Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Leges provinciae The leges provinciae were sets of laws first enacted in 146 BC designed to aid in the regulation and administration of the Roman provinces. Written specifically for each province, the leges provinciae was drafted by the victorious general with the help of a commission of ten legati, or advisors, who were usually of senatorial rank. Then the charter was enacted, provided it was approved by the Senate. History Provincial administration before 146 BC was achieved in essentially the same manner as it was after the advent of the leges provinciae. In 167 BC, for example, Lucius Aemilius Paulus imposed an extensive settlement on Macedonia. Paulus and his commission divided Macedonia into four independent republics; and they wrote laws for each region, including the amount of tribute to be paid to Rome. Settlements prior to 146 BC, including Paulus' settlement of Macedonia, were informal. The leges, or lex provinciae originated in 146 BC after Scipio Aemilianus' settlement of Africa. Like previous provincial organization, Africa was settled without a formal charter3. Later that year, however, the senate seems to have passed the leges provinciae, which created formal constitutions for the provinces and set a precedent for future conquests5. Examples include Publius Rupilius' Lex Rupilia for Sicily in 132 BC and Pompeius Magnus' Lex Pompeia for Bithynia1. Lex provinciae and leges provinciae were used interchangeably over the course of Roman history. Although drafting formal constitutions for provinces became more common after the advent of the leges provinciae, having a leges provinciae was not a necessary condition for the Romans exercising direct rule. Several territories settled after 146. BC had provincial status without a leges provinciae. For example, parts of Germania seem to have been subject to paying tribute without a formal charter3. Provisions The leges provinciae had four main objectives: I) it divided the province into regions, II) it made arrangements for taxes and marked out tax districts, III) it divided the province into conventus for judicial purposes, and IV) it defined the relationships between the senate, magistrates, and popular assemblies1. The main objective of the leges provinciae was to formalize the conquered territory's status as a province and to exact tribute from it. The leges provinciae were not detailed constitutions designed to resolve everyday affairs. Rather, they were basic charters or formulas which organized the territory and specified certain basic regulations. The day-to-day administration of the province was done by a combination of magistrates and senatorial commissions. The governor of the province had autonomous power and was free to enact edicts so long as they complied with the leges provinciae4. The leges provinciae determined the extent of the governor's power in the sense that it limited the kinds of cases that the governor could hear2.
WIKI
Erae: how to access, edit, and upload Alt configs? In Erae Lab, how do you download and upload the Alt configuration? There’s no Erae thread devoted to regular help, so I made this new thread. If it should get folded into some other thread, please do that. Alt is “interlinked” with the main Layout. So when saving/loading, say Layout 1 (alt is combined) It gets tricky to “move” around just the Alt part of Layouts (but it can be done) For now, a bit planing ahead, is a good advice :wink: When I’m in Eraa Lab and I’m editing Layout 5, I only see the image for Layout 5, never Layout 5alt. When in Erae Lab, how do I make Layout 5alt appear on the screen so that I can edit it separately from Layout 5? This is what I have (you can always go get the zip fie containing all Factory layouts) https://www.embodme.com/downloads ERAE Lab V1.0 Factory layouts Layout5 Layout5 - ALT edit: also take notice if you are in “Live” mode or not 1 Like Thanks. My MacBook’s screen resolution made the ALT indicator in Erae Lab, which has a different appearance on the hardware, almost invisible. I stopped using Erae Lab’s live mode because it’s inconvenient when a layout generates the “incorrect format” error. Embodme says they’ve fixed the error where Erae Lab declares saved layouts—even factory layouts—as incorrect and refuses to load them, so I look forward to the next version. 1 Like
ESSENTIALAI-STEM
J.P. Bekasiak J.P. Bekasiak (born January 1, 1982) is a Canadian football defensive tackle who most recently played for the Montreal Alouettes of the Canadian Football League. He was drafted as the fourth overall pick in the 2007 CFL Draft by the Hamilton Tiger-Cats. He played college football with the Toledo Rockets.
WIKI
Russian ex-minister Ulyukayev: I am victim of 'monstrous set up' MOSCOW (Reuters) - Former Russian economy minister Alexei Ulyukayev, accused of taking a $2 million bribe from Rosneft chief executive Igor Sechin, told a court on Thursday he was the victim of “a monstrous and cruel provocation.” State prosecutors said the bribe was given last year on Nov. 14 in exchange for Ulyukayev approving the sale of state-controlled oil company Bashneft to Rosneft. Ulyukayev denies the charges. He says he thought the bag holding the bribe was a gift of expensive alcohol. “A monstrous and cruel provocation was carried out against me,” Ulyukayev told the court in his final statement before it hands down a verdict on Dec. 15. “This trial has aroused public interest similar to that of a circus,” he added. “The charges are absurd, the evidence is absurd, and at its base lies the cruelty and impunity of the provocateur.” Rosneft head Sechin, a witness in the trial and a close ally of President Vladimir Putin, has not appeared in court, citing work commitments. Russian prosecutors earlier this month sought a sentence of 10 years in jail for Ulyukayev. Reporting by Polina Nikolskaya; Writing by Dmitry Solovyov; Editing by Andrew Osborn
NEWS-MULTISOURCE
TechSpot Advice: Should I partiton or add a 2nd HDD? Storage By Stu_Brookes Jun 8, 2005 1. Hi all, I'm in a quandry at the moment. I need to re-format my 64GB hdd, I'm also going to go to Windows XP. I'm thinking of changing my set up as well, as I've recently bought an iPod so store a lot of music. This time, I've had to back up everything which is a lot of time and a lot of CDs. I have two ideas 1) Do I just partition my current HDD. Using one partition for the O/S, another for all Apps/Programmes and a 3rd partition for MP3s. That way, if anything goes wrong, I only need to format the 1st partition and re-install XP. I still have all my other date. However, someone said I'd need to re-install all Apps and Programmes as well. Is that true, I thought it'd only be certain Apps and Progs like NAV and Office. 2) Do I add a 2nd HDD. I was going to buy a 10GB HDD for my O/S, then partition my 64GB into (i) Programs/Apps and (ii) Music and Video. I was then told I needed identical HDDs for that, otherwise I'd get poor performance. And I'd still have the same problem regarding Progs/Apps if I need to re-install the O/S at any point. What's your opinion or advice on this? Much appreciated Stu   2. Nodsu Nodsu TS Rookie Posts: 9,431 You will need to reinstall your applications because most programs keep their data in WIndows registry. If you nuke Windows, the registry goes as well and most of your applications will break. So from a backup point of view there is no use in separating the OS and apps. You do not need identical drives. Did you make a typo and meant 100GB? If not then it is a very bad idea. Any 10GB drive you get will be slower than your 64GB one. It is not a good idea to run your OS off a slow drive. Plus, I doubt that you will find any "new" 10GB drives under warranty so you will end up with a used part with very questionable lifetime.   3. Stu_Brookes Stu_Brookes TS Rookie Topic Starter Okay, thanks for that. You've also answered my follow up question. I had originally planned on installing the O/S on a 'smaller, slower' HDD than everything else. But I thought that may be a potential flaw. So, if I understand correctly I either buy a new HDD that is at least equal to my current HDD or I just partition my current HDD (and keep apps/progs on the same partition as the O/S). Is there a list of what Apps/Progs rely on the Registry? I presumed it was 'essential' stuff only, like Office, NAV, Internet Security, Updates etc. Games etc won't rely on the registry will they?   4. Nodsu Nodsu TS Rookie Posts: 9,431 Any application you install by unpacking a bunch of files into a dietory will work just fine. All applications that install through an installer (you have to run an .exe or .msi to intall) register themelves so they would show up in add-remove programs and put shortcuts in your start menu and desktop. This doesn't necessarily mean that the application will break when that info goes missing. I you have a simple and/or a robust program that does not rely heavily on the registry or copes with its entries missing from the regitry then it will not break. You can track down the program from your Program FIles folder and make new shortcuts to run it. You will not be able to uninstall it but deleting the folder from Program FIles will do the trick. There are not many progams like this around :) Modern applications install and register piles of objects in many locations on your hard disk, including system folders and also keep all their information in the registry and will crap their pants when that information is missing. From the list you gave, only some games will fall in the first or second category. Office and antivirus applications are guaranteed to break when the OS goes AWOL. So, again, from the backup point of view there is not much point. There is a benefit from the performance viewpoint though. Keeping Windows on a small specialised partition will allow the OS to run on the fastest part of the disk (the beginning) without much fragmentation while your bulky programs sit on the bigger and more fragmented partition further away. When Windows dies, you will have to reinstall everything of course. I suggest you partition your 64GB drive for Windows: ~10GB for Windows only, ~50GB for Program Files and Documents and Settings. You will have to tweak Windows to make this happen - such things will not be asked from you during the installation. Buy a new 200GB+ drive for the rest of your data. If you are a good boy you will also frequently make disk images of your first drive to the second as backups.   5. CMH CMH TechSpot Chancellor Posts: 2,573   +9 I partitioned my 40gb HDD on one of my comps to have 5gb, 35gb, one strictly for OS and office apps, and the other for all other apps. I don't seem to haev any problems with this. Also, I must agree that some programs do require you to reinstall if you formatted the OS partition. Hoever I still find this usefull as if there were any files that were needed, I'd still have them even if I reinstalled that program. You might be able to make a backup of those files beforehand, but for myself, I'd probably miss a few items, so this works best for me. Save games might be an issue for you there. Also, over the years I found myself bogged with too little space on the OS partition, now I'm looking at getting a new HDD, as there's only a paltry 10 or so megs of free space on the OS drive. Seems like something is eating up all the space, as I have 1gb unaccounted for, after deleting all temps and cookies and what-have-yous. Not a problem as once I get that new HDD, I'm just gonna shift everything over, unpartition it, and use it as a secondary drive. And yes, an image of the OS partition will help if things go sour.   6. tdeg tdeg TS Rookie Posts: 348 The unaccounted for space may be your swap file. You can move that to another partition if you want to get into that. I had a setup similar to what Stu is thinking. I think it was a 40GB partition to 10GB for OS, 10GB for apps, and 20GB for data. It worked pretty good. I had to re-install my OS a couple of times and re-installing the apps wasn't that bad. I kept all of my downloaded files on the data drive so I didn't need to download them again and the rest were CDs. When I re-installed the apps, pretty much all of my settings and data was left behind as the apps just updated the registry and left the rest as it was. Make sure you point to the same directory on your second partition as you did when you first installed though. Before you re-install your OS though, if you can, un-install any programs you won't use anymore though as the uninstall information could be lost after the re-install. This might leave you with a bunch of directories on the apps drive that you no longer need.   7. Stu_Brookes Stu_Brookes TS Rookie Topic Starter Cheers for the advice. I don't like the idea of a 2nd massive partition though, I'd planned the following. Partition 1 - O/S, Essential Apps & Swap File - 8GB (can be increased) Partition 2 - Temporary Files Partition - 1Gb Partition 3 - Games / Non Essential Apps / My Docs - 8Gb Partition 4 - Music / Video - 20Gb Partition 5 - 'Ghost of Partition 1' - 8 GB (can be increased) Partition 6 - Spare - 21GB or so By Essential Apps I'm thinking Office, NAV, Internet Security, SP Updates, Drivers etc... Games/Non Essential Apps is Football Manager 2005 and iTunes etc. It gives me 'spare' increase Partition 1 increases, as that affects Partition 6.] What would people recommend to that?   8. CMH CMH TechSpot Chancellor Posts: 2,573   +9 Too many partitions IMO. If it works for you, I suppose it'll be fine, but I'd personally put 3, 4, and 6 together, and seperate into folders. It is a good idea to have a ghost partition, you mgiht not need 8gbs of ghost partition, as you can compress the file, if you are comfortable with that. I keep my ghost files on high compression and have no problems with it other than the slower recovery from uncompressing it. Also, 1gb of temp files partition may be a good idea, depending on how large your temp files are going to be. Mine unfortunately can be huge, as I keep all sorts of installation files there. You might have different ideas for the use of that partition, but its not a bad idea, as you can just format the thing,and reduce your fragmentation, although I'd prefer to just perform fragmentation more often on my comps.   9. tdeg tdeg TS Rookie Posts: 348 I agree.. too many partitions. The problem with that many partitions is that you never judge the sizes right and end up with some partitions too small and some too big. Yes, you can partition magic them but that has issues its own. Plus you get a bunch of drive letters. I'd still with 3 partitions for one harddrive. If he does decide to go with 2 harddrives, I would set up. Disk0 (68GB) 20GB OS partition 30GB APPS 10GB essential DATA Disk1 (whatever size) 20GB backup of Disk0 OS partition 10GB backup of essential DATA rest for other DATA that doesn't need to be backup up.   10. Stu_Brookes Stu_Brookes TS Rookie Topic Starter Cheers folks, I'll combine 3, 4 and 6 then. That would mean a partition of 50GB, but if thats not a problem then I'll do that. The 'Temp' folder was mainly for Temp, Recent and Temp Internet Files basically. 1GB is probably too much, but I thought better be safe than sorry. So thats Partition 1 - O/S, Essential Apps & Swap File - 8GB (can be increased) Partition 2 - Temporary Files Partition - 1Gb Partition 3 - Everything else - 49GB Partition 4 - Ghost Image of Partition 1 - 8GB Sound alright? Really appreciate all your help. Top dogs, the lot of ya. :grinthumb   Topic Status: Not open for further replies. Similar Topics Add New Comment TechSpot Members Login or sign up for free, it takes about 30 seconds. You may also... Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.
ESSENTIALAI-STEM
John A. Cameron John Angus Cameron (September 1, 1820 – November 7, 1888) was a Canadian prospector, also known as "Cariboo Cameron". Biography He was born in Charlottenburg Township in Upper Canada in 1820 and grew up in Glengarry County. He went to California with two of his brothers as a prospector in 1850 but had returned by 1860. When gold was discovered in the Cariboo region of British Columbia, he took his family west and arrived in Victoria, British Columbia in 1862. Cameron and his partner Robert Stevenson discovered one of the richest claims in the Cariboo on Williams Creek. His wife Margaret Sophia had died of typhoid fever just prior to this and Cameron had promised to take her back to Canada West for burial. Cameron and his partner hauled the body 400 miles by toboggan to Victoria, where the body was buried temporarily in a coffin filled with alcohol. The town of Camerontown or Cameronton, long since abandoned, sprung up near Cameron's claim because he wanted to finish mining his claim as quickly as possible and employed 75 men working three shifts. In 1863, he left the Cariboo and transported the coffin back by ship, crossing overland at the Isthmus of Panama, and eventually returned home where he had the coffin reburied. In 1865, he remarried and built a new residence at Fairfield at Summerstown, on property formerly owned by John Cameron, a distant relative. In 1873, he had his first wife's body exhumed to disprove rumours of foul play in her death. Cameron frittered away his fortune and, around 1886, he returned to the scene of his former windfall in British Columbia. He died penniless in Barkerville in 1888.
WIKI
León Etymology From, from , named for the , which settled there. via Old French. Proper noun * 1) in reference to various places in Spain and Latin America. Etymology 1 . The places in Spain are named after the Roman legion that settled them, the. , which was a learned borrowing. Etymology 2 From, ablative of , from.
WIKI
Criss Cross King Crunchers The Criss Cross King Crunchers is a men's volleyball team playing in the Spikers' Turf. The team is owned by Republic Biscuit Corporation and named after its Criss Cross potato snack brand. History The Criss Cross King Crunchers were formed in 2024 as the third team and first men's team owned by Republic Biscuit Corporation. The first two teams, namely Creamline Cool Smashers and Choco Mucho Flying Titans, are also owned by the company and both play in the Premier Volleyball League. During the sponsorship event by the Insurance company Allianz in February 2024, the Rebisco team managers already hinted the new team owned by the company. The team would be launched in March 1, 2024. Anusorn Bundit will be coaching their debut on the Spikers' Turf. Team Spikers' Turf: Individual Spikers' Turf: Team captains * Ysay Marasigan (2024–present) Coaches * 🇹🇭 Anusorn Bundit (2024–present)
WIKI
Testnet and Mainnet have same private key #1 I was playing around with NEM API, and I got a feature, that maybe it’s obvious but I didn’t know that. You can have the same address in testnet and mainnet with the same keys. In fact, the first letter of an address is not meaningful to the keys. So let’s say I have TALICExxxx with pub key A and priv key B. If I change the address to NALICExxx it will have the same pub key A and priv key B. I don’t know if it is so on purpose, but what do you think? a pitfail? or a feature? #2 That is known. A private / public key is just a sequence of 256 bit. You can use it in any network. The address in different networks will be different though, not only the first character but also at the end of the address string. General rule of thumb is: Do not use the same private key in different networks! #3 I see the tail of the address is also different. Practically they are the same address, the algorithm that “builds” NEM addresses just puts a letter in front (T, N, M), and some kind of checksum at the end? Why not be totally different strings? I sent my public key to get some data to a NIS Server, and I forgot to change the network, when I saw a result with 0 balance and I got :hushed: The same public key was returning data in two networks! Interesting, thanks! #4 Why would there be a need for totally different string?
ESSENTIALAI-STEM
Mirabel Madrigal Mirabel Madrigal is a fictional character that appears in the Walt Disney Animation Studios' film, Encanto (2021). Created by directors Byron Howard and Jared Bush, Mirabel is depicted as an imperfect, quirky, emotional, and empathetic 15-year-old girl who is the only member of the Madrigal family who does not receive a magical gift. When their "miracle" begins to fade, Mirabel takes it upon herself to save the magic, learning of her familial troubles. From the outset of the character's development, Mirabel was conceived as the only member of her family without a gift. The film's draft plot depicted her desperately searching for a gift, but the character's motivation was adjusted to a desire to be noticed, which was deemed more relatable for the audience. Mirabel's physical appearance is based on that of tourist guide Alejandra Espinosa Uribe; Mirabel's design began with her skirt, whose extensive embroidery represents her personality. American actress Stephanie Beatriz provides Mirabel's voice; Beatriz first auditioned for the role of Luisa but was deemed perfect for Mirabel. Her characterization garnered a variety of awards, with critics praising the character as relatable and heartfelt. Beatriz's performance was also lauded as "terrific" and "perfectly cast". Mirabel's relationship with her family has been the subject of discussion among therapists and immigrant groups, who related to the ways in which she deals with generational trauma. Conception After finishing Zootopia (2016), directors Byron Howard and Jared Bush wanted their next project to be a musical, which became a Latin American musical after Lin-Manuel Miranda joined the project. The developers discussed their common experiences of having large extended families and decided to make a musical film about a large extended family with twelve main characters. Howard and Bush discussed Latin American culture at length with Juan Rendon and Natalie Osma, who had worked with them on the making-of documentary Imagining Zootopia. Rendon and Osma are from Colombia; they drew upon their personal experiences with Colombian culture in their discussions, which caused Howard, Bush, and Miranda to focus their research on that country. Rendon and Osma became the first of several cultural experts hired by Disney Animation as consultants on the film, forming what Disney called the "Colombian Cultural Trust". The Encanto production team had finalized the basic idea of a girl who is the only member of her family without a supernatural gift. When the group began developing the characters, they realized the vulnerability of Mirabel's situation. Mirabel's lack of powers quickly established her as the ideal plot device, as well as a character with whom audiences could sympathize. The reason behind her lack of powers is deliberately not explained in the film. Bush and Howard said that as a magic realism film, Encanto is meant to "function just as well as a story" in the absence of magic. As a result, Mirabel saves her family by resolving tensions rather than by using magic. The directors challenged the animators to make Mirabel distinctive from prior Disney female heroes; she had to be both capable and imperfect but not merely clumsy. Mirabel's original name was Beatriz, which was changed two years before casting her voice actor Stephanie Beatriz. The character's name originated from the word Mira, which means look in Spanish. According to Bush; "in the early days we always question if we have the right names – 'miracle' etymology and rhyme with Mirabel reinforced it". The character's name is also a Latin word that means wonderful, which represents her curiosity. As Encanto story evolved, the writers and story artists considered Mirabel's motives and imperfections. The film's draft plot depicted her desperately searching for a gift, but the crew realized she would have grown past this. Bush stated that her hope to be noticed, rather than an adventure for a magical gift, felt considerably more relatable. The plot and family connections were eventually written around this motive. One version of the film featured Mirabel narrating until the start of the third act, in which Abuela Alma's point of view would be shown; this concept was scrapped because it was regarded as too distracting. Voice Beatriz initially auditioned for Luisa, but when they heard her read, the production crew decided she was perfect for Mirabel. According to Smith, Beatriz secured the part because of her personality, humor, and distinctive voice. During her audition for Mirabel, Beatriz sang "You're Welcome" from Moana and performed a scene in which Mirabel comforts Antonio before he receives his gift. The directors wanted to let the actors explore their roles and to feel at ease "messing around and improvising in the moment". Beatriz initially believed Mirabel should sound young, so she voiced her with a high pitch. Howard and Bush, however, insisted on making her sound more mature; they considered she had to take care of herself most of the time because her family is full of "stars". According to Beatriz, Mirabel must manage her own needs, requiring a certain amount of maturity. Beatriz said finding time to breathe while singing was the most challenging part of voicing Mirabel; "You got to literally plan out 'Okay. On this eighth note or whatever I've got to ... ' So that I'm ready for the next big chunk of it." When recording Mirabel's "I Want" song "Waiting on a Miracle", Beatriz was nine months pregnant; she worked with a vocal coach to learn proper breathing techniques and ensure she was properly supporting herself. Much of her voice work was recorded during the COVID-19 pandemic. Sometimes, she acted with only Miranda or the directors, but on some occasions, many other crew members would listen to her. As she recorded for Mirabel, Beatriz received many sketches, which she described as "really special" because the character bore a resemblance to herself at the same age. For "What Else Can I Do?", Beatriz watched the sequence's initial animation, which she credited for her finding a way to "weave [her] way through the song using [her] voice". Design While researching the film in Barichara, Howard and Bush befriended Alejandra Espinosa Uribe, a local tour guide who showed them around the town, later hiring her to consult on the film's historical and cultural authenticity. Espinosa Uribe influenced several aspects of Mirabel's characteristics, including her curly, black hair, large eyeglasses, and gestures. Velasquez and the film's character technical director Xinmin Zhao looked for real-life references across "the whole studio" for Mirabel's hair and were inspired by Castro Smith's curls. The animators took inspiration from Beatriz's characteristics and mannerisms to make Mirabel as distinct as possible. Mirabel's clothes are intended to look handmade. As a unique member of her family, Mirabel lacks a color palette that connects her to Casita, so her outfit incorporates most of her family's colors. Because Encanto is set in the Andean region, its traditional fashions were an important inspiration for the film's costumes. During the late 19th and early 20th centuries, women from the region usually dressed in white tops with needlework, long skirts, and matching petticoats. They would also wear alpargatas (traditional Colombian shoes) created from fique. Design work was not linear; Disney artists repeatedly moved between different stages to iteratively improve the character. For example, the modelers sent the production team a work-in-progress model after building a first iteration based on visual development artists' drawings of Mirabel. The artists would make draw-overs to give feedback to the modelers, adding to her anatomy and design. Initial designs depicted Mirabel in an oversized coat, an idea the production crew explored for some time. Earlier versions of Mirabel's body shape were more stylized than later ones. When Abuela Alma's body was revised to a more naturalistic shape, Mirabel's body was also revised in the same way, which meant the shape of Mirabel's neckline more closely resembled human anatomy. Mirabel's design began with her skirt, which is inspired by those from the Vélez area as well as traditional Colombian ones in general. The skirt was decorated with embroidery that is intended to look imperfect and handcrafted. Look-development artist Jose Luis "Weecho" Velasquez "virtually stitched all the embroidery by hand" on a computer to build the texture of Mirabel's skirt. Disney artists designed symbols for the skirt to represent each member of her family and her affection for them. These symbols include a candle for Alma, animals for Antonio, flowers for Isabela, a sun for Pepa, and a chameleon for Camilo. According to Screen Rant, the incorporation of her family's gifts on her skirt displays her Madrigal pride and indicates her character, her lack of resentment and envy of her family, and her active support for them and their gifts. Mirabel's full name, and an image of her own face wearing her glasses, are sewn into the skirt to show she lacks a gift. "Loud" aspects, such as pink tassels, are used to represent Mirabel's desire to be noticed. According to associate production designer Lorelay Bové, Mirabel's skirt is similar to "a 15-year-old girl's scrapbook". Mirabel's shirt has a butterfly pattern that references the Madrigal family. In accordance with the film's theme of significant changes, butterfly designs, including one on the candle, are seen throughout Casita. Mirabel is the first Disney female hero to wear glasses. They are a significant part of her appearance. A primary theme of the film, according to Bové, is perspective; Mirabel's glasses are a deliberate choice to highlight that concept. Mirabel embarks on an adventure to see her family anew and other people's true characters; according to Bush: "we gave her glasses on purpose because it was a part of her journey[,] and we wanted it to be baked into her character". She also wears them because part of her name comes from the Spanish word Mira. The glasses are green as a reference to Bruno, her uncle, who wears green clothing. Encanto At age five, Mirabel is seemingly denied a gift from her family's miracle. From this point onward, everyone's expectations of her change, and everyone, including Mirabel herself, sees her differently. Ten years later, she is accidentally excluded from a family picture and feels she is not truly a part of the Madrigal family. Because she wishes to have a gift, Mirabel notices Casita cracking and the candle flickering, which Alma, her abuela, says would never happen. Mirabel warns everyone, but the cracks disappear, and no one believes her. Mirabel hears Alma questioning whether the miracle is dying, and she takes it upon herself to save it. Luisa, Mirabel's older sister, suggests Mirabel search her missing uncle Bruno's room for a clue because of a rumor that he had a vision about the magic. Mirabel finds the vision and sees herself surrounded by a cracked Casita, implying she might be the cause of the miracle's dying. Dolores later reveals the secret to everyone. Mirabel finds Bruno hiding inside the house's walls and questions him about his vision; Bruno says he only knows the fate of the Madrigal family will depend on her. When Bruno makes another vision, Mirabel sees a butterfly and herself hugging someone, whom she and Bruno identify as Isabela, her eldest sister. Annoyed due to Isabela's entitled personality, Mirabel insincerely asks her for a hug, which she refuses. Isabela inadvertently reveals that she struggles with the constant pressure to be perfect. Mirabel persuades Isabela to become truer to herself, and they reconcile, partially healing the cracks near the candle. Alma sees them and accuses Mirabel of trying to hurt the family out of spite for lacking a gift. Despondent with this treatment, Mirabel realizes that she and the rest of the family will never be good enough for Alma and that the miracle is dying because of her. The house breaks and collapses as a result of their heated argument. Mirabel tries to save the candle, but it extinguishes in her hands. Distraught and heartbroken, Mirabel runs away. Alma finds Mirabel at the river and apologizes for her accusation and high expectations for their family. Mirabel and Alma reconcile, and return to a broken Casita; Mirabel tells her family they are more than their gifts, while Alma apologizes for seeing her family's powers as the miracle instead of their existence. The family, with the townspeople, rebuild Casita. The Madrigals make a doorknob bearing an "M" for Mirabel to place into the front door, causing Casita to be restored, and the family regains their powers. Later, the family takes a group photograph, this time with Mirabel at the center of her family. Merchandise In December 2021, Disney released the Mirabel Singing Doll, which sings "The Family Madrigal" from the film, on shopDisney. A separate doll sold by Jakks Pacific says more than 15 "Encanto-inspired" phrases. Funko Pop released a set of 4 inch vinyl figurines of Madrigal family members, including Mirabel, in January 2022. Video games Mirabel was added to Disney Dreamlight Valley in a February 2023 update as one of the "villagers" of the titular Dreamlight Valley. She also appears as a playable character in the world building game Disney Magic Kingdoms. Disney parks From November 2021, Mirabel started making appearances for meet and greets in the Adventureland areas of Disney parks. In April 2022, the Madrigal family and the song "We Don't Talk About Bruno" were incorporated into the "It's a Small World" attraction through numerous projections. As of April 5, 2022, early ideas for the Main Street Electrical Parade's 14 grand finale stories included Mirabel and Antonio. Critical response Mirabel has been praised by film critics. According to Screen Daily, Mirabel radiates warmth in caring for her younger relatives and acting as the family's emotional glue. San Francisco Chronicle G. Allen Johnson considered her one of Disney's most appealing works, possessing "the greatest superpower" of all. For Denver Post, John Wenzel stated that Mirabel, as well as Moana (2016) and Raya and the Last Dragon (2021) titular characters, signified more independent Disney heroines. Kristen Lopez of IndieWire found it impossible to find Mirabel unrelatable in a family where one might be perceived as non-standard; CinemaBlend Dirk Libbey agreed, calling Mirabel Disney's most relatable character to date. Brian Truitt, writing for USA Today, singled out her awkwardness, humor, and heart, commenting that these elements made her "quite [an] enjoyable character to watch on a journey of identity and acceptance". Jonathan Sim of ComingSoon.net gave particular praise to Mirabel's distinctiveness, charisma, quirkiness, and weirdness. Critics have found Beatriz's voice work for the character magnificent, terrific, perfectly cast, spectacular, excellent, spirited, and exceptional. IGN said Beatriz "brings just the right amount of charm and sincerity to the non-magical teenager". Bleeding Cool critic Kaitlyn Booth thought Mirabel's sadness and frustration were well expressed within her performance. Impact Since its release, Encanto has been discussed among therapists. Mirabel has been interpreted as the "[t]he healer trying to keep her family whole". Immigrants stated they identify with her since they are "born into this duality, and ... not seen in one, and ... not seen in the other" after their parents come to another country to escape war and violence. Other clients relate to Mirabel's hopes for acknowledgment from her elders expressed during "Waiting on a Miracle". Psychology Today stated that despite attempting to use "positive self-talk" at the start of the film, Mirabel's sense of self-worth and belonging is harmed by her lack of powers. The website interpreted Alma's later understanding that Mirabel's existence is a gift as a message of self-appreciation. On the topic of family dynamics, therapist and YouTuber Steph Anya stated that since her viewpoint is different from her family's, Mirabel is blamed for all the problems that occur, and because she lacks a gift, she can see the Madrigals' suffering and "starts the family's healing journey". According to USA Today, many Latino millennials wanting to end generational trauma hope to do what Mirabel does: confronting the problem's source and the person who is causing pain. Polygon writer José María Luna drew comparisons between the people of Colombia and Mirabel, stating: "We're a country of Mirabels, all struggling to figure out how to fix these evils that seem like our birthright." Marcela Rodriguez-Campo, a Colombian academic, believed that casting Mirabel, a non-white, mestiza heroine, as the primary character was a crucial decision. However, Camilo Garzón expressed concern that when a non-white figure is inspirational, there is a risk that the character may become representative of a whole culture, as was the case with Moana and Coco (2017). Accolades Mirabel won Best Animated Female at the 2022 Alliance of Women Film Journalists Awards and 2021 Women Film Critics Circle Awards, in addition to the Visual Effects Society Award for Outstanding Animated Character in an Animated Feature. Stephanie Beatriz has also received several nominations for her voice performance, including the Annie Award for Outstanding Achievement for Voice Acting in a Feature Production.
WIKI
Hillary Clinton interview: explaining What Happened and more On page 239 of What Happened, Hillary Clinton reveals that she almost ran a very different campaign in 2016. Before announcing for president, she read Peter Barnes’s book With Liberty and Dividends for All, and became fascinated by the idea of using revenue from shared natural resources, like fossil fuel extraction and public airwaves, alongside revenue from taxing public harms, like carbon emissions and risky financial practices, to give every American “a modest basic income.” Her ambitions for this idea were expansive, touching on not just the country’s economic ills but its political and spiritual ones. “Besides cash in people’s pockets,” she writes, “it would be also be a way of making every American feel more connected to our country and to each other.” This is the kind of transformative vision that Clinton was often criticized for not having. It’s an idea bigger than a wall, perhaps bigger even than single-payer health care or free college. But she couldn’t make the numbers work. Every version of the plan she tried either raised taxes too high or slashed essential programs. So she scrapped it. “That was the responsible decision,” she writes. But after the 2016 election, Clinton is no longer sure that “responsible” is the right litmus test for campaign rhetoric. “I wonder now whether we should’ve thrown caution to the wind, embraced [it] as a long-term goal and figured out the details later,” she writes. What Happened has been sold as Clinton’s apologia for her 2016 campaign, and it is that. But it’s more remarkable for Clinton’s extended defense of a political style that has become unfashionable in both the Republican and Democratic parties. Clinton is not a radical or a revolutionary, a disruptor or a socialist, and she’s proud of that fact. She’s a pragmatist who believes in working within the system, in promising roughly what you believe you can deliver, in saying how you’ll pay for your plans. She is frustrated by a polity that doesn’t share her “thrill” over incremental policies that help real people or her skepticism of sweeping plans that will never come to fruition. She believes in politics the way it is actually practiced, and she holds to that belief at a moment when it’s never been less popular. This makes Clinton a more unusual figure than she gets credit for being: Not only does she refuse to paint an inspiring vision of a political process rid of corruption, partisanship, and rancor, but she’s also actively dismissive of those promises and the politicians who make them. On Tuesday morning, I sat down with Clinton for an hour on the first official day of her book tour. It is a cliché that stiff candidates become freer, easier, and more confident after they lose — see Gore, Al — but it is true for Clinton. Jon Stewart used to talk of the “buffering” you could see happening in the milliseconds between when Clinton was asked a question and when she answered; the moments when she played out the angles, envisioned the ways her words could be twisted, and came up with a response devoid of danger but suffused with caution. That buffering is gone. In our conversation, she was as quick and confident as I’ve seen her, making the case for her politics without worrying too much about the coalitional angles or the possible lines of offense. And she says plenty that can, and will, offend. In our discussion, she lit into Bernie Sanders’s single-payer plan, warned that Donald Trump is dragging us down an authoritarian path, spoke openly of the role racism and white resentment played in the campaign, and argued that the outcome of the 2016 election represented a failure of the media above all. This was Clinton unleashed, and while she talked about what happened, it was much more interesting when she talked about what she believed should have happened. Watch the video. (Or read the transcript.)
NEWS-MULTISOURCE
Difference between commands for starting,restarting, stoppping or reloading a service Hello guys I would like to know the difference between the following commands: $ sudo service service_name start|restart|stop|reload* and $ sudo /etc/init.d/service_name start|restart|stop|reload* For example, $ sudo service apache2 restart* and $ sudo /etc/init.d/apache2 restart* If there are other commands that can work in the same way, you can let me know. There is no such difference between those commands, all of them do the same job using the same files in here /etc/init.d/* AFAIK there are no more commands to do the same job except if you are using cPanel/WHM, in that case you can use something like this: /scripts/restartsrv_httpd, /scripts/restartsrv_cpanel, and so on.... 1 Like @modserv Thanks so much… 1 Like No worries, you are most welcome :smile:
ESSENTIALAI-STEM
Talk:Noncommutative quantum field theory The noncommutative spacetime of this article is NOT the only possible choice for noncommutative quantum field theory! Phys 05:05, 11 Aug 2004 (UTC) Other forms of non-commutative QFTs You're right, I wrote the original version of this article but feel I'm not qualified to write about other versions of NCQFTs, I've made a minor edit to include your point but feel free to expand the article.
WIKI
This Buffett Powerhouse Stock Just Announced a Stock Split It's stock-split season. Two of the most highly valued companies in the world, Amazon and Tesla, recently excited the investing community with their stock-split announcements. Now RH (NYSE: RH), a smaller company, has announced a stock split of its own. RH is a niche furniture company, and its shares are owned by investing guru Warren Buffet. Shares trade at $336 as of this writing, much lower than Amazon at over $3,000 and Tesla at over $1,000. What's this all about? Expensive luxury goods, cheap stock price RH, formerly Restoration Hardware, is an upscale furniture retailer that promotes its gallery-style stores, where customers can choose their own pieces or work with a staff designer. It takes great pains to style its spaces and create a luxury brand, moving past retail goods and into company-branded hotels, restaurants, and even yacht experiences. Image source: Getty Images. Although many home retailers benefited from lockdown orders at the beginning of the pandemic, as a luxury retailer, RH's sales suffered. Recently, that trend turned around and sales bounced back. But now it's struggling with general macroeconomic changes such as inflation and rising interest rates. These are times when customers typically scale back spending, especially for high-cost goods. The company released its fourth-quarter earnings report last week, and although it was mostly good, investors were disappointed with another slowdown in sales growth and weak guidance. Fourth-quarter revenue increased only 11%, but full-year revenue increased 32% to $3.8 billion, in line with third-quarter guidance. Net income increased 13% to $147 million, beating Wall Street's average estimate. As for guidance, management is expecting sales to increase 7% to 8% year over year in the first quarter and full-year sales to increase by 5% to 7%. That takes into account continued uncertainty regarding the economy, and even though it's a low increase, it still builds on 2021's success. Along with the report, RH announced the surprise stock split. In a statement, management said: The Company believes that a stock split is appropriate in view of the substantial appreciation that has occurred in the share price since the 2012 initial public offering. Although a stock split does not change the value of the Company, we believe that a split should have a number of benefits, including the recruitment and retention of talent. The stock split is expected to be executed in the spring. Typically, a company splits its stock when the price gets very high, and investors feel priced out. A lower price breaks down barriers to entry -- although these days many investors can invest in any stock with fractional shares. Splitting the stock to attract talent means that it wants to be able to offer stock option packages to recruit workers, and it can do that more efficiently when there are more shares that each cost less. Amazon mentioned a similar idea as part of the reason for its 20-for-1 stock split, saying, "This split would give our employees more flexibility in how they manage their equity in Amazon." It's more unusual to split a stock at RH's share price. The stock is being split 3-for-1, and investors will get stock that costs somewhat over $100 a share, not so far off from Amazon's stock at around $150 per share after it splits. And although the company didn't mention it as a consideration, the lower share price could make it easier for investors to buy it. Why did Buffett buy it? Warren Buffett is known for an investing style that favors undervalued companies. With shares trading at 15 times trailing 12-month earnings, RH appears to fit the bill. It has plenty of growth opportunities in a niche industry, and it has a committed founder-leader who is leading the company with vision. CEO Gary Friedman pointed out in his annual letter to shareholders that RH had outperformed all of the FAANG stocks, which is pretty impressive for a furniture retailer with only 81 showrooms. FB data by YCharts. Buffett, through his holding company Berkshire Hathaway, revealed a position in RH for the first time in 2019. Although it makes up a tiny percentage of Berkshire Hathaway's portfolio, Berkshire is RH's fourth-largest shareholder. It might appear that RH isn't a very resilient company based on how easily it falls prey to macroeconomic conditions. In some sense, that would be true -- as it would be in relation to any luxury goods company. However, the flip side is that it does very well when the economy is going well, and historically at least, the economy does well significantly more often than not. That means if you can look past the current pressure, RH has a solid long-term trajectory, and you can get these cheap shares right now. 10 stocks we like better than RH When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and RH wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of March 3, 2022 John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Jennifer Saibil has no position in any of the stocks mentioned. The Motley Fool owns and recommends Amazon, Berkshire Hathaway (B shares), RH, and Tesla. The Motley Fool recommends the following options: long January 2023 $200 calls on Berkshire Hathaway (B shares), short January 2023 $200 puts on Berkshire Hathaway (B shares), and short January 2023 $265 calls on Berkshire Hathaway (B shares). The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
α-Synuclein oligomers: an amyloid pore? Insights into mechanisms of alpha-synuclein oligomer-lipid interactions M.T. Stöckl, Niels Zijlstra, Vinod Subramaniam Research output: Contribution to journalArticleAcademicpeer-review 68 Citations (Scopus) Abstract In many human diseases, oligomeric species of amyloid proteins may play a pivotal role in cytotoxicity. Many lines of evidence indicate that permeabilization of cellular membranes by amyloid oligomers may be the key factor in disrupting cellular homeostasis. However, the exact mechanisms by which the membrane integrity is impaired remain elusive. One prevailing hypothesis, the so-called amyloid pore hypothesis, assumes that annular oligomeric species embed into lipid bilayers forming transbilayer protein channels. Alternatively, an increased membrane permeability could be caused by thinning of the hydrophobic core of the lipid bilayer due to the incorporation of the oligomers between the tightly packed lipids, which would facilitate the transport of small molecules across the membrane. In this review, we briefly recapitulate our findings on the structure of α-synuclein oligomers and the factors influencing their interaction with lipid bilayers. Our results, combined with work from other groups, suggest that α-synuclein oligomers do not necessarily form pore-like structures. The emerging consensus is that local structural rearrangements of the protein lead to insertion of specific regions into the hydrophobic core of the lipid bilayer, thereby disrupting the lipid packing Original languageEnglish Pages (from-to)613-621 JournalMolecular neurobiology Volume47 Issue number2 DOIs Publication statusPublished - 6 Sep 2013 Keywords • IR-89726 • METIS-289435 Fingerprint Dive into the research topics of 'α-Synuclein oligomers: an amyloid pore? Insights into mechanisms of alpha-synuclein oligomer-lipid interactions'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
How To Reduce Risk For Cervical Cancer Tips To Reduce Risk For Cervical Cancer Tips To Reduce Risk For Cervical Cancer Cervical cancer is one of the most common forms of cancer among women all over the globe. Despite the fact that a growing number of women develop cancer of the cervix, it is one of the most preventable forms of the ailment. Triggered by Human Papilloma Virus (HPV) infection, cervical cancer continues to be a major threat to women who are sexually active especially between the age group of 17 to 39. Although there are certain risk factors which greatly augment the chances of developing cervical cancer, few preventive measures is all that you need to reduce the risk of developing the ailment to a large extent. Having an overall knowledge of the risk factors involved in cervical cancer is a basic step that needs to be undertaken in a bid to alleviate the risk of developing cancer of the cervix. Read on to get a revealing insight into the various risk factors that need to be addressed to combat cervical cancer risk. Tips To Reduce Risk For Cervical Cancer Family History Some women have a greater risk of developing cervical cancer if they have a family history of the condition. If more than one woman in your family has suffered from cervical cancer then it is advisable to get yourself tested for the disease as genetics is considered to be a major contributing factor is developing the ailment. Diet Research shows that women who fail to consume a balanced diet that fulfils the nutritional needs of the body have a higher risk of developing cervical cancer. A diet that is low in vegetables and fruits can make you more susceptible to develop this form of cancer. Hence, to reduce the risk of cervical cancer, consume a diet that is adequately rich in all the nutrients to ward off the chances of developing the disease. Birth Control Pills Tips To Reduce Risk For Cervical Cancer If you are taking birth control pills for years then you are more likely to develop cervical cancer. Being on birth control pills for a prolonged period of time is known to augment the possibility of developing the ailment to a large extent. However, once you stop taking the pills, the risk is known to lessen considerably. Also Read Prevention Of Cervical Cancer Through Papillomavirus How To Prevent Cervical Cancer With Diet How To Prevent Cervical Cancer Naturally Vegetables To Prevent Cervical Cancer Early pregnancy It has been observed that the chance of developing cervical cancer is associated with the incidence of early pregnancy. Women who have carried out full term pregnancy below the age of 17 are twice more susceptible in developing the ailment in comparison to females who got pregnant after the age of 25. Lifestyle factors Lifestyle factors are also known to play a significant role in determining the incidence of cervical cancer. In comparison to non-smokers women who are addicted to smoking are twice more likely to develop this form of cancer. Smoking can have damaging effects on the body such as mutating the DNA of the cervix cells, resulting in cancer. In addition to smoking, alcohol consumption is also linked to cervical cancer development among women. Hence, maintaining a healthy lifestyle and staying away from cigarettes and alcohol can go a long way in reducing the risk of cervical cancer among women.
ESSENTIALAI-STEM
Malformations during choroid fissure (CF) closure, an important step in retinal morphogenesis, are a significant cause of congenital visual impairment. Hh signaling plays a crucial role during CF morphogenesis;however, there is a fundamental gap in our understanding of the genetic and cellular mechanisms that control this process. We have identified a novel role for zebrafish Zic2a, a conserved zinc-finger transcription factor, as a key modulator of Hh-regulated gene expression in the forebrain and retina, and demonstrated an essential role for Zic2a in CF morphogenesis. The long-term goal of our research is to elucidate the gene regulatory network that controls CF morphogenesis. An essential step toward this goal, identification of Zic2a effectors and detailed analysis of their functions during CF formation, is the objective of this proposal. We have shown that Zic2a is expressed in the optic stalk, which is adjacent to the CF, and functions non-cell-autonomously to promote CF formation. Based on these data, we hypothesize that Zic2a functions through Hh signaling to control differential cellular dynamics that drive OS and CF morphogenesis, and that Zic2a regulates transcription of genes with key functions during OS/retinal border formation. This hypothesis will be tested by pursuing two Specific Aims: (1) Characterize cellular dynamics at the forming OS/retinal boundary and analyze the role for Hh signals and Zic function in regulating these dynamics;(2) Identify transcriptional targets of Zic2a in the optic stalk and CF, and test their roles during CF morphogenesis. Under the first aim, cellular dynamics during CF morphogenesis will be examined using high-resolution real-time imaging, both during normal development and in embryos with disrupted Zic function and Hh signaling. Under the second aim, optic stalk cells will be isolated from embryos with normal or disrupted Zic2a expression using fluorescence-activated sorting, and genes that require Zic2a function for their correct expression in these cells will be identified using high-throughput sequencing (RNA-seq). Functions of these genes during CF formation will be assessed through a combination of conditional over expression assays and targeted mutagenesis with engineered zinc finger nucleases. The proposed effort is significant because it will identify new components of a very important genetic network that controls retinal morphogenesis and is coordinated by Hedghog signaling. This approach is innovative because it integrates molecular, genetic and cell biological approaches in one experimental organism, the zebrafish, to examine a novel function for Zic2a during CF morphogenesis. This approach will fundamentally advance our understanding of an important outstanding question: how Hh signaling coordinates patterning and morphogenesis during retinal development, and will build a strong foundation for analyses of other important but poorly understood functions of Zics, including their roles in neural tube closure, neuronal regeneration and tumorigenesis. Public Health Relevance The proposed research is relevant to human health because it targets a conserved but poorly understood genetic mechanism that controls an aspect of retinal morphogenesis (choroid fissure formation), particularly vulnerable to disruption during human development. This work will identify novel candidate genes for human coloboma and will set the stage for small-molecule screens to identify modulators of CF closure, with the ultimate goal of designing pharmacological interventions to alleviate coloboma-associated visual impairment. Agency National Institute of Health (NIH) Institute National Eye Institute (NEI) Type Research Project (R01) Project # 5R01EY022098-03 Application # 8597436 Study Section Biology and Diseases of the Posterior Eye Study Section (BDPE) Program Officer Greenwell, Thomas Project Start 2012-01-01 Project End 2014-12-31 Budget Start 2014-01-01 Budget End 2014-12-31 Support Year 3 Fiscal Year 2014 Total Cost $238,265 Indirect Cost $77,265 Name University of Wisconsin Madison Department Zoology Type Schools of Arts and Sciences DUNS # 161202122 City Madison State WI Country United States Zip Code 53715
ESSENTIALAI-STEM
How to add a custom validation method in laravel? Member by carlo , in category: PHP , 10 days ago How to add a custom validation method in laravel? Facebook Twitter LinkedIn Telegram Whatsapp 1 answer Member by carey , 9 days ago @carlo  To add a custom validation method in Laravel, you can create a new validation rule class. Here's a step-by-step guide on how to do it: 1. Create a new validation rule class: Create a new PHP class in the 'app/Rules' directory of your Laravel project. You can name the class anything you like, but it's a good practice to name it something meaningful related to the validation rule you're implementing. For example, let's create a class called 'CustomValidationRule'. You can do this by running the following artisan command: 1 php artisan make:rule CustomValidationRule 1. Implement the validation logic: Open the newly created 'CustomValidationRule.php' file and implement the validation logic in the 'passes' method. This method should return true if the validation passes and false if it fails. Here's an example of how you can implement a custom validation rule that checks if the input value is a multiple of 10: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 // app/Rules/CustomValidationRule.php namespace AppRules; use IlluminateContractsValidationRule; class CustomValidationRule implements Rule { public function passes($attribute, $value) { return $value % 10 === 0; } public function message() { return 'The :attribute must be a multiple of 10.'; } } 1. Register the validation rule: In your controller or form request class where you define the validation rules, you can now use the new custom validation rule. You can do this by adding the rule class as a new key-value pair in the validation rules array, with the key being the field name and the value being an instance of the custom validation rule. Here's an example of how you can use the 'CustomValidationRule' in a form request class: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 // app/Http/Requests/YourRequest.php namespace AppHttpRequests; use AppRulesCustomValidationRule; use IlluminateFoundationHttpFormRequest; class YourRequest extends FormRequest { public function rules() { return [ 'input_field' => ['required', new CustomValidationRule], ]; } } That's it! You have now successfully added a custom validation method in Laravel using a custom validation rule class. You can now use this custom validation rule across your Laravel application wherever needed.
ESSENTIALAI-STEM
Talk:2011 Tampa Bay Rays season Russ Canzler's position Why list a player under "other positions" on the roster when he has played hundreds of professional baseball games in the field? That awkward listing lumps him in with Manny Ramirez, who was exclusively a DH in 2011. Canzler has yet to start a major league ballgame and entered three games late last season as a pinch hitter. However, he played over 131 games at AAA in 2011, splitting time almost evenly between the OF and IF. Actually, looking at just last year's stats, he played a few more games in the OF, so that would be a better place to list him here. To me, it makes absolutely no sense to not list a player's position when he clearly has a position. Why make readers go searching other places for basic info that can (and should) be listed right in this article? Zeng8r (talk) 16:51, 24 October 2011 (UTC) * On his personal page you can list his position, but the standard practice for all past season pages is to list the players where they played in the field during that season. If they just pinch hit or were only the designated hitter then they are listed as other batters... thats how we have it on every season page.. not just this one... as this roster shows how players played during this season.. it's a snapshot of the season, so listing him as a first baseman when he didnt play there for the Rays in 2011 would be incorrect. Spanneraol (talk) 17:06, 24 October 2011 (UTC) * So the usual course is to make readers click to another article if they want to find out basic info such as what position a young player actually plays. Nice. It's the same old wikipedia story - "This is how we've done it" overrules "This is what makes sense". Zeng8r (talk) 10:23, 26 October 2011 (UTC)
WIKI
Page:Popular Science Monthly Volume 59.djvu/419 Rh ' A Practical Treatise,' by Charles Prelini, of Manhattan College, is a well-printed book, just published by D. Van Nostrand Company, which appears to fill a real need, since no American work on the subject has appeared during the past twenty years. The various methods of driving tunnels through earth are fully illustrated, especial attention being given to the shield process which has been so thoroughly developed in recent years. Submarine tunnels are discussed fully, with illustrations of those in New York, Chicago and Milwaukee. Tunnels in rock occupy nearly one-half the volume, the modern methods used in the St. Gothard and Simplon tunnels receiving detailed notice. Subway construction in Boston and New York is also discussed. Interesting historical information regarding ancient tunnels is given, while methods of surveying, centering, blasting and ventilating are explained in a manner which sets forth principles as well as facts. The book is one that shows much painstaking work on the part of the author, and it deserves high commendation. ancient times it was the custom for the title page of a book to give a full account of its contents. This plan is followed in a work by James D. Schuyler, published by Wiley & Sons, whose title is 'Reservoirs for Irrigation, Water Power, and Domestic Water Supply, with an account of various types of dams and the methods and plans of their construction, together with a discussion of the available water supply for irrigation in various sections of arid America; the distribution, application and use of water; the rainfall and run-off, the evaporation from reservoirs, the effect of silt upon reservoirs, etc' The volume is a large octavo of 400 pages with numerous full-page half-tones and several folding plates. It is mostly devoted to constructions west of the Rocky mountains; here hydraulic-fill dams and rock-fill dams originated, and the book contains descriptions of all that have been built, as well as accounts of the most important masonry and earthen dams. The treatment is descriptive and statistical rather than scientific, and the work is hence mainly one of reference for the use of engineers. published by the 'Engineering Record,' is an octavo volume of 235 pages which gives detailed descriptions of numerous cement plants in Europe and America. The production of natural cement in the United States has been somewhat checked during the last decade by the rapid improvements in the manufacture of the Portland product, particularly by the introduction of rotary kilns. From 1895 to 1900 the production of Portland cement increased from one to seven million barrels per year, and the price suffered a reduction of nearly fifty per cent. The great deposits of argillaceous limestone in the Lehigh Valley form the principal source of Portland cement, but in the west it is made by mixing clay and marl in proper proportions, and there are also two or three plants where blast-furnace slag is used. The book, which is well illustrated, gives full details of the methods of manufacture of both natural and Portland cements.
WIKI
Pistorius must pay for his crime, Steenkamp's father tells court PRETORIA (Reuters) - Oscar Pistorius must pay for the crime of murdering his girlfriend Reeva Steenkamp, which has devastated her family, her father told a South African court on Tuesday. The 29-year-old Paralympian gold medalist faces a minimum 15-year jail term after his manslaughter conviction for the 2013 killing, for which he originally received a five-year sentence, was upgraded on appeal. Called to testify by the lead state prosecutor in Pistorius’s sentencing hearing, a tearful and trembling Barry Steenkamp said forgiving the runner was very hard. “It just devastated us, I ended up having a stroke... I just don’t wish that to anybody in this world,” the 73-year-old said. “He has to pay for his crime.” Steenkamp said he and wife June had relied financially on their daughter, and he had hurt himself to try to relive the pain that his daughter went through: “I jabbed myself with needles.” He asked the court to allow pictures of his daughter to be shown to the world as a deterrent to would-be killers. Jonathan Scholtz, a psychologist called by Pistorius’ lawyer, told the court on Monday — the first day of the hearing — that the athlete was “a broken man” on medication for depression, anxiety and insomnia who should be hospitalized and not jailed. But prosecutor Gerrie Nel said Pistorius has shown no remorse for shooting and killing Steenkamp when he fired four shots through a locked toilet door in his Pretoria home. Nel also said he had had temper tantrums while serving his sentence. The case has prompted a fierce debate in a country beset by high levels of violent crime against women. Some rights groups have said the white athlete has received preferential treatment. Charlotte Mashabane, an assistant health manager at the prison where Pistorius was held for a year, told the court on Tuesday he “threw tantrums” while in prison and she felt threatened by him. Mashabane said Pistorius became angry when she declined to change his approved medication for medication supplied by his family, and that he had thrown some medicine on her table. Mashabane also said there was no report of Pistorius being assaulted while in prison, as Scholtz had asserted. Pistorius lawyer Barry Roux disputed Mashabane’s testimony, saying she was changing it to cast his client in a bad light. Earlier on Tuesday Ebba Gudny Gudmundsdottir, from Iceland, described the runner as an inspiration to her 11-year-old son, who has a similar disability to Pistorius. The lower part of the athlete’s legs were amputated when he was a baby, and he is known as “Blade Runner” for the carbon-fibre prosthetics he wore when racing. Pistorius reached the pinnacle of his fame in London 2012 when he became the first double amputee to run in the Olympics, reaching the 400 meters semi-finals. Gudmundsdottir told the court Pistorius often visited her family in Iceland and her family traveled to Manchester to see Pistorius race. “It was an inspiration for him (her son) to see Oscar and the others run,” she said. Marius Nel, a pastor, said Pistorius had worked at his church’s charity, training school children in athletics. “Feedback from the schools was very positive,” he said. At his original trial, Pistorius had argued he mistook Reeva Steenkamp for an intruder. His manslaughter conviction was upgraded to murder after an appeal heard by the Supreme Court, which ruled in March that Pistorius had exhausted all his legal options. The original trial judge, Thokozile Masipa, is also presiding at the sentencing hearing, at Pretoria High Court. Writing by James Macharia; editing by John Stonestreet
NEWS-MULTISOURCE
Date of Award 2018 Document Type Thesis Degree Name Master of Science (MS) Department Biology First Advisor Alicia M. Ebert Abstract The migration of neurons from their place of birth to their place of function is an important process during neurodevelopment. Two adaptor proteins, Crk and Crkl, are known to be important factors for neuronal migration. In the neocortex, both molecules play a critical role in the well studied Reelin signaling pathway, guiding newly born neurons to their correct cell layer to create the laminated structure of this tissue. These two adaptor proteins are implicated in human disease of the nervous system. Heterozygous compound deletion of human chromosome 17p13, which includes CRK, occurs in Miller-Dieker syndrome, a severe type of lissencephaly (smooth brain syndrome). Autosomal dominant compound deletion of human chromosome 22q11.2, which includes CRKL, causes DiGeorge Syndrome, a neural crest migratory disease that effects the heart, kidneys, ears, immune system, and face. Danio rerio, or zebrafish, are a great model to study the developing nervous system, and are used in our studies. We characterized expression of crk and crkl at various stages of zebrafish embryo development and determined that both are expressed in the developing eye. We aim to determine if Crk and Crkl have a role in eye development, as the eye and neocortex are very similar in the way they are patterned, and little is known about the signaling mechanisms that guide lamination of the retina. Using mutant knockout lines, we have determined gross retinal phenotypes of Crk deficient, Crkl deficient, and Crk and Crkl compound deficient embryos. Crk and Crkl are both required for proper eye development, as combinations of Crk and Crkl deficiency lead to impaired formation of this tissue. Crk seems to be particularly important for proper eye size, and Crkl is required for proper lamination. This preliminary research is critical to further elucidating the role Crk and Crkl are playing in the retina. Language en Number of Pages 84 p. Share COinS  
ESSENTIALAI-STEM
Page:Astounding Science Fiction (1950-01).djvu/104 met so far. Stature about three-quarters Earth normal. Carbon people. Almost a duplicate of man but missing several tissues essential of emotional balance including one brain chord intimately related to kindness, worry and judgment. Established depot of supplies but unable to transport workmen and soldiers in quantity and so made use of Department of Agriculture Experimental Station vats on Gorgan, wrecking freighter and substituting its phials. Very sentient. Obviously well informed intelligence at work in this galaxy. Leaders conditioned to enterprise and spoke English. Detectable by uncommon strength. Life period very short reaching maturity at about six years of age due to emotional imbalances and early development of gonads and so easy to detect in society by rapid aging. "Treatment and handling of case: Developed the formulae of their gene patterns and isolated missing development cells. Synthesized cells and injected them into proper areas where they will harmonize with bodies. They succumb easily to a strawberry allergy and are painfully affected by it. All beings so located and all artificial gestations infected so that they could be treated. All treated and left in Stupor except five who could not be reached with strawberries. "Recommendations: That you get hold of the Department of Agriculture of the United States as soon as possible and inform them as follows: Their vessel Wanderho destroyed. Their station on Gorgon deserted but undamaged; the Achnoids there were bought by the aliens and are no longer to be trusted; inform them that the Gorgon Station is now inhabited by about thirty-eight thousand aliens converted to human beings and that a relief expedition should be sent to take care of them since they will none of them be found over twelve years of age and the bulk of them a human five or six months, needing care. Expedition should be armed but should also contain several dozen expert nurses. Gorgon can now be considered to be humanly populated. "Proceeding at normal speed to base to refit. Please have somebody air out my quarters, preferably Miss Ellison. That is all." As he threw the switch he heard a gasp behind him. "That's all!" said O'Hara. "You convert thirty-eight thousand one hundred and some odd extragalactic invaders to human beings and you say, 'that's all'! Man, I've heard legends about the Soldiers of Light, but I never realized what superboys you fellows really are." Ole Doc gave him a very bored look and then and thereafter ignored him. "Hippocrates," said Ole Doc, "we're almost home. Let's open those last two bottles of wine." 104
WIKI
when to use map() function and when to use summarise_at()/mutate_at() • A+ Category:Languages Can anyone give a suggestion regarding when to use the map() (all map_..() functions) and when to use summarise_at()/mutate_at()? E.g. if we are doing some modification to the column of vectors then we do not need to think map() ? If we have a df / have a column has a list in it then we need to use map()? Does map() function always need to be used with nest() function? Anyone could suggest some learning videos regarding this. And also how to put lists in df and modeling multiple lists at the same time then store the model results in another column ? Thank you so much! The biggest difference between {dplyr} and {purrr} is that {dplyr} is designed to work on data.frames only, and {purrr} is designed to work on every kind of lists. Data.frames being lists, you can also use {purrr} for iterating on a data.frame. map_chr(iris, class) Sepal.Length Sepal.Width Petal.Length Petal.Width Species "numeric" "numeric" "numeric" "numeric" "factor" summarise_at and map_at do not exactly behave the same: summarise_at just return the summary you're looking for, map_at return all the data.frame as a list, with the modification done where you asked it : > library(purrr) > library(dplyr) > small_iris <- sample_n(iris, 5) > map_at(small_iris, c("Sepal.Length", "Sepal.Width"), mean) $Sepal.Length [1] 6.58 $Sepal.Width [1] 3.2 $Petal.Length [1] 6.7 1.3 5.7 4.3 4.7 $Petal.Width [1] 2.0 0.4 2.1 1.3 1.5 $Species [1] virginica setosa virginica versicolor versicolor Levels: setosa versicolor virginica > summarise_at(small_iris, c("Sepal.Length", "Sepal.Width"), mean) Sepal.Length Sepal.Width 1 6.58 3.2 map_at always return a list, mutate_at always a data.frame : > map_at(small_iris, c("Sepal.Length", "Sepal.Width"), ~ .x / 10) $Sepal.Length [1] 0.77 0.54 0.67 0.64 0.67 $Sepal.Width [1] 0.28 0.39 0.33 0.29 0.31 $Petal.Length [1] 6.7 1.3 5.7 4.3 4.7 $Petal.Width [1] 2.0 0.4 2.1 1.3 1.5 $Species [1] virginica setosa virginica versicolor versicolor Levels: setosa versicolor virginica > mutate_at(small_iris, c("Sepal.Length", "Sepal.Width"), ~ .x / 10) Sepal.Length Sepal.Width Petal.Length Petal.Width Species 1 0.77 0.28 6.7 2.0 virginica 2 0.54 0.39 1.3 0.4 setosa 3 0.67 0.33 5.7 2.1 virginica 4 0.64 0.29 4.3 1.3 versicolor 5 0.67 0.31 4.7 1.5 versicolor So to sum up on your first question, if you are thinking about doing operation "column-wise" on a non-nested df and want to have a data.frame as a result, you should go for {dplyr}. Regarding nested column, you have to combine group_by(), nest() from {tidyr}, mutate() and map(). What you're doing here is creating a smaller version of your dataframe that will contain a column which is a list of data.frames. Then, you're going to use map() to iterate over the elements inside this new column. Here is an example with our beloved iris: library(tidyr) iris_n <- iris %>% group_by(Species) %>% nest() iris_n # A tibble: 3 x 2 Species data <fct> <list> 1 setosa <tibble [50 × 4]> 2 versicolor <tibble [50 × 4]> 3 virginica <tibble [50 × 4]> Here, the new object is a data.frame with the colum data being a list of smaller data.frames, one by Species (the factor we specified in group_by()). Then, we can iterate on this column by simply doing : map(iris_n$data, ~ lm(Sepal.Length ~ Sepal.Width, data = .x)) [[1]] Call: lm(formula = Sepal.Length ~ Sepal.Width, data = .x) Coefficients: (Intercept) Sepal.Width 2.6390 0.6905 [[2]] Call: lm(formula = Sepal.Length ~ Sepal.Width, data = .x) Coefficients: (Intercept) Sepal.Width 3.5397 0.8651 [[3]] Call: lm(formula = Sepal.Length ~ Sepal.Width, data = .x) Coefficients: (Intercept) Sepal.Width 3.9068 0.9015 But the idea is to keep everything inside a data.frame, so we can use mutate to create a column that will keep this new list of lm results: iris_n %>% mutate(lm = map(data, ~ lm(Sepal.Length ~ Sepal.Width, data = .x))) # A tibble: 3 x 3 Species data lm <fct> <list> <list> 1 setosa <tibble [50 × 4]> <S3: lm> 2 versicolor <tibble [50 × 4]> <S3: lm> 3 virginica <tibble [50 × 4]> <S3: lm> So you can run several mutate() to get the r.squared for e.g: iris_n %>% mutate(lm = map(data, ~ lm(Sepal.Length ~ Sepal.Width, data = .x)), lm = map(lm, summary), r_squared = map_dbl(lm, "r.squared")) # A tibble: 3 x 4 Species data lm r_squared <fct> <list> <list> <dbl> 1 setosa <tibble [50 × 4]> <S3: summary.lm> 0.551 2 versicolor <tibble [50 × 4]> <S3: summary.lm> 0.277 3 virginica <tibble [50 × 4]> <S3: summary.lm> 0.209 But a more efficient way is to use compose() from {purrr} to build a function that will do it once, instead of repeating the mutate(). get_rsquared <- compose(as_mapper("r.squared"), summary, lm) iris_n %>% mutate(lm = map_dbl(data, ~ get_rsquared(Sepal.Length ~ Sepal.Width, data = .x))) # A tibble: 3 x 3 Species data lm <fct> <list> <dbl> 1 setosa <tibble [50 × 4]> 0.551 2 versicolor <tibble [50 × 4]> 0.277 3 virginica <tibble [50 × 4]> 0.209 If you know you'll always be using Sepal.Length ~ Sepal.Width, you can even prefill lm() with partial(): pr_lm <- partial(lm, formula = Sepal.Length ~ Sepal.Width) get_rsquared <- compose(as_mapper("r.squared"), summary, pr_lm) iris_n %>% mutate(lm = map_dbl(data, get_rsquared)) # A tibble: 3 x 3 Species data lm <fct> <list> <dbl> 1 setosa <tibble [50 × 4]> 0.551 2 versicolor <tibble [50 × 4]> 0.277 3 virginica <tibble [50 × 4]> 0.209 Regarding the resources, I've written a series of blogpost on {purrr} you can check: https://colinfay.me/tags/#purrr Comment :?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen:
ESSENTIALAI-STEM
Eval Logs Overview Every time you use inspect eval or call the eval() function, an evaluation log is written for each task evaluated. By default, logs are written to the ./logs sub-directory of the current working directory (we’ll cover how to change this below). You will find a link to the log at the bottom of the results for each task: $ inspect eval security_guide.py --model openai/gpt-4 The Inspect task results displayed in the terminal. A link to the evaluation log is at the bottom of the results display. You can also use the Inspect log viewer for interactive exploration of logs. Run this command once at the beginning of a working session (the view will update automatically when new evaluations are run): $ inspect view The Inspect log viewer, displaying a summary of results for the task as well as 8 individual samples. This section won’t cover using inspect view though. Rather, it will cover the details of managing log usage from the CLI as well as the Python API for reading logs. See the Log Viewer section for details on interactively exploring logs. Log Location By default, logs are written to the ./logs sub-directory of the current working directory You can change where logs are written using eval options or an environment variable: $ inspect eval popularity.py --model openai/gpt-4 --log-dir ./experiment-log Or: log = eval(popularity, model="openai/gpt-4", log_dir = "./experiment-log") Note that in addition to logging the eval() function also returns an EvalLog object for programmatic access to the details of the evaluation. We’ll talk more about how to use this object below. The INSPECT_LOG_DIR environment variable can also be specified to override the default ./logs location. You may find it convenient to define this in a .env file from the location where you run your evals: INSPECT_LOG_DIR=./experiment-log INSPECT_LOG_LEVEL=warning If you define a relative path to INSPECT_LOG_DIR in a .env file, then its location will always be resolved as relative to that .env file (rather than relative to whatever your current working directory is when you run inspect eval). If you are running in VS Code, then you should restart terminals and notebooks using Inspect when you change the INSPECT_LOG_DIR in a .env file. This is because the VS Code Python extension also reads variables from .env files, and your updated INSPECT_LOG_DIR won’t be re-read by VS Code until after a restart. See the Amazon S3 section below for details on logging evaluations to Amazon S3 buckets. EvalLog The EvalLog object returned from eval() provides programmatic interface to the contents of log files: Class inspect_ai.log.EvalLog Field Type Description status str Status of evaluation ("started", "success", or "error"). eval EvalSpec Top level eval details including task, model, creation time, etc. plan EvalPlan List of solvers and model generation config used for the eval. samples list[EvalSample] Each sample evaluated, including its input, output, target, and score. results EvalResults Aggregate results computed by scorer metrics. stats EvalStats Model usage statistics (input and output tokens) logging list[LoggingMessage] Logging messages (e.g. from log.info(), log.debug(), etc. error EvalError Error information (if status == "error) including traceback. Before analysing results from a log, you should always check their status to ensure they represent a successful run: log = eval(popularity, model="openai/gpt-4") if log.status == "success": ... In the section below we’ll talk more about how to deal with logs from failed evaluations (e.g. retrying the eval). You can enumerate, read, and write EvalLog objects using the following helper functions from the inspect_ai.log module: Function Description list_eval_logs() List all of the eval logs at a given location. read_eval_log(log_file) Read an EvalLog from a log file path. write_eval_log(log, log_file) Write an EvalLog to a log file path. A common workflow is to define an INSPECT_LOG_DIR for running a set of evaluations, then calling list_eval_logs() to analyse the results when all the work is done: # setup log dir context os.environ["INSPECT_LOG_DIR"] = "./experiment-logs" # do a bunch of evals eval(popularity, model="openai/gpt-4") eval(security_guide, model="openai/gpt-4") # analyze the results in the logs logs = list_eval_logs() Note that list_eval_logs() lists log files recursively. Pass recursive=False to list only the log files at the root level. Errors and Retries When an evaluation task fails due to an error or is otherwise interrupted (e.g. by a Ctrl+C), an evaluation log is still written. In many cases errors are transient (e.g. due to network connectivity or a rate limit) and can be subsequently retried. For these cases, Inspect includes an eval-retry command and eval_retry() function that you can use to resume tasks interrupted by errors (including preserving samples already completed within the original task). For example, if you had a failing task with log file logs/2024-05-29T12-38-43_math_Gprr29Mv.json, you could retry it from the shell with: $ inspect eval-retry logs/2024-05-29T12-38-43_math_43_math_Gprr29Mv.json Or from Python with: eval_retry("logs/2024-05-29T12-38-43_math_43_math_Gprr29Mv.json") Note that eval_retry() does not overwrite the previous log file, but rather creates a new one (preserving the task_id from the original file). Here’s an example of retrying a failed eval with a lower number of max_connections (the theory being that too many concurrent connections may have caused a rate limit error): log = eval(my_task)[0] if log.status != "success": eval_retry(log, max_connections = 3) Sample Preservation When retrying a log file, Inspect will attempt to re-use completed samples from the original task. This can result in substantial time and cost savings compared to starting over from the beginning. IDs and Shuffling An important constraint on the ability to re-use completed samples is matching them up correctly with samples in the new task. To do this, Inspect requires stable unique identifiers for each sample. This can be achieved in 1 of 2 ways: 1. Samples can have an explicit id field which contains the unique identifier; or 2. You can rely on Inspect’s assignment of an auto-incrementing id for samples, however this will not work correctly if your dataset is shuffled. Inspect will log a warning and not re-use samples if it detects that the dataset.shuffle() method was called, however if you are shuffling by some other means this automatic safeguard won’t be applied. If dataset shuffling is important to your evaluation and you want to preserve samples for retried tasks, then you should include an explicit id field in your dataset. Max Samples Another consideration is max_samples, which is the maximum number of samples to run concurrently within a task. Larger numbers of concurrent samples will result in higher throughput, but will also result in completed samples being written less frequently to the log file, and consequently less total recovable samples in the case of an interrupted task. By default, Inspect sets the value of max_samples to max_connections + 1, ensuring that the model API is always fully saturated (note that it would rarely make sense to set it lower than max_connections). The default max_connections is 10, which will typically result in samples being written to the log frequently. On the other hand, setting a very large max_connections (e.g. 100 max_connections for a dataset with 100 samples) may result in very few recoverable samples in the case of an interruption. Eval Suites We’ve discussed how to manage retries for a single evaluation run interactively. For the case of running many evaluation tasks in batch and retrying those which failed, see the documentation on retrying tasks within Eval Suites Amazon S3 Storing evaluation logs on S3 provides a more permanent and secure store than using the local filesystem. While the inspect eval command has a --log-dir argument which accepts an S3 URL, the most convenient means of directing inspect to an S3 bucket is to add the INSPECT_LOG_DIR environment variable to the .env file (potentially alongside your S3 credentials). For example: INSPECT_LOG_DIR=s3://my-s3-inspect-log-bucket AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY AWS_DEFAULT_REGION=eu-west-2 One thing to keep in mind if you are storing logs on S3 is that they will no longer be easily viewable using a local text editor. You will likely want to configure a FUSE filesystem so you can easily browse the S3 logs locally. Log CLI Commands We’ve shown a number of Python functions that let you work with eval logs from code. However, you may be writing an orchestration or visualisation tool in another language (e.g. TypeScript) where its not particularly convenient to call the Python API. The Inspect CLI has a few commands intended to make it easier to work with Inspect logs from other languages. Listing Logs You can use the inspect list logs command to enumerate all of the logs for a given log directory. This command will utilise the INSPECT_LOG_DIR if it is set (alternatively you can specify a --log-dir directly). You’ll likely also want to use the --json flag to get more granular and structured information on the log files. For example: $ inspect list logs --json # uses INSPECT_LOG_DIR $ inspect list logs --json --log-dir ./security_04-07-2024 You can also use the --status option to list only logs with a success or error status: $ inspect list logs --json --status success $ inspect list logs --json --status error You can use the --retryable option to list only logs that are retryable $ inspect list logs --json --retryable Reading Logs The inspect list logs command will return set of URIs to log files which will use a variety of protocols (e.g. file://, s3://, gcs://, etc.). You might be tempted to try to read these URIs directly, however you should always do so using the inspect info log-file command. This is because log files can be located on remote storage systems (e.g. Amazon S3) that users have configured read/write credentials for within their Inspect environment, and you’ll want to be sure to take advantage of these credentials. For example, here we read a local log file and a log file on Amazon S3: $ inspect info log-file file:///home/user/log/logfile.json $ inspect info log-file s3://my-evals-bucket/logfile.json Log files are stored in JSON. You can get the JSON schema and TypeScript type definitions for the log file format with the following calls to inspect info: $ inspect info log-schema $ inspect info log-types NaN and Inf Because evaluation logs contain lots of numerical data and calculations, it is possible that some number values will be NaN or Inf. These numeric values are supported natively by Python’s JSON parser, however are not supported by the JSON parsers built in to browsers and Node JS. To correctly read Nan and Inf values from eval logs in JavaScript, we recommend that you use the JSON5 Parser. For other languages, Nan and Inf may be natively supported (if not, see these JSON 5 implementations for other languages).
ESSENTIALAI-STEM
Madonna and Child with Saints Michael and Bernardino The Madonna and Child with Saints Michael and Bernardino is a triptych of 1476 in tempera and gold on panel by Neroccio di Bartolomeo de' Landi, now in the Pinacoteca Nazionale in Siena. To the left is the Archangel Michael, and to the right is Saint Bernardino of Siena.
WIKI
How to adjust the pressure of the briquetting machine? Hydraulic system adjustment method of ball press During transportation, loose powder materials are prone to float and the transportation cost is high. Therefore, in most cases, briquetting machines are used to press them into balls, which are then transported and used. However, in the face of different materials, To make it into a ball, different pressures are required, so the briquetting machine must be adjusted. How to adjust the pressure of the briquetting machine? Adjusting method of briquetting machine pressure According to the different materials pressed by the briquetting machine, the pressure of the hydraulic system is also different. The system pressure can be adjusted according to the actual situation of the site. The adjustment method is: 1. Disconnect the system control circuit first, loosen the overflow valve, and tighten the pressure relay adjustment handle at the same time; 2. Turn on the power of the hydraulic motor, the oil pressure in the hydraulic cylinder rises, observe the pressure value displayed on the pressure gauge, adjust the relief valve handle to be higher than the working pressure value, and lock the relief valve lock nut; 3. Connect the hydraulic system control loop and adjust the pressure value of the pressure relay. The pressure value can be adjusted with reference to the pressure gauge display. The high pressure value can be set to 2~3MPa higher than the working pressure, and the low pressure value can be lower than the working pressure 1~2MPa ; 4. After the pressure relay is adjusted, the lock nut is fixed and locked. At this time, the system drain valve can be opened or closed to check the debugging situation. After everything is normal, the hydraulic system debugging is completed.   Attentions for hydraulic system adjustment 1. Before adjusting the pressure of the briquetting machine, check whether the connections of all parts are properly connected, whether the oil in the tank is sufficient, and ensure that the handle of the manual reversing valve is in the middle position. 2. Loosen the overflow valve handwheel to the end (left-handed) before starting the motor. 3. After starting the motor, turn the handwheel of the overflow valve to the right, and observe the reading of the pressure gauge. Stop the adjustment when the gauge pressure reaches 20.5MPa. 4. Under the premise of non-stop pump, readjust the overflow valve hand wheel to reduce the pressure gauge indication to the upper limit of working pressure (not greater than 19MPa), and lock the nut. 5. If the working system of the briquetting machine is required to release pressure, the handle of the manual reversing valve must be moved. Regarding how to adjust the pressure of the briquetting machine, the above is the entire content of the briquetting machine manufacturer for everyone. I hope it can be helpful to everyone.
ESSENTIALAI-STEM
TrueNAS General We have a NAS unit running TrueNAS at vault.synshop.net which is only accessible on the shop LAN and not accessible on the internet. Any member who requires some storage space for project related storage can request an account to be created for them. • There is also a folder called "stash" that is a public, general temporary space that is mounted as a shared storage by all shop computers to quickly and easily move files between devices. • The Vault pool has a folder called "members" under which each user with an active account on the NAS has a personal folder. • The stash folder is at the same level. • Additional folders can be created as needed. • There are two user groups: Members and Admins. Folders can be given Members, Admin, or selected individual permissions as needed. More groups can be created if required but is not advised. Administration To add a new user to the system, you need to log into the web interface as root user. Credentials for root in the administrative keepass in Google Drive under TrueNAS. To add a user: 1. Go to Accounts>User in the left hand menu 2. Click "Add User" 3. Fill in the actual members name, and their chosen username (default to their Discord/known-as identity when possible) 4. The email address is optional, but preferred. Use the member's normal contact email for future compatibility. 5. Set a password for the member, or let them set one themselves. Note that they can only change it by SSHing into the NAS. 6. Leave the userID to the programatically assigned one. 7. Uncheck "new primary group" and set their group to the existing "members" group. 8. select /mnt/vault/members from the menu as their default home directory location. (the system will auto create a folder for them with their username) 9. Submit! The unit is a Rackable Systems with 4x2TB SATA drives, with a SAS cable to a 16 drive unit. • Drive 0 (far left) in the control unit is the OS drive at 2TB • Drives 2-4 are in a RAIDz pool called "Plex" for media storage. • Drives 5-7 are currently unused 2TB drives but will slowly be used to phase in larger capacity drives. • Drives 8-20 are 3Tb drives in a RAIDz3 pool called "Vault". This is the main NAS storage. There are two network devices. LAN 1 is static assigned to 10.0.40.30. TrueNAS takes a hardline stance on never having 2 NICs on the same subnet, and has designed many elements of the OS to prevent this, so LAN 2 is not used at this time. Future to do: • Setup second nic on the local network on an appropriately different subnet • Bind both nics into one for higher throughput and reliability • Eventually replace user management with centralized system for the whole shop
ESSENTIALAI-STEM
Module talk:dum-verbs Template errors * Could you possibly fix the errors appearing on dum-conj-st and dum-conj-wk. I mean, we could just the templates, but I thought you might prefer to fix the module itself. — JohnC5 15:23, 3 May 2017 (UTC)
WIKI
Variables Prerequisites Before starting this lesson, you should be familiar with: Learning Objectives After completing this lesson, learners should be able to: • Understand difference between variable name, value, type, and storage • How to use variables in functions Motivation A variable is an essential concept in programming, it allows to structure and generalize a script/program. A variable stores in memory a value, e.g. a numeric or string value, that can be used and changed at several occasions in a script. Concept map graph TD V("Variable") --> |has|Name("Symbolic name") V --> |has|Type("Type") V --> |has|Value("Value") V --> |is| Stored("Stored in memory") Value --> |can| Change Type --> |can| Change Figure Variables are containers specific for an information type. Variable names do not contain spaces, should explain their purpose, should be consistent throughout your code, and should adhere to a naming convention. Activities Use a script editor for all these activities. General usage of variables String variables Variable type Show activity for: ImageJ Macro, general usage // ImageJ Macro variables general concepts // ImageJ Macro language is typeless // Run these commands one by one number1; // This will create an error as number1 without = is not defined. // Define variable symbol and initiate/assign a value number1 = 10; number2 = 20; // Use of variables: e.g. store result of sum in a new variable sumNumbers = number1 + number2; // Display results. We are using the variable in a macro print(sumNumbers); // Change value of number1 number1 = 20; print(number1); // value is different print(sumNumbers); // value is the same as before. // Use variables in ImageProcessing function with & operator radiusMedian = 15 open("https://github.com/NEUBIAS/training-resources/raw/master/image_data/xy_8bit__nuclei_very_noisy.tif"); run("Duplicate...", "title=Median"); run("Median...", "radius=&radiusMedian"); // The & operator does not always work // Other method to use variables in string function arguments is with string concatenation. See appropriate module ImageJ Macro, strings // ImageJ Macro variables strings // Preferred double quotes welcomeMessage1 = "Hello world!"; print(welcomeMessage1); // Can also use single quote. In standard JAVA this is for char only welcomeMessage2 = 'Hello world again!'; print(welcomeMessage2); ImageJ Macro, type aVariable = 1; print(aVariable); aVariable = "Hello World!"; print(aVariable); // ImageJ is type less and the variable type can change ImageJ Groovy, type // Print out is on the console // Run the two chunks separately as you are not allow to define the variable twice // Untyped variables def aVariable = 1; print(aVariable); print("\n"); aVariable = "Hello World!"; print(aVariable); // If you you use typed variables, type change is not allowed int aVariable = 1; print(aVariable); print("\n"); aVariable = "Hello World!"; print(aVariable); Exercises Difference of Gaussians The code performs two gaussian blurs of an image with fixed sigma. The code then computes the difference of the two filtered images. 1. Modify the code and replace the hard-coded sigma value of the gaussian blur with 2 variables, sigma1 and sigma2 respectively 2. Make sigma2 three times larger than sigma1 and run again the code Fix it Try to run the code and fix the error(s). Modify the variable names to camelCase in a way that their content/meaning is clear to the reader. Show exercise/solution for: ImageJ Macro, difference of gaussians Copy the code to the FiJi script editor and solve the exercise. Hint: You need to modify the code in line 5 and 7 and for example use the & operator to include the variables. run("Close All") open("https://github.com/NEUBIAS/training-resources/raw/master/image_data/xy_16bit__autophagosomes.tif"); rename("raw"); run("Duplicate...", "title=sigma1"); run("Gaussian Blur...", "sigma = 1"); run("Duplicate...", "title=sigma2"); run("Gaussian Blur...", "sigma = 1.5"); // This subtracts the blurred image from the raw image, i.e. sigma1 - sigma2 imageCalculator("Subtract create", "sigma1","sigma2"); Solution run("Close All") sigma1 = 1.0; sigma2 = 1.5; // For part two // sigma2 = 3*sigma1; open("https://github.com/NEUBIAS/training-resources/raw/master/image_data/xy_16bit__autophagosomes.tif"); rename("raw"); run("Duplicate...", "title=sigma1"); run("Gaussian Blur...", "sigma=&sigma1"); run("Duplicate...", "title=sigma2"); run("Gaussian Blur...", "sigma=&sigma2"); // This subtracts the blurred image from the raw image, i.e. sigma1 - sigma2 imageCalculator("Subtract create", "sigma1","sigma2"); ImageJ Macro, fix it Copy the macro code to the FiJi editor and press Run. This will create an error. 1. Fix the variable naming for the file path. Use the camelCase naming convention. 2. Change the name of the variables a and b so that it their names are meaningful and reflect their content. Use the camelCase naming convention. run("Close All"); FilePath = "https://github.com/NEUBIAS/training-resources/raw/master/image_data/xy_16bit__autophagosomes.tif"; a = 1; b = 2; open(filePath); rename("input"); run("Duplicate...", "title=tophat"); run("Top Hat...", "radius=&b"); selectWindow("input"); run("Duplicate...", "title="); run("Variance...", "radius=&a"); Solutions run("Close All"); filePath = "https://github.com/NEUBIAS/training-resources/raw/master/image_data/xy_16bit__autophagosomes.tif"; varianceRadius = 1; topHatRadius = 2; open(filePath); rename("input"); run("Duplicate...", "title=tophat"); run("Top Hat...", "radius=&topHatRadius"); selectWindow("input"); run("Duplicate...", "title=variance"); run("Variance...", "radius=&varianceRadius"); Assessment True or False Solution • False • True • False • True Follow-up material Recommended follow-up modules: Learn more:
ESSENTIALAI-STEM
User:The Flying Spaghetti Monster/Sonnyjim = Sonnyjim = Sonnyjim is a rapper and hip-hop producer from Birmingham, England. He first began making music in 2005, steadily building an underground following, before reaching a significant buzz with his 2016 album Mud in My Malbec. His 2022 album White Girl Wasted with producer The Purist, featuring prominent U.S. artists MF Doom, Jay Electronica and DJ Premier, saw Sonnyjim gain more widespread attention. Style and Works Reviewers have noted Sonnyjim's laid back and nonchalant vocal delivery, with intricate lyrics covering topics of drugs, cooking and luxurious debauchery. His early influences include UK hip-hop artists like Skinnyman and U.S. east coast hip hop like Jay-Z, Nas and Roc Marciano. Throughout his career he has rapped with various noted U.S. hip hop artists, including MF DOOM, Jay Electronica, DJ Premier, Madlib, Roc Marciano and Buckwild. Labels he has been involved with include Daupe! and Blah Records as well as collaborations with artists on Griselda Records like Conway the Machine and Westside Gunn. Career Sonnyjim is from Birmingham, England, and is of Indian heritage. He started rapping in the mid 2000s UK hip-hop scene, appearing on mixtapes alongside British artists like Stig of the Dump and Jehst. Over the years he slowly built up an underground following, with releases like 2013's Psychonaut and the Purple Patch series, as well as founding his own label EatGood Records. His 2016 Mud in My Malbec garnered considerable underground attention, including features with New York rappers Westside Gunn and Heems. That sparked a run of collaborations with American rappers, from then until present. In 2018, Sonnyjim linked up with long-term aqquaintance The Purist after returning from Croatia's Outlook Festival. Their sessions resulted in the track Barz Simpson, which would eventually grow into the joint project White Girl Wasted. The song title was inspired by the cartoon character Bart Simpson, the rapper David Bars and the saxophonist Gary Bartz. After recording Barz Simpson, the duo decided to contact MF DOOM for a guest verse on a whim, as they thought the track sounded like his style. Doom liked the track and recorded a verse, but soon got back to Sonnyjim and asked to license the track for an Adult Swim compilation. He and The Purist declined, but kept the track to themselves in order to expand their collaboration into a full album release. When the album dropped in 2022 the list of features including the posthumous verse from MF DOOM, alongside The Purist's eclectic sample-based productions and Sonny's laconic punchlines, saw the release gain wider attention. That included positive coverage from prominent music publications like Pitchfork, Rolling Stone and The Fader. In 2023, Sonnyjim made an appearance for a freestyle session on New York radio's Hot 97 show Real Late with Peter Rosenberg. Discography Albums * Ortolan and Armagnac with Lee Scott (2023, Blah Records) * White Girl Wasted with The Purist (2022, Daupe!) * No Vi$ible Means of Income 2 with Giallo Point (2021) * Between the Lines with Da$h (2021) * Coke le Roc with Buckwild (2021) * A Joint Venture with Kev Brown (2021) * Spencer for Hire 2 & 3 (2020) * Tailor Made Ostrich with Must Volkoff (2020) * No Vi$ible Means of Income with Giallo Point (2020) * Spencer for Hire with Vic Spencer (2018, Daupe!) * Death by Misadventure with Conway the Machine (2018) * Mud in My Malbec (2016, Daupe!)
WIKI
Trump to Congress: Syria strike was in 'vital national security interest' of US | TheHill President Trump on Saturday delivered his justification to Congress for ordering a missile strike on Syria this week, saying in a letter to congressional leaders that the U.S. was prepared to take further military action if necessary. "I acted in the vital national security and foreign policy interests of the United States, pursuant to my constitutional authority to conduct foreign relations and as Commander in Chief and Chief Executive," Trump wrote. "The United States will take additional action, as necessary and appropriate, to further its important national interests," he added. The letter was addressed to House Speaker Paul RyanPaul Davis RyanEmbattled Juul seeks allies in Washington Ex-Parkland students criticize Kellyanne Conway Latina leaders: 'It's a women's world more than anything' MORE (R-Wis.) and Sen. Orrin HatchOrrin Grant HatchTrump to award racing legend Roger Penske with Presidential Medal of Freedom Trump awards Presidential Medal of Freedom to economist, former Reagan adviser Arthur Laffer Second ex-Senate staffer charged in aiding doxxing of GOP senators MORE (R-Utah), the Senate president pro tempore. Under the War Powers Resolution, the president is required to submit an explanation for the use of force within 48 hours after military action is taken. The deadline for Trump to do so would be Saturday night. Trump's letter echoed his comments delivered roughly an hour after the strikes on Thursday night, when he characterized the strikes as in the "vital national security interest" of the U.S. “It is in this vital national security interest of the United States to prevent and deter the spread and use of deadly chemical weapons,” Trump said at his Mar-a-Lago resort in Florida, where he was hosting Chinese President Xi Jinping. A number of world leaders rallied around the U.S. strikes on Friday, applauding the action as a necessary and proportional response to Syrian President Bashar Assad’s alleged use of chemical weapons in the country’s Idlib Province. The Syrian government and Russia, a longtime backer of Assad and one of the regime’s fiercest military supporters, condemned the strike. A spokesman for Russian President Vladimir Putin on Friday called the strike an act of “aggression against a sovereign state” and accused the U.S. of violating international law. U.S. lawmakers expressed general support for the attack, though many called for the president to seek congressional approval before conducting any further military operations against Syria. Senate Majority Leader Mitch McConnellAddison (Mitch) Mitchell McConnellAre Democrats turning Trump-like? House Democrat calls for gun control: Cities can ban plastic straws but 'we can't ban assault weapons?' Churches are arming and training congregants in response to mass shootings: report MORE (R-Ky.), however, said that the president shouldn’t have to seek further approval for military action. He argued that an Authorization for Use of Military Force (AUMF) approved by Congress in the days after the Sept. 11, 2001 attacks, and another in 2002 that authorized the Iraq War, justified recent military action in the region. "We passed one back in 2001 and 2002, I believe, and the previous president thought that it authorized what we were doing in that part of the world, and I expect this president thinks the same," he told conservative radio host Hugh Hewitt on Friday. Trump’s assertion that the U.S. was prepared to carry out further attacks on Syria if necessary echoed similar comments made by U.S. Ambassador to the United Nations Nikki Haley on Friday, who delivered a rebuttal to Russia’s condemnations and defended the president’s action. "The United States took a very measured step last night," Haley said. "We are prepared to do more, but we hope that will not be necessary." Updated: 3:51 p.m. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
wiljago wiljago - 6 months ago 35 SQL Question SQL query to match characters from N in X positions to characters from M in Y positions I am trying to figure out how to match characters based on position, but I also want the sub string to match to be based on position. Here is what I'm trying to do: SELECT employee_table.LastFirst, employee_table.EmployeeId, MondayPlgReport.created_by, SUBSTR (employee_table.LastFirst, 0,5) AS employeeNameMatch SUBSTR (MondayPlgReport.created_by, 2,4) AS userNameMatch UPDATE MondayPlgReport SET MondayPlgReport.created_by=employee_table.EmployeeId WHERE employeeNameMatch=userNameMatch I know that's wrong as hell, but hopefully it clarifies what I'm trying to achieve. I also tried: SELECT LastFirst, EmployeeId, SUBSTR (LastFirst, 0,5) AS employeeNameMatch FROM employee_table SELECT created_by, SUBSTR (created_by, 2,4) AS userNameMatch FROM MondayPlgReport UPDATE MondayPlgReport SET MondayPlgReport.created_by=employee_table.EmployeeId WHERE employeeNameMatch=userNameMatch When I run either SELECT LastFirst, EmployeeId, SUBSTR (LastFirst, 0,5) AS employeeNameMatch FROM employee_table Or SELECT created_by, SUBSTR (created_by, 2,4) AS userNameMatch FROM MondayPlgReport Then I do see the query returns the results I'm seeking. The issue here is that the employees change frequently, and I am seeking another position. If the code needs to be updated every time someone leaves or is hired, then it will be useless to the department as soon as I leave. Thanks very much for any help! Answer If you are using mysql you can use use JOIN this way UPDATE MondayPlgReport JOIN mployee_table SET MondayPlgReport.created_by=employee_table.EmployeeId ON SUBSTR(employee_table.LastFirst, 0,5)=SUBSTR(MondayPlgReport.created_by, 2,4) and for sqlite UPDATE MondayPlgReport SET created_by = (select EmployeeId from employee_table where SUBSTR(LastFirst, 0,5) = SUBSTR(MondayPlgReport.created_by, 2,4));
ESSENTIALAI-STEM
How do you permanently delete an iCloud account? – [Answer] 2022 Answer 1. Head to Apple’s data and privacy webpage login. 2. Log in to the account you’d like to delete. 3. Toward the bottom. 4. Click on Request to delete your account. 5. Make sure you want to delete your account and double-check backups of your data. 6. Double check if you have any subscriptions with your Apple ID. How to Permanently Delete Your iCloud Account How to Delete an iCloud account Is it possible to change iCloud email address? Although you can delete an iPhone address, you cannot modify it. You can only make a new Apple account with your desired icloud.com email address. If you create a new account, all data must be manually transferred from the old to the new account, and you lose access to previous purchases. How do I delete an iCloud account from my iPhone without a password? You can’t leave or delete an account without knowing the login credentials. That’s just good security practice. As a result, you’ll need to reset the password and recover the account first. Does iCloud have recently deleted? On iCloud.com, go to https://www-us.apple.com/accountsettings/manageappdiskspace and sign in with your Apple ID and password to see Recently Deleted at the bottom right of the window. To restore all of the data, click Recover All or pick each file you want to recover, then choose Recover. What happens when you cancel iCloud? The process of deleting a user from an iPhone is relatively simple, and as long as you follow these steps carefully, it should not result in data loss. Here’s how to do it: Tap Settings General Profile Name. What happens to iCloud if I stop paying? If you stop paying for iCloud storage, you’ll get a pop-up on your phone prompting you to pay. If you refuse, you’ll have 30 days to retrieve your data from the cloud before it’s permanently erased. What happens to my data if I stop paying iCloud? When you cancel your iCloud storage plan, Apple reduces your account to the free 5 GB. If you have more than 5 GB of data in iCloud, Apple generally does not delete it for another 30 days. If you do not act within 30 days, Apple will begin deleting your iCloud data. Does factory reset remove iCloud? Yes, your iPhone’s factory reset will not alter your iCloud account. If you wish to re-establish your iPhone, you’ll be given the option to connect it to your iCloud account if necessary. Backups from iCloud may also be restored on an iOS device. The only impact that a factory reset has on the phone is that it deletes all of its data. Leave a Comment
ESSENTIALAI-STEM
Talk:Goyang A Feedback from New Page Review process I left the following feedback for the creator/future reviewers while reviewing this article: the name doesn't correspond to any constituency in South Korean Legislature Constituencies -MPGuy2824 (talk) 04:20, 26 February 2024 (UTC) * Thank you for your comment. The constituency name corresponds with the list of constituencies on List of members of the National Assembly (South Korea), 2020–2024 MogasTheThird (talk) 05:00, 26 February 2024 (UTC)
WIKI
Happy Codings - Programming Code Examples Html Css Web Design Sample Codes CPlusPlus Programming Sample Codes JavaScript Programming Sample Codes C Programming Sample Codes CSharp Programming Sample Codes Java Programming Sample Codes Php Programming Sample Codes Visual Basic Programming Sample Codes C++ Programming Code Examples C++ > Code Snippets Code Examples Use eof() to read and display a text file. /* Use eof() to read and display a text file. */ #include <iostream> #include <fstream> using namespace std; int main(int argc, char *argv[]) { char ch; ifstream fin("text.txt"); if(!fin) { cout << "Cannot open file.\n"; return 1; } do { fin.get(ch); if(!fin.eof() && (fin.fail() || fin.bad())) { cout << "Input Error\n"; fin.close(); return 1; } if(!fin.eof()) cout << ch; } while(!fin.eof()); fin.clear(); fin.close(); if(!fin.good()) { cout << "Error closing file."; return 1; } return 0; } In while loop, condition is evaluated first and if it returns true then the statements inside while loop execute, this happens repeatedly until the condition returns false. When condition returns false, the control comes out of loop and jumps to the next statement in the program after while loop. The important point to note when using while loop is that we need to use increment or decrement statement inside while loop so that the loop variable gets changed on each iteration, and at some point condition returns false. This way we can end the execution of while loop otherwise the loop would execute indefinitely. A while loop that never stops is said to be the infinite while loop, when we give the condition in such a way so that it never returns false, then the loops becomes infinite and repeats itself indefinitely. In computer programming, we use the if statement to run a block code only when a certain condition is met. An if statement can be followed by an optional else statement, which executes when the boolean expression is false. There are three forms of if...else statements in C++: • if statement, • if...else statement, • if...else if...else statement, The if statement evaluates the condition inside the parentheses ( ). If the condition evaluates to true, the code inside the body of if is executed. If the condition evaluates to false, the code inside the body of if is skipped. Get characters. Extracts characters from the stream, as unformatted input. The get() function is used to read a character(at a time) from a file. The classes istream and ostream define two member functions get(), put() respectively to handle the single character input/output operations. There are two types of get() functions. Both get(char *) and get(void) prototype can be used to fetch a character including the blank space,tab and newline character. The get(char *) version assigns the input character to its argument and the get(void) version returns the input character. Since these functions are members of input/output Stream classes, these must be invoked using appropriate objects. Check whether either failbit or badbit is set. Returns true if either (or both) the failbit or the badbit error state flags is set for the stream. At least one of these flags is set when an error occurs during an input operation. failbit is generally set by an operation when the error is related to the internal logic of the operation itself; further operations on the stream may be possible. While badbit is generally set when the error involves the loss of integrity of the stream, which is likely to persist even if a different operation is attempted on the stream. badbit can be checked independently by calling member function bad. This function does not accept any parameter. Function returns true if badbit and/or failbit are set. #include is a way of including a standard or user-defined file in the program and is mostly written at the beginning of any C/C++ program. This directive is read by the preprocessor and orders it to insert the content of a user-defined or system header file into the following program. These files are mainly imported from an outside source into the current program. The process of importing such files that might be system-defined or user-defined is known as File Inclusion. This type of preprocessor directive tells the compiler to include a file in the source code program. Check whether state of stream is good. Returns true if none of the stream's error state flags (eofbit, failbit and badbit) is set. ios::good() and ios::bad() functions in C++ are used to check the state of the stream whether it is good or bad to do our task. Both of these are defined in ios library. The good() method of ios class in C++ is used to check if the stream is good enough to work. It means that this function will check if this stream has raised any error or not. Notice that this function is not the exact opposite of member bad, which only checks whether the badbit flag is set. This function does not accept any parameter. Function returns true if none of the stream's state flags are set. Check whether eofbit is set. Returns true if the eofbit error state flag is set for the stream. This flag is set by all standard input operations when the End-of-File is reached in the sequence associated with the stream. Note that the value returned by this function depends on the last operation performed on the stream (and not on the next). Operations that attempt to read at the End-of-File fail, and thus both the eofbit and the failbit end up set. This function can be used to check whether the failure is due to reaching the End-of-File or to some other reason. Check whether badbit is set. Returns true if the badbit error state flag is set for the stream. The bad() method of ios class in C++ is used to check if the stream is has raised any bad error. It means that this function will check if this stream has its badbit set. This method does not accept any parameter. Function returns true if the stream's badbit error state flag is set. false otherwise. A program shall contain a global function named main, which is the designated start of the program in hosted environment. main() function is the entry point of any C++ program. It is the point at which execution of program is started. When a C++ program is executed, the execution control goes directly to the main() function. Every C++ program have a main() function. Set error state flags. Sets a new value for the stream's internal error state flags. The clear() method of ios class in C++ is used to change the current state of the specified flag by setting it. Hence this function changes the internal state of this stream. The current value of the flags is overwritten: All bits are replaced by those in state; If state is goodbit (which is zero) all error flags are cleared. In the case that no stream buffer is associated with the stream when this function is called, the badbit flag is automatically set (no matter the value for that bit passed in argument state). Note that changing the state may throw an exception, depending on the latest settings passed to member exceptions. Logical Operators are used to compare and connect two or more expressions or variables, such that the value of the expression is completely dependent on the original expression or value or variable. We use logical operators to check whether an expression is true or false. If the expression is true, it returns 1 whereas if the expression is false, it returns 0. Assume variable A holds 1 and variable B holds 0: Consider a situation, when we have two persons with the same name, jhon, in the same class. Whenever we need to differentiate them definitely we would have to use some additional information along with their name, like either the area, if they live in different area or their mother's or father's name, etc. Same situation can arise in your C++ applications. For example, you might be writing some code that has a function called xyz() and there is another library available which is also having same function xyz(). Now the compiler has no way of knowing which version of xyz() function you are referring to within your code. In C++ programming we are using the iostream standard library, it provides cin and cout methods for reading from input and writing to output respectively. To read and write from a file we are using the standard C++ library called fstream. Let us see the data types define in fstream library is: • ofstream: This data type represents the output file stream and is used to create files and to write information to files. • ifstream: This data type represents the input file stream and is used to read information from files. • fstream: This data type represents the file stream generally, and has the capabilities of both ofstream and ifstream which means it can create files, write information to files, and read information from files. C++ Program to find edge connectivity of a graph. An edge in an undirected connected graph is a bridge if removing it disconnects the graph. For a "disconnected undirected" Displaying the "Topological Sort Method" of finding whether a given graph contains cycle or not using Kosaraju's Algorithm. Enter the source and destination. Cycles exist in graph. Algorithm finds the median of 2 sorted arrays using binary search approach. Takes the input of 'n' Data Elements of both the arrays. Using decrease, conquer method find the combined
ESSENTIALAI-STEM
Page:Federal Reporter, 1st Series, Volume 5.djvu/30 18 FEDSBÀli BSFOBTBB. �ton, supra, the woman was never in the United States until after the death of her husband, and in neither case does it appear that the^e waa any evidence that the women held to be citizens, by reason of their marriage with citizens, possessed the qualifications of good moral character, attachment to the principles of the constitution, and disposition to the good order and happiness of the United States. The reasonable inference is that, notwithstanding the letter of the statute, "might herself be lawfully naturalized," the supreme court considered that it was only necessary that the wornan should be a person of the class or race permitted to be naturalized by existing laws, and that in respect to the qualifications arising out of her conduct or opinions, being the wife of a citizen, she is to be regarded as qualified for citizenship, and therefore considered a citizen. And, tried by this test, it is quite likely that she will be found as well qualified, person- ally, as her husband, or the thousands of poor, ignorant, and unknown aliens who are yearly admitted to citizenship, in the larger eenters of foreign population, by the local courts of practically their own creation. �The stipulation in this case is silent as to the qualifications of the plaintiff, except that she is a native of Switzerland, and was married to an American citizen in 1875, and has since resided in Oregon ; and, if it must appear affirmatively that she possessed the qualifications at the time of her marriage to entitle her to naturalization, then it does not appear that she is or ever was a citizen of the United States. Indeed, it does not appear certainly that she belongs to the class or race of per- sons who "might be lawfully naturalized;" for, although she is a native of Switzerland, it does not folio w from that f act that she is either a free white person, or one of African descent or nativity. But, on the argument, it was practically admitted that she was a free white person, and the stipula- tion may be amended in this respect accordingly. As to the other qualifications, my conclusion is, upon the authorities and the reason, if not the necessity of the case, that the statute must be construed as in efifect deolaring that an alien ����
WIKI
Living with hemorrhoids can be a frustrating and painful experience. However, if armed with the right knowledge, you can make this troublesome condition less agonizing and learn how to prevent hemorrhoids from occurring in the future. The following article gives you all the tips, hints and advice that you need to start making your life easier today. An all natural astringent like witch hazel costs only two or three dollars and is available at nearly every pharmacy and grocery store. Soak a cotton ball in the witch hazel, then apply it directly to the surface and surrounding area of your external hemorrhoid. Witch hazel causes the blood vessels to temporarily shrink, which reduces the size and discomfort of the hemorrhoid. Sleep is integral if you want to reduce the pain from the hemorrhoids that you have. Try to aim for at least seven hours of sleep every single night to help your body to restore its natural functionality. Make sure to get the ample rest to eliminate the painful symptoms of hemorrhoids. Beans are very important to help eliminate hemorrhoids. When you consume beans, you will maximize the quality of your bowel movements, which can help with the irritation that you may get from hemorrhoids. Try to eat a least one meal during the day with beans to help improve your condition. Try to limit the amount of sitting that you do during the course of the day. Remaining stagnant in your seat can lead to a lot of irritation and can strain your affected area of skin. If you are at work, limit the sitting that you do to improve your condition. One of the best things that you can put on your skin to improve your condition, is vitamin E oil. Vitamin E helps to soothe and smooth out the surface of your skin, which can help your hemorrhoids. If you prefer, you can take vitamin E in a capsule, as well. The next time that you take a shower, make sure you are using lukewarm water instead of hot water. Heat can worsen your condition if you have hemorrhoids and can cause your sores to get worse. Stick to warm or cold water to maximize how you feel during the day. If you are suffering from hemorrhoids, do not rely on certain laxatives to help you relieve constipation! These types of medications are made to assist you in a single bowel movement. If you find that you are having issues with bowel movements and regularity, change your diet. Many people suffer needlessly from the pain and discomfort caused by hemorrhoids. While there is no magic cure to entirely ease your suffering, you can greatly alleviate your distress by educating yourself on the causes, treatments and cures of this condition. Living with hemorrhoids can range from an irritating nuisance to an excruciating ordeal. No matter where you fall on the spectrum, this article is designed to provide you with the information you need to start combating the problem.
ESSENTIALAI-STEM
Toad For Oracle (Windows) keyboard shortcuts Toad For Oracle (Windows) Zeynel Abidin Öztürk - 9 months ago - Shortcuts Ctrl + D Description Ctrl + ⭾ Tab Open Quick Describe window F1 Cycle through a collection of "child windows" or tabs in a window F4 Open the Toad documentation F10 Immediately describe object in popup window Ctrl + Alt + B Display right-click menu Ctrl + F5 Add watch at cursor Ctrl + Alt + D Display the PL/SQL Debugger Breakpoints window Ctrl + Alt + E Display the PL/SQL Debugger DBMS Output window Ctrl + Alt + C Display the PL/SQL Debugger Evaluate/Modify window Ctrl + Alt + W Display the PL/SQL Debugger Call Stack window F11 Display the PL/SQL Debugger Watches window F12 Run (continue execution) ↑   Shift + F5 Run to cursor ↑   Shift + F7 Set or delete a breakpoint on the current line ↑   Shift + F8 Trace into ↑   Shift + F10 Step over ↑   Shift + Ctrl + F9 Trace out Alt + Set parameters Alt + Display previous statement Alt + then Ctrl + B Display next statement Ctrl + E Comment block Ctrl + M Execute Explain Plan on the current statement Ctrl + N Make code statement Ctrl + P Find sum of the selected fields. You can also include additional calculations, such as the average or count Ctrl + T Strip code statement Ctrl + F9 Display pick list drop-down Ctrl + F12 Verify statement without execution (parse) in the Editor Ctrl + . Pass the SQL or Editor contents to the specified external editor Ctrl + ⤶ Enter Display code completion list Ctrl + Alt + Page Up Execute current SQL (same as Shift + F9) Ctrl + Alt + Page Down Navigate to the previous results panel tab F2 Navigate to the next results panel tab F6 Toggle full screen Editor F5 Execute as script F7 Toggle between Editor and Results panel F8 Clear all text, trace into the Editor F9 Recall previous SQL statement in the Editor ↑   Shift + F2 Execute statement in the Editor Ctrl + F Find text Ctrl + G Go to line number Ctrl + R Find and replace F3 Find next occurence ↑   Shift + F3 Find previous occurence Ctrl + B Comment block Ctrl + ↑   Shift + B Un-comment block Thanks our visitor for the shortcut list! Share this page on: Program information Program name: Toad For Oracle (Windows) Toad For Oracle (Windows) (Developer tools) Toad is a database management software for database developers, administrators and data analysts. It reduces the time spend on daily tasks. Web page: toadworld.com/products/downloa... Last update: 11 Nov 2019 Shortcut count: 46 How easy to press shortcuts: 80% Platform detected: Windows or Linux (not macOS) Similar programs Advertisement Join our mailing list! Your email is kept private and we don't spam.
ESSENTIALAI-STEM
Template talk:RQ:Pynchon Gravity's Rainbow Divisions Note to myself to get rid of the chapter parameter, as there as no real chapters in this book. There are 4 distinct parts, divided thus: Thus I will add a part parameter, and an episode parameter. Also note that the episodes are not explicitly numbered in the work, but are separated in the first edition by seven square "sprockets" and one square sprocket in subsequent editions. The episodes will be numbered in page order obviously. Nervelita (talk) 10:38, 13 December 2022 (UTC) * Part 1:Beyond the Zero (21 episodes) * Part 2:Une Perm au Casino Hermann Goering (8 episodes) * Part 3:In the Zone (32 episodes) * Part 4:The Counterforce (12 episodes) * done Nervelita (talk) 12:45, 14 December 2022 (UTC)
WIKI
User:Bonjofosho Bon Jo Fo Sho: It is a group of young men who don't beleive in the way of God or the theory of the "Big Bang" we beleive that Life and/or earth is an Illusion we are a small group now but in the near future our numbers will increase shy high.. watch out Jesus "if there is one"
WIKI
TechSpot "The maximum number of secrets that may be stored in a single system has exceeded..." Inactive By JimmaWat Aug 22, 2011 1. JimmaWat JimmaWat TS Rookie Topic Starter Posts: 42 Hmm ok. I'll look around some more or see if anybody I know has a spare copy. I'll get back to you when I can find one.   2. Broni Broni Malware Annihilator Posts: 47,032   +255 Meanwhile.... Go Start>Run ("Start Search" in Vista/7), type in: sfc /scannow Click OK (hold CTRL, and SHIFT, hit Enter in Vista/7). Have Windows CD/DVD handy (with Vista/7, most likely, you won't need it). If System File Checker (sfc) will find any errors, it may ask you for the CD/DVD (rarely in Vista/7 case). I realize you don't have that CD yet, but I just want you to check if "sfc" WILL ask you for a CD. That way we'll know if some system files are NOT OK.   3. JimmaWat JimmaWat TS Rookie Topic Starter Posts: 42 I found the original CD (it was in a storage) and I popped it in but it still won't recognize the qmgr.dll file it asks for when restoring BITS. And it's weird because I see it right there on the CD. The same happens with my friend's CD. I tried the sfc /scannow and it indeed need the CD to replace some DLL's and it was taking a while so I left it alone for a bit. When I came back, the screen was completely black and didn't seem responsive for a while, so I did a hard reset and it came back to its normal state, internet still not working. I'll try sfc again and keep a closer eye to see why it black screened. Any suggestions?   4. Broni Broni Malware Annihilator Posts: 47,032   +255 5. JimmaWat JimmaWat TS Rookie Topic Starter Posts: 42 So I decided to just give up and reinstall Windows. Nothing was working. But everything seems to be working fine now. Internet and all. I didn't do a clean installation so I don't know if there's still anything potentially dangerous still lurking around, but for now, I believe the WINDOWS folder is clean.   6. Broni Broni Malware Annihilator Posts: 47,032   +255 Let me know if something comes up.   Topic Status: Not open for further replies. Add New Comment TechSpot Members Login or sign up for free, it takes about 30 seconds. You may also... Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.
ESSENTIALAI-STEM
Lotfi A. Zadeh From Wikiquote (Redirected from Lotfi Asker Zadeh) Jump to: navigation, search Lotfali Askar Zadeh (February 4, 1921September 6, 2017) was a Azerbaijani-born Iranian American mathematician, electrical engineer, computer scientist, artificial intelligence researcher, and professor emeritus of computer science at the University of California, Berkeley, known for the development of fuzzy logic. Quotes[edit] 1960s[edit] • It was a biologist — Ludwig von Bertalanffy — who long ago perceived the essential unity of system concepts and techniques in the various fields of science and who in writings and lectures sought to attain recognition for “general systems theory” as a distinct scientific discipline. It is pertinent to note, however, that the work of Bertalannfy and his school, being motivated primarily by problems arising in the study of biological systems, is much more empirical and qualitative in spirit than the work of those system theorists who received their training in exact sciences. In fact, there is a fairly wide gap between what might be regarded as “animate” system theorists and “inanimate” system theorists at the present time, and it is not at all certain that this gap will be narrowed, much less closed, in the near future. There are some who feel this gap reflects the fundamental inadequacy of the conventional mathematics—the mathematics of precisely defined points, functions, sets, probability measures, etc.—for coping with the analysis of biological systems, and that to deal effectively with such systems, we need a radically different kind of mathematics, the mathematics of fuzzy or cloudy quantities which are not describable in terms of probability distributions. Indeed the need for such mathematics is becoming increasingly apparent even in the realms of inanimate systems Fuzzy sets (1965)[edit] Zadeh (1965). "Fuzzy sets", Information and Control 8 (3): 338–353. • A fuzzy set is a class of objects with a continuum of grades of membership. Such a set is characterized by a membership (characteristic) function which assigns to each object a grade of membership ranging between zero and one. The notions of inclusion, union, intersection, complement, relation, convexity, etc., are extended to such sets, and various properties of these notions in the context of fuzzy sets are established. In particular, a separation theorem for convex fuzzy sets is proved without requiring that the fuzzy sets be disjoint. • p. 338 • More often than not, the classes of objects encountered in the real physical world do not have precisely defined criteria of membership. For example, the class of animals clearly includes dogs, horses, birds, etc. as its members, and clearly excludes such objects as rocks, fluids, plants, etc. However, such objects as starfish, bacteria, etc. have an ambiguous status with respect to the class of animals. The same kind of ambiguity arises in the case of a number such as 10 in relation to the “class” of all real numbers which are much greater than 1. • p. 338 1970s[edit] • In general, complexity and precision bear an inverse relation to one another in the sense that, as the complexity of a problem increases, the possibility of analysing it in precise terms diminishes. Thus 'fuzzy thinking' may not be deplorable, after all, if it makes possible the solution of problems which are much too complex for precise analysis. • Zadeh (1972) "Fuzzy languages and their relation to human intelligence". in: Proceedings of the International Conference Man and Computer, Bordeaux, France. Basel: S. Karger, pp. 130-165. cited in Gaines (1976) "Foundations of fuzzy reasoning" in: International Journal of Man-Machine Studies 8(6), p. 624 • [ Fuzzy logic is ] a logic whose distinguishing features are (i) fuzzy truth-values expressed in linguistic terms, e.g., true, very true, more or less true, or somewhat true, false, nor very true and not very false, etc2.; (2) imprecise truth tables; and (3) rules of inference whose validity is relative to a context rather than exact. • Zadeh (1975) "Fuzzy logic and approximate reasoning". Synthese 30: p. 407 Outline of a new approach to the analysis of complex systems and decision processes (1973)[edit] Zadeh (1973) "Outline of a new approach to the analysis of complex systems and decision processes" in IEEE Transactions on Systems, Man and Cybernetics 3(1), p. 28-44 • A linguistic variable is defined as a variable whose values are sentences in a natural or artificial language. • p. 28 • The advent of the Computer age has stimulated a rapid expansion in the use of quantitative techniques for the analysis of economic, urban, social, biological and other types of systems in which it is the animate rather than in dominant role. At present, most of the techniques employed for the analysis of humanistic, i.e., human centred systems are adaptations of the methods that have been developed over a long period of time for dealing with mechanistic systems, i.e., physical systems governed in the main by-the laws of mechanics, electromagnetism, and thermodynamics. The remarkable successes of these methods in unraveling the secrets of nature and enabling us to build better and better machines have inspired a widely held belief that the same or similar techniques can be applied with comparable effectiveness to the analysis of humanistic systems. • p. 28 • [T]he successes of modern control theory in the design of highly accurate space navigation systems have stimulated its use in the theoretical analyses of economic and biological systems. Similarly, the effectiveness of computer simulation techniques in the macroscopic analyses of physical systems has brought into vogue the use of computer-based econometric models for purposes of forecasting, economic planning, arid management. • p. 28 • A linguistic variable is a variable whose values are words or sentences in a natural or synthetic language. • Essentially, a fuzzy algorithm is an ordered sequence of instructions (like a computer program) in which some of the instructions may contain labels or fuzzy sets, e.g.: Reduce x slightly if y is very large Increase x very slightly if y is not very large and not very small If x is small then stop; otherwise increase x by 2. • p. 30 1990s[edit] • The question really isn't whether I'm American, Russian, Iranian, Azerbaijani, or anything else. I've been shaped by all these people and cultures and I feel quite comfortable among all of them. • A frequent source of misunderstanding has to do with the interpretation of fuzzy logic. The problem is that the term fuzzy logic has two different meanings. More specifically, in a narrow sense, fuzzy logic, FLn, is a logical system which may be viewed as an extension and generalization of classical multivalued logics. But in a wider sense, fuzzy logic, FLw is almost synonymous with the theory of fuzzy sets. In this context, what is important to recognize is that: (a) FLw is much broader than FLn and subsumes FLn as one of its branches; (b) the agenda of FLn is very different from the agendas of classical multivalued logics; and (c) at this juncture, the term fuzzy logic is usually used in its wide rather than narrow sense, effectively equating fuzzy logic with FLw • Zadeh (1995) in Foreword of George J. Klir Fuzzy sets and fuzzy logic: theory and applications. • To what degree is something true or false? • Attributed to Zadeh in: "What is Fuzzy Logic?" in: Azerbaijan international Vol 2.4 (Winter 1994). p. 47 • This quote is introduced as "The question Zadeh always insists upon asking". • The term fuzzy logic is used in this paper to describe an imprecise logical system, FL, in which the truth-values are fuzzy subsets of the unit interval with linguistic labels such as true, false, not true, very true, quite true, not very true and not very fake, etc.... As a consequence, the truth tables and the rules of inference in fuzzy logic are (i) inexact and (ii) dependent on the meaning associated with the primary truth-value true as well as the modifiers very quite. • Lotfi Asker Zadeh, George Jiri Klir, Bo Yuan (1996) Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers. p. 238 Interview with Lotfi Zadeh, Creator of Fuzzy Logic (1994)[edit] Zadeh (1994) in: Betty Blair. "Interview with Lotfi Zadeh, Creator of Fuzzy Logic". Azerbaijan International, Vol. 2:4 (Winter 1994), pp. 46 ff. • Well, I knew it was going to be important. That much I knew. In fact, I had thought about sealing it in a dated envelope with my predictions and then opening it 20-30 years later to see if my intuitions were right. I realized this paper marked a new direction. I used to think about it this way-that one day Fuzzy Logic would turn out to be one of the most important things to come out of our Electrical Engineering Computer Systems Division at Berkeley. I never dreamed it would become a worldwide phenomenon. My expectations were much more modest. • Answer to the question: "Back in 1965 when you published your initial paper on Fuzzy Logic, how did you think it would be accepted?" • In many, many fields. I expected people in the social sciences-economics, psychology, philosophy, linguistics, politics, sociology, religion and numerous other areas to pick up on it. It's been somewhat of a mystery to me why even to this day, so few social scientists have discovered how useful it could be. Instead, Fuzzy Logic was first embraced by engineers and used in industrial process controls and in "smart" consumer products such as hand-held camcorders that cancel out jittering and microwaves that cook your food perfectly at the touch of a single button. I didn't expect it to play out this way back in 1965. • Response to the question: "How did you think Fuzzy Logic would be used at first?" • I can't say that anything has been "exciting". Rather, I would choose the word "interesting". Not too long ago, the Chinese University of Hong Kong conducted a survey to determine which consumer products were using Fuzzy Logic. The result was a thick report, some 150-200 pages long-washing machines, camcorders, microwave ovens, etc. What interested me wasn't the particular applications so much as the breadth of applications-so many products were incorporating Fuzzy Logic. • About "What kinds of applications have you been excited to see develop?" About Lotfi A. Zadeh[edit] • I would like to comment briefly on Professor Zadeh's presentation. His proposals could be severely, ferociously, even brutally criticized from a technical point of view. This would be out of place here. But a blunt question remains: Is professor Zadeh presenting important ideas or is he indulging in wishful thinking? No doubt Professor Zadeh's enthusiasm for fuzziness has been reinforced by the prevailing climate in the U.S.-one of unprecedented permissiveness. 'Fuzzification, is a kind of scientific permissiveness; it tends to result in socially appealing slogans unaccompanied by the discipline of hard scientific work and patient observation. • Conceptual graphs (CGs) (Sowa 1976; 1984) and fuzzy logic (Zadeh 1965; 1975a) are two logical formalisms that emphasize the target of natural language, each of which is focused on one of the two mentioned desired features of a logic for handling natural language. Conceptual graphs, based on semantic networks and Peirce's existential graphs, combine the visual advantage of graphical languages and the expressive power of logic. • Tru Hoang Cao (2010) Conceptual Graphs and Fuzzy Logic: A Fusion for Representing and Reasoning with Linguistic Information. p. 1 • As an indispensable constituent of AI, fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the concept of partial truth, where the truth value can range between completely true and completely false. As the creator of a new field of mathematics—fuzzy set theory and fuzzy logic—Lotfi Zadeh’s intellectual contributions are myriad. He is also known for his research in system theory, information processing, AI, expert systems, natural language understanding, and the theory of evidence. His current research is focused on fuzzy logic, computing with words, and soft computing, which is a coalition of fuzzy logic, neurocomputing, evolutionary computing, probabilistic computing, and parts of machine learning • Derong Liu (2011) "Fuzzy Logic and Computational Intelligence" in: "AI's Hall of Fame" in: IEEE Intelligent Systems. Vol 26 (2011). Issue 4, p. 5-15 External links[edit] Wikipedia Wikipedia has an article about:
ESSENTIALAI-STEM
Lumbar puncture This page explains about a lumbar puncture and what to expect when your child comes to Great Ormond Street Hospital (GOSH) to have this procedure. What is a lumbar puncture? A lumbar puncture is a medical procedure, carried out to obtain a sample of cerebrospinal fluid (CSF). The same fluid covers the brain and the spinal cord. When a lumbar puncture is carried out, a needle is used to obtain CSF from the bottom of the spine, because this is where it can be done most easily and safely. How is a lumbar puncture done? Procedures and treatments - Lumbar puncture A special hollow needle goes through the skin in the lower back, into the lower spine. The CSF comes out through the needle and a few drops are collected and sent to the laboratory. Is a lumbar puncture dangerous? A lumbar puncture is not dangerous, as long as the doctors and nurses carrying it out follow the correct procedures. These procedures include checking that there are no contraindications (such as a sudden rise in pressure in the brain or an abnormality in the way in which blood clots). The doctors and nurses will take precautions to prevent any infection entering the body during the lumbar puncture. The spinal cord cannot be injured by a lumbar puncture that is correctly carried out, as the needle enters the spine below the lower end of the spinal cord. The body replaces the small amount of fluid that is removed very quickly (in less than two days). Why does my child need a lumbar puncture? A lumbar puncture is generally carried out for one or more of these reasons:  • To detect possible infection in the CSF. • To measure the pressure in the CSF. • To measure the levels of chemicals in the CSF. The exact reasons for your child having a lumbar puncture will be explained by the doctors looking after your child. The reason why doctors require CSF for these tests is because it is the fluid that has come into closest contact with the brain itself. By analysing the CSF they will have more information about how the brain may be affected by a medical condition. What happens before the lumbar puncture? You will have received information about how to prepare your child for the test in your admission letter. Your child should not eat or drink for the time specified in the letter. It is important to follow these instructions, otherwise your child’s lumbar puncture may have to be delayed or even cancelled. On the day of the procedure, the doctor will explain the procedure in detail and discuss any worries you may have. You will be asked to sign a consent form. Depending on your child’s age, he or she will probably be given sedative medication, to make him or her sleepy. In a few cases only will a general anaesthetic be required. A local anaesthetic cream will be applied to his or her back in order to numb the area. What happens to my child during the lumbar puncture? A lumbar puncture is usually carried out on the ward, so you should be able to stay with your child to comfort him or her. Most children require sedation for the procedure as it can be uncomfortable and it is important to lie still. Your child will be asked to lie on the bed on his or her side and to curl up into a ball. The nurse will help the child to keep in the correct position. The doctor will feel your child’s lower back and locate the correct space between the vertebrae (the bones of the spine). The doctor will then wash the skin around this area and cover the surrounding parts of the back with a sterile towel. The doctor will insert a needle into the space between the vertebrae (spine). The CSF will be collected into special containers and sent to the laboratories to be examined. In some cases the CSF pressure will also be measured. What can go wrong? It is unusual for something to go wrong, but occasionally one of the following may occur:  • It may not be possible to get the child into the correct position for the lumbar puncture, because they are too restless or upset. If this is the case, the procedure may have to be postponed or carried out with a general anaesthetic. • Sometimes it is not easy for the doctor to locate the place where the needle should be inserted. Another doctor may be called to assist, but in some cases the procedure has to be stopped. The doctors will discuss with you when and if the lumbar puncture should be repeated. • If a little bleeding occurs when the lumbar puncture is done, some of the blood may become mixed with the CSF, affecting the results of the test. After a lumbar puncture, a little fluid may leak out and collect under the skin. You may be able to see some swelling in the lower back, around where the lumbar puncture needle went in. This is not dangerous and will stop of its own accord. If a child is encouraged to lie flat it can help to prevent this leak from developing. Some children develop a headache after a lumbar puncture. This is due to the slight reduction in pressure around the brain, resulting from the procedure. This headache usually settles down of its own accord in 24 to 48 hours, but if necessary your child can be given paracetamol. Some children vomit after a lumbar puncture. This should be treated with bed rest and regular sips of fluid. If the vomiting is severe or uncontrolled, please seek medical advice. What happens after the lumbar puncture? The doctor will use a plaster to cover the site where the needle entered the skin. Your child will be encouraged to lie flat for about an hour afterwards. When he or she is fully awake, you should encourage him or her to drink normally. When you get home • If your child is in pain at home, give paracetamol according to the instructions on the bottle. If the pain persists or becomes worse, please call your GP. • Keep an eye on the lumbar puncture site. If the site continues to swell or you see any clear fluid or blood, or it looks red and swollen, please call your GP. Make sure your child lies flat and rests at this time. • The plaster covering the lumbar puncture site should stay in place for 24 hours and then you can remove it. It is fine for your child to attend school the day following the procedure. However, we advise that he or she does not take part in any sports or PE for a week after the test. What happens next? The samples are analysed in different laboratories. Some of the tests are very routine and give answers within a few hours, but others are much more specialised and take longer to come back. You will receive the results of the tests at your child’s next outpatient appointment. Compiled by:  Staff on Koala Ward in collaboration with the Child and Family Information Group. Last review date:  February 2014 Ref:  2013F0162 Disclaimer Please note this is a generic GOSH information sheet. If you have specific questions about how this relates to your child, please ask your doctor. Please note this information may not necessarily reflect treatment at other hospitals.
ESSENTIALAI-STEM
Daniel Atienza Daniel Atienza Urendez (born 22 September 1974 in Moudon, Switzerland) is a former Spanish professional road bicycle racer who rode for UCI ProTeam Cofidis from 2001 to 2005. Major results * 1996 * 1st Stage 7, Circuito Montañés * 1999 * 12th Overall, Tour de Romandie * 2000 * 1st Rominger Classic * 10th Overall, Tour de Suisse * 29th Overall, Tour de France * 2001 * 13th Overall, Tour de Suisse * 30th Overall, Tour de France * 2002 * 1st Mountains Competition, Midi Libre * 15th Overall, Volta a Catalunya * 2003 * 9th Overall, Volta a Catalunya * 2004 * 10th Overall, Volta a Catalunya * 2005 * 9th Overall, Tour de Romandie * 13th Overall, Tour de Suisse * 14th Overall, Giro d'Italia * 17th Overall, Vuelta a España
WIKI
Joao Urbáez Joao Andrés Urbáez Gómez (born 24 July 2002) is a professional footballer who plays as a centre-back or right-back for CD Leganés B. Born in Spain, he plays for the Dominican Republic national team. Club career Urbáez is a youth product of the academies of Canillas, Móstoles and Alcorcón. He was promoted to Alcorcón B in August 2021, after making his debut with them in May 2021. International career Born in Spain, Urbáez is of Dominican descent. He is a one-time representative of the Dominican Republic U23s in 2021. He was called up to the Dominican Republic national team for matches in June 2022. He debuted with the Dominican Republic in a 3–2 CONCACAF Nations League loss to French Guiana on 5 June 2022.
WIKI
How An NR Supplement Can Help You Hit Your Fitness Goals In 2021 When you take NR, your body converts it into nicotinamide adenine dinucleotide (NAD+), a coenzyme that exists in all cells and factors into energy metabolism and your ability to maintain proper cell functioning. NAD+ also plays a vital role in your energy levels: NAD+ is what fuels your mitochondria, which inturn fuels your body by creating energy. This, researchers think, is how the supplement aids in recovery: By supporting cell rejuvenation thereby helping your body recover and rebuild between workouts.  In fact, one animal study showed that increasing levels of NAD+ also may help improve muscle function as you age. The study, published in the journal Cell Metabolism, found that mice that had depleted levels of NAD+ had a “dramatic” drop in their muscle strength and endurance on a treadmill, implying that NAD+ is a critical component of strength and endurance.* In another study, researchers used mice whose genes were altered so their muscle tissue contained only 15% of the normal amount of NAD+. They then measured muscle strength and endurance, which was pretty low. But after giving the mice NR-enriched water for just a week, their exercise capacity was that of a normal, healthy mouse.* And in one additional mouse study, supplementation with NAD+ precursors led to better-supported DNA repair and health of muscle tissue within the first week—to the point where researchers couldn’t tell the difference between the tissue of a mouse that was 2 years old versus a mouse that was 4 months old.* Source link #Supplement #Hit #Fitness #Goals More Stories Mike Sarraille on Overcoming Life’s Challenges
ESSENTIALAI-STEM
Research Article: Glucosinolate variability between turnip organs during development Date Published: June 6, 2019 Publisher: Public Library of Science Author(s): Guusje Bonnema, Jun Gu Lee, Wang Shuhang, David Lagarrigue, Johan Bucher, Ron Wehrens, Ric de Vos, Jules Beekwilder, Yong Pyo Lim. http://doi.org/10.1371/journal.pone.0217862 Abstract Turnip (Brassica rapa spp. rapa) is an important vegetable species, with a unique physiology. Several plant parts, including both the turnip tubers and leaves, are important for human consumption. During the development of turnip plants, the leaves function as metabolic source tissues, while the tuber first functions as a sink, while later the tuber turns into a source for development of flowers and seeds. In the present study, chemical changes were determined for two genotypes with different genetic background, and included seedling, young leaves, mature leaves, tuber surface, tuber core, stalk, flower and seed tissues, at seven different time points during plant development. As a basis for understanding changes in glucosinolates during plant development, the profile of glucosinolates was analysed using liquid chromatography (LC) coupled to mass spectrometry (MS). This analysis was complemented by a gene expression analysis, focussed on GLS biosynthesis, which could explain part of the observed variation, pointing to important roles of specific gene orthologues for defining the chemical differences. Substantial differences in glucosinolate profiles were observed between above-ground tissues and turnip tuber, reflecting the differences in physiological role. In addition, differences between the two genotypes and between tissues that were harvested early or late during the plant lifecycle. The importance of the observed differences in glucosinolate profile for the ecophysiology of the turnip and for breeding turnips with optimal chemical profiles is discussed. Partial Text Turnip (Brassica rapa subsp. rapa) forms a large and edible tuber, that is composed of both hypocotyl and root tissue [1]. From turnips, both the tubers and green parts are consumed, in particular in temperate regions in Asia, Europe and North America. In addition to its role in human nutrition it is also important as a fodder crop. Turnips are a source of vitamins and nutrients, but also contain significant amounts of glucosinolates (GLS), a group of secondary plant metabolites almost exclusively found in the order Brassicales [2,3,4]. GLS are water-soluble compounds that derive from glucose and amino-acids such as methionine, tryptophan or phenylalanine. The core structure of all GLS consists of thioglucose and sulphate groups, which are conjugated to an amino-acid derived side chain. Side chains can be aliphatic or indolic or aromatic, vary in chain length and can undergo several modifications (Fig 1) [5]. In plants, GLS have a role to protect the plant from insect damage, both in leaves and in underground tissues [6,7,8,9]. In vegetables, GLS provide a variety of tastes like bitterness and pungency. Upon damage to plants, e.g. by chewing, GLS are enzymatically converted into a range of volatile compounds, like nitriles and isothiocyanates (ITCs). In addition to taste formation GLS have been reported to be implicated in both antinutritional and health-promoting effects [10]. Progoitrin, a GLS known from several brassica species, has anti-thyroid activity and promotes goitre disease [11]. On the other hand, a high consumption of Brassica vegetables correlates negatively with the incidence of degenerative diseases in numerous epidemiological studies [11]. Protective effects are often accredited to GLS breakdown products such as ITCs, nitriles and indoles [12,13]. There is increasing evidence that ITCs are involved in cancer prevention and have anti-inflammatory effects (reviewed in [14]). During the life cycle of a plant, metabolites are needed at different times and for different purposes. For example, the tuber tissue of a turnip plant initially functions as a sink to store nutrients for the plant, while it will function as a source to supply these nutrients when the plant goes into the reproductive stage and starts bolting, flowering and setting seed. Leaves provide photosynthetic capacity, and are replaced continuously by young fresh leaves during the life cycle of the plant; therefore they likely have different requirements for their functioning than turnip tubers. These requirements are at least partly met by their chemical composition. In recent years, changes in chemistry and nutritional status during sink-source transitions have been addressed on the level of sucrose transport (e.g. [48]), but much less on the level of secondary metabolites. However, in addition to differences in physiological roles of leaves and tubers, their chemistry is also under selection pressure to defend the plant to different biotic stresses, such as insects, snails, vertebrate herbivores, fungi and bacteria. Hence, differences in secondary metabolites such as GLS can be expected between the different tissues of turnip plants. Two recent reviews address these issues. Jørgensen et al. [20] present what is known about transport of defence compounds from source to sink, and use GLS as a case study. They discuss especially the roles of GLS transporters in establishing dynamic GLS patterns in Arabidopsis source and sink tissues. Burow and Halkier [19] also use GLS as case study and discuss how Arabidopsis orchestrates synthesis, storage and mobilization to target tissues. In this paper, a GLS analysis is presented which aims to provide insight in the chemical changes which accompany development of turnip tissues that function as sinks and sources for the plant. It differs from earlier studies, which focus on single tissues (either leaves or turnip tubers) and or single timepoints. It becomes clear that there are large chemical differences between tissues, between developmental-stages and between genotypes. Clearly these differences will play a role in the eco-physiology of the turnip, given the reported involvement of GLS in plant defence.   Source: http://doi.org/10.1371/journal.pone.0217862   0 0 vote Article Rating Subscribe Notify of guest 0 Comments Inline Feedbacks View all comments
ESSENTIALAI-STEM
Nicene and Post-Nicene Fathers: Series I/Volume V/On the Soul and its Origin/Book III/Chapter 22 Chapter 22 [XV.]—A Summary Recapitulation of the Errors of Victor. What these particular errors are, I have, to the best of my ability, already explained. But I will run over them again with a brief recapitulation. One is, “That God did not make the soul out of nothing, but out of His own self.” A second is, that “just as God who gives is Himself ever existent, so is He ever giving souls through infinite time.” The third is, that “the soul lost some merit by the flesh, which it had had previous to the flesh.” The fourth is, that “the soul by means of the flesh recovers its ancient condition, and is born again through the very same flesh by which it had deserved to be polluted.” The fifth is, that “the soul deserved to be sinful, previous to any sin.” The sixth is, that “infants which are forestalled by death before they are baptized, may yet attain to forgiveness of their original sins.” The seventh is, that “they whom the Lord has predestinated to be baptized may be taken away from his predestination, or die before that has been accomplished in them which the Almighty has predestined.” The eighth is, that “it is of infants who are fore-stalled by death, before they are born again in Christ, that the Scripture says, &#8216;Speedily was he taken away, lest wickedness should alter his understanding,&#8217;” with the remainder of the passage to the same effect in the Book of Wisdom. The ninth is, that “there are outside the kingdom of God some of those mansions which the Lord said were in His Father&#8217;s house.” The tenth is, that “the sacrifice of Christians ought to be offered in behalf of those who have departed out of the body without being baptized.” The eleventh is, that “some of those persons who have departed this life without the baptism of Christ do not in the meanwhile go into the kingdom, but into paradise; afterwards, however, in the resurrection of the dead, they attain even to the blessedness of the kingdom of heaven.”
WIKI
DEV Community Cover image for Productivity with Visual Studio: Debug | Part 3 Fernando Sonego Fernando Sonego Posted on • Updated on Productivity with Visual Studio: Debug | Part 3 Until now, in the first part and in the second, we have seen tricks for the code editor and improving our navigation in it. Now it's time for some tricks to improve our debugging. Most of us know the basic commands like F5 to start debugging, F9 to set a breakpoint, or F11 to get into the implementation. In addition to these, there are many functionalities in the tool that we can use to make our work easier. Move the execution point The first is to move the point where it is running. On the left side of the editor, we can find a yellow arrow, this indicates where the execution is stopped. If we need to go to another line to run from there, all we have to do is hold down the arrow and drag it to the desired place. Productivity with Visual Studio Run up to a point Suppose we have a breakpoint on the first line, but we want to run up to one in particular. We can do is click on the line and press Ctrl + F10 or press right-click and select it from the Run to Cursor context menu Productivity with Visual Studio Another path is through the green marker to the left of the code line. We position ourselves on the line to which we want to go, on the right, the green marker will appear, indicating that we can advance to that point by clicking on it. Productivity with Visual Studio We can go to an execution line without the need to execute the middle code. Again, if we stand on the line, we see the green marker on the left side. If we press the control, we will see that it turns yellow, we click and it will go to the line without executing the intermediate code. It is for this reason that when viewing the tracking window the object is null. Productivity with Visual Studio Set breakpoints Breakpoints don't just stop because we mark them. We can configure a breakpoint by configuring different conditions or when a particular event happens. It is very useful when we are debugging and we depend on the values ​​that the objects contain. We can configure a property of an object to stop when it has changed. In the image, we can see how we should do it. We configure that when changing ProductId of the product object it stops. Notice how the line is gray. Productivity with Visual Studio Suppose we need to stop execution when a property takes a specific value. For this, on the red marker of the breakpoint, we press on the configuration gear and select Conditions. We see that we have several configuration parameters. We complete it to stop when p, which is inside a loop, in the Description property is equal to “Product 2”. This will make the loop run until the condition is as desired. Home Now instead of stopping, we also want to see all the outputs of the loop. We can use Actions. Again, on the breakpoint, we select the gear and select Actions. Here we can write a text and then enter {} the name of the variable or object that we want to print in the output window. Productivity with Visual Studio View function values Many times, we execute a method that returns a value, but we ignore it or do not assign it to a variable. This makes it not accessible at run time or debugging. The debugging time can be seen, if necessary, from the auto window. We can open it, at debugging time, from Debug> Windows> Auto. Productivity with Visual Studio Verify unchanged objects from immediate window and observation Whenever we execute a method from the immediate window we change the value of some property or object. As we see in the image, each time we execute the method, the value in the observation window is updated, notifying us that the value has changed. To have no effect, we can use the prefix nse. Productivity with Visual Studio Decompile the IL code Many times we create libraries to reuse in our projects. We refer to our project to the assembly that has a dll extension. In this example, we have Math.dll, it is a project that I create to use in the example. Once we referenced it, it will work as a black box, where we can't see the implementation. Visual Studio gives us the possibility of being able to do it even though it is compiled. This functionality allows us to decompile the component and have the implementation code available. To access the value we must use what is called a pseudo-variable, in this case, $ReturnValue. As we see in the image, after executing the method, we immediately write $ReturnValue in the window and we will see the result. Productivity with Visual Studio Conclusions With all this set of functionalities and tools, we can make it easier to search for any problem that we have in our application. In the next post, we will see tricks for refactoring. I hope you find it useful and take advantage of it. Top comments (0)
ESSENTIALAI-STEM
Talk:Denkigai no Honya-san Header I am in a class project on Wikipedia. I have to evaluate a existing page related tot he class topic (manga/anime). Compared to other Wikipedia pages on other anime and manga, this page is missing a plot summary to give an overview of the series and little summaries for the episodes. I feel this would be helpful to the page and give readers a little bit more knowledge on this particular anime/manga.Invisible117 (talk) 17:51, 5 May 2016 (UTC)
WIKI
Talk:Louis Bacon/Archives/2015 Criticisms; "Noblesse oblige" As a general policy, I feel that all Wikipedia biographies should include a criticism section - even those for Jesus Christ Mother Theresa, Einstein and Bach. Hopefully this section could be very short in most cases, though it should never be perfunctory. In Bacon's case, at least 2 criticisms should be raised. First he has closed Orton Plantation Garden to general public visitation, abandoning a nearly-hundred year tradition. I feel that "noblesse oblige" applies here (almost literally, given Mr Bacon's direct descent from Rory Moore). I realize he has done sterling work for nature conservation, but there is more to life than the natural world, vital though that might be. Presumably Mr Bacon spends relatively little time at Orton. When he is not in residence the garden should be opened to the public at least one day per week; a relatively high fee could be charged, to cover the cost of the personnel required. Alternatively, a "Friends of Orton" association could be created to take on the task promoting regulated public access. Second, and similarly, Bacon has closed Robins Island (Long Island, NY) to all forms of public access. Again, some form of limited public access should be restored. Orton and Robins are important parts of the American cultural patrimony, which goes far beyond its natural glories. Visitors to these places would in general be educated, responsible, and respectful, and I suspect rather rare. Paulhummerman (talk) 11:53, 26 April 2015 (UTC)
WIKI
From 47575925596c2af2a78c009fcdd14de72fc82d3e Mon Sep 17 00:00:00 2001 From: "Andrew G. Morgan" Date: Sun, 19 Nov 2000 23:31:22 +0000 Subject: Relevant BUGIDs: task 15788, bugs 108297, 117476, 117474 Purpose of commit: merge in the autoconf stuff Commit summary: --------------- this is a merge of the 0-72 autoconf branch to something more up to date. This commit will be followed by merging this Linux-PAM-0-73pre-autoconf branch to the main trunk. --- libpam_misc/include/security/pam_misc.h | 56 +++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 libpam_misc/include/security/pam_misc.h (limited to 'libpam_misc/include/security') diff --git a/libpam_misc/include/security/pam_misc.h b/libpam_misc/include/security/pam_misc.h new file mode 100644 index 00000000..fbf7a9f1 --- /dev/null +++ b/libpam_misc/include/security/pam_misc.h @@ -0,0 +1,56 @@ +/* $Id$ */ + +#ifndef __PAMMISC_H +#define __PAMMISC_H + +#include + +/* include some useful macros */ + +#include + +/* functions defined in pam_misc.* libraries */ + +extern int misc_conv(int num_msg, const struct pam_message **msgm, + struct pam_response **response, void *appdata_ptr); + +#include + +extern time_t pam_misc_conv_warn_time; /* time that we should warn user */ +extern time_t pam_misc_conv_die_time; /* cut-off time for input */ +extern const char *pam_misc_conv_warn_line; /* warning notice */ +extern const char *pam_misc_conv_die_line; /* cut-off remark */ +extern int pam_misc_conv_died; /* 1 = cut-off time reached (0 not) */ +extern int (*pam_binary_handler_fn)(const void *send, void **receive); + +/* + * Environment helper functions + */ + +/* transcribe given environment (to pam) */ +extern int pam_misc_paste_env(pam_handle_t *pamh + , const char * const * user_env); + +/* char **pam_misc_copy_env(pam_handle_t *pamh); + + This is no longer defined as a prototype because the X/Open XSSO + spec makes it clear that PAM's pam_getenvlist() does exactly + what this was needed for. + + A wrapper is still provided in the pam_misc library - so that + legacy applications will still work. But _BE_WARNED_ it will + disappear by the release of libpam 1.0 . */ + +/* delete environment as obtained from (pam_getenvlist) */ +extern char **pam_misc_drop_env(char **env); + +/* provide something like the POSIX setenv function for the (Linux-)PAM + * environment. */ + +extern int pam_misc_setenv(pam_handle_t *pamh, const char *name + , const char *value, int readonly); + +#endif + + + -- cgit v1.2.1
ESSENTIALAI-STEM
How to selectively display widgets on specific posts or pages WordPress by default display the widget every where. So if you want to display or hide the  widgets based on rules then you will need to make use of plugins. In this tutorial I will cover 4 plugins which can be used to hide or display widgets in posts or pages control the widget visibility of specific post and pages. At the end o this post I will also share a code snippet for controlling the widget visibility based on conditional logic. 1. Using Widget Logic Plugin This is a very powerful plugin. It works by adding an extra logic field to every widget.  It lets you control the pages that the widget will appear on . Refer to this screenshot. So for example if you want the search widget to only appear on home page , then you will simply use the is_home() tag in the logic field. Similarly if you DONT want to display the search widget on home page, you will use !is_home() tag in the logic field. This can be configured in a lot of ways.  For example, you can display / hide widgets on certain categories , you can display widget on a certain posts etc. It is a very powerful plugin and since it uses conditional tags,  it can be a bit difficult for newbies and non technical users. 2. Using Widget Context Plugin Widget context is very similar to Widget logic. The main difference is the user interface.  The widget Context gives you a friendly user interface to control the widget visibility. Refer to this screenshot It is possible to display / hide widgets on specific posts, pages, categories , url etc.  It is a beginner friendly plugin as users dont require knowledge of conditional logic to operate the plugin.  So, if you are an absolute beginner , I recommend you use the Widget context plugin 3. Using Dynamic Widgets Plugin This is another popular plugin which allows you to define visibility through a user interface.  The plugins opens a separate page to configure the visibility rule. This can be a minor inconvenience. Refer to this screenshot Apart from that it is a good plugin and supports rules like specific categories, display on a url, specific posts, archive pages etc. 4. Using Jetpack Plugin If you are using Jetpack plugin, then you can utilize the inbuilt widget visibility feature to control the widget display. It gives you a user friendly interface to configure the widget visibility. Visibility can be controlled based on category, post , pages, users role, date etc. Refer to this screenshot There are other plugin like Restrict widgets and Widget Manager Light. But I am not covering them in this tutorial as they are not as popular as the above four plugins. Code Snippet In case you dont want to use plugin then you may use the following snippet to control the widget display. add_filter( 'widget_display_callback', 'spice_display_widget_logic',10,2); function spice_display_widget_logic( $instance, $widget) { if ( $widget->id == 'calendar-4') { // we are controlling the visibility of calendar-4 widget. if ( is_page('24')) { // calendar-4 widget will NOT display on page with id 24 return false; } } } This snippet ensures that the calendar-4 does not appear on a page having id 24.  Refer to this tutorial to understand how to get widget id. You can modify the snippet to control widget visibility based on post types,  user role, etc. Even though the above snippet works , I would not recommend using the snippet unless you are a developer. If you are non-technical user, simply use any of the above mentioned plugins. If you have any questions,ask in the comments.   Did you enjoy this article? Get Awesome with WordPress. Subscribe and get awesome stuff delivered straight to your inbox. I agree to have my personal information transfered to Mad Mimi ( more information ) 1 thought on “How to selectively display widgets on specific posts or pages Leave a Comment
ESSENTIALAI-STEM
Udea exigualis Udea exigualis is a moth in the family Crambidae. It was described by Alfred Ernest Wileman in 1911. It is found in Japan, China (Fujian, Guangxi, Guizhou, Hubei, Hunan, Sichuan, Tibet, Yunnan) and Pakistan. The wingspan is 16–21 mm.
WIKI
Ubuntu / Linux news and application reviews. Dropbox Ubuntu 11.04 Those of you that run Ubuntu 11.04 Natty Narwhal already probably know that the Dropbox application indicator doesn't work in Natty - not using the official Dropbox build. But you can get the Dropbox AppIndicator to work in Ubuntu 11.04 Natty Narwhal by using the latest script below: 1. Install Dropbox the regular way - using the .deb provided on its download page. 2. Run the commands below: cd wget http://webupd8.googlecode.com/files/fixdropbox chmod +x fixdropbox ./fixdropbox What the script does is remove the Dropbox daemon files and prompts you to download it again, then modifies the Dropbox startup script to start with a delay of 20 seconds and then modifies it so that Dropbox doesn't change it automatically (dropbox automatically overwrites this file on each start without this tweak). So when you log in, Dropbox will start with a 20 seconds delay! That's the only way to get the Dropbox AppIndicator to work in Ubuntu 11.04 with the latest Dropbox version. For now anyway. If it doesn't start after 20 seconds, you may want to add more seconds to the script so edit it: gedit ~/.dropbox.sh And modify the delay to a bigger value. Post updated April 29, 2011.
ESSENTIALAI-STEM
Talk:Post-critical Needs work Quoting Wikipedia editor: This article has multiple issues. Please help improve it or discuss these issues on the talk page. This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: style and adherence to the Manual of Style. (February 2014) This article may require copy editing for style and adherence to the Manual of Style. (February 2014) This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. (February 2014) This article needs additional citations for verification. (February 2014) Examples requested Thank you for the alerts concerning the deficiencies of the article as it now stands. I will seek additional citations, delete the "citation needed" remarks where appropriate, and re-read the Manual of Style to determine how to better comply with it. However, any specific style deficiencies you point out will help me focus on what needs correcting. JCvP 02:19, 11 February 2014 (UTC)
WIKI
Aa Tarmana Aa Tarmana was the mayor of Bandung from 1998 to 2003. He was the front-runner for a reelection, but overnight the second-level parliament elected Dada Rosada instead. Tarmana was a colonel in the Indonesian Army and he was known for his military-style leadership. His time as mayor also involved him supporting street vendors with tents, in contrast with his predecessor and successor who attempted to relocate them.
WIKI
Rehab.com Group Therapy Group Therapy Group therapy is any therapeutic work that happens in a group (not one-on-one). There are a number of different group therapy modalities, including support groups, experiential therapy, psycho-education, and more. Group therapy involves treatment as well as processing interaction between group members. What is group therapy? Group therapy typically involves a licensed therapist and 5-12 group members with a related problem or concern. Such concerns could be mental health disorders like depression or bipolar disorder, or struggling with drug addiction. Some groups are for those with a dual diagnosis (having both a mental disorder and a substance abuse issue at the same time). Groups usually meet for 1-2 hours per week, and group members may also attend individual therapy sessions in addition to the group session each week. Some group members participate only in group sessions. Therapists may recommend a client attend a group format for a number of reasons. First, receiving support from other group members experiencing similar issues can be a relief, since it shows someone they're not the only ones struggling. Second, seeing others who are further along the path of recovery can provide both relief and encouragement that recovery is possible. Third, hearing from different group members can inspire others to see that their problems may not always be as oppressive as they thought – others are in similar or worse situations. Finally, group situations give members the chance to support others and give back, which can lead to feelings of self-worth, self-esteem, and connection. Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) are examples of support groups to which therapists often refer clients, in addition to individual sessions. What does group therapy treat? • Drug and alcohol addiction and other forms of substance abuse • Anorexia and bulimia • Behavioral addictions such as sex addiction or gambling addiction • Depression and anxiety • Mental illnesses like depression, schizophrenia, bipolar disorder, and PTSD • Anger • Sexual and relationship problems • Grief, divorce, or loss or a loved one • Panic disorders • Shyness, loneliness, or low self-esteem How does group therapy work? Groups usually meet once a week for 1-2 hours and are led by one or more therapists, or facilitators (as in AA and NA). Groups can cover a wide range of topics. Although most target a specific problem, other groups may focus on improving general skills or assisting those in the midst of a loss due to death or life transition (like divorce). Some groups are purely support groups, such as AA and NA. Others are required group therapy sessions dictated by a certain therapy modality, such as Dialectical Behavior Therapy (DBT). Those participating in group therapy benefit both from the interventions of the therapist as well as from other group members. Members get the chance to observe and listen to other people as well as get and give feedback, such that the entire group can benefit from one strategy or example. What is a session like? For many, sharing information with a group about one's life can seem intimidating at first. However, it usually takes participants just a few weeks to get comfortable, especially as they watch and learn from other group members. Participants are allowed to share to their own comfort level and are never forced to share something they don't want to. Groups normally discuss a topic related to their group's specific concern. For example, in a drug addiction group they might begin by sharing triggers and coping skills that did or did not work over the past week. Group members take turns sharing and listening to each other as well as the therapist. An insight for one can often result in an insight for all, leading to an increased rate of healing and recovery. What are the advantages of group therapy? In group therapy, a therapist is able to treat multiple individuals at once, which lowers the cost. Group therapy can be as low as one-third the cost of individual therapy since both the attention and cost is divided among group members. Some groups may be offered free of cost to the larger community, particularly if run by a trained facilitator rather than a licensed therapist (this is the case for AA, NA, and other 12-step groups). Clients are also able to gain coping skills more quickly by seeing what works and doesn't work for other group members. For example, one members of an AA group might share that he realized that after speaking to his father on the phone one night that week, he had the strong desire to drink. Someone else in the group might then identify that the same thing happens when they talk to one of their family members. Thus the insight of one can benefit all, and result in more rapid progress. Communication skills are also also enhanced because group members are taught to and see modeling on how to communicate clearly and more effectively within the group setting. Group members also offer and receive feedback to one another, which can be a helpful process of sharing and connection. Members give and get valuable feedback from those who are often aware of both their struggles, strengths, weaknesses, and history. Group therapy can be hugely rewarding, and is often reported to be by those who engage in it. It offers participants a safe and supportive environment to interact and connect with others who have similar concerns, and can produce stronger and longer-lasting results than individual therapy alone. Rehab Articles Group Therapy during Rehab in the United States Ocean Breeze Recovery Substance, Drug And Alcohol Abuse 844-201-5159 | Private 2413 East Atlantic Boulevard Pompano Beach, FL 33062-5213 The Palm Beach Institute Substance, Drug And Alcohol Abuse 844-816-0050 | Private 310 10th St West Palm Beach, FL 33401 Pathway To Hope Mental Health, Substance, Drug And Alcohol Abuse 844-815-4546 | Private 600 SE 2nd Ct Fort Lauderdale, FL 33301 California Highlands Addiction Treatment Center Mental Health, Substance, Drug And Alcohol Abuse 844-816-4141 | Private 300 S Highland Springs Ave #6c Banning, CA 92220 Elevate Recovery Center Substance, Drug And Alcohol Abuse 844-816-3031 | Private 1827 N Case St Orange, CA 92865
ESSENTIALAI-STEM
Driving time-based identification of gaps in specialised care coverage: An example of neuroinflammatory diseases in Germany Digit Health. 2023 Jan 27:9:20552076231152989. doi: 10.1177/20552076231152989. eCollection 2023 Jan-Dec. Abstract Objective: Due to the growing complexity in monitoring and treatment of many disorders, disease-specific care and research networks offer patients certified healthcare. However, the networks' ability to provide health services close to patients' homes usually remains vague. Digital Health Technologies (DHTs) help to provide better care, especially if implemented in a targeted manner in regions undersupplied by specialised networks. Therefore, we used a car travel time-based isochrone approach to identify care gaps using the example of the neuroinflammation-focused German healthcare and research networks for multiple sclerosis (MS), myasthenia gravis (MG), myositis and immune-mediated neuropathy. Methods: Excellence centres were mapped, and isochrones for 30, 60, 90 and 120 minutes were calculated. The resulting geometric figures were aggregated and used to mask the global human settlement population grid 2019 to estimate German inhabitants that can reach centres within the given periods. Results: While 96.48% of Germans can drive to an MS-focused centre within one hour, coverage is lower for the rare disease networks for MG (48.3%), myositis (43.1%) and immune-mediated neuropathy (56.7%). Within 120 minutes, more than 80% of Germans can reach a centre of any network. Besides the generally worse covered rural regions such as North-Eastern Germany, the rare disease networks also show network-specific regional underrepresentation. Conclusion: An isochrone-based approach helps identify regions where specialised care is hard to reach, which might be especially troublesome in the case of an often disabled patient collective. Patient care could be improved by focusing deployments of disease-specific DHTs on these areas. Keywords: Digital health; care access; connected care; geography; multiple sclerosis; myasthenia gravis; myositis; neurology; remote patient monitoring; specialised care networks.
ESSENTIALAI-STEM
Skip to main content String-gauge correspondence as a tool for Nature Final Report Summary - STONE (String-gauge correspondence as a tool for Nature) Work performed During the period of the project, I worked on the following directions, which are sub-projects of the main project. Integrability of gauge and string theories and holographic three-point functions of semiclassical states Integrability has been the driving force behind the recent progress in studying the spectral problem in the context of the AdS/CFT correspondence, which concerns the important question of obtaining the exact spectrum of anomalous dimensions of gauge-invariant operators of the theory under examination. The best studied example involves the correspondence between N=4 Super Yang Mills (SYM) theory in four dimensions and type IIB superstring theory on AdS5XS5. Recently a novel explicit example of a gauge/string duality of the type AdS4/CFT3 has emerged and a great deal of work has been done in also examining the question of integrability in this case. The study of the spectral problem allowed us to compute the two-point correlation functions of gauge invariant operators from their anomalous dimension. To completely solve the theory, however, one should also know the set of all three-point correlation functions. Much progress in this direction has been done recently, starting with the work of Zarembo, which proposes a prescription for the computation of the holographic three-point functions in N=4 SYM theory in the case when two of the operators correspond to semi-classical states and one to a supergravity state. A very interesting question that I investigated is how to compare the strong and weak coupling results for the three-point correlation functions using the AdS/CFT correspondence for two semi-classical operators and one light chiral primary operator. This study has been recently performed between the tree-level three-point function with the two semi-classical operators described by coherent states, while on the string side the three-point function is found in the Frolov-Tseytlin limit. In this context, I computed the one-loop correction to the three-point function on the gauge theory side and compared this to the corresponding correction on the string theory side, finding that the corrections do not match. In other publications, I found a new Penrose limit of AdS5×S5 giving the maximally supersymmetric pp-wave background with two explicit space-like isometries. This is an important missing piece of information in studying the AdS/CFT correspondence in certain subsectors. Our analysis completes the study of all possible pp-wave backgrounds that can be obtained as Penrose limits of the AdS5×S5 geometry. It also represents a further step in the investigation of matching the strongly coupled gauge theory and string theory in certain sectors, which are relevant for describing non-perturbative physics of type IIB string theory on AdS5×S5. In particular, where the Penrose limit giving one space-like isometry is useful for analysing the SU(2) sector of N=4 SYM, this new Penrose limit is instead useful for studying the SU(2|3) and SU(1, 2|3) sectors. The new Penrose limit of AdS5×S5 that we found is also relevant for studying the finite temperature behaviour of AdS/CFT. It is conjectured that the confinement/deconfinement transition temperature of planar N=4 SYM on RxS3 is dual to the Hagedorn temperature of type IIB string theory on AdS5×S5. Using the Penrose limit, this was shown quantitatively to be true (see work by Orselli and Harmark) by matching the confinement/deconfinement temperature of planar N=4 SYM on RxS3 in a limit with R-charge chemical potentials to the Hagedorn temperature of type IIB string on the pp-wave background. We furthermore expect that these results could help in understanding more generally the behaviour of string theory above the Hagedorn temperature and to study the connection between gauge theory and black holes in AdS5×S5, since the decoupling limit to the SU(1; 2,3) subsector is relevant for studying (nearly) supersymmetric black holes in AdS5×S5. This is part of a work in progress. In addition to the new Penrose limit of AdS5×S5, we also find a new Penrose limit of AdS4 × CP3 in the context of the newly proposed example of AdS/CFT correspondence relating type IIA string theory on AdS4 × CP3 and N=6 Superconformal field theory (ABJM theory). Here two different classes of Penrose limits have been found: one in which there are no explicit space-like isometries and another in which there are two explicit space-like isometries that makes it suitable for studying the SU(2) X SU(2) sector of ABJM theory. We found a new Penrose limit of AdS4 × CP3 background that gives a pp-wave background with one explicit space-like isometry. In the context of the type IIA/ABJM correspondence recently proposed, we found the full interacting Lagrangian and Hamiltonian for quantum strings in a near plane wave limit of AdS4 × CP3. The leading curvature corrections give rise to cubic and quartic terms in the Lagrangian and Hamiltonian that we have computed in full. The Lagrangian is found as the type IIA Green-Schwarz superstring in the light-cone gauge employing a superspace construction with 32 grassmann-odd coordinates. The light-cone gauge for the fermions is nontrivial since it should commute with the supersymmetry condition. We provide a prescription to properly fix the kappa-symmetry gauge condition to make it consistent with a light-cone gauge. Using an effective vertex method we explicitly derived the two-loop dilatation generator of ABJM theory in its SU(2)×SU(2) sector, including all non-planar corrections. Subsequently, we applied this generator to a series of finite length operators as well as to two different types of BMN operators. As in N=4 SYM, the finite length operators at the planar level are found to exhibit a degeneracy between certain pairs of operators with opposite parity - a degeneracy which can be attributed to the existence of an extra conserved charge and thus to the integrability of the planar theory. When non-planar corrections are taken into account, the degeneracies between parity pairs disappear, hinting at the absence of higher conserved charges. The analysis of the BMN operators resembles that of N=4 SYM. Additional non-planar terms appear for BMN operators of finite length but once the strict BMN limit is taken these terms disappear. D-branes in thermal backgrounds Another project that I worked on and that has started a new line of research involves a very recent proposal, formulated by me in collaboration with scientists from Denmark, Sweden and Italy, for a novel approach to black hole physics at finite temperature. This might lead to important and revolutionary results in the investigation and understanding of the quark-gluon plasma physics and related topics. The main feature of the new method we propose is that it describes a brane probe consisting of a large number of coincident non-extremal D-branes, so that the probe is in thermal equilibrium with the background. We employed this new method to study the BIon solution of Callan and Maldacena in the background of hot flat space. Doing this, we found that the finite temperature BIon behaves qualitatively different to its zero-temperature counterpart. A key observation is that the requirement of thermal equilibrium between the probe and the background changes the probe, not only globally but also locally, in that it changes the energy-momentum tensor in the equations of motion of the probe. This is due to the fact that the degrees of freedom living on the brane get heated up. While this is taken into account in our new method it is, however, not taken into account in the previously used approach for describing D-brane probes in thermal background, which employed the classical Dirac-Born-Infeld (DBI) action. Thus, the previously used approach does not provide an accurate description of D-brane probes in thermal backgrounds. Our method could thus potentially open up new insights and developments in the study of D-branes as probes of thermal backgrounds, particularly with applications to the AdS/CFT correspondence. In the case of D3-branes, the extremal BIon solution either takes the form of an infinite spike with an F-string charge coming out of the D3-brane, describing a number of coincident F-strings ending on the D3-brane, or the form of a D3-brane and a parallel anti-D3-brane connected by a 'wormhole' with F-string charge, which we dubbed the brane-antibrane-wormhole configuration. The finite temperature BIon solution that we found is a generalisation of the brane-antibrane-wormhole configuration, which is found employing a non-extremal D3-F1 probe brane system curved in hot flat space. Note that, while the extremal BIon solution of the DBI action is found for a system with one D3-brane (and anti-D3-brane) in the regime of weak string coupling, the finite temperature BIon solution is instead found in a regime with N D3-branes (and anti-D3-branes) with N >>1 and at strong coupling. By examining the structure of the phases of the brane-antibrane-wormhole configuration at finite temperature, we found that there are up to three available phases for a given temperature and separation between the D3-branes and anti-D3-branes, in contrast with the two available phases for the extremal BIon. We also investigated the possibility of constructing a finite temperature generalisation of the infinite spike configuration of the extremal BIon.
ESSENTIALAI-STEM
Talk:Bar (music) Confusing "In musical notation, a bar line or measure is a segment of time defined as a given number of beats of a given duration." This is the first line, and I don't understand it fully. Is the same meaning derived by typing: (?) "In musical notation, a bar or measure is a segment of time defined as a given number of beats in the segment of time." If it means the same thing I prefer the latter, because it's more clear to me.Logictheo 07:00, 2 October 2006 (UTC) * Please sign your posts on talk pages per Sign your posts on talk pages. Thanks! Hyacinth 07:26, 2 October 2006 (UTC) "Hypermeasures must be larger than a notated bar, perceived as a unit, consist of a pattern of strong and weak beats, and along with adjacent hypermeasures, which must be of the same length, create a sense of hypermeter." Wow! What does that mean? Could someone clarify this? I'm not one of those jerks who brags about having two doctorate degrees... but I do and one of them is in music and I really, really don't know what this sentence is supposed to mean. Gingermint (talk) 06:59, 28 February 2011 (UTC) word "preceded" has 2 meanings? Since it seems it means both 1. Go before than, and 2. Has higher rank (with other words, has something extra), I'm replacing the word with the meaning behind each word. Comments welcome. Logictheo 09:06, 13 October 2006 (UTC) * Awesome, noticed that too. 2001:8003:617A:7701:FD8B:95AC:276A:EFDC (talk) 09:50, 21 March 2023 (UTC) Repeat barline is not a barline There is an article about this symbol, the title of which is [Repeat sign]. There, the expression "repeat barline" is not even mentioned. I suspect that this is not just an imperfection of that article. Indeed, theoretically the repeat sign should not be called a barline, because it consists of two barlines and two dots. See also modern musical symbols. So, I suggest to delete the reference to "repeate barline" in this article, unless you have an authoritative reference proving that this improper terminology is accepted and used (as it often happens even in sciences). If you have such a reference, then I suggest to indicate this alternative terminology in the articles repeat sign and modern musical symbols as well, for the sake of consistency. Paolo.dL (talk) 19:08, 6 January 2010 (UTC) * If you can find a Wikipedia policy or guideline which suggests the removal of the term "repeat barline" for reason please do so. If you can find a source which denounces it as incorrect terminology please do so. Hyacinth (talk) 03:45, 11 February 2010 (UTC) Bar and measure This is funny: "Measure (music)" redirects to "Bar (music)", but the latter article is mainly saying that "bar" is poor usage, "measure" is good usage. According to my New Grove (1980), English "bar" and American "measure" are equivalents, as are English "bar-line" and American "bar". Not to speak of the "twelve-bar blues". --<IP_ADDRESS> (talk) 22:49, 18 February 2010 (UTC) * I agree, somewhat arbitrarily... I wonder what the reason is for our English bias? Seniority? =) So, I suppose we should transform this page a bit and rename it to Measure (music). Other input/opinions? --DJ Phazer talk 09:31, 26 March 2010 (UTC) * What? Why? No, ‘Bar (music)’ is a good name. As I said above, it is wrong to call ‘bar’ bad usage, ‘measure’ good usage; ‘bar’ is correct British English. We should remove the following sentence: ‘Although the words bar and measure are often used interchangeably the correct use of the word “bar” refers only to the vertical line itself, while the word “measure” refers to the music contained between bars.’ --<IP_ADDRESS> (talk) 15:44, 28 April 2010 (UTC) * Changed. --<IP_ADDRESS> (talk) 16:59, 28 April 2010 (UTC) * Bar is the same as measure - measure can be used more professionally in some situations but bars is just as fine. This is a weird edit in the publishing. 2001:8003:617A:7701:FD8B:95AC:276A:EFDC (talk) 09:51, 21 March 2023 (UTC) We should still cite sources. Hyacinth (talk) 21:59, 28 April 2010 (UTC) I think that the distinction between bar and measure as British and American usages, respectively, is overemphasized in this article. I don't know about the UK, but in the U.S. the terms are used practically interchangeably. When the Andrews Sisters sang "Beat Me Daddy, Eight to the Bar" they certainly weren't referring to the bar lines but rather to measures. That was many decades ago; the usage has become ever more common since then. Steve Bob (talk) 14:09, 5 May 2010 (UTC) Just to let you know, and obviously this is subjective, but in England I've only heard bar, I only came across measure a few years ago when I bought an American music book.--<IP_ADDRESS> (talk) 18:58, 17 October 2010 (UTC) Bar numbering Seems like a lot of the first section is concerned with bar numbering rather than bars per se. (Also it's pretty prescriptive.) Maybe the discussion of numbering could be moved lower down, and the first section could talk more about how bars typically divide the sound into regular patterns of stressed beats. &mdash;Wahoofive (talk) 06:34, 21 February 2010 (UTC) Requested move: "Musical scale" → "Scale (music)" I have initiated a formal RM action to move Musical scale to Scale (music). Contributions and comments would be very welcome; decisions of this kind could affect the choice of title for many music theory articles. N oetica Tea? 00:10, 21 June 2012 (UTC) * This will help with consistency and understanding 2001:8003:617A:7701:FD8B:95AC:276A:EFDC (talk) 09:52, 21 March 2023 (UTC) Notational convention Is a bar an aspect of audible music, or only a convention of notation? The current lede defines a bar as a segment of time defined by a given number of beats, but I would suggest that only notated music contains bars, which are demarcated by barlines. This in turn implies something about the meter of the music, but the word bar itself is only meaningful in notation, much like note values themselves. Agree? &mdash;Wahoofive (talk) 06:04, 31 December 2012 (UTC) * The bar is a 2D-diagram of music, where the x coordinate is time and the y coordinate is sound frequency. You can fold the bar into a circle and use polygons to represent monophonic sounds like percussion . In the latter example, the ability to represent musical notes has been traded for the ability to represent polygons in a circle (instead of a series of bars on a line). The barrel organ, phonograph cylinder and compact disc are examples of 3D notational systems. Machine readability increases with every dimension, but human readability decreases. --<IP_ADDRESS> (talk) 10:51, 15 February 2021 (UTC) Piano music in the 15th and 16th ???!!!??? We read at the section "History": The earliest barlines, used in piano and vihuela music in the 15th and 16th centuries... — Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:12, 7 February 2013 (UTC) * Replaced with "keyboard" &mdash;Wahoofive (talk) 19:46, 7 February 2013 (UTC) * nope 2001:8003:617A:7701:FD8B:95AC:276A:EFDC (talk) 09:51, 21 March 2023 (UTC) A Manual of Modern Practice? Is it wise to be using a source for distinctions of usage in modern English that was written almost 40 years ago (1979)? I don't have access to any more recent books with a similar purpose but I feel that, especially given that it was cited in regards to a distinction that could easily be outdated (whether the term bar and measure can be used interchangeably in American English) it might be wise to get a source from this millennium to weigh in on the issue.Snowblinded (talk) 00:45, 18 November 2017 (UTC) barline spelling In the article there are two spellings in use: barlines and bar lines. I don't care if it should be the British or the American spelling, but it should be spelled uniformly. --Rettinghaus (talk) 12:56, 6 October 2020 (UTC) First illustration is misleading The first image gives the impression that barlines are called "bars". It doesn't show that a bar contains notes and is about duration and rhythm. Instead, there should be a time signature and for example three bars of music, each bar in a different color, and the figure caption can explain that ("the first two notes are in the first bar (shown in blue), ..."). — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:09, 26 April 2022 (UTC) Intro The introduction is unclear to me in terms of everything but visuals. "The bar line (or barline) is a vertical line written in the music which separates the bars."along with the illustration is clear enough, but how does one hear a bar? Kdammers (talk) 02:35, 10 December 2022 (UTC) * You can't hear a bar; it's strictly a notational device. &mdash;Wahoofive (talk) 01:14, 15 December 2022 (UTC) New lede I'd like to rewrite the lede, both to remove specialized topics (which might go lower down) and to steer away from the term "beats," since the relation between time signature and beat is not consistent (e.g. compound meter), while accommodating nonstandard usages, such as irregular unmetered bars, which occur both in early music and modern usage. Here's a proposed first sentence: * In musical notation, a bar (or measure) is a short passage of notated music bounded by vertical lines, known as bar lines (or barlines), usually indicating one or more recurring beats. The length of the bar, measured by the number of note values it contains, is normally indicated by the time signature. This would replace most of the first two paragraphs. Obviously I'd add suitable links to related topics. Comments welcome. &mdash;Wahoofive (talk) 23:06, 21 March 2023 (UTC) * Basically I agree. The current first paragraph includes such gems as "each bar of staff symbols can be read and played as a batch", which is simply beyond meaningless. A couple of comments: in your phrasing, I do not think "passage" is the right word, since this normally refers to a (longer) mucisally coherent stretch of music. I think a more neutral word, like "section" would be better. * Secondly, I strongly disagree with the claim above that we should pretend that English and American are more or less the same. A properly written article in AmE could reasonably say, with proper sources, that it is incorrect to call a measure a "bar", while a properly written article in BrE could reasonably ignore the word "measure" entirely, as it is essentially never used. The current article has some rather silly claim about "international usage", whatever that is supposed to mean. A very simple table of the equivalences (including 'bar' and 'barline') would help. Imaginatorium (talk) 06:56, 23 March 2023 (UTC) Thank you for your comments. I hope you can clarify for me what the situation is with British vs. American usage. This isn't really like "elevator" and "lift". As an American, I'd usually say "measure" but I hear plenty of people say "bar", and it wouldn't occur to me or any American to think that's "incorrect." Same with "barline." What is the usage in UK (or other Anglophone countries)? Since the article is titled "Bar," it seems like the British usage should predominate, but I don't think the difference is as clean-cut as "lorry" and "truck." More like "taxi" and "cab." I'm happy to be educated, though. I don't think changing "passage" to "section" really solves the problem. "Fragment"? "Segment"? "Period"? &mdash;Wahoofive (talk) 16:40, 23 March 2023 (UTC) By the way, none of Lorry, Elevator, or Taxi dwell on the regional usages; they just give the synonyms and go on. &mdash;Wahoofive (talk) 16:43, 23 March 2023 (UTC) Bar x line The question is the value of x: space, hyphen, or null. I think the last ("barline") is preferable. Reference books to hand suggest: older British texts (first pub. 1940s and 1950s) use "bar-line"; Gardner Read (US) uses "barline", even in the middle of a misguided rant about how non-American terminology is wrong or unprofessional. The Dolmetch reference I just removed also uses "barline", as do most of the comments above. I think it is OK to list all three alternative spellings, but suggest using "barline" through the article. Imaginatorium (talk) 12:07, 10 December 2023 (UTC)
WIKI
Race and injustice was preasant in World War 1 for African Americans. Before the war, Blacks were very ambitious about joining hoping that they could earn more rights and respect. Over one million showed up for the draft. Only to find out that during the war most Acfrican American soldiers were not in the trenches but rather digging them. And they were even more disappointed that when the war was over things almost got worse, with the introducement of the Jim Crow laws treating their race like they are less than human. The Blacks in the Civil War For the beginning, in the middle and in the ending of the Civil War in the United States, the Black Americans were central as soldier and civilian. At first, people tried hard to get around this fact. Even President Abraham Lincoln administration sent Black volunteers home with an understanding that the war was a ''White man's war". The policy was eventually changed not because of humanitarianism but because of the Confederation's battlefield brilliance. The South brought the North to a realization that it was in a real brawl that it needed all the weapons it could lay hands on. With the war just beginning, ex-slaves and other African Americans wanted to get in on the action. They wanted to fight against those who had enslaved them and their families for generations. They began volunteering and trying to enlist, but everywhere they went they were rejected. "In general, white soldiers and officers believed that black men lacked the courage to fight and fight well'; (History of African-Americans in the Civil War). Even some abolitionists believed putting them in the battlefield would be putting African Americans higher than they should be. They were inferior. Many thought that if Blacks could fight in the war it would make them equal to whites and prove the theory of slavery was wrong. Even though Black soldiers had to face much discrimination during the Civil War, they were willing to fight to the death for their freedom. In the movie “Glory“ the director focused on the African Americans in the north that fought in the 54th regiment led by Colonel Robert Gould Shaw. During the time of the Civil War, the African Americans that fought in the 54th regiment were often treated unfairly but there were always nice people that backed them up. Fighting for freedom wasn’t just the white men that were allowed to be in the war and had their rights but there were African Americans part in this war to. When the war started there were African Americans participating the beginning but more started to join later on. The blacks that were part of the war were not enslaved but they faced many dilemmas because the white soldiers would ignore and deny them. As the war was going on, some places started to need soldiers so the Americans and the British say that anyone could join the war and if you are a slave you will be promised freedom after the war is over because of this many African Americans began to fight in the Revolutionary War. Free blacks and runaway slaves signed up for the navy as a privateer because they were offered almost equal pay. Although there were many casualties and the battle was not successful, the 54th Massachusetts’ bravery led the Union to accept thousands of African American men into their ranks which helped the Union win the war. In many parts of the film, Some whites stated that they would run at the first sign of danger! The blacks were not allowed to fight until needed. They were offered the same rights as the white soldiers, but discrimination always interfered.Most black soldiers did not receive equal pay and benefits. Even whites who supported the idea of blacks in army were harassed. The Confederacy objected strongly to the North's use of black soldiers because they grew fearful of losing slaves to the Union armies. The black codes suggested that the blacks were still the inferior race, and they also show the reluctance the south had to change their lifestyle after the Civil War. The black codes returned political, social, and economic power to the white southerners. Black codes also affect us today. If black codes were never enforced during reconstruction, black people would have been able to be a part of the government much sooner than they did. They would have been able to vote, marry interracially, work where they wanted, and get an education. Whites felt that the Civil War was a war started upon the White Man's issues and what possible reason would the Black Man have for wanting to fight in this war. On the contrary The Black Man saw The Civil War as an opportunity to win freedom and gain respect(2). Blacks in the North who were free from slavery willingly pledged their service to fight in the Union Army however, their allegiance was denied by President Lincoln on political grounds. Lincoln realized that the issue of Black soldiers would be intolerable by the public and would not be accepted. Initially, the Union Army utilized Northern Blacks from the free states to relieve Whites from daily tasks that were essential to maintain the armies, thus freeing up White soldiers for battle. African Americans joined and fought willingly (Doc B) and bravely now that they had a cause to fight for—the removing of slavery. More than thirty-eight thousand died in war for the Union, suffering in the Fort Pillow Massacre and serving in units such as the Fifty-Fourth Massachusetts regiments and other black military units. Due to prejudice and ideas, the Confederacy did not enlist slaves into the army until the war was nearly over; confederate slaves worked on farms while white men joined the army. The novel idea of African Americans engaged in the war, marching and fighting for the Union, changed many whites’ view and treatment of blacks. ... ... middle of paper ... ...rstand God’s words (Doc E).
FINEWEB-EDU
Ask Your Question 2 Matrix/Tensor derivative for Stress Tensor asked 2011-05-18 10:20:46 -0600 packoman gravatar image updated 2011-05-18 20:47:46 -0600 I need to do define/calculate the following stress tensor in an elegant way: $T_{i,j} := -p \delta_{i,j} + \eta (\partial_i v_j + \partial_j v_i)$ where i,j can be x,y,z and $\partial_i v_j := \frac{\partial v_j}{\partial i}$ I've found the sage-function kronecker_delta for the first term, but I am having problems with the two partial derivatives. Thanks in advance! edit retag flag offensive close merge delete Comments Can you post what have you tried, or what are exactly your problems? The `diff` function can compute partial derivatives: just pass the variable with respect to you are differentiating. Does this help you in any way? Juanlu001 gravatar imageJuanlu001 ( 2011-05-20 23:19:13 -0600 )edit 1 answer Sort by » oldest newest most voted 0 answered 2015-05-23 17:37:51 -0600 roberto gravatar image Have you tried SageManifolds? sagemanifolds.obspm.fr I do tensor calculus with it and I think it's good. Then as Juanlu001 already told you try to use diff and post your code. edit flag offensive delete link more Your Answer Please start posting anonymously - your entry will be published after you log in or create a new account. Add Answer Question Tools Stats Asked: 2011-05-18 10:20:46 -0600 Seen: 685 times Last updated: May 23 '15
ESSENTIALAI-STEM
Page:Leo Tolstoi - Life Is Worth Living and Other Stories - tr. Adolphus Norraikow (1892).djvu/85 78
WIKI
Marconi-Osram Valve M-OV (Marconi-Osram Valve Company) was a British manufacturer of thermionic valves (vacuum tubes). It was a subsidiary of the (British) General Electric Company Ltd. It was named after the Marconi Company and Osram, which were two major manufacturers of the tube. History The company was founded in 1919, when the valve making interests of GEC (Osram) and the Marconi Company were combined. In 1929, Marconi sold its interest in the company to the Gramophone Company, a predecessor of EMI. In 1939, M-OV acquired two disused cotton mills at Shaw, Oldham where it established a shadow factory to produce valves and cathode ray tubes. The two mills named Cape and Duke, were bought from the Lancashire Cotton Corporation for £7,000. Cape mill was used as the main production facility at Shaw, with the adjacent Duke mill remaining mostly unused. Shaw produced a vast array of valves for the war effort, some of which are listed below. * VT104 and VT105 for the T1154 transmitter. * VR99, VR100, VR101 and VR103 for the R1155 receiver. * TT11 for the TR1143 fighter set. * VT90 micropup used in airborne radar. EMI sold its share of M-OV to GEC in 1956. The company continued to manufacture valves at the Brook Green Works, Hammersmith, London, until 1988. M-OV branded new old stock valves, continue to be highly prized by enthusiasts of the valve sound. Notable products of the company included cathode ray tubes for television, starting in the 1930s. The company also introduced the KT66 "kinkless tetrode" (beam power tetrode). In 1922 the company brought out valves using thoriated tungsten filaments, which needed less battery power to operate than former types. During World War II the company developed the CV122 valve used in the proximity fuse.
WIKI
File:Kaitai01.jpg Summary Johan Kulmus. Kaitai shinsho (Edo, 1774). From the website of the National Library of Medicine: https://www.nlm.nih.gov/exhibition/historicalanatomies/kulmus_home.html.
WIKI
List of Insane Coaster Wars episodes Insane Coaster Wars is an American television series broadcast by Travel Channel that premiered on July 8, 2012, and has three completed seasons. Each episode is based on a certain roller coaster category and features four coaster's per category. Before the series began, Travel Channel announced the four roller coasters in each category and allowed voters to decide which one is the best. At the end of each episode, the ride with the most votes would be the winner. Also, in the seventh episode, the top ten roller coasters from past episodes were grouped together and one was named the best.
WIKI
drift (redirected from drifter) Also found in: Dictionary, Thesaurus, Legal, Encyclopedia, Wikipedia. drift  [drift] 1. slow movement away from the normal or original position. 2. a chance variation, as in gene frequency from one generation to another; the smaller the population, the greater are the random variations. antigenic drift relatively minor changes in the antigenic structure of a virus strain, probably resulting from natural selection of variants circulating among an immune or partially immune population. See also antigenic shift. ulnar drift ulnar deviation. drift (drift), 1. A gradual movement, as from an original position. 2. A gradual change in the value of a random variable over time as a result of various factors, some random and some systematic effects of trend, manipulation, etc. drift (drift) 1. slow movement away from the normal or original position. 2. a chance variation, as in gene frequency between populations; the smaller the population, the greater are the chance random variations. radial drift  see under deviation. ulnar drift  see under deviation. drift Etymology: AS, drifan, to move forward a gradual movement away from the original position. See also antigenic drift, genetic drift. drift Orthopedics See Pronator drift Virology Antigenic drift, see there. drift (drift) 1. A gradual movement, as from an original position. 2. A gradual change in the value of a random variable over time as a result of various factors, some random and some systematic effects of trend or manipulation. drift see RANDOM GENETIC DRIFT. drift (drift) In dentistry, movement of teeth usually medially due to loss of adjacent teeth or wear of proximal surfaces. Synonym(s): mesial drift, migrating teeth. drift, drift chance variation; in genetics, the random changes in gene frequencies in a population. antigenic drift see antigenic drift. drift lambing a strategy in which ewes which have lambed are periodically removed from a flock of lambing ewes by moving the unlambed ewes on to the next paddock or field. References in periodicals archive ? In principle, any instance when a drifter crossed the major fairway as defined above could potentially represent a separate accident or any other release of oil. Records, The Drifter starts in Bali, where Machado is looking for life's deeper meaning. The basic parameters (the maximum and minimum drift time after the drifter crossed both fairway branches, and the final location of each drifter) of these 26 drifters are illustrated in Fig. SAD REALITY: Weak law enforcement helps drifters to run loose, leading to tragedies. But it seems that the researcher didn't learn much from this particular drifter, as it had been at sea since the mid 1960's. Rally champion and all round motorsports hero Abdo Feghaly who directed the race pointed out that Red Bull Car Park Drift has once again represented a unique platform for Arab drifters to meet and compete on a professional level while promoting safe driving. Drifter is set in the near future and tells the story of a non-believer's struggle to survive a religious civil war on the battle-scarred moors of the North of England. The point of difference for Drifter Pale Ale is the hops. 5 at the off and he ran the sort of race you would expect from a significant pre-race drifter. LANCASTER - Bobby Maxwell, a singer with Chico Vega's Drifters, is an enigma. In High Plains Drifter, his character manipulates the inhabitants of Lago into painting their town red, as a metaphor for a living hell. On a recent holiday in Thailand she reportedly met up with an Australian drifter on the beach.
ESSENTIALAI-STEM
C++ Platforms Using XML to describe the platforms is very convenient. It provides a human-readable, quick way to start your experiments. Although, XML format brings several drawbacks as your platforms get larger and more complex (see Beyond the XML: the power of C++ platforms). In this case, it may be more interesting to write your platform directly in C++ code. It allows you to programmatically describe your platform and remove the intermediate XML parser during simulations. Take care to follow the recommendations in Modeling Hints to keep a clear separation of concerns between your platform and your application. Describing Resources A platform in SimGrid is composed of several resources organized in different Netzones. The different resources, such as hosts, disks and links, follow the same idiom: create()->set()->set()->seal(). NetZone* zone = s4u::create_star_zone("zone0"); Link* l_up = zone->create_link("link_up", "125MBps")->set_latency("24us")->seal(); Host* host = zone->create_host("host0", "1Gf")->seal(); zone->seal(); The first NetZone created will be the root zone of your platform. You’re allowed to modified an object as long as you did not seal it. For more details about how to describe the platforms, please give a look at examples or directly at the S4U API. Loading the platform The C++ interface to build the platforms give you freedom to organize your code as you wish, separating (or unifying) your application from your platform code. However, we provide a small hack if you want to keep the same structure of the old code with XML platforms. You can pass a library (.so) file to Engine::load_platform function, having a predefined function implemented. When loading the platform, the Engine will look for a function with this signature: “void load_platform(const sg4::Engine& e)”, and execute it. It could be an easy way to make the transition between XML and C++ if necessary. For more details, please refer to the cpp and CMakeLists.txt files in examples/platform. Example The best way to build your C++ platform is starting from some examples. Give a look in the examples folder in examples/. For instance, the file examples/cpp/clusters-multicpu/s4u-clusters-multicpu.cpp shows how to build complex platforms composed of clusters of clusters. Here, we present a complete example showing how to create 3 regulars clusters connected through a shared link. /* Copyright (c) 2006-2023. The SimGrid Team. All rights reserved. */ /* This program is free software; you can redistribute it and/or modify it * under the terms of the license (GNU LGPL) which comes with this package. */ #include <numeric> #include <simgrid/s4u.hpp> namespace sg4 = simgrid::s4u; /** * @brief Create a new cabinet * * This function creates the cabinet, adding the hosts and links properly. * See figure below for more details of each cabinet * * @param root Root netzone * @param name Cabinet name * @param radicals IDs of nodes inside the cabinet * @return netzone the created netzone */ static sg4::NetZone* create_cabinet(const sg4::NetZone* root, const std::string& name, const std::vector<int>& radicals) { auto* cluster = sg4::create_star_zone(name)->set_parent(root); std::string prefix = "griffon-"; std::string suffix = ".nancy.grid5000.fr"; /* create the backbone link */ const sg4::Link* l_bb = cluster->create_link("backbone-" + name, "1.25GBps"); sg4::LinkInRoute backbone(l_bb); /* create all hosts and connect them to outside world */ for (const auto& id : radicals) { std::string hostname = prefix + std::to_string(id) + suffix; /* create host */ const sg4::Host* host = cluster->create_host(hostname, "286.087kf"); /* create UP/DOWN link */ const sg4::Link* link = cluster->create_split_duplex_link(hostname, "125MBps")->set_latency("24us"); /* add link and backbone for communications from the host */ cluster->add_route(host, nullptr, {{link, sg4::LinkInRoute::Direction::UP}, backbone}, true); } /* create gateway */ cluster->set_gateway(cluster->create_router(prefix + name + "-router" + suffix)); cluster->seal(); return cluster; } /** @brief Programmatic version of griffon.xml */ extern "C" void load_platform(const sg4::Engine& e); void load_platform(const sg4::Engine& /*e*/) { /** * C++ version of griffon.xml * Old Grid5000 cluster (not available anymore): 3 cabinets containing homogeneous nodes connected through a backbone * 1.25GBps shared link * ___________________________________ * 1 / | \ * / | \ * / | \ * ________________ / ______|__________ \_________________ * | | | | | | * | cab1 router | | cab2 router | | cab3 router | * |_______________| |_______________| |_______________| * ++++++++++++++++ ++++++++++++++++ ++++++++++++++++++ <-- 1.25 backbone * / / | | \ \ / / | | \ \ / / | | \ \ * / / | | \ \ / / | | \ \ / / | | \ \ <-- 125Mbps links * / / | | \ \ / / | | \ \ / / | | \ \ * host1 ... hostN host1 ... hostM host1 ... hostQ */ auto* root = sg4::create_star_zone("AS_griffon"); sg4::NetZone* cab_zone; /* create top link */ const sg4::Link* l_bb = root->create_link("backbone", "1.25GBps")->set_latency("24us")->seal(); sg4::LinkInRoute backbone{l_bb}; /* create cabinet1 */ std::vector<int> rad(32); std::iota(rad.begin(), rad.end(), 1); // 1-29,58,59,60 rad[rad.size() - 1] = 60; rad[rad.size() - 2] = 59; rad[rad.size() - 3] = 58; cab_zone = create_cabinet(root, "cabinet1", rad); root->add_route(cab_zone, nullptr, {backbone}); /* create cabinet2 */ rad.resize(28); std::iota(rad.begin(), rad.end(), 30); // 30-57 cab_zone = create_cabinet(root, "cabinet2", rad); root->add_route(cab_zone, nullptr, {backbone}); /* create cabinet3 */ rad.resize(32); std::iota(rad.begin(), rad.end(), 61); // 61-92 cab_zone = create_cabinet(root, "cabinet3", rad); root->add_route(cab_zone, nullptr, {backbone}); root->seal(); } Beyond the XML: the power of C++ platforms This section describes one of the advantages of using C++ code to write your platforms. Let’s see an example of the description of a Fat-Tree in XML (Fat-Tree Cluster) <?xml version='1.0'?> <!DOCTYPE platform SYSTEM "https://simgrid.org/simgrid.dtd"> <platform version="4.1"> <zone id="world" routing="Full"> <cluster id="bob_cluster" prefix="node-" radical="0-15" suffix=".simgrid.org" speed="1Gf" bw="125MBps" lat="50us" topology="FAT_TREE" topo_parameters="2;4,4;1,2;1,2" loopback_bw="100MBps" loopback_lat="0" /> </zone> </platform> Our cluster bob is composed of 16 hosts with the same 1Gf CPU power. Imagine now that you want to simulate the same Fat-Tree topology with more complex hosts, composed of 1 CPU, 1 GPU and some interconnecting bus. Unfortunately, this is not possible with the XML description since its syntax obliges that the leaves in your Fat-Tree to be single Hosts. However, with the C++ API, your leaves can be composed of other zones, creating a Fat-Tree of FullZones for example. Consequently, you can describe the desired platform as follows: sg4::Engine e(&argc, argv); sg4::create_fatTree_zone("bob", e.get_netzone_root(), {2, {4, 4}, {1, 2}, {1, 2}}, {create_hostzone, create_loopback, {}}, 125e6, 50e-6, sg4::Link::SharingPolicy::SPLITDUPLEX)->seal(); Note that the leaves and loopback links are defined through callbacks, as follows: /* create the loopback link for each leaf in the Fat-Tree */ static sg4::Link* create_loopback(sg4::NetZone* zone, const std::vector<unsigned int>& /*coord*/, int id) { // note that you could set different loopback links for each leaf return zone->create_link("limiter-" + std::to_string(id), 1e6)->seal(); } /* create each leaf in the Fat-Tree, return a pair composed of: <object (host, zone), gateway> */ static std::pair<simgrid::kernel::routing::NetPoint*, simgrid::kernel::routing::NetPoint*> create_hostzone(const sg4::NetZone* zone, const std::vector<unsigned long>& /*coord*/, unsigned long id) { /* creating zone */ std::string hostname = "host" + std::to_string(id); auto* host_zone = sg4::create_full_zone(hostname); /* setting my parent zone */ host_zone->set_parent(zone); /* creating CPU */ std::string cpu_name = hostname + "-cpu" + std::to_string(i); const sg4::Host* cpu = host_zone->create_host(cpu_name, 1e9)->seal(); /* creating GPU */ std::string gpu_name = hostname + "-gpu" + std::to_string(i); const sg4::Host* gpu = host_zone->create_host(gpu_name, 1e12)->seal(); /* connecting them */ sg4::Link* link = host_zone->create_link("link-" + cpu_name, 10e9)->set_latency(10e-9)->seal(); host_zone->add_route(cpu->get_netpoint(), gpu->get_netpoint(), nullptr, nullptr, {sg4::LinkInRoute(link)}); host_zone->seal(); /* cpu is the gateway for this host */ return std::make_pair(host_zone->get_netpoint(), cpu->get_netpoint()); } The code is straightforward and can be easily adapted to more complex environments thanks to the flexibility provided by the C++ API.
ESSENTIALAI-STEM
Seekoeivlei Nature Reserve Seekoeivlei Nature Reserve is an expansive wetland spanning some 30 km2 (or 4,754 hectares) near the town of Memel in the Free State, South Africa. The area was declared a Ramsar site in 1999. It is unique for housing more than 250 species of birds, and the town of Memel is now a popular destination for bird enthusiasts, featuring bird hides and picnic facilities. It is also home to some hippopotamus, "seekoei" being the Afrikaans translation, as well as zebra. It lies nearly 2000 m above sea level near the Drakensberg escarpment and close to where the Free State, Mpumalanga, and KwaZulu-Natal meet. Two parts of the Sneeuwberg Protected Environment connects with its south-western border. Wetland Just north of Memel, the Pampoenspruit meets the Klip River, a tributary of the Tugela River, in a 25-km2 swamp with consisting of a myriad of marshes, pools, floodplains, lakes, and grasslands that often flood during the rainy season. It is the largest inland wetland in the Highveld. Flora and fauna Many rare and endangered birds can be found there. The following birds are especially common there: * Little bittern * Yellow-billed stork * White-winged flufftail * Blue crane * Hedgehog * Heron * Stork * Ibis * Cattle egret * Southern masked weaver * Common quail * Whiskered tern * Wattled crane * Basra reed warbler * Rudd's lark * Botha's lark Probably due to the cold temperatures at this altitude, snakes are not found here.
WIKI
Modelling of rare earth solvent extraction with artificial neural nets Giles A.E. ; Aldrich C. ; Van Deventer J.S.J. (1996) Article The design and operation of mass transfer units such as rare earth solvent extraction systems require accurate models of the mass transfer phenomena that occur in these systems. The modelling of rare earth solvent extraction systems from first principles is severely constrained by the physico -chemical similarities of the lanthanides and the strong interactions that can occur between the components of these systems. Artificial neural networks are widely recognized as one of the fastest expanding computer technologies for the modelling of complex or ill -defined systems that are difficult to model otherwise. In this paper, it is shown that the general mass transfer of rare earth solvent extraction in various systems can be modelled significantly more accurately by means of artificial neural network models as compared to conventional models. It is shown that the crystal radius of the lanthanide elements can be used to generalize the behaviour of rare earths in solvent extraction systems. In cases where large numeric variations in data occur, the accuracy of the neural network models can be significantly affected by the logarithmic scaling of data. The incorporation of a self -organizing (Kohonen) layer in a neural network can give an improved performance in systems with clustered data. Please refer to this item in SUNScholar by using the following persistent URL: http://hdl.handle.net/10019.1/12105 This item appears in the following collections:
ESSENTIALAI-STEM
Francesc-Xavier Ciuraneta Aymí Francesc-Xavier Ciuraneta-Aymí (12 March 1940 – 11 November 2020) was a Spanish Roman Catholic bishop. Cuiraneta-Aymí was born in Spain and was ordained to the priesthood in 1964. He served as bishop of the Roman Catholic Diocese of Menorca, Spain, from 1991 to 1999 and as bishop of the Roman Catholic Diocese of Lleida, Spain, from 1999 to 2007.
WIKI
User:Epic gaming nerd Epic Gaming Nerd also known as Angelus Sangash, is a youtuber known for gaming and live streaming. She has accounts on YouTube, Twitch, Mixer and Facebook. Which she uses to stream live gaming events.
WIKI
Now listen clearly.  This is NOT a hack.  It’s meant to do this.  I can also hear a few people (ok, MORE than a few, a LOT) screaming “WHY?! WHY?!? WHYYYY????!??!!!!” Just cuz.  I was curious if it could work and to what degree. So here we have a lovely little Domain on an NT4 server called “CONTOSO”, leftover from my previous session of pulling users out.  I wanted to see just what it would take. Process is simple actually. Bind to the Domain Create a user object Populate the necessary fields Set it in stone Now if there are any small children watching this?  BACK AWAY!  I am working with a VERY old and INSECURE system that might just Blue Screen and eat something. Bind to the Domain while logged as an account with Domain Admin rights $NTdomain=[ADSI]”WinNT://CONTOSO” Create the User Object $NEWUser=$NTDomain.psbase.Children.add(“John Smith”,”user”) Populate the necessary fields $NEWUser.setPassword(“ReallyStupidPasswordSinceThisIsNT4”) $NewUser.Put(“Description”,”Our Standard Generic User”) Set it in stone $Newuser.Setinfo() Yes.  It works.  It follows the exact same principals and rules when creating and modifying local machine accounts and groups in Windows 7. I’m not quite sure where this is actually USEFUL but it was fun messing about Smile The Power of Shell took me over! Sean The Energized Tech
ESSENTIALAI-STEM
Behind the Sun (Motorpsycho album) Behind the Sun is an album by Motorpsycho, released on March 7, 2014 via Stickman Records and Rune Grammofon. It was released as a double 12" vinyl record, CD, as well as digital download. Side A of the vinyl version features two instrumental tracks, cut in parallel (the needle will randomly play one of the two songs). Since this side was marketed as featuring an "etching", these instrumentals are considered hidden tracks. It was the second album recorded with Reine Fiske on second guitar, who joined the band for recordings and touring in 2012. It also saw the return of Ole Henrik "Ohm" Moe, who collaborated frequently with the band in the late 1990s. Track listing * CD & digital Side A: Side B Side C Side D * Vinyl: * 1) Instrumental 1 – 3:58 * 2) Instrumental 2 – 3:42 * 1) Cloudwalker (a darker blue) * 2) Ghost * 3) On a Plate * 4) The Promise * 1) Kvæstor (incl. Where Greyhounds Dare) * 2) Hell, part 4-6: Traitor/The Tapestry/Swiss Cheese Mountain * 1) Entropy * 2) The Magic & The Wonder (A Love Theme) * 3) Hell, part 7: Victim of Rock Note: CD and digital download versions omit the Side A tracks. Authors of the instrumental tracks are not mentioned on the record sleeve. Personnel * Bent Sæther – vocals, bass, 12- & 6-string acoustic and electric guitars, Mellotrons, percussion * Hans Magnus Ryan – vocals, electric and acoustic guitars * Kenneth Kapstad – drums with: * Reine Fiske – electric and acoustic guitars, Mellotron (present on all tracks except "The Promise") * Thomas Henriksen – piano (on "The Magic & The Wonder") * Ole Henrik Moe: saw (on "Cloudwalker"), viola (on "Ghost" and "Kvæstor") * Kari Rønnekleiv: violin (on "Ghost" and "Kvæstor")
WIKI
Are weight loss pills safe? Are weight loss pills safe? Anyone who has watched TV after midnight has heard the claims. Eat all you want, never exercise, and still lose weight with little weight loss  pill. Sadly, scientific research has not borne out such claims. These products are classified as dietary supplements, not as drugs. The number and element of good, haphazard, double blind that really traverse the question of proficiency are very limited for these herbal products and dietary supplements. Fat – trapping products generally contain chitosan. It comes from the grind shells of shrimps, crabs, and other shellfish. Supposedly it secures to fat in the food you eat, keeping it from being dissolved. While there is attestation that it does help avert you from engrossing dietary fat, it’s effects may be too small for you to actually notice anything. The risk of chitosan is that it may get in the way of your body’s capacity to absorb fat – soluble nutrients. These contain vitamin A, vitamin D, and the disease – fighting phytochemicals found in many fruits and vegetables. No worry what the constructor claims, it’s probably not a good idea to take this product for more than about three months at a time.  Fat burners are generally some merger of herb – derived impetus , vital fatty acids, pyruvate and hydroxycitric acid.  Fighting the combat of the convexity can span can range from following a realistic diet to making ill – guided expenditure that can have serious health sequels. People get so focused on weight loss they are willing to do dubious and assuredly dangerous things that can backfire and cause serious health problems, who teaches mindful eating. Weight lose pills are not safe it’s harmful. Companies that make pills don’t have to demonstrate that their products are safe or effective before putting them on the market. Even pills that assert to be natural are not necessarily safe or good for you. If you are thinking about taking any weight loss pills , ask your doctor first. It’s best to point on what’s confirm to work for weight loss, including your diet. We live a world where many people haunt to uttermost measures to lose weight. In this environment, pills that promise uttermost or rapid weight lose have created a great deal of suspicion and dissention. Some people may satisfaction from using these pills under their Doctor’s supervision, if they also follow a healthy diet and exercise regularly. There are many side effects that need to be monitored, including blood pressure, heart rhythms, and mood. Block adds that most people only lose 5 to 10 pounds from taking weight loss pills. This is contemplate significant by the medical community , but is very disappointing to patients. Unfortunately, this modest weight loss is quickly gained back when patients stop the pills. Are weight lose drugs safe? How long you will take a weight loss drug founds on if the drug helps you lose weight. If you have lost enough weight to ameliorate your health and you have not had serious side effects , your doctor may advocate that you take the drug indefinitely. If you have not lost at least 5% of your body weight after three to six months on the full dose of a drug, your doctor will probably change your treatment and may switch your drugs. Weight lose drugs are not safe for health. Nausea, vomiting, diarrhea, constipation, low blood pressure, and increased appetite. Serious side effects can include raised heart rate, pancreatitis, gallbladder disease, kidney problems, and suicidal thoughts. The drug can also increased blood pressure and heart rate. Orlistat ( xenical) is a drug medicine. It blocks your body from absorbing about a third of fat you eat. When a doctor prescribed Orlistate, it is called Xenical. If you get it without a prescription, it is called Alli, which has half of Xenical’s dose.  Weight lose drugs are not safe. It has many side effects include abdominal cramping , passing gas, leaking oily stool, having more bowel movements, and not being able to control bowel movements. These side effects are generally mild and temporary. But they may get worse if you eat high – fat foods. Rare cases of severe liver injury have been reported in people taking orlistat, but it’s not certain that the drug caused these problems. Never medications, which may be safer than earlier drugs, have enlarged the options for treating obesity. Obesity is now contemplated more than a risk factor for other conditions; it’s a disease itself. Are weight lose pills safe and effective? Not everyone answers the same way to any given pills. A few people may lose a great deal of weight on a specific pills, while others may lose little or none. If a pill helps you lose 5% of your weight within a few months without side effects, you will likely want to continue it. But meditations are not a substitute for lifestyle changes. They work best when used as part of broader medical weight – loss program. They should be just one part of lifelong plan that includes a healthy diet, regular exercise, adequate sleep, and stress reduction. A product is not necessarily safe simply because it’s natural. Though infrequent, some dietary diets have been linked to serious problems. Pills can have strong effects. Some weight – lose pills have been establish to contain hidden ingredients, such as prescription drugs, that may be harmful. Its important to do your homework if you are thinking about trying a weight-lose pills.
ESSENTIALAI-STEM
Wikipedia talk:Articles for deletion/Anaya Music Anaya Music should not be deleted This article has been improved, errors were corrected. Links and references are being added. This artist is an important award winning member of the music community and should not be deleted. JamesJune6 (talk) 23:39, 29 September 2019 (UTC) Anaya Music Where is the Anaya Music page? I can’t find it anymore. JamesJune6 (talk) 22:07, 21 October 2019 (UTC)
WIKI
Probing HLA-B7 Conformational Shifts Induced by Peptide-Binding Groove Mutations and Bound Peptide with Anti-HLA Monoclonal Antibodies Kelly D. Smith, Brian E. Mace, Alicia Valenzuela, Janet L. Vigna, Jane A. McCutcheon, James A. Barbosa, Eric Huczko, Victor H. Engelhard, Charles T. Lutz Research output: Contribution to journalArticlepeer-review 20 Scopus citations Abstract To determine the influence of peptide-binding groove residues and MHC-bound peptide on HLA-B7 conformation, we investigated the binding sites of nine locus- or allele-specific mAbs using a panel of 82 HLA-B7 variants. The functional mAb epitopes encircle the HLA-B7 peptide-binding groove. Three mAbs are affected by mutations at solvent-accessible peptide-binding groove mutations. Mutations in peptide-binding groove residues 45, 63, and 150 affect multiple nonoverlapping mAb epitopes, probably by interaction with other MHC residues or bound peptide. However, 18 of 24 peptide-binding groove mutations do not affect mAb binding, indicating that the conformation of solvent-accessible HLA-B7 structures is largely dissociated from changes in the peptide-binding groove. To test whether bound peptides alter HLA-B7 conformation, we loaded HLA-B7 heavy chains on acid-stripped cells with β2-microglobulin and 20 individual synthetic peptides. Two of eight mAbs are sensitive to HLA-B7-bound peptides. A likely interpretation of these data is that the conformational flexibility of HLA-B7 is due to peptide-induced conformational shifts in MHC side chains, rather than major shifts in the MHC main chain. These results suggest that HLA-B7 conformation is largely maintained in the context of different bound peptides and different peptide-binding grooves. Original languageEnglish Pages (from-to)2470-2478 Number of pages9 JournalJournal of Immunology Volume157 Issue number6 StatePublished - Sep 15 1996 ASJC Scopus subject areas • Immunology and Allergy • Immunology Fingerprint Dive into the research topics of 'Probing HLA-B7 Conformational Shifts Induced by Peptide-Binding Groove Mutations and Bound Peptide with Anti-HLA Monoclonal Antibodies'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Google: The adtech industry is 'crowded and competitive' Google has a new response to the antitrust scrutiny over its ad business. Following the new antitrust investigation announced by 50 U.S. attorneys general Monday, the company published a blog post Wednesday night arguing it competes in the ad tech sector with "lots of other companies" like Adobe, Amazon and Facebook. The new Google blog post, titled "The ad tech industry is crowded and competitive," was written in response to a Reuters piece Wednesday that discussed how advertising executives believed Google is stifling business. Among several other points, the Reuters piece said Google's running of search results, YouTube, Gmail and other services hinders advertising competition. It also touched on Google's bundling of ad tools that rivals claim make it so they can't afford to match. Critics of Google say the presence of other companies in the space isn't the issue. It's that Google has such a strong hold on different parts of the digital media supply chain. In fact, some of the companies Google used as examples of competition rebutted the company's argument in statements to CNBC. There's a lot left unsaid in Google's latest blog post about its dominance in digital advertising along with Facebook, and those are many of the areas the attorneys general will likely start looking into. Here's what's going on. According to eMarketer, Google will reach a milestone of surpassing 20% of all U.S. ad spending both online and offline this year. Google captures 74.6% of U.S. search ad spending. And the company is expected to lead the U.S. digital ad market with a 37.2% share, totaling $48.05 billion this year. Regulators will likely examine whether Google has genuine competition among technologies along the links of the digital media supply chain, among other factors. Google's blog post, from its vice president of product management, Sissie Hsiao, only focuses on the presence of other digital advertising companies, not their market share and small valuations relative to Google's parent company Alphabet. "There are thousands of companies, large and small, working together and in competition with each other to power digital advertising across the web, each with different specialties and technologies," it says and names several companies involved in ad tech like AT&T, Comcast and Oracle. The post also cites publicly traded companies like Telaria, Rubicon Project and The Trade Desk. The market caps of Telaria ($451.4 million), Rubicon Project ($508.7 million) and The Trade Desk ($9.8 billion) are nothing to sniff at, but are tiny in comparison with Google's $854.1 billion market cap. But some argue that even if there is a proliferation of players that play in different areas of the ad tech ecosystem, Google is a huge player in each step of the way. The Trade Desk, for instance, said in response to Google's post that the tech giant's involvement in different parts of digital media make it "hard to be objective." "At The Trade Desk, we believe an open, competitive market for digital advertising increases effectiveness for advertisers, improves revenue for publishers and funds a broad scope of premium content for all consumers," the company said in an emailed statement. "As with many markets, it's hard to be objective if you operate on both the buy- and the sell-side of digital advertising, and that's key to an open, competitive market." The Google post also argues that advertisers have options, citing, for instance, data that the average advertiser uses 3.7 demand-side platforms. DSPs are automated buying platforms that let advertisers buy digital ad inventory, like in-steam videos or banner ads. What it doesn't say is that to buy ads on YouTube, advertisers must use Google's ad buying tool, Reuters reported. Facebook and much of Amazon's inventory, for example, work in similar ways. Telaria, a software platform for managing video advertising, also responded to Google's post. "We believe there is an increasingly important role for independent, unconflicted technology platforms like Telaria to empower publishers to control and monetize their video content," the company's CEO, Mark Zagorski, said in a statement. "As more consumers cut the cord in favor of big screen, CTV content, and as more of that content becomes ad-supported, issues around transparency, trust and conflict of interest within the digital walled gardens are taking center stage. Healthy competition in the ecosystem creates an environment that drives the development of innovative technology solutions that support a video advertising market that is more transparent and fair for publishers, marketers and consumers." Disclosure: Comcast is the owner of NBCUniversal, parent company of CNBC and CNBC.com.
NEWS-MULTISOURCE
Circle line (London Underground) The Circle line is a spiral-shaped London Underground line, running from Hammersmith in the west to Edgware Road and then looping around central London back to Edgware Road. The railway is below ground in the central section and on the loop east of Paddington. Unlike London's deep-level lines, the Circle line tunnels are just below the surface and are of similar size to those on British main lines. Printed in yellow on the Tube map, the 17 mi line serves 36 stations, including most of London's main line termini. Almost all of the route, and all the stations, are shared with one or more of the three other sub-surface lines, namely the District, Hammersmith & City and Metropolitan lines. On the Circle and Hammersmith & City lines combined, over 141 million passenger journeys were recorded in 2019. The first section became operational in 1863 when the Metropolitan Railway opened the world's first underground line between Paddington and Farringdon with wooden carriages and steam locomotives. The same year a select committee report recommended an "inner circle" of lines connecting the London railway termini, and the Metropolitan District Railway (commonly known as the District Railway) was formed to build the southern portion of the line. In 1871, services began between Mansion House and Moorgate via Paddington, jointly operated by the two companies. Due to conflict between the two companies it was not until October 1884 that the inner circle was completed. The line was electrified in 1905, and in 1933 the companies were amalgamated into the London Passenger Transport Board. In 1949, the Circle line appeared as a separate line for the first time on the Tube map. In 2009, the closed loop around the centre of London on the north side of the River Thames was broken at Edgware Road and extended west to become a spiral to Hammersmith. Starting in 2015, the signalling system was upgraded as part of a programme to increase peak-hour capacity on the line. The six-car C Stock trains were replaced from 2012 to 2014 by new seven-car S Stock trains. Origins In 1863, the Metropolitan Railway, the world's first underground railway, opened in London between Paddington and Farringdon, connecting the Great Western Railway's relatively remote terminus at Paddington with Euston and King's Cross stations and the City, London's financial district. In the same year, a select committee report recommended an "inner circle" of railway lines connecting the London termini that had been built or were under construction. In the next year, the Metropolitan District Railway (commonly known as the District Railway) was formed to build and operate a railway from South Kensington to Tower Hill. The Metropolitan western extension from a new station at Paddington to South Kensington opened in 1868. By May 1870, the District Railway had opened its line from West Brompton to Blackfriars via Gloucester Road and South Kensington, services being operated at first by the Metropolitan. In 1871, the District had built a terminus at Mansion House, and on 18 November 1876 the Metropolitan opened its terminus at Aldgate. Because of the conflict between the two companies, it took an act of Parliament, the (42 & 43 Vict. c. cci) before further work was done on the inner circle. In 1882, the Metropolitan extended its line from Aldgate to a temporary station at Tower Hill and the District completed its line to Whitechapel. On 6 October 1884, the temporary station was replaced with a joint station and the inner circle was complete. The Metropolitan provided the clockwise, or "outer rail", trains; the District the "inner rail", or anti-clockwise. Many breakdowns occurred, due to the unbalanced wear-and-tear inflicted upon the train and carriages caused by travelling in a single circular direction. Equally, services were further disrupted due to petty squabbles between the two rivals including an incident whereby the Metropolitan Railway forcibly removed (using three trains) the District Railway's parked carriages which had been chained to the track. Other circle routes As well as the inner circle, other routes circumnavigated London, although these were not complete loops. From 1872, the L&NWR began an "outer circle" service from Broad Street to Mansion House via Willesden Junction and Earl's Court, diverting an earlier service that had run to Victoria; and the GWR began a "middle circle" service from Moorgate to Mansion House via Latimer Road and Earl's Court. Both of these routes were cut back to Earl's Court: the "middle circle" in 1900 and the "outer circle" in 1909. The GWR service survived as a shuttle service from the Hammersmith & City line to Addison Road, now Kensington (Olympia), until 1940. The Midland Railway briefly ran a super outer circle from St Pancras to Earl's Court from 1878 to 1880. London Overground now runs services between Clapham Junction, Willesden Junction and Dalston Junction and between Dalston Junction and Clapham Junction. Electrification Wooden carriages were originally hauled by steam locomotives leading to smoke-filled stations and carriages, unpopular with passengers. At the start of the 20th century, the District and Metropolitan were seeing increased competition in central London from the new electric underground tube lines and trams, and conversion to electric traction was seen as the way forward. Experiments were carried out on the Earl's Court to High Street Kensington section, and a jointly-owned six-carriage train began passenger service in 1900. Following this, an AC system was suggested, and this was accepted by both parties. However, the District was looking for a way to raise the finance needed and in 1901 found an investor, the American Charles Yerkes. He formed the Underground Electric Railways of London (UERL), and his experience in the United States led him to favour DC, with third-rail pick-up similar to that in use on the City & South London Railway and Central London Railway. After arbitration by the Board of Trade, the DC system was taken up, and the railways began electrifying the routes, using multiple-unit stock. The District and Metropolitan Railways bought different designs of electric multiple unit. Both had open saloons; the Metropolitan trains with gated ends, the District B Stock with sliding doors in the middle of each car. When their introduction was attempted on 1 July 1905, a Metropolitan train overturned the third rail on the District Railway, requiring all Metropolitan trains to be modified before running again on the District lines. A fully electric service began on 24 September, initially with six-car trains, later reduced to four-car. The Metropolitan trains were soon modified to enclose the gated end and eventually to add sliding doors in the middle. Trains were increased to five cars in 1918 and the Metropolitan introduced new stock in 1921, with three pairs of sliding double doors on trailer cars. In 1926 the Metropolitan took over all inner circle workings except for three trains on Sundays. London Transport On 1 July 1933, the Metropolitan and the District Railways were amalgamated with other Underground railways, tramway companies and bus operators to form the London Passenger Transport Board. Metropolitan Railway electric multiple units were refurbished in 1934 at Acton Works to become eighteen five-car trains of Circle Stock, at first painted red and cream, later painted red all over to reduce costs. These trains included first-class accommodation, but this was downgraded in 1940. From 1947, these were replaced by five-car trains of O and P Stock, with doors remotely operated by the guard, released by the transfer of F Stock to the Uxbridge line. The 1933 London Underground Beck map shows a Metropolitan line north of and stations and a District line south of these points. On the 1947 map, the Metropolitan and District lines were shown together in the same colour and two years later in 1949 the Circle line was shown separately on the map. In 1959–1960, Circle line trains were increased to six cars, the same length as those operating on the Hammersmith & City line, and the stock of the two lines was integrated with maintenance concentrated at Hammersmith depot, allowing Neasden depot to concentrate on the new A Stock. Aluminium C Stock trains, with public address systems and originally unpainted, replaced these trains from 1970. One person operation of the trains was proposed in 1972 but, due to conflict with the trade unions, was not introduced until 1984. In 2003, the infrastructure of the Circle line was partly privatised in a public–private partnership, managed by the Metronet consortium. Metronet went into administration in 2007 and the local government body Transport for London took over responsibilities. On 7 July 2005, at about 08:50, bombs exploded on two Circle line trains. One was travelling between Liverpool Street and Aldgate and the other was at Edgware Road. The bombs killed 15 people, including the two suicide bombers. Following the attacks, the whole of the Circle line was closed until 8 August. A day before a ban on drinking alcohol on public transport in London came into force, a party was held on 31 May 2008, mainly on the Circle line. Thousands of people attended and 17 were arrested by police due to disorderly behaviour, eventually causing several stations to be closed. Extension Prior to 13 December 2009, Circle line trains travelled in both directions around a simple loop with 27 stations and 20.75 km of track. In 2006, there were fourteen trains in service on the line with an interval between trains of minutes during peak hours and 8 minutes off-peak; the minimum running time around the circle off-peak was minutes, although timetabled stops at stations extended this. In December 2009, the Circle line was extended to include the Hammersmith & City route from Edgware Road to Hammersmith. Rather than continuously running around the circle, trains now travel from Hammersmith to Edgware Road, generally going around the circle once before terminating at Edgware Road, and returning via the same route; occasionally, trains may also continue clockwise through Edgware Road to additional stations. The change was made to improve reliability and increase the service frequency on the Hammersmith branch. In March 2020, following the UK government's implementation of lockdown restricting all non-essential travel, the Circle line, along with the Waterloo & City line, was suspended. Railway line The Circle line is 27 km long with 36 stations. Almost all of its track, and all of its stations, are shared with the other London Underground sub-surface lines: the Hammersmith & City line from Hammersmith to just north of Aldgate; the Metropolitan line from Baker Street to Aldgate; and the District line from Tower Hill station to Edgware Road station, (except for a short connecting section near Gloucester Road). The line is electrified with a four-rail DC system: a central conductor rail is energised at $-210 V$ and a rail outside the running rail at $420 V$, giving a potential difference of $630 V$. The running rails are not electrified. Much of the 2 mi double track railway from the Hammersmith terminus to Westbourne Park station is on a 20 ft high brick viaduct. East of Westbourne Park the line passes beneath the Great Western Main Line before resurfacing at Royal Oak station and running alongside the tracks of the main line to an island platform just north of the suburban platforms at Paddington station. The line enters a cut and cover tunnel at the end of the platforms and meets the District line and the other end of the Circle line from Bayswater at Praed Street Junction before passing through Edgware Road station in a cutting. After King's Cross St Pancras station the line exits the tunnel before passing over the Ray Street Gridiron beneath which pass the City Widened Lines which are currently used by Thameslink services. The line continues underground after Farringdon station; there are bay platforms at Moorgate station. After passing through Aldgate station, the terminus of the Metropolitan line, the line joins the District line shortly before Tower Hill; this part of the line includes stations on the Victoria Embankment, on the north bank of the Thames, as far as Westminster station. West of Gloucester Road station the line turns off the District main line to join the District line's Edgware Road branch just before High Street Kensington station. In Bayswater the line is in a cutting, concealed from above by a façade of two five-storey houses at Nos 23 and 24 Leinster Gardens. Trains then call at the second Paddington station on Praed Street before rejoining the Hammersmith & City line at Praed Street junction and terminating at the four-platform Edgware Road station. Services , there are six trains per hour, calling at all stations, requiring 18 trains in service. The journey from Edgware Road around the loop and continuing to Hammersmith takes 72 minutes off-peak. Together with the Hammersmith & City line over 114 million passenger journeys are made each year. Paddington and all stations on the loop are within Zone 1, with those on the line to Hammersmith in Zone 2. Two trains per day run from Barking to Edgware Road via Victoria (as of February 2015). Announcements Historically there has been difficulty in relaying the direction of travel a train is headed in a clear message: variations such as "eastbound" and "westbound", and "clockwise" and "anti-clockwise" can be ambiguous. As passengers became more accustomed to digital devices, TfL considered stopping such announcements and now uses key stations along the route to describe a service (e.g. "via. High Street Kensington"). Rolling stock From 1970 to 2014, services were provided using six-car C69 stock trains, each car having mostly transverse seating and four sets of double doors per side to minimise loading times. The C69 stock trains were replaced by seven-car S Stock trains, the first running on the Circle line on 2 September 2013. By June 2014 all services were provided by S7 Stock trains. The trains are part of Bombardier's Movia family, and have a top speed of 62 mph. A 7-car S Stock train has a capacity of 865 passengers compared to 739 for the 6-car C Stock train it replaced. With a length of 117 m, the S Stock trains are 24 m longer than the 93 m long C stock train, and required station platforms to be lengthened before their introduction. Depot The line's depot is at Hammersmith, close to Hammersmith station, originally built by the Great Western Railway to be operated by the Metropolitan Railway when the joint Hammersmith & City Railway was electrified in the early 20th century. Sidings at Barking, Farringdon and near High Street Kensington (known as Triangle Sidings) stable trains overnight. Four Lines Modernisation (4LM) It was planned that a new signalling system would be used first on the sub-surface lines from the end of 2016, but signalling contractor Bombardier was released from its contract by agreement in December 2013 amid heavy criticism of the procurement process and London Underground subsequently awarded the contract for the project to Thales in August 2015. With the introduction of S7 Stock, the track, electrical supply, and signalling systems are being upgraded in a programme planned to increase peak-hour capacity on the line by 27 per cent by the end of 2023. A single control room for the sub-surface railway opened at Hammersmith on 6 May 2018, and Communications Based Train Control (CBTC) provided by Thales will progressively replace 'fixed block' signalling equipment dating back to the 1940s. The rollout of CBTC has been split into sections, each known as a Signal Migration Area (SMA), and are located on the line as follows: List of stations The line then continues to Edgware Road where trains terminate, then reverse to traverse the loop in an anticlockwise direction to Hammersmith. Urban myths Owing to its historically circular nature, the line has generated many urban myths over the years, including a dead man travelling around undiscovered, a school or office using the service to save infrastructure costs and, as an April fool in the Independent, a new particle accelerator to coexist alongside passenger services.
WIKI
My first ASP.NET Core app on Cloud Foundry Tags: Dotnet core, Cloud Foundry, itq Created: 30-03-2016 Today I tried to deploy a .NET Core web app to a Pivotal Cloud Foundry platform that my ITQ buddy Ruurd set up for us to tinker with. The app itself is a very basic ASP.NET MVC app built with the new ASP.NET Core framework to make it cross-platform. It being cross platform makes it very easy to deploy on something like Cloud Foundry since there is no dependency on Windows or the full .NET Framework anymore. There were some bumps along the way though and here is what I learned. The post assumes some basic Cloud Foundry knowledge so YMMV as far as this post goes. Buildpacks Before Cloud Foundry can run an app it must be able to understand how to compile and run said app. There are some default buildpacks for Java and such but there is no default buildpack for ASP.NET 5/Core. Luckily there is one available over at the Cloud Foundry community github. This takes care of building and running the app. One thing still puzzles me. I added the buildpack to my manifest.yml but CF did not pick up on it during the cf push. Setting the buildpack on the push command had the desired effect: cf push -b https://github.com/cloudfoundry-community/asp.net5-buildpack.git and CF downloaded the required components to handle my .NET Core app. There must still be something I'm forgetting or doing different from what is expected, but it won't work if I stick the buildpack in the manifest. If anyone knows why, please enlighten me :-) Pushing the wrong things When I first pushed I noticed it was uploading ~8200 files. That can't be right. I forgot to add a .cfignore file to exclude things like my node_modules folder. It works just like a .gitignore file and so I copy-pasted my .gitignore file to a new .cfignore file and tried again. I was down to 24 files now. Pusing the wrong things The .cfignore file is an important one because uploading the installed packages resulted in all sorts of failures. My new rule of thumb is to only upload files that I would commit, nothing else, the platform will handle it. Setting up the host This last step took me the longest because the platform only told me that health checks were failing when the app was starting up. Documentation pointed me in the direction of the port being set dynamically. I already had a command in my manifest which was the basic command to start the web app: dnx web. This however uses the settings you specify in your project.json file for the command (server.url ... in this case). Cloud Foundry will expose a port for you and the number can be found in the PORT environment variable. You also need to set the IP to 0.0.0.0 since no actual binding is required (CF will take care of it for you). So the url that app is running on becomes: http://0.0.0.0:$PORT. The final piece is setting up the command to start the app. Since you can no longer use the web command name from the project.json file, we need to call the Kestrel server directly (which is what the command in your project.json is doing) so the command we give to the platform becomes dnx Microsoft.AspNet.Server.Kestrel server.urls=http://0.0.0.0:$PORT. Having done all that should get you up and running with your ASP.NET 5/Core on Cloud Foundry. TL;DR:
ESSENTIALAI-STEM
South Florida cities sue state over right to regulate guns (CNN)Ten South Florida cities have filed a lawsuit challenging a law that gives the state of Florida the authority to regulate firearms and imposes strict penalties on local officials who pass their own gun laws. In announcing the lawsuit Monday, the mayors of some of those cities said constituents demanded action after the February 14 massacre of 17 people at Marjory Stoneman Douglas High School in Parkland near Fort Lauderdale. "We get phone calls every day, 'What are you going to do?' " MIramar Mayor Wayne Messam said at a news conference. "This is about doing the right thing," Weston Mayor Daniel Stermer said. "If not now, when? If this tragedy wasn't enough in our own backyard, what has to happen to have something change?" The lawsuit was filed Monday in Leon County Circuit Court in Tallahassee, the state capital. Ten cities and 31 local officials joined the suit. The municipalities are Weston, Cutler Bay, Lauderhill, Miami Beach, Miami Gardens, Miramar, Pinecrest, Pompano Beach, South Miami and Coral Gables. Parkland is not a plaintiff. Gov. Rick Scott's office said Tuesday it was reviewing the lawsuit but had no further comment. State Attorney General Pam Bondi's office said it had not been served yet. CNN asked the National Rifle Association for comment but received no reply. The NRA is not a defendant in the suit, but some plaintiffs say the NRA promoted the law being challenged. The state law passed in 1987 says that "the Legislature hereby declares that it is occupying the whole field of regulation of firearms and ammunition ... to the exclusion of all existing and future county, city, town or municipal ordinances." Penalties were added in 2011. Municipal leaders who pass gun laws could be removed from office, fined up to $5,000 and sued personally for damages, said Jamie Cole, city attorney for the city of Weston and the lead attorney for the cities in the lawsuit. If they were sued, the local officials could not use public funds in their legal defense, Cole said. "The Legislature's stated intent in imposing these penalties was to chill and deter local governments from taking any action at all that might affect firearms," the lawsuit says. The mayors said they want the power to regulate guns in public spaces in their cities. Messam noted that Miramar recently opened a 5,000-seat amphitheater but cannot prohibit people from bring guns inside. "In my own City Hall, somebody can walk in with a concealed weapon, and there's legally nothing I can do about it, nothing," Miami Beach Mayor Dan Gelber said. Coral Gables considered a firearms regulation in February but got an email from an unnamed "guns rights organization" that threatened legal action if the law passed, the lawsuit says. The city backed off, the suit says. Some groups in Florida like the gun law, saying it creates uniformity and eliminates confusion. "Counties with 25 cities, it would be impossible to enforce" different ordinances, Mike Adkinson, president of the Florida Sheriffs Association, said in February. "It would be confusing." He's also the sheriff of Walton County, Florida. But Stermer said the law creates a "one-size-fits-all" system that doesn't really work in a state as diverse as Florida. South Florida is very urban, he said, whereas parts of northern and central Florida are rural. Those areas need different laws, he said. The mayors also complained that the state law infringes on their rights of free speech, plus their ability to govern. "It's not that it's an insult to public officials," Gelber said. "It tries to gag us. It tries to bind us, it tries to handcuff us from doing the fundamental purpose of government -- protecting our citizens -- and that's just wrong." Cole said the cities want the law struck down but are not seeking monetary damages or compensation for attorneys' fees. No hearing dates have been set, he said. The state law has been the subject of legal action in the past. When he was a Tallahassee city commissioner, Andrew Gillum was sued personally by gun advocates after voting against repealing an ordinance that banned shooting firearms in public parks. His defense costs were $200,000, but his attorneys worked pro bono. "Basically, they are suppressing local governments from pushing back, which has a chilling effect," Gillum said. The case ended in an appeals court ruling for Gillum, who is now the city's mayor, and other city commissioners. The courts did not reach a conclusion on whether the state statute was overreaching. The governor recently signed a law that raises the minimum age to purchase a firearm to 21 from 18. The NRA immediately filed a lawsuit to stop the law. CNN's Lawrence Davidson contributed to this report.
NEWS-MULTISOURCE
Skip to contents Introduction As some user-specificed multiverses can be quite large, it is only natural that we should make use of the rich parallel processing resources that are widely available. multiverse makes use of futures using the future library, which “provides a very simple and uniform way of evaluating R expressions asynchronously…”. This allows both the user and us (as the creators of this library) greater flexibility in supporting how execution and parallel execution may be supported. How and when evaluation takes place depends on the strategy chosen by the user of executing the multiverse. These strategies include sequential execution in the current R session, or asynchronous parallel execution on the current machine or on a compute cluster. In this document, we show how you can execute each of the distinct analyses in your specified multiverse. Data and analysis We will use the hurricane dataset that has been discussed in greater detail in the README as well as in the vignette hurricane. If you are already familiar with this dataset and analysis, please feel free to skip this section, and continue from the next section data(hurricane) hurricane_data <- hurricane %>% # rename some variables rename( year = Year, name = Name, dam = NDAM, death = alldeaths, female = Gender_MF, masfem = MasFem, category = Category, pressure = Minpressure_Updated_2014, wind = HighestWindSpeed ) %>% # create new variables mutate( post = ifelse(year>1979, 1, 0), zcat = as.numeric(scale(category)), zpressure = -scale(pressure), zwind = as.numeric(scale(wind)), z3 = as.numeric((zpressure + zcat + zwind) / 3) ) M = multiverse() We implement the same analysis as in the vignette(hurricane). Below we briefly outline the steps involved. Outlier exclusion: We implement different alternative choices on how to exclude outliers based on extreme observations of death and damages. inside(M, { df <- hurricane_data %>% filter(branch(death_outliers, "no_exclusion" ~ TRUE, "most_extreme_deaths" ~ name != "Katrina", "most_extreme_two_deaths" ~ ! (name %in% c("Katrina", "Audrey")) )) %>% filter(branch(damage_outliers, "no_exclusion" ~ TRUE, "most_extreme_one_damage" ~ ! (name %in% c("Sandy")), "most_extreme_two_damage" ~ ! (name %in% c("Sandy", "Andrew")), "most_extreme_three_damage" ~ ! (name %in% c("Sandy", "Andrew", "Donna")) )) }) Identifying independent variables: How is femininity of the name of a hurricane operationalised? Simonsohn et al. identify two distinct ways. First, using the 11 point scale that was used in the original analysis; or second using a binary scale. Data transformations: The dollar amount in damages caused by a hurricane follows a long tailed, positive only valued distribution. The decision involved is whether or not to transform damages. inside(M, { df <- df %>% mutate( femininity = branch(femininity_calculation, "masfem" ~ masfem, "female" ~ female ), damage = branch(damage_transform, "no_transform" ~ identity(dam), "log_transform" ~ log(dam) ) ) }) Alternative specifications of regression model: The next step is to fit the model. We can use either a log-linear model or a poisson model for the step. Both are reasonable alternatives for this dataset. We also have to make a choice on whether we want to include an interaction between femininity and damage. This results in the following specification: inside(M, { fit <- glm(branch(model, "linear" ~ log(death + 1), "poisson" ~ death) ~ branch(main_interaction, "no" ~ femininity + damage, "yes" ~ femininity * damage ) + branch(other_predictors, "none" ~ NULL, "pressure" %when% (main_interaction == "yes") ~ femininity * zpressure, "wind" %when% (main_interaction == "yes") ~ femininity * zwind, "category" %when% (main_interaction == "yes") ~ femininity * zcat, "all" %when% (main_interaction == "yes") ~ femininity * z3, "all_no_interaction" %when% (main_interaction == "no") ~ z3 ) + branch(covariates, "1" ~ NULL, "2" ~ year:damage, "3" ~ post:damage), family = branch(model, "linear" ~ "gaussian", "poisson" ~ "poisson"), data = df) res <- broom::tidy(fit) }) Execution Sequential The most simple execution strategy would be to perform each computation sequentially, on one’s current machine. This is the default strategy, which can be used by simply calling execute_multiverse() on the current multiverse object. However, some studies have created multiverse analyses with thousands or even millions of unique specifications (universes). In such cases, the optimisation to avoid redundant computation that we have built into our solution for execution is insufficient, and sequential execution fails to make use of the embarrassingly abundant parallel processing resources. Parallel: separate R sessions To process multiverses in parallel, we make use of the future library. future allows the user to declare different strategies for resolving futures asynchronously and in parallel using future::plan(). The most general approach, which would work on both unix and non-unix based systems is to use a multisession future, which resolves futures asynchronously (in parallel) in separate R sessions running in the background on the same machine: plan(multisession, workers = availableCores()) execute_multiverse(M, parallel = TRUE) plan(sequential) # explicitly closes multisession workers by switching plan Note: this vignette uses the inside() syntax to implement a multiverse. However, futures can be used with multiverse code blocks as well, and the steps involved in setup of asynchronous futures and execution would remain the same. Parallel: separate forked processes This strategy is similar to the mc*apply suite of functions in the parallel library. It resolves futures “asynchronously (in parallel) in separate forked R processes running in the background on the same machine”. However, this functionality is not supported on Windows (non-unix based system). Thus, we recommend using multisession instead. Parallel: compute clusters Future also supports resolution in separate R sessions running on a compute cluster. “A cluster future is a future that uses cluster evaluation, which means that its value is computed and resolved in parallel in another process.” What if I want to execute only a subset of the specifications? For debugging purposes or otherwise, one might wonder if it is possible to execute only a small subset of N universes from the larger specified multiverse. Although we do not provide a specific function which supports this behavior, such a behavior can be easily achieved using the following workflow using the lapply() functions. N = 5 lapply(1:5, function(x) execute_universe(M, x)) Alternatively, the same result can be obtained using the purrr::map() function: purrr::map(1:N, ~ execute_universe(M, .)) If we want to perform this operation in parallel, we could use furrr::future_map() as follows: plan(multisession, workers = availableCores()) furrr::future_map(1:5, function(x) execute_universe(M, x)) plan(sequential) For a detailed description on asynchronous resolution of futures and how to set up clusters, please refer to the documentation of the future library.
ESSENTIALAI-STEM
TIMELINE-Developments in the $2 billion Punjab National Bank fraud case March 8 (Reuters) - A $2 billion fraud at India’s second-biggest state-run lender Punjab National Bank has shaken the nation’s financial sector, triggering a massive probe and regulatory changes. The following is a timeline of how the case has unfolded: Jan. 29, 2018: Punjab National Bank (PNB) files police complaint against jewellers Nirav Modi, Mehul Choksi and others, saying they had colluded with two of its staff to defraud the bank of 2.81 billion rupees ($43.16 million Feb. 5, 2018: Central Bureau of Investigation (CBI) says has launched a probe into the alleged scam. Bank tells stock exchange it is still investigating the extent of the fraud. Feb. 14, 2018: PNB now discloses the amount involved in the fraud as $1.77 billion, adds other banks overseas advanced money to jewellers based on the fraudulent guarantees issued by its staff Feb. 15, 2018: PNB Chief Executive Sunil Mehta holds news conference, says working with law enforcement agencies, regulators, other banks CBI says Modi, Choksi left India before PNB filed complaint Feb. 16, 2018: CBI files case against Choksi’s Gitanjali Group, conducts searches at 20 of the jewellery retailers locations PNB CEO tells analysts bank putting in place better checks and balances, hopes to recover within six months Reserve Bank of India, the Indian central bank, says will take appropriate supervisory action State-run Union Bank Of India says it has exposure of about $300 million related to the PNB incident, while State Bank of India says its exposure is about $212 million Feb. 17, 2018: CBI makes first arrests in the case, two PNB employees and an executive of Nirav Modi’s group detained State-run UCO Bank says it has about $412 million in exposure to fraudulent transactions carried out at PNB Enforcement Directorate seizes a cumulative 56.74 billion rupees worth of diamonds, gold and jewellery from Nirav Modi's home and offices bit.ly/2tv1af9 Feb. 19, 2018 CBI arrests three more PNB executives Feb. 20, 2018 PNB shares fall for fifth trading session, wiping off $1.9 billion in market capitalisation Finance Minister Arun Jaitley slams oversight lapses, without directly referring to PNB case Reserve Bank of India asks banks to implement measures to strengthen their oversight of the SWIFT interbank messaging platform Jeweller Modi’s lawyer denies wrongdoing by client; Modi writes to PNB saying his companies owe much less than the sums reported Enforcement Directorate (ED) says investigating more than 100 shell companies allegedly used by Modi and Choksi to route funds CBI arrests three officials from Modi’s group, two from Gitanjali Feb. 21, 2018: CBI arrests PNB general manager Rajesh Jindal, who headed the bank’s Brady House branch in Mumbai between August 2009 and May 2011 Jeweller Modi writes to his employees in India saying they should look for other jobs as he would not be able to pay them salaries after the seizure of his assets Feb. 22, 2018: ED seizes nine luxury cars belonging to Modi and his firms; freezes shares and mutual funds worth 78 million rupees held by Modi and 867.2 million rupees held by Choksi Feb. 23, 2018: Auditor group Institute of Chartered Accountants of India begins probe into PNB fraud RBI orders linking of SWIFT system with banks’ core accounting software by April 30, among other measures, Feb. 20 letter to banks shows Bollywood star Priyanka Chopra announces cutting ties with Nirav Modi’s brand February 24, 2018: Choksi writes an open letter to employees of Gitanjali Gems protesting innocence and telling them to look for other jobs ED seizes 21 properties including a farmhouse, a solar power plant and land belonging to Modi worth 5.24 billion rupees Feb. 27, 2018: PNB says the amount of fraudulent transactions has gone up by about $204 million to $1.97 billion Jeweller Modi’s firm Firestar Diamond files for bankruptcy in the United States Feb. 28, 2018: CBI arrests former PNB auditor M.K. Sharma, who was responsible for auditing systems and practices of the bank’s Brady House branch March 1, 2018: PNB appoints BDO India as forensic auditor for five group companies belonging to Modi CBI arrests another former PNB internal auditor, Bishnubrata Mishra, who was responsible for audits at the branch between 2011 and 2015 March 3, 2018: Authorities say gold and diamond bribes given to one PNB staffer named in fraud State-run lender Allahabad Bank says its exposure to the fraud is about $367 million March 4, 2018: CBI makes four more arrests - two former employees of Modi’s Firestar International, an auditor of Modi’s group and a former director of one of Choksi’s companies March 6, 2018: CBI arrests a vice president of Gitanjali group Serious Fraud Investigation Office (SFIO) meets executives from Axis Bank, ICICI Bank over Modi, Choksi exposure March 7, 2018: PNB CEO Sunil Mehta meets SFIO officials in Mumbai March 8, 2018: Choksi accuses investigating agencies of gross abuse of due process in ongoing probe Reporting by Krishna V Kurup in Bengaluru; Additional Reporting By Patturaja Murugaboopathy Editing by Euan Rocha Our Standards: The Thomson Reuters Trust Principles.
NEWS-MULTISOURCE
.338 Xtreme The .338 Xtreme cartridge (or .338 XT for short), is based on a necked down .505 Gibbs cartridge case with a sharper 35 degree shoulder angle. Introduced in 2008 by Xtreme Machining of Grassflat, Pa, the cases, commercially produced by Bertram Bullets, have a length of 3.030" and a head diameter of 0.640". Case capacity is 167.5 grains. Factory loads drive a 266 grain bullet at 3350 feet per second from a 30" barrel. The factory loads are loaded with a Tellurium Copper alloy solid very-low-drag bullet, These projectiles are manufactured by Xtreme Machining and of a patent pending design. The secant ogive projectile measures 1.808" long, including a 6 degree boat tail of 0.285". The patent refers to a "dual diameter" aspect of the projectile, where the main cylindrical portion of the bullet measures 0.331", 0.001" greater than the lands of the rifling. About 1.440" from the tip, the diameter increases to 0.338", creating a 0.15" "driving band". This both reduces driving force required for the high muzzle velocity as well as improves accuracy. The .338 Xtreme possesses a full 50% more case capacity than a .338 Lapua Magnum cartridge, but it drives a projectile with a claimed G1 ballistic coefficient of 0.825 of like mass at only 10–12% more velocity from a similar length barrel when measured at the muzzle. Casual observers might conclude that the cartridge is overbore, but the ballistics tables tell a different story. Between 1000 and 2000 yards, the normal operating envelope for extreme long range shooting, the .338 Xtreme demonstrates 50% higher velocity, is 50% flatter shooting, and maintains more than double the energy of C.I.P. conform with .338 Lapua Magnum loads with conventional 250-grain very-low-drag bullets. The external ballistic performance expectations of this .338 Xtreme load and non C.I.P.conform .338 Lapua Magnum based cartridges like the LM-105 wildcat cartridge utilizing the LM-105 projectile with a claimed G1 ballistic coefficient of ≈ 0.93 are similar. A small production facility and single-source manufacturing affect availability of both the weapon and the ammunition components, so it is unlikely that the .338 Xtreme will be adopted as a military cartridge.
WIKI
Changes between Initial Version and Version 1 of Ticket #13244, comment 3 Ignore: Timestamp: 10/01/12 14:51:21 (9 years ago) Author: tscrim Comment: Legend: Unmodified Added Removed Modified • Ticket #13244, comment 3 initial v1   22> The patch looks good, even if I am not quite convinced by the trading of time-consumption versus dataspace-usage. 33 4 My belief is that this is the better approach since memory/disk space is cheap, especially compared to CPU cycles since it takes seconds. However I would argue that each of these should be implemented as (immutable) singletons unless someone can think of a reason why you would need a true duplicate.  4My belief is that this is the better approach since memory/disk space is cheap, especially compared to CPU cycles since it takes seconds. However I would argue that each of these should be implemented as (immutable) singletons unless someone can think of a reason why you would need a true duplicate. Perhaps that should be another ticket and this one be set to positive review? 55 66Also a minor technical thing, from looking at the patch file I believe the reference in SimplicialComplexExamples() on line 1027 is missing the linking underscore.
ESSENTIALAI-STEM
User:Jamesviolon Overview James Macalinao Violon is political science practitioner and academician. He has the interests on the fields of Political Science and History. He is a well balance person as far as principles are concern. He knows the importance of reality and idea and how these two things differ with each other. Biography James Macalinao Violon was born in June 6, 1990 in Bagontaas, Valencia City, Bukidnon of Mr. Melchor Cabang Violon Sr. and Mrs. Amelita Macalinao Violon. He is the eldest child followed by Melched, Alili Babes, Apple Mae, Melchor Jr., Mel, Sy, and Deo. In 2001, he graduated his elementary at Angel Villarica Central School in Samal Island, Davao del Norte. In 2006, He then graduated his secondary at Valencia National High School in Valencia City, Bukidnon. They were forced to transfer in the Province of Bukidnon due to the major operation in the skull to his father. His mother decided to transfer in her hometown (Bukidnon) in order to take care with her ill husbanda and eight children but apparently, James' father regained his strength and found stable job in Bukidnon. After James graduated in high school he did not enter to college immediately due to some personal problems that they had encountered in their family. In the year 2008 he decided to study in Central Mindanao University and took up Bachelor of Arts in Political Science and graduated with honors in 2012. June in that year, he applied as faculty member in the Department of Social Sciences in his alma mater and fortunately, he was hired and was given history courses teaching load which pushed him to pursue graduate degree, Master in History at Mindanao State University-Iligan Institute of Technology (MSU-IIT) to give himself the license to teach history subjects. His teaching experience made him realize to become a full-pledged academician.
WIKI
E. Lampert, former Chairman of Sears, in a '09 letter to shareholders ... full letter included ... this shit has been going on a long time, and perhaps no other company has been as ruthlessly pounded in the ass as Sears ... on virtually every SEC FTD report since first made available in 2004. &#x200B; [Full text below ...](https://preview.redd.it/0p06dqj3fq981.png?width=1262&format=png&auto=webp&s=ccfbb01b1600e1e794f6640c92ef2146bb465b5f) Message from the Chairman February 26, 2009 (Link to full letter here: [https://consumerist.com/2009/02/27/sears-chairman-unleashes-15-page-manifesto-about-um-everything/](https://consumerist.com/2009/02/27/sears-chairman-unleashes-15-page-manifesto-about-um-everything/)) To Our Shareholders: ... \[just including the juicy bits here\] ... \* \* \* \* As discussed above, a number of changes in the regulatory environment greatly impacted Sears Holdings and other companies. Three additional areas quickly come to mind. **Short-Selling Rules** From the middle of the summer through the fall, the Securities and Exchange Commission expressly prohibited short selling of securities of a number of financial institutions and companies with financial subsidiaries. We elected to have our shares included in that short selling ban for a number of reasons. First, the level of “naked” short selling of our shares was significant. The activity can be measured by the number of shares sold short as disclosed twice monthly by the NYSE and Nasdaq as well as by the reported number of instances of failure to deliver securities by short sellers to purchasers of Sears Holdings stock. Second, as fiduciaries for our shareholders, our decisions are governed by what we think is in the best interests of the owners of the company. Since the time of the ban, the SEC has taken further actions to enforce “naked” short selling rules that had been in place, but not enforced, for a significant period of time. This is an important protection for shareholders and for property rights. The sale of property (shares in a corporation) that a seller does not own and can’t deliver (naked short selling) is an affront to property owners, and a destroyer of confidence and trust. Much of the commentary around short selling ignores this simple fact. While I understand (and often appreciate) the urge to critically evaluate possible regulation, it is interesting that there has been protest by those on the short side with regard to some of the rules that have been suggested. For example, the reinstatement of the uptick rule, which would require any short sale to occur at or above the last sale price on the stock exchange. Such a rule had been in place for over 70 years (to prevent “bear raids” in which short sellers aggressively sold stock at ever lower levels, undermining confidence) until it was repealed in 2007. It has been suggested that, because stocks are now traded in decimals rather than in 1/8 point increments, such a rule is obsolete or unnecessarily difficult to implement. However, what the opponents fail to point out is that companies who repurchase their own shares are advised to adhere to a rule that forbids those companies from initiating a plus tick when repurchasing shares. Why policymakers would favor an asymmetric application of a rule like this in favor of short sales and against company repurchases is a mystery. Similarly, the SEC has required short sales of securities to be reported periodically beginning in the second half of 2008. Short sellers have prevailed on the SEC to allow this disclosure to be done privately on the basis of a claimed need to protect their investment strategies. While I respect this privacy right, investors who purchase and own stocks, however, are afforded no such privacy in their holdings. In fact, holders of securities are required to publicly file their holdings on a quarterly basis. Such public disclosures have been known to attract the interest of short sellers when institutional investors and hedge funds have found themselves under performance or redemption pressures. Again, it is a mystery as to why those who are owners of publicly traded companies are required to disclose their holdings while those who sell short those very same securities are permitted to keep their positions private. Ultimately, the thing to remember about short selling is that the company’s owners have the ability to regulate whether shares of their company can be sold short – even if regulations permit it. When shareholders choose to lend their shares, they are facilitating the ability to have those shares sold short. When they choose not to do so, the ability to sell short is reduced. Mark-to-Market Accounting At the end of the year, our accountants and auditors determined that all of the goodwill associated with the Orchard Supply Hardware business should be written off. The goodwill write-off has no impact on the cash flows of the business and is purely a non-cash accounting charge. I take absolutely no issue with this determination. Other companies find themselves with similar goodwill adjustments as a result of stock price and business performance declines. Interestingly, the amount of goodwill initially recorded was determined by an actual market transaction when Ares Capital purchased 19.9% of Orchard in 2005, and the write-off was determined based on the financial models developed by appraisers and accountants of what they project to happen in the future. In this case, it is not a mark-to-market, it is a mark-to-model or to assumptions that may or may not be reflective of what Orchard would be worth in a market transaction, were it for sale. Accounting disciplines strive to provide information which is both relevant and verifiable. In the old days accounting rules were based on the concept of “historical cost,” which means that items were valued based on actual transactions. This accounting model had the benefit of being highly verifiable as different parties could objectively confirm the value of a given transaction and the resulting cost. However, many believed that such historical cost-based financial statements did not provide information as relevant as current market price, so accounting has evolved from historical cost to fair-value-based financial statements. In normal times, market values are volatile and in extraordinary times extremely volatile. For those entities required to sell assets because of their business model or because of their funding circumstances, they are subject to the whims of the market and their business may be severely impacted by wherever market prices may end up on a given date. For many companies, market values can be a guide for purchases and sales of assets, but they don’t force actions by the companies. Benjamin Graham said, as Warren Buffett paraphrased, that “in the short run, the market is a voting machine. In the long run, it’s a weighing machine.” Despite this caution, much of our financial system now rests on the shoulders of a “voting machine” rather than a “weighing machine.” Don’t be fooled by the term “mark-to-market.” Mark-to-market is a regulatory convention and not a free market convention. As regulated entities, most financial institutions are required to account for their assets by regulatory convention. Similarly, all publicly traded companies are required to conform to GAAP (Generally Accepted Accounting Principles). This helps for comparability and it helps to assure investors that they can rely on the financial statements of publicly traded companies. What has happened is that we have gone from a system which stressed objectivity and verifiability to a system in which the market price of an asset, under conditions of economic stress and financial dislocation, must be derived using a significant amount of judgment. But this is not where it stops. Once you accept the mark-to-market convention, you begin the debate of what is the correct market price. Different people and different firms end up pricing the same asset differently. This has been true for a long time in the derivatives markets, but it also is now true in markets in which asset prices are less liquid. This allows critics and commentators to charge that financial institutions are not marking their assets properly (regardless of whether the critics have any specific evidence or not). The incessant drumbeat of these charges leads to a loss of confidence among investors as well as concerns from regulators and rating agencies who are fearful of being accused of being lax in overseeing these institutions. The accounting profession, as well, is put into a position of being second-guessed for the financial statements they prepare and certify, so they too become “conservative.” So much time and money ends up spent ensuring that the financial statements are immune from criticism that it can become much more of a distraction than a useful tool for investors and managers. That doesn’t mean that mark-to-market has no bearing or that it is wrong. It is important for investors as well as regulators to appreciate the consequences of certain conventions. Imagine you were accounting for an oil company and oil was trading at $140 when you had to produce financial statements. Three months later, oil is at $60 and you produce another set of financial statements, marked-to-market. Given the transparency of a single commodity, when the next set of financial statements is produced, the assets of the company are significantly lower. The company explains that with the drop in the price of oil, the value of the assets is significantly lower than three months before. To most investors this would make sense. Now, take a similar company, but instead of oil as a single commodity, substitute thousands of financial instruments of different types. Each type of asset will have its own price path and level of volatility. When a financial statement is produced three months later showing dramatically lower assets and a significant loss, it is impossible for an outsider to conclude whether the financial statements of three months prior were inaccurate simply because the new financial statements show lower asset values. Sarbanes-Oxley rules were designed to improve the accountability and oversight of public company financial statements to increase investor confidence. Despite these rules, over the past year we have witnessed all kinds of accusations and assertions about company financial statements and management credibility. Instead of recognizing that price volatility, illiquidity, and mark-to-market rules are the primary reason for volatility in financial statements, many have concluded that you can’t trust the “bankers” and that additional regulation and oversight is needed. The tendency to overreact is very significant. The risk-reward calculation for regulators and rating agencies are heavily weighted towards assuming the worst and acting based on those assumptions. The result of these actions, however, is extremely harmful for the system as a whole. I believe that in a capitalist society we are always faced with the tradeoffs between freedom and tyranny. In a free society and free markets, what people say and what people write have been largely protected by the U.S. Constitution (this is not always true in any capitalist society). This is much less true in the economic domain, where constitutional protections of private property and economic rights have been watered down over time to permit significant levels of regulation and government intervention. Just as with free speech and a free press you will have people saying things that others view as harmful, hateful, or obscene, so too in a free economy you will have individuals and businesses doing things that others will disagree with. Some of those things may lead to great business success and others to failure or to disgrace. To expect or allow for excessive regulation of business, including financial businesses, is to stifle growth and creativity, which ultimately produce jobs and wealth that are the foundation for any successful and free society. The two most important books that any student of current events should be reading in this environment are both by Friedrich Hayek, the esteemed Austrian economist. Based on events he witnessed beginning in the early part of the 20th century, Hayek wrote The Road to Serfdom as a warning to England and the United States against the damaging impact of socialist policies and The Fatal Conceit as a warning against heavy intervention in markets and society at large. Despite the almost universal belief today that more, but better, regulation is needed and that the role of the state needs to be not just temporarily larger, but permanently larger, Hayek’s writings and logic should give everybody pause as to the consequences of these actions. As a country, we need to rebuild confidence and trust and to understand what happened. Whether by business or by government, the misdiagnosis of situations leads to poor prescriptions for rehabilitation and recovery. When the misdiagnosis is done at the federal government level and involves large parts of a national economy, the consequences can be swift and significant. The unintended consequences are often swifter and even more significant. As the leaders in our nation continue to evaluate and evolve the policies and rules of the game, we would all be wise to heed the cautions raised by Friedrich Hayek. I appreciate that the free market can be a difficult master and that there is an important role for government and regulators, but I hope that as we move forward the rules of the game and the methodology for changing those rules will be more consistent and fair than they have been over the past year. Those who desire to protect civil liberties in times of war appreciate the importance of laws protecting individuals and institutions. In times of economic and financial distress we need to be similarly vigilant in protecting economic and contract rights so that we can continue to have a system that functions properly. Attempts to threaten or eliminate those rights will chase away the capital and investment that our country needs to restore prosperity and to thrive in the future. \* \* \* \* \*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\* # Ryan Cohen, Eddie Lampert, Patrick Byrne, Dan Gilbert, Elon Musk, Mark Cuban, Eric Sprott, and probably several others I am not even aware of ... What do they all have in common? https://preview.redd.it/3enum6zogq981.png?width=1730&format=png&auto=webp&s=943f8a63ee82d1ff8cb0177f479ea0a836fa0c54
NEWS-MULTISOURCE
Jordan Lam Jordan Lam Lok Kan (born 2 February 1999) is a Hong Kong professional footballer who currently plays as a left winger or a left back for Hong Kong Premier League club Kitchee and the Hong Kong national team. Youth career Born in Hong Kong, Lam's family moved to Temple City, California when he was several months old. Due to his father's need to frequently travel between Hong Kong and Los Angeles for work, the family decided to sell their house in Temple City and move back to Hong Kong after a few years. When Lam was seven, he and his brother entered and won a 2 on 2 football tournament organized by the local YMCA. At age 10, he joined a football academy run by Hong Kong football star Leslie Santos, which would later become Chelsea Soccer School. During his time at Chelsea Soccer School, he trained under the tutelage of Shum Kwok Pui, competed in various Hong Kong youth tournaments and many overseas showcase tournaments. In 2014, Lam led Diocesan Boys' School to the Hong Kong Inter-School Football Competition championship and was named season MVP. His performances soon attracted the attention of scouts and he was offered opportunities to join the youth teams of Guangzhou Evergrande and Shandong Luneng. However, his family did not want to relocate to the Mainland as they felt that the standard of players whom Lam would train against were similar to those in Hong Kong. On 21 June 2015, Lam led the South China U-16 team to a victory over the Kitchee U-16's in the HKFA U-16 Cup Final. Eastern expressed an interest in signing Lam to a professional contract following the match but ultimately were unable to come to terms. In March 2016, Lam and his Chelsea School teammate Tse Ka Wing travelled to England to seek out an opportunity to join the youth academy of an English side. The two trialled at Leicester City but left because they felt that it would be too difficult to break into the first team. The two later trialled at Bury for six weeks and decided to join their academy. However, their time at Bury was marred by a delay in the processing of their international clearance. As a result, the pair could not receive work permits in order to play in the Football League Youth Alliance with the rest of the squad. Facing long odds of ever receiving a work permit, Lam returned to Hong Kong. Pegasus On 10 February 2017, Lam signed his first professional contract with Pegasus. He made his debut on 1 April, creating two assists in a 5–3 loss to Eastern. On 12 June 2018, Lam stated that he would leave Pegasus in search of greater playing opportunities elsewhere. Dreams FC Following his departure, Lam joined Dreams FC on 11 July 2018. R&F On 19 June 2019, R&F head coach Yeung Ching Kwong revealed that Lam would join the club. He was officially announced as an R&F player on 9 July 2019. During preseason training in Portugal, Lam injured his anterior cruciate ligament, necessitating a long layoff to recover. On 14 October 2020, Lam left the club after his club's withdrawal from the HKPL in the new season. Southern On 25 November 2020, Lam signed for Southern. Resources Capital On 21 August 2021, Lam joined Resources Capital. North District On 17 July 2023, Lam joined North District. Kitchee On 27 June 2024, Kitchee president Ken Ng announced that the club had signed Lam. On 2 July 2024, Lam officially joined Kitchee. International career In October 2014, Lam received his first call up to the Hong Kong U-16's as a 15 year old. Head coach Yeung Ching Kwong selected him ahead of the 2014 AFC U-16 Championship despite being a year younger than some of his teammates. He made two appearances off the bench for Hong Kong but the team did not advance past the group stage. In May 2017, Lam was called into the Hong Kong U-23's squad which finished as runners up in the HKFC Soccer Sevens tournament. In July 2017, he was called into the full squad for U-23's squad for a tournament in Myanmar and 2018 AFC U-23 Championship qualification. On 26 March 2024, Lam made his debut for the senior Hong Kong national team in a World Cup qualifier against Uzbekistan. Personal life Lam's younger brother, Jerry, is also a professional footballer.
WIKI
Morris Westfall Morris Westfall (born April 5, 1939) is a former American Republican politician who has served in the Missouri General Assembly in the Missouri Senate and the Missouri House of Representatives. Westfall graduated from University of Missouri with a bachelor's degree in agriculture. He has served in the U.S. Marine Corps and has worked as a livestock farmer. As chairman of the Senate Transportation Committee, Westfall has been an advocate for road safety and against drunk driving.
WIKI
Hide Toolbar at runtime In multi DLL application I want the user to select whether to use a Toolbar or not. Is there a way to globally hide the Toolbar at runtime, or do I have to insert the code to hide it in every window? Trond For a Major Project “XYZ” I have written Project XYZ specific Extension templates that are populated manually into most every procedure. That allows making project wide settings easily just in Project XYZ, e.g. your toolbar hiding. Usually have an APP level extension then separate Window, Report and Process extensions. Sometimes have separate Browse and Form templates but the Window template can examine the %ProcedureTemplate to figure it out Browse or Form or Window. You can have a page of #Prompts to shape behavior. You can Export/Import to TXA to mass change those new symbols. It allows a lot of flexibility to have Project specific extensions. You could also look at PROP:OpenWindowHook which you only have to implement in the Frame. Loop using PROP:NextField looking for PROP:Type = ToolBar
ESSENTIALAI-STEM
Appendix Slic Application Code Example Below is the complete Slic Application Code Example presented in the Getting Started with Slic section. The code can be found in the Axom source code under src/axom/slic/examples/basic/logging.cpp. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 // SPHINX_SLIC_INCLUDES_BEGIN // Slic includes #include "axom/slic.hpp" // SPHINX_SLIC_INCLUDES_END using namespace axom; //------------------------------------------------------------------------------ int main( int AXOM_NOT_USED(argc), char** AXOM_NOT_USED(argv) ) { // SPHINX_SLIC_INIT_BEGIN slic::initialize(); // SPHINX_SLIC_INIT_END slic::disableAbortOnError(); // SPHINX_SLIC_FORMAT_MSG_BEGIN std::string format = std::string( "<TIMESTAMP>\n" ) + std::string( "[<LEVEL>]: <MESSAGE> \n" ) + std::string( "FILE=<FILE>\n" ) + std::string( "LINE=<LINE>\n\n" ); // SPHINX_SLIC_FORMAT_MSG_END // SPHINX_SLIC_SET_SEVERITY_BEGIN slic::setLoggingMsgLevel( slic::message::Debug ); // SPHINX_SLIC_SET_SEVERITY_END // SPHINX_SLIC_SET_STREAM_BEGIN slic::addStreamToAllMsgLevels( new slic::GenericOutputStream( &std::cout,format) ); // SPHINX_SLIC_SET_STREAM_END // SPHINX_SLIC_LOG_MESSAGES_BEGIN SLIC_DEBUG( "Here is a debug message!" ); SLIC_INFO( "Here is an info mesage!" ); SLIC_WARNING( "Here is a warning!" ); SLIC_ERROR( "Here is an error message!" ); // SPHINX_SLIC_LOG_MESSAGES_END // SPHINX_SLIC_FINALIZE_BEGIN slic::finalize(); // SPHINX_SLIC_FINALIZE_END return 0; } axom::utilities::processAbort() The axom::utilities::processAbort() function gracefully aborts the application by: 1. Calling abort() if it is a serial application. 2. Calls MPI_Abort() if the Axom Toolkit is compiled with MPI and the application has initialized MPI, i.e., it’s a distributed MPI application. Slic Macros Used in Axom Slic provides a set of convenience macros that can be used to streamline logging within an application. Note The Slic Macros Used in Axom are not the only interface to log messages with Slic. They are used within the Axom Toolkit for convenience. Applications or libraries that adopt Slic, typically, use the C++ API directly, e.g., call slic::logMessage() and wrap the functionality in application specific macros to better suit the requirements of the application. SLIC_INFO The SLIC_INFO macro logs INFO messages that consist general information reported by an application. The following code snippet illustrates the usage of the SLIC_INFO macro: SLIC_INFO( "Total number of mesh cells:" << N ); SLIC_INFO_IF The SLIC_INFO_IF macro provides the same functionality with the SLIC_INFO macro, however, it takes one additional argument, a boolean expression, that allows the application to conditionally log an INFO message depending on the value of the boolean expression. For example, the following code snippet illustrates the usage of the SLIC_INFO_IF macro. SLIC_INFO_IF( (myval >= 0), "[" << myval << "] is positive!" ); In this case, the INFO message is only logged when the boolean expression, (myval >=0) evaluates to true. Note The primary intent is to provide a convenience layer and facilitate in a cleaner and more compact code style by encapsulating the conditional branching logic within a macro. SLIC_ERROR The SLIC_ERROR macro logs ERROR messages that indicate that the application has encountered a critical error. The following code snippet illustrates the basic usage of the SLIC_ERROR macro: SLIC_ERROR( "jacobian is negative!" ); A stacktrace of the application is appended to all ERROR messages to facilitate debugging. Note By default, an ERROR message triggers a call to abort() the application. However, this behavior can be toggled by calling slic::enableAbortOnError() and slic::disableAbortOnError() accordingly. See the Slic Doxygen API Documentation for more information. SLIC_ERROR_IF The SLIC_ERROR_IF provides the same functionality with the SLIC_ERROR macro, however, it takes one additional argument, a boolean expression, that allows the application to conditionally log an ERROR message depending on the value of the boolean expression. The following code snippet illustrates the usage of the SLIC_ERROR_IF macro. SLIC_ERROR_IF( (jacobian < 0.0 + TOL), "jacobian is negative!" ); In this case, the ERROR message in only logged when the boolean expression, (jacobian < 0.0 + TOL) evaluates to true. Note The primary intent is to provide a convenience layer and facilitate in a cleaner and more compact code style by encapsulating the conditional branching logic within a macro. SLIC_WARNING The SLIC_WARNING macro logs WARNING messages that indicate that the application has encountered an error, however, the error is not critical and the application can proceed. The following code snippet illustrates the basic usage of the SLIC_WARNING macro. SLIC_WARNING( "Region [" << ir << "] defined but not used in the problem!" ); SLIC_WARNING_IF Similarly, the SLIC_WARNING_IF macro provides the same functionality with the SLIC_WARNING macro, however, it takes one additional argument, a boolean expression, that allows the application to conditionally log a WARNING message depending on the value of the boolean expression. The following code snippet illustrates the basic usage of the SLIC_WARNING_IF macro. SLIC_WARNING_IF( (val < 1), "val cannot be less than 1. Forcing value to 1." ); val = 1; In this case, the WARNING message is only logged when the boolean expression, (val < 1), evaluates to `` true``. Note The primary intent is to provide a convenience layer and facilitate in a cleaner and more compact code style by encapsulating the conditional branching logic within a macro. SLIC_DEBUG The SLIC_DEBUG macro logs DEBUG messages that are intended for debugging information intended for developers. The following code snippet illustrates the basic usage of the SLIC_DEBUG macro SLIC_DEBUG( "Application is running with " << N << " threads!" ); Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information. SLIC_DEBUG_IF Similarly, the SLIC_DEBUG_IF macro provides the same functionality with the SLIC_DEBUG macro, however, it take one additional argument, a boolean expression, that allows the application to conditionally log a DEBUG message depending on the value of the supplied boolean expression. The following code snippet illustrates the basic usage of the SLIC_DEBUG_IF macro. SLIC_DEBUG_IF( (value < 0), "value is negative!" ); In this case, the DEBUG message is only logged when the boolean expression, (value <0), evaluates to true. Note The primary intent is to provide a convenience layer and facilitate in a cleaner and more compact code style by encapsulating the conditional branching logic within a macro. Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information. SLIC_ASSERT The SLIC_ASSERT macro is used in a similar manner to the C++ assert() function call. It evaluates the given expression and logs an ERROR message if the assertion is not true. The contents of the error message consist of the supplied expression. The SLIC_ASSERT macro is typically used to capture programming errors and to ensure pre-conditions and post-conditions are satisfied. The following code snippet illustrates the basic usage of the SLIC_ASSERT macro. SLIC_ASSERT( data != nullptr ); Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information. SLIC_ASSERT_MSG The SLIC_ASSERT_MSG macro provides the same functionality with the SLIC_ASSERT macro, however, it allows the application to supply a custom message in addition to the boolean expression that is evaluated. The following code snippet illustrates the basic usage of the SLIC_ASSERT_MSG macro. SLIC_ASSERT_MSG( data != nullptr, "supplied pointer is null!" ); Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information. SLIC_CHECK The SLIC_CHECK macro evaluates a given boolean expression, similar to the SLIC_ASSERT macro. However, in contrast to the SLIC_ASSERT macro, when the boolean expression evaluates to false, the macro logs a WARNING instead of an ERROR. The following code snippet illustrates the basic usage of the SLIC_CHECK macro. SLIC_CHECK( data != nullptr ); Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information. SLIC_CHECK_MSG The SLIC_CHECK_MSG macro provides the same functionality with the SLIC_CHECK macro, however, it allows for the application to supply a custom message in addition to the boolean expression that is evaluated. The following code snippet illustrates the basic usage of the SLIC_CHECK_MSG macro. SLIC_CHECK_MSG( data != nullptr, "supplied pointer is null!" ); Warning This macro will log messages only when the Axom Toolkit is configured and built with debug symbols. Consult the Axom Quick Start Guide for more information.
ESSENTIALAI-STEM
Szymon Lenkowski Szymon Lenkowski (born 28 February 1981) is a Polish cinematographer and director based in Hollywood. Life and career Lenkowski was born on 28 February 1981 in Rzeszow, Poland. In 2005, Lenkowski graduated from the National Film School in Łódź with a degree in cinematography. He was taught by Polish cinematographer Witold Sobocinski, authoring a thesis titled "Digital Future of Cinema". Lenkowski has directed photography for 2 feature films, 15 short films, 10 documentary films, 5 music videos, 10 HD multi-camera live concerts, and over 50 television advertisements. Whilst winning awards for his short films, Szymon was noticed by Warsaw production companies and started shooting commercials. In his mid-twenties, Lenkowski had already worked for numerous global advertising agencies including Publicis, BBDO, Euro RSCG, Grey, and McCann Erickson. In 2009, he shot his first feature film and received a nomination for Camerimage Festival's Golden Frog award. Later in the same year, together with Piotr Bujnowicz he directed Trailer and More, and began creating movie trailers. In 2010 he was nominated for a Golden Trailer Award for the film General Nil. In 2011 he won the Golden Trailer Award for the Little Rose trailer. His second feature film, Shameless, was expected to be released in the summer of 2012 Awards * 2011 – Golden Trailer Awards – Best Foreign Romantic trailer for Little Rose (aka. Różyczka) trailer Szymon Lenkowski, Piotr Bujnowicz - Winner * 2010 – Golden Trailer Awards – Best Foreign trailer for General Nil Szymon Lenkowski, Piotr Bujnowicz – Nomination * 2009 - Polish Film Festival, Gdynia - I am yours (Jestem Twój), Main competition * 2009 - Busan International Film Festival - I am yours (aka. Jestem Twój), World Cinema section * 2009 - Montreal World Film Festival - I am yours (aka. Jestem Twój), World Competition section * 2009 - The International Film Festival of the Art of Cinematography CAMERIMAGE – Szymon Lenkowski, The best Cinematography in Polish feature film - Nomination * 2008 – Karlovy Vary International Film Festival – Like in heaven (aka. Jak w niebie), Main Competition for Documentary Films * 2008 - 48th Cracow Film Festival – Like in heaven (aka. Jak w niebie), Main Competition * 2007 - DOCSDF, International Documentary Film Festival of México City (Oct-Nov 2007) - The Seeds (aka. Nasiona) Special Mention of the Jury in the Best International Short Documentary competition * 2007 - Parnu International Documentary and Anthropology Film Festival (July 2007), - The Seeds (aka. Nasiona), Grand Prix * 2007 - II International Film Festival Competition CINEMAGIC in Plock (June 2007) - The Seeds (aka. Nasiona), Main Prize * 2007 - 28. Big Muddy Film Festival (Carbondale, USA) - The Seeds (aka. Nasiona), The First Prize for the Short Documentary Film * 2007 - The Big Sky Documentary Film Festival (Montana, USA) - The Seeds (aka. Nasiona), The Jury's Special Prize * 2007 - The CMU International Film Festival 2006 „Faces of Democracy” (Pittsburgh, USA) - The Seeds (aka. Nasiona), The Main Prize in the student's film competition * 2006 - 3rd Festival Kinoteatr.doc (Moskva 2006) * 2006 - XVI Media Festival „Man in Danger” (Lodz, Poland) - The Seeds (aka. Nasiona), The Jury's Special Prize (given for the first time in the history of the festival) * 2006 - International Documentary Film Festival "Flahertiana" (Perm, Russia) - The Seeds (aka. Nasiona), The Great Silver Nanook Prize * 2006 - 46th Cracow Film Festival (May 2006), Grand Prix Złoty Lajkonik, KODAK's Prize for Wojciech Kasperski (dir.) - The Seeds (aka. Nasiona), The Students’ of Cracow Jury Prize * 2006 - 13 L'Alternativa Festival de Cinema Independent de Barcelona - The Seeds (aka. Nasiona), Special Mention * 2006 - “Artdokfest”, National Prize of LAVR (Moscow) - The Seeds (aka. Nasiona), Main Prize for the Art-film (the best writer and director; the best photography; the best producer) * 2006 - Prix Europa, Berlin; - The Seeds (aka. Nasiona), Special Mention for the best television documentary film * 2006 - SILVERDOCS: AFI/Discovery Channel Documentary Festival (USA)- The Seeds (aka. Nasiona); Main prize for the best short documentary film * 2006 - International Film Festival “Kratkofil” Banja Luka, Bosnia and Herzegovina - The Seeds (aka. Nasiona); Grand Prix * 2005 - Berlinale Berlin Today Award - If I Were a Fish, Nomination * 2005 - Kielce (Nurt 2005) - The Dwarfs Are Going To Ukraine (aka. Krasnoludki jadą na Ukrainę), Audience Awards * 2005 – Golden Duck Award of FILM magazine – Cyrano, The Best Independent Film, Nomination * 2005 – OFFSKARY 2005 – Cyrano, * 2004 - CINEMA magazine awards - Cyrano- Best independent film, Best script (Marczewski, Bartosz Kurowski) – awarded, best actor (Maciej Marczewski) – nomination * 2004 – Szymon Lenkowski – Cyrano - KAMERA magazine award for cinematography * 2004 – Warsaw (films tomorrow) - Cyrano, Grand Prix – best student film * 2004 – Kazimierz Dolny (Summer of Films) - Cyrano, Grand Prix – best short film * 2004 – Cracow (Krakffa) - Cyrano, Grand Prix * 2006 - Szymon Lenkowski Cieszyn (School Film) – Poor-land (aka. Bieda ziemia) Award for best cinematography * 2005 - Szymon Lenkowski Offskary – Poor-land (aka. Bieda ziemia), nomination for best cinematography * 2005 - Szymon Lenkowski Cieszyn - (Węgiel Student Film Festival) - Poor-land (aka. Bieda ziemia) best cinematography special mention * 2005 - Tampere Film Festival Finland – Poor-land (aka. Bieda ziemia), international competition * 2005 – Israel, Docaviv for - Poor-land (aka. Bieda ziemia) * 2005 – Grimstad IFF Nowary - Poor-land (aka. Bieda ziemia), international competition * 2005 – Sopot Film Festiwal – Poor-land (aka. Bieda ziemia), special mention * 2004 – Cracow Film Festiwal – Poor-land (aka. Bieda ziemia), Polish competition * 2004 – IDFA Amsterdam for Poor-land (aka. Bieda ziemia) * 2004 – Offensiva – Dirty World bronze OFF award in the video art category * 2005 – Prowincjonalia 2005 – Winners and Loosers (aka. Zwyciezcy i przegrani), Award for the Best Documentary Film * 2005 – Breslau Optimistic Film Festival “Happy End” – Winners and Loosers (aka. Zwyciezcy i przegrani), Grand Prix * 2004 – Milano (MFFS) Italy - Winners and Loosers (aka. Zwyciezcy i przegrani), “Mention d’Honneur” „Sport and society. Sport and solidarity” * 2003 - Szymon Lenkowski Cannes – Polish representation as part of New Talent Showcase * 2002 - Szymon Lenkowski International Film Festival of the Art of Cinematography– Silver Tadpole Selected filmography * 2012 – Shameless, (aka. Bez wstydu) feature film, dir. Filip Marczewski. - director of photography * 2011 - In Treatment (aka. Bez tajemnic) HBO Poland TV Series, dir. Anna Kazejak-Dawid, Jacek Borcuch – director of promotional materials, author of trailers, TV spots, promotional films, and next-ons * 2010 - Little Rose (aka. Rosebud, aka. Różyczka) feature film, dir. Jan Kidawa Błoński - director of promotional materials * 2010 - General Nil feature film, dir. Ryszard Bugajski - director of promotional materials * 2009 – I am yours (aka. Jestem Twój) – feature film, dir. Mariusz Grzegorzek - director of photography * 2008 – Like in heaven (aka. Jak w niebie) - documentary film 28’, dir. Filip Marczewski - director of photography * 2007 – Aria Diva – medium length feature film, dir. Agnieszka Smoczyńska - director of photography * 2006 – The Seeds (aka. Nasiona), documentary film 28’, dir. Wojciech Kasperski - director of photography * 2005 – If I Were a Fish - documentary film 18’, dir. Tomasz Wolski - director of photography * 2005 – The Dwarfs Are Going To Ukraine (aka. Krasnoludki jadą na Ukrainę) - documentary film 58’, dir. Miroslaw Dembinski - director of photography * 2004 – Cyrano - feature film DV 17’, dir. Filip Marczewski - director of photography * 2004 – Poor-land (aka. Bieda ziemia) - documentary film 35mm 5’, dir. Filip Marczewski - director of photography * 2004 – Dirty World, music video 3’, music. artist: TheCalog, - director/ director of photography * 2004 – Winners and Loosers (aka. Zwyciezcy i przegrani) – documentary film 52’, dir. Mirosław Dembinski - director of photography * 2002 – Siena - feature film 4’ - director, director of photography
WIKI
Natural Supplements for Reducing Anxiety and Depression Anxiety and depression are two of the world’s most widely encountered mental health issues, as highlighted by the World Health Organization. They’re responsible for a large amount of disability across the globe, with depression being number one and anxiety disorders in sixth place. Traditional treatments for anxiety and depression include psychotherapy and prescription medication, but some people are turning to natural supplements as an alternative or complementary solution. How Natural Supplements Can Help Natural supplements like allesNATUR have been used for centuries to treat various health conditions, and they are increasingly recognized for their potential to help with anxiety and depression. Some natural supplements have a calming effect on the mind and body, while others can boost mood and energy levels. Many natural supplements also have anti-inflammatory properties, which can help reduce the inflammation in the brain linked to anxiety and depression. Before beginning to take any natural supplements, it’s important to remember that they cannot replace professional medical advice or treatment. Consult with a healthcare provider beforehand, especially if you are taking any type of prescription medication. Popular Natural Supplements for Anxiety and Depression 1. St. John’s Wort: St. John’s Wort has been used throughout history to manage depression symptoms and is still highly popular today. It appears to do so by improving the serotonin and dopamine, which help control moods. 2. Ashwagandha: Ashwagandha has a long-standing history of being a popular herb in Ayurvedic medicine. It is thought to help with stress and anxiety by reducing cortisol levels within the body. 3. Omega-3 Fatty Acids: These are crucial for good health, and can be consumed through foods such as fish and nuts. Studies suggest that these fats can help lower inflammation in the brain, which could potentially minimize the symptoms of depression and anxiety. 4. Valerian Root: Valerian root is a natural supplement commonly used as a sleep aid, but it also has calming properties that can help reduce anxiety. While natural supplements are not a cure-all for anxiety and depression, they can be a promising solution for some people. They offer a natural and holistic approach to mental health that can complement traditional treatments like psychotherapy and medication. When it comes to natural supplements, no two people will have the same experience. It may take some experimentation until you find the right combination that works for you. Keep in mind that everyone’s results can differ. With the guidance of a healthcare provider, natural supplements can be a safe and effective tool for managing anxiety and depression. 𐌢
ESSENTIALAI-STEM
Sheikhan Sheikhan (Punjabi Shahmukhi: ) (Punjabi Gurmukhi: ) (Hindi: से़ख़न) town is situated in Chiniot Tehsil and in District Chiniot in Punjab province of Pakistan. Until 2009, new Chiniot District was not formed by the government and Chiniot Tehsil was part of Jhang District Southern side The village Sheikhan is situated some distance 2.5 km from the right bank of the river Chenab (Chanhan) in the Utar region which flows in the southeast of the village. A rain pond (talaab) is also located a half-mile from the village on the southern side, called Sangar. Northern side On the north side, a canal flowing from the river Jehlum (Vehat) provides water to village lands for cultivation. Most of the population lives in old villages, while a colony was also settled by prime minister Zulfiqar Ali Bhutto in the 1970s for non-landowners. A number of the population also lives on the north side crossing the canal after the development of a link road between Jhang and Lalian, which is called Adda Sheikhan. Adjoining villages Bhawana is just 28 km from Sheikhan. Adjoining villages to the west are Ratta Matta. Vegetation Being an agricultural area, most of the land is ploughed but wasteland can still be found here, especially near the riverbanks. Different kinds of trees, grasses and shrubs are found here. Trees Kikar, talhi, jand, pippal, bohar, vann. Shrubs Karil, akk, etc. Grasses Lunak, dhaman, etc. Herbs Hermal Area politicians * Saqlain Anwar Sipra, Member Profile, Provincial Assembly of Punjab (constituency PP-76 Chiniot-IV-Cum Jhang) (2013–2018)
WIKI
Storage for Containers using NetApp ONTAP NAS – Part V Shipping containers Overview In this article we will look at how you can configure and dynamically provision ONTAP NAS Storage for containerized applications in a Kubernetes/OpenShift environment. This article is a work from Kapil Arora (Cloud Platform Architect @NetApp). NetApp recently released an open source project known as Trident, the first external storage provisioner for Kubernetes leveraging on-premises storage. Trident enables the use of the new storage class concept in Kubernetes, acting as a provisioning controller that watches for PVCs (persistent volume requests) and creates them on-demand. This means that when a pod requests storage from a storage class that Trident is responsible for, it will provision a volume that meets those requirements and make it available to the pod in real-time. To learn more  check-out these  Trident videos. This is how it works: 1. The OpenShift/Kubernetes Administrator deploys and configures Trident with NetApp ONTAP NAS and defines StorageClasses and Quotas. 2. The developer creates a PVC  with the respective StorageClass. 3. Trident dynamically provisions storage for the developer. Installation and Configuration Instructions Following are the steps to install and configure NetApp ONTAP NAS backend with Trident in your OpenShift environment: 1) Ensure OpenShift 3.4+, or OpenShift Origin 1.4+ Create a service account for trident. oc create serviceaccount trident oc adm policy add-cluster-role-to-user storage-admin system:serviceaccount:myproject:trident oc adm policy add-scc-to-user anyuid system:serviceaccount:myproject:trident oc adm policy add-role-to-user edit system:serviceaccount:myproject:trident You can find detailed  instructions here. 2) Install ‘kubectl’ client for Trident install script curl -LO https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl chmod +x ./kubectl  sudo mv ./kubectl /usr/local/bin/kubectl You can find detailed instructions here. 3) Download and untar the Trident installer bundle. 4) Install nfs utils on all your OpenShift nodes if not already installed. $ sudo yum install -y nfs-utils 5) Configure the ONTAP backend. A sample is provided here sample-input/backend-ontap-nas.json. Copy the edited file to setup/backed.json  6) Execute Trident installer script. $ ./install_trident.sh --namespace myproject --serviceaccount trident 7) Wait until the deployment is complte. You should see Trident deployment when you execute ‘oc get deployment' and trident pod when you execute ‘oc get pods' 8) If you face issues, check this troubleshooting session. 9) Register you backend with Trident $ cat setup/backend.json | kubectl exec -i -- post.sh backend 10) Edit storage-class-nfs-gold.yaml to configure your storage class. 11) Create storage class in openshift: $ oc create -f  storage-class-nfs-gold.yaml 12) Trident is now installed and we have also defined a storage class for ONTAP NAS. 13) Now Storage is dynamically provisioned when we create a PVC. e.g. Make sure you provide the right ONTAP NFS export policy as per your environment. Application use-case Let us look at how we can deploy a WordPress application backed by a MySQL database. In the below example we use Trident to dynamically provision ONTAP NAS storage for our WordPress (+ MySQL) application using PVCs and nfs-gold StorageClass. mysql-wordpress-ontap-openshift NetApp ONTAP NetApp ONTAP is a unified enterprise storage system which supports both File and Block storage  and comes in many flavours like AFF (All Flash version), FAS (Fabric Attached Storage), ONTAP Select (Virtualized) and ONTAP Cloud (in Public cloud AWS/Azure). Why NetApp ONTAP? NetApp ONTAP offers following key benefits for the most demanding applications: • Predictable high performance • Consistent low latency and excellent response time • Inline efficiency, achieved by inline deduplication and compression • Instant, efficient and efficient database clones for QA and dev-test environments • Backup and recovery using Snapshot technology • Disaster recovery solutions using SnapMirror(enterprise replication technology) • Scalability, reliability and non-disruptive operations Summary With NetApp Trident dynamic provisioner ONTAP NAS storage can be provisioned on-demand for your containerized applications. Trident can help you deploy Stateful containerized applications  e.g.  Databases with NetApp ONTAP enterprise storage References 1. NetApp Trident GitHub project 2. NetApp thePub website 3. Join NetApp on Slack 4. NetApp Trident and OpenShift 5. Trident Videos Happy ONTAPing! (c) 2017 Keith Tenzer Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s
ESSENTIALAI-STEM
• Dries's avatar · 562df8fe Dries authored * Added Jeremy's pager: "This is a simple, generic pager for Drupal-CVS. It is designed to be easily themeable and expandable. The code is highly-commented to enhance readability." "Pagers are constructed by combining the provided pieces (all of which can be easily modified to display the text or image you prefer) into your custom pager." * Statistics module fixes by Jeremy: - removed superfluous check for existence of watchdog() - saving changes in admin page displays status and returns same page - no longer return 1971/01/01 in "view statistics" table - switched from "!=" to "<>" in SQL queries for ANSI-SQL compliance - switched from "MAX(timestamp) as timestamp" to "MAX(timestamp) as max_timestamp" moving towards ANSI-SQL compliance. * Added a "theme_item_list" function to format itemized lists. Also changed a couple of modules to take advantage of it. Makes for a more consistent UI. 562df8fe pager.inc 11 KB
ESSENTIALAI-STEM
Anfengtang reservoir Anfengtang reservoir is an ancient reservoir located in Huai river basin of China. It was built during the Warring States period in 585 BC and is still under operation. The reservoir was originally called the Shaobei (meaning Peony flower). The dam was constructed with soil, woods and straws.
WIKI
Page:Aerial Flight - Volume 1 - Aerodynamics - Frederick Lanchester - 1906.djvu/236 § 154 planes four inches apart, at the average speeds, the stratum of air disturbed during its passage over it is, at any rate, less than four inches thick. In other words, the plane is sustained by the compression and elasticity of an air layer not deeper than this, which we may treat for all our present purposes as resting on a solid support less than four inches below the plane.” “(The reader is again reminded that this sustenance is also partly due to the action of the air above the plane.)” In the author's opinion the whole of this inference is unsound. Professor Langley appears to have overlooked the possibility of a superposition of the two systems of flow, such as is plotted for the Eulerian fluid in Fig. 73, Chap. IV. It is evident that such a superposition is not only possible but highly probable, each plane affecting the other profoundly so far as the actual stream-line system is concerned; but the combined supporting power of the planes, that is, the sum of the two systems, being substantially unaffected. Fig. 73 illustrates, from the case of the perfect fluid, the manner in which the two cyclic systems proper to the two planes may react on one another. Beyond this it is evident that the speed of propagation of the compression and rarefaction within the fluid will be equal, or approximately equal, to that of sound, so that if this were really the determining factor as affecting the layer of fluid involved,
WIKI