorial via the Comments section. Intermediate SQL Queries Beginner 4 hours 1,485,125 Master the basics of querying tables in relational databases such as MySQL, SQL Server, and PostgreSQL. See DetailsRight Arrow Start Course SQL for Joining Data Beginner 5 hours 353,321 Join two or three tables together into one, combine tables using set theory, and work with subqueries in PostgreSQL. Exploratory Data Analysis in SQL Beginner 4 hours 70,363 Learn how to explore what's available in a database: the tables, relationships between them, and data stored in them. See all coursesRight Arrow Related Data Science Concept Vector Image How to Become a Data Scientist in 8 Steps Find out everything you need to know about becoming a data scientist, and find out whether it’s the right career for you! Jose Jorge Rodriguez Salgado's photo Jose Jorge Rodriguez Salgado 12 min What is SQL Used For? 7 Top SQL Uses Discover the uses of SQL in industries and specific jobs. Plus, learn why the SQL language is so versatile and in demand. Natassha Selvaraj's photo Natassha Selvaraj 11 min DC Data in Soccer Infographic.png How Data Science is Changing Soccer With the Fifa 2022 World Cup upon us, learn about the most widely used data science use-cases in soccer. Richie Cotton's photo Richie Cotton SQL Window Functions Cheat Sheet With this SQL Window Functions cheat sheet, you'll have a handy reference guide to the various types of window functions in SQL. DataCamp Team's photo DataCamp Team 10 min COALESCE SQL Function COALESCE() is one of the handiest functions in SQL. Read this tutorial to learn how to master it. Travis Tang 's photo Travis Tang FORMAT() SQL FUNCTION FORMAT() is one of the most commonly used functions in SQL. Learn its main applications in this tutorial. Travis Tang 's photo Travis Tang See MoreSee More
ESSENTIALAI-STEM
Vitaliy Koval Vitaliy Stanislavovych Koval (Віталій Станіславович Коваль; born 28 July 1981 in Berezne, Rivne oblast) is a Ukrainian entrepreneur and politician. Vice-president of the Ukrainian Wrestling Association. Member of the National Olympic Committee of Ukraine. Head of the Rivne Regional State Administration from September 9, 2019 to November 23, 2023 as Governor of Rivne Oblast. Head of the State Property Fund of Ukraine since 21 November 2023 Biography In 2003, he graduated from Ternopil National Economic University. In 2017, received an MBA from the Lviv Business School of the Ukrainian Catholic University. Koval worked in the banking sector (2004—2006). 2006—2019 – headed enterprises in agriculture, transport and construction. 2004–2006 – in the credit department of OJSC Ukrgasbank. From 2008 to 2009 he was the director of Probank Consult LLC, Vyshneve (Kyiv region). 2012–2014 – General Director of Investtradeservice LLC, Kyiv. Since 2014 – General Director of Sanako LLC (Kyiv), since 2015 – General Director of BBB Montazh (Kyiv). Candidate for Master of Sports in Greco-Roman Wrestling. He heads the public association "Rivne Regional Federation of Greco-Roman Wrestling". First Vice-President of the All-Ukrainian Federation of Greco-Roman Wrestling. He is a member of the National Olympic Committee of Ukraine. Vitaliy Koval is the Deputy chairman of the board of the All-Ukrainian Road Association. On September 9, 2019 Koval was appointed Governor of Rivne Oblast. Koval has also been a candidate to be the mayor of Rivne as a member of the Servant of the People party. On 21 November 2023 Koval was appointed Head of the State Property Fund of Ukraine. Two days later he was formally dismissed as Governor of Rivne Oblast. Koval is married and has two daughters.
WIKI
Page:Tacitus; (IA tacituswilliam00donnrich).pdf/103 Rh deal with politics. In the forms and ceremonies of his high office, he was doubtless properly instructed; since, had he displayed ignorance of them, the Roman wits and scandal-mongers would not have failed to note it, and to make Rome merry at the mistakes of its Cæsar. In his "five good years" Nero indeed seems to have taken some part in business, and even to have exhibited generous instincts in his care for his people. Any dream, however, of an amiable character in Nero soon vanished; and his father's prophecy at his birth—that "his and Agrippina's offspring could be nothing but a monster"—was amply fulfilled. We can afford space for only a very brief summary of the events in a reign of fifteen years. Peaceful years they were not, like those in general of Claudius. There were disturbances in Britain: the Parthians were again in the field, though they were humbled in the end, and their king Tiridates was compelled to acknowledge himself a vassal of the empire. He came to Rome: he had a magnificent reception there; and took his diadem from Nero's hand. But Corbulo, a faithful and conscientious as well as brave and succesfulsuccessful [sic] general, was ill repaid for his victories. He anticipated by self-destruction the death Nero had prepared for him. The fire which destroyed two-thirds of the city is scarcely less familiar to English readers than the great fire of London. The Golden Palace which Nero built on the ruins of Rome is also too famous for mention; and the so-called first persecution of the Christians adds to the interest of the period. Nero's follies seem to have caused more indigna-
WIKI
When to Worry About a Cough That Won’t Go Away By | January 31, 2019 How to know if you have cough-variant asthma Top view of a close up of the hands of a female doctor is inserting a pressurized cartridge inhaler into an inhalation chamber on a medical demonstration on her desk - Medical respiratory disease Click and Photo/Shutterstock What It Is: “Asthma occurs when something triggers the airways to get inflamed,” says Dr. Rho. “It is usually a dry cough that causes your airways to narrow. Symptoms can include a recurrent cough, wheezing, and shortness of breath.” What Causes It: There are two causes of asthma: Allergies or a non-allergic response to stress, exercise, or illness. Treatment: If you suspect that you have asthma, you may need to undergo breathing tests; your doctor may suggest you try out an inhaler. Plus, anyone with asthma will want to be eating this one food. You may have postnasal drip Businesswoman with a seasonal winter fever and chill blowing her nose on a white handkerchief as she sits in the shadows in her officestockfour/Shutterstock What It Is: This is also known as upper-airway cough syndrome. “It feels like exactly how it sounds—something may be dripping down from your nasal passage into the throat, constantly irritating your epiglottis and vocal cords and causing a cough,” says Dr. Rho. It may be a more wet cough, as your body is producing more mucus. What Causes It: “It can be caused by a virus, bacterial sinusitis, or a number of allergies, including seasonal allergies like hay fever, that cause watery, itchy eyes, and a runny nose,” says Dr. Rho. These are the 10 reasons you can’t stop sneezing. Treatment: There are a number of treatments for postnasal drip. “You can use a number of treatments, including nasal irrigation, saline rinses, or a Neti pot. There are many OTC nasal sprays, antihistamines (like Benadryl, Zyrtec, or Allegra). You could also use a nasal steroid like Flonase, says Dr. Rho. You may have GERD Chilli pepper close up on wood desk. Food backgroundOleksandr Rybitskiy/Shutterstock What It Is: It stands for gastroesophageal reflux disease; it’s basically a severe form of heartburn. “The stomach’s acid secretions can back up from your stomach into the esophagus, mouth, and epiglottis, and that triggers a cough,” says Dr. Rho. You may taste something sour in the back of your mouth or burning regurgitation. What Causes It: Spicy or fried foods, caffeine, chocolate, alcohol, foods high in citrus, like some fruits and tomatoes. “You may also notice it if you lay down immediately after eating,” says Dr. Rho. “There’s another type called silent reflux, in which you reflux all the time regardless of eating.” Treatment: Modify your diet by minimizing the foods that trigger symptoms, says Dr. Rho, and eat at least three hours before bedtime. OTC heartburn medications or prescription medications may also help. These are the foods people with GERD should avoid. Article Source: Reader's Digest
ESSENTIALAI-STEM
The Importance of Resilient Materials in Securing Sustainable Nuclear Energy: Sustainable Technology for Engineering By Kok Boon CHONG Fossil fuels dominate the global energy sector, contributing 42 percent of all the carbon emissions for the year 2015 alone, a trend that is likely to persist into the future. As such, given the massive amount of greenhouse gases pumped into the environment, it is almost certain that the targets set for the Paris Agreement will not be achieved if countries fail to adopt, more rapidly, the low carbon technologies as replacement to the current dominant source of energy: the cheap but dirty fossil fuels. In our efforts to decarbonize our energy mix, we have to closely consider multiple low-carbon energy technologies in order to ensure that we maintain energy security, economic viability, environmental concerns, as well as public health and safety. We should be aware however, that while renewables should be heavily emphasized in growth, renewables alone might not fit all our energy demands. Therefore, nuclear energy is a necessary consideration to drive the deep de-carbonization of the energy sector. As one of the currently available technologies for power generation, nuclear fission is an energy source that is capable of supplying massive amounts of energy at a high capacity factor (a factor of average energy output over time, compared to the maximum possible output). In the absence of rapid breakthroughs in the field of environmentally-friendly energy storage, nuclear energy will be required in the energy mix. However, to maintain nuclear energy as part of the energy mix requires a comprehensive set of technical knowledge and expertise, as well as strict regulations and policy. Therefore, even the pettiest detail involved in its deployment is important for increasing the safety margins of the reactors producing the needed power. Hence, the study described here is part of an ongoing research for future Generation IV reactors, which include reactor designs with potential for commercial applications. Among the objectives aspired towards are improved safety, better sustainability, increased efficiency and lower cost. Nuclear reactor applications such as fuel cladding (outer containment for nuclear fuel rods) or fuel channel commonly utilize zirconium (Zr) alloys, materials that exhibit a low neutron absorption cross section (important for increasing safety margin during the shutdown of the nuclear reactor) as well as high mechanical strengths and corrosion resistance. This study aims to improve the service duration of the Zr cladder. The goal is not limited to increasing the life span of the nuclear reactor or improving efficiency, but would also reduce the associated environmental issues, especially the high radon emission from loss-of-coolant accidents exemplified by the Fukushima Daiichi Nuclear Power Plant in 2011. Corrosion in zirconium alloy is a complex electrochemical process influenced by many factors, including the properties of the metal/oxide interface, water chemistry, pressure, irradiation, and time. Tracking the results of the corrosion will aid in the development of slow-corroding alloys required for improving the management of fuel burnup, as well as the efficiency and safety features of the nuclear reactors. Therefore, a study (discussed in the publication below) was made to offer a mechanistic explanation of the interplay between the few essential parameters associated with the corrosion process required for advancing the development of the alloys for sustaining a safer production of nuclear energy. The study divulges the direct evidence between the probed stress-field and “breakaway” transition in the Zr cladder under the harsh environment inside the reactor, where the ‘’breakaway’’ transition will lead to fuel failure because of the dissipation of the radon gas from the fuel container into the cooling reservoir. Presently, the practice of the nuclear energy industry is to allow for one fuel failure for every one million fuel pin. However, such a failure is not easily predictable, as that requires the exercising of a rather cumbersome in-services reactor inspection, which makes for an extremely challenging situation when predicting the lifetime of the fuel cycle needed for maximizing the economics of nuclear energy without compromising on safety. The study contributes to working around this problem, as an engineer can use the results to improve reliability in the prediction of the lifetime of the nuclear fuel technology through improved design of the alloys deployed in nuclear reactor technology. The original publication "Evolution of stress fields and phase content in corroded zirconium cladding materials" could be found in the Surface and Coatings Technology journal. The article presents a mechanistic explanation of the corrosion process from early to late stage.
ESSENTIALAI-STEM
Analyst on Viacom drama: 'This needs to end' As Viacom's businesses show signs of struggle, analysts told CNBC it's time for the behind-the-scenes drama to end. "It's having an impact right now, all this noise," Barton Crockett, research analyst at FBR Capital Markets, told CNBC's "Squawk on the Street " on Friday. "This needs to end before the wheels fall further off the bus." Viacom said Friday its fiscal third-quarter earnings will fall short of projections, as the company's film division struggled amid management turmoil within the company. Sumner Redstone, the company's controlling shareholder, moved to fire CEO Philippe Dauman and four other directors from Viacom's board Thursday, in the latest in a string of disputes among the board. Meanwhile, Paramount's "Teenage Mutant Ninja Turtles" film franchise didn't perform as planned at the box office, the company told investors. "There's no doubt that Viacom has been an underperformer," Crockett said. "What people are seeing here is you can have a better performance, I think, with better management. Certainly what's happening with the governance dispute right now didn't help." Viacom's laggard film businesses seem to be hit hardest, said Wedbush Securities media analyst James Dix. Redstone has tried to block the sale of a minority stake in Paramount, while Dauman, who is still CEO as the court handles the case, has advocated for the sale. "It seems harsh to blame it all on 'Turtles,'" Dix told "Squawk on the Street" on Friday. "But yeah, it seems like it's primarily the film segment. They actually gave an update, their advertising business seems to be OK, in line with what people were looking for." Despite Viacom's chopped-down guidance, BTIG analyst Rich Greenfield upgraded its shares to buy Friday, citing the management change if Dauman is successfully removed. "Viacom has really lost its mojo over the course of the last decade under Dauman, and I think the reality is they need someone that talent trusts," Greenfield told CNBC's "Fast Money Halftime Report " on Friday. "I think fresh blood is certainly needed." With misfire after misfire from Paramount's highly paid executives, Greenfield said the company needs to reset creatively and reconnect with the millennial generation. "I think you don't sell Paramount now, I think you work on improving it," he said. A merger with CBS under Les Moonves has been suggested as a solution for Viacom, a move that would shield the company's turnaround from the scrutiny of cable providers, Greenfield said. But it's unclear if Moonves, or other similarly qualified executives, would want the job, Dix said. Indeed, the company could be broken up, rather than united under one white knight, Crockett said. Still, Greenfield contends, some changes at the top are likely either way. "We've been waiting for clear and decisive action, and I think that's exactly what we're getting now," Greenfield said. "Really, Philippe Dauman cannot win. The current board cannot win." Shares of Viacom are down nearly 34 percent over the past year. Disclosure: FBR Capital Markets owns more than 1 percent of Viacom stock and Viacom is an investment banking client of FBR.
NEWS-MULTISOURCE
Winters v. Ethell/Opinion of the Court This is a suit brought in the district court of the second judicial district of Idaho territoty, in and for the county of Alturas, by George F. Settle and Jacob Reeser against John B. Winters, Frank Ganahl, and John Winkelbach. The complaint alleges that the plaintiffs, being the owners of a mining property, licensed the defendants to work it on the terms and conditions expressed in a written agreement and a supplemental agreement, for a definite period; that, under the agreement, the defendants were to work the mine during that period at their own expense, keep the property free from liens, and pay to the plaintiffs, as a consideration, one-half of the gross proceeds from the mine; that, if the defendants should pay to the plaintiffs, on or before November 27, 1883, the termination of the said period, out of the proceeds of the mine, or otherwise, $40,000, the plaintiffs should convey the property to the defendants; that, in the event of such payment by the defendants to the plaintiffs within the time specified, any and all sums theretofore received by the plaintiffs from the defendants as consideration for the use and working of the mine should be credited upon and deducted from the $40,000; that, if the defendants should fail to comply with any of their agreements, or should not, on or before the day named pay the $40,000 to the plaintiffs, they should forfeit all rights under the agreement, and no longer work the property; that the defendants proceeded to work the mine, and continued, during the period mentioned, to extract large quantities of gold and silver ore from it; that, on the 24th of November, 1883, the agreement was extended, in writing, to December 27, 1883; that the defendants had paid to the plaintiffs only $21,000 out of the $40,000, which sum was realized out of the working of the mine, and was not in excess of the one-half of its gross proceeds; that the defendants were continuing to work the mine, and were insolvent, and, during the 30-days extension of time, had extracted and removed large quantities of ore, for which they had failed to account to the plaintiffs; and that the defendants threatened to continue to extract the ore. The prayer of the complaint is for an injunction restraining the defendants during the pendency of the suit, and also by a final order on the hearing, from entering upon on interfering with the possession of the property, or from extracting or removing from the mine any rock or ore, and for an accounting by the defendants with the plaintiffs concerning all rock or ore taken from the mine by the defendants, and for the payment by them to the plaintiffs of a moiety thereof; and that the amount found to be due to the plaintiffs upon such account be decreed to be a lien upon all rock or ore remaining in the hands of the defendants. After a demurrer to the complaint had been overruled, the defendants put in an answer to it. They also filed a cross-complaint, praying that the plaintiffs might be decreed specifically to execute and perform their contract to convey the property to the defendants, on receiving from them the remainder of the purchase money which might be equitably due therefor, and for an injunction, to be made perpetual on the hearing, restraining the plaintiffs from interfering with the possession by the defendants of the mining claim, and the works and openings leading thereto. This cross-complaint was answered by the plaintiffs, and the case was tried by the court on evidence, oral or documentary, adduced by the respective parties. It made certain findings of fact and conclusions of law, and entered a decree adjudging that the defendants be enjoined perpetually from entering upon or interfering with the possession of the mining claim mentioned in the complaint, and that the plaintiffs were entitled to an accounting with the defendants of and concerning all rock and ore taken from the mine by the defendants during the term mentioned, and not already accounted for, and referring it to a referee to take and state such account. The decree further adjudged that the defendants take nothing by their cross-complaint; that it be dismissed; that they were not entitled to any order restraining the plaintiffs from the enjoyment of the premises, prior to or pending any appeal that might be taken; and that the plaintiffs recover from the defendants their costs. On an appeal by the defendants to the supreme court of the territory from that judgment it was affirmed. The defendants have brought the case here by appeal, and briefs have been filed by both parties on the merits. But we are of opinion that the decree was not a final one, and is not appealable. The judgment of the supreme court simply affirmed the judgment of the district court. As regards the relief sought by the plaintiffs, the latter judgment merely enjoined the defendants, and ordered an accounting by them before a referee concerning the rock and ore taken by them from the mine. The bill prays for such injunction and for such accounting, and for the payment to the plaintiffs of what shall be found due to them upon such accounting. In this respect, the decree is of the same character as that considered by us in Iron Co. v. Martin, ante, 32, (decided November 11, 1889,) where the decree was held not to be final or appealable. Nor does it make any difference that the decree in the present case dismisses the cross-complaint of the defendants. The filing of the cross-complaint was not the institution of a separate suit, but grew out of the original complaint. There was but a single decree, and that was entitled in the original suit. The right of the defendants to appeal from the decree, so far as their cross-complaint is concerned, will be preserved; and time will run against them, as to all parts of the present judgment of the district court, only from the time of the entry of a final decree after a hearing under the accounting which is to be had. Ayers v. Chicago, 101 U.S. 184, 187. Appeal dismissed.
WIKI
10 Feedback Company from 5 reviews Using Leafspy for the Nissan Leaf By Roel Klein - 13 Feb 2023 LeafSpy is an app designed specifically for Nissan LEAF electric vehicles. The app provides owners with real-time data and information about their vehicles, including battery health, power consumption and driving efficiency. The app connects to the vehicle's on-board diagnostic (OBD-II) system, which provides access to a wide range of information about the vehicle's performance and health. LeafSpy allows owners to monitor their vehicles' performance and make adjustments to improve efficiency, range and battery life. The app also provides alerts for problems that may affect vehicle performance, such as low battery charge or high battery temperature. LeafSpy also offers additional features, such as the ability to log data for later analysis and access to an online community of Nissan LEAF owners. LeafSpy is a useful app for Nissan LEAF owners who want to get the most out of their vehicle and stay informed about its performance and health. Below you can find an overview of the most frequently asked questions about LeafSpy: 1. Is LeafSpy trustworthy? 2. How do I use LeafSpy with my Nissan LEAF? 3. Does LeafSpy void the warranty on my vehicle? 4. Can LeafSpy increase the range of my LEAF? 5. Can LeafSpy be used with other electric vehicles? 6. What information does LeafSpy provide about my vehicle's battery? 7. How does LeafSpy access the vehicle's on-board diagnostic system? 8. Can LeafSpy be used to diagnose problems with my LEAF? 9. How much does LeafSpy cost? 10. What is the difference between the free and paid versions of LeafSpy? These are some of the most frequently asked questions about LeafSpy. If you have other questions or would like more information, feel free to ask one of our experts via the contact page. Is LeafSpy trustworthy? LeafSpy is widely regarded as a reliable app for Nissan LEAF owners. It provides accurate information about vehicle performance and health, and it is widely used by Nissan LEAF owners around the world. However, as with any app or technology, it is possible for LeafSpy to have bugs or glitches that affect performance. It is important to check regularly for updates to ensure the app works as intended. How do I use LeafSpy with my Nissan LEAF? To use LeafSpy with your Nissan LEAF, you must connect the app to the vehicle's on-board diagnostic (OBD-II) system. You do this by connecting a compatible OBD-II adapter to the vehicle's OBD-II port, such as an OBDLink MX+, and then connecting the adapter to your smartphone or tablet. Once connected, LeafSpy will automatically access the vehicle's diagnostics and provide information about the vehicle's performance and health. Does LeafSpy void the warranty on my vehicle? Using LeafSpy should not void your vehicle's warranty. However, it is always a good idea to contact your Nissan LEAF dealer to be sure. Additionally, if you use LeafSpy to modify your vehicle in a way that affects performance or reliability, your warranty may be affected as a result. Can LeafSpy increase the range of my LEAF? LeafSpy can help you improve the efficiency of your Nissan LEAF, which can result in increased range. By monitoring your car's performance and using LeafSpy's information, you can adjust your driving style, energy consumption and charging habits to maximize the car's range. Can LeafSpy be used with other electric vehicles? LeafSpy is designed specifically for Nissan LEAF electric vehicles and does not work with other electric vehicles. If you have another electric vehicle, you may need to find another app or tool to access on-board diagnostic information, an example being Hybrid Assistant for Toyota or the ABRP (A better Routplanner) for several brands. What information does LeafSpy provide about my vehicle's battery? LeafSpy provides detailed information about your Nissan LEAF's battery, including battery health, charge status, capacity, voltage, temperature and more. The app also provides alerts for problems that may affect battery performance, such as low battery charge or high battery temperature. How does LeafSpy access the vehicle's on-board diagnostic system? LeafSpy accesses the vehicle's on-board diagnostic system through a compatible OBD-II adapter that plugs into the vehicle's OBD-II port. The adapter provides a connection between the vehicle's diagnostic system and the LeafSpy app on your smartphone or tablet. The best adapters to use for LeafSpy are OBDLink adapters. Can LeafSpy be used to diagnose problems with my LEAF? LeafSpy can be used to diagnose certain problems with your Nissan LEAF by providing information about the vehicle's performance and health. However, it is not a substitute for a professional diagnosis by a qualified mechanic or Nissan LEAF dealer. How much does LeafSpy cost? The cost of LeafSpy depends on the version you choose. The free version provides basic information about the performance and health of your Nissan LEAF, while the paid version offers more detailed information and additional features. The cost of the paid version is usually around $20-$30. What is the difference between the free and paid versions of LeafSpy? The main difference between the free and paid versions of LeafSpy is the amount of information and features. The free version provides basic information about the performance and health of your Nissan LEAF, while the paid version offers more detailed information and additional features. Some of the additional features of the paid version include: detailed battery information, real-time driving statistics, the ability to log data for later analysis, and access to an online community of Nissan LEAF owners. The paid version also includes regular updates and support, while the free version receives updates or support less frequently. Whether you choose the free or paid version depends on your needs and the level of information and features you want to use. Leafspy screenshots Leafspy screenshots
ESSENTIALAI-STEM
User:Fconteh02/Access control https://dl.acm.org/doi/pdf/10.1145/3422337.3450324 https://dl.acm.org/doi/pdf/10.1145/3445969.3450426 Lead Access control should be applicable with smart home devices due to the increased adoption and usage of Smart IoT devices. In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. Locks and login credentials are two analogous mechanisms of access control. The advancement in technology and the increased rate of cyber attacks against organizations including critical infrastructure and services has transformed the concept of access control be it physical or virtual.
WIKI
Code covered by the BSD License   Highlights from Huygens-Fresnel integral approximation, free-form apertures and rough surfaces image thumbnail Huygens-Fresnel integral approximation, free-form apertures and rough surfaces by   Simulate wave propagation through free-form apertures, or off rough surfaces. matrix2Vector(X, Y, Z) function B = matrix2Vector(X, Y, Z) % matrix2Vector - reshape three m-by-n matrices to a 3-by-(m*n) vector % % B .... grid, [xi;yi;zi] with (m*n) columns % X/Y/Z .... [m n 3] matrix with x/y/z-coordinates p.inputParser; p.addOptional('X', [], @isnumeric); p.addOptional('Y', [], @isnumeric); p.addOptional('Z', [], @isnumeric); p.parse(X, Y, Z); if ~isempty(p.Results.X) B(1,:) = reshape(X, 1, numel(X)); end if ~isempty(p.Results.Y) B(2,:) = reshape(Y, 1, numel(Y)); end if ~isempty(p.Results.Z) B(3,:) = reshape(Z, 1, numel(Z)); end Contact us  
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 80 Part 2.djvu/141 80 STAT.] PROCLAMATION 3687-NOV. 10, 1965 ished their ranks. Their shelter was crude. Their future was uncertain. Yet when their harvest was abundant, they considered themselves blessed—and their hearts were filled with gratitude. Today we have much more than an abundant harvest. Our nation is rich and strong and united in the cause of liberty and justice. Our physical comforts are unmatched anywhere in the world. Our medicine has conquered ancient diseases. I n the past year we have added greatly to that national legacy. We have guaranteed the right to vote to all our citizens. We have pledged dignity to our elderly—even in sickness. We have added new dimensions to the education of our youth. We have broadened the horizons of opportunity for our poor. And all the while, we have enjoyed the greatest prosperity in history. But our real blessings lie not in our bounty. They lie in those steadfast principles that the early Pilgrims forged for all generations to come: the belief in the essential dignity of man; the restless search for a better world for all; and the courage—as shown by our sons in Viet-Nam today—to defend the cause of freedom wherever on earth it is threatened. These are the eternal blessings of America. They are the blessings which make us grateful even when the future is uncertain. They are the blessings which give us the strength to complete the unfinished tasks that remain before us. For these blessings should we thank God most of all. NOW, THEREFORE, I, LYNDON B. JOHNSON, President of the United States of America, in consonance with the joint resolution of the Congress approved December 26, 1941, 55 Stat. 862 (5 U.S.C. 87b), designating the fourth Thursday of November in each year as Thanksgiving Day, do hereby proclaim Thursday, November 25, 1965, as a day of national Thanksgiving. On that day, let us gather in our homes and in our places of worship to thank God for His generosity. Let us make ourselves worthy of that generosity by pledging to Him our everlasting devotion. And let us pray to Him that the forces of violence, indifference and intolerance may soon vanish from the face of the earth so that peace and understanding and love may reign supreme. I N W I T N E S S WHEREOF, I have hereunto set my hand and caused the Seal of the United States of America to be affixed. D O N E at the City of Washington this tenth day of November in the year of our Lord nineteen hundred and sixty-five, and [SEAL] of the Independence of the United States of America the one hundred and ninetieth. LYNDON B. JOHNSON By the President: DEAN R U S K, Secretary of State. 1735 �
WIKI
• Resonance phenomena and long-term chaotic advection in Stokes flows Vainchtein, Dmitri; Cohen, Richard; Won, Chang-Hee, 1967- (Temple University. Libraries, 2011) Creating chaotic advection is the most efficient strategy to achieve mixing in a microscale or in a very viscous fluid, and it has many important applications in microfluidic devices, material processing and so on. In this paper, we present a quantitative long-term theory of resonant mixing in 3-D near-integrable flows. We use the flow in the annulus between two coaxial elliptic counter-rotating cylinders as a demonstrative model. We illustrate that such resonance phenomena as resonance and separatrix crossings accelerate mixing by causing the jumps of adiabatic invariants. We calculate the width of the mixing domain and estimate a characteristic time of mixing. We show that the resulting mixing can be described in terms of a single diffusion-type equation with a diffusion coefficient depending on the averaged effect of multiple passages through resonances. We discuss what must be done to accommodate the effects of the boundaries of the chaotic domain.
ESSENTIALAI-STEM
How and why did castles change from 1066 to 1550? The developments of castles have occured over time, gradual change and improvements to their design and purpose. Changes in construction materials of castles and also in the shape and design, the defensive structure, weaponry or the location of castles have occurred in order to improve them for their needed purpose. Castles were built across Britain from 1066 to 1600 in order to either protect from foreign warriors or local rebellion, to control the local area, as a form of presenting status or even just as comfortable and safe homes for the rich. The earliest castles built were the Motte and Bailey castles built from 1066 to 1100 by the Normans. Motte and Bailey castles were a common feature in England by the death of William the Conqueror in 1087. Their construction was the start of what was to become a massive castle building programme in England and Wales. The earliest Motte and Bailey castles were simply a wooden blockhouse placed on a mound and surrounded by a stockade hence the term of Motte and Bailey castles. The rapid construction of the Motte and Bailey castles enabled the Normans to control and subjugate the conquered English. Norman soldiers manned the Motte and Bailey castles and were able to take on any attackers. The wooden Norman Castle was also used to safely store supplies and equipment together with their horses. They were built due to the fact of how cheap and easy to get they were, also because of how fast the castles could have been built. Then, the Stone Keep castles were built from 1100 onwards. They were a development from Motte and Bailey castles, the changes made were that the castle was then built from stone, they were made to be taller, and they had crenulations along the top, some towers had rounded corners however, mostly were square and only some were rebuilt Motte and Bailey castles. Stone Keep castles were built because they were stronger – more defensive and new weaponry was able to be used – hallering rams. The castles were powerful and permanent, reminder of the authority of the government, they also gave nobles increased power in their local area. They served to further consolidate the control of the Normans. Stone Keep castles included features of a raised entrance, a moat, a drawbridge, a portcullis, a square keep, window slits, arrow slits, square towers on walls, murder holes and machicolations. As a development of Stone Keep castles, concentric castles were built from 1250 onwards. The concentric design was copied from the castles in the Middle East; knowledge and understanding of design and structure came into England through returning crusaders (soldiers) during the 1200’s. Concentric castles came to typify the medieval castle; strong and impregnable – round towers, fortified gate houses, moats, drawbridges… They were built in response to improvements in siege techniques, for example tunnelling. They were built mainly on England’s borders; Wales, Scotland, Ireland. Concentric castles included features of murder holes, layers of walls, gatehouse, portcullis and drawbridge, spiral staircases, machicolations, arrow slits, and it has all features that a Stone Keep castle has with more included. They also included round towers along the walls which meant that they were hard to undermine, they had a 360 degree view and lines of fire, a cover fire and they made it a lot stronger. The next castle developed were fortified manor houses from 1290’s onwards. They were not built primarily to defend or to control a local area but built primarily to advertise the power and status of a provincial noble and to demonstrate the strong bond between the King and his nobility. They were seen as a reflection of a more stable and secure society with respect for law and order and the authority of the government. Fortified manor houses were used to show wealth and power of nobles and to show that England was more settled – little risk of rebellion but were also defensive if needed. The changes made were that there was more comfort, big and separate rooms, separate areas for servants, comfortable bed chambers, big windows and were made of brick and was patterned – shows wealth because brick was handmade. It included the features of lots of glass and lots of windows, arrow slits, a flag, crenulations, a grand hall, towers, fancy features - chimneys, oriel windows, heraldic crests and the location was on an existing castle site. More of a development of concentric castles than the fortified manor house was coastal castles made from the 1530’s onwards. They were built for a specific purpose during 1530’s by Henry VIII; namely the defence of England’s southern coastline from the possibility of an invasion launched by Spain and France. The unique clover/petal design was designed to site the new weapon of the 1500’s – the cannon. Coastal castles included the features of thick and layered but low stone walls, round towers, gun ports, cannon ports, may have had a moat, was one big tower design – no separate towers, pointed bastions and were located by the coast. Examples of coastal castles – Deal castle in Kent which was built in 1530 and St. Mawes castle in Cornwall which was built in 1535.
FINEWEB-EDU
MSBuild special characters MSBuild reserves some characters for special use in specific contexts. You only have to escape such characters if you want to use them literally in the context in which they are reserved. For example, an asterisk has special meaning only in the Include and Exclude attributes of an item definition, and in calls to CreateItem. If you want an asterisk to appear as an asterisk in one of those contexts, you must escape it. In every other context, just type the asterisk where you want it to appear. To escape a special character, use the syntax %<xx>, where <xx> represents the ASCII hexadecimal value of the character. For more information, see How to: Escape special characters in MSBuild. Special characters The following table lists MSBuild special characters: Character ASCII Reserved usage % %25 Referencing metadata $ %24 Referencing properties @ %40 Referencing item lists ' %27 Conditions and other expressions ( %28 Multiple uses ) %29 Multiple uses ; %3B List separator ? %3F Wildcard character for file names in Include and Exclude attributes * %2A Wildcard character for use in file names in Include and Exclude attributes See also
ESSENTIALAI-STEM
NewAnnouncing MongoDB Atlas Vector Search and Dedicated Search Nodes for genAI use cases How Do Change Streams Work in MongoDB? What are Change Streams? A change stream is a real-time stream of database changes that flows from your database to your application. With change streams, your applications can react—in real time—to data changes in a single collection, a database, or even an entire deployment. For apps that rely on notifications of changing data, change streams are critical. A few use cases where you might find change streams include: • Analytics Dashboards - Change streams can provide an audit trail for applications. • IoT Event Tracking - Change streams can be used to detect and adjust a system to events that internet-enabled devices are tracking - for example, tracking when a device moves outside of a geo-fencing area. A change stream can be filtered to detect only those events that fall outside of this range and trigger an alarm when it happens. • Real-Time Trading Applications - Change streams can be used to track changes to financial data and react to them in real time. If you’re using MongoDB 3.6 or later, change streams are already built in, and taking advantage of them is easy. Let’s look at the major features of MongoDB change streams, some of your options with those streams (such as modifying the output of the stream), and finally dive into code to see how to implement MongoDB change streams with Python and Node.js. Features of MongoDB Change Streams MongoDB change streams provide a high-level API that can notify an application of changes to a MongoDB database, collection, or cluster, without using polling (which would come with much higher overhead). Here are some characteristics of change streams that might help you to understand how change streams work and what they can be used for: • Filterable • Applications can filter changes to receive only those change notifications they need. • Resumable - Change streams are resumable because each response comes with a resume token. Using the token, an application can start the stream where it left off (if it ever disconnects). • In order • Change notifications occur in the same order that the database was updated. • Durable - Change streams only include majority-committed changes. This is so every change seen by listening applications is durable in failure scenarios, such as electing a new primary. • Secure - Only users with rights to read a collection can create a change stream on that collection. • Easy to use • The syntax of the change streams API uses the existing MongoDB drivers and query language. Availability of MongoDB Change Streams In order to use change streams in MongoDB, there are a few requirements your environment must meet. In MongoDB 4.0 and earlier, change streams are available only if read concern "majority" support is enabled by default. Read concern “majority” guarantees that the documents read are durable and guaranteed not to roll back. However, starting in MongoDB 4.2, change streams are available regardless of the read concern "majority" support. Using Change Streams in MongoDB Atlas If you want to experiment with MongoDB change streams and don’t have a development environment set up that supports using them, you can sign up for an account at MongoDB Atlas and choose the free cluster option. Minutes later, you will have a cluster that supports change streams and is free for life. setting up change streams in mongodb atlas Opening a Change Stream To open a change stream for a replica set, you can issue the open change stream operation from any of the data-bearing members. For a sharded cluster, you must issue the open change stream operation from the mongos binary. Fortunately, most MongoDB drivers support using change streams in a syntax that should be pretty familiar. Let’s look at examples using the official MongoDB Node Driver in Node.js and PyMongo in Python to see how easy it really is. MongoDB Change Streams Node.js Example This example opens a change stream for a collection and iterates over the cursor to retrieve the change stream documents. It assumes that you have connected to a MongoDB replica set and accessed a database with a comment collection. Here, we use a stream to process all change events in the comment collection: conn = new Mongo("YOUR_CONNECTION_STRING"); db = conn.getDB('blog'); const collection = db.collection('comment'); const changeStream = collection.watch(); changeStream.on('change', next => { // do something when there is a change in the comment collection }); But we can also use an iterator to process the change events by iterating the change stream cursor: const changeStreamIterator = collection.watch(); const next = await changeStreamIterator.next(); MongoDB Change Streams Python Example Opening a change stream with Python is very similar and just as easy. In Python, we open a change stream for a collection and iterate over the cursor to retrieve the change stream documents. This example assumes you have connected to a MongoDB replica set and have accessed a database containing an inventory collection. cursor = db.inventory.watch() document = next(cursor) Modifying the Output of a MongoDB Change Stream Customizing the change stream to meet your needs is also straightforward. You control the change stream output by providing an array of one or more of the following pipeline stages when configuring the change stream. For details of what each does, you can check out the documentation. • $addFields • $match • $project • $replaceRoot • $replaceWith (Available starting in MongoDB 4.2) • $redact • $set (Available starting in MongoDB 4.2) • $unset (Available starting in MongoDB 4.2) This allows you to filter the complete change stream down to just those changes you want to listen for. For example, here’s how to modify the change stream output with both Node.js and Python. Node.js: const pipeline = [ { $match: { 'fullDocument.username': 'alice' } }, { $addFields: { newField: 'this is an added field!' } } ]; const collection = db.collection('inventory'); const changeStream = collection.watch(pipeline); changeStream.on('change', next => { // process next document }); Python: pipeline = [ {'$match': {'fullDocument.username': 'alice'}}, {'$addFields': {'newField': 'this is an added field!'}} ] cursor = db.inventory.watch(pipeline=pipeline) document = next(cursor) Resuming Change Streams If a change stream is disconnected, it can reestablish itself and start listening where it left off. This is possible because each change stream event comes with a resume token. { _id: <resumeToken>, operationType: 'update' ... } The client can reestablish its change stream by passing this resume token, and it will be able to start where it left off. MongoDB drivers will also try to automatically resume one time, just in case the error is a transient error such as a network error. Still, even in this situation, you can access this resume token yourself and write your own retry logic. Here, we cache the resume token from the change by storing the _id. On an error, we try to reestablish the change stream using this cached resume token. In Node.js: changeStream.on('change', (change) => { console.log(change) cachedResumeToken = change["_id"] }) changeStream.on('error', () => { if (cachedResumeToken) { establishChangeStream(cachedResumeToken) } }) In Python, the code is even simpler: resume_token = cursor.resume_token cursor = db.inventory.watch(resume_after=resume_token) document = next(cursor) Conclusion Change streams transform a MongoDB database into a real-time database by taking advantage of MongoDB’s replication process. They monitor replication in MongoDB, providing an API for external applications that require real-time data without the risk involved in tailing the oplog or the overhead that comes with polling. For more details, check out the official change stream documentation. FAQs What is a change stream in MongoDB? A change stream is a real-time stream, flowing from your MongoDB database to your application, of all database changes. Does MongoDB allow duplicates? MongoDB does allow duplicates unless you create a unique index on a field or multiple fields. Is MongoDB a real-time database? You can use MongoDB like a real-time database by implementing change streams. Does MongoDB have triggers? MongoDB does not have native support for triggers. But by using change streams, which can notify an external application of any document changes, you can create your own triggers from scratch in the programming language of your choice, or you can create triggers in Atlas App Services. Ready to get started? Launch a new cluster or migrate to MongoDB Atlas with zero downtime. No credit card required.
ESSENTIALAI-STEM
Commonwealth vs. Admilson Resende. Plymouth. December 10, 2015. June 9, 2016. Present: Gants, C.J., Spina, Cordy, Botsford, Duffly, Lenk, & Hines, JJ. Firearms. Practice, Criminal, Motion to suppress, Sentence. A Superior Court judge properly denied the criminal defendant’s pretrial motions to suppress statements that the defendant made to State police troopers and physical evidence obtained after his arrest, where no seizure of the defendant occurred until a trooper directed him to a different area of the parking lot from where the troopers first encountered the defendant, at which point the trooper had observed the defendant holding his hand at his waist in a manner that the trooper believed (from his training and experience) was consistent with someone holding a gun in the waistband of his pants; and where the trooper’s subsequent series of increasingly intrusive actions were all reasonable responses to new information supplied by the defendant’s actions that provided an increasingly robust basis for suspecting that the defendant was holding a concealed gun in his pants. [459-462] At a criminal trial in which a Superior Court judge, sitting jury-waived, found the defendant guilty of several firearms offenses, the judge erred in sentencing the defendant under G. L. c. 269, § 10G (c), where the defendant’s previous drug offenses, which were part of a single prosecution, should have been considered as one previous conviction that would be punishable under § 10G (a) instead. [462-470] Cordy, J., dissenting, with whom Spina, J., joined. Indictments found and returned in the Superior Court Department on August 26, 2011. Pretrial motions to suppress evidence were heard by Charles J. Hely, J., and a motion for reconsideration was considered by him; and the cases were heard by Frank M. Gaziano, J. The Supreme Judicial Court granted an application for direct appellate review. Patrick Levin, Committee for Public Counsel Services, for the defendant. Carolyn A. Burbine, Assistant District Attorney, for the Commonwealth. Botsford, J. In a jury-waived trial in June, 2014, a Superior Court judge found the defendant, Admilson Resende, guilty of several firearms offenses, each of which had associated with it an armed career criminal sentence enhancement charge under G. L. c. 269, § 10G (§ 10G), the Massachusetts armed career criminal act (Massachusetts ACCA). After a separate jury-waived trial on the enhancement charges, the judge sentenced the defendant under § 10G (c) to a mandatory minimum State prison term of from fifteen years to fifteen years and one day. In his appeal from these convictions, the defendant presents an unanswered question about the proper interpretation of § 10G, which provides sentence enhancements for designated firearms offenses where a defendant previously has been convicted of one or more “violent crimes” or “serious drug offenses,” or a combination of the two. For reasons we shall explain, we interpret § 10G to mean that where the previous convictions of predicate offenses forming the basis of the sentence enhancement charge were all part of a single prosecution, they properly should be treated as a single predicate conviction. In this case, therefore, the defendant’s previous drug offense convictions, which were part of a single prosecution, should have been considered as one previous conviction that would be punishable under § 10G (a) rather than § 10G (c). 1. Background, a. Prior drug convictions. On August 22, 2006, when the defendant was nineteen years old, he was arrested and charged with five counts of distribution of cocaine and one count of possession of cocaine with intent to distribute, G. L. c. 94C, § 32A (a). The five distribution counts arose from hand-to-hand transactions that took place on five different days within a seventeen-day period from August 5 through August 22, 2006; the possession with intent count arose from the defendant’s actions on August 22, 2006. All of the counts were included in a single set of charges. On January 23, 2007, the defendant pleaded guilty to the distribution charges as part of a single plea proceeding, and received concurrent house of correction sentences. b. Convictions at issue in this appeal, i. Procedural history. On August 26, 2011, a grand jury returned indictments against the defendant for unlawful possession of a firearm, G. L. c. 269, § 10 (a); unlawful possession of a loaded firearm, G. L. c. 269, § 10 (n); unlawful possession of a firearm or ammunition without a firearm identification card, G. L. c. 269, § 10 (A); and unlawful possession of cocaine with intent to distribute, subsequent offense, G. L. c. 94C, § 32A (c) and (d). Each of the firearms offenses carried a concomitant sentence enhancement charge under § 10G. On May 7, 2012, the defendant filed motions to suppress the physical evidence seized by the police and his postarrest statements. After an evidentiary hearing, a Superior Court judge (motion judge) denied the motions on December 4, 2012. On June 30, 2014, at the conclusion of a bench trial on all charges other than the sentence enhancement charges, a different Superior Court judge (trial judge) found the defendant guilty of unlawful possession of a firearm, unlawful possession of a loaded firearm, and unlawful possession of a firearm or ammunition without a firearm identification card; he found the defendant not guilty of possession of cocaine with intent to distribute. Thereafter, the trial judge in a separate bench trial found the defendant guilty of two of the armed career criminal sentence enhancement charges as a person previously convicted of three or more serious drug offenses, and imposed the mandatory minimum sentence. ii. Facts. On May 28, 2011, State police Trooper Erik Telford was on patrol in Brockton with Sergeant Michael McCarthy. Telford had substantial experience working as a member of law enforcement units focused on individuals involved in guns, violence, and drugs in urban areas, and he had worked specifically in Brockton and with the Brockton police. At approximately 11:40 p.m., Telford and McCarthy, driving in an unmarked police vehicle, were near the intersection of Ames and Intervale Streets, where, on one comer, a bar was located. The neighborhood was an area where Telford had been assigned to work since 2003, and he had made numerous arrests for gun offenses as well as drag offenses in this area. Telford saw a young man, the defendant, walking with two women on the opposite side of Intervale Street, and believed that the defendant made eye contact with him. The defendant was wearing a long polyester jacket that extended past his hips and covered his pants pockets. Telford noticed the jacket because it was not a particularly cold night and Telford himself was not wearing a jacket. Telford saw the defendant move his hand under the jacket and into the waistband area underneath his shirt, and became suspicious that the defendant was carrying a gun. Telford also believed that the defendant appeared similar to a man depicted in a bulletin that had been posted at various locations in the Brockton police station. Telford turned his vehicle around, “and waited in the vicinity of the [bar].” As he did so, the defendant and the two women walked through the bar’s parking lot toward the front door of the bar. Telford and McCarthy left their vehicle and approached the defendant, while wearing clothing marked “State Police,” with their badges and guns clearly visible. As he approached, Telford noticed that the defendant had his right hand out of his pocket and at his waist area. Telford asked the defendant his name, and the defendant gave his correct name in response. Telford then remembered that he had encountered the defendant in connection with a search of a residence pursuant to a warrant — a search that had resulted in the discovery of two guns. At this point, Ryan Guin-ta, a bouncer at the bar, came out of the bar and told the officers that the defendant had been in the bar all night. Telford knew that this was not true, and told Guinta to go back inside, which he did. Telford motioned to the defendant to follow him to a different part of the parking lot where they could speak further. As the defendant walked to this location, Telford noticed that the defendant had his right hand in his pocket but was holding it close to his body at the waistband area, and that the defendant “bladed away” from him. During the ensuing conversation, the defendant, with his right hand in his pocket, made movements that appeared to Telford to be retention checks — touching the area where a weapon or heavy object is located to ensure it stays in place because it is not holstered. Telford recognized these types of movements as being consistent with someone who is carrying a weapon in his waistband. Telford asked the defendant to remove his right hand from his pocket, which the defendant did briefly, before putting it back into the pocket. Telford asked the defendant again to remove his right hand from his pocket, which he did, and then the defendant touched an area near his waistband, consistent with another retention check. After noticing that the defendant was looking from left to right, as if to attempt to flee, Telford asked him to lift his shirt, twice. The defendant did so, but both times exposed only the left side of his waistband, where Telford saw nothing. At this point, because the officers were convinced that the defendant was carrying a gun, they decided to handcuff him, but before the handcuffs were applied, Telford reached to the right side of the defendant’s waistband and retrieved a gun containing one round of ammunition in the chamber and at least one other round in the gun magazine. The officers arrested the defendant for unlawfully carrying a firearm and advised him of the Miranda rights. After stating that he understood his rights, the defendant said that he had obtained the gun in Providence, Rhode Island, the cost was $750, the gun was not stolen, and it had serial numbers. In a subsequent search of the defendant incident to his arrest, the officers found plastic bags containing cocaine, and when asked if the bags contained more than fourteen grams, the defendant responded that they did not. 2. Discussion, a. Motions to suppress. On review of a ruling on a motion to suppress, “we accept the judge’s subsidiary findings of fact absent clear error ‘but conduct an independent review of his ultimate findings and conclusions of law’ ” (citation omitted). Commonwealth v. Scott, 440 Mass. 642, 646 (2004). We “make an independent determination of the correctness of the judge’s application of constitutional principles to the facts as found” (citation omitted). Id. The defendant argues that the denial of his motions to suppress was error because he was seized without reasonable suspicion — a contention turning primarily on the propriety of the motion judge’s ruling that no seizure of the defendant occurred at least until the defendant was directed to go speak with Trooper Telford in a different area of the parking lot from where the officers first encountered him. The defendant contends that this ruling was incorrect because, contrary to the motion judge’s findings, the uncontradicted testimony of Telford showed that as the defendant approached the front door of the bar, the officers “cut off [the defendant’s] path of travel and immediately got out of their car and approached him” with their guns and badges displayed. In doing so, the defendant argues, the officers effectuated a seizure of his person at that point, because a reasonable person would not have felt free to leave under those circumstances. The defendant contends further that, at this point in time, the officers did not have a reasonable suspicion of any criminal activity, and accordingly, all of the officers’ actions that followed, culminating in the defendant’s arrest, were constitutionally prohibited and his motions to suppress should have been allowed. The Commonwealth argues that the motion judge correctly concluded that there was no seizure of the defendant until he was directed to a different area of the parking lot, at which time the officers had a reasonable suspicion that the defendant was illegally carrying a gun, and their subsequent, measured actions fit well within the scope of a permissible stop, frisk, and seizure pursuant to Terry v. Ohio, 392 U.S. 1 (1968). We agree with the Commonwealth. We reject the defendant’s challenge to the motion judge’s factual findings. As previously stated, the judge did not make a specific finding as to when the two officers drove into the parking lot, but insofar as the findings may suggest that the officers entered the parking lot and came to a stop before the defendant and his two companions reached the bar’s door and at a distance that permitted them to do so, the testimony of Sergeant McCarthy supports that view. Accordingly, we do not agree with the defendant that the judge made clearly erroneous findings concerning the initial encounter between the defendant and the two officers. Rather, our review of the motion record persuades us that the judge was warranted in concluding that the officers’ exit from their vehicle with their State police identification and weapons visible, followed by Telford’s question asking the defendant for his name, was not itself a stop or seizure in the constitutional sense. See, e.g., Commonwealth v. Narcisse, 457 Mass. 1, 5-6 (2010) (no seizure where officers pulled alongside defendant and got out of vehicle, asking defendant’s name and what he was doing in vicinity); Commonwealth v. Gomes, 453 Mass. 506, 510 (2009) (defendant not seized when police got out of vehicles quickly and approached him as he stood in doorway; no indication that police activated blue lights); Commonwealth v. Lopez, 451 Mass. 608, 610-614 (2008) (two uniformed officers in two marked patrol cruisers followed defendant on bicycle late at night; one officer emerged from cruiser, and asked, “Can I speak with you?” after which defendant approached him; officer’s actions did not constitute seizure); Commonwealth v. DePeiza, 449 Mass. 367, 370-371 (2007) (no seizure where police got out of unmarked vehicle and approached defendant, while engaging in brief conversation). The motion judge determined that a limited “intrusion” — i.e., seizure — occurred when Telford requested or directed the defendant to walk to a different part of the parking lot to talk to the trooper, and that this seizure was justified in the circumstances. We agree. By that point, Telford had observed the defendant holding his hand at his waist in a manner that Telford believed from his training and experience was consistent with someone holding a gun in the waistband of his pants. Moreover, before speaking with the defendant at the new location in the parking lot, Telford had observed the defendant “blading” away from him and making motions with his hand that were consistent with weapon retention checks. We also agree with the motion judge that Telford’s series of increasingly intrusive actions that followed —• asking the defendant to take his hands out of his pocket, then asking the defendant to raise his shirt, then reaching for the defendant’s hands and putting them behind his back, and then grabbing a gun from the defendant’s waist area on his right side — were all reasonable responses to new information supplied by the defendant’s actions that provided an increasingly robust basis for suspecting the defendant was holding a concealed gun in his pants on the right side of his body. The seizure of the defendant effectuated by Telford and McCarthy was constitutionally proper. See DePeiza, 449 Mass. at 371. Cf. Commonwealth v. Torres, 433 Mass. 669, 675 (2001) (officer’s actions no more intrusive than necessary at each phase of increasingly suspicious interaction with defendant and passengers in vehicle during traffic stop). b. Defendant’s armed career criminal status. The defendant argues that his armed career criminal convictions cannot stand because his five previous drug convictions were encompassed in a single prosecution. As such, he claims, the convictions should be counted as a single predicate offense for purposes of § 10G, and therefore within the scope of level one, see § 10G (a), rather than level three, see § 10G (c). The Commonwealth takes the position that, under § 10G, similar to the enhancement scheme under 18 U.S.C. § 924(e) (2006), the Federal armed career criminal act (Federal ACC A), each qualifying violent crime or serious drug offense of which a defendant has previously been convicted represents a separate predicate offense for purposes of determining sentence enhancement levels, regardless of whether those previous convictions were the result of a single or several prosecutions. Although this court has considered questions concerning the proper interpretation of § 10G in prior cases, the issue raised here is one of first impression. Section 10G provides in relevant part: “(a) Whoever, having been previously convicted of a violent crime or of a serious drug offense, both as defined herein, violates the provisions of paragraph (a), (c) or (h) of [§] 10 shall be punished by imprisonment in the state prison for not less than three years nor more than [fifteen] years. “(b) Whoever, having been previously convicted of two violent crimes, or two serious drug offenses or one violent crime and one serious drug offense, arising from separate incidences, violates the provisions of said paragraph (a), (c) or (h) of said [§] 10 shall be punished by imprisonment in the state prison for not less than ten years nor more than [fifteen] years. “(c) Whoever, having been previously convicted of three violent crimes or three serious drug offenses, or any combination thereof totaling three, arising from separate incidences, violates the provisions of said paragraph (a), (c) or Qi) of said [§] 10 shall be punished by imprisonment in the state prison for not less than [fifteen] years nor more than [twenty] years.” (Emphasis added.) G. L. c. 269, § 10G (a)-(c). The question of interpretation before us relates to the meaning of the phrase, “having been previously convicted of three [qualifying crimes] arising from separate incidences,” that appears in § 10G (c), and more specifically the meaning of the phrase, “arising from separate incidences.” To answer that question, we consider first the meaning of the actual language used by the Legislature. See Commonwealth v. Robertson, 467 Mass. 371, 376 (2014). However, “we also seek guidance from [the statute’s] legislative history, ... the language and construction of related statutes,... and the law of other jurisdictions” (citations omitted). Commonwealth v. Welch, 444 Mass. 80, 85 (2005). The word “incidences” or “incidence” is not defined in § 10G. Dictionary definitions of “incidence” include “an act or the fact or manner of falling upon or affecting: occurrence,” the “rate, range, or amount of occurrence or influence,” Webster’s Third New International Dictionary 1142 (1993), and “[t]he frequency with which something occurs, such as crime” or “the number of times that something happens,” Black’s Law Dictionary 879 (10th ed. 2014). The word thus appears to focus more on the measurement of something’s frequency of occurrence than on the definition of the “something” itself. In that sense, it is distinct from the word “incidents,” or “incident.” But the fact that the Legislature chose not to use the word “incidents” provides little direct guidance as to what the Legislature meant by selecting “incidences.” Nor is the statute’s legislative history illuminating on this point. Section 10G was enacted in 1998 as one section of an omnibus piece of legislation entitled, “An Act relative to gun control in the Commonwealth,” that was designed to provide a stricter gun control regime by adding a wide variety of new statutory provisions. It appears that from the earliest drafts, the phrase “arising from separate incidences” was included in what is now § 10G, and nothing in these drafts or any other legislative materials available for review offers any explanation or guidance as to the reason for this choice of words, or the meaning that the Legislature ascribed to them. However, three separate considerations lead us to conclude that the phrase “arising from separate incidences” is best understood to mean that each previous conviction serving as a predicate offense under § 10G must result from a separate prosecution, and not simply from a separate criminal event. The three considerations are the Legislature’s departure from the language used in the Federal ACCA, the analysis of cases from other jurisdictions, and the rule of lenity. The Federal ACCA provides: “In the case of a person who violates [18 U.S.C. § 922(g)] and has three previous convictions ... for a violent felony or a serious drug offense, or both, committed on occasions different from one another, such person shall be fined under this title and imprisoned not less than fifteen years, and, notwithstanding any other provision of law, the court shall not suspend the sentence of, or grant a probationary sentence to, such person with respect to the conviction under [§] 922(g)” (emphasis supplied). 18 U.S.C. § 924(e)(1). The language “committed on occasions different from one another” was added to the Federal ACCA by amendment in 1988. See Pub. L. No. 100-690, 102 Stat. 4181, § 7056 (1988). In United States v. Letterlough, 63 F.3d 332, 335 (4th Cir.), cert. denied, 516 U.S. 955 (1995), the United States Court of Appeals for the Fourth Circuit articulated the test that it noted was used by the courts of almost every Federal Circuit for determining whether the Federal ACCA applies to a defendant’s prior crimes: “Convictions occur on occasions different from one another ‘if each of the prior convictions arose out of a “separate and distinct criminal episode” ’ ” (emphasis in original). Id., quoting United States v. Hudspeth, 42 F.3d 1015, 1019 (7th Cir. 1994), cert. denied, 515 U.S. 1105 (1995). The Legislature enacted the Massachusetts ACCA ten years after the Federal ACCA was amended to include the phrase “committed on occasions different from one another” and three years after the Letterlough decision. The Massachusetts ACCA adopts the definitional language of the Federal ACCA. See Commonwealth v. Colon, 81 Mass. App. Ct. 8, 12 (2011). See also Commonwealth v. Eberhart, 461 Mass. 809, 815 (2012). However, we disagree with the Commonwealth that the Massachusetts statute “largely replicates,” Colon, supra, the entire structure of its Federal counterpart. In fact, § 10G departs from the Federal ACCA precisely in relation to the language in contention here, namely, the description of what makes a prior violent crime or serious drug offense qualify as a predicate offense. That is, § 10G does not incorporate the Federal ACCA language that the crimes be “committed on occasions different from one another,” 18 U.S.C. § 924(e)(1), to qualify, but rather requires that the predicate crimes be ones “arising from separate incidences.” Considering the Legislature’s obvious awareness of the language used in the Federal ACCA (witness the § 10G definitions) and the Legislature’s presumptive knowledge of the nearly uniform judicial interpretation of the phrase “committed on occasions different from one another,” its decision to use different words to refer to qualifying offenses suggests that the Legislature affirmatively intended to enact a sentence enhancement scheme that did not march in lock step with the Federal ACCA. Differences in language between a State statute and a previously enacted, analogous Federal statute “reflect a conscious decision by the Legislature to deviate from the standard embodied in the Federal statute.” Globe Newspaper Co. v. Boston Retirement Bd., 388 Mass. 427, 433 (1983). See Commonwealth v. McGhee, 472 Mass. 405, 413 n.8 (2015). We therefore reject the Commonwealth’s argument, adopted by the dissent, that in § 10G the Legislature simply employed different words to convey the exact same meaning as the Federal ACCA. That the Legislature had a sentencing scheme different from the Federal ACCA in mind when it enacted § 10G is made even more clear when the structures of the Massachusetts and Federal statutes are compared. The Federal ACCA imposes only one level of enhancement that comes into play after three qualifying offenses; in contrast, § 10G provides for three separate levels of enhancement, each with an increasing mandatory minimum sentence depending on the number of predicate offenses committed, up to a maximum of three —• i.e., a graduated approach to enhanced penalties. Again, given its familiarity with the Federal statute, the Legislature’s rejection of the single, “three strikes, you’re out” model of 18 U.S.C. § 924(e) and the adoption of a graduated approach is significant. In terms of structure, the Massachusetts ACCA shares less in common with the Federal ACCA than it does with a large number of armed career criminal sentencing statutes with graduated penalty provisions that have been enacted by other States. The language of these statutes varies, but a majority of State appellate courts have interpreted statutory provisions providing progressively longer sentences for crimes a defendant commits after having been previously convicted of one, two, or three qualifying offenses to require that the prior convictions be sequential — i.e., that the first conviction (and imposition of sentence) occur before the commission of the second predicate crime, and the second conviction and sentence occur before the commission of the third crime. See, e.g., Commonwealth v. Shiffler, 583 Pa. 478, 480, 492-495 (2005). See also Hall v. State, 473 A.2d 352, 356-357 (Del. 1984); State v. Lohrbach, 217 Kan. 588, 591 (1975); State v. Ellis, 214 Neb. 172, 174-176 (1983). See generally Annot., Chronological or Procedural Sequence of Former Convictions as Affecting Enhancement of Penalty under Habitual Offender Statutes, 7 A.L.R. 5th 263, §§ 2(a), 7(d) (1992 & Supp. 2015). The rationale underlying the majority view that graduated sentence enhancement statutes should be interpreted to require sequential prosecutions and convictions of the predicate crimes is well expressed by the Pennsylvania Supreme Court in Shiffler, 583 Pa. at 494: “ ‘[T]he point of sentence enhancement is to punish more severely offenders who have persevered in criminal activity despite the theoretically beneficial effects of penal discipline.’ . . . Particularly salient here is the implicit link between enhanced punishment and behavioral reform, and the notion that the former should correspondingly increase along with a defendant’s foregone opportunities for the latter. Any other conception would ignore the rationale underlying the recidivist philosophy, i.e., that the most culpable defendant is ‘one, who after being reproved, “still hardeneth his neck.” ’ . . . The generally recognized purpose of such graduated sentencing laws is to punish offenses more severely when the defendant has exhibited an unwillingness to reform his miscreant ways and to conform his life according to the law” (emphasis in original; citations omitted). Decisions in other States reflect similar reasoning. See, e.g., State v. Ledbetter, 240 Conn. 317, 328-330, 332 (1997) (“We agree with the defendant that the legislative purpose of [the State’s armed career criminal statute] is fulfilled only by requiring a sequence of offense, conviction and punishment, thus allowing a felon the opportunity to reform prior to being labeled a persistent felony offender”); Buckingham v. State, 482 A.2d 327, 330-331 (Del. 1984) (punishment enhanced only for individuals who failed to reform after separate encounters with criminal justice system); Lohrbach, 217 Kan. at 591 (“The basic philosophy underlying recidivist statutes might be expressed in this fashion: where the punishment imposed against an offender for violating the law has failed to deter him from further infractions, a harsher and more severe penalty is justified, the idea being, hopefully, that the greater punishment may serve as an object lesson and cause him to accomplish his reformation, where the lesser penalty had failed in that respect”). As noted, the available legislative history of the Massachusetts ACCA does not reveal the Legislature’s specific rationale or purpose for eschewing the Federal ACCA’s approach and establishing a graduated penalty structure tied to the number of a defendant’s previous convictions of predicate offenses. But the Legislature having done so, we are persuaded that the most logical interpretation of § 10G (a)-(c) is one that reflects and implements the principle that penal discipline can have (or should have) a reforming influence on an offender, with enhanced consequences if prior convictions and sentences do not have such an effect. As a consequence, the most logical and appropriate interpretation of § 10G (c) is that its sentence enhancement of a mandatory minimum of fifteen years applies only when a defendant’s previous convictions of three qualifying crimes “arising from separate incidences” were the results of separate, sequential prosecutions. Finally, insofar as the meaning of “arising from separate incidences” in § 10G (c) is ambiguous, the rule of lenity supports the interpretation we have adopted here: “Under the rule of lenity, ‘if we find that the statute is ambiguous or are unable to ascertain the intent of the Legislature, the defendant is entitled to the benefit of any rational doubt.’ Commonwealth v. Constantino, 443 Mass. 521, 524 (2005). ‘This principle applies to sentencing as well as substantive provisions.’ Commonwealth v. Gagnon, 387 Mass. 567, 569 (1982).” Commonwealth v. Richardson, 469 Mass. 248, 254 (2014). See Commonwealth v. Hamilton, 459 Mass. 422, 436-437 (2011). The Commonwealth posits that § lOG’s requirement that qualifying convictions “aris[e] from separate incidences” is satisfied so long as the defendant’s conduct underlying the convictions involved distinct criminal offenses even if all the convictions were the result of a single prosecution. This interpretation is not compelled by the language and particularly the structure of § 10G. Accordingly, in this case — where the defendant’s previous drug offense convictions were the result of counts that were brought at the same time, combined in a single set of charges, prosecuted and handled as a single criminal prosecution, and resolved by guilty pleas in a single plea proceeding — the convictions represented a single “incidence” for purposes of § 10G. The defendant, therefore, could not be prosecuted or sentenced under § 10G (c) (or § 10G [&]), but could be prosecuted and sentenced pursuant to § 10G (a). 3. Conclusion. The motion judge properly denied the defendant’s motions to suppress evidence, and the order denying the motions to suppress is affirmed. With respect to the defendant’s appeal from his convictions as an armed career criminal pursuant to G. L. c. 269, § 10G (c), those convictions are vacated, and the case is remanded to the Superior Court for further proceedings consistent with this opinion. So ordered. Cordy, J. (dissenting in part, with whom Spina, J., joins). I agree that the defendant’s motions to suppress were properly denied. I disagree that the Massachusetts armed career criminal act, G. L. c. 269, § 10G (ACCA), is ambiguous, and would adopt what I perceive to be the plain meaning of its words: previous convictions are convictions occurring prior to the ACCA violation for offenses “arising from separate” criminal incidents. Crimes arising from separate incidents are crimes committed on different occasions as contrasted with multiple crimes arising out of a single occasion or criminal episode. The issue is purely one of legislative intent at the time of enactment, and, absent any evidence to the contrary, I would not read into the statute a “recidivist philosophy,” rather than an intent to ensure public safety by significantly increasing the penalties for persons who commit crimes with firearms after having been convicted of multiple serious felonies. In my view, the Massachusetts statute should be interpreted as the Federal ACCA statute has been by virtually every Federal Circuit and District Court to undertake the task. 18 U.S.C. § 924(e) (2006) (offenses “committed on occasions different from one another”). So long as the prior offenses of which the defendant has been convicted arise out of different criminal episodes (whether termed different occasions, occurrences, incidents, or incidences), they should qualify as separate previous convictions for purposes of the Massachusetts ACCA statute. The court’s interpretation would essentially incorporate all crimes, no matter how separate in time, victim, or nature, into a single conviction (for ACCA purposes) if they were eventually resolved by guilty plea or trial in the same prosecution. For example, a person who commits a string of armed robberies in Suffolk County over a period of months and who is eventually apprehended, linked to, charged with, and convicted of all of the robberies, in a combined prosecution, would have only “one” prior felony conviction for purposes of the Massachusetts ACCA statute — no matter how many robberies he is convicted of committing. Further, the court suggests that prior convictions must be sequential. In other words, the first conviction must occur before the second predicate crime and its prosecution and conviction, and the second conviction must occur before the commission and prosecution of the third crime, and so on — apparently, so that the recidivist felon has multiple opportunities to correct his criminal behavior before facing far greater punishment when he once again commits a serious felony, this time with a firearm. Hence, by way of example, if the armed robber is prosecuted in Suffolk County, and, subsequent to his conviction, it is determined that before his conviction he had committed a series of armed robberies in Hampden County and is, accordingly, now prosecuted and convicted of those armed robberies, he would still only have one prior conviction under the Massachusetts ACCA statute when and if he commits his next armed felony. This could not have been what the Legislature intended. The fact that some State courts have interpreted their own armed career criminal statutes (variously worded) differently (and as this court now would), based on their view of what their Legislatures intended to punish, is not terribly relevant or revealing. Other State courts have concluded the opposite. There is no consensus as to how such statutes, no matter how differently worded or intended, must be interpreted. I would not infuse our analysis with hindsight doubts about whether the statute has served as an effective deterrent, or whether it might seemingly prove unduly harsh in some circumstances. That is the Legislature’s responsibility, not ours. And I would not use the modest facts in this case, in which the defendant’s prior convictions were for five drug sales, each occurring on a different day during a three-week period, as an excuse to broadly transplant a new policy that has no traceable origin in legislative history, onto a statute plainly intended to protect the public from felons with multiple felony convictions who use firearms in committing new crimes. In addition to his claim concerning the sentence imposed under G. L. c. 269, § 10G (§ 10G), the defendant challenges the denial of his pretrial motions to suppress evidence. We conclude in this opinion that the defendant’s motions to suppress were properly denied. The possession with intent charge was placed on file. The defendant’s conviction of unlawful possession of a loaded firearm and the accompanying armed career criminal charge were dismissed by agreement. At the conclusion of the trial on the sentence enhancement charges, the trial judge denied the defendant’s request for a required finding that each of the previous drug charges did not constitute a separate predicate offense under the Massachusetts armed career criminal act (ACCA). The facts are taken primarily from the findings made by the motion judge in ruling on the defendant’s motions to suppress; the judge’s findings are themselves based primarily on the testimony of Trooper Erik Telford and Sergeant Michael McCarthy of the State police, witnesses whom the motion judge found to be “highly credible.” On or about May 25, 2011, Brockton police Officer Robert Saquet posted bulletins containing a photograph of a young African-American man holding a “TEC-9” automatic pistol in the Brockton police station detectives’ office and the report room, where uniformed officers write their reports; the name of the man depicted in the photograph was not provided. Trooper Erik Telford had seen one of the bulletins while in the Brockton police station within a few days of May 28, 2011. Although at some point the Brockton police learned the name of the person depicted, who was not the defendant, and added the name to the bulletin, the original version viewed by Telford had not had a name added to it. The motion judge found that the defendant shared similar basic characteristics with the man in the bulletin, including height, approximate age, facial hair, and wearing of a baseball cap, and noted that these similarities could apply to many men in the Brockton area. The motion judge did not make any finding about precisely when the two police officers drove into the bar parking lot itself, or about where the officers parked their vehicle in relation to the entrance to the bar. Telford testified that “blading away” refers to the action of creating a thin profile of oneself with respect to another viewpoint, effectively hiding one side of the body from the other person’s view. See note 7, supra, and accompanying text. McCarthy testified that “when [he] pulled into the parking lot with Trooper Telford,. . . the defendant and the two females continue[d] to walk towards the entrance of the [bar].” See, e.g., Commonwealth v. Eberhart, 461 Mass. 809 (2012); Commonwealth v. Anderson, 461 Mass. 616, cert. denied, 133 S. Ct. 433 (2012); Commonwealth v. Johnson, 461 Mass. 44 (2011); Commonwealth v. Furr, 454 Mass. 101 (2009). The Appeals Court has as well. See, e.g., Commonwealth v. Colon, 81 Mass. App. Ct. 8, 12 (2011); Commonwealth v. Ware, 75 Mass. App. Ct. 220, 222 (2009). Under § 10G (d), any sentence imposed under the statute shall not be reduced to less than the minimum mandatory sentence or suspended, and the defendant is not eligible for probation or parole until he has served the minimum term. At issue in this case are the defendant’s convictions under § 10G (c), but our analysis applies with equal force to § 10G (b). The word “incident” is defined as “a separate unit of experience: happening,” Webster’s Third New International Dictionary 1142 (1993), and “[a] discrete occurrence or happening; an event, esp. one that is unusual, important, or violent,” Black’s Law Dictionary 879 (10th ed. 2014). Section 10G was inserted by St. 199S, c. 180, which, among other things, enacted into Massachusetts law the Federal assault weapons ban; created negligence liability for gun owners who improperly stored guns; created a new category of large capacity weapons, see G. L. c. 140, § 121, and G. L. c. 269, § 10F; created a new licensing structure for all guns, see G. L. c. 140 § 123; established a firearms record-keeping trust fund; prohibited the possession or sale of “sawed-off’ shotguns, see G. L. c. 269, § 10 (c); required that gun dealers operate out of a location separate from their residence; prohibited mail order gun sales within the State, G. L. c. 140, § 123; established penalties for possession of a weapon while intoxicated, G. L. c. 269, § 10H; and required all new gun license applicants to pass a gun safety course, G. L. c. 140, § 13 IP. The legislative record of the omnibus bill’s enactment includes two recommendations from the Governor’s legislative director to his legislative office and a House of Representatives “Executive Bill Summary” memorandum, both of which provide summaries of the bill by section. With respect to § 10G, the documents state that if a defendant has “three previous felony convictions the punishment shall be imprisonment in a [S]tate prison for not less than [fifteen] nor more than [twenty] years,” but do not address the timing of those convictions in relation to each other, or the statutory phrase “arising from separate incidences.” A comparison of the definitions of “violent crime” and “serious drug offense” in the Massachusetts ACCA with the language used by Congress to define “violent felony” and “serious drug offense” in the Federal ACCA indicates that the two definitions are virtually identical in substance; the inference that the Legislature had the Federal ACCA in mind when enacting the Massachusetts ACCA appears inescapable. Cf. Commonwealth v. Callahan, 440 Mass. 436, 441 (2003) (we “presume that the Legislature is aware of the prior state of the law as explicated by the decisions of this court” [citation omitted]). But see, e.g., Watson v. State, 392 So. 2d 1274, 1279 (Ala. Crim. App. 1980) (no requirement that prior convictions be sequential); Knight v. State, 277 Ark. 213, 215-216 (1982) (same); People v. District Court in & for the County of Larimer, 643 P.2d 37, 38-39 (Colo. 1982) (same); Stradt v. State, 608 N.W.2d 28, 29-30 (Iowa 2000) (same). It bears noting that despite the actual language and judicial interpretation of the Federal ACCA — which, as we have discussed, focuses on whether the prior convictions involved distinct criminal episodes — the United States Sentencing Commission has adopted guidelines providing that simultaneous convictions, i.e., convictions charged in the same charging instrument or for which sentences are entered on the same day, should qualify only as a single predicate offense under the Federal ACCA, unless the offenses were separated by intervening arrests. See Federal Sentencing Guidelines Manual § 4A1.2(a)(2) (updated Nov. 2015). Accord Commonwealth v. McClintic, 589 Pa. 465, 483 (2006) (“Following the recidivist logic, each strike that serves as a predicate offense must be followed by sentencing and, by necessary implication, an opportunity for reform, before the offender commits the next strike”). See also State v. Ellis, 214 Neb. 172, 175-176 (1983) (“We believe that the purpose of enacting the habitual criminal statute is to serve as a warning to previous offenders that if they do not reform their ways they may be imprisoned for a considerable period of time, regardless of the penalty for the specific crime charged. . . . We believe we should join the majority of jurisdictions in their interpretation of the habitual criminal statute, and now, therefore, declare that in order to warrant the enhancement of the penalty under the Nebraska habitual criminal statute ... the prior convictions, except the first conviction, must be for offenses committed after each preceding conviction, and all such prior convictions must precede the commission of the principal offense”). This rationale reflects what the Pennsylvania Supreme Court terms a “recidivist philosophy.” See Commonwealth v. Shiffler, 583 Pa. 478, 494 (2005). The dissent contends that there is little to no support for our conclusion that a recidivist philosophy underlies the Legislature’s enactment of § 10G. Post at 470-471. Certainly the scant legislative history relating to § 10G contains no evidence that the Legislature used that term. But the Legislature’s express adoption of a graduated penalty structure in § 10G, increasing the mandatory minimum sentence as the defendant acquires more “strikes,” and the decisions of other State courts construing habitual offender statutes akin to § 10G in a manner consistent with the substantive tenets of a recidivist philosophy work together to support our interpretation. See Commonwealth v. Welch, 444 Mass. 80, 85 (2005) (court may use language and construction of related statutes and law of other jurisdictions to determine legislative intent). The dissent states that § 10G is not ambiguous and asserts that the statute’s plain meaning is that “previous convictions are convictions occurring prior to the ACCA violation for offenses ‘arising from separate’ criminal incidents.” Post at 470. However, this construction of the statute conflates the terms “incident” and “incidence,” which, as discussed previously, have distinct definitions. See note 14, supra. Where the Legislature used the term “incidences” in § 10G, we will interpret the statute with that word in mind, and will not substitute for it a word that means something else. It is clear that the defendant could not have been sentenced as an armed career criminal under § 10G during the prosecution of the crimes committed in 2006 because those convictions were simultaneous — i.e., none of the convictions could be considered a previous conviction in relation to any of the others. Allowing the defendant to be sentenced as a third-time repeat offender under § 10G (c) here, despite the fact that he could not have, at any previous time, been charged as even a first-time repeat offender under § 10G (a), is a result that we do not believe the Legislature intended. Cf. Shiffler, 583 Pa. at 492. See, e.g., United States v. Elliott, 703 F.3d 378, 383 (7th Cir. 2012), cert. denied, 133 S. Ct. 2359 (2013), and United States v. Letterlough, 63 F.3d 332, 335 (4th Cir.), cert. denied, 516 U.S. 955 (1995), and the numerous cases cited therein. The court’s interpretation would also result in the following: An individual is arrested for a serious drug offense and is released on personal recognizance. He is then arrested for another serious drug offense and is released on bail. He is finally arrested for an armed robbery and is held without bail. All three separate crimes (for which he has been separately arrested and charged) are eventually resolved by guilty pleas and sentencing in a single plea and sentencing proceeding. Result — one prior conviction only. For example, the court cites a Nebraska case, State v. Ellis, 214 Neb. 172, 175 (1983), in support of its proposition that habitual offender statutes should be interpreted in a manner that allows felons the opportunity to “reform their ways.” The Nebraska Supreme Court was, of course, interpreting the meaning and legislative intent behind its own statute, which provided that a habitual criminal is one who has previously “been twice convicted of [a] crime, sentenced and committed to prison.” Id. at 172-173. See Neb. Rev. Stat. § 29-2221. The court, in a four-to-three decision, concluded that where the defendant was convicted of two crimes (robbery and the use of a firearm in the course of the robbery), occurring on the same day, and for which he was sentenced on the same day, he had only one prior conviction and sentence under its statute. Ellis, supra at 172-173, 175-176. The court went on to more broadly endorse the “recidivist philosophy” behind its habitual offender statute, see id. at 175, over a vigorous dissent noting that the court had “chosen to substitute doubtful sociological assumptions (without legislative history to show that the Legislature shared its view) for the logical construction of [the] statute.” Id. at 177 (White, J., dissenting). See, e.g., Watson v. State, 392 So. 2d 1274, 1279 (Ala. Crim. App. 1980); Linn v. State, 658 P.2d 150, 152 (Alaska Ct. App. 1983); Knight v. State, 277 Ark. 213, 215-216 (1982); Stradt v. State, 608 N.W.2d 28, 29-30 (Iowa 2000); Rushing v. State, 461 So. 2d 710, 713 (Miss. 1984).
CASELAW
Seal of Mindaugas The Seal of Mindaugas (Mindaugo antspaudas) is a medieval seal affixed to the October 1255 act by Mindaugas, King of Lithuania, granting Selonia to the Teutonic Knights. An academic debate is ongoing to determine authenticity of the act and the seal as they might have been forged by the Knights. If it is authentic then the seal is the only surviving contemporary depiction of Mindaugas. As the most important surviving artifact from Mindaugas' times, the seal was a centerpiece of a special exhibition organized by the National Museum of Lithuania in 2003 to commemorate the 750th anniversary of Mindaugas' coronation. Act and seal During an internal struggle in 1250, Mindaugas allied himself with the Livonian Order and the Teutonic Knights. With Orders' assistance he defeated his enemies, converted to Christianity, and was crowned as King of Lithuania in 1253. For their help, Mindaugas granted various lands to the Knights in 1253, 1255, 1257, 1259, 1260, and 1261. These six acts caused much controversy and debate among modern historians regarding their authenticity. Only one act, the October 1255 act concerning Selonia, survives with a seal of Mindaugas. The Selonian act was mentioned by Pope Alexander IV in a papal bull, dated July 13, 1257, confirming the territorial transfer. A transcript and detailed description of the seal was made in May 1393 by a papal legate. The 1393 description is an accurate representation of the surviving seal except for the string holding the seal to the parchment: according to the description the string was white and yellow while it is now white and blue. The original document is preserved by the Prussian Privy State Archives. The seal is about 85 mm in diameter (the exact size is impossible to determine because its edges have chipped off). It depicts a ruler sitting on a bench, covered by a cushion or drapery. The ruler wears a royal mantle and a crown. The right arm holds a scepter decorated with a large lily, while the left arms holds an orb with a cross. The empty field around the figure is decorated with a Gothic diamond-shaped latticework. The diamonds have a tiny cross in the middle of them. The legend where Mindaugas' name and title should appear is almost completely chipped off. The only surviving details are a tiny cross, which would indicate the beginning of the legend's text, and a letter. The letter was variously read as M, D, or SI. According to the 1393 description, when the legend was still intact, it read + MYNDOUWE DEI GRA REX LITOWIE (Mindaugas by the grace of God King of Lithuania). Scholarship Already in the beginning of the 19th century, German historian Ernst Hennig raised doubts about authenticity of the act. These doubts were elaborated upon by Polish historian Juliusz Latkowski. He raised a theory that the act was forged around 1392–1393 during territorial disputes over Samogitia, but the seal was authentic – it was taken from another document by Mindaugas and affixed to the forged act. This hypothesis is bolstered by the fact that the wax used to fasten the seal to the parchment is of different color. Wojciech Kętrzyński paid special attention to the fact that seal's legend with Mindaugas's name and title is almost completely chipped off while the rest of the seal and the act are generally well-preserved. He arrived to the conclusion that the legend was destroyed on purpose. He further stipulated that the act was forged while Mindaugas was alive and that the seal belonged to a completely different person, perhaps Magnus III of Sweden or Andrew II of Hungary. Antoni Prochaska dismissed any doubts regarding authenticity based on the fact that the act was mentioned in a papal bull. Karol Maleczyński also rejected ideas about forgery and argued that at some point the seal fell off and was affixed anew thus explaining different color strings and wax used to fasten it. Lithuanian heraldic expert Edmundas Rimša analyzed heraldic aspects of the seal. He paid particular attention to the Gothic latticework, which appeared in European royal seals only in the 14th century. Rimša thus concluded that the seal is a forgery made at least 50 years after the supposed date of the act.
WIKI
Page:The Case for Capitalism (1920).djvu/240 pose to deal with the capitalist, the man who owns the plant and takes the risk of productive failure. He is just to be relieved of his property, and Messrs. Hobson-Orage call attention to the great advantage of this plan over that of the State Socialists, whom they credit with the intention of buying him out. On page 179 of their book they set out the advantage in the form of an equation as follows:— "Cost of production under State Socialism = raw material + standing charges + rent + interest + profits + increased wages. Cost of production under Guild Socialism = raw material + standing charges + pay." And on page 240 they develop Mr. Cole's suggestion of "catastrophic action or general strike" in detail in the form of a dialogue between a Guild deputation and the Chairman and General Manager of a large industrial enterprise that divides £100,000 a year amongst its shareholders. The deputation admits that the company pays standard rates of wages, but says it has decided that the men shall no longer work on a wage basis. In the first place, the men now on the pay-rolls must continue there whether there is work for them or not. The Guild is going to "assume partner-
WIKI
Zhu Manyue Zhu Manyue (547–586), later known by her Buddhist name Fajing (法淨), was a concubine of the Emperor Xuan (Yuwen Yun) of the Xianbei-led Northern Zhou dynasty of China. She was the mother of the Emperor Jing (Yuwen Chan). Zhu Manyue was said to be from the Wu region, now southern Jiangsu. Because someone from her family, probably her father, was accused of crimes, she was forced to be a servant and assigned to the palace of Yuwen Yun, who was then crown prince under his father Emperor Wu. She was in charge of the clothes of Yuwen Yun, 12 years younger than her. On one occasion, he summoned her to have sexual relations with him; in summer 573, she gave birth to his first son, Yuwen Yan (宇文衍), whose name was later changed to Yuwen Chan. In 578 Emperor Wu died, and Yuwen Yun took the throne. He created Yuwen Chan crown prince, and after Emperor Xuan passed the throne to Yuwen Chan and became retired emperor in spring 579 (with the atypical title of "Emperor Tianyuan" (天元皇帝, Tianyuan Huangdi), he, in another unusual move, decided to create three (and later one more) additional empresses in addition to his wife, Yang Lihua, and Consort Zhu, on account of her being the mother of Emperor Jing, received the title of Empress Tianyuan (Tianyuan Di Hou, 天元帝后, a slightly less honored title than Empress Yang's Tianyuan Huanghou (天元皇后)), later changed to Tian Huanghou (天皇后), and then further changed in 580 to Tian Da Huanghou (天大皇后). It was said that she was not favored by him on account of her being much older and also of lowly birth. Emperor Xuan died in 580, and Empress Yang's father Yang Jian became regent. Three of Emperor Xuan's empresses, other than Empresses Yang and Zhu, became Buddhist nuns, but Empress Zhu did not at this point, and was honored as empress dowager (along with Empress Yang) but with the secondary title of Di Taihou (帝太后), lower than Empress Dowager Yang's title of Huang Taihou (皇太后). In 581, Yang Jian seized the throne from Emperor Jing, ending the Northern Zhou dynasty and establishing the Sui dynasty. The Emperor Jing and other members of the imperial Yuwen clan were soon slaughtered. Empress Dowager Zhu became a Buddhist nun and took the name Fajing. She died in 586 and was buried only with ceremonies due a Buddhist nun, west of the capital Chang'an.
WIKI
Clement the Heretic Clement the Heretic, Irish abbot and heretic, fl. 8th-10th centuries. In his account of Irish monasteries in Germany, Hogan mentions an abbot of St. Martin's of Cologne, which was at the time an Irish institution: "Beatus, Virgilius, Fridolinus do not sound very Irish, yet all admit their nationality. German Protestant historians have no doubt about the Irish nationality of Clement the Heretic; yet Clement does not sound particularly Hibernian." Nothing else appears to be known of Clement.
WIKI
Masahiko Shibayama Masahiko Shibayama (柴山 昌彦) is a Japanese politician. He is a member of the House of Representatives belonging to the Liberal Democratic Party (6th term), Deputy Secretary-General of the Liberal Democratic Party and Chairman of the Federation of Saitama Prefecture Liberal Democratic Party. He served as Minister of Education, Culture, Sports, Science and Technology from October 2018 to September 2019. Early life He was born in Nagoya, Aichi and grew up in Saitama Prefecture. He graduated from the University of Tokyo and joined Sumitomo Real Estate in 1990, but resigned thereafter to study for the Japanese bar examination, which he passed in 1998. In 2000, he was admitted as an attorney and joined the Toranomon Chuo Law Firm in Tokyo. Political career He was elected to the House of Representatives for the first time in 2004, in a special election in Saitama to replace Masanori Arai, who had been arrested for campaign finance violations. He was re-elected the following year in the Japanese general election. In 2008, he was named Vice-Minister for Foreign Affairs under Prime Minister Yasuo Fukuda and maintained this post under the cabinet of Taro Aso. Shibayama lost his Saitama seat to a DPJ candidate in the 2009 general election, but picked up a Kanto bloc seat and remained a member of the House of Representatives. After the LDP returned to power in the 2012 general election, he was named Senior Vice-Minister for Internal Affairs and Communications in the second Shinzo Abe cabinet. He also serves as a "special advisor" to the prime minister, acting as a spokesman for the Abe government with regard to its fiscal stimulus policies, and argued in 2016 that "doubling the number of foreign workers [in Japan] cannot be avoided in this global market situation." Family Shibayama is married and has one daughter.
WIKI
Page:Pan's Garden.djvu/82 leave him alone with the Influence of the Forest all about him to have its unimpeded way, she felt the pangs of that subtle jealousy bite keen and close. He loved the Forest better than herself, for he placed it first. Behind the words, moreover, hid the unuttered thought that made her so uneasy. The terror Sanderson had brought revived and shook its wings before her very eyes. For the whole conversation, of which this was a fragment, conveyed the unutterable implication that while he could not spare the trees, they equally could not spare him. The vividness with which he managed to conceal and yet betray the fact brought a profound distress that crossed the border between presentiment and warning into positive alarm. He clearly felt that the trees would miss him—the trees he tended, guarded, watched over, loved. 'David, I shall stay here with you. I think you need me really,—don't you?' Eagerly, with a touch of heart-felt passion, the words poured out. 'Now more than ever, dear. God bless you for you sweet unselfishness. And your sacrifice,' he added, 'is all the greater because you cannot understand the thing that makes it necessary for me to stay.' 'Perhaps in the spring instead' she said, with a tremor in the voice. 'In the spring—perhaps,' he answered gently, almost beneath his breath. 'For they will not need me then. All the world can love them in the spring. It's in the winter that they're lonely and neglected. I wish to stay with them particularly then. I even feel I ought to—and I must.' And in this way, without further speech, the decision was made. Mrs. Bittacy, at least, asked no
WIKI
Assembling the Parts Step by step build, with Gotcha's noted. All the major parts collected for the build Not shown, all the fasteners laid out. Of course, I'll have to move most of them to have space to work in. Base rails attached to 80/20. Note the nut driver attached to my drill. Lots of nuts to tighten. Here is where I forgot to slide in the captive nuts for the base motor mount. Linear carriages held in place while gantry cross bar is attached. Here is where I forgot to put in the bolts to hold the base anti-backlash nut in place. Here is where I realized that the old style carriage bolts could not be adjusted. Ahren Johnson, CNC Router Parts,  sent me replacement hex head bolts. - Thanks Ahren! Mount the couplings onto the motor shafts before you mount the motors to the N23 mounting plates. My N23 plates don't have countersunk mounting screws. If you do that, remember that you'll need longer bolts. Note the "Low Profile" bearing blocks. Z axis plate with spacer blocks. Bolts and captive nuts used as travel stops to keep carriage on rails. Don't tighten the gantry rails until you have them in the right position. Note the 1530 crossbar position changes when the base is turned over. I offset the 1530 crossbar to reduce the amount of dead space at the end of the router table. This was undone later on. Gantry rails in place Z axis attached to gantry rails. note that there's no feedscrew yet. I was waiting on the delivery of AB nuts and got ahead of myself. First pass at mounting the trim router comes out too low. I'll need to add additional mounting holes to the z axis plate. I used a shaft collar both as a cutting guide when I started the hacksaw cut and as a filing guide when I filed a flat on the end for the coupling to seat onto. Once I cut the feedscrew and filed the ends smooth I also filed a flat on the shaft for the Lovejoy coupling to grip. I rebuilt my base frame to move the feet out to where they should have been. I also shifted the position of the x axis rails all the way to the left and put the gantry crossbar back to the center position. note the home made angle brackets now added   installing Z axis feedscrew is easier done horizontally. Alignment marks help to center the x feedscrew AB nut. Except for squaring up the joints and installing a work surface the assembly is pretty much complete. Table/ Enclosure Home Packaging Electronics
ESSENTIALAI-STEM
Talk:Liberation of Taiwan "Social-media radicalism" section It seems there's some disagreement about whether to include this material in the article, so I'm starting a discussion in the hope of stopping an edit war. It's clear this material is WP:FRINGE and not what the vast majority of people using the phrase "liberation of Taiwan" mean. Should it be included in the article despite this? —Mx. Granger (talk · contribs) 17:35, 17 January 2022 (UTC) * It's not notable enough for the article, its just a very small number of people on social media being extremists. The sources are terrible too, because there aren't any better ones for something this unnotable. Corinal (talk) 23:06, 17 January 2022 (UTC) * I'm inclined to agree with you. —Mx. Granger (talk · contribs) 19:25, 18 January 2022 (UTC) Notability please demonstrate reliability. Horse Eye&#39;s Back (talk) 18:20, 19 January 2022 (UTC) * See the article, please demonstrate lack of reliability. Corinal (talk) 18:25, 19 January 2022 (UTC) * Lol sorry, I meant WP:NOTABILITY. Horse Eye&#39;s Back (talk) 18:27, 19 January 2022 (UTC) * The policy was officially used as seen in the first source, and the change in policy is demonstrated by source two. Corinal (talk) 18:37, 19 January 2022 (UTC) * Official use has nothing to do with WP:NOTABILITY, we need feature coverage in independent WP:RS Horse Eye&#39;s Back (talk) 19:10, 19 January 2022 (UTC) * (edit conflict) The phrase 解放台湾 ("liberate Taiwan") is commonly used to refer to some version of the concept we describe in the article Chinese unification. At first glance, the title makes this article look like a WP:POVFORK. I guess the question is whether the term itself is notable separately from the concept. I would guess not, but I'm open to sources proving otherwise. I think those would need to be sources about the term itself, not the general concept of cross-Strait unification. If we can't find enough sources, then I would suggest merging. —Mx. Granger (talk · contribs) 18:40, 19 January 2022 (UTC) * Perhaps a merger may be good, but as it was used as an official term for a policy, there should be sufficient sources to show notability Corinal (talk) 18:42, 19 January 2022 (UTC) * Those sources would actually need to be presented, we can't just speculate about their existence. Horse Eye&#39;s Back (talk) 19:10, 19 January 2022 (UTC) * Indeed but we should not rush to delete stubs simply because they are stubs. Corinal (talk) 05:07, 20 January 2022 (UTC) * It was not nominated for deletion because it is a stub, it was nominated for deletion because it has no demonstrated feature coverage in reliable sources. Horse Eye&#39;s Back (talk) 01:31, 21 January 2022 (UTC)
WIKI
EXPLAINER-Will the Bank of England raise rates in May after Carney dampened expectations? (Adds more reaction, detail from MPC’s Saunders) By Costas Pitas and Andy Bruce LONDON, April 20 (Reuters) - Bank of England Governor Mark Carney dampened widespread expectations for an interest rate hike in May, pointing out there were also “other meetings” this year. “I don’t want to get too focused on the precise timing, it is more about the general path,” Carney told the BBC. He said Britain should prepare for “a few interest rate rises over the next few years.” “We have had some mixed data ... We’ll sit down calmly and look at it all in the round.” “I am sure there will be some differences of view but it is a view we will take in early May (at the next meeting of the Bank’s Monetary Policy Committee), conscious that there are other meetings over the course of this year.” British government bond prices jumped on Friday. Expectations of a UK interest rate increase in May have shrunk to below 50 percent from 70 percent earlier in the week, according to estimates derived from the swap markets. Sterling took another leg down on Friday to $1.4060 after falling nearly 1 percent in the New York session. In March, the Bank of England’s Monetary Policy Committee voted 7-2 to keep rates at 0.5 percent. Ian McCafferty and Michael Saunders - who were the first officials to call for rates to rise in 2017 - said it was time for rates to increase again for only the second time since the 2008 financial crisis. Saunders on Friday said the BoE no longer needed to keep its foot firmly on the accelerator at a time of rising domestic inflation pressure. He reiterated the BoE’s joint position that “any further tightening is likely to be at a gradual pace and to a limited extent” but added that “a key point is that ‘gradual’ need not mean ‘glacial’. Saunders also said the range of views about interest rates among MPC members may be no wider than usual. A firm majority of economists in a Reuters poll taken before Carney’s comments and published earlier this week said they expect the BoE will raise interest rates to a new post-financial crisis high of 0.75 percent in May. WHAT THE ANALYSTS SAID ANDREW SENTANCE, PWC SENIOR ECONOMIC ADVISER, EX-MPC MEMBER “Quite likely that all 4 external MPC members will vote for a May rate rise. Can they get 1 or 2 internal votes to support them? If Carney is opposed, Broadbent and Haldane are main candidates to push through a rate rise - so watch their statements in the next week or so.” “(Carney’s commentary) opens the possibility of the BoE passing on May and instead hiking later in the year as the data improve. “The data have not been uniformly weak, especially at the start of the quarter, and it is hard to believe the BoE will delay a rate rise because of bad weather. Should the April surveys bounce decisively this would help reassure the BoE that growth is set to improve this quarter.” BANK OF AMERICA MERRILL LYNCH ANALYSTS: “Then last night Governor Mark Carney suggested delay. In a BBC interview he said the BoE was conscious of ‘other meetings over the course of the year’ when they could hike. As hints go, we think it’s as strong as we get. The data justify delay in our view. We have been sceptical of the need for a May hike.” “(Carney’s) interview last night has rocked the boat and introduced a much higher level of uncertainty (over) whether the BOE will decide to raise rates in May or not. We still expect a hike in May, structural reasons to be short front end remain.” “His comments suggest the vote on whether to hike in May is now on a knife-edge, and next week’s 1Q18 GDP report (we expect growth of just 0.2 percent (quarter-on-quarter), in part due to a hit from adverse weather) could be decisive. A hike in May is still likely but, as we had previously warned, it is a much closer call than financial markets were expecting.” “Carney struck back against any doubters that he is still king of the ‘unreliable boyfriends’, with his comments casting a whole (load) of doubt that a further 25 bps rate hike is a slam dunk.” Additional reporting by Jamie McGeever, Editing by Guy Faulconbridge and Toby Chopra
NEWS-MULTISOURCE
Search conditions List of errors in React/Client Error Codes Show Showing from 1 to 100 of 466 results Id Title Description 1 failed err local ssl error (errno success) The error message "failed err local ssl error (errno success)" indicates that an SSL (Secure Sockets 2 x connection to localhost broken There could be several reasons why your connection to localhost is broken. Here are a few possible e 3 localhost not loading react There could be a few reasons why localhost is not loading your React application. Here are some step 4 localhost err_connection_refused The error message "ERR_CONNECTION_REFUSED" typically occurs when a browser is unable to establish a 5 err_connection_reset localhost The error "ERR_CONNECTION_RESET" typically occurs when there is a problem with the network connectio 6 connection reset localhost The "connection reset" error message typically occurs when a connection to a server, in this case, " 7 react error logging Error logging in React is the process of capturing and tracking errors that occur during the executi 8 react localhost not loading There can be several reasons why your React localhost is not loading. Here are some steps you can ta 9 react native localhost network request failed There could be a few reasons why you are experiencing this issue. Here are some possible solutions: 10 react err_local_participant_lost_connection The error "ERR_LOCAL_PARTICIPANT_LOST_CONNECTION" commonly occurs in React when a local participant 11 react err_participant_not_in_room The error message "err_participant_not_in_room" in React could mean that the participant you are try 12 react err_entering_room_still_in_progress The error "err_entering_room_still_in_progress" in React usually occurs when a user tries to enter a 13 react err_participant_already_in_room The error "ERR_PARTICIPANT_ALREADY_IN_ROOM" typically occurs when a participant is attempting to joi 14 react-select z index The z-index property determines the stacking order of elements on a web page. It determines which el 15 z-index react In React, the `z-index` property can be applied to an element using the `style` prop. Here's an ex 16 r reactable package The "reactable" package is a library that enables the creation of interactive and customizable visua 17 r reactable shiny Reactable Shiny is a package in R that allows users to create interactive web applications using the 18 r reactable examples 1. The Reactable is an electronic music instrument that uses a tangible, modular interface to create 19 react select issearchable The isSearchable prop in React Select allows users to search through the dropdown options by typing 20 react accessible select To create an accessible select element in React, you can follow these steps: 1. Import the necessa 21 react-select issearchable Yes, react-select is searchable. It allows users to type in the dropdown input field to search and s 22 react-select invalid The "react-select" component is invalid because it does not meet the criteria or requirements of the 23 react err_selected_content_inaccessible The error message "err_selected_content_inaccessible" in React typically indicates that the selected 24 5 react hooks 1. useState: This hook is used to manage the state of a component. It takes an initial state value a 25 react-select options not showing There could be a few reasons why the options in react-select are not showing: 1. Verify that the op 26 z index not working react There could be several reasons why the z-index may not be working in React. Here are a few common is 27 react-select show error To show an error in React Select, you can use the `className` prop to add a CSS class to the select 28 react-select error state The error state in react-select is a visual indication that there is an error or invalid input in th 29 gl-react-expo gl-react-expo is a library that allows you to write React components that use WebGL for rendering. I 30 react-select not showing selected value There can be several reasons why React Select may not be showing the selected value. Here are a few 31 react-select error Apologies, but I'm not able to assist with this error as it is specific to the React Select library. 32 react err_selected_content_not_exist The error "err_selected_content_not_exist" typically occurs in React when you try to access or refer 33 react-scripts permission denied The "react-scripts permission denied" error typically occurs when you are trying to run a React appl 34 r permission denied "Permission denied" is an error message that indicates that a user or program does not have the nece 35 react err_cert_authority_invalid The error "ERR_CERT_AUTHORITY_INVALID" in React typically occurs when the SSL certificate used by th 36 react native permissionsandroid The PermissionsAndroid module is a part of the React Native framework and allows you to request and 37 react err_permission_denied_for_screen_share If you are receiving an "err_permission_denied_for_screen_share" error while trying to screen share 38 error code status_breakpoint react The error code "status_breakpoint" in React typically indicates a breakpoint was set in the code, an 39 react err_not_supported_app_state_for_screen_share The error message "err_not_supported_app_state_for_screen_share" indicates that the current state of 40 react err_screen_share_failed_due_to_unknown_reaso When encountering the error message "ERR_SCREEN_SHARE_FAILED_DUE_TO_UNKNOWN_REASON" in React, it mea 41 chrome react extension not showing There can be a few reasons why a Chrome React extension may not be showing: 1. Ensure the extension 42 uncaught error should not already be working I'm sorry, but I'm not sure what you're asking. Could you please provide more information or clarify 43 react err_not_supported_browser_for_screen_share The error "err_not_supported_browser_for_screen_share" indicates that the browser you are using does 44 react err_ossl_evp_unsupported' The error "err_ossl_evp_unsupported" in React refers to an unsupported operation in the OpenSSL EVP 45 react error overlay React Error Overlay is a developer tool that provides an overlay with error messages when something 46 react err_not_supported_os_version_for_screen_shar This error message suggests that the operating system version you are using is not supported for scr 47 /bin/sh 1 react-scripts not found The error message "/bin/sh: 1: react-scripts: not found" typically occurs when trying to run a React 48 error /bin/sh react-scripts command not found This error typically occurs when the react-scripts package is not installed or cannot be found in th 49 error spawn react-scripts enoent The error "spawn react-scripts ENOENT" usually occurs when your system is unable to find the `react- 50 error react-scripts start The error "react-scripts start" is a common error message that can occur when running a React applic 51 fatal server error (ee) no screens found(ee) (ee) This error message typically indicates a problem with your X server configuration, which is responsi 52 /bin/sh react-scripts not found The error "/bin/sh react-scripts not found" typically occurs when trying to run a React project usin 53 react err_no_screen_share_exists The error "err_no_screen_share_exists" typically occurs when a screen sharing session is attempted, 54 react err_screen_share_already_in_progress The error "err_screen_share_already_in_progress" in React generally occurs when you try to start a s 55 react err_screen_share_request_before_call_is_conn The error "err_screen_share_request_before_call_is_connected" occurs when a screen share request is 56 react err_screen_share_restricted_from_audio_call If you encounter the React error "err_screen_share_restricted_from_audio_call," it means that you ca 57 react supported versions React is a JavaScript library for building user interfaces. It is developed and maintained by Facebo 58 react err_not_supported_os_version_for_recording The error message "err_not_supported_os_version_for_recording" means that the current operating syst 59 invalid record type insufficient_access_on_cross_r The error "invalid record type insufficient_access_on_cross_reference_entity" typically occurs when 60 invalid record type I'm sorry, but without any specific context or additional information, I cannot determine the exact 61 react errorinfo In React, `ErrorInfo` is an object that represents the error's stack trace and other useful informat 62 react error invalid hook call When you see the "Invalid hook call" error in React, it usually means that you have a rule of hooks 63 react err_invalid_recording_type The error message "ERR_INVALID_RECORDING_TYPE" typically indicates that the recording type is not re 64 g-recaptcha not showing There could be several reasons why the reCAPTCHA may not be showing on your website. Here are some p 65 react err_not_supported_browser_for_recording The error "ERR_NOT_SUPPORTED_BROWSER_FOR_RECORDING" usually occurs when attempting to record audio o 66 stop reason = exc_bad_access EXC_BAD_ACCESS is a common error that occurs when a program tries to access memory that it does not 67 react err_failed_to_stop_recording The error "ERR_FAILED_TO_STOP_RECORDING" is typically encountered when there is an issue with stoppi 68 react 9 I'm sorry, but I cannot understand what you mean by "react 9". Could you please provide more clarifi 69 sa_restart example One possible example of using the "sa_restart" command is to restart the Apache HTTP Server after ma 70 sa_restart "sa_restart" is a command used to restart the Security Gateway and Security Management Server proces 71 obs failed to start recording There could be several reasons why OBS failed to start recording. Here are a few troubleshooting ste 72 react error reporting In React, error reporting refers to the process of identifying and handling errors that occur during 73 react err_failed_to_start_recording The "err_failed_to_start_recording" error message usually indicates that there was a problem while a 74 7 zip error cannot open file as archive This error typically occurs when trying to open a file that is not a valid archive file or is corrup 75 7z error e_fail The "E_FAIL" error in 7z typically indicates a general failure during the extraction or compression 76 (26) failed to open/read local data from file/appl There are several possible reasons why (26) failed to open/read local data from a file or applicatio 77 z_mem_error A z_mem_error can occur when a computer program is unable to allocate memory for a particular task o 78 z_data_error It seems like there is an error with the data. Can you please provide more information or clarify th 79 tar failed to open ' . tape0' There could be several reasons why tar is failing to open ' . tape0'. Here are a few possible explan 80 typeerror failed to fetch react This error usually occurs when there is an issue with fetching data from an API or when trying to ac 81 r fatal error unable to open the base package I'm sorry to hear that you're encountering a fatal error. The error message you mentioned usually me 82 r read_excel zip file cannot be opened There could be a few reasons why the zip file cannot be opened using the `read_excel` function in R. 83 jojo react fanfic Title: "Unexpected Encounters: A JoJo React Fanfic" Chapter 1: A Bizarre Introduction It was a nor 84 failed to fetch error react The "failed to fetch" error in React typically occurs when making API requests using the Fetch API o 85 c error_t "error_t" is a data type in the C programming language. It is typically used to represent an error o 86 c read errno The `errno` variable in C is used to indicate an error that occurs during the execution of a program 87 c open errno In C, `open()` is a function used to open a file. The `errno` is a global variable that is set by sy 88 react typeerror failed to fetch This error usually occurs when there is an issue with fetching data from an API or server in a React 89 react error enoent no such file or directory The error `ENOENT: no such file or directory` typically occurs when a file or directory that is bein 90 react err_failed_to_open_file The error "Failed to open file" in React typically occurs when the specified file path is incorrect 91 react err_recording_already_in_progress The error "err_recording_already_in_progress" typically means that a recording process is already on 92 react troubleshooting When troubleshooting a React application, here are some common steps to follow: 1. Check the error 93 qsoundeffect(qaudio) error decoding source file I'm sorry, but I couldn't find any specific information about the error message "qsoundeffect(qaudio 94 react err_wrong_recording_type_for_audio_call The error message "err_wrong_recording_type_for_audio_call" indicates that there is an issue with th 95 react devtools error calling listener There are a few reasons why you may be encountering an error while calling a listener in React DevTo 96 react error #321 The error "React Error #321" is not a specific error code in React. It is possible that the error me 97 react error #31 There is no specific information provided about "react error #31", so it is difficult to give a spec 98 typeerror (0 _reactredux.connect) is not a functio The error message "TypeError: (0, _reactredux.connect) is not a function" typically occurs when the 99 react error catch In React, the ErrorBoundary component is used to catch and handle errors that occur during rendering 100 react error context The "React error context" refers to the concept of error handling in React applications using the Er
ESSENTIALAI-STEM
User:Arvam Welcome to my page. When I find time, will keep update this page. :) My interest is in gardening, reading books and listening to music. Here in WP, have been active from late 2012. Find it interesting. Most of editors I found are supportive and stimulating to work with. These are few of pages that I had created and contributed to I Am That - a book for meditation and contemplation. Read this books slowly. Read just one chapter a day and spend your day contemplating on its message. Deepti Omchery Bhalla - heard her first on youtube, when I was doing some research on the bhajan by Sri Tulsidas. Was entranced by her beautiful rendering. Tarzie Vittachi - His book gave me a neutral perceptive about the Sri Lankan problem These are other pages that I have been contributing to Ashtavakra Gita - an unique book that deals with the mystical experience of the Self. Anthony de Mello - a christian mystic from India. His books are a pleasure to read and loved by all spiritual seekers. Kalki Bhagavan - a spiritual master from India, whom I respect. Do add your comments in my talk page, regarding any pages that I have created or edited.
WIKI
Figuring Out Treatments Creating a Nootropic Stack: Guidelines for Starters If you have been doing researches in the past few days, then certainly you already have acquired a good volume of knowledge on nootropics and its benefits on ADHD patients. It is a supplement that produces cognitive enhancing effects. They are practically beneficial to people who want to maximize the potential of their brains for remember or thinking. There are wide range of nootropics available in the market these days and each of them works for the specific purpose to which they are intended to address. What Is a Nootropic Stack? A nootropic stack is a set of supplements combined together to produce a good number of beneficial effects on the brain, particularly in learning, motivation, memory and focus. The combination of different supplements is basically targeted towards providing a synergistic effect on the brain which is far greater than what a single supplement can give or create on its own. This kind of supplementation technique is utilized and taken advantage of by people for the purpose of boosting the capabilities of their brain much more than what any single supplement could give, being alone. There are two ways through which you can begin on nootropic stacks. One is through preformulated stacks and the next one is through custom stacks. Preformulated Stacks Explained The first choice that you do have is to buy the preformulated stack from a manufacturer. Most of the times, this manufacturer does have their own combination of the supplements. The primary benefit of buying a preformulated nootropics stack is that you can gain a better assurance when it comes to the effect of the supplements. In addition to that, you can get convenience out of this option because you no longer have to weigh and mix your own combinations of nootropics. Nevertheless, there also a disadvantage to this option. Seeing that it is preformulated, it is ready made and you lose your ability to make some experiments on the components that make up the stack and their respective dosages. When you talk of the preformulated option, however, it is highly necessary that you are choosing a well-reputed company. This is for the sake of making sure you are going to be safe upon using the product. Even more, you can rely on the quality of the product when it is coming from a reputable manufacturer. What About Custom Stacks The primary benefit that custom stacks have to offer is allowing you to become flexible and creative. Basically, you are given the chance to make any changes on the stack components. Even more, you are allowed to do some changes on the dosages of the components that make up the stack. Manufacturers often sell preformulated stacks at more expensive prices because they spend on the marketing and packaging of the product, so when you go with custom stacks, you can save some money in your pocket. Resource: blog
ESSENTIALAI-STEM
Robyn Adele Anderson Robyn Adele Anderson (born February 19, 1989) is an American singer and stage actress based in New York City. She is a cast member and featured artist for Scott Bradlee's Postmodern Jukebox with over 250 million YouTube views on her music videos. She is credited with the band's breakthrough covers of "Thrift Shop" and "We Can't Stop" in 2013. Anderson also performed lead vocals for performances on Good Morning America (ABC) in 2013, and TEDx in 2014. Early life and education Robyn Adele Anderson was born in Albany, New York. She grew up in Glenmont, New York with her mother, father, and half-sister. She is of German, Dutch, English, Scottish, and Native American descent. She attended Bethlehem Central High School where she played clarinet in the Wind Ensemble and sang in several choral groups. She graduated from Binghamton University in 2011 with a Bachelors of Arts degree in Political Science and Arabic and concentrations in Middle Eastern Studies and International Affairs. She studied at the University of Seville in Spain for a semester in 2009 and became a study-abroad peer adviser. Her academic accomplishments won her the Israel J. Rosefksy Language and Culture Scholarship and the Chancellor's Award for Student Excellence in 2011. She was also selected as the intern for Binghamton's Planet Library project, an internationalization effort. Career From 2012 to 2015, Anderson worked for the ANSOB Center for Refugees, a non-profit organization in Astoria, NY that assists refugees in obtaining legal and social services. In February 2013, Anderson began collaborating with American pianist and musical arranger Scott Bradlee, becoming a founding member of Bradlee's Postmodern Jukebox collective. In 2013, Anderson's vocal contributions to the Postmodern Jukebox cover of Macklemore & Ryan Lewis' "Thrift Shop" (2012) helped the video receive one million views on YouTube in its first week and four million in its first year. After serving as Postmodern Jukebox' primary vocalist, Anderson started producing music under her own name. The music was released on YouTube and other platforms. As of August 2021, her YouTube channel has over 653,000 subscribers and over 84 million views. In January 2014, she became a staff writer for the online K-pop magazine KpopStarz. In 2015, she was cast as Lilyan Tashman in Cynthia von Buhler's Speakeasy Dollhouse: Ziegfeld's Midnight Frolic at the Liberty Theatre. In 2016, she played the part of Lucile in FlexCo.'s production of The Flying Doctor at the Central Booking Art Space in the Lower East Side. Occasionally she is a guest vocalist for the musical duo The Skivvies, composed of Lauren Molina and Nick Cearley. In 2017, Anderson began a series of solo shows, first at Feinstein's/54 Below followed by several at Sleep No More's Manderley Bar, and a two-week tour in 2018 alongside Von Smith. Anderson voiced the character Robin Koninsky (a Polish singer) in the 2018 video game Red Dead Redemption 2. Other members of Postmodern Jukebox also made appearances. In the same year, Robyn Adele (Vol 1.) was released on Bandcamp. Solo * Vol. 1 (2018) * Vol. 2 (2019) * Vol. 3 (2019) * Vol. 4 (2019) * Platinium Collection - EP (2019, Vinyl) * Vol. 5 (2020) * OMG I Love Jazz (2020) * Vol. 6 (2021) * A Very Vintage Christmas - EP (CD) As member of Postmodern Jukebox * Introducing Postmodern Jukebox (2013) * Twist is the New Twerk (2014) * Clubbin' with Grandpa (2014) * Selfies on Kodachrome (2015) * 33 Resolutions Per Minute (2017) Postmodern Jukebox videography As of December 12, 2016, music videos featuring Anderson account for over 200 million of Postmodern Jukebox' 1 billion+ total YouTube viewcount. She also appears performing backup vocals on at least one video with Postmodern Jukebox: "Rude - Vintage 1950s Sock Hop - Style MAGIC! Cover ft. Von Smith" published July 15, 2014 * TEDx Talks: "A bizarro world of pop music | Postmodern Jukebox | TEDxFoggyBottom" * Good Morning America (ABC)
WIKI
Talk:WOUB (AM) Community station? As far as I can tell, WOUB-AM does not fit the definition of a community radio station. To qualify for this designation, as opposed to the term's generic use, volunteers from the community would have to be engaged in the station's on-air broadcast activities. Nothing in the article or on the station's website indicates this is the case. Accordingly, I am removing Category: Community radio stations in the United States, and I also plan to edit the lead, which currently uses "community radio" as a wikilink in its description. Allreet (talk) 10:44, 17 May 2018 (UTC)
WIKI
con el fin de Preposition * 1) in order to, for the purpose of, with the purpose of, with the goal of, with a view to, with the aim of
WIKI
Design Performance Standards (DPS) For Safety Critical Elements (SCE) The safety critical elements are those parts of an installation or plants that can be subjected to failure and substantially cause, contribute, prevent or help recover from a major accident hazard or event. It is essential to develop performance standards for the identified SCEs. The SCE life cycle management involves alignment of maintenance, inspection and testing and performance history to maintain SCE in suitable working conditions. Continual monitoring helps in conformance of SCEs by Performance Standards. The following steps as depicted in are used for the identification of SCEs: • Identify the systems and elements of the facility • Review the list of Major Accident Events (MAE) , developed in the HAZID Study and Major Accident Events List, and identify the systems associated with each MAE; • Assess the criticality of each system by determining whether the failure of the system could cause a MAE or contribute substantially to a MAE. Any system found to be safety critical on this basis is deemed to be safety critical for reasons of integrity, i.e. if their integrity is maintained, then the MAE cannot occur; • For any system found not to be safety critical above, assess whether the system prevents or limits the effects of a MAE. Any system or equipment item found to be safety critical on this basis is deemed to be safety critical for reasons of control and mitigation as emergency response to a MAE; and • Once identified, the SCEs are categorized as follows: • Integrity; and/or • Control and mitigation. This process allows the identification of all SCEs associated with the facility as well as detailing those systems deemed not safety critical with regard to causing or mitigating a MAE. Note: There are several systems whose failed integrity could lead to serious harm/injury, e.g. pressurized release, exposure to chemicals, etc, but not necessarily a MAE. These systems are not identified as an SCE, as the consequence due to failure of their integrity is not severe enough to lead or contribute ‘substantially’ to a MAE. This determination has been made by reference to the results of the HAZID, and engineering judgement and experience. The recommended model for developing Safety Critical Element Performance Standards is based on the Functionality, Availability, Reliability, Survivability and Interaction (FARSI) format where: Functionality refers to the purpose that the Safety Critical Element has to be able to perform to prevent, detect or mitigate a hazardous event or to protect people. Availability refers to the proportion of the time that the Safety Critical Element will be required to perform on demand. Reliability refers to how likely the Safety Critical Element is to perform on demand. Survivability refers to how the Safety Critical Element will perform after a major accident has occurred, i.e. how well it will survive a fire, explosion, dropped object, etc. Interaction refers to the way that the Safety Critical Element in question is dependent upon other SCEs to operate or otherwise interacts with other SCEs
ESSENTIALAI-STEM
Hillary Clinton Is Pitching Herself To Millennials | HuffPost WASHINGTON -- Is Hillary Clinton actually moving left, and if so, why? The answer is yes, though not on every topic. And the reason is to push young voters' turnout and grassroots organizing enthusiasm as close as possible to the levels that President Barack Obama enjoyed in 2008. After two terms of President Obama, it won't be easy, but our challenge is to again excite the passion of the youngest voters, Clinton campaign chairman John Podesta told fellow Georgetown Law Center alums at a luncheon last week. The campaign aims to fire up millennials with both a tailored approach to the issues and innovative use of technology. For the latter, the team recently brought aboard a former high-ranking Google manager to push new initiatives in social media and big data-guided outreach. As for issues, Clinton advisers and Democrats close the candidate say she will focus on matters of particular appeal to those voters ages 18 to 33. The idea is that she will go strongly to the left on social issues, move somewhat less left on economic issues, and remain a centrist on foreign policy, military affairs and terrorism. The target areas include climate change and other global environmental concerns, and social issues broadly defined -- including support for same-sex marriage; a path to citizenship for most undocumented immigrants; and criminal justice reforms such as changing harsh sentencing rules, reducing the current reliance on incarceration and opposing militarization of local police forces. Clinton also plans to take a measured, big-picture approach to dealing with the overbearing influence of corporate wealth and the resulting public cynicism. She will advocate a higher minimum wage and support a constitutional amendment to overturn the Citizens United decision. But she's not about to become an all-out, rail-against-the-banks populist in the manner of Sen. Elizabeth Warren (D-Mass.). And as she did this week, Clinton will talk up the role of small business and innovation. Especially on climate and social issues, the calculation is that the entire electorate has rapidly moved left, led by the youngest voters, whose views on the full range of these topics is starkly more liberal than those of the oldest voters. It's become almost too easy to ridicule Republicans speaking to young audiences as out of the mainstream. On climate change, some of the Republicans remind me of Alfred E. Neuman, said Podesta last week. What, me worry? Economics are a closer question among millennials. Their distrust of big-government solutions is robust; their doubts about the efficacy of programs such as Social Security is deep. They believe in entrepreneurship, if for no other reason than that the old pyramid of lifetime hiring is gone. So far, Hillary Clinton has avoided taking firm stands on the Keystone XL pipeline or the Trans-Pacific Partnership trade pact. If and when she is forced to do so, she'll flat-out reject the former, one adviser predicts, and look for less-than-sweepingly ideological reasons to temporarily oppose the latter. If the goal is to instill passion in millennials, however, there is little reason to dwell on foreign policy, or so it seems. A recent poll shows that the current crop of youngest voters is noticeably less worried about terrorism than the previous cohort. The overwhelming American consensus is that the Iraq War was a mistake and that the bomb-and-drone approach to ending terrorism and making the U.S. safer hasn't worked. But that doesn't necessarily mean voters want the U.S. to withdraw from the world. It's more likely to mean that voters, especially millennials, don't see the Global War on Terror as central to the 2016 contest. So even though Clinton's tenure as secretary of state is her top official on-the-job experience, she isn't going to make it the centerpiece of her campaign. Republicans will still dwell on what she did and didn't do at the State Department. But it's doubtful young voters will care. Do you have information you want to share with HuffPost? Here's how.
NEWS-MULTISOURCE
7 Semiconductor Stocks to Buy on the Dip InvestorPlace - Stock Market News, Stock Advice & Trading Tips With August’s signing of the bipartisan CHIPS and Science Act of 2022, investors ought to consider semiconductor stocks to buy on the dip. Primarily, this groundbreaking legislation will make historic investments to bolster competitiveness among U.S. workers and businesses. More importantly, the bill represents a key component of economic stability and national security. Earlier, I mentioned that the CHIPS Act could potentially address supply chain vulnerabilities. One of the lessons of 2022 is that the U.S. competes with international rivals who may lack a full deck. For instance, Russia’s invasion of Ukraine forced the recognition that inflows of critical commodities risk disruption at a moment’s notice. However, bolstering domestic production could mitigate such impacts, thereby drawing interest for semiconductor stocks to buy on the dip. Moreover, stability in the chip-manufacturing space represents a tailwind for every technology player. True, the CHIPS Act seemingly supports certain semiconductor stocks to buy on the dip more so than others. However, in a tacky Hallmark sort of way, we’re all in this together. What’s good for the U.S. chip sector should invigorate domestic and western-friendly markets. Semiconductor Stocks to Buy on the Dip: Intel (INTC) Source: tomeqs / Shutterstock.com Tech icon Intel (NASDAQ:INTC) represents one of the riskier plays among semiconductor stocks to buy on the dip. However, it may also be the most compelling. Recently, Reuters reported that Intel inked an agreement with Canada’s Brookfield Asset Management (NYSE:BAM) to “jointly fund up to $30 billion for the U.S. chipmaker’s leading-edge chip factories in Arizona.” This contract fuels “Intel’s ambition to bring more chip production onshore without weighing on its balance sheet.” Reuters added that through the deal, “Intel could preserve debt capacity for other priorities with financing commitment for a multi-year project, while maintaining operational control.” David Zinsner, Intel’s finance chief, stated that the arrangement “builds on the momentum from the recent passage of the CHIPS Act in the U.S.” Here’s the deal with INTC stock. On a year-to-date basis through the close of the Aug. 24 session, shares hemorrhaged more than 36% of market value. However, Gurufocus considers Intel to be “significantly undervalued.” In particular, the company’s forward price-earnings ratio is 13.6 times, below the industry median of 17. Micron Technology (MU) Source: Charles Knowles / Shutterstock.com Another intriguing name among semiconductor stocks to buy on the dip, Micron Technology (NASDAQ:MU) represents a clear beneficiary of the CHIPS Act. According to the White House announcement on the matter, Micron announced a $40 billion investment in memory chip manufacturing. Per the statement, the initiative will create up to 40,000 new jobs in construction and manufacturing. “This investment alone will bring the U.S. market share of memory chip production from less than 2 percent to up to 10 percent over the next decade.” To be sure, this latest development represents a substantial tailwind for the broader U.S. tech industry. However, Micron is especially eager to bolster stability in domestic supply chains. A few years ago, the New York Times highlighted how the company suffered from a sophisticated Chinese corporate espionage incident. Looking at the equities market, MU clearly has seen better days, suffering a 39% YTD loss. Still, Gurufocus rates shares as “modestly undervalued.” Therefore, MU should be on your radar of semiconductor stocks to buy on the dip. Semiconductor Stocks to Buy: Skyworks Solutions (SWKS) Source: madamF / Shutterstock.com To be clear, the CHIPS Act’s main focus centers on invigorating U.S. production, thus directly challenging China’s hegemony. At the same time, the bill may benefit neighboring countries, particularly Mexico as an alternative to Asian chip production. Therefore, Skyworks Solutions (NASDAQ:SWKS) may deserve some attention from investors bargain-hunting semiconductor stocks. According to Nikkei Asia, “Mexico stands to benefit from U.S. incentives for chipmakers, an Economy Secretariat official said, arguing that her country offers a lower-cost production base for companies like Intel.” Mexico, with its proximity and trade links to the U.S., sees America’s bid to decouple its chip supply chain from Asia as an opportunity to attract nearshoring investment. “It does not make sense to do everything in the United States because it is much more expensive,” Monica Duhem Delgado, head of the secretariat’s global economic intelligence unit, said in an interview. With Skyworks already having operations in Mexico, SWKS may be built for the long run. Additionally, the integrated device maker features a significantly undervalued profile, likely attracting attention among speculators. ASML (ASML) Source: Ralf Liebhold / Shutterstock As a Dutch company, ASML (NASDAQ:ASML) doesn’t immediately stand out as one of the semiconductor stocks to buy. At least, it doesn’t stand out in terms of CHIPS Act beneficiaries. However, investors should consider two factors. First, ASML calls a friendly nation home. Second, it’s the only company capable of assembling extreme ultraviolet (EUV) lithography machines, per CNBC. “ASML has a monopoly on the fabrication of EUV lithography machines, the most advanced type of lithography equipment that’s needed to make every single advanced processor chip that we use today,” said Chris Miller, assistant professor at the Fletcher School at Tufts University. “The machines that they produce, each one of them is among the most complicated devices ever made.” Put another way, CHIPS Act or not, ASML drives indelible relevance to the chip-manufacturing segment. With the U.S. securing its own supply chain, this may be a matter of a rising tide lifting all boats. As a bonus, Gurufocus considers ASML stock to be “modestly undervalued.” Not surprisingly because of its relevance, the issuing company features excellent profitability metrics. Semiconductor Stocks to Buy: Microchip Technology (MCHP) Source: Michael Vi / Shutterstock.com Billed as a leading provider of smart, connected and secure embedded control solutions, Microchip Technology (NASDAQ:MCHP) offers an intriguing take on semiconductor stocks to buy on the dip. While shares have enjoyed some recent momentum, gaining about 6% in the trailing month, MCHP currently is down 22% for the year. Given the broader implications of the CHIPS Act, the stock potentially has much room to run higher. In part, Microchip released this statement regarding the legislation: It provides critical investments to even the global playing field for U.S. semiconductor companies and is strategically important for our economic and national security. As the largest U.S.-headquartered supplier of microcontrollers and the global leader in semiconductors in , we will benefit from the Act’s investment tax credits and potential additional grants. Because of rising tensions in the geopolitical sphere, Microchip will likely see greater fundamental demand. As well, MCHP delivers a nice bonus, with Gurufocus rating the company as modestly undervalued. In particular, its forward PE of 12 times is more favorable than the 17-times median for the semiconductor industry. Nvidia (NVDA) Source: Michael Vi / Shutterstock.com While the CHIPS Act represented a key achievement for the Biden administration, it didn’t receive universal support. True, the bill was bipartisan in nature. However, drilling into the granularity, some critics pointed out that the federal government will end up picking winners and losers. In other words, the CHIPS Act directly benefits chip manufacturers, not designers who outsource the manufacturing component to other companies. Therefore, on the face of it, Nvidia (NASDAQ:NVDA) doesn’t appear to be one of the best semiconductor stocks to buy here. Its specialty focuses on innovative chip designs, not physically building them. To the critics’ point, Nvidia’s rivals that do feature a manufacturing arm (i.e. Intel) get an unfair advantage. Nevertheless, the bigger point to remember is that the CHIPS Act should shore up domestic tech supply chains. When the coronavirus pandemic hit us, it devastated everyone involved in the semiconductor ecosystem. With greater stability forecasted, Nvidia should improve, meaning NVDA belongs on your radar. Semiconductor Stocks to Buy: GlobalFoundries (GFS) Source: viewimage / Shutterstock.com When one of the starkest lessons of the Covid-19 crisis focused on dependencies. As multiple news outlets discussed, Taiwan dominates the foundry (or outsourced semiconductor manufacturing) business. However, the country also finds itself routinely embroiled in geopolitical controversy. Plus, the region itself represents a hotspot waiting to spill over militarily. So, many people asked themselves why the U.S. couldn’t drive its own foundry industry? Well, the Malta, New York-headquartered GlobalFoundries (NASDAQ:GFS) offers a viable solution. Combined with the CHIPS Act, it now has the support it needs to drive its expansion efforts. According to the aforementioned White House press release, Qualcomm (NASDAQ:QCOM) and GlobalFoundries have announced a new partnership. In part, this agreement involves $4.2 billion to “manufacture chips in an expansion of GlobalFoundries’ upstate New York facility. Qualcomm, the leading fabless semiconductor company in the world, announced plans to increase semiconductor production in the U.S. by up to 50 percent over the next five years.” Now, GFS shares are up 30% over the trailing month so they might not have the greatest upside potential. Still, down almost 10% for the year, GFS is one of the semiconductor stocks to buy on the dip. On the date of publication, Josh Enomoto did not have (either directly or indirectly) any positions in the securities mentioned in this article. The opinions expressed in this article are those of the writer, subject to the InvestorPlace.com Publishing Guidelines. A former senior business analyst for Sony Electronics, Josh Enomoto has helped broker major contracts with Fortune Global 500 companies. Over the past several years, he has delivered unique, critical insights for the investment markets, as well as various other industries including legal, construction management, and healthcare. The post 7 Semiconductor Stocks to Buy on the Dip appeared first on InvestorPlace. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:Joe Carstairs Marriage Cannot see any evidence of her marrying, as mentioned in article. GrahamBould (talk) 19:27, 23 September 2008 (UTC) * It's referenced now. The wikiservers barfed while I was working on it and I lost half an edit. 8-( Andy Dingley (talk) 19:35, 23 September 2008 (UTC) Copyright problem This article has been revised as part of the large-scale clean-up project of a massive copyright infringement on Wikipedia. Earlier text must not be restored, unless it can be verified to be free of infringement. For legal reasons, Wikipedia cannot accept copyrighted text or images borrowed from other web sites or printed material; such additions must be deleted. Contributors may use sources as a source of information, but not as a source of sentences or phrases. Accordingly, the material may be rewritten, but only if it does not infringe on the copyright of the original or plagiarize from that source. Please see our guideline on non-free text for how to properly implement limited quotations of copyrighted text. Wikipedia takes copyright violations very seriously. For more information on this situation, which involved a single contributor liberally copying material from print and internet sources into several thousand articles, please see the two administrators' noticeboard discussions of the matter, here and here, as well as the the cleanup task force subpage. Thank you. --Moonriddengirl (talk) 01:11, 22 April 2009 (UTC) * Thanks for your efforts in clearing this up (I'm so glad I don't do snails!). I've got an (as yet unread) copy of the one likely source book (Queen of Whale Cay) and the few other useful print sources, so when I have time I'll try to get through this article and restore as much of the useful content as possible, without copyvio. Andy Dingley (talk) 01:53, 22 April 2009 (UTC) Jack Stripes Marion Carstairs also spent considerable sums of money on building boats intended to make a fast cross Atlantic run. The last and fastest of these was "Jack Stripes". Fuller details used to be in the Basildon Motor boat Museum.AT Kunene (talk) 20:05, 23 May 2013 (UTC) Pronouns Marion Barbara Carstairs chose to be called Joe. She wore men’s clothing specifically designed to diminish her bust. She would also walk about her island wearing a false mustache. It is possible that, were she alive today, she would identify as a transgender man. However, Joe referred to herself as a woman and so, for the purposes of this post and for the sake of not making an assumption, I have as well. https://blog.marinersmuseum.org/2020/09/not-your-average-joe/ Oathed (talk) 01:04, 25 January 2022 (UTC) Treatment of native people There is no reference in this article of Joe’s abuse and rule over of the people Whale Cay. Joe didn’t build those buildings <IP_ADDRESS> (talk) 20:57, 9 December 2023 (UTC)
WIKI